blog.liquidinfo.net blog.liquidinfo.net

blog.liquidinfo.net

Liquid Information

Tweets and blog posts are my own and do not express the views or opinions of my employer. April 25, 2015. Share the Threat Intelligence? This data would then be retrievable for organizations based on their preferences, organizations first make sanity checks to the data before applying it to different technologies. Sanity check like "am I in the feed data" would serve a detective purpose. Thus there would be a way to provide threat intelligence feeds with proper coverage and proper co-operation. It has be...

http://blog.liquidinfo.net/

WEBSITE DETAILS
SEO
PAGES
SIMILAR SITES

TRAFFIC RANK FOR BLOG.LIQUIDINFO.NET

TODAY'S RATING

>1,000,000

TRAFFIC RANK - AVERAGE PER MONTH

BEST MONTH

May

AVERAGE PER DAY Of THE WEEK

HIGHEST TRAFFIC ON

Thursday

TRAFFIC BY CITY

CUSTOMER REVIEWS

Average Rating: 3.3 out of 5 with 8 reviews
5 star
1
4 star
4
3 star
1
2 star
0
1 star
2

Hey there! Start your review of blog.liquidinfo.net

AVERAGE USER RATING

Write a Review

WEBSITE PREVIEW

Desktop Preview Tablet Preview Mobile Preview

LOAD TIME

CONTACTS AT BLOG.LIQUIDINFO.NET

Login

TO VIEW CONTACTS

Remove Contacts

FOR PRIVACY ISSUES

CONTENT

SCORE

6.2

PAGE TITLE
Liquid Information | blog.liquidinfo.net Reviews
<META>
DESCRIPTION
Tweets and blog posts are my own and do not express the views or opinions of my employer. April 25, 2015. Share the Threat Intelligence? This data would then be retrievable for organizations based on their preferences, organizations first make sanity checks to the data before applying it to different technologies. Sanity check like am I in the feed data would serve a detective purpose. Thus there would be a way to provide threat intelligence feeds with proper coverage and proper co-operation. It has be...
<META>
KEYWORDS
1 liquid information
2 markruots
3 any thoughts
4 no comments
5 email this
6 blogthis
7 share to twitter
8 share to facebook
9 share to pinterest
10 relatively simple solution
CONTENT
Page content here
KEYWORDS ON
PAGE
liquid information,markruots,any thoughts,no comments,email this,blogthis,share to twitter,share to facebook,share to pinterest,relatively simple solution,simple outbound monitoring,these are servfail,3 comments,older posts,blog archive
CONTENT-TYPE
utf-8
GOOGLE PREVIEW

Liquid Information | blog.liquidinfo.net Reviews

https://blog.liquidinfo.net

Tweets and blog posts are my own and do not express the views or opinions of my employer. April 25, 2015. Share the Threat Intelligence? This data would then be retrievable for organizations based on their preferences, organizations first make sanity checks to the data before applying it to different technologies. Sanity check like "am I in the feed data" would serve a detective purpose. Thus there would be a way to provide threat intelligence feeds with proper coverage and proper co-operation. It has be...

INTERNAL PAGES

blog.liquidinfo.net blog.liquidinfo.net
1

Liquid Information: April 2015

http://blog.liquidinfo.net/2015_04_01_archive.html

Tweets and blog posts are my own and do not necessarily express the views or opinions of my employer. April 25, 2015. Share the Threat Intelligence? This data would then be retrievable for organizations based on their preferences, organizations first make sanity checks to the data before applying it to different technologies. Sanity check like "am I in the feed data" would serve a detective purpose. Thus there would be a way to provide threat intelligence feeds with proper coverage and proper co-...

2

Liquid Information: Share the Threat Intelligence?

http://blog.liquidinfo.net/2015/04/share-threat-intelligence.html

Tweets and blog posts are my own and do not necessarily express the views or opinions of my employer. April 25, 2015. Share the Threat Intelligence? This data would then be retrievable for organizations based on their preferences, organizations first make sanity checks to the data before applying it to different technologies. Sanity check like "am I in the feed data" would serve a detective purpose. Thus there would be a way to provide threat intelligence feeds with proper coverage and proper co-...Aweso...

