sites you need to visit
15 years 8 months ago #29571
by sose
sose
Network Engineer
analysethis.co/index.php/forum/index
Replied by sose on topic Re: sites you need to visit
when I am not watching my laptop screen then I could be reading some novels like the john grisham novel. sadly I have exusted all his novels , the chase series and the ludlum series.
I got most of these books in this site
booksdownload247.blogspot.com/
www.4shared.com/network/search.jsp?searc...rchName=john+grisham
I got most of these books in this site
booksdownload247.blogspot.com/
www.4shared.com/network/search.jsp?searc...rchName=john+grisham
sose
Network Engineer
analysethis.co/index.php/forum/index
15 years 8 months ago #29603
by sose
sose
Network Engineer
analysethis.co/index.php/forum/index
Replied by sose on topic Re: sites you need to visit
these are important sites worth visiting, I even pinpoint intersting articles and papers in the sites that are worth going through.
just make sure you have a pot of coffee by your side
A Stateful Inspection of CheckPoint Firewall 1
Kevin Mitnick vs. Tsutomu Shimomura www.takedown.com
www.apa.state.va.us/info_sys_security/sample_pol_proc.htm
domino.mms.de/tech.nsf/0/adfd89bf4f5669a...y_based_routing.pdf\
www.incidents.org/papers/OSfingerprinting.php
IP VPN Services
www.networkmagazine.com/shared/article/s...ml?articleID=8703357
What is a Virtual Private Network?
www.networkmagazine.com/shared/article/s...ml?articleID=8706528
VPN Vulnerabilities
www.networkmagazine.com/shared/article/s...ml?articleID=8703359
This is an interesting article about the Sapphire Worm (Slapper), that could go right through the VPN and cause a little havoc.
www.networkmagazine.com/shared/article/s...ml?articleID=8703534
www.computerworld.com.au/index.php?id=20...amp;fp=16&fpid=0
www.securityfocus.com/infocus/1694
www.firewall.cx/firewall_topologies.php
'Penetration Testing Methodology - For Fun And Profit' - Efrain Tores and LoNoise, you can Google for this paper and find it.
An Approach To Systematic Network Auditing - Mixter ( mixter.void.ru )
'Penetration Testing - The Third Party Hacker' - Jessica Lowery. ( www.sans.org/rr/papers/index.php?id=264 )
'
Penetration Testing - Technical Overview' - Timothy P. Layton
Sr. also from the www.sans.org ( www.sans.org ) reading room
www.ietf.org/rfc/rfc2132.txt?number=2131
www.ietf.org/rfc/rfc2132.txt?number=2132
homepages.wmich.edu/~mchugha/w2kfirewall.htm
entreelibre.com/cctt/index_en.html
Securing IIS webservers
www.securityfocus.com/infocus/1755
Securing PHP www.securityfocus.com/infocus/1706
packetstormsecurity.org/papers/protocols..._to_arp_spoofing.pdf
grc.com/dos/drdos.htm
www.visualware.com/whitepapers/tutorials/email.html
www.securityfocus.com/infocus/1759
news.zdnet.co.uk/internet/security/0,39020375,39160000,00.htm
www.uwsg.indiana.edu/hypermail/Linux/kernel/0406.0/0497.html
www.isecom.org/osstmm/
web.lemuria.org/security/WormPropagation.pdf
hxxp://www.infoshackers.com/index.php
And go to SniffingTraQ (first register)
Linux Newbie Administration Guide
www.ultrasoftware.net/viruslist/descr.asp?id=101
news.bbc.co.uk/1/hi/technology/4190607.stm
www.radarhack.com/dir/papers/hping2_v1.5.pdf
cert.uni-stuttgart.de/archive/bugtraq/2004/04/msg00351.html
www.giac.org/practical/GSEC/Vernon_Vail_GSEC.pdf
www.phenoelit.de
Hacking exposed - Windows 2003 book by Joel Scambray and Stuart McClure
www.isaserver.org/tutorials/How_to_creat...s_Ping_Requests.html
www.robertgraham.com/pubs/sniffing-faq.html
www.securiteam.com/tools/AntiSniff_-_fin...r_local_network.html
www.derkeiler.com/Newsgroups/microsoft.p...ty/2004-01/1621.html
www.cisco.com/warp/public/cc/so/cuso/epso/sqfr/safe_wp.htm
www.fefe.de/switch/
www.nsacom.net:1952/txt/Website_Mirrors/...niff/tech-paper.html
www.robertgraham.com/pubs/sniffing-faq.html
www.zurich.ibm.com/~dac/Prog_RAID98/Full...ector.html/index.htm
www.safesquid.com
www.safesqid.com/mktg/safesquid.pdf
www.cisco.com/univercd/cc/td/doc/product...x/pdm/v_30/index.htm
www.cisco.com/en/US/products/sw/netmgtsw...user_guide_list.html
www.stunnel.org/
stunnel.mirt.net/
www.onsight.com/faq/stunnel/
www.watchguard.com/infocenter/editorial/135324.asp
en.wikipedia.org/wiki/Type_1_product
( myitforum.techtarget.com/articles/12/view.asp?id=7724 )
www.jms1.net/nt-unlock.html
www.tracking-hackers.com .
