OK
http://astalavista.box.sk/
Unknown
Country
AS0
Network
August 02, 2020, 01:39 AM UTC
Date & Time
Websites
Websites
Web Connectivity Test
Runtime: 3.1s

On August 02, 2020, 01:39 AM UTC, http://astalavista.box.sk/ was accessible when tested on AS0 in Unknown.

Failures

HTTP Experiment
null
DNS Experiment
null
Control
null

DNS Queries

Resolver:
217.72.64.229
Query:
IN A astalavista.box.sk
Engine:
Name
Class
TTL
Type
DATA
@
IN
TTL
CNAME
gg.box.sk
@
IN
TTL
A
88.212.29.3

TCP Connections

Connection to 88.212.29.3:80 succeeded.

HTTP Requests

URL
GET https://www.box.sk/
Response Headers
Accept-Ranges:
bytes
Vary:
Accept-Encoding
Server:
Apache/2.4.38 (Debian)
Last-Modified:
Sun, 31 May 2020 21:19:52 GMT
ETag:
"1db9a-5a6f83d2cce00-gzip"
Date:
Sun, 02 Aug 2020 01:39:51 GMT
Content-Type:
text/html
Response Body
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
	<title>Astalavista.box.sk</title>
	<link href="style.css" rel="stylesheet" type="text/css" />
</head>
<body background="background.jpg" bottommargin="0" leftmargin="0" marginheight="0" marginwidth="0" pbzloc="1774" rightmargin="0" text="#eaf5ff" topmargin="0">
<table border="0" cellpadding="0" cellspacing="0" height="33" pbzloc="1534" width="100%">
	<tbody>
		<tr valign="top"><!-- IMPORTANT.. edit blankbutton1.jpg or .psd and save as a different
name to create the FIRST button on this menu.  Then change the src="" below to the new file name.
The blankbutton.jpg is a different graphic and shouldn't be edited for placement here -->
			<td height="33" width="246">&nbsp;</td>
			<!-- end of first button code -->
			<td height="33" width="368"><img alt="" border="0" height="33" src="3buttonarea.jpg" width="427" /></td>
			<td background="3buttonareabg.jpg" height="33" width="100%">&nbsp;</td>
		</tr>
	</tbody>
</table>

<table border="0" cellpadding="0" cellspacing="0" pbzloc="1768" width="100%">
	<tbody>
		<tr valign="top">
			<td width="207">
			<p><!-- the rest of the menu buttons go below, edit blankbutton.jpg / or .psd and save as a different
name to create a new button.  Then change the src="" below to the new file name --><br />
			<a href="http://astalavista.box.sk"><img alt="" src="tempbuttons/button1.jpg" style="border-top: 0px solid; height: 33px; border-right: 0px solid; width: 207px; border-bottom: 0px solid; border-left: 0px solid" /></a><br />
			<a href="https://www.box.sk/wordpress/"><img alt="" src="tempbuttons/button2.jpg" style="border-top: 0px solid; height: 33px; border-right: 0px solid; width: 207px; border-bottom: 0px solid; border-left: 0px solid" /></a><br />
			<a href="https://www.box.sk/wordpress/2020/03/06/enter-a-bold-new-world-of-hacking-and-security-embrace-the-cybertronics-vr-platform-for-hackers-and-security-experts-today-were-hiring/"><img alt="" src="tempbuttons/button3.jpg" style="border-top: 0px solid; height: 33px; border-right: 0px solid; width: 207px; border-bottom: 0px solid; border-left: 0px solid" /></a><br />
			<a href="https://astalavista.box.sk/phpBB3"><img alt="" src="tempbuttons/button4.jpg" style="border-top: 0px solid; height: 33px; border-right: 0px solid; width: 207px; border-bottom: 0px solid; border-left: 0px solid" /></a><br />
			<a href="https://box.sk/wordpress"><img alt="" src="tempbuttons/button5.jpg" style="border-top: 0px solid; height: 33px; border-right: 0px solid; width: 207px; border-bottom: 0px solid; border-left: 0px solid" /></a><a href="https://www.metooo.io/e/astalavista-box-sk-upcoming-high-profile-live-youtube-broadcast-rsvp-today"><img alt="" src="tempbuttons/button6.jpg" style="border-top: 0px solid; height: 33px; border-right: 0px solid; width: 207px; border-bottom: 0px solid; border-left: 0px solid" /></a><a href="mailto:dancho.danchev@hush.com"><img alt="" src="tempbuttons/button7.jpg" style="border-top: 0px solid; height: 33px; border-right: 0px solid; width: 207px; border-bottom: 0px solid; border-left: 0px solid" /></a></p>

			<p>&nbsp;</p>

			<p>&nbsp;</p>

			<p>&nbsp;</p>

			<p>&nbsp;</p>

			<p pbzloc="407">&nbsp;</p>
			</td>
			<td width="20">&nbsp;</td>
			<td width="100%">
			<table border="0" cellpadding="10" cellspacing="0" pbzloc="2" width="100%">
				<tbody>
					<tr valign="top">
						<td pbzloc="418"><!------------------------ Content area, delete anything below this comment and add your content below ---------------------------->
						<table border="0" cellpadding="2" cellspacing="2" pbzloc="765" style="height: 1368px; width: 1470px" width="1470">
							<tbody>
								<tr valign="top">
									<td width="49%">
									<h3>.: welcome to astalavista.box.sk</h3>

									<p><img border="0" src="Misc_03.png" style="float: left" />We&#39;re back! This is&nbsp;the official&nbsp;Astavista.box.sk - The Underground official Web Site Re-Launch page courtesy of Team Box.sk - The Underground and the Scene - the way we know it - The World&#39;s Most Popular and the Scene&#39;s oldest running Hacking and Security Portal managed and operated by a new Team Member - Dancho Danchev.</p>

									<p pbzloc="919">Where did we go? It&#39;s been 10 years since we used to rock the boat and managed to provide a diverse and popular set of Hacking and Security content to hundreds of thousands of users on a daily basis. Big news - we would like to announce our online presence and official re-lauch by offering free access to our Scene-driven and community-powered Astalavista.box.sk - The Underground - flagship Hacking E-zine called - &quot;Wisdom Kings&quot; where we feature quality high-level hacking and security content for the general public to see. In the first issue of &quot;Wisdom Kings&quot; hacking E-zine we cover the following topics and offer the following articles:</p>

									<ul>
										<li>01. Introduction........................................by Phenomix</li>
										<li>02. 10 years back in the future.........................by Phenomix</li>
										<li>02. Back to basics .....................................by Phenomix</li>
										<li>03. The basics of Social engineering....................by Phenomix</li>
										<li>04. How to make anarchy for beginners...................by Phenomix</li>
										<li>05. How to hack for fun.................................by Phenomix</li>
										<li>06. The ultimate guide to getting a girlfriend..........by Phenomix</li>
										<li>07. Exploiting the scene for fun and profit.............by Phenomix</li>
										<li>08. Hacking your school for fun and profit..............by Phenomix</li>
										<li>09. Exposing the &quot;Data Leaks&quot; Paradise..................by Phenomix</li>
										<li>10. How not to get &quot;caught&quot;.............................by Phenomix</li>
										<li>11. CYBERINT and Virtual SIGINT Exposed.................by Phenomix</li>
										<li>12. From Cybercrime to Multi-Billion Dollar Industry....by Phenomix</li>
										<li>13. The &quot;Dark Web&quot; Exposed and Profiled.................by Phenomix</li>
										<li>14. Exposing the Bastards who stole the Scene...........by Phenomix</li>
										<li>15. Top 20 Hacking Sites and Hacking Forums.............by Phenomix</li>
										<li>16. Greetz and Shouts go out to.........................by Phenomix</li>
										<li>17. Conclusion..........................................by Phenomix</li>
									</ul>

									<p pbzloc="804">We wish you a pleasant and joyful Astalavista.box.sk experience and look forward to working with you pushing the bounderies of Hacking and Security and the Scene the way we know it - together! Our official email - <a href="mailto:dancho.danchev@hush.com" pbzloc="805">dancho.danchev@hush.com</a></p>

									<h3 pbzloc="803">.: Introduction to Project &quot;Data Paradise&quot; - Old-School KGB Style Intranet</h3>

									<p><img border="0" src="Misc_700.jpg" style="float: left" /></p>

									<p>Welcome to the future of the U.S Intelligence Community - a disperse and geographically-relevant old school KGB style dial-in only telephone modem driven Intranet powered by the World&#39;s largest minds in the World of information and computer security and modern hacktivism and political activism including good old-fashioned cyberpunks and cryptologists looking for ways to proprietary and privately contribute to a bigger cause - a modern and information data and &quot;know-how&quot; driven U.S Intelligence Community with actively established &quot;touch points&quot; with hundreds of invite-only researchers and enthusiasts and basically people who know how to make an impact and change internationally on a dial-in today and contribute with data and &quot;know-how&quot; on a daily basis further empowering Box.sk&#39;s Intranet with data information and knowledge to potentially assist&nbsp; the U.S Intelligence Community on its way to modernize its assets base and actually find solutions and be exposed to a modern solution-oriented society of intellectual visionaries and cyberpunks who know to make a change and impact internationally.</p>

									<p>Sourcing from a personally selected U.S based and internationally-dispersed&nbsp;high-profile information warfare and cyber warfare based type of active researchers the Intranet aims to steamline cooperation and actual data and research including &quot;know-how&quot; exchange in the area of offensive and defensive Information Warfare and cyber warfare operations. Operaring on a daily basis using a 24/7/365 time-period the &quot;Data Paradise&quot; Intranet aims to satisfy the needs of a selected set of individuals globally further empowering them with the necessary secure infrastructure to exchange data information and knowledge including &quot;know-how&quot; potentially building the foundations for one of the World&#39;s first priprietary dial-in U.S Intelligence Community oriented Intranet.</p>

									<p><img border="0" src="Misc_400.jpg" style="float: left" /></p>

									<p>How does the process and the infrastructure for &quot;Data Paradise&quot; work? We use a Telephone Line Sharing Switch (TSS) in combination with multiple <a class="0" href="https://www.arcelect.com/DES_encryption-encrypted_modem.htm">MaxSpeed 5690+</a> modems which offer DES Encryption for the purpose of interacting and sharing and exchanging information including to actually work on classified and U.S Intelligence Community oriented projects. Based on a pre-defined schedule of tasks based on a specific period of time of the day selected users actively dial-in each other in an attempt to coordinate the active sharing of classified and sensitive data information and knowledge including &quot;know-how&quot; with the the reset of the users potentially building a vast global scale Intranet network serving and directly empowering the U.S Intelligence Community with the necessary data information and knowledge including &quot;know-how&quot; courtesy of a selected set of U.S based and internationally dispersed individuals.</p>

									<p>Here&#39;s a quick list of all the classified and unclassified Manuals courtesy of &quot;Data Paradise&quot; memebers which you can currently download and use prior to obtaining access to the Intranet.</p>

									<p><img border="0" height="698" src="Misc_800.png" style="height: 171px; width: 125px; float: left" width="448" /></p>

									<p pbzloc="830"><img border="0" height="693" src="Misc_900.png" style="height: 169px; width: 104px; float: left" width="441" /><img border="0" height="684" src="Misc_901.png" style="height: 171px; width: 137px; float: left" width="435" />&nbsp;&nbsp;&nbsp;<img border="0" height="687" pbzloc="802" src="Misc_902.png" style="height: 167px; width: 119px; float: left" width="432" />&nbsp;&nbsp;<img border="0" height="739" pbzloc="843" src="Misc_951.png" style="height: 173px; width: 120px; float: left" width="490" /></p>

									<p pbzloc="845">&nbsp;</p>

									<p pbzloc="822">&nbsp;</p>

									<p pbzloc="841">&nbsp;</p>

									<p pbzloc="810">&nbsp;</p>

									<p pbzloc="817">&nbsp;</p>

									<p><img border="0" height="740" src="Misc_904.png" style="height: 198px; width: 152px; float: left" width="494" /></p>

									<p pbzloc="812">&nbsp;<img border="0" height="742" src="Misc_906.png" style="height: 201px; width: 138px" width="493" />&nbsp;<img border="0" height="740" src="Misc_905.png" style="height: 200px; width: 151px" width="495" />&nbsp;<img border="0" height="744" src="Misc_907.png" style="height: 202px; width: 171px" width="493" /></p>

									<p>Welcome to the future of classified and sensitive data sharing! Join us today! Approach us at <a href="mailto:dancho.danchev@hush.com">dancho.danchev@hush.com</a> seeking dial-in access code and password and we would be happy to vet and research potentially inviting you to join the project. Stay tuned!</p>

									<h3>.: Upcoming High-Profile Live YouTube Broadcast - Join Us Today!</h3>

									<p><img border="0" height="156" src="Misc_31.png" style="float: left" width="324" />The time has come to properly present the newly launched and re-surrected Astalavista.box.sk project with a two-hour long Live YouTube Broadcast featuring exclusive guests from the Scene and the Security Industry which include:</p>

									<p>- Mike Ingle - <a href="https://confidantmail.org">https://confidantmail.org</a><br />
									- Dhillon Kannabhiran - <a href="http://www.hitb.org/">http://www.hitb.org/</a><br />
									- Space Rogue - <a href="https://www.spacerogue.net">https://www.spacerogue.net</a><br />
									- Mark Rash - <a href="http://www.securityfocus.com/columnists/423">http://www.securityfocus.com/columnists/423</a><br />
									- Richard Stiennon - <a href="https://it-harvest.com/">https://it-harvest.com/</a></p>

									<p>How you can join us? Bookmark the actual <a class="0" href="http://www.youtube.com/channel/UC-kG5Hl0irayFMfukwEPKfw">YouTube</a> Channel and stay tuned for additional updates. Meanwhile you can also <a class="0" href="https://www.metooo.io/e/astalavista-box-sk-upcoming-high-profile-live-youtube-broadcast-rsvp-today">RSVP</a> here.</p>

