Возраст домена | 14 лет |
Дата окончания | Истек срок регистрации |
PR | 2 |
ИКС | 0 |
Страниц в Google | 246 |
Страниц в Яндексе | 74 |
Dmoz | Нет |
Яндекс Каталог | Нет |
Alexa Traffic Rank | 2727702 |
Alexa Country | Нет данных |
История изменения показателей | Авторизация |
Идет сбор информации... Обновить
John Melton's Weblog – Java, Security and Technology
n/a
n/a
UTF-8
135.39 КБ
2 500
60 215 симв.
50 068 симв.
Данные предоставлены сервисом semrush
Сайт | Общие фразы | PR | тИЦ | Alexa Rank | Alexa Country | |
---|---|---|---|---|---|---|
owasp.org | 82 | 7 |
0 | 20332 | 12362 | |
stackoverflow.com | 75 | 7 |
0 | 47 | 44 | |
github.com | 27 | 8 |
0 | 44 | 33 | |
youtube.com | 25 | 9 |
0 | 2 | 2 | |
google.com | 22 | 9 |
0 | 1 | 1 | |
coderanch.com | 21 | 5 |
0 | 10342 | 3082 | |
springsource.org | 17 | 7 |
0 | 1332388 | Нет данных | |
wikipedia.org | 16 | 9 |
0 | 5 | 6 | |
mkyong.com | 15 | 4 |
0 | 8481 | 2258 | |
oracle.com | 10 | 8 |
0 | 356 | 319 | |
metawerx.net | 3 | 3 |
10 | 972814 | 243097 | |
liferay.com | 3 | 8 |
0 | 34398 | 10791 | |
java.net | 3 | 7 |
400 | 20835 | 12960 | |
devmanuals.com | 2 | 2 |
0 | 988788 | 236885 | |
ibm.com | 2 | 8 |
0 | 599 | 449 | |
atlassian.com | 2 | 7 |
0 | 1389 | 881 | |
Еще 34 сайта после авторизации |
Данные предоставлены сервисом semrush
Счетчик | Посетители за 24 часа | Просмотры | Просмотров на посетителя |
---|---|---|---|
Google Analytics | Нет доступа | Нет доступа | n/a |
Данные linkpad ( 3 Марта 2013 ) | |
Количество ссылок на сайт | 44 |
Количество доменов, которые ссылаются на сайт | 12 |
Количество найденных анкоров | 12 |
Исходящие (внешние) ссылки домена | 2286 |
Количество доменов, на которые ссылается сайт | 128 |
Количество исходящих анкоров | 213 |
Внешние ссылки главной страницы ( 83 ) | |
twitter.com/_jtmelton | - |
linkedin.com/in/johnmelton | - |
github.com/jtmelton | - |
twitter.com/share | Tweet |
owasp.org/index.php/OWASP_Dependency_Check | OWASP Dependency Check |
bekk.github.io/retire.js/ | Retire.js |
openhub.net | here |
cwiki.apache.org/confluence/display/S2PLUGINS/Home | plugin architecture |
struts.apache.org/docs/plugins.html#Plugins-ExtensionPoints | extension points |
blogs.oracle.com/swchan/entry/servlet_3_0_web_fragment | web fragments |
docs.spring.io/spring-boot/docs/current/reference/htmlsingle... | “actuator” |
github.com/dropwizard/metrics | metrics |
start.spring.io | http://start.spring.io |
start.spring.io/trace | http://start.spring.io/trace |
start.spring.io/mappings | http://start.spring.io/mappings |
start.spring.io/metrics | http://start.spring.io/metrics |
start.spring.io/info | http://start.spring.io/info |
start.spring.io/env | http://start.spring.io/env |
start.spring.io/autoconfig | http://start.spring.io/autoconfig |
start.spring.io/configprops | http://start.spring.io/configprops |
start.spring.io/beans | http://start.spring.io/beans |
start.spring.io/dump | http://start.spring.io/dump |
technorati.com/tag/PDF | |
technorati.com/tag/Year+of+Security+For+Java | Year of Security For Java |
technorati.com/tag/Experience | Experience |
technorati.com/tag/Fundamentals | Fundamentals |
technorati.com/tag/Improve | Improve |
