Help
RSS
API
Feed
Maltego
Contact
Domain > www.rewindproject.eu
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2016-03-23
174.37.110.28
(
ClassC
)
2025-02-07
3.163.19.60
(
ClassC
)
Port 80
HTTP/1.1 200 OKContent-Type: text/htmlContent-Length: 5415Connection: keep-aliveDate: Fri, 07 Feb 2025 23:37:02 GMTServer: ApacheLast-Modified: Mon, 20 Jul 2020 14:56:20 GMTAccept-Ranges: bytesCache-Control: max-age0, no-cache, no-store, must-revalidatePragma: no-cacheVary: Accept-EncodingX-Cache: Miss from cloudfrontVia: 1.1 05cf67c96e96cd376921ba5b65795a56.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P2X-Amz-Cf-Id: DyNdhBwHvpPg9CefSOUREcmnBM1dmD8WU2stbpxQrz43jDBIQbErbw !DOCTYPE html>html>head>meta charsetutf-8> title>Rewind Project/title> meta nameviewport contentwidthdevice-width, initial-scale1> link hrefcss/normalize.css relstylesheet typetext/css /> link hrefcss/rewind1.css relstylesheet typetext/css /> link hrefcss/rewind2.css relstylesheet typetext/css />script src../ajax.googleapis.com/ajax/libs/webfont/1.4.7/webfont.js>/script>script> WebFont.load({ google: { families: Open Sans:300,300italic,400,400italic,600,600italic,700,700italic,800,800italic,Inconsolata:400,400italic,700,700italic,Roboto:300,regular,500 } }); /script>script typetext/javascript srcjs/modernizr.js>/script> style typetext/css>.rp-nav {background: transparent !important;} .rp-nav-link {padding:3px 0 3px 0 !important;} .rp-nav-menu {float: left !important;}a.rp-nav-link.navlink_b {padding: 33px 17px 28px 18px !important;} /style>/head>body>div classrp-container page-container>div classrp-section nav_a_section>div classrp-nav nav_a data-animationdefault data-collapsemedium data-contain1 data-duration400>div classrp-container>nav classrp-nav-menu rp-clearfix nav_menu_a rolenavigation>div classrecent>LATEST POST:/div>a classrp-nav-link nav_a_link hrefwatermarking.html>watermarking as a means of protecting visual content/a>/nav>div classrp-nav-button>div classrp-icon-nav-menu> /div>/div>/div>/div>/div>div classrp-section nav_b_section>div classrp-row row_header>div classrp-col rp-col-5 logo_col>a classrp-inline-block hrefindex-2.html>img classlgo srcimages/rewind_logo.png width351 /> /a>/div>div classrp-col rp-col-7>div classrp-nav navbar data-animationdefault data-collapsemedium data-contain1 data-duration400>div classrp-container>nav classrp-nav-menu nav_b rolenavigation>a classrp-nav-link navlink_b hrefresampling.html>Resampling/a> a classrp-nav-link navlink_b hrefwatermarking.html>Watermarking/a> a classrp-nav-link navlink_b hrefcopy.html>Copy & move/a> a classrp-nav-link navlink_b hrefprivacy.html>Privacy/a>/nav>div classrp-nav-button>div classrp-icon-nav-menu> /div>/div>/div>/div>/div>/div>/div>div classrp-section hero>div classhero_header>h1 classhero_head>Digital Fingerprinting Tools/h1>/div>/div>div classrp-section section>div classrp-row main_row>div classrp-col rp-col-8 main_content>h2>Introduction to Digital Forensics/h2>p>We live in a time when we are party to n amazing range of digital imagery. In the past, images were trustworthy source, but today’s technology has has put paid to this confidence./p>p>Doctored photos and digital imagery are landing on our doorstep with increasing frequency. Just think of the fashion models on the covers of magassines, the images used in advertising, political campaigning, not to mention the music industry. Recently, digital forensics has improved and has begun to regain some confidence in such things. This site provides a brief overview of some of these technologies./p>p>Digital watermarking has been suggested as a means by which images can be authenticated However, a watermark must be included when the photo is taken, limiting this to cameras with this facility./p>p>Passive tools for image authentification can also be useful. These assume that even though digital forgeries may leave few visual clues, they may change the under-lying stats of an image./p>p>These tools can be roughly grouped into five categories: 1) pixel-based, 2) format-based, 3) camera lens, sensor, or on-chip postprocessing; 4) physical techniques that explicitly model and detect anomalies./p>p>In order to maximize the use of these tools, it is best to have complimentary equipment of quality. Here is a list with the different types of equipments:br />1) Camera: a hrefhttp://www.trustedreviews.com/top-ten-cameras_round-up_Page-8>Best cameras of 2016/a>br />2) Forgery software: a hrefhttps://articles.forensicfocus.com/2013/08/22/detecting-forged-altered-images/>State of the art forgery software/a>br />3) Router processing: a hrefhttp://192-168-1-1.tech/>Best routers and IP range software of 2016/a>br />4) Router port forwarding: a hrefhttp://bestrouters.net/>Most sophisticated port forwarding routers/a>br />5) Router gateway accessing: IP Address a hrefhttp://19216811ip.host/>192.168.l.l/a> Accessbr />iframe allowfullscreen frameborder0 height320 srchttp://www.youtube.com/embed/der3_89cdvU?rel0 width570>/iframe>/p>/div>div classrp-col rp-col-4 sidebar-column>img srcimages/quote.png width300 />p classhd_parag>Can you tell which photo below has been manipulated, and which is the original?/p>img classsidebimg srcimages/bsimg.jpg width320 />img srcimages/bsimg.jpg />/div>/div>/div>div classrp-section footer> /div>div classrp-section footer center>div classrp-container>div classfooter-text>© rewindproject.eu 2015/div>/div>/div>/div>script typetext/javascript src../ajax.googleapis.com/ajax/libs/jquery/1.11.1/jquery.min.js>/script>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]