apps.k7computing.com
Open in
urlscan Pro
178.79.129.76
Public Scan
Submission: On April 28 via api from US — Scanned from GB
Summary
TLS certificate: Issued by Go Daddy Secure Certificate Authority... on July 17th 2022. Valid for: a year.
This is the only time apps.k7computing.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
11 | 178.79.129.76 178.79.129.76 | 63949 (AKAMAI-LI...) (AKAMAI-LINODE-AP Akamai Connected Cloud) | |
2 | 2606:4700::68... 2606:4700::6812:acf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 2a00:1450:400... 2a00:1450:4001:80b::2003 | 15169 (GOOGLE) (GOOGLE) | |
19 | 4 |
ASN63949 (AKAMAI-LINODE-AP Akamai Connected Cloud, SG)
PTR: li185-76.members.linode.com
apps.k7computing.com | |
blog.k7computing.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
k7computing.com
apps.k7computing.com blog.k7computing.com |
723 KB |
3 |
gstatic.com
fonts.gstatic.com |
55 KB |
2 |
bootstrapcdn.com
netdna.bootstrapcdn.com — Cisco Umbrella Rank: 5620 |
62 KB |
0 |
googleapis.com
Failed
fonts.googleapis.com Failed |
|
19 | 4 |
Domain | Requested by | |
---|---|---|
9 | blog.k7computing.com |
apps.k7computing.com
blog.k7computing.com |
3 | fonts.gstatic.com |
blog.k7computing.com
|
2 | netdna.bootstrapcdn.com |
apps.k7computing.com
netdna.bootstrapcdn.com |
2 | apps.k7computing.com |
apps.k7computing.com
|
0 | fonts.googleapis.com Failed |
apps.k7computing.com
|
19 | 5 |
This site contains links to these domains. Also see Links.
Domain |
---|
blog.k7computing.com |
k7computing.com |
www.k7computing.com |
k7academy.com |
www.facebook.com |
twitter.com |
www.linkedin.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.k7computing.com Go Daddy Secure Certificate Authority - G2 |
2022-07-17 - 2023-08-17 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-12-30 - 2023-12-30 |
a year | crt.sh |
*.gstatic.com GTS CA 1C3 |
2023-04-03 - 2023-06-26 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://apps.k7computing.com/EDM/AVAR2022/SecurityInsight/Century
Frame ID: 5C2EC6D05514CEB526A16CCA5B432DCD
Requests: 19 HTTP requests in this frame
Screenshot
Page Title
Page not found - The K7 Security BlogDetected technologies
WordPress (CMS) ExpandDetected patterns
- <link rel=["']stylesheet["'] [^>]+/wp-(?:content|includes)/
- /wp-(?:content|includes)/
Bootstrap (Web Frameworks) Expand
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Material Design Lite (Web Frameworks) Expand
Detected patterns
- <link[^>]* href="[^"]*material(?:\.[\w]+-[\w]+)?(?:\.min)?\.css
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Page Statistics
195 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: Home
Search URL Search Domain Scan URL
Title: Home Products
Search URL Search Domain Scan URL
Title: K7 Antivirus Premium
Search URL Search Domain Scan URL
Title: K7 Total Security
Search URL Search Domain Scan URL
Title: K7 Ultimate Security
Search URL Search Domain Scan URL
Title: K7 Antivirus for Mac
Search URL Search Domain Scan URL
Title: K7 Mobile Security – Android
Search URL Search Domain Scan URL
Title: K7 Mobile Security – iOS
Search URL Search Domain Scan URL
Title: K7 Ultimate Security Infiniti
Search URL Search Domain Scan URL
Title: Business Products
Search URL Search Domain Scan URL
Title: About Us
Search URL Search Domain Scan URL
Title: Contact Us
Search URL Search Domain Scan URL
Title: Careers
Search URL Search Domain Scan URL
Title: Awards & Recognitions
Search URL Search Domain Scan URL
Title: Certifications
Search URL Search Domain Scan URL
Title: News & PR
Search URL Search Domain Scan URL
Title: Affiliates
Search URL Search Domain Scan URL
Title: K7 Academy
Search URL Search Domain Scan URL
Title: Product Downloads
Search URL Search Domain Scan URL
Title: Free Tools
Search URL Search Domain Scan URL
Title: Free Scanner
Search URL Search Domain Scan URL
Title: Blog
Search URL Search Domain Scan URL
Title: Technical Blog
Search URL Search Domain Scan URL
Title: Threat Reports
Search URL Search Domain Scan URL
Title: Videos
Search URL Search Domain Scan URL
Title: Refer & Earn
Search URL Search Domain Scan URL
Title: Partners
Search URL Search Domain Scan URL
Title: Free Trial
Search URL Search Domain Scan URL
Title: Renew
Search URL Search Domain Scan URL
Title: 10 great ways to ensure internet safety for your kids
Search URL Search Domain Scan URL
Title: 10 tips to stay secure when using public Wi-Fi
