In this chapter, you have learned about user and click tracking, specifically how they operate, and the limitations of each. You've examined user-and click-tracking statistics to determine which users are opening which messages and which links are being clicked. Specifically, you've covered:
In the following chapter, we'll be looking at securing your phpList installation, both against common attacks (that is, brute force) and against potential (current and future) vulnerabilities.
3.147.85.221