Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations IamaSherpa on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

"Click here to download pictures" in Outlook 2003 1

Status
Not open for further replies.

nrburgess

IS-IT--Management
Jan 4, 2003
4
AU
I have tried everything to turn off the "Click here to download pictures" feature in Outlook 2003. I have tried the tools, options, Mail Format, Internet Format, "HTML send pictures instead of reference to .... command. Hasn't made any difference. I preferred to receive the pictures as they were intended instead of having to right click to download them.

Any advice?
 
Many HTML messages with a marketing focus include invisible Web bugs—images with embedded URLs that tell the sender that you've opened a message, thus providing readership data for advertisers and confirming an email address.
Outlook 2003 blocks automatic download of html in preview to block theese treats.

What exactly is a Web Bug?

A Web bug is a graphic on a Web page or in an e-mail message designed to monitor who is reading the page or message. Web bugs are often invisible because they are typically only 1-by-1 pixels in size. In many cases, Web bugs are placed on Web pages by third parties interested in collecting data about visitors to those pages.

What information is sent to a server by a Web bug?

The IP address of the computer that fetched the Web bug
The URL of the page that the Web bug is located on
The URL of the Web bug image, which contains the information to be communicated between the Web page visited and the site collecting the data
The time the Web bug was viewed
The type of browser that fetched the Web bug image
A previously set cookie value

(Although this might not seem like much, these items can be used to spread information between multiple Web sites. Click here for a more detailed explanation.)

What are some of the uses of a Web bug on a Web page?

Web bugs can be used to provide an independent accounting of how many people have visited a particular Web site. Web bugs are also used to gather statistics about Web browser use at different sites on the Internet.

In addition, advertising networks can use Web bugs to collect information on what sites a person is visiting to create a personal profile. The personal profile is stored in a database server belonging to the ad network and identified by the browser cookie of the network. The profile determines what banner ad one is shown at a later time.

A more detailed outline of the uses of Web bugs appears under Advanced Topics.

Why are they called Web bugs?

A "bug" is a small eavesdropping device. It's not a euphemism for a programming error.

Rather than the term "Web bugs," the Internet advertising community prefers the more sanitized term "clear GIFs." Web bugs are also known as "1-by-1 GIFs," "invisible GIFs." and "beacon GIFs."

Are all invisible GIF images Web bugs?

No. Invisible GIF files are also used for alignment purposes on Web pages. A Web bug will typically be loaded from a different Web server than the rest of the page, so they are easy to distinguish from alignment GIF files.

Are Web bugs always invisible on a page?

Yes, according to our definition. But Web bugs are not the only types of Web elements that can track user activity. See the Advanced Topics below.

How can I manually locate a Web bug on a page?

Before Bugnosis, the only way to find a Web bug was by viewing the HTML source code of a Web page and searching for IMG tags that match up with cookies stored on the user's computer. A Web bug will typically have its HEIGHT and WIDTH parameters in the IMG tag set to 1, it will be loaded from a different server than the rest of the Web page, and it will have an associated cookie.

I was visiting when Bugnosis told me about a Web bug from ad.doubleclick.net. Which company is responsible for the Web bug: Buy.com or Doubleclick.net?

The companies may have decided together to place the Web bug on Buy.com’s page. In fact, both Web sites need to add a little bit to their Web servers to put the Web bugs there. However, sometimes the main site — the one you are aware of visiting — defers such matters to the site actually providing the bug.

Why are they bugging me?

Companies use Web bugs to:

Count the number of times a particular Web page has been viewed.
Track the Web pages a visitor views within a Web site.
Track what Web pages an individual visits across many different Web sites.
Count the number of times a banner ad has appeared.
Measure the effectiveness of a banner ad campaign by matching visits to a Web site to where banner ads for the site were originally viewed.
Match a purchase to a banner ad that a person viewed before making the purchase. The Web site that displayed the banner ad is typically given a percentage of the sale.
Allow a third party to provide server logging to a Web site that cannot perform this function.
Record and report the type and configuration of the Internet browser used by a visitor to a Web site. This information is typically used in aggregate form to determine what kind of content can be put on a Web site to be viewed by most visitors.
Record and report search strings from a search engine to an Internet marketing company. The search strings are typically used to profile users.
Transfer previously input demographic data (gender, age, zip code, etc.) about visitors of a Web site to an Internet marketing company. This information is typically used for online profiling purposes.
Transfer previously input personally identifiable information (name, address, phone number, e-mail address, etc.) about visitors of a Web site to an Internet marketing company. This information is typically used for online profiling purposes. It also can be combined with other offline demographic data such as household income, number of family members, type(s) of car(s) owned, mortgage balance, etc.
Cookie sync, which allows two companies to exchange data in the background about Web site visitors. This data can be demographics or personally identifiable data, typically used for online profiling purposes.

