New
#1
Hidden junk mail sender's addresses?
Is it possible to see the REAL email address a email was sent from or do the spammers have foolproof ways to make it impossible to find out?
Is it possible to see the REAL email address a email was sent from or do the spammers have foolproof ways to make it impossible to find out?
Spammers go to great lengths to hide the real originating address. The ability to do this is one of the reasons why spamming is possible. I can't say these methods are foolproof but they are very effective.
Are there any methods that can work at least sometimes to get the addy's from outlook 2013?
You would need to be able to read and understand the email headers. But with true spam that won't do you much good.
The problem with SPAM is that you never know for sure if you have the real address.
Email headers can be spoofed.
https://support.office.com/en-sg/art...1-47c668e60199
Loki
Problem has nothing to do with Outlook 2013 or anything like that. It's the mail protocol itself what's flawed. Anyone sending an email can put whatever address they like as the "sender" and this isn't validated or can be verified in any way. Proper clients will send their real address, but spammers of course will put a fake one there.
The current Internet email protocols have their roots in the 1970's. It was never anticipated that it would become the mass worldwide message system it currently is. Security was an add-on and initially thought not very important. Effective security in anything is not an add-on but something that must be designed in from the very beginning.
There have been numerous proposals for a more secure email system but obtaining worldwide agreement and acceptance, to say nothing of implementation, would be a massive undertaking. And there is always the concern, would it be truly effective?
Spammers go to great lengths to hide the source of SPAM messages, that being one of it's defining characteristics. If SPAM could be effectively traced it wouldn't be a viable form of advertising. Current email protocols make hiding the source a relatively simple matter.