tag:blogger.com,1999:blog-87650210525218462282024-02-20T10:54:38.379-08:00The ICSI Networking Group Blog<a href="http://www.icir.org">Network Research</a> at the <a href="http://www.icsi.berkeley.edu">International Computer Science Institute</a> in Berkeley, CA.Robin Sommerhttp://www.blogger.com/profile/00359901142211806482noreply@blogger.comBlogger76125tag:blogger.com,1999:blog-8765021052521846228.post-28373553813690350302016-01-07T06:22:00.003-08:002016-01-07T06:23:23.131-08:00Internships for Summer 2016The ICSI Networking and Security Group is accepting applications for summer interns for 2016. ICIR's internships are paid positions, and generally aimed at Ph.D. students actively engaged in network and/or security research and with research interests that have overlap with the general areas of research of one or more of the group's staff.<br />
<br />
Please send your applications no later than Friday, <b>January 29, 2016</b>. We will notify applicants of our decisions by February 16, 2015.<br />
<br />
You can find details regarding the application process <a href="http://www.icir.org/internships.html">here</a>.Mark Allmanhttp://www.blogger.com/profile/16307174487858112101noreply@blogger.com0tag:blogger.com,1999:blog-8765021052521846228.post-17056023986446468302015-01-22T10:27:00.001-08:002015-01-22T10:27:49.743-08:00Internships for Summer 2015The ICSI Networking and Security Group is accepting applications for summer interns for 2015. ICIR's internships are paid positions, and generally aimed at Ph.D. students actively engaged in network and/or security research and with research interests that have overlap with the general areas of research of one or more of the group's staff.<br />
<br />
Please send your applications no later than Friday, <b>January 30, 2015</b>. We will notify applicants of our decisions by February 13, 2015.<br />
<br />
You can find details regarding the application process <a href="http://www.icir.org/internships.html">here</a>.Christian Kreibichhttp://www.blogger.com/profile/05102947565390977065noreply@blogger.com0tag:blogger.com,1999:blog-8765021052521846228.post-13494611273124288292014-01-14T15:25:00.000-08:002014-01-14T15:25:42.552-08:00Internships for Summer 2014The ICSI Networking and Security Group now accepts applications for summer interns for 2014. ICIR's internships are paid positions, and generally aimed at Ph.D. students actively engaged in network and/or security research and with research interests that have overlap with the general areas of research of one or more of the group's staff.<br />
<br />
Please send your applications no later than Friday, <b>January 31, 2014</b>. We will notify applicants of our decisions by February 14, 2014.<br />
<br />
You can find details regarding the application process <a href="http://www.icir.org/internships.html">here</a>.Christian Kreibichhttp://www.blogger.com/profile/05102947565390977065noreply@blogger.com0tag:blogger.com,1999:blog-8765021052521846228.post-204456555227261782013-04-18T11:51:00.001-07:002013-04-18T11:56:30.680-07:00Fathom is a Google Summer of Code Project<div dir="ltr" style="text-align: left;" trbidi="on"><a href="http://fathom.icsi.berkeley.edu">Fathom</a>, our browser-based network measurement platform, is part of <a href="http://measurementlab.net">M-lab</a>'s list of Google Summer of Code Projects. If you're a great browser/JavaScript hacker and interested in working with us on this project in the summer, check out the <a href="http://fathom.icsi.berkeley.edu">Fathom website</a> and the <a href="http://measurementlab.net/gsoc_2013">GSoC ideas page</a>, and get in touch!<br />
</div>Christian Kreibichhttp://www.blogger.com/profile/05102947565390977065noreply@blogger.com0tag:blogger.com,1999:blog-8765021052521846228.post-51207819991292318412013-01-18T05:19:00.003-08:002013-01-18T05:19:38.444-08:00Internships for Summer 2013The ICSI Networking and Security Group is accepting applications for summer interns for Summer 2013. ICIR's internships are paid positions, and generally aimed at Ph.D. students actively engaged in network and/or security research and with research interests that have overlap with the general areas of research of one or more of the group's staff.<br />
<br />
The deadline for submissions is Friday <b>February 8, 2013</b>.<br />
Applicants will be notified of decisions by February 22, 2013.<br />
<br />
