securitymanagerinfo.org

Back to Main/Home Page

Cyber Reference Link Page

This is Dan W's Cyber Reference Link Page.

This is really the only cyber list you need. It is now web page formatted.  For additions, send which section your addition belongs, plus cut and paste the item above where your link should go. Then we can cut & paste it into the chart.

SITE URL                                                                          Back to Main/Home Page
REFERENCES  
CERT http://www.cert.org/nav/index.html
CERT Advisories http://www.cert.org/advisories/
CERT Incident Notes http://www.cert.org/incident_notes/
CERT Summaries http://www.cert.org/summaries/
CERT Current Activity http://www.cert.org/current/current_activity.html
DoD CERT http://www.cert.mil
Computer Weekly http://www.computerweekly.com
DeepSight Threat Management System https://tms.symantec.com
DHS Daily Report Archives http://www.nipc.gov/dailyreports/dailyindex.htm
eWeek News http://eweek-zannounce.com/lrd1_AADYUAAAEoYB
Federal Computer Incident Response Center (FedCIRC) http://www.fedcirc.gov/
iDefense http://www.idefense.com/
Infosyssec http://www.infosyssec.com/
MyNetWatchman http://www.mynetwatchman.com/default.asp
SANS http://www.sans.org
NIST Computer Security Resource Center (SCRC) http://csrc.nist.gov/
NIST Computer Security Resource Center (SCRC) http://csrc.nist.gov/csrc/list.html
NIST Vulnerability and Threat Portal http://icat.nist.gov/vt_portal.cfm
NIST Security Bulletins http://csrc.nist.gov/publications/nistbul/
Security News Portal http://www.securitynewsportal.com/index.shtml
Navy Information Security Techical Assistance Center (ITAC) https://infosec.navy.mil
Navy Information Assurance https://infosec.navy.mil/ps/?t=main/main.tag&bc=main/bc_main.html
Navy NAVCIRT Advisories Database (IAVAs) https://infosec.navy.mil/Advisory/advi?
IATAC http://iac.dtic.mil/iatac/
IATAC Digest http://iac.dtic.mil/iatac/products/ia_digest.htm
Hacker Intel http://www.hackerintel.com/
CERT Tech Tips on Improving Security   http://www.cert.org/tech_tips/
CIAC Documents http://ciac.llnl.gov/cgi-bin/index/documents  http://ciac.llnl.gov/cgi-bin/index/documents
The Cryptography Project   http://www.cosc.georgetown.edu/~denning/crypto
FIRST Security Papers   http://www.alw.nih.gov/Security/first-papers.html
Hideaway.Net - Security Texts   http://www.hideaway.net/Server_Security/Library/library.html
Information Warehouse! Technical Publications   http://iwi.com/iw-pubs.htm
Miscellaneous Security Papers (ftp)   ftp://jhunix.hcf.jhu.edu/pub/miscellaneous_security_papers
Model Security Policies (SANS Institute Resources)   http://www.sans.org/newlook/resources/policies/policies.htm
Rainbow Series Books   http://csrc.nist.gov/secpubs/rainbow/
Raptor Systems Security Library   http://www.raptor.com/lib/index.html
NSA Security Configuration Guides http://www.nsa.gov/snac/
Cisco SAFE Blueprint for Security and Intrusion Detection http://www.cisco.com/en/US/netsol/ns340/ns394/ns171/ns128/networking_solutions_package.html
   
General Topics                                                                                   Back to Main/Home Page
Security Glossary of Terms   http://www.setsolutions.com/security.htm
Glossary of Terms Used in Security and Intrusion Detection   http://www.sans.org/resources/glossary.php
An Introduction to Computer Security , NIST Special Publication 800-12  http://csrc.nist.gov/publications/nistpubs/index.html
IT Baseline Protection Manual from BSI  http://www.bsi.bund.de/gshb/english/menue.htm
How To Eliminate The Ten Most Critical Internet Security Threats - SANS  http://www.sans.org/top20/top10.php
   
   
DATABASES                                                                                   Back to Main/Home Page
NIST - ICAT Vulnerability Database http://icat.nist.gov/icat.cfm
NIST - ICAT Vulnerability Database - Top Ten Vulnerabilities http://icat.nist.gov/icat.cfm?function=topten
NIST Computer Security Resource Center (SCRC) - Virus Information http://csrc.nist.gov/virus/
Computer Vulnerabilities and Exposure (CVE) http://cve.mitre.org/about/
CVE Index and Search http://cve.mitre.org/cve/index.html
CVE Concordance http://www.iss.net/security_center/advice/Concordance/default.htm
Full-Disclosure Archives http://lists.netsys.com/pipermail/full-disclosure/
Virus Bulletin http://www.virusbtn.com/resources/
eEye Digital Security http://www.eeye.com/html/Research/Advisories/index.html
zone-h http://www.zone-h.org/en/defacements/special
ICAT Metabase http://icat.nist.gov
Open Source Vulnerability Database http://www.osvdb.org
   
