Sunday, March 18, 2012

Click Me

Kaspersky /
(http://www.securelist.com/en/descriptions/Email-Flooder.Win32.Stealm.a)


http://keyghost.com/


http://www.amecisco.com/


http://www.keylogger.org  


http://www.keylogger.org/monitoring-free-software-review/


http://www.keykatcher.com/


http://www.keycarbon.com/


http://www.omniquad.com


www.softpedia.com


http://www.cirt.net/passwords  


www.cirt.net/cgi-bin/passwd.pl


regnow.com 


http://hide-ip-soft.com/download.htm


http://password-viewer.softpedia.com/


http://www2.faronics.com


sourceforge.net


infobel.com


www.freality.com/find.htm


www.anywho.com


www.zabasearch.com


http://mesa.rrzn.uni-hannover.de/


portprotector.com


http://cookiecentral.com/


http://www.debryansk.ru/~kamkov/


Browser Cache Index viewer is a freeware tool usefull for reading the contents
of Url cache index.dat files  (they are files where  Windows Internet Explorer
store  information about your browsing activity,  such as cookies and internet
addresses).


BCIView lets you view URIs and last  access time  stored in index.dat files.
The program exports lists to the XML file.


http://openbsd.org/


https://mosaicsecurity.com/categories/74-endpoint-security-hostbased-intrusion-detection-system


- Every cell phone contains both a unique electronic serial number (ESN) & and mobile identification number (MIN).


www.securelogix.com (modem security)


http://www.totse2.com/


http://vomit.xtdnet.nl


http://www.citi.umich.edu/u/provos/systrace/ (systemtrace)


http://cvsweb.netbsd.org/bsdweb.cgi/src/bin/systrace/Attic/


www.tripod.lycos.com


http://angelfire.lycos.com


www.secureroot.com


http://www.secureroot.com/topsites/


www.startplaza.nu


http://www.snort.org


http://www.windowsecurity.com/pages/links.asp


http://www.securitywizardry.com/


www.tucows.com


www.serials.ws


Federal Agencies:
http://www.usa.gov/Agencies/Federal/All_Agencies/index.shtml 






Feeder - generator of IP addresses for scanning. Angry IP Scanner provides various kinds of feeders: IP Range, Random, and IP List File. You can select a feeder using the combo box next to the Start button.


Fetcher - gathers specific information about a host, e.g. ping time, hostname, open ports. Feeders usually represent columns in the scanning results list. You can select additional fetchers by choosing "Tools->Select fetchers" from the menu.
Main terminology (continued):


hosts. You can choose between them in the Preferences dialog.


ICMP echo - is the standard method used by the 'ping' program. This one requires administrator or root privileges on most platforms. Note that some firewall software disables sending of ICMP echo reply packets, making alive hosts appear like dead.


UDP - sends UDP packets (datagrams) to one of the host's ports and sees if there is any response (either positive or negative). This is non-standard, but works without special privileges.


TCP - tries to connect to port 80 (http) on the host. This may work better than UDP for some networks, but usually it is worse.


UDP and TCP pinging most often doesn't properly detect routers or other network equipment.


TTL (time to live) - this fetcher works only with ICMP pinging method. Its initial value is usually 64 or 128, and the difference represents the distance to the host in number of nodes it has travelled.


Alive host - is the host, responding to pinging. These are blue in the results list.


Dead host - is the host, not responding to pinging (red in the list). However, it may still have ports open (if firewall blocks pings). In order to scan these hosts fully, check "scan dead hosts" in the Tools->Preferences dialog.


Open port - a TCP port, responding to connection attempts. Hosts with open ports are green in the results list.


Filtered port - a TCP port, not responding that it is closed (no RST packet). These ports are usually specifically blocked by firewalls for some reason.




http://www.nwd-wc.usace.army.mil/TMT/


http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=site%3Aarmy.mil+intitle%3Aindex.of+apache





www.websecurify.com


www.portswigger.net


www.nmap.org


www.whitehatsec.com


www.vericode.com


www.fortify.com


www.phoenix.com


www.digitalriver.com


www.artima.com


www.xml.gov


www.codesynthesis.com


http://queue.acm.org/


http://www.interpol.int/


www.tek-tips.com


http://www.mysql.com/


www.entrust.net


http://colab.cim3.net/


www.eclipse.org


http://www.php.net/


www.fsf.org


http://www.internetnews.com/


www.onlamp.com


http://windows.php.net/snapshots/







DANIEL S. ABRAHAMIAN
CLICK ME
FEELMYFLAME

No comments:

Post a Comment