Posted by Sandman on 09/15/05 11:02
In article <eS0We.23$tt.3@newsfe2-win.ntli.net>,
"Virginner" <theDOTbin@virginLOSEIT.net> wrote:
> "Paul Marshall" <marshallrp@gmail.com> wrote in message
> news:43288e3f$0$97131$ed2619ec@ptn-nntp-reader03.plus.net...
> | Hi
> |
> | I am my wits end! I have a PHP script running that captures variables
> | posted from a form on the previous page. The script then emails the
> | results using the mail() function.
> |
> | The script is currently being spammed in two ways:
> |
> | 1) The page is being loaded directly, therefore emailing blank results
> | 2) The variables are made up of an accepted email address (all variables
> | are filled with it). This email address is random, created using any
> | cobinations of characters before the accepted domain.
>
> Try this...
>
> if (!checkdnsrr(array_pop(explode("@",$_POST["email_address"])),"MX"))
> {
> $message='That email address does not seem to be valid';
> }
>
> D.
That's a good way to block lots of valid email addresses.
--
Sandman[.net]
[Back to original message]
|