background preloader

Lookup IP address to Country, State, City, Netblock, Longitude and Latitude

Lookup IP address to Country, State, City, Netblock, Longitude and Latitude

Network-Tools | Traceroute, Ping, Domain Name Server (DNS) Lookup, WHOIS Reverse IP Lookup - Find Other Web Sites Hosted on a Web Server Find other sites hosted on a web server by entering a domain or IP address above. Note: For those of you interested, as of May 2014, my database has grown to over 100 million domain names. I am now offering this domain list for purchase. A reverse IP domain check takes a domain name or IP address pointing to a web server and searches for other sites known to be hosted on that same web server. Background All web sites are hosted on web servers, which are computers running specialized software that distribute web content as requested. As of 2003, more than 87% of all active domains names were found to share their IP addresses (i.e. their web servers) with one or more additional domains. While IP sharing is typically transparent to ordinary users, it may cause complications for both search engine optimization and web site filtering. Concerning SEO (search engine optimization) Conversely, search engines value links from web sites hosted on different IP addresses. Concerning web site filtering

Using SSH Tunnel with PuTTY to browse internet hiding your IP address Thursday, December 11th, 2008 If you have access to SSH on a remote server (dedicated server, vps or shell account), you can browse the internet over the IP address hiding your original IP address. This can be useful for many scenarios like - IP based authentication over dynamic IP: In many cases for security reasons we use restrict access only to some selected IP addresses. Technical limitations related to shared/dynamic IP: In many places (specially in Bangladesh) ISPs provide the clients only with dynamic or shared IP address. Being a cool geek: Or you can use it just to surprise your friends (who actaully checks for your ip =P) by showing your domain on you email and forum posts ;) Anyways… enough of possible “usage”. Now to get straight into the tutorial. What you need? Now, first run PuTTY. Then, in the left-hand menu, click on “SSH“. Now expand the “SSH” menu and select the “Tunnels” sub-menu. Congrats! From now on you can use this connection to login to your server. Done!

ngrep - network grep 1303.4814.pdf Can You See Me InternetSupervision | Website Monitoring Services 12 Free Products You Need to Protect Your Privacy Identity theft has impacted nearly 8.4 million US adults in 2007. It is also estimated that 750,000 laptops were stolen last year alone. Your data can be stolen in a number of ways, from phishing scams, trojan programs, spyware, stolen hardware, to unsecured internet traffic. Bug Me Not Bugmenot.com alleviates the need for pointless registrations to sites that only wish to collect your data. PeerGuardian 2 PeerGuardian 2 is Phoenix Labs’ premier IP blocker for Windows. McAfee SiteAdvisor McAfee SiteAdvisor warns you before you interact with a dangerous Web site. It also complements and enhances your existing security software by detecting threats which traditional security products often miss, including spyware attacks, online scams, and sites that spam you. File Shredder 2 File Shredder deletes the unwanted files on your computer past the point of recovery. ProxyWay anonymous surfing 2.6 TrueCrypt 4.3 Truecrypt is one of my favorite programs. SpyBot KeePass Password Safe Ccleaner Adaware free

tcpflow -- TCP Flow Recorder Note: I am no longer actively maintaining tcpflow. This page has the most recent version I released personally. Maintenance has been taken over by Simson Garfinkel, who distributes new versions at his site. Downloads and Documentation The most recent version of tcpflow is v0.21, released 7 August 2003. There is an HTMLized version of the tcpflow man page. tcpflow is free software, distributed under the GNU General Public License (GPL); see the file COPYING (in the distribution) for details. Sources and "Official" Builds Version 0.21 source tarball (HTTP, FTP) Version 0.21 Source RPM (HTTP, FTP) Version 0.21 Linux i386 binary RPM (HTTP, FTP) Previous versions (HTTP, FTP) CVS Repository Access (using CVS tools, or browsable on the web) Contributed Builds and Packages (off-site) What is tcpflow? tcpflow is a program that captures data transmitted as part of TCP connections (flows), and stores the data in a way that is convenient for protocol analysis or debugging. What use is it? Bugs

Easy steps for better Google Drive security In light of the recent iOS cloud breach, it's imperative to secure your Google Drive account. Jack Wallen offers up a few tips to help tighten down Drive. If you've followed the news lately, you know iCloud was hacked and a number of celebrity photos were leaked from accounts. The unfortunate reality is that there will always be someone (or groups) attempting to gain access to that which they should not. Pay close attention to this list of tips, as it could be the thing that prevents someone from hacking into your Google Drive account and gaining access to sensitive data. 1. I thought I'd lead off with the best tip possible. 2. There are plenty of apps available that work in conjunction with cloud accounts (like Google Drive) to encrypt your data transmissions. 3. This one should go without saying... but I'll say it anyway. 4. As you go about your existence with your Android device, you tend to hand off permissions to apps and services. 5. Only share with people you completely trust.

Related: