letzte Aktualisierung der Daten: 2011/10/14, 16: 36
Webseite Ladezeit
bei der Prüfung: 0.86 s
Kabel-Anschluss (Durchschnitt): 1.03 s
DSL-Anschluss (Durchschnitt): 1.2 s
Modem (Durchschnitt): 10.31 s
HTTP-Header
HTTP/1.1 301 Moved Permanently
Date: Fri, 14 Oct 2011 23:36:36 GMT
Server: Apache
Location: http://www.hackerco.de/
Vary: Accept-Encoding
Content-Length: 231
Connection: close
Content-Type: text/html; charset=iso-8859-1
HTTP/1.1 200 OK
Server: Apache
X-PhApp: oak-tp-web028
X-Webserver: oak-tp-web028
Vary: cookie
Keep-Alive: timeout=300, max=100
Content-Type: text/html; charset=utf-8
Content-Length: 67724
Date: Fri, 14 Oct 2011 23:36:36 GMT
X-Varnish: 854074321 854072046
Age: 2
Via: 1.1 varnish
Connection: close
Informationen über DNS-Server
hackerco.de | A | 208.113.133.6 | IN | 14400 | |
hackerco.de | SOA | ns1.dreamhost.com | hostmaster.dreamhost.com | 2011101512 | 14547 1800 1814400 14400 IN 14400 |
hackerco.de | MX | 30 | ASPMX3.GOOGLEMAIL.com | IN | 14400 |
hackerco.de | MX | 30 | ASPMX4.GOOGLEMAIL.com | IN | 14400 |
hackerco.de | MX | 30 | ASPMX5.GOOGLEMAIL.com | IN | 14400 |
hackerco.de | MX | 10 | ASPMX.L.GOOGLE.com | IN | 14400 |
hackerco.de | MX | 20 | ALT1.ASPMX.L.GOOGLE.com | IN | 14400 |
hackerco.de | MX | 20 | ALT2.ASPMX.L.GOOGLE.com | IN | 14400 |
hackerco.de | MX | 30 | ASPMX2.GOOGLEMAIL.com | IN | 14400 |
hackerco.de | NS | ns1.dreamhost.com | IN | 14400 | |
hackerco.de | NS | ns3.dreamhost.com | IN | 14400 | |
hackerco.de | NS | ns2.dreamhost.com | IN | 14400 |
Empfangen von dem ersten DNS-Server
Request an den Server "hackerco.de"
Du hast die folgenden DNS-Server:
DNS Name: ns1.dreamhost.com
DNS-Server-Adresse: 66.33.206.206#53
DNS-Server-Aliase:
Header opcode: ANFRAGE, status: NOERROR, id: 61376
Fahne: qr aa rd ANFRAGE: 1, Antwort: 12, AUTHORITY: 0, zusätzliche: 3
Abschnitt Abfrage:
hackerco.de. IN ANY
Antwort Bereich:
hackerco.de. 14400 IN MX 20 ALT2.ASPMX.L.GOOGLE.COM.
hackerco.de. 14400 IN MX 30 ASPMX2.GOOGLEMAIL.COM.
hackerco.de. 14400 IN MX 20 ALT1.ASPMX.L.GOOGLE.COM.
hackerco.de. 14400 IN MX 30 ASPMX5.GOOGLEMAIL.COM.
hackerco.de. 14400 IN NS ns1.dreamhost.COM.
hackerco.de. 14400 IN MX 10 ASPMX.L.GOOGLE.COM.
hackerco.de. 14400 IN NS ns3.dreamhost.COM.
hackerco.de. 14400 IN MX 30 ASPMX4.GOOGLEMAIL.COM.
hackerco.de. 14400 IN NS ns2.dreamhost.COM.
hackerco.de. 14400 IN A 208.113.133.6
hackerco.de. 14400 IN SOA ns1.dreamhost.COM. hostmaster.dreamhost.COM. 2011101512 14547 1800 1814400 14400
hackerco.de. 14400 IN MX 30 ASPMX3.GOOGLEMAIL.COM.
