We were certainly not willing to spend the full asking price for the domain and after a long conversation about it we settled that our maximum amount we were willing to pay was 0, but that we’d make an an initial offer at 0. At they very end Christian adds one more wrinkle stating that our next offer would be “final”, what does that mean. At this point we needed to figure out how much we valued the domain. It then goes on to say that for domains in the 00 range they typically accept offers in the 0 – 00 range depending on “certain” factors. We received their reply to our initial offer very quickly, just a few hours later. What those factors are, I have no idea. The reply stated that HugeDomains won’t accept less than 0 for any domain that they sell.
If he’s voluntarily offering this information I am pretty sure it must be higher that what he actually thinks the value of the domain is. But the question is how much lower will he go. We immediately feel comfortable that we will eventually get the domain for at most our maximum value of 0. Third, he presents a new price range (0 – 00).
For Your Website Name. I setup a page for each. Forums , Free Services , Website Reviews and Appraisals , Domain Auction: Next Auction. With the domain name being in different color than the rest of. I only see problem how to create this lander for many/bulk domains (in time efficient way.
However I am glad that I didn’t jump immediately to my maximum bid. I don’t know if they really have a 0 minimum policy or not. I’ll never know if I should have stuck to my original offer of 0. I am inclined to think I made a mistake and they would have taken the 0 offer.
— Internet security testing and education
One afternoon, when I was writing ASPI drivers for the world, I realized that I could check the Microsoft Windows file and printer sharing security of anyone who came by our web site. Within a week they had backpedalled, apologized, and updated Real Download to remove the privacy-invading unique ID tagging. So we developed a simple and highly secure “one time password” system and have encouraged its wide usage. Free & Clear — “ClearType” demo
Microsoft’s announcement of their “ClearType invention” rubbed me the wrong way because it seemed both obvious and derivative from many previous systems. Overhaul — time for new technology
For nearly all of the first four years of its existence ShieldsUP. I am already crushed by my shorter-term project backlog. ) So I built my own system from scratch to securely manage the process of accepting customers’ private information, interacting with the international banking network, and providing our software to our customers moments later. Wizmo — a weird little “Windows Gizmo”
I wanted a quick means for invoking my systems’ power management. Are you really receiving the bandwidth you are paying for. 0 — The *MAJOR* Upgrade
Version 5. When the Lavasoft folks promised to extend their Ad-Aware tool, while keeping it free, I formally turned the task of spyware removal over to them. A specialized tool was required. PPP — GRC’s perfect paper passwords system
As more banking and eCommerce happens over the Internet, identity theft and impersonation is becoming a growing problem. WIZMO goes much further and adds many other cool features (like a gravitational attraction simulation screen saver). The first advance is deployed in the second-generation, much faster, NanoProbe-enhanced ShieldsUP. GENESIS — denial of service immunity for TCP
A consequence of the NanoProbe RSVP Agent technology (see next item) is the need to open a server to the Internet to accept inbound RSVP client-authentication connections. This has been a badly mixed blessing. From that information I was able to help Internet users deal with this menace. 0, every outbound-blocking personal firewall (not WinXP or BlackICE Defender) has been updated to correct this deficiency. It would not require any sort of bulk file downloads and it would measure only the local service provider’s bandwidth to you. NoShare/LetShare — file sharing enable/disable for Windows
Before I worked out the details of “unbinding” network protocols from transports, I wrote a pair of simple to use utilities to achieve the same effect. SpinRite is, without a doubt, my MS-DOS programming masterpiece. ChromaZone — how I taught myself to program Windows in asm
If SpinRite is my MS-DOS masterpiece, ChromaZone is probably the equivalent for Windows. Advanced IIS Filter — preemptive security for IIS
Following the “IIS Worm Wars” of 2001, it was clear that the world needed to be protected from future “Malicious URL” exploits against IIS. Dev newsgroup, turned v5. (Serious security vulnerabilities and exploits are being discovered in those apps all the time. EarthLink Browser Tag — anatomy of EarthLink’s custom tag
One weekend, the gang hanging out in our newsgroups discovered an intriguing and frightening “Browser Tag” being added to all queries generated by Earthlink’s customized version of Internet Explorer. This attaches a custom database to the server to allow accesses to be tracked without logging. So, I quickly and independently “invented” the technology for myself. For users of Windows 3. The Assimilator — Net-connected device stress-testing
I want to spend some time with “The Assimilator”, which I built back in February, 2001. I have always been insatiably curious, so my explanation is that I was just working to understand how to put things together. It turned out that WinXP worked just fine without raw sockets, and Microsoft finally removed them with XP’s Service Pack 2. PatchWork — a quick tool to secure Windows servers
A Russian organized crime ring had broken into more than 40 eCommerce sites running unpatched versions of Microsoft’s IIS web server. I use it constantly on all of our systems. Before Gibson Research
As you’ll see from my resumé, I began working on “projects” shortly after I learned to walk. Project-X — IF ONLY there were more time . What Have I Accomplished. Spoofarino — holding ISP’s accountable
Spoofarino will be a simple end-user utility to determine whether ISPs are allowing Internet packets containing fraudulent return addresses (spoofed source IPs) to escape onto the public Internet. Times changed and so has ShieldsUP. It will be used whenever we need to “melt down” commercial hardware or software products of any kind. SpinRite can often help and sometimes save the day. XPdite — quick Windows XP critical security fixer
A critical security flaw has always existed in Windows XP. So I wrote Add sound to a “too quiet” keyboard
Third-Party Cookies — How many users leave them enabled. Real Networks — commercial “phone home” spyware
I went a bit ballistic when I discovered that Real Networks’ file downloading utility, “Real Download”, was sending a report of every download back to Real Networks with a unique ID they had assigned to me. COM network topology change — it was time to update things
We were given the opportunity to assume the management of our own equipment to be installed in our ISP’s facility. Internet Spyware Analyzer — keeping Aureate/Radiate honest
The exact behavior of the nasty Aureate/Radiate advertising spyware was unknown. This flaw allows a specially formed URL to delete the contents of entire file system directories. By the middle of 2003, it became clear that a new version of SpinRite was urgently needed. ” But high-quality “unguessable” passwords are surprisingly difficult for people to invent. ASPI ME — ASPI drivers installer
The original ASPI_ME was simply a better installer of Adaptec’s FREE ASPI drivers than its own. I realized that since only the first megabyte of each drive was erased, it was theoretically possible to completely resurrect the drives by rebuilding the partition table, first partition boot sectors, and first FAT table. XPdite provides instant protection for this vulnerability with a 30k download. I hope to offer a surprisingly comprehensive solution for long-term ZIP and JAZ drive management and maintenance. (NOTE that this system was shutdown and replaced by the GRC Corporate News Blog which eMails subscribers whenever any new posts are made. GRC eCommerce — custom order processing system
I finally made time to address the need for online, 24/7/365, real time purchasing and downloading of our software. The success of ShieldsUP. For many years I have had an idea for creating a very cool, but highly research and development intensive, product. I embarked upon a research project to determine the percentage of GRC’s visitors who currently have third-party cookies (the bad one’s) enabled in their browsers. I created UnPnP to automate this process. I can not reveal much more than that here, but I am excited about creating and offering it. This web site has been growing steadily as a consequence of the work I’ve been finishing. FIX-CIH — whole drive recovery after “Chernobyl” virus attack
On April 26th of 1999 the Windows “Chernobyl” virus completely wiped out tens of thousands of hard drives. SocketLock & SocketToMe — Raw sockets. )
ID — for SCSI/ASPI/ATAPI devices
Before creating TIP (see next item) I needed to understand the ASPI API. Our next-generation security tests, which will be much more aggressive, require absolute confirmation of the target IP. Our Research & Development “NanoProbe” server at //nanoprobe. I really want to. Newsgroups Reorganization — our community grows
As our private newsgroups grew in popularity and traffic, we reached the point where the organization of our group hierarchy needed to be scrapped and reconceived. Focused my attention upon the growing problems of Internet security and privacy. So I created a compatible “stateless TCP handshake” technology for a SYN-flood immune server. SocketLock disabled them completely and SocketToMe tested for the presence of full raw sockets. So I created the DCOMbobulator for two purposes: It allows any Windows user to quickly check their DCOM patch effectiveness . The direction of my work was changed forever. And we’re going to give it a try. Seven months of development, with lots of support and testing help from the members of our grc. ID Serve — remote Internet server identification, and more
The “IIS Worm Wars” of 2001 worried many eCommerce site users about the security of the sites they were trusting with their confidential financial information. Its overall design, which was appropriate for a much smaller site, is becoming old and creaky. Today, ID helps people figure out what’s going on with their Iomega ZIP, JAZ, or other storage devices under Windows. At the time I never imagined that we would ever have the 794,019 subscribers we have today, but I’m glad we have a system that makes their sign-up and maintenance manageable. Then I created the “Free & Clear” demo to show how obvious and “open” any similar solution should be. See the SpinRite link above for the whole story. The new suite of “Freeware” pages are also automatically recreated nightly with updated statistics. This little utility quickly determines and displays which of those features a system support. ClicKey — Adding sound to “too quiet” keyboards
After purchasing a tiny Toshiba Libretto sub-laptop with “chicklet” keys, I was annoyed by the lack of any audible (or much tactile) feedback. UNIX News Server — switched to a “real” UNIX News server
The increasing load on our Microsoft-based news server began causing frequent system crashes. SpinRite — the PC industry’s ultimate data recovery
Most people take their computer’s hard disk drives for granted . Right up to the moment they start acting funny, generating errors, making bad noises, and perhaps “crash” altogether. Since work on Project-X would require me to disappear from the world for a LONG time, it is continually pushed back until all of the much less time consuming projects have been completed and are in your hands. So I created a prophylactic filter (APF) to examine and discard bogus URLs before they could touch and exploit IIS. Although this flaw was finally fixed by XP’s first service pack, the size of the service pack and many stability problems associated with its use argued for a more immediate solution. But Adaptec didn’t approve of ASPI_ME and asked that it be discontinued. I plan to invest a few weeks building some unique tools, then working with the people in our newsgroups to explore and develop a characterization of contemporary ISP DNS server operation. )
Perfect Passwords — A reliable source of randomness
Modern WiFi security, as well as many other forms of security, now depends upon using passwords that cannot be easily guessed or “brute forced. These two little test utilities were designed to “put the lie” to Microsoft’s claim that Windows XP depended upon having full raw sockets. Site Technology Upgrade — added some cool new features
Most of January of 2002 was spent creating a new “query-stream” technology for our web server. (But it can be turned back on anytime if it’s ever needed. To me, the code execution path seemed to have been put in there deliberately, once upon a time. I was working on my own full replacement when the idea for ShieldsUP. So I switched to FreeBSD UNIX and the INN server. I quickly wrote the free FIX-CIH utility to save the data belonging to all of these people. It became wildly popular and enjoyed substantial success. We were late doing this since I refused to use someone else’s “shopping cart” system that I didn’t write and couldn’t trust. SpinRite was not the right tool for data recovery here because the Click of Death is caused by a terminal failure of the IoMega drive. But many of the people who actively participate in our newsgroups are unable to receive the cable channel telecasts. Pure CSS Menus — 100% Script-free menuing
This research project developed the technology of 100% script-free, pure CSS (cascading style sheet) menus for any web site. Once we raised the alarm, Earthlink explained that it was generated from a bunch of user and browser settings and was not a user identifier. Com/ 00000. 1 through WinME, ChromaZone is an amazing toy. 0 accomplished its simple but important mission of revealing the application masquerading vulnerability present in most personal firewalls. Here’s a sample bogus URL aimed at our hybrid, APF-protected, web server: //www. But during that time its support for FAT file systems only began to significantly limit the product’s usability as Windows XP brought NT’s sophisticated NTFS file system into the consumer mainstream. (The graphics charts are not “live”. )
SpinRite v6. SecurAble — Check processor security features
Modern generation processors have improved support for 64-bit code, “hardware virtualization” and buffer overrun exploitation. NanoProbe — my own TCP protocol implementation
I designed and wrote a complete IP protocol suite from scratch, in assembly language, to enable several major advances in our remote Internet security testing technology. 0 — a comprehensive firewall testing tool
LeakTest v1. How good are their firewalls. )
Everything below is in various stages of design or completion,
and may be completed in approximately this sequence. And then to shut down DCOM for good. Everything above is finished and was
completed in that approximate sequence. I learned how to make Windows do my bidding by creating this program in assembly language, and working to invent and implement ChromaZone’s many unique special effects. The GRC NetFilter, described here, will be our solution. A Passion for Technology — my InfoWorld column compendium
Every week, for eight years, I wrote a column in InfoWorld Magazine, the industry’s leading PC newsweekly of the era. The RSVP technology accomplishes this. You can see for yourself why I did it. I built “The Assimilator” to answer such questions. GRC eMail — our unique user-managed eMail system
794,019 subscribers ago, I wrote (in assembly language of course) our own custom eMail management system. Com/ hosts pre-release development of new technologies. The NoShare and LetShare utilities were discontinued once the protocol/transport unbinding and rebinding system was proven more effective. UnPlug n’ Pray — manage Windows’ unsafe UPnP Internet service
On December 20th, 2001, Microsoft revealed a highly critical defect contained in the Universal Plug and Play (UPnP) services running in all versions of Windows XP and many copies of Windows ME. We badly need a complete home page redesign and a site-wide search. So the FBI and the SANS Institute asked me to create a simple utility that anyone could use to check IIS servers for the four vulnerabilities being exploited by the Russians. The returned version number, as an IP address, is also a single small packet. There is a serious need for an end-user consumer-oriented comprehensive Internet content filter to protect the identity and privacy of Internet users while returning control of our Internet connections to us. All I need is the time to write it. 0 — motivation for plugging a glaring vulnerability
Before I created the first simple version of LeakTest, only the ZoneAlarm personal firewall could not be fooled by simple application masquerading. DNS Characterization — creating a contemporary appraisal
Every day, the Internet’s Domain Name System (DNS) silently, faithfully, and reliably looks up and converts millions of domain names into IP addresses. (Now we don’t need to bug Verio for every small change. I created the “Internet Spyware Analyzer” to simulate contact with “home base” and to allow me to figure out exactly what was going on. My column was often the #1 rated feature in the publication. So I created the simple but useful “ID” utility as my own ASPI training test-bed. This causes us to see the proxy server’s IP address rather than the user’s. Could best be described as an “introductory” remote port scanner. My parents say I spent most of my time walking around and disassembling everything within reach. GRC Versioning System — Super-lightweight software versioning system
To support the rapid development of the DNS Benchmark, and for the future work on CryptoLink, I created a pseudo-DNS server at GRC which can be queried with a single DNS packet for the latest version of any of GRC’s recent software. This allowed me to NanoProbe-enhance the traditional ShieldsUP. I heavily customized the open-source news server adding cryptographic user authentication, secure article cancellation, troll-blocking, and many other features. 0 will answer that need. )
MouseTrap — Check your system for “MICE”
At the start of 2006, a very serious critical Windows vulnerability was discovered to have existed in every version of Windows since NT. The DCOMbobulator — DCOM: check it, then chuck it
Microsoft’s DCOM patch to fix the nasty remote compromise vulnerability doesn’t always “take”. Tests to increase their reliability while allowing more ports to be probed much more quickly. TIP — Trouble In Paradise for Iomega users
Iomega’s popular ZIP and JAZ drives suffer from a worrisome condition known as the “Click of Death”. The link above shows real-time statistics. FlowMeter — accurate and true bandwidth measurement
I have an idea for a really cool “true bandwidth” measurement utility. It appeared to be a “sticky” user-ID of some sort. And even when it does it foolishly leaves the unneeded DCOM facility running. This utility quickly checks to make sure your system has been patched. They are doing a >great
I have an idea for a useful and important commercial product. The Assimilator — a grueling hardware firewall/router tester
What happens to personal routers when they are hit with a SYN-flood. But I couldn’t find any existing freeware, so I created my own. Today, as a direct consequence of LeakTest v1. The NanoProbe system includes support for ARP, ICMP, UDP & TCP protocols and generates custom security-testing Internet packets. I have never returned to that project. We think it’s possible to do a MUCH better job . 0 of SpinRite managed to survive untouched for six long years (which was, in retrospect, somewhat longer than it should have). Is there any practical difference between stateful packet inspection firewalls and a simple NAT router. Site Redesign & Search — way past time to fix the home page. There is a need for a thoroughly comprehensive, easy-to-use, end-user personal firewall testing tool. I want to experiment with personal firewalls and residential gateways and NAT routers “under abusive load” to see how they behave when pushed beyond their breaking point. So I wrote the free TIP “early warning system” for all ZIP and JAZ users. I wrote ID Serve in response to many questions asking how the make and model of remote Internet servers could be determined. But, if you have made it down to this point on this page, I am sure I don’t need to tell you how busy I am. 0 into the far more capable, speedy, and useful v6. When I went public with this news I was immediately threatened with legal action by Real Networks. Upgrade — much faster nanoprobe-enhanced testing
