The featuring article of IRW explains how to access, read, and interpret email headers. Several techniques for tracking down spammers are also disclosed.
We show whether your ISP or email client might be adding headers that unnecessarily disclose important information like the name of the machine used to send an email, your isp name and IP, your email vendor, which antivirus software your isp might be using, etc.
For instance, this morning I received the following unsolicited emai asking for a link exchange:
My name is David Stern, and I am contacting you on behalf of our client ***
*** is London’s most exclusive personal training and therapy centre.
I have visited your site and see that your site is sufficiently related to their domain. It would be great if we can have website *** linked to yours. In lieu of this link, we will provide a link back from one of our best directories and from same Google PageRank page.
The email headers identify in the HELO command the sender’s local machine. I’m disabling the link using asterisks.
Received: from [188.8.131.52] (helo=smtp.net4india.com)
by smtp.net4india.com with smtp (Exim 4.66) <*a href=*mailto:email@example.com”>firstname.lastname@example.org<*/a>)
If HELO is not present, there are plenty of data mining techniques to use.