technorati.com/tag/document | document |
technorati.com/tag/Think | Think |
youtube.com/watch?v=VShmtsLhkQg | John Cleese talk on Creativity |
ted.com/ | http://www.ted.com/ |
technorati.com/tag/Creativity | Creativity |
codeascraft.etsy.com/2011/02/15/measure-anything-measure-eve... | http://codeascraft.etsy.com/2011/02/15/measure-anything-measure-everything/ |
veracode.com/reports/index.html | http://www.veracode.com/reports/index.html |
verizonbusiness.com/about/events/2012dbir/ | http://www.verizonbusiness.com/about/events/2012dbir/ |
whitehatsec.com/resource/stats.html | https://www.whitehatsec.com/resource/stats.html |
twitter.com/securityninja | Security Ninja |
securityninja.co.uk/application-security/application-securit... | http://www.securityninja.co.uk/application-security/application-security-data/ |
fsisac.com/ | FS-ISAC |
github.com/jsteven/psm/tree/master/Documents | this helpful spreadsheet |
technorati.com/tag/Data+Collection | Data Collection |
technorati.com/tag/Data+Sharing | Data Sharing |
owasp.org/index.php/OWASP_AppSensor_Project | https://www.owasp.org/index.php/OWASP_AppSensor_Project |
technorati.com/tag/AppSensor | AppSensor |
technorati.com/tag/Attack | Attack |
technorati.com/tag/Breach | Breach |
technorati.com/tag/DEVOPS | DEVOPS |
technorati.com/tag/Disaster+Recovery | Disaster Recovery |
technorati.com/tag/Hack | Hack |
technorati.com/tag/Incident+Response | Incident Response |
technorati.com/tag/Security+Program | Security Program |
owasp.org/index.php/Cryptographic_Storage_Cheat_Sheet | https://www.owasp.org/index.php/Cryptographic_Storage_Cheat_Sheet |
technorati.com/tag/data+re-keying | data re-keying |
technorati.com/tag/encryption | encryption |
technorati.com/tag/encryption+keys | encryption keys |
technorati.com/tag/key+rotation | key rotation |
technorati.com/tag/secure+data+storage | secure data storage |
en.wikipedia.org/wiki/Rainbow_table | Rainbow tables |
en.wikipedia.org/wiki/Graphics_processing_unit | hardware |
twitter.com/m1splacedsoul | jOHN Steven |
goo.gl/Spvzs | Secure Password Storage Threat Model |
github.com/jsteven/psm | jOHN Steven PSM code / docs |
cigital.com/justice-league-blog/2012/06/11/securing-password... | http://www.cigital.com/justice-league-blog/2012/06/11/securing-password-digests-or-how-to-protect-lonely-unemployed-radio-listen... |
blog.whitehatsec.com/hash-length-extension-attacks/ | https://blog.whitehatsec.com/hash-length-extension-attacks/ |
cigital.com/justice-league-blog/2009/08/14/proper-use-of-jav... | http://www.cigital.com/justice-league-blog/2009/08/14/proper-use-of-javas-securerandom/ |
throwingfire.com/storing-passwords-securely/ | http://throwingfire.com/storing-passwords-securely/ |
analyticalengine.net/2012/06/should-we-really-use-bcryptscry... | http://www.analyticalengine.net/2012/06/should-we-really-use-bcryptscrypt/ |
analyticalengine.net/2012/06/one-of-many-problems-with-appse... | http://www.analyticalengine.net/2012/06/one-of-many-problems-with-appsec/ |
troyhunt.com/2012/06/our-password-hashing-has-no-clothes.htm... | http://www.troyhunt.com/2012/06/our-password-hashing-has-no-clothes.html |