ACTIVITY MONITORING and REPORTS                                                                                   Back to Main/Home Page
Symantec Threat Monitoring System https://tms.symantec.com
Internet Storm Center http://isc.incidents.org
Internet Storm Center - Top 10 http://isc.incidents.org/top10.html
my NetWatchman -  Top Ports http://www.mynetwatchman.com/tp.asp
my NetWatchman - Top Port Increase http://www.mynetwatchman.com/tpincr.asp
Dshield - General Lookup http://www.dshield.org/reports.php
Dshield - Top 10 Most Wanted IP http://www.infosyssec.com/cgi-bin/flink.cgi?target=www.infosyssec.com/infosyssec/bor1.htm
Dshield - Top 10 Target Ports http://www.infosyssec.com/cgi-bin/flink.cgi?target=www.infosyssec.com/infosyssec/bor2.htm
   
IP ADDRESS LOOKUP                                                                                    Back to Main/Home Page
INTERNET REGISTRIES  
American Registry for Internet Numbers (ARIN) http://www.arin.net
Asia Pacific Network Information Centre http://www.apnic.net
Réseaux IP Européens (RIPE) http://www.ripe.net
Latin America and Caribbean Internet Registration (LACNIC) http://lacnic.net/cgi-bin/lacnic/whois?lg=EN
APJII - Indonesia  
CNNIC - China  
JPNIC - Japan http://whois.nic.ad.jp/cgi-bin/whois_gw
KRNIC - Korea http://www.nic.or.kr/www/english/
TWNIC http://www.twnic.net/index2.php
VNNIC - Vietnam  
Military networks http://www.nic.mil
Symantec TMS https://tms.symantec.com
Dshield - General Lookup http://www.dshield.org/reports.php
   
TOOLS                                                                                   Back to Main/Home Page
Network Calculator http://www.telusplanet.net/public/sparkman/netcalc.htm
Visual Route http://visualroute.visualware.com
Open Vulnerability Assessment Language http://oval.mitre.org/
SPEW.org http://spews.org
GeekTools http://www.geektools.com/tools.php
Karen's Power Tools http://www.karenware.com/powertools.asp
Mozilla Firefox 0.8 http://www.mozilla.org
New Work and Security Tools http://thc.org
String encoder and decoder http://umbrella.name/codenow.htm
Canvas http://www.immunitysec.com/downloads.shtml
Datarescue http://www.datarescue.com/idabase/index.htm
Ascii , dex , oct reference  http://www.asciitable.com/
Solidshell http://solidshell.net/#
Fosh http://www.fosh.com.au/Fosh/Support/hextoascii.htm
Spychecker http://www.spychecker.com/
Hfnetchk http://hfnetchk.shavlik.com/default.asp
netcraft http://news.netcraft.com/
Proxypot http://www.proxypot.org/
multiproxy www.multiproxy.org
webferret www.webferret.com
   
BACKGROUND / REFERENCES                                                                                    Back to Main/Home Page
Internet Security Systems http://www.iss.net/security_center/advice
DeepSight Alert Services https://alerts.symantec.com
Trojan List with Sorting Options http://www.simovits.com/trojans/trojans.html
Trojan List v, Ports http://www.jlathamsite.com/dslr/suspectports.htm
DosHelp.com Intrusion and Attack Reporting Center http://www.doshelp.com/trojanports.htm
ONCTek - Trojan / Backdoor and TCP/UDP ports http://www.onctek.com/trojanports.html
Linux Firewall Tools - Commonly Probed Ports http://www.linux-firewall-tools.com/linux/ports.html
Commodon Communications http://www.commodon.com/threat/frame.htm
InfoSysSec http://www.infosyssec.org/
Commodon Communications-Current List of Trojans http://www.commodon.com/threat/threat-all.htm
Internet Ports, Services and Trojans http://andrew.triumf.ca/ports/other.html
X-Force Research http://xforce.iss.net/
X-Force Research - Alerts and Advisories http://xforce.iss.net/xforce/alerts
Port Knowledgebase http://www.iss.net/security_center/advice/Exploits/Ports/
IANA Port Assignments http://www.iana.org/assignments/port-numbers
astalavista http://www.astalavista.com
Blackcode http://www.blackcode.com
Church of the Swimming Elephant http://www.cotse.com
CyHackPortal http://www.cyhackportal.com
DShield http://dshield.org
E-Week http://www.eweek.com/
fatelabs http://www.fatelabs.com
Hack in the Box http://www.hackinthebox.com
HACK R. COM http://www.hack3r.com
Hackersplayground http://www.hackersplayground.org
Hackerthreads.org Security Forum http://www.hackerthreads.org
Insecure.Org http://www.insecure.org
Lame Industries http://www.lameindustries.org
Linux Security.com http://www.linuxsecurity.com
my NetWatchman http://www.mynetwatchman.com
New Order http://neworder.box.sk
Packet Storm http://www.packetstormsecurity.com
ProgenicDotCom http://www.progenic.com
Root Hack http://www.roothack.org
SecurityFocus http://www.securityfocus.com
The Hacktivist http://www.thehacktivist.com/index.php
the Honeynet Project http://www.honeynet.org
Zone-h http;//www.zone-h.org
GoDaddy http://www.godaddy.com
Security News Portal http://securitynewsportal.com/index.html
Ziff Davis http://www.zdnet.com
The Register http://www.theregister.co.uk/content/1/index.html
Internet Assigned Numbers Authority http://www.iana.org/
mlsecurity http://www.mlsecurity.com/research/
Bsdhound http://bsdhound.com/link.php
Security horizon http://www.securityhorizon.com/security_whitepapers/
Cisco aironet moding http://www.mrx.com.au/wireless/AironetModifications.htm
Cyruxnet http://www.cyruxnet.org/news.htm
Deamonnews  http://www.daemonnews.org/200108/security-howto.html
I-eye http://www.i-eye.de/dokumentation/index.php
bugtraq.underattack http://bugtraq.underattack.co.kr/xploit.php3?line_1=0&line_2=10
Freebsd security http://www.watson.org/fbsd-hardening/
hack canada http://www.hackcanada.com/
rootkit http://rootkit.host.sk/
Government security http://www.governmentsecurity.org/
markusjansson http://www.markusjansson.net/exp.html
HSC http://www.hsc.fr/ressources/outils/idswakeup/index.html.en#copieecran
haxworx http://www.haxworx.com/index.php
securiteam http://www.securiteam.com/
hernanracciatti http://www.hernanracciatti.com.ar/papers_and_download.html
Shellcode http://www.shellcode.com.ar/
Security.ku.edu http://security.ku.edu/hardening/freebsd.shtml
Securitytrap http://www.securitytrap.com/
Sysinternals http://www.sysinternals.com/
Cartel-Securite http://www.cartel-securite.fr/pbiondi/projects/shellforge.html
Networkintrustion http://www.networkintrusion.co.uk/fortools.htm
Community core sdi  http://community.core-sdi.com/~juliano/bufo.html
Security Corporation http://www.security-corporation.com/
Underground Mac http://undergroundmac.com/
theory X http://www.theory-x.org/
windows security http://www.windowsecurity.com/
critical security  http://www.criticalsecurity.com/
firewall http://www.firewall.cx/
blackhate info http://www.blackhat.info/live/
hacker news http://www.hackers-news.com/
elcomsoft http://www.elcomsoft.com/prs.html
Xatrix http://www.xatrix.org/
Security Forums http://www.security-forums.com/
Hack in the Box http://www.hackinthebox.org
Camelot Newsletters and Library  http://www.camelot.com/newsletter.asp?PageID=69
Cipher Newsletter  http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/
Computer Incident Advisory Capability (CIAC) Notes  http://ciac.llnl.gov/cgi-bin/cnotes
Computer Security News Daily  http://www.MountainWave.com
Internet Security Newsletter   http://www.securecomputing.com/U_New_ISN.html
Internet Security Review  http://www.isr.net/index1.html
Hacker  Quarterly http://www.2600.com
   
USEFUL PRODUCTS                                                                                    Back to Main/Home Page
Technorati online forum search engine http://www.technorati.com
Dogpile Search Engine http://www.dogpile.com
Google Search Engine http://www.google.coom
Babelfish Machine Translation http://babelfish.altavista.com
All nettools http://www.all-nettools.com/tools4.htm
Proxify  https://proxify.com/
CGIProxy 2.0.1 http://www.jmarshall.com/tools/cgiproxy/
eventlongscan http://www.eventlogscan.com/
Eunet http://home.eunet.no/~pnordahl/ntpasswd/bootdisk.html
Free Translation.com http://Freetranslation.com
   
Security Software  
   
Public Domain Security Software by Category  
Authentication and Encryption Software   http://www.alw.nih.gov/Security/prog-auth.html
Firewall Software /Security/prog-firewall.html  http://www.alw.nih.gov/Security/prog-firewall.html
Network and Network Monitoring Software   http://www.alw.nih.gov/Security/prog-network.html
System Enhancements Software /  http://www.alw.nih.govSecurity/prog-enhance.html
System Monitoring Software / http://www.alw.nih.govSecurity/prog-monitor.html
   
