last data update: 2011/10/18, 05:19

Website loading time

during the test: 3.05 s

cable connection (average): 3.15 s

DSL connection (average): 3.25 s

modem (average): 8.67 s

HTTP headers

Information about DNS servers

aafrin.comA110.4.45.116IN14400
aafrin.comSOAns101.mschosting.comabuse.mschosting.com200912310186400 7200 3600000 86400 IN 43200
aafrin.comMX0aafrin.comIN14400
aafrin.comNSns101.mschosting.comIN43200
aafrin.comNSns102.mschosting.comIN43200

Received from the first DNS server

Request to the server "aafrin.com"
You used the following DNS server:
DNS Name: ns101.mschosting.com
DNS Server Address: 110.4.45.4#53
DNS server aliases:

HEADER opcode: REQUEST, status: NOERROR, id: 706
flag: qr aa rd REQUEST: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 3

REQUEST SECTION:
aafrin.com. IN ANY

ANSWER SECTION:
aafrin.com. 14400 IN MX 0 aafrin.com.
aafrin.com. 86400 IN SOA ns101.mschosting.com. abuse.mschosting.com. 2009123101 86400 7200 3600000 86400
aafrin.com. 86400 IN NS ns101.mschosting.com.
aafrin.com. 86400 IN NS ns102.mschosting.com.
aafrin.com. 14400 IN A 110.4.45.116

SECTION NOTES:
aafrin.com. 14400 IN A 110.4.45.116
ns101.mschosting.com. 14400 IN A 110.4.45.4
ns102.mschosting.com. 14400 IN A 72.18.132.245

Received 201 bytes from address 110.4.45.4#53 in 268 ms

Received from the second DNS server

Request to the server "aafrin.com"
You used the following DNS server:
DNS Name: ns102.mschosting.com
DNS Server Address: 72.18.132.245#53
DNS server aliases:

HEADER opcode: REQUEST, status: NOERROR, id: 28035
flag: qr aa rd REQUEST: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 3

REQUEST SECTION:
aafrin.com. IN ANY

ANSWER SECTION:
aafrin.com. 14400 IN MX 0 aafrin.com.
aafrin.com. 86400 IN SOA ns101.mschosting.com. abuse.mschosting.com. 2009123101 86400 7200 3600000 86400
aafrin.com. 86400 IN NS ns102.mschosting.com.
aafrin.com. 86400 IN NS ns101.mschosting.com.
aafrin.com. 14400 IN A 110.4.45.116

SECTION NOTES:
aafrin.com. 14400 IN A 110.4.45.116
ns101.mschosting.com. 14400 IN A 110.4.45.4
ns102.mschosting.com. 14400 IN A 72.18.132.245

Received 201 bytes from address 72.18.132.245#53 in 64 ms

Subdomains (the first 50)

Typos (misspells)

zafrin.com
safrin.com
wafrin.com
qafrin.com
azfrin.com
asfrin.com
awfrin.com
aqfrin.com
aadrin.com
aacrin.com
aavrin.com
aagrin.com
aatrin.com
aarrin.com
aafein.com
aafdin.com
aaffin.com
aaftin.com
aaf5in.com
aaf4in.com
aafrun.com
aafrjn.com
aafrkn.com
aafron.com
aafr9n.com
aafr8n.com
aafrib.com
aafrim.com
aafrij.com
aafrih.com
afrin.com
afrin.com
aarin.com
aafin.com
aafrn.com
aafri.com
aafrin.com
afarin.com
aarfin.com
aafirn.com
aafrni.com
aaafrin.com
aaafrin.com
aaffrin.com
aafrrin.com
aafriin.com
aafrinn.com

Location

IP: 110.4.45.116

continent: AS, country: Malaysia (MYS), city:

Website value

rank in the traffic statistics:

There is not enough data to estimate website value.

Basic information

website build using CSS

code weight: 39.35 KB

text per all code ratio: 15 %

title: Aafrin.com

description:

keywords: forensic, computer forensic, digital forensic, mobile forensic, data recovery, cyber crime, digital investigation, , project management, what is project management, project management theory, project management definition

encoding: UTF-8

language: en-US

Website code analysis

one word phrases repeated minimum three times

PhraseQuantity
of21
the20
to13
on13
In10
and9
CASE8
20117
7
Posted7
Others6
in5
tools5
The5
be5
it4
forensic4
switching4
Switching3
this3
will3
article,3
into3
can3
Internet3
been3
by3
project3
use3
May,3
is3
are3

