last data update: 2011/10/14, 20:52
Website loading time
during the test: 2.11 s
cable connection (average): 2.28 s
DSL connection (average): 2.44 s
modem (average): 11.23 s
HTTP headers
HTTP/1.1 200 OK
Server: nginx admin
Date: Sat, 15 Oct 2011 03:52:42 GMT
Content-Type: text/html; charset=UTF-8
Connection: close
Vary: Accept-Encoding
X-Pingback: http://punter-infosec.com/xmlrpc.php
X-Cache: HIT from Backend
Information about DNS servers
punter-infosec.com | A | 69.50.198.7 | IN | 9328 | |
punter-infosec.com | NS | ns1.techfiz.info | IN | 38128 | |
punter-infosec.com | NS | ns.techfiz.info | IN | 38128 | |
punter-infosec.com | NS | ns2.techfiz.info | IN | 38128 | |
punter-infosec.com | NS | ns3.techfiz.info | IN | 38128 |
Received from the first DNS server
Request to the server "punter-infosec.com"
You used the following DNS server:
DNS Name: ns1.techfiz.info
DNS Server Address: 69.50.198.7#53
DNS server aliases:
HEADER opcode: REQUEST, status: NOERROR, id: 60220
flag: qr aa rd REQUEST: 1, ANSWER: 7, AUTHORITY: 0, ADDITIONAL: 5
REQUEST SECTION:
punter-infosec.com. IN ANY
ANSWER SECTION:
punter-infosec.com. 14400 IN MX 0 punter-infosec.com.
punter-infosec.com. 86400 IN SOA ns1.techfiz.info. omshivaprakash.gmail.com. 2011032900 86400 7200 3600000 86400
punter-infosec.com. 86400 IN NS ns1.techfiz.info.
punter-infosec.com. 86400 IN NS ns2.techfiz.info.
punter-infosec.com. 86400 IN NS ns3.techfiz.info.
punter-infosec.com. 86400 IN NS ns.techfiz.info.
punter-infosec.com. 14400 IN A 69.50.198.7
SECTION NOTES:
punter-infosec.com. 14400 IN A 69.50.198.7
ns.techfiz.info. 86400 IN A 69.50.198.7
ns1.techfiz.info. 14400 IN A 69.50.198.7
ns2.techfiz.info. 14400 IN A 69.50.192.11
ns3.techfiz.info. 14400 IN A 69.50.198.7
Received 288 bytes from address 69.50.198.7#53 in 82 ms
Received from the second DNS server
Request to the server "punter-infosec.com"
You used the following DNS server:
DNS Name: ns.techfiz.info
DNS Server Address: 69.50.198.7#53
DNS server aliases:
HEADER opcode: REQUEST, status: NOERROR, id: 4545
flag: qr aa rd REQUEST: 1, ANSWER: 7, AUTHORITY: 0, ADDITIONAL: 5
REQUEST SECTION:
punter-infosec.com. IN ANY
ANSWER SECTION:
punter-infosec.com. 14400 IN MX 0 punter-infosec.com.
punter-infosec.com. 86400 IN SOA ns1.techfiz.info. omshivaprakash.gmail.com. 2011032900 86400 7200 3600000 86400
punter-infosec.com. 86400 IN NS ns.techfiz.info.
punter-infosec.com. 86400 IN NS ns1.techfiz.info.
punter-infosec.com. 86400 IN NS ns2.techfiz.info.
punter-infosec.com. 86400 IN NS ns3.techfiz.info.
