Some sites are no longer with us... however they remain legends in time!

.::News::.

Wednesday, April 11, 2018

Cloudflare-DNS Resolver



What is a DNS Resolver?
Domain name resolvers are the names given to computers, commonly located with Internet Service Providers (ISPs) or institutional networks that are used to respond to a user request to resolve a domain name. These computers translate a domain name into an IP address.


What is a Open DNS Resolver?
An Open DNS Resolver is any DNS resolver that is publicly accessible, and willing to resolve recursive queries for anyone on the internet. 


Who is Cloudflare?
Cloudflare, Inc. is a U.S. company that provides a content delivery network, DDoS mitigation, Internet security services and distributed domain name server services, sitting between the visitor and the Cloudflare user's hosting provider, acting as a reverse proxy for websites. Cloudflare's headquarters are in San Francisco, California, with additional offices in London, Singapore, Champaign, Austin, Boston and Washington, D.C.


What they say?
Cloudflare’s mission is to help build a better Internet and today we are releasing our DNS resolver, 1.1.1.1 - a recursive DNS service. With this offering, we’re fixing the foundation of the Internet by building a faster, more secure and privacy-centric public DNS resolver. The DNS resolver, 1.1.1.1, is available publicly for everyone to use - it is the first consumer-focused service Cloudflare has ever released. The DNS resolver, 1.1.1.1, provides, on day-one, all defined and proposed DNS privacy-protection mechanisms for use between the stub resolver and recursive resolver. For those not familiar, a stub resolver is a component of your operating system that talks to the recursive resolver. By only using DNS Query Name Minimisation defined in RFC7816, DNS resolver, 1.1.1.1, reduces the information leaked to intermediary DNS servers, like the root and TLDs. That means that DNS resolver, 1.1.1.1, only sends just enough of the name for the authority to tell the resolver where to ask the next question.


The DNS Resolver, 1.1.1.1 is also supporting privacy-enabled TLS queries on port 853 (DNS over TLS), so we can keep queries hidden from snooping networks. Furthermore, by offering the experimental DoH (DNS over HTTPS) protocol, we improve both privacy and a number of future speedups for end users, as browsers and other applications can now mix DNS and HTTPS traffic into one single connection.


Visit the blog to learn more and give the open service a try today! We have tested this on our personal computers and found it to be a very lucrative alternative to other DNS Resolvers that are sluggish.

Friday, April 6, 2018

Vera Crypt


What does VeraCrypt bring to you?

What they have to say:
VeraCrypt adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks.
VeraCrypt also solves many vulnerabilities and security issues found in TrueCrypt.

As an example, when the system partition is encrypted, TrueCrypt uses PBKDF2-RIPEMD160 with 1000 iterations whereas in VeraCrypt we use 327661. And for standard containers and other partitions, TrueCrypt uses at most 2000 iterations but VeraCrypt uses 655331 for RIPEMD160 and 500000 iterations for SHA-2 and Whirlpool.

This enhanced security adds some delay only to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted data.

Starting from version 1.12, it is possible to use custom iterations through the PIM feature, which can be used to increase the encryption security.

Starting from version 1.0f, VeraCrypt can load TrueCrypt volume. It also offers the possibility to convert TrueCrypt containers and non-system partitions to VeraCrypt format.

Since open source is the way to go now days we suggest using this tool for your OS encryption needs!

Saturday, March 31, 2018

DDoS-Guard


What do they have to say about this service?

DDoS-GUARD is one of the leading companies on the European market of protection against DDoS attacks by price/quality ratio. What sets us apart from many competitors?
Own infrastructure of unique filtration nodes, developed and regularly upgraded by the company’s specialists.
Geodistributed filtering network. The nodes are located in major data centers in different countries: Germany, the Netherlands, Russia, USA, China and Japan. The network is steadily expanding.
Huge channel capacity of 1.5 Tbps with the possibility of a “hot” extension at the customer's request can provide protection against attacks of any power and complexity, including IP malformed, ICMP flood, TCP SYN flood, TCP-malformed, ICMP smurf, SlowLoris, HTTP POST flood, HTTP SLOW POST and others.
Own equipment allows us to not depend on third-party suppliers and their prices, giving us an opportunity to implement a flexible pricing policy across the whole spectrum of our services.
Customer focus. It is important for us not only to promptly activate the service, but also to provide a proper operation for the customer regardless of cost categories of service provided.

What else  do they say?
Reliability of DDoS-GUARD is appreciated among numerous companies
We are trusted by more than 6 000 businesses worldwide

What can they offer?

Attacks and protection against them such as listed below.

Amplification:
The process of increasing the volume of traffic

Bot (Zombie):
A zombie (also known as a bot) is a computer that a remote attacker has accessed and set up to forward transmissions (including spam and viruses) to other computers on the Internet

Firewall:
Firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules

Spoofed packet:
Spoofed packet is an Internet Protocol packet created from a spoofed or fake IP address but is impersonating to be a legitimate and authentic sender

DDoS attack:
A DDoS attack (Distributed Denial of Service attack) is a complex of actions aimed at fully or partially rendering an online resource unavailable to its intended users. Almost any online resource can be targeted: a website, a game server, or a public resource.

Ban list:
The list of clients banned to perform certain actions.

Website protection via traffic proxying:
In this case, all traffic is routed through a special-type proxy server, which is a hardware-software filtering complex, acting as an intermediary for loading and returning the content of different web sites.

SYN cookies:
*A key element of the method used to protect against SYN flood attacks.

They offer the best protection for all your networking needs such as:
*Website
*Game Server
*Server
*Data Center
*Corporate Networks

To break it down it is basicaly protected hosting sevalence provider withRound-the-clock availability for all of your your websites/servers needs such as listed.

High Risk protection:
*A unique approach for unique customers

Game protection Lite:
*DDoS protection for entry level game projects

Game protection Prime:
*Serious DDoS protection for advanced game projects

Protected VDS Lite:
*Flexible service plans affordable to everyone! Protect up to 3 domains at L7 OSI. Low priority helpdesk response time

Protected VDS Prime:
*Maximum opportunities for your business: priority support and unlimited protection at all levels

Protected Servers:
*Maximum performance combined with DDoS protection for any purpose

 Recommended by us: Snapcrackerz-Team and therefor looks to be a promising approach to say the least. check into it today!

Saturday, March 17, 2018

Top Alternative To


What is TopAlternativeTo all about?

What they say:


Most of the software, programs, games and application available on internet are not totally free. Some contains fixed price and some are against periodically subscription payment. To make it easy for the users to get the alternatives of these costly products or at minimum price, came into field with the intention of providing the users the alternatives and relative software of a specific software they are searching for.


This will display the software, program and applications for PCs, iOS, Android and other operating systems into categories so that the users can filter out the desired results instantly and conveniently. We will always come with the latest version of the best alternatives of software and programs that will be of best rating, malware/adware/viruses free, and will be without any extra toolbars, ad-ons or installers.


TopAlternativeTo will surely make it easy of our users to make the better decision when they are planning to use any program. Our users will get here the free detail of every program listed, reviews of programs, download links (subject to availability) and much more.

Looks to be a promising web site with a future to say the least! Visit and try it out today!

Tuesday, July 4, 2017

Cracking Patching


What is CrackingPaching website all about you may ask yourself?
Here is the little that's published or known as far as the details from the web has managed to crawl about it:

Free Softwares?
CrackingPatching website basically based on concept to facilitate others by offering cracked or patched software and help people to avoid trial periods / annoying pop-ups. Our team members only cracking software for educational/ recreational purposes only and able the end user to experience the software and urge them buy software from original developers because they deserve it.

We do not  condone downloading and cracking software however if you do test it out purchase it to support its developers.Before even attempting anything get a good reliable VPN that supports your torrent files client. That being said enjoy your endeavours.... Visit and check it out today!

Thursday, June 13, 2013

TorVPN

 TorVPN

What is TorVPN all about and what they have to say about it?
TorVPN is a VPN service provider offering a quick and simple solution for accessing the internet without content filters.

 TorVPN is great for bypassing strict content filters, browsing the web anonymously, securing your VOIP communications or remote access to your home/office workstation.

