Tuesday, November 23, 2010

[HumJanenge] Re: [HumJanenge-YG] Re: impersonators on RTI discussion groups

Dear everyone

Will you people please specify what exactly you feel is "cyber crime"
before spamming my inbox. If you need more info please go to "Cyber
Crime India" http://sarbajit-roy.blogspot.com/

Incidentally there are 17 stories from/about sucheta dalal on that
blog, so sue me.
http://www.google.co.in/#hl=en&q=sucheta+dalal+site%3Asarbajit-roy.blogspot.com&aq=f&aqi=&aql=&oq=&gs_rfai=&fp=e8da7fa0f269e147

For any crime (incl cyber crime) you need
A) VICTIM
b) DAMAGE / HARM
c) INTENT

Sarbajit Roy

On 11/23/10, Awdhesh Kumar <jhajee9999@yahoo.co.in> wrote:
> [Moderator's note: Thanks Awdesh. Here is the Mumbai's cyber cell's FAQ on
> email-headers
> http://www.cybercellmumbai.com/faq/email-headers
> However gmail truncates the sender's ip information
> http://mail.google.com/support/bin/answer.py?hl=en&answer=26903
> -vishal]
>
> My suggestion will be try to examine from where the mail has been received
> following is example ( taking into consideration yahoo mail )
>
> go to inbox then go the suspicious mail
> / impersonated mail -> search for
> " Full Headers " [ Down Right ] click full headers you will see some
> not easily understandable text - these are basically paths which mail has
> traveled over to reach you inbox
>
> only give more emphasis to retun path of the email - if one wants to check
> source of ip address one can use robtex.com to know more about ip
> address in email or domain names in emails it is big thing to trace a mail
> but slowly you will try to atleast figure out impersonated mails
>
> if any suspicious / impersonated mail arrives try to save full headers and
> analyze
>
> Awdhesh kumar--- On Tue, 23/11/10, suchetadalal@yahoo.com
> <suchetadalal@yahoo.com> wrote:
>
> From: suchetadalal@yahoo.com <suchetadalal@yahoo.com>
> Subject: [HumJanenge-YG] Re: impersonators on RTI discussion groups
> Date: Tuesday, 23 November, 2010, 7:21 AM
>
> Hi all. According to me this is a very serious violation of personal privacy
> and more importantly it is impersonation. I have preciously filed a cyber
> crime complaint against a pune based forensic crime

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.