Sektion Hinweise:
ns1.dreamhost.COM. 14400 IN A 66.33.206.206
ns2.dreamhost.COM. 14400 IN A 208.96.10.221
ns3.dreamhost.COM. 14400 IN A 66.33.216.216
Angenommen 383 Bytes ab Adresse 66.33.206.206#53 in der Zeit 91 ms
Empfangen von dem zweiten DNS-Server
Request an den Server "hackerco.de"
Du hast die folgenden DNS-Server:
DNS Name: ns3.dreamhost.com
DNS-Server-Adresse: 66.33.216.216#53
DNS-Server-Aliase:
Header opcode: ANFRAGE, status: NOERROR, id: 36418
Fahne: qr aa rd ANFRAGE: 1, Antwort: 12, AUTHORITY: 0, zusätzliche: 3
Abschnitt Abfrage:
hackerco.de. IN ANY
Antwort Bereich:
hackerco.de. 14400 IN MX 30 ASPMX2.GOOGLEMAIL.COM.
hackerco.de. 14400 IN MX 30 ASPMX4.GOOGLEMAIL.COM.
hackerco.de. 14400 IN MX 30 ASPMX5.GOOGLEMAIL.COM.
hackerco.de. 14400 IN MX 20 ALT1.ASPMX.L.GOOGLE.COM.
hackerco.de. 14400 IN MX 10 ASPMX.L.GOOGLE.COM.
hackerco.de. 14400 IN NS ns2.dreamhost.COM.
hackerco.de. 14400 IN SOA ns1.dreamhost.COM. hostmaster.dreamhost.COM. 2011101512 14547 1800 1814400 14400
hackerco.de. 14400 IN MX 30 ASPMX3.GOOGLEMAIL.COM.
hackerco.de. 14400 IN MX 20 ALT2.ASPMX.L.GOOGLE.COM.
hackerco.de. 14400 IN NS ns3.dreamhost.COM.
hackerco.de. 14400 IN A 208.113.133.6
hackerco.de. 14400 IN NS ns1.dreamhost.COM.
Sektion Hinweise:
ns1.dreamhost.COM. 14400 IN A 66.33.206.206
ns2.dreamhost.COM. 14400 IN A 208.96.10.221
ns3.dreamhost.COM. 14400 IN A 66.33.216.216
Angenommen 383 Bytes ab Adresse 66.33.216.216#53 in der Zeit 76 ms
Subdomänen (die ersten 50)
Typos (falsch geschrieben)
gackerco.de backerco.de nackerco.de jackerco.de uackerco.de yackerco.de hzckerco.de hsckerco.de hwckerco.de hqckerco.de haxkerco.de havkerco.de hafkerco.de hadkerco.de hacjerco.de hacmerco.de haclerco.de hacoerco.de hacierco.de hackwrco.de hacksrco.de hackdrco.de | hackrrco.de hack4rco.de hack3rco.de hackeeco.de hackedco.de hackefco.de hacketco.de hacke5co.de hacke4co.de hackerxo.de hackervo.de hackerfo.de hackerdo.de hackerci.de hackerck.de hackercl.de hackercp.de hackerc0.de hackerc9.de ackerco.de hckerco.de hakerco.de | hacerco.de hackrco.de hackeco.de hackero.de hackerc.de ahckerco.de hcakerco.de hakcerco.de hacekrco.de hackreco.de hackecro.de hackeroc.de hhackerco.de haackerco.de hacckerco.de hackkerco.de hackeerco.de hackerrco.de hackercco.de hackercoo.de |
Lokalisierung
IP: 208.113.133.6
Kontinent: NA, Land: United States (USA), Stadt: Brea
Website-Wert
Rang in der Traffic-Statistiken:
Es gibt nicht genügend Daten, um Website-Wert zu schätzen.
Grundlegende Informationen
Website zu bauen mit Hilfe von CSS
Code Gewicht: 66.14 KB
Text pro all-Code ratio: 26 %
Titel: HackerCode
Beschreibung: Information security news and ideas.