Public Domain Security Software  
Abacus Sentry  http://www.psionic.com/abacus/abacus_sentry.html
AIDE  http://www.cs.tut.fi/~rammer/aide.html
Anonftpd  ftp://koobera.math.uic.edu/pub/software
Additional Info: anonftd  ftp://koobera.math.uic.edu/www/anonftpd.html
Argus  ftp.andrew.cmu.edu/pub/argus
Arpwatch  ftp://ftp.ee.lbl.gov/
COPS (Computer Oracle and Password System)  ftp://ftp.cerias.purdue.edu/pub/tools/unix/scanners/cops
Courtney  ftp://ciac.llnl.gov/pub/ciac/sectools/unix
  http://www.alw.nih.gov/Security/CIAC-Notes/CIAC-Notes-08.html
Crack lib  ftp://ftp.cerias.purdue.edu/pub/tools/unix/libs/cracklib/
Deslogin  ftp://ftp.uu.net/pub/security/des/
Dig  ftp://venera.isi.edu/pub/
Drawbridge  ftp://net.tamu.edu/pub/security/TAMU/
Fcheck  http://sites.netscape.net/fcheck
Fping  ftp://ftp.stanford.edu/pub/packages/fping/
Icmpinfo  ftp://hplyot.obspm.fr/net/
Additional Info: icmpinfo man page  http://hplyot.obspm.fr/~dl/icmpinfo.html
Iss  ftp://ftp.cerias.purdue.edu/pub/tools/unix/scanners/iss/
Additional Info: CERT Advisory 93:14.Internet.Security.Scanner  http://www.cert.org/advisories/CA-1993-14.html
IPACL  ftp://ftp.porcupine.org/pub/security/
Jetmon  http://jetmon.uoregon.edu/
Kerberos  http://web.mit.edu/network/kerberos-form.html
Additional Info: Kerberos: The Network Authentication Protocol  http://web.mit.edu/kerberos/www/
Klaxon  ftp://ftp.eng.auburn.edu/pub/doug/
L6  ftp://ftp.pgci.ca/pub/l6
Additional Info: L6 http://www.pgci.ca/l6.html
Lcrzo  http://www.laurentconstantin.com/us/lcrzo/lcrzo/
Lcrzoex  http://www.laurentconstantin.com/us/lcrzo/lcrzoex/
Logdaemon  ftp.porcupine.orgftp://ftp.porcupine.org/pub/security/
Additional Info: Wietse's tools and papers  ftp://ftp.porcupine.org/pub/security/index.html
Logsurfer  ftp.cert.dfn.deftp://ftp.cert.dfn.de/pub/tools/audit/logsurfer/
Additional Info: Lo gsurfer Homepage  http://www.cert.dfn.de/eng/team/wl/logsurf/
Lsof  ftp://vic.cc.purdue.edu/pub/tools/unix/lsof
Mangle  ftp://ftp.informatik.uni-erlangen.de/pub/utilities/pwtest/
Additional Info: Readme file for Mangle ftp://ftp.informatik.uni-erlangen.de/pub/utilities/pwtest/README.mangle
Mason  http://www.pobox.com/~wstearns/mason/
Merlin  ftp://ciac.llnl.gov/pub/ciac/sectools/unix/merlin/merlin.tar.gz
Additional Info: Merlin Information  http://ciac.llnl.gov/ciac/ToolsMerlin.html
MD5  ftp://rsa.com/pub/
Additional Info: RFC 1544  http://www.rsa.com
MIME Object Security Services (MOSS)  ftp://ftp.tis.com/pub/MOSS
Additional Info: MOSS FAQ ftp://ftp.tis.com/pub/MOSS/FAQ
The Nessus Project  http://www.nessus.org/
Netlog  ftp://net.tamu.edu/pub/security/TAMU/
Network Security Scanner (NSS)  ftp://jhunix.hcf.jhu.edu/pub/nss/
NFSWatch  ftp://ftp.cerias.purdue.edu/pub/tools/unix/nfswatch/
Nmap  http://www.insecure.org/nmap/index.html
Nnap for NT Download  http://www.eeye.com/html/Databases/Software/nmapnt.html
Npasswd  ftp://ftp.cc.utexas.edu/pub/npasswd/
