{"id":73,"date":"2025-05-20T16:43:32","date_gmt":"2025-05-20T11:13:32","guid":{"rendered":"https:\/\/www.mailxaminer.com\/blog\/?p=73"},"modified":"2025-05-21T17:37:10","modified_gmt":"2025-05-21T12:07:10","slug":"icewarp-email-server-forensic-analysis","status":"publish","type":"post","link":"https:\/\/www.mailxaminer.com\/blog\/icewarp-email-server-forensic-analysis\/","title":{"rendered":"IceWarp Email Server \u2013 Forensic Analysis"},"content":{"rendered":"<p>In 2002, during the investigation of a Cyber Crime case, investigators came across a new type of email file format that was divulged as <strong>IMAP<\/strong>. After a deep analysis of the file, technocrats came up with a conclusion that the corresponding file extension was created by <strong>IceWarp Email Server<\/strong>. This gave rise to a new challenge, i.e. <strong>IceWarp Email Server Forensics<\/strong>.<\/p>\n<p>The IceWarp Mail Server is a commercial mail and groupware server developed by <strong>IceWarp Ltd<\/strong>. This mail server is compatible with both; <strong>Windows<\/strong> and <strong>Linux<\/strong> environments respectively. It is a <strong>communication and collaboration software<\/strong> that offers not only secure and reliable solution for email, but also for instant messaging, groupware functionality, a <strong>VoIP<\/strong> server, and a web interface for administrators and users.<\/p>\n<h2>An Introduction of IceWarp Mail Server<\/h2>\n<p>IceWarp, Inc. is a software company located in Springfield, provides powerful <strong>SMTP\/IMAP\/POP3<\/strong> email access to users. The services are provided through an intuitive <strong>HTML5 WebClient<\/strong> for desktop, mobile, and tablet interfaces. The manufacturers of \u00a0the IceWarp claim that more than 50,000 servers have been installed, serving more than 50 million users. The server offers most of the familiar features of Exchange Server and Lotus Notes. All the services provided by IceWarp are encrypted with <strong>TLS<\/strong> and <strong>SSL<\/strong> (Transport Layer Security &amp; Secure Sockets Layer). The IceWarp mail server can run on both Windows as well as Linux and is integrated with Kaspersky anti-virus.<\/p>\n<p><strong>NOTE<\/strong>: &#8211;<\/p>\n<p>By using the <strong>SSL and TLS<\/strong> security protocols, a company with multiple offices can create a secure email pipeline with IceWarp Mail Servers at both ends of the connection providing secure clients for employees. The\u00a0 IceWarp Mail Server is set up to use TLS as its primary encryption method when communicating with other TLS enabled mail servers and Encrypted email messages are also safe from hackers. <strong>If TLS is unavailable, IceWarp Mail Server will automatically use SSL.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>The default mail location:<\/strong><em> C:\/Program Files(x86)\/Mail\/enable.com<\/em><\/p>\n<p><strong>Email File Format:<\/strong><em> .imap<\/em><\/p>\n<p><strong>Step 1: &#8211;<\/strong> To evaluate the software, download IceWarp server full setup package from <strong>http:\/\/www.icewarp.com\/downloads\/<\/strong>. You will receive a fully working 30 days of trial period package, for up to 200 users.<\/p>\n<p>&nbsp;<\/p>\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5561 size-full\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2014\/12\/admin-login.png\" alt=\"IceWarp-Web-Admin\" width=\"630\" height=\"415\" \/><\/figure>\n<p>&nbsp;<\/p>\n<p><strong>Step 2: &#8211;<\/strong> The Administrative console is the place where all IceWarp server\u2019s functionalities can be administered.<\/p>\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5561 size-full\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2014\/12\/iceWarp-server-admin-console.png\" alt=\"admin-console\" width=\"630\" height=\"415\" \/><\/figure>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Step 3: &#8211;<\/strong> Now in next pop-up window, select an existing user from Domains &amp; Accounts or click on New User from the Console Menu to create a new user.<\/p>\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5561 size-full\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2014\/12\/create-new-user.png\" alt=\"new-user-account\" width=\"630\" height=\"415\" \/><\/figure>\n<p>&nbsp;<\/p>\n<p><strong>Step 4: &#8211;<\/strong> By default, IceWarp mail server generates a password for the user that can later be changed as per the requirement.<\/p>\n<p>&nbsp;<\/p>\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5561 size-full\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2014\/12\/generate-new-password.png\" alt=\"set-password\" width=\"630\" height=\"415\" \/><\/figure>\n<p>&nbsp;<\/p>\n<p><strong>Step 5: &#8211;<\/strong> Now, a browser window representing the new user account created on IceWarp Mail Server, will open.<\/p>\n<p>&nbsp;<\/p>\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5561\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2014\/12\/inbox.png\" alt=\"icewarp-inbox\" width=\"350\" height=\"186\" \/><\/figure>\n<p>&nbsp;<\/p>\n<p><strong>Step 6: &#8211;<\/strong> You can now easily sending and receiving of emails, add new contacts, schedule calendar items, create tasks, and so on.<\/p>\n<p>&nbsp;<\/p>\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5561 size-full\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2014\/12\/compose.png\" alt=\"compose-emails\" width=\"630\" height=\"415\" \/><\/figure>\n<p>&nbsp;<\/p>\n<p><strong>Step 7: &#8211;<\/strong> A pop-up window will appear showing the Delivery Report, after the recipient receives the sent mail.<\/p>\n<p>The location of this feature in IceWarp Mail Server \u2013 Message Composer Window \u2013 Options \u2013 Show Delivery Report.<\/p>\n<p>&nbsp;<\/p>\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5561 size-full\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2014\/12\/delivery-report.png\" alt=\"delivery-report-emails\" width=\"630\" height=\"415\" \/><\/figure>\n<p><strong>Step 8: &#8211;<\/strong> The IceWarp mail server saves all emails of its users in Inbox folder and all users have an inbox of their own. The file extension of all the emails is <strong>.imap<\/strong>. In investigation process, applications like; MailXaminer can be included for being very well equipped with the <a href=\"https:\/\/www.mailxaminer.com\/product\/\">email analysis<\/a> techniques. <a title=\"Search within Emails\" href=\"https:\/\/www.mailxaminer.com\/search-emails\/\" target=\"_blank\" rel=\"noopener\">Evidences available in .imap file can easily be searched\u00a0by\u00a0using the tool<\/a>, as it is loaded with various search features based on sophisticated algorithms.<\/p>\n<p>The default mail location: <strong><em>C\/Program File\/IceWarp\/Mail\/Enable.Com\/User Name\/Inbox.<\/em><\/strong><\/p>\n<p>&nbsp;<\/p>\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5561 size-full\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2014\/12\/imap-files.png\" alt=\"imap\" width=\"630\" height=\"415\" \/><\/figure>\n<p>&nbsp;<\/p>\n<p><strong>Conclusion<\/strong>: IceWarp mail server complete with GroupWare, Calendaring, and Document Management, is accessible through an intuitive Web Client. It comes customized with add-ons, spam and anti-virus protection, instant messaging along with video calls, and much more. The IceWarp mail server is a serious competitor for Exchange server, Lotus Notes, and other email servers and clients. In addition to that, its powerful WebClient UC interface stands out as an impressive feature which can replace several desktop applications, letting you have a very comprehensive unified solution for communication.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In 2002, during the investigation of a Cyber Crime case, investigators came across a new type of email file format <a href=\"https:\/\/www.mailxaminer.com\/blog\/icewarp-email-server-forensic-analysis\/\" >Read More&#8230;<\/a><\/p>\n","protected":false},"author":8,"featured_media":91,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"class_list":["post-73","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-forensics"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IceWarp Mail Server Forensics \u2013 Analyze Email Headers<\/title>\n<meta name=\"description\" content=\"Know IceWarp Email Server investigative and forensic aspect. Learn how to analyze email content along with headers of IceWarp mailboxes for ediscovery.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mailxaminer.com\/blog\/icewarp-email-server-forensic-analysis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IceWarp Mail Server Forensics \u2013 Analyze Email Headers\" \/>\n<meta property=\"og:description\" content=\"Know IceWarp Email Server investigative and forensic aspect. Learn how to analyze email content along with headers of IceWarp mailboxes for ediscovery.