Stichworte: security, information assurance, hacker, hack, code, secure development, code security, network security, web security, software, security, software security, don ankney, ankney, donald j. ankney
Codierung: utf-8
Sprache: de
Website-Code-Analyse
ein Wort Phrasen wiederholt mindestens dreimal
Phrase | Menge |
---|---|
on | 11 |
2008 | 6 |
the | 6 |
redirects | 4 |
Open | 3 |
Ankney | 3 |
Don | 3 |
web | 3 |
2010 | 3 |
with | 3 |
Zwei-Wort-Phrasen wiederholt mindestens dreimal
Phrase | Menge |
---|---|
Ankney on | 3 |
Don Ankney | 3 |
Drei-Wort-Phrasen wiederholt mindestens dreimal
Phrase | Menge |
---|---|
Don Ankney on | 3 |
B-Tags
U-Tags
I-Tags
Bilder
Dateiname | Alternativ-Text |
---|---|
6a0120a7f55fc1970b0120a94c4459970b-150wi | My Photo |
lg-share-en.gif | Bookmark and Share |
stats?blog_id=83447402755102476&user_id=&page= | |
p-fcYWUmj5YbYKM.gif?tags=typepad.extended | Quantcast |
b?c1=2&c2=6035669&c3=&c4=http%3A%2F%2Fwww.hackerco.de%2Fhackercode%2F&c5=&c6=&c15=&cv=1.3&cj=1 |
Header
H1
HackerCode
H2
Search
Archives
Categories
Recent Comments
11/18/2010
01/28/2010
01/22/2010
01/21/2010
06/16/2009
06/07/2009
05/29/2009
05/28/2009
05/23/2009
05/21/2009
H3
Search
Archives
Categories
Recent Comments
11/18/2010
01/28/2010
01/22/2010
01/21/2010
06/16/2009
06/07/2009
05/29/2009
05/28/2009
05/23/2009
05/21/2009
H4
H5
H6
interne Links
Adresse | Anchor-Text |
---|---|
http://www.hackerco.de/hackercode/ | HackerCode |
http://www.hackerco.de/hackercode/ | Home |
http://www.hackerco.de/hackercode/archives.html | Archives |
http://www.hackerco.de/about.html | About |
http://www.hackerco.de/hackercode/atom.xml | Subscribe |
http://www.hackerco.de/about.html | About |
http://www.hackerco.de/hackercode/archives.html | Archives |
http://www.hackerco.de/hackercode/2010/11/index.html | November 2010 |
http://www.hackerco.de/hackercode/2010/01/index.html | January 2010 |
http://www.hackerco.de/hackercode/2009/06/index.html | June 2009 |
http://www.hackerco.de/hackercode/2009/05/index.html | May 2009 |
http://www.hackerco.de/hackercode/2008/12/index.html | December 2008 |
http://www.hackerco.de/hackercode/2008/10/index.html | October 2008 |
http://www.hackerco.de/hackercode/2008/09/index.html | September 2008 |
http://www.hackerco.de/hackercode/2008/08/index.html | August 2008 |
http://www.hackerco.de/hackercode/2008/07/index.html | July 2008 |
http://www.hackerco.de/hackercode/2008/06/index.html | June 2008 |
http://www.hackerco.de/hackercode/archives.html | Categories |
http://www.hackerco.de/hackercode/culture/ | Culture |
http://www.hackerco.de/hackercode/design-patterns/ | Design Patterns |
http://www.hackerco.de/hackercode/identity/ | Identity |
http://www.hackerco.de/hackercode/news/ | News |
http://www.hackerco.de/hackercode/privacy/ | Privacy |
http://www.hackerco.de/hackercode/security/ | Security |
http://www.hackerco.de/hackercode/software/ | Software |
http://www.hackerco.de/hackercode/systems/ | Systems |
http://www.hackerco.de/hackercode/trust/ | Trust |
http://www.hackerco.de/hackercode/2010/01/secure-web-form-authentication-using-stored-produres.html?cid=6a0120a7f55fc1970b0120a883ae2c970b#comment-6a0120a7f55fc1970b0120a883ae2c970b | Don Ankney |
http://www.hackerco.de/hackercode/2010/01/secure-web-form-authentication-using-stored-produres.html | Secure web form authentication using stored procedures |
http://www.hackerco.de/hackercode/2010/01/secure-web-form-authentication-using-stored-produres.html?cid=6a0120a7f55fc1970b0120a87b027a970b#comment-6a0120a7f55fc1970b0120a87b027a970b | webdevguy |