punter-infosec.com. 14400 IN A 69.50.198.7
SECTION NOTES:
punter-infosec.com. 14400 IN A 69.50.198.7
ns.techfiz.info. 86400 IN A 69.50.198.7
ns1.techfiz.info. 14400 IN A 69.50.198.7
ns2.techfiz.info. 14400 IN A 69.50.192.11
ns3.techfiz.info. 14400 IN A 69.50.198.7
Received 288 bytes from address 69.50.198.7#53 in 82 ms
Subdomains (the first 50)
Typos (misspells)
ounter-infosec.com lunter-infosec.com -unter-infosec.com 0unter-infosec.com pynter-infosec.com phnter-infosec.com pjnter-infosec.com pinter-infosec.com p8nter-infosec.com p7nter-infosec.com pubter-infosec.com pumter-infosec.com pujter-infosec.com puhter-infosec.com punrer-infosec.com punfer-infosec.com punger-infosec.com punyer-infosec.com pun6er-infosec.com pun5er-infosec.com puntwr-infosec.com puntsr-infosec.com puntdr-infosec.com puntrr-infosec.com punt4r-infosec.com punt3r-infosec.com puntee-infosec.com punted-infosec.com puntef-infosec.com puntet-infosec.com punte5-infosec.com punte4-infosec.com punter0infosec.com punterpinfosec.com punter-unfosec.com punter-jnfosec.com punter-knfosec.com punter-onfosec.com | punter-9nfosec.com punter-8nfosec.com punter-ibfosec.com punter-imfosec.com punter-ijfosec.com punter-ihfosec.com punter-indosec.com punter-incosec.com punter-invosec.com punter-ingosec.com punter-intosec.com punter-inrosec.com punter-infisec.com punter-infksec.com punter-inflsec.com punter-infpsec.com punter-inf0sec.com punter-inf9sec.com punter-infoaec.com punter-infozec.com punter-infoxec.com punter-infodec.com punter-infoeec.com punter-infowec.com punter-infoswc.com punter-infossc.com punter-infosdc.com punter-infosrc.com punter-infos4c.com punter-infos3c.com punter-infosex.com punter-infosev.com punter-infosef.com punter-infosed.com unter-infosec.com pnter-infosec.com puter-infosec.com puner-infosec.com | puntr-infosec.com punte-infosec.com punterinfosec.com punter-nfosec.com punter-ifosec.com punter-inosec.com punter-infsec.com punter-infoec.com punter-infosc.com punter-infose.com upnter-infosec.com pnuter-infosec.com putner-infosec.com punetr-infosec.com puntre-infosec.com punte-rinfosec.com punteri-nfosec.com punter-nifosec.com punter-ifnosec.com punter-inofsec.com punter-infsoec.com punter-infoesc.com punter-infosce.com ppunter-infosec.com puunter-infosec.com punnter-infosec.com puntter-infosec.com punteer-infosec.com punterr-infosec.com punter--infosec.com punter-iinfosec.com punter-innfosec.com punter-inffosec.com punter-infoosec.com punter-infossec.com punter-infoseec.com punter-infosecc.com |
Location
IP: 69.50.198.7
continent: NA, country: United States (USA), city: Phoenix
Website value
rank in the traffic statistics:
There is not enough data to estimate website value.
Basic information
website build using CSS
code weight: 63.87 KB
text per all code ratio: 13 %
title: Penetration Testing,Vulnerability Assessment,Web Application Security,Information Security,Hacking tools,Wireless Security
description: Penetration Testing,Vulnerability Assessment,Web Application Security,Information Security,Hacking tools,Wireless Security
keywords: Penetration Testing, Vulnerability Assessment, Web Application Security, Information Security, Hacking tools, Wireless Security
encoding: UTF-8
language: en-US
Website code analysis
one word phrases repeated minimum three times
Phrase | Quantity |
---|---|
Security | 7 |
Lock | 4 |
Penetration | 4 |
Tweet | 3 |
Videos | 3 |
and | 3 |
Picking | 3 |
by | 3 |
two word phrases repeated minimum three times
Phrase | Quantity |
---|---|
Lock Picking | 3 |
three word phrases repeated minimum three times
B tags
U tags
I tags
images
file name | alternative text |
---|---|
lock-150x120.jpg | lock |
secdocs-150x120.png | secdocs |
Copy-of-bt5-r1-backtrack2-150x120.png | Copy of bt5-r1-backtrack2 |
bt5-r1-backtrack-150x120.png | bt5-r1-backtrack |
metasploit-150x120.jpg | metasploit |
nokia-n900-04-150x120.jpg | nokia-n900-04 |
backtrackmobile-150x120.jpg | backtrackmobile |
bt5-revolution-blogpost-BTL-150x120.png | bt5-revolution-blogpost-BTL |
suxnet-150x120.jpg | stuxnet |
