Back in the day, they used to hide warez within images and put them on a webhost. Most of the time they were broken images, but if they took enough time, would be a tiny image like a smiley, but which had a huge file size. We had a script on cron that would scan real late at night, find and report these images. It is possible to have php review the code of the actual image and look for domains in that code. No image should have any domain such as 'amazon' within it's code. Take any image and open it with wordpad. Now find a cookie stuffer image and do the same. You will know what your addon needs to do after seeing that. All it really has to do is look for certain words in the image code, or you can give that option to the forum owner to insert what keywords he would like the addon to check for in the image code.
|