Reverse IP Lookup - Find Other Web Sites Hosted on a Web Server Find other sites hosted on a web server by entering a domain or IP address above. Note: For those of you interested, as of May 2014, my database has grown to over 100 million domain names. I am now offering this domain list for purchase. A reverse IP domain check takes a domain name or IP address pointing to a web server and searches for other sites known to be hosted on that same web server. Data is gathered from search engine results, which are not guaranteed to be complete. IP-Address.org provides interesting visual reverse IP lookup tool. Background All web sites are hosted on web servers, which are computers running specialized software that distribute web content as requested. As of 2003, more than 87% of all active domains names were found to share their IP addresses (i.e. their web servers) with one or more additional domains. While IP sharing is typically transparent to ordinary users, it may cause complications for both search engine optimization and web site filtering. Solution
InternetSupervision | Website Monitoring Services Sandboxie - Sandbox software for application isolation and secure Web browsing Stolen Camera Finder - find your photos, find your camera The 10 Tools of Online Oppressors - Reports SAN FRANCISCO In reporting news from the world’s most troubled nations, journalists have made a seismic shift this year in their reliance on the Internet and other digital tools. Blogging, video sharing, text messaging, and live-streaming from cellphones brought images of popular unrest from the central square of Cairo and the main boulevard of Tunis to the rest of the world. In Other Languages • Español • Português • Français • Русский • العربية • Multimedia • Audio Report: Offenders and TacticsIn Print • Download the pdfMore on This Issue • CPJ Internet Channel: Danny O'Brien's blog • Blogging in Egypt: Virtual network, virtual oppression • Burmese exile news site endures hacking, DDoS attacks Yet the technology used to report the news has been matched in many ways by the tools used to suppress information. In two nations we cite, Egypt and Tunisia, the regimes have changed, but their successors have not categorically broken with past repressive practices. Key country: Iran
Internet Traffic Archive | acm sigcomm The Internet Traffic Archive is a moderated repository to support widespread access to traces of Internet network traffic, sponsored by ACM SIGCOMM. The traces can be used to study network dynamics, usage characteristics, and growth patterns, as well as providing the grist for trace-driven simulations. The archive is also open to programs for reducing raw trace data to more manageable forms, for generating synthetic traces, and for analyzing traces. Traces contributed to the archive have no restrictions as to what use may be made of them (except for traffic analysis as noted below). Traces may however have restrictions on redistribution. Software contributed to the archive is in general copyrighted. Traces contributed to the archive often will have been filtered to some degree to preserve the privacy of the network users whose traffic was traced, and to address network security concerns. The actual ITA data and software archives are here.
PhishTank | Join the fight against phishing A Zero-Day Virus Attack Earlier this month a part of our University was hit with a zero-day virus attack. I had not heard of the phrase zero-day before now and suspect most people only learn about the concept when one occurs at their place of work. Zero-day refers to a class of computer threats that exposes undisclosed or unpatched application vulnerabilities. A Zeroday Emergency Response Team (ZERT) is a group of software engineers who works to release non-vendor patches for Zero-day exploits. When the smoke cleared, over 1900 desktops and 10 servers were infected with the mass mailing virus referred to as W32/Nuwar or W32/Mixor. EnCase 101 CYBER NEWS DATA BREACHES