Showing posts with label Internet. Show all posts
Showing posts with label Internet. Show all posts

Tuesday, 1 November 2016

What is phishing?









What do you think is more likely to happen? A) Having a hacker steal your credit card information over the Internet and charging thousands of dollars on it the next day, or B) getting tricked online by a simple letter in your email box from a con man?
The answer is B—online con artists and tricksters are more likely to weasel money from us than hackers are. Even though hackers make more headlines these days with serious breaches of security, everyday computer users—like you, your sweet grandmother or your naive twenty-something—are more likely to get burned online by a convincing con artist.
How can con artists still trick people? Because they are very good at what they do and have been for thousands of years, long before the Internet came around. They use trickery and lies to gain your trust and steal your money. (Think of Adam and Eve and the serpent.)
If you don't know what to be on the lookout for, an online con artist can fool you when your guard is down. But if you learn some of their tactics and tricks, you can fend off their scams and save yourself—or your parent or grandparents—from a lot of trouble.

Gone phishing.

One of the tactics they use is called "phishing," an old, online con that's still a major problem even though people think they're smart enough not to fall for a scam.
Instead of using a rod and reel with a sardine on a hook to net a catch, the tricksters use misleading emails to attract your attention and lure you into their scheme. If you take the bait, the outcome could cost you thousands of dollars and a lifetime of regret and embarrassment.
One of the aspects that most of us like about the Internet—anonymity—is something that an online scam artist will use to their advantage. A con artist can pretend to be anybody they want to be. They don't need elaborate disguises as the characters on Mission Impossible do or false ID badges and credentials like the ones in Ocean's 11.
When it comes to phishing, all they need are an angle and a whole bunch of email addresses. They usually don't have a lot of technical savvy like a hacker does...they only need a low level of writing and computer-design skills to create emails and fake websites that look legitimate enough to fool you.

What a does a "phish hook" look like?

The typical scam at play these days works something like this:
  • You receive an email letter from your bank or credit card company that says your account has been compromised or that you need to update your information...or it will be closed.
  • But it's not really from your bank. It's from a phisher hoping to catch you off guard with a very sneaky scam. They're savvy enough to use simple graphics (bank logos, etc.) to make it look legit.
  • The fake email conveniently includes a link you can click on to resolve the problem ASAP, which you're told you need to do. If you do it, you're whisked to a Web page the con artist has designed and controls...he's reeling you in. On that page, you're asked to update your account information...username, password, etc.
  • If you send/submit the update, you will have provided the phisher with all he needs to steal money, your identity or both.

"Spear phishing."

Sometimes the phisher's goal isn't to steal account information—it's to gain access to a company's or government agency's private network. So instead of targeting a broad audience with a wide net, they'll target a select group of individuals with a message that appears to have come from either a coworker or a department within that organization, such as Human Resources or the payroll department. That's spear phishing.

How to stay safe.

Whether you're at home or at work, maintain a healthy attitude of doubt whenever you're asked to provide any kind of account information or are instructed to update your username and password. Take a long, close look at the source and verify that it's legitimate before you do anything.

What is hacking?


During the 1990s, the term "hacker" originally denoted a skilled programmer proficient in machine code and computer operating systems. In particular, these individuals could always hack on an unsatisfactory system to solve problems and engage in a little software company espionage by interpreting a competitor's code.
Unfortunately, some of these hackers also became experts at accessing password-protected computers, files, and networks and came to known as "crackers." Of course, an effective and dangerous "cracker" must be a good hacker and the terms became intertwined. Hacker won out in popular use and in the media and today refers to anyone who performs some form of computer sabotage.

Hacker Tools

There now are more than 100,000 known viruses with more appearing virtually daily. The myriad of hackers and their nefarious deeds can affect any computer owner whether an occasional home user, e-mailer, student, blogger, or a network administrator on site or on the internet. No matter your level of computer use, you must protect your computer, business, or even your identity. The best way to know how to protect your computer is to understand the hacker's tools and recognize their damage.

