*
DISCLAIMER * Use this information at your own risk. I will NOT assume ANY
responsibility for the use, misuse, or abuse, of the information provided
herein. The following information is provided for educational purposes ONLY. The
information is NOT to be used for illegal purposes.
The
CERT Advisory Mailing List
CERT/CC Vulnerability
Notes
CERT Technical Tips
SecurityFocus.com
Incidents
Shields Up! Port
Scanning
Packet Storm
Guide
To Securing Intranet And Extranet Servers
Automated Crime
The Net Abuse FAQ
Internet
Security Professional Reference
Sniffing (network
wiretap, sniffer) FAQ
Network Scanning Techniques
The
IT Security Cookbook
How to Handle and Identify
Network Probes
Crackers and Commercial
Vulnerability Scanners
Simulating Cyber
Attacks, Defenses, and Consequences
A Preliminary
Classification Scheme for Information System Threats, Attacks, and Defenses
Managing
Network Security: Simulating Network Security
Managing Network Security:
Watching the World
Managing Network Security:
Attack and Defense Strategies
Maintaining Security.
Security: Secure Internet
Data Transmission.
Security: Access Control.
Security: Keeping Hackers
Out.
Network design -
security.
Handbook of Information Security
Management
Guide For Protecting Local
Area Networks And Wide Area Networks (LANs/WANs)
Computer security
Introduction to Denial of
Service
The Social Organization Of The
Computer Undergroung
Excerpts from The
Encyclopedia of Networking
Understanding Concepts In
Enterprise Network Security And Risk Management
The Inevitability of Failure:
The Flawed Assumption of Security in Modern Computing Environments
Tracing an e-mail message
NOT the Orange Book
Improving
Computer Security through Network Design
Email Bombing
and Spamming
ANATOMY OF A FRIENDLY HACK:
Testing The Security of Your Enterprise
INTERNET Security
How to protect from
Spoofed/Forged Email
How to Send Fake Mail Using SMTP
Servers
Site Security Handbook
The Art of Port Scanning
Network Management Protocol
Insecurity: SNMPv1
An analysis of TCP/IP NetBIOS
file-sharing protocols
Types of Ehernet cards
Format description of the
LANAlyzer output file
The
Moron's Guide to Kerberos, Version 1.2.2
Alladin
eSoftonline
- White papers
Authentication
and Encryption Software
White
Papers
Security
Search Whitepapers
Mixter
Security
Technotronic
w00w00.org
Attrition.org
Cyberbase7
Cipherwar
Help
Net Security
Packetstorm