last data update: 2011/10/18, 04:14

Website loading time

during the test: 0.29 s

cable connection (average): 0.44 s

DSL connection (average): 0.58 s

modem (average): 8.34 s

HTTP headers

Information about DNS servers

megilen.plA193.218.153.73IN14400
megilen.plMX0megilen.plIN14400
megilen.plSOAns1.aidahosting.comroot.s73.superhost.pl200810240086400 7200 3600000 86400 IN 43200
megilen.plNSns2.aidahosting.comIN43200
megilen.plNSns1.aidahosting.comIN43200
corailclub57.netMX10mx00.1and1.frIN43200
corailclub57.netMX10mx01.1and1.frIN43200
corailclub57.netSOAns11.1and1.frhostmaster.1and1.fr200908250128800 7200 604800 86400 IN 43200
corailclub57.netA82.165.200.41IN10800
corailclub57.netNSns11.1and1.frIN43200
corailclub57.netNSns12.1and1.frIN43200
duisburg-segelt.deA80.237.132.245IN43200
duisburg-segelt.deSOAns1.hans.hosteurope.dehostmaster.duisburg-segelt.de201008172216384 2048 1048576 2560 IN 2560
duisburg-segelt.deMX50mx0.duisburg-segelt.deIN43200
duisburg-segelt.deNSns2.hans.hosteurope.deIN43200
duisburg-segelt.deNSns1.hans.hosteurope.deIN43200
skopp.ok.pe.vpslink.comA38.113.1.225IN3600
kalksandstein.chMX10mx1.vicat.comIN43200
kalksandstein.chSOAns3.staempfli.chadministrator.staempfli.ch20110915011200 600 1209600 3600 IN 3600
kalksandstein.chNSns3.staempfli.chIN1
kalksandstein.chNSns2.fcom.chIN1
repromeda.czA81.91.85.129IN14400
repromeda.czSOAns1.ignum.comhostmaster.ignum.cz200911180010800 3600 604800 14400 IN 14400
repromeda.czMX10mail.repromeda.czIN14400
repromeda.czNSns1.ignum.comIN14400
repromeda.czNSns2.ignum.czIN14400
ville-latronche.frMX0srvmail.ville-latronche.frIN14400
ville-latronche.frA82.138.70.53IN14400
ville-latronche.frSOAns1.atnweb.comdns_technique.atngroupe.fr200712201286400 7200 3600000 86400 IN 43200
ville-latronche.frNSns3.ipcenter.frIN43200
ville-latronche.frNSns1.atnweb.comIN43200
kasalux.comMX10mail5.clubenet.netIN43200
kasalux.comA94.126.171.8IN43200
kasalux.comSOAdns1.clubenet.netinfo.clubenet.net201011051610800 3600 604800 86400 IN 43200
kasalux.comNSdns1.clubenet.netIN43200
kasalux.comNSdns2.clubenet.netIN43200
resblucalciofemminile.itMX10mx.resblucalciofemminile.itIN21600
resblucalciofemminile.itA62.149.128.154IN21600
resblucalciofemminile.itA62.149.128.157IN21600
resblucalciofemminile.itA62.149.128.160IN21600
resblucalciofemminile.itA62.149.128.163IN21600
resblucalciofemminile.itA62.149.128.166IN21600
resblucalciofemminile.itA62.149.128.72IN21600
resblucalciofemminile.itA62.149.128.74IN21600
resblucalciofemminile.itA62.149.128.151IN21600
resblucalciofemminile.itSOAdns.technorail.comhostmaster.technorail.com186400 7200 2592000 86400 IN 21600
resblucalciofemminile.itNSdns.technorail.comIN21600
resblucalciofemminile.itNSdns2.technorail.comIN21600
kullaniciyorumlari.netTXTv=spf1 redirect=_spf.turhost.comArrayIN600
kullaniciyorumlari.netMX10mail.kullaniciyorumlari.netIN600
kullaniciyorumlari.netA94.199.201.62IN600
kullaniciyorumlari.netSOAns1.turdns.comdnsmaster.turdns.com20110916147200 3600 604800 3600 IN 3600
kullaniciyorumlari.netNSns2.turdns.comIN600
kullaniciyorumlari.netNSns1.turdns.comIN600
ledroideenchaine.comA69.195.81.158IN14400
ledroideenchaine.comSOAns1.hostmonster.comroot.host389.hostmonster.com201109220086400 7200 3600000 300 IN 43200
ledroideenchaine.comTXTv=spf1 a mx ptr include:hostmonster.com ?allArrayIN14400
ledroideenchaine.comMX20alt1.aspmx.l.google.comIN14400
ledroideenchaine.comMX20alt2.aspmx.l.google.comIN14400
ledroideenchaine.comMX30aspmx3.googlemail.comIN14400
ledroideenchaine.comMX300aspmx2.googlemail.comIN14400
ledroideenchaine.comMX10aspmx.l.google.comIN14400
ledroideenchaine.comNSns1.hostmonster.comIN43200
ledroideenchaine.comNSns2.hostmonster.comIN43200
securityweek.comNSdns1.stabletransit.comIN3014
securityweek.comNSdns2.stabletransit.comIN3014

