Security and related Web bookmarks and URLs from Rob Slade
(maintained by Rob Slade)
Computers and Technology
specs and terms
- FOLDOC - Computing Dictionary
- Compaq Contura Aero Frequently Asked Questions
- What Is...every file format in the world - A through E
- BABEL: A Glossary of Computer Related Abbreviations and Acronyms
- Harddrive Specifications
- Hardware Specifications
- PC Webopaedia home page
- Tom's Hardware Guide Mass Storage: IDE Training Course, Part 1: A Detailed Look at the Basics and Technology -
Introduction
Computer Communications
Spam
- How to Complain About Spam, or, Put a Spammer in the Slammer
- Anti-Spam Provisions in Sendmail 8.8
-
- Anti-Spam Provisions in Microsoft Exchange Version 5.5
- MailGate NT SPAM Filter
- Get that spammer!
- Join the Fight Against Spam!
- Spam Chat.
- Spam tools
- SPAM-News.com - Providing daily news updates about Spam, UCE, UBE & Junk E-mail since 1996
- A Message for Spammers: Beware
- MAPS Realtime Blackhole List
- Spam Calculator
- TPROJJO: KASA: Members
- Yahoo! Computers and Internet:Communications and Networking:Electronic Mail:Junk
Email
- Web Interface to Whois
- ARIN: Whois
- carpeNet Traceroute
- The National Fraud Information Center
- TPROJJO: KASA: The Spam Busters
- emailabuse.org
- rfc2076 - Common Internet Message Headers
- SamSpade.org
- Abuse.net: Home Page
- ORBS
- ChooseYourMail
- Chain Letter Evolution
- 'Guinness Book of Records' Chain Letter - Urban Legends and Folklore
- Index of /~barnowl/chain_letter
- InformationWeek > Langa Letter > Has Spam Won? > July 9, 2001
- Welcome to CAUCE
- ChooseYourMail
- SamSpade.org
- Sam Spade
- Smart Whois - Whois Search - Internic + many country domains
- Allwhois.com - Search and Register any Domain Name in the World
- Abuse.net: Home Page
- Open Directory - Computers: Internet: Abuse
-
- RE: SPAM: SPAM and the Internet
- UXN Spam Combat
- Emailias.com
- SpamAssassin: Welcome to SpamAssassin
- Spam Laws
- G E E K T O O L S
- SpamAssassin: Welcome to SpamAssassin
- FAQ: Teergrubing against Spam
- Government Addresses for Reporting Spam
- You’ve Got Spam: How to "Can" Unwanted Email
- Bloomba
- MailWasher
- POPFile Home Page
- Why Am I Getting All This Spam?
- Silicon.com - 'Nigerian' money scam: What happens when you reply?
- SecuritySage - Login
- ARIN: WHOIS Database Search
- Query the APNIC Whois Database
-
- Tracing Emails
- MAPS - Stopping Spam at its Source
- SpamAssassin: Welcome to SpamAssassin
- Nuclear Elephant: DSPAM
- A Plan for Spam
- United States Secret Service: Advance Fee Fraud Advisory
- United States Secret Service
- Spam Laws
Computer Security
access control
- TCPA / Palladium FAQ
- PawSense helps you catproof your computer.
- Face Recognition Vendor Test 2002
- Rudimentary Treatise on the Construction of Locks
- Is It Just My Imagination?
- Biometric Consortium
- Role Based Access Control
- CAPTCHAs for authentication
Antivirus sites
Virus Encyclopedias
- Symantec Security Updates
- Trend Micro virus encyclopedia, worm, trojan, virus, macro
- Virus Encyclopedia
- F-Secure : Security Information Center
- Mac Virus: Home Page
- Encyclopedia
- McAfee.com - Virus Information Library
- Panda Software
- Sophos virus analyses
- Panda Software - Global Security Solutions
- Virus Encyclopedia [ VirusList.com® ]
- RAV Antivirus - Web Site
- F-Prot Antivirus for Windows, Linux, BSD, Exchange, AIX and DOS | F-Prot AVES - anti-spam and anti-virus e-mail filtering service |
- Guillermito et les virus informatiques
- Virus Test Center - University of Hamburg
- AntiVirus Software Database - AntiVirus Resources
Virus Hoaxes and false alerts
- Virus Hoaxes
- CIAC Internet Hoaxes
- Computer Virus Myths home page
- National Computer Security Association
- antivirus online: hype alerts!
- Data Fellows HOAX warnings page
- SARC - Virus Hoaxes
- The Hoaxkill service: Let's get rid of hoaxes now!
- HOAXBUSTERS Home Page
- Vmyths.com- Truth About Computer Virus Myths & Hoaxes
- Computer Virus Hoaxes
- Don't Spread that Hoax!
- Internet Hoaxes Email Rumors and Urban Legends - Current Netlore
- Computer Virus Hoaxes
- TruSecure Corporation is the worldwide leader in Internet Security Assurance.