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mailxaminer.com\/blog\/icewarp-email-server-forensic-analysis\/\" \/>\n<meta property=\"og:site_name\" content=\"MailXaminer Official Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-20T11:13:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-21T12:07:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2014\/12\/icewarp.png\" \/>\n\t<meta property=\"og:image:width\" content=\"180\" \/>\n\t<meta property=\"og:image:height\" content=\"120\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mansi Joshi\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mansi Joshi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/icewarp-email-server-forensic-analysis\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/icewarp-email-server-forensic-analysis\\\/\"},\"author\":{\"name\":\"Mansi Joshi\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#\\\/schema\\\/person\\\/c9207395234d7178f353e02c45490a95\"},\"headline\":\"IceWarp Email Server \u2013 Forensic Analysis\",\"datePublished\":\"2025-05-20T11:13:32+00:00\",\"dateModified\":\"2025-05-21T12:07:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/icewarp-email-server-forensic-analysis\\\/\"},\"wordCount\":698,\"image\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/icewarp-email-server-forensic-analysis\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2014\\\/12\\\/icewarp.png\",\"articleSection\":[\"Forensics\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/icewarp-email-server-forensic-analysis\\\/\",\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/icewarp-email-server-forensic-analysis\\\/\",\"name\":\"IceWarp Mail Server Forensics \u2013 Analyze Email Headers\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/icewarp-email-server-forensic-analysis\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/icewarp-email-server-forensic-analysis\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2014\\\/12\\\/icewarp.png\",\"datePublished\":\"2025-05-20T11:13:32+00:00\",\"dateModified\":\"2025-05-21T12:07:10+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#\\\/schema\\\/person\\\/c9207395234d7178f353e02c45490a95\"},\"description\":\"Know IceWarp Email Server investigative and forensic aspect. Learn how to analyze email content along with headers of IceWarp mailboxes for ediscovery.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/icewarp-email-server-forensic-analysis\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/icewarp-email-server-forensic-analysis\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/icewarp-email-server-forensic-analysis\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2014\\\/12\\\/icewarp.png\",\"contentUrl\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2014\\\/12\\\/icewarp.png\",\"width\":180,\"height\":120},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/icewarp-email-server-forensic-analysis\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog Home\",\"item\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Forensics\",\"item\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/category\\\/forensics\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IceWarp Email Server \u2013 Forensic Analysis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/\",\"name\":\"MailXaminer Official Blog\",\"description\":\"Tech Talks by Forensics Experts\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#\\\/schema\\\/person\\\/c9207395234d7178f353e02c45490a95\",\"name\":\"Mansi Joshi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g\",\"caption\":\"Mansi Joshi\"},\"description\":\"Tech enthusiast &amp; cyber expert for the past 5 years. Love to solve complicated scenarios to counter cyber crimes with in-depth technical knowledge.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/mansi-joshi-54414524a\\\/\",\"https:\\\/\\\/www.mailxaminer.com\\\/assets\\\/author\\\/mansi-joshi.png\"],\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/author\\\/mansi-joshi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IceWarp Mail Server Forensics \u2013 Analyze Email Headers","description":"Know IceWarp Email Server investigative and forensic aspect. Learn how to analyze email content along with headers of IceWarp mailboxes for ediscovery.