s. has become a primary means of communication. can easily be forged. can be abused
|
|
- Frederica Spencer
- 5 years ago
- Views:
Transcription
1 s has become a primary means of communication. can easily be forged can be abused Spam Aid in committing a crime Threatening ,
2 Challenges to Authenticity Origin & Sender of the Party refutes the s, allege forgery IP Address of sender matches, still the party refute the s Sender accept the mail but challenge attachments coming from Proxy Server
3 tracing Study of Identifying the source system domain, IP Address Tracing the sender Date/time of sending Message / contents Locate the source of & its sender
4 Protocols: program such as outlook is a client application. Needs to interact with an server: Post Office Protocol (POP) Internet Message Access Protocol (IMAP) Simple Mail Transfer Protocol: SMTP
5 Protocols: Post Office Service Protocol Characteristics Stores only incoming messages. Stores all messages Web-based send and receive. POP IMAP MS MAPI Lotus Notes HTTP Investigation must be at the workstation. Copies of incoming and outgoing messages might be stored on the workstation or on the server or on both. Incoming and outgoing messages are stored on the server, but there might be archived or copied messages on the workstation. Easy to spoof identity.
6 Client based s
7 Web based s
8 sending mail to
9 SMTP SMTP, SMTP. POP3 or IMAP4 Rediff Server Internet Gmail Server Naresh Ram SMTP SMTP POP3/IMAP C1 HCU HYD BITS Goa C2
10 HYD Lucknow Jaipur Delhi Rediff Mail SMTP Server 2 SMTP Server 3 Gmail HCU CBI Naresh Ram
11 Click On Click On This Down Arrow
12 Click on Show Original Window Showing Full Header Appears
13 X-Remote-IP: X-REDF-OSEN: Date: 6 Jul :09: Message-ID: < qmail@f4mail rediffmail.com> MIME-Version: 1.0 To: "cyber.nk@gmail.com" <cyber.nk@gmail.com> 3 Received: from unknown by rediffmail.com via HTTP; 06 Jul :09: X-Senderscore: D=0&S=0 Sender: naresh3151@rediffmail.com 1 Subject: =?utf-8?b?twfpbcbmb3igsgvhzgvyiefuywx5c2lz?= From: "Naresh Kumar" <naresh3151@rediffmail.com> Content-Type: multipart/alternative; boundary="=_bbc614545e533ca7186fc46b513e40f5" --=_bbc614545e533ca7186fc46b513e40f5 Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset="utf-8" Hi This mail is for testing purpose only. --=_bbc614545e533ca7186fc46b513e40f5 Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset="utf-8" Hi<br><br>This mail is for testing purpose only.<br><br><br><br> --=_bbc614545e533ca7186fc46b513e40f
14 Delivered-To: 6 Received: by with SMTP id 7csp649857ivj; Tue, 5 Jul :09: (PDT) X-Received: by with SMTP id m24mr pfi ; Tue, 05 Jul :09: (PDT) Return-Path: <naresh3151@rediffmail.com> Received: from rediffmail.com (f4mail rediffmail.com. [ ]) 5 by mx.google.com with ESMTPS id 15si pfx for <cyber.nk@gmail.com> (version=tls1_2 cipher=aes128-gcm-sha256 bits=128/128); Tue, 05 Jul :09: (PDT) Received-SPF: pass (google.com: domain of naresh3151@rediffmail.com designates as permitted sender) client-ip= ; Authentication-Results: mx.google.com; spf=pass (google.com: domain of naresh3151@rediffmail.com designates as permitted sender) smtp.mailfrom=naresh3151@rediffmail.com Received: (qmail invoked by uid 510); 6 Jul :09: Comment: DomainKeys? See DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=redf; d=rediffmail.com; b=jowwdtsl1llu/9tohon/wlscr8zlpxrmyrmaekyhotuauoblwt9klutujtosvj4zcezid8yol5nwqzjilqotyas5aozk974gh3uj Wh5QPJoZsbx9+e8h6lAAJUwgpyOw85s+YEUVbXyaBsotwzUjxkYZWLEKWGTTBerxqZaaPPI= ; x-m-msg: asd54ad564ad7aa6sd5as6d5; a6da7d6asas6dasd77; 5dad65ad5sd;
15 In this example, we have sent an from to 1. Sender: This represent the name and address of the person who send the Received: from unknown by rediffmail.com via HTTP; 06 Jul :09: This is probably the most vital part of the header from investigation point of view. It represents us that - The was sent from a computer having IP address The was sent on 06 Jul :09:15 (GMT).