									<h3>.: PayPal and Bitcoin Donations Accepted!</h3>

									<p><a href="mailto:dancho.danchev@hush.com"><img height="139" src="Misc_32.png" style="border-top: 0px solid; height: 129px; border-right: 0px solid; width: 318px; border-bottom: 0px solid; border-left: 0px solid" width="360" /></a>&nbsp;<a href="bitcoin:15yeV2ZKikdc4ft7J1M8TKMKoKMJjHMkjp"><img height="137" src="Misc_30.jpg" style="border-top: 0px solid; height: 127px; border-right: 0px solid; width: 342px; border-bottom: 0px solid; border-left: 0px solid" width="363" /></a></p>

									<h3>.: What the&nbsp;Scene says?</h3>

									<ul>
										<li><a href="https://www.google.com/search?source=hp&amp;ei=Ll1pXp6BFonGafv7o1g&amp;q=astalavista.box.sk&amp;oq=astalavista.box.sk">Google</a></li>
										<li><a href="https://www.bing.com/search?q=astalavista.box.sk&amp;search=&amp;form=QBLH">Bing</a></li>
										<li><a href="https://search.yahoo.com/search?p=astalavista.box.sk&amp;fr=yfp-t&amp;fp=1&amp;toggle=1&amp;cop=mss&amp;ei=UTF-8">Yahoo</a></li>
										<li><a href="https://twitter.com/search?q=astalavista.box.sk&amp;src=typed_query&amp;f=live">Twitter</a></li>
										<li><a href="https://www.baidu.com/s?ie=utf-8&amp;f=8&amp;rsv_bp=1&amp;rsv_idx=1&amp;tn=baidu&amp;wd=astalavista.box.sk">Baidu</a></li>
										<li><a href="https://yandex.com/search/?text=astalavista.box.sk&amp;lr=10511">Yandex</a></li>
										<li><a href="https://duckduckgo.com/?q=astalavista.box.sk&amp;t=h_&amp;ia=web">DuckDuckGo</a></li>
										<li><a href="https://web.archive.org/web/*/astalavista.box.sk">Internet Archive</a></li>
										<li><a href="https://en.wikipedia.org/wiki/Astalavista.box.sk">Wikipedia</a></li>
										<li><a href="https://www.alexa.com/siteinfo/box.sk">Alexa</a></li>
									</ul>

									<h3 pbzloc="733">.: Security and Hacking News from the Lab! We&#39;re hiring! Work for us for Free!</h3>

									<p pbzloc="1306"><img border="0" height="1333" pbzloc="1771" src="Misc_10.jpg" style="height: 411px; width: 315px; float: left" width="1000" /></p>

									<ul pbzloc="1738">
										<li pbzloc="1398">Dear Astalavista.box.sk user,</li>
									</ul>

									<p pbzloc="1742">This is Dancho. I&#39;ve decided to take a moment of your precious time and briefly introduce you in terms of what I&#39;ve been up to in terms of the project including several other currently-active community-oriented projects that we&#39;re currently running including the OSINT and Law Enforcement Operation &quot;<a class="0" href="https://ddanchev.blogspot.com/2019/10/announcing-law-enforcement-and-osint.html">Uncle George</a>&quot; which basically consists of one of the Industry&#39;s most relevant and up-to-date cybercrime forum data set up to present day which basically consists of 18GB of raw HTML data processed from publicly accessible cybercrime-friendly communities and aims to actively profile and provide personally identifiable information on the individuals behind them including to actually attempt to take down and offline the communities responsible for such type of fraudulent and malicious online activity.</p>

									<ul pbzloc="1782">
										<li pbzloc="1710">How you can participate? Drop me an email at <a href="mailto:dancho.danchev@hush.com">dancho.danchev@hush.com</a> in terms of obtaining access to the cybercrime forum data set and actually assist in enriching and processing it for the purpose of publicly disclosing personally identifiable information on the individuals behind the associated communities.</li>
										<li pbzloc="1711">&nbsp;</li>
										<li pbzloc="1746">In the meantime consider going through the following extremely recommended research resources and research articles which include:</li>
										<li pbzloc="1917">&nbsp;</li>
										<li pbzloc="1922">- <a class="0" href="https://ddanchev.blogspot.com/2019/11/dancho-danchevs-disappearance-2010.html">Dancho Danchev&#39;s Disappearance - 2010 - Official Complaint Against Republic of Bulgaria</a><br />
										- <a class="0" href="https://ddanchev.blogspot.com/2015/07/assessing-computer-network-operation_29.html">Assessing The Computer Network Operation (CNO) Capabilities of the Islamic Republic of Iran - Report</a><br />
										- <a class="0" href="https://ddanchev.blogspot.com/2017/05/historical-osint-inside-2007-2009.html">Historical OSINT - Inside the 2007-2009 Series of Cyber Attacks Against Multiple International Embassies</a><br />
										- <a class="0" href="https://ddanchev.blogspot.com/2018/07/historical-osint-summarizing-2-years-of.html">Historical OSINT - Summarizing 2 Years of Webroot&#39;s Threat Blog Posts Research</a><br />
										- <a class="0" href="https://ddanchev.blogspot.com/2018/10/pay-per-exploit-acquisition.html">Pay-Per-Exploit Acquisition Vulnerability Programs - Pros and cons?</a><br />
										- <a class="0" href="https://ddanchev.blogspot.com/2018/12/cyber-security-project-investment.html&#13;&#10;">Cyber Security Project Investment Proposal - DIA Needipedia - Fight Cybercrime and Cyber Jihad With Sensors - Grab Your Copy Today!</a><br />
										- <a class="0" href="https://ddanchev.blogspot.com/2019/01/the-threat-intelligence-market-segment.html">The Threat Intelligence Market Segment - A Complete Mockery and IP Theft Compromise - An Open Letter to the U.S Intelligence Community</a><br />
										- <a class="0" href="https://ddanchev.blogspot.com/2019/04/dancho-danchevs-2010-disappearance.html">Dancho Danchev&#39;s 2010 Disappearance - An Elaboration - Part Two</a><br />
										- <a class="0" href="https://ddanchev.blogspot.com/2019/05/exposing-yet-another-currently-active.html">Exposing Yet Another Currently Active Fraudulent and Malicious Pro-Hamas Online Infastructure</a><br />
										- <a class="0" href="https://ddanchev.blogspot.com/2019/07/profiling-currently-active-portfolio-of.html">Profiling a Currently Active Portfolio of High-Profile Cybercriminal Jabber and XMPP Accounts</a><br />
										- <a class="0" href="https://ddanchev.blogspot.com/2019/01/exposing-irans-most-wanted.html" pbzloc="1921">Exposing Iran&#39;s Most Wanted Cybercriminals - FBI Most Wanted Checklist - OSINT Analysis</a><br />
										- <a class="0" href="https://ddanchev.blogspot.com/2019/07/whos-behind-syrian-electronic-army.html">Who&#39;s Behind the Syrian Electronic Army? - An OSINT Analysis</a><br />
										- <a class="0" href="https://ddanchev.blogspot.com/2019/07/exposing-evgeniy-mikhaylovich-bogachev.html">Exposing Evgeniy Mikhaylovich Bogachev and the &quot;Jabber ZeuS&quot; Gang - An OSINT Analysis</a><br />
										- <a class="0" href="https://ddanchev.blogspot.com/2019/07/profiling-innovative-marketing-flagship.html">Profiling &quot;Innovative Marketing&quot; - The Flagship Malvertising andf Scareware Distributor - Circa 2008 - An OSINT Analysis</a><br />
										- <a class="0" href="https://ddanchev.blogspot.com/2019/09/historical-osint-dancho-danchevs-media.html">Historical OSINT - Dancho Danchev&#39;s Media and News Coverage - 2008-2013</a></li>
									</ul>

									<h3 pbzloc="1778">.: We&#39;re Hiring Work for us for Free!</h3>

									<p pbzloc="1781">Some of the currently open positions that we have include:</p>

									<ul>
										<li pbzloc="1930">Web Site and Forum Translators&nbsp;- we&#39;re currently recruiting Web Site and Forum Translators in any language who might be interested in helping us with the localization of the Web Site and the Forum to their native language potentially allowing local users to better understand the information provided and to better access and interact with the Forum and the Community</li>
										<li pbzloc="1933">Virtual Reality Application and Game Developer - we&#39;re currently active hiring a VR application developer who might be interested in working with us on Project Cybertronics - Virtual Reality for Hackers and Security Experts. Approach us today!</li>
										<li pbzloc="1936">Contributors - do you remember the Scene? We need you today! Do you have an idea for a high-profile Security or Hacking Project? Approach us today and we&#39;ll offer Technical and Operational support including general advice!</li>
										<li pbzloc="1939">Call for Papers&nbsp;and&nbsp;Call for Innovation&nbsp;- did you check out the latest <a class="0" href="https://www.box.sk/wordpress/2020/01/07/announcing-box-sks-world-hacker-global-domination-group-whgdg-call-for-security-and-privacy-papers-and-call-for-innovation/"><strong>Call for Papers</strong></a>? Drop us an email at <a href="mailto:dancho.danchev@hush.com &nbsp;with your document or your actual application and we'll make sure to feature it right away.">dancho.danchev@hush.com</a> with your document or your actual application and PoC (Proof of Concept) code &nbsp;and we&#39;ll make sure to feature it right away.</li>
										<li pbzloc="1942">High-Profile Psytrance and Goa-Trance DJs for the purpose of assisting us with a 24/7 live Online Radio reaching out to thousands of loyal users across the globe</li>
										<li pbzloc="1943">Collaborative Hacking and Security E-book Writing Proposal participants who will be collaborating with us on our way to&nbsp;constructively produce a variety of high-profile publicly accessible Security and Hacking E-books</li>
									</ul>

									<h3 pbzloc="1363">.: Currently running community-oriented projects!</h3>

									<ul>
										<li>Hacking E-Zine - Welcome to the future of Hacking and Information Security through the exclusive release of the first issue of the upcoming high-profile Hacking and Security E-Zine called &quot;&quot;Kings of Wisdom&quot; with the first issue officially releleased and produces by one of Box.sk&#39;s Team Members - Dancho Danchev where we aim to bring back the spirit of the Scene and the Security Industry - the way we know it - through a harcore Security and Hacking E-Zine publication covering a variety of high-profile and informative topics including the publication of actual PoC (Proof of Concept) Code including never-published before articles and research materials. Are you interested in contributing with content? Approach us at <a href="mailto:dancho.danchev@hush.com">dancho.danchev@hush.com</a> Stay tuned!</li>
										<li>Hacking E-Books - Are you capable of producing and communicating hardcore technical material to a variety of audiences including the actual production of high-profile and never-published before technical manuals and research publications in the form of E-books which also includes printed books? Are you looking for a place to collaborate with other high-profile members of the Scene and the Security Industry and actually produce and publish a high-quality Security and Hacking E-book with the help of others ultimately publishing your E-book and actual printed book on one of the World&#39;s most popular and high-traffic visited Web sites for Hackers and Security Experts? Consider going through the currently <a class="0" href="www.box.sk/wordpress/2020/03/11/announcing-a-new-hacking-and-security-collaborative-e-book-writing-initiative-join-us-today/">proposed titles</a> and approach us at <a href="mailto:dancho.danchev@hush.com">dancho.danchev@hush.com</a> for the purpose of beginning to collaboratively produce high-quality Hacking and Security E-books. Let&#39;s make it happen! Stay tuned!</li>
										<li>Hacking Merchandise - do you remember the official Astalavista.box.sk T-shirt part of the Jinx Hack Wear franchise circa the 90&#39;s? We&#39;re proud to let you know of a currently existing inventory of Hacker T-Shirts including other apparel which can be also produced and distributed on demand. Approach us at <a href="mailto:dancho.danchev@hush.com">dancho.danchev@hush.com</a> in terms of possible payment methods and we would be happy to accept a payment and actually send you one of the T-shirts.</li>
										<li pbzloc="966">Official Bug Bountry - are you good at ethically pen-testing high-profile U.S government and U.S Intelligence Community Web sites and networks? Are you interested in sharing with us your whereabouts on U.S Government Web sites and U.S Intelligence Community networks for the purpose of disclosing key and never-published security flaws and vulnerabilities for the purpose of making these Web sites and networks more secure? Approach us today at <a href="mailto:dancho.danchev@hush.com">dancho.danchev@hush.com</a> with your flaw and vulnerability disclosure and we would be happy to feature your research and actually help you reach out to the U.S Government and U.S Intelligence Community in terms of disclosing the flaw and the vulnerability in question in a structed and timely fashion.</li>
										<li>Security Incubator - do you have an idea for a high-profile and successful Security or Hacking product or a service but you&#39;re currently lacking the technical &quot;know-how&quot; and operational and financial incentive and support to execute your project&#39;s vision? Approach us today with your idea and we would be happy to offer a strategic including structured response and advice including to possibly assist with the actual seed investment and a possible angel investor or seed fund investor introduction.</li>
										<li>Talent Management - are you looking to hire high-profile security and hacking researchers? Are you constantly looking to join collaborative efforts in classified and sensitive projects? Approach us today and we would be happy to offer you access to an ubiqutous talent and HR pool of high-profile Security and Hacking researchers including to actually help you land the next high-profile and sensitive project.</li>
										<li>Security Comic - are you interested in entertaining yourself with a high-profile and informative Security and Hacking Comic? Stay tuned for the upcoming release of Box.sk&#39;s official Security Comic.</li>
										<li>Top Hacking Links - do you like exploring new and high-profile Security and Hacking Resources? Stay tuned for the upcoming launch of Box.sk&#39;s official Top 100 Security and Hacking Links Directory. Make a submission today! Approach us at <a href="mailto:dancho.danchev@hush.com">dancho.danchev@hush.com</a></li>
										<li>Graphics Contest - are you good at producing high-quality Graphics Banners and Wallpapers including Cover Art and various other multimedia? We&#39;re currently looking for Graphic Designers who might be interested in contributing with high-quality Astalavista.box.sk themed Graphics Banners and Wallpapers. Feel free to approach us <a href="mailto:dancho.danchev@hush.com">dancho.danchev@hush.com</a> and submit your creative and we&#39;ll feature it right away.</li>
										<li>Online Radio - do you enjoy listening to high-quality and never-published before Psytrance and Goatrance songs including live-shows? We&#39;re proud to let you know of an upcoming release and the general availability of a high-profile 24/7 Psytrance and Goatrance online radio. Are you possibly interested in becoming a Live DJ including to actually host a live show online? Are you popular in the Psytrance and Goatrance scene and know a lot of people? Feel free to approach us at <a href="mailto:dancho.danchev@hush.com">dancho.danchev@hush.com</a> and we would be happy to work with you and help you organize the event and actually invite you to participate.</li>
										<li>Security Newsletter - are you intested in receiving a high-profile monthly and weekly Security Newsletter including a featured Security Interview with folks from the Scene and the Security Industry? Feel free to subscribe <a class="0" href="https://mailchi.mp/b2781679541e/ddanchev">here</a>. Stay tuned!</li>
										<li>Security Podcast - do you enjoy listening to high-quality and never-published before Security Podcasts? Stay tuned for the upcoming release of Box.sk&#39;s flagship Security Podcast featuring folks and people from the Scene and the Security Industry.</li>
										<li>Security Conference - have you ever wanted to meet high-profile members of the Scene and the Security Industry including hackers researchers virus and malware analysts including actual malicious code producers including anarchists and political activitists including phreaking enthusiasts and experts from across the globe? Stay tuned for an upcoming official announcement on an invite-only &quot;real-life&quot; meeting with high-profile members of the Scene and the Security Industry? Dare to join us? Do you know someone who should attend? Drop us a line at <a href="mailto:dancho.danchev@hush.com">dancho.danchev@hush.com</a> and we&#39;ll invite you and make the necessary arrangements for a possible invite-only meeting. Stay tuned!</li>
										<li>Security Search Engine - do you remember the original Astalavista.box.sk search engine for hacking and security related material? Stay tuned for the upcoming availability of a high-profile high-volume search engine for Hackers and Security Experts.</li>
									</ul>