The application process is outlined <a href="http://www.icir.org/internships.html">here</a>.<br />
<br />
<br />Mark Allmanhttp://www.blogger.com/profile/16307174487858112101noreply@blogger.com0tag:blogger.com,1999:blog-8765021052521846228.post-78056051467563687432012-11-02T15:52:00.000-07:002012-11-02T15:52:43.674-07:00Announcing the ICSI Certificate Notary<p>We are happy to announce the <a href="http://notary.icsi.berkeley.edu">ICSI Certificate
Notary</a> today. This service provides near
real-time reputation information on a large number of TLS/SSL certificates seen
in the wild, collected continuously from a set of partner network sites. The
notary’s data includes the time when a certificate was first and last seen, and
whether we can establish a valid chain to a root certificate from the <a href="http://www.mozilla.org/projects/security/certs/">Mozilla
root store</a>.</p>
<p>Since the beginning of this year we collaborate with operations at about ten
large network sites to passively extract certificates from their upstream
traffic using <a href="http://www.bro-ids.org">Bro</a>. This has allowed us to build a
certificate database that now comprises roughly half a million unique
web certificates from over 8 billion connections, representing the activity
of estimated 220,000 users. (In fact, we have collected 7 million unique
certificates but the majority is non-web activity and hence excluded from the
notary.)</p>
<p>You can use the service by sending a DNS request for an A or TXT record to:</p>
<pre><code><sha1>.notary.icsi.berkeley.edu
</code></pre>
<p>The token <code><sha1></code> represents the SHA1 digest of the certificate to query,
which you may find when consulting your browser for details about a
certificate. For A record queries, the result comes back either as the address
127.0.0.1 to indicate that our data providers have seen the certificate, as
127.0.0.2 if we could recently validate the certificate against the Mozilla
root store, or <code>NXDOMAIN</code> if we have not seen the certificate. For TXT record
queries, the notary returns key-value pairs with more details. Here is an
example reply:</p>
<pre><code>"version=1 first_seen=15387 last_seen=15646 times_seen=260 validated=1"
</code></pre>
<p>For further details, usage instructions, and background reading, please visit
the notary website at <a href="http://notary.icsi.berkeley.edu">http://notary.icsi.berkeley.edu</a>. We much appreciate your feedback at this early stage, both positive
works-for-me notices as well as problems and suggestions for improvements.</p>Matthias Vallentinhttp://www.blogger.com/profile/18246529686272793999noreply@blogger.com0tag:blogger.com,1999:blog-8765021052521846228.post-30839347712560150652012-02-06T10:03:00.000-08:002012-02-06T10:11:00.985-08:00Summer Internships<p>
The Networking Group is now <a href="http://www.icir.org/interns2012.html">accepting applications for Summer 2012 internships</a>. Applicants should be Ph.D. students with a solid research background in networking and/or security. To apply, send a resume to <a href="mailto:summer@icir.org">summer@icir.org</a>, and arrange for a letter of reference to be sent to that address too. The deadline for applications is February 24, 2012.
</p>Christian Kreibichhttp://www.blogger.com/profile/05102947565390977065noreply@blogger.com0tag:blogger.com,1999:blog-8765021052521846228.post-81492795320206720902011-06-09T00:08:00.000-07:002011-06-09T01:08:18.928-07:00Oakland'11 papers<p>At this year's IEEE <a href="http://www.ieee-security.org/TC/SP2011/">Symposium on Security and Privacy</a> we presented two papers.</p>
<p>The first presents an <a href="http://www.icir.org/christian/trajectories/">extensive measurement study</a> our team of 15 researchers, postdocs and graduate students at UCSD and ICSI has worked on for two years. It expands the analysis of the spam value chain into the financial domain, illuminates the affiliate program landscape for pharmaceuticals, replica goods, and software, and identifies three banks that together receive the credit card transactions of 95% of the spam we observe.</p>
<ul>
<li>K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Felegyhazi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G. M. Voelker, and S. Savage. <i><a href="http://www.icir.org/christian/publications/2011-oakland-trajectory.pdf">Click Trajectories: End-to-End Analysis of the Spam Value Chain</a></i>. IEEE Symposium on Security and Privacy, 2011, Oakland, USA.
</li></ul>
<p>The second paper presents Monarch, a real-time system that crawls
URLs as they are submitted to web services and determines
whether the URLs direct to spam. The paper evaluates the fundamental
challenges that arise due to the diversity of web service spam. Monarch
could protect a service such as Twitter—which needs to process 15 million
URLs/day—for a bit under $800/day.
</p>
<ul>
<li>K. Thomas, C. Grier, J. Ma, V. Paxson and D. Song. <i><a href="http://www.icir.org/vern/papers/monarch-oak11.pdf">Monarch: Providing Real-Time URL Spam Filtering as a Service</a></i>. IEEE Symposium on Security and Privacy, 2011, Oakland, USA.
</li></ul>Christian Kreibichhttp://www.blogger.com/profile/05102947565390977065noreply@blogger.com0tag:blogger.com,1999:blog-8765021052521846228.post-32517343586704619182011-06-08T23:50:00.000-07:002011-06-09T00:08:13.034-07:00SIGCOMM awards<p>ACM has awarded <a href="http://www.sigcomm.org/node/528">this year's SIGCOMM award</a>
to Vern Paxson, for his
seminal contributions to the fields of Internet
measurement and Internet security, and for distinguished leadership and
service to the Internet community.</p>
<p>SIGCOMM's Test-Of-Time Award recognizes papers published at least ten
years ago that have turned out to make significant contributions to the
field of networking. <a href="http://www.sigcomm.org/node/530">This year</a>
one of the two papers chosen is
"A Scalable Content-addressable Network" which appeared in SIGCOMM 2001 and
is authored by current and past ICSI researchers Sylvia Ratnasamy, Paul
Francis, Mark Handley, Richard Karp and Scott Shenker.</p>Christian Kreibichhttp://www.blogger.com/profile/05102947565390977065noreply@blogger.com0tag:blogger.com,1999:blog-8765021052521846228.post-49036238156915034332011-02-23T15:29:00.001-08:002011-02-23T15:29:08.785-08:00Bro Internship<p>The Bro project is <a href="http://www.bro-ids.org/intern.html">looking for an intern</a> this summer as well.
</p>Robin Sommerhttp://www.blogger.com/profile/00359901142211806482noreply@blogger.com0tag:blogger.com,1999:blog-8765021052521846228.post-3399259207542644102011-02-22T10:11:00.001-08:002011-02-22T10:11:07.045-08:00Summer Internships<p>
The Networking Group is now <a href="http://www.icir.org/interns.html">accepting applications for Summer 2011 internships</a>. Applicants should be Ph.D. students with a solid research background in networking and/or security. To apply, send a resume to <a href="mailto:summer@icir.org">summer@icir.org</a>, and arrange for a letter of reference to be sent to that address too. The deadline for applications is March 18, 2011.
</p>Robin Sommerhttp://www.blogger.com/profile/00359901142211806482noreply@blogger.com0tag:blogger.com,1999:blog-8765021052521846228.post-3871223664680522302010-12-07T09:31:00.000-08:002011-01-07T10:54:59.177-08:00Characterizing Scanning BehaviorLast week, Tom Dooner and Brian Stack, two undergraduates we're working with at Case Western Reserve University, presented a poster at Case's <span style="font-style:italic;">Intersections: SOURCE Undergraduate Symposium and Poster Session</span>. The work presented is a preliminary characterization of scanning patterns as observed over 12+ years at LBNL. You can view the poster <a href="http://www.icir.org/mallman/papers/scanning-intersections-poster-2010.pdf">here</a>.
<p>
Followup: Tom and Brian's poster won second place among posters from the College of Engineering at this event. Congrats!Mark Allmanhttp://www.blogger.com/profile/16307174487858112101noreply@blogger.com0tag:blogger.com,1999:blog-8765021052521846228.post-8576187241769903142010-11-23T10:36:00.000-08:002010-11-23T11:17:35.988-08:00IMC'10 Paper on Illuminating Edge NetworksEarlier this month we presented the <a href="http://netalyzr.icsi.berkeley.edu/">ICSI Netalyzr</a> at the <a href="http://conferences.sigcomm.org/imc/2010/">Internet Measurement Conference</a> in Melbourne, Australia. The Netalyzr is a public edge network measurement and debugging service that evaluates the functionality provided by people's Internet connectivity. Its tests include outbound port filtering, hidden in-network HTTP caches, DNS manipulations, NAT behavior, path MTU issues, access-modem buffer capacity, and growing IPv6 support and performance. The paper is available here:
<ul>
<li>Christian Kreibich, Nicholas Weaver, Boris Nechaev, and Vern Paxson. <i><a href="http://www.icir.org/christian/publications/2010-imc-netalyzr.pdf">Netalyzr: Illuminating The Edge Network</a></i>. Internet Measurement Conference, 2010, Melbourne, Australia. (<a href="http://www.icir.org/christian/publications/2010-imc-netalyzr.bib">bib</a>)</li>
</ul>
The Netalyzr has been one of our major research efforts over the past two years, and we're thrilled by the popularity it has gained since we launched it—to date, Netalyzr has collected 160,000 sessions from 6,800 different organisations in 190 countries:
<img style="margin: 0px auto 10px; display: block; text-align: center;" src="http://netalyzr.icsi.berkeley.edu/map.png" />
The study is ongoing, so visit the <a href="http://netalyzr.icsi.berkeley.edu/">Netalyzr website</a> and run it yourself!Christian Kreibichhttp://www.blogger.com/profile/05102947565390977065noreply@blogger.com0tag:blogger.com,1999:blog-8765021052521846228.post-25949655293553443782010-11-17T05:24:00.000-08:002010-11-23T11:18:56.745-08:00Paper on Emergency NotificationWe recently published a paper that discusses a special-purpose social network for communicating during an wide-scale emergency situation (e.g., an earthquake).
<ul>
<li>Mark Allman. <a href="http://www.icir.org/mallman/papers/ice-ccr10.pdf"><i>On Building Special-Purpose Social Networks for Emergency Communication</i></a>. ACM Computer Communication Review, 40(5), October 2010.
</ul>
The CCR public review of the paper is also available <a href="http://ccr.sigcomm.org/online/?q=node/684">here</a>.Mark Allmanhttp://www.blogger.com/profile/16307174487858112101noreply@blogger.com0tag:blogger.com,1999:blog-8765021052521846228.post-38437384594975344892010-10-22T04:32:00.000-07:002010-11-23T11:18:08.447-08:00Dealing with TussleAt HotNets this week Aditya Akella presented our joint paper outlining an architectural framework for dealing with the tussle that naturally arise between networks that want to control resources and enforce policies, on the one hand, and users who are trying to accomplish some work, on the other. The paper is:
<ul>
<li>Chitra Muthukrishnan, Vern Paxson, Mark Allman, Aditya Akella. <i><a href="http://www.icir.org/mallman/papers/tussle-hotnets10.pdf">Using Strongly Typed Networking to Architect for Tussle</a></i>. ACM SIGCOMM Workshop on Hot Topics in Networks (HotNets), October 2010.
</li></ul>
While many of the details of a practical implementation would need to be worked out we'd appreciate feedback on this thought experiment.Mark Allmanhttp://www.blogger.com/profile/16307174487858112101noreply@blogger.com0tag:blogger.com,1999:blog-8765021052521846228.post-9619050101964453132010-09-13T15:23:00.001-07:002010-11-23T11:24:36.410-08:00Postdoctoral Fellowship Opening<p>
The International Computer Science Institute (ICSI) invites applications for a Postdoctoral Fellow position in the area of applying modern compiler technology to the domain of high-performance network security monitoring.
</p>
<p>
The Fellow will be working with ICSI's Networking Group on designing, implementing, and evaluating novel approaches for efficient monitoring of large-scale network environments. The position's primary research focus is on developing strategies for compiling high-level analysis descriptions into highly optimized code for execution on current multi-core architectures.
</p>
<p>
Please see the <a href="http://www.icsi.berkeley.edu/about/netjob.html">full posting</a> for more information.
</p>Robin Sommerhttp://www.blogger.com/profile/00359901142211806482noreply@blogger.com0tag:blogger.com,1999:blog-8765021052521846228.post-54416055132875574012010-08-24T17:12:00.003-07:002010-08-24T17:17:44.456-07:00Major NSF Funding for Bro Development<p>
The Bro team is jazzed to
announce that the National Science Foundation has awarded a grant of
almost $3M to the International Computer Science Institute (ICSI)
and the National Center for Supercomputing Applications (NCSA) for
extensive Bro development.