- TruSecure Corporation is the worldwide leader in Internet Security Assurance.
- The Hoaxkill service: Let's get rid of hoaxes now!
- EFF "Hoaxes" Archive
- McAfee.com - Virus Information Library - Virus Hoaxes
- F-Secure : Security Information Center
- Symantec Security Updates - Hoax Page
- Carmel Anti Virus
- ChekWARE's Home Site
- Security Solutions: Virus Clinic
- Data Fellows World-Wide Web Server Main Index
- The SBABR Homepage (Europe 2nd mirror)
- Welcome To Dr Solomon's On-Line
- Welcome To Dr Solomon's On-Line
- EliaShim - Virus Center
- ThunderBYTE Home Page
- IBM antivirus online
- AVP Page by Central Command
- Welcome To McAfee
- Norman
- Sophos Home Page
- Stiller Research: Integrity Master Virus Protection / Data Integrity
- Symantec AntiVirus Research Center
- Trend AntiVirus Center, Antivirus Solutions, Antivirus News
- Henri Delger's VirusHelp Home Page
- Panda
- Virus Bulletin Home Page
- NCSA Anti-Virus Information
- Welcome to Leprechaun Software
- iRiS Software
- Frisk Software Home Page
- Command Software Virus Information
- ALWIL Software Home Page
- Disinfectant pub/mac/virus
- University of Tampere Virus Research Unit
- University of Michigan Virus Busters
- Thomas Jefferson University Computer Virus Information
- Penn State Anti-Virus Page
- OUCS Anti-virus Information
- UK Open University Antivirus Home Page
- The Scanner
- The Virus Encyclopedia
- Virus Research Unit
- Worms
- Chat rooms hit by Internet flu
- risc.ua.edu /pub/ibm-antivirus
- PC Virus Page
- What's NOT a Virus
- alt.comp.virus.pictures
- Vet Anti-Virus Software
- mIRC SCRIPT.INI Infosheet
- MAC VIRUS/TORJAN HORSE ALERT
- SARC - Virus Encyclopedia
- Doug Muth's Anti-Virus Help Page
- Directory of /pc/virus
- pub/mac/virus
- Virus Bulletin Home Page
- .Computer Virus Help Information by Henri Delger
- .Computer Virus Help Information by Henri Delger
- Mountain Ridge Dataworks Macintosh Consultants
- AVP Virus Encyclopedia
- Data Fellows Virus Information Centre
- The Virus Encyclopedia
- McAfee.com : Virus Information Center
- Trend Micro Anti-Virus Software for the Enterprise, Virus Info - Virus Encyclopedia
- SARC - Virus Encyclopedia
- antivirus online: virus descriptions
- Virus Descriptions
- Descriptions of Common Viruses
- The Joe Wells Virus Encyclopedia® - Full Listing
- Padgett's frame page
- Padgett's AntiVirus Page
- Cure of Computer Viruses
- McAfee.com World Virus Map
- Checkmark - Home Page
- IBM Research | Projects | Antivirus Research
- Mac Virus II
- www.jasons-toolbox.com
- The Deceptive Safety of RTF Files - Breaking Antivirus News [ Kaspersky™ AntiVirus (AVP)]
- Frisk Software International download
-
- Whitehats: Lion Internet Worm Analysis
- ALWIL Software Home Page
- Computer Knowledge Virus Tutorial
- A Warhol Worm: An Internet Plague in 15 Minutes!
- Viruses Revealed
- Homepage of Peter Szor
- Frisk Software International / Download / Getfpdosfree
- Are "Good" Viruses Still a Bad Idea?
- United States
Patent: 4,975,950
- United States
Patent: 5,121,345
- Parasitic Computing
- Writing Word Macro Viruses
- Index of /pub/cert/virus-l/archives
- AVG Anti-Virus System Main Page
- Osborne McGraw-Hill Virus Alert
- Robert Slade History: Contents
- Code of Conduct
- TruSecure Corporation is the worldwide leader in Internet Security Assurance.
- AVG Anti-Virus System Main Page
- ACM: Ubiquity - Crying Klez: Maybe the Sky IS Falling
- Newhouse B1
- AVI-EWS - Anti-Virus Information & Early Warning System
- AVIEN - Home of the Anti-Virus Information Exchange Network
- anti-worm throttling
- PestPatrol
- CIACTech02-004: Parasite Programs; Adware, Spyware, and Stealth Networks
- Directory of /anti-virus/free/updates
- F-Secure Welcomes You
- SpybotSD - Spybot - Search & Destroy by PepiMK Software
- Official website for DiamondCS TDS-3 - Trojan Defence Suite (TDS), leading anti-trojan system for Windows
- Download latest virus identity (IDE) files
- Download latest virus identity (IDE) files
- Stinger - Network Associates Inc.
