email trace

email trace

Post by Daniel Spálenk » Thu, 12 Oct 2000 15:27:15



Hi,

Im looking for a tool to catch up eMails sent from a known eMail to a known
eMail. Does exist such a tool?


 
 
 

email trace

Post by Daniel Spálenk » Thu, 12 Oct 2000 15:27:33


Hi,

Im looking for a tool to catch up eMails sent from a known eMail to a known
eMail. Does exist such a tool?



 
 
 

email trace

Post by Daniel Spálenk » Thu, 12 Oct 2000 15:27:36


Hi,

Im looking for a tool to catch up eMails sent from a known eMail to a known
eMail. Does exist such a tool?


 
 
 

email trace

Post by Dave Mun » Thu, 12 Oct 2000 04:00:00


        Greetings and Salutations.
        Well, beyond the currently famous (or infamous) "Carnivore" system
that is being discussed, pretty much any *nix system has the tools to
do this built into it.
        Read the F*ing Manual
        Regards
        Dave Mundt


>Hi,

>Im looking for a tool to catch up eMails sent from a known eMail to a known
>eMail. Does exist such a tool?



Remove the "REMOVE_THIS_" from my email address to get to me...
I hate Cullers who gather from newsgroups

Visit my home page at http://www.esper.com/xvart/index.html

 
 
 

email trace

Post by John Elsbu » Thu, 12 Oct 2000 04:00:00


On Wed, 11 Oct 2000 08:27:36 +0200, "Daniel Splenka"


>Hi,

>Im looking for a tool to catch up eMails sent from a known eMail to a known
>eMail. Does exist such a tool?

It depends where you are.  E-mail travels across an IP connection from
the sender to the recipient's mailbox via telcos, service providers
and perhaps intermediate nodes.  

You have to be where you can see the sender's traffic, the mailbox
itself, the addressee's PC, or the addressee's connection.

If you can tap a communications link between the sender and the
sender's service provider, you can do it with the right tools.

If you are a telephone company you can do it.

If you are the government and you can make the telephone company or
service providers let you, you can do it.

If you own an intermediate node through which the traffic passes, you
can do it.

If you are the sender's or recipient's service provider, you can do
it.

If you can tap the link between the recipient and their service
provider, you can do it.

If you can remotely control the sender's or recipient's PC, you can do
it.

If you can hack either service provider, the telco, or the government
monitoring agencies then you can do it.

If you are a non-technical person with low skill levels and no useful
contacts, it would probably be easier (but, of course, illegal) to
steal the PC once the e-mail has been received.