last data update: 2012/04/30, 13:51

Website loading time

during the test: 0.34 s

cable connection (average): 0.9 s

DSL connection (average): 1.46 s

modem (average): 31.15 s

HTTP headers

Information about DNS servers

pauldotcom.comMX30ASPMX4.GOOGLEMAIL.comIN43200
pauldotcom.comMX30ASPMX5.GOOGLEMAIL.comIN43200
pauldotcom.comMX10ASPMX.L.GOOGLE.comIN43200
pauldotcom.comMX20ALT2.ASPMX.L.GOOGLE.comIN43200
pauldotcom.comMX30ASPMX2.GOOGLEMAIL.comIN43200
pauldotcom.comMX30ASPMX3.GOOGLEMAIL.comIN43200
pauldotcom.comAAAA2001:470:1f0e:98c::2IN3600
pauldotcom.comA209.20.73.195IN21600
pauldotcom.comSOAns1.pauldotcom.compsw.pauldotcom.com201102020228800 7200 604800 86400 IN 43200
pauldotcom.comNSns2.pauldotcom.comIN43200
pauldotcom.comNSns3.pauldotcom.comIN43200
pauldotcom.comNSns1.pauldotcom.comIN43200

Received from the first DNS server

Request to the server "pauldotcom.com"
You used the following DNS server:
DNS Name: ns2.pauldotcom.com
DNS Server Address: 209.20.93.237#53
DNS server aliases:

HEADER opcode: REQUEST, status: NOERROR, id: 43335
flag: qr aa rd REQUEST: 1, ANSWER: 12, AUTHORITY: 0, ADDITIONAL: 4

REQUEST SECTION:
pauldotcom.com. IN ANY

ANSWER SECTION:
pauldotcom.com. 86400 IN SOA ns1.pauldotcom.com. psw.pauldotcom.com. 2011020202 28800 7200 604800 86400
pauldotcom.com. 86400 IN NS ns1.pauldotcom.com.
pauldotcom.com. 86400 IN NS ns3.pauldotcom.com.
pauldotcom.com. 86400 IN NS ns2.pauldotcom.com.
pauldotcom.com. 21600 IN A 209.20.73.195
pauldotcom.com. 86400 IN MX 10 ASPMX.L.GOOGLE.com.
pauldotcom.com. 86400 IN MX 20 ALT2.ASPMX.L.GOOGLE.com.
pauldotcom.com. 86400 IN MX 30 ASPMX2.GOOGLEMAIL.com.
pauldotcom.com. 86400 IN MX 30 ASPMX3.GOOGLEMAIL.com.
pauldotcom.com. 86400 IN MX 30 ASPMX4.GOOGLEMAIL.com.
pauldotcom.com. 86400 IN MX 30 ASPMX5.GOOGLEMAIL.com.
pauldotcom.com. 3600 IN AAAA 2001:470:1f0e:98c::2

SECTION NOTES:
ns1.pauldotcom.com. 86400 IN A 209.20.73.195
ns1.pauldotcom.com. 3600 IN AAAA 2001:470:1f0e:98c::2
ns2.pauldotcom.com. 3600 IN A 209.20.93.237
ns3.pauldotcom.com. 3600 IN A 209.20.93.237

Received 401 bytes from address 209.20.93.237#53 in 27 ms

Received from the second DNS server

Request to the server "pauldotcom.com"
You used the following DNS server:
DNS Name: ns3.pauldotcom.com
DNS Server Address: 209.20.93.237#53
DNS server aliases:

HEADER opcode: REQUEST, status: NOERROR, id: 39750
flag: qr aa rd REQUEST: 1, ANSWER: 12, AUTHORITY: 0, ADDITIONAL: 4