Received from the first DNS server

Request to the server "securityweek.com"
Received 34 bytes from address 193.34.0.34#53 in 123 ms
Request to the server "securityweek.com"
You used the following DNS server:
DNS Name: ns2.aidahosting.com
DNS Server Address: 193.34.0.34#53
DNS server aliases:

Host securityweek.com not found: 2(SERVFAIL)
Received 34 bytes from address 193.34.0.34#53 in 115 ms

Received from the second DNS server

Request to the server "securityweek.com"
Received 34 bytes from address 91.199.22.8#53 in 120 ms
Request to the server "securityweek.com"
You used the following DNS server:
DNS Name: ns1.aidahosting.com
DNS Server Address: 91.199.22.8#53
DNS server aliases:

Host securityweek.com not found: 2(SERVFAIL)
Received 34 bytes from address 91.199.22.8#53 in 122 ms

Subdomains (the first 50)

Typos (misspells)

aecurityweek.com
zecurityweek.com
xecurityweek.com
decurityweek.com
eecurityweek.com
wecurityweek.com
swcurityweek.com
sscurityweek.com
sdcurityweek.com
srcurityweek.com
s4curityweek.com
s3curityweek.com
sexurityweek.com
sevurityweek.com
sefurityweek.com
sedurityweek.com
secyrityweek.com
sechrityweek.com
secjrityweek.com
secirityweek.com
sec8rityweek.com
sec7rityweek.com
secueityweek.com
secudityweek.com
secufityweek.com
secutityweek.com
secu5ityweek.com
secu4ityweek.com
securutyweek.com
securjtyweek.com
securktyweek.com
securotyweek.com
secur9tyweek.com
secur8tyweek.com
securiryweek.com
securifyweek.com
securigyweek.com
securiyyweek.com
securi6yweek.com
securi5yweek.com
securittweek.com
securitgweek.com
securithweek.com
securituweek.com
securit7week.com
securit6week.com
securityqeek.com
securityaeek.com
securityseek.com
securityeeek.com
security3eek.com
security2eek.com
securitywwek.com
securitywsek.com
securitywdek.com
securitywrek.com
securityw4ek.com
securityw3ek.com
securitywewk.com
securitywesk.com
securitywedk.com
securitywerk.com
securitywe4k.com
securitywe3k.com
securityweej.com
securityweem.com
securityweel.com
securityweeo.com
securityweei.com
ecurityweek.com
scurityweek.com
seurityweek.com
secrityweek.com
secuityweek.com
securtyweek.com
securiyweek.com
securitweek.com
securityeek.com
securitywek.com
securitywek.com
securitywee.com
escurityweek.com
sceurityweek.com
seucrityweek.com
secruityweek.com
secuirtyweek.com
securtiyweek.com
securiytweek.com
securitwyeek.com
securityewek.com
securityweek.com
securityweke.com
ssecurityweek.com
seecurityweek.com
seccurityweek.com
secuurityweek.com
securrityweek.com
securiityweek.com
securittyweek.com
securityyweek.com
securitywweek.com
securityweeek.com
securityweeek.com
securityweekk.com

Location

IP: 173.203.107.14

continent: NA, country: United States (USA), city: San Antonio

Website value

rank in the traffic statistics:

There is not enough data to estimate website value.

