Tampilkan postingan dengan label Tools. Tampilkan semua postingan
Tampilkan postingan dengan label Tools. Tampilkan semua postingan

Kamis

Cara Membuat T̶u̶l̶i̶s̶a̶n̶ ̶d̶i̶c̶o̶r̶e̶t̶ pada posting Faceboook dan Twitter kita!






S̶t̶r̶i̶k̶e̶t̶h̶r̶o̶u̶g̶h̶ update Facebook & Twitter anda! StrikeThrough teks atau tulisan dicoret sering digunakan untuk menunjukkan bahwa ada sesuatu yang tidak tersedia, salah atau dihapus. Nah disini kita bisa membuat tulisan kamu menjadi: struck-through, cross-hatched, underlined, waved atau dotted text yang bisa kita paste di facebook.

Sementara Facebook hanya memungkinkan Anda untuk membuat teks tebal atau miring saja, tidak ada cara untuk menulis teks dicoret (strikethrough). Nah Dengan tool ini kita dapat menghasilkan teks strikethrough yang dapat digunakan pada situs-situs media sosial. Karena karakter yang dicoret ini masih teks biasa, yang dapat Anda posting di Facebook, Twitter, Google+ dll


































































Copy & paste



Cukup Hanya dengan menulis teks kita di kotak pertama, versi dicoret akan langsung dihasilkan dalam kotak kedua. Anda langsung dapat kopi&paste ke Facebook, Google+, Twitter, atau situs jejaring sosial lainnya yang Anda inginkan dengan sangat mudah. Demikian semoga bermanfaat. Jangan lupa tulisan komentarnya ditunggu.




toolseed



Selasa

iWEBTOOL's philosophy to create a successful website
Success comes better without evil

We believe delivering honesty to your users support your steps up the success ladder. Serve your users with solid factual content on your website. Every now and then websites tend to deceive the web users and search engine crawlers with incorrect information, this has bad repercussions.

If a visitor has been mislead by untruth information, for example free web hosting and then discovered the free hosting to be lie, the website will lose the visitor’s loyalty. Word of mouth will usually be spread with a negative comment which will cause a loss of potential visitors.

Misleading search crawlers again has bad consequences. Let’s take a look at Google’s search bot. Googlebot wonders around the web through millions of websites; looking up the websites, extracting information, it’s all perfect isn’t it? Not quite.

Some webmasters have a tricky way to fool this googlebot and attempt to provide the bot with non-related information to try and attract extra visitors. Webmasters preset different information to be shown when the googlebot comes around; this is commonly known as ‘cloaking’. Some webmasters get away with this trick unnoticed but quite frequently googlebot will discover this dishonest scam and as a result the website will suffer a penalty.
 
Other ways of dishonesty:
Including hidden text and hidden links.
Including non-related keywords and description into the page’s meta-tags.
Creating similar pages to reproduce a duplicate content.
Altering a text link’s display address (This is where the link redirects the user and is
usually displayed on the status bar while hovering a link).
 
Focus on your users rather than your website ranking

Quality will attract users. Users will automatically develop a website rank depending on the quality. So what do you do? Aim for the website ranking or aim to provide quality to your users?

Webmasters tend to pay third-party companies to try and 'cheat’ themselves a good ranking. Is this a good idea? Certainly not. Satisfy your users with excellence and the users themselves will spread the word about your website, your ranking will grow.
 
Make people see it how you see it

When you create a website, you first have an initial idea. You believe your idea will head to become successful, but do your visitors see it as that? Your users are people who surf around the internet exploring millions of websites, all with different content and all with a different set of ideas. There are dozens of other websites out there which are similar to yours. Why would users visit your website rather than the other dozen available on the internet? Perhaps you know why they should visit your website, but do the hundreds of web users have the same thoughts? No? One keyword for all of this, explain.

Explaining what your website is about thoroughly is one of the major requirements of web content. The user would not know what your site is about unless you explain everything and when you do explain, explain how you see it. Explain why you produced the website, explain why you believe the web users should visit your website. What is good about your website? What services do you provide?

For example, take a chess game, you will not know what the game is about, why you should play it nor will you be aware of the rules unless you have read the instructions. The same principles apply to a website, your users will not know what your site is about nor will they know why they should visit it unless you explain it to them clearly.
 
Aim for quality rather than quantity

When you create a website for a particular purpose, you should assure it fulfils the purpose well. What does this mean? In simpler words, when a resource is provided, it should be supplied with quality features.

Quality is what a webmaster should be aiming for. For instance, take Google. Google offers nothing more or less but a search; search with quality features assuring it satisfies its users. They do not offer weather details, dating services or anything unconnected with search.

Nowadays webmasters tend to target a large audience by having almost everything listed on their website. The services provided on some sites vary from unrelated things such as news headlines to online kid games. This is a bad idea as webmasters cannot really provide a quality service for each section as these are entirely different. As an alternative, webmasters should pick a particular category and concentrate providing it with quality features. For example, Google providing quality Search.
 
Fast is better than slow
Immediate satisfaction is the key to a successful website. When you visit a page, you want the resource ready with quick accessibility.

Easy NavigationWhat is meant by quick navigation? Easy to access content without having to go through complicated links to find it. Good accessibility is essential; navigations should be placed in almost every possible way to help users navigate through different aspects of the site easily.

Users are usually unaware of a site’s full content. So how do you help them become aware of the other dozens of content? Related links! You simply link one service to another service assuring they are someway related. Related linking contributes to quick navigation which is again very critical to a website.

For instance, during the summer season, a website about weather conditions may add a link to another part of the website providing information on summer clothing. Users will most likely visit this additional link as it provides secondary information on something they may be interested in.


Simple Content
Which sort of content would you prefer, heavy slow or quick simple? Personally, I’ll select ‘quick simple’. One of the best recommendations of a web design is simplicity. Who needs fancy large graphics to attract visitors? Statistically speaking, users will often make a visit to your website for a certain service or specific information and users will not be vastly impressed if every time their attend to the site, they are forced to download heavy content due to images and graphics.
 
Let people know you exist

Approximately 70% percent of the websites existing on the internet believe they provide nonsense service due to no increasing visitors. But do the web users actually know about the website’s existence? You cannot determine if a website visitors are decreasing or increasing when the web users do not actually know about your website.
 