									<h3>.: Currently recommended Astalavista.box.sk T-Shirt Mechandise!</h3>

									<p>&nbsp;&nbsp;<a href="mailto:dancho.danchev@hush.com"><img src="Misc_08.png" style="border-top: 0px solid; height: 234px; border-right: 0px solid; width: 197px; border-bottom: 0px solid; border-left: 0px solid" /></a>&nbsp;<a href="mailto:dancho.danchev@hush.com"><img src="Misc_07.png" style="border-top: 0px solid; height: 233px; border-right: 0px solid; width: 224px; border-bottom: 0px solid; border-left: 0px solid" /></a>&nbsp; <a href="mailto:dancho.danchev@hush.com"><img src="Misc_40.png" style="border-top: 0px solid; height: 232px; border-right: 0px solid; width: 186px; border-bottom: 0px solid; border-left: 0px solid" /></a></p>

									<h3>.: Currently recommended high-profile Hacker merchandise E-shops!</h3>

									<p><a href="https://www.zerodayclothing.com/"><img src="Misc_18.jpg" style="border-top: 0px solid; height: 120px; border-right: 0px solid; width: 295px; border-bottom: 0px solid; border-left: 0px solid" /></a>&nbsp;<a href="https://hackerwarehouse.com/"><img src="Misc_19.jpg" style="border-top: 0px solid; border-right: 0px solid; border-bottom: 0px solid; border-left: 0px solid" /></a></p>

									<h3>.: Currently recommended high-profile Hacker movies!</h3>

									<p>&nbsp;<a href="https://www.imdb.com/title/tt3293462"><img src="Misc_22.jpg" style="border-top: 0px solid; border-right: 0px solid; border-bottom: 0px solid; border-left: 0px solid" /></a>&nbsp;<a href="https://www.imdb.com/title/tt0126765/"><img src="Misc_23.jpg" style="border-top: 0px solid; border-right: 0px solid; border-bottom: 0px solid; border-left: 0px solid" /></a><a href="https://www.imdb.com/title/tt2717822"><img src="Misc_24.jpg" style="border-top: 0px solid; border-right: 0px solid; border-bottom: 0px solid; border-left: 0px solid" /></a>&nbsp;<a href="https://www.imdb.com/title/tt2873282"><img src="Misc_25.jpg" style="border-top: 0px solid; border-right: 0px solid; border-bottom: 0px solid; border-left: 0px solid" /></a></p>

									<h3>.: Currently recommended high-profile hacker game projects!</h3>

									<p pbzloc="879"><a href="https://www.exosyphen.com/"><img src="Misc_15.jpg" style="border-top: 0px solid; height: 124px; border-right: 0px solid; width: 229px; border-bottom: 0px solid; border-left: 0px solid" /></a>&nbsp;<a href="https://www.niteteam4.com"><img src="Misc_16.jpg" style="border-top: 0px solid; height: 122px; border-right: 0px solid; width: 345px; border-bottom: 0px solid; border-left: 0px solid" /></a>&nbsp;<a href="http://www.emcneill.com/"><img src="Misc_17.jpg" style="border-top: 0px solid; height: 119px; border-right: 0px solid; width: 180px; border-bottom: 0px solid; border-left: 0px solid" /></a></p>

									<h3 pbzloc="890">.: Currently recommended high-profile Security and Hacking Products!</h3>

									<p pbzloc="1203"><a href="https://apricorn.com/aegis-secure-key-3"><img pbzloc="1185" src="Misc_354.jpg" style="border-top: 0px solid; height: 218px; border-right: 0px solid; width: 216px; border-bottom: 0px solid; border-left: 0px solid" /></a>&nbsp;<a href="https://www.netgate.com/solutions/pfsense/sg-3100.html"><img pbzloc="1191" src="Misc_371.jpg" style="border-top: 0px solid; height: 217px; border-right: 0px solid; width: 179px; border-bottom: 0px solid; border-left: 0px solid" /></a>&nbsp;<a href="https://orwl.org/" pbzloc="1200"><img pbzloc="1946" src="Misc_371.png" style="border-top: 0px solid; height: 170px; border-right: 0px solid; width: 286px; border-bottom: 0px solid; border-left: 0px solid" /></a></p>

									<p pbzloc="1202"><a href="https://smidcloud.com/en/smid-pro-device/" pbzloc="1199"><img pbzloc="1181" src="Misc_373.jpg" style="border-top: 0px solid; height: 159px; border-right: 0px solid; width: 214px; border-bottom: 0px solid; border-left: 0px solid" /></a></p>

									<h3 pbzloc="928">&nbsp;.: Currently recommended high-profile psytrance projects!</h3>

									<p><a href="http://www.philosomatika.fm/"><img src="philo2017.png" style="border-top: 0px solid; height: 85px; border-right: 0px solid; width: 463px; border-bottom: 0px solid; border-left: 0px solid" /></a></p>

									<p>&nbsp;<a href="https://www.geomagnetic.tv/"><img src="Misc_13.jpg" style="border-top: 0px solid; border-right: 0px solid; border-bottom: 0px solid; border-left: 0px solid" /></a></p>

									<p><a href="https://www.goabase.net/"><img src="Misc_14.jpg" style="border-top: 0px solid; border-right: 0px solid; border-bottom: 0px solid; border-left: 0px solid" /></a></p>

									<h3>.: Currently recommended high-profile&nbsp;Space Warfare&nbsp;projects!</h3>

									<p>&nbsp;<img border="0" height="668" src="Misc_990.png" style="height: 259px; width: 335px; float: left" width="1159" /></p>

									<p>Featured&nbsp;Space Warfare and Satellite Weapon system resources:</p>

									<p>- <a class="0" href="https://spacewar.com">Space War</a><br />
									- <a class="0" href="https://www.rand.org/topics/space-warfare.html">RAND - Space Warfare</a><br />
									- <a class="0" href="https://www.jstor.org/action/doBasicSearch?Query=space+warfare&amp;acc=off&amp;wc=on&amp;fc=off&amp;group=none">JSTOR - Space Warfare</a><br />
									- <a class="0" href="https://link.springer.com/search?query=space+warfare">Springer - Space Warfare</a><br />
									- <a class="0" href="https://www.youtube.com/watch?v=O0dWvKLHj-k">Network-Centric Warfare</a><br />
									- <a class="0" href="https://www.youtube.com/watch?v=MaowZIQNrzk">Information Warfare</a><br />
									- <a class="0" href="https://www.youtube.com/watch?v=MByuFtoY0VM">Information Warfare</a><br />
									- <a class="0" href="https://www.youtube.com/watch?v=kaJJfZ_1MHo">Information Warfare</a><br />
									- <a class="0" href="https://www.youtube.com/watch?v=-Dkr5zzyyTM">Information Warfare</a><br />
									- <a class="0" href="https://www.youtube.com/watch?v=LkKobkhoAXU">Information Warfare</a><br />
									- <a class="0" href="https://www.youtube.com/watch?v=hZ5e1PuCZEc">Information Warfare</a></p>

									<p>&nbsp;</p>

									<p pbzloc="734">&nbsp;</p>

									<h3 pbzloc="3">.: Currently recommended high-profile&nbsp;Malware research projects!</h3>

									<p pbzloc="81">Curently featured high-profile online malware analysis sandboxes:</p>

									<p pbzloc="774">- <a href="https://virustotal.com/">VirusTotal</a><br />
									- <a href="https://hybrid-analysis.com/">Hybrid-Analysis</a><br />
									- <a href="https://any.run/">any.run</a><br />
									- <a href="https://amaaas.com/" pbzloc="85">amaas</a><br pbzloc="18" />
									- <a href="https://analyze.intezer.com/">Intezer Analyze</a><br />
									- <a href="https://iris-h.services" pbzloc="63">IRIS-H</a><br />
									- <a href="https://valkyrie.comodo.com/">Comodo Valkyrie</a><br />
									- <a href="https://www.joesandbox.com/" pbzloc="767">JoeSandBox</a></p>

									<h3 pbzloc="768">.: Currently recommended high-profile&nbsp;Soviet Union Themed Game!</h3>

									<p pbzloc="1526"><img border="0" height="183" pbzloc="1483" src="Misc_944.jpg" style="float: left" width="275" /></p>

									<p pbzloc="1554">Are you currently looking for hours-long fururistic Soviet Union themed game that guarantees hours of long play and unforgettable experience? We&#39;ve decided to exclusively feature and recommend the playing of the Soviet Union themed Singularity game which guarantees an unforgettable experience in the future and back in time in the Soviet Union where you&#39;re responsible for orchestration a research operation into a damaged U.S Satellite with the primary involvement of an island which was once owned by the&nbsp;Soviet Union which is responsible&nbsp;for&nbsp;damaging&nbsp;the U.S satellite.</p>

									<p pbzloc="1564">Grab it from <a class="0" href="https://store.steampowered.com/app/42670/Singularity/">here</a>.</p>

									<p pbzloc="1553">&nbsp;</p>

									<p pbzloc="1546">&nbsp;</p>

									<h3 pbzloc="1639">.: Currently recommended high-profile&nbsp;U.S Military Systems Videos!</h3>

									<p pbzloc="1638"><img border="0" height="677" pbzloc="1007" src="Misc_346.png" style="height: 229px; width: 282px; float: left" width="924" />- <a class="0" href="https://www.youtube.com/watch?v=r9FZDotVYZI">U.S. Ballistic Missile Defense System - Target Launch and Interceptor Launch</a><br />
									- <a class="0" href="https://www.youtube.com/watch?v=ae5VmVwfWmk">Raytheon&#39;s Ballistic Missile Defense Systems Provide Layered Defense Around the World<br />
									Ballistic Missile Defense</a><br />
									-&nbsp;<a class="0" href="https://www.youtube.com/watch?v=lOHHtIVP8Pw">U.S. Launch of ICBM (Intercontinental Ballistic Missile) - LGM 30 Minuteman</a><br />
									- <a class="0" href="https://www.youtube.com/watch?v=Yf5ggIkym9I">US Navy Nuclear Submarine Crashes Through Polar Ice</a><br />
									- <a class="0" href="https://www.youtube.com/watch?v=i-gMMQTt5-c">AC-130 Gunship Mission</a><br />
									- <a class="0" href="https://www.youtube.com/watch?v=EizQ4y39B1A">MQ-9 Reaper UAV: The Most Feared USAF Drone in the World</a><br />
									- <a class="0" href="https://www.youtube.com/watch?v=Ucr7zH_Q0YI">Integrated Air and Missile Defense</a><br />
									- <a class="0" href="https://www.youtube.com/watch?v=E27yrxR4bN4">Raytheon Technologies Space Solutions</a><br />
									- <a class="0" href="https://www.youtube.com/watch?v=-DJWcz-d2bc">F-15E Drops a Raytheon StormBreaker smart weapon</a><br />
									&nbsp;</p>

									<p pbzloc="1640">&nbsp;</p>

									<p pbzloc="1641">&nbsp;</p>

									<h3 pbzloc="1643">&nbsp;</h3>

									<h3 pbzloc="1644">.: Currently recommended high-profile&nbsp;Military Game Simulation!</h3>

									<p pbzloc="1124"><img border="0" height="168" pbzloc="1125" src="Misc_943.jpg" style="height: 171px; width: 278px; float: left" width="302" /></p>

									<p pbzloc="1694">We wanted to take the time and effort and currently recommend a high-profile and extremely releavant sophisticated military simulation which basically ensures hours of long and extremely realistic military scenario building type of military simulation which is currently one of the best and most realistic military simulations that you should immediatelly obtain access to in case you&#39;re interested in getting yourself involved.</p>

									<p pbzloc="1709">Grab it from <a class="0" href="https://www.matrixgames.com/game/command-modern-air-naval-operations-wargame-of-the-&#13;&#10;&#13;&#10;year-edition">here</a>.</p>

									<p pbzloc="1172">&nbsp;</p>

									<p pbzloc="1699">&nbsp;</p>

									<p pbzloc="1707">&nbsp;</p>

									<h3 pbzloc="1705">.: Currently recommended high-profile&nbsp;Cyberterrorism and Information Warfare Videos!</h3>

									<p pbzloc="402"><img border="0" height="665" pbzloc="19" src="Misc_340.png" style="height: 206px; width: 351px; float: left" width="1261" />- <a class="0" href="https://www.youtube.com/watch?v=lOQUia-b9Sw">Hearing: Preparing for the Future: An Assessment of Emerging Cyber Threats</a><br />
									- <a class="0" href="https://www.youtube.com/watch?v=CNE1tQoObbs">Cyber Terrorism and Warfare: The Emergent Threat</a><br />
									- <a class="0" href="https://www.youtube.com/watch?v=iCVv8KTcUnU">A Borderless Battle: Defending Against Cyber Threats</a><br />
									- <a class="0" href="https://www.youtube.com/watch?v=kzAl1wrYcxE">Senate Hearing On Cyber Threats To U.S. Infrastructure</a><br />
									- <a class="0" href="https://www.youtube.com/watch?v=qlZpgrf076c">International Cyber Conflict and the Rise of &lsquo;Information Warfare&#39;</a><br />
									- <a class="0" href="https://www.youtube.com/watch?v=oEvV8BveDAM">Information Warfare Defining and Analysing - CyCon 2019</a><br />
									- <a class="0" href="https://www.youtube.com/watch?v=uakFnQ5FNyE">Crafting an Information Warfare and Counter-Propaganda Strategy for the Emerging Security Environment</a><br />
									- <a class="0" href="https://www.youtube.com/watch?v=CkS0UWOos00">Senator Reed Urges Trump Administration to Counter Russian Information Warfare</a><br />
									- <a class="0" href="https://www.youtube.com/watch?v=NraeY2TO-ZE">Information Warfare: It&#39;s Like War, Only with More Followers</a><br />
									- <a class="0" href="https://www.youtube.com/watch?v=qslCY9Xlf78">Chris Inglis: Cyber Warfare &amp; Cyber Defense</a><br />
									- <a class="0" href="https://www.youtube.com/watch?v=XA3pOrZebxY">Cyber Warfare and Special Ops: A General Weighs-In</a></p>

									<p pbzloc="1087">&nbsp;</p>

									<h3 pbzloc="545">.: Currently recommended high-profile&nbsp;Cyber Surveillance and Intelligence Community themed Articles!</h3>

									<p pbzloc="1094"><img border="0" height="538" pbzloc="420" src="Misc_342.png" style="height: 215px; width: 341px; float: left" width="874" />- <a class="0" href="https://medium.com/@danchodanchev/assessing-u-s-military-cyber-operational-capabilities-to-counter-pro-isis-internet-infrastructure-e4914bd8fb8c">Assessing U.S Military Cyber Operational Capabilities to Counter Pro-ISIS Internet Infrastructure</a><br />
									- <a class="0" href="https://medium.com/@danchodanchev/my-involvement-in-the-top-secret-gchq-lovely-horse-program-and-the-existence-of-the-karma-police-daaf08b028a2">My Involvement in the Top Secret GCHQ &ldquo;Lovely Horse&rdquo; Program and the Existence of the Karma Police</a><br />
									- <a class="0" href="https://medium.com/@danchodanchev/kasperskys-antivirus-products-the-nsa-and-u-s-national-security-an-analysis-c55d9ee001a8&#13;&#10;">Kaspersky&rsquo;s Antivirus Products the NSA and U.S National Security &mdash; An Analysis</a><br />
									- <a class="0" href="https://medium.com/@danchodanchev/assessment-of-u-s-intelligence-community-cyber-surveillance-programs-and-tradecraft-part-one-24c29418107b">Assessment of U.S Intelligence Community Cyber Surveillance Programs and Tradecraft &mdash; Part One</a><br />
									- <a class="0" href="https://medium.com/@danchodanchev/how-the-nsa-utilized-iranian-cyber-proxies-to-participate-in-the-boundless-informant-program-e82045d44848">How the NSA utilized Iranian Cyber Proxies To Participate in the BOUNDLESS INFORMANT Program?</a><br />
									- <a class="0" href="https://medium.com/@danchodanchev/exposing-gchqs-top-secret-gordian-knot-cyber-defense-sensor-program-an-analysis-db64aa8a62ea">Exposing GCHQ&rsquo;s Top Secret &ldquo;GORDIAN KNOT&rdquo; Cyber Defense Sensor Program &mdash; An Analysis</a><br />
									- <a class="0" href="https://medium.com/@danchodanchev/exposing-gchqs-url-shortening-service-and-its-involvement-in-iran-s-2009-election-protests-6c6a9282630">Exposing GCHQ&rsquo;s URL-Shortening Service and Its Involvement in Iran&rsquo;s 2009 Election Protests</a><br />
									- <a class="0" href="https://medium.com/@danchodanchev/astalavista-com-the-scene-the-way-we-know-it-my-experience-in-running-the-portal-8ffa914f2161" pbzloc="513">Astalavista.com &mdash; The Scene the Way We Know it &mdash; My Experience in Running the Portal</a><br />
									- <span style="display: none">&nbsp;</span><a class="0" href="https://medium.com/@danchodanchev/exposing-the-u-s-intelligence-community-and-gchqs-use-of-dirty-tricks-online-an-analysis-d673c41d3dd9">Exposing the U.S Intelligence Community and GCHQ&rsquo;s Use of &ldquo;Dirty Tricks&rdquo; Online &mdash; An Analysis</a><br />
									- <a class="0" href="https://medium.com/@danchodanchev/how-the-gchq-used-the-top-secret-anticrisis-girl-program-to-spy-on-users-an-analysis-83a979543c1e">How the GCHQ Used the Top Secret &ldquo;ANTICRISIS GIRL&rdquo; Program to Spy on Users &mdash; An Analysis</a><br />
									- <a class="0" href="https://medium.com/@danchodanchev/the-2016-u-s-presidential-elections-and-russias-active-measures-in-terms-of-cyber-espionage-bb705992b61d">The 2016 U.S Presidential Elections and Russia&rsquo;s Active Measures in Terms of Cyber Espionage</a><br />
									- <a class="0" href="https://medium.com/@danchodanchev/how-the-gchq-and-the-nsa-work-on-intercepting-and-infiltrating-virtual-private-networks-f0e39f9a4bd3" pbzloc="1089">How the GCHQ and the NSA work on intercepting and infiltrating Virtual Private Networks?</a></p>

									<h3 pbzloc="1476">.: Currently recommended high-profile&nbsp;Cyber Warrior Guides and News Articles!</h3>

									<p pbzloc="1479"><img border="0" height="503" pbzloc="1120" src="Misc_975.png" style="height: 183px; width: 233px; float: left" width="617" />- <a class="0" href="https://unit-123.org/index.php/2019/02/13/france-to-wage-offensive-cyber-warfare-brace-yourselves/">France to Wage Offensive Warfare - Brace Yourselves!</a><br />
									- <a class="0" href="https://unit-123.org/index.php/2019/02/14/uae-where-money-pays-do-you-want-to-be-a-cyber-warrior/">UEA - Where Money Pays - Do You Want to be a Cyber Warrior?</a><br />
									- <a class="0" href="https://unit-123.org/index.php/2019/02/15/oops-white-house-national-cyberspace-strategy-acknowledges-information-warfare-operations/">Oops - White House National Cyberspace Strategy Acknowledges Information Warfare Operations</a><br />
									- <a class="0" href="https://unit-123.org/index.php/2019/04/16/proactively-digging-in-the-u-s-cyber-warfare-realm-and-how-you-can-perform-better/">Proactively Digging in the U.S Cyber Warfare Realm - And How You Can Perform Better?</a><br />
									- <a class="0" href="https://unit-123.org/index.php/2019/07/21/dods-cyber-strategy-2018-shall-we-play-a-cyber-retaliation-game/">DoD&#39;s Cyber Strategy - 2018 - Shall We Play a Cyber-Retaliation Game?</a><br />
									- <a class="0" href="https://unit-123.org/index.php/2019/11/21/exploring-the-basics-of-cyber-assets-and-cyber-inventory-efforts-build-up-a-proposed-off-the-shelf-methodology/">Exploring the Basics of Cyber Assets and Cyber Inventory Efforts Build-Up - A Proposed Off-The-Shelf Methodology</a><br />
									- <a class="0" href="https://unit-123.org/index.php/2019/11/21/exploring-the-basics-of-cyber-assets-and-cyber-inventory-efforts-build-up-a-proposed-off-the-shelf-methodology/" pbzloc="1468">Exploring the &quot;Let&#39;s name and shame them&quot; Intelligence Community Mentality - Keep it Coming?</a><br />
									- <a class="0" href="https://unit-123.org/index.php/2020/02/10/the-top-10-off-the-shelf-cyber-threat-intelligence-career-positions-and-which-one-you-should-pick-up/" pbzloc="1481">The Top 10 Off-The-Shelf Cyber Threat Intelligence Career Positions - And Which One You Should Pick Up?</a></p>
									</td>
									<td pbzloc="918" width="1%">&nbsp;</td>
									<td width="50%">
									<h3>.: What&#39;s new?</h3>

									<p align="justify"><img border="0" height="694" src="Misc_250.png" style="height: 135px; width: 138px; float: left" width="693" />In a bold new World of Hacking and Computer Security we&#39;re proud to announce the existence of the following Hacking and Security communities and research-oriented communities part of the Astalavista.box.sk - The Underground portfolio of Hacking and Security Web sites.</p>

									<p align="justify">01.&nbsp;<a href="https://box.sk/wordpress"><strong>WordPress Blog</strong></a>&nbsp;-&nbsp; This is Box.sk&#39;s Official Hacking and Security blog managed and operated by Dancho Danchev</p>

									<p align="justify" pbzloc="4">02.&nbsp;<a href="http://astalavista.box.sk/phpBB3"><strong>Forum Community</strong></a>&nbsp;- This is the primary destination point for Astalavista.box.sk running the World&#39;s largest and most popular Hacking and Security Forum Community. Join us today!</p>

									<p align="justify" pbzloc="806">03.&nbsp;<a href="https://www.box.sk/wordpress/2020/03/06/enter-a-bold-new-world-of-hacking-and-security-embrace-the-cybertronics-vr-platform-for-hackers-and-security-experts-today-were-hiring/"><strong>VR For Hackers and Security Experts</strong></a>&nbsp;- This is our flagship crowd-funded and crowd-sourced Community Project where we aim to build a unique VR application for Hackers and Security Experts and actually bring it online with the help of the Community and the Scene.</p>

									<p align="justify">04.&nbsp;<a href="https://www.metooo.io/e/astalavista-box-sk-upcoming-high-profile-live-youtube-broadcast-rsvp-today"><strong>Upcoming High-Profile Live YouTube Broadcast</strong></a>&nbsp;- Do you remember the Scene? Are you part of the Security Industry? Stay tuned for an exclusive Live YouTube Broadcast featuring exclusive guests from the Scene and the Security Industry.</p>

									<p align="justify" pbzloc="397">05. <strong><a class="0" href="https://www.box.sk/wordpress/2020/01/07/announcing-box-sks-world-hacker-global-domination-group-whgdg-call-for-security-and-privacy-papers-and-call-for-innovation/">Call for Papers and Call for Innovation</a></strong> - Do you actively produce high-quality and never-published before Hacking and Security research? Feel free to go through the Call for Papers and Call for Innovation and approach us in terms of submitting your papers tools and PoC (Proof of Concept) code.</p>

									<p align="justify" pbzloc="597">06. <a class="0" href="https://www.box.sk/wordpress/2020/03/11/announcing-a-new-hacking-and-security-collaborative-e-book-writing-initiative-join-us-today/"><strong>Collaborative Hacking and Security E-Book writing project</strong></a> - Do you want to participate in a collaborative Hacking and Security E-book wriring project on a variety of topics and ultuimately contribute with knowledge information and</p>

									<h3 align="justify" pbzloc="967">.: Introduction to Dancho Danchev&#39;s Keynote Presentation on &quot;Tracking Down and Monitoring of the Koobface botnet&quot;</h3>

									<p pbzloc="313"><img border="0" height="674" pbzloc="553" src="Misc_341.png" style="height: 167px; width: 284px; float: left" width="1267" /></p>

									<p align="justify" pbzloc="557">Do you remember Koobface? Koobface was one of the most prolific and sophisticated social media propagating botnet that used to spread across Facebook eventually got shut down and terminated its operations thanks to a two and a half years long active and real-time monitoring of the botnet&#39;s activities courtesy of Dancho Danchev one of the primary researchers of the botnet at the time.</p>

									<p align="justify" pbzloc="555">Consider watching the following Keynote <a class="0" href="https://www.youtube.com/watch?v=hgQ_nxoMXzY">presentation</a> on &quot;Tracking Down and Monitoring of the Koobface Botnet&quot; including the actual <a class="0" href="https://speakerdeck.com/ddanchev/cyber-camp-exposing-koobface-botnet-02">PPT</a>.</p>

									<p align="justify" pbzloc="984">&nbsp;</p>

									<h3 align="justify" pbzloc="986">.: Introduction to Project &quot;herdProtect&quot; - Multi-Antivirus Engine Scanner</h3>

									<p pbzloc="524"><img border="0" pbzloc="525" src="Misc_820.png" style="float: left" /></p>