Search URL Search Domain Scan URL
Title: 15 Mistakes To Avoid When You Download free Antivirus Software
Search URL Search Domain Scan URL
Title: 30 Days to Better Security Part 1 - Back to Basics
Search URL Search Domain Scan URL
Title: 30 Days to Better SecurityPart 2 - Ransomware
Search URL Search Domain Scan URL
Title: 30 Days to Better SecurityPart 3 - Phishing
Search URL Search Domain Scan URL
Title: 30 Days to Better SecurityPart 4 - Adware
Search URL Search Domain Scan URL
Title: 7 Reasons To Choose K7 - For Home Users
Search URL Search Domain Scan URL
Title: 7 Reasons To Renew K7
Search URL Search Domain Scan URL
Title: 7 Advantages of K7 Antivirus - How You Can Make Full Use of It
Search URL Search Domain Scan URL
Title: 9 Critical Measures For IT/ITES Cybersecurity
Search URL Search Domain Scan URL
Title: 7 Attacks On Banks And What We Can Learn From Them
Search URL Search Domain Scan URL
Title: Advantages of Cloud Deployed Endpoint Security
Search URL Search Domain Scan URL
Title: 7 Reasons To Choose K7 Total Security Powered By MAT
Search URL Search Domain Scan URL
Title: Air Gapping for Enterprise Cybersecurity – What, Why, How
Search URL Search Domain Scan URL
Title: All you need to know about cryptocurrency and cryptomining
Search URL Search Domain Scan URL
Title: 7 Reasons Why K7 Is A Global Leader In Antivirus
Search URL Search Domain Scan URL
Title: Are you sure your internet is secure?
Search URL Search Domain Scan URL
Title: Atm and debit/credit card scams
Search URL Search Domain Scan URL
Title: 8 Things to Consider when Buying Antivirus Online for Your Device
Search URL Search Domain Scan URL
Title: BYOD – Don’t Be Vulnerable at Any Time, Anywhere
Search URL Search Domain Scan URL
Title: A guide to banking trojans, malware loaders, and how to get rid of them
Search URL Search Domain Scan URL
Title: Coronavirus, Ransomware, phishing and a few actionable tips to swear by
Search URL Search Domain Scan URL
Title: ADHICS Compliance For Smaller Healthcare Organisations
Search URL Search Domain Scan URL
Title: Creating A Cybersecurity Culture – What You Need To Know
Search URL Search Domain Scan URL
Title: Cryptomining vs Cryptojacking: All You Need to Know
Search URL Search Domain Scan URL
Title: Cyber-hygienic Healthcare – Preventing Digital Infections
Search URL Search Domain Scan URL
Title: Cyberattacks On CEOs – Risk Management For Leaders
Search URL Search Domain Scan URL
Title: App Control made Smarter
Search URL Search Domain Scan URL
Title: Cyberattacks – What The BFSI Sector Should Know And Do
Search URL Search Domain Scan URL
Title: Cybersecuring the Supply Chain
Search URL Search Domain Scan URL
Title: Cybersecurity in Manufacturing – Enabling Cybersafe Production
Search URL Search Domain Scan URL
Title: Cybersecurity In The Time of COVID-19: Work From Home Safety Tips
Search URL Search Domain Scan URL
Title: C2-as-a-Service (C2aaS) and its evil impact on the global threat landscape
Search URL Search Domain Scan URL
Title: Cybersecurity Plays Catch-up
Search URL Search Domain Scan URL
Title: Data Privacy and Protection Day: Let’s take a pledge to make our enterprise safe with these six rules
Search URL Search Domain Scan URL
Title: Data Sharing and Privacy: Everything You Must Know
Search URL Search Domain Scan URL
Title: Creating Secure Branch Connectivity With SD-WAN
Search URL Search Domain Scan URL
Title: Deepfake and the Spooky Face of AI: Everything You Need to Know
Search URL Search Domain Scan URL
Title: Do Not Panic! – K7 Computing demystifies the ‘Android Banking Trojan’
Search URL Search Domain Scan URL
Title: Cyber Threat Reporting in India - What You Need To Know
Search URL Search Domain Scan URL
Title: Education Uninterrupted: Stopping Cyberattacks in Academic Institutions
Search URL Search Domain Scan URL
Title: Enhancing Cybersafety In Call Centres
Search URL Search Domain Scan URL
Title: Enterprise Cybersecurity Needs to Tame the Social Media Beast
Search URL Search Domain Scan URL
Title: Essential Tips to Protect Yourself from Webcam Hacks
Search URL Search Domain Scan URL
Title: Cybersecuring FMCG
Search URL Search Domain Scan URL
Title: EXPLAINED: How downloading Torrent makes you vulnerable
Search URL Search Domain Scan URL
Title: Get Your Head in the Cloud
Search URL Search Domain Scan URL
Title: How to boost the performance of your system ?
