Basics of working of Email
Email stands for Electronic Mail. Email sending and receiving is
controlled by the Email servers.Email service providers configure Email
Server before anyone can Sign into his or her account and
start communicating digitally.Users from across the world register in to
these Email servers and setup an Email account
Email Travelling Path :-
Let’s say we have two Email providers, one is gmail.com and other is yahoo.com, ABC is a registered user in gmail.com and XYZ is a registered user in yahoo.com.
• ABC signs in to his Email account in gmail.com, he then writes a mail to the xyz@yahoo.com and sends the message.
• But what happens behind the curtains, the Email from the computer of abc@gmail.com is forwarded to the Email server of gmail.com. Server of gmail.com then looks for yahoo.com on the internet and forwards the Email of the yahoo.com for the account of XYZ@yahoo.com. Yahoo server puts that email in that account.
• XYZ then sits on computer and signs in to her Email account.Now she has the message in her Email inbox.
Let’s say we have two Email providers, one is gmail.com and other is yahoo.com, ABC is a registered user in gmail.com and XYZ is a registered user in yahoo.com.
• ABC signs in to his Email account in gmail.com, he then writes a mail to the xyz@yahoo.com and sends the message.
• But what happens behind the curtains, the Email from the computer of abc@gmail.com is forwarded to the Email server of gmail.com. Server of gmail.com then looks for yahoo.com on the internet and forwards the Email of the yahoo.com for the account of XYZ@yahoo.com. Yahoo server puts that email in that account.
• XYZ then sits on computer and signs in to her Email account.Now she has the message in her Email inbox.

Email Travelling Path :-
Let’s say we have two Email providers, one is gmail.com and other is yahoo.com, ABC is a registered user in gmail.com and XYZ is a registered user in yahoo.com.
• ABC signs in to his Email account in gmail.com, he then writes a mail to the xyz@yahoo.com and sends the message.
• But what happens behind the curtains, the Email from the computer of abc@gmail.com is forwarded to the Email server of gmail.com. Server of gmail.com then looks for yahoo.com on the internet and forwards the Email of the yahoo.com for the account of XYZ@yahoo.com. Yahoo server puts that email in that account.
• XYZ then sits on computer and signs in to her Email account.Now she has the message in her Email inbox.
Let’s say we have two Email providers, one is gmail.com and other is yahoo.com, ABC is a registered user in gmail.com and XYZ is a registered user in yahoo.com.
• ABC signs in to his Email account in gmail.com, he then writes a mail to the xyz@yahoo.com and sends the message.
• But what happens behind the curtains, the Email from the computer of abc@gmail.com is forwarded to the Email server of gmail.com. Server of gmail.com then looks for yahoo.com on the internet and forwards the Email of the yahoo.com for the account of XYZ@yahoo.com. Yahoo server puts that email in that account.
• XYZ then sits on computer and signs in to her Email account.Now she has the message in her Email inbox.
Can we get sender's IP address from Email Headers ?
We may or may not. Gmail, yahoo normally do not reveal sender's IP address. But when we send an email from a php script, the headers might reveal Sender's IP. The conclusion is that answer to this question varies from different email service providers and the way how email is sent.
Can we trace sender's location, if we get his IP address ?
The IP address could only tell that which Internet Service Provider (ISP) is used by sender. Further details can not be revealed without the help of that ISP. Normally the Public IP is dynamic that is it keeps changing. We need to ask ISP about the user who was assigned that IP at the time email was sent. If sender has purchased a static IP address, it doesn't matter that when exactly was email sent. He could easily be traced.
Phone Hacking Do-It-Yourself Tutorial
Why
The previous guide can now be considered obselete as this meant it required someone like me to still make the hacks for each device. This new guide will focus more on the user creating and implementing his own hack. I'll try to be as visual as possible when doing so, minimizing the need for support from other users.
Procedure
Firmware Files
First off, you'll need your firmware files. This is the key to hacking your device. You'll be using the uda file for hacking your device. This is basically your C:\ drive or your Phone Memory.
There are two good ways to download your firmware files. I will outline them here.
Navifirm+Navifirm+ is a good application that can easily download firmware files. It is currently integrated in Nokia Cooker, which is the application we will be using to hack our
Why
The previous guide can now be considered obselete as this meant it required someone like me to still make the hacks for each device. This new guide will focus more on the user creating and implementing his own hack. I'll try to be as visual as possible when doing so, minimizing the need for support from other users.
Procedure
Firmware Files
First off, you'll need your firmware files. This is the key to hacking your device. You'll be using the uda file for hacking your device. This is basically your C:\ drive or your Phone Memory.
There are two good ways to download your firmware files. I will outline them here.
Navifirm+Navifirm+ is a good application that can easily download firmware files. It is currently integrated in Nokia Cooker, which is the application we will be using to hack our
firmware file.
4. Download your firmware files. In order to do this, you need to know
the RM model of your device. It's pretty simle. All you have to do is
press *#0000# and you'll be taken to the Device Updates screen of your
device. The RM model is listed under Type.
News
There has been a new method developed by CodeRus for hacking any Symbian device without flashing. Head over to This Post for more information.
Phone Hacking Do-It-Yourself Tutorial
Why
The previous guide can now be considered obselete as this meant it required someone like me to still make the hacks for each device. This new guide will focus more on the user creating and implementing his own hack. I'll try to be as visual as possible when doing so, minimizing the need for support from other users.
Procedure
Firmware Files
First off, you'll need your firmware files. This is the key to hacking your device. You'll be using the uda file for hacking your device. This is basically your C:\ drive or your Phone Memory.
There are two good ways to download your firmware files. I will outline them here.
Navifirm+
Navifirm+ is a good application that can easily download firmware files. It is currently integrated in Nokia Cooker, which is the application we will be using to hack our firmware file.
1.Download Nokia Cooker
2. Extract it into its own folder.
3. Run Nokia Cooker.exe
4. Download your firmware files. In order to do this, you need to know the RM model of your device. It's pretty simle. All you have to do is press *#0000# and you'll be taken to the Device Updates screen of your device. The RM model is listed under Type.

Once you know which RM model you have, open Navifirm+
On the first column, type in your RM version. It should be the only one appearing in the first column now.
Releases mean the version of the firmware. Choose the latest.
You will then be presented with a list of product codes and variants. Filter them by typing in your country. You will then need to select one. Any one is fine. The variant mainly determines which languages will be on the device. The coulour in the selection basically is the colour of your device. This will determine the default theme it'll have. Choose one.
Now click on Mark All and then Download from FiRe. Save the files to a folder somewhere in your computer.
Hacking Files
Download the hack. The hack itself is a tiny application called installserver.exe. This little Symbian application is the one that allows or disallows any application to be installed in our devices. Basically, someone has circumvented the application's certificate checking requirements and it allows the installation of any application into our device.
First, you need to determine which version of the Symbian Operating System you are running. A very painless way of doing this is via checking via the Forum Nokia Devices website.
Once you're there, all you have to do is search for your device.
IPHONE
SAMSUNG
COMPARE THE TWO

News from South Korea leaks details about Apple's new iPhone 4G.
It looks like Apple might be busting out all of its new gear this spring, first the Apple tablet in in March and the perhaps a next generation iPhone in April. KT, an exclusive South Korean partner for Apple’s iPhone, told The Korean Times it plans to introduce an upgraded 4G version of the device this April. The anonymous sources from KT claims this new 4G iPhone will have an OLED screen, boast better graphics and dual-core processor, and have a video chat function. KT sources also eluded to a new removable battery and a higher resolution camera for the iPhone 4G.
The AppleInsider, says the pieces seem to be falling into place considering its report from last week of Apple purchasing a significant amount of LED camera flash components. The AppleInsider thinks the rumored dual-core support for the iPhone 4G will probably come in the form of the new Cortex-A9 processor design from ARM, which are capable of breaking the 2GHz barrier.
As with all Apple news, unless it’s directly announced by Steve Jobs himself, it seems like a curious jigsaw puzzle. We’ll keep you updated on more iPhone 4G developments as they seep through the cracks.
No comments:
Post a Comment