</p>
<p>
The funded project aims specifically at addressing much of the
feedback that we have received from Bro users over the years. It
will enable us to refine many of the rough edges that the system has
accumulated over time[*], improve Bro's performance significantly,
and also make it much easier for the community to contribute to the
project.
</p>
<p>
For further information, see the joint <a href="http://www.ncsa.illinois.edu/News/10/0824NSFawards.html">ICSI/NCSA press release.</a>
</p>
<p> Thanks to everybody who helped make this happen!
</p>
<p> <small>[*] Yes, that includes documentation!</small>
</p>Robin Sommerhttp://www.blogger.com/profile/00359901142211806482noreply@blogger.com0tag:blogger.com,1999:blog-8765021052521846228.post-15680592914656500462010-08-24T17:12:00.001-07:002010-08-24T17:38:23.103-07:00Cybercasing the Joint<p>
Earlier this month, we presented a paper on how geotagging can leave users vulnerable to what we termed "cybercasing":
</p>
<p>
<em>Gerald Friedland, Robin Sommer</em><br>
<a href="http://www.icir.org/robin/papers/hotsec10-geotube.pdf">Cybercasing the Joint: On the Privacy Implications of Geo-Tagging</a><br>
<em>Proc. USENIX Workshop on Hot Topics in Security, 2010</em>
</p>
<p>
This work was featured by the <a href="http://www.nytimes.com/2010/08/12/technology/personaltech/12basics.html">New York Times</a>, <a href="http://abcnews.go.com/Technology/celebrity-stalking-online-photos-videos-give-location/story?id=11443038">ABC News</a>, <a href="http://www.parentcentral.ca/parent/newsfeatures/article/842467—posting-pictures-online-reveals-more-than-you-know">Toronto Star</a>, and <a href="http://www.newscientist.com/article/dn19160-geotags-reveal-celeb-secrets.html">New Scientist</a>.
</p>
Robin Sommerhttp://www.blogger.com/profile/00359901142211806482noreply@blogger.com0tag:blogger.com,1999:blog-8765021052521846228.post-64598680460880411222010-05-24T21:34:00.001-07:002010-05-24T21:34:34.785-07:00Machine Learning For Network Intrusion Detection
<p>
At last week's <a href="http://oakland31.cs.virginia.edu/">IEEE Symposium on Security & Privacy</a>, we presented some thoughts on using machine learning for intrusion detection:
</p>
<p>
<em>Robin Sommer, Vern Paxson<br>
<a href="http://www.icir.org/robin/papers/oakland10-ml.pdf">Outside the Closed World: On Using Machine Learning For Network Intrusion Detection</a><br>
Proc. IEEE Symposium on Security and Privacy, 2010<br>
</em>
</p>
<p>
Slides are <a href="http://www.icir.org/robin/slides/anomaly-oakland.pdf">here</a>.
</p>
Robin Sommerhttp://www.blogger.com/profile/00359901142211806482noreply@blogger.com0tag:blogger.com,1999:blog-8765021052521846228.post-82026801426010687072010-05-04T11:21:00.000-07:002010-05-04T11:34:45.474-07:00LEET'10 paper on proactive domain blacklistingAt last week's <a href="http://www.usenix.org/events/leet10/">LEET'10</a> workshop we presented our recent work on proactive domain blacklisting based on registration patterns of domain names used in scams.
<ul>
<li>M. Felegyhazi, C. Kreibich, and V. Paxson. <a href="http://www.icir.org/christian/publications/2010-leet-proactive.pdf"><i>On the Potential of Proactive Domain Blacklisting</i></a>. Third USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET '10), 2010, San Jose, CA, USA. (<a href="http://www.icir.org/christian/publications/2010-leet-proactive.bib">bib</a>)</li>
</ul>Christian Kreibichhttp://www.blogger.com/profile/05102947565390977065noreply@blogger.com0tag:blogger.com,1999:blog-8765021052521846228.post-79931133458833996002010-05-03T12:58:00.000-07:002010-05-04T11:33:14.732-07:00TCP Performance in Enterprise NetworksLast week at INM/WREN Vern presented our paper (as a proxy for Boris who was stranded in Finland by volcanic ash) on TCP performance observed within the LBNL enterprise network. The paper is:
<ul>
<li>Boris Nechaev, Mark Allman, Vern Paxson, Andrei Gurtov. <a href="http://www.icir.org/mallman/papers/ent-tcpperf-inm-wren10.pdf"><i>A Preliminary Analysis of TCP Performance in an Enterprise Network</i></a>. USENIX Internet Network Management Workshop/Workshop on Research on Enterprise Networking (INM/WREN), April 2010.</li>
</ul>Mark Allmanhttp://www.blogger.com/profile/16307174487858112101noreply@blogger.com0tag:blogger.com,1999:blog-8765021052521846228.post-2913030116939866242010-04-27T07:11:00.000-07:002010-04-27T07:17:15.607-07:00Early RetransmitAfter many years our Early Retransmit specification is now an RFC.
<ul>
<li>Mark Allman, Konstantin Avrachenkov, Urtzi Ayesta, Josh Blanton, Per Hurtig. <a href="http://www.icir.org/mallman/papers/rfc5827.txt"><i>Early Retransmit for TCP and SCTP</i></a>, April 2010. RFC 5827.
</ul>Mark Allmanhttp://www.blogger.com/profile/16307174487858112101noreply@blogger.com0tag:blogger.com,1999:blog-8765021052521846228.post-1338043757298028832010-04-20T11:41:00.000-07:002010-04-20T11:45:16.051-07:00An Assessment of Web TimeoutsTwo weeks ago at PAM Zak presented our work in assessing the length and implications of various timeouts associated with the process of downloading web pages. The paper are slides:
<ul>
<li>Zakaria Al-Qudah, Michael Rabinovich, Mark Allman. <i><a href="http://www.icir.org/mallman/papers/timeouts-pam10.pdf">Web Timeouts and Their Implications</a></i>. Passive and Active Measurement Conference, April 2010. <a href="http://www.icir.org/mallman/papers/timeouts-pam10-talk.pdf">Zak's slides.</a>
</ul>Mark Allmanhttp://www.blogger.com/profile/16307174487858112101noreply@blogger.com0tag:blogger.com,1999:blog-8765021052521846228.post-34714724899131969112010-04-20T11:40:00.000-07:002010-04-20T11:49:18.104-07:00A Longitudinal Look at Web TrafficA couple weeks back at PAM Tom presented our initial analysis of 3.5 years of HTTP traffic from ICSI's border. The paper and slides from the talk:
<ul>
<li>Tom Callahan, Mark Allman, Vern Paxson. <i><a href="http://www.icir.org/mallman/papers/httpanaly-pam2010.pdf">A Longitudinal View of HTTP Traffic</a></i>. Passive and Active Measurement Conference, April 2010. <a href="http://www.icir.org/mallman/papers/httpanaly-pam2010-talk.pdf">Tom's slides.</a>
</ul>Mark Allmanhttp://www.blogger.com/profile/16307174487858112101noreply@blogger.com0tag:blogger.com,1999:blog-8765021052521846228.post-53491760997045506872010-01-13T10:24:00.000-08:002010-01-13T10:44:41.477-08:00ICSI Netalyzr leaves betaToday we are taking the <a href="http://netalyzr.icsi.berkeley.edu">ICSI Netalyzr</a> out of the beta stage. Among the changes we are rolling out are:
<ul>
<li>New tests. We now provide a path MTU test, IP fragmentation support, improved DNS examination, and look up additional names. Besides the client-side transcript you can now inspect the server-side one, which is useful for debugging highly troubled sessions. In addition, we have improved the overall robustness of the existing tests.</li>
<li>Interface improvements. A frequent complaint we received was that the results summary is overwhelming. As a first step to improve the situation, you can now selectively show or hide result summary detail. On the summary page, you find clickable plus/minus symbols that will expand/collapse test results on the entire page, in a particular test class, or on a particular test. When you first arrive at the summary page, any issues we have noticed remain expanded by default.</li>
<li>Updated info pages. Each of our tests comes with an info page, available by clicking on the test's name (such as "Path MTU" in the above). We have given those info pages a makeover, which will hopefully make them easier to understand and more useful to less technical users.</li>
</ul>
We hope you will enjoy the new Netalyzr. Many thanks to everyone who has tried out the tool in the past!Christian Kreibichhttp://www.blogger.com/profile/05102947565390977065noreply@blogger.com0