blog.mozilla.org/webdev/2012/06/08/lets-talk-about-password-... | http://blog.mozilla.org/webdev/2012/06/08/lets-talk-about-password-storage/ |
wiki.mozilla.org/WebAppSec/Secure_Coding_Guidelines#Password... | https://wiki.mozilla.org/WebAppSec/Secure_Coding_Guidelines#Password_Storage |
owasp.org/index.php/Password_Storage_Cheat_Sheet | https://www.owasp.org/index.php/Password_Storage_Cheat_Sheet |
owasp.org/index.php/Hashing_Java | https://www.owasp.org/index.php/Hashing_Java |
en.wikipedia.org/wiki/Key_derivation_function | http://en.wikipedia.org/wiki/Key_derivation_function |
en.wikipedia.org/wiki/Key_stretching | http://en.wikipedia.org/wiki/Key_stretching |
krebsonsecurity.com/2012/06/how-companies-can-beef-up-passwo... | http://krebsonsecurity.com/2012/06/how-companies-can-beef-up-password-security/ |
technorati.com/tag/adaptive+hash | adaptive hash |
technorati.com/tag/hash | hash |
technorati.com/tag/password+storage | password storage |
technorati.com/tag/salt | salt |
technorati.com/tag/user+passwords | user passwords |
machothemes.com/themes/decode/ | Decode Theme |
machothemes.com/ | Macho Themes |
Внутренние ссылки главной страницы ( 91 ) | |
jtmelton.com | - |
jtmelton.com/ | John Melton's Weblog |
jtmelton.com/about/ | About |
jtmelton.com/2014/12/30/framework-magic/#comments | 2 Comments |
jtmelton.com/2012/03/29/year-of-security-for-java-week-13-kn... | https://www.jtmelton.com/2012/03/29/year-of-security-for-java-week-13-know-your-frameworks/ |
jtmelton.com/2012/09/21/year-of-security-for-java-week-38-cr... | https://www.jtmelton.com/2012/09/21/year-of-security-for-java-week-38-create-a-reusable-security-framework/ |
jtmelton.com/author/admin/ | john |
jtmelton.com/2013/01/08/year-of-security-for-java-pdf/#respo... | No Comments |
jtmelton.com/wp-content/uploads/YearOfSecurityforJava.pdf | Year of Security for Java – Complete Series – PDF |
jtmelton.com/2013/01/08/year-of-security-for-java-conclusion... | 1 Comment |
jtmelton.com/2012/01/02/year-of-security-for-java-introducti... | https://www.jtmelton.com/2012/01/02/year-of-security-for-java-introduction/ |
jtmelton.com/2012/01/02/year-of-security-for-java-week-1-ses... | https://www.jtmelton.com/2012/01/02/year-of-security-for-java-week-1-session-fixation-prevention/ |
jtmelton.com/2012/01/10/year-of-security-for-java-week-2-err... | https://www.jtmelton.com/2012/01/10/year-of-security-for-java-week-2-error-handling-in-web-xml/ |
jtmelton.com/2012/01/17/year-of-security-for-java-week-3-ses... | https://www.jtmelton.com/2012/01/17/year-of-security-for-java-week-3-session-cookie-secure-flag/ |
jtmelton.com/2012/01/25/year-of-security-for-java-week-4-ses... | https://www.jtmelton.com/2012/01/25/year-of-security-for-java-week-4-session-cookie-httponly-flag/ |
jtmelton.com/2012/02/03/year-of-security-for-java-week-5-cli... | https://www.jtmelton.com/2012/02/03/year-of-security-for-java-week-5-clickjacking-prevention/ |
jtmelton.com/2012/02/07/year-of-security-for-java-week-6-csr... | https://www.jtmelton.com/2012/02/07/year-of-security-for-java-week-6-csrf-prevention-in-java/ |
jtmelton.com/2012/02/14/year-of-security-for-java-week-7-con... | https://www.jtmelton.com/2012/02/14/year-of-security-for-java-week-7-content-security-policy/ |
