http://www.insecure.in/email_hacking_01.asp

I think this article may explain practically well........!