background preloader

Down for everyone or just me?

Down for everyone or just me?

http://downforeveryoneorjustme.com/#

Related:  Cyber Security Tools

Reverse IP Lookup - Find Other Web Sites Hosted on a Web Server Find other sites hosted on a web server by entering a domain or IP address above. Note: For those of you interested, as of May 2014, my database has grown to over 100 million domain names. I am now offering this domain list for purchase.

Website Monitoring Services population of the united states Support Wolfram|Alpha Wolfram Alpha Pro » x The 10 Tools of Online Oppressors - Reports SAN FRANCISCO In reporting news from the world’s most troubled nations, journalists have made a seismic shift this year in their reliance on the Internet and other digital tools. Blogging, video sharing, text messaging, and live-streaming from cellphones brought images of popular unrest from the central square of Cairo and the main boulevard of Tunis to the rest of the world. In Other Languages • Español • Português • Français • Русский • العربية • Multimedia • Audio Report: Offenders and TacticsIn Print • Download the pdfMore on This Issue • CPJ Internet Channel: Danny O'Brien's blog • Blogging in Egypt: Virtual network, virtual oppression • Burmese exile news site endures hacking, DDoS attacks

Android Development: Do You Know Your Options? Nowadays everyone wants to be an Android developer. Android applications can be built in many programming languages. Some users are familiar with web programming (HTML5/CSS/JS/Ruby.. ) some others are very much familiar with software programming (Java) or Game or Flash programming(AS3) etc.

Internet Traffic Archive The Internet Traffic Archive is a moderated repository to support widespread access to traces of Internet network traffic, sponsored by ACM SIGCOMM. The traces can be used to study network dynamics, usage characteristics, and growth patterns, as well as providing the grist for trace-driven simulations. The archive is also open to programs for reducing raw trace data to more manageable forms, for generating synthetic traces, and for analyzing traces. Traces contributed to the archive have no restrictions as to what use may be made of them (except for traffic analysis as noted below). Traces may however have restrictions on redistribution.

Rune Converter: English Letters to Germanic Runes Converter The Rune Converter transforms Roman alphabet, as used in modern English, into five systems of Germanic runic writing: Elder Futhark, Anglo-Saxon runes, Long Branch Younger Futhark, Short Twig Younger Futhark and staveless or Hålsinge runes. Note that it does not translate the words themselves into Old Norse or any other language, it only converts letters into runes. Also note that the present converter works with modern English only.

A Zero-Day Virus Attack Earlier this month a part of our University was hit with a zero-day virus attack. I had not heard of the phrase zero-day before now and suspect most people only learn about the concept when one occurs at their place of work. Zero-day refers to a class of computer threats that exposes undisclosed or unpatched application vulnerabilities.

Amazon price tracker, Amazon price history charts, price watches, and price drop alerts. Sandboxie - Sandbox software for application isolation and secure Web browsing isoHunt is the BitTorrent & P2P search engine Stolen Camera Finder - find your photos, find your camera iFixit: The free repair manual Join the fight against phishing

Related: