Help
RSS
API
Feed
Maltego
Contact
Domain > wiretip.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-04-25
74.208.236.6
(
ClassC
)
Port 80
HTTP/1.1 200 OKContent-Type: text/html; charsetUTF-8Transfer-Encoding: chunkedConnection: keep-aliveKeep-Alive: timeout15Date: Mon, 09 Dec 2024 13:44:35 GMTServer: Apache html>head> title>www.WireTip.com/title> link relstylesheet typetext/css hrefwiretip.css>/head>body> table width100% height100% cellspacing0 cellpadding0> tr>td valigntop alignleft> table width100% cellspacing10 cellpadding0> tr> td valigntop width250> div classmenu> a href?about>About/a>br> a href?dictionary>nobr>The Devils Infosec Dictionary/nobr>/a>br> a href?axioms>Security Axioms/a>br> a href?maxims>nobr>Physical Security Maxims/nobr>/a>br> a href?HTSAIS>nobr>How to Suck at Information Security/nobr>/a>br> br> a href?pgp>PGP/a> br>br> a hrefhttp://zert.wiretip.com>ZERT mirror/a> /div> /td> td> center> div classtitle>The Devils Infosec Dictionary/div> div classtext>Originally posted at a hrefhttp://www.csoonline.com/read/080105/debrief.html>www.csoonline.com/a>/div>/center>hr>div classtext>div classitem>24/7/div>adj. The window of time in which systems are most vulnerable to attackbr>br>div classitem>Access Control List (ACL)/div>The operating system file that gives users access to files and programs they have no good reason to accessbr>br>div classitem>Analyst, security/div>A mercenary paid vast sums of money to tell you that your systems cant be securedbr>br>div classitem>Back door/div>A hackers front doorbr>br>div classitem>Backup/div>A process you dont need until you dont do itbr>br>div classitem>BC/DR (Business Continuity/Disaster Recovery Planning)/div>An alternate spelling for CISObr>br>div classitem>Biometrics/div>Strong authentication mechanism that streamlines insider attacksbr>br>div classitem>Bot/div>See Zombiebr>br>div classitem>Business case/div>A creative writing project, the quality of which is directly proportional to your security budgetbr>br>div classitem>Client/server/div>Two types of easily hacked computersbr>br>div classitem>Clean desk policy/div>What document users admit to ignoring during your intellectual property theft investigationbr>br>div classitem>Confidentiality, integrity and availability/div>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]