www.securityfocus.com/infocus/1674
www.hack.gr/Linux/gazette/issue63/sharma.html
www.cert.org/advisories/CA-1996-21.html
www.phrack.org/phrack/48/P48-14
bau2.uibk.ac.at/matic/spoofing.htm
www.iss.net/security_center/advice/...ing/default.htm
staff.washington.edu/dittrich/talks...ora/hijack.html
www.cs.cornell.edu/Courses/CS519/20...Ctcphijack.html
weadmin.com/satish/talk/non_blind_s...ion_hijack.html
www.phrack.org/phrack/33/P33-08
www.phrack.org/phrack/34/P34-08
www.cisco.com/univercd/cc/td/doc/ci.../ito_doc/ip.htm
www.cisco.com/warp/public/535/4.html
www.garykessler.net/library/tcpip.html
www.acm.org/crossroads/xrds1-1/tcpjmy.html
www.governmentsecurity.org/forum
just make sure you have a pot of coffee by your side
A Stateful Inspection of CheckPoint Firewall 1
Kevin Mitnick vs. Tsutomu Shimomura www.takedown.com
www.apa.state.va.us/info_sys_security/sample_pol_proc.htm
domino.mms.de/tech.nsf/0/adfd89bf4f5669a...y_based_routing.pdf\
www.incidents.org/papers/OSfingerprinting.php
IP VPN Services
www.networkmagazine.com/shared/article/s...ml?articleID=8703357
What is a Virtual Private Network?
www.networkmagazine.com/shared/article/s...ml?articleID=8706528
VPN Vulnerabilities
www.networkmagazine.com/shared/article/s...ml?articleID=8703359
This is an interesting article about the Sapphire Worm (Slapper), that could go right through the VPN and cause a little havoc.
www.networkmagazine.com/shared/article/s...ml?articleID=8703534
www.computerworld.com.au/index.php?id=20...amp;fp=16&fpid=0
www.securityfocus.com/infocus/1694
www.firewall.cx/firewall_topologies.php
'Penetration Testing Methodology - For Fun And Profit' - Efrain Tores and LoNoise, you can Google for this paper and find it.
An Approach To Systematic Network Auditing - Mixter ( mixter.void.ru )
'Penetration Testing - The Third Party Hacker' - Jessica Lowery. ( www.sans.org/rr/papers/index.php?id=264 )
'
Penetration Testing - Technical Overview' - Timothy P. Layton
Sr. also from the www.sans.org ( www.sans.org ) reading room
www.ietf.org/rfc/rfc2132.txt?number=2131
www.ietf.org/rfc/rfc2132.txt?number=2132
homepages.wmich.edu/~mchugha/w2kfirewall.htm
entreelibre.com/cctt/index_en.html
Securing IIS webservers
www.securityfocus.com/infocus/1755
Securing PHP www.securityfocus.com/infocus/1706
packetstormsecurity.org/papers/protocols..._to_arp_spoofing.pdf
grc.com/dos/drdos.htm
www.visualware.com/whitepapers/tutorials/email.html
www.securityfocus.com/infocus/1759
news.zdnet.co.uk/internet/security/0,39020375,39160000,00.htm
www.uwsg.indiana.edu/hypermail/Linux/kernel/0406.0/0497.html
www.isecom.org/osstmm/
web.lemuria.org/security/WormPropagation.pdf
hxxp://www.infoshackers.com/index.php
And go to SniffingTraQ (first register)
Linux Newbie Administration Guide
www.ultrasoftware.net/viruslist/descr.asp?id=101
news.bbc.co.uk/1/hi/technology/4190607.stm
www.radarhack.com/dir/papers/hping2_v1.5.pdf
cert.uni-stuttgart.de/archive/bugtraq/2004/04/msg00351.html
www.giac.org/practical/GSEC/Vernon_Vail_GSEC.pdf
www.phenoelit.de
Hacking exposed - Windows 2003 book by Joel Scambray and Stuart McClure
www.isaserver.org/tutorials/How_to_creat...s_Ping_Requests.html
www.robertgraham.com/pubs/sniffing-faq.html
www.securiteam.com/tools/AntiSniff_-_fin...r_local_network.html
www.derkeiler.com/Newsgroups/microsoft.p...ty/2004-01/1621.html
www.cisco.com/warp/public/cc/so/cuso/epso/sqfr/safe_wp.htm
www.fefe.de/switch/
www.nsacom.net:1952/txt/Website_Mirrors/...niff/tech-paper.html
www.robertgraham.com/pubs/sniffing-faq.html
www.zurich.ibm.com/~dac/Prog_RAID98/Full...ector.html/index.htm
www.safesquid.com
www.safesqid.com/mktg/safesquid.pdf
www.cisco.com/univercd/cc/td/doc/product...x/pdm/v_30/index.htm
www.cisco.com/en/US/products/sw/netmgtsw...user_guide_list.html
www.stunnel.org/
stunnel.mirt.net/
www.onsight.com/faq/stunnel/
www.watchguard.com/infocenter/editorial/135324.asp
en.wikipedia.org/wiki/Type_1_product
( myitforum.techtarget.com/articles/12/view.asp?id=7724 )
www.jms1.net/nt-unlock.html
www.tracking-hackers.com .
www.securityfocus.com/infocus/1674
www.hack.gr/Linux/gazette/issue63/sharma.html
www.cert.org/advisories/CA-1996-21.html
www.phrack.org/phrack/48/P48-14
bau2.uibk.ac.at/matic/spoofing.htm
www.iss.net/security_center/advice/...ing/default.htm
staff.washington.edu/dittrich/talks...ora/hijack.html
www.cs.cornell.edu/Courses/CS519/20...Ctcphijack.html
weadmin.com/satish/talk/non_blind_s...ion_hijack.html
www.phrack.org/phrack/33/P33-08
www.phrack.org/phrack/34/P34-08
www.cisco.com/univercd/cc/td/doc/ci.../ito_doc/ip.htm
www.cisco.com/warp/public/535/4.html
www.garykessler.net/library/tcpip.html
www.acm.org/crossroads/xrds1-1/tcpjmy.html
www.governmentsecurity.org/forum
sose
Network Engineer
analysethis.co/index.php/forum/index
15 years 8 months ago #29605
by sose
sose
Network Engineer
analysethis.co/index.php/forum/index
Replied by sose on topic Re: sites you need to visit
note some of these site may no longer be floating
some did not renew their domain registration
laws came up in some countries that disallow the floating of some fo these sites etc
check this out
These are educative sites for subscriptions
www.jupiterwebcasts.com/security
Send your name address telephone and destination address of organization to SECURITY-REQUEST@CPD.COM
RISKS-REQUEST@CSL.SRI.COM USENET newsgroup "comp. risks
LISTSERV%LEHIIBM1.BITNET@MITVMA.MIT.EDU send this line :SUB VIRUS-L name
TK0JUT2%NIU.bitnet@mitvma.mit.edu mail replies to cud@chinacat.unicom.com.
TCP-IP-REQUEST@NISC.SRI.COM comp.protocols.tcp-ip
CERT@CERT.SEI.CMU.EDU comp.security.announce
REQUEST@CERT.SEI.CMU.EDU
NIC.DDN.MIL, in SCC:DDN-SECURITY-yy-nn.TXT
CSRC.NCSL.NIST.GOV
CSRC@nist.gov
bugtraq
NIC@NIC.DDN.MIL USENET newsgroup "ddn.mgt-bulletin
SYSADM-LIST-REQUEST@SYSADMIN.COM.
quarterly magazine, "CIPHER".
quarterly magazine, "SIGSAC Review
quarterly magazine called "ISSA Access".
