Introduction proxy

The operating principle of a proxy server is very simple: it is a server "mandated" by an application to query the Internet instead. Thus, when a user connects to the Internet using a client application configured to use a proxy server, it will connect first to the proxy server and give him his request. The proxy server will then connect to the server that the client application tries to join and to transmit the request. The server will then give its response to the proxy, which in turn will send it to the client application.

Clearly, the starting IP address is completely hidden, and only the IP address of the proxy appears in the log service contacted.

Advantage: You appear more with your own IP address
Disadvantage: Depending on the type of proxy used (public: free, private: paying) the rate may be very low.


Saturday, April 20, 2013

Can You Trace An Email If The Sender Is Using a Proxy Server?

Many times when a person is seeking a consultation regarding an email trace investigation they are concerned because they believe their stalker is "computer savvy" and using a proxy server to disguise their IP Address. Well the good news is that an experienced investigator can still locate and identify the person behind an email address even if the sender is using a proxy server.

You may be asking what is a proxy server and how does it affect an email trace investigation? A proxy server is an intermediary computer that sits between the user's computer and the Internet. So if the sender of an email uses a proxy server then the email headers will show the IP address of the proxy server and not the IP address of the cyber stalkers computer. A person who is "computer savvy" mistakenly believes this will completely mask their identity.

But it is just that kind of thinking that makes it so much easier to catch this type of stalker. They are focusing all their attention on their IP address not realizing that the header examination is only one very small ingredient in a thorough investigation into the real identity behind an email address.

One thing they forget is that only the incoming header information will contain a disguised IP address. Unless they also use a proxy server or anonymous service to open and read every incoming email, identifying information about their computer will still be uncovered.Even the most savvy computer IT tech guy will not take this fact into consideration.

In their boldness and confidence in their computer knowledge they will fall for some of the most basic pretexts or tricks a seasoned private investigator will use in any investigation to locate or identify people. Think back to the days before the Internet and email. PIs were investigating, bail jumpers run away teenagers and all kinds of people on the run. Many times with far less information than what can be found in the most difficult email trace investigation.

An email sent by a big bad 'computer savvy" IT guy via a proxy server may stump another computer savvy IT guy but it's not even going to slow down a private detective experienced in email tracing investigations.The IP address and header examination is only one small step of the investigation involving time proven investigative techniques that a computer expert will be completely unaware of, and his overconfidence in a proxy server will be his undoing.

Copyright (c) 2011 Opperman Investigations Inc
Ed Opperman invites you to visit his cyber investigation website for all of your email search needs. He offers cyber stalking investigations, internet infidelity investigations, reverse email search and much more. To learn more about reverse email lookup and other useful information please click here now:===> http://www.emailrevealer.com

Article Source: http://EzineArticles.com/?expert=Ed_Opperman

No comments:

Post a Comment