16 3. To: This represent the name and address of the receiver. Contd 4. Message-ID: Message ID can be broken into the following parts: : Represent the time stamp of the in yyyymmddhhmmss format : This number is the reference number that represents the corresponding which is unique.
17 Contd 5. Received: from rediffmail.com (f4mail rediffmail.com. [ ]) by mx.google.com with ESMTPS id 15si pfx for (version=tls1_2 cipher=aes128-gcm-sha256 bits=128/128); Tue, 05 Jul :09: (PDT) This represent that the was received by an SMTP server at Google Called mx.google.com from Rediffmail server at the given date and time that has the IP Address
18 6. Delivered-To: Contd This shows that the was delivered to the account You have noticed that time and date in the above examples have been mentioned as 06 Jul :09: It means that the time mentioned above i.e. 06:09:15 is in GMT which is 0000 hours. IST time is 05:30 hours ahead of GMT. To calculate time in IST, add 05:30 hours to make it IST.
19 What are we looking for? ? Verification of IP addresses: Regional Internet Registry APNIC (Asia Pacific Network Information Centre). ARIN (American Registry of Internet Numbers). LACNIC Latin American and Caribbean IP address Regional Registry. RIPE NCC (Réseau IP Européens Network Coordination Centre). Whois (whois.apnic.net) Numerous other websites. The best
20 Whois IP % [whois.apnic.net] % Whois data copyright terms % Information related to ' ' inetnum: netname: BHARTI-IN Descr: Bharti Airtel Limited descr: Transport Network Group descr: 234, Okhla Phase III country: IN admin-c: NA40-AP tech-c: NA40-AP status: ALLOCATED NON-PORTABLE mnt-by: MAINT-IN-BBIL mnt-irt: IRT-BHARTI-IN source: APNIC
21 Fake mails We have seen a general flow How do you identify fake mails
22
23 1. From: "Naresh Kumar" 2. Received: from emkei.cz ([2a01:5e0:36:5001::20]) by mx.google.com with ESMTP id uy1si wjb for Tue, 05 Jul :14: (PDT) 3. Delivered-To: 4. Message-Id: Wed, 6 Jul :18: (CEST) Server of Rediffmail is Missing Emkei Server Internet Gmail Server Naresh Ram
24 They are sent using Open relays Compromised systems Self owned servers Proxy Server Hijacked accounts
25 Proxy Gmail Internet Naresh Internet Internet Internet Ram Rediff
26 NeoTracePro Visual IP Trace Visual Route Tracker Pro tracer (from CDAC, India)
Investigating . Tracing & Recovery
Investigating Email Tracing & Recovery Overview Email has become a primary means of communication. Email can easily be forged. Email can be abused Spam Aid in committing a crime Threatening email, Email
More information59YHTgcmmrUbp965ht2TugQFZRjjak9Ckrp66CTxKEsgBZZJZqJvz462M3ePt5EGVcuL
Delivered-To: bmackenty@gmail.com Received: by 10.79.136.130 with SMTP id k124csp2649542ivd; Mon, 7 Aug 2017 04:59:05-0700 (PDT) X-Received: by 10.84.231.194 with SMTP id g2mr312696pln. 5.1502107145823;
More informationbh=40lsbgolp7pbwmgrxdkxpu2gosgmm2ifbkmg6lw1jeu=; b=wmry1ugcb83u5xihbivsnolgzuj07gjvzmm+469p5b +8PzVhEWlQ1wqSjQBPAFHp6J
Delivered-To: bmackenty@aswarsaw.org Received: by 10.55.80.139 with SMTP id e133csp463209qkb; Mon, 1 May 2017 03:07:15-0700 (PDT) X-Received: by 10.107.5.12 with SMTP id 12mr16189961iof. 186.1493633235602;
More informationBACKTRACING S. Michael Sonntag
BACKTRACING E-MAILS Michael Sonntag SOURCE E-MAILS Source of E-Mails: My personal spam folder! real_viagra.eml Fake GMX E-Mail For comparison a real GMX messages: Beispielmail_GMX.eml As_lecture.eml A
More informationOver 99% of s are SPAM! Useless for mankind!
