Solved

How to discover who is a malicious blogger is

Posted on 2011-03-02
8
483 Views
Last Modified: 2013-12-24
I have a friend who sent me this email:

"It’s www.<name removed>.com and a poster named <name removed> for years has said some ugly things about me. I thought I heard on a program that there was  a way to go to their posts and learn where that post came from – I COULD BE WRONG"

He is constantly being tortured by this person and the only way to stop this person is to legally confront him/her. But, so far, he has been unsuccessful in determining who this person is.

Can you help?

Thanks, in advance.

Lenny Gray

0
Comment
Question by:LennyGray
  • 3
  • 3
  • 2
8 Comments
 
LVL 10

Expert Comment

by:akhalighi
Comment Utility
Sorry I don't get it . what exactly you are trying to track ? an email address ? or a post in a web site ?
0
 
LVL 10

Author Comment

by:LennyGray
Comment Utility
A post on the website.

Is there a way to find out the name of someone just fom their 'handle' (posting name)or email address?
0
 
LVL 8

Accepted Solution

by:
lancecurwensville earned 250 total points
Comment Utility
It is possible to find out the IP of the poster from the blogging hosting company, utilize that IP to trace the person's ISP, and get the information from them.  Unfortunately, all of this is not possible for the average person, in order for this to be done, you will have to contact Law Enforcement Personel, who will obtain legal papers from a magistrate or judge (depending on where you live), and the ISP will provide this information.  Having said that, unless the comments are of a threatening nature, you will probably not be able to convince the law to do this for you.  
0
 
LVL 10

Assisted Solution

by:akhalighi
akhalighi earned 250 total points
Comment Utility
I agree with lance..

A post on a website is hard to track but at least your friend can ask that hosting service to block this blog if it is insulting, they also can provide IP address of the person who owns that blog or posts to that blog.

Once you got the IP address , it can be traced easily to find his Internet service provider and eventually that person. but as lance said these things need law enforcements.

So , I'd say , start with a complain email to that web site or hosting company. at least they will warn him/her not to continue posting materials like that.
0
What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

 
LVL 10

Author Comment

by:LennyGray
Comment Utility
If this person leaves an email address or a 'handle' (like SkiMaven), is there a way, other than Googling the name, to find this person?

I am sure that this person posts nice things on other sites where there is a social, political or hobby interest.

0
 
LVL 8

Expert Comment

by:lancecurwensville
Comment Utility
If you have their email address, you could purchase a one time use package from intellus, http://www.intelius.com/reverse-email.html however, there is no guarantee that the person used their actual name when registering the email.  I know of no "free" ways of tracking someone from an email address.
0
 
LVL 10

Expert Comment

by:akhalighi
Comment Utility
if you get an email from him , you can check the header of it and possible get some network related information like IP addresses ,etc. it really depends on the method that he uses to send emails.
0
 
LVL 10

Author Closing Comment

by:LennyGray
Comment Utility
Thanks for the advice. I was away on vacation and I just retruned. Please excuse my delay.
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

Configuring network clients can be a chore, especially if there are a large number of them or a lot of itinerant users.  DHCP dynamically manages this process, much to the relief of users and administrators alike!
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

6 Experts available now in Live!

Get 1:1 Help Now