Ever wondered what the first domain names registered were?

You can find the list of 100 of the first domain names ever registered at http://www.thelongestlistofthelongeststuffatthelongestdomainnameatlonglast.com Which has the full list, and what rolls in at number one? Well its SYMBOLICS.COM! You can check out the full list here.  

You can find the list of 100 of the first domain names ever registered at http://www.thelongestlistofthelongeststuffatthelongestdomainnameatlonglast.com

Which has the full list, and what rolls in at number one? Well its SYMBOLICS.COM!

You can check out the full list here.

 


Did you like this article?


0 Shares:
You May Also Like

Underfunded NSA Suffers Brownouts

This is really funny, NSA employee's have problems trusting each other.
Underfunded NSA Suffers Brownouts - An anonymous reader writes "Almost ten years after the an internal report, and a year after a Baltimore sun story warned that the electrical system at the fort Meade NSA HQ couldn't keep up with the growing electricity demand ... the problem has got worse. The 'NSA has had to resort to partial, rolling brownouts at its computer farms and scheduled power outages and some offices are experiencing significant power disruptions'. NSA director Alexander testified to congress about this problem. It is suggested he wanted to add more than $800 million to the 07 budget. A recent public powerpoint presentation suggested 70% of of all intelligence spending goes to contractors. It also included a graph, without numbers, of this spending. It suggests that US intelligence spending is around $60 billion. An internal survey that showed NSA employees have problems trusting each other."

Read more of this story at Slashdot.

[Slasdot]
Read More

Detect insider threats with Linux auditing

Detect insider threats with Linux auditing -

Organizations of all sizes need to mitigate the risk of insider threats. Misconduct by authorized users represents a grave threat to an organization. According to the 2005 Computer Security Institute and Federal Bureau of Investigation Computer Crime and Security Survey, organizations reported that computer intrusions from inside sources accounted for nearly half of all incidents. You can secure your network perimeter with intrusion detection systems, firewalls, and virus scanners, but don't neglect to monitor authorized users. The Linux Audit daemon can help you detect violations of your security policies.

[Linux.com]
Read More

10 Really Useful Flickr Grease Monkey Userscripts.

I'm sure a lot of people are familiar with the FireFox extension called GreaseMonkey. The extension allows you to manipulate the JavaScript present on any website you visit. For instance, if you want to displaying text is a specific way, you can. You can also change the colour or look of site with your own custom JavaScript.
9. Flickr Follow Comments - This useful script helps you to view images that you have commented on - but only those that interest you. If you are writing lots of comments every day you know how hard it is not to get distracted by the overload of images when you click “Comments You’ve made”. With this userscript you have 4 different options to see only certain types of comments.
Read More