REQUEST SECTION:
pauldotcom.com. IN ANY

ANSWER SECTION:
pauldotcom.com. 86400 IN SOA ns1.pauldotcom.com. psw.pauldotcom.com. 2011020202 28800 7200 604800 86400
pauldotcom.com. 86400 IN NS ns3.pauldotcom.com.
pauldotcom.com. 86400 IN NS ns1.pauldotcom.com.
pauldotcom.com. 86400 IN NS ns2.pauldotcom.com.
pauldotcom.com. 21600 IN A 209.20.73.195
pauldotcom.com. 86400 IN MX 30 ASPMX5.GOOGLEMAIL.com.
pauldotcom.com. 86400 IN MX 10 ASPMX.L.GOOGLE.com.
pauldotcom.com. 86400 IN MX 20 ALT2.ASPMX.L.GOOGLE.com.
pauldotcom.com. 86400 IN MX 30 ASPMX2.GOOGLEMAIL.com.
pauldotcom.com. 86400 IN MX 30 ASPMX3.GOOGLEMAIL.com.
pauldotcom.com. 86400 IN MX 30 ASPMX4.GOOGLEMAIL.com.
pauldotcom.com. 3600 IN AAAA 2001:470:1f0e:98c::2

SECTION NOTES:
ns1.pauldotcom.com. 86400 IN A 209.20.73.195
ns1.pauldotcom.com. 3600 IN AAAA 2001:470:1f0e:98c::2
ns2.pauldotcom.com. 3600 IN A 209.20.93.237
ns3.pauldotcom.com. 3600 IN A 209.20.93.237

Received 401 bytes from address 209.20.93.237#53 in 27 ms

Subdomains (the first 50)

Typos (misspells)

oauldotcom.com
lauldotcom.com
-auldotcom.com
0auldotcom.com
pzuldotcom.com
psuldotcom.com
pwuldotcom.com
pquldotcom.com
payldotcom.com
pahldotcom.com
pajldotcom.com
paildotcom.com
pa8ldotcom.com
pa7ldotcom.com
paukdotcom.com
paupdotcom.com
pauodotcom.com
paulsotcom.com
paulxotcom.com
paulcotcom.com
paulfotcom.com
paulrotcom.com
pauleotcom.com
paulditcom.com
pauldktcom.com
pauldltcom.com
pauldptcom.com
pauld0tcom.com
pauld9tcom.com
pauldorcom.com
pauldofcom.com
pauldogcom.com
pauldoycom.com
pauldo6com.com
pauldo5com.com
pauldotxom.com
pauldotvom.com
pauldotfom.com
pauldotdom.com
pauldotcim.com
pauldotckm.com
pauldotclm.com
pauldotcpm.com
pauldotc0m.com
pauldotc9m.com
pauldotcon.com
pauldotcok.com
pauldotcoj.com
auldotcom.com
puldotcom.com
paldotcom.com
paudotcom.com
paulotcom.com
pauldtcom.com
pauldocom.com
pauldotom.com
pauldotcm.com
pauldotco.com
apuldotcom.com
pualdotcom.com
paludotcom.com
paudlotcom.com
paulodtcom.com
pauldtocom.com
pauldoctom.com
pauldotocm.com
pauldotcmo.com
ppauldotcom.com
paauldotcom.com
pauuldotcom.com
paulldotcom.com
paulddotcom.com
pauldootcom.com
pauldottcom.com
pauldotccom.com
pauldotcoom.com
pauldotcomm.com

Location

IP: 209.20.73.195

continent: NA, country: United States (USA), city: Saint Louis

Website value

rank in the traffic statistics: 483 596

page wievs - daily average: 170

page views - monthly average: 5 099

visitors - daily average during last 30 days: 94

visitors during last 30 days: 2 833

estimated daily income from ads: 13 USD

estimated monthly income from ads: 383 USD

estimated website value: 10 595 USD

Basic information

website build using CSS

code weight: 215.66 KB

text per all code ratio: 38 %

title: Home Of PaulDotCom Security Podcast

description:

