Can't find what you need? Try....Google
  
 
 
 
 
Email Spoofing and Phishing - By tweaking the settings on standard email client like; Eudora, Outlook Express and sending spoofed email by inserting someone else email address into the Mail FROM: or to the REPLY TO: fields  
.
Email Spoofing
and Phishing

Q. "I found out from returned "undelivered" email that those address does not exist in my lists--in the first place, I have never sent them".

A. Many affected owners of email domain being spoofed are complaining of having their account being suspended for spamming and receiving "tons"

 
of harassing hate mails marked as coming from them--which they have never sent and only found-out when they start receiving angry replies or returned undelivered bounce email.

The victims of these new from of harassment in which fake or boogie messages was sent-out posing as the original owner of the email address by spoofing, are usually done by dissatisfied or fired employees, competitors, pranksters, junk mailers, provocateurs or spammers trying to sell something--not that they want you to respond to the email but to click on a link in the message.
 

According to the FBI, spoofing is generally not illegal because no hacking is required, unless it involves a direct threat of violence or death and by using such tactic, know as email spoofing--they exploit the simplicity of Internet SMTP (simple mail transport protocol RFC 821).
 
eMail CRM Freeware I recommend it. It maximize the life-time value of my customers--Quick Tour
emails Art of eMail CRM How to apply minimum efforts for maximum result
at the shortest time?
eMail Bolts & Nuts Interesting emails stuff that you should  know eMail Broadcasting
eMail Marketing Tips Great email marketing strategies and ideas to help you increase sales
Sun Tzu Free eBook Sun Tzu Art of War Leaders without thoughtful strategy invite defeat.
Useful Web Sites
Freeware, shareware tools to help you speed-up your Internet connection
Guest Book  |  Minute Wisdom
Filled with stolen moments, lost dreams, and too many 'if only'
 
 
 
 
 
 

 


Email can be
spoofed
by tweaking the settings on standard email client like; Eudora, Outlook Express, etc., in fact almost all email program can be tweaked/spoofed.

There are also many website that offers an automated process for creating and sending spoofed email by inserting someone else email address into the Mail FROM: or REPLY TO: fields--which also contains information about the "origin" of the message--but most people don't know how to decipher it or simply assume that the spoofed message is genuine.

See: Using a non-existing FAKE sender FROM: or REPLY TO: email address to send or broadcast messages?

Spoofing is usually to obtain information, sell something, computer infected by spam zoombie, spambot or simply hate mail by assuming another's ID and making the recipient think that the email is from the sender...

a) Pretending to be a legitimate bank, etc., to get your ID.

b) A link in the message body taking you to a sales site

c) Attachments with virus or hate message

d) Selling something by using an infected computer to send-out sales pitch (unknown to the owner of the machine) and at the same time "spoofing" the spam using the computer owner address book email list.

If your email got bounced back to you with contents of: (a) or (b) then you know that someone machine got hijacked by spam zombies, sending out sales messages spoofed with your email address.

Usually, not only your email address but others as well from the address book of the hijacked machine.

If it is (C) it is usually a hijacked machine trying to propagate virus, perhaps someone sending it for fun or someone (perhaps an ex-employee) trying to create problem.

Spoofing does not mean that your computer are infected by "worm, virus, spambot, zombies, etc." and sending out messages from your address book.

It could be that "someone or your friend" machine (containing your email address in the address book) is infected or hijacked and sending out messages with your email as well as others, randomly taken from the infected machine address book.

   
 

 

 


100% effective.
I recommend it.

  An easy way
to
stop spam getting
into your PC
Free
2-Try

 

Freeware
eMail
Bounce
manager


"A
valued contribution
that I and the rest of my team sincerely appreciate it. We have checked your software twice and it is good." Alex webmaster@softpicks.net

 


Mike Enlow
Complimentary
Online Stealth
Marketing eBook

 

 

 

 

 


 

 

 

 


 

 

 

 

 

 

 

 


 

 

 

 

 

 

 

 

 

 


 


Normally, tracking
or finding the culprits is not that difficult, because Deciphering Fake Email; every single Internet email message headers contains...

1. An origin-the machine that sent it.

2. Relay the machine relaying it to another machine

3. Final destination (the machine that receive it)

4.
IP address  and  5. Domain name

By using tools like
nslookup a DNS whois tool that perform forward and reverse DNS queries for the current domain address (to get an IP address of a hostname and hostname of the IP address).

Online cheat concealed IP address for scams 28 December 2011 www.straitstimes.com

A computer technician used advanced software to hide his Internet Protocol address while he cheated 19 victims of $12,500 in an online scam. -- PHOTO: REUTERS

A computer technician used masking software to prevent detection while he cheated 19 victims of S$12,500 in an online scam. A district court heard that Robin Goh Chin Soo, 29, used advanced software to hide his Internet Protocol (IP) address and to give the impression he was in Germany.

