How to find the IP address of the email sender in Gmail, Yahoo mail, Hotmail, AOL, Outlook Express, etc. When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers. Also, note that if you receive an email sent from a Gmail account through the web browser, you may not be able to find the real IP address because Google hides the real IP address of the sender. Lets begin this. Finding IP address in Gmail Log into your Gmail account with your username and password.Open the mail.To display the email headers, Click on the inverted triangle beside Reply. Finding IP address in Yahoo! Log into your Yahoo! You may copy the headers and use my IP address detection script to ease the process. Finding IP address in Hotmail Finding IP address in AOL
57 Tips Every Admin Should Know The longer a person serves as a network admin, the more tips and tricks they are likely to pick up along the way. Some could be shortcuts, others might seem like magic, but all are intended to save you time and help you solve problems. Assume that all of these Windows commands should be run from an administrative command prompt if you are using Vista, Windows 7, or Windows 2008. The most essential tool for sysadmins: Automate multiple OS patching Scan for vulnerabilities Audit hardware and software Run compliance reports Discover, manage and secure your network Monitor & control web activity Manage bandwidth & internet usage Secure downloads & web browsing Control of applications & stronger policy No credit card required, Trial also includes GFI technical support Active Directory 1. dsquery group -limit 0 | dsget group -members –expand 2. dsquery * domainroot -filter “(&(objectcategory=person)(objectclass=user)(lockoutTime=*))” -limit 0 3. netdom query fsmo 4. gpupdate 5. 6. 7.
6 reasons to use Pearltrees Pearltrees is the first and largest social curation community on the Internet. It’s a place to organize, discover and share all the cool content you find online. However, beyond this basic definition, a question remains: why would I want to use Pearltrees? Well, what I want to share with you are six major use cases (or reasons) we’ve identified as being most popular across our entire community of web curators. In addition, I’ll also share with you a couple of interesting ways in which I have put Pearltrees to use for myself. Hopefully, you’ll not only get value in learning how the community uses Pearltrees, but also be inspired to find even more clever and creative ways to use our software yourself. 3. The problem is that aside from searching your personal twitter stream to get back to the cool stuff you tweeted there’s no great way to keep those links at hand. Note: For advanced users you can even hashtag the links you tweet with #PT and the name of a pearltree in your account (e.g.
Predator Locks and Unlocks Your PC with a USB Thumb Drive | PREDATOR PREDATOR locks your PC when you are away, even if your Windows session is still active. It uses a regular USB flash drive as an access control device, and works as follows: you insert the USB drive you run PREDATOR (autostart with Windows is possible) you do your work... when you're away from your PC, you simply remove the USB drive: - once it is removed, the keyboard and mouse are disabled and the screen darkens when you return back to your PC, you put the USB flash drive in place: - keyboard and mouse are immediately released, and the display is restored. PREDATOR helps to limit the time your kids spend on their computers: you define the times of day when each user may access the computer with the built-in scheduler you can make specific rules for each user and each day of the week out of authorized periods you can either lock the desktop, logoff the user or shutdown the computer ; or you can remove the flash drive to disable the computer for good. Watch a short demo video of PREDATOR:
Just Delete Me | A directory of urls to delete your account from web services Can't find what you're looking for? Help make justdelete.me better. easy No Info Available Login to your account, go to parameters, click Delete my account. show info... hard You have to call them in order to delete your account. Log in to your account and click the top-left link to 'Member Preferences'. Despite what it says in their FAQ there is actually no automatic way to delete your account. Follow the link to edit your profile and click cancel account at bottom. Just head to the account page and click the red button 'Delete your account' at the bottom left of the page. To close your account, contact Amazon by email (via this contact form) and request that your account be closed. You must login before visiting the link. impossible We do not 'delete' or 'terminate' accounts on ACC. Remove all applications and services from your account, then request deletion by emailing customer services. Response from firstname.lastname@example.org: We really don't have a way to delete accounts entirely. medium