Advanced Mail Introduction SPAM vs. non-spam Mail sent by spammer vs. non-spammer Problem of SPAM mail Over 99% of E-mails are SPAM! Useless for mankind! SPAM detection? Client-based detection These methods
More informationAnti-spam WG. RIPE 49 Manchester, September Rodney Tillotson, JANET-CERT
Anti-spam WG RIPE 49 Manchester, September 2004 Rodney Tillotson, JANET-CERT R.Tillotson@ukerna.ac.uk Agenda A Administrative matters B Update C Technical measures D Interactions E Advice X AOB Y Future
More information<OF1C8DBAB4.F6DD93FA ON852580F EA Mon, Mar 27, 2017 at 2:22 PM (Delivered after 239 seconds)
Original Message Message ID Created at: From: To: Mon, Mar 27, 2017 at 2:22 PM (Delivered after 239 seconds) IBM Knowledge
More informationAPNIC Whois Database and use of Incident Response Team (IRT) registration. Terry Manderson APNIC AusCERT 2003
APNIC Whois Database and use of Incident Response Team (IRT) registration Terry Manderson APNIC AusCERT 2003 Contents What is APNIC? The APNIC Whois Database Reporting abuse Invalid contacts IRT object
More informationPhishing and Ransomware
Phishing and Ransomware Dave Phillips Information Technology Resources March 2, 2016 Phishing Phishing What it looks like How to identify What happens to your credentials Remember that ITR will NEVER,
More informationWHOIS Database and MyAPNIC
APNIC elearning: WHOIS Database and MyAPNIC Issue Date: 01/04/2015 Revision: Overview What is the APNIC Database? Resource Registration Object Types Inetnum/Inet6num Objects Person and Role Objects Maintainers
More informationAPNIC s role in stability and security. Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013
APNIC s role in stability and security Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013 Overview Introducing APNIC Working with LEAs The APNIC Whois Database
More informationDatabase Update. Paul Palse Database Manager, RIPE NCC
Database Update Paul Palse Database Manager, RIPE NCC Outline Introduction to the Database Group Status of APs and outstanding deliverables Projects completed between RIPE 60 and 61 RIPE Labs publication
More informationCLOUD MAIL End User Guide. (Version 1.0)
End User Guide () Table of Contents 1. How to Activate New Account... 3 2. How to Compose a New Email Message... 5 3. How to View and Edit the Email Draft... 6 4. How to View Sent Email Messages... 6 5.
More informationbh=9f8/dl/qo6zqvut76gpsxonsryoygj7+iz3zai0nyty=; b=uzb/khk +qtkuju4s0ehm4kowgbvgoagiofkkbeqgxde79wrvtbe2kdtnqhenm+vnp1
Delivered-To: bmackenty@aswarsaw.org Received: by 10.55.75.144 with SMTP id y138csp364924qka; Sat, 21 Jan 2017 01:28:46-0800 (PST) X-Received: by 10.157.54.139 with SMTP id h11mr10253536otc. 86.1484990925933;
More informationAPNIC Training. Internet Routing Registry (IRR)
APNIC Training Internet Routing Registry (IRR) Objectives To provide an introduction to the APNIC Routing Registry Explain concepts of the global RR Outline the benefits of the APNIC Routing Registry Discuss
More informationForensics. CSF: Forensics Cyber-Security. Part III. Techniques and Tools for Network Forensics. Fall 2017 Nuno Santos
Email Forensics Part III. Techniques and Tools for Network Forensics CSF: Forensics Cyber-Security Fall 2017 Nuno Santos Motivation for email investigations! Email has become a primary means of communication!
More informationCase 3:09-cv F Document Filed 04/07/11 Page 17 of 23 PageID 16514
Case 3:09-cv-00988-F Document 440-1 Filed 04/07/11 Page 17 of 23 PageID 16514 To: "'Elizabeth M. Schurig'" , "'jeffbaron1@gmail.com'" , "Michelle Rosenblatt" ,
More informationRoute Filtering. Types of prefixes in IP core network: Internal Prefixes External prefixes. Downstream customers Internet prefixes
1 Types of prefixes in IP core network: Internal Prefixes External prefixes Downstream customers Internet prefixes 2 Internal prefixes originated in IP core network Loopback Transport Connect inter-regional
More information<deb61fd5 4d79 a Fri, Feb 17, 2017 at 4:08 PM (Delivered after 8 seconds) Bill MacKenty
Original Message Message ID Created at: From: To: Subject: SPF: DKIM:
More informationDelivery incomplete. Detected a bounce of message #36, list gbird (bounce type DSN)
1 of 5 2/3/2018 6:03 PM Subject: Bounce detected (list gbird) from Toni.J.Piaggio@aphis.usda.gov From: mj2-owner@lists.ncsu.edu Date: 2/17/2017 12:06 PM To: gbird-owner@lists.ncsu.edu Detected a bounce
More informationRoute Filtering. Types of prefixes in IP core network: Internal Prefixes External prefixes. Downstream customers Internet prefixes