keywords: security, podcast, network, hacking, pauldotcom, ninja

encoding: utf-8

language: en

Website code analysis

one word phrases repeated minimum three times

PhraseQuantity
the95
of57
and56
to53
we39
for37
in32
with29
that28
on27
PM26
Episode26
is25
can25
have22
Hack22
Naked22
April20
201219
this18
PaulDotCom17
----17
PowerShell17
are17
our16
Security16
it15
We15
ShouldProcess14
as14
use14
Weekly13
200813
will12
200612
TV12
200712
Host12
201012
201112
FileSystem12
200912
could11
-a---11
not10
an10
from10
AV10
you10
security10
Name10
by10
AM9
PS9
your9
at9
or9
other9
C:>8
Feeds:8
2848
out8
one8
At8
Night8
do8
d----8
used8
Halo8
February7
January7
their7
look7
March7
December7
Registry7
if7
like7
October7
November7
da---7
many7
Check7
be7
Paul7
Audio7
------7
provider6
The6
John6
all6
TV,6
any6
4/5/20126
Permalink6
Posted6
August6
Martin6
As6
against6
there6
Video6
see6
May6
Windows6
July6
June6
current6
September6
Lets6
-------------5
so5
commands5
implemented5
data5
whole5
2825
here5
access5
Alias5
2835
Length5
(mp3)5
Microsoft5
LastWriteTime5
Cmdlets5
Directory:5
Mode5
they5
systems5
aliases5
You5
WSMan5
Function5
Pesce,4
Larry4
files4
Rob4
Carlos4
Perez,4
Links4
Strand,4
file4
For4
Certificate4
Notes4
has4
user4
more4
Show4
how4
take4
McAfee4
server4
just4
parameter4
(GB)4
Items4
type4
Variable4
what4
about4
Get-ChildItem4
Download4
when4
those4
organizations4
Part4
Direct4
than4
PSDrives4
Gene4
using4
Interview:4
Asadoorian,4
New-Item4
---------4
Dan4
Introduction4
traditional4
even4
Alan4
only4
cloud4
92.168.1.2isostore3
-Name3
It3
it.3
start3
would3
want3
much3
system3
show3
blacklist3
create3
Jack3
because3
vendor3
vast3
majority3
Daniel,3
product3
cmdlet3
allows3
manage3
need3
Many3
environments.3
make3
3/15/20123
d-r--3
see,3
C:3
Files3
information3
account3
treats3
Bos3
Hosts:3
channel.3
Bliptv3
Transactions3
Channel3
Geeks3
Espanol3
does3
Environment3
In3
Password3
Asadoorian3
YouTube3
episodes3
20053
installed3
-Path3
Session.3
defensive3
drives3
cmdlets3
Kim3
Tune3
layers3
3
Working3
also3
Stogie3
awesome3
me3
Get-PSProvider3
most3
PSDrive.3
things3
Drives3
Credentials3
Each3

two word phrases repeated minimum three times

PhraseQuantity
Hack Naked22
Security Weekly13
Host of12
for the11
Naked TV11
could have11
we can11
We could10
PaulDotCom Security10
of the9
Episode 2848
At Night8
Naked At8
with the8
use the7
of Hack7
PS C:>7
on April6
Permalink April6
Posted by6
look at6
Weekly Episode6
on the6
can be6
TV Episode5
Episode 2835
Video Feeds:5
Name ----5
Length Name5
---- -------------5
------------- ------5
------ ----5
LastWriteTime Length5
Mode LastWriteTime5
can see5
Feeds: Posted5
have implemented5
(mp3) Episode5
Episode 2825
the current5
for this5
access to5
As we4
to the4
to Microsoft4
Introduction to4
there is4
Check out4
we will4
current PowerShell4
Larry Pesce,4
Paul Asadoorian,4
John Strand,4
Carlos Perez,4
on our4
of PaulDotCom4
Download (mp3)4
in the4
Part with4
against the4
Show Notes4
files and4
Audio Download4
Direct Audio4
in our3
Bliptv channel.3
Channel or3
we are3
episodes on3
our YouTube3
YouTube Channel3
to manage3
our Bliptv3
PowerShell Session.3
Episode Hosts:3
Hosts: Paul3
Check it3
Asadoorian, Host3
it out3
Notes Episode3
da--- 3/15/20123
d---- 4/5/20123
drives we3
will use3
Jack Daniel,3
be used3
used to3
have access3
the PSDrive.3
this is3
We do3
majority of3
blacklist AV3
the vast3
2012 PaulDotCom3
Tune in3
Naked TV,3
vast majority3
TV, and3
and Hack3
TV, Hack3
Weekly TV,3
in to3
AM Permalink3
to PaulDotCom3
Night episodes3
or our3
that we3
by Paul3
Paul Asadoorian3
see in3
we use3
Feeds: Video3
PaulDotCom Espanol3
Espanol Audio3
one of3
Audio Feeds:3
Working with3
PowerShell –3
of Security3
PM Permalink3
the most3
Gene Kim3
Asadoorian on3
at the3
Microsoft PowerShell3
to make3
need to3
Perez, Host3
that PowerShell3
TV Hack3
and Stogie3
can use3
Geeks Larry3
Pesce, Host3
Strand, Host3
Stogie Geeks3
TV Carlos3
Weekly and3