- Kattoon: August 25, 2003
- NetWorm.org
- A 20-year plague | CNET News.com
-
- SecurityFocus HOME Infocus: Worm Propagation In Protected Networks
- Welcome to The Trojan Horses Research Mailing-List Home Page
- TH-Research FAQ
- AV-Test.org · Tests of Anti-Virus Software
- Download latest virus identity (IDE) files
- WormRadar
-
- The Final Virus: A Science-Fiction Story
- Virus Tutorial
- Welcome to Antivirus-Review.info
- ClamAV: Project News
- Welcome to the SOSDG - ClamAV For Windows
- Anti-Spyware Test (Guide)
App Dev
- malware.com
- BugNet Home Page
- ACM Classic: Reflections on Trusting Trust
- CIACTech02-004: Parasite Programs; Adware, Spyware, and Stealth Networks
- The Peon's Guide To Secure System Development
- Secure UNIX Programming FAQ
- Executing arbitrary commands without Active Scripting or ActiveX
- SSE-CMM Home Page
- CIACTech02-004: Parasite Programs; Adware, Spyware, and Stealth Networks
- Frequently Asked Questions about DRE Voting Systems
- SpybotSD - Spybot - Search & Destroy by PepiMK Software
- Official website for DiamondCS TDS-3 - Trojan Defence Suite (TDS), leading anti-trojan system for Windows
- Secure Coding: Principles & Practices
-
-
- anti-trojan, free antivirus downloads, remove trojan virus, free trojan horses remover, trojan horse virus remover, subseven, sub 7 trojan, hacking trojans,
trojan virus cleaners removers, sub7, trojan cleaner
v1.9d, about trojan horse viruses, sub7 troja
- Cassandra(TM) -- CERIAS
- Software Method HOWTO - Xbox-Linux
- WebGoat
Backups
- NovaStor - Backup, Encryption, AntiVirus and Data Interchange
- iomegazine(tm)
- Welcome To Seagate's SeaNET
- Exabyte Corporation Home Page
- Hewlett Packard: Tape Storage
- @Backup | Remote Backup & Virus Protection Services
- ATRIEVA: Safe and Easy Online Backup
- Backup & offsite data storage - SafeGuard Interactive Incorporated
- BackMagic Home Page
- NetPro NorthWest Win95 Registry Backup
- Welcome to Seagate Software
- PowerQuest Corporation
- FreeDrive: Free Internet Hard Drive
- UltraBac - Windows NT Backup and Disaster Recovery - BEI Corporation's Web Site.
- The Non Sequitur Homepage
- Mike Lin's Home Page
- Welcome to Backup4all site
bcp
blackhats
- 2600: The Hacker Quarterly
- Hack Canada - anything can be cracked when it's forty below
- the spartan horse - Test It
- Directory of /pub/ADM
- Cult of the Dead Cow Back Orifice Backdoor
- DigiCrime, Inc.
- EC-Council | 312-50
- EC-Council | Certified Ethical Hacker Certification
- Silicon.com - 'Nigerian' money scam: What happens when you reply?
encryption
- GNUPG - The GNU Privacy Guard
- National Cryptologic Museum
- CodedDrag
- Steganography & Digital Watermarking
- Voicecrypt Web Site
- Directory of /pub/crypto/pgp/pgp60
- Tiny IDEA Encryption Program
- PGP-Users Mailing List Home Page
- The International PGP Home Page
- NovaStor - Backup, Encryption, AntiVirus and Data Interchange
- Canadian Strategy
- Distributed Authentication in Kerberos Using Public Key Cryptography
- Niels Ferguson list of publications
- RSA Laboratories | Cryptography FAQ
- OutGuess - universal Steganography
- The Alice and Bob After Dinner Speech
- The Zimmerman Note
- SSL analysis from counterpane
- [SSL-Talk List FAQ] Secure Sockets Layer Discussion List FAQ v1.1.1
- [SSL-Talk List FAQ] Secure Sockets Layer Discussion List FAQ v1.1.1
- WEP weaknesses
- White Paper: hComments on "An Initial Security Analysis of the IEEE 802.1X Standard"
- WEP additional weaknesses
- Handbook of Applied Cryptography
-
- WW II Codes and Ciphers
- Handbook of Applied Cryptography
- WW II Codes and Ciphers
- Retrobeep - the computer museum at Bletchley Park
- BletchleyPark - Station X
- Why Johnny Can't Encrypt
- cryptographie militaire
- Cracking DES: Secrets of Encryption Research, Wiretap Politics, and Chip Design
- Polyalphabetic substitution
- Fred Cohen & Associates
- spammimic - hide a message in spam
-
- JavaScrypt: Browser-Based Cryptography Tools