As required for many of the things I have planned for GRC (LeakTest v2, NanoProbe tests, RSVP, Spoofarino and more) the now mature NanoProbe technology was moved from the NanoProbe R&D server to the main production GRC. After we developed a new hierarchy, I wrote a series of NNTP protocol utilities to relocate and “re-thread” all of the existing content into the new structure. ZipMon — the long-awaited replacement of TIP (Trouble In Paradise)
There is much more I can do for owners of IoMega ZIP and JAZ drives than I have so far. Optout was hugely successful with more than 2,544,000 individual downloads. I desperately want to have the time to see whether I can pull it off (I believe I can) and every PC user would kill to have it. Has arguably taken the lead to become the Net’s most authoritative and reliable Internet port vulnerability scanning facility. (And it also provides nice processor identification. RSVP Agent — absolutely determining the user’s IP
User IPs are sometimes obscured by an ISP’s transparent proxy server which re-issues the browser’s request. The bottom of every web page on our site now shows its last change date and age, and the average number of times it is viewed per day. Beyond applying another patch to Windows, the United States FBI urged users to completely disable Microsoft’s UPnP service. But that’s all it did. All of the work was placed into the public domain for the benefit of the Internet community. CryptoLink — GRC’s unique remote connectivity product
VPNs (Virtual Private Networks) and similar remote connectivity solutions are all either prohibitively complex, unreliable, difficult to use, or available on a “subscription” basis. The rest, as they say, is history. GRC’s Perfect Passwords page provides a high quality and trustworthy source of randomness for any purpose. )
About Bulk Domain Appraisals. With the Bulk Domain Name. The Bulk Domain Appraisal tool appraises multiple domains and is designed for big, bulk domain lists.
Before purchasing a domain name appraisal you should always first do research and determine the pros and cons of the different domain appraisal.
Through twenty years of participation in the PC industry, I have earned the respect of most of its members. And often makes waves. But this is sometimes controversial and messy. If you are familiar with my work on this web site, you already know that I take stands on issues that I consider important. (And some people just seem to be grumpy. This invites criticism from those whose interests are contrary to mine, those who are annoyed by my non-academic populist style, those who wish their work were as popular as mine, or those who are paid to creatively generate criticism. Therefore, my work often receives attention and publicity.
We offer a wide range of solutions Domain names – focused on getting the correct domain name, privacy and security for you. Only with a few clicks.
Since I need to stay in touch with the world, I try to hang out in some of the many active security and privacy newsgroups we host at “news. So if you want to be on the inner track of what’s happening, the newsgroups at news. (I sometimes disappear for days at a time when I’m in “full project mode”. I also use the groups for pre-release “beta” testing of our new goodies. ) But I always return to the groups to find out what’s been going on in the world. Com are the place to be. ” Even there, my level of participation varies depending upon how absorbed I am in current development projects.
As I saw it there were three options, 1) stick with the current 0 offer, 2) increase it to 0 the possible faux minimum, or 3) go straight to our 0 maximum. We had fun running through several scenarios and trying to predict what their response would be. Our plan was that they would either accept it right away or we would wait a few more months and try again at a slightly higher amount. However it boils down to the simple fact that we don’t know enough to predict their response or find the optimal strategy it’s just a guess. In the end we decided that we would increase our bid to 0. At this point we consult with several other co-workers having an engaging discussion on the best negotiation strategies to maximize returns.
Become a premium user, fill in your bulk domain appraisal list and see how fast your domain names are appraised. Top 5 domain name marketplaces 20 Sep.