Friday, December 25, 2009

140 Amazing PC Hacks For you!

140 Amazing Hacks For your PC!


 

Some of the hacks which this article contains are:

How to call your friends with their own number Extreme Hack

How to Hack a MySpace Account

how Web 2.0 Logos Are Drawn in Photoshop

Photoshop Tips and Tricks

Rapidshare Hack,No waiting for 15 mins

Shutdown Command Via Command Prompt

Talk 2Desktop

VODAFONE HACK FOR FREE GPRS!

Where The Saved Passwords Stores In Windows Xp & Vista - Must for hackers and Beginers

Windows Genuine Hack 100 percent Works

Wireless Hacking

Call Anywhere in the World From PC to Mobile For Free 100% Working Hack Using Skype and Yahoo Messanger Full Tutorial

Chat with Friends through ms dos Command Prompt

Create Your Own Instant Messenger Bot'

Format A HDD With Notepad

Free Calling to Any US Phone From Your iPhone

Google Hacking.

DOWNLOAD

http://hotfile.com/dl/14200772/6246697/htpks.rar

Open Source Security Tools: Practical Guide to Security Applications

This book sorts through the overwhelming mass of open source security tools, chooses a few of the best, and shows network and system administrators how to use them to solve common security problem. Open Source Security Tools is a practicum. It tells readers what they need to do to secure their networks, introduces best-in-class tools, and shows readers how to use them. For each security task described, Howlett reviews the best open source tools, shows readers how to use them, and takes them through a sample implementation and case studies.

Download Links (5 Mb)

http://hotfile.com/dl/21700759/3d46ca5/open-source-security-tools-practical-guide-to-security-applications-a.9780321194435.24576.chm.html

Beginning Oracle SQL

Beginning Oracle SQL is your introduction to the interactive query tools and specific dialect of SQL used with Oracle Database. The book is a revision of the classic Mastering Oracle SQL and SQL*Plus by Lex de Haan, and has been updated to cover the very latest developments in Oracle's version of the SQL query language. Written in an easygoing and example-based style, Beginning Oracle SQL is the book that will get you started down the path to successfully writing SQL statements and getting results from Oracle Database.

Download Links (6 Mb)

http://rapidshare.com/files/325337365/Apress.Beginning.Oracle.SQL.Dec.2009.rar

Expert SQL Server Development

Expert SQL Server 2008 Development is aimed at SQL Server developers ready to move beyond Books Online. Author and experienced developer Alastair Aitchison shows you how to think about SQL Server development as if it were any other type of development. You'll learn to manage testing in SQL Server and to properly deal with errors and exceptions. The book also covers critical, database-centric topics such as managing concurrency and securing your data and code through proper privileges and authorization.

Download Links (8 Mb)

http://hotfile.com/dl/21703324/4abfb49/Apress.Expert.SQL.Server.2008.Development.Dec.2009.rar.html

Java Number Cruncher: The Java Programmer's Guide to Numerical Computing

This book introduces Java programmers to numerical computing. It contains clear, non-theoretical explanations of practical numerical algorithms, including safely summing numbers, finding roots of equations, interpolation and approximation, numerical integration and differentiation, and matrix operations, including solving sets of simultaneous equations. Many of the programs are applets that take advantage of Java's interactive graphics capabilities. These programs allow the user to interact with them as they dynamically demonstrate the computational algorithms in action.

Download Links (5 Mb)

http://hotfile.com/dl/21715334/a36d562/java-number-cruncher-the-java-programmers-guide-to-numerical-computing.9780130460417.2021.rar.html

http://rapidshare.com/files/325380917/java-number-cruncher-the-java-programmers-guide-to-numerical-computing.9780130460417.2021.rar

Developing Php Applications for IBM Data Servers

PHP (PHP: Hypertext Preprocessor) is a reflective programming language originally designed for producing dynamic Web pages and remote application software.[1] PHP is used mainly in server-side scripting, but can be used from a command line interface or in standalone graphical applications.

The sole implementation is produced by The PHP Group and released under the PHP License. It is considered to be free software by the Free Software Foundation. This implementation serves to define a de facto standard for PHP, as there is no formal specification.

Download Links (6 Mb)

http://hotfile.com/dl/21714895/8d7148f/Developing_PHP_Applications.zip.html

http://rapidshare.com/files/325377305/Developing_PHP_Applications.zip

How to Find a Job on LinkedIn, Facebook, MySpace and Other Social Networks

Finding the job of your dreams the old way just doesn?t happen anymore. If you want great pay, great benefits, and great satisfaction in your career, you must begin social networking.

How to Find a Job on LinkedIn, Facebook, Twitter, MySpace, and Other Social Networks helps you take full advantage of the bounty of opportunities to be found on the most popular sites. Online job-search experts Brad and Debra Schepp take you step-by-step through the process of joining networks, creating effective online profiles, and successfully

* Marketing yourself

* Building a network of business contacts

* Connecting with employers

* Getting recommendations

* Finding new leads

Mailing a resume and hoping for the best simply puts your fate in the hands of others. To stay in the running, you have to take control by keeping your information fresh and current?in real time. Online social networking is the only way to go, and this forward-looking guide is the best way to get there.


 

Download

http://hotfile.com/dl/21725587/161200e/BR-1525-HTFJ.rar.html

Mirror

http://rapidshare.com/files/325420971/BR-1525-HTFJ.rar

Thursday, December 24, 2009

Essential Facebook Development - Build Successful Applications for the Facebook Platform Eboook Dec 09

"What sets this title apart is the authors' deep insight of how to leverage the Facebook API to create wildly successful applications. They even provide instructions of how to a/b test, track, and analyze metrics to increase the exposure and engagement of your applications. Their knowledge is practical and after putting their techniques to use, my applications have achieved better results."

–Joseph Annuzzi, Jr., App Architect, PeerDynamic.com

With more than 250 million active users, Facebook is the world's #1 social networking platform. But developing successful Facebook applications presents unique challenges, both technical and nontechnical. Now, two of the world's most experienced Facebook developers show you exactly how to meet those challenges. Essential Facebook Development offers insider guidance and up-to-the-minute best practices for the entire application lifecycle: design, coding, testing, distribution, post-launch monitoring, metrics, and even application marketing.

Using extensive real-world examples, John Maver and Cappy Popp reveal why some Facebook applications succeed brilliantly while others fail. Next, they walk through building a complete application using every major component of the Facebook platform. Maver and Popp thoroughly cover Facebook's most important new features, including Facebook Connect, and provide extensive information available nowhere else–from measuring application success to monetization.