- SourceForge.net: Project Info - WinPT - Windows Privacy Tools
- KerbCrack
- CrypTool - Homepage
- SNEAK: Snarkles.Net Encryption Assortment Kit
- WWII crypto machines
comseced
- Stay Safe Online | Home
- Consumer Information Security - Federal Trade Commission
- Presentations
- Awareness
- Talisker Computer Security Advice For The Home User
- MailFrontier Phishing IQ Test
- Posters for Security Awareness Training & Education
- archive of computer security presentations
- Microsoft Support WebCasts
- Cisco Seminar Series
Forensic programming
- Authorship analysis Kraul/Spaf
- Authorship Analysis: Identifying The Author of a Program - Krsul, Spafford (ResearchIndex)
- Andrew Gray's Software Metrics (Including Authorship Analysis) and Neural Network/Statistical Modelling
Page
- Index
- Last Fravia's mirror of Reverse code engineering
- Last Fravia's mirror of Reverse code engineering
- Documentation for disassembler writers
- Dave Dittrich
- LC Technology International, Inc. Home Page
- New Scientist
- IJDE
- Digital Forensic Links
- Digital Evidence: Standards and Principles, by SWGDE and IOCE (Forensic Science Communications, April 2000)
- Transform / DeCompilation
- Protools - Decompilers
- Decompilation of Binary Programs - dcc
- REC Decompiler Home Page
- Ralf Brown's Files
- Jon Kirwan: PC Assembly Programming/Where to Get PC Assembly Tools
- Last Fravia's mirror of Reverse code engineering
- Intel Architecture Software Developer's Manual, Volume 2: Instruction Set Reference Manual
- On-line Intel Documentation
- Re-engineering Scientific Credit in the Era of the Globalized information Economy
- CCIPS SEARCHING AND SEIZING COMPUTERS
- NASM-IDE, NasmEdit and S-Library homepage
- Computer Simulators
- A Beginner's Nasm Page
- NASM Manual
- Jeff Duntemann's Assembly Language Books and Links
- Softpanorama Assembler is not for Dummies Page
- Jon Kirwan: PC Assembly Programming/Where to Get PC Assembly Tools
- The UK Patent Office - About Us and Policies - Consultation Paper
-
- Responsible Use of Information Technology at BCIT
- Antiword: a free MS Word document reader
-
- Text Editor - HEX Editor - HTML Editor - Programmers Editor - UltraEdit
- Shellcoding for Linux and Windows Tutorial
- The Art of Disassembly
glossaries
- NETSYS.COM - Security Glossary
- Security Glossary | Security documentation
- Welcome to the MSDN Library
- PGP Security - Glossary
- RFC 2828
- Security Glossary of Terms
- Mitre Security Glossary
- Sun Security Glossary
- ISU Draft Comprehensive Information Assurance Dictionary
- Corporate Computer Consultants Ltd Information Security Jargon Buster at www.CCCL.net
- President's Commission - Critical Infrastructure Assurance Office Glossary
- ISU Security Publications
- ISU dictionary
- More glossaries online , 12/05/01
- National Information Systems Security (INFOSEC) Glossary
- Hacking Lexicon
- Hacking Lexicon
- <draft-shirey-security-glossary-00.txt> attached
- OASIS security glossary (pdf)
- BABEL: A Glossary of Computer Related Abbreviations and Acronyms
- security glossary by DigitalGuards
- Security Glossary - Lynn Wheeler
- Rob Slade's Security Glossary
- Rob Slade's Security Glossary
LIE
- email tampering - Suni Munshani v. Signal Lake Venture Fund II, LP, et al., Massachusetts Superior Court, Civil Action No. 00-5529 BLS
- RFC 2350 Expectations for Computer Security Incident Response
- Ethics and Information Technology
- Lawful Access – Consultation Document
- Home of the Digital Forensics Information Network
- Welcome To Joel A. Wuesthoff JD, CISSP
- Privacy & Human Rights 2002
- Privacy & Human Rights 2002
- Department of Justice Canada
- Prime Curios!: 48565...29443 (1401-digits)
- DeCSS, JILT 2002 (3): Guadamuz
- ID Theft: When Bad Things Happen To Your Good Name
- Centers for Medicare & Medicaid Services
- THE LEGAL FRAMEWORK
- The Frontiers of Privacy and Security: New Challenges for a New Century - 2003 FOIPP Conference
