SlideShare ist ein Scribd-Unternehmen logo
1 von 12
iGennie, one of world’s leading Online Computer tech Support is
readily available through the toll free number +1-855-512-4808. Just a
call and computer issues get effectively resolved through remote tech
support. iGennie fosters an adept Technical Support team of Microsoft
Certified Technicians offering Online Computer Help, Dell and HP Tech
Support, Windows Support, Computer Experts, XP Vista and Windows
7 support, Email and Outlook Support, 24x7 tech support, Tech support,
Digital camera, On Phone Computer Support.


Call Now Toll Free: +1-855-512-4808

                      iGennie Technical Services
                                                                         1
Virus Spoofing Address from E-mails is Alarming




             iGennie Technical Services
                                                  2
Online computer threats are growing at an alarming rate with
ever new and advanced level of intensity. Hence, a computer
user also needs to employ constant security systems to
combat the threats from making ways through.




                  iGennie Technical Services
                                                               3
The gateway to security is to apply quality security software
on your computers as preventive measure towards protecting
your work and sensitive data from falling prey to the malice.
When security is at stake owing to viruses, spyware, and
other security threats, quality security cannot have a
substitute. Getting good anti-virus software installed is
necessary to avoid risking all of your work or sensitive data
that might get compromised. Antivirus protections help your
system with effective virus scan & removal, but then we
indeed need to implement few measures specifically on our
part. For this:




                  iGennie Technical Services
                                                                4
• Schedule and perform regular weekly updates for your
'virus definitions'
• Get installed a quality Firewall
• Get installed an anti-spyware application
• Be well aware of e-mail Attachments
• Avoid opening unexpected and strange e-mail attachments.




                 iGennie Technical Services
                                                             5
Let us discuss some strange email notifications that can often
prove to be harmful. At times you might receive notices
saying that emails sent by you were not delivered, when you
are unaware of having sent one. Such are the strange
situations that viruses endow you with. This kind of virus
sends mail from somebody else’s PCs, though the mails
resemble as if sent from you or vice-versa. Such malicious
activity of virus is called spoofing of the 'from address'.




                   iGennie Technical Services
                                                                 6
It is both annoying and unusual that in spite of your system
protected by strong antivirus, virus on someone else’s
computer that is sending such emails out in the ploy of , there
is someone else out there whose computer is infected and
sending these emails out.




                   iGennie Technical Services
                                                                  7
See how the virus spoofs the from-address in emails:
• Efficient anti-virus software installed on your computer to
keep it safe,
• You happen to send an e-mail to a Friend,
• Now your email address gets registered in your Friend’s
address book within his email software,
• Your Friend happens to have not so effective anti-virus
software, and his PC is virus infected,
• The virus infesting your Friend’s computer scans through
his address book to fetch all the email addresses on it,




                  iGennie Technical Services
                                                                8
• Now the virus starts its activities by sending e-mails to all
the addresses on your Friend’s address book,
• But then these virus e-mails do not specify that they are
from your Friend. Rather it opts another address from your
Friend's address book and enters it within the 'From field' of
the outgoing email.
• This virus may mingle the name of one address and the
domain of the other, thereby creating a 'from address' that
never exists.
• These emails when received by other PC with effective anti-
virus software s, instantly the virus gets detected and the
email gets rejected,




                   iGennie Technical Services
                                                                  9
• On rejecting the virus fed mail, the receiving computer, it
sends an 'Undeliverable' message to the sender. Su8ch as:
'Subject: /Delivery Notification: Delivery has failed'.
• But then this message doesn’t go to your friend, and instead
goes to the spoofed address. It can rather be sent to you.
• At time you would not find your Friend’s genuine address
in the virus stuffed email or the 'Undeliverable' note, hence
you remain unsure about the real virus email sending
computer or sender.




                   iGennie Technical Services
                                                                 10
Hence, effective and high security impending anti-virus
software for virus removal is a must for the properly
functioning PC. An adept anti-virus helps keeping the
malicious emails and programs at safe distance.




                 iGennie Technical Services
                                                          11
iGennie Technical Services
                             12

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Empfohlen

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Saba Software
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming Language
Simplilearn
 

Empfohlen (20)

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming Language
 

Virus spoofing address from e mails is alarming

  • 1. iGennie, one of world’s leading Online Computer tech Support is readily available through the toll free number +1-855-512-4808. Just a call and computer issues get effectively resolved through remote tech support. iGennie fosters an adept Technical Support team of Microsoft Certified Technicians offering Online Computer Help, Dell and HP Tech Support, Windows Support, Computer Experts, XP Vista and Windows 7 support, Email and Outlook Support, 24x7 tech support, Tech support, Digital camera, On Phone Computer Support. Call Now Toll Free: +1-855-512-4808 iGennie Technical Services 1
  • 2. Virus Spoofing Address from E-mails is Alarming iGennie Technical Services 2
  • 3. Online computer threats are growing at an alarming rate with ever new and advanced level of intensity. Hence, a computer user also needs to employ constant security systems to combat the threats from making ways through. iGennie Technical Services 3
  • 4. The gateway to security is to apply quality security software on your computers as preventive measure towards protecting your work and sensitive data from falling prey to the malice. When security is at stake owing to viruses, spyware, and other security threats, quality security cannot have a substitute. Getting good anti-virus software installed is necessary to avoid risking all of your work or sensitive data that might get compromised. Antivirus protections help your system with effective virus scan & removal, but then we indeed need to implement few measures specifically on our part. For this: iGennie Technical Services 4
  • 5. • Schedule and perform regular weekly updates for your 'virus definitions' • Get installed a quality Firewall • Get installed an anti-spyware application • Be well aware of e-mail Attachments • Avoid opening unexpected and strange e-mail attachments. iGennie Technical Services 5
  • 6. Let us discuss some strange email notifications that can often prove to be harmful. At times you might receive notices saying that emails sent by you were not delivered, when you are unaware of having sent one. Such are the strange situations that viruses endow you with. This kind of virus sends mail from somebody else’s PCs, though the mails resemble as if sent from you or vice-versa. Such malicious activity of virus is called spoofing of the 'from address'. iGennie Technical Services 6
  • 7. It is both annoying and unusual that in spite of your system protected by strong antivirus, virus on someone else’s computer that is sending such emails out in the ploy of , there is someone else out there whose computer is infected and sending these emails out. iGennie Technical Services 7
  • 8. See how the virus spoofs the from-address in emails: • Efficient anti-virus software installed on your computer to keep it safe, • You happen to send an e-mail to a Friend, • Now your email address gets registered in your Friend’s address book within his email software, • Your Friend happens to have not so effective anti-virus software, and his PC is virus infected, • The virus infesting your Friend’s computer scans through his address book to fetch all the email addresses on it, iGennie Technical Services 8
  • 9. • Now the virus starts its activities by sending e-mails to all the addresses on your Friend’s address book, • But then these virus e-mails do not specify that they are from your Friend. Rather it opts another address from your Friend's address book and enters it within the 'From field' of the outgoing email. • This virus may mingle the name of one address and the domain of the other, thereby creating a 'from address' that never exists. • These emails when received by other PC with effective anti- virus software s, instantly the virus gets detected and the email gets rejected, iGennie Technical Services 9
  • 10. • On rejecting the virus fed mail, the receiving computer, it sends an 'Undeliverable' message to the sender. Su8ch as: 'Subject: /Delivery Notification: Delivery has failed'. • But then this message doesn’t go to your friend, and instead goes to the spoofed address. It can rather be sent to you. • At time you would not find your Friend’s genuine address in the virus stuffed email or the 'Undeliverable' note, hence you remain unsure about the real virus email sending computer or sender. iGennie Technical Services 10
  • 11. Hence, effective and high security impending anti-virus software for virus removal is a must for the properly functioning PC. An adept anti-virus helps keeping the malicious emails and programs at safe distance. iGennie Technical Services 11