Additional Info: Information about npasswd  http://uts.cc.utexas.edu/~clyde/npasswd.html
OPIE  ftp://ftp.nrl.navy.mil/pub/security/opie/
Osh  ftp://ftp.c3.lanl.gov/pub/mcn/
Additional Info: The Operator Shell  http://www.c3.lanl.gov/~mcn/osh.html
Passwd+  ftp://ftp.dartmouth.edu/pub/security/
PGP  ftp://www.eff.org/pub/Net_info/Tools/Crypto
Additional Info: Cryptography, PGP, and Your Privacy  http://world.std.com/~franl/crypto.html
Pidentd  ftp://ftp.lysator.liu.se/pub/ident/servers
PingLogger  http://www.students.uiuc.edu/~jwthomp/code
Portmapper  ftp.porcupine.orgftp://ftp.porcupine.org/pub/security/
RIPEM  ftp://ripem.msu.edu/pub/crypt/GETTING_ACCESS
Additional Info: Information about RIPEM  http://www.cs.indiana.edu/ripem/dir.html
Rpcbind  ftp://ftp.porcupine.org/pub/security/
Rscan  ftp://ftp.vis.colostate.edu/pub/rscan/
Additional Info: Rscan: Heterogeneous Network Interrogation  http://www.vis.colostate.edu/rscan
SAINT  ftp://ftp.cerias.purdue.edu/pub/tools/unix/scanners/saint/
SARA  http://www-arc.com/sara/
SATAN  ftp://ftp.cerias.purdue.edu/pub/\tools/unix/scanners/satan/
Additional Info: Cert Advisory CA-95:06.satan  http://www.cert.org/advisories/CA-1995-06.html
Scan-Detector  ftp://ftp.cerias.purdue.edu/pub/tools/unix/logutils/scan-detector/
Additional Info: COAST Projects' Tools  http://www.cs.purdue.edu/coast/coast-tools.html
Sendmail  ftp://ftp.cs.berkeley.edu/ucb/sendmail
Sendmail Wrapper  ftp://ftp.auscert.org.au/pub/auscert/tools
SENSS  http://www.sun.com/software/communitysource/senss
Shadow  ftp://ftp.cs.widener.edu/pub/src/adm
Simple Socksd  http://www.leverage.com/users/tlod/ssockd.html
Additional Info: Simple SOCKS Daemon  http://waynesworld.ucsd.edu/~tlod/ssockd/ssockd.html
SKey  ftp://ftp.cerias.purdue.edu/pub/tools/unix/netutils/skey/
Simple Key-Management For Internet Protocols (SKIP)  http://skip.incog.com/form.html
Additional Info: SKIP Information http://skip.incog.com/
Siphon  http://www.subterrain.net/projects/siphon/
Smrsh  ftp://ftp.nec.com/pub/security/smrsh
Snort http://www.snort.org
Socks  ftp://ftp.nec.com/pub/security
Additional Info: Welcome to SOCKS   http://www.socks.nec.com/
SSH  ftp://ftp.cs.hut.fi/pub/ssh
Additional Info: Ssh (Secure Shell) Home Page  http://www.cs.hut.fi/ssh
STEL  ftp://idea.sec.dsi.unimi.it/cert-it/
Strobe  ftp://suburbia.apana.org.au/pub/
Sudo  ftp://ftp.cs.colorado.edu/pub/sysadmin/utilities
Additional Info: Sudo - a utility to allow restricted root access   http://www.cs.colorado.edu/~millert/sudo/
Swatch  ftp://ftp.stanford.edu/general/security-tools/swatch
Syn  ftp://ftp.pgci.ca/pub/syn/
Additional Info: Syn   http://www.pgci.ca/syn.html
TCP Wrapper  ftp://ftp.porcupine.org/pub/security/
Additional Info: TCP Wrapper   ftp://ftp.porcupine.org/pub/security/tcp_wrapper.txt.Z
Tcpdump  ftp://ftp.ee.lbl.gov/
Tcpr  ftp://ftp.alantec.com/pub/tcpr/
Tiger  ftp://net.tamu.edu/pub/security/TAMU/
Traceroute  ftp://ftp.psc.edu/pub/net_tools/
   
