Security and related Web bookmarks and URLs from Rob Slade
(maintained by Rob Slade)
 Computers and Technology
  specs and terms
  
   
- FOLDOC - Computing Dictionary
   
- Compaq Contura Aero Frequently Asked Questions
   
- What Is...every file format in the world - A through E
   
- BABEL: A Glossary of Computer Related Abbreviations and Acronyms
   
- Harddrive Specifications
   
- Hardware Specifications
   
- PC Webopaedia home page
   
- Tom's Hardware Guide Mass Storage: IDE Training Course, Part 1: A Detailed Look at the Basics and Technology -
Introduction
  
        
 
Computer Communications
  Spam
  
   
- How to Complain About Spam, or, Put a Spammer in the Slammer
   
- Anti-Spam Provisions in Sendmail 8.8
   
- 
   
- Anti-Spam Provisions in Microsoft Exchange Version 5.5
   
- MailGate NT SPAM Filter
   
- Get that spammer!
   
- Join the Fight Against Spam!
   
- Spam Chat.
   
- Spam tools
   
- SPAM-News.com - Providing daily news updates about Spam, UCE, UBE & Junk E-mail since 1996
   
- A Message for Spammers: Beware
   
- MAPS Realtime Blackhole List
   
- Spam Calculator
   
- TPROJJO: KASA: Members
   
- Yahoo! Computers and Internet:Communications and Networking:Electronic Mail:Junk
Email
   
- Web Interface to Whois
   
- ARIN: Whois
   
- carpeNet Traceroute
   
- The National Fraud Information Center
   
- TPROJJO: KASA: The Spam Busters
   
- emailabuse.org
   
- rfc2076 - Common Internet Message Headers
   
- SamSpade.org
   
- Abuse.net: Home Page
   
- ORBS
   
- ChooseYourMail
   
- Chain Letter Evolution
   
- 'Guinness Book of Records' Chain Letter - Urban Legends and Folklore
   
- Index of /~barnowl/chain_letter
   
- InformationWeek > Langa Letter > Has Spam Won? > July 9, 2001
   
- Welcome to CAUCE
   
- ChooseYourMail
   
- SamSpade.org
   
- Sam Spade
   
- Smart Whois - Whois Search - Internic + many country domains
   
- Allwhois.com - Search and Register any Domain Name in the World
   
- Abuse.net: Home Page
   
- Open Directory - Computers: Internet: Abuse
   
- 
   
- RE: SPAM: SPAM and the Internet
   
- UXN Spam Combat
   
- Emailias.com
   
- SpamAssassin: Welcome to SpamAssassin
   
- Spam Laws
   
- G E E K T O O L S
   
- SpamAssassin: Welcome to SpamAssassin
   
- FAQ: Teergrubing against Spam
   
- Government Addresses for Reporting Spam
   
- You’ve Got Spam: How to "Can" Unwanted Email
   
- Bloomba
   
- MailWasher
   
- POPFile Home Page
   
- Why Am I Getting All This Spam?
   
- Silicon.com - 'Nigerian' money scam: What happens when you reply?
   
- SecuritySage - Login
   
- ARIN: WHOIS Database Search
   
- Query the APNIC Whois Database
   
- 
   
- Tracing Emails
   
- MAPS - Stopping Spam at its Source
   
- SpamAssassin: Welcome to SpamAssassin
   
- Nuclear Elephant: DSPAM
   
- A Plan for Spam
   
- United States Secret Service: Advance Fee Fraud Advisory
   
- United States Secret Service
   
- Spam Laws
 
                                                                  
 
Computer Security
 
  
access control
  
   
- TCPA / Palladium FAQ
   
- PawSense helps you catproof your computer.
   
- Face Recognition Vendor Test 2002
   
- Rudimentary Treatise on the Construction of Locks
   
- Is It Just My Imagination?
   
