Information Technology Reference
In-Depth Information
Intelius and White Pages to pull up what the rest of the world sees about you. From there, it
becomes a tedious (but worthwhile) process of filling out online forms and making phone
calls with these services to limit or remove your personal information from company data-
bases. For more information on public data companies to check and how to remove your
information from them.
If drastic measures are needed to erase your information, companies are ready and waiting
to “wash out” your digital footprint: for a price. Reputation.com offers a suite of paid ser-
vices to protect, promote, and defend their customers' personal data online.
“Scammers, stalkers and identity thieves prey on private data. Equally harmful are things
we call negative content — a bad review of your business, a nasty comment on Facebook,
an article about something from your past that's simply irrelevant now — that could dam-
age your personal life or your livelihood. We can help.”
If an absolute face lift or dramatic reduction of your online information is needed, pay ser-
vices such as this may be your quickest way to a smaller digital shoe size.
FOOTPRINTING TOOLS SAM SPADE
NEO TRACE
VISUAL ROUTE SMART WHOIS VISUAL LOOKOUT
MAIL FOOTPRINTING TOOLS
VISUAL ROUTE MAIL TRACKER
EMAIL TRACKER PRO
MAIL TRACKING (MAILTRACKING.COM)
SUMMARY
Information gathering phase can be categorized broadly into seven phases.
Footprinting renders a unique security profile of a target system.
Whois, ARIN can reveal public information of a domain that can be leveraged further.
Traceroute and mail tracking can be used to target specific IP and later for IP spoofing.
Nslookup can reveal specific users and zone transfers can compromise DNS security.
Search WWH ::




Custom Search