Site:Our Projects
As a research and development organization, Digibase Operations has various projects it oversees, an overview of our projects is
seen below:
Ongoing Projects
X9 Computer Core
Project lifespan: 2001-present
The X9 Computer Core is the mainframe computer system Digibase Operations has developed, deploys and maintains at its facility.
-
Among the system features:
- Network centralization - The system facilitates centralization for many services and computer systems
- Multiple unit configurations - The system facilitates for external servers to be utilized as part of the system as auxillary processors as so the system CPU can offload tasks to the external units as it continues to service users at peak efficiency.
- Optimization for bulk processing - The system is built and optimised around being able to compute for large bulk tasks.
<a href='/?p=systems-x9cc'>More Information</a>
IP/range Blacklists
Project lifespan: January 2009-present
The Operations currently manages 3 blacklists that are geared toward preventing automated nuicences such as spambots, FTP brute forcing, and web script exploits.
The Operations makes these lists available for the Internet community at large to assist to combat the ongoing issues that plague the internet. It is planned
to expand these lists to cover other issues as well, if you have a suggestion under the scope of a blacklist, feel free to <a href='/?p=c'>contact us</a>.
-
The Blacklists:
- <a href='/blacklist.php?bl=DB_OPS_SPAMBOT_BL'>Spambots</a> - Various forum spambot hosts
- <a href='/blacklist.php?bl=DB_OPS_FTPABUSE_BL'>FTP Abuse</a> - Hosts that are known to perpetrate FTP login brute forcing
- <a href='/blacklist.php?bl=DB_OPS_EXPLOIT_BL'>Web Exploits</a> - Various known RFI (Remote file include) and other various exploit attempt sources.
Project Links: <a href='/?p=regdb'>Statistics and data sources</a>
Current Projects
Web Proxy Scanner (WPS)
Exclusive project for usage by <a href='http://doujinstyle.com'>doujinstyle.com</a>
Project lifespan: April 2010-present
This scanner mechanism is developed as a method to counter abuse where conventional banning techniques does not curb the abuse. This scanner works on a scoring principle where
systems are actively scanned and proxy or proxy-like attributes (specific ports, behavior of services) are given score amounts. A certain threshold prevents the user from
proceeding without the site administrator's intervention.