Search URL Search Domain Scan URL
Title: Cybersecurity Challenges in MSME Digital Transformation
Search URL Search Domain Scan URL
Title: Cybersecurity Considerations in Telemedicine
Search URL Search Domain Scan URL
Title: How to choose the best antivirus software?
Search URL Search Domain Scan URL
Title: How to create a strong password?
Search URL Search Domain Scan URL
Title: How To Detect And Stop PETYA With K7's Free Scanner?
Search URL Search Domain Scan URL
Title: How to ensure your child’s safe online browsing experience?
Search URL Search Domain Scan URL
Title: Cybersecurity Threat Barometer Q4 2021-22: Malware attacks reaching an all-time high. Are you safe enough from the inevitable perils?
Search URL Search Domain Scan URL
Title: How To Keep Children Safe In Online Class – Practical Steps
Search URL Search Domain Scan URL
Title: How to keep up and interface with your child's steadily developing tech information?
Search URL Search Domain Scan URL
Title: Data Diddling
Search URL Search Domain Scan URL
Title: How to Protect your Digital Identity
Search URL Search Domain Scan URL
Title: How to Protect Yourself from Common Online Scams
Search URL Search Domain Scan URL
Title: How to Protect yourself from Online Scams!
Search URL Search Domain Scan URL
Title: Denial of Service Attack
Search URL Search Domain Scan URL
Title: How To Remove 'Fireball' Malware?
Search URL Search Domain Scan URL
Title: How To Remove 'Fireball' Malware?
Search URL Search Domain Scan URL
Title: How to tackle identity theft on Facebook?
Search URL Search Domain Scan URL
Title: Don’t Be Juice Jacked
Search URL Search Domain Scan URL
Title: India At Risk Of COVID-19 Themed Phishing Attack By Lazarus Group
Search URL Search Domain Scan URL
Title: Internal Attacks: The What, Why and How
Search URL Search Domain Scan URL
Title: Is WannaCry in your computer?
Search URL Search Domain Scan URL
Title: Ensuring Seamless Security in All Aspects
Search URL Search Domain Scan URL
Title: K7 Celebrates 25 years of Excellence
Search URL Search Domain Scan URL
Title: K7 Celebrates ‘An Entrepreneur’s Odyssey’
Search URL Search Domain Scan URL
Title: Enterprises - The Threat Arena
Search URL Search Domain Scan URL
Title: K7 Computing Presenting Twice at AVAR 2017
Search URL Search Domain Scan URL
Title: Existing in a Macro-Less Age
Search URL Search Domain Scan URL
Title: K7 Computing’s take on the Landscape of Cyberthreats
Search URL Search Domain Scan URL
Title: K7 Cyber Threat Monitor Report Q4, 19-20: Why you Should Read Right Now
Search URL Search Domain Scan URL
Title: K7 Hasn’t Forgotten Win 7
Search URL Search Domain Scan URL
Title: Fileless Malware and LOLBins: Everything You Should Know
Search URL Search Domain Scan URL
Title: FISHing for Ransom
Search URL Search Domain Scan URL
Title: K7 is presenting at Virus Bulletin International Conference
Search URL Search Domain Scan URL
Title: K7 Products are Compatible with Meltdown & Spectre Patches!
