SlideShare a Scribd company logo
1 of 91
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes

More Related Content

What's hot

Module 18 investigating web attacks
Module 18 investigating web attacksModule 18 investigating web attacks
Module 18 investigating web attackssagaroceanic11
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissanceNishaYadav177
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware AnalysisAndrew McNicol
 
Password Cracking
Password CrackingPassword Cracking
Password CrackingSagar Verma
 
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareBasic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareNatraj G
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Practical Malware Analysis: Ch 8: Debugging
Practical Malware Analysis: Ch 8: Debugging Practical Malware Analysis: Ch 8: Debugging
Practical Malware Analysis: Ch 8: Debugging Sam Bowne
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing ThreatNick Miller
 
Ethical Hacking - Hackers and crackers
Ethical Hacking  - Hackers and crackersEthical Hacking  - Hackers and crackers
Ethical Hacking - Hackers and crackersAshish Duggal
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanningamiable_indian
 

What's hot (20)

Module 18 investigating web attacks
Module 18 investigating web attacksModule 18 investigating web attacks
Module 18 investigating web attacks
 
Windows registry forensics
Windows registry forensicsWindows registry forensics
Windows registry forensics
 
Cyber espionage
Cyber espionageCyber espionage
Cyber espionage
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Cyber safety 101
Cyber safety 101Cyber safety 101
Cyber safety 101
 
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareBasic Dynamic Analysis of Malware
Basic Dynamic Analysis of Malware
 
Hacking
HackingHacking
Hacking
 
Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Registry Forensics
Registry ForensicsRegistry Forensics
Registry Forensics
 
Practical Malware Analysis: Ch 8: Debugging
Practical Malware Analysis: Ch 8: Debugging Practical Malware Analysis: Ch 8: Debugging
Practical Malware Analysis: Ch 8: Debugging
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking - Hackers and crackers
Ethical Hacking  - Hackers and crackersEthical Hacking  - Hackers and crackers
Ethical Hacking - Hackers and crackers
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanning
 
What is malware
What is malwareWhat is malware
What is malware
 

More from sagaroceanic11

Module 21 investigative reports
Module 21 investigative reportsModule 21 investigative reports
Module 21 investigative reportssagaroceanic11
 
Module 20 mobile forensics
Module 20 mobile forensicsModule 20 mobile forensics
Module 20 mobile forensicssagaroceanic11
 
Module 04 digital evidence
Module 04 digital evidenceModule 04 digital evidence
Module 04 digital evidencesagaroceanic11
 
Module 03 searching and seizing computers
Module 03 searching and seizing computersModule 03 searching and seizing computers
Module 03 searching and seizing computerssagaroceanic11
 
Module 01 computer forensics in todays world
Module 01 computer forensics in todays worldModule 01 computer forensics in todays world
Module 01 computer forensics in todays worldsagaroceanic11
 
Virtualisation with v mware
Virtualisation with v mwareVirtualisation with v mware
Virtualisation with v mwaresagaroceanic11
 
Virtualisation overview
Virtualisation overviewVirtualisation overview
Virtualisation overviewsagaroceanic11
 
Introduction to virtualisation
Introduction to virtualisationIntroduction to virtualisation
Introduction to virtualisationsagaroceanic11
 
2 the service lifecycle
2 the service lifecycle2 the service lifecycle
2 the service lifecyclesagaroceanic11
 
1 introduction to itil v[1].3
1 introduction to itil v[1].31 introduction to itil v[1].3
1 introduction to itil v[1].3sagaroceanic11
 
Visual studio 2008 overview
Visual studio 2008 overviewVisual studio 2008 overview
Visual studio 2008 overviewsagaroceanic11
 
Rubyforjavaprogrammers 1210167973516759-9
Rubyforjavaprogrammers 1210167973516759-9Rubyforjavaprogrammers 1210167973516759-9
Rubyforjavaprogrammers 1210167973516759-9sagaroceanic11
 

More from sagaroceanic11 (20)

Module 21 investigative reports
Module 21 investigative reportsModule 21 investigative reports
Module 21 investigative reports
 
Module 20 mobile forensics
Module 20 mobile forensicsModule 20 mobile forensics
Module 20 mobile forensics
 
Module 04 digital evidence
Module 04 digital evidenceModule 04 digital evidence
Module 04 digital evidence
 
Module 03 searching and seizing computers
Module 03 searching and seizing computersModule 03 searching and seizing computers
Module 03 searching and seizing computers
 
Module 01 computer forensics in todays world
Module 01 computer forensics in todays worldModule 01 computer forensics in todays world
Module 01 computer forensics in todays world
 
Virtualisation with v mware
Virtualisation with v mwareVirtualisation with v mware
Virtualisation with v mware
 
Virtualisation overview
Virtualisation overviewVirtualisation overview
Virtualisation overview
 
Virtualisation basics
Virtualisation basicsVirtualisation basics
Virtualisation basics
 
Introduction to virtualisation
Introduction to virtualisationIntroduction to virtualisation
Introduction to virtualisation
 
6 service operation
6 service operation6 service operation
6 service operation
 
5 service transition
5 service transition5 service transition
5 service transition
 
4 service design
4 service design4 service design
4 service design
 
3 service strategy
3 service strategy3 service strategy
3 service strategy
 
2 the service lifecycle
2 the service lifecycle2 the service lifecycle
2 the service lifecycle
 
1 introduction to itil v[1].3
1 introduction to itil v[1].31 introduction to itil v[1].3
1 introduction to itil v[1].3
 
Visual studio 2008 overview
Visual studio 2008 overviewVisual studio 2008 overview
Visual studio 2008 overview
 
Vb introduction.
Vb introduction.Vb introduction.
Vb introduction.
 
Vb essentials
Vb essentialsVb essentials
Vb essentials
 
Vb basics
Vb basicsVb basics
Vb basics
 
Rubyforjavaprogrammers 1210167973516759-9
Rubyforjavaprogrammers 1210167973516759-9Rubyforjavaprogrammers 1210167973516759-9
Rubyforjavaprogrammers 1210167973516759-9