Viruses, Exploits, Worms, and More

The term computer "virus" originated to describe machine code command inserted into a computer's memory that, on execution, copies itself into other programs and files on the computer. Depending on the hacker's intent, the design of a virus can merely be an inconvenience or have very serious consequences up to a potential catastrophe.
Generally, a virus is a piece of software, a series of data, or a command sequence that exploits a bug, glitch, or vulnerability. Each example is appropriately termed an "exploit." An exploit causes unintended or unanticipated behavior to occur in a computer's operating system or applications while propagating itself within the computer.
An exploit and operates through a network security vulnerability or "hole" without previous access to the vulnerable system is a "remote" exploit. An exploit that needs prior access to a system is termed a "local" exploit. These are usually intended to increase the hacker's access privileges beyond those granted by a system administrator.
Worms are simply viruses that send copies over network connections. A bomb resides silently in a computer's memory until set off by a date or action. A Trojan horse is a malicious program that cannot reproduce itself, but is distributed by CD or e-mail.

Protect Your Computer: Avoid Computer Holes/Vulnerabilities

Install only trusted software and delete unknown emails. If you have any doubt about a piece of software's function, do not install it. If you receive e-mails from random people's names, resist your curiosity and do not open it, just delete it.
Under no conditions download or open attachments from anyone that you do not know and even then be cautious. Banks and most companies that create online personal accounts will not send you attachments. If they do, it is probably best to go to the company site and request the download or at least see if it is legitimate. Avoid adult web sites, a hacker's paradise.
Whether in your e-mail or online, do not click on ads. If the ad is of interest, find the site. Be careful with what you physically put into your computer. This is especially true for shared R/W CDs, USB hard disks, or flash drives. This is an easy path for a virus to follow from computer to computer.

Protection: Install Anti-Virus Software

Anti-virus software searches for evidence of the presence of viral programs, worm, bombs, and Trojan horses by checking for the characteristic appearances or behaviors that is typical of these programs. When found the program logs its discovery, its type, often its name or an identifier, and it potential for damage. The anti-virus software then eliminates or isolates/quarantines the infected files. For the individual, commercial software is relatively inexpensive; however, there are free anti-virus programs available.
Since new viruses appear almost daily with new code it is imperative that you update you antivirus program often to keep up with these threats; therefore, make sure to set your program to update automatically. To avoid the annoyance of computer slowdown schedule full scale scans late at night.
The same is true for your Windows Operating System. Very often, your OS is where hackers discover the holes to exploit. Of course, in an ever-continuing battle, this software is continuously updated with security patches.
Finally, secure your wireless network with a router that has a built in firewall. Almost all wireless routers are set to no security when first installed. Log into the router and at least set it to basic security with a strong password to replace the factory setting that any hacker knows. A firewall or router that is not configured properly or non-existent allows hackers to scan passwords, e-mails, or files that cross your network connection.

Home Depot Gets Hacked. What Should You Learn?


If you're a Home Depot customer, hackers may have stolen your consumer data. Did you do something wrong, like not protect your PIN at the register, or expose your credit card number?
Not at all. All you did was use your payment card at the register to buy your lumber and plants. The hackers did all the rest, while the Home Depot IT department was evidently asleep at the wheel. Because whoever was driving the security effort for the do-it-yourself superstore didn't see the crash that was coming.
For starters, Home Depot hadn't implemented the full features of its security software, as it had been advised to. The primary feature was designed to be an extra layer of protection at the terminals where you swipe your card and make your purchases.
It's not completely certain that the hackers attacked the terminals, but it certainly looks as if it were somewhere at the register. That same kind of hacker attack also happened at Target stores and Michael's.
Not only did the skilled hackers penetrate Home Depot's payments systems—they put the stolen credit card data up for sale on the Internet! If your data was stolen, it was also quickly up for sale. Not what customers expected when they bought cans of paint or a new faucet for the bathroom!
If that makes you upset, here's a little more to get you worked up: Before the big hack that occurred in the summer (2014), Home Depot had already been hacked a couple of times a few months earlier. (They didn't announce it publicly—the news leaked out later.) And when those smaller attacks happened, security contractors consulting for the company urged Home Depot to activate all of the features of its security software.
Well, they didn't, and not long afterward the hackers took advantage of that poor decision. That's not uncommon: Often, many companies don't put a high-enough priority on putting up a strong defense against electronic attacks. Like the average person, they think (or hope) that it won't happen to them.
That's unfortunate for people like you who shop at stores in good faith, thinking they've taken care of everything and that their payment information is safe and secure.