Search URL Search Domain Scan URL
Title: How K7 Creates Environment Friendly Cybersecurity
Search URL Search Domain Scan URL
Title: Lazarus’s latest fileless malware caught first in the K7 Labs radar
Search URL Search Domain Scan URL
Title: Let’s Fix The Ransomware Scare Against Healthcare
Search URL Search Domain Scan URL
Title: Obsolete OS: A Potential Malware Zone
Search URL Search Domain Scan URL
Title: Our Top 10 Tips for Better Security
Search URL Search Domain Scan URL
Title: Pegasus, a Spyware
Search URL Search Domain Scan URL
Title: Personal Antivirus Is Not Enough For SMEs
Search URL Search Domain Scan URL
Title: Privacy in The Age of The Pandemic
Search URL Search Domain Scan URL
Title: Ransomware & Bitcoin are the New Ingredients for Sextortion
Search URL Search Domain Scan URL
Title: Ransomware – Why Public Institutions Are Vulnerable
Search URL Search Domain Scan URL
Title: Safe Zoom Calls & Meetings: The K7 Guide
Search URL Search Domain Scan URL
Title: Shadow IT, the most significant cybersecurity risk during Covid-19, explained
Search URL Search Domain Scan URL
Title: Six essential tips to keep your data secured in the Cloud
Search URL Search Domain Scan URL
Title: Six Important Measures To Remain Safe from Cyberattacks
Search URL Search Domain Scan URL
Title: Six tips to keep hackers at bay by securing your passwords
Search URL Search Domain Scan URL
Title: Social Engineering and the Psychology of Falling Prey to Cybercriminals
Search URL Search Domain Scan URL
Title: If You Worry About Ransomware, You Should Worry Even More About Phishing
Search URL Search Domain Scan URL
Title: Social Engineering Knowhow 2: Everything you should know about Phishing
Search URL Search Domain Scan URL
Title: Social Engineering Knowhow 3: All you need to know about Vishing and SMiShing
Search URL Search Domain Scan URL
Title: Social Engineering Knowhow 4: The murky alleys of Pharming
Search URL Search Domain Scan URL
Title: Investing in the right antivirus software
Search URL Search Domain Scan URL
Title: Social Engineering Knowhow 5: All you need to know about Pretexting
Search URL Search Domain Scan URL
Title: Social Engineering Knowhow 6: Everything You Need To Know About Scareware
Search URL Search Domain Scan URL
Title: Sodinokibi ransomware and QBot Malware: The (R)Evil Connection Explained
Search URL Search Domain Scan URL
Title: Stop Hackers From Impersonating Your Brand
Search URL Search Domain Scan URL
Title: Strengthening School Cyber Defences
Search URL Search Domain Scan URL
Title: The Business Of Cybercrime
Search URL Search Domain Scan URL
Title: K7 Cyber Threat Monitor Q1 2022-23: Countrywide Infection Rate(IR) surges 7%. What’s Next?
Search URL Search Domain Scan URL
Title: The Cybersafe School
Search URL Search Domain Scan URL
Title: K7 Dialogue – Conversation with Sandeep Bansal, Associate Director at REVA University
Search URL Search Domain Scan URL
Title: The K7 Cyber Threat Monitor Q1 2020-21: A snapshot into the countrywide threat landscape
Search URL Search Domain Scan URL
Title: K7 Dialogue – Conversation with Sanjiv Ranjan, Cybersecurity Advisor
Search URL Search Domain Scan URL
Title: The Man-In-The-Middle (MITM) Cyberattack
Search URL Search Domain Scan URL
Title: The Relevance of Steganography in Cybersecurity
Search URL Search Domain Scan URL
Title: Think Cybersecurity – Think K7!
Search URL Search Domain Scan URL
Title: Tips for Safe Web Browsing
Search URL Search Domain Scan URL
Title: K7 Is The Only Antivirus To Achieve The ‘Very Fast’ Rating In All Of AV-Comparatives’ Test Categories
Search URL Search Domain Scan URL
Title: Top 10 Smartphone Security Tips You Should Know
Search URL Search Domain Scan URL
Title: Keep Children Cybersafe With K7 Ultimate Security
Search URL Search Domain Scan URL
Title: Top 10 types of Cyberbully every parent must know
Search URL Search Domain Scan URL
Title: Top 7 Web Browsing Tips One Must Know
Search URL Search Domain Scan URL
Title: Top cybersecurity practices for Business
Search URL Search Domain Scan URL
Title: Mitigating Business Cyber Risk During The Holiday Season
Search URL Search Domain Scan URL
Title: Top tips for tightening your Wi-Fi security
Search URL Search Domain Scan URL
Title: Top Tips to Stay Safe from Ransomware
Search URL Search Domain Scan URL
Title: What Can Website Categorization Tell Us About Malicious URLs?
