Whois queries are used to determine the IP address ranges associated with clients. A whois query can be run on most UNIX environments. In a Windows environment, the tools such as WsPingPro and Sam Spade can be used to perform whois queries. Whois queries can also be executed over the Web from www.arin.net and www.networksolutions.com.

Explore More

SQL Injection Attacks and Prevent

Introduction Security in software applications is an ever more important topic. In this article, I discuss various aspects of SQL Injection attacks, what to look for in your code, and

SQL Commandos (usefull for injections)

Here is a list of SQL commands and what they do, these would be used in some injection methods and of course legitimate sql functions. On thier own they wont

Torrent Poisoning

=== Introduction === The BitTorrent protocol identifies peers using a tracker. Each peer announces itself to the tracker via HTTP. Certain parameters in the announce request itself can be altered