jtmelton.com/2012/02/21/year-of-security-for-java-week-8-htt... | https://www.jtmelton.com/2012/02/21/year-of-security-for-java-week-8-http-strict-transport-security/ |
jtmelton.com/2012/02/28/year-of-security-for-java-week-9-x-f... | https://www.jtmelton.com/2012/02/28/year-of-security-for-java-week-9-x-frame-options/ |
jtmelton.com/2012/03/06/year-of-security-for-java-week-10-x-... | https://www.jtmelton.com/2012/03/06/year-of-security-for-java-week-10-x-content-type-options/ |
jtmelton.com/2012/03/13/year-of-security-for-java-week-11-x-... | https://www.jtmelton.com/2012/03/13/year-of-security-for-java-week-11-x-xss-protection/ |
jtmelton.com/2012/03/20/year-of-security-for-java-week-12-lo... | https://www.jtmelton.com/2012/03/20/year-of-security-for-java-week-12-log-forging-prevention/ |
jtmelton.com/2012/04/03/year-of-security-for-java-week-14-st... | https://www.jtmelton.com/2012/04/03/year-of-security-for-java-week-14-store-jsps-in-web-inf/ |
jtmelton.com/2012/04/10/year-of-security-for-java-week-15-au... | https://www.jtmelton.com/2012/04/10/year-of-security-for-java-week-15-audit-security-related-events/ |
jtmelton.com/2012/04/17/year-of-security-for-java-week-16-se... | https://www.jtmelton.com/2012/04/17/year-of-security-for-java-week-16-set-a-soft-session-timeout/ |
jtmelton.com/2012/04/27/year-of-security-for-java-week-17-se... | https://www.jtmelton.com/2012/04/27/year-of-security-for-java-week-17-set-a-hard-session-timeout/ |
jtmelton.com/2012/05/01/year-of-security-for-java-week-18-pe... | couple |
jtmelton.com/2012/05/09/year-of-security-for-java-week-19-re... | https://www.jtmelton.com/2012/05/09/year-of-security-for-java-week-19-reduce-the-attack-surface/ |
jtmelton.com/2012/05/16/year-of-security-for-java-week-20-tr... | https://www.jtmelton.com/2012/05/16/year-of-security-for-java-week-20-trust-nothing/ |
jtmelton.com/2012/05/23/year-of-security-for-java-week-21-an... | https://www.jtmelton.com/2012/05/23/year-of-security-for-java-week-21-anti-caching-headers/ |
jtmelton.com/2012/05/31/year-of-security-for-java-week-22-ht... | https://www.jtmelton.com/2012/05/31/year-of-security-for-java-week-22-http-parameter-pollution/ |
jtmelton.com/2012/06/06/year-of-security-for-java-week-23-ht... | https://www.jtmelton.com/2012/06/06/year-of-security-for-java-week-23-http-header-injection/ |
jtmelton.com/2012/06/13/year-of-security-for-java-week-24-us... | https://www.jtmelton.com/2012/06/13/year-of-security-for-java-week-24-use-static-analysis/ |
jtmelton.com/2012/06/20/year-of-security-for-java-week-25-us... | https://www.jtmelton.com/2012/06/20/year-of-security-for-java-week-25-use-dynamic-analysis/ |
jtmelton.com/2012/06/27/year-of-security-for-java-week-26-do... | code review |
jtmelton.com/2012/07/05/year-of-security-for-java-week-27-pe... | https://www.jtmelton.com/2012/07/05/year-of-security-for-java-week-27-penetration-testing/ |
jtmelton.com/2012/07/11/year-of-security-for-java-week-28-un... | https://www.jtmelton.com/2012/07/11/year-of-security-for-java-week-28-unit-test/ |