- GIAC: Global Information Assurance Certification - GIAC Code of Ethics
- Online Ethics Center: NSPE Case 92-6: Public Welfare -- Hazardous Waste
- C Y B E R C R I M E
-
- Tom's Hardware Guide Mass Storage: IDE Training Course, Part 1: A Detailed Look at the Basics and Technology -
Introduction
- EPIC Bill Track - 108th Congress Privacy and Cyber-Liberties Legislation
- Spam Laws
- Home Page - Privacy Commissioner of Canada
- Privacy Legislation - Privacy Commissioner of Canada
- The European Union Directive on Data Protection
- Zeichner Risk Analytics LLC
- International Association of Privacy Professionals - IAPP
- Microsoft TechNet
- Creating a Computer Security Incident Response Team: A Process for Getting Started
-
- FORENSICS.ORG
- SecurityFocus HOME Infocus: U.S. Information Security Law, Part 1
- Antiword: a free MS Word document reader
- catdoc and xls2csv - free MS-Office format readers
- FORENSICS.ORG
- GROKLAW
- Pew Internet and American Life Project
- IOCE - Guidelines for Best Practice in the Forensic Examination of Digital Technology
- NLECTC JustNet-Law Enforcement Links
- knackit.net :: every 0 makes a difference
- SourceForge.net: Project Info - Open Source Computer Forensics Manual
- Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations (July 2002)
- The Guide - Privacy and Security on your PC Part I
- Knoppix STD
- Office of the Information & Privacy Commissioner
- Rahmenlayout Schüler STM Homepage
- Cybercrime Law
- EUROPA - The European Union On-Line
- Privacy Commissioner of Canada / Commissaire à la protection de la vie privée du Canada
- OIPC
- IPC - Information & Privacy Commissioner of Ontario
- Office of the Information & Privacy Commissioner
- Putercops.org
- [strike out]
- Privacy International - Country Archives
- USA PATRIOT Act (H.R. 3162)
- Digital Forensic Research Workshop - Bringing together the digital forensics comminity [Home Page]
- SB 1386 Senate Bill - CHAPTERED
- Consequentialism - Wikipedia, the free encyclopedia
- Ethics - Wikipedia, the free encyclopedia
- ForensicsWeb :: Forensics Web - Technology investigation & forensics.
- ID Fraud Home Page
- Federal Trade Commission - Your National Resource for ID Theft
- The 2001 Daftas Longest Email Disclaimer | The Register
- Personal Information Protection and Electronic Documents Act
- Scientific Working Group on Digital Evidence
- United States Secret Service: Best Practices for Siezing Electronic Evidence
- Tracing Emails
- Childfind and Cybertip.ca/Cyberaide.ca Splash Page
- EU approved clauses for international data transfers
magazines
- INFORMATION SECURITY Free Subscription Form
- Index of /Cipher
- 2600: The Hacker Quarterly
- SC Magazine On-line
- JCS Home Page
- ACM: ACM Transactions on Information and System Security
- ICSA Information Security Magazine
- Ethics and Information Technology
- SECURITY Magazine
- ICSA Information Security Magazine
- Information security Digest
- Security News Portal - A Different Kind of News
- Security Pipeline
mailing lists
- Cipher - Newsletter of the IEEE CS TC on Security and Privacy
- PRIVACY Forum
- Security Mailing List Archives
- Bugtraq mailing list archives
- RISKS-LIST: RISKS-FORUM Digest
- Crypto-Gram Newsletter
- Cipher: The Newsletter of the IEEE Computer Society Technical Committee on Security and Privacy
- Internet Security Systems, Inc. : X-Force
- NTBugtraq - NTBugtraq Home
- Information Security Zeitgeist
- Full-Disclosure Information
- RISKS Info Page
NT security
- Windows NT Frequently Asked Questions (FAQ)
- NT Security - Frequently Asked Questions
- NTBugTraq - NTBugtraq Home
- NT Exploit(ed) Page
- NT Configuration Guide for the Paranoid
- NSA/Windows NT Security Guidelines
- Nessus for WindowsNT
- Nomad Mobile Research Centre - NT Files
- ISS – Internet Security Systems
- Windows NT Killer Utilities
- Russ Cooper's NT Fixes Status Page
- Offline NT-password-utility
- Secure Windows NT Installation and Configuration Guide
- Green Bullet Home at MIKO s.c.
- Utilities for Windows NT
- eEye™ Digital Security
- NT Security - Frequently Asked Questions
- NT Security - Frequently Asked Questions
- Next-Generation Win32 exploits: fundamental API flaws
- Scott Schnoll's Internet Explorer Security Center
- Microsoft Baseline Security Analyzer
- Windows XP Security Checklist from LabMice.net
- IEBUG News
- BasicSec.org | Security and Privacy for Regular Folks
ops
- Microsoft Baseline Security Analyzer
- BasicSec.org | Security and Privacy for Regular Folks
Physical security
- SECURITY Magazine
- Deborah Quilter's RSI Web Site
Fire
- Talking Sense About Foam
- Howstuffworks "How Fire Extinguishers Work"
- Fire Safety and Fire Extinguishers in a Chemistry Laboratory
- Handbook of Forensic Services: Evidence Examinations--Crime Scene Search (1999)
- RCMP - TSB
- FEMA: Are You Ready? A Guide to Citizen Preparedness
- Master-Keyed Lock Vulnerability
- Rudimentary Treatise on the Construction of Locks
- Master-Keyed Lock Vulnerability
- FM 3-19.30 Table of Contents
-
-
- Howstuffworks "How Lock Picking Works"
- IntelCenter
- FM 3-19.30 Table of Contents
- The Art of War
-
- 9-11 Commission Final Report
Security agencies
- (ISC)2 Reference Materials
- SecurityFocus
- CERT Coordination Center
- SANS Institute Online - Home Page
- Cissp.com The web portal for the certified information systems security professionals
- CISSPworld (www.cisspworld.com)
- CISSPworld CA (www.ca.cisspworld.com)
- About the CERT® Coordination Center
- C S R C - Computer Security Resource Center
- CIPS Vancouver Security Special Interest Group
- ICSA
- COAST
- The United States Navy INFOSEC Home Page
- Office of the Director of Central Intelligence
- Central Intelligence Agency
- CIA Directorate of Intelligence Homepage
- DS&T Main Page
- The Intelligence Community
- Center for the Study of Intelligence
- Central Intelligence Agency - Electronic Document Release Center
- DIA HOME PAGE
- National Security Agency
- U.S. Navy: Welcome Aboard
- Access Denied
- Air Force Command Section
- MarineLINK
- WELCOME TO NIMA's PUBLIC HOME PAGE
- National Reconnaissance Office
- Federal Bureau of Investigation Home Page
- U.S. Department of Energy Home Page
- Canadian Security Intelligence Service -- Service canadien du renseignement de sécurité
- ITS Home
- TECHNICAL SECURITY BRANCH - Homepage
- Encyclopedia
- National Infrastructure Protection Center (NIPC) - CyberNotes
- CCITS Home Page - Canadian Centre for Information Technology Security
- National Infrastructure Protection Center (NIPC) - Home Page
-
- IATRP Home Page
- CASPR Home-Page Commonly Accepted Security Practices & Recommendations
- SCI: InfoSec Certification FAQ
- Government Security Policy
- Government Security Policy
- Security Policy - Policies and Publications
- Information Technology Security Standard
- OCIPEP - Public Communications
- OCIPEP - Critical Infrastructure Protection
- IFCC 2001 fraud report
- Science and Technology - Information Security Committee
- FTC Issues Financial Information Safeguards Rule
- CSORT - Chief Security Officer's Round Table
- Draft Publications
- IJDE
- NCIX - One Evil
- Network Security from the Pros
- Science and Technology - Information Security Committee
- 53 Questions for Developing the National Strategy to Secure Cyberspace
- CIPS Vancouver Security Special Interest Group
- www.phrack.org
- Welcome to InfraGard
- National Crime Squad, Combating Serious and Organised Crime
- Electronic Crimes Task Force Website
- NIST Computer Security Special Publications
- Draft National Strategy to Secure Cyberspace
- Information Security Forum
- UNITED STATES INTELLIGENCE COMMUNITY
- RCMP - TSB
- Internet Fraud Complaint Center
- C4I.org - Computer Security and Intelligence
- R.U.N.S.A.F.E.
- Computer Security
- Welcome to the Society for the Policing of Cyberspace (POLCYB)
- Community Ed in security
- Computer Security
- R a i n F o r e s t P u p p y
- IASE Public Home Page
- CompTIA Security+ Certification - Welcome to Security+
- About CSE
- Manuals
- RCMP TSSIT
- (ISC)2 Canada public CISSP directory
- US Cyberspace security strategy
- 2003 FISSEA Conference - homepage
- Home Page - Privacy Commissioner of Canada
- Pew Internet and American Life Project
- Security Tools
- Security Scene Errata - Charlatans
- MI5 > Home
- ISSA - Vancouver
- Federal Trade Commission - Consumer Information Security
- Organization for Internet Safety
- ISECOM - Institute for Security and Open Methodologies
- OpenCSOProject.org: The Ultimate Resource for Aspiring Security Professionals
- ISSPCS: The International Systems Security Professional Certification Scheme
- Treachery Unlimited: A Computer & Network Security Information Site
- Office of the National Counterintelligence Executive-What's New Section
- NIST Computer Security: Federal Information Processing Standards (FIPS) page
- United States Secret Service
- How many CISSPs are there?