To make it more difficult for police to track him down, he operated the scam through his neighbour's wireless router without the neighbour's knowledge. When police finally got him, he jumped bail in August 2007 and fled to Malaysia, Thailand and Taiwan.

Goh surrendered himself in August 2011 at the Woodlands Checkpoint (Singapore) as he had grown tired of travelling. On Tuesday, he pleaded guilty to cheating to securing access to the Internet illegally, and concealing his criminal proceeds.

He will be sentenced on Jan 17 2012. Deputy Public Prosecutor Zhuo Wenzhao told the court that in early October 2006, Goh posted on motoring websites claiming that he was in Germany. He also said he was able to obtain bulk discounts on car parts and accessories and quoted prices that were 25% lower than retail prices. He invited forum users to place orders within him although he was not in a position to obtain discounted prices. Between October and November 2006, several victims reported the scam to the police.

Notes:
The DNS server IP Address have nothing to do with the process of email message delivery. It merely serves to turn the IP address--a series of four 8 bit numbers, ie: 151.196.75.10 into www.miyysite.com  (a domain name) that's all.

DNS (Domain Name System) is a distributed domain based naming system database that can be query to identify administers of IP Address--which is a string of numbers, example: 207.151.159.3 are translated into a string of "letters" called Domain Name  - example:
207.151.159.3 = Domain Name www.internic.net

When we send an email we uses character string to specify a destination, like; 2consult @ mailsbroadcast.com but the machine on the internet does not understand this name (character string).

The machine uses a protocol called IP (internet protocol) and numbers like these; 132.0.33.54 to represent a destination, which is not very user friendly, therefore, a special internet service called DNS (Domain Name Service) is to help convert character string (name) into numbers.

Every email domain or website URL has their own individual destination number that is different from another.

Therefore, we send an email to your local ISPs mail server, they will also have a local DNS (Domain Name Service) server (sort of like a mirror DNS site) that can be queried, identify and locate the actual destination of a character string (name).

Anyone can use a DNS Program query tool freeware from samspade.org to access a DNS Name Server on the Internet and gather data in its DNS database.

See: Tracking Email - Can mass email marketers overcome the problem of Port 25 blocking

See: Can mail servers filters forged email headers, IP's or email domain with no MX Records?

See: My email was hijacked/spoofed and got blacklisted?

FREE
Email Trace - Email Tracking

You can trace an email address and get detailed accurate information including name, address, phone number and much more with this reverse email search tool www.ip-adress.com/trace_email/

 

FREE
Hide your IP address
www.webfreer.com Secure web access with encryption Free, fast & reliable connections. You can relax now, your online activities will be secure, private, and anonymous
 

<><><><><><><><><><><><><><><><><><><>
Free
anti-spam zombies,
malware, spambot, spyware, adsware software program download for personal use only from www.lavasoft.nu

Quote "Most people are familiar with freeware, shareware, cookies, media players, interactive content, and file sharing.

What they may not realize is that some of them contain code or components that allow the developers of these applications and tools to actually collect and disseminate information about those using them.

They can track your surfing habits, abuse your internet connection by sending this data to a third party, profile you shopping preferences, hijack your browser start page or pages, alter important system files, and can do this without your knowledge or permission--lavasoft" End Quote
<><><><><><><><><><><><><><><><><><><>
 

To check on identity theft and Internet scams, visit www.scambusters.org/

See the latest threats making the rounds... read it all here at this website http://snopes.com 

To submit a complaint about a particular company to the U.S. Federal Trade Commission "Google Federal Trade Commission for a listing of sites".

<><><><><><><><><><><><><><><><><><><>


Free www.antirootkit.com/
The aim is to help ordinary computer users gain an
understanding of Rootkits, what they can do and steps to remove them as well as Prevention, Detection, Identification and Removal.

A rootkit is a program that is designed to hide itself and other programs, data, and/or activity including viruses, backdoors, keyloggers and spyware on a computer system.

A Rootkit can keep itself, other files, registry keys and network connections hidden from detection and this is why they are so dangerous.

Rootkits are used to hide the existence of Spyware, Trojans, Keyloggers and other malware on computers. They are also commonly used by hackers to hide the backdoors they install on computers.

The rise in the use of Rootkits can be seen at the moment as more Spyware creators trying to hide their installation from the evolving Spyware scanners and virus writers trying to hide their existence.
<><><><><><><><><><><><><><><><><><><>

Free AVG anti-spyware and AVG anti Virus with free auto update at www.grisoft.com

Free Zone alarm firewall with free auto update at www.zonelabs.com

 
Free Secrets of International Trade
Every thing you wanted to know about International import export
   
Free 2Try e-Book "I am a Japanese international business consultant. I find your International Export Import Guide Manual fantastic and splendid." Tominaga Shintaro, Global Business Management Consultant