Tripwire  ftp://ftp.cerias.purdue.edu
Additional Info: Tripwire   ftp://ftp.cerias.purdue.edu/pub/tools/unix/ids/tripwire/
TTY-Watcher  ftp.cerias.purdue.edu
Wu-ftpd  wuarchive.wustl.edu
Xinetd  qiclab.scn.rain.com
Xp-BETA  ftp.mri.co.jp
YPX  ftp.uu.net
   
SUBSCRIPTION SERVICES                                                                                    Back to Main/Home Page
IATAC NEWS LETTER http://iac.dtic.mil/iatac
Microsoft Windows Security Bulletin http://www.microsoft.com/technet/security/bulletin/notify.mspx
Sophos Alert System Tosubscribetothelist,sendanemailto

notification-subscribe@lists.sophos.com

orvisithttp://www.sophos.com/virusinfo/notifications/
Full-Disclosure digest http://lists.netsys.com/mailman/listinfo/full-disclosure
morning wood http://exploitlabs.com/menu.html
   
   
FOCUS ON BROWSER SECURITY                                                                                    Back to Main/Home Page
People   
Liu Die Yu http://www.safecenter.net/UMBRELLAWEBV4/DirSvc/index.html
Jelmer http://62.131.86.111/
Georgi Guninski http://www.guninski.com/
http-eqiv http://www.malware.com/
   
PENETRATION TESTING                                                                                    Back to Main/Home Page
Hammer of the gods http://ettercap
Netbios attacks using samba  http://www.sorgonet.com/security/windows-shared-resources/
Netbios attacks using samba  http://www.hackinthebox.org/print.php?sid=5719
Secfr http://secfr.nerim.net/docs/fingerprint/en/ttl_default.html
Enumeration http://home.ubalt.edu/abento/753/enumeration/enumerationtools.html
Ettercap http://ettercap.sourceforge.net/
Excoll http://ers.pp.ru/excoll/
Rosiello http://www.rosiello.org/en/index.html
Sql injection http://www.sitepoint.com/article/sql-injection-attacks-safe
Rootexploit http://rootexploit.net/docs/dictionaries/
Session hijack http://staff.washington.edu/dittrich/talks/agora/script.html
Skopesix http://www.skopesix.com/
Webhack http://www.web-hack.ru/exploit/
lcamtuf http://lcamtuf.coredump.cx/p0f.shtml
Wordlist ftp://ftp.ox.ac.uk/pub/wordlists/
   
SECURITY TRAINING COMPANIES                                                                                    Back to Main/Home Page
Dave Aitel http://www.immunitysec.com/news-latest.shtml
Foundstone www.foundstone.com
Hacker Degree http://www.hackerdegree.com/?source=adwords
   
SHELL SCRIPTING AND PROGRAMMING  
Bash shell  http://www.tldp.org/LDP/abs/html/
Bash shell  http://www.arachnoid.com/linux/shell_programming.html
Bash shell  http://steve-parker.org/sh/loops.shtml
C basics http://www.haxworx.com/texts/c_documentation.html
C programming XOR-Encryption http://www.cprogramming.com/tutorial/xor.html
Buffer overflow  http://www.shellcode.com.ar/docz/bof/mixter-smash.txt
XML  http://64.26.23.218/gpage.html
   
   
Advisories from Independent Groups                                                                                    Back to Main/Home Page
   
8LGM Advisories http://www.alw.nih.gov/Security/8lgm.html
AUSCERT Advisories http://www.auscert.org.au/Information/advisories.html
Bugtraq Archives  http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html
CIAC Bulletins http://ciac.llnl.gov/cgi-bin/index/bulletins/
DFN-CERT http://www.cert.dfn.de/eng/
(@) Stake Advisories http://www.atstake.com/research/advisories/
Rootshell http://www.rootshell.com/
Secure Networks, Inc. (SNI) Advisories  http://www.secnet.com/advisories/
VulnWatch - Vulnerability Disclosure List http:///  http://www.vulnwatch.org/
   
Advisories from Vendors  
   
Microsoft Security Advisor   http://www.microsoft.com/security/
OpenBSD Security Views  http://www.openbsd.org/security.html
Silicon Graphics Security Advisories   http://www.sgi.com/Support/security/advisories.html
   
   
   
   
Specialized Topics  
   
Java   
Java Security   http://swissnet.ai.mit.edu/~jbank/javapaper/javapaper.html
Java Security: From HotJava to Netscape and Beyond   http://www.cs.princeton.edu/sip/pub/secure96.html
Low Level Security in Java   http://java.sun.com/sfaq/verifier.html
Security in Java   http://java.sun.com/whitePaper/java-whitepaper-8.html
   
Network   
Home PC Firewall Guide for Internet Security   http://www.FireWallGuide.Com
Internet Spoofing Reference http:// http://www.articsoft.com/web_spoofing.htm
Security in a Public World: A Survey   http://www.stanford.edu/group/DCE/Gaurav/sec_doc.html
Things that Go Bump in the Net http://www.research.ibm.com/massdist/bump.html
   
PGP   
PGP: a Nutshell Overview  (PDF)  http://www.jjgb.com/public_files/pgpnut.pdf
PGP User's Guide Volume 1  (PDF)  http://www.jjgb.com/public_files/pgpvol1.pdf
PGP User's Guide Volume 2  (PDF)  http://www.jjgb.com/public_files/pgpvol2.pdf
   