So how do you let users acknowledge your website?
Try to have related sites link to your website. (Make sure the websites that link to you are decent as you can easily receive a bad reputation by bad neighbours)
Share the word to your local mates on the internet, perhaps letting the member at your local message board know your site is online.
Submit your site to Search Engines.
Submit your site to relevant website directories. You could add your website to the iWEBTOOL directory.
 
Source: http://www.iwebtool.com

iwebtool





































Top Sites

Receive free traffic to your website simply
by exchanging links with iWEBTOOL.


Description
You can now submit your website to our Top Sites
and receive traffic. After your submit your website, you simply add a link to
iWEBTOOL from your website and as you refer visitors to us, you earn yourself a
better ranking in our Top Sites list. The better ranking you have, the better
traffic you should receive.

 
Key Features

































Your website will be listed in our Top Sites list which will be shown to over thousands a day.


Easy to use interface.


Submit your website within seconds.


Every unique visitor you refer to us are counted by our system.


Easy to use "Copy and Paste" codes.


You have the choice to insert banners or text links.


The counters reset every month. This should allow everyone to
have a chance for top ranking.


Previews












Go to this service now!



Submit your Website

Free webmaster resources including SEO Tools, Computer Glossary,
Templates,
Tutorials and Webmaster Forums.





Jumat

ninjawords.com





Ninja Word
















NinjaWord 


Word_BlogNinja






Minggu

Recent Posts Widget with Thumbnails for Blogger/Blogspot


A few days ago, I've posted a tutorial about How To Add A Simple Recent Posts Widget
but today I want to present to you a very nice Recent Posts widget that
comes along with posts thumbnails and post summary as well. If you want
to know how to add this Recent Posts widget/gadget to your Blogger
blog, then follow the steps below:




recent posts, blogger widgets



How to Add the Recent Posts Widget to Blogger



Step 1. Go To Blogger > Layout and click on "Add a Gadget" link







Step 2. From the pop-up window, scroll down and choose HTML/JavaScript







Step 3. Paste inside the empty box, the following code:




<div class="eggTray">

<script
src="http://helplogger.googlecode.com/svn/trunk/listbadge.js">{"pipe_id":"1a6640e2a78b2c6e736f2220529daae5","_btype":"list",

"pipe_params":{"URL":"YOUR-BLOG/SITE-URL/feeds/posts/default"},

"hideHeader":"false","height":"500","count": 8 }</script>

<div style="font-family: arial, sans-serif; font-size: 9px;"
class="ycdr"><a
href="http://helplogger.blogspot.com/2012/05/recent-posts-widget-with-thumbnails-for.html"
target="_blank" title="Grab this widget">Recent Posts
Thumbnails</a> <a href="http://helplogger.blogspot.com/"
target="_blank">Blogger
Widget</a></div><noscript>Your browser does not
support JavaScript!</noscript></div>

<style type=text/css>

.eggTray {margin:10px 0px;padding:0px;}

.ybr li  {border-bottom:0px #cccccc dotted; padding:0px 0px 10px 0px!important;}

.pipesTitle {padding-top:0px;}

.pipesDescription {display:true;}

.ycdr {background:transparent
url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMawMI2YoOJVrEbo_5RhChGOg5je9ecE-XebMLdotRkff_ehLPeZzwBVDKfnah9fngHhiIkbjFT_W_m1IbRexcQhyphenhyphen3zxe0fKDfvcvPN4REmQduQ8F6RPsKy6AYqzINjZi7ppZ9sx6RUWw/s1600/logo.png)
0px 0px no-repeat; padding: 1px 0px 0px 19px; height:14px; margin: 4px
0px 0px 0px;line-height:14px;}

.ycdr, .ycdr a {color:#999999;}

.widget .popular-posts ul {padding-left:0;}

</style>



Step 4. Change YOUR-BLOG/SITE-URL with the url address of your site/blog (ex: http://helplogger.blogspot.com) and look to have no forward slash symbol "/" at the end of your url



Note:


  • To disable the scroll bar, remove the number 500

  • By default, this widget is set to display a maximum of 8 recent posts. To change this number, replace the number 8 with the number of posts desired

  • if you want only the posts titles to appear, change true to none and "0" from padding-top:0px with 10




Step 5. Save your widget. And you're done!



If you need more help, leave your comment below.






Sabtu

Facebook ID Lookup Finder Search Tool




Facebook logo Español: Logotipo de Facebook Fr...



























Facebook ID Lookup Finder Search Tool


Identify your Facebook User ID or Page ID.













Enter Your Facebook Username or URL

(i.e. JohnDoe or http://www.facebook.com/JohnDoe)









































Senin

IPduh - The Internet Tools




IPduh.com   About   IPduh Internet Tools   Propaganda




IPduh is a set of Internet Forencics and Troubleshooting Tools made to work Together.   IPduh may be used as an Internet Forensics Search Engine or a General Purpose Search Engine.   Smart Humans and Aliens researching the internetz on Earth Love IPduh.






ip    Tools Menu

IP address verbose report





input:



an IPv4 address in dot-decimal notation



output:

For non public, special IP addresses a short explanation and a URI to more information.



xor



For public and special public IP addresses:


  1. The IANA designation of the /8 block containing this IP address.

  2. The Internet Regional Registry of this IP address.

  3. The Autonomous System Path.

  4. The IP Prefix.

  5. The Autonomous System Number.

  6. The Organization using this IP address.

  7. The country or city of the organization to which this IP address is assigned.



    Sometimes the machine(s) using this IP address happen to be in the same country or city.



    The geographical coordinates of the country or the city.



    Two Databases made by IPduh and the MaxMind database are used to determine the geographical location of the IP address. The databases made by IPduh are based mostly on data provided by the Regional Internet Registries. A macro view of the IPduh Country database used is available.



    The physical location of the machine(s) using this IP address is not guaranteed to be the same as the location suggested by IPduh .

  8. The name of the IP address ( known as Reverse DNS record ).

  9. The A record of the IP address name.

  10. The registered domain name associated with the IP address name.

  11. The A records registered domain name.

  12. The dot-decimal IP address entered as a 32b Base 10 Integer.





Examples of using ip with GET requests








ip/dnstrace    Tools Menu





input:



A pubic IPv4 address



output:

The delegation path from the root Name Servers to the Authoritative DNS Netwok Servers of the PTR.




