originalni file se najde na:
http://www.phaster.com/find_info_net_traffic.html

Web Utilities

 

Speedcheck                   Speedcheck is a simple internet speed test accompanied by a comprehensive speed tutorial. 

 

FYI a “hacker” is someone who programs for enjoyment, but the term has become synonymous with “cracker,” a person that performs an illegal act. If you are worried about crackers (and you should if you use any Micro$oft products and the internet) perform an internet connection security analysis (of commonly probed ports) and then consider using a Mac.

BTW if ya have a question then read the Hacking FAQ's else try the graffiti wall to post a question or share a comment about solar powered 802.11 nodes I designed and built for a community network.

The Internet Traffic Report monitors the flow of data around the world. It then displays a value between zero and 100. Higher values indicate faster and more reliable connections.
The Internet Traffic Report monitors the flow of data around the world. It then displays a value between zero and 100. Higher values indicate faster and more reliable connections.



 
WhoisWhois, can determine whether the domain name you desire is already in use (for example APPLE.COM); in addition you can learn who administers a particular site; and you can view a list of a site’s name servers.
Domain LookupEnter a domain (for example COM or CH which is short Switzerland), and you can get the name of the country for which that domain is associated.
eMail Dossie Validate and investigate eMail addresses (for example USER@HOSTNAME).
FingerIf you can pull a Finger, (for example USER@HOSTNAME) this will tell you various information about that account.
IP LookupIf the domain name has been activated (for example APPLE.COM), it will return a numerical value such as 17.254.3.183.
IP TargetingTarget the IP host in Latitude/Longitude (for example Micro$oft.COM), will return Lat, Lon: (47.675, -122.117), useful if you want to nuke the evil empire.
NMAPNMAP is a utility for port scanning large networks (for example APPLE.COM).
PINGThe ping utility sends a packet to the specified host (for example APPLE.COM) and waits for a reply. The host address and round-trip times for each pair of packets are displayed.
Port Number The Internet Storm Center gathers more than 3,000,000 intrusion detection log entries every day and providing authoritative data on the types of attacks that are being mounted against computer ports (for example 80 or 19).
Reverse DNSType in an IP address (for example 17.254.3.183) to find out the DNS or the Domain Name Server.
TracerouteTraceroute tracks the path taken by packets as they travel from source (the default is the San Diego Super Computer Center) to destination (for example APPLE.COM).
Traffic Rank The traffic rank (for example APPLE.COM) is based on aggregated historical traffic data from millions of Alexa Toolbar users and is a combined measure of page views and users (reach.)
UptimeReport a site’s (for example APPLE.COM) operating system, web server, and netblock owner together with, if available, a graphical view of the time since last reboot for each of the computers serving the site.

At Toorcon 2003 (Information Security Conference) a talk was given on utilities people in the know seem to find most useful. So FYI here a rough list of the top 20 hacking tools. FYI insecure.org has a list of top 75 Security Tools.

NessusThe "Nessus" Project aims to provide to the internet community a free, powerful, up-to-date and easy to use remote security scanner for Linux, BSD, Solaris, and other flavors of Unix.
EtherealEthereal is a free network protocol analyzer for Unix and Windows. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session.
SnortSnort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks.
NetcatNetcat has been dubbed the network swiss army knife. It is a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol
TCPdumpTCPdump is the most used network sniffer/analyzer for UNIX. TCPTrace analyzes the dump file format generated by TCPdump and other applications.
HpingHping is a command-line oriented TCP/IP packet assembler/analyzer, kind of like the “ping” program (but with a lot of extensions).
DNSiffDNSiff is a collection of tools for network auditing and penetration testing. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.).
GFI LANguardGFI LANguard Network Security Scanner (N.S.S.) automatically scans your entire network, IP by IP, and plays the devil's advocate alerting you to security vulnerabilities.
EttercapEttercap is a multipurpose sniffer/interceptor/logger for switched LAN. It supports active and passive dissection of many protocols (even ciphered ones)and includes many feature for network and host analysis.
Nikto

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 2500 potentially dangerous files/CGIs, versions on over 375 servers, and version specific problems on over 230 servers.