									<p align="justify" pbzloc="50">Are you an active antivirus scanner user? Do you remember the 90&#39;s? We&#39;re proud to let you know that we&#39;re officially partnering with a leading provider of a market-leading multi-antivirus scanner engine provider - herdProtect which currently offers on of the industry&#39;s market leading multi-antivirus engine scanner which basically empowers you with the necessary tool and application to scan your host and PC with 64 leading antivirus scanners potentially establishing the foundations of a successful host-based malware-detection strategy further protecting your host and PC. The reason for featuring the free application is that we believe that antivirus scanner users should end the monopoly of the well-established brand and actually rely on and use a market-relevant possibly the World&#39;s first free multi-antivirus scanner application which relies on a multi-tude of scanners and active sensors further protecting your host and PC from today&#39;s modern malware and cyber</p>

									<p align="justify" pbzloc="1216">Grab it from <a class="0" href="https://www.herdprotect.com">here</a>.</p>

									<h3 align="justify" pbzloc="27">.: Introduction to Project &quot;Cybertronics&quot; - Help&nbsp;Us Launch the Platform Today!</h3>

									<p pbzloc="644"><img border="0" height="71" pbzloc="626" src="Misc_872.png" style="height: 68px; width: 207px; float: left" width="246" /></p>

									<p align="justify" pbzloc="642">Welcome to the Wonderful future of Virtual Reality! We&#39;re proud to let you know that we&#39;re currently running a high-profile public crowd-funding project for Cybertronics - Virtual Reality for Hackers and Security Experts on GopGetFunding and we decided to share with you additional details including the actual Technical Specifications behind the project with the idea to seek your assistance and possible financial support in the form of donations that would empower us with the necessary funds to launch manage and operate the platform.</p>

									<p align="justify" pbzloc="1275">Visit us today and donate <a class="0" href="https://gogetfunding.com/?p=6626546">today</a>!</p>

									<h3 align="justify" pbzloc="1276">.: Introduction to Project &quot;Omnimix&quot; - Anonymous Remailer Network Application!</h3>

									<p pbzloc="1236"><img border="0" height="479" pbzloc="1237" src="Misc_373.png" style="height: 220px; width: 316px; float: left" width="866" /></p>

									<p align="justify" pbzloc="1295">We&#39;re proud to let you know that we&#39;re officially partnering and recommending the use of the Omnimix - anonymous remailer network application which is basically one of the Industry&#39;s leading and most sophisticated features-rich anonymous remailer network application which you can freely download and use for free. The application basically offers a sophisticated and advanced set of features which further empowers its users on their way to achieve a full-set of spectrum of anonymous email and remailer communications potentially offering an easy to use GUI further empowering its users on their way to achieve a decent degree of anonymous email and anonymous remailer online communications.</p>

									<p align="justify" pbzloc="1303">Grab it from <a class="0" href="https://www.danner-net.de">here</a>.</p>

									<p align="justify" pbzloc="1646">&nbsp;</p>

									<h3 align="justify" pbzloc="1285">.: Introduction to Project &quot;Onion-Routing&quot; and &quot;Free Haven&quot; Privacy and Anonymity Resources</h3>

									<h3 align="justify" pbzloc="1654"><a href="https://www.onion-router.net/"><img pbzloc="1207" src="Misc_344.png" style="border-top: 0px solid; height: 51px; border-right: 0px solid; width: 255px; border-bottom: 0px solid; border-left: 0px solid" /></a>&nbsp;<a href="https://www.freehaven.net/" pbzloc="1647"><img pbzloc="1212" src="Misc_345.png" style="border-top: 0px solid; height: 50px; border-right: 0px solid; width: 364px; border-bottom: 0px solid; border-left: 0px solid" /></a></h3>

									<h3 pbzloc="1673">.:&nbsp;Currently&nbsp;Recommended&nbsp;Privacy and Cyber Surveillance Projects!</h3>

									<p pbzloc="1691"><a href="https://nsa.gov1.info/"><img pbzloc="1792" src="Misc_348.jpg" style="border-top: 0px solid; border-right: 0px solid; border-bottom: 0px solid; border-left: 0px solid" /></a>&nbsp;<a href="https://nsarchive.gwu.edu/"><img pbzloc="1926" src="Misc_348.png" style="border-top: 0px solid; height: 90px; border-right: 0px solid; width: 139px; border-bottom: 0px solid; border-left: 0px solid" /></a>&nbsp;<a href="https://snowdenarchive.cjfe.org/"><img pbzloc="1689" src="Misc_349.png" style="border-top: 0px solid; height: 82px; border-right: 0px solid; width: 261px; border-bottom: 0px solid; border-left: 0px solid" /></a></p>

									<h3 pbzloc="1659">.: Introduction to Dancho Danchev&#39;s E-Book Hacking Security and Cybercrime Research Compilation - Grab a copy on Amazon Today!</h3>

									<p pbzloc="128"><img border="0" height="681" pbzloc="129" src="Misc_876.png" style="height: 237px; width: 168px; float: left" width="462" /></p>

									<p align="justify" pbzloc="612">We&#39;re proud to present the general and overal availability of a high-profile Security Hacking and Cybercrime Research Memoir courtesy of Dancho Danchev. The security hacking and cybercrime research journal compilation aims to spread data information and knowledge on some of the most prolific cyber security and cyber attack incidents throughout 2005-2020 courtesy of one of the World&#39;s leading experts in the field of cybercrime research security blogging and threat intelligence gathering.</p>

									<p align="justify" pbzloc="614">Have you ever wanted to take an in-depth peek inside some of the Security Industry&#39;s most prolific cybercrime group and campaigns including some of the most prolific cyber attack campaigns that took place during 2005-2020? Consider grabbing a copy of the research compilation today.</p>

									<p align="justify" pbzloc="611">- Dancho Danchev&#39;s Personal Security Hacking and Cybercrime Research Memoir - Grab a copy <a class="0" href="https://www.amazon.com/dp/B088F7MSPL/ref=sr_1_11?dchild=1&amp;qid=1589201525&amp;refinements=p_27%3ADancho+Danchev&amp;s=digital-text&amp;sr=1-11&amp;text=Dancho+Danchev">today</a>!<br />
									- <a class="0" href="https://www.amazon.com/dp/B088FG1LT6/ref=sr_1_7?dchild=1&amp;keywords=dancho+danchev+cybercrime&amp;qid=1589201568&amp;s=digital-text&amp;sr=1-7">Volume 01</a><br />
									- <a class="0" href="https://www.amazon.com/dp/B088FG4SLL/ref=sr_1_3?dchild=1&amp;keywords=dancho+danchev+cybercrime&amp;qid=1589201568&amp;s=digital-text&amp;sr=1-3">Volume 02</a><br />
									- <a class="0" href="https://www.amazon.com/dp/B088F8CQCS/ref=sr_1_9?dchild=1&amp;keywords=dancho+danchev+cybercrime&amp;qid=1589201568&amp;s=digital-text&amp;sr=1-9">Volume 03</a><br />
									- <a class="0" href="https://www.amazon.com/dp/B088DZ4JPZ/ref=sr_1_6?dchild=1&amp;keywords=dancho+danchev+cybercrime&amp;qid=1589201568&amp;s=digital-text&amp;sr=1-6">Volume 04</a><br />
									- <a class="0" href="https://www.amazon.com/dp/B088FF3RSR/ref=sr_1_2?dchild=1&amp;keywords=dancho+danchev+cybercrime&amp;qid=1589201568&amp;s=digital-text&amp;sr=1-2">Volume 05</a><br />
									- <a class="0" href="https://www.amazon.com/dp/B088F7LVMM/ref=sr_1_12?dchild=1&amp;keywords=dancho+danchev+cybercrime&amp;qid=1589201568&amp;s=digital-text&amp;sr=1-12">Volume 06</a><br />
									- <a class="0" href="https://www.amazon.com/dp/B088F75FWB/ref=sr_1_13?dchild=1&amp;keywords=dancho+danchev+cybercrime&amp;qid=1589201568&amp;s=digital-text&amp;sr=1-13">Volume 07</a><br />
									- <a class="0" href="https://www.amazon.com/dp/B088F8BPVJ/ref=sr_1_4?dchild=1&amp;keywords=dancho+danchev+cybercrime&amp;qid=1589201568&amp;s=digital-text&amp;sr=1-4" pbzloc="607">Volume 08</a><br />
									- <a class="0" href="https://www.amazon.com/dp/B088F874H9/ref=sr_1_5?dchild=1&amp;keywords=dancho+danchev+cybercrime&amp;qid=1589201568&amp;s=digital-text&amp;sr=1-5">Volume 09</a><br />
									- <a class="0" href="https://www.amazon.com/dp/B088F8QTRS/ref=sr_1_8?dchild=1&amp;keywords=dancho+danchev+cybercrime&amp;qid=1589201568&amp;s=digital-text&amp;sr=1-8">Volume 10</a><br />
									- <a class="0" href="https://www.amazon.com/dp/B088F7ZN4V/ref=sr_1_10?dchild=1&amp;keywords=dancho+danchev+cybercrime&amp;qid=1589201568&amp;s=digital-text&amp;sr=1-10">Volume 11</a></p>

									<p align="justify" pbzloc="124">Consider obtaining a complete and full access to the entire ePub and E-book reader collection (13 Volume Editions) by approaching me at <a href="mailto:dancho.danchev@hush.com">dancho.danchev@hush.com</a></p>

									<h3 align="justify" pbzloc="137">.: Introduction to Project &quot;Loki - Open-Source IOC Scanner&quot; -&nbsp;Grab a copy&nbsp;today!</h3>

									<p pbzloc="178"><img border="0" height="692" pbzloc="798" src="Misc_940.png" style="height: 216px; width: 253px; float: left" width="635" /></p>

									<p align="justify" pbzloc="795">We&#39;re proud to let you know that we&#39;re officially partnering with Nextron Systems with the development of one of the Security Industry&#39;s first and most popular publicly accessible Yara-rules based&nbsp;IoC (Indicator of Compromise) scanner which users and organizations can easily modify and suit their needs on their ways to integrate and possibly synchronize their threat intelligence feed data into an end-point relevant malicious software and IoC (Indicator of Compromise) scanner which is currently available for free.</p>

									<p align="justify" pbzloc="208">The applications works by detecting the presence of known IoCs (Indicators of Compromise) on the targeted host and can take further measures to properly protect the end-point from a variety of currenty circulating malicious and fraudulent online campaigns.</p>

									<p align="justify" pbzloc="186">&nbsp;Grab a copy <a class="0" href="https://www.nextron-systems.com/loki/">here</a>.</p>

									<p align="justify" pbzloc="202">&nbsp;</p>

									<h3 align="justify" pbzloc="198">.: Introduction to Project &quot;0day.today&quot; - Auction-Based Zero Day Market</h3>

									<p pbzloc="299"><img border="0" height="100" pbzloc="127" src="Misc_815.jpg" style="height: 85px; width: 175px; float: left" width="433" /></p>

									<p pbzloc="303">Are you currently looking for&nbsp;high-profile public and private exploits including never-published before zero day type of&nbsp;exploits research? We&#39;ve decided to feature and actually recommend one of the Internet&#39;s largerst and most comprehensive public <a class="0" href="https://0day.today">auction-based</a> commercial market-place for exploits and zero day flaws - 0day.today which further empowers penetration testers and red teams on their way to properly assess and actually launch offensive and defensive campaigns against legitimate infrascture.</p>

									<p pbzloc="305">Currently featured high-profile vulnerabilities and exploits which can be accessed at 0day.today:</p>

									<p pbzloc="313">- <a class="0" href="https://0day.today/exploit/description/23926">Instagram bypass Access Account Private Method Exploit Highlighted</a><br />
									- <a class="0" href="https://0day.today/exploit/description/24768&#13;&#10;">Twitter reset account Private Method 0day Exploit Highlighted</a><br />
									- <a class="0" href="https://0day.today/exploit/description/30155">Hotmail.com reset account 0day Exploit Highlighted</a><br />
									- <a class="0" href="https://0day.today/exploit/description/30850">Facebook steal Group 0day Exploit Highlighted</a><br />
									- <a class="0" href="https://0day.today/exploit/description/34312">Whatsapp Desktop (session hijacking) Payload 0day Exploit</a><br />
									- <a class="0" href="https://0day.today/exploit/description/29171">iCloud reset mail Account Authentication Elevation Of Privilege 0day Exploit</a><br />
									- <a class="0" href="https://0day.today/exploit/description/34125">360 Security Sandbox Escape 0day Exploit</a><br />
									- <a class="0" href="https://0day.today/exploit/description/33684">Microsoft Office Word (2003/2007/2010/2013 +2016) Universal Silent 0day Exploit</a><br />
									- <a class="0" href="https://0day.today/exploit/description/29002">Apple iOS 11.1.1 kernel DoS Exploit</a><br />
									- <a class="0" href="https://0day.today/exploit/description/22772">Microsoft Office Word 2003+2007+2010 Universal 0day Exploit</a><br />
									- <a class="0" href="https://0day.today/exploit/description/26928">macOS 10.11.* / 10.12.* Kernel Code Execution - SIP bypass 0day Exploit</a><br />
									- <a class="0" href="https://0day.today/exploit/description/24240">PowerPoint 2003/2007/2010 Silent Builder Exploit</a><br />
									- <a class="0" href="https://0day.today/exploit/description/23846">OS X 10.10.2-10.10.4 Privilege Escalation Exploit 0day</a><br />
									- <a class="0" href="https://0day.today/exploit/description/21891" pbzloc="307">Microsoft Office 2007/2010 Download and Execute Vulnerability</a><br />
									- <a class="0" href="https://0day.today/exploit/description/21830" pbzloc="308">Office 2003 SP3, Office 2007 SP2, Office 2011 Stack-based buffer overflow</a></p>

									<h3 pbzloc="335">.: Introduction to Project &quot;Vulnerability-Lab&quot; - Public Security Group Research Project</h3>

									<p pbzloc="350"><img border="0" height="132" pbzloc="339" src="Misc_818.png" style="height: 83px; width: 214px; float: left" width="493" />We wanted to take the time and effort to properly present a currently active public repositiory of exploits and vulnerabilities courtesy of Vulnerability-Lab with the idea to properly communicate and present their portfolio of exploits flaws and vulnerabilities potentiallty partnering with the project and enticing more users into using the Web site.</p>