False sense of security.

In some ways, a store like Home Depot is no different from a lot of consumers, as far as thinking they won't be attacked. For instance, how many people do you know that have security systems in their home? Most of us think (or hope) that it won't happen to us, that the odds are in our favor.
Maybe that's what happened to the do-it-yourself warehouse. They just figured that the security they had in place (which had seemed to work okay up until then) was working well enough.
They were wrong. For a company that says it makes decisions based on "the best interests of our customers," this one didn't turn out too well.
Here's another lesson to be learned, not just for retailers, but for all of us: Home Depot did have security in place, but security experts were telling them they needed to use more technological firepower than they had on hand.
For example, according to an article in Bloomberg Businessweek (Sept. 22), the store was using outdated antivirus software, a 2007 version, in their stores. An upgrade had been released in 2011 (three years ago), but Home Depot chose, for some reason, not to purchase and implement it.
Lesson to learn: If there's an upgrade available for your antivirus program, get it and install it! Software companies provide upgrades for good reasons.

Why being cheap doesn't pay.

Here's something really disturbing about the Home Depot story: It's possible that the retailer was just too cheap and didn't want to take any "expensive" steps to increase their cyber-defenses. Unfortunately, that's not just a guess: According to reports, the company's decision to put cost-savings ahead of protecting customer data made a lot of Home Depot IT workers frustrated and mad. In fact, many of them have left the company because of that.
Lesson to learn: When you pay more, you usually get more. Usually, when you pay more for extra security features, it does translate into greater protection of your personal data. And the savings—not just in money, but also in peace of mind—just might be invaluable to you.

About IP addresses


Here are ten simple facts that might answer some questions you have about IP addresses:
1. You must have an active IP address to be online.
Or more accurately, every time you're online you automatically have an active IP address. IP stands for Internet Protocol: The protocols are connectivity guidelines and regulations that govern computer networks.
2. IP addresses are assigned to computers, not people.
The IP address you see—the one you're connected to a network and the Internet with—is assigned to the computer you're on. When you're at a coffeehouse, the IP address you see will be different from the IP address you see at home, a hotel or an airport. Test it one day to see.
3. Whoever you interact with online could discover your IP address (if they know how to find it).
Your IP address isn't obvious to others, but it isn't hidden. A website's network administrator and technically savvy types can identify the IP addresses of computers that visit their websites or send emails. But all they can see is a number...the same one you see on WhatIsMyIPaddress.com.
4. Only an Internet Service Provider (ISP) knows the real name and home address that corresponds to an IP address.
They have to know, in order to send a bill for monthly Internet usage. However, they keep that information private and do not disclose IP addresses—or names and addresses of customers—to just anyone asking for it. However, they would disclose that information under subpoena to law enforcement agencies.
5. Your IP address NEVER reveals your name or actual, physical location.
If you click on the map on our home page, you'll see plenty of details (state, ISP, etc.), but no personal information.
6. Someone can get a general idea of where you are when you're online.
That's what the above map shows. Geolocation services can estimate where a computer user is, based on an IP address. All they need to do is record your IP address and use an IP Lookup service. However, they will still not know who the computer user is.
7. You can hide your actual IP address.
More accurately, you can show a different IP address from the one you're actively using. You can do that by using a Virtual Private Network (VPN). Think of it like having your mail sent to a P.O. Box instead of your home—you haven't moved; you're just using a different mailing address. Some VPNs are free, but the better ones charge a small monthly fee.
8. A website can monitor online behavior through online visits and viewing.
Advertisers use online tracking to place ads that might be of interest to website visitors. Website tracking systems can recognize visits by the same IP address and suggest ads for articles and topics that might interest the user behind the IP address…YOU.
9. Your IP address AND other information could lead someone to you.
If you revealed to someone your real name, your home city and perhaps sent them an email (that contained your actual IP address) from home, they could use all that information to discover your home address.
10. A VPN is the best and easiest way to hide your IP address.
Plus, it offers other online safety benefits, including keeping snooping eyes out of your computer, as well as your personal and financial affairs.