Coverage includes

Thorough introductions to Facebook's current architecture, integration points, and development technologies

Discussion of successful Facebook applications–and what makes them successful

What every developer must know about Facebook's Terms of Service

Creating an effective application infrastructure

Creating canvas pages with FBML and IFrames

Adding support for profiles, application tabs, and messaging

Incorporating JavaScript into Facebook applications with FBJS

Integrating Facebook into external sites with Facebook Connect and the Facebook JavaScript Client Library

Debugging techniques for Facebook applications

Spreading, monitoring, and tuning applications

DownloaD

Gray Hat Python: Python Programming for Hackers and Reverse Engineers

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore.

"Gray Hat Python" explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin Seitz goes beyond theory, showing you how to harness existing Python-based security tools - and how to build your own when the pre-built ones won't cut it.

You'll learn how to:

*Automate tedious reversing and security tasks;

*Design and program your own debugger;

*Fuzz Windows drivers and create powerful fuzzers from scratch;

*Have fun with code and library injection;

*Use soft and hard hooking techniques;

*Sniff secure traffic out of an encrypted web browser session;

*Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and more;


 

The world's best hackers are using Python to do their handiwork.

Shouldn't you?

[For more information] http://www.amazon.com/exec/obidos/tg/detail/-/1593271921/

Download

Advanced BlackBerry Development Edition December 2009 Retail Ebook

With Advanced BlackBerry Development, you'll learn you how to take advantage

of BlackBerry media capabilities, including the camera and video playback.


 

The book also shows you how to send and receive text and multimedia messages,

use powerful cryptography libraries, and connect with the user's personal and

business contacts and calendar.


 

http://www.apress.com/book/view/1430226560


 

Download

Backup Files Automatically with Everyday Auto Backup

Backup Files Automatically with Everyday Auto Backup

Backing up files is one of the most important and high priority tasks when it comes to data. There are many freeware tools to back up data. Everyday Auto Backup is an easy-to-use freeware application designed to backup your files automatically in Windows. Once you have added or modified a backup project, this software will immediately generate the list of today's tasks according to the project's settings.

You can create a new project using the add button and specify the files and folders to be added to the back up. You can either do an incremental back up or a full back up. You can also specify the schedule for back up.

When the start time of a backup task arrives, this software will automatically start the backup task in the background without manual intervention.

The backup project allows you to set:

The name of the backup project.

Source directory and destination directory.

Backup type: Minutely, Hourly, Daily, Weekly, and Monthly.

Whether to include the sub directories.

The start time (for Daily, Weekly, Monthly).

Whether to check the file time. If Yes the backup task will only backup newer or modified files.

Download Everyday Auto backup

http://www.backupsoft.net/download/eab_setup.exe

Tuesday, December 22, 2009

The Power User's BlackBerry Guide: 100+ CrackBerry Tips, Hacks and Resources

CrackBerry addicts, are you ready to take your BlackBerry to the next level? In this list, you'll find some of the most awesome tips, hacks, how-tos and guides for the BlackBerry, making it easy for just about anyone to become a power user.

Tips

These BlackBerry tips will help you work easier, better and faster.

  1. Delete Multiple Messages: Search for messages, then press Delete Prior to delete all of the messages in the results.
  2. Read "A Wired-In Guy Getting Set for a Big Date": Stick your wet BlackBerry, or any other doomed device, (turned off) in a bowl of uncooked rice overnight, and it will suck out the moisture.
  3. Navigate Your Calendar Quickly: First, enable Quick Entry, then press "D" for day, "W" for week, "M" for month and "A" for agenda.
  4. Separate SMS (Short Message Service) Messages and Emails: Select Separate in the SMS and Email Inboxes field under General Options.
  5. Select Text on a Page: To highlight text, press Shift, then move the wheel up or down.
  6. Delete by Date: Click a date and press Delete Prior to restore order to your mailbox while still retaining your most recent messages.
  7. Get BlackBerry Tips, Tricks and Key-Press Shortcuts: Learn important keys, message tips and more.
  8. Permanently Delete Emails: To ensure that you're permanently deleting emails, delete them from your email client rather than using the Delete Prior feature.
  9. Capitalize Letters: Press and hold letters down to make them capitals.
  10. Turn Off Messages: You can choose to turn off messages by going through your security options and modifying your firewall settings.
  11. Get Better Coverage with Your Radio: If your coverage is not doing well, try turning your radio off and on to force a network scan.
  12. Scroll Down: Use your spacebar to scroll down a page, then press Shift and the spacebar simultaneously to move back up.
  13. Get BlackBerry Calendar Tricks: This post covers popular tricks for the BlackBerry's calendar.
  14. Sync Specific Folders: Set up Folder Redirection to sync only selected email folders to your BlackBerry.
  15. Dial Letter Numbers: Call lettered numbers like 1-800-GOOG-411 by pressing Alt, hen typing the letters.
  16. Empty Your Phone-Call Log: Enable Call Logging, then delete items in your Phone Call Logs folder.
  17. Insert the "@" Symbol in an Email Message. Press the spacebar to enter an "@" symbol in a message or press it twice to insert a period.
  18. Dry Your Device with Silica Gel: If you've dropped your BlackBerry in water, dry it out with silica-gel packets, which often come in shoeboxes. This also works with silica cat litter, which is generally labeled as crystal.
  19. Select Special Characters: Press and hold a letter key, then move the thumb wheel up or down to get the appropriate character.
  20. Enable Content Protection: Store data on your device securely by enabling content protection.
  21. Stop a Page from Loading. Press the Escape button to keep Web pages from loading.
  22. Reboot Your BlackBerry: You can reboot your BlackBerry without pulling out your battery by pressing Alt, Caps and Delete simultaneously.
  23. Dry Your BlackBerry with Alcohol: Another drying option that also disinfects is 100 percent alcohol. Turn your BlackBerry off, soak it in alcohol and take it apart as much as possible. The alcohol should evaporate with exposure to air.
  24. Read the Top 10 Phone Tips from BlackBerry: This list includes simple tips for changing volume, speed-dialing and more.
  25. Use Your BlackBerry as a Flashlight: The BlackBerry makes a great flashlight for middle-of-the-night runs to the fridge or the bathroom.
  26. Delete Mail-Client Emails from Your BlackBerry: Select Purge Deleted Items under Email Reconciliation to delete emails on your mail client.

Guides

Learn how to turn your BlackBerry into a supertool with these guides.

