Content deleted Content added
→Security vulnerabilities: «+"Some [[e-mail", "[[E-mail" → "takes advantage of the multi-part message format to trick spam filters into believing that the message is legitimate by including e-mail spam", +" for these reasons", "high" → " |
→Multi-part formats: «+"The message itself is of type multipart/alternative, and contains two parts, one with type text/plain, and one with text/html. HTML email clients read the HTML part, while text-only clients ignore the HTML part and displa |
||
Line 20:
== Multi-part formats ==
Many email clients are configured to send a plain text version of a message along with the HTML version, to ensure that it can be read even by text-only clients, using the <code>[[MIME#Content-Type|Content-Type]]: [[MIME#Alternative|multipart/alternative]]</code>, as specified in RFC 1521.<ref>[http://www.freesoft.org/CIE/RFC/1521/18.htm RFC 1521 7.2.3. The Multipart/alternative subtype]</ref><ref>[http://www.codestone.ltd.uk/software/docs/csmail/tn1010-11-2.pdf TN1010-11-2: Multipart/Alternative – Gracefully handling HTML-phobic email clients.]</ref><ref>[http://www.wilsonweb.com/wmt5/html-email-multi.htm Sending HTML and Plain Text E-Mail Simultaneously]</ref> The message itself is of type multipart/alternative, and contains two parts, the first of type text/plain, which is read by text-only clients, and the second with text/html, which is read by HTML-capable clients.
== Message size ==
|