Bugtraq
Wayback machine
Gigaweb
www.security-portal.com
www.cert.org -
www.securityfocus.com/archive/1 -
www.insecure.org
seclists.org
www.eeye.com rm.
www.nessus .
www.zonelabs.com -
www.secinf.net
www.searchsecurity.com
www.antioffline.com - A very good library section on buffer
www.packetstormsecurity.nl - The largest selection of tools and exploits possible.
some did not renew their domain registration
laws came up in some countries that disallow the floating of some fo these sites etc
check this out
These are educative sites for subscriptions
www.jupiterwebcasts.com/security
Send your name address telephone and destination address of organization to SECURITY-REQUEST@CPD.COM
RISKS-REQUEST@CSL.SRI.COM USENET newsgroup "comp. risks
LISTSERV%LEHIIBM1.BITNET@MITVMA.MIT.EDU send this line :SUB VIRUS-L name
TK0JUT2%NIU.bitnet@mitvma.mit.edu mail replies to cud@chinacat.unicom.com.
TCP-IP-REQUEST@NISC.SRI.COM comp.protocols.tcp-ip
CERT@CERT.SEI.CMU.EDU comp.security.announce
REQUEST@CERT.SEI.CMU.EDU
NIC.DDN.MIL, in SCC:DDN-SECURITY-yy-nn.TXT
CSRC.NCSL.NIST.GOV
CSRC@nist.gov
bugtraq
NIC@NIC.DDN.MIL USENET newsgroup "ddn.mgt-bulletin
SYSADM-LIST-REQUEST@SYSADMIN.COM.
quarterly magazine, "CIPHER".
quarterly magazine, "SIGSAC Review
quarterly magazine called "ISSA Access".
Bugtraq
Wayback machine
Gigaweb
www.security-portal.com
www.cert.org -
www.securityfocus.com/archive/1 -
www.insecure.org
seclists.org
www.eeye.com rm.
www.nessus .
www.zonelabs.com -
www.secinf.net
www.searchsecurity.com
www.antioffline.com - A very good library section on buffer
www.packetstormsecurity.nl - The largest selection of tools and exploits possible.
sose
Network Engineer
analysethis.co/index.php/forum/index
15 years 8 months ago #29607
by S0lo
Studying CCNP...
Ammar Muqaddas
Forum Moderator
www.firewall.cx
Replied by S0lo on topic Re: sites you need to visit
I Couldn't resist posting this although it's OT
www.cartalk.com/Radio/WeeklyShow/online.html
Listen to the segments. These two brothers are supposed to help people fix their cars. And they do. Butttaaa......... :lol:
www.cartalk.com/Radio/WeeklyShow/online.html
Listen to the segments. These two brothers are supposed to help people fix their cars. And they do. Butttaaa......... :lol:
Studying CCNP...
Ammar Muqaddas
Forum Moderator
www.firewall.cx
15 years 8 months ago #29622
by sose
sose
Network Engineer
analysethis.co/index.php/forum/index
Replied by sose on topic Re: sites you need to visit
sose
Network Engineer
analysethis.co/index.php/forum/index
15 years 8 months ago #29671
by sose
sose
Network Engineer
analysethis.co/index.php/forum/index
Replied by sose on topic Re: sites you need to visit
All these tools are useful for administratively troubleshooting networks. But remember it is like a double edge sword, you can use them either way. People are currently serving jail terms simple because they try to break networks they weren’t authorized to. So if you plan to use these tools negatively, you better have a rethink. And as usual, your mile may vary: standard disclaimer.
The important part here is not to show how to attack something, but to show how attackers take advantage of your mistakes. This will enable you to protect your network by avoiding the pitfalls attackers use.
Before we start, however, let me make one thing absolutely clear: I neither condone nor will we ever aid or defend those who attack networks or systems they do not own or that they have not been asked to attack. One of the greatest challenges the security community faces is lack of information on the enemy. Questions like who is the threat, why do they attack, how do they attack, what are their tools, and possibly when will they attack? It is questions like these the security community often cannot answer. For centuries military organizations have focused on information gathering to understand and protect against an enemy. To defend against a threat, you have to first know about it. However, in the information security world we have little such information.