  1. BlackBerry on Crack: 25 Tools to Supercharge Your Lifeline: This guide offers useful tools for BlackBerry business users and more.
  2. BlackBerry Software and Utilities: If you're looking for any aftermarket BlackBerry tweaks, this is the place to start.
  3. Mac OS X Tethered Modem Solution for BlackBerry: Find out how to use a BlackBerry as a modem in OS X.
  4. Voice-to-Text Voice Mail Services and Third-Party Alpha Pager Dispatch Services: Check out these services that will transcribe your BlackBerry voice mails.
  5. What Are the Methods of Receiving Email on BlackBerry?: Read this article to figure out your email options.
  6. BlackBerry for the Deaf and Hard of Hearing: This article explains why BlackBerry devices are great for those who are hearing impaired.
  7. The Agony of "BlackBerry Thumb": Learn about BlackBerry-related thumb pain and what you can do about it.
  8. Why BlackBerry?: Find out why the BlackBerry is a superior choice for some people.
  9. BlackBerry HTML Web-Browsing FAQ: Get the lowdown on HTML browsing here.
  10. Basic BlackBerry Etiquette: Here, you'll find a basic list of dos and don'ts for being a polite BlackBerry user.
  11. Buying a BlackBerry on eBay: Check out this guide to learn how to avoid getting scammed when purchasing a BlackBerry from a seller on eBay.
  12. Implementing GTD with Your BlackBerry: This guide recommends applications and more items for helping you get things done on the BlackBerry.
  13. Transfer a File Using Bluetooth Technology Between Two BlackBerry Smart Phones: This guide will show you how to transfer files easily.
  14. Gmail Receiving "Sent Items" You Send On Your BlackBerry: Learn how to turn off this syncing feature for Gmail and more.
  15. BlackBerry Chat Apps/FAQ: Learn about awesome IM (instant messaging) applications and more in this guide.
  16. Remove an IT Policy from a BlackBerry: Here, you'll find out how to rid yourself of a pesky IT policy.
  17. Easy BlackBerry Backup: Use this guide to back up your BlackBerry in just a minute.
  18. The First 10 Things You Should Do With Your New BlackBerry: Before you do anything else with your BlackBerry, do these 10 things.
  19. Appear to Be in the Office While Actually Working from Home: Fool everyone by making these tweaks using your BlackBerry and more.
  20. BlackBerry Messenger: What Is It and How Does It Work?: Get the lowdown on this BlackBerry-to-BlackBerry messaging service.
  21. Maximize the Battery Life of Your New BlackBerry: Follow this tutorial to learn how to get the most out of your battery.

How-Tos

These how-tos will guide you through step-by-step hacks and tricks for the BlackBerry.

  1. How to Use Your BlackBerry to Transfer Between Windows and Mac OS X: In this guide, you'll learn how to port tasks, notes, appointments and contacts from Mac OS X to Windows, and vice versa.
  2. How to Turn on Standby Mode Using the Mute Key: Use this method to avoid pressing keys by accident.
  3. How to Edit a Profile and Set Notifications: Here, you'll find out how to change your BlackBerry's message and email notifications.
  4. How to Restore Your BlackBerry to Default Settings: Perform a security wipe on your device with this quick tutorial.
  5. How to Free Up Memory on Your BlackBerry: Keep your BlackBerry from enabling the low-memory management feature with this tutorial.
  6. How to Get Images onto Your BlackBerry: This quick tutorial offers a few easy ways to get images on your device.
  7. How to Remove "Sent from my BlackBerry": This tutorial will walk you through the steps to changing your signature.
  8. How to Use BlackBerry as Modem For Laptop: Give your laptop full Internet access using a BlackBerry.
  9. How to Increase the Speed of the BlackBerry Browser: Speed things up with these simple tips.
  10. How to Configure Full Internet Access on BlackBerry: Learn how to get full Internet access on your BlackBerry with this tutorial.
  11. How to Install Third-Party Applications (Mac OS X): This guide will walk you through installing apps on your BlackBerry through Mac OS X.
  12. BlackBerry 101: The How-To Lecture Series: This series covers purchasing a BlackBerry, checking out the controls, third-party apps andmuch more.
  13. How to Disassemble a BlackBerry Pearl: Whether you're taking your Pearl apart for fun, hacking or just to air it out, here's how to do the job.
  14. How to Secure Your BlackBerry: Keep your data safe by following the tips in this guide.
  15. How to Clean Your BlackBerry's Trackball: Get your trackball cleaned up with this how-to.
  16. How to Stop the Blinking: Here you'll find out what various blinking lights mean and what you can do about them.
  17. Installing Third-Party Applications: This guide for Windows users walks you through the process of installing of apps.
  18. How to Get BlackBerry Internet Access without a Data Plan: Avoid data plans with this hack.
  19. How to Set up Gmail as a Free Spam Filter for Your CrackBerry: Use Gmail to keep spam out of your BlackBerry.
  20. How to Pair a Bluetooth GPS Receiver with Your BlackBerry: Check out this Bluetooth hack to pair your BlackBerry with a GPS receiver.
  21. How to Transfer Files to Your BlackBerry: This guide will teach you a few different methods of file transfers.
  22. How to Use BerryDialer to Save a Lot of Money on Voice Calls: Use this dialing hack to save some cash.
  23. Turn a Full Length DVD Movie into a Pearl Movie File: This guide shows you how to turn a DVD into an .avi file.
  24. How to Use Your BlackBerry as an Emergency Flashlight: Learn what you need to do to turn your BlackBerry into a flashlight.
  25. How to Remove and Clean the Trackball: Get your trackball squeaky clean with this guide.
  26. How to Put a Full-Blown Windows Desktop Environment on Your BlackBerry: Use your microSD card slot to get Windows on your BlackBerry.

Cheat Sheets

Make shortcuts and formats with these BlackBerry cheat sheets.