nexpose1-42x42.jpg | nexpose1 |
lock-42x42.jpg | |
secdocs-42x42.png | |
Copy-of-bt5-r1-backtrack2-42x42.png | |
bt5-r1-backtrack-42x42.png | |
metasploit-42x42.jpg | |
eb0fc9d5e0cf120f9ae481d4b15328ea?s=42&d=http%3A%2F%2F0.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D42&r=G | |
33a5c3b96ee01351c69acf012b54f650?s=42&d=http%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D42&r=G | |
a4bcf38be1f36785d32ca314729eecf6?s=42&d=http%3A%2F%2F0.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D42&r=G | |
f436e56a06ed6371762836b8d2137638?s=42&d=http%3A%2F%2F1.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D42&r=G | |
657ad65157aa8989666b51e870a7ec68?s=42&d=http%3A%2F%2F0.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D42&r=G |
headers
H1
Life of a Penetration Tester
H2
Complete Lock Picking Video Series by SchuylerTowne
IT Security and Hacking Knowledge base
BackTrack 5 R1 released
BackTrack 5 R1 Release on 10th August,2011
Metasploit: A Penetration Tester’s Guide Book Comming Soon
Weaponizing Your Nokia N900 Mobile
BackTrack 5 On Mobile and Smart Phones
BackTrack 5 Released
Backtrack 5 Teaser Trailer Video Preview
Installation, Injection and Mitigation the Stuxnet Worm
H3
Complete Lock Picking Video Series by SchuylerTowne
IT Security and Hacking Knowledge base
BackTrack 5 R1 released
BackTrack 5 R1 Release on 10th August,2011
Metasploit: A Penetration Tester’s Guide Book Comming Soon
Weaponizing Your Nokia N900 Mobile
BackTrack 5 On Mobile and Smart Phones
BackTrack 5 Released
Backtrack 5 Teaser Trailer Video Preview
Installation, Injection and Mitigation the Stuxnet Worm
H4
H5
H6
internal links
address | anchor text |
---|---|
http://punter-infosec.com | Home |
http://punter-infosec.com/wiki | InfoSec Wiki |
http://punter-infosec.com | Life of a Penetration Tester |
http://punter-infosec.com/category/assembley-language | Assembley language |
http://punter-infosec.com/category/backtrack-2 | Backtrack |
http://punter-infosec.com/category/backtrack5 | Backtrack5 |
http://punter-infosec.com/category/books | books |
http://punter-infosec.com/category/bufferoverflow | BufferOverFlow |
http://punter-infosec.com/category/c-programming | C Programming |
http://punter-infosec.com/category/cheat-sheets | Cheat Sheets |
http://punter-infosec.com/category/exploit-writing-2 | Exploit Writing |
http://punter-infosec.com/category/metasploit | metasploit |
http://punter-infosec.com/category/nexpose | nexpose |
http://punter-infosec.com/category/penetration-testing | Penetration testing |
http://punter-infosec.com/category/physical-security | Physical Security |
http://punter-infosec.com/category/sap | SAP |
http://punter-infosec.com/category/security-conference | Security Conference |
http://punter-infosec.com/category/tools | tools |
http://punter-infosec.com/category/uncategorized | Uncategorized |
http://punter-infosec.com/category/videos | Videos |
http://punter-infosec.com/category/web-application-security | Web Application Security |
http://punter-infosec.com/complete-lock-picking-video-series-by-schuylertowne | lock |
http://punter-infosec.com/complete-lock-picking-video-series-by-schuylertowne | Complete Lock Picking Video Series by SchuylerTowne |
http://punter-infosec.com/author/admin | Punter |
http://punter-infosec.com/complete-lock-picking-video-series-by-schuylertowne#respond | 0 |
http://punter-infosec.com/it-security-and-hacking-knowledge-base | secdocs |
http://punter-infosec.com/it-security-and-hacking-knowledge-base | IT Security and Hacking Knowledge base |
http://punter-infosec.com/author/admin | Punter |
http://punter-infosec.com/it-security-and-hacking-knowledge-base#respond | 0 |
http://punter-infosec.com/backtrack-5-r1-released | Copy of bt5-r1-backtrack2 |
http://punter-infosec.com/backtrack-5-r1-released | BackTrack 5 R1 released |
http://punter-infosec.com/author/admin | Punter |
http://punter-infosec.com/backtrack-5-r1-released#respond | 0 |
http://punter-infosec.com/backtrack-5-r1-release-on-10th-august2011 | bt5-r1-backtrack |