Types of prefixes in IP core network: Internal Prefixes External prefixes Downstream customers Internet prefixes Internal prefixes originated in IP core network Loopback Transport Connect inter-regional
More informationRIPE NCC Status Update
RIPE NCC Status Update IPv4 and more Marco Hogewoning, Trainer IPv4 Run Out IPv4 Distribution IANA 3 February 2011 15 April 2011 AfriNIC ARIN RIPE NCC APNIC LACNIC? 7,000 LIRs End Users 3 Business As Usual
More informationIRT-Object in the RIPE Database, "interim" meeting
IRT-Object in the RIPE Database, "interim" meeting Overview Ulrich Kiermayr, Wilfried Wöber: ACOnet-CERT TF-CSIRT, 10th meeting Amsterdam, NL September 26, 2003 1 What does the IRT-Object do?? documents
More informationHeader- A Forensic Key to Examine an
E-Mail Header- A Forensic Key to Examine an E-Mail Swapnil Gupta 1, Kopal Gupta 2, Dr. Anu Singla 3 1,2,3 Institute of Forensic Science & Criminology, Bundelkhand University, Jhansi (U.P.), India ---------------------------------------------------------------------***---------------------------------------------------------------------
More informationThe whois Database. Introduction and Usage. Anne Lord & Mirjam Kühne. AfNOG Workshop, 10 May
The whois Database Introduction and Usage Overview What is the whois database? Why use it? Who uses it? Database query process Database update process 2 What is the whois Database? Network Management Database
More informationLEA Workshop. Champika Wijayatunga & George Kuo, APNIC Wellington, New Zealand 09, May, 2013
LEA Workshop Champika Wijayatunga & George Kuo, APNIC Wellington, New Zealand 09, May, 2013 Agenda Introduction to APNIC Know about APNIC Internet Policy Development How the Internet Policies are developed
More informationThe IRT Object in the RIPE Database
The IRT Object in the RIPE Database The direct link from IP numbers to CSIRTs Don Stikvoort, Elsinore Wilfried Wöber, Vienna University 1 Problem Outline Despite all high tech, wizardry and risk management
More informationNetworking and the Internet
ICS 101 Fall 2012 Networking and the Asst. Prof. Lipyeow Lim Information & Computer Science Department University of Hawaii at Manoa 9/4/2012 Lipyeow Lim -- University of Hawaii at Manoa 1 Problem Ancient
More informationBEST PRACTICES FOR PERSONAL Security
BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple
More informationSETUP FOR OUTLOOK (Updated October, 2018)
EMAIL SETUP FOR OUTLOOK (Updated October, 2018) This tutorial will show you how to set up your email in Outlook using IMAP or POP. It also explains how to configure Outlook for MAC. Click on your version
More informationAPNIC. Database Tutorial. 3 September, Kitakyushu, Japan. 14 th APNIC Open Policy Meeting
APNIC Database Tutorial 3 September, Kitakyushu, Japan 14 th APNIC Open Policy Meeting Introduction Presenters Nurani Nimpuno Training Development Officer nurani@apnic.net Champika Wijayatunga Training
More informationhttps://mail.google.com/mail/u/0/?ui=2&ik=4a9d5ab0fe&vi...
Delivered-To: bmackenty@aswarsaw.org Received: by 10.194.158.100 with SMTP id wt4csp1082891wjb; X-Received: by 10.55.50.149 with SMTP id y143mr16553555qky.86.1445001190398; Return-Path:
More informationInternational Journal of Advance Engineering and Research Development. Legalistic Evaluation of Headers Based on Address Spoofing
Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 5, Issue 01, January -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Legalistic
More informationSupporting Notes for the Provider Independent (PI) Assignment Request Form
Supporting Notes for the Provider Independent (PI) Assignment Request Form RIPE NCC Document-ID: ripe-357 Date: October 2005 Obsolete: ripe-337 This document contains instructions for LIRs on how to complete
More informationISP-NAP & Direct Members (Feb 2018)
ISP-NAP & Direct Members (Feb 2018) Total ISP and NAP: 368 (Des 2016) and 417 companies (Feb 2018) Total Direct Member: 655 (Des 2016) and 836 users (Feb 2018) increase 13,3% increase 27,6% 1400 1050 700
More informationSet Up with Microsoft Outlook 2013 using POP3
Page 1 of 14 Help Center Set Up E-mail with Microsoft Outlook 2013 using POP3 Learn how to configure Microsoft Outlook 2013 for use with your 1&1 e-mail account using the POP3 Protocol. Before you begin,
More informationNote: CONTENTS. 1. Outlook Express (IMAP) 2. Microsoft Outlook (IMAP) 3. Eudora (IMAP) 4. Thunderbird (IMAP) 5. Outlook Express (POP)
CONTENTS 1. Outlook Express (IMAP) 2. Microsoft Outlook (IMAP) 3. Eudora (IMAP) 4. Thunderbird (IMAP) 5. Outlook Express (POP) Note: Prior to configuring, please ensure that your ID is enabled for POP/IMAP.
