Phising email it is multipart what are the two parts the

Assignment Help Computer Networking
Reference no: EM13346636

Phising email

* It is multipart, what are the two parts?

* The HTML part, is it inviting the recepient to click somewhere?

* What is the email proporting to do when the link is clicked?

* Where will the browser actually go, when the link is clicked?

* From whom does the email proport to come from, and by what (at least) two ways does it say this?

* According to the headers, where does the email actually come from?

Format of Email

Return-Path: <[email protected]>

Received: from ironport.newpaltz.edu (ironport.newpaltz.edu [137.140.1.118])

by phantom.math.xxxx.edu (8.14.4/8.14.4) with ESMTP id r2KC7sZo057346;

     Wed, 20 Mar 2013 08:07:54 -0400 (EDT)

     (envelope-from [email protected])

X-Spam-Flag: YES

Received: from zmail.newpaltz.edu ([137.140.1.112])

by ironportout.newpaltz.edu with ESMTP; 20 Mar 2013 08:07:49 -0400

Received: from localhost (localhost.localdomain [127.0.0.1])

by zmail.newpaltz.edu (Postfix) with ESMTP id DB03C10DC00B;

     Wed, 20 Mar 2013 08:07:47 -0400 (EDT)

X-Virus-Scanned: amavisd-new at zmail.newpaltz.edu

Received: from zmail.newpaltz.edu ([127.0.0.1])

bylocalhost (zmail.newpaltz.edu [127.0.0.1]) (amavisd-new, port 10024)

with ESMTP id jcghw0+YylvM; Wed, 20 Mar 2013 08:07:47 -0400 (EDT)

Received: from Unknown (unknown [213.123.123.13])

by zmail.newpaltz.edu (Postfix) with ESMTPSA id 9D99D10D400B;

     Wed, 20 Mar 2013 08:02:29 -0400 (EDT)

Message-ID: <B81EF58EFA444973823E1A9399194842@bjrrebr>

From: "University of xxxx" <[email protected]>

Subject: Notice From University of xxxx

Date: Wed, 20 Mar 2013 08:33:40 -0400

MIME-Version: 1.0

Content-Type: multipart/mixed;boundary="----=_20130324204259_94270"

X-Priority: 3

X-MSMail-Priority: Normal

X-Mailer: Microsoft Outlook Express 6.00.2900.5512

X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5512

To: undisclosed-recipients:;

X-Math-Scanned: Phantom Zone Evaluation                                                                                                                                                                                                                                                         

------=_20130324204259_94270

Content-Type: text/plain; charset="iso-8859-1"

Content-Transfer-Encoding: 8bit

 

---------------------------- Original Message ----------------------------

Subject: Notice From University of xxxx

From:    "University of xxxx" <[email protected]>

Date:    Wed, March 20, 2013 8:33 am

To:      undisclosed-recipients:;

--------------------------------------------------------------------------

 

Dear User,

 

Your e-mail will expire soon.

 

For security reasons, please use our website below to update your personal

information.

 

https://www.xxxx.edu/

 

University of xxxx

 

------=_20130324204259_94270

Content-Type: text/html; name="untitled-[2].html"

Content-Transfer-Encoding: 8bit

Content-Disposition: attachment; filename="untitled-[2].html"

 

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">

<HTML><HEAD>

<META content="text/html; charset=utf-8" http-equiv=Content-Type>

<META name=GENERATOR content="MSHTML 6.00.6000.16674">

<STYLE></STYLE>

</HEAD>

<BODY bgColor=#ffffff>

<DIV id=yui_3_7_2_1_1363110797648_17022>

<DIV id=yiv1193796572yui_3_7_2_1_1363110797648_3280>

<DIV id=yiv1193796572>

<DIV id=yiv1193796572yui_3_7_2_1_1363110797648_2688>

<DIV id=yiv1193796572yui_3_7_2_1_1362975386038_2725>

<DIV id=yiv1193796572yui_3_7_2_1_1362975386038_2724 align=left><FONT

id=yiv1193796572yui_3_7_2_1_1362975386038_2723 size=2 face=Arial>

<DIV id=yiv1193796572yui_3_7_2_1_1362975386038_4825><FONT

style="FONT-SIZE: 10pt" id=yiv1193796572yui_3_7_2_1_1362975386038_4829

color=#808080 face=Arial>Dear User, <BR><BR>Your e-mail will expire

soon.</FONT></DIV>

<DIV id=yiv1193796572yui_3_7_2_1_1362975386038_4824>&nbsp;</DIV><FONT size=2

face=Verdana>

<DIV></DIV></FONT><FONT id=yiv1193796572yui_3_7_2_1_1362975386038_2722

face=Arial>

<DIV style="MIN-HEIGHT: 16px; WIDTH: 842px"

