[Hidden-tech] An Idea about Email

Roman Victor romanvictor at rvpmdesigns.com
Thu Aug 28 16:58:26 EDT 2008


It really depends on the motivation of the offending sender. If it is a
blatant attack, and the sender is hiding behind a botnet, then all bets are
off. The odds of tracing attacks back to the originator are fairly low. In
some cases it may be possible to trace the botnet as they too have legacies.
If the botnet fails, is older or has had enough people use it, one might be
able to gain information to report on the substance of the botnet to give
clues as to the owner or at least their location. I am not too up on botnet
and their own lingo but I believer there are some white hat groups that
track them.

There are few tools that help but no tool I have come across so far is
definitive. I can tell you one thing for sure this sort of research takes
time.

Roman
 
Roman Victor, Software Developer
RVPM Designs
8 Coach Ln
Amherst, MA 01002
413 253-6547
413 695-9425 cell
romanvictor at rvpmdesigns.com
www.rvpmdesigns.com
________________________________________
From: Rikk Desgres [mailto:all at pinehurstpictures.com] 
Sent: Thursday, August 28, 2008 4:35 PM
To: Rick Feldman; romanvictor at rvpmdesigns.com
Cc: hidden-discuss at lists.hidden-tech.net
Subject: Re: [Hidden-tech] An Idea about Email

Not much you can do about it. My email too has been used.

Rikk
-- 
Rikk Desgres
Pinehurst Pictures & Sound
http://www.pinehurstpictures.com
(413) 584-6200

************************************************************
Please do not place this email address on any mailing list.
This address is for direct one on one communication.
Thank you for your cooperation.
************************************************************



on 8/28/08 4:23 PM, Rick Feldman at rfeldman at cpubtech.com wrote:
  ** Be sure to fill out the survey/skills inventory in the member's area.
   ** If you did, we all thank you.


________________________________________
I hope my question hasn't already been covered in this thread; I apologize
if it has been. 

I had my e-mail address spoofed and used for a massive spam "attack". What
happens in a case like this, Roman, when someone is in fact innocent yet
becomes the target of retribution?

Rick


At 11:46 AM 8/28/2008, Roman Victor wrote:
  ** Be sure to fill out the survey/skills inventory in the member's area.
   ** If you did, we all thank you.


Hi,

I sent a letter a few days ago to the Massachusetts Attorney General
offering to package my spam research right down to showing them the home
address of the spammer. I got this brush-off letter yesterday.
http://www.rvpmdesigns.com/images/MassAttyGenl.pdf. 

I will be at the GoNomad shop tonight after 6 pm if anyone one wants to chat
about this in person. 

Roman
 
Roman Victor, Software Developer 

_______________________________________________
Hidden-discuss mailing list - home page: http://www.hidden-tech.net
<http://www.hidden-tech.net/> 
Hidden-discuss at lists.hidden-tech.net

You are receiving this because you are on the Hidden-Tech Discussion list.
If you would like to change your list preferences, Go to the Members   
page on the Hidden Tech Web site.
http://www.hidden-tech.net/members
Rick Feldman
Hassett Feldman Group
Ostberg & Associates
RickFeldman at HassettFeldman.com
BLOG: http://OnPurpose.RickFeldman.net
 <http://onpurpose.rickfeldman.net/> TEL:413.537.7059

________________________________________
_______________________________________________
Hidden-discuss mailing list - home page: http://www.hidden-tech.net
Hidden-discuss at lists.hidden-tech.net

You are receiving this because you are on the Hidden-Tech Discussion list.
If you would like to change your list preferences, Go to the Members   
page on the Hidden Tech Web site.
http://www.hidden-tech.net/members




Google

More information about the Hidden-discuss mailing list