http://punter-infosec.com/backtrack-5-r1-release-on-10th-august2011 | BackTrack 5 R1 Release on 10th August,2011 |
http://punter-infosec.com/author/admin | Punter |
http://punter-infosec.com/backtrack-5-r1-release-on-10th-august2011#respond | 0 |
http://punter-infosec.com/metasploit-a-penetration-testers-guide-comming-soon | metasploit |
http://punter-infosec.com/metasploit-a-penetration-testers-guide-comming-soon | Metasploit: A Penetration Tester’s Guide Book Comming Soon |
http://punter-infosec.com/author/admin | Punter |
http://punter-infosec.com/metasploit-a-penetration-testers-guide-comming-soon#comments | 2 |
http://punter-infosec.com/weaponizing-the-nokia-n900-mobile | nokia-n900-04 |
http://punter-infosec.com/weaponizing-the-nokia-n900-mobile | Weaponizing Your Nokia N900 Mobile |
http://punter-infosec.com/author/admin | Punter |
http://punter-infosec.com/weaponizing-the-nokia-n900-mobile#respond | 0 |
http://punter-infosec.com/backtrack-5-on-mobile-and-smart-phones | backtrackmobile |
http://punter-infosec.com/backtrack-5-on-mobile-and-smart-phones | BackTrack 5 On Mobile and Smart Phones |
http://punter-infosec.com/author/admin | Punter |
http://punter-infosec.com/backtrack-5-on-mobile-and-smart-phones#respond | 0 |
http://punter-infosec.com/backtrack-5-released | bt5-revolution-blogpost-BTL |
http://punter-infosec.com/backtrack-5-released | BackTrack 5 Released |
http://punter-infosec.com/author/admin | Punter |
http://punter-infosec.com/backtrack-5-released#respond | 0 |
http://punter-infosec.com/backtrack-5-teaser-trailer-video-preview | |
http://punter-infosec.com/backtrack-5-teaser-trailer-video-preview | Backtrack 5 Teaser Trailer Video Preview |
http://punter-infosec.com/author/admin | Punter |
http://punter-infosec.com/backtrack-5-teaser-trailer-video-preview#respond | 0 |
http://punter-infosec.com/installation-injection-and-mitigation-the-stuxnet-worm | stuxnet |
http://punter-infosec.com/installation-injection-and-mitigation-the-stuxnet-worm | Installation, Injection and Mitigation the Stuxnet Worm |
http://punter-infosec.com/author/admin | Punter |
http://punter-infosec.com/installation-injection-and-mitigation-the-stuxnet-worm#respond | 0 |
http://punter-infosec.com/page/2 | Older Entries |
#popular-posts | Popular |
#recent-posts | Latest |
#recent-comments | Comments |
#tag-cloud | Tags |
http://punter-infosec.com/c-programming-for-hackers | C programming for Hackers |
http://punter-infosec.com/c-programming-for-hackers#comments | 5 |
http://punter-infosec.com/finds-websites-located-on-the-same-web-server | Find Websites Located on the Same Web Server |
http://punter-infosec.com/finds-websites-located-on-the-same-web-server#comments | 5 |
http://punter-infosec.com/sap-penetration-testing-video-and-slides-by-mariano-nunez-di-croce | SAP Penetration Testing Video and Slides by Mariano Nunez Di Croce |
http://punter-infosec.com/sap-penetration-testing-video-and-slides-by-mariano-nunez-di-croce#comments | 5 |
http://punter-infosec.com/nexpose-meatsploit-shell | Nexpose + Metasploit = Shell |
http://punter-infosec.com/nexpose-meatsploit-shell#comments | 5 |
http://punter-infosec.com/cheat-sheets-for-pentesters | Security Assessment and Pentest tools Cheat Sheets |
http://punter-infosec.com/cheat-sheets-for-pentesters#comments | 3 |
http://punter-infosec.com/complete-lock-picking-video-series-by-schuylertowne | Complete Lock Picking Video Series by SchuylerTowne |
http://punter-infosec.com/complete-lock-picking-video-series-by-schuylertowne#respond | 0 |
http://punter-infosec.com/it-security-and-hacking-knowledge-base | IT Security and Hacking Knowledge base |
http://punter-infosec.com/it-security-and-hacking-knowledge-base#respond | 0 |
http://punter-infosec.com/backtrack-5-r1-released | BackTrack 5 R1 released |
http://punter-infosec.com/backtrack-5-r1-released#respond | 0 |
http://punter-infosec.com/backtrack-5-r1-release-on-10th-august2011 | BackTrack 5 R1 Release on 10th August,2011 |
http://punter-infosec.com/backtrack-5-r1-release-on-10th-august2011#respond | 0 |