 Is it a useful VPN service?
 * Our fast server enables you to see the internet through our eyes - without censorship.
 * In China? Configure your VPN user to only route Facebook, Google, and Twitter.
 * Not admin? No problem! Use SSH tunnelling to create a dynamic SOCKS proxy.
 * Combine features: enter with SSH, tunnel a VPN connection, enable transparent TOR.
 * Using Macintosh, Linux or Android? No problem! OpenVPN is supported on all platforms.
 * Option to access .onion sites through the VPN with ease.

 What do they offer?
 * An OpenVPN server. A transparent solution for encrypted communication..
 * An SSH server. Connect securely, use SSH tunnelling or port forwarding.
 * A PPTP VPN server. Connect to TorVPN with the built-in Windows private networking.
 * A SOCKS proxy. You can easily set up your browser to use it directly.
 * A TOR proxy. A SOCKS proxy that uses the TOR network.
 * A control panel with advanced features.

Recommended as yet another fine alternative to achieve your anonymity online like so many others and rates right up there with the top VPN services. Visit today and find out more!


Saturday, May 25, 2013

SafeIP

 SafeIP

Hide your IP address and protect your online identity with SafeIP.

Anonymous proxy IPs help hide your true online identity and unblock websites. Protect your online identity by hiding your IP from websites, email, games, and more.Secure Secure SSL proxy encryption with WiFi protection. Encrypt all your Internet traffic with a private proxy, either browsing at home or on public WiFi hotspots. Fast unlimited access to unblock any website.
Choose the anonymous IP location closest to you for the fastest connection speeds. Free download for Windows with no ads or expiration.


SafeIP can be used completely free for unlimited use, without advertisements and never expires.
As always there are plenty of IP tools plastered across the web here is yet another decent add free
tool to help you accomplish this goal! Visit and try it out today!




Friday, March 15, 2013

DNS Leak

 DNS Leak

What is a DNS leak and why should I care?

Here is what they have to say about it:
When using an anonymity or privacy service, it is extremely important that all traffic originating from your computer is routed through the anonymity network. If any traffic leaks via the underlying connection, any entity monitoring your traffic will be able to log your activity.
DNS or the domain name system is used to translate domain names such as www.privacyinternational.org into numerical IP addresses e.g. 123.123.123.123 which are required to route packets of data on the Internet. Whenever your computer needs to contact a server on the Internet, such as when you enter a URL into your browser, your computer contacts a DNS server and requests the IP address. Most Internet service providers assign their customers a DNS server which they control and use for logging and recording your Internet activities.
Under certain conditions, even when connected to the anonymity network, the operating system will continue to use its default DNS servers instead of the anonymous DNS servers assigned to your computer by the anonymity network. DNS leaks are a major privacy threat since the anonymity network may be providing a false sense of security while private data is leaking.

Visit and run a test today!

Monday, March 4, 2013

Top Site

 topsite.com

 What is TopSites all about and what they say about it?
Based on our revolutionary related content search technology, Topsite is the latest addition to the SimilarGroup family of Web properties and applications.
TopSite.com searches the Web, first collecting sites, then applies our proprietary technology to group sites by topic, finally assigning a rank to each site. The result is a list of the best sites for each category.

The biggest benefit of our technology is that all users can quickly find the best sites in their field of interest, and do so without having to master complicated searches queries and spend hours of digging through irrelevant results.

Using TopSite.com simply search for a topic and choose from one of the results. Each results page contains several relevant sites for the chosen topic, and these results are ranked from best to worst. For most users, the top website result should be a great match for the searched term.

We recommend this site to find more relevant top ten listings of any given search and is easy to use. 

Saturday, March 2, 2013

Mighty Duck

 DuckDuckGo.com

DuckDuckGo has been out for awhile and is a handy search engine that do not track your searches you make like google and other huge search providers. So that being said we have posted about it hear for those who may not have tried or heard of it yet.


                                  Lets hear what the MightyDuck has to say about about it?

They offer many other features such ass the ability to add it to your browser along with your other search engines. DuckDuckGo is a general purpose search engine. The Have also created a platform called DuckDuckHack that enables developers to write open source plugins on top of the search engine (like add-ons for Firefox). DuckDuckGo plugins react to search queries and provide useful instant answers above traditional links. So give it try and see what you think Visit

UC Sniffer

 UCSniff
We often come across many tools over the years and many never even get used. So we like to share the ones that we have tried and found useful for what ever reasons may be. UCSniff is simply put a very useful tool to have in your toolbox. This is an open source project and made free to the public.