  1. Hot Keys: BlackBerry Browser: Use these hot keys when viewing Web pages.
  2. BlackBerry Cheat Sheet: This sheet is full of useful shortcuts.
  3. Compare Cellular: Compare Cellular offers guides to getting started as well as quick reference guides for a number of BlackBerry models.
  4. Supported Document Types: This list offers a glimpse at the file formats that a BlackBerry can handle.
  5. BlackBerry Shortcut Collection: This handy guide has lots of shortcuts for the BlackBerry.
  6. Tip: Helpful Keyboard Shortcuts: This cheat sheet offers lots of shortcuts for phoning, messaging and more.
  7. RIM BlackBerry Quick Reference Guide: Get this handy printable sheet for an easy, quick reference for your BlackBerry.
  8. Cheat Sheet to Share: Here, you'll find loads of shortcuts.
  9. Hot Keys: Calendar: Create appointments and view dates more quickly with these hot keys.
  10. SMS Quick Reference: Get this quick-reference guide to learn about SMS shortcuts for the BlackBerry.
  11. Free SMS Messages: Avoid messaging fees by sending carrier-specific emails.
  12. What Is My Carrier's BIS (BlackBerry Internet Service) Web Site URL?: Here, you'll find BIS URLs for providers worldwide.
  13. The BlackBerry Glossary: Find out what various acronyms stand for in this BlackBerry Glossary.
  14. BlackBerry PIN Quick-Reference Guide: Have everything you need to know about BlackBerry PINs handy with this guide.
  15. Hot Keys: View Word Document: Use these hot keys when working in Word.

Tools

Put these tools to work on your BlackBerry for loads of increased functionality.

  1. BlackBerry Operating System Downloads: Find places to download a new OS here.
  2. Berry Bloglines: Access Bloglines from your BlackBerry device using this RSS reader.
  3. Google Maps Mobile: Get traffic, listings, maps and more with Google Maps for your BlackBerry.
  4. Mobile Desktop: With this software, you can access your desktop PC from anywhere using your BlackBerry.
  5. Mobylo! MultiAlarm: Get ultramanageable alarms with this neat tool.
  6. Black & Whitelist: Keep harassing phone calls at bay using this blacklist application for the BlackBerry.
  7. TryPhone: If you're shopping for a BlackBerry, use TryPhone to find out exactly how your model will function.
  8. Naggie: This reminder application works with your BlackBerry's GPS to nag you about tasks when you get close to a location.
  9. Google Mobile: Sync up your Google Calendar and more with this service.
  10. RepliGo Professional: Using RepliGo Professional, you can view documents as if they were on your desktop computer.
  11. Empower HTML Mail Viewer: See your emails in HTML with graphics, links and more with this tool.
  12. Digby: Shop a number of online stores from your BlackBerry using Digby.
  13. Spot: Get GPS on your BlackBerry with this software.
  14. Necho Expense BlackBerry Edition: This tool makes expense reports a breeze.
  15. Secure Password Manager: With this manager, you can safely store all of your important passwords and numbers on your BlackBerry.
  16. BBTetris: Entertain yourself with this classic game for the BlackBerry (link opens download folder).
  17. ABC Amber BlackBerry Convertor: Transfer contacts, emails, logs and lots more onto your desktop computer with this convertor.
  18. iSkoot: Use this Skype client to get cheap calls on your BlackBerry.
  19. IM+ All-in-One Mobile Messenger: IM on several different accounts and applications with this neat tool.
  20. MicroStrategy Mobile: MicroStrategy Mobile automatically reformats documents so that they can be easily viewed on your BlackBerry.
  21. Mobile SSH: Get access to your server from your BlackBerry using this cool tool.
  22. Windows Live Search Mobile: Get local information, maps and searching capabilities with Windows Live Search Mobile.
  23. StockView: Track stock prices with this free viewer (link opens download folder).
  24. Translator+: Use this tool to get easy foreign translations on the go.
  25. BeamBerry: Make your BlackBerry compatible with PDFs, Word documents, text files and more with this software (link opens download folder).
  26. Beyond411: Get supercharged 411 listings using Beyond411, a service that gives you local prices, listings and GPS searches.
  27. BlackBerry Unite!: Collaborate with up to five users by sharing remote access, calendars, documents and more with BlackBerry Unite!.
  28. Backpack Mobile: Get organized on the go with Backback for the BlackBerry.
  29. BlackBerry Tools: In this suite of BlackBerry tools, you'll find a number of useful applications.

Book

Find out even more in-depth tips and hacks in these BlackBerry reference books.

  1. "BlackBerry Hacks": You'll learn how to supercharge your BlackBerry with this book.

A Beginner's Guide to Sending Email from an ASP Page

In this tutorial, we will learn how to send email from an Active Server Page using CDONTS (Microsoft Collaboration Data Objects for Windows NT Server). Although there are other CDONTS objects, we will focus solely on the NewMail object in this tutorial. We will cover most of the properties and methods of the NewMail object, and will develop, step by step, a complete and thorough example.

It is assumed that the reader has some familiarity with creating ASP pages using VBScript. (Note: If you are viewing this tutorial from a downloaded zip file, the links will not work.)

We begin by declaring an object of type NewMail.

<%

Dim MyMail

Set MyMail = Server.CreateObject("CDONTS.NewMail")

%>

We then use the From property of the NewMail object to indicate the sender of the message. The From property is required, and multiple senders are not permitted. The type of this property is String.

<%

Dim MyMail

Set MyMail = Server.CreateObject("CDONTS.NewMail")

MyMail.From = "justme@myaddress.com"

%>

Analogously, we use the To property of the NewMail object to identify the recipients of the message. This property is also of type String. At least one of the To, Cc or Bcc properties (Cc and Bcc properties discussed subsequently) must be nonempty. Each recipient must be addressed in full, with multiple recipients separated by semicolons.

<%

Dim MyMail

Set MyMail = Server.CreateObject("CDONTS.NewMail")

MyMail.From = "justme@myaddress.com"

MyMail.To = "friend1@address1.com;friend2@address2.com"

%>

The Cc property (for indicating recipients of copies of the message) and Bcc property (for indicating recipients of blind copies) work exactly like the To property. Neither of these properties is required, however, and both are of String type.

<%

Dim MyMail

Set MyMail = Server.CreateObject("CDONTS.NewMail")

MyMail.From = "justme@myaddress.com"

MyMail.To = "friend1@address1.com;friend2@address2.com"

MyMail.Cc = "friend3@address3.com;friend4@address4.com"

MyMail.Bcc = "friend5@address5.com;friend6@address6.com"

%>

It is important to include a subject line in our email messages, so we do that next using the Subject property, which is of type String. This property is not required, however, and could be set to an empty string.

