background preloader

DNS Stuff: DNS tools, DNS hosting tests, WHOIS, traceroute, ping, and other network and domain name tools.

DNS Stuff: DNS tools, DNS hosting tests, WHOIS, traceroute, ping, and other network and domain name tools.

Browser Toolbars Online Privacy - Toolbar Removal Tool The risk with website monitoring is that it's possible for query strings to be monitored and retransmitted. Query strings are data strings following the '?' delimiter in urls often used by webform submissions and search engines. Query strings may contain sensitive information such as credit card numbers, passwords, names, addresses, hotel/flight reservation details and other personally identifiable information which an unethical browser extension could monitor and retransmit to its home server or a third party. Firewalls won't block browser extensions because they're integrated into the web browser.

John the Ripper password cracker John the Ripper is free and Open Source software, distributed primarily in source code form. If you would rather use a commercial product tailored for your specific operating system, please consider John the Ripper Pro, which is distributed primarily in the form of "native" packages for the target operating systems and in general is meant to be easier to install and use while delivering optimal performance. This version integrates lots of contributed patches adding GPU support (OpenCL and CUDA), support for a hundred of additional hash and cipher types (including popular ones such as NTLM, raw MD5, etc., and even things such as encrypted OpenSSH private keys, ZIP and RAR archives, PDF files, etc.), as well as some optimizations and features. Unfortunately, its overall quality is lower than the official version's.

Reverse IP Lookup - Find Other Web Sites Hosted on a Web Server Find other sites hosted on a web server by entering a domain or IP address above. Note: For those of you interested, as of May 2014, my database has grown to over 100 million domain names. I am now offering this domain list for purchase.

Network Monitoring Tools Les Cottrell, SLAC. Last Update: December 14, 2015 ESnet | ESCC | PinGER Internet monitoring | Tutorial This is a list of tools used for Network (both LAN and WAN) Monitoring tools and where to find out more about them. The audience is mainly network administrators. You are welcome to provide links to this web page. Please do not make a copy of this web page and place it at your web site since it will quickly be out of date. 15 Online Tools That You Will Come To Love As A Tech I have compiled a list of 15 free online tools that will help you greatly as a tech. I’m sure that there are other good ones that I have left out so please feel free to post the ones that you like as well. IPTools offers a wide variety of online networking tools.

Getting Started In order to make phone calls, WarVOX needs to be configured with one or more service providers. For a list of VoIP ISPs, please see the Service Providers section. To add a new provider to WarVOX, access the web interface, click the Providers link, and fill in the New Provider form. This form allows you to specify a nickname for the provider and indicate how many concurrent outbound calls can be made using this account. WarVOX can make use of multiple service providers and multiple outbound calls per provider when processing jobs. WarVOX requires an IAX service to make calls and most VoIP ISPs only support SIP. Dr.Web - innovation anti-virus security technologies. Comprehensive protection from Internet threats. Everyone knows that once you are on malicious or fraudulent websites, your PC can easily become infected, especially if your computer or mobile device does not have anti-virus software installed. But could this be avoided? Yes, and it’s as simple as this: if a website looks suspicious, you check it on this web page before clicking on the unknown link. Attention! New threat!

Big Oil Profits—and Tax Breaks—Remain High Despite Sequestration Cuts By Daniel J. Weiss, Guest Contributor and Jackie Weidman, Guest Contributor "Big Oil Profits—and Tax Breaks—Remain High Despite Sequestration Cuts" A customer pumps gas in California. While many middle-class programs are facing cuts, the big five oil companies continue to enjoy huge profits and tax breaks.

IP Calculator / IP Subnetting ipcalc takes an IP address and netmask and calculates the resulting broadcast, network, Cisco wildcard mask, and host range. By giving a second netmask, you can design subnets and supernets. It is also intended to be a teaching tool and presents the subnetting results as easy-to-understand binary values. Enter your netmask(s) in CIDR notation (/25) or dotted decimals ( Inverse netmasks are recognized. reaver-wps - Brute force attack against Wifi Protected Setup Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations. On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase. Intimidated by the command-line? Running Windows, OS X, or just don't want to run Linux, download, and compile the open source Reaver?

Open Ports Tool Remote Address Port Number Check a port's status by entering an address and port number above. The open port checker is a tool you can use to check your external IP address and detect open ports on your connection. This tool is useful for finding out if your port forwarding is setup correctly or if your server applications are being blocked by a firewall. This tool may also be used as a port scanner to scan your network for ports that are commonly forwarded.

Linux and Open source Understanding Nmap Commands: In depth Tutorial with examples Article by James Hawkins As we all know, Nmap (Network Mapper) is a stealth port scanner widely used by network security experts (including forensics & Pen-testing Experts). In this article we’ll see the different types of Nmap Scans, its techniques, understanding the purpose and goals of each scan , its advantages or disadvantages over other scanning tools, which could be better at evading firewalls & IDS (To a certain extent) and much more. In this first part, I have made my best to explain the basic scanning techniques, Host discovery options, port scanning options, techniques used in detecting Operating system & services running on the system. i also give Nmap as already installed on your system.

Related:  Internet Security ToolsWWW Trendsnetwork