The developers overview!
UCSniff is a VoIP /IP Video Security Assessment tool that integrates existing open source software into several useful features, allowing VoIP and IP Video owners and security professionals to rapidly test for the threat of unauthorized VoIP and Video Eavesdropping. Written in C/C++, and available on Linux and Windows, the software is free and available for anyone to download, under the GPLv3 license.

They have plenty of help guides and tutorials to get you started as well as other products available.
Try out UCSiff and leave the developers some feed back at http://ucsniff.sourceforge.net/

Friday, March 1, 2013

Toolsvoid

 Toolsvoid.com

 About this free service?
 Toolsvoid.com is a free online service that offer various and useful tools for webmasters, security researchers and system administrators. We have a vast range of network tools, string manipulation tools, hashing tools and regex tools. You don't have to register to use the service, it's completely free.

Toolsvoid.com is networked with novirusthanks.org and offers up to the public free useful online networking tools and more! We are always researching and posting about sites like this to help our readers have a wide range of information all in one place!

Worth visiting and checking out all the free services available to the public!
Visit Today

Thursday, February 28, 2013

DownBlocked

 downblocked.com
What they say about it?
DownBlocked.com answers a straightforward question - Is a website down just for you or for everyone else. We test the website by trying to connect to the server and see if it is responding. We also get all the DNS A records (IP addresses) of the domain name and check all of them.

A website may be down because of several reasons:

    The website is performing maintenance. In this case, just wait for an hour and check it again.
    The domain name has been blocked by your firewall. This firewall could be running on your computer (like ZoneAlarm, or Windows firewall) or it could be blocked by your ISP (Internet Service Provider). If the latter, you cannot do much. If the former, check your firewall and see if the website is blocked.
    The domain name's DNS has not been setup correctly, or its name servers are not working properly. In this case, we recommend you contact the admin contact of the domain name and let him know that the website is down. You may also check the DNS configuration at SolveDNS
    Another possibility is that the website has changed servers and the DNS settings have not propagated completely. In this case, just wait for an hour and check the domain name again.
    It is also possible that your internet connection is down.
    Another reason could be that the DNS of the website has recently changed and your computer has the wrong cached DNS entries. In that case, on a windows machine, use "ipconfig /flushdns" on the command prompt.
    If nothing works, contact your internet service provider support and see if they can help.

There are other similar services such as downforeveryoneorjustme that we have posted about in the past so here is yet another to add to your list.
Try  it out today!

Friday, February 15, 2013

TvPc

 TVPC
What is TVPC all about?
This is a great site to watch free TV from all over the world offering links to live programming streams such as HBO, Showtime, Cinemax, History Channel, Discovery, FX, ESPN, CNN, Fox News, MSNBC, and many, many more for free. We have posted about sites such as this in  the past however this one by far is one of the best out there to watch your favorite shows or movies ect.

Not only does it offer US programming it also hosts links for live streaming content from just about every country in the world from Afghanistan to Peru, from the UK to Australia.

 TVPC also offers you to host your own content and get paid using your own google adsence user ID.
Visit and check it out today!

Monday, February 4, 2013

Clickandsend

 www.clickandsend.com

Send personal and business emails with unlimited file size free!

While still in beta phase lets see what they have to offer?
 No Installations:
There is nothing to download. No signup fees. No cancellation fees or long term contracts. Just click and send it.

Works with any email address:
Send and receive files using your existing personal or company email address – all messages will appear in your existing inbox (e.g. Gmail, Yahoo, AOL, Outlook etc).

Unlimited attachments:
Sending a single large file or thousands of files, your recipient will receive those files regardless of their mailbox size limit.

Free to send and receive files:
While they offer optional paid features to the sender, it’s always free for the recipient to view and download files

Mobile & Tablet Friendly:
Click and send works with Mac, PC, tablets  mobile phones. All latest browsers are supported (e.g. Chrome, FireFox, Internet Explorer, Safari etc.)