The rise of big data marketplaces Thanks to the ever-marching progression of Moore’s Law, we’re moving into the era where data itself becomes a traded commodity. Before we look at this megatrend and how it will almost certainly impact nearly everything and everyone on Earth in some form, let’s take a brief look at where we’ve been: Online marketplaces for goods and services We know them and, in some cases, love them: Amazon, eBay, E*TRADE, Match.com (why not?), just about everything conceivable has found its way online and into our Internet-enabled handheld devices. Early data marketplaces There are some. Now, big data marketplaces As Moore’s Law, applied to processing power, storage, available low-cost bandwidth and other core elements, brings us headlong into the generation of more data each year than was generated in the entire history of computing before it, we’re now talking about big data. Like what? Ideas abound, but let’s look at a few of the more interesting areas. Again, the hallmarks of a data marketplace are:
catchme catchme 0.3 catchme is the rootkit/stealth malware scanner that scans for: catchme can also delete, destroy and collect malicious files. How to scan How to delete malware files To delete malicious files on the "Script" tab paste the list after "Files to delete:" command and click the "Run" button. Files to delete: c:\windows\system32\yruoykdhak.dat c:\windows\system32\yruoykdhak.exe c:\windows\system32\yruoykdhak_nav.dat c:\windows\system32\yruoykdhak_navps.dat content of catchme.log How to destroy malware files To destroy malicious executable files on the "Script" tab paste the list after "Files to kill:" command and click the "Run" button. Files to kill: C:\WINDOWS\system32\drivers\symavc32.sys C:\WINDOWS\system32\drivers\Deg39.sys How to collect files To collect files paste the list on the "Script" tab after "Files:" command and click the "Run" button. Files: C:\WINDOWS\system32\drivers\symavc32.sys C:\WINDOWS\system32\drivers\Deg39.sys List of command line options recognized by catchme
The complete list of Windows Logo keyboard shortcuts The Windows Logo key, which is common on most keyboards these days, can be a powerful tool if you know the right shortcuts. When it comes to keyboard shortcuts in Microsoft Windows 7, I admit to being a bit of a novice. I fall back on the menu system or, now that it is available by default in Windows 7, I use the search box located on the Start Menu. But, as the following list shows us, there are definitely opportunities for increased efficiency within the matrix of keyboard shortcuts. One of the more powerful, and probably least used, set of keyboard shortcuts involves the Windows Logo key, which is common on most keyboards packaged with a Windows-based personal computer these days. Table A lists the keyboard shortcut combinations associated with the Windows Logo key and what each combination will do. Table A - Source Microsoft Also read:
Content Curation With Pearltrees EduTip: Content Curation with Pearltrees by Linnea Sudduth Ward Content curation tools—or tools designed to collect, store, and share ideas on a particular topic—are great tools for allowing your students to delve more deeply into a given concept. Like Pinterest, Pearltrees users create a “collection” (i.e., “board”) around a given topic and add pearls (such as relevant websites or photos) to it. Yet, Pearltrees’ capabilities exceed that of Pinterest’s. Perhaps the most useful feature that separates Pearltrees from Pinterest is its advanced organizational capabilities. The Instructional Design Core Toolset collection is a good example of Pearltrees’ capabilities. Pearltrees served as the perfect platform for this project. Pearltrees is a “freemium” service, meaning that its basic features are free but more advanced capabilities require a nominal monthly fee. Pearltrees as an Educational Technology Video:
Lightbeam for Firefox Tracking & privacy Not all tracking is bad. Many services rely on user data to provide relevant content and enhance your online experience. But tracking can happen without the user’s knowledge. Explore the database In the Lightbeam database, you will be able to browse first and third-party connection data uploaded by donors who use the Lightbeam add-on.
Make Any Dead URL Work Again | DeadURL.com Lightbeam for Firefox Gripe: Get your complaints resolved! Let's audit Truecrypt! A few weeks ago, after learning about the NSA's efforts to undermine encryption software, I wrote a long post urging developers to re-examine our open source encryption software. Then I went off and got distracted by other things. Well, I'm still distracted by other things, but people like Kenn White have been getting organized. Today I'm proud to announce the result. It is my great pleasure to publicize (and belatedly kick off) an open project to audit the Truecrypt disk encryption tool. If you already know why this is important, by all means stop reading this post now. In case you don't see the reason for a Truecrypt audit, I'm going to devote the remainder of this post to convincing you how important it is. Why audit Truecrypt? In case you haven't noticed, there's a shortage of high-quality and usable encryption software out there. But the better answer is: because Truecrypt is important! So what's wrong with Truecrypt? Maybe nothing at all. What's your plan? License review.