What did you learn about tracking e-mail and spam

Assignment Help Management Information Sys
Reference no: EM131178157

Answer must be in APA ,no plagiarism,

Find at least ten pieces of spam mail from any account, whether it be home, work, school, or something else. Using the e-mail headers, and any web site that might provide information, attempt to trace the spam mail back to its original source.

You will need the following materials:

1. Collect the e-mails and view the e-mail header information in your e-mail program.

2. Find the "Received:" field in the headers and write down as many DNS names or IP addresses as you can. Also look for common details in the header elements of the different messages, such as the same e-mail servers and spammers.

3. Using the Internet, research the physical locations of the IP addresses.

4. Report the different locations from which your spam e-mail originated. What did you learn about tracking e-mail and spam?

Reference no: EM131178157

Questions Cloud

Common equity-short term debt and preferred stock : You have been asked to calculate the WACC of a company that you firm is trying to value. The firm has the following element of capital: Common Equity-Short Term Debt and Preferred Stock
Assuming the market is in equilibrium : You are considering an investment in Keller Corporation's stock which is expected to pay a dividend of $2.00 a share at the end of the year (D1=$2.00) and has a beta of 0.85. The risk-free rate is 5.5% and the market risk premium is 6%. Keller curren..
Organization lean six sigma program : A popular saying is "always clean your own house first, before criticizing your neighbor's house." Discuss how this applies to your organization's Lean Six Sigma program and its broader supply chain
Explain key difference between isas and us auditing standard : What efforts is the Auditing Standards Board making to clarify auditing standards? Describe the five key differences between ISA's and US Auditing Standards.
What did you learn about tracking e-mail and spam : Find the "Received:" field in the headers and write down as many DNS names or IP addresses as you can. Also look for common details in the header elements of the different messages, such as the same e-mail servers and spammers.
Explain advantages of maturity as well as the limitations : Contrast and Compare: A Mature Industry vs. New Innovation and Technology. Explain the advantages of maturity as well as the possible limitations. Then, compare that to the same issues for a new company. Provide examples of a service or product that ..
Review the given paper : Review the given Paper for the following:- The Topic of Paper is: "Transcending vs. Falling Behind". - Is Table of contents in correct APA format?
Cases and internet sites : Read the cases thoroughly to assess the effectiveness of each company's human resource management system. Note these categories of human resource management activities.
Explain the impact that economic and monetary policies : Analyze the impact that economic and monetary policies of one of the chosen countries currently exerts upon its trade with other countries.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd