Trust in a relationship, whether parent-child, between spouses or at work, is sometimes put to the test. When one party feels that trust has been abused, he might want to ease his doubts. New technology makes it possible to effectively hide e-mail accounts, but most people do not use or understand this technology.
Check the history on your Web browser for free e-mail sites like mail.yahoo.com, hotmail.com or gmail.com. Most of the time nontechnical users do not realise how much information is contained in the browser history. When searching the history, most free e-mail accounts will show up with the various user names that were used to connect to them. It is easy to differentiate between regular e-mail accounts and new suspicious ones.
Check her regular e-mail accounts. Most free e-mail accounts have the option to enter a trusted e-mail address to be used in case the user loses her password, or to warn her if that information changes on the account. Checking for such e-mail is easy and quick. Do a search on the account for words like "welcome," "yahoo.com" and "gmail.com" to check for communication from free e-mail providers.
Check for instant messaging logs. All major free e-mail accounts have free instant messaging such as yahoo messenger, msn and gmail talk. Each of those messaging services have logging options that save the live chats to the hard drive. If you have an instant messaging software installed, check to see if the logging option is turned on. Check in the software where the log is saved and go to that location. Installing messaging software usually creates one folder named after each account to store the logs.
Check for virtual machines on the computer. More technical people might be tempted to install a virtual machine that allows them to have a dedicated operating system to use as their own. If you have a virtual machine software such as Vmware, Virtualbox or Virtual PC, try to boot any operating systems present and do the same searches done on the main computer.
Install a key logger on the computer to monitor activity taking place during anonymous browsing. Modern browsers have an anonymous browsing mode that does not record anything done while turned on. It is easy, however, to install a key logger that will record everything the user types on the keyboard. It will allow you to discover any e-mail accounts accessed during anonymous sessions.
When looking at hidden e-mails, remember that while finding them is one thing, trying to gain access to them might be illegal. Installing a keylogger on a computer that is not yours can be illegal. Be sure to understand privacy and hacking laws before looking into such history and logs.