Misc
Home Up Certifications Interests Photo Album Links Search 

 

 

Home Up

 

* DISCLAIMER * Use this information at your own risk. I  will NOT assume ANY responsibility for the use, misuse, or abuse, of the information provided herein. The following information is provided for educational purposes ONLY. The information is NOT to be used for illegal purposes. 

The CERT  Advisory Mailing List

CERT/CC Vulnerability Notes

CERT Technical Tips

SecurityFocus.com Incidents

Shields Up!  Port Scanning

Packet Storm

Guide To Securing Intranet And Extranet Servers 
Automated Crime 
The Net Abuse FAQ 

Internet Security Professional Reference 
Sniffing (network wiretap, sniffer) FAQ 
Network Scanning Techniques 

The IT Security Cookbook 
How to Handle and Identify Network Probes 
Crackers and Commercial Vulnerability Scanners 
Simulating Cyber Attacks, Defenses, and Consequences 
A Preliminary Classification Scheme for Information System Threats, Attacks, and Defenses 

Managing Network Security: Simulating Network Security 
Managing Network Security: Watching the World 
Managing Network Security: Attack and Defense Strategies 
Maintaining Security. 
Security: Secure Internet Data Transmission. 
Security: Access Control. 
Security: Keeping Hackers Out. 
Network design - security. 
Handbook of Information Security Management 
Guide For Protecting Local Area Networks And Wide Area Networks (LANs/WANs) 
Computer security 
Introduction to Denial of Service 
The Social Organization Of The Computer Undergroung 
Excerpts from The Encyclopedia of Networking 
Understanding Concepts In Enterprise Network Security And Risk Management 
The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments 
Tracing an e-mail message 
NOT the Orange Book 
Improving Computer Security through Network Design 
Email Bombing and Spamming 
ANATOMY OF A FRIENDLY HACK: Testing The Security of Your Enterprise 
INTERNET Security 
How to protect from Spoofed/Forged Email 
How to Send Fake Mail Using SMTP Servers 
Site Security Handbook 
The Art of Port Scanning 
Network Management Protocol Insecurity: SNMPv1
An analysis of TCP/IP NetBIOS file-sharing protocols 
Types of Ehernet cards 
Format description of the LANAlyzer output file 

The Moron's Guide to Kerberos, Version 1.2.2
 Alladin

eSoftonline - White papers

Authentication and Encryption Software

White Papers

Security Search Whitepapers

Mixter Security

Technotronic

w00w00.org

Attrition.org

Cyberbase7

Cipherwar

Help Net Security

Packetstorm

Go to top of page

This page was last updated on 12-Sep-2000 23:43.