3

Liquid Information: Simple outbound monitoring?

http://blog.liquidinfo.net/2014/07/simple-outbound-monitoring.html

Tweets and blog posts are my own and do not necessarily express the views or opinions of my employer. July 2, 2014. When thinking about a typical attack it involves an attacker sending a payload to the target or tricking the target into visiting a malicious site. Usually the target initiates a connection back to attacker-specified resources like a C&C server. Many moons ago I thought about a solution but unfortunately I'm not a programmer who could develop this thing in a sensible time-frame. The sol...

4

Liquid Information: February 2014

http://blog.liquidinfo.net/2014_02_01_archive.html

Tweets and blog posts are my own and do not necessarily express the views or opinions of my employer. February 6, 2014. Seen any weird DNS-traffic lately? Responses appearing to come from random DNS-servers and all seem to have the same destination port for my IP set to 2994 ( http:/ isc.sans.org/port.html? The requested DNS entry contains randomjunk .139hg.com. The interval between these responses range from 30 to 120 minutes and I do not receive anything else like actual resolved queries. UDP packets a...

5

Liquid Information: Simple outbound monitoring, part 2

http://blog.liquidinfo.net/2014/07/simple-outbound-monitoring-part-2.html

Tweets and blog posts are my own and do not necessarily express the views or opinions of my employer. July 3, 2014. Simple outbound monitoring, part 2. I continue a bit on the monitoring idea, as I forgot a few crucial features :). It would not be a silver bullet but as said in the earlier post, could reduce incident discovery time. The last feature might be problematic in an environment where people could stay late into evening or even midnight. Posted by Marko Ruotsalainen.

UPGRADE TO PREMIUM TO VIEW 9 MORE

TOTAL PAGES IN THIS WEBSITE

14

SOCIAL ENGAGEMENT



OTHER SITES

blog.liquidemporium.com blog.liquidemporium.com

Liquid Emporium Blog -

Take A Volunteer Trip…. March 25, 2014. And find out how you might actually receive more than you give! While volunteer trips can change a community, they will also open your eyes to the needs of our world while putting in a punctuation mark on all we have to be grateful for. It can be little things, like being able to shower not just once a day but twice. One of the most important parts of a volunteer trip is the happiness it creates and the lessons you learn about being happy and how happiness is defin...

blog.liquideyes.de blog.liquideyes.de

LIQUIDeyes - photography

Buenos Aires, Argentinien, 2018. Monte Christo, Ecuador, 2017. New York, 2017. Hier: San Telmo Plaza. Heaven (hier: Cataratas Do Iguaçu). Hier: Buenos Aires, Argentina. Puerto Madryn, Argentina, 2015. School, Slavery, Atacana, Peru, 2017. Chile, Feuerland, 2017. A f…. dream. One year ago, NZ 2016. San Blas Islands, 2017. Powered by gondaba.com's color shades.

blog.liquidfence.com blog.liquidfence.com

Creating Alternative Solutions for Better Outdoor Living

Creating Alternative Solutions for Better Outdoor Living. Is That Snake Venomous? Venomous snakes will often have triangular or arrow-shaped heads because of the position of their venom glands, while non-venomous varieties will be spoon-shaped or rounded. It’s a good idea to use a field guide or regionally specific website to get familiar with the types of snakes commonly found in your area. But if remembering that information or recalling the common characteristics of venomous snakes slips your mind...

blog.liquidhub.com blog.liquidhub.com

thoughtleadership.liquidhub.com | thoughtleadership.liquidhub.com

WHAT WE ARE THINKING ABOUT. Discover insights and thoughts about the latest in digital trends, new technologies, and innovation. Our Associates share insights and opinions on technology opportunities and challenges - this is what we are thinking about. Surviving Dreamforce 2015: Networking (Part 3). On August 11, 2015. In our final installment of our Surviving Dreamforce 2015 series, we discuss how you can network both with apps and in social settings. Missed the first two posts in the series? The state ...

