I’m using Tor for so long that I can’t remember! The main reasons to use it are to access some websites while preserving my anonymity (after all that’s the main purpose of Tor) but also to access dangerous resources like command & control servers or sites delivering malicious content. The
ISC Top-100 Malicious IP: STIX Feed Updated
Based on my previous ISC SANS Diary, I updated the STIX feed to answer the requests made by some readers. The feed is now available in two formats: STIX 1.2 (XML) (link) STIX 2.0 (JSON) (link) There are updated every 2 hours. Enjoy!
How Shared Hosting Can Affect Your Reputation?
A quick blog post about the risks associated with shared hosting solutions. Today it’s very easy to rent some space on the intertubes. They are tons of companies which give you some gibabytes of storage and bandwidth for a few bucks per month. It’s easy as 1-2-3, even Granny is