Yes, there is a way - but it is extremely unlikely that you can do it yourself.
When you send an e-mail message, the sending computer contacts the SMTP (e-mail) server - usually at your ISP. That server forwards the e-mail further, sometimes directly, sometimes through a chain of computers, until the e-mail reaches the destination computer.
Each such transaction between two computers on the chain inserts a line in the header of the e-mail message, describing the transaction (i.e., who sent to whom and when). However, a malicious computer (usually, but not always that of the sender) can put bogus lines there (although it has no impact on the lines that are inserted by the transactions further on the chain). In addition, each computer that forwards an e-mail message puts an entry about the operation in its local log file.
The way to trace e-mail is to start examining the e-mail header and try to trace the chain backwards. If you hit a bogus (spoofed) line, you need the cooperation of the administrator of the computer that has first received the message with the bogus header (i.e., the first legitimate computer on the chain after the malicious one). The logs of that computer will show which computer the e-mail really came from - because they log computers by their IP addresses and not by what the e-mail message claims.
But even if you locate the actual sender of the e-mail (which, as I said, you cannot do without the cooperation of one or more system administrators on the chain), it doesn't mean that you have located the person responsible for sending the e-mail. Their computer might have been hacked and/or infected and the e-mail message might have been sent by the hacker (while accessing the compromised computer remotely) or by the virus on the computer.
2006-12-24 22:29:04
·
answer #1
·
answered by Vesselin Bontchev 6
·
0⤊
0⤋
That is a piece of cake. Every email has a header. Look at your next email and look at the bottom or top left of email and you will see something with the word header. Anway, go to WUGNET.com and you can download a program on a 30 day trail basis. The program will explain how to do or how to go about getting the header and placing it in the program. Now if you need it on a constant basis watch it if you order. I have not been there in sometime. But if you do plan to buy, do not buy right away. On the same window, press all the options on the left side. Sometimes, if you press a certain option, it will give you a slight discount. Else, you might pay the full retail price.
2006-12-24 21:01:13
·
answer #2
·
answered by Big C 6
·
0⤊
0⤋
Delete it - that's an prolonged working scam They first get all your very own tips for identity theft purposes. Then if the guy is stupid sufficient to deliver all that information to an entire stranger, they ask to your financial company account info asserting they are shifting the money. yet particularly they are coming up a pretend identity consisting of your very own info yet their photograph, walk into any branch of your financial company, fill out a withdrawal slip, walk as much as the window, teach the fake identity and empty your account interior of two hours of you sending your financial company account info. And your financial company won't assist you to when you consider which you probably did no longer shield your privateness and prepared gave out your very own info and monetary company account quantity to an entire stranger for this reason you in no way open emails from every person you do no longer understand
2016-12-15 07:40:07
·
answer #3
·
answered by ? 4
·
0⤊
0⤋
email is short for electronic mail,,, if you have an email address, messages can be sent thru your email address,,, these messages can either be a word file, pictures, presentations and even videos,, you will know who will be sending you the email since, their email address will appear,,, if you have one of those high tech softwares, you can track the location of the person who's sending you the emails,,
2006-12-24 20:53:40
·
answer #4
·
answered by anna113 2
·
0⤊
0⤋