Whois queries are used to determine the IP address ranges associated with clients. A whois query can be run on most UNIX environments. In a Windows environment, the tools such as WsPingPro and Sam Spade can be used to perform whois queries. Whois queries can also be executed over the Web from www.arin.net and www.networksolutions.com.
What are whois queries?
October 4, 2008
0 Comments
Explore More
Social Engineering is no science, it is pure trickery!
The term “Social Engineering†sounds like a serious academic subject on reforming a wayward society! Alas, far from the truth, it is pure and simple trickery, a con job. The
Distributed Denial of Service (DDoS) Attacks
Demystifying Denial-Of-Service attacks, part one By Abhishek Singh, CISSP This paper provides an introduction to Denial of Service (DoS) attacks, their methodologies, common prevention techniques, and how they differ from
Critical XSS Vulnerability in Shwe Myanmar http://www.shwemyanmar.net
PlanetCreator has reported another Critical XSS Vulnerability in Shwe Myanmar http://www.shwemyanmar.net Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications that enables malicious attackers