IPV6 issues

Routers, VPNs and other services struggle to connect.

IPv6 is the new IP address format that is already beginning to replace the current format, known as IPv4. (Actually, it was simply known as an IP address, because few of us needed to know about its number.) Everything that connects to the Internet—wired or wireless—needs an IP address. But little did we know that the IPv4 address would be pushed aside one day, because the world would need more IP addresses. It's already starting to happen. As of August 2016, most of the big Internet Service Providers (ISPs) were starting to switch their customers to IPv6. The world needs IPv6 because the world wants to connect everything to a computer or smart device. That's what the Internet of Things is all about.
But not everything is ready for it. And, like many things computer-network oriented, it may take some monkeying around with, and may take some time for everything to connect with ease. As a matter of fact, you might not even be able to connect to the Internet so easily the first time around.
That's been the case for hundreds of customers.

"I can't get a connection!"

If you're lucky, the switch has taken place and your router, computer and its built-in networking hardware has figured it all out. Thanks to something called "dual stack," which your ISP implemented, the IPv4/IPv6 switch-over should work.
But chances are there's something you'll have to do that to make things work; something you just don't know about. And oftentimes the people who should be able to help (your ISP's help desk) is unable to...which makes the problem even more frustrating.
Here's a real-life, help-forum question from an Mac user to other users about his dilemma and his ISP:
    After several unproductive calls with my ISP's first-tier support, I finally reached a representative who acknowledged that they were rolling out IPv6, but that they were having a problem with Airport Extreme Routers. They said Apple was working on it and gave me a number to call at Apple Router support. Unfortunately, the number they gave was no longer valid. I called my ISP again and this time talked to someone who told me he knew how to fix it. He said I should just restart my modem and test it in about 15minutes. I did so and sure enough I just clocked 333Mbps! This was the third support person I dealt with in three days. The first two were of no help and said I needed to make an appointment with a technician to come to my home. I kept insisting they should be able to fix on their side but they couldn't do it. But the third person I talked to knew what to do right away. It just goes to show that support desks are so often hit or miss. It just really depends on the luck of the draw whether you get someone competent or not.
Here are few more related issues that are springing up.

Your Internet-content filter stops working.

If you use a program like OpenDNS or a similar service to block out unwanted websites from coming into your home, you might find that they're no longer doing the job. Why? Because the filtering is all based on the IP address you initially provided them. They may not be equipped yet to handle IPv6 IP addresses if yours has changed. Again, you'll have to go into your online filtering account, check your connection and see if their service identifies your IPv6 address.

Your VPN doesn't work.

This is a real problem for the VPN services that offer secure browsing—IPv6 isn't working at all or isn't working as well. There are plenty of reports of VPN "leakage," which means that data being transmitted over wireless networks isn't staying as secure and "hacker proof" as it does with IPv4 transmissions. Many VPNs are even telling customers that, for security purposes, they shouldn't log into their VPN account with an IPv6 connection.

It will all be good someday. But when?

The switch to IPv6, like any other major technological change, is for the better, so it's worthwhile to be patient until your computer and smart devices are connected properly.
Unfortunately, that's not going to ease your frustration of having connections that used to work just fine suddenly start acting up. Count on spending some time configuring and reconfiguring some services that need to be fine-tuned for IPv6. And no one knows how long that may take or how to do it quickly and easily.
The best advice for you might be to call a tech-savvy friend who knows about IPv6 and routers and kindly ask for his or her help.
The cost of a fancy lunch or dinner (or two) in exchange for tech support could be well worth it for both of you.