This is about securing networks, not distributing tools to break them. Certain information systems security professionals, namely those who are charged with pen testing, have a legitimate use for these tools. In addition, to stop a criminal hacker requires the ability to think like a criminal. After all, the objective is to demonstrate what an attacker would do. Most of us have been taught from a very early age to be good law-abiding people and are simply not good at thinking up very plausible and innovative criminal schemes.
check these tools out: you can google them if you like
Ettercap - I've been personally using Ettercap for over a year and one of the most useful features I have found is it's flooding technique. Using the required plugins, you are able to bring a P4 with 512MB ram Linux server to its knees in around 40 seconds! Amongst the 20 plugins it comes with, here are the most popular:
Lamia- This plug-in allows you to become the root in a switched network that uses the STP protocol to avoid loops.
Spectre: Floods the LAN with random MAC addresses
Banshee: Described as "They kill without discretion... "
Golem: A dangerous D.O.S plugin and lastly its useful Hxx_xxx series plugins
They allow you to steal passwords and data from HTTP, POP, SMTP and a number of other types of streams.
www.nwfusion.com/bg/firewalls/firewallsr..._tablename=firewalls
www.snort.org (IDS)
tripwire(IDS)
CERT (system scanner)
black ice (IDS)
www.gfi.com/mailsecurity/wpexploitengine.htm
eeye.com (network scanner)
retina
core impact ($$) network scanner
www.securityfocus.com/data/vulnerabilities/exploits/kaht2.zip (vul scanner) www.astalavista.com/tools/auditing/netwo...ultiscanner/RPC2.zip scanner
winsock API
www.stealthnet.com
www.insecure.org/nmap
tcpdump
iris
ethereal
Ettercap ( ettercap.sourceforge.net
nesus
john the ripper
l0phtcrack
nickto
cisco scanner
sophie script
sid2user
SEQ-scan
legion
pwdump2
netcat
hping2
superscan
butrus,hydra
www.samspade.org/ssw/
securitypronews.com/securitypronews-24-2...oofingandBeyond.html
ettercap.sourceforge.net
Email tracker pro
nmap,
hping,
nc,
sing,
icmpenum,
Languard Network Scanner (GFI),
Retina (eEye).
hping3
www.tomsnetworking.com/Reviews-150-ProdID-LBU-1.php
kismet
www.foundstone.com/index.htm?subnav=reso...ources/freetools.htm AntiSniff
www.l0pht.com/antisniff/
CPM (Check Promiscuous Mode)
ftp://coast.cs.purdue.edu/pub/tools/unix/cpm/
Neped
www.apostols.org/projectz/neped/
Sentinel
www.packetfactory.net/Projects/sentinel/
ifstatus
m0n0.ch/wall/
www.ipcop.org/
www.isaserver.org
www.safesquid.com/forum
Nessus. www.insecure.org/tools.html
www.dnsstuff.com
www.e-messenger.net/
snort-inline.sourceforge.net/
freebsd.rogness.net/snort_inline/
( www.safer-networking.org/en/download/index.html )
www.anonymizer.com
tor.eff.org
www.controlkids.com/
cybersitter
proxomitron
Wi-Fi Defense - www.otosoftware.com/wireless.asp
sourceforge.net/projects/yahoopops/
www.jaybe.org/info.htm
CacheDump (http://http://www.cr0.net:8040/misc/cachedump.html).
www.cr0.net:8040/misc/cachedump.html
www.oxid.it/cain.html
www.openwall.com/john/
www.paessler.com
cybersitter
websnake
webwacker
Bugtraq
Wayback machine
Gigaweb
www.security-portal.com
www.cert.org -
www.securityfocus.com/archive/1 -
www.insecure.org
seclists.org
www.eeye.com.rm .
www.nessus.com
www.zonelabs.com -
www.secinf.net
www.searchsecurity.com
www.antioffline.com - A very good library section on buffer
www.packetstormsecurity.nl - The largest selection of tools and exploits possible.
The important part here is not to show how to attack something, but to show how attackers take advantage of your mistakes. This will enable you to protect your network by avoiding the pitfalls attackers use.
Before we start, however, let me make one thing absolutely clear: I neither condone nor will we ever aid or defend those who attack networks or systems they do not own or that they have not been asked to attack. One of the greatest challenges the security community faces is lack of information on the enemy. Questions like who is the threat, why do they attack, how do they attack, what are their tools, and possibly when will they attack? It is questions like these the security community often cannot answer. For centuries military organizations have focused on information gathering to understand and protect against an enemy. To defend against a threat, you have to first know about it. However, in the information security world we have little such information.
