Jim Atkins, thedosmann, is a website programmer who started programming in the early 90's. He has worked professionally as a Manager of Technical Services, Website developer, hosting provider, and consultant since 1995.
The following is a list of IPs that ignore robot.txt that I have collected over the past year or so.
As the Sony hack investigation unfolds, revelations regarding its possible origin, type of hack used, and the damage it is purported to have caused, are starting to be revealed.
In programming code it is possible to theorize about several aspects of code flow and dependency through coding models. One such model is the Actor Model.
Google is pioneering another innovation which may someday replace the need for passwords. The device they are introducing is a pluggable USB device that acts as the authentication mechanism to login. By inserting the device into a USB port and touching it a process is started that authenticates the user through that physical device.
VR (Virtual Reality) is not a new concept and it has seen its share of failures and even long spans of time in virtual limbo. The idea and reality of VR have, for some time, been separated by a chasm of ergonomics, hardware requirements, and consumer acceptance.
Headlines like "Devastating Heartbleed Flaw Was Used in Hospital Hack" and others tend to make one wonder if anybody is paying attention. The hackers are letting the security firms do the grunt work of finding flaws and then all they have to do is troll for sites don't update.
Coinciding with the cascading avalanche of information on the disaster of Flight MH17, there is an influx of malware, false stories, and spam, permeating the internet.
The vulnerability is codenamed TowelRoot after a rooting tool that was released for rooting mobile devices that uses this vulnerability to root most mobile devices on the market.
Detecting spoofed Ips and geo-targeting. A national infrastructure like this would also expose ISPs and routes that allow non-network IPs to originate from their network.