More informationAPNIC Internet Routing Registry. Tutorial Seoul 19 August 2003
APNIC Internet Routing Registry Tutorial Seoul 19 August 2003 Overview What is an IRR Why use an IRR? RPSL IRR objects Recap attributes of some objects Routing Policy What is routing policy? Why define
More information& Online Evidence Collection
Email & Online Evidence Collection Domestic violence offenders frequently misuse email and online spaces to stalk, abuse, terrorize, and monitor victims. Abusers may send messages from random email addresses
More informationSupporting Notes for the Provider Independent (PI) Assignment Request Form
Supporting Notes for the Provider Independent (PI) Assignment Request Form RIPE NCC Document-ID: ripe-455 Date: March 2009 Obsoletes: ripe-337,ripe-357, ripe-454 This document contains instructions for
More informationECE697AA Lecture 2. Today s lecture
ECE697AA Lecture 2 Application Layer: HTTP Tilman Wolf Department of Electrical and Computer Engineering 09/04/08 Protocol stack Application layer Client-server architecture Example protocol: HTTP Demo
More informationRSC Part II: Network Layer 3. IP addressing (2nd part)
RSC Part II: Network Layer 3. IP addressing (2nd part) Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are, mainly, part of the companion slides to the book Computer Networking:
More informationElectronic Mail. Electronic Mailboxes
Electronic Mail E-mail belongs to the Application Layer Has been around since the early 80 s Enables new forms of interaction Fast Automatic processing (sorting, reply) Can carry other content Electronic
More informationTo assist you with debugging problems, this whois query was received from IP Address. Your web client may be behind a web proxy.
APNIC - Query the APNIC Whois Database To assist you with debugging problems, this whois query was received from IP Address [59.90.151.244] Your web client may be behind a web proxy. % APNIC found the
More informationExperiment No: Group A-6
R (2) N (5) Oral (3) Total (10) Dated Sign Experiment No: Group A-6 Problem Definition: Write a program in C++ /Python to analyze email header. 6.1Prerequisite: Application Layer Protocols 6.2 Learning
More informationThe Application Layer: & SMTP
The Application Layer: email & SMTP Smith College, CSC 249 Feb 1, 2018 4-1 Chapter 2: Application layer q 2.1 Principles of network applications q 2.2 Web and HTTP q 2.3 FTP q 2.4 Electronic Mail v SMTP,
More information. indigoo.com INTRODUCTION TO MAIL TRANSFER PROTOCOLS FOR THE INTERNET. Peter R. Egli INDIGOO.COM. 1/35 Rev Peter R.
EMAIL INTRODUCTION TO MAIL TRANSFER PROTOCOLS FOR THE INTERNET Peter R. Egli INDIGOO.COM 1/35 Contents 1. EMail Electronic Mail RFC821/RFC822 2. Email Elements 3. Email Message 4. Email Transfer with SMTP
More informationis still the most used Internet app. According to some studies around 85% of Internet users still use for communication.
1 E-mail is still the most used Internet app. According to some studies around 85% of Internet users still use e-mail for communication. Electronic mail is a method to exchange digital messages from a
More informationThis process should take approximately 10 minutes to complete
How to set up your Endeavor Email with the Gmail App You can use the Gmail or Outlook app depending on personal preference. If you would like to use the Outlook app please see the How to set up your Endeavor
More informationUsing Resource Certificates Progress Report on the Trial of Resource Certification
Using Resource Certificates Progress Report on the Trial of Resource Certification October 2006 Geoff Huston APNIC From the RIPE Address Policy Mail List 22 25 Sept 06, address-policy-wg@lists.ripe.net
More informationTURNING LEGAL WEBSITE into DDoS TOOL. OWASP Jakarta Tech Day Meetup Kalpin Erlangga Silaen
TURNING LEGAL WEBSITE into DDoS TOOL OWASP Jakarta Tech Day Meetup Kalpin Erlangga Silaen DISCLAIMER Segala cara, tehnik, peragaan serta alat yang digunakan dalam sesi presentasi ini adalah untuk tujuan
More informationOffice 365: Secure configuration
Office 365: Secure email configuration Published September 2017 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created
More informationUsing Resource Certificates Progress Report on the Trial of Resource Certification
Using Resource Certificates Progress Report on the Trial of Resource Certification October 2006 Geoff Huston APNIC Sound Familiar? 4:30 pm Mail: Geoff, mate, I ve been dealing with your phone people and