http://www.hackerco.de/hackercode/2010/01/secure-web-form-authentication-using-stored-produres.html | Secure web form authentication using stored procedures |
http://www.hackerco.de/hackercode/2008/12/threat-modeling-at-microsoft.html?cid=6a0120a7f55fc1970b012876f8b786970c#comment-6a0120a7f55fc1970b012876f8b786970c | Don Ankney |
http://www.hackerco.de/hackercode/2008/12/threat-modeling-at-microsoft.html | Threat Modeling at Microsoft |
http://www.hackerco.de/hackercode/2008/12/threat-modeling-at-microsoft.html?cid=6a0120a7f55fc1970b012876f8b785970c#comment-6a0120a7f55fc1970b012876f8b785970c | Mike Adewole |
http://www.hackerco.de/hackercode/2008/12/threat-modeling-at-microsoft.html | Threat Modeling at Microsoft |
http://www.hackerco.de/hackercode/2008/07/open-source-software-struggles-with-security.html?cid=6a0120a7f55fc1970b0120a7f59d88970b#comment-6a0120a7f55fc1970b0120a7f59d88970b | Don Ankney |
http://www.hackerco.de/hackercode/2008/07/open-source-software-struggles-with-security.html | Open source software struggles with security |
http://www.hackerco.de/hackercode/2008/07/open-source-software-struggles-with-security.html?cid=6a0120a7f55fc1970b0120a7f59d87970b#comment-6a0120a7f55fc1970b0120a7f59d87970b | Adam Tauno Williams |
http://www.hackerco.de/hackercode/2008/07/open-source-software-struggles-with-security.html | Open source software struggles with security |
http://www.hackerco.de/hackercode/2008/05/movable-type-vs-wordpress.html?cid=6a0120a7f55fc1970b012876f8b72f970c#comment-6a0120a7f55fc1970b012876f8b72f970c | Anil |
http://www.hackerco.de/hackercode/2008/05/movable-type-vs-wordpress.html | Movable Type vs. Wordpress |
http://www.hackerco.de/hackercode/2008/05/movable-type-vs-wordpress.html?cid=6a0120a7f55fc1970b012876f8b72e970c#comment-6a0120a7f55fc1970b012876f8b72e970c | Mike |
http://www.hackerco.de/hackercode/2008/05/movable-type-vs-wordpress.html | Movable Type vs. Wordpress |
http://www.hackerco.de/hackercode/2006/11/tunneling-afp-over-ssh.html?cid=6a0120a7f55fc1970b0120a7f59d2d970b#comment-6a0120a7f55fc1970b0120a7f59d2d970b | Colin |
http://www.hackerco.de/hackercode/2006/11/tunneling-afp-over-ssh.html | Tunneling AFP over SSH |
http://www.hackerco.de/hackercode/2007/10/openbsd-post-install-configurat.html?cid=6a0120a7f55fc1970b0120a7f59d79970b#comment-6a0120a7f55fc1970b0120a7f59d79970b | Nat |
http://www.hackerco.de/hackercode/2007/10/openbsd-post-install-configurat.html | OpenBSD Post-install Configuration |
http://www.hackerco.de/hackercode/atom.xml | Subscribe to this blog's feed |
http://www.hackerco.de/hackercode/2010/11/closing-open-redirects-efficiently.html | Closing open redirects efficiently |
http://www.hackerco.de/hackercode/design-patterns/ | Design Patterns |
http://www.hackerco.de/hackercode/security/ | Security |
http://www.hackerco.de/hackercode/software/ | Software |
http://www.hackerco.de/hackercode/systems/ | Systems |
http://www.hackerco.de/hackercode/2010/11/closing-open-redirects-efficiently.html | Permalink |
http://www.hackerco.de/hackercode/2010/11/closing-open-redirects-efficiently.html#comments | Comments (0) |
http://www.hackerco.de/hackercode/2010/11/closing-open-redirects-efficiently.html#trackback | TrackBack (0) |
http://www.hackerco.de/hackercode/2010/01/eff-illustrates-difficulty-of-anonymous-web-browsing.html | EFF illustrates difficulty of anonymous web browsing |
http://www.hackerco.de/hackercode/identity/ | Identity |
http://www.hackerco.de/hackercode/news/ | News |
http://www.hackerco.de/hackercode/privacy/ | Privacy |
http://www.hackerco.de/hackercode/security/ | Security |
http://www.hackerco.de/hackercode/software/ | Software |
