I know what you're asking and the methodology is at this time
quite useless yet it should still probably be used regardless just to
foil the entry-level spammers for a little while longer.
The credibility of the methodology is predicated on the assumption
that there are no professional spammers, they have no f*cking brains,
and do not know how to write code that can screen scrape pages and
use regular expressions to cull the e-mail address from the HTML
response of pages such as Contact Us, About Us, Support and so
on. Finally the assinine assumption would have the naive believe that
spammers are not using inexpensive Linux server harvesting and
processing farms that function 365-24-7
IMO using JavaScript to dynamically write an e-mail address to the
page when the page is rendered so as to avoid that address being
harvested was reliable for about what? Six months or so? Maybe.
The same is true of the obfuscation that can be observed in my
sig shown below. The gig is up as using human readable text and
phrases such as REMOVETHISTEXT has also been compromised.
The spammers have been harvesting the obfuscated addresses
regardless and using what they harvest to create huge data dictionaries
that they can then launch brute force grammar attacks on to parse the
flakey sh!t from the good stuff. I know this is going on as I have been
receiving spam that includes variants using REMOVETHISTEXT in the
address -- I have to come up with something new myself... but what to
do next!
--
<%= Clinton Gallagher
A/E/C Consulting, Web Design, e-Commerce Software Development
Wauwatosa, Milwaukee County, Wisconsin USA
NET (e-mail address removed)
URL
http://www.metromilwaukee.com/clintongallagher/