Search URL Search Domain Scan URL
Title: WhatsApp Video Controversy: All you need to know
Search URL Search Domain Scan URL
Title: Why Rarely Used Computers Need Cybersecurity
Search URL Search Domain Scan URL
Title: Phishing, The Vicious Scam
Search URL Search Domain Scan URL
Title: Why should you never reuse passwords?
Search URL Search Domain Scan URL
Title: Windows 7 Shutdown bug: Pro tips to solve the problem
Search URL Search Domain Scan URL
Title: Phishing: The Lucky Charm for the Cyberspace Baddies
Search URL Search Domain Scan URL
Title: Phishy Messages And How To Avoid Them
Search URL Search Domain Scan URL
Title: Protect Yourself Against Malicious Online Advertising
Search URL Search Domain Scan URL
Title: QR Code Phishing: Technology, Examples, and Everything You Should Know
Search URL Search Domain Scan URL
Title: Ransomware Protection for Legacy Devices in Healthcare
Search URL Search Domain Scan URL
Title: Ransomware-as-a-Service – Implications for SMBs
Search URL Search Domain Scan URL
Title: Red Team Assessment – What It Is And Why Your Enterprise Needs It
Search URL Search Domain Scan URL
Title: Reinforcing The Human Layer In Enterprise Cybersecurity
Search URL Search Domain Scan URL
Title: Romance scams: the Cupid-ridden online frauds you should be aware of
Search URL Search Domain Scan URL
Title: Scamming using Screen Sharing Apps
Search URL Search Domain Scan URL
Title: Securing Enterprise Passwords
Search URL Search Domain Scan URL
Title: SMBs Need Enterprise Grade Cybersecurity
Search URL Search Domain Scan URL
Title: Sponsored Adverts spreading malware via Social Media Platforms
Search URL Search Domain Scan URL
Title: Spoofing the AntiVirus
Search URL Search Domain Scan URL
Title: Strengthening Enterprise Cybersecurity With Firewall Hardening
Search URL Search Domain Scan URL
Title: The nefarious horde of SMiShing campaigns and how to eliminate them
Search URL Search Domain Scan URL
Title: The QR code Humbug
Search URL Search Domain Scan URL
Title: Things You Should Know About Ransomware as a Service (RaaS)
Search URL Search Domain Scan URL
Title: Tips to avoid failure while buying antivirus online
Search URL Search Domain Scan URL
Title: Today’s Youth and Their Modus Operandi
Search URL Search Domain Scan URL
Title: Uncovering SQL Injection Attacks: A Guide for Enterprises and SMBs
Search URL Search Domain Scan URL
Title: Unexpected Costs And Consequences Of A Cyberattack
Search URL Search Domain Scan URL
Title: Using VAPT To Strengthen Enterprise Cybersecurity
Search URL Search Domain Scan URL
Title: What The Enterprise Sector Needs To Know About Ransomware-as-a-Service (RaaS)
Search URL Search Domain Scan URL
Title: What's so Ethical about Hacking?
Search URL Search Domain Scan URL
Title: Why Legal Departments Need Top-Notch Security
Search URL Search Domain Scan URL
Title: Why Ransomware Continues to Torment Enterprises of All Sizes
Search URL Search Domain Scan URL
Title: Will Your Business Continuity Plan Handle Tomorrow's Cyberattack?
