Mozilla Thunderbird has one big drawback: if the mail is spammed and there are so many letters on it, then the software may hang tightly. It is extremely difficult to work with such mail.
For such cases, there is a certain analogue called the Universal Imap Tool. The developer from the neighboring forum does not support the software anymore, but this did not make him less useful and working.
- You can download this software here: [HIDE]download[/HIDE
- Link to virustotal: vt
[HIDE]It works on the same principle as Thunderbird, only it does not know how to independently select server data and works exclusively according to its own database. Everything is extremely simple: enter your mail, password, double-click on 'Server' and if the data on the domain is in the database, then press 'Enter'.
So, we figured out the software. But what if there is no domain data in either Mozilla Thunderbird or Universal Imap Tool? Then let's try to find them ourselves.
Option two. By hands
Let's assume that we have mail jayboy @ cyber-rights.net to which a very fat account is linked. After trying to log in through Mozilla Thunderbird, we get an error, Universal Imap Tool does not know such a domain either .. What to do? The main thing is not to despair. Letters somehow reach such boxes, which means that something can be done.
Each domain stores different information, whether it is information about which server the site is on or where to send letters. This is called NS-records (from the English name servers) and it is absolutely public information. We are only interested in records of the MX type, because they indicate the server to which letters should be sent. You can check them both through the windows console and corny through the browser.
To check NS records, we will use an online utility from Google: https://toolbox.googleapps.com/apps/dig/
Go to the site, enter our domain and select the records that interest us, namely MX.
In a moment we receive an answer and there are several options:
1. We see something familiar, like googleapis, google, yandex, hotmail, microsoft, yahoo and the like. Here you immediately understand which service the mail is tied to and you can try to access it, respectively, through Google, Yandex, etc.
2. We see something unfamiliar, but not associated with the domain itself, as in our case.
We see the domain plsmtp1.hushmail.com and it is to this domain that the letters sent to our mailbox arrive. Here you just need to isolate the 'main' site, go to it and try to find the web version of the mail. In our case, everything is extremely simple, the site hushmail.com . We go and easily find the page for entering the mail, this is https://secure.hushmail.com/mail/ .
3. We see that the server one way or another coincides with the domain of our mail. For example, the answer would be imap.cyber - rights.net . In this case, this means that the domain owner has his own server on which mail is configured .. Usually there is nothing to be done here .. You can try to guess the web mail address, like cyber-rights.net/webmail/or mail.cyber - rights.net , or you can try to find the addresses of imap servers yourself, like imap.cyber - rights.net / mail.cyber - rights.net , etc. But this business is usually pretty bad and unsuccessful.[/HIDE
This account is currently banned
Ban reason: Spam
Ban reason: Spam