|
|
|
|
|
There are also many
website that offers an
automated process for creating and sending
spoofed email by inserting someone else
email address into the
Mail FROM:
or
REPLY TO:
fields--which also contains information about the "origin" of the message--but
most people don't know how to decipher it
or simply assume that the spoofed message is genuine. Spoofing is usually to obtain information, sell something, computer infected by spam zoombie, spambot or simply hate mail by assuming another's ID and making the recipient think that the email is from the sender... a) Pretending to be a legitimate bank, etc., to get your ID. b) A link in the message body taking you to a sales site c) Attachments with virus or hate messaged) Selling something by using an infected computer to send-out sales pitch (unknown to the owner of the machine) and at the same time "spoofing" the spam using the computer owner address book email list. If your email got bounced back to you with contents of: (a) or (b) then you know that someone machine got hijacked by spam zombies, sending out sales messages spoofed with your email address. Usually, not only your email address but others as well from the address book of the hijacked machine. If it is (C) it is usually a hijacked machine trying to propagate virus, perhaps someone sending it for fun or someone (perhaps an ex-employee) trying to create problem. Spoofing does not mean that your computer are infected by "worm, virus, spambot, zombies, etc." and sending out messages from your address book. It could be that "someone or your friend" machine (containing your email address in the address book) is infected or hijacked and sending out messages with your email as well as others, randomly taken from the infected machine address book. |
|
Normally, tracking or finding the culprits is not that difficult, because Deciphering Fake Email; every single Internet email message headers contains... 1. An origin-the machine that sent it.
2.
Relay
the machine relaying it to another machine
Notes:
DNS
(Domain Name System) is a distributed
domain based naming system database that can be query to identify administers
of IP Address--which is a string of numbers, example:
207.151.159.3 are translated into a
string of "letters" called Domain Name
- example: When we send an email we uses character string to specify a destination, like; 2consult @ mailsbroadcast.com but the machine on the internet does not understand this name (character string). The machine uses a protocol called IP (internet protocol) and numbers like these; 132.0.33.54 to represent a destination, which is not very user friendly, therefore, a special internet service called DNS (Domain Name Service) is to help convert character string (name) into numbers. Every email domain or website URL has their own individual destination number that is different from another. Therefore, we send an email to your local ISPs mail server, they will also have a local DNS (Domain Name Service) server (sort of like a mirror DNS site) that can be queried, identify and locate the actual destination of a character string (name). Anyone can use a DNS Program query tool freeware from samspade.org to access a DNS Name Server on the Internet and gather data in its DNS database. See: Tracking Email - Can mass email marketers overcome the problem of Port 25 blocking See: Can mail servers filters forged email headers, IP's or email domain with no MX Records? See: My email was hijacked/spoofed and got blacklisted?
FREE
You can trace an email address and get detailed accurate information including name, address, phone number and much more with this reverse email search tool www.ip-adress.com/trace_email/
FREE
www.webfreer.com
Secure web access with encryption Free, fast &
reliable connections.
You can relax now, your online activities will
be secure, private, and anonymousHide your IP address
<><><><><><><><><><><><><><><><><><><>
Quote
"Most people are familiar
with freeware,
shareware, cookies, media players, interactive content, and file sharing.
What they may not realize is that some of them
contain code or components that allow the developers of these applications
and tools to actually collect and disseminate information about those using
them. They can track your surfing habits, abuse your
internet connection by sending this data to a third party, profile you
shopping preferences, hijack your browser start page or pages, alter
important system files, and can do this without your knowledge or
permission--lavasoft" See the latest threats making the rounds... read it all here at this website http://snopes.comTo submit a complaint about a particular company to the U.S. Federal Trade Commission "Google Federal Trade Commission for a listing of sites". <><><><><><><><><><><><><><><><><><><>
A rootkit is a program that is designed to hide itself and other programs, data, and/or activity including viruses, backdoors, keyloggers and spyware on a computer system. A Rootkit can keep itself, other files, registry keys and network connections hidden from detection and this is why they are so dangerous. Rootkits are used to hide the existence of Spyware, Trojans, Keyloggers and other malware on computers. They are also commonly used by hackers to hide the backdoors they install on computers.
The rise in the use of Rootkits
can be seen at the moment as more
Spyware creators trying to hide their installation from the evolving Spyware
scanners and virus writers trying to hide their existence. Free AVG anti-spyware and AVG anti Virus with free auto update at www.grisoft.com Free Zone alarm firewall with free auto update at www.zonelabs.com |
|
![]() |
|
|