More informationWelcome! APNIC Internet Routing Registry Tutorial. In conjunction with SANOG IV
Welcome! APNIC Internet Routing Registry Tutorial 29 July 2004, Kathmandu, Nepal In conjunction with SANOG IV Introduction Presenters PART I Champika Wijayatunga champika@apnic.net PART II Gaurab Raj Upadhaya
More informationIPv6 Allocation Policy and Procedure. Global IPv6 Summit in China 2007 April 13, 2007 Gerard Ross and Guangliang Pan
IPv6 Allocation Policy and Procedure Global IPv6 Summit in China 2007 April 13, 2007 Gerard Ross and Guangliang Pan 1 Overview Introduction to APNIC Policy development process IPv6 policy and procedures
More informationRIPE NCC Status Update
RIPE NCC Status Update IPv4 and more Marco Hogewoning, Trainer The five RIRs 2 RIPE NCC Service region: Europe, Middle East and parts of Central Asia Supports coordination of Internet operations Not-for-profit
More informationSample Headers Understanding Headers Interpreting Headers
Sample Email Headers Return-Path: Received: from smtp.alphanet.com (smtp.alphanet.com [192.168.0.100]) by mailhost.betanet.com with smtp (Exim 4.44)id 1DtsVC-0001I2-O2 Mon, 25
More informationInternet Engineering Task Force (IETF) Request for Comments: 6591 April 2012 Category: Standards Track ISSN:
Internet Engineering Task Force (IETF) H. Fontana Request for Comments: 6591 April 2012 Category: Standards Track ISSN: 2070-1721 Authentication Failure Reporting Using the Abuse Reporting Format Abstract
More informationService User Manual. Outlook By SYSCOM (USA) May 2, Version 2.0. Outlook 2007 Ver. 2.0
Outlook 2007 By SYSCOM (USA) May 2, 2013 Version 2.0 1 Contents 1. How to Setup POP3/SMTP Setup for Outlook 2007... 3 2. How to Setup IMAP for Outlook 2007... 13 3. How to Manage Spam Filter... 22 2 1.
More informationIPv6 Allocation Policy and Procedure. Global IPv6 Summit in China 2007 April 13, 2007 Gerard Ross and Guangliang Pan
IPv6 Allocation Policy and Procedure Global IPv6 Summit in China 2007 April 13, 2007 Gerard Ross and Guangliang Pan 1 Overview Introduction to APNIC Policy development process IPv6 policy and procedures
More informationi-mscp OpenDKIM plugin
2019/01/23 02:32 1/5 i-mscp OpenDKIM plugin Bear in mind that this documentation is for the last available version. If you use an older version, you must refer to the README.md file inside the plugin archive.
More informationsender) client-ip= ; dkim=pass
Delivered-To: ryanlawhsv@gmail.com Received: by 10.129.162.146 with SMTP id z140csp2021593ywg; X-Received: by 10.200.36.81 with SMTP id d17mr24690451qtd.99.1487704818927; Return-Path:
More informationSecurity by Any Other Name:
Security by Any Other Name: On the Effectiveness of Provider Based Email Security Ian Foster, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, and Kirill Levchenko University of California, San
More informationS a p m a m a n a d n d H a H m 성균관대학교 최형기
Spam and Ham 성균관대학교 최형기 Agenda Email Protocol Introduction to spam Techniques spammers use Kinds of spam Solutions to spam Conclusion CINS/F1-01 Sungkyunkwan University, Hyoung-Kee Choi 2 SMTP 1 Electronic
More informationCOSC 301 Network Management. Lecture 14: Electronic Mail
COSC 301 Network Management Lecture 14: Electronic Mail Zhiyi Huang Computer Science, University of Otago COSC301 Lecture 14: Electronic Mail 1 Today s Focus Electronic Mail -- How does it work? -- How
More informationThis form should be sent following the submission of Provider Aggregatable (PA) Assignment Request Form(s) found at:
Supporting Notes for the IPv4 First Allocation Request Form Filiz Yilmaz Bican, Emma Bretherick, Agata Peszkowska, Ingrid Wijte Document ID: ripe-312 Date: 26 April 2004 Obsoletes: ripe-236, ripe-273 See
More informationContents. Management. Client. Choosing One 1/20/17
Contents Email Management CSCU9B2 Email clients choosing and using Email message header and content Emailing to lists of people In and out message management Mime attachments and HTML email SMTP, HTTP,
More informationCIDR. The Life Belt of the Internet 2005/03/11. (C) Herbert Haas
CIDR The Life Belt of the Internet (C) Herbert Haas 2005/03/11 Early IP Addressings Before 1981 only class A addresses were used Original Internet addresses comprised 32 bits (8 bit net-id = 256 networks)
More informationObjectives. What Is and How Does It Work? Objectives. and How Does It Work? and How Does It Work?
