For a while now spammers have been using obfuscated URLs (eg http://microsoft.com@3463815505/) in an attempt to hide where their webpages are hosted.
Many people now know how to find the real address hidden behind these URLs, either by hand or by using canned tools.
The next step was using throwaway webpages on providers such as Angelfire, with the results of the signup form being emailed to an account elsewhere (often a throwaway address or forwarding address) either using an ACTION="mailto:throwaway@yahoo.com" or using an public cgi script at another site (ACTION="http://insecure.tld/cgi-bin/formmail.cgi" combined with <INPUT TYPE="hidden" NAME="recipient" VALUE="throwaway@yahoo.com">).
If you look at the source code, either with View Source from your browser, or using a canned tool you can see the recipient.
So now... the spammers are using tools like HayWyre to ship the contents of the webpage in an encoded format, then use javascript running on the recipients browser to decode it. This means that the HTML source can't be seen easily - as View Source from a browser will just show the encoded form.
Here is an example of the obfuscated source code. Here is the executable javascript version - you'll need to have javascript enabled in your browser.
All of these require you to run javascript on your browser, so if there's anything 'hostile' in there, it'll run. Generally, though, javascript can't do much worse than crash your browser or force you to kill the process by hand
Microsoft have a host of useful plugins for IE5 at http://www.microsoft.com/Windows/ie/WebAccess/default.ASP, including the View Partial Source tool as part of their Web Developer Accesories pack. Grab it and install it (while you're there the web accesories and the AltaVista tools are handy to have too).
Once it's installed you can load the page then select the whole page or a section of it, right-click and select View Partial Source to see the HTML for the selection.
Navigator is documented to show the HTML source generated by javascript document.write() calls. I have once managed to persuade it to do this properly, so it is possible, but there seem to be some strange bugs in its caching of data that makes it hard to do consistently.
If you download the source, then edit it locally you can persuade the javascript to show you the HTML source produced.
There are lots of ways to do this, but this one seems pretty portable.
Edit the source and look for document.write(foo) for some foo. Replace this with document.write(foo.split("<").join("<br><"))
You'll normally end up with:
function d(ber) {document.write(c(alf,ber).split("<").join("<br><"));}
Load the file into your browser, and you'll see the source.