<%

Dim MyMail

Set MyMail = Server.CreateObject("CDONTS.NewMail")

MyMail.From = "justme@myaddress.com"

MyMail.To = "friend1@address1.com;friend2@address2.com"

MyMail.Cc = "friend3@address3.com;friend4@address4.com"

MyMail.Bcc = "friend5@address5.com;friend6@address6.com"

MyMail.Subject = "sending email via CDONTS NewMail"

%>

The BodyFormat property sets the text format of the NewMail object. It is of type Long, and has two possible values: 0, which indicates that the body of the message includes Hypertext Markup Language (HTML); or 1, which indicates that the body of the message is exclusively plain text. The default value for the BodyFormat property is 1, so this property does not need to be set for plain text messages. Our example message will be in plain text, but, for demonstration purposes, we will explicitly set the BodyFormat property.

<%

Dim MyMail

Set MyMail = Server.CreateObject("CDONTS.NewMail")

MyMail.From = "justme@myaddress.com"

MyMail.To = "friend1@address1.com;friend2@address2.com"

MyMail.Cc = "friend3@address3.com;friend4@address4.com"

MyMail.Bcc = "friend5@address5.com;friend6@address6.com"

MyMail.Subject = "sending email via CDONTS NewMail"

MyMail.BodyFormat = 1

%>

The MailFormat property sets the encoding for the NewMail object. It is of type Long, and has two possible values: 0, which indicates that the object is to be in MIME (Multipurpose Internet Mail Extension) format; or 1, which indicates that the object is to be in uninterrupted plain text. This property is optional, and its default value is 1. This property determines the default value for the EncodingMethod parameter in the AttachFile method (to be discussed later). Since we will be including an image attachment (later), we will set the MailFormat property to 0 now.

<%

Dim MyMail

Set MyMail = Server.CreateObject("CDONTS.NewMail")

MyMail.From = "justme@myaddress.com"

MyMail.To = "friend1@address1.com;friend2@address2.com"

MyMail.Cc = "friend3@address3.com;friend4@address4.com"

MyMail.Bcc = "friend5@address5.com;friend6@address6.com"

MyMail.Subject = "sending email via CDONTS NewMail"

MyMail.BodyFormat = 1

MyMail.MailFormat = 0

%>

The Importance property (optional) allows us to set the importance associated with the NewMail object. Its type is Long, and the possible values are: 0, indicating low importance; 1, indicating normal importance (default); and 2, indicating high importance. Our message is very important, so we will set the Importance property accordingly.

<%

Dim MyMail

Set MyMail = Server.CreateObject("CDONTS.NewMail")

MyMail.From = "justme@myaddress.com"

MyMail.To = "friend1@address1.com;friend2@address2.com"

MyMail.Cc = "friend3@address3.com;friend4@address4.com"

MyMail.Bcc = "friend5@address5.com;friend6@address6.com"

MyMail.Subject = "sending email via CDONTS NewMail"

MyMail.BodyFormat = 1

MyMail.MailFormat = 0

MyMail.Importance = 2

%>

To set the text of the NewMail object, we use the Body property, which can consist of plain text only, or can contain HTML (as described in the discussion of the BodyFormat property). The Body property is either of type String or Istream object (C/C++/Java only). The Body property is not required, so it is possible to send a message with no body text at all. In fact, if you really want to be mysterious, you can send a message with no subject and no body! We, however, have an important message to send, so we will provide text for the Body property.

<%

Dim MyMail

Set MyMail = Server.CreateObject("CDONTS.NewMail")

MyMail.From = "justme@myaddress.com"

MyMail.To = "friend1@address1.com;friend2@address2.com"

MyMail.Cc = "friend3@address3.com;friend4@address4.com"

MyMail.Bcc = "friend5@address5.com;friend6@address6.com"

MyMail.Subject = "sending email via CDONTS NewMail"

MyMail.BodyFormat = 1

MyMail.MailFormat = 0

MyMail.Importance = 2

MyMail.Body = "Sending email with CDONTS NewMail" &_

"objects is easy! Try it!"

%>

If we wish to include an attachment with our mail message, we use the AttachFile method of the NewMail object. This method has three parameters.

The first parameter is Source, of type String or Istream object. This parameter is required, and must contain the full path and file name of the attachment. Only C/C++ and Java programs can use an Istream object.

The second (optional) parameter is FileName, of type String. This provides a file name to appear in the attachment's placeholder in the message. If not specified, the file name from the Source parameter is used.

The third (optional) parameter is EncodingMethod, of type Long, which indicates the encoding of the attachment. There are two possible values: 0, meaning the attachment is in UUEncode format; and 1, indicating the attachment is in Base64 format. (Base64 is the encoding scheme defined by MIME; UUEncode is an older format that you should use if you suspect your recipient(s) may not have a MIME-compliant system.) The default value of this parameter depends upon the MailFormat property. If the MailFormat property is set to 1, the default value of EncodingMethod is 0. If the MailFormat property is set to 0, the default value of EncodingMethod is 1.

In our example, we have already set the MailFormat property to 0, but we will still explicitly assign a value of 1 to the EncodingMethod parameter, for demonstration purposes.

<%

Dim MyMail

Set MyMail = Server.CreateObject("CDONTS.NewMail")

MyMail.From = "justme@myaddress.com"

MyMail.To = "friend1@address1.com;friend2@address2.com"

MyMail.Cc = "friend3@address3.com;friend4@address4.com"

MyMail.Bcc = "friend5@address5.com;friend6@address6.com"

MyMail.Subject = "sending email via CDONTS NewMail"

MyMail.BodyFormat = 1

MyMail.MailFormat = 0

MyMail.Importance = 2

MyMail.Body = "Sending email with CDONTS NewMail" &_

"objects is easy! Try it!"

MyMail.Attachfile "c:\path\smiley.gif", "smilefile.gif", 1

%>

At last, we are ready to use the NewMail object's Send method to send our email. After the Send method executes, the NewMail object becomes invalid and cannot be used for another message. Therefore, being conscientious programmers, we set that object to Nothing to release the memory. (We also do this because an accidental access of any kind to the NewMail object after Send executes will raise an embarrassing error!)

<%

Dim MyMail

Set MyMail = Server.CreateObject("CDONTS.NewMail")

MyMail.From = "justme@myaddress.com"

MyMail.To = "friend1@address1.com;friend2@address2.com"

MyMail.Cc = "friend3@address3.com;friend4@address4.com"

MyMail.Bcc = "friend5@address5.com;friend6@address6.com"

MyMail.Subject = "sending email via CDONTS NewMail"

MyMail.BodyFormat = 1

MyMail.MailFormat = 0

MyMail.Importance = 2

MyMail.Body = "Sending email with CDONTS NewMail" &_

"objects is easy! Try it!"

MyMail.Attachfile "c:\path\smiley.gif", "smilefile.gif", 1

MyMail.Send

Set MyMail = Nothing

%>

That should do it!

We conclude by mentioning that the Send method has optional parameters for From, To, Subject, Body and Importance (in that order). Therefore, we can include values for these properties when calling the Send method, rather than explicitly assigning values to the corresponding properties of the NewMail object. If the To property has already been given a value, and is also supplied as a parameter to the Send method, the message is sent to all recipients in both lists. If the other properties have been given values previously, and specified again in the Send parameters, the prior values are overwritten.

In our example code segment, if we reached the point of calling the Send method and decided to add a recipient to our mailing list, and also change the text of the subject line, this could be done as shown below. The original recipients specified in the To property would receive the message, in addition to the new recipient. The Subject property would be changed, but the From, Body, and Importance properties would retain their earlier values, as would the other NewMail properties. Note that a comma appears after the call to Send, but before the string intended for the To property. This is because we are not modifying the From property, which is the first parameter to the Send method. Without the comma, "youtoo@youraddress.com" would become the From property value, and "new subject" would be appended to the To property value. Delineating commas are not required after the last explicitly-provided parameter.

<%

Dim MyMail

Set MyMail = Server.CreateObject("CDONTS.NewMail")

MyMail.From = "justme@myaddress.com"

MyMail.To = "friend1@address1.com;friend2@address2.com"

MyMail.Cc = "friend3@address3.com;friend4@address4.com"

MyMail.Bcc = "friend5@address5.com;friend6@address6.com"

MyMail.Subject = "sending email via CDONTS NewMail"

MyMail.BodyFormat = 1

MyMail.MailFormat = 0

MyMail.Importance = 2

MyMail.Body = "Sending email with CDONTS NewMail" &_

"objects is easy! Try it!"

MyMail.Attachfile "c:\path\smiley.gif", "smilefile.gif", 1

MyMail.Send , "youtoo@youraddress.com", "new subject"

Set MyMail = Nothing

%>

Now that you know all about the CDONTS NewMail object, let's look at how to put this all together in a working user interface. We offer two ways to do this. (Note: If you are viewing this tutorial from a downloaded zip file, the links will not work.)

You can see an example of an cdonts email submission form. {http://www.devguru.com/features/tutorials/CDONTS/cdontsmailform.html}

Or you can download a zip copy of this tutorial{http://www.devguru.com/features/tutorials/CDONTS/cdonts.zip} and its supporting form-handling pages to see how they work. Further you can easily customize these email forms for your own needs.

Note, however, that our sample user interface does not provide a means for the client to specify an attachment. This is because the Request.Form method used to process the form is limited in that it only allows plain text upload, and users often wish to include attachments in alternative formats. If you wish to add attachment capability and support it fully, the Request.Form method must be augmented with additional software, e.g. dgFileUpload

[NOTE]

If you are using CDOSYS for Windows 2000 or Windows XP, the code will be be slightly different, as shown below:

<%

Dim MyMail

Set MyMail = Server.CreateObject("CDO.Message")

MyMail.From = "justme@myaddress.com"

MyMail.To = "friend1@address1.com;friend2@address2.com"

MyMail.Cc = "friend3@address3.com;friend4@address4.com"

MyMail.Bcc = "friend5@address5.com;friend6@address6.com"

MyMail.Subject = "Sending Mail via CDOSYS for Windows 2000/XP"

MyMail.TextBody = "Sending email with CDOSYS Message " &_

"objects is easy! Try it!"

MyMail.AddAttachment "c:\path\smiley.gif"

MyMail.Fields("urn:schemas:httpmail:importance").Value = 2;

MyMail.Fields.Update()

MyMail.Send()

Set MyMail = Nothing

%>

[END NOTE]

We hope our CDONTS NewMail tutorial has been helpful. Thanks for browsing

Monday, December 21, 2009

Change Progress Dialog Box Using Resource Hacker

People using Windows Vista may be familiar with the new look of the Progress Dialog Box.It really looks nice.Now XP users can also get that look without any software but just following my steps.In this tutorial I am going to tell you that how you can replace the Progress Dialog Box in XP from old XP style to new Vista Style.

Instructions :

Before doing anything you will need to know about Resource Hacker.(click here to know all about Resource Hacker).

Now,as you know about basics of Resource Hacker.So lets start :

In this tutorial we have to do 3 things :

  • Replace Script
  • Replace AVI's
  • Add BMP Image

1)Replacing Script : Here we will replace the original script with new created script.

>>Open shell32.dll from %windir%\System32\Shell32.dll in Resource Hacker.

>>Then goto Dialog>>1020>>1033 and replace the code in Right Hand Side Panel to the code given below :

click here to download the code. Just copy it and replace it and press Compile Script

2)Replacing AVI's : Now you have to replace AVI's.Follow the steps given below :

First download these 3 AVI's.

It's a RAR archive so you will need WINRAR to open it.

Now in Resource Hacker goto AVI and replace AVI's as given below..

Goto AVI>>160>>1033>> and replace it with 160.avi (just downloaded)

Goto AVI>>161>>1033>> and replace it with 161.avi (just downloaded)

Goto AVI>>162>>1033>> and replace it with 162.avi (just downloaded)

Goto AVI>>163>>1033>> and replace it with 162.avi (just downloaded)

Goto AVI>>164>>1033>> and replace it with 162.avi (just downloaded)

3)Adding BMP : It works as the background image.

You can also change its colour and then add.

First download the BMP from here and extract it.

Now in Resource Hacker click on Add A New Resource.

After that a new window will pop up,in it click on Open File With Resource.

Now navigate to the BMP file you just downloaded and open it.

In Resource Name type 404

In Resource Language type 1033 and click Add Resource.

Click on SAVE and your are done !!

How to FOOL keyloggers and remove them securely

You might have heard about a dangerous application called Keylogger. It's a very tricky tool to record your key strokes in a notepad file. Whenever you type anything using keyboard, this software stores all your key strokes. If you access Internet from any cyber cafe or any public PC, this post is must for you.

There are many keyloggers that are not detected by anti virus and other security applications, so today I am sharing few tricks with which you can fool keyloggers easily.

1) Use Virtual Keyboard: Whenever you access PC from any cyber cafe always use Virtual Keyboard or On Screen Keyboard for entering password.

How to enable virtual keyboard: If you are using Windows XP, Click on Start >> All Programs >> Accessories << Accessibility >> On Screen Keyboard.

Just use mouse clicks for entering password and username. By using on screen keyboard, keylogger will never detect your key strokes, thus your account will be safe.

