Toronto Escorts

How to Trace an Email

Miss Maya Blue

New member
Aug 21, 2003
1,090
0
0
san francisco
www.msmayablue.com
~

check out www.readnotify.com

email tracking service..useful for tracking emails you send . super cheap, and you can register several of your email addresses for service under one account.

shows you where your email was opened, at what time, how many times, was it forwarded, and the persons IP address. i think you can even withdraw emails you sent...
 
Tiffany_69 said:
Lil spoken from the heart of a tru hacker. With Wap Wireless acess protocals any programer worth his/her salt will rip you new asshole. There are some real tricks with sub netting to hide behind. Remeber every Pc has a private Ip address work stations and Terminals are usually daisy chaind ringed or inlined on the one IP. D Boolean math guys in Ip adressing work from left to right.
If I want trace back it too easy and Pop and mail servers usually are not protected very well, there 3 classes of networks A, B , C usually most unless goverment depend on the router and firewall on C class network way too much. most net cafes usually hubbed easy to create cut out programe. Just thought I let you guys know.

credentials Aplus certified, Network plus certified, Cisco, Xp ertified
I know I know half way too an MSCE.
curently under grade in comp sci honners programe.


Well well.. I female nerd! LOL I'm kidding. Nice credentials, I'm impressed with the Cisco certification, what level are you ceitified in?

MSCE is still the way to go just to get recognize in the business, but unfortunately the industry is so saturated with "text book" MCSE certifications, and most of them don't have any hands on experience just text book. I have my MSCE and also Comp Sci degree from U of T, I'm certified with all level starting from Associate, Pro and Expert (CCNE, CCNA and CCNP). It all hard work but it pays off in the end. It helps allot when you own a business and can trouble shoot and diagnose problems over the phone rather than onsite, save the customer money and us the time to travel.
 
Last edited:

UFCGuy

New member
Sep 4, 2007
20
0
0
If you grab an unenrypted wireless signal, I assume they would trace the email back to that signal which would not be you?
 

21pro

Crotch Sniffer
Oct 22, 2003
7,830
1
0
Caledon East
You know, I used a similar strategy to steal my business competitor's email lists...
 

cypherpunk

New member
Mar 10, 2004
929
0
0
UFCGuy said:
If you grab an unenrypted wireless signal, I assume they would trace the email back to that signal which would not be you?
You assume correctly. This doesn't ensure anonimity, but it goes a really long way.
 

UFCGuy

New member
Sep 4, 2007
20
0
0
Hey Data1960,

Sometimes I wish I had your knowledge base. I did some reading about the stuff but my background is of such a different nature it is hard for me to follow what might be obvious to the typical IT person.
 

cypherpunk

New member
Mar 10, 2004
929
0
0
data1960 said:
That's why the consulting I sell is team based with each person providing a unique expertise (i.e. network, wireless, IPT, OS, forensic analysis, network protocol, etc) and our company maintains staff that are only responsible for monitoring for new exploits. The client benefits tremendously from this approach. The consulting teams have access to the product design engineers, software heads, 100s pre/post-sales CCIEs as well as our TAC center.
Do you guys check whether the client's sensitive information is indexed by Google? That's always a treat.
 
data1960 said:
I work for a major IT hardware company and I sell their security products and services. i.e. Firewalls, IDS/IPS, server IPS (HIDS), syslog servers and security event correlation tools, security consulting services, incident response services as well as post incident recovery and avoidance services. I have a CCIE (routing and switching), CCSP and have taken several SANS and CERT courses. I know about 1% of what I should know, and I know less every day. It's murder to keep current, especially with all the new technologies.

Us IT types should all get together for a beer at a club and compare horror stories.
Very true on what you're saying. The Technology changes everyday, it is hard and costly to keep with with the certification/industry. Cisco certification is one of the hardest certification to learn out there and I can bet you in any major company their is a Cisco product in their vault. What we have and accomplished is very good, as most don't get this far because of all numbers you have to remember...
 

lancerarms

New member
Jul 11, 2005
50
0
0
hotmail etc.

I pulled the headers off of a message I got from a hotmail address but the only IP adress that I could get were microsoft's. Does this not work with Hotmail type accounts?..or am I just not doing it right?
noob
 

cypherpunk

New member
Mar 10, 2004
929
0
0
steeverus said:
Hey guys & girls.
I am looking to hack a hotmail account. Is this doable for an amateur?
Any help or suggestions on where I can find info would be much appreciated.
It might be as hard as it is for me to know that you're 31 years old. Tough to say.
 

trisket

New member
Apr 21, 2007
820
0
0
data1960 said:
I have a work tool that I use for demo purposes that let's me drive up a street and log all APs and identifies those that are unencrypted. I can then sniff the active sessions and watch/log what the user is doing for any protocol.
Sniff active sessions?
I bet we could get a bus load of people interested it that drive. :rolleyes:
 

lancerarms

New member
Jul 11, 2005
50
0
0
no answers?

Anyone able to answer my question?

lancerarms said:
I pulled the headers off of a message I got from a hotmail address but the only IP adress that I could get were microsoft's. Does this not work with Hotmail type accounts?..or am I just not doing it right?
noob
 

cypherpunk

New member
Mar 10, 2004
929
0
0
lancerarms said:
Anyone able to answer my question?
Yes. If the sender's address has been stripped or the sender was never actually involved because it's webmail, then there's nothing to be done.
 

Keebler Elf

The Original Elf
Aug 31, 2001
14,575
207
63
The Keebler Factory
Tiffany_69 said:
lol spoken from the heart of a tru hacker. With Wap Wireless acess protocals any programer worth his/her salt will rip you new asshole.
I don't see how. All you'll be able to do is trace it back to the public terminal. If the sender never accesses (e.g., Hotmail) from home, then what're you going to do? Set up video surveillance on all the terminals at the library? lol :p
 
Ashley Madison
Toronto Escorts