two word phrases repeated minimum three times

PhraseQuantity
Posted on7
2011 Others5
CASE tools4
Others In3
of the3

three word phrases repeated minimum three times

PhraseQuantity
2011 Others In3

B tags

U tags

I tags

images

file namealternative text
Aafrin.com
50 Twitter Profile Must Follow For Computer / Digital Forensic Enthusiast
Computer Aided Software Engineering Tool’s Classification
Understanding The Basics Of Project Management
The Evolution of Cyber Space & Personal Privacy.
Example : Circuit Switching VS Packet Switching
An In Depth Look Into Internet Forensics – The Defensive Weapon For Cyber Crime
Top 5 Reason Why CASE Tools Shouldn’t Be Used In Software Engineering

headers

H1

H2

50 Twitter Profile Must Follow For Computer / Digital Forensic Enthusiast

Computer Aided Software Engineering Tool’s Classification

Understanding The Basics Of Project Management

The Evolution of Cyber Space & Personal Privacy.

Example : Circuit Switching VS Packet Switching

An In Depth Look Into Internet Forensics – The Defensive Weapon For Cyber Crime

Top 5 Reason Why CASE Tools Shouldn’t Be Used In Software Engineering

H3

50 Twitter Profile Must Follow For Computer / Digital Forensic Enthusiast

Computer Aided Software Engineering Tool’s Classification

Understanding The Basics Of Project Management

The Evolution of Cyber Space & Personal Privacy.

Example : Circuit Switching VS Packet Switching

An In Depth Look Into Internet Forensics – The Defensive Weapon For Cyber Crime

Top 5 Reason Why CASE Tools Shouldn’t Be Used In Software Engineering

H4

H5

H6

internal links

addressanchor text
About Aafrin
Advertise Here
Join Us
Contact Us
Aafrin.com
Home
Freebies
General
Inspiration
Others
Photoshop
Security
Web Development
50 Twitter Profile Must Follow For Computer / Digital Forensic Enthusiast
50 Twitter Profile Must Follow For Computer / Digital Forensic Enthusiast
Inspiration
4
Computer Aided Software Engineering Tool’s Classification
Computer Aided Software Engineering Tool’s Classification
Others
0
Understanding The Basics Of Project Management
Understanding The Basics Of Project Management
Others
0
The Evolution of Cyber Space & Personal Privacy.
The Evolution of Cyber Space & Personal Privacy.
Others
0
Example : Circuit Switching VS Packet Switching
Example : Circuit Switching VS Packet Switching
Others
1
An In Depth Look Into Internet Forensics – The Defensive Weapon For Cyber Crime
An In Depth Look Into Internet Forensics – The Defensive Weapon For Cyber Crime
Security
0
Top 5 Reason Why CASE Tools Shouldn’t Be Used In Software Engineering
Top 5 Reason Why CASE Tools Shouldn’t Be Used In Software Engineering
Others
0
2
3
4
5
10
Last
Populars
Recents
Categories
Archives
5 Mins - Quick Setup Guide To Run CakePHP On Windows 7
12 Yii PHP Framework Powered Websites
Test Now: Is Your Web Site Or Web Application Vulnerable To SQL Injection Attacks?
Simple And Effective Method To By Pass CPALead Survey Ads
Transforming Megan Fox : Skin Retouching
Removing Watermark In Less Than 30 Seconds On Photoshop CS5
A Collection Of Ext JS Framework's Tutorials, Tools & Resources
12 Ext JS Web Application And GUI Showcase
20 Different Type Of Web Sites Built On With PRADO Framework
Virtual Keyboard Resources To Make Your Web Application Touch Screen Enabled
50 Twitter Profile Must Follow For Computer / Digital Forensic Enthusiast
Computer Aided Software Engineering Tool’s Classification
Understanding The Basics Of Project Management
The Evolution of Cyber Space & Personal Privacy.
Example : Circuit Switching VS Packet Switching
An In Depth Look Into Internet Forensics – The Defensive Weapon For Cyber Crime
Top 5 Reason Why CASE Tools Shouldn’t Be Used In Software Engineering
Fix : Windows Management Instrumentation Error During SQL Server 2008 Installation
A Small Security Guide To Stay Protected And Safe In Cyber Space
The Impact on Personal Privacy Through The Use Of Social Networking
Freebies
General
Inspiration
Others
Photoshop
Security
Web Development
September 2011
August 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
aafrin.com
Adsense
css
Facebook
Flash
Freebies
Inspiration
Photoshop
php
php framework
Security
Setup
Themes
tools
tutorial
Web Design
Wordpress
xHTML
Yii

external links

addressanchor text
Roy Tanck
Luke Morton
Flash Player