id=yiv1193796572yui_3_7_2_1_1362975386038_4823><FONT

id=yiv1193796572yui_3_7_2_1_1362975386038_4822 color=#808080><SPAN

style="FONT-SIZE: 10pt" id=yiv1193796572yui_3_7_2_1_1362975386038_4821>For

security reasons, please use our website below to update your personal

information.</SPAN></FONT></DIV>

<DIV id=yiv1193796572yui_3_7_2_1_1362975386038_2721><SPAN

style="FONT-SIZE: 10pt" id=yiv1193796572yui_3_7_2_1_1362975386038_2762><FONT

color=#808080><BR></FONT><FONT id=yiv1193796572yui_3_7_2_1_1363110797648_3494

color=#808080><A id=yiv1193796572yui_3_7_2_1_1363110797648_3493

href="https://users.atw.hu/pltest/images/css.php" rel=nofollow

target=_blank><SPAN id=yiv1193796572lw_1363136150_0

class=yiv1193796572yshortcuts>https://www.xxxx.edu/</SPAN></A></FONT><FONT

id=yiv1193796572yui_3_7_2_1_1362975386038_2788 color=#808080><BR><BR><SPAN

id=yiv1193796572lw_1362982925_1 class=yiv1193796572yshortcuts><SPAN

id=yiv1193796572lw_1363134212_0 class=yiv1193796572yshortcuts><SPAN

id=lw_1363138633_0 class=yshortcuts>University of

xxxx</SPAN></SPAN></SPAN></FONT></SPAN></DIV></FONT></FONT></DIV></DIV></DIV></DIV></DIV></DIV></BODY></HTML>

------=_20130324204259_94270--

Reference no: EM13346636

Questions Cloud

Write a report on im operations governancethe aim of the : write a report on im operations governance.the aim of the report is to investigate an ict governance problem amd
Question 1 breakthrough innovation you are attending an : question 1 breakthrough innovation you are attending an annual clothes and fashion industry meeting. one of the
1 explain the types of financial ratios and other financial : 1. explain the types of financial ratios and other financial performance measures that are used during a ventures
1 this problem is intended to demonstrate some problems : 1. this problem is intended to demonstrate some problems that can arise from the finite precision of numerical
Phising email it is multipart what are the two parts the : phising email it is multipart what are the two parts? the html part is it inviting the recepient to click somewhere?
1 find laplace transforms of the following functions where : 1. find laplace transforms of the following functions where a b and c are constants.a. a bt ct2b. asin2tc.nbsp e-3t2.
Basic requirementsscreen one has three edittext views and : basic requirementsscreen one has three edittext views and one button.the edittext views allow you to enter a students
Planning and decision makingconsider a decision you have : planning and decision makingconsider a decision you have made or were involved in recently that has had important
A different smooth structure on r show that u phi given : a different smooth structure on r show that u phi given byis a local chart of the topological manifold m r which is

Reviews

Write a Review

Computer Networking Questions & Answers

  Depict network topology graphical model initial environment

Depict a network topology graphical model of the initial environment of 10 employees using Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length.

  You were tasked to handle the urgent delivery

You were tasked to handle the urgent delivery of 10TB of data from your company in Washington, D.C to a subsidiary in San Francisco, CA (2,815 miles away).

  Cnt-books wants an affordable

CNT-Books wants an affordable way to establish remote connections for its salespeople, who log on from customer sites all over the country, and its three branch offices.

  Advantages and disadvantages of remote access solution

Describe whether or not your network design will support dial-up or VPN remote access by using descriptions of following aspects: advantages and disadvantages of remote access solution.

  List host addresses

Subnet the following address - 130.4.8.74 The goal is to subnet the above address and to produce 7 subnets and 350 hosts/subnet. Please show all of your work. I am looking for the following: 1. List Custom Subnet Mask 2. List Network Addresses 3. ..

  Intercept message and generates alternative message

Computed hash value for the message. Alice is able to intercept message, and generates alternative message that has a hash value that collides with Bob's original hash value. Show.

  Explain the main differences between http version

Explain FTP and TFTP and their main differences. Using a diagram, explain the main differences between HTTP version 1.0 and 1.1

  Find the required bit rate if sampling rate is given

Find out the required bit rate. Suppose that the sampling rate is 8000 samples per second and that one framing bit is added to each frame.

  Network servers and resources in networked business office

What kinds of business applications would you deem significant in the networked business office? What kinds of network servers and resources.

  Receiving uart transfering incoming character to buffer

How long [in micro-seconds (µs)] does receiving UART have to transfer an incoming character to buffer or to the main computer before next character arrives?

  Outline the design of a wireless network

Outline the design of a wireless network to support user mobility over a wide area. Include in your answer a discussion of addressing, routing and the used of fixed versus ad hoc network access nodes or base stations.

  Explain plan and design a lan/wan for citycampus

The faulty staff and students of CityCampus need the ability to communicate with each other via email and to access to internet. Plan and design a LAN/WAN for CityCampus based on the following considerations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd