Find out the name of the server, referring to the documentation in Windows mail, your Internet provider or network administrator. Note: Windows mail does not support HTTP:// which is used by email services like Hotmail, Gmail and Yahoo. And to find out whether it applies to your OS using servers POP3, IMAP4 and SMTP, please refer to official Microsoft website (www.microsoft.com).
To find your server settings, sign in to your account your email using Outlook Web App. Click: "Settings" – "Show all settings" – "Account" – "My account" – "Settings for POP access IMAP and SMTP" (you can find them in another menu of the account page, the "Protocol Settings"). However, if in the section settings for these servers are listed "Unavailable", contact your ISP or network administrator for clarification.
Use the IMAP4 Protocol, as it as the mail server has more features. If you experience problems with the definition of the server settings, see the documentation section "Login and password" or to the person responsible for the account management.
If Windows mail and failed to establish a connection, check the authentication settings. Select in menu "tools", tab "Account" and then – click the "Account online". Find your account and click "Properties". Go to the Servers tab and make sure next to "Use secure password authentication" is not checked.
To know the name of the server through which you was sent message and, if necessary, block the connection, you can apply on the website http://who.is.
Advice 2: How to find out your account
Modern man a lot of time on the Internet. So over time, each recruited an impressive number of accounts on different portals and websites. To know which sites you are already registered, simply.
During his stay on the Internet each student has a unique story. It consists of announcements and messages posted under his own name, and accounts on various sites and portals. From superfluous and irrelevant information of this kind it is better to get rid of by elementary considerations of information security. Another case is when there is a need to remember whether you already have an account on the specific website, not to register again.
To find out your account record, you can start with Internet search for your own nick. Enter into a search engine, the pseudonym most often used in the registrations. In the results you will see links to almost all sites where the account of such a user was active. In the future more not to lose this information, you can add all the web address into a special folder on the bookmarks bar.
To learn or to remember whether you have an account on a specific website, use the password recovery option. Without entering data in the "sign in" section, click on the link "Remind password". In the box that appears, enter the email address which you normally use for registrations. If you already have an account on this resource, you will see a system message that indicated the box was sent the data for password recovery. Please check your email and follow the instructions contained in the email.
In the future, not had any problems with updating information about existing accounts, create a special file and storing the data about all new registrations. In this case, you will be very easy to clarify information, simply by searching on such an instrument.
Drive a special document recording all of your registration on the Internet sites.
Advice 3: How to know the server password
Hacks servers happen every day. Hackers are aware of hundreds of loopholes through which you can obtain a particular level of access to the server. In some cases, vulnerabilities could allow access to sensitive user data, sometimes a hacker does gets full control over the resource. How to protect yourself from hacker attacks?
To protect the server from hacking, you must know the main methods of hacker attacks. Closing possible loopholes, you greatly increase the security of your resource. All the following is of no interest to hackers (they know everything about that), but can be useful for server operators.
How is the attack on the server? First of all a hacker is trying to understand what software is installed on it. For this purpose, he may access located on the server site and enter an incorrect query. In response to this request is incorrectly configured server issues an error message and accompanies him about this text: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8 e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/184.108.40.20635 Server at www.имя_server.com Port 80.
For a hacker this information can be very useful – it sees the version of the installed the HTTPserver (Apache/2.2.14) and versions of other programs and services. Now he can look for exploits (malicious codes) under the vulnerability of the versions of these services. And if your system administrator has not closed the existing loopholes, the hacker can access the computer. A properly configured server should not give any information, or can display deliberately distorted.
One of the simplest ways of hacking, often giving the result, is the view of the server folders. Very often administrators forget to set rights to view them, so the hacker, identifying the structure of the site with appropriate tools, easily opens not intended for viewing folders. If the administrator is a newbie, a hacker can find these folders contain a lot of useful information. For example, the username and password of the administrator. The password is usually encrypted with md5 algorithm, but there are a lot of services for decryption. As a result, the hacker has full control over the site. Conclusion: expose read permissions on the files and opening folders.
Very often, hackers break into the database, using found sql vulnerability. There are special utilities, greatly facilitate the "work" of a hacker. With their help, in a matter of minutes is determined by the vulnerability, then the definition of the name of the database, we calculate the table name and column, then the hacker has full access to data stored in the database of information – such as logins and passwords, data, credit cards, etc.
Be sure to test your resources for the presence of sql vulnerabilities, for this you can use a hacking program. For example, NetDeviLz SQL Scanner. Enter in the program the address of your website, click. If there is a vulnerability site address appears in lower window.
Fairly common situation, when an administrator uses a very simple passwordwhich is easy to selecting. For this purpose, special programs bruteforcer, searching password using dictionaries or according to special algorithms. Your password must be at least 8 characters to be entered in different registers and include letters, numbers, and special characters@,$, etc.
Check your resources for the presence of XSS vulnerabilities, they are very common. Using this loophole, the hacker can get your cookies. Substituting them instead of my own, it is easy to enter the site under your account. To check your resources for possible vulnerabilities take advantage of a completely legal program XSpider.