2) Anti Keylogger : If you do not know whether keylogger is installed or not, you can use this software called Elite Anti Keylogger. It has more than 1000 known keyloggers and will warn you immediately it detects any keylogger.

Top 5 Very Important Security Tests For Your Computer

Until and unless you are not attacked by any virus or spyware you think that your computer security is very high but when your PC gets infected it is too late. So if you think that you have a good Internet security why not you go for some Internet Security Tests :

1) PopUp Blocker Test : This popup test is is an automated way to check your popup blocker's ability to allow good ads.

2) Firewall Test : This test will check your computer for ports that are commonly left open. Open ports could allow your computer to be compromised. This firewall test will also check for open ports known to be used by Viruses and Trojans.

3) Firewall Leak Tester : This website, on one hand, enables you to test your software personal firewall thanks to different test programs ('leaktests'), and on the other hand, shows a global vulnerabilities view of the most common personal firewalls in a summary page. Firewall Leak Tester provides also documentation and advices to improve your security dramatically.

4) Browser Security Check : This test will check your Browser Security. If you have good browser like Mozilla Firefox you will surely pass this test.

5) Online Port Scan : This test will make a scan of all your Open Ports.


 

If you have passed all these tests, congrats your system is VIRUSFREE

Thursday, December 17, 2009

How To Become The SYSTEM User In Windows XP

If you think Administrator has the largest privileges onto the computer, then you are wrong. There is a user who is named SYSTEM. SYSTEM has full control of the operating system and it's kernel. If you open windows task manager (press ctrl+alt and delete) you will see that System User controls several processes. These processes cannot be closed by Administrator. In this tutorial we will see how to trick Windows into running our desktop as System. So we'll get a much greater privileges over computer.

1.Open Command Prompt. Go to Start , then Run. In Run option type cmd and click OK. After this will open Command Prompt, or Start->All Programs ->Accessories->Command Prompt

2. In Command Prompt write at 13:55 /interactive "cmd.exe" and press enter , the time is usually a minute or two ahead of your present time in the 24 hours format.

After a minute or two will appear new Comand Prompt Window wit different title bar. It has changed from cmd.exe to svchost.exe.

3. End current explorer.exe process. Open Task Manager, select explorer.exe and click End Process.

4. In new Comand Prompt with title svchost.exe write cd.. and press enter , then write explorer.exe and press enter.

After this you will become SYSTEM user,

Use Keyboard As Mouse

When mouse isn't working properly , this trick can be very helpful. To activate mouse keys all you do is press Alt+Left shift key + NumLock and click OK or press enter .

Use the Numerical pad for controlling the mouse pointer.

5 is for click.

+ is for double click

- for right click.

Transform your Windows XP in to Windows 7

If you are using Windows XP and want to experience Windows 7 without installing then here is Seven Remix XP transformation pack to transform Windows XP to Windows 7.With this simple app you can make your XP look like Windows 7 in just few clicks. It supports Windows XP, Windows 2003, Windows Media Center Edition and some other flavors of XP. Will work with only 32 bit edition of Windows.

Just download it and install .

Download Seven Remix XP and transform your windows xp .

http://www.softpedia.com/get/Desktop-Enhancements/Shell-Replacements/Seven-Remix-XP.shtml

Monday, December 14, 2009

Make Windows XP Genuine & Validate trick

[Windows XP] Genuine & Validating Trick

Make Windows XP Genuine & Validate it

Windows XP Professional Validate
100% Working and Tested by me

All you have to do is:

(1) Open you're notepad and copy text below:

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion]
"CurrentBuild"="1.511.1 () (Obsolete data - do not use)"
"ProductId"="55274-640-7450093-23464"
"DigitalProductId"=hex:a4,00,00,00,03,00,00,00,35,35,32,37,34,2d,36,34,30,2d,\
37,34,35,30,30,39,33,2d,32,33,34,36,34,00,2e,00,00,00,41,32,32,2d,30,30,30,\
30,31,00,00,00,00,00,00,00,62,fc,61,4c,e0,26,33,16,05,d3,54,e7,a0,de,00,00,\
00,00,00,00,49,36,c2,49,20,47,0c,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,33,33,35,30,30,00,00,00,00,00,00,00,65,10,\
00,00,74,99,dd,b0,f7,07,00,00,98,10,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,c4,ae,d6,1c
"LicenseInfo"=hex:e7,77,18,19,f8,08,fc,7d,e8,f0,df,12,6e,46,cb,3f,ad,b2,dd,b9,\
15,18,16,c0,bc,c3,6a,7d,4a,80,8b,31,13,37,5a,78,a2,06,c8,6b,b9,d9,dd,cc,6a,\
9c,c5,9b,77,aa,07,8d,56,6a,7c,e4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WPAEvents]
"OOBETimer"=hex:ff,d5,71,d6,8b,6a,8d,6f,d5,33,93,fd


 

(2) Then in notepad paste text u copied.Then go File/Save As and type : "xp.reg" (WITHOUT " " )
Save it to the Destop - so you can find quickly

(3) When done that, go and double click on xp.reg and then click on "YES"
And Windows will be Genuine, you can test that here:

http://www.microsoft.com/genuine/validate/ValidateNow.aspx?displaylang=en

Saturday, December 12, 2009

A Step By Step Process of Defacing Websites

In the past I have received a number of queries like: How do I deface websites? How do I replace someone else’s web page with my own? Questions like these had become very common. After procrastinating this manual for some weeks, I finally have got down to bringing it out.

Before we move on with this manual, it is important to note that this manual explores only one method of defacing websites and the described process will not necessarily work on all target systems. Also note that we take an imaginary target system X for the below steps.

Identifying a Vulnerable host

A number of system administrators have a tendency to keep even those ports on their system open, which have no useful daemon running on them. One tip given to all system administrators is to close all those ports or disable all those daemons/services, which have no great use. However, many system administrators around the world are both too carefree and ignorant or lack the knowledge required to be able to get a list of running services and disabling the not useful ones. In effect they keep their system vulnerable to outside attacks by keeping even those ports open, which could have been done without.

The first step to be able to deface a website successfully is to identify a vulnerable host, against which you can carry out attacks. The defacing process described in this manual requires for the Port 21 or the FTP port of the target system to be open and allowing anonymous logins. In effect, you first step would be to port scan the target system X and find out whether or not the FTP port is open, and if the FTP port is open, then whether it allows for anonymous logins or not.

