How to find hidden email accounts on a computer

Written by contributing writer
  • Share
  • Tweet
  • Share
  • Email

Trust in a relationship, whether parent-child, between spouses or at work, is sometimes put to the test. When one party feels that trust has been abused, he might want to ease his doubts. New technology makes it possible to effectively hide e-mail accounts, but most people do not use or understand this technology.

Skill level:

Other People Are Reading

Things you need

  • Keylogger (optional)

Show MoreHide


  1. 1

    Check the history on your Web browser for free e-mail sites like, or Most of the time nontechnical users do not realise how much information is contained in the browser history. When searching the history, most free e-mail accounts will show up with the various user names that were used to connect to them. It is easy to differentiate between regular e-mail accounts and new suspicious ones.

  2. 2

    Check her regular e-mail accounts. Most free e-mail accounts have the option to enter a trusted e-mail address to be used in case the user loses her password, or to warn her if that information changes on the account. Checking for such e-mail is easy and quick. Do a search on the account for words like "welcome," "" and "" to check for communication from free e-mail providers.

  3. 3

    Check for instant messaging logs. All major free e-mail accounts have free instant messaging such as yahoo messenger, msn and gmail talk. Each of those messaging services have logging options that save the live chats to the hard drive. If you have an instant messaging software installed, check to see if the logging option is turned on. Check in the software where the log is saved and go to that location. Installing messaging software usually creates one folder named after each account to store the logs.

  4. 4

    Check for virtual machines on the computer. More technical people might be tempted to install a virtual machine that allows them to have a dedicated operating system to use as their own. If you have a virtual machine software such as Vmware, Virtualbox or Virtual PC, try to boot any operating systems present and do the same searches done on the main computer.

  5. 5

    Install a key logger on the computer to monitor activity taking place during anonymous browsing. Modern browsers have an anonymous browsing mode that does not record anything done while turned on. It is easy, however, to install a key logger that will record everything the user types on the keyboard. It will allow you to discover any e-mail accounts accessed during anonymous sessions.

Tips and warnings

  • When looking at hidden e-mails, remember that while finding them is one thing, trying to gain access to them might be illegal.
  • Installing a keylogger on a computer that is not yours can be illegal. Be sure to understand privacy and hacking laws before looking into such history and logs.

Don't Miss

  • All types
  • Articles
  • Slideshows
  • Videos
  • Most relevant
  • Most popular
  • Most recent

No articles available

No slideshows available

No videos available

By using the site, you consent to the use of cookies. For more information, please see our Cookie policy.