MHM is a tool for discovering sites on same host or IP and for the discovery of sites affiliated to each other, or that might be your competitor. It is available at
It is great for discovering domain names branded with keywords or known name brands. Excellent also for discovering spam communities, domainers, and more.
You may also use it to build micro-indexes and topic-specific collections (as we do) or to chase down communities of personal interest to law and order agencies, recruiters, etc.
If you think that domain searches are just about domain marketing and whois stuff, think again.
Try MDM, our domain intelligence tool, with queries of the form w1.w2… where w1 and w2 are words as described at the end of this link:
Vulnerability scans via search engines. Includes Google scans and Bing reflections.
A handy resource:
1. If you are using Spybot Search & Destroy on Windows32 systems, enter
2. Spybot Search & Destroy will list all blocked connections; i.e. those that are redirected to the localhost.
3. You can manually add/delete entries.
4. It is a another layer of security!!
For details, check:
As part of the migration of Mi Islita to a new home at http://www.miislita.com, I’m happy to announce the initial release of The Net Miner Tool Set, v. 1
The tool set has been around for about a week with some few speed issues, but now you can enjoy it for good. So, what you can do with it? Well, visit the site, try it, and let me know if you like it or if there is room for improvement.
With The Net Miner Tool Set, now anyone can do some basic network security tests. You would be surprise to learn of how many sites are exposing things like php.ini files, making easy the life of attackers, or leaking unnecessary information in their configuration headers.
Worry about July 9, 2012? Check your DNS.
The simplest solution. Visit http://www.dns-ok.us and if you see a green background, you are ok. If the background is red, you might be in trouble.
Want to do the check manually? Do this
Open a command window and at the prompt, type or paste:
The output will probably be very long. Look for the IPv4 information under “Ethernet adapter…” Then Look for the “DNS Servers line, and write down these numbers. “Compare them with the IP numbers of the malicious Rove DNS changer listed in http://www.dcwg.org/detect/checking-windows-7-for-infections/
If a match, you might be in trouble.
I Doser has been called an addictive electronic drug. It is a common hype in social networks. But, actually it is nothing new, but a well-repacked business.
You can get all kind of e-drugs: from e-marihuana to e-….anything by just using earphones. A dangerous mixture if you are driving a car!
Such e-drugs are based on binaural beats, discovered in 1839 by Dove. These are slow modulations that are perceived when tones of different frequency are presented to each ear. Such auditory beats in the brain can have unexpected results, altering consciousness: A virtual LSD?
In 1973 Oster discovered that binaural beats can be detected by humans when carrier tones are below approximately 1000 Hz. According to Lane et al (see references below)
WHEN two pure auditory signals of similar frequency are mixed together, the phase interference between their waveforms produces a composite signal with a frequency midway between the upper and lower frequencies and an amplitude modulation that occurs with a frequency equal to the difference between the two original frequencies. For example, mixing tones of 100 Hz and 110 Hz yields a signal with a perceived frequency of 105 Hz that rises and falls in amplitude with a frequency of 10 Hz. The amplitude-modulated composite signal is called an auditory beat.
A similar phenomenon occurs when auditory signals of similar frequency are presented separately to the left and right ear through stereo headphones. Although each ear hears only one of the frequencies, the listener perceives the middle frequency and the amplitude modulation, even though the auditory beat does not exist in physical space. This phenomenon, called a ‘‘binaural auditory beat,’’ and described more than 25 years ago (6), is created by the brain’s processing of the two separate auditory signals at the level of the olivary nuclei of the brainstem.
It was a matter of time to see some looking for making a quick cash doing a 2 + 2 math, mixing hungry with necessity (“se juntó el hambre con la necesidad”). So now we can see low level forms of life looking for an escape to their reality through I Doser.
Hackers may soon be able to misuse these e-brain technologies to cause physical harm. A WMD in the making or accident waiting to happen?
Binaural Auditory Beats Affect Vigilance Performance and Mood
Auditory Beats in the Brain
Inducing Altered States Auditory and Visual Stimulation
Entraining Tones and Binaural Beats
This is interesting: How to launch a DOS attack without ever having to infect a single PC machine. This is done through URL shorteners:
Beware of clicking on links with URLs shortened.
Ho, Ho, Ho.
Thanks to the Internet, hackers are -or soon will be- invading your cell phones, car, and TV.
The Energizer DUO Trojan: What You Need to Know, reports that the Energizer USB charger has been infected with a nasty Trojan.
Ford Motor Rolls Out New Security Features To Prevent Car-Hacking, reports that Ford is taking steps to prevent hackers from literally car-jacking your vehicle.
Google, DISH Network in Set-top Tests, reports that Google is moving to provide search services through your TV. With TV soon hitting the market with Internet Widgets and similar technologies, soon your TV sessions will be subject to hacking.
So, very soon: hackers, spammers, and marketers in your car, phone, and TV.
To secure a job, get certified in Internet Security related technologies. Or how about, Multimedia Search Marketing (MSM)? That’s a new great acronym to think about.