http://punter-infosec.com/metasploit-a-penetration-testers-guide-comming-soon | Metasploit: A Penetration Tester’s Guide Book Comming Soon |
http://punter-infosec.com/metasploit-a-penetration-testers-guide-comming-soon#comments | 2 |
http://punter-infosec.com/tag/backtrack | backtrack |
http://punter-infosec.com/tag/backtrack4-rc2 | BackTrack4-RC2 |
http://punter-infosec.com/tag/backtrack-5 | Backtrack 5 |
http://punter-infosec.com/tag/blocking-nmap-scans | blocking nmap scans |
http://punter-infosec.com/tag/de-ice-live-cds | De-ICE live CDS |
http://punter-infosec.com/tag/dns | DNS |
http://punter-infosec.com/tag/exploitation | Exploitation |
http://punter-infosec.com/tag/exploit-writing | exploit writing |
http://punter-infosec.com/tag/fuzzing | fuzzing |
http://punter-infosec.com/tag/hacking | hacking |
http://punter-infosec.com/tag/http | HTTP |
http://punter-infosec.com/tag/ipod-touch-2g | iPod Touch 2G |
http://punter-infosec.com/tag/jailbreak | Jailbreak |
http://punter-infosec.com/tag/linux | linux |
http://punter-infosec.com/tag/load-balancers | Load Balancers |
http://punter-infosec.com/tag/lockpicking | lockpicking |
http://punter-infosec.com/tag/metasploit | metasploit |
http://punter-infosec.com/tag/nexpose-2 | NeXpose |
http://punter-infosec.com/tag/nmap | nmap |
http://punter-infosec.com/tag/owasp | Owasp |
http://punter-infosec.com/tag/penetration-testing-2 | Penetration Testing |
http://punter-infosec.com/tag/pentest | Pentest |
http://punter-infosec.com/tag/pentesters | pentesters |
http://punter-infosec.com/tag/presentations | Presentations |
http://punter-infosec.com/tag/reverse-engineering | reverse engineering |
http://punter-infosec.com/tag/rogue-access-points | Rogue Access Points |
http://punter-infosec.com/tag/secure-code-audits | secure code audits |
http://punter-infosec.com/tag/security | Security |
http://punter-infosec.com/tag/software-testing | software testing |
http://punter-infosec.com/tag/source-code | source code |
http://punter-infosec.com/tag/sqlinjection | sqlinjection |
http://punter-infosec.com/tag/tool | Tool |
http://punter-infosec.com/tag/tools | tools |
http://punter-infosec.com/tag/update | Update |
http://punter-infosec.com/tag/video | Video |
http://punter-infosec.com/tag/videos-2 | videos |
http://punter-infosec.com/tag/vulnerability-analysis | vulnerability analysis |
http://punter-infosec.com/tag/vulnerable-oss | Vulnerable OS's |
http://punter-infosec.com/tag/vulnerable-web-applications | Vulnerable Web Applications |
http://punter-infosec.com/tag/war-games | war games |
http://punter-infosec.com/tag/watobo | WATOBO |
http://punter-infosec.com/tag/web-application | Web Application |
http://punter-infosec.com/tag/web-application-firewall | web application firewall |
http://punter-infosec.com/tag/web-application-security-2 | web Application Security |
http://punter-infosec.com/tag/xss | xss |
http://punter-infosec.com/complete-lock-picking-video-series-by-schuylertowne | Complete Lock Picking Video Series by SchuylerTowne |
http://punter-infosec.com/it-security-and-hacking-knowledge-base | IT Security and Hacking Knowledge base |
http://punter-infosec.com/backtrack-5-r1-released | BackTrack 5 R1 released |
http://punter-infosec.com/backtrack-5-r1-release-on-10th-august2011 | BackTrack 5 R1 Release on 10th August,2011 |
http://punter-infosec.com/metasploit-a-penetration-testers-guide-comming-soon | Metasploit: A Penetration Tester’s Guide Book Comming Soon |
http://punter-infosec.com/tag/backtrack | backtrack |
http://punter-infosec.com/tag/backtrack4-rc2 | BackTrack4-RC2 |
http://punter-infosec.com/tag/backtrack-5 | Backtrack 5 |
http://punter-infosec.com/tag/blocking-nmap-scans | blocking nmap scans |
http://punter-infosec.com/tag/de-ice-live-cds | De-ICE live CDS |
http://punter-infosec.com/tag/dns | DNS |
http://punter-infosec.com/tag/exploitation | Exploitation |
http://punter-infosec.com/tag/exploit-writing | exploit writing |
http://punter-infosec.com/tag/fuzzing | fuzzing |
http://punter-infosec.com/tag/hacking | hacking |