Objectives E-MAIL BASICS Evaluating Integrated Browser E-Mail Programs and a Web-Based E-Mail Service New Perspectives on THE INTERNET Learn about e-mail and how it works Configure and use two popular
More informationProgress Report on APNIC Trial of Certification of IP Addresses and ASes
Progress Report on APNIC Trial of Certification of IP Addresses and ASes APNIC 22 September 2006 Geoff Huston Motivation: Address and Routing Security What we have today is a relatively insecure system
More informationService User Manual. Outlook By SYSCOM (USA) May 7, Version 2.0. Outlook 2003 Ver. 2.0
Outlook 2003 By SYSCOM (USA) May 7, 2013 Version 2.0 1 Contents 1. How to set up POP3/SMTP for Outlook 2003... 3 2. How to Setup IMAP for Outlook 2003... 10 3. How to Manage Spam Filter... 15 2 1. How
More informationOverview. Electronic mail. History Format of . Sending . Retrieving . RFC 822, MIME, addresses SMTP, DNS. POP, IMAP, Web-based
Electronic Mail Electronic mail History Format of email Overview RFC 822, MIME, email addresses Sending email SMTP, DNS Retrieving email POP, IMAP, Web-based 2 Flashback to the 70s ARPANET just recently
More informationClergy Table of Contents
Clergy E-mail Table of Contents How to access your @riotx.org Email using your web browser...2 How to set up @riotx.org Clergy Email Forwarding...5 How to add a @riotx.org on your Microsoft Outlook: First
More informationDesign and Implementation of a DMARC Verification Result Notification System
Proceedings of the APAN Research Workshop 2016 ISBN 978-4-9905448-6-7 Design and Implementation of a DMARC Verification Result Notification System Naoya Kitagawa, Toshiki Tanaka, Masami Fukuyama and Nariyoshi
More informationWhy Firewalls? Firewall Characteristics
Why Firewalls? Firewalls are effective to: Protect local systems. Protect network-based security threats. Provide secured and controlled access to Internet. Provide restricted and controlled access from
More informationBased on material produced by among others: Sanjay Pol, Ashok Ramaswami, Jim Fenton and Eric Allman
DKIM Patrik Fältström Based on material produced by among others: Sanjay Pol, Ashok Ramaswami, Jim Fenton and Eric Allman September 22, 2005 1 What is Domain Keys Identified Mail? Method of using cryptographic
More informationHandling Network Abuse Reports at APNIC
Handling Network Abuse Reports at APNIC 17 November 2010 APT Cybersecurity Forum, Sydney George Kuo Member Services Manager, APNIC 1 APT Bali Plan of Action Nov 2009 A. Widen broadband connectivity B.
More informationHybrid setup. Product Note
Hybrid setup Product Note Proposed by: 1 On premise vs cloud email Email is considered a mission-critical system in almost all organizations that employ email and to host emails on-premise or in a cloud
More informationCSCE 463/612 Networks and Distributed Processing Spring 2018
CSCE 463/612 Networks and Distributed Processing Spring 2018 Application Layer IV Dmitri Loguinov Texas A&M University February 13, 2018 1 Chapter 2: Roadmap 2.1 Principles of network applications 2.2
More informationBacktracing s Computer Forensics
Mag. iur. Dr. techn. Michael Sonntag Backtracing E-Mails Computer Forensics E-Mail: sonntag@fim.uni-linz.ac.at http://www.fim.uni-linz.ac.at/staff/sonntag.htm Institute for Information Processing and Microprocessor
More informationObjectives CINS/F1-01
Email Security (1) Objectives Understand how e-mail systems operate over networks. Classify the threats to the security of e-mail. Study how S/MIME and PGP can be used to add security to e-mail systems.
More informationn Define active and passive footprinting n Identify methods and procedures in information gathering Chapter #2:
Outline n Define active and passive footprinting n Identify methods and procedures in information gathering Chapter #2: n Understand the use of social networking, search engines, and Google hacking in
More informationService User Manual. Outlook By SYSCOM (USA) May 2nd, Version 1.0. Outlook 2013 Ver.1.0
Outlook 2013 By SYSCOM (USA) May 2nd, 2016 Version 1.0 1 Contents 1. How to Setup POP3/SMTP Setup for Outlook 2013... 3 2. How to Setup IMAP for Outlook 2013... 14 3. How to Manage Spam Filter... 25 2
More informationOutline. Tools
E-mail Tools 1 Outline Goals and Objectives Topics Headlines Introduction Communication Protocols Content, Attachments, and Etiquette Acronyms and Emoticons E-mail clients and Webbased E-mail Eudora Outlook
More informationSpam and Ham 성균관대학교 최형기
Spam and Ham 성균관대학교 최형기 Agenda Introduction to spam Techniques spammers use Kinds of spam Solutions to spam Conclusion CINS/F1-01 2 Electronic Mail outgoing message queue Three major components: user agents
More informationReading Headers with MX Tool Box By Matt Flederbach
Reading Email Headers with MX Tool Box By Matt Flederbach Often times, you'll get a customer asking Why did it take so long for my email to be delivered? or Why was my email blocked? or even Why was this
More informationHow do I setup Outlook Express to get my s?
