Robot | Path | Permission |
GoogleBot | / | ✔ |
BingBot | / | ✔ |
BaiduSpider | / | ✔ |
YandexBot | / | ✔ |
User-agent: * Sitemap: |
Title | Caleb Cushing’s Blog - Also known as |
Description | Gradle With Caleb Cushing’s Blog Also known as XenoTerraCide Gradle With Gdub 2020-05-28 2021-08-10 gradle gdub java development build-tools monorepo So I found this |
Keywords | N/A |
WebSite | xenoterracide.com |
Host IP | 76.76.21.21 |
Location | United States |
Site | Rank |
US$320,105
Last updated: 2023-05-11 18:21:13
xenoterracide.com has Semrush global rank of 33,065,107. xenoterracide.com has an estimated worth of US$ 320,105, based on its estimated Ads revenue. xenoterracide.com receives approximately 36,936 unique visitors each day. Its web server is located in United States, with IP address 76.76.21.21. According to SiteAdvisor, xenoterracide.com is safe to visit. |
Purchase/Sale Value | US$320,105 |
Daily Ads Revenue | US$296 |
Monthly Ads Revenue | US$8,865 |
Yearly Ads Revenue | US$106,374 |
Daily Unique Visitors | 2,463 |
Note: All traffic and earnings values are estimates. |
Host | Type | TTL | Data |
xenoterracide.com. | A | 299 | IP: 76.76.21.21 |
xenoterracide.com. | NS | 86400 | NS Record: ns1.vercel-dns.com. |
xenoterracide.com. | NS | 86400 | NS Record: ns2.vercel-dns.com. |
Caleb Cushing’s Blog Also known as XenoTerraCide Gradle With Gdub 2020-05-28 2021-08-10 gradle gdub java development build-tools monorepo So I found this cool tool the other day when researching how to do Gradle multi-module (monorepo). The tool is called gdub and what it does, is it behaves more or less like git, instead of having to be in the directory with ./gradlew all you have to do is be in the directory, or a sub directory, and it will fall back to gradle on the path if ./gradlew isn’t present. Beware of SQL injection with Spring Boot and Flyway 2017-05-01 2021-09-04 java code exploit injection postgresql spring spring boot h2 vulnerability flyway sql injection sql So this is a hard to accomplish exploit, and is really only accomplishable by first exploiting another exploit first, or by an employee with some level of trusted access, though this employee might not normally have actual database access. I do believe you should be aware of it, as it leaves open an avenue you may |
HTTP/1.1 308 Permanent Redirect Date: Tue, 09 Nov 2021 09:44:12 GMT Content-Type: text/plain Connection: keep-alive Location: https://xenoterracide.com/ Refresh: 0;url=https://xenoterracide.com/ server: Vercel x-vercel-id: cle1::x8mrd-1636451052283-a34d89895c80 HTTP/2 200 date: Tue, 09 Nov 2021 09:44:12 GMT content-type: text/html; charset=utf-8 content-length: 37584 content-disposition: inline; filename="index.html" cache-control: public, max-age=0, must-revalidate etag: W/"4d6557bebe490e6f3958a7739a839c5d16e8008a979036fdd3ab198808a3e3b8" access-control-allow-origin: * accept-ranges: bytes age: 2637123 x-vercel-cache: HIT server: Vercel x-vercel-id: cle1:cle1::q8hzc-1636451052381-592ea0c58aee strict-transport-security: max-age=63072000 |
Domain Name: XENOTERRACIDE.COM Registry Domain ID: 1585906890_DOMAIN_COM-VRSN Registrar WHOIS Server: whois.namecheap.com Registrar URL: http://www.namecheap.com Updated Date: 2021-01-21T05:02:57Z Creation Date: 2010-02-19T00:17:19Z Registry Expiry Date: 2030-02-19T00:17:19Z Registrar: NameCheap, Inc. Registrar IANA ID: 1068 Registrar Abuse Contact Email: abuse@namecheap.com Registrar Abuse Contact Phone: +1.6613102107 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Name Server: A.ZEIT-WORLD.CO.UK Name Server: B.ZEIT-WORLD.COM Name Server: C.ZEIT-WORLD.ORG Name Server: F.ZEIT-WORLD.NET DNSSEC: unsigned >>> Last update of whois database: 2021-11-09T08:26:20Z <<< |