jtmelton.com/2012/07/17/year-of-security-for-java-week-29-ma... | https://www.jtmelton.com/2012/07/17/year-of-security-for-java-week-29-manage-resources/ |
jtmelton.com/2012/07/25/year-of-security-for-java-week-30-au... | authentication |
jtmelton.com/2012/08/02/year-of-security-for-java-week-31-ac... | access control |
jtmelton.com/2012/08/07/year-of-security-for-java-week-32-ac... | https://www.jtmelton.com/2012/08/07/year-of-security-for-java-week-32-access-control-2/ |
jtmelton.com/2012/08/14/year-of-security-for-java-week-33-ac... | https://www.jtmelton.com/2012/08/14/year-of-security-for-java-week-33-access-control-3/ |
jtmelton.com/2012/08/21/year-of-security-for-java-week-34-se... | https://www.jtmelton.com/2012/08/21/year-of-security-for-java-week-34-separate-admin-functionality/ |
jtmelton.com/2012/08/30/year-of-security-for-java-week-35-so... | https://www.jtmelton.com/2012/08/30/year-of-security-for-java-week-35-solve-security-problems-one-at-a-time/ |
jtmelton.com/2012/09/07/year-of-security-for-java-week-36-so... | https://www.jtmelton.com/2012/09/07/year-of-security-for-java-week-36-solve-sql-injection/ |
jtmelton.com/2012/09/12/year-of-security-for-java-week-37-so... | https://www.jtmelton.com/2012/09/12/year-of-security-for-java-week-37-solve-cross-site-scripting/ |
jtmelton.com/2012/09/27/year-of-security-for-java-week-39-do... | https://www.jtmelton.com/2012/09/27/year-of-security-for-java-week-39-dont-reinvent-the-wheel-unless-its-square/ |
jtmelton.com/2012/10/05/year-of-security-for-java-week-40-ge... | https://www.jtmelton.com/2012/10/05/year-of-security-for-java-week-40-get-a-security-person-or-some-people-if-you-can/ |
jtmelton.com/2012/10/12/year-of-security-for-java-week-41-sp... | https://www.jtmelton.com/2012/10/12/year-of-security-for-java-week-41-spend-wisely-on-developer-security-training/ |
jtmelton.com/2012/10/19/year-of-security-for-java-week-42-br... | https://www.jtmelton.com/2012/10/19/year-of-security-for-java-week-42-break-something/ |
jtmelton.com/2012/10/27/year-of-security-for-java-week-43-bu... | https://www.jtmelton.com/2012/10/27/year-of-security-for-java-week-43-build-something-and-give-it-away/ |
jtmelton.com/2012/11/03/year-of-security-for-java-week-44-fo... | https://www.jtmelton.com/2012/11/03/year-of-security-for-java-week-44-follow-a-secure-sdlc/ |
jtmelton.com/2012/11/09/year-of-security-for-java-week-45-do... | threat model |
jtmelton.com/2012/11/17/year-of-security-for-java-week-46-st... | 1 Comment |
jtmelton.com/2012/11/24/year-of-security-for-java-week-47-st... | No Comments |
jtmelton.com/2012/12/01/year-of-security-for-java-week-48-yo... | No Comments |
jtmelton.com/2012/12/08/year-of-security-for-java-week-49-co... | No Comments |
jtmelton.com/2012/12/13/year-of-security-for-java-week-50-th... | 1 Comment |
jtmelton.com/2012/12/22/year-of-security-for-java-week-51-do... | No Comments |
jtmelton.com/2012/12/29/year-of-security-for-java-week-52-ne... | No Comments |
jtmelton.com/2010/11/10/application-intrusion-detection-with... | times |
jtmelton.com/page/2/ | Older posts |
jtmelton.com/2014/12/ | December 2014 |
jtmelton.com/2013/01/ | January 2013 |
jtmelton.com/2012/12/ | December 2012 |
jtmelton.com/2012/11/ | November 2012 |
