MENU
last data update: 2011/10/15, 14:47
Website loading time
during the test: 1.53 s
cable connection (average): 1.71 s
DSL connection (average): 1.89 s
modem (average): 11.32 s
HTTP headers
HTTP/1.1 301 Moved Permanently
Date: Sat, 15 Oct 2011 21:47:20 GMT
Server: Apache
Location: http://www.clerkendweller.com
Vary: Accept-Encoding
Content-Length: 237
Connection: close
Content-Type: text/html; charset=iso-8859-1
HTTP/1.1 200 OK
Date: Sat, 15 Oct 2011 21:47:21 GMT
Server: Apache
Content-Type: text/html;charset=utf-8
Vary: Accept-Encoding,User-Agent
Set-Cookie: USERID=2301133;expires=Mon, 07-Oct-2041 21:47:21 GMT;path=/
Set-Cookie: SERVERID=14108259;expires=Mon, 07-Oct-2041 21:47:21 GMT;path=/
X-Frame-Options: sameorigin
X-Content-Type-Options: nosniff
X-Content-Security-Policy: allow 'self'; frame-ancestors 'none'; report-uri http://www.clerkendweller.com/report-csp.php
Content-Length: 70201
Connection: close
Information about DNS servers
clerkendweller.com | MX | 10 | mail.watsonhall.com | IN | 3600 |
clerkendweller.com | A | 194.168.19.55 | IN | 3600 | |
clerkendweller.com | SOA | ns0.bocc.co.uk | domains.bocc.co.uk | 2010101601 | 10800 3600 604800 86400 IN 43200 |
clerkendweller.com | TXT | v=spf1 mx ip4:194.168.19.102 -all | Array | IN | 300 |
clerkendweller.com | NS | ns1.bocc.co.uk | IN | 43200 | |
clerkendweller.com | NS | ns2.bocc.co.uk | IN | 43200 | |
clerkendweller.com | NS | ns0.bocc.co.uk | IN | 43200 |
Received from the first DNS server
Request to the server "clerkendweller.com"
You used the following DNS server:
DNS Name: ns1.bocc.co.uk
DNS Server Address: 194.168.19.8#53
DNS server aliases:
HEADER opcode: REQUEST, status: NOERROR, id: 46365
flag: qr aa rd REQUEST: 1, ANSWER: 7, AUTHORITY: 0, ADDITIONAL: 4
REQUEST SECTION:
clerkendweller.com. IN ANY
ANSWER SECTION:
clerkendweller.com. 86400 IN SOA ns0.bocc.co.uk. domains.bocc.co.uk. 2010101601 10800 3600 604800 86400
clerkendweller.com. 86400 IN NS ns2.bocc.co.uk.
clerkendweller.com. 86400 IN NS ns1.bocc.co.uk.
clerkendweller.com. 86400 IN NS ns0.bocc.co.uk.
clerkendweller.com. 3600 IN A 194.168.19.55
clerkendweller.com. 3600 IN MX 10 mail.watsonhall.com.
clerkendweller.com. 300 IN TXT "v=spf1 mx ip4:194.168.19.102 -all"
SECTION NOTES:
ns0.bocc.co.uk. 3600 IN A 194.168.19.5
ns1.bocc.co.uk. 3600 IN A 194.168.19.8
ns2.bocc.co.uk. 3600 IN A 80.93.163.135
mail.watsonhall.com. 300 IN A 194.168.19.103
Received 302 bytes from address 194.168.19.8#53 in 87 ms
Received from the second DNS server
Request to the server "clerkendweller.com"
You used the following DNS server:
DNS Name: ns2.bocc.co.uk
DNS Server Address: 80.93.163.135#53
DNS server aliases:
HEADER opcode: REQUEST, status: NOERROR, id: 15037
flag: qr aa rd REQUEST: 1, ANSWER: 7, AUTHORITY: 0, ADDITIONAL: 4
REQUEST SECTION:
clerkendweller.com. IN ANY
ANSWER SECTION:
clerkendweller.com. 86400 IN SOA ns0.bocc.co.uk. domains.bocc.co.uk. 2010101601 10800 3600 604800 86400
clerkendweller.com. 86400 IN NS ns0.bocc.co.uk.
clerkendweller.com. 86400 IN NS ns2.bocc.co.uk.
clerkendweller.com. 86400 IN NS ns1.bocc.co.uk.
clerkendweller.com. 3600 IN A 194.168.19.55
clerkendweller.com. 3600 IN MX 10 mail.watsonhall.com.
clerkendweller.com. 300 IN TXT "v=spf1 mx ip4:194.168.19.102 -all"
SECTION NOTES:
ns0.bocc.co.uk. 3600 IN A 194.168.19.5
ns1.bocc.co.uk. 3600 IN A 194.168.19.8
ns2.bocc.co.uk. 3600 IN A 80.93.163.135
mail.watsonhall.com. 300 IN A 194.168.19.103
Received 302 bytes from address 80.93.163.135#53 in 84 ms
Subdomains (the first 50)
Typos (misspells)
xlerkendweller.com vlerkendweller.com flerkendweller.com dlerkendweller.com ckerkendweller.com cperkendweller.com coerkendweller.com clwrkendweller.com clsrkendweller.com cldrkendweller.com clrrkendweller.com cl4rkendweller.com cl3rkendweller.com cleekendweller.com cledkendweller.com clefkendweller.com cletkendweller.com cle5kendweller.com cle4kendweller.com clerjendweller.com clermendweller.com clerlendweller.com cleroendweller.com cleriendweller.com clerkwndweller.com clerksndweller.com clerkdndweller.com clerkrndweller.com clerk4ndweller.com clerk3ndweller.com clerkebdweller.com clerkemdweller.com clerkejdweller.com clerkehdweller.com clerkensweller.com clerkenxweller.com clerkencweller.com | clerkenfweller.com clerkenrweller.com clerkeneweller.com clerkendqeller.com clerkendaeller.com clerkendseller.com clerkendeeller.com clerkend3eller.com clerkend2eller.com clerkendwwller.com clerkendwsller.com clerkendwdller.com clerkendwrller.com clerkendw4ller.com clerkendw3ller.com clerkendwekler.com clerkendwepler.com clerkendweoler.com clerkendwelker.com clerkendwelper.com clerkendweloer.com clerkendwellwr.com clerkendwellsr.com clerkendwelldr.com clerkendwellrr.com clerkendwell4r.com clerkendwell3r.com clerkendwellee.com clerkendwelled.com clerkendwellef.com clerkendwellet.com clerkendwelle5.com clerkendwelle4.com lerkendweller.com cerkendweller.com clrkendweller.com clekendweller.com | clerendweller.com clerkndweller.com clerkedweller.com clerkenweller.com clerkendeller.com clerkendwller.com clerkendweler.com clerkendweler.com clerkendwellr.com clerkendwelle.com lcerkendweller.com celrkendweller.com clrekendweller.com clekrendweller.com clerekndweller.com clerknedweller.com clerkednweller.com clerkenwdeller.com clerkendewller.com clerkendwleler.com clerkendweller.com clerkendwelelr.com clerkendwellre.com cclerkendweller.com cllerkendweller.com cleerkendweller.com clerrkendweller.com clerkkendweller.com clerkeendweller.com clerkenndweller.com clerkenddweller.com clerkendwweller.com clerkendweeller.com clerkendwelller.com clerkendwelller.com clerkendwelleer.com clerkendwellerr.com |
Location
IP: 194.168.19.55
continent: EU, country: United Kingdom (GBR), city: Oxford
Website value
rank in the traffic statistics:
There is not enough data to estimate website value.
Basic information
website build using CSS
code weight: 68.56 KB
text per all code ratio: 52 %
title: Clerkendweller : Web Security, Usability and Design
description: A blog about security issues for web site designers, developers and owners.
keywords: web, website, application, security, usability, design, accessibility, threats, hackers
encoding: UTF-8
language: en
Website code analysis
one word phrases repeated minimum three times
Phrase | Quantity |
---|---|
the | 193 |
and | 193 |
to | 170 |
of | 92 |
for | 59 |
is | 55 |
on | 52 |
in | 47 |
be | 41 |
The | 34 |
are | 32 |
2011 | 32 |
with | 31 |
at | 31 |
He | 29 |
security | 27 |
that | 26 |
as | 23 |
described | 23 |
have | 22 |
about | 22 |
some | 22 |
by | 21 |
an | 20 |
OWASP | 20 |
how | 20 |
this | 19 |
can | 19 |
software | 18 |
from | 18 |
web | 16 |
application | 15 |
these | 15 |
data | 14 |
will | 14 |
was | 14 |
all | 14 |
also | 14 |
code | 13 |
AppSec | 13 |
need | 13 |
been | 12 |
September | 12 |
own | 12 |
use | 12 |
using | 11 |
not | 11 |
vulnerabilities | 11 |
hrs | 11 |
or | 11 |
issues | 11 |
but | 11 |
where | 11 |
October | 11 |
(0) | | 10 |
Permalink | | 10 |
Comments | 10 |
Send | | 10 |
on: | 10 |
presentation | 10 |
which | 10 |
you | 10 |
used | 10 |
there | 10 |
10 | |
Posted | 10 |
Post | 10 |
then | 10 |
has | 10 |
This | 9 |
mobile | 9 |
development | 9 |
Security | 9 |
your | 9 |
other | 9 |
(e.g. | 8 |
USA | 8 |
analysis | 8 |
developers | 8 |
explained | 8 |
secure | 8 |
testing | 8 |
Ryan | 8 |
over | 8 |
AppSensor | 8 |
his | 8 |
attended | 8 |
new | 8 |
had | 8 |
It | 7 |
were | 7 |
activities | 7 |
what | 7 |
now | 7 |
called | 7 |
it | 7 |
guidance | 7 |
format | 7 |
good | 7 |
trust | 7 |
There | 7 |
if | 7 |
practices | 6 |
out | 6 |
people | 6 |
based | 6 |
no | 6 |
more | 6 |
most | 6 |
into | 6 |
their | 6 |
In | 6 |
information | 6 |
audience | 6 |
he | 6 |
SQL | 6 |
they | 6 |
Common | 6 |
number | 6 |
threat | 6 |
applications | 6 |
do | 6 |
meeting | 6 |
during | 6 |
additional | 6 |
my | 6 |
After | 5 |
session | 5 |
Web | 5 |
If | 5 |
Software | 5 |
previous | 5 |
Conference | 5 |
presentations | 5 |
next | 5 |
process | 5 |
Secure | 5 |
up | 5 |
Europe | 5 |
For | 5 |
well | 5 |
RSA | 5 |
level | 5 |
any | 5 |
really | 5 |
modelling | 5 |
vulnerability | 5 |
users | 5 |
uses | 5 |
Tuesday | 5 |
suggestions | 5 |
said | 5 |
such | 5 |
relating | 5 |
Michael | 5 |
cheat | 5 |
could | 5 |
techniques | 5 |
local | 5 |
track | 4 |
review | 4 |
HTTP | 4 |
standards | 4 |
useful | 4 |
educational | 4 |
provide | 4 |
asked | 4 |
And | 4 |
set | 4 |
On | 4 |
systems | 4 |
might | 4 |
Following | 4 |
available | 4 |
talks | 4 |
speaking | 4 |
one | 4 |
standard | 4 |
come | 4 |
who | 4 |
built | 4 |
file | 4 |
Security, | 4 |
automated | 4 |
Leeds | 4 |
user | 4 |
Enumeration | 4 |
three | 4 |
group | 4 |
Injection | 4 |
apps | 4 |
25th | 4 |
blog | 4 |
threats | 4 |
so | 4 |
injection | 4 |
than | 4 |
across | 4 |
two | 4 |
being | 4 |
These | 4 |
source | 4 |
Language | 4 |
sheets | 4 |
common | 4 |
problems | 4 |
attack | 4 |
different | 4 |
organisations | 4 |
returned | 4 |
current | 4 |
STAAF | 3 |
difficulty | 3 |
assessed | 3 |
provides | 3 |
many | 3 |
time. | 3 |
listed | 3 |
changes | 3 |
lunch | 3 |
conference | 3 |
identify | 3 |
authenticity | 3 |
detection | 3 |
tools | 3 |
resources | 3 |
may | 3 |
risks | 3 |
heard | 3 |
Clerkendweller | 3 |
before | 3 |
application, | 3 |
Fall | 3 |
public | 3 |
training | 3 |
range | 3 |
Williams | 3 |
Forum | 3 |
read | 3 |
system, | 3 |
enterprise | 3 |
Coates | 3 |
Jeff | 3 |
Summit | 3 |
thus | 3 |
talking | 3 |
shared | 3 |
project's | 3 |
Open | 3 |
mainly | 3 |
time | 3 |
day | 3 |
always | 3 |
needs | 3 |
discuss | 3 |
unique | 3 |
lead | 3 |
application-specific | 3 |
published | 3 |
computing. | 3 |
its | 3 |
integration | 3 |
organisation | 3 |
concerns | 3 |
penetration | 3 |
initiatives. | 3 |
approach | 3 |
change | 3 |
Application | 3 |
controls | 3 |
deployment | 3 |
cloud-based | 3 |
storage | 3 |
book, | 3 |
help | 3 |
build | 3 |
style | 3 |
system | 3 |
Building | 3 |
version | 3 |
identified | 3 |
control | 3 |
guidelines | 3 |
very | 3 |
measures | 3 |
Attack | 3 |
developers, | 3 |
am | 3 |
caching | 3 |
post | 3 |
last | 3 |
ideas | 3 |
specific | 3 |
further | 3 |
government | 3 |
party | 3 |
Coding | 3 |
extended | 3 |
coding | 3 |
went | 3 |
page. | 3 |
applications, | 3 |
privacy | 3 |
describe | 3 |
via | 3 |
SM | 3 |
With | 3 |
week | 3 |
when | 3 |
around | 3 |
events | 3 |
discussed | 3 |
business | 3 |
3 | |
keep | 3 |
great | 3 |
attacks | 3 |
possible | 3 |
demonstrated | 3 |
server | 3 |
sockets | 3 |
HTML5 | 3 |
JavaScript | 3 |
terms | 3 |
things | 3 |
listen | 3 |
look | 3 |
Watson | 3 |
professional | 3 |
long | 3 |
tokenisation | 3 |
make | 3 |
another | 3 |
page | 3 |
podcast | 3 |
Usability | 3 |
Ramon | 3 |
technology | 3 |
Design | 3 |
Jump | 3 |
RSS | 3 |
two word phrases repeated minimum three times
Phrase | Quantity |
---|---|
of the | 18 |
to the | 17 |
September 2011 | 12 |
to be | 12 |
the OWASP | 11 |
2011 at | 11 |
on the | 11 |
and the | 11 |
in the | 10 |
to Twitter | 10 |
Post to | 10 |
(0) | Permalink | | 10 |
Comments (0) | | 10 |
Send | Post | 10 |
Posted on: | 10 |
Permalink | Send | | 10 |
hrs Comments | 10 |
October 2011 | 9 |
can be | 9 |
need to | 9 |
AppSec USA | 8 |
described the | 8 |
He described | 8 |
your own | 8 |
will be | 7 |
have been | 6 |
number of | 6 |
is now | 6 |
for the | 6 |
Conference Europe | 5 |
with the | 5 |
RSA Conference | 5 |
of use | 5 |
there is | 5 |
at the | 5 |
used to | 5 |
relating to | 5 |
USA 2011 | 5 |
all the | 5 |
at AppSec | 5 |
based on | 5 |
the audience | 5 |
could be | 4 |
how to | 4 |
about the | 4 |
said that | 4 |
be used | 4 |
He said | 4 |
of your | 4 |
SQL Injection | 4 |
threat modelling | 4 |
Europe 2011 | 4 |
application security | 4 |
practices and | 4 |
set of | 4 |
such as | 4 |
if you | 4 |
software security | 4 |
presentation on | 4 |
cheat sheets | 4 |
you have | 4 |
on to | 4 |
and then | 4 |
some of | 4 |
returned to | 4 |
security issues | 3 |
page. Posted | 3 |
needs to | 3 |
He discussed | 3 |
track to | 3 |
described how | 3 |
is to | 3 |
It is | 3 |
to keep | 3 |
from the | 3 |
the project's | 3 |
these are | 3 |
the mobile | 3 |
security initiatives. | 3 |
mobile computing. | 3 |
and what | 3 |
He explained | 3 |
Secure Coding | 3 |
He also | 3 |
explained how | 3 |
Michael Coates | 3 |
well as | 3 |
Jeff Williams | 3 |
as well | 3 |
code review | 3 |
review and | 3 |
web sockets | 3 |
Building Security | 3 |
went on | 3 |
web application | 3 |
Tuesday 25th | 3 |
secure coding | 3 |
extended to | 3 |
has been | 3 |
and thus | 3 |
range of | 3 |
talking about | 3 |
to help | 3 |
it is | 3 |
There is | 3 |
data from | 3 |
to listen | 3 |
the current | 3 |
The meeting | 3 |
the Software | 3 |
Forum Fall | 3 |
Usability and | 3 |
Security, Usability | 3 |
Web Security, | 3 |
and Design | 3 |
Jump to | 3 |
and how | 3 |
good to | 3 |
AppSensor Summit | 3 |
listen to | 3 |
The talks | 3 |
terms of | 3 |
need for | 3 |
use and | 3 |
three word phrases repeated minimum three times
Phrase | Quantity |
---|---|
Send | Post to | 10 |
(0) | Permalink | Send | | 10 |