- Navy Info Assurance Tips
sec arch
- The ISO17799 Security Newsletter
- In-Depth Review of the Bell-Lapadula Model
- TCPA / Palladium FAQ
- Common Criteria Project -- HomePage
- Multics Home page
- NIAP - NATIONAL INFORMATION ASSURANCE PARTNERSHIP ®
- Common Criteria, Parts 1-3
- The Common Criteria Home Page
-
- CC - Common Criteria for Information Technology Security Evaluation
sec man
- The ISO17799 Security Newsletter
- GASSP Home Page
- Common Criteria Project -- HomePage
- GASSP Version 2
- CobiT: Download the Executive Summary, Framework, and Control Objectives
- NIST Computer Security Special Publications
- Special Pub 800-12 -- An Introduction to Computer Security: The NIST Handbook
- The CISSP and SSCP Open Study Guides Web site
- Common Criteria, Parts 1-3
- SANS Institute - Security Policy Project
- Privacy International - Stupid Security
- Rudimentary Treatise on the Construction of Locks
- On the discussion of security vulnerabilities
- CobiT: Download the Executive Summary, Framework, and Control Objectives
- ISECOM Open Source Security Testing Methodology Manual
- Handbook AS-805, Information Security
- CobiT: Download the Executive Summary, Framework, and Control Objectives
- rfc1244 - Site Security Handbook
- Simtel - DownLoad: b4all130.zip
- Risk Support index
-
-
- NRIC - Network Reliability & Interoperability Council
- NRIC Best Practices
- Internal Audit: Resources for Internal Auditors
- Threat and Risk Assessment Working Guide (ITSG-04)
- Common Criteria - Developers - Official CC/CEM versions
- fault-tree.net Selected Readings on Fault Tree and related analytical methods.
- COSO
-
telecom
- COTSE-IP Tools
- net stumbler dot com
- Commonly Probed Ports
- alt.spam FAQ or "Figuring out fake E-Mail & Posts". Rev 19991122
- Media Awarness Network - The Three Little Cyber Pigs
- RE: SPAM: SPAM and the Internet
- SRI/CSL's: Intrusion Detection Page
- The WWW Security FAQ
- Intro to IPsec
- CERIAS - Security Trends
- NIST on wireless security
- Warchalking || Warchalking Legality FAQ
- RFC 1492 - An Access Control Protocol, Sometimes Called TACACS. C. Finseth.
- The Attacks on GRC.COM
- HoneyNet Project
- The Distributed Reflection DoS Attack
- Guidelines on Internet Access for Children and Parents
- FAQ: Teergrubing against Spam
- Internet Storm Center
- Home Network Security
- Internet Tutorial
- SANS / FBI The Twenty Most Critical Internet Security Vulnerabilities
- FBI Publications - A Parent's Guide to Internet Safety
- Guidelines on Internet Access for Children and Parents
- SafeKids.Com Home Page
- Web Wise Kids - Provides Internet Safety program for Adults & Children
- AT&T Fraud Education: At Home
- Bloomba
- Top 75 Network Security Tools
- Web Security Field Guide by Steve Kalman
- Pew Internet and American Life Project
-
- Washington Internet Project
- Free Firewall Software for Windows - download
- Loaf
-
- Marcus J. Ranum
- WormRadar
- Tracing Emails
- MailFrontier Phishing IQ Test
- IMlogic :: Instant Messaging Infrastructure
vendors
- Riptech
- Zone Labs
- Gibson Research Corporation Homepage
- Cerberus Information Security, Ltd
- ASR Data
- data recovery
- Counterpane Homepage
- Gibson Research Corporation Homepage
- Ontrack Data International, Inc. - Data Recovery, Software, Computer Evidence Services
- Fred Cohen & Associates
- ArcSight - Security Management for the Enterprise
- Clearswift
- Computer Associates
- Corbett delivers network security and information security services.
- DataSec Limited
- Ernst & Young - Global Home
- Guidance Software - Home of the world's leading computer forensic solutions
- Welcome to Integralis
- Computer Forensics - NTI Training, Tools and Consulting
- PentaSafe Security Technologies, Inc. The safest way to grow your business.
- QinetiQ
- Sanctum Inc. - Save Your Site
- savvy data
- SilentRunner - Information Rules. Protect Yours.
- TheTrainingCo. Techno-Security Training Website
- TLSI Inc. - Electronics Solutions Worldwide
- Vogon International
- Web services security ::Vordel::
- WetStone Technologies, Inc.
- RDA Homepage
- LaBrea - The Tarpit
- Technology Section - Virtual Matrix Encryption | Meganet Corporation
- IntelliRecovery- Global data recovery services company specializing in hard disk & hard drive recovery
- IntelliRecovery- Global data recovery services company specializing in hard disk & hard drive recovery
- cansecwest 2004
- Security Volition
- Ad-aware - Software - Lavasoft
- The home of Spybot-S&D!
- SpywareInfo :· Spyware and hijackware Removal Specialists
- Webroot Software Inc - Home Page
- Spyaudit
- www.comparespywareremovers.com
- Spyware Remove :: Spyware Remove Deletes all Spyware From Your Machine. FREE DOWNLOAD
- SpyKiller - The #1 Rated SpyWare and AdWare Killer for your PC!
- OmniPass Enterprise Edition
- University of Fairfax
- Security University
- Data Recovery Centers
- Data Recovery, Computer Forensics, Raid Data Recovery and Hard Disk Data Recovery by Ibas
- InfoDev-Security.net
- Amenaza Technologies Limited | Home
- Security Risk Assessment Software Tool - Relational Security
- Computer Forensics Training, Computer Forensic Investigation, Computer Forensics Houston - CyberEvidence, Inc.
