The form is:
<FORM METHOD="POST" target="_top" ACTION="/cgi-bin/formmail/FormMail.pl">
<INPUT TYPE="HIDDEN" NAME="recipient" VALUE="myemail@email.com.au">
<INPUT TYPE="hidden" NAME="subject" VALUE="Newsletter enquiry">
<input type="hidden" name="redirect" value="http://www.xxmysitexx.html">
<input type="hidden" name="missing_fields_redirect" value="http://www.xxmysitexx.html">
<input type="hidden" name="print_config" value="name,phone,e-mail">
<p><label for="name">First Name</label> <input type="text" id="name" /></p>
<p><label for="phone">Last Name</label> <input type="text" id="phone" /></p>
<p><label for="e-mail">Email</label> <input type="text" id="e-mail" /></p>
<p class="submit"></p>
<p>
<input type="submit" value="Submit" margin-left="auto" />
</p>
</form>
Anyone?!
These are probably incorrect:
<input type="text" id="name" />
<input type="text" id="phone" />
<input type="text" id="e-mail" />
They should probably be:
<input type="text" id="name" name="name" />
<input type="text" id="phone" name="phone"/>
<input type="text" id="e-mail" name="email"/>
Try that and see what happens...
Correct, and the explanation behind that is names are used to assign key/value pairs to transmit the data to the server, ids are used to manipulate the document client side via CSS, Javascript, or other technologies.
However, this generic script is well known for being abused by spammers, and is a headache waiting to happen for you, beginning with
<INPUT TYPE="HIDDEN" NAME="recipient" VALUE="myemail@email.com.au">
Although it's a hidden field, this is an appetizer for email spiders. They will read your page and find this email, drop it into a spam list. If you have access to this script, hard code the email address into the script, at the very least.