When I port scanned X, I find that Port 21 is open and it indeed has the FTP daemon running. I then use the FTP MS-DOS utility to ftp to port 21 of X.

C:\WINDOWS>ftp X
Connected to X
220 X FTP server (Digital UNIX Version 5.60) ready.
User (X:(none)):

FTP’ing to the port 21 of the target system brings up a prompt which asks for a Username. Now, let us try to login anonymously:

User (X:(none)): anonymous
331 Guest login ok, send ident as password.

The daemon did not get an error message, thus it does allow anonymous logins. Now, I just enter any fake email address as my password and login:

Password: fake_email@fake_domain.com
Defacing Websites: A Step By Step Process By Ankit Fadia Hacking Truths. FTP Exploits
230 Guest login ok, access restrictions apply.
ftp>

Actually, one does not need to login anonymously for this method to work. Even if you have a normal account with the target system, using which you can login to the FTP daemon and if the system is vulnerable, then this method will still work. If your target system does not allow anonymous logins and if you do not even have an account with them, then another thing that you could try is: Trying to login using the default password of the FTP daemon running on the target system. (For more information regarding default passwords, read: http://hackingtruths.box.sk/defaultpasswd.htm) However, the fact remains that the method described in this manual works the best with servers, which have anonymous logins, enabled.

The Vulnerability Itself

In the above paragraphs, I have mentioned the term: ‘the method’, several times. So what exactly is this method and what vulnerability does it exploit?

Ideally, the FTP port should be disabled unless it is really of some use. If one does have to necessarily keep the FTP daemon running, then typically each user’s file access should be limited to a particular directory. For example, like my ISP gives an FTP account to each subscriber, with each subscriber having file access to the following directory:

/bin/users/username

However, sometimes both anonymous logins and normal logins give the user access to the entire directory structure. This means that each and every user can login to the Port 21 of the vulnerable system and browse through all directories and access all files on that particular system. In such cases, the attacker tries to lay his hands on the /etc/passwd file. But that is not we lay the stress on, in this manual.

On top of all this, many servers have world write-able directories, to which all users have access to, due to the above problem. The directories being world write-able, means that all users can login and upload any files of their choice onto the target system. Or in other words, anyone can write to the target system. Thus, you not only have access to all directories on the target system, but you can save and delete or even replace all files on that system, just as if it were your local hard disk.

********************
HACKING TRUTH: How do I know whether my target system’s FTP port gives me access to world write-able directories? If you are able to upload any file to the target system, then it probably means that the directory into which logged in is at least write-able by you.
*******************

This vulnerability can be used by an attacker to access the directory where the pages of the website hosted by the target system are stored. Once the attacker knows which directory stores the web pages of the target system then he can easily edit their pages or even replace their entire site with his own, with the help of a simple command:

ftp> mput filename

Please note that if you FTP to a system and find that you are able to upload files, then it could also mean that your particular directory is write-able by you, while you do not have privileges to write to other directories. Such a scenario is quite common in the case of Webspace providers, in which each subscriber is given a particular space to Defacing Websites: A Step By Step Process By Ankit Fadia Hacking Truths. FTP Exploitsstore files or in other words each other member is given a write-able directory to which he can upload files. The gist being, having write privileges in one directory does not give you write privileges in all directories.

With this we come to the end of the first in the series of guides to Defacing websites.

Hello Guys Nowadays spamming is the Most common .. Out of the 5 emails you receive 2 are spams... And Out of 5 spam Mails 1 contains Virus or Botnet.. Its hard to believe but its truth... So Today I am Going to share with you HOW TO TRACE THE EMAIL ADDRESS AND ORIGINAL SENDER?? .. So guys Read On..




TRACING AN EMAIL ADDRESS


The purpose of this guide is to show the process involved in tracing an email. The first step required to tracing an email is finding out the headers of the email. What are headers? Email headers are lines added at the top of an email message that are used by servers as the email goes on route to get delivered. Generally email clients only show the standard To, From, and Subject headers, but there are more.

1) Enabling Email Headers

Enabling Email Headers For Gmail
Step 1:Once Logged into your Gmail Account open the Email whose headers you want to view. Click on the "More Options" link in the message next to the date of the email. 



 


 


 

Step 2: Now click the "Show Original" link.




Step 3: This link will popup a new window the headers and the body of the message.
 





Enabling Email Headers For Hotmail


Step 1:Once logged in, click on the "Options" link in the upper navigation bar.



Step 2: Now click on the "Mail Display Settings" link. 





Step 3: Change the "Message Headers" option to "Full" and click ok.



Step 4: Go to your inbox and open any one of your email. You emails show now contain additional headers.






Enabling Email Headers For Yahoo

Step 1:Once logged in, click on the "Options" link in the upper navigation bar. 





Step 2: Now click on the "General Preferences" link.



Step 3: In the paragraph titled Messages and locate the "Headers" heading and select "All".



Step 4: Go to your inbox and open any one of your email. You emails show now contain additional headers.







2) Understanding Email Headers




 



In this example the "Sender" located at sender@exampleuniversity.edu want to send an email to "Receiver" located at receiver@exampleisp.com. The sender composes his email at his workstation in the university's computer lab (lab.exampleuniversity.edu). Once completed the email message is passed to the university's mail server called mail.exampleuniversity.com. The mail server seeing that it has a message forreceiver@exampleisp.com, contacts someisp.com mail server and delivers the email to it. The email is stored on someisp.com server until Receiver logs on to check his/her inbox.

In this example, four headers will be added to the email message. This first header is generated by email client on lab.exampleuniversity.edu when forwarding it to the mail server at mail.exampleuniversity.edu.



The following header is added when mail.exampleuniversity.edu transmits the message to mail.exampleisp.com.





The following header is added when mail.exampleisp.com stores the message on the server for Reciever.





The following header is added when Reciever downloads the email from home machine called reciever.local. 







3) Tracking The Orginal Sender


The easiest way for finding the original sender is by looking for the X-Originating-IP header, this header is important since it tells you the IP Address of the computer that had sent the email. If you can not find the X-Originating-IPheader then you will have to sift through the Received headers to find the sender's ip. 





Once the email sender's ip is found go to http://www.arin.net/ to begin a search. 







Now click on the "NET-24-16-0-0-1" link. 






Scroll down the page untill you find the OrgAbuseEmail field. 






Remember to include all the headers of the email along with an attached copy when filling a complaint. 


I am Not the Original Writer of this Post. I have take It from Security Forums...But I thought It would be Useful So I am Sharing It with you Guys...
IF you have Any Queries Ask Me!