Difference between Tor, Proxy, and VPN

At the heart of this topic are two issues: being able to see whatever you want to see online, and being able to do that safely, privately, or both. There are three known services that can help you do that—something called "Tor," a proxy-server service, and a VPN.
Each allows you to view content while concealing your computer's IP address...its digital identity. But they are definitely different from one another, not all are easy to use, and they are certainly not all worry-free.
You need to know the facts about Tor, proxies and VPNs before you think about jumping right in and giving it a go. There's a lot to know...and plenty to risk.

What is Tor?

Tor is a special Internet browser, one that your grandmother would advise you not to use. It is a browser that you have to download and set up, which will then give you access to parts of the Internet you may or may not want to see—that's why it is sometimes referred to as the "Dark Web." (Tor, by the way, stands for The Onion Router, the name of the software project as it was being designed.)
  • Tor does provide anonymity, because your Internet activity is routed through thousands of dedicated Tor servers around the world, making it hard for anyone to trace activity back to your computer.
  • The Tor network, however, does not take extra measures to protect your data from hackers. It just routes your data so it's more or less untraceable.
  • Going on some of the websites that are on Tor could easily infect your computer with malware. In fact, many people would advise you not to go exploring many websites on Tor. (Think of it as seeing electronic goods in the back of a van parked in a dark alley...and discovering what else is going on.)
  • Tor is also somewhat complicated. It's a multi-step process to download and then go exploring. You'll need to watch a few tutorials to get going.
  • Tor is essentially a whole other world of Internet usage, below the surface of what you see every day on Google and Yahoo. It's not for grandma. It's also not for your kids.

What is a proxy?

A proxy is an online service you can find on the Internet that allows you to visit a website while disguising your actual IP address, which is the electronic identity of your computer. Websites sometimes block users by their IP address—a proxy gets around that. Advertisers, website administrators and those who "track" IP addresses (for various reasons) would not be able to see or track yours. The word "proxy" means a substitute or stand-in: A proxy substitutes your IP address with one of theirs.
  • With a little exploring, you'll find that proxies aren't that popular today and aren't recommended or promoted for either security purposes or anonymous Web browsing.
  • A proxy isn't easy to set up. There is some configuring to do to make it work, and there are a lot of options to choose from. It's work.
  • You can set up a proxy to watch content that would otherwise be blocked because of your location, which your IP address would reveal. Sports fans can use a proxy to watch games online and get around blackouts.
  • There are free proxies...but there are also disreputable ones. In other words, some free proxies can't be trusted. It's worrisome to hear Web experts telling you to be careful when choosing a proxy and to "find one you can trust"...without saying how to do that.
  • A proxy connection works for just one website at a time; therefore, it doesn't hide your IP address from all websites—just the one you want to trick by using a proxy.

What is a VPN?

A VPN (virtual private network) is another type of online service that you can find on the Internet. (Check out our VPN comparison page after you read this article.) Once you pick a VPN provider/service and set up an account, you can use your VPN account every time you go online—from anywhere—and visit websites without the worry of being hacked.
  • With a VPN account, your Internet browsing experience is identical to what it always is. You simply have your activity tunneling through the VPN's network of servers around the country or around the world.
  • When using your VPN account, your real IP address is always hidden. Your IP address cannot be blocked, traced or tracked.
  • A VPN doesn't replace your Internet Service Provider. It works with your ISP and the Internet by creating a special tunnel in which your data travels safely. A VPN is essentially a data network inside another network (the Internet) that hackers can't get to.
  • There are free VPN options and there are plans that you pay for. Sometimes they're even offered by the same VPN provider. You get more (more protection, more services) when you're willing to pay.
  • VPNs are relatively easy to sign up for and set up. (If one isn't, choose one that is.)
  • A full-power VPN costs anywhere from a few dollars to $10 a month for a yearly plan.

Tor, VPN, proxy...which one is for you?

Of all the ways to protect your identity, your family, your data and your computer online, Tor may be the the poorest choice for the typical computer user simply looking for anonymity and security.
Proxies might do the trick, but a good proxy may be hard to fine, tricky to configure and may not even keep your IP address secure.
A personal VPN account with a good provider (and they're easy to find) will work everywhere, without fail, and provide the best level of protection at home, on the road and whenever you're using a free wireless hotspot.
That's probably exactly what you're looking for.