Message Tracking:
Track in real time when your secure private email message has been viewed with option to retract & destroy the message after it was already sent.

This is simply a fantastic service and can be very handy as far as what your able to send and receive.Visit and download today!


Lockbin

 Lockbin
What is Lockbin?
Lockbin is a web application for sending private email messages and files. It's free! People use it to send things like credit card numbers or confidential information.
Why can't I just use email?
Lockbin ends message persistence, which means your email message will not be backed up on email servers or stored in backup files. Network sniffers can also spy on your email traffic while in transit. Use Lockbin to obscure the content of your message and avoid these hazards to your privacy.
How does it work?
No registration is required to use Lockbin. Your message and file attachments are protected by strong AES-256 bit encryption and your secret password. You invent the password and deliver it to the recipient using a phone, text message, instant message, homing pigeon, but not email. 

We have posted about many online email encryption tools and services and here yet another to add to the list. Easy and simple to use and like all others can come in handy for your own personal reasons!

 Lockbin protects messages in transit with 256-bit TLS/SSL, while FIPS 140-2 verified AES-256 bit encryption protects messages at rest. Supports: Windows/Linux/Mac.

Visit to find out more and try it out today!

Thursday, January 31, 2013

Mega

 mega.co.nz/

 What is MEGA all about?
We all know about the shut down of the famous file sharing site MegaUpload right?
Recently the owner has created a newer Beta site and it is ready for the up-loaders to
engage and try this new and improved sharing experience! Keep in mind like most
sites they start out in Beta test phase to work out the bugs and kinks to help improve
the end user experience.

What they say about it?
We are a dedicated group of technologists who were given the time, opportunity and Internet access to build an awesome cloud storage service that will help protect your privacy. We have programmed this Internet service from scratch in Auckland, New Zealand. Unlike most of our competitors, we use a state of the art browser based encryption technology where you, not us, control the keys. Our design group includes Kim Dotcom, Mathias Ortmann, Bram van der Kolk, and Finn Batato. Our CEO, industry veteran Tony Lentino, has experience running a renowned global domain registry. We hope you like it. 

About the new service?
 MEGA is a so-called cloud storage provider. It offers free and paid Internet-accessible storage space and bandwidth. It allows you to store and access your files from within your browser or through dedicated client applications.

What does MEGA stand for?
 MEGA is a recursive acronym and stands for "MEGA Encrypted Global Access".

Are there any file size limits?
We do not impose artificial limits on file sizes other than your available cloud drive space. However, some legacy or technically inadequate browsers require the entire file to be stored in memory for downloading (Firefox, IE10, Opera), or for both downloading and uploading (IE9, Safari 5).

Is support for up or downloaded files supported?
Yes, as long as you do not close the browser tab, up- and downloads will resume automatically after e.g. a network interruption or your device having entered standby/sleep mode. Please note that our servers automatically discard incomplete uploads after 48 hours of inactivity. 

Like most cloud based file hosting there are free as well as premium accounts available depending on your needs. Visit and give it a test drive today!   UPDATE: KIM DOT COM

Tuesday, January 29, 2013

Calling Vault

 www.callingvault.com

What is this new beta service all about?
Callingvault gives you a fully-functioning phone line and a simple, intuitive platform for managing your conversations. Your CallingVault line has the ability to send and receive calls, SMS and MMS messages and can receive voice mail as well. Manage all of your conversations through a powerful and easy-to-use web app from any web-enabled device. This is a must have option for spoofing your
real phone number and get rid of or block unwanted calls!

Even though it is in still in beta testing mode rest assure it can prove to be very productive and
essential for other reasons as well! Get your self a second number for security reasons today and
redirect your calls as needed today! Get started while still in beta testing phaze!.

*Update they have moved to full version and all beta testers can still log in with same info!
If server is down hang tight till they launch the Full release!

Saturday, January 26, 2013

Exploit Shield

 Exploit Shield

What about ExploitShield by Zero Vulnerability Labs?
ExploitShield was released the later part of 2012 and is currently in beta2 test mode.
It is being offered for free for beta testers to evaluate and try out!

                                          Exploit Shield in action....

