background preloader

Join the fight against phishing

Join the fight against phishing
Related:  Cyber Security ToolsOutils de sécurité

Internet Traffic Archive | acm sigcomm The Internet Traffic Archive is a moderated repository to support widespread access to traces of Internet network traffic, sponsored by ACM SIGCOMM. The traces can be used to study network dynamics, usage characteristics, and growth patterns, as well as providing the grist for trace-driven simulations. The archive is also open to programs for reducing raw trace data to more manageable forms, for generating synthetic traces, and for analyzing traces. Traces contributed to the archive have no restrictions as to what use may be made of them (except for traffic analysis as noted below). Traces may however have restrictions on redistribution. Software contributed to the archive is in general copyrighted. Traces contributed to the archive often will have been filtered to some degree to preserve the privacy of the network users whose traffic was traced, and to address network security concerns. The actual ITA data and software archives are here.

SiteCheck - Free Website Malware Scanner Telepathwords: preventing weak passwords by reading your mind. Reverse IP Lookup - Find Other Web Sites Hosted on a Web Server Find other sites hosted on a web server by entering a domain or IP address above. Note: For those of you interested, as of May 2014, my database has grown to over 100 million domain names. I am now offering this domain list for purchase. A reverse IP domain check takes a domain name or IP address pointing to a web server and searches for other sites known to be hosted on that same web server. Data is gathered from search engine results, which are not guaranteed to be complete. provides interesting visual reverse IP lookup tool. Background All web sites are hosted on web servers, which are computers running specialized software that distribute web content as requested. As of 2003, more than 87% of all active domains names were found to share their IP addresses (i.e. their web servers) with one or more additional domains. While IP sharing is typically transparent to ordinary users, it may cause complications for both search engine optimization and web site filtering. Solution

Redleg's File Viewer If you have problems identifying the issue don't sit there and struggle with it for days/weeks. Go over to the Stopbadware Forum and ask for some assistance. Notes: 1. Google has 2 very different types of flagging of a "compromised" site -- A. If the site is "compromised" with malicious content access to the site will be blocked in your browser, you will get a malware ahead warning instead, and there will be a This site may harm your computer below your links in search results. B. In both cases Google will attempt to notify the site owner via Webmaster Tools and the message will indicate the site may have been compromised. It is important that you know the why (the for what) your site is being flagged for in order to select a referrer and user agent for the request that will trigger the malware/spam content. When a request is made for a page on your site the request provides your server with some additional information beyond which page is being requested. 2. 3.

Digital Attack Map : une carte interactive des attaques DDoS Un nouveau service utile vient d'apparaître sur le web. Fruit d'une collaboration entre Google Ideas et le fournisseur de solutions de sécurisation de réseaux Arbor Networks, cette carte interactive permet de visualiser en temps réel ce qui se passe sur Internet en matière d'attaques distribuées par déni de service, également appelées "attaques DDoS" : Cette carte globale donne une vision complète des attaques en cours, depuis ou vers les différents pays du monde. On constate qu'il y a une véritable "guerre électronique" opposant les États-Unis et la Chine : Source Digital Attack Map On peut zoomer sur la carte et voir le détail d'une attaque en particulier, par exemple ici une attaque qui a eu lieu le 21 octobre sur la France, durant une heure, de provenance inconnue : Digital Attack Map fournit aussi, en-dessous de la carte, un "hit parade" des pays les plus concernés par les attaques DDoS, qu'ils en soient "auteurs" ou "victimes". @PierreCol

InternetSupervision | Website Monitoring Services Malware removal guide Find out where you are on the CyberWar map / Узнай, где кипит кибервойна Sandboxie - Sandbox software for application isolation and secure Web browsing Request a malware review - Webmaster Tools Help File a reconsideration request instead if your site has been removed from the Google index, or no longer performs as well as it did, but has no security violations. If your site is flagged as containing malware or unwanted software, you can request a malware or unwanted software review. Prepare for your review You must first take action on your own site before requesting a review. Make sure your site is free from any infected code and content. See What is malware for more details. Request a review Once you've performed the steps above, you can request a review. Once you clean your site and request the review, Google systems will scan your website for malware or unwanted software. If you have cleaned your site and the warning is still in place after a few days, you might not have found and removed all the problematic content on your site.