Greetings and my special thanks to Landonsandor and Iori,
To successfully remote mIRC script Email Flooding and Hacker Alerts to our remote staff members, we have successfully implemented and are using the following using mIRC, the Outlook Express Email browser, Outlook Express Command line features, and the Windows SendKey Shell.
The same technique could apply to any mIRC scripting application in which a trigger would begin the following sequence where you wanted to automatically generate and send a email about a given triggered mIRC event.
Note: For Outlook Express, the shortcut key to Send a email document is Alt-s and other email browsers could well use a different keystroke combination which would reflect in minor changes in your file.wsf
Alias routine and .wsf file needed are:
Alias mass.emailflood1
In the Alias Section we've added this:
mass.emailflood1 { run mailto:Someone@charter.net?cc=SomeoneElse@charter.net&bcc=AnoterPerson@hotmail.com&subject=Flooding Alert&body=A Flooding Alert was Issued from Whatever Name chatroom at $time(hTT) $day on $adate | /run C:\1Report/alt-s.wsf }
Adding the Windows SendKey Shell
alt-s.wsf file creation steps:
In the C drive 1Report folder using either Windows NotePad (save as a .txt file then rename as a .wsf file format) or NotePad Plus (save as a .wsf file format) we simply entered the following and named it alt-s.wsf
<job id="js">
<script language="JScript">
var WshShell = WScript.CreateObject("WScript.Shell");
WshShell.SendKeys ("{TAB}");
WshShell.SendKeys ("{TAB}");
WshShell.SendKeys ("{TAB}");
WshShell.SendKeys ("{TAB}");
WshShell.SendKeys ("%(s)");
</script>
</job>
Note: The 4 Tab strokes were needed for us to move the cursor into the body of the email text, once there we automatically initiated the Alt-s command ("%(s)"); which then automatically sends that email out to our staff members. This folder 1Report is of course specific to our needs and is changed as is the hard drive designation on your specific system, the name of the resulting Windows SendKey Shell .wsf file we simply named to reflect its single function namely alt-s.wsf
Additional features regarding the Windows SendKey Shell can be found at this link:
http://msdn.microsoft.com/library/default.asp?url=/library/en-us/script56/html/wsmthsendkeys.asp Windows SendKey Shell Information Testing this new feature:
In a active channel window, simply enter the following:
/timer.test 1 1 /mass.emailflood1
If Nortons or another anti-virus software program halts this specific .wsf file from implementation, simply verify that specific script is safe to use. That doesn't tell Norton's Anti Virus software its OK for other similar scripts to run, just that specific one, if you change your resulting alt-s.wsf then Norton's or another possible anti-virus email protector will again ask you if you wish to add that to its safe list or not.
Again our thanks and best regards to Landonsandor,Iori,the Author of mIRC and the many helpful folks here.
MDA