Basic information

website build using CSS

code weight: 56.32 KB

text per all code ratio: 24 %

title: Information Security News, IT Security News & Expert Insights: SecurityWeek.Com

description: IT Security News and Information Security News, Cyber Security, Network Security, Enterprise Security Threats, Cybercrime News and more. Information Security Industry Expert insights and analysis from IT security experts around the world.

keywords: Information Security News, IT Security News, cyber threats, enterprise security, cloud security, cybercrime news, virus, malware, network security, Trojan horses, worms, antivirus, access control, identity management, firewall, encryption, Denial of Service, DDoS, threat reports, risk management, mobile device management

encoding: utf-8

language: en

Website code analysis

one word phrases repeated minimum three times

PhraseQuantity
Security16
and16
the11
Read10
to10
More..10
of8
in6
Malware6
by5
Management5
with5
that4
Akamai4
IT4
Force3
The3
security3
Papers3
Data3
Compliance3
Sony3
White3
on3
Air3
News3

two word phrases repeated minimum three times

PhraseQuantity
Read More..10
Security News3
in the3
Air Force3
White Papers3

three word phrases repeated minimum three times

B tags

U tags

I tags

images

file namealternative text
Information Security News, IT Security News & Expert Insights: SecurityWeek.Com
long dotted
Chris Poulin's picture
Wade Williamson's picture
Jon-Louis Heimerl's picture
Jeff Hudson's picture
Robert Vamosi's picture
Eric Schou's picture
Marc Solomon's picture
Rod Rasmussen's picture
Eric Knapp's picture
Chris Hinkley's picture
subscribe_icon_54
Become a Fan on Facebook
Subscribe via RSS
Smart Device Security Information
Wired Business Media