How do I setup Outlook Express to get my e-mails? Before you set up a mail account in Outlook Espress you must first have your POP3 mailbox details provided to you by your Account Manager, this will be
More informationCS 43: Computer Networks. 12: and SMTP September 28, 2018
CS 43: Computer Networks 12: Email and SMTP September 28, 2018 A. HTTP Mail s communicate using B. IMAP C. POP D. SMTP Lecture 12 - Slide 2 Mail s typically A. send messages directly from the sending s
More informationInternet Routing Protocols, DHCP, and NAT
Internet Routing Protocols, DHCP, and NAT Hwajung Lee Modified from Slides Courtesy of Cisco Networking Academy and the book titled Communication Networks by Leon-Garcia Contents Basic Routing Single Area
More informationt and Migration of WLCG TEIR-2
IPv6 Deploymen t and Migration of WLCG TEIR-2 site resources on Privat te Cloud Saqib Haleem Saqib Haleem National Centre for Physics, Pakistan Agenda Introduction of National Centre for Physics (NCP)
More informationForensic Analysis of Date and Time Spoofing
Third International Conference on Computer and Communication Technology Forensic Analysis of E-mail and Spoofing Preeti Mishra, Emmanuel S. Pilli and R. C. Joshi Department of Computer Science & Engineering
More informationConfigure Outlook to use port 587 with authentication
Configure Outlook 2003 email to use port 587 with authentication In order to send and receive E-mail through your website hosted with FastWebEngine, you can configure Outlook as your preferred E-mail client.
More informationThe Application Layer: SMTP, FTP
The Application Layer: SMTP, FTP CS 352, Lecture 5 http://www.cs.rutgers.edu/~sn624/352-s19 Srinivas Narayana 1 Recap: Application-layer protocols DNS: lookup a (machine-readable) address using a (humanreadable)
More informationAdvanced Introduction to Machine Learning CMU-10715
Advanced Introduction to Machine Learning CMU-10715 MLE, MAP, Bayes classification Barnabás Póczos Sept 9, 2015 Outline Theory: Probabilities: Dependence, Independence, Conditional Independence Parameter
More informationOutlook Express(POP3)
Outlook Express(POP3) 1. Click on Tools in the menu bar and then go to Accounts 2. The Internet Accounts pop-up window appears. 3. Click on the Mail tab. If you are starting Outlook Express for the first
More informationOFFICE 365 SERVICES INCLUSIONS AND EXCLUSIONS
INCLUSIONS AND EXCLUSIONS OFFICE 365 MIGRATION AS A SERVICE SOURCE Exchange 2003, 2007, 2010, 2013 and 2016 Google Mail (Gmail) WHAT WE WILL MIGRATE FROM SOURCE MAILBOX Emails Mailbox rules Mailbox contacts
More informationA Policy Story - IPv4 Transfer. TWNIC OPM 26, Taipei 14 December 2016 George Kuo, Services Director
A Policy Story - Transfer TWNIC OPM 26, Taipei 14 December 2016 George Kuo, Services Director 1 About APNIC Membership-based, not-for-profit, Regional Internet Registry (RIR) Delegates and registers IP
More informationHow to set up an account in Outlook
How to set up an e-mail account in Outlook Note: To complete these steps, you will need to know your email address, password, incoming mail server name, and outgoing mail server name that is provided by
More informationPassword Change and Mail Client Configuration Guide for sltnet.lk/slt.lk Mail Server
User Guide Password Change and Mail Client Configuration Guide for sltnet.lk/slt.lk Mail Server 2018/05/10 LEGAL INFORMATION Copyright 2018 Sri Lanka Telecom Plc All rights reserved. We reserve the right
More informationTowards authentication
Towards email authentication TLS SPF + DKIM + DMARC 2012/10/03 Roberto Innocente 1 Who adopted it? Hotmail.com Gmail.com AOL.com Verizon.com Ebay Paypal Yahoo.com 2012/10/03 Roberto Innocente 2 Tls/SPF/DKIM/DMARC
More information