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Century
apps.k7computing.com/EDM/AVAR2022/SecurityInsight/ |
177 KB 177 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
rgs.css
blog.k7computing.com/wp-content/themes/k7security/blog/css/ |
6 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
blog.k7computing.com/wp-content/themes/k7security/ |
865 KB 113 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
responsive.css
blog.k7computing.com/wp-content/themes/k7security/blog/css/ |
171 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
skin-material.css
blog.k7computing.com/wp-content/themes/k7security/blog/css/ |
106 KB 16 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
netdna.bootstrapcdn.com/font-awesome/4.3.0/css/ |
23 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
k7_script.js
blog.k7computing.com/wp-content/themes/k7security/blog/js/ |
120 KB 42 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
css
fonts.googleapis.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
blog.k7computing.com/wp-content/themes/k7security/blog/ |
4 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
blog.png
blog.k7computing.com/wp-content/themes/k7security/blog/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
k7_jq.js
blog.k7computing.com/wp-content/themes/k7security/blog/js/ |
97 KB 28 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
k7_image.js
blog.k7computing.com/wp-content/themes/k7security/blog/js/ |
629 KB 136 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Century
apps.k7computing.com/EDM/AVAR2022/SecurityInsight/ |
177 KB 177 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
7Au_p_0qiz-ade3iOCX2zw.woff2
fonts.gstatic.com/s/muli/v11/ |
17 KB 17 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
OpenSans-Regular-webfont.woff
blog.k7computing.com/wp-content/themes/k7security/css/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
XRXW3I6Li01BKofAjsOUYevI.woff2
fonts.gstatic.com/s/nunito/v9/ |
19 KB 19 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
JTURjIg1_i6t8kCHKm45_ZpC3gnD_g.woff2
fonts.gstatic.com/s/montserrat/v12/ |
18 KB 18 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
fontawesome-webfont.woff2
netdna.bootstrapcdn.com/font-awesome/4.3.0/fonts/ |
55 KB 56 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
OpenSans-Regular-webfont.ttf
blog.k7computing.com/wp-content/themes/k7security/css/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- fonts.googleapis.com
- URL
- http://fonts.googleapis.com/css?family=Roboto%3A500%2C700%7CNunito%3A300%2C700%2C400%2C400italic%7CMuli%3A600%7CMontserrat%3A500&subset=latin&ver=1508772994
- Domain
- blog.k7computing.com
- URL
- https://blog.k7computing.com/wp-content/themes/k7security/css/fonts/OpenSans-Regular-webfont.woff
- Domain
- blog.k7computing.com
- URL
- https://blog.k7computing.com/wp-content/themes/k7security/css/fonts/OpenSans-Regular-webfont.ttf
Verdicts & Comments Add Verdict or Comment
86 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless undefined| $ function| jQuery object| html5 object| Modernizr object| eventie function| EventEmitter function| getStyleProperty function| getSize function| docReady function| matchesSelector object| fizzyUIUtils function| Outlayer function| Isotope function| Masonry object| classie function| Packery object| k7securityLove function| resizeIframe function| vc_js function| getSizeName function| loadScript function| vc_ttaActivation function| vc_accordionActivate function| initVideoBackgrounds function| vc_initVideoBackgrounds function| insertYoutubeVideoAsBackground function| vcResizeVideoBackground function| vcExtractYoutubeId function| vc_googleMapsPointer function| vc_setHoverBoxPerspective function| vc_setHoverBoxHeight function| vc_prepareHoverBox string| screen_size function| imagesLoaded function| Waypoint object| wp function| jQueryBridget function| EvEmitter function| Flickity function| Unipointer function| Unidragger function| TapListener object| jQuery1124037712973747290834 function| vc_plugin_flexslider function| vc_googleplus function| vc_pinterest function| vc_progress_bar function| vc_waypoints function| vc_toggleBehaviour function| vc_tabsBehaviour function| vc_accordionBehaviour function| vc_teaserGrid function| vc_carouselBehaviour function| vc_slidersBehaviour function| vc_prettyPhoto function| vc_google_fonts boolean| vcParallaxSkroll function| vc_rowBehaviour function| vc_gridBehaviour function| getColumnsCount function| wpb_prepare_tab_content boolean| $disableHI number| $tabbedClickCount number| $contentWidth number| $justOutOfSight string| $mobileNavSelector string| $ocm_link_selector boolean| $waypointsBound number| $searchBtnHeight number| $resizeExtra boolean| $usingk7securityCarouselFlk object| $blog_containers string| $html string| $target string| $colAndImgOffsetPos string| $colAndImgOffsetPos2 string| $progressBarsOffsetPos string| $dividerOffsetPos string| $iconListOffsetPos string| $animatedTitlesOffsetPos string| $imageWithHotspotsOffsetPos string| $clientsOffsetPos string| $splitLineOffsetPos string| $svgOffsetPos string| $foodItemOffsetPos0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
7 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Frame-Options | DENY |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
apps.k7computing.com
blog.k7computing.com
fonts.googleapis.com
fonts.gstatic.com
netdna.bootstrapcdn.com
blog.k7computing.com
fonts.googleapis.com
178.79.129.76
2606:4700::6812:acf
2a00:1450:4001:80b::2003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