|
|
Data Recovery Made Easy
Today millions of people all around the world depend on their computers for their daily work, and while modern computers are fairly reliable millions of dollars are lost every year due to technical problems and loss of data. If you spend more than a...
Is Your CRM (Customer Relationship Management) System Doomed To Fail?
“Right, People. Let’s blast out that mail campaign we’ve been planning for so long.” It’s time to put your trusty CRM software to work; to let it earn its keep. You run a search of people and companies you want to target. You soon realize...
Lookup domain names using name generators to save time and find common keyword combinations
Many reputable domain registration services on the web have added little domain name generators to their sites. There are also entire name generation programs that have been popular in the marketing and branding industry for years. If you have...
Profiting From Small Search Engines
Profiting From Smaller Search Engines February 23, 2005 Once you venture into the world of Pay Per Click advertising, you'll soon discover that the marketplace is sharply divided between tier 1 Search Engines (Google and Overture), and everyone...
Your Hard Drive is Going to Explode – Why a UPS is Essential
It’s most peoples worst computing nightmare. You wake up in the morning, flip on the computer, and it doesn’t boot. Sometimes the problem rears its ugly head as a horrific clacking noise. Other times it simply gives a read error. At this point,...
|
|
|
|
|
|
|
|
Sending anonymous email
Whatever you do with the following information is solely your responsibility. #telnet ip:25 That title looks like random letters and symbols, but it is actually the command used to connect to an SMTP server via telnet. The # represents the shell, “telnet” is the program used to start a connection via telnet, “ip” is the ip address of the mail/smtp server (an SMTP server comes with XP PRO and is easy to set up), and 25 is the port SMTP daemons run on. First of all, the newer Windows command shells are not truly DOS, and the telnet command is a little different. Namely, you will replace the colon between the ip and the port with a space. I don’t know why this was changed but there is nothing to be done about it so you just have to live with it. The colon is used, however, in almost all other operating systems, such as BSD, Linux, and probably Mac (I don’t own a Mac). When you connect, you will know right away what daemon the server is running. A daemon is a program that deals with all incoming connections and data on a specific port. The most common SMTP daemon is Sendmail (for Linux and maybe cygwin). Don’t expect to find this on too many big websites (ie Yahoo, Microsoft.com, etc), I would think they would know better. But on many websites this daemon is still being used. This tutorial will cover just fake mail sending. You will not learn how to take down any mail servers, because it is generally irresponsible to take down mail servers, and the only practical application is testing the security of your own server (if you really want to know how, use Google). That being said, you could potentially cause havoc with fake mail as well, but the playing field is more even considering everyone is equally at risk (not just those with outdated software on their servers), and unless you are smarter than the average kill-random-computers-with-winnuke person then the most harm you can do is anonymously insult people.
Fake
Mail Commands Generally, the following commands will work fine: helo mail from: someguy@random.com rcpt to: someotherguy@anywhere.com data content of email . quit Entering those commands when connected via telnet to a Sendmail daemon will send someotherguy@anywhere.com an email containing “content of email” from someguy@random.com. In some cases, you might need to type “helo random.com” at the beginning (random.com being the domain of the return address) to get this to work. The return and to addresses, as well as the content of the e-mail, can be modified as much as you want. If it doesn’t work, the daemon might need authentication, or the syntax might be different (try adding <>s on either side of the email addresses). And, backspace does not work, even though it looks like that. If you mess up in typing a command and press backspace, the command is void. In the contents of the e-mail, backspaces will show up as boxes when read by the receiver. This is an invaluable social engineering technique. Imagine sending an email to an AOL customer, faking the return address as a system administrator, with contents something like “We are debugging the system lost all our user data for your area. We require you to send your name, date of birth, address, username, password, credit card number, and credit card expiration date.” They would happily comply, thinking you were someone you weren’t. You are not completely anonymous when using this technique. Anyone who is serious about safety should know about email “headers,” or information included in the email. If you have pop3 enabled with your email (you do if you have gmail) then just open up the mail with Thunderbird (of Outlook, ugg) and tell it to display the headers. I will not go in depth on this, but a search on the internet will show you what you need to know to spot fake mail.