jtmelton.com/2012/10/ | October 2012 |
jtmelton.com/2012/09/ | September 2012 |
jtmelton.com/2012/08/ | August 2012 |
jtmelton.com/2012/07/ | July 2012 |
jtmelton.com/2012/06/ | June 2012 |
jtmelton.com/2012/05/ | May 2012 |
jtmelton.com/2012/04/ | April 2012 |
jtmelton.com/2012/03/ | March 2012 |
jtmelton.com/2012/02/ | February 2012 |
jtmelton.com/2012/01/ | January 2012 |
jtmelton.com/2011/02/ | February 2011 |
jtmelton.com/2010/11/ | November 2010 |
jtmelton.com/2010/09/ | September 2010 |
jtmelton.com/2010/08/ | August 2010 |
jtmelton.com/2010/07/ | July 2010 |
jtmelton.com/2010/06/ | June 2010 |
jtmelton.com/2010/05/ | May 2010 |
jtmelton.com/2009/12/ | December 2009 |
jtmelton.com/2009/01/ | January 2009 |
jtmelton.com/2008/01/ | January 2008 |
jtmelton.com/2007/11/ | November 2007 |
jtmelton.com/2007/10/ | October 2007 |
jtmelton.com/2007/08/ | August 2007 |
jtmelton.com/2007/07/ | July 2007 |
Domain Name: JTMELTON.COM
Registry Domain ID: 1573769648_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.godaddy.com
Registrar URL: http://www.godaddy.com
Update Date: 2013-10-29 07:05:26
Creation Date: 2009-10-28 07:55:54
Registrar Registration Expiration Date: 2015-10-28 07:55:54
Registrar: GoDaddy.com, LLC
Registrar IANA ID: 146
Registrar Abuse Contact Email: abuse@godaddy.com
Registrar Abuse Contact Phone: +1.480-624-2505
Domain Status: clientTransferProhibited
Domain Status: clientUpdateProhibited
Domain Status: clientRenewProhibited
Domain Status: clientDeleteProhibited
Registry Registrant ID:
Registrant Name: John Melton
Registrant Organization:
Registrant Street: 3803 Saxonbury Way
Registrant City: Charlotte
Registrant State/Province: North Carolina
Registrant Postal Code: 28269
Registrant Country: United States
Registrant Phone: (704) 806-9523
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
Registrant Email: jtmelton@gmail.com
Registry Admin ID:
Admin Name: John Melton
Admin Organization:
Admin Street: 3803 Saxonbury Way
Admin City: Charlotte
Admin State/Province: North Carolina
Admin Postal Code: 28269
Admin Country: United States
Admin Phone: (704) 806-9523
Admin Phone Ext:
Admin Fax:
Admin Fax Ext:
Admin Email: jtmelton@gmail.com
Registry Tech ID:
Tech Name: John Melton
Tech Organization:
Tech Street: 3803 Saxonbury Way
Tech City: Charlotte
Tech State/Province: North Carolina
Tech Postal Code: 28269
Tech Country: United States
Tech Phone: (704) 806-9523
Tech Phone Ext:
Tech Fax:
Tech Fax Ext:
Tech Email: jtmelton@gmail.com
Name Server: NS1.BLUEHOST.COM
Name Server: NS2.BLUEHOST.COM
DNSSEC: unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
Last update of WHOIS database: 2014-03-02T16:00:00Z
User-agent: *
Disallow: /wp-admin/
Allow: /wp-admin/admin-ajax.php
Sitemap: https://www.jtmelton.com/sitemap.xml
США - 67.221.237.21
Xiolink, LLC
Xiolink, LLC
HTTP/1.1 200 OK
Server: nginx
Date: Fri, 20 Dec 2019 05:21:16 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Link: ; rel="https://api.w.org/"
Vary: Accept-Encoding,User-Agent
Host-Header: 5d77dd967d63c3104bced1db0cace49c
X-Proxy-Cache: MISS
Кнопка для анализа сайта в один клик, для установки перетащите ссылку на "Панель закладок"