									<p pbzloc="471">Are you interested in learning more about the currently active and publicly accessible exploits and vulnerabilities for the purpose of improving and actually improving the quality of research courtesy of your penetration testing team or just to improve your situational awareness in terms of newly discovered flaws and vulnerabilities? Consider visiting the project <a class="0" href="https://www.vulnerability-lab.com/">here</a>.</p>

									<p pbzloc="466">Currently active publicly accessible details on public Web Site flaws and vulnerabilities include:</p>

									<p pbzloc="469">- <a class="0" href="https://www.vulnerability-lab.com/get_content.php?id=2183">Dabman &amp; Imperial (i&amp;d) - Multiple Vulnerabilities</a><br />
									- <a class="0" href="https://www.vulnerability-lab.com/get_content.php?id=2188">TortoiseSVN v1.12.1 - Remote Code Execution Vulnerability</a><br />
									- <a class="0" href="https://www.vulnerability-lab.com/get_content.php?id=2186">Mobatek MobaXterm v11.1 - Code Execution Vulnerability</a><br />
									- <a class="0" href="https://www.vulnerability-lab.com/get_content.php?id=1514">Microsoft Outlook 365 - Arbitrary File Upload Vulnerability</a><br />
									- <a class="0" href="https://www.vulnerability-lab.com/get_content.php?id=2116">Microsoft Skype Mobile v8.x - Emoticons DoS Vulnerability</a><br />
									- <a class="0" href="https://www.vulnerability-lab.com/get_content.php?id=2112">Microsoft Skypexspaces - DNS Squatting Web Vulnerability</a><br />
									- <a class="0" href="https://www.vulnerability-lab.com/get_content.php?id=2097">MobaXtrem v10.4 - Remote Code Execution Vulnerability</a><br />
									- <a class="0" href="https://www.vulnerability-lab.com/get_content.php?id=2026">Huawei Flybox B660 - (POST SMS) CSRF Web Vulnerability</a><br />
									- <a class="0" href="https://www.vulnerability-lab.com/get_content.php?id=2025">Huawei Flybox B660 - (POST Reboot) CSRF Vulnerability</a><br />
									- <a class="0" href="https://www.vulnerability-lab.com/get_content.php?id=1990">Tenda, Dlink &amp; Tplink TD-W8961ND - DHCP XSS Vulnerability</a><br />
									- <a class="0" href="https://www.vulnerability-lab.com/get_content.php?id=2026">Huawei Flybox B660 Router - Auth Bypass Vulnerability</a></p>

									<h3 pbzloc="309"><a href="http://shareaza.sourceforge.net" pbzloc="318"><img src="Misc_808.jpg" style="border-top: 0px solid; border-right: 0px solid; border-bottom: 0px solid; border-left: 0px solid" /></a>&nbsp;<a href="www.emule-project.net"><img src="Misc_864.png" style="border-top: 0px solid; height: 59px; border-right: 0px solid; width: 274px; border-bottom: 0px solid; border-left: 0px solid" /></a></h3>

									<h3 align="justify" pbzloc="77">.: Exclusive Torrent Archive of Hacking and Security Events!</h3>

									<p><img border="0" src="Misc_803.png" style="float: left" /></p>

									<p align="justify">We&#39;re proud to let you know of the general availability of a high-profile Torrent Archive consisting of all the publicly accessible Hacking and Security event videos available for download which aims to further empower you with the necessary data information and knowledge including technical and operational &quot;know-how&quot; to stay on the top of your game and keep your cyber situational awareness up-to-date which is currenly being distributed by InfoCon - The Hacking Conference Archive.</p>

									<p align="justify" pbzloc="78">Grab a copy of <a class="0" href="https://www.bittorrent.com">Bittorrent</a>&nbsp;today and check out the actual <a class="0" href="https://infocon.org">archive</a>&nbsp;including to actually check the <a class="0" href="https://infocon.org/documentaries/Hacking%20Documentaries/">Hacker Documentary</a> and <a class="0" href="https://infocon.org/documentaries/Hacker%20Movies/">Hacker movies</a> archive.</p>

									<p align="justify">&nbsp;</p>

									<h3 align="justify">.: Exclusive Box.sk Public Hacking and Security FTP Server!</h3>

									<p><img border="0" height="520" src="Misc_861.jpg" style="height: 147px; width: 189px; float: left" width="899" /></p>

									<p align="justify">Are you interested in having your Hacking and Security research including tools documents and presentations including PoC (Proof of Concept) code on one of the World&#39;s most popular Web sites for hackers ands security experts? We&#39;re proud to let you know of the general availability of a publicly accessible FTP server where users can submit and upload their latest hacking tools white papers and documents including PoC (Proof of Concept) code and actual hacking and security presentations with the idea to have the content featured on one of the World&#39;s most popular Web sites for hackers and security experts. Do you produce a lot of hacking and security white papers and documents including presentations and actual hacking and security tools including PoC (Proof of Concept) code?</p>

									<p align="justify">Approach us at <a href="mailto:dancho.danchev@hush.com">dancho.danchev@hush.com</a> in case you&#39;re interested in obtaining access to the server and actually contributing with content. Stay tuned!</p>

									<h3 align="justify">.: Introducing Box.sk&#39;s Hacking and Security Search Engine!</h3>

									<p><img border="0" height="224" src="Misc_802.png" style="height: 127px; width: 146px; float: left" width="225" /></p>

									<p align="justify">Do you remember the 90&#39;s? We&#39;re proud to let you know of the general availability of Astalavista.box.sk&#39;s high-profile search engine for Hackers and Security Experts currently featuring puiblic access to over 2,402,311 Hacking and Security Web sites largely becoming the World&#39;s largest and most popular and comprehensive search engine for Hackers and Security Experts.</p>

									<p align="justify">Access the primary access point for Box.sk&#39;s Flagship Hacking and Security Web sites search engine <a class="0" href="https://astalavista.yacypeer.net">here</a>.</p>

									<p align="justify">Sample queries: <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=CVE&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">CVE</a>; <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=OSINT&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">OSINT</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=MD5&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">MD5</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=Ransomware&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">Ransomware</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=Phishing&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">Phishing</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=Spam&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">Spam</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=RFID&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">RFID</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=NSA&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">NSA</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=GCHQ&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">GCHQ</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=TDoS&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">TDoS</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=Security+Conference&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">Security Conference</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=Podcast&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">Podcast</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=Botnet&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">Botnet</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=Crimeware&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">Crimeware</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=Advanced+Persistent+Threat&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">Advanced Persistent Threat</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=Encryption&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">Encryption</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=PGP&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">PGP</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=DDoS&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">DDoS</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=SCADA&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;am&#13;&#10;p;am&#13;&#1;&#13;&#10;;&#13;&#10;;&#13;&#10;;&#13;&#10;;&#13;&#10;;&#13;&#10;;&#13;&#10;;&#13;&#10;0;p;am&#13;&#10;p;am&#13;&#10;p;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">SCADA</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=Rootkit&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">Rootkit</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=Zero+Day&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">Zero Day</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=Vulnerability&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">Vulnerability</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=Bug+Bounty&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">Bug Bounty</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=Malware&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">Malware</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=Metasploit&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">Metasploit</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=Penetration+Testing&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">Penetration Testing</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=Wireless+Security&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">Wireless Security</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=Intrusion+Detection+System&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">Intrusion Detection System</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=Passwords&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">Passwords</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=Data+Breach&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">Data Breach</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=Malware+Stealer&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">Malware Stealer</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=Keylogger&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">Keylogger</a>, <a class="0" href="https://astalavista.yacypeer.net/yacysearch.html?query=Trojan+Horse&amp;Enter=&amp;auth=&amp;contentdom=text&amp;strictContentDom=false&amp;former=exploit&amp;maximumRecords=10&amp;startRecord=0&amp;verify=ifexist&amp;resource=local&amp;nav=location%2Chosts%2Cauthors%2Cnamespace%2Ctopics%2Cfiletype%2Cprotocol%2Clanguage&amp;prefermaskfilter=&amp;depth=0&amp;constraint=&amp;meanCount=5&amp;timezoneOffset=-120">Trojan Horse</a>.</p>

									<h3 align="justify">.: Join Us on Astalavista.box.sk&#39;s IRC Network!</h3>

									<p><img border="0" height="222" src="Misc_970.jpg" style="height: 163px; width: 164px; float: left" width="224" /></p>

									<p pbzloc="3">Have you ever wanted to catch up with some of the leading people from the Scene and the Security Industry for the purpose of exchanging ideas knowledge experience and &quot;know how&quot;? We&#39;re proud to let you know of the general availability of Astalavista.box.sk&#39;s Official IRC Network where we partnered with <a class="0" href="https://www.coreshells.net">CoreShells</a>&nbsp;a leader provider of managed IRCd infrastructure further aiming to empower a new generation of hackers and security experts with the necessary communication vehicle and channel for the purpose of reaching out to each other and keeping in touch in real-time further sharing &quot;know-how&quot; data and information on their way to properly become hackers and security experts. How you can join us?</p>

									<p>General topics on which we currently accept new channels include - Hacktivism, Web Site Defacement Groups, Cracking Groups, Political Activism Groups, Cryptography Groups, Warez Groups, Virii Groups and organizations, Phreaking Groups, Anti-Surveillance Groups, COMSEC and OPSEC Groups, Hacking Groups.</p>

									<p>Direct your favorite <a class="0" href="https://hexchat.github.io">IRC client</a> to irc.inspircd.net using port 6697 or + mode for&nbsp;SSL or 6667&nbsp;and join #astalavista.box.sk today! Consider launching a channel for your project or Hacking or Security group and let&#39;s get the conversation going. Approach me at <a href="mailto:dancho.danchev@hush.com">dancho.danchev@hush.com</a> in case you have a question or want to launch a channel for your Hacking or Security project. Stay tuned!</p>

									<h3>.: Featured High-Profile DIY Honeypot System - T-Pot</h3>

									<p><img border="0" height="720" src="Misc_804.png" style="height: 143px; width: 248px; float: left" width="1280" />We&#39;re proud to let you know that we&#39;re officially partnering and recommending the use of the extremely easy to use and implement T-Pot DIY honeypot system which you can basically use and implement on your own featuring an exclusive set of built-in honeypot technologies which could further empower your PC and personal network with the necessary malicious attacker interception technology including the active implementation of a pretty good deception technology within your personal network which could further detect and allow you to respond to a growing set of cyber attacks and malicious software incidents.</p>

									<p>Grab it from <a class="0" href="https://dtag-dev-sec.github.io/mediator/feature/2019/04/01/tpot-1903.html">here</a>.</p>

									<h3>.: Featured High-Profile DIY Exploit Development Tool</h3>

									<p><img border="0" height="529" src="Misc_863.jpg" style="height: 169px; width: 265px; float: left" width="747" /></p>

									<p>Have you ever wanted to become an experienced exploit developer including a high-profile vulnerability finder on your way to become an experienced penetration tester but never really managed to find the proper and sophisticated market-relevant exploit development and penetration testing tool? We&#39;re proud to let you know that we&#39;re officially partnering and recommending the use of Exploit Pack a sophisticated exploit development and vulnerability exploitation tool which currently offers access to thousands of exploits including actual zero day flaws using a market and penetration tester relevant GUI interface to suit your needs.</p>

									<p>The publicly accessible tool and the free version currently offers access to over 38,000 exploits and vulnerabilities and is cross-platform currently offering a multi-tude of exploits targeting the following operating systems - Windows, Linux, Unix, Minix, SCO, Solaris, OSX, etc.</p>

									<p>&nbsp;Grab it from <a href="https://exploitpack.com">here</a>.</p>

									<h3>.: Featured High-Profile DIY&nbsp;Cyber Threat Intelligence Platform</h3>

									<p><img border="0" height="558" src="Misc_805.png" style="height: 154px; width: 257px; float: left" width="1023" /></p>

									<p align="justify">Welcome to the future of Cyber Threat Intelligence. Are you interested in running your own or your organization of company&#39;s Cyber Threat Intelligence platform and want to further explore the World of Cyber Threat Intelligence by efficiency producing sharing and communicating vital part of your daily work-flow research to a diverse set of audience? We&#39;re proud to let you know that we&#39;re partnering and actively recommending the use of OpenCTI platform which is an extremely easy to use cyber threat intelligence platform featuring an exclusive set of advanced and sophisticated features further empowering you and your organization to stay on the top of its game in terms of cyber threat intelligence.</p>

									<p align="justify">Grab it from <a class="0" href="https://www.opencti.io/en/">here</a>.</p>

									<p align="justify">&nbsp;</p>

									<h3 align="justify">.: Featured Premium Advertisers and VR Application Partners</h3>

									<p><a href="https://www.casinoadvisers.com"><img src="Misc_200.png" style="border-top: 0px solid; height: 37px; border-right: 0px solid; width: 207px; border-bottom: 0px solid; border-left: 0px solid" /></a>&nbsp;&nbsp;<a href="http://www.anantajitsol.com/"><img src="Misc_201.png" style="border-top: 0px solid; height: 40px; border-right: 0px solid; width: 184px; border-bottom: 0px solid; border-left: 0px solid" /></a>&nbsp;&nbsp;<a href="https://www.hitb.org"><img src="Misc_300.jpg" style="border-top: 0px solid; height: 59px; border-right: 0px solid; width: 88px; border-bottom: 0px solid; border-left: 0px solid" /></a><a href="https://www.coreshells.net"><img src="Misc_807.png" style="border-top: 0px solid; height: 54px; border-right: 0px solid; width: 125px; border-bottom: 0px solid; border-left: 0px solid" /></a></p>

									<h3 align="justify">.: Featured High-Profile Hacking and Security Project Affiliates</h3>