About the Author
eblivion -- Mike Vollmer http://eblivion.sitesled.com
|
|
|
|
|
Tucows Downloads - Download Freeware and Shareware Software |
Download freeware, shareware, and demos. Maintains over 45000 software titles that are tested, rated, reviewed and ready to download. |
www.tucows.com |
  |
Free Software Downloads and Software Reviews - Download.com |
Download shareware, freeware and Demo software for PC, Mac, Linux, and Handhelds categorized into categories, plus software reviews. |
www.download.com |
  |
Computer software - Wikipedia, the free encyclopedia |
This includes application software such as a word processor, which enables a ... Application software is often purchased separately from computer hardware. ... |
en.wikipedia.org |
  |
Shareware.com - Search for shareware programs and free software ... |
Search for shareware programs from more than a dozen downloadable software directories. |
www.shareware.com |
  |
Jumbo: Free & Shareware MP3 files, Games, Screen Savers & Computer ... |
Source of free and shareware computer programs and utilities for PC and Mac. Evaluate software and read product reviews. Download games and screen savers. |
www.jumbo.com |
  |
Computer Software in the Yahoo! Directory |
Browse categories featuring sites devoted to computer software, including shareware and freeware download sites, operating systems, desktop customization, ... |
dir.yahoo.com |
  |
IEEE Software |
IEEE Computer Society's magazine covering all aspects of software, including software engineering. |
www.computer.org |
  |
Free Downloads on ZDNet | Shareware, Trialware, Evaluation Software |
ZDNet's Software Directory is the Web's largest library of software downloads. Covering software for Windows, Mac, and Mobile systems, ZDNet's Software ... |
downloads.zdnet.com |
  |
FSF - The Free Software Foundation |
Free software is a matter of liberty not price. Think of "free" as in "free speech". |
www.fsf.org |
  |
Apple - Software |
Software products for your digital life. ... The perfect addition for professional review. QuickTime Broadcaster. Encoding software for live events. ... |
www.apple.com |
  |
Open Directory - Computers: Software |
In Partnership with AOL Search. about dmoz | report abuse/spam | help. the entire directory, only in Computers/Software. Top: Computers: Software (38471) ... |
dmoz.org |
  |
freshmeat.net: Welcome to freshmeat.net |
About: The Web browser is probably the most frequently used software today, ... Web professionals can use the software for functional testing and regression ... |
freshmeat.net |
  |
Software - GNU Project - Free Software Foundation (FSF) |
Listing of the GNU software packages. |
www.gnu.org |
  |
Sun Software |
Get enterprise-class software--Solaris 10 OS, the Java Enterprise System, ... Sun Java StorageTek Software reduces cost and complexity with a single, ... |
www.sun.com |
  |
Internet Real Estate.com -- owns and operates a portfolio of the ... |
SOFTWARE.COM · SWEEPSTAKES.COM · PHONE.COM PODCAST.COM ... Software.com | Sweepstakes.com | Phone.com | Podcast.com | Shop.com | Safety.com ... |
www.internetrealestate.com |
  |
Joel on Software |
A weblog by Joel Spolsky, a programmer working in New York City, about software and software companies. |
www.joelonsoftware.com |
  |
Amazon.com Software: Computer & video games, business, accounting ... |
Online shopping for computer & video games, business & office productivity software, software from Microsoft, Apple, Adobe & more; accounting, antivirus, ... |
www.amazon.com |
  |
IBM Software - Home Page |
IBM home page for all of its software products, including Lotus and Tivoli, with keyword search, category browse and AZ product names. |
www.ibm.com |
  |
Opera web browser: Homepage |
Copyright © 2006 Opera Software ASA. All rights reserved. Skip navigation. Opera Software ... Copyright Opera Software ASA . All rights reserved. ... |
www.opera.com |
  |
Google Directory - Computers > Software |
Search only in Software Search the Web ... Software Categorized by Letter: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ... |
www.google.com |
  |
|