All email communications on the internet are possible by two protocols:
1) Simple Mail Transfer Protocol (SMTP port-zg)
2) Post Office Protocol (POP port-no)
E-Mail hacking consists of various techniques as discussed below.
1) EMail Tracing:- Generally, the path taken by an email while travelling from sender to receiver can be explained by following diagram.
The most effective and easiest way to trace an email is to analyze it's email headers. This can be done by just viewing the full header of received email. A typical email header looks something like this:
1) Simple Mail Transfer Protocol (SMTP port-zg)
2) Post Office Protocol (POP port-no)
E-Mail hacking consists of various techniques as discussed below.
1) EMail Tracing:- Generally, the path taken by an email while travelling from sender to receiver can be explained by following diagram.
The most effective and easiest way to trace an email is to analyze it's email headers. This can be done by just viewing the full header of received email. A typical email header looks something like this:
|
No comments:
Post a Comment