The project has been updated and moved to - https://cirt.net/Nikto2

++ guide to network vulnerability scanners (https://comparite.ch/nvscan)

John the RipperJohn the Ripper is a fast password cracker, currently available for many flavors of Unix.
OpenSSHOpenSSH is a FREE version of the SSH protocol suite of network connectivity tools, which encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other network-level attacks.
TripWireTripwire is a tool that can be used for data and program integrity assurance.
KismetKismet is an 802.11 wireless network sniffer - this is different from a normal network sniffer (such as Ethereal or tcpdump) because it separates and identifies different wireless networks in the area.
NetFilterNetFilter and iptables are the framework inside the Linux 2.4.x kernel which enables packet filtering, network address translation (NAT) and other packetmangling.
IP FilterIP Filter is a software package that can be used to provide network address translation (NAT) or firewall services.
pfOpenBSD Packet Filter
fportfport identifys all open TCP/IP and UDP ports and maps them to the owning application.
SAINTSAINT network vulnerability assessment scanner detects vulnerabilities in your network's security before they can be exploited.
OpenPGPOpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil Zimmermann.

A “Proxy” is an application that breaks the connection between sender and receiver, thus protecting your internet privacy (to some degree) while you are surfing. Enjoy the proxy gateway list(1) and list(2). If you’re curious, try Test Page for Web Anonymzing Services to test the various proxies yourself. Note as of 11/19/2001 those suffering from corporate oppression and Muslims in Saudi Arabia, UAE, etc. looking for porn better have alternative plans, because Safeweb turns off free service.

URL (for example APPLE.COM)
 
AnonymizerCotse.comproxify
SilenterSpaceProxyBugMeNot.com

The University of Toronto's Internet Censorship Explorer permits anyone with a Web browser to test the limits of certain national and organizational Internet-blocking schemes. Users simply enter a target URL and a country into a search field on the Censorship Explorer's website. The software then scans the ports of available servers in that country, looking for open ones.

If you’re interested in anonymous surfing (i.e. the phaster proxy gateway), and wondering is someone watching your every move, then you may also know eMail is not private (it is like sending a postcard that leaves a trail). So here is a list of free eMail services, some of which include a measure of security. B.T.W. if you have any browser privacy issues, I have Netscape Navigator secrets and tips on how to secure Internet Explorer.

Phaster computer security resources search includes: exploits/bugs, internet security tools, guides to ethical hacking, encryption, network security documentation, hacks, cracks, phreaking stuff, etc.

 

Select an ALT News Group - Google Powered


Serials 2000 and serials & keys are clearinghouses of serial numbers for thousands of commercial and shareware programs that allows a user to check out disabled features of demo programs and reinstall software you may have misplaced the keys for like Windows 98, Windows ME, etc.

If you’re a hacker or just curious, ya might want to check out CyberLaw an educational service focusing on legal issues concerning computer technology. CyberLex reports legal developments touching the computer industry and is distributed monthly throughout the United States. The Cyberlaw Encyclopedia is a large nexus on legal matters pertaining to cyberspace.

Buzz words like “Hacker” are used by the media, politicians, corporations and government agencies for so called (dis)information warfare (IW). B.T.W. looking for info on: anthrax, Bin Laden, Bush, etc?

 Center for Secure Information Systems
 Disinformation
 Federation of American Scientists: DoctrineLINK
 Joint Vision - how the U.S. military can exploit advanced technologies
 Psychological Operations/Warfare
 SIGNAL

Many factors such as: your modem speed, phone line quality (unless you are connecting with an ISDN line or a cable modem), computer hardware (processor speed, cache, etc.), and web traffic jams affect how fast you connect to the internet and how fast web pages load on your computer. The following links will test your internet connection speed.

Your browser has JavaScript turned off.
To use the internet connection speed tests, turn JavaScript on in your browser preferences.

Internet Explorer users: Preferences > Web Content > Enable Scripting
Netscape Navigator users: Preferences > Advanced > Enable JavaScript

 dslreports.com - speed test
 Bandwidth Speed Test
 Golden Hill Free Web JavaScript Bandwidth Test

Wi-Fi is an open-standard technology that enables wireless connectivity between laptops and local area networks and until reciently, wireless local area networks have been just another grass roots hobbyist technology. FYI a Wi-Fi protocol analyzer can help you plan and secure your network even if you don't use Wi-Fi

Since this “Hacked” page seems to have international appeal, try these computer-based translation systems (it might be good for a laugh or two).

 Arabic
 Español
 Français
 Deutsch
 Italiano
 Português
 Nederlands
 Norwegian

Since you have read this far, do ya think terrorism will end when rm -fr /bin/laden/? You can use the graffiti wall to post your own opinion on that question or ask one of your own.


 
 
 
 
 
 
News & Weather | Search Engines | Stock Quotes | Chat & eMail | Travel Info
Phone Directory & Road Maps | Encyclopedia | Hacking Tools | Shopping | Add URL | Home