									<p><img border="0" src="advknowledge.gif" />&nbsp;<img border="0" src="b0iler.jpg" />&nbsp;<img border="0" src="b88x31e.jpg" />&nbsp;<img border="0" src="dh-mini-logo.gif" />&nbsp;<img border="0" src="eq_minilogo.gif" />&nbsp;<img border="0" src="frame4.gif" />&nbsp;<img border="0" src="fsix.jpg" /></p>

									<p><img border="0" src="g0tr00t.gif" />&nbsp;<img border="0" src="glitch.jpg" />&nbsp;<img border="0" src="hackergurus.gif" />&nbsp;<img border="0" src="hns.gif" />&nbsp;<img border="0" src="minilogo.jpg" />&nbsp;<img border="0" src="nekromanti-btn2.gif" />&nbsp;<img border="0" src="rootshell.gif" /></p>

									<p><img border="0" src="spbutton.gif" />&nbsp;<img border="0" src="swg.gif" />&nbsp;<img border="0" src="wbglinks.jpg" />&nbsp;<img border="0" src="zoneh.jpg" /></p>

									<h3 align="justify">.: Featured High-Profile Hacking and Security Memoir E-book</h3>

									<p><img border="0" height="856" src="Cyber_Conspiracy_eBook.png" style="height: 244px; width: 183px; float: left" width="567" /></p>

									<p align="justify" pbzloc="5">In a World that was once dominated by 33.6k telephone modem connectivity an ex-Bulgarian hacker was busy checking Cyberarmy.com and Progenic.com on a daily basis further exploring the daily batches of new Security and Hacking tools including the latest and most recently released Hacking and Security text files further gaining experience and knowledge in the Scene potentially making high-profile contacts of key leaders and members of the Scene including the U.S Security Industry on his way to seek data information and knowledge on &quot;how to become a hacker&quot; including the latest X-Filed Wallpapers and MIDI-related soundtracks including UFO photos and actual information and photos of the KGB.</p>

									<p align="justify">In this upcoming high-profile Hacking and Security memoir written by Dancho Danchev the ex-Bulgarian hacker will detail his whereabouts throughout the 90&#39;s including his involvement in the Scene including an active work position within the Security Industry while working for several high-profile anti-trojan vendors utimately leading him to pursue a career as one of the World&#39;s most widely recognized and popular cybercrime researchers security bloggers and threat intelligence analysts including an active participation in a Top Secret GCHQ Program for monitoring hackers online known as &quot;Lovely Horse&quot;.</p>

									<p align="justify" pbzloc="4">Approach us today at <a href="mailto:dancho.danchev@hush.com">dancho.danchev@hush.com</a> an inquire about obtaining a copy of the E-book.</p>

									<h3 align="justify">.: Shouts and Greetz to Security Industry Members</h3>

									<p align="justify">It&#39;s been a decade and we&#39;ve been waiting to say hi. Special thanks and cheers to the following groups and individuals for having supported and participated in various Astalavista.box.sk projects including their general and overall contributions to the Security Industry.&nbsp;Groups and individuals we would like to say hi to include:</p>

									<ul>
										<li align="justify">Gary Scott</li>
										<li align="justify">Gadi Evron</li>
										<li align="justify">Paul Ferguson</li>
										<li align="justify">Alex Eckelberry</li>
										<li align="justify">Mark Rash</li>
										<li align="justify">Jamie Riden</li>
										<li align="justify">Steve Santorelli</li>
										<li align="justify">James McQuaid</li>
										<li align="justify">Jeffrey Bardin</li>
										<li align="justify">Jeffrey Carr</li>
										<li align="justify">Mark Risher</li>
										<li align="justify">Ken Dunham</li>
										<li align="justify">Jart Armit</li>
										<li align="justify">Robert McMillan</li>
										<li align="justify">Rob Lemos</li>
										<li align="justify">Gregg Keizer</li>
										<li align="justify">Gary Warner</li>
										<li align="justify">Jorge Mieres</li>
										<li align="justify">Marcus Sachs</li>
										<li align="justify">Gunter Ollman</li>
									</ul>

									<h3>.: Shouts and Greetz to Scene Members</h3>

									<ul>
										<li>Proge &mdash; <a href="http://www.progenic.com/">http://www.progenic.com/</a></li>
										<li>Jason Scott &mdash; <a href="http://www.textfiles.com/">http://www.textfiles.com/</a></li>
										<li>Kevin Townsend &mdash; <a href="http://www.Itsecurity.com/">http://www.Itsecurity.com/</a></li>
										<li>Richard Menta &mdash; <a href="http://www.bankinfosecurity.com">http://www.bankinfosecurity.com</a></li>
										<li>MrYowler &mdash; <a href="http://www.cyberarmy.net/">http://www.cyberarmy.net/</a></li>
										<li>Prozac &mdash; <a href="http://www.astalavista.com/">http://www.astalavista.com/</a></li>
										<li>Candid Wuest &mdash; <a href="http://www.trojan.ch/">http://www.trojan.ch/</a></li>
										<li>Anthony Aykut &mdash; <a href="http://www.frame4.com/">http://www.frame4.com/</a></li>
										<li>Dave Wreski &mdash; <a href="http://www.linuxsecurity.com/">http://www.linuxsecurity.com/</a></li>
										<li>Mitchell Rowtow &mdash; <a href="http://www.securitydocs.com/">http://www.securitydocs.com/</a></li>
										<li>Eric (SnakeByte) &mdash; <a href="http://www.snake-basket.de/">http://www.snake-basket.de/</a></li>
										<li>Bj&ouml;rn Andreasson &mdash; <a href="http://www.warindustries.com/">http://www.warindustries.com/</a></li>
										<li>Bruce &mdash; <a href="http://www.dallascon.com/">http://www.dallascon.com/</a></li>
										<li>Nikolay Nedyalkov &mdash; <a href="http://www.iseca.org/">http://www.iseca.org/</a></li>
										<li>Roman Polesek &mdash; <a href="http://www.hakin9.org/en/">http://www.hakin9.org/en/</a></li>
										<li>John Young &mdash; <a href="http://www.cryptome.org/">http://www.cryptome.org/</a></li>
										<li>Eric Goldman &mdash; <a href="http://www.ericgoldman.org/">http://www.ericgoldman.org/</a></li>
										<li>Robert &mdash; <a href="http://www.cgisecurity.com/">http://www.cgisecurity.com/</a></li>
										<li>Johannes B. Ullrich &mdash; <a href="http://isc.sans.org/">http://isc.sans.org/</a></li>
										<li>Daniel Brandt &mdash; <a href="http://google-watch.org/">http://google-watch.org/</a></li>
										<li>David Endler &mdash; <a href="http://www.tippingpoint.com/">http://www.tippingpoint.com/</a></li>
										<li>Vladimir, 3APA3A &mdash; <a href="http://security.nnov.ru/">http://security.nnov.ru/</a></li>
									</ul>

									<h3>.: Links</h3>

									<ul>
										<li pbzloc="2"><a href="https://packetstormsecurity.com" pbzloc="1">PacketStormSecurity</a></li>
										<li><a href="https://www.hackthissite.org/">HackThisSite</a></li>
										<li><a href="http://cryptome.org">Cryptome</a></li>
										<li><a href="https://link-base.org">Link-Base</a></li>
										<li><a href="https://www.exploit-db.com">Exploit-db</a></li>
										<li><a href="https://www.vulnerability-lab.com">Vulnerability Lab</a></li>
										<li><a href="https://nullsecurity.net">NullSecurity</a></li>
										<li><a href="https://www.zone-h.org">Zone-H</a></li>
										<li><a href="https://defacer.id">Defacer</a></li>
										<li><a href="http://xssed.com">XSSed</a></li>
										<li><a href="http://smashthestack.org/">SmashTheStack</a></li>
										<li><a href="http://www.blackhat.be/">Blackhat</a></li>
										<li><a href="http://www.iwar.org.uk/">IWS</a></li>
										<li><a href="https://www.nmrc.org/">NMRC</a></li>
										<li><a href="http://www.phreak.be/">Phreak</a></li>
									</ul>

									<h3>.: Banner and Link Exchange</h3>

									<p><img border="0" src="astalavista.gif" /></p>

									<p><img border="0" src="astalavista.jpg" /></p>

									<p><img border="0" src="AstaTops.jpg" /></p>

									<h3>.: Featured Hacking and Security Products</h3>

									<p><a href="https://maltronics.com/collections/wifi-keyloggers"><img src="Misc_20.jpg" style="border-top: 0px solid; border-right: 0px solid; border-bottom: 0px solid; border-left: 0px solid" /></a>&nbsp;<a href="https://shop.hak5.org/products/usb-rubber-ducky-deluxe"><img src="Misc_21.jpg" style="border-top: 0px solid; height: 288px; border-right: 0px solid; width: 225px; border-bottom: 0px solid; border-left: 0px solid" /></a></p>

									<h3>.: Featured Hacking and Security Projects</h3>

									<p><a href="https://offensive-warfare.com"><img src="Misc_22.png" style="border-top: 0px solid; border-right: 0px solid; border-bottom: 0px solid; border-left: 0px solid" /></a><a href="https://unit-123.org"><img src="Misc_20.png" style="border-top: 0px solid; height: 192px; border-right: 0px solid; width: 244px; border-bottom: 0px solid; border-left: 0px solid" /></a></p>

									<p><a href="http://lkzihepprlhxtvbutjedoazbsqd4avmifhpjms3zuq7itceiu4qajwad.onion/"><img src="Misc_21.png" style="border-top: 0px solid; height: 218px; border-right: 0px solid; width: 240px; border-bottom: 0px solid; border-left: 0px solid" /></a>&nbsp;<a href="http://cryptome.org"><img src="Misc_28.jpg" style="border-top: 0px solid; border-right: 0px solid; border-bottom: 0px solid; border-left: 0px solid" /></a></p>

									<p><a href="https://hackthissite.org"><img src="Misc_29.jpg" style="border-top: 0px solid; height: 85px; border-right: 0px solid; width: 319px; border-bottom: 0px solid; border-left: 0px solid" /></a>&nbsp;<a href="https://packetstormsecurity.com"><img src="Misc_30.png" style="border-top: 0px solid; border-right: 0px solid; border-bottom: 0px solid; border-left: 0px solid" /></a></p>

									<h3>.: Featured high-profile Cyberpunk movies!</h3>

									<p><a href="https://www.imdb.com/title/tt0353014/"><img src="Misc_40.jpg" style="border-top: 0px solid; border-right: 0px solid; border-bottom: 0px solid; border-left: 0px solid" /></a>&nbsp;<a href="https://www.imdb.com/title/tt0138704/"><img src="Misc_41.jpg" style="border-top: 0px solid; border-right: 0px solid; border-bottom: 0px solid; border-left: 0px solid" /></a>&nbsp;<a href="https://www.imdb.com/title/tt0401233/"><img src="Misc_43.jpg" style="border-top: 0px solid; border-right: 0px solid; border-bottom: 0px solid; border-left: 0px solid" /></a></p>

									<h3>.: Featured High-Profile Advanced VPN Service Provider</h3>

									<p><a href="https://secure.cryptohippie.com/files/CryptohippieProfessionalRouter.pdf"><img src="Misc_908.png" style="border-top: 0px solid; height: 281px; border-right: 0px solid; width: 275px; border-bottom: 0px solid; border-left: 0px solid" /></a></p>

									<h3>.: Featured High-Profile Personal Honeypot System</h3>

									<p><a href="https://canary.tools"><img src="Misc_998.jpg" style="border-top: 0px solid; border-right: 0px solid; border-bottom: 0px solid; float: left; border-left: 0px solid" /></a></p>

									<h3>&nbsp;</h3>

									<h3>&nbsp;</h3>

									<h3>&nbsp;</h3>

									<h3>&nbsp;</h3>

									<h3>&nbsp;</h3>

									<h3>.: Featured High-Profile Network Honeypot System</h3>

									<p><a href="http://www.novanetworksecurity.com"><img src="Misc_999.png" style="border-top: 0px solid; height: 204px; border-right: 0px solid; width: 231px; border-bottom: 0px solid; float: left; border-left: 0px solid" /></a></p>

									<h3>&nbsp;</h3>

									<h3>&nbsp;</h3>

									<h3>&nbsp;</h3>

									<h3>&nbsp;</h3>

									<h3>&nbsp;</h3>

									<h3>.: Featured Cyber Jihad Intelligence Service Providers</h3>

									<p><img border="0" height="368" src="Misc_900.jpg" style="height: 117px; width: 219px; float: left" width="761" /></p>

									<p>Featured Cyber Jihad Intelligence Products and Services:</p>

									<p>- <a class="0" href="https://web.archive.org/web/*/http://internet-haganah.com">Internet Haganah</a><br />
									- <a class="0" href="https://mypetjawa.mu.nu">The Jawa Report v3.0 Beta</a><br />
									- <a class="0" href="https://ent.siteintelgroup.com">SITE Institute</a></p>

									<h3>&nbsp;</h3>

									<h3>.: Featured Information Warfare Projects and Resources</h3>

									<p>&nbsp;<img border="0" height="530" src="Misc_910.png" style="height: 205px; width: 303px; float: left" width="693" /></p>

									<p>Featured&nbsp;Information Warfare Resources:</p>

									<p>- <a class="0" href="https://fas.org/irp/`">FAS - Intelligence Resource Program</a><br />
									- <a class="0" href="https://www.rand.org/topics/asymmetric-warfare.html">RAND - Asymmetric Warfare Resources</a><br />
									- <a class="0" href="https://www.rand.org/topics/cyber-warfare.html">RAND - Net-Centric Warfare Resources</a><br />
									- <a class="0" href="http://www.iwar.org.uk/">The Information Warfare Site</a><br />
									- <a class="0" href="https://www.jinfowar.com">Journal of Information Warfare</a><br />
									- <a class="0" href="https://www.jstor.org/action/doBasicSearch?Query=information+warfare&amp;acc=off&amp;wc=on&amp;fc=off&amp;group=none&#13;&#10;">JSTOR Information Warfare Resources</a></p>