Web info grabbers
- Analyze Your Internet Privacy
- The Limit Software, Inc.
- The Consumer Information Organization's Consumer.Net.
- Privacy Analysis of your Internet Connection
- Fat-Free Software News
- Shields UP! -- Internet Connection Security Analysis
- E-Soft Inc.
- Security Space
- eEye™ Digital Security
- MC2 Security Wire Computer and Network/Security Solution, hacking, operating systems, virus information and more!
- COTSE-IP Tools
- network tool v2.41
- DSL - DSLreports.com - the place for BROADBAND
- HACKER WHACKER Remote Computer Network Security Scan
- Online Security Check
- Security Space
- Anonymizer.com - Test #1: Your Unique IP Address
- CIAC Internet Hoaxes
- RISKS-LIST: RISKS-FORUM Digest
- SecSIG - WWW DEC Notes Server on MUKLUK
- SekOrg Security Library
- The Center for Democracy and Technology
- Books on the Social Aspects of Computing
- Experimental Interaction Unit
- TECS: The Encyclopaedia of Computer Security
- Computer Security - Suite101.com
- L0pht Heavy Industries Security Advisories
- Ph thesis by Suzana Stojakovic-Celustka
- Security Search - The Security Search Engine
- s e c u r i t y f o c u s
- Common Vulnerabilities and Exposures
- Pueblo High Tech Crimes Unit - Slide Shows
- attrition.org
- Perspectives of the Smithsonian: Smithsonian Computer History
- Security Solutions Online Presented By Access Control & Security Systems Integration
- IT Crime - IT Security and crime prevention methods
- Security Information
- Security Tools
- Security News
- Handbook of Information Security Management:Introduction
- Security Publications from Other Organizations
- Rainbow Series
- Information Security Resources
- Publications
- Frequently Asked Questions (FAQ)
- Whitepapers
- Wiretapped - Computer Security Software etc.
- The Security Writers Guild
- Common Vulnerabilities and Exposures
- ICAT Metabase: A CVE Based Searchable Vulnerability Index
- SecurityPortal - July, 2001
- SecurityPortal - July, 2001
- Linux Security - The Community's Center For Security
- Microsoft TechNet
- rain forest puppy - choose your skin
- @stake Research Labs - Advisories
- Scott Schnoll's Internet Explorer Security Center
- Certificate in Internet & Technology Security at UBC Continuing Studies: Computers & Technology
- s e c u r i t y w a t c h . c o m
- Security books by Chuvakin
- Books on the Social Aspects of Computing
- Censorship in action: why I don't publish my HDCP results
- The SANS Security Policy Project
- Fact Squad
- Home Network Security
- Access Control Journal Papers
- CCCL's collection of information security and computer audit web resources at PowerFavorites
- Information Security Education Resources for Professional Development
- The Ideahamster Organization - About The Open Source Security Testing Methodology Manual
- COAST Library (23-Feb-1998)
- SecurityFocus home columnists: A Certified Waste of Time
- Try2Hack
- IA-CMM
- Introduction to Computer Security
- Nessus
- SecurityFocus home tools archive
- NSS Group - Europe's foremost independent network testing facility, security and consultancy organisation
- Distributed Denial of Service (DDoS) Attacks/tools
- SANS Reading Room: Home and Small Office Computing
- IWS - The Information Warfare Site
- 2002 Report of the Auditor General of Canada - April - Chapter 3 - Information Technology Security
- EUROPA - Internal Market - Data Protection - Third countries: Canada/FAQ
- Symantec Security reference handbook
- Hacking and Hackers - Computer Security Programs Downloading Search Engines Portal News
- Security | Sage
- Network Security Library
- Whitehats Network Security Resource
- Security Search
- Cracking the hackers' code - smh.com.au
- Next-Generation Win32 exploits: fundamental API flaws
- CyberSmart! : Home
- RobertGraham.com Infosec Publications
- Illustrative Risks compendium
- NetDay Cyber Security Kit for Schools
- Handbook of Information Security Management:Table of Contents
- TEMPEST 101 - Debunking the Myth
- Top 75 Network Security Tools
- Summit Training
- Security Awareness Graphics from Interpact's Artists
- concepts - security clipart - Clip Art Directory
- Security Awareness Posters by Native Intelligence
- Summit Training
- CISSP Study Guide
- Les Bell and Associates Pty Ltd: Security Tech-Notes and White Papers
- Personal Page - Dan Houser, CISSP
-
- Guidelines on Internet Access for Children and Parents
- History of Computer Security
- Computer Security Day
- InfoSecByte!
- BasicSec.org -- Tools and Resources
- A Taste of Computer Security
- OpenCSOProject.org: The Ultimate Resource for Aspiring Security Professionals
- Talisker Computer Security Advice For The Home User
Book reviews main topic menu
Recommended security books by domain
menu
Virus information main menu