http://punter-infosec.com/tag/http | HTTP |
http://punter-infosec.com/tag/ipod-touch-2g | iPod Touch 2G |
http://punter-infosec.com/tag/jailbreak | Jailbreak |
http://punter-infosec.com/tag/linux | linux |
http://punter-infosec.com/tag/load-balancers | Load Balancers |
http://punter-infosec.com/tag/lockpicking | lockpicking |
http://punter-infosec.com/tag/metasploit | metasploit |
http://punter-infosec.com/tag/nexpose-2 | NeXpose |
http://punter-infosec.com/tag/nmap | nmap |
http://punter-infosec.com/tag/owasp | Owasp |
http://punter-infosec.com/tag/penetration-testing-2 | Penetration Testing |
http://punter-infosec.com/tag/pentest | Pentest |
http://punter-infosec.com/tag/pentesters | pentesters |
http://punter-infosec.com/tag/presentations | Presentations |
http://punter-infosec.com/tag/reverse-engineering | reverse engineering |
http://punter-infosec.com/tag/rogue-access-points | Rogue Access Points |
http://punter-infosec.com/tag/secure-code-audits | secure code audits |
http://punter-infosec.com/tag/security | Security |
http://punter-infosec.com/tag/software-testing | software testing |
http://punter-infosec.com/tag/source-code | source code |
http://punter-infosec.com/tag/sqlinjection | sqlinjection |
http://punter-infosec.com/tag/tool | Tool |
http://punter-infosec.com/tag/tools | tools |
http://punter-infosec.com/tag/update | Update |
http://punter-infosec.com/tag/video | Video |
http://punter-infosec.com/tag/videos-2 | videos |
http://punter-infosec.com/tag/vulnerability-analysis | vulnerability analysis |
http://punter-infosec.com/tag/vulnerable-oss | Vulnerable OS's |
http://punter-infosec.com/tag/vulnerable-web-applications | Vulnerable Web Applications |
http://punter-infosec.com/tag/war-games | war games |
http://punter-infosec.com/tag/watobo | WATOBO |
http://punter-infosec.com/tag/web-application | Web Application |
http://punter-infosec.com/tag/web-application-firewall | web application firewall |
http://punter-infosec.com/tag/web-application-security-2 | web Application Security |
http://punter-infosec.com/tag/xss | xss |
http://punter-infosec.com/wp-login.php | Log in |
http://punter-infosec.com/feed | Entries RSS |
http://punter-infosec.com/comments/feed | Comments RSS |
http://punter-infosec.com | Life of a Penetration Tester |
http://punter-infosec.com/wp-admin/ | Site Admin |
http://punter-infosec.com/feed | Entries RSS |
http://punter-infosec.com/comments/feed | Comments RSS |
external links
address | anchor text |
---|---|
http://twitter.com/share | Tweet |
http://twitter.com/share | Tweet |
http://twitter.com/share | Tweet |
http://twitter.com/share | Tweet |
http://twitter.com/share | Tweet |
http://twitter.com/share | Tweet |
http://twitter.com/share | Tweet |
http://twitter.com/share | Tweet |
http://twitter.com/share | Tweet |
http://twitter.com/share | Tweet |
http://www.youtube.com/user/ | YouTube |
http://twitter.com/punter_infosec | |
http://www.facebook.com/ | |
http://feeds.feedburner.com/ | RSS |
http://feedburner.google.com/fb/a/mailverify?uri=&loc=en_US | |
http://twitter.com/punter_infosec | Folllow me @punter_infosec |
http://twitter.com/ | '+reply.substring(1)+' |
http://twitter.com/ | '+relative_time(twitters[i].created_at)+' |
http://michael-coates.blogspot.com | Application Security |
http://carnal0wnage.attackresearch.com | carnalOwnage |
http://www.exploit-db.com | Exploit DB |
http://www.hackstacks.com | Hackstacks |
http://sickness.tor.hu | ihasomgsecurityskills |
http://krebsonsecurity.com/ | Krebs on Security |
http://www.myinfosecjob.com | My Information Security Job |
http://pciguru.wordpress.com/ | pciguru |
http://www.corelan.be:8800 | Peter Van Eeckhoutte's Blog |
http://www.question-defense.com | Question Defense |
http://www.securitytube.net | SecurityTube.Net |
http://www.skullsecurity.org/blog/ | SkullSecurity |
http://taosecurity.blogspot.com/ | TaoSecurity |
http://wordpress.org/ | WordPress.org |
http://wordpress.org | WordPress |
http://www.theme-junkie.com | Theme Junkie |
http://www.statcounter.com/ | web analytics |