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mailxaminer.com\/blog\/icewarp-email-server-forensic-analysis\/","og_locale":"en_US","og_type":"article","og_title":"IceWarp Mail Server Forensics \u2013 Analyze Email Headers","og_description":"Know IceWarp Email Server investigative and forensic aspect. Learn how to analyze email content along with headers of IceWarp mailboxes for ediscovery.","og_url":"https:\/\/www.mailxaminer.com\/blog\/icewarp-email-server-forensic-analysis\/","og_site_name":"MailXaminer Official Blog","article_published_time":"2025-05-20T11:13:32+00:00","article_modified_time":"2025-05-21T12:07:10+00:00","og_image":[{"width":180,"height":120,"url":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2014\/12\/icewarp.png","type":"image\/png"}],"author":"Mansi Joshi","twitter_misc":{"Written by":"Mansi Joshi","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mailxaminer.com\/blog\/icewarp-email-server-forensic-analysis\/#article","isPartOf":{"@id":"https:\/\/www.mailxaminer.com\/blog\/icewarp-email-server-forensic-analysis\/"},"author":{"name":"Mansi Joshi","@id":"https:\/\/www.mailxaminer.com\/blog\/#\/schema\/person\/c9207395234d7178f353e02c45490a95"},"headline":"IceWarp Email Server \u2013 Forensic Analysis","datePublished":"2025-05-20T11:13:32+00:00","dateModified":"2025-05-21T12:07:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mailxaminer.com\/blog\/icewarp-email-server-forensic-analysis\/"},"wordCount":698,"image":{"@id":"https:\/\/www.mailxaminer.com\/blog\/icewarp-email-server-forensic-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2014\/12\/icewarp.png","articleSection":["Forensics"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mailxaminer.com\/blog\/icewarp-email-server-forensic-analysis\/","url":"https:\/\/www.mailxaminer.com\/blog\/icewarp-email-server-forensic-analysis\/","name":"IceWarp Mail Server Forensics \u2013 Analyze Email Headers","isPartOf":{"@id":"https:\/\/www.mailxaminer.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mailxaminer.com\/blog\/icewarp-email-server-forensic-analysis\/#primaryimage"},"image":{"@id":"https:\/\/www.mailxaminer.com\/blog\/icewarp-email-server-forensic-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2014\/12\/icewarp.png","datePublished":"2025-05-20T11:13:32+00:00","dateModified":"2025-05-21T12:07:10+00:00","author":{"@id":"https:\/\/www.mailxaminer.com\/blog\/#\/schema\/person\/c9207395234d7178f353e02c45490a95"},"description":"Know IceWarp Email Server investigative and forensic aspect. Learn how to analyze email content along with headers of IceWarp mailboxes for ediscovery.","breadcrumb":{"@id":"https:\/\/www.mailxaminer.com\/blog\/icewarp-email-server-forensic-analysis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mailxaminer.com\/blog\/icewarp-email-server-forensic-analysis\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mailxaminer.com\/blog\/icewarp-email-server-forensic-analysis\/#primaryimage","url":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2014\/12\/icewarp.png","contentUrl":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2014\/12\/icewarp.png","width":180,"height":120},{"@type":"BreadcrumbList","@id":"https:\/\/www.mailxaminer.com\/blog\/icewarp-email-server-forensic-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog Home","item":"https:\/\/www.mailxaminer.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Forensics","item":"https:\/\/www.mailxaminer.com\/blog\/category\/forensics\/"},{"@type":"ListItem","position":3,"name":"IceWarp Email Server \u2013 Forensic Analysis"}]},{"@type":"WebSite","@id":"https:\/\/www.mailxaminer.com\/blog\/#website","url":"https:\/\/www.mailxaminer.com\/blog\/","name":"MailXaminer Official Blog","description":"Tech Talks by Forensics Experts","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mailxaminer.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.mailxaminer.com\/blog\/#\/schema\/person\/c9207395234d7178f353e02c45490a95","name":"Mansi Joshi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g","caption":"Mansi Joshi"},"description":"Tech enthusiast &amp; cyber expert for the past 5 years. Love to solve complicated scenarios to counter cyber crimes with in-depth technical knowledge.","sameAs":["https:\/\/www.linkedin.com\/in\/mansi-joshi-54414524a\/","https:\/\/www.mailxaminer.com\/assets\/author\/mansi-joshi.png"],"url":"https:\/\/www.mailxaminer.com\/blog\/author\/mansi-joshi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts\/73","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/comments?post=73"}],"version-history":[{"count":4,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts\/73\/revisions"}],"predecessor-version":[{"id":6390,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts\/73\/revisions\/6390"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/media\/91"}],"wp:attachment":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/media?parent=73"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/categories?post=73"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}