Solved

How to recover history on gmail account?

Posted on 2012-03-26
6
240 Views
Last Modified: 2013-06-13
My account was hacked and whole history erased. Is there any way I can recover it?
0
Comment
Question by:Snjeguljica
  • 2
  • 2
6 Comments
 
LVL 16

Expert Comment

by:l33tf0b
Comment Utility
Q. My e-mail history was deleted by the hacker, how do I recover it?
A. Have you looked in All Mail and Trash for the missing information? Have you used Search to try and find it? Unfortunately, messages deleted from Trash or Spam can not be recovered. If you would like to request Google attempt to recovery messages deleted by a hacker, see: http://mail.google.com/support/bin/answer.py?hl=en&answer=8256


You'll want to visit this page for more info:

http://gmailaccountrecovery.blogspot.com/

http://code.google.com/p/got-your-back/

is a tool to backup your gmail data and restore it at any time.  Command line based only. FREE!
0
 

Author Comment

by:Snjeguljica
Comment Utility
Thank you for those informations but I tried it all of them. Point is that my account was returned to me by the same person who hacked it and I can log into my gmail account but all messages were delated forever. I can not find them anywhere and now I don't know what to do?? I clicked on those sites you provided but they write the same thing ,,,, check all mail, trash ..... If I go to my account has been compromised then only solution they give is (I can not open my account and something similar. Now I really don't know what else I can do to recover it??
0
 
LVL 16

Accepted Solution

by:
l33tf0b earned 500 total points
Comment Utility
you might be out of luck if they purged the data from the server.  You could try reaching out to Google customer support but I highly doubt they'll be able to do much.  I would say take it as an experience and start configuring a backup of your mail.

You could attempt to setup an IMAP / POP account and see if it can pull data from the server, but I highly doubt this will work if you are unable to see emails in gmail.
0
 

Author Comment

by:Snjeguljica
Comment Utility
Thank you anyway :-(
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

More or less everybody in the IT market understands the basics of Networking, however when we start talking about Storage Networks, things get a bit dizzier, and this is where I would like to help.
Hyper-convergence systems have taken the IT world by storm and have quickly started to change our point of view of how the data center should and could be architected. In this article, I’ll explain the benefits of employing a hyper-converged system …
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now