									<h3>&nbsp;</h3>

									<h3>&nbsp;</h3>

									<h3>.: Featured High-Profile and Recommended DOS Games</h3>

									<p>&nbsp;<a href="https://classicreload.com/civilization.html"><img src="Misc_991.jpg" style="border-top: 0px solid; height: 126px; border-right: 0px solid; width: 190px; border-bottom: 0px solid; float: left; border-left: 0px solid" /></a><a href="https://classicreload.com/dosx-apache.html"><img src="Misc_961.jpg" style="border-top: 0px solid; height: 127px; border-right: 0px solid; width: 169px; border-bottom: 0px solid; float: left; border-left: 0px solid" /></a><a href="https://classicreload.com/dosx-ascendancy.html"><img src="Misc_962.jpg" style="border-top: 0px solid; height: 122px; border-right: 0px solid; width: 207px; border-bottom: 0px solid; float: left; border-left: 0px solid" /></a></p>

									<p>&nbsp;</p>

									<p>&nbsp;</p>

									<p>&nbsp;</p>

									<p>&nbsp;</p>

									<h3>.: Featured High-Profile Sci-Fi and Hacker TV Series</h3>

									<p>&nbsp;<a href="https://www.imdb.com/title/tt0112111/"><img src="Misc_990.jpg" style="border-top: 0px solid; height: 148px; border-right: 0px solid; width: 167px; border-bottom: 0px solid; border-left: 0px solid" /></a>&nbsp;&nbsp;<a href="https://www.imdb.com/title/tt0243069/"><img src="Misc_984.jpg" style="border-top: 0px solid; height: 149px; border-right: 0px solid; width: 123px; border-bottom: 0px solid; border-left: 0px solid" /></a><a href="https://www.imdb.com/title/tt0113568/"><img src="Misc_983.jpg" style="border-top: 0px solid; height: 150px; border-right: 0px solid; width: 141px; border-bottom: 0px solid; border-left: 0px solid" /></a>&nbsp;<a href="https://www.imdb.com/title/tt0118379/"><img src="Misc_982.jpg" style="border-top: 0px solid; height: 145px; border-right: 0px solid; width: 94px; border-bottom: 0px solid; border-left: 0px solid" /></a></p>
									</td>
								</tr>
								<tr>
									<td pbzloc="1095" width="49%">&nbsp;</td>
									<td width="1%">&nbsp;</td>
									<td width="50%">&nbsp;</td>
								</tr>
							</tbody>
						</table>

						<h3 pbzloc="1339">.:&nbsp;brief introduction to the Project&nbsp;- 2020</h3>

						<p>It&#39;s 2020 and we&#39;ve decided to re-launch and re-surrect the Scene and the Security Industry&#39;s most popular Internet destination for Hackers and Security Experts with the help of a New Team Member acting as the primary operator of the project Dancho Danchev. The current state of the project promises a variety of new features including an extremely popular Wordpress blog a high-profile and high-volume Hacking and Security Forum and a flagship VR for Hackers and Security Experts application platform including an upcoming high-profile Live YouTube Broadcast featuring exclusive guests from the Scene and the Security Industry including a variety of related Hacking and Security Projects such as for instance People&#39;s Directory and a comprehensive one-page summary of all the currently active U.S Intelligence Community Cyber Surveillance and Eavesdropping Programs and Systems including an online psy-trance and goa-trance online radio a Security Newsletter and a flagship Hacking and Security E-zine &quot;Kings of Wisdom&quot;.</p>

						<p><img border="0" height="623" src="Dancho_Danchev_Photo_2006.png" style="height: 307px; width: 383px; float: left" width="807" />Dancho Danchev is the world&#39;s leading expert in the field of cybercrime fighting and threat intelligence gathering having actively pioneered his own methodology for processing threat intelligence throughout the past decade following a successful career as a hacker-enthusiast in the 90&#39;s leading to active-community participation and contribution as a Member to WarIndustries&nbsp; List Moderator at BlackCode Ravers&nbsp; Contributor to Black Sun Research Facility (BSRF) List Moderator Software Contributor (TDS-2 Trojan Information Database) at DiamondCS Trojan Defense&nbsp; contributor to LockDownCorp&nbsp; Contributor to HelpNetSecurity&nbsp; Managing Director of Astalavista Security Group&#39;s Astalavista.com - The Underground&nbsp; a Security Consultant for Frame4 Security Systems&nbsp; contributor to TechGenix&#39;s WindowSecurity.com&nbsp; security blogger for ZDNet Zero Day&nbsp; Threat Intelligence Analyst for Webroot&nbsp; leading to a successful set of hundreds of high-quality anaysis and research articles published at the industry&#39;s leading threat intelligence blog - ZDNet&#39;s Zero Day&nbsp; Dancho Danchev&#39;s Mind Streams of Information Security Knowledge and Webroot&#39;s Threat Blog with his research featured in Techmeme&nbsp; ZDNet&nbsp; CNN&nbsp; PCWorld&nbsp; SCMagazine&nbsp; TheRegister&nbsp; NYTimes&nbsp; CNET&nbsp; ComputerWorld&nbsp; H+Magazine currently producing threat intelligence at the industry&#39;s leading threat intelligence blog - Dancho Danchev&#39;s - Mind Streams of Information Security Knowledge.</p>

						<p>He&#39;s currently on the following Social Media accounts: <a class="0" href="https://twitter.com/dancho_danchev"><strong>Twitter</strong></a>&nbsp;- <a class="0" href="https://www.facebook.com/dancho.danchev.1048"><strong>Facebook</strong></a>&nbsp;- <a class="0" href="https://linkedin.com/in/danchodanchev"><strong>LinkedIn</strong></a>&nbsp;- <a class="0" href="https://medium.com/@danchodanchev"><strong>Medium</strong></a>&nbsp;- <a class="0" href="https://www.youtube.com/channel/UC-kG5Hl0irayFMfukwEPKfw"><strong>YouTube</strong></a>&nbsp;- <a class="0" href="https://www.peerlyst.com/users/dancho-danchev"><strong>Peerlyst</strong></a></p>

						<p>and is currently runnig the following projects - <a class="0" href="https://unit-123.org"><strong>Unit-123.org</strong></a> - a high-profile Intelligence Deliverables&nbsp;E-shop&nbsp;and <a class="0" href="https://offensive-warfare.com"><strong>Offensive-Warfare.com</strong></a> - a high-profile Pro-Western Cyber Security and Hacking Community including the industry&#39;s leading <a class="0" href="https://ddanchev.blogspot.com"><strong>Dancho Danchev&#39;s Blog</strong></a> - Mind Streams of Information Security Knowledge blog.</p>

						<p>With his research featured at RSA Europe&nbsp; CyberCamp&nbsp; InfoSec&nbsp; GCHQ and Interpol the researcher continues to actively produce threat intelligence at the industry&#39;s leading threat intelligence blog - Dancho Danchev&#39;s - Mind Streams of Information Security Knowledge publishing a diverse set of hundreds of high-quality research analysis detailing the malicious and fraudulent activities at nation-state and malicious actors across the globe.</p>

						<h3>.: brief introduction of Astalavista.box.sk</h3>

						<p align="justify">It&#39;s 1999 and WebFringe Cyberarmy&nbsp;and Progenic used to rock the boat with yet another newly added h/c/p/a/v Web site further empowering a new generation of novice hackers and potentially training and educating thousands of hacking newbies on their way to become successful hackers while coding hacker programs and actually using them withiout the term script kiddies. With major hacking tool releases including ICQ Flooders Mail Bombers and Trojan Horses continuing to grow - a new generation of hackers and security experts including novice hackers and script kiddies was prone to over-take the modern Security Industry by offering data information and knowledge to further explore and push the bounderies of intellectual exploration in the field of computer and information security. Meanwhile on the other side of the Scene the World&#39;s largest and most popular Search Engine for hackers was quickly gaining scale potentially reaching out to tens of thousands of loyal and daily users across the globe serving their Hacking and Security needs by offering and providing the World&#39;s first and largest index of Hacking and Security information. Sticking to the original mission of the Scene namely to offer data information and knowledge to thousands of loyal users across the globe Astalavista.box.sk quickly gained fame and scaled to the point where it became the World&#39;s first and most popular Search Engine for Hackers and Security Experts. With thousands of users using it and tens of thousands of&nbsp; Web sites linking back the portal quickly became one of the most highly-visted and high-trafficked Web site on the Internet. Throughout the past decade and since 1994 the portal is publicly known to be serving the needs of an entire generation of Hackers and Security Experts potentially empowering them with the necessary data information and knowledge on stay on the top of their game and to learn and exchange data information and knowledge turning the portal into what it is today one of the Internet&#39;s primary destination point for Hackers and Security Experts.</p>

						<h3>.: brief introduction of the scene and&nbsp;the Security Industry&nbsp;through the prism of Dancho&nbsp;Danchev&nbsp;- 1999-2013</h3>

						<p align="justify"><img border="0" height="1200" src="GCHQ_Honeynet_Project_2008.JPG" style="height: 419px; width: 583px; float: left" width="1599" />Here you can find a brief description of Dancho Danchev&#39;s experience and expertise in the Scene and the Security Industry throughout the past decade.</p>

						<p align="justify">Sample Brief History of the Scene through the prism of Dancho Danchev&#39;s professional and community-driven experience and expertise:</p>

						<p align="justify">- A Member to WarIndustries (<a href="http://warindustries.com">http://warindustries.com</a>)<br />
						- List Moderator at BlackCode Ravers (<a href="http://blackcode.com">http://blackcode.com</a>)<br />
						- Contributor Black Sun Research Facility (<a href="http://blacksun.box.sk">http://blacksun.box.sk</a>) (BSRF)<br />
						- List Moderator Software Contributor (TDS-2 Trojan Information Database) (<a href="https://packetstormsecurity.com/files/25533/tlibrary.zip.html">https://packetstormsecurity.com/files/25533/tlibrary.zip.html</a>) DiamondCS Trojan Defense (<a href="http://tds.diamondcs.com.au">http://tds.diamondcs.com.au</a>)<br />
						- Contributor to LockDownCorp (<a href="http://lockdowncorp.com">http://lockdowncorp.com</a>)<br />
						- Contributor to HelpNetSecurity (<a href="http://forbidden.net-security.org">http://forbidden.net-security.org</a>)<br />
						- A Security Consultant for Frame4 Security Systems (<a href="http://frame4.com">http://frame4.com</a>)<br />
						- Contributor to TechGenix&rsquo;s WindowSecurity.com (<a href="http://www.windowsecurity.com/authors/dancho-danchev/">http://www.windowsecurity.com/authors/dancho-danchev/</a>)<br />
						- Technical Collector - LockDownCorp - (<a href="https://lockdowncorp.com">https://lockdowncorp.com</a>)<br />
						- Managing Director - Astalavista Security Group - (<a href="https://astalavista.com">https://astalavista.com</a>)<br />
						- Security Consultant - Wandera - (<a href="https://wandera.com">https://wandera.com</a>)<br />
						- Threat Intelligence Analyst - GroupSense - (<a href="https://groupsense.io">https://groupsense.io</a>)<br />
						- Security Consultant - KCS Group Europe - (<a href="https://kcsgroup.com">https://kcsgroup.com</a>)<br />
						- OSINT Analyst - Treadstone71 - (<a href="https://treadstone71.com">https://treadstone71.com</a>)<br />
						- Security Blogger - Armadillo Phone - (<a href="https://armadillophone.com">https://armadillophone.com</a>)<br />
						- Security Blogger for ZDNet (<a href="http://www.zdnet.com/blog/security/">http://www.zdnet.com/blog/security/</a>)<br />
						- Threat Intelligence Analyst for Webroot (<a href="https://www.webroot.com/blog/">https://www.webroot.com/blog/</a>)</p>

						<p align="justify">Stay tuned and let&#39;s make the Scene happen again and don&#39;t forget - <strong>&quot;We&rsquo;re all elite when we tend to rock together. The difference? We rock for ourselves. Our wisdom is our king, and our king is our prevalence. We shall prevail!&rdquo; &ndash; World Hacker Global Domination Group &ndash; 2019</strong></p>

						<p align="justify">Sincerely Yours,</p>

						<p align="justify">Dancho Danchev - Project Administrator - Web&nbsp;site: <a href="https://ddanchev.blogspot.com">https://ddanchev.blogspot.com</a> Email: <a href="mailto:dancho.danchev@hush.com">dancho.danchev@hush.com</a> Voicemail: +1 646 419 4540 Jabber/XMPP/OMEMO: <a href="mailto:90184@armadillophone.com">90184@armadillophone.com</a>&nbsp;Dark Web Onion: <a href="http://lkzihepprlhxtvbutjedoazbsqd4avmifhpjms3zuq7itceiu4qajwad.onion/">http://lkzihepprlhxtvbutjedoazbsqd4avmifhpjms3zuq7itceiu4qajwad.onion/</a></p>

						<center>&nbsp;</center>

						<center>Web site contents &copy; Copyright&nbsp;Astalavista.box.sk 2020, All rights reserved.</center>

						<center><a href="mailto:dancho.danchev@hush.com">dancho.danchev@hush.com</a></center>

						<center>&nbsp;</center>
						</td>
					</tr>
				</tbody>
			</table>
			</td>
			<td width="20">&nbsp;</td>
		</tr>
	</tbody>
</table>
</body>
</html>
URL
GET http://astalavista.box.sk/
Response Headers
Date:
Sun, 02 Aug 2020 01:39:50 GMT
Content-Type:
text/html; charset=iso-8859-1
Location:
https://www.box.sk/
Server:
Apache/2.4.38 (Debian)
Response Body

Empty body

Report ID

20200802T013921Z_AS0_dfVB8HunSOJ8eNrc8sApQu3qlpTZS8ymulokhwbJsjppF7txNC

Platform

linux

OONI Probe version

2.2.0

Measurement Kit version

none

Raw Measurement Data