three word phrases repeated minimum three times

PhraseQuantity
Hack Naked TV11
We could have10
PaulDotCom Security Weekly10
Naked At Night8
Hack Naked At8
of Hack Naked7
Host of Hack6
Security Weekly Episode6
could have implemented5
Feeds: Posted by5
------------- ------ ----5
we can see5
Name ---- -------------5
Video Feeds: Posted5
LastWriteTime Length Name5
Length Name ----5
---- ------------- ------5
Mode LastWriteTime Length5
Naked TV Episode5
Introduction to Microsoft4
As we can4
Direct Audio Download4
Download (mp3) Episode4
Audio Download (mp3)4
the current PowerShell4
Audio Feeds: Video3
Espanol Audio Feeds:3
Perez, Host of3
Naked TV Carlos3
Strand, Host of3
TV Carlos Perez,3
Carlos Perez, Host3
of PaulDotCom Espanol3
Host of PaulDotCom3
PaulDotCom Espanol Audio3
Paul Asadoorian on3
vast majority of3
can be used3
have access to3
the vast majority3
against the PSDrive.3
Check it out3
AM Permalink April3
to PaulDotCom Security3
PM Permalink April3
by Paul Asadoorian3
current PowerShell Session.3
for the current3
John Strand, Host3
Asadoorian on April3
Microsoft PowerShell –3
to Microsoft PowerShell3
Posted by Paul3
Feeds: Video Feeds:3
At Night episodes3
TV Hack Naked3
and Hack Naked3
in to PaulDotCom3
Night episodes on3
YouTube Channel or3
our YouTube Channel3
on our YouTube3
Tune in to3
Security Weekly TV,3
Naked TV, and3
TV, and Hack3
episodes on our3
Pesce, Host of3
Hack Naked TV,3
Weekly TV, Hack3
2012 PaulDotCom Security3
TV, Hack Naked3
or our Bliptv3
Channel or our3
Host of Security3
Stogie Geeks Larry3
Geeks Larry Pesce,3
of Security Weekly3
Security Weekly and3
and Stogie Geeks3
Weekly and Stogie3
Asadoorian, Host of3
look at the3
(mp3) Episode Hosts:3
Show Notes Episode3
our Bliptv channel.3
Episode Hosts: Paul3
Hosts: Paul Asadoorian,3
Larry Pesce, Host3
Paul Asadoorian, Host3
can see in3

B tags

U tags

I tags

images

file namealternative text
Paul Dot Com
The News
www.coresecurity.com
www.tenablesecurity.com
twitter.com/pauldotcom
PaulDotCom YouTube Channel
image