How many computers are involved when a Web bug is used?

Usually three. For example, suppose Alice surfs to Spend.com, which contains a Web bug. Technically speaking, the Web bug looks like an image embedded in the Spend.com Web page. In response to loading the Spend.com Web page, Alice's computer automatically tries to fetch the embedded image. But it was deposited in Spend.com in a way that says "the image is actually located at Bug.com, go get it from there." Alice's computer dutifully contacts Bug.com, which delivers an invisible image, so this transaction is not at all apparent to Alice. Effectively, the Spend.com site has tricked Alice into transmitting information from Spend.com and/or Alice's computer to Bug.com, without Alice's knowledge.

What information is carried by a Web bug?

1. The type of browser that fetched the Web bug image.
2. The time the Web bug was fetched.
3. The IP address of the computer that fetched the Web bug.
4. The URL of the main Web site.
5. The URL of the Web bug image located on the hidden Web site.
6. A previously-set cookie value.

Information types (1-2) are not necessarily such a big deal. However, (3-6) are more sensitive. The computer's IP address (3) can be traced by network providers, but this usually takes a fair amount of effort. By receiving (4), the hidden Web site learns where the user intended to browse. And the main Web site can control (5) to communicate any extra information it has through Alice's computer to the hidden Web site. Item (6) allows the hidden Web site to recognize the user's computer.

For example, suppose Alice creates an account at Spend.com, which contains a Web bug to Bug.com. During this process she enters her e-mail address alice@example.com. The Spend.com Web site could use a Web bug to transmit her address to Bug.com without Alice's knowledge. But the Spend.com site could send that information directly to Bug.com without involving Alice's computer at all!

Why is this important?

If Spend.com sent the infomation to Bug.com without going through Alice's computer, then all Bug.com could learn is that someone created a login at Spend.com with the e-mail address alice@example.com. Certainly Bug.com could add an e-mail address to their collection, but they would have no automatic way to associate the e-mail address with Alice's Web browser. When Alice visits other Web sites that also contain Bug.com Web bugs, they still wouldn't be able to deduce her e-mail address. Having given her e-mail address to Spend.com for the sole purpose of establishing an account there, Spend.com remains the only site that can recognize her and remember her e-mail address when she returns.

But if Spend.com uses a Web bug to transmit the information through Alice's computer to Bug.com, then Bug.com could arrange to communicate her e-mail address to many other Web sites. For example, when she later visits Splurge.com, it could get her e-mail address from Bug.com with very little effort. So in this case, even though Alice gave her e-mail address to Spend.com for the sole purpose of establishing an account there, she later discovers (without knowing why) that many other Web sites seem to suddenly know her e-mail address.


Can information other than e-mail addresses be shared between sites in this way?

Yes. Health interests, political affiliations, personally identifiable information, sexual disclosures: whatever is expressed at one Web site could be carried by a Web bug to many other Web sites.

Can a Web bug search a user's computer and extract data from it?

No. Web bugs only enable multiple sites to share information that they have collected using some other means, like enticing the user to enter the information into a Web form.

Can one Web site use a Web bug to extract data from another Web site against its will?

No. Of the three computers involved in a Web bug transaction, usually two of them have teamed up to communicate information about the third.

Are Web bugs able to carry any more information than ordinary third-party images such as banner advertisements?

No. But with banner advertisements, it's hard to know whether the information during the transaction has primary value or is just a side effect of delivering the advertisement to the user. But since Web bugs try to remain invisible, they must exist for the sake of the information exchange alone.

Why don’t Web site privacy policies mention Web bugs?

Good question. Web site privacy policies should disclose the use of Web bugs. In fact, the general practice of online profiling by third-party ad networks should be disclosed in privacy policies, but is rarely mentioned.


SYAR
 
It can be turned off in:
Tools - Options - Security tab
Change automatic downoad settings button .

SYAR
 
SYAR2003 -

Can you please credit the site where you got that text? I assume it's for a product called "Bugnosis".

You might also want to be careful - someone might interpret your post as being advertising - if you have no involvment with "Bugnosis" then you need to say so. Otherwise such posts & their posters tend to get red-flagged here at Tek-Tips.
[2thumbsup]

Chip H.


If you want to get the best response to a question, please check out FAQ222-2244 first
 
Sorry about that .
This is no advertising , it's an example/explanation
of web-bugs and how some advertisers can hide privacy tracking .
This is only ment for explaining how the web-bug works ,and an explanation why the hide pictures in outlook 2003 is implemented .

SYAR
 
I guess my original question still remains, can I turn it off?
 
Yes !
Go to Tools menu

Select Options

Select the Security tab

Click on the "Automatic downoad settings button"

Remove the checkmark on
"Don't download pictures or other content automaticly ..."


SYAR
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top