blog.liquidinc.ca blog.liquidinc.ca

Blog – LiQuid: Passion. Strategy. Results

You can't just ask customers what they want and then try to give that to them. By the time you get it built, they'll want something new. Steve Jobs. Top 10 Activities of Canadians Online. Apr 20, 2011. Canadians lead the world when it comes to the Internet. 83% of us have Internet access from any location, and almost a quarter of us (22%) are connected through a smartphone or PDA. We spend more time online than any other country in the world, according to a recent comScore study. 66% listened to radio.

blog.liquidinfo.net blog.liquidinfo.net

Liquid Information

Tweets and blog posts are my own and do not express the views or opinions of my employer. April 25, 2015. Share the Threat Intelligence? This data would then be retrievable for organizations based on their preferences, organizations first make sanity checks to the data before applying it to different technologies. Sanity check like "am I in the feed data" would serve a detective purpose. Thus there would be a way to provide threat intelligence feeds with proper coverage and proper co-operation. It has be...

blog.liquidip.com blog.liquidip.com

LiquidIP

Cloud Confluence of Media, Networking, and Storage (& Some outdoor Spice). The opinions expressed here are my personal opinions. Content published here is not read or approved in advance and does not necessarily reflect the views and opinions of others. This is my blog. Compute As A Service. Dana Farber Cancer Institute. Software As A Service. Storage As A Service. On Rich's Road Crew - On Pace with 5 days until 2010 JFW. On Rich's Road Crew - On Pace with 5 days until 2010 JFW. Pondering Data Center dem...

blog.liquidlitigation.com blog.liquidlitigation.com

BLLAWG - Legal Technology and eDiscovery Blog from Liquid Litigation Management, Inc. (LLM)

RadioShack Rings up Brand and Data Deal. Google Phights Phishing, Briefly Phails. Lawsuit against Pacquiao Alleges Low Blow. Trial and Error and Mistrial. Court Docks Defendants’ Fishing Expedition. Breach of Fiduciary Duty. Fair Labor Standards Act. False Claims Act (FCA). Freedom of Information Act. RadioShack Rings up Brand and Data Deal. Once known as the World’s Leading Specialty Electronics Retailer (clock radios, scanners, remote-controlled cars, anyone? May 20th, 2015 Category: Big Data,. The Fig...

blog.liquidlounge.co.za blog.liquidlounge.co.za

Liquid Lounge Blog

Freedom Day – 2015. Valentines Day – 2015. Easter Specials – 2015. New Year Parties 2015. Year End Functions 2014. Freedom Day – 2015. April 27, 2015. The Day That Rock Beat Paper. For to be free is not merely to cast off one’s chains, but to live in a way that respects and enhances the freedom of others. Valentines Day – 2015. February 14, 2015. Life is an opportunity…benefit from it…. Life is a beauty…admire it…. Life is a dream…realize it…. Life is a duty…complete it…. Life is luck…make it…. Kick off ...

blog.liquidmercurysolutions.com blog.liquidmercurysolutions.com

Liquid Mercury Solutions Blog

Ad hoc and on retainer consulting. Project plans and documentation. Technical staff screening services. Sharepoint upgrades and migrations. Team foundation server set-up. Extranets and public sites. Data, process, intelligence. Office 365 small business trial. Office 365 consulting and support. Technologies We Know - Line Card. Cloud hosting for sharepoint saturday. Sharepoint adfs shibbleth = win. Bi and search for healthcare. Sharepoint For Mere Mortals: What Can Be Done In Sharepoint 101. Log a Suppor...

blog.liquidperspective.com blog.liquidperspective.com

Liquid Perspective

The Business of Life through the eyes of a trained negotiator and experienced entrepreneur. Monday, April 18, 2016. Security or Something Like It. An interesting conversation happened around me today about all the high-profile data breaches that have occurred and could they have been prevented. There was of course, the one lunatic who was valiantly arguing they could have but weren't because of some grand conspiracy. The crux of making security accessible and easy. Today, the big thing is to add an addit...