 What they say?
Every week new financial, state-sponsored and commercial espionage targeted attacks are discovered. These sophisticated advanced persistent threats use arsenals of vulnerability exploits that are weaponized to steal confidential information and trade secrets. Organizations remain infected while security companies rush to develop updated signatures for an outdated security model.

 ExploitShield protects users where traditional security measures fail. It consists of an innovative patent-pending application shielding technology that prevents malicious exploits from compromising computers through software vulnerabilities.

Supports:
  • Windows 8, Windows 7, Windows Vista or Windows XP.
  • ExploitShield runs as both 32bit and native 64bit.
Visit developers site to find out more today!

Friday, January 18, 2013

Similar Sites

 /www.similarsites.com
  About Them?
SimilarSites.com is an innovative Recommendation Engine for websites that scours the Internet to deliver the most similar websites according to a specific website or topic of your choice. Cut through the clutter of the web by finding the most relevant similar sites based on related content, website structure, link analysis algorithms, detailed user surfing behaviors and a large community of user rankings.
Using more than 30 unique Similarity Engines, our technology takes a snapshot of the inside and outside of a website. Once analyzed, we categorize the site with our huge index of data to help you get the very best similar results depending on what you are looking for.

How to use this site?
Search by Url:
Type in the name of a website in our search field. You will see up to 25 results showing similar websites. From these results, you can understand how websites are connected based on:
  • Content - driving factor that makes sure a similar result has the same text or images as another website
  • Keyword Density - measures how many times a specific word or phrase is used on a homepage in comparison to the total amount of text on that specific page
  • Topic/Tagging Similarities - grouped characteristics that describe the overall website
  • Websites Also Visited - analyzes actual browsing data that shows what websites people are mostly likely to jump to from a specific website
  • User Rating and Reviews - community generated opinions by real human beings
Search by Topic:
Type in the keyword or topic of your choice into our search field. A list of up to 10 results will show that are the most relevant websites in our database. This well enable you to avoid the hassle of navigating to unknown websites and help you find the most similar websites which you can then browse based on similar sites or even more detailed topics.

This is simply a great search tool to find more of what your looking for fast!
Visit and try it out today!

Tuesday, January 15, 2013

Security Kiss

 www.securitykiss.com

Whats is free SecurityKiss  Tunnel all about?

Secure your Internet connection with SecurityKISS VPN Tunnel.
We are a leading VPN provider to protect privacy, ensure anonymity and bypass Internet restrictions.


 Smart & Simple!
Easy to use
No registration, No usernames, No passwords
Download, Install, Connect - and you are secured
Long server list to select from
OpenVPN, PPTP and L2TP protocols
All platforms supported
High anonymity - only minimum information logged

 Free For Lifetime!
Free to download
Free to use for lifetime
Daily traffic limit in the free version
Unlimited switching between servers
All operating systems supported in the free version
No ads, 100% clean
Genuine non-automated help desk even for free use

 Fast & Secure!
Uncapped speed
Online data compression guarantees high speed
Every copy of the program is unique
Real 1024-bit security
Session keys renegotiated every hour
Built-in Exclusive Tunneling
Full version with additional dedicated fast servers
Instant account activation

As always there are plenty of VPN services available out there that we have posted about however
this is quick and simlpe to use. The free service allows up to 300MB of data a day wich is decent.
Even the rate planes for extended data service are cheaper than most others. This is simple clean
no ads even on the free for life version. Visit and try today!




Monday, January 14, 2013

Encipher IT

 encipher.it

What does Encipher.It offer?
Encrypting email with Encipher.it is a simple way to protect your sensitive data. You can encrypt emails with your private info and only the recipient can decrypt it with correct password. To deal with email encryption you have to type the message in Gmail or any other email web service, click on Encipher It button and create a password. In the same way you can encrypt messages in Facebook or any other social networks and web services. You need only to enter your message in a text field, use bookmarklet and type a password to encrypt message.

                                Watch the video tutorial to see how to use it!



 There are many alternatives to performing an encrypted email however this is a quick and simple solution and it works! Visit and try it out today!

HackHound

http://hackhound.org/forums/page/index.html

What is HackHound all about?
HackHound is a community of Security and Programming Enthusiasts who coexist to form a friendly and productive Forum dedicated to providing a fair, safe and enjoyable environment for it's members.
We are focused on the teaching and development of Computer/Network Security and Programming within the Security Scene.
Security through insecurity is what they say! Visit and join up today!