headers

H1

H2

Recent Posts

Archives

April 24, 2012

April 20, 2012

April 18, 2012

April 17, 2012

April 16, 2012

April 10, 2012

April 9, 2012

PSDrives

Working with Items

Working with Paths

Conclusion

April 6, 2012

March 28, 2012

PowerShell Cmdlets

March 27, 2012

What Is PowerShell

Setting Up the Environment

H3

Recent Posts

Archives

April 24, 2012

April 20, 2012

April 18, 2012

April 17, 2012

April 16, 2012

April 10, 2012

April 9, 2012

PSDrives

Working with Items

Working with Paths

Conclusion

April 6, 2012

March 28, 2012

PowerShell Cmdlets

March 27, 2012

What Is PowerShell

Setting Up the Environment

H4

H5

H6

internal links

addressanchor text
about
contact
Home
Home
About
Show Notes Wiki
Training
Live Video Stream
Mailing List
Papers
Presentations
Contact
PaulDotCom Security Weekly Episode 284 - Martin Bos, Derbycon, Backtrack, Password Cracking
Hack Naked TV Episode 32
Episode 284 with Martin "PureHate" Bos Thursday night 6PM
Hack Naked TV Episode 31
PaulDotCom Security Weekly Episode 283 - Gene Kim
PaulDotCom Security Weekly Episode 282 - Dan Geer, Alan Paller, and more!
Introduction to Microsoft PowerShell – Working with PSDrives and Items
Hack Naked TV Episode 30
Introduction to Microsoft PowerShell– Basics of Running Cmdlets
Introduction to Microsoft PowerShell – What is it and Setup
Subscribe to this blog's feed
Archives
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
August 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
August 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
August 2008
July 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
August 2007
July 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
December 2006
November 2006
October 2006
September 2006
August 2006
July 2006
June 2006
May 2006
April 2006
March 2006
February 2006
January 2006
December 2005
November 2005
October 2005
img
img
img
PaulDotCom Security Weekly Episode 284 - Martin Bos, Derbycon, Backtrack, Password Cracking
Episode 284 Show Notes
Security Weekly
PaulDotCom Espanol
img
img
Permalink
Hack Naked TV Episode 32
John Strand
Permalink
Episode 284 with Martin "PureHate" Bos Thursday night 6PM
Episode 284
PaulDotCom Live!
Episode 284 show notes page
Mike Perez
Permalink
Hack Naked TV Episode 31
John Strand
Permalink
PaulDotCom Security Weekly Episode 283 - Gene Kim
Episode 283 Show Notes
Security Weekly
PaulDotCom Espanol
img
img
Permalink
PaulDotCom Security Weekly Episode 282 - Dan Geer, Alan Paller, and more!
Episode 282 Show Notes
Security Weekly
PaulDotCom Espanol
img
img
Permalink
Introduction to Microsoft PowerShell – Working with PSDrives and Items
Carlos Perez
Permalink
Hack Naked TV Episode 30
John Strand
Permalink
Introduction to Microsoft PowerShell– Basics of Running Cmdlets
image
image
image
image
Carlos Perez
Permalink
Introduction to Microsoft PowerShell – What is it and Setup
image
image
image
image
image
image
image
image
Carlos Perez
Permalink
Paul dot com

external links

addressanchor text
Listen
Watch
Consulting
Forum
PaulDotCom TV
Hack Naked TV
Hack Naked At Night
#IRC
Pics
What is this?
img
img
img
img
img
img
img
img
SANSFIRE 2012 (July 7-8)
Blackhat 2012 (July 21-22 & 23-24)
www.coresecurity.com
www.tenablesecurity.com
twitter.com/pauldotcom
PaulDotCom YouTube Channel
Visit PaulDotCom Insider
YouTube Channel
Bliptv channel.
Episode 284 (mp3)
Stogie Geeks
Hack Naked At Night
Hack Naked TV
img
img
here
here
img
img
Question Defense Tool
IRC channel
IRC channel
Paul Asadoorian
Larry Pesce
Jack Daniel
Carlos Perez
John Strand
Darren Wigley
Mike Perez
here
here
img
img
YouTube Channel
Bliptv channel.
Episode 283 - Part 1 with Gene Kim- Direct Audio Download (mp3)
Episode 283 - Part 2 with the man behind Goatse - Direct Audio Download (mp3)
Stogie Geeks
Hack Naked At Night
Hack Naked TV
img
img
YouTube Channel
Bliptv channel.
Episode 282 - Part 1 with Dan Geer - Direct Audio Download (mp3)
Episode 282 - Part 2 with Alan Paller - Direct Audio Download (mp3)
Stogie Geeks
Hack Naked At Night
Hack Naked TV
img
img
here
here
img
img
http://social.technet.microsoft.com/wiki/contents/articles/4537.powershell-approved-verbs-en-us.aspx
http://www.microsoft.com/powershell
http://poshcode.org/2220
Counts Web Design