Spam detection software, running on the system "avery.infomotions.com", has identified this incoming email as possible spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see eric_morgan_at_infomotions.com for details. Content preview: The Zotero browser plugin seems to have the ability to extract metadata (e.g., author name) and PDF from a publisher's page. From a screen reader perspective this is helpful as it avoids having to learn how to navigate publisher's pages. [...] Content analysis details: (1.0 points, 0.5 required) pts rule name description ---- ---------------------- -------------------------------------------------- -0.0 BAYES_20 BODY: Bayes spam probability is 5 to 20% [score: 0.1844] -0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at http://www.dnswl.org/, no trust [66.175.211.245 listed in list.dnswl.org] 0.2 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level mail domains are different -0.0 SPF_PASS SPF: sender matches SPF record -0.6 RP_MATCHES_RCVD Envelope sender domain matches handover relay domain -0.0 SPF_HELO_PASS SPF: HELO matches SPF record 0.0 T_HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level mail domains are different -1.0 MAILING_LIST_MULTI Multiple indicators imply a widely-seen list manager 2.3 FORGED_MUA_MOZILLA Forged mail pretending to be from Mozilla
attached mail follows:
The Zotero browser plugin seems to have the ability to extract metadata (e.g., author name) and PDF from a publisher's page. From a screen reader perspective this is helpful as it avoids having to learn how to navigate publisher's pages. Anyone have time to talk about how this done via phone? markReceived on Mon Apr 13 2020 - 20:21:01 EDT