This is about securing networks, not distributing tools to break them. Certain information systems security professionals, namely those who are charged with pen testing, have a legitimate use for these tools. In addition, to stop a criminal hacker requires the ability to think like a criminal. After all, the objective is to demonstrate what an attacker would do. Most of us have been taught from a very early age to be good law-abiding people and are simply not good at thinking up very plausible and innovative criminal schemes.
check these tools out: you can google them if you like
Ettercap - I've been personally using Ettercap for over a year and one of the most useful features I have found is it's flooding technique. Using the required plugins, you are able to bring a P4 with 512MB ram Linux server to its knees in around 40 seconds! Amongst the 20 plugins it comes with, here are the most popular:
Lamia- This plug-in allows you to become the root in a switched network that uses the STP protocol to avoid loops.
Spectre: Floods the LAN with random MAC addresses
Banshee: Described as "They kill without discretion... "
Golem: A dangerous D.O.S plugin and lastly its useful Hxx_xxx series plugins
They allow you to steal passwords and data from HTTP, POP, SMTP and a number of other types of streams.
www.nwfusion.com/bg/firewalls/firewallsr..._tablename=firewalls
www.snort.org (IDS)
tripwire(IDS)
CERT (system scanner)
black ice (IDS)
www.gfi.com/mailsecurity/wpexploitengine.htm
eeye.com (network scanner)
retina
core impact ($$) network scanner
www.securityfocus.com/data/vulnerabilities/exploits/kaht2.zip (vul scanner) www.astalavista.com/tools/auditing/netwo...ultiscanner/RPC2.zip scanner
winsock API
www.stealthnet.com
www.insecure.org/nmap
tcpdump
iris
ethereal
Ettercap ( ettercap.sourceforge.net
nesus
john the ripper
l0phtcrack
nickto
cisco scanner
sophie script
sid2user
SEQ-scan
legion
pwdump2
netcat
hping2
superscan
butrus,hydra
www.samspade.org/ssw/
securitypronews.com/securitypronews-24-2...oofingandBeyond.html
ettercap.sourceforge.net
Email tracker pro
nmap,
hping,
nc,
sing,
icmpenum,
Languard Network Scanner (GFI),
Retina (eEye).
hping3
www.tomsnetworking.com/Reviews-150-ProdID-LBU-1.php
kismet
www.foundstone.com/index.htm?subnav=reso...ources/freetools.htm AntiSniff
www.l0pht.com/antisniff/
CPM (Check Promiscuous Mode)
ftp://coast.cs.purdue.edu/pub/tools/unix/cpm/
Neped
www.apostols.org/projectz/neped/
Sentinel
www.packetfactory.net/Projects/sentinel/
ifstatus
m0n0.ch/wall/
www.ipcop.org/
www.isaserver.org
www.safesquid.com/forum
Nessus. www.insecure.org/tools.html
www.dnsstuff.com
www.e-messenger.net/
snort-inline.sourceforge.net/
freebsd.rogness.net/snort_inline/
( www.safer-networking.org/en/download/index.html )
www.anonymizer.com
tor.eff.org
www.controlkids.com/
cybersitter
proxomitron
Wi-Fi Defense - www.otosoftware.com/wireless.asp
sourceforge.net/projects/yahoopops/
www.jaybe.org/info.htm
CacheDump (http://http://www.cr0.net:8040/misc/cachedump.html).
www.cr0.net:8040/misc/cachedump.html
www.oxid.it/cain.html
www.openwall.com/john/
www.paessler.com
cybersitter
websnake
webwacker
Bugtraq
Wayback machine
Gigaweb
www.security-portal.com
www.cert.org -
www.securityfocus.com/archive/1 -
www.insecure.org
seclists.org
www.eeye.com.rm .
www.nessus.com
www.zonelabs.com -
www.secinf.net
www.searchsecurity.com
www.antioffline.com - A very good library section on buffer
www.packetstormsecurity.nl - The largest selection of tools and exploits possible.
sose
Network Engineer
analysethis.co/index.php/forum/index
Time to create page: 0.184 seconds