Examples of using ip/dnstrace.








ipv6/dnstrace    Tools Menu





input:



A pubic IPv6 address



output:

The delegation path from the root Name Servers to the Authoritative DNS Netwok Servers of the IPv6 address PTR.




Examples of using ip/dnstrace.








ip/tor-exit    Tools Menu





input:



A unicast IPv4 address



output:


  1. If the IPv4 address entered is listed on the IPduh Tor Exit List, the first and the last times it was seen used as a Tor Exit.

  2. If the IPv4 address entered is listed on the tor.dan.me.uk DNSBL ( a list of currently used Tor Exits ), some information regarding its Tor Network characteristics.




The lookups performed by ip/tor-exit are performed by ip/dnsbl as well.




Examples of using ip/tor-exit.








dns/list    Tools Menu

Create a List of DNS names





input:



DNS names



ipduh-list built-in variables and punctuation marks:

&list=   ---   ,   &title=   ;   &www=1   &sc=1   &sa=1



comments:

All listed strings of characters not Identified by dns/list as DNS names are printed.

A ; stops list processing and hides all characters following it.



output:

A list of DNS names along with links to the appropriate IPduh tools and the URL producing the list.




Examples of using dns/list.








ip/list    Tools Menu

Create a List of IP numbers





input:



IP numbers:

[ IPv4 address | IPv6 address | IPv4 CIDR block | IPv6 CIDR block | Autonomous System Number ]



ipduh-list built-in variables and punctuation marks:

&list=   --   ,   &title=   ;



comments:

All listed strings of characters not Identified by ip/list as IP numbers are printed.

A ; stops list processing and hides all characters following it.



output:

A list of IP numbers along with links to the appropriate IPduh tools and the URL producing the list.




Examples of using ip/list.








IPduh List Syntax    Tools Menu   about ip/list   about dns/list   about demux/list


IPduh list syntax is used to create lists with ip/list , dns/list , and demux/list and it is a simple way of denoting lists in a form text area or a URL.



HTML tags are not allowed.

URL Enconding and URL decoding are handled by the list tools.








Every list item not identified as an IP number by ip/list , a DNS name by dns/list , and an IP number or a DNS name or a URI by demux/list will be printed without IPduh links. This way comments and almost empty lines may be put in a list.

eg:http://ipduh.com/dns/list/?&list=`---google.fr---Google in French---.---google.gr---Google in Greek---'





ipv6/dnstrace    Tools Menu





input:



A pubic IPv6 address



output:

The delegation path from the root Name Servers to the Authoritative DNS Netwok Servers of the IPv6 address PTR.




Examples of using ip/dnstrace.








dns/trace    Tools Menu





input:



A DNS domain name



output:

The delegation path from the root Name Servers to the Authoritative Name Servers of the DNS name.




Examples of using ip/dnstrace.








ipv6/cidr    Tools Menu





input:



An IPv6 CIDR block in CIDR notation



output:


  1. Whether the IPv6 CIDR block entered is valid.

  2. If the IPv6 CIDR block entered is invalid a correction is attempted.

  3. The Type of the IPv6 network address.

  4. The IPv6 Range. Network Address - Broadcast Address.

  5. The Number of IPv6 addresses in the CIDR block.





Examples of using ipv6/cidr








ipv6/traceroute    Tools Menu





input:



An IPv6 address



output:

If the IPv6 address entered is a routable Unicast Internet IPv6 address, the intermediate routers along the path from an IPduh Internet Host to the Internet host using the IPv6 address entered. For each of the routers in the path ipv6/traceroute attempts to output their reverse records, their IPv6 addresses, the Autonomous Systems in which they belong, and the time it took them to respond to the traceroute probes.








ipv6    Tools Menu

IPv6 address basic information lookup





input:



An IPv6 Address



output:


  1. The type of the IPv6 address entered, URIs to more information and the appropriate RFC, if needed.

  2. Allocation Prefix , Status , Responsible RIR , Allocation Date.

  3. The short form of the IPv6 address entered.

  4. The long form of IPv6 address entered Hexadecimal and Binary.

  5. The unsigned integer number represantating the IPv6 address entered.

  6. The Country in which the Organization using this IPv6 address is located.



    The machine(s) using this IPv6 address may not be on the same country.



    The Location is determined by the Regional Internet Registries data and a macro view of the IPv6 addresses per country is also available.





Examples of using ipv6.








as/prefix    Tools Menu

IP prefixes originating an Autonomous System





input:



An Autonomous System Number



output:

The IP prefixes originating the autonomous system




Examples of using as/prefix.





Still in Beta release --Not consistent Results.



Glitch - Bug: If you get "I did not find IP prefixes originating from 'AS#'" for an autonomous system number with prefixes in the IPduh Database, try to refresh the page.







ipv6/whois    Tools Menu

IPv6 address whois information lookup





input:



An IPv6 Address



output:

For non Global Unicast IPv6 addresses,



a short explanation and a URI to more information or the apprpopriate RFC.



For Global Unicast IPv6 addresses,


  1. The parent IANA block.

  2. The IANA status.

  3. The Regional Internet Registry.

  4. The whois server.

  5. The whois information for the owner of the block.





Examples of using ipv6.








ipv6/ptr    Tools Menu

IPv6 address PTR ( Reverse DNS name ) lookup





input:



An IPv6 address



output:

The PTR of the IPv6 address entered.




Examples of ipv6/ptr.








ip/ptr/24    Tools Menu

The PTR of all IP addresses in a /24 network





input:



A pubic IPv4 address or a /24 CIDR or the three first Bytes of an IP address in decimal dotted notation



output:

The PTR ( Reverse DNS names ) for all the IP addresses in the /24 ( C ) Network along with pointers to more information.




Examples of using ip/ptr/24 .








idn/ace    Tools Menu

IDNA - Unicode to ACE convertion





input:



An International Domain Name in Unicode.



output:

An ASCII Comptible Encoded string of characters.




Examples of using idn/ace.








idn/unicode    Tools Menu

IDNA - ACE to UNICODE convertion





input:



An International Domain Name in ASCII Compatible Encoding ACE.



output:

The International Domain Name in Unicode.




Examples of using idn/unicode.








pdb/as    Tools Menu

PeeringDB information about an Autonomous System





input:



An autonomous system number



output:

The information that the Autonomous System Owner put in the Peering database.



The peeringdb information is cached for at least 15 days. The latest PeeringDB information can be viewed at peeringdb.com.




Examples of using pdb/as.








ip/whois    Tools Menu

IP address whois lookup





input:



a public IPv4 address



output:

The whois information for the IP address entered.






Examples of using ip/whois with GET requests






Caveat


ip/whois caches whois information for 15 days.





idn    Tools Menu

International Domain Name convertions ( Unicode to ACE xor ACE to Unicode )





input:



a Domain Name



output:

If the domain entered is an international domain name encoded in Unicode it's ASCII Compatible encoded ( ACE ) version.

If the domain name entered is an Internation domain name encode in ACE it's equivalent Unicode encoded version.




Examples of using idn.








ip/whois/as    Tools Menu

Autonomous System Number whois lookup





input:



an Autonomous System number

an Autonomous System number with the "AS" prefix

an Autonomous System number with the "ASN" prefix.



output:

The whois information for an Internet Autonomous System.



If the Autonomous System Number entered is not used in Internet BGP routing an explanation is attempted.






Examples of using ip/whois/as with GET requests








ip/cidr    Tools Menu

IP CIDR Calculator





input:



A network block in CIDR notation



output:


  1. If the network address on the CIDR is valid and the network mask on the CIDR is valid. Each Byte in the network address in Binary (put your cursor above the network address on the CIDR block)

  2. If the CIDR block is invalid ( the network address is not compatible with the network mask ) a valid CIDR block is suggested.

  3. The IP Range. Network Address - Broadcast Address.

  4. The Network Mask in decimal dotted notation and each Byte in binary ( put your cursor above the mask).

  5. The Number of IP addresses in the network block.

  6. If the the CIDR block is in a special block a short explanation and URI to more information, usually the appropriate RFC.





Examples of using ip/cidr with GET requests








ip/reverse or ip/ptr   Tools Menu

IP address PTR RR lookup - IP reverse mapping - reverse IP address DNS lookup




ip/reverse or ip/ptr is based on a IP PTR RR lookup also known as reverse DNS lookup and it is usefull in associating an IP address with a host name or a DNS name.




input:



a public IPv4 address



output:


  1. The IP PTR resource record.

  2. The registered domain name -deduced by the PTR record.

  3. The A records of the registered domain name.





Note


For single IP addresses ip output includes the ip/reverse output as well.






Examples of using ip/reverse with GET requests








epoch    Tools Menu

Epoch Clock and Epoch to Date Conversion





input:



An Epoch -an integer number



output:


  1. The equivalent UTC Date.

  2. The Δsec since the Unix Epoch.

  3. The Δsec from the Unix epoch timestamp entered.





Examples of using epoch.









url/bouncer    Tools Menu

Bounce URLs - Basic Protection against Malicious URLs





input:



[ IPv4 address | IPv6 address | URI | DNS name ]



output:

The Bouncer will lookup the DNS name or the IP address contained in the URI in a few major Black Lists. If the URI , IP address , or DNS name pass the test , the bouncer will redirect you there after a few seconds.





The Bouncer transforms plain DNS names , plain IPv4 addresses , and plain IPv6 addresses to HTTP URLs.



The Bouncer will bounce URIs using the protocols used often with web browsers: HTTP , HTTPS , and FTP.



The Bouncer runs a basic test against the host you are destined.

For a more thorough test consult dns/bl for domain names and ip/dnsbl for IPv4 address.



The Bouncer is ideal when you need to link to URIs beyond your control or to hide your referrer.




Examples of using url/bouncer.





The Bouncer waits for 4.5 sec before redirecting.

If you do not like the 4.5 sec wait time before the redirection you may use one of the following:

/url/bouncer/1

/url/bouncer/2

/url/bouncer/3

/url/bouncer/4





/url/bouncer/1 waits 0.5 sec before redirecting and it may be used in the same way.

eg:http://ipduh.com/url/bouncer/1/?http://alog.ipduh.com



/url/bouncer/2 waits 1.5 sec before redirecting and it may be used in the same way.

eg:http://ipduh.com/url/bouncer/2/?http://alog.ipduh.com



/url/bouncer/3 waits 2.5 sec before redirecting and it may be used in the same way.

eg:http://ipduh.com/url/bouncer/3/?http://alog.ipduh.com





url/encode    Tools Menu

Percent Encode a URI





input:



A URI



output:

A percent-encoded URI.


Examples of using url/encode.










ip/dnsbl    Tools Menu

IP address Blacklist check.





input:



a public IPv4 address



output:


  1. The answer for this IP address from each of the major IP DNS BlackLists and IP 'black' lists queried.

  2. An explanation for each answer and if needed a URI to more information.









DNS BlackLists and IP 'black' lists queried by ip/dnsbl



  1. ZEN - zen.spamhaus.org

    ZEN combines all Spamhaus IP DNSBLs.




    1. Spamhaus Block List - SBL - sbl.spamhaus.org

      A database of IP addresses of spam-sources, spam support services, and snowshoe spammers ( the CSS component ).

    2. Exploits Block List - XBL - xbl.spamhaus.org

      XBL includes CBL and a customized NJABL




      1. Composite Blocking List - CBL - cbl.abuseat.org

        CBL lists IP addresses exhibiting characteristics which are specific to open proxies, spam bots, and spam malware.

      2. Not Just Another Bogus List - NJABL - njabl.org

        An IP database of known and potential spam sources ( open relays, open proxies, open form to mail HTTP gateways, dynamic IP pools, and direct spammers )



    3. Policy Block List - PBL - pbl.spamhaus.org

      A database of end-user IP addresses which should not be delivering unauthenticated SMTP email to any Internet mail server.

      Many ISPs participate in the PBL project. The PBL lists both dynamic and static IP addresses which by policy whether the block owner's or -interim in its absence- Spamhaus' policy) should not be sending email directly to the MX servers of third parties.



  2. SORBS - dnsbl.sorbs.net

    Contains all the SORBS DNSBLs




    1.   http.dnsbl.sorbs.net

      List of Open HTTP Proxy Servers.

    2.   socks.dnsbl.sorbs.net

      List of Open SOCKS Proxy Servers.

    3.   misc.dnsbl.sorbs.net

      List of open Proxy Servers not listed in the SOCKS or HTTP lists.

    4.   smtp.dnsbl.sorbs.net

      List of Open SMTP relay servers.

    5.   web.dnsbl.sorbs.net

      Hosts that have abusable vulnerabilities

    6.   spam.dnsbl.sorbs.net

      List of hosts that have been noted as sending spam/UCE/UBE to the administrators of SORBS. This zone also contains net blocks of spam supporting service providers, including those who provide web sites, DNS or drop boxes for a spammer. Spam supporters are added on a 'third strike and you are out' basis, where the third spam will cause the supporter to be added to the list.

    7.   block.dnsbl.sorbs.net

      List of hosts demanding that they never be tested by SORBS.

    8.   zombie.dnsbl.sorbs.net

      List of networks hijacked from their original owners, some of which have been used for spamming.

    9.   dul.dnsbl.sorbs.net

      Dynamic IP Address ranges (NOT a Dial Up list!)

    10.   badconf.rhsbl.sorbs.net

      List of domain names where the A or MX records point to bad address space.

    11.   nomail.rhsbl.sorbs.net

      List of domain names where the owners have indicated no email should ever originate from these domains.



  3. SpamCop Blocking List - SCBL - bl.spamcop.net

    SCBL lists IP addresses that were used to spam.

  4. Barracuda Reputation Block List - BRBL - b.barracudacentral.org

    Lists IP addresses which are sending spam or viruses

  5. Tor.dan.me.uk - dan.me.uk - A list of IP addresses used currently by the Tor Network.

    If the IPv4 address entered is listed on tor.dan.me.uk some information regarding its Tor Network characteristics ( the node name, the port used by Tor, and whether it is: Fast,Guard,Named,Running,Stable, or Valid ).

  6. Team Cymru Full Bogons List - Team Cymru

    This List contains IP addresses that are not assigned to an ISP or other end-user and they should not be seen in the Internet.

  7. IPduh Black List - An IP black List, not a DNSBL.

    Contains IP addresses used by abusive or compromised systems.

  8. IPduh Tor Exit List - A list of IP addresses that have been Tor Exits, not a DNSBL.

    This list is maintained by IPduh and it is composed mainly by the Tor Project data .

    If the IPv4 address entered is listed on the IPduh Tor Exit List the first and the last times it was seen used as a Tor Exit are displayed.





Examples of using ip/dnsbl








ip/srv    Tools Menu



Check which of the most common services are running on the host(s) using a remote IP address.





input:



a public IPv4 address



output:


  1. The TCP ports that accepted connection within 300ms.

  2. Limited software recognition for the daemons found listening and some of the headers.

  3. Limited OS recognition, Uptime guess, Link Type Guess, and TOS.

  4. Guess the number of systems using the IP address.





List of the TCP ports probed by ip/srv and their common use



  1. 21 - FTP - File Transfer Protocol

  2. 22 - SSH Secure SHell

  3. 23 - Telnet

  4. 25 - SMTP - Simple Mail Protocol



  5. 465 - SMTP SSL/TLS - Simple Mail Transfer Protocol over SSL/TLS (encrypted)

  6. 53 - DNS - Domain Name System

  7. 80 - HTTP - HyperText Transfer Protocol

  8. 110 - POP3 - Post Office Protocol version 3

  9. 123 - NTP - Network Time Protocol

  10. 143 - IMAP - Internet Message Access protocol

  11. 993 - IMAP over SSL/TLS (encrypted)

  12. 389 - LDAP - Lightweitght Directory Access Protocol

  13. 443 - HTTPS - HyperText Transfer Protocol Secure (encrypted)

    ip/srv also attempts to print the certificate details.

  14. 587 - MSA - Message Submission Agent

  15. 1352 - Lotus Notes

  16. 1433 - Microsoft SQL server

  17. 3306 - MySQL Server

  18. 3389 - Windows Remote Desktop Connection Service







IPduh.com/ip/srv bot


ip/srv bot is called the piece of software that does the scans or looks up the cashed scans. The scans are cashed for no fixed periods of time. The ip/srv bot always attempts to pass the asker's IP address to the web server listening on the scanned IP when it attempts a new (non-cached) scan. The ip/srv bot always acts at someone's request and never picks arbitrary hosts to lookup.



If you are a server administrator who does not want his server's IP to be scanned by ip/srv please tell IPduh so. If you are a server administrator that wants to know who requested an ip/srv scan, search your web server's logs for IPduhSrvBot.



The ip/srv agent signature on http daemons listening on port 80 or port 443 looks like:



"Mozilla/5.0 (compatible; IPduhSrvBot/VERSION; for/192.0.2.222; +http://ipduh.com/about/#ip-srv-bot)"



where: 192.0.2.222 is the IP address of the IPduh user who requested the first ip/srv scan, and VERSION is [0.0.1 - 0.9.9].







dns/whois    Tools Menu

Domain Name whois lookup





input:



a registered DNS domain name



output:


  • The domain name whois information or a URI to the whois information.





Examples of using dns-whois










Caveat


In an effort to not be a nuisance to the whois servers dns/whois caches whois queries for at least 15 days.





dns/bl    Tools Menu

Domain name URIBL and IP BLack List lookup



input:



a DNS domain name



output:


  • The URI Black Lists' answers, and the answers of the major IP (DNS) Black Lists for all the IP addresses DNS related to the domain name.





The URI Black Lists



  1. Google Safe Browsing - Google Safe Browsing FAQ



    This is a list of sites involved in phising or sites dedicated to the spread of malware.

  2. URIBL - uribl.com



    URIBL lists domain names found in URIs in the body of spam messages. These domain names may be used in one or more of the following categories of web sites: spamadvertized sites that are trying to sell something, phising sites, sites that host malware or used by malware, sites that infect visitors with malware.



The IP Black Lists


The IP Black Lists queried for every DNS related IP address are the same with the ones queried by ip/dnbl.




Examples of using dns-bl





For each of the DNS related IP addresses of the domain name dns/bl does not print IP Black Lists that answered "not listed".

You could use dns/bl/verbose if you want to see everything printed.



The domain names listed in the URI Black Lists are: dedicated to the propagation of malware, used for phising, used for spamming, or advertized though spamming.



IPduh suggests to not use your browser to visit any of the domain names listed on the URI Black Lists.




phishing site: Forgery or imitation of another website, designed to trick users into sharing personal or financial information. Entering any personal information on such site may result in identity theft or other abuse of the information entered.



malware site: A site that contains malicious software that could be downloaded to a user's computer without the user's content. A site used in controlling infected computers and coordinate malicious attacks or attempts to spread software viruses and other malicious software.



It is possible for the lists used by dns/bl to contain outdated or false information. It is possible that the lists compiled by IPduh to contain errors. The IPduh experience shows that the external lists chosen and the lists compiled by IPduh have a low false/positive ratio.





dns    Tools Menu

Lookup the A, MX, NS, SOA DNS records, relevant IP addresses, and servers' locations.





input:



a DNS name



output:


  1.  The purpose and the country (if any) of the Top Level Domain TLD.

  2.  The Address ( A ) records and the locations of these IP addresses.

    The A records usually point to webservers.

  3.  The A record of www --The www subdomain usually points to webservers.

  4.  The CNAME record

  5.  The DNAME record

  6.  The AAAA record(s)

    IPv6 address records.

  7.  The TXT record

  8.  The Mail Exchange ( MX ) records, their priority and their location.

    The MX records point to Mail Transfer Agents - mailservers. The number in front of the MX records specifies the preference value for the mailserver or the array of mailservers the record points to.

  9.  The Name Server ( NS ) records and the nameservers' locations.

  10.  The Start Of Authority ( SOA ) record, which includes:




    1.   SERIAL - the domain serial number.

      This is an unsigned 32 bit integer that must be incremented on the primary server every time a change is made. [RFC1912 2.2] recommends the YYYYMMDDnn syntax where YYYY=year,MM=month,DD=day,nn=revision number.

    2.   MNAME - the primary name server.

    3.   RNAME - the email of the domain name administrator.

      RNAME must follow the hostmaster.example.tld format meaning hostmaster@example.tld.

    4.   REFRESH -the refresh timer.

      A signed 32 bit integer that specifies the number of seconds between the time that a secondary name server checks if the zone was changed on the primary nameserver.

    5.   RETRY - the retry timer.

      A signed 32 bit integer that specifies the number of seconds that the secondary name server(s) have to wait if a REFRESH fails.

    6.   TTL - the Time To Live timer.

      TTL is an unsigned 32 bit integer that defines the number of seconds that a record may be cached.









Examples of using dns with GET requests








Note


For better results use the registered domain name example.com and do not use subdomains like www.example.com



There are cases that subdomain zones are delegated to name servers different than the domain authoritative name servers, and the subdomain has a different set of DNS records.




To see the root nameservers for a Top Level Domain use "TLD." and not just "TLD"




For International Domain Names, just use their UTF8 encoded form







ip/traceroute    Tools Menu

IP traceroute




Trace packets on their route from an Internet host in AS2490 along their route to another IPv4 Internet host.




input <



An Internet IPv4 address



output >

If the IP address entered is a routable Internet IP address, the intermediate routers along the IP path from IPduh to the IP address entered. For each of the routers in the path ip/traceroute attempts to output their reverse records, their IP addresses, the Autonomous Systems in which they belong, and the time it took them to respond to the traceroute probes.





anonymity-check    Tools Menu


The anonymity-check shows what a web server can see or deduce about a web user. The web user information leaked to the WWW servers varies and depends on the web user's system, browser, settings, and local or proxy network. Even though the anonymity-check was intended to be used as a tool to demonstrate ways used by many sites to track web users, to check the anonymity of a connection through an HTTP proxy , check the integrity of an HTTP conversation, and test a Tor setup , it is more commonly used to find out the browser and network settings when troubleshooting. The anonymity checker is also a good way to find out if your privacy plugin conceals or ruins your Privacy.




Anonymity-check performs a plethora of tests and it is enhanced with new tests at a regular basis.

For the most part it reports only its finds.



Some of the Anonymity-check checks:


  1. Searching the HTTP headers for proxy traces.



    Some common HTTP headers used by web proxy servers are the following.




    1. HTTP_FORWARDED

    2. HTTP_X_FORWARDED_FOR

    3. HTTP_VIA

    4. HTTP_PROXY_CONNECTION

    5. HTTP_PROXY_ID

    6. HTTP_XROXY_CONNECTION

    7. HTTP_PROXY_CONNECTION

    8. HTTP_CLIENT_IP



  2. If cookies are accepted,anonymity-check processes the *leg cookies which hold information about the client's earlier visits and the previous IP address.

  3. The anonymity checker attempts to virtually ( it does not really store any of your inforamtion to the IPduh systems ) track you through an ETag.

  4. If Java is enabled, anonymity-check attempts to figure out your private IP address along with your computer's host name. None of this information is sent back to IPduh.

  5. Anonymity-check looks at the IP packets coming from your system or proxy system. This way it attempts to find out the MTU and advertised MSS along with information about your OS, your uptime, whether you are behind a NAT router or a firewall, your link type, and the number of the intermediate routers.

  6. Anonymity-check attempts to print the referral URI and the visiting system's host name as seen in the HTTP headers.

  7. Anonymity-check shows a report about your public IP addess. This report contains the same information with ip.

  8. Anonymity-check prints your user agent information as seen in the HTTP headers.

  9. Anonymity-check attemps to figure out the language(s) set to default on your web browser.

  10. If javascript is enabled on your browser, anonymity-check

    1. prints the cookies set by IPduh

    2. the visiting system's screen dimensions

    3. the character string identifying your WWW user agent.

    4. the plugins installed on the web browser, if any

    5. the operating system and the operating system vendor if available

    6. Attempts to store information about your visit on your system.

    7. If the Flash plugin is installed and enabled the anonymity checker attempts to store information about your visit on the Flash Local Share Object.

    8. Attempts to find previously stored information about your visits on your system.



  11. The Anonymity checker attempts to find the cashing name servers used by your system and print links to more information about them.

  12. The Anonymity checker attempts to detect anomalies such as missing or extra headers and HTML injections in the HTTP conversations between you system and IPduh.





Note


To see all the anonymity-check finds visit it two times in a browsing session, then do what you usually do when you want to clean up your browsing history and visit the Anonymity Checker again.

To encrypt your communication with the anonymity checker use https://ipduh.com/anonymity-check.



To use TLS - SSL encryption in between your browser and IPduh you may need to trust the IPduh Certificate Authortity - install the IPduh CA public certificate.

To automate your public IP address lookup you could use http://ipduh.com/my/ip.

Most privacy and anti-tracking Firefox plugins tested against the anonymity-check, so far ( 1330538493 ), failed to deliver what they promise. Actually, 90% of them are completely useless or do Privacy Concealing like it is 1996.





my/geoloc    Tools Menu

geographical location




Yet another HTML5 Location Aware Browsing Demo. Let Google Location Services to estimate your geographical location and draw it on a map.



Before using my/geoloc your browser should ask you if you would like to share the geographical estimation of your system and your IP address with the browser's location service provider --Usually Google Location Services. Your IP address, your GPS reading (if any), and a unique ID identifying your web browser are sent to the location service provider. In case of Google Location Services a cookie with the name PREF is stored in your browser's cookie jar.





demux    Tools Menu

Submit a string of characters to an appropriate IPduh tool





input:

A string of characters:

[ IP address | IP CIDR block | IPv6 address | IPv6 CIDR block | Autonomous System Number | DNS name | URI ]



output:

The string of characters submitted to Demux is submitted to an appropriate IPduh tool.

[ ip | ip/cidr | ipv6 | ipv6/cidr | ip/whois/as | dns | url/decode]




Examples of using demux








demux/class    Tools Menu

Classify a string of characters and see the appropriate IPduh links





input:

A string of characters:

[ IP address | IP CIDR block | IPv6 address | IPv6 CIDR block | Autonomous System Number | DNS name | URI ]



output:

A classification and appropriate IPduh links to further information about the string of characters submitted given.





Examples of using demux/class








demux/list    Tools Menu

Create a List of IP numbers, DNS names, and URIs





input:



listed items:

[ IPv4 address | IPv6 address | IPv4 CIDR block | IPv6 CIDR block | Autonomous System Number | DNS names | URI ]



ipduh-list built-in variables and punctuation marks:

&list=   ---   ,   &title=   ;



comments:

All strings of characters not Identified by demux/list as IP numbers, DNS names, or URIs are printed without IPduh links.

A ; stops list processing and hides all characters following it.



output:

A bookmarkable list of DNS names, IP numbers, URIs and your comments along with links to the appropriate IPduh tools.




Examples of using demux/list






Note


-- is not a valid delimeter anymore. Use , or --- instead. Lists using -- may be compiled by http://ipduh.com/demux/list/old.



There is a 3KB limit on the size of the demux lists.



Through Bouncer URLs are printed only for HTTP , HTTPS , and FTP URIs.





apropos    Tools Menu    apropos guides    add apropos to your browser

Apropos will submit any string of characters to the appropriate IPduh tool.




Apropos may be used as an Internet Forensics Search Engine or a General Purpose Search Engine. Apropos is a good place to start your research and the most commonly used Tool of IPduh.




input:

Any string of characters





output:

The string of characters submitted to apropos will be submitted to the appropriate IPduh tool.

[ ip | ip/cidr | ipv6 | ipv6/cidr | ip/whois/as | dns | url/decode | torrent search | search ]




Examples of using apropos





Note: apropos does not handle IPduh lists ( ip/list , dns/list , demux/list )




apropos guides







Add Apropos to your Browser:



You can add apropos to your browser search engines or set it as your default search engine.



Add Apropos to Mozilla Firefox and Mozilla based browsers

Add Apropos to Chrome

Add Apropos to Internet Explorer

Add Apropos to Opera









To add Apropos to your Mozilla Firefox Search Engines:



Add the Firefox IPduh Apropos add-on from https://addons.mozilla.org/addon/ipduh-apropos/



OR



Click on this



OR


  • visit IPduh

  • click on the down arrow used to select search engine

  • click on Add IPduh Apropos.






To set Apropos as the default search engine used for invalid URLs on Firefox and Mozilla Based Browsers ( Iceweasel , Seamonkey , etc ):


  • Enter about:config in the browser location bar.

  • Promise, you 'll be carefull.

  • Enter keyword.URL in the Filter: under the location bar.

  • Double-click on the keyword.URL result.

  • Enter http://ipduh.com/apropos/? in the text box that pops up

  • OK and close the about:config tab.








To add IPduh Apropos to your Search Engines on Chrome Based Browsers:



Click on this



To set IPduh Apropos as your default search engine on Chrome Based Browsers:


  • visit IPduh

  • Click the Wrench

  • Click Settings

  • Choose IPduh Apropos from the drop down list in the Search section under "Set which search engine is used when searching from the omnibox"






In Chrome's omnibox and when Apropos is set as the search engine used on the location bar, you can differentiate domain names you want to lookup from domain names you want to visit by prepending !d to your query eg: http://ipduh.com/apropos/?!d bing.no. You can also differentiate URIs you want to visit from URIs you want to decode and analyse by prepending !u to the ones you want to analyze, and jump to a Torrent Search by prepending !t to your query.



To add IPduh Apropos to your Internet Explorer Search Engines:



Click on this



OR






  • visit IPduh

  • click on the down arrow used to select search engine

  • click on Add Search Providers.

  • click on IPduh Apropos.








To add IPduh Apropos to your Opera Search Engines:


  • visit IPduh

  • click on the down arrow used to select search engine

  • click on Manage Search Engines.

  • click the Add... Button.

  • set the Name -- Apropos.

  • set the Keyword -- a.

  • set the address to http://ipduh.com/apropos/?%s

  • The check boxes following are optional.

  • Hit OK








You can add Apropos over an encrypted connection to your Browser search engines.