headers

H1

H2

IT Security News Headlines

NEWS & INDUSTRY UPDATES

SecurityWeek Experts

H3

IT Security News Headlines

NEWS & INDUSTRY UPDATES

SecurityWeek Experts

H4

H5

H6

internal links

addressanchor text
Information Security News
Newsletters
Black Hat 2011
WRITE FOR US
Free Subscription
White Papers
Webcasts
Events
Contact Us
Malware & Threats
Vulnerabilities
Email Security
Virus & Malware
White Papers
Desktop Security
Cybercrime
Cyberwarfare
Fraud & Identity Theft
Phishing
Malware
Tracking & Law Enforcement
Whitepapers
Mobile & Wireless
Mobile Security
Wireless Security
Risk & Compliance
Risk Management
Compliance
Privacy
Whitepapers
Security Infrastructure
Cloud Security
Identity & Access
Data Protection
White Papers
Network Security
Application Security
Management & Strategy
Risk Management
Security Architecture
Disaster Recovery
Incident Management
Training & Certification
Black Hat
Gartner: Enterprise IT Spending to Reach $2.7 Trillion in 2012, Time to Re-Imagine IT
China Blocked by US in Network Bid Due to Security Concerns
Application Security, Inc. Increases DAM Offerings
Researchers Analyze Hacker Forums
RIM Offers Free Apps and Support Following Service Interruptions
Symantec Unveils Anti-Malvertising Solution Powered by Armorize
Read More..
General Dynamics Awarded $86M Cyber Security Contract by Defense Intelligence Agency
Read More..
Join us at The AMPHION Forum 2011 Medical
Read More..
SEC May Require Companies to Disclose Data Breach Incidents
Read More..
Air Force Officials Share Details on Malware That Infected Drone Systems
Read More..
Information-Stealing Android Malware Targets Netflix Customers
Read More..
Akamai Unveils New DDoS Protection and Compliance Solutions
Read More..
LogRhythm Updates Its SIEM Platform with Pattern Recognition and Remediation
Read More..
RSA's "Trial by Fire" Caused by Two State-Sponsored Groups
Read More..
Sony Attacked Again: Attackers Used Login Data Stolen from Other Sources
Read More..
››
Chris Poulin's picture
Practical SIEM Deployment
Chris Poulin
Network Security
Read full story
Wade Williamson's picture
Getting Your Hands Dirty In the Fight on Malware, Part 2
Wade Williamson
Malware
Read full story
Jon-Louis Heimerl's picture
A Day in the Life of Privacy
Jon-Louis Heimerl
Privacy
Read full story
Jeff Hudson's picture
The Encryption Advantage: Simple Steps to Protect your Valuable Information
Jeff Hudson
Incident Management
Read full story
Robert Vamosi's picture
Man-in-the-Middle Attacks on Voting Machines: Vote Early, Often, and Why Not Vote Remotely?
Robert Vamosi
Vulnerabilities
Read full story
Eric Schou's picture
Accurate User Identification - a Key Element for Robust Database Security
Eric Schou
Security Architecture
Read full story
Marc Solomon's picture
Using Network Segmentation to Protect the Modern Enterprise Network
Marc Solomon
Network Security
Read full story
Rod Rasmussen's picture
Why DNS Firewalls Should Become the Next Hot Thing in Enterprise Security
Rod Rasmussen
Security Infrastructure
Read full story
Eric Knapp's picture
Son of Stuxnet: Is SCADA the New Low Hanging Hacker Fruit?
Eric Knapp
Security Architecture
Read full story
Chris Hinkley's picture
Just Because Your Business is Compliant Doesn't Mean It's Secure
Chris Hinkley
Compliance
Read full story
››
Most Recent
Most Read
Gartner: Enterprise IT Spending to Reach $2.7 Trillion in 2012, Time to Re-Imagine IT
Practical SIEM Deployment
China Blocked by US in Network Bid Due to Security Concerns
Application Security, Inc. Increases DAM Offerings
Researchers Analyze Hacker Forums
RIM Offers Free Apps and Support Following Service Interruptions
Symantec Unveils Anti-Malvertising Solution Powered by Armorize
Getting Your Hands Dirty In the Fight on Malware, Part 2
A Day in the Life of Privacy
General Dynamics Awarded $86M Cyber Security Contract by Defense Intelligence Agency
Hacker Uses XSS and Google Street View Data to Determine Physical Location
The Rise of the Small Botnet
An Inside Look at Hacker Business Models
Defense Department’s Cyberwar Credibility Gap
Are Nigerian Scams From Nigeria?
ATM Hacking Video - Barnaby Jack Demonstrates ATM Hacking at Black Hat USA 2010
The Top Five Worst DNS Security Incidents
The Three Providers Who Decide Whether You Will Be Hacked
China’s Cyber Threat Growing
The Root is Signed with DNSSEC - Now What?
Staring into the Eye of the Beast - Hackers are One Step Ahead
How to Defend Against DDoS Attacks
Preparing Organizations for a New Era of Compliance
Using Guilt Instead of Cryptography
A Look Inside the Bustling Cybercrime Marketplace
Smart Device Security Information
Information Security News
IT Security News
Risk Management
Cybercrime
Cloud Security
Application Security
Smart Device Security
IT Security Newsletters
Events
Comments
Most Read
Submit Tip
Team
Advertising
Events
Writing Opportunities
Feedback
Contact Us
Wired Business Media
Privacy Policy
Terms of Use

external links

addressanchor text
img
img
subscribe_icon_54
Become a Fan on Facebook
subscribe_icon_54
Subscribe via RSS
Twitter
Facebook
LinkedIn Group
Stuxnet Group on LinkedIn
RSS Feed
subscribe_icon_54
Subscribe via RSS