//
archives

Predictive Analytics

This category contains 5 posts

Tracking Website Visitors Pt5: Installation Script

/tracker/install.php Tracking Website Visitors Pt1: Masking Image Requests Tracking Website Visitors Pt2: Returning Image From Database Tracking Website Visitors Pt3: Returning Tracking Information Tracking Website Visitors Pt4: Uploading Image to MySql Tracking Website Visitors Pt5: Installation Script Advertisements

Tracking Website Visitors Pt4: Uploading Image to MySql

/tracker/upload_image.php Tracking Website Visitors Pt1: Masking Image Requests Tracking Website Visitors Pt2: Returning Image From Database Tracking Website Visitors Pt3: Returning Tracking Information Tracking Website Visitors Pt4: Uploading Image to MySql Tracking Website Visitors Pt5: Installation Script

Tracking Website Visitors Pt3: Returning Tracking Information

This is just a simple page for reading the hits from the database with your tracking information for the image id involved. /tracker/status.php Tracking Website Visitors Pt1: Masking Image Requests Tracking Website Visitors Pt2: Returning Image From Database Tracking Website Visitors Pt3: Returning Tracking Information Tracking Website Visitors Pt4: Uploading Image to MySql Tracking Website … Continue reading

Tracking Website Visitors Pt2: Returning Image From Database

/tracker/return_image.php Tracking Website Visitors Pt1: Masking Image Requests Tracking Website Visitors Pt2: Returning Image From Database Tracking Website Visitors Pt3: Returning Tracking Information Tracking Website Visitors Pt4: Uploading Image to MySql Tracking Website Visitors Pt5: Installation Script

Tracking Website Visitors Pt1: Masking Image Requests

Email marketers commonly use small images embedded in email messages as tracking mechanisms. These email tracking images enable marketers to track approximately how many people viewed a particular email campaign. The same technology has implications in security. Now and then I am asked to consult on Bond skips. Bounty hunters will ask me to help … Continue reading

IP to Street Address

IP to Street Address PHP Script Retrieving the user’s IP address is actually much simpler than you might think, and can be done in a single line. Getenv(“REMOTE_ADDR”) will return the IP address of the person visiting your site. Generally this is accurate, however if the user is running through a proxy server, then it … Continue reading

Twitter Timeline Preservation

The Twitter Timeline Preservation tool is used to automatically take screenshots and transcribe a target’s timeline. Below is a video of the tool in action. After it is done collecting timeline data, it also spits out a current list of who the target is following and who their followers are. Protected accounts are able to … Continue reading

Detect nude images and pornography without using OpenCV

OpenCV (Open Source Computer Vision) is a library of programming functions for processing video and images. The library has more than 2500 optimized algorithms. Usage ranges from interactive art, to mines inspection, stitching maps on the web or through advanced robotics. Below is some code copied from that OpenCV group that gives a mask for … Continue reading

Public Relations and Social Media Scraping

I recently got asked for an interview by a girl in a Master’s program who was doing research so she could teach a class on Public Relations. She had only one question, and it was as generic as they come; “In a Masters Degree program for PR and was assigned to teach a lesson on … Continue reading

Criminal Network Analysis and Visualization: A Data Mining Perspective by J Xu

Criminal Network Analysis After the tragic events of September 11, 2001, academics have been called on for possible contributions in uncovering terrorist networks to enhance public safety and national security. Both the public and the Pentagon have realized that knowledge of the structure of terrorist networks and how those networks operate is one of the … Continue reading