Free wi-fi is a place for hackers


As you know, free Wi-Fi that gives you an Internet connection seems to be available anytime you're out of the house and where you need it the most. You can connect at coffeehouses in the morning on your way to work, at lunch you can find wireless networks at most dining spots, and you can connect at restaurants and bars when the workday is done.
And if you travel often, you typically have access to public hotspots at airports, hotels and convention centers.
Of course, when you're on the road, you aren't on the same network you use at home...and that's where the danger comes in, because the more you move from network to network, the greater your risk for running into hackers who are prowling the hotspots, looking for easy targets (and innocent victims)—anyone who doesn't take the steps necessary to stay safe online.
A recent article in The Wall Street Journal suggested you should take the following steps to make it harder for hackers to get into your computer:

1. Be sure you send encrypted data.

You want to make sure the websites you are visiting are encrypting your messages as they travel across the Internet. That activity should include:
  • All of your website browsing
  • Your banking transactions
  • All online purchases
  • Every one of your emails
  • Your posts on social media sites
Here's what you need to look for: Make sure the websites you're using for the above activities begin with "https" in the address bar. The key letter is that "s," which stands for "secure." You should also see an icon in the address bar that looks like a padlock.
If you're not using a secure website, your data is at risk every time you hit "Send" or "Enter."

2. Use a VPN.

A VPN (virtual private network) is a service that you can sign up for online through one of many VPN-provider websites. Once you select a VPN provider and open an account, you will be able to go online with the assurance that all of your online activity is encrypted—guaranteed. VPNs take your data and tunnel it through highly protected networks and remote servers.
Better still, not only is your data encrypted, but your true IP address is hidden from any website you visit and from anyone who receives an email from you. A VPN even allows you to look as if your online connection is in a different region or country from where you actually are. That could allow you to view content or websites that are blocked in your region.
Visit our VPN comparison page, where you can select one of several options listed. Almost all of them offer a money-back guarantee, which you can use to test-run their service.
You'll find many articles about virtual private networks on WhatIsMyIPAddress.com.

3. Choose open networks carefully.

Have you ever gone to a mall or coffeehouse with your laptop and noticed that it automatically connected to an available network? Or you saw a long list of available networks and they all seemed legitimate to you? Beware. It's common for sophisticated hackers to set up their own hotspot in a public setting and give it a name that sounds legitimate. If you connect to a bogus network and it's run by a hacker—and you're not connected to a VPN—then you have unwittingly given them access to your computer.
Go to your network preferences folder on your computer and deselect the automatic "join networks" feature. Then be sure that the available network you choose is legitimate.

4. Practice "safe" computing.

It's not only important for you to be safe—you need to pass along these online safety tips to everyone in your family who shares your home network. In addition to the tips already covered, add these to your list...and pass them along:
  • Use different passwords for every account. If you get caught in one of those large hack attacks which seem to happen all the time (a bank or store), the hackers will explore other websites and attempt to use the stolen emails and passwords to randomly unlock the door to other accounts. It doesn't take them much effort—it's all digital—so don't make it easy for them to succeed. Use unique, tricky passwords for each account. Think about using a password manager program to help you create different passwords and store them.
  • Explore "two-factor authentication." Imagine if someone learned your username and guessed the password to your bank account! It's a frightening thought. However, you could still thwart someone who managed to get that information if you used two-factor authentication. That's because every time you start to make an online transaction, you'll be sent a special code, usually through a text message—a code you need to continue with the online transaction. Without that code, a hacker pretending to be you cannot complete a fraudulent transaction.
You may have come across this security step before. Many websites, for example, use two-factor identification anytime a customer wants to change passwords.
If you like the way that extra layer of security sounds, ask your financial institutions if they offer it. It may take an extra minute to complete your online requests, but it will add a level of protection, for free, that's worth every second.
Hackers prey on the unprotected. You can send them on their way by instituting a few extra security steps to keep your privacy intact and your computer clean.