- Biometric Consortium
   
- Role Based Access Control
   
- CAPTCHAs for authentication
  
        
  
Antivirus sites
  
   
Virus Encyclopedias
   
    
- Symantec Security Updates
    
- Trend Micro virus encyclopedia, worm, trojan, virus, macro
    
- Virus Encyclopedia
    
- F-Secure : Security Information Center
    
- Mac Virus: Home Page
    
- Encyclopedia
    
- McAfee.com - Virus Information Library
    
- Panda Software
    
- Sophos virus analyses
    
- Panda Software - Global Security Solutions
    
- Virus Encyclopedia [ VirusList.com® ]
    
- RAV Antivirus - Web Site
    
- F-Prot Antivirus for Windows, Linux, BSD, Exchange, AIX and DOS | F-Prot AVES - anti-spam and anti-virus e-mail filtering service |
   
             
   
- Guillermito et les virus informatiques
   
- Virus Test Center - University of Hamburg
   
- AntiVirus Software Database - AntiVirus Resources
   
Virus Hoaxes and false alerts
      
    
- Virus Hoaxes
    
- CIAC Internet Hoaxes
    
- Computer Virus Myths home page
    
- National Computer Security Association
    
- antivirus online: hype alerts!
    
- Data Fellows HOAX warnings page
    
- SARC - Virus Hoaxes
    
- The Hoaxkill service: Let's get rid of hoaxes now!
    
- HOAXBUSTERS Home Page
    
- Vmyths.com- Truth About Computer Virus Myths & Hoaxes
    
- Computer Virus Hoaxes
    
- Don't Spread that Hoax!
    
- Internet Hoaxes Email Rumors and Urban Legends - Current Netlore
    
- Computer Virus Hoaxes
    
- TruSecure Corporation is the worldwide leader in Internet Security Assurance.
    
- TruSecure Corporation is the worldwide leader in Internet Security Assurance.
    
- The Hoaxkill service: Let's get rid of hoaxes now!
    
- EFF "Hoaxes" Archive
    
- McAfee.com - Virus Information Library - Virus Hoaxes
    
- F-Secure : Security Information Center
    
- Symantec Security Updates - Hoax Page
   
                     
   
- Carmel Anti Virus
   
- ChekWARE's Home Site
   
- Security Solutions: Virus Clinic
   
- Data Fellows World-Wide Web Server Main Index
   
- The SBABR Homepage (Europe 2nd mirror)
   