Comments (0) | Permalink | | 10 |
hrs Comments (0) | | 10 |
Post to Twitter | 10 |
Permalink | Send | Post | 10 |
September 2011 at | 6 |
AppSec USA 2011 | 5 |
need to be | 5 |
October 2011 at | 5 |
RSA Conference Europe | 5 |
returned to the | 4 |
Conference Europe 2011 | 4 |
He said that | 4 |
on the OWASP | 4 |
of your own | 4 |
Usability and Design | 3 |
Security, Usability and | 3 |
went on to | 3 |
code review and | 3 |
software security initiatives. | 3 |
page. Posted on: | 3 |
to listen to | 3 |
Web Security, Usability | 3 |
be used to | 3 |
at AppSec USA | 3 |
some of the | 3 |
terms of use | 3 |
of use and | 3 |
as well as | 3 |
B tags
U tags
I tags
images
file name | alternative text |
---|---|
clerkendweller.gif | Clerkendweller - Web Security, Usability and Design - A blog about security issues for web site designers, developers and owners |
london-ajax-1.jpg | Photograph of the presenters and attendees at Skills Matter eXchange for the October meeting of the London Ajax User Group |
comment.gif | Comments |
email.gif | Send |
public-notice-1.jpg | Photograph of a workstation in a retail shop showing a web browser and a message printed across the top of the display screen |
razor-wire-1.jpg | Photograph of a warning sign on a building site |
sdlc-bsimm3-1.jpg | An example scorecard in version 3 of the Building Security In Maturity Model (BSIMM) |
danger-noentry-1.jpg | Photograph of a notice stating |
appsecusa-2011-a.jpg | Photograph of signage outsiee the Minneapolis Convention centre stating |
appsecusa-2011-b.jpg | Photograph of Michael Coates speaking at AppSec USA 2011 in Minneapolis |
appsecusa-2011-c.jpg | Photograph of one of Ryan Stinson |
appsecusa-2011-d.jpg | Photograph of Mike Ware speaking at AppSec USA 2011 in Minneapolis |
appsecusa-2011-e.jpg | Photograph of Moxie Marlinspike speaking during Friday |
appsecusa-2011-f.jpg | Photograph of Adam Meyers speaking at AppSec USA 2011 in Minneapolis |
appsecusa-2011-g.jpg | Photograph of Charles Schmidt speaking at AppSec USA 2011 in Minneapolis |
appsecusa-2011-h.jpg | Photograph of Ryan Barnett speaking at AppSec USA 2011 in Minneapolis |
appsecusa-2011-2.jpg | Photograph of the opening keynote speech at AppSec USA 2011 with Mark Curphey |
appsecusa-2011-3.jpg | Photograph of the Andres Riancho speaking at AppSec USA 2011 |
appsecusa-2011-4.jpg | Photograph of the Ryan Smith speaking at AppSec USA 2011 |
appsecusa-2011-5.jpg | Photograph of the Scott Matsumoto speaking at AppSec USA 2011 |
appsecusa-2011-6.jpg | Photograph of the OWASP board presentation over lunch at AppSec USA 2011 |
appsecusa-2011-7.jpg | Photograph of the Dan Cornell speaking at AppSec USA 2011 |
appsecusa-2011-8.jpg | Photograph of the Kevin Stadmeyer and Garret Held speaking at AppSec USA 2011 |
appsecusa-2011-9.jpg | Photograph of downtown Minneapolis where the OWASP AppSec USA 2011 conference is being held |
appsecusa-2011-1.jpg | Photograph of the signage on an Arlington County Fire Rescue vehicle |
swaf-arlington-1.jpg | |
box-null.gif | Photograph of Colin Watson MSc CITP CISSP |
clerkendweller.jpg | ISO/IEC 18004:2006 QR code for http://clerkendweller.com |
qr-code-clerkendweller-com.png |
headers
H1
Out and About This Week
SQL Injection For Beginners
Tuesday 25th is Leeds
Example Secure Coding Guidelines
BSIMM 3 Released
RSA Conference Europe 2011 Podcast
AppSec USA 2011 - Part 2
AppSec USA 2011 - Part 1
AppSensor Summit at AppSec USA 2011
Reflections on SwA Forum Fall 2011
H2
H3
H4
H5
H6
internal links
external links