Add Apropos over HTTPS to Mozilla Firefox and Mozilla based browsers

Add Apropos over HTTPS to Chrome

Add Apropos over HTTPS to Internet Explorer

Add Apropos over HTTPS to Opera









To add Apropos over HTTPS ( an encrypted connection ) to the Mozilla Firefox Search Engines:



add the Firefox IPduh Apropos SSL add-on from https://addons.mozilla.org/en-US/firefox/addon/apropos-ssl/



OR


  • visit IPduh Privacy

  • click on the down arrow used to select search engine

  • click on Add IPduh Apropos SSL.






To set Apropos over SSL as the default search engine used for invalid URLs on Firefox and Mozilla Based Browsers ( Iceweasel , Seamonkey , etc ):


  • Enter about:config in the browser location bar.

  • Promise, you 'll be carefull.

  • Enter keyword.URL in the Filter: under the location bar.

  • Double-click on the keyword.URL result.

  • Enter https://ipduh.com/apropos/? in the text box that pops up

  • OK and close the about:config tab.








To set IPduh Apropos over SSL as your default search engine on Chrome Based Browsers:


  • visit the IPduh privacy page.

  • Click the Wrench

  • Click Settings

  • Choose IPduh Apropos SSL from the drop down list in the Search section under "Set which search engine is used when searching from the omnibox"






In Chrome's omnibox and when Apropos is set as the search engine used on the location bar, you can differentiate domain names you want to lookup from domain names you want to visit by prepending !d to your query eg: http://ipduh.com/apropos/?!d bing.no. If you want to decode and analyze a URI instead of visiting it you can prepend !u to your query, and jump to a Torrent Search by prepending !t to your query.



To add IPduh Apropos over HTTPS to your Internet Explorer Search Engines:


  • visit the IPduh privacy page.

  • click on the down arrow used to select search engine

  • click on Add Search Providers.

  • click on IPduh Apropos SSL.








To add IPduh Apropos over HTTPS to your Opera Search Engines:


  • visit the IPduh privacy page.

  • click on the down arrow used to select search engine

  • click on Manage Search Engines.

  • click the Add... Button.

  • set the Name -- Apropos.

  • set the Keyword -- a.

  • set the address to https://ipduh.com/apropos/?%s

  • The check boxes following are optional.

  • Hit OK








Torrent Search    Tools Menu

Search Torrents across all the major Torrent Trackers, Torrent Directories, and Torrent Search Engines.




Add the Torrent Search to your Browser Search Engines.



Add Torrent Search to Mozilla Firefox and Mozilla based browsers

Add Torrent Search to Internet Explorer

Add Torrent Search to Opera





To add Torrent Search to your Firefox Search Engines:



Add the Firefox Torrent add-on from https://addons.mozilla.org/en-US/firefox/addon/torrent/



OR


  • visit the Torrent Search

  • click on the down arrow used to select search engine

  • click on Add Torrent Search.






To add Torrent Search to your Internet Explorer Search Engines:


  • visit the Torrent Search

  • click on the down arrow used to select search engine

  • click on Add Search Providers.

  • click on Torrent Search.






To add Torrent Search to your Opera Search Engines:


  • visit the Torrent Search


  • click on the down arrow used to select search engine

  • click on Manage Search Engines.

  • click the Add... Button.

  • set the Name -- Torrent Search.

  • set the Keyword -- t.

  • set the address to http://ipduh.com/search/torrent/?q=%s

  • The check boxes following are optional.

  • Hit OK








The Torrent Search is available through apropos with the !t guide.



Add the Torrent Search over HTTPS --an encrypted Connection-- to your Browser Search Engines.



Add Torrent Search over HTTPS to Mozilla Firefox and Mozilla based browsers

Add Torrent Search over HTTPS to Internet Explorer

Add Torrent Search over HTTPS to Opera





To add Torrent Search over HTTPS to your Mozilla Firefox Search Engines:



Add the Firefox Torrent SSL add-on.



OR


  • visit IPduh Privacy

  • click on the down arrow used to select search engine

  • click on Add Torrent Search SSL.






To add Torrent Search over HTTPS to your Internet Explorer Search Engines:


  • visit the IPduh privacy page.

  • click on the down arrow used to select search engine

  • click on Add Search Providers.

  • click on Torrent Search SSL.






To add Torrent Search SSL to your Opera Search Engines:


  • visit the IPduh privacy page.


  • click on the down arrow used to select search engine

  • click on Manage Search Engines.

  • click the Add... Button.

  • set the Name -- Torrent Search SSL.

  • set the Keyword -- t or whatever else you think appropriate.

  • set the address to https://ipduh.com/search/torrent/?q=%s

  • The check boxes following are optional.

  • Hit OK








gmap    Tools Menu

Display a set of coordinates ( latitude , longitude ) on a google map.





input:



Decimal latitude φ, longitude λ in the uri parameters



output:

A google map with a marker on the set of coordinates passed.


Examples of using gmap.






gmap/tolatlon    Tools Menu

Display and Find coordinates ( latitude , longitude ) on a google map.







input:



Markers with Right Click and decimal latitude and longitude in the uri parameters



output:

A google map with a marker on the set of coordinates passed.

You may right click on the map to enter markers and get the coordinates of points.


Examples of using gmap/tolatlon.

















ip  ip/whois  ip/dnsbl  ip/cidr  ip/ptr  ip/ptr/24  ip/dnstrace  ip/srv  ip/traceroute  ip/tor-exit  ip/list

 ip/whois/as  pdb/as  as/prefix  apropos  demux  demux/class  demux/list

 ipv6  ipv6/whois  ipv6/ptr  ipv6/dnstrace  ipv6/cidr  ipv6/traceroute

dns  dns/whois  dns/trace  dns/bl  dns/list  idn  idn/ace  idn/unicode

 anonymity check  url/decode  url/encode  url/bouncer  my/geoloc  epoch

© 1372644985 IPduh Search Contact Privacy








MAKNA SPIRITUAL DAN FILOSOFIS HANACARAKA: KAJIAN KEBATINAN JAWA DALAM PERSPEKTIF

  MAKNA SPIRITUAL DAN FILOSOFIS HANACARAKA: KAJIAN KEBATINAN JAWA DALAM PERSPEKTIF MAHASISWA   Disusun untuk memenuhi tugas mata kuliah Fils...