Kerberos   
Kerberos: Authentication for computer networks  http://nii.isi.edu/gost-group/products/kerberos/
Kerberos Information and Help by Lenny Miceli of SUNY at Buffalo  http://ubvms.cc.buffalo.edu/~tkslen/kerberos.html
Kerberos: The Network Authentication Protocol   http://web.mit.edu/kerberos/www/
Kerberos Reference Page l by Derrick Brashear of CMU  http://www.cs.cmu.edu/afs/andrew.cmu.edu/usr/shadow/www/kerberos.htm
State of Macintosh Kerberos Authentication   http://ccmc17.cc.ncsu.edu/sma/sma.html
Troubleshooting and Configuring Kerberos V5 Client Support  in Cisco IOS Router Configuration  http://www.cisco.com/warp/public/106/kerb_pt1.html
   
Unix   
An Architectural Overview of Unix Network Security http://www.alw.nih.gov/Security/Docs/network-security.html
How to improve Security on SunOS 4.1.3 ftp://ftp.hawaii.edu/pub/security/doc/
Hardening Solaris. This article presents a concise step-by-step approach to securely installing Solaris for use in a firewall DMZ. l  http://securityportal.com/direct.cgi?/coverstory19991025.htm
Improving the Security of Your Site by Breaking Into it   http://www.alw.nih.gov/Security/Docs/admin-guide-to-cracking.101.html
Securing X Windows   http://ciac.llnl.gov/ciac/documents/ciac2316.html
   
Windows NT   
The Hardening of Microsoft Windows NT   http://pw2.netcom.com/~honeyluv/HardNT40rev1.pdf
Windows NT Security Information   http://www.microsoft.com/security/products/windowsnt.asp.htm
Understanding Virus Behavior in the Windows NT Environment   http://www.symantec.com/avcenter/reference/vbnt.html
Windows NT Security l  http://world.std.com/~jimf/papers/nt-security/nt-security.htm
Windows NT Security Issues   http://www.somarsoft.com/security.htm
   
Netsurfer Focus  http://www.netsurf.com/nsf/
Secure News  http://www.isecure.com/newslet.htm
SecurityTracker.com   http://securitytracker.com/
   
Steganography   
Steganography   http://www.thur.de/ulf/stegano/
Steganography by Neil F. Johnson  http://http://www.jjtc.com/stegdoc
   
Viruses   
Security (Computer Technology)  http://www.einet.net/galaxy/Engineering-and-Technology/Computer-Technology/Security.html
Hideaway.Net - Anti-Virus Links http://www.hideaway.net/Anti-Virus/anti-virus.html   
ICSA Labs Anti-Virus site   http://www.icsalabs.com/html/communities/antivirus/index.shtml
Internet Hoaxes   http://ciac.llnl.gov/ciac/CIACHoaxes.html
ITtoolbox Security   http://security.ittoolbox.com/
Macintosh Virus Information   http://wwwhost.ots.utexas.edu/mac/pub-mac-virus.html
Symantec Security Response   http://www.sarc.com
Virus Bulletin   http://www.virusbtn.com/
   
World Wide Web (WWW)   
Netscape: On Security  http://home.netscape.com/info/security-doc.html
The World Wide Web Consortium http://www.w3c.org/
Writing Secure CGI Scripts   http://hoohoo.ncsa.uiuc.edu/cgi/security.html
WWW Security   http://www-ns.rutgers.edu/www-security/index.html
   
Miscellaneous   
ITtoolbox Security  http://security.ittoolbox.com/
Security on the Net  by Law Journal Extra!  http://www.ljextra.com/securitynet
Hideaway.Net - Security Links http://www.hideaway.net/Server_Security/Library/library.html
securitypointer.com - Computer Security Privacy and Tools http://www.securitypointer.com   
SecuritySearch.Net - The Internet security resource   http://www.securitysearch.net/
   
   
Computer Security Organizations                                                                                    Back to Main/Home Page
   
American Society for Industrial Security   http://www.securitymanagement.com/asismore.html
Canadian Society for Industrial Security   http://www.csis-scsi.org
   
Communications Security Establishment  http://www.cse.dnd.ca/
Computer Security Institute http://www.gocsi.com/   
   
Electronic Frontier Foundation   http://www.eff.org/
Forum of Incident Response and Security Teams (FIRST)   http://www.first.org/
FIRST Member Security Teams   http://www.first.org/team-info/www.html
High-Tech Crime Network   http://www.htcn.org
   
Information Systems Security Association (ISSA)   http://www.issa-intl.org
The Institute Of Information Security - INSTIS   http://www.instis.com
International Association for Cryptologic Research   http://www.swcp.com/~iacr/
ICSA Labs   http://www.icsalabs.com/
Italian Computer Antivirus Research Organization   http://www-iwi.unisg.ch/~sambucci/icaro/index.html
National Security Institute   http://nsi.org/
SANS Institute   http://www.sans.org/
The USENIX Association   http://www.usenix.org/
   
 USENET Computer Security NewsGroups                                                                                    Back to Main/Home Page
   
alt.disasters.planning news:alt.disasters.planning  news:alt.disasters.planning
alt.hackers   news:alt.hackers
alt.security   news:alt.security
alt.security.alarms y  news:alt.security
alt.security.keydist   news:alt.security.keydist
alt.security.pgp   news:alt.security.pgp
alt.security.ripem   news:alt.security.ripem
alt.security.tscm   news:alt.security.tscm
comp.lang.java.security   news:comp.lang.java.security
comp.os.ms-windows.nt.admin.security   news:comp.os.ms-windows.nt.admin.security
comp.os.netware.security   news:comp.os.netware.security
comp.protocols.kerberos   news:comp.protocols.kerberos
comp.risks   news:comp.risks
comp.security.announce   news:comp.security.announce
comp.security.firewalls   news:comp.security.firewalls
comp.security.gss-api   news:comp.security.gss-api
comp.security.misc   news:comp.security.misc
comp.security.pgp   news:comp.security.pgp
comp.security.pgp.announce   news:comp.security.pgp.announce
comp.security.pgp.discuss   news:comp.security.pgp.discuss
comp.security.pgp.resources   news:comp.security.pgp.resources
comp.security.pgp.tech   news:comp.security.pgp.tech
comp.security.unix   news:comp.security.unix
comp.virus   news:comp.virus
info.firewalls-digest t  news:info.firewalls-diges
misc.security   news:misc.security
sci.crypt   news:sci.crypt
sci.crypt.research   news:sci.crypt.research
   
   
   
NEW                                                                                    Back to Main/Home Page
   
The Center for Education and Research in Information Assurance and Security (CERIAS) http://www.cs.purdue.edu/coast/coast.html
SNP Security New Portal http://www.securitynewsportal.com/index.shtml
Security Tracker http://www.securitytracker.com/
  http://www.theregister.co.uk/
  http://www.infosecnews.com/home/index.cfm
Secunia Graphical Advisories page http://secunia.com/
  http://www.securityfocus.com/
  http://www.zone-h.org/
  http://www.viruslist.com/en/weblog
  http://www.f-secure.com/weblog/
  http://securitywizardry.com/radar.htm
  http://www.internettrafficreport.com/main.htm
  http://www.internetpulse.net/
  http://www.us-cert.gov/current/current_activity.html
  http://www.security-forums.com/
   
Public Cooperative Vulnerability Database https://cirdb.cerias.purdue.edu/coopvdb/public/pub_search.php
X-force DataBase (ISS) http://xforce.iss.net/xforce/search.php
  http://www.auscert.org.au/
Hideaway.net http://www.hideaway.net/home/public_html/index.php
United States Computer Security Emergency Readiness Team. (DHS) http://www.us-cert.gov/current/current_activity.html
United States Computer Security Emergency Readiness Team. (DHS) Resources Page http://www.us-cert.gov/resources.html
United States Computer Security Emergency Readiness Team. (DHS) Resources Page http://www.us-cert.gov/federal/
Dartmouth College ISTS http://www.ists.dartmouth.edu/library.php
The Information Warfare Site (UK mailing list) http://www.iwar.org.uk/mailman/listinfo/infocon/
Attrition - / Defaced Commentary Mail List Archive http://www.attrition.org/security/commentary/
   
Safemode  - inactive defacement archive http://www.safemode.org/
   
Zone-H  - The Internet Thermometer - Defacement Archive and IT Security http://www.zone-h.org/en/defacements
   
Links for Security Managers - HERE  

To Subscribe to Security_Manager_Info:

http://groups.yahoo.com/group/S2_online/  

We all have knowledge on a part of this business. If we share, we all look smart! This is done in conjunction with our list server Security_Manager_Info. Membership is open to all .mil and .gov addresses.    
Google
Search WWW Search securitymanagerinfo.org Search s2online.org Search chinapost1.org Search storybasket.com
Back to Main/Home Page  

 
Security_Manager_Info  is an email list server for qualified security managers to help other new security managers. This is shared brain power where we can ask for assistance and leverage the the combined experience of experienced Security Mgr · Click here for Security Managers Info Source Email List Server

   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   

      Hit Counter :::::Send Updates and new links!:: webmaster                 Back to Main/Home Page

Supported by:     Lint Center
for National Security Studies, Inc

© 1993-2007 Lint Center for National Security Studies, Inc