http://www.hackerco.de/hackercode/trust/ | Trust |
http://www.hackerco.de/hackercode/2010/01/eff-illustrates-difficulty-of-anonymous-web-browsing.html | Permalink |
http://www.hackerco.de/hackercode/2010/01/eff-illustrates-difficulty-of-anonymous-web-browsing.html#comments | Comments (0) |
http://www.hackerco.de/hackercode/2010/01/eff-illustrates-difficulty-of-anonymous-web-browsing.html#trackback | TrackBack (0) |
http://www.hackerco.de/hackercode/2010/01/clinton-cybersecurity-speech-misses-the-mark-on-privacy.html | Clinton cybersecurity speech misses the mark on privacy |
http://www.hackerco.de/hackercode/identity/ | Identity |
http://www.hackerco.de/hackercode/news/ | News |
http://www.hackerco.de/hackercode/privacy/ | Privacy |
http://www.hackerco.de/hackercode/security/ | Security |
http://www.hackerco.de/hackercode/systems/ | Systems |
http://www.hackerco.de/hackercode/2010/01/clinton-cybersecurity-speech-misses-the-mark-on-privacy.html | Permalink |
http://www.hackerco.de/hackercode/2010/01/clinton-cybersecurity-speech-misses-the-mark-on-privacy.html#comments | Comments (0) |
http://www.hackerco.de/hackercode/2010/01/clinton-cybersecurity-speech-misses-the-mark-on-privacy.html#trackback | TrackBack (0) |
http://www.hackerco.de/hackercode/2010/01/secure-web-form-authentication-using-stored-produres.html | Secure web form authentication using stored procedures |
http://www.hackerco.de/hackercode/2010/01/secure-web-form-authentication-using-stored-produres.html#more | Continue reading "Secure web form authentication using stored procedures" |
http://www.hackerco.de/hackercode/design-patterns/ | Design Patterns |
http://www.hackerco.de/hackercode/security/ | Security |
http://www.hackerco.de/hackercode/software/ | Software |
http://www.hackerco.de/hackercode/systems/ | Systems |
http://www.hackerco.de/hackercode/2010/01/secure-web-form-authentication-using-stored-produres.html | Permalink |
http://www.hackerco.de/hackercode/2010/01/secure-web-form-authentication-using-stored-produres.html#comments | Comments (2) |
http://www.hackerco.de/hackercode/2010/01/secure-web-form-authentication-using-stored-produres.html#trackback | TrackBack (0) |
http://www.hackerco.de/hackercode/2009/06/bar-camp-seattle-presentation-on-web-application-security.html | Bar Camp Seattle presentation on web application security |
http://www.hackerco.de/hackercode/security/ | Security |
http://www.hackerco.de/hackercode/software/ | Software |
http://www.hackerco.de/hackercode/2009/06/bar-camp-seattle-presentation-on-web-application-security.html | Permalink |
http://www.hackerco.de/hackercode/2009/06/bar-camp-seattle-presentation-on-web-application-security.html#comments | Comments (0) |
http://www.hackerco.de/hackercode/2009/06/bar-camp-seattle-presentation-on-web-application-security.html#trackback | TrackBack (0) |
http://www.hackerco.de/hackercode/2009/06/original-mac-pro-and-64-bit-bootcamp.html | Original Mac Pro and 64-bit BootCamp |
http://www.hackerco.de/hackercode/software/ | Software |
http://www.hackerco.de/hackercode/systems/ | Systems |
http://www.hackerco.de/hackercode/2009/06/original-mac-pro-and-64-bit-bootcamp.html | Permalink |
http://www.hackerco.de/hackercode/2009/06/original-mac-pro-and-64-bit-bootcamp.html#comments | Comments (0) |
http://www.hackerco.de/hackercode/2009/06/original-mac-pro-and-64-bit-bootcamp.html#trackback | TrackBack (0) |
http://www.hackerco.de/hackercode/2009/05/security-lessons-from-behavioral-economics.html | Security lessons from behavioral economics |
http://www.hackerco.de/hackercode/culture/ | Culture |