Trace Email (Find Email Address Source)


In the following steps you'll learn how to find and copy an email header and paste it into the Trace Email Analyzer to get the sender's IP address and track the source.
Would you like to track down (or trace) where an email that you received came from?
This Trace Email tool can help you do precisely that. It works by examining the header that is a part of the emails you receive to find the IP address. 
(A header is the unseen part of every sent and received email. To learn a little bit more on headers. You can see an example of a header at the end of this article.)

What email provider do you use?

To find the IP address of a received email you're curious about, open the email and look for the header details. How you find that email's header depends on the email program you use. Do you use Gmail or Yahoo? Hotmail or Outlook?
For example, if you're a Gmail user, here are the steps you'd take:
  1. Open the message you want to view
  2. Click the down arrow next to the "Reply" link
  3. Select "Show Original" to open a new window with the full headers

STEPS TO TRACING AN EMAIL:

  1. Get instructions for locating a header for your email provider below

    Apple Mail 2.x (Mac)

    1. Select the message you want to view the headers of.
    2. Press SHIFT-COMMAND-H to toggle full headers for the message. (Alternatively you can click VIEW in the menu bar, click MESSAGE, click LONG HEADERS.

    Microsoft Outlook 2003 (Win)

    1. Select the message you want to view the headers of.
    2. Right click the mouse, select OPTIONS
    3. Headers will be displayed within the "Internet Headers" area of a pop-up window.

    Mozilla Thunderbird 2.x (Win)

    1. Select the message you want to view the headers of.
    2. Press CTRL-U (or click VIEW from the menu bar, select MESSAGE SOURCE)
    3. Headers will be displayed in a new window.

    Google Mail (GMail)

    1. Open the message you want to view the headers of.
    2. Click the down arrow next to the "Reply" link.
    3. Select "Show Original" to open a new window with the full headers

    Windows Live Hotmail

    (Full Version)
    1. This does not work with Safari on Mac OS X
    2. Right click on the message. (From the list of emails)
    3. Select "View Source"
    4. A new window with the full headers and HTML source of the email will open

    Yahoo Mail

    "New" Version
    1. Right click on the message.
    2. Select "View Full Headers"
    3. A new window with the full headers will open

    Yahoo Mail

    "Classic" Version
    1. Click on the message.
    2. Click "Full Headers" on the bottom right of the screen
  2. Open the email you want to trace and find its header
  3. Copy the header, then paste it into the Trace Email Analyzer below
  4. Press the "Get Source" button
  5. Scroll down below the box for the Trace Email results!
You should know that in some instances people send emails with false or "forged" headers, which are common in spam and unwanted or even malicious e-mail. Our Trace Email tool does not and cannot detect forged e-mail. That's why that person forged the header to begin with!

Trace Email Analyzer

Paste the header you've copied in the box.

Example of an email header
Return-path: <user@example.com>
Received: from mac.com ([10.13.11.252])
  by ms031.mac.com (Sun Java System Messaging Server 6.2-8.04 (built Feb 28
  2007)) with ESMTP id <0JMI007ZN7PETGC0@ms031.mac.com> for user@example.com; Thu,
  09 Aug 2007 04:24:50 -0700 (PDT)
Received: from mail.dsis.net (mail.dsis.net [70.183.59.5])
  by mac.com (Xserve/smtpin22/MantshX 4.0) with ESMTP id l79BOnNS000101
  for <user@example.com>; Thu, 09 Aug 2007 04:24:49 -0700 (PDT)
Received: from [192.168.2.77] (70.183.59.6) by mail.dsis.net with ESMTP
  (EIMS X 3.3.2) for <user@example.com>; Thu, 09 Aug 2007 04:24:49 -0700
Date: Thu, 09 Aug 2007 04:24:57 -0700
From: Frank Sender <sender@example.com>
Subject: Test
To: Joe User <user@example.com>
Message-id: <61086DBD-252B-46D2-A54C-263FE5E02B41@example.com>
MIME-version: 1.0 (Apple Message framework v752.2)
X-Mailer: Apple Mail (2.752.2)
Content-type: text/plain; charset=US-ASCII; format=flowed
Content-transfer-encoding: 7bit