- Welcome To Dr Solomon's On-Line
   
- Welcome To Dr Solomon's On-Line
   
- EliaShim - Virus Center
   
- ThunderBYTE Home Page
   
- IBM antivirus online
   
- AVP Page by Central Command
   
- Welcome To McAfee
   
- Norman
   
- Sophos Home Page
   
- Stiller Research: Integrity Master Virus Protection / Data Integrity
   
- Symantec AntiVirus Research Center
   
- Trend AntiVirus Center, Antivirus Solutions, Antivirus News
   
- Henri Delger's VirusHelp Home Page
   
- Panda
   
- Virus Bulletin Home Page
   
- NCSA Anti-Virus Information
   
- Welcome to Leprechaun Software
   
- iRiS Software
   
- Frisk Software Home Page
   
- Command Software Virus Information
   
- ALWIL Software Home Page
   
- Disinfectant pub/mac/virus
   
- University of Tampere Virus Research Unit
   
- University of Michigan Virus Busters
   
- Thomas Jefferson University Computer Virus Information
   
- Penn State Anti-Virus Page
   
- OUCS Anti-virus Information
   
- UK Open University Antivirus Home Page
   
- The Scanner
   
- The Virus Encyclopedia
   
- Virus Research Unit
   
- Worms
   
- Chat rooms hit by Internet flu
   
- risc.ua.edu /pub/ibm-antivirus
   
- PC Virus Page
   
- What's NOT a Virus
   
- alt.comp.virus.pictures
   
- Vet Anti-Virus Software
   
- mIRC SCRIPT.INI Infosheet
   
- MAC VIRUS/TORJAN HORSE ALERT
   
- SARC - Virus Encyclopedia
   
- Doug Muth's Anti-Virus Help Page
   
- Directory of /pc/virus
   
- pub/mac/virus
   
- Virus Bulletin Home Page
   
- .Computer Virus Help Information by Henri Delger
   
- .Computer Virus Help Information by Henri Delger
   
- Mountain Ridge Dataworks Macintosh Consultants
   
- AVP Virus Encyclopedia
   
- Data Fellows Virus Information Centre
   
- The Virus Encyclopedia
   
- McAfee.com : Virus Information Center
   
- Trend Micro Anti-Virus Software for the Enterprise, Virus Info - Virus Encyclopedia
   
- SARC - Virus Encyclopedia
   
- antivirus online: virus descriptions
   
- Virus Descriptions
   
- Descriptions of Common Viruses
   
- The Joe Wells Virus Encyclopedia® - Full Listing
   
- Padgett's frame page
   
- Padgett's AntiVirus Page
   
- Cure of Computer Viruses
   
- McAfee.com World Virus Map
   
- Checkmark - Home Page
   
- IBM Research | Projects | Antivirus Research
   
- Mac Virus II
   
- www.jasons-toolbox.com
   
- The Deceptive Safety of RTF Files - Breaking Antivirus News [ Kaspersky™ AntiVirus (AVP)]
   
- Frisk Software International download
   
- 
   
- Whitehats: Lion Internet Worm Analysis
   
- ALWIL Software Home Page
   
- Computer Knowledge Virus Tutorial
   
- A Warhol Worm: An Internet Plague in 15 Minutes!
   
- Viruses Revealed
   
- Homepage of Peter Szor
   
- Frisk Software International / Download / Getfpdosfree
   
- Are "Good" Viruses Still a Bad Idea?
   
- United States
Patent: 4,975,950
   
- United States
Patent: 5,121,345
   
- Parasitic Computing
   
- Writing Word Macro Viruses
   
- Index of /pub/cert/virus-l/archives
   
- AVG Anti-Virus System Main Page
   
- Osborne McGraw-Hill Virus Alert
   
- Robert Slade History: Contents
   
- Code of Conduct
   
- TruSecure Corporation is the worldwide leader in Internet Security Assurance.
   
- AVG Anti-Virus System Main Page
   
- ACM: Ubiquity - Crying Klez: Maybe the Sky IS Falling
   
- Newhouse B1
   
- AVI-EWS - Anti-Virus Information & Early Warning System
   
- AVIEN - Home of the Anti-Virus Information Exchange Network
   
- anti-worm throttling
   
- PestPatrol
   
- CIACTech02-004: Parasite Programs; Adware, Spyware, and Stealth Networks
   
- Directory of /anti-virus/free/updates
   
- F-Secure Welcomes You
   
- SpybotSD - Spybot - Search & Destroy by PepiMK Software
   
- Official website for DiamondCS TDS-3 - Trojan Defence Suite (TDS), leading anti-trojan system for Windows
   
- Download latest virus identity (IDE) files
   
- Download latest virus identity (IDE) files
   
- Stinger - Network Associates Inc.
   
- Kattoon: August 25, 2003
   
- NetWorm.org
   
- A 20-year plague | CNET News.com
   
- 
   
- SecurityFocus HOME Infocus: Worm Propagation In Protected Networks
   
- Welcome to The Trojan Horses Research Mailing-List Home Page
   
- TH-Research FAQ
   
- AV-Test.org · Tests of Anti-Virus Software
   
- Download latest virus identity (IDE) files
   
- WormRadar
   
- 
   
- The Final Virus: A Science-Fiction Story
   
- Virus Tutorial
   
- Welcome to Antivirus-Review.info
   
- ClamAV: Project News
   
- Welcome to the SOSDG - ClamAV For Windows
   
- Anti-Spyware Test (