http://www.hackerco.de/hackercode/security/ | Security |
http://www.hackerco.de/hackercode/software/ | Software |
http://www.hackerco.de/hackercode/systems/ | Systems |
http://www.hackerco.de/hackercode/2009/05/security-lessons-from-behavioral-economics.html | Permalink |
http://www.hackerco.de/hackercode/2009/05/security-lessons-from-behavioral-economics.html#comments | Comments (0) |
http://www.hackerco.de/hackercode/2009/05/security-lessons-from-behavioral-economics.html#trackback | TrackBack (0) |
http://www.hackerco.de/hackercode/2009/05/layerone-presentation-video.html | LayerOne presentation video |
http://www.hackerco.de/hackercode/security/ | Security |
http://www.hackerco.de/hackercode/software/ | Software |
http://www.hackerco.de/hackercode/2009/05/layerone-presentation-video.html | Permalink |
http://www.hackerco.de/hackercode/2009/05/layerone-presentation-video.html#comments | Comments (0) |
http://www.hackerco.de/hackercode/2009/05/layerone-presentation-video.html#trackback | TrackBack (0) |
http://www.hackerco.de/hackercode/2009/05/slides-from-layerone-are-up.html | Slides from LayerOne are up |
http://svn.hackerco.de/xssspider/ | available via Subversion here |
http://www.hackerco.de/hackercode/news/ | News |
http://www.hackerco.de/hackercode/security/ | Security |
http://www.hackerco.de/hackercode/software/ | Software |
http://www.hackerco.de/hackercode/2009/05/slides-from-layerone-are-up.html | Permalink |
http://www.hackerco.de/hackercode/2009/05/slides-from-layerone-are-up.html#comments | Comments (0) |
http://www.hackerco.de/hackercode/2009/05/slides-from-layerone-are-up.html#trackback | TrackBack (0) |
http://www.hackerco.de/hackercode/2009/05/speaking-at-layerone-on-saturday.html | Speaking at LayerOne on Saturday |
http://www.hackerco.de/hackercode/security/ | Security |
http://www.hackerco.de/hackercode/software/ | Software |
http://www.hackerco.de/hackercode/2009/05/speaking-at-layerone-on-saturday.html | Permalink |
http://www.hackerco.de/hackercode/2009/05/speaking-at-layerone-on-saturday.html#comments | Comments (0) |
http://www.hackerco.de/hackercode/ | HackerCode |
externe Links
Adresse | Anchor-Text |
---|---|
http://www.blacklodgeresearch.org/ | Black Lodge Research |
http://www.addthis.com/bookmark.php?v=250&username=xa-4b6f745c17584c77 | Bookmark and Share |
http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project | OWASP Top Ten |
http://www.technorati.com/search/http://www.hackerco.de/hackercode/2010/11/closing-open-redirects-efficiently.html | Technorati Tags |
http://technorati.com/tag/open%2Bredirect | open redirect |
http://technorati.com/tag/OWASP | OWASP |
http://technorati.com/tag/php | php |
http://technorati.com/tag/redirect | redirect |
http://technorati.com/tag/web%2Bapplication%2Bsecurity | web application security |
http://panopticlick.eff.org/ | Panopticlick |
http://www.torproject.org/ | |
https://www.eff.org/deeplinks/2010/01/primer-information-theory-and-privacy | information |
http://panopticlick.eff.org | [from panopticlick.eff.org |
http://www.technorati.com/search/http://www.hackerco.de/hackercode/2010/01/eff-illustrates-difficulty-of-anonymous-web-browsing.html | Technorati Tags |
http://technorati.com/tag/anonymity | anonymity |
http://technorati.com/tag/browser | browser |
http://technorati.com/tag/cookies | cookies |
http://technorati.com/tag/EFF | EFF |
http://technorati.com/tag/panopticlick | panopticlick |
http://technorati.com/tag/privacy | privacy |
http://technorati.com/tag/security | security |
http://technorati.com/tag/web | web |
http://en.wikipedia.org/wiki/Network_neutrality | net neutrality |