Langkah-langkah mendaftarkan sebuah web/blog diwebmaster yandex

Mungkin banyak sekali teman-teman sekalian yang masih kurang akrab dengan mesin pencari web satu ini. Namun, bagi para IT atau programmer bahwa mesin pencari satu ini sudah gak terasa asing ditelinga mereka, karena yandex adalah salah satu mesin pencari terbesar setelah google dan bing, dimana yandex menguasai pangsa pasar di eropa timur dan sekitarnya untuk para pemakai internet loh. Asal kalian tahu bahwa yandex berasal dari negara beruang merah (Rusia). 

Biasanya, selain google dan bing yang menyediakan para pemilik web/blog untuk mendaftarkan domain mereka di webmaster mereka. Nah, Yandex pun tidak jauh berbeda seperti mereka dalam memberikan kenyamanan bagi para pemilik web/blog supaya situs mereka tedeteksi dengan mudah di mesin pencari Yandex. Hebatkan yandex, hehehe. Daripada kita ngomong terlalu lebar, Mendingan kita langsung aja ya membahas tentang bagaimana langkah-langkah untuk mendaftarkan sebuah web/blog diwebmaster yandex.


1. Silahkan masuk pada halaman webmaster Yandex, disini.
2. Klik tombol Login yang berada di sudut kanan atas. Kalau Anda sudah memiliki account, silahkan Sign in dan kalau belum bisa Sign up terlebih dahulu.Setelah Sign up, Anda diminta mem-verifikasi account Yandex Anda melalui surel yang dikirimkan oleh Yandex. Buka surel Anda lalu aktifkan account Yandex Anda. Sampai di sini account Yandex Anda sudah aktif dan siap dipergunakan.
Cara Mendaftarkan Blog di Yandex

3. Setelah Sign ini, langkah berikutnya klik tombol Add untuk menambahkan situs atau blog Anda, seperti gambar dibawah ini.
  • Cara Mendaftarkan Blog di Yandex
  • 4. Pada halaman tambah situs (Add a Site), di bagian bawah terdapat kotak yang disediakan untuk memasukan url situs atau blog, masukan url blog Anda yang akan didaftarkan dan klik tombol Add, seperti ini gambarnya.

  • Cara Mendaftarkan Blog di Yandex

  • 5. Setelah Anda menambahkan blog, langkah berikut adalah verifikasi blog yang telah didaftarkan tadi. Di sini ada 4 pilihan cara untuk mem-verifikasi blog yang sudah didaftarkan tadi, seperti : html file, meta tag, txt file, dan by dns. Anda pilih cara meta tag, lalu di bagian bawah ada kode meta tag yang harus Anda copy. Seperti ini gambarnya.


  • Cara Mendaftarkan Blog di Yandex

  • 6. Sampai di sini, Anda tinggalkan dulu Yandex dan buka blog Anda yang telah didaftarkan tadi, pilih "TEMPLATE" lalu "EDIT HTML". Kemudian paste atau tempatkan kode meta tag yang diberikan Yandex di antara <head> dan </head> lalu simpan.


  • Cara Mendaftarkan Blog di Yandex

  • 7. Setelah Anda menempatkan kode meta tag dari Yandex tadi, lalu Anda kembali ke Yandex lagi untuk melakukan verifikasi dengan menekan tombol Check seperti gambar sebelumnya (lihat lingkaran no.4). Sampai di sini mendaftarkan blog di webmaster Yandex sudah selesai, dan tinggal menunggu hasil. Akhirnya berhasil, kini Anda harus mengucapkan syukur Alhamdulillah.


  • 8. Terakhir adalah menambahkan url sitemap untuk semua artikel-artikel Anda pada webmaster Yandex, dengan cara klik tombol Indexing options lalu pilih Sitemap files. Pada kotak yang tersedia masukan url sitemap blog Anda seperti ini : http://nama-blog-Anda.blogspot.com/sitemap.xml, lalu klik tombol Add