The Exploit Database

 

The Exploit Database (EDB) – an ultimate archive of exploits and vulnerable software. A great resource for penetration testers, vulnerability researchers, and security addicts alike. Our aim is to collect exploits from submittals and mailing lists and concentrate them in one, easy to navigate database.

Brought to you by Offensive Security is a must book mark for any security research and developer visit today!

Sunday, January 13, 2013

Mailinator


  • What is Mailinator?
    Mailinator is a different kind of email service. The biggest difference is that you don't need to sign up. Any email name you can think of already exists at Mailinator.com. Want BrianTheSkink@mailinator.com? You got it. Want to be JacquesKooStow? ScaryGavyn? GraysonTheMason? No problem. They exist when you create them and they are just waiting for you to check your inbox.
  • How is Mailinator different than some other web email, like Yahoo or Hotmail?
    Mailinator is fundamentally quite different from other services. Other services like Gmail or Yahoo allow you to actually send email. You cannot send email from Mailinator. After several hours, all email is auto-deleted. A Mailinator email inbox can be read by anyone. There is no real security here. Mailinator has strict rules about what kind of email it receives. Plain text is best, html is filtered. Images, attachments, and fancy stuff are simply stripped away.
    The upside is that Mailinator requires no sign-up. Send email to a name, and the account is created automagically.
    In a nutshell, other services provide more functionality but require a sign-up (which takes time, even if you falsify all the information anyway). Mailinator provides less, but requires no sign-up.
  • Do I want this?
    Are you Kidding? YOU SURE DO !
    In our internet world, you often need an email address NOW. Signing up for an email service takes time. That's probably ok for most emailing, but every now and then you need a quick email address for just a single email. After that you don't care what happens to it. Given that such an email address is ready in an instant, you can avoid giving out your real email address when you are afraid of getting spammed. Instead, make up any address @mailinator.com on the spot and go check it later.
  • So Mailinator solves the Spam problem?
    Heck no. If it solved the spam problem it would probably be called IBMinator or MICROSOFTinator or something even catchier cuz we would have sold it and we'd be zillionaires off pursuing our real dream of helping nice people like Dr. Bahutu of Nigeria who keeps emailing us asking for our help transferring some funds.
    Mailinator gives you an opportunity to skirt one avenue that spammers use to spam you. It's just one extra tool in your spam-fighting toolbox.

    Probably a useful site to deal with spammers or using for pranks or whatever!

    Visit and join today! 

Online Beta

 www.onlinebeta.com

What is Online Beta all about? A beta test is the final step that companies go through to ensure that their products are ready to be released to their customers. This process generally involves providing a nearly-final product to customers, and collecting feedback from those customers. This feedback may include bug reports, feature ideas, surveys about important aspects of the product, and open user forum discussions. 

Is evaluating online products really free?
Yes. Evaluating products is free of any cost. You will never be asked to provide any credit card or other payment kind to OnlineBeta.com, Centercode, or any of our customers. 

What they say!
Thank you for your interest in OnlineBeta.com The purpose of this site is to match volunteer beta testers around the world with upcoming products in development that they are interested in. The following are the most common questions we receive about membership in our Community. 

What better way to try before you buy for the latest software products and give feedback to ensure
it does what you want it to do before its fully released to the public!

Visit and sign up free today!

Mibbit

 www.mibbit.com

Do you use IRC?
 Mibbit connects to IRC from anywhere on almost any device!
  • Full IRC functionality
  • Chat histories
  • Create your own channels
  • YouTube and Flickr inline
  • Colors and smileys
  • Multi-language UI
  • Live chat translation
  • Desktop notifications
  • Word filters
Search Mibbit and hundreds of IRC networks for places to chat.
  • Find places to chat
  • View trending channels
  • Browse IRC networks
  • See histories & usage
  • Channel bookmarks
  • Searchable histories
  • Private messaging
Perfect and easy to use chat client for IRC fans to place on your social networks or web sites!
Visit to try out today!

BTGuard - BitTorrent Anonymously