Wednesday, March 31, 2010

Stop the spam or we'll shoot this dog

spam these days has become more vogue and a technical jargon for most of the email users and is the cause of pain in ass.yes this spam is just an unsolicited marketing strategies just like some one calling you on phone and advertising there products or trying to lure you.And we muddle heads cant do any thing about this unsolicited person.
    I was also so oblivious these days that i always maundered on this spam reception but didn't tried to thwart.I was a bit surprised , Ya probable boggled when i saw an email from my own email address  having some cupid girls photos and more stuff website blah-blah.Nonplussed i was looking here and there??? yes you folks are genius i was in my home. It was a breath taking moment so palpable,thankfully no one in my home was vacillating around.So after this close shave i was engrossed in finding ways to take some purportedly revenge for my vex.
                                        Each time one receives an email now one can easily verify its authenticity or even can trace it down using some utility tools freely available on the internet like NeoTracePro ,VisualRoute and many more.Follow these pursuit as i have mentioned :

  1. View the email headers for the suspicious email -just go into the email service provider and there ia na option of reply with a downward arrow click it.See for the option "show original" .And there you are the complete message with the full headers.For more clear view go an see of your self.An example is envisaged for you at Full header.
  2. Identify the true IP address for the sender (the person who sent you this email) using the header analysis as envisaged in the link at full header.The best way to do is to start from bottom of the received from list to trace the true IP address.
  3. After finding the IP address of the sender ,check for the specified domain of the sender if the domain name and the senders email address is not same it is for sure a spam.So for a quick trace of IP go for any application tools or see in free site like www.ipmango.com, www.whois.com and many more you just need to Google.see it's so simple is not so.
Well you may be thinking how exactly does an email forging works and how was that Sumit calling Sumit  went all the way.Then folks you need to jump into the vista of Linux or Unix OS.These OS are were handy and interest most of the hacker with it versatile and large application available to play with.A must for every nascent or fledgling buddy's to dirty there hands with these OS.    More you talk n work with them more n more you become acquainted n adroit. Before i tell you all these ethical hacking stuff,i like to make a point about the fulminating discussion about spam is that removing spam is not an easy task for the email service provider all alone.so please pals stand for yourself n report about the spam you receive so we together can ferret all spams.And no dogs get killed (metaphorically....its a joke i don't want animal lovers to chide or berate me anymore).I will write how to carry an email spam But for that you need to see my next post.Hope you all make most of these and teach me also with your flair n inane writings.


For newbies you ought to know more of IP(internet protocol) addresses on your own but from the point of stimulating you folks.Here is a gist idea of IP addressing schemes:(ipv4)
IP Addresses are made up of four parts/can be broken down into four parts.For example 192.168.1.1 can be broken down into 192,168,1 and 1.Each of these represent 8 bits(1 byte).Each of the parts contains numbers ranging from 0-255.
IP Address are divided into five classes which are:-

 


   

No comments:

Post a Comment