http://www.state.gov/secretary/rm/2010/01/135519.htm | .[Full text of the speech here] |
http://www.technorati.com/search/http://www.hackerco.de/hackercode/2010/01/clinton-cybersecurity-speech-misses-the-mark-on-privacy.html | Technorati Tags |
http://technorati.com/tag/censorship | censorship |
http://technorati.com/tag/china | china |
http://technorati.com/tag/clinton | clinton |
http://technorati.com/tag/cybersecurity | cybersecurity |
http://technorati.com/tag/google | |
http://technorati.com/tag/government | government |
http://technorati.com/tag/identity | identity |
http://technorati.com/tag/infowar | infowar |
http://technorati.com/tag/security | security |
http://technorati.com/tag/speech | speech |
http://technorati.com/tag/state%2Bdepartment | state department |
https://openid.org/home | OpenID |
http://dev.mysql.com/doc/refman/5.1/en/miscellaneous-functions.html#function_uuid | UUIDs |
http://en.wikipedia.org/wiki/Rainbow_table | rainbow tables attacks |
http://www.technorati.com/search/http://www.hackerco.de/hackercode/2010/01/secure-web-form-authentication-using-stored-produres.html | Technorati Tags |
http://technorati.com/tag/authentication | authentication |
http://technorati.com/tag/code | code |
http://technorati.com/tag/mysql | mysql |
http://technorati.com/tag/php | php |
http://technorati.com/tag/sql%2Binjection | sql injection |
http://technorati.com/tag/stored%2Bprocedure | stored procedure |
http://technorati.com/tag/web%2Bapplication%2Bsecurity | web application security |
http://technorati.com/tag/web%2Bform | web form |
http://www.scribd.com/doc/16500846/Web-Application-Security-2009 | Web Application Security 2009 |
http://i.scribd.com/public/images/uploaded/38755783/3fAD8yeiDUv_thumbnail.jpeg | Web Application Security 2009 dankney These slides are for my standard "Introduction to Web Application Security" presentation. I cover some basic secure design principals and go through the OWASP Top 10 Web Vulnerabilities as well as some common strategies for mitigating them. Publish at Scribd |
http://www.scribd.com/browse | explore |
http://www.scribd.com/tag/security | security |
http://www.scribd.com/tag/session%20management | session management |
http://support.apple.com/kb/HT1846 | see here |
http://social.msdn.microsoft.com/forums/en-US/servervirtualization/thread/a8ae28ed-daf8-4e47-a356-84fb57cf9016/ | found a solution on MSDN |
http://www.microsoft.com/downloads/details.aspx?FamilyID=94BB6E34-D890-4932-81A5-5B50C657DE08&displaylang=en | Windows Automated Installation Kit |
http://layerone.info/?page_id=132 | already posted video of the talks |
http://www.youtube.com/watch?v=-c2xcb21X2Q | David Bryan's talk on GNURadio |
http://www.youtube.com/watch?v=WkHkryIoLD0 | Joe McCray's Advanced SQL Injection |
http://www.scribd.com/doc/15756215/Is-XSS-Solvable | are available here via Scribd |
http://layerone.info | LayerOne |
http://technorati.com/tag/Ankney | Ankney |
http://technorati.com/tag/author | author |
http://technorati.com/tag/browser | browser |
http://technorati.com/tag/code | code |
http://technorati.com/tag/Community | Community |
http://technorati.com/tag/conference | conference |
http://technorati.com/tag/design | design |
http://technorati.com/tag/Donald%20J.%20Ankney | Donald J. Ankney |
http://technorati.com/tag/php | php |
http://technorati.com/tag/Security | Security |
http://technorati.com/tag/Software | Software |
http://technorati.com/tag/web | web |
http://technorati.com/tag/xss | xss |
http://www.typepad.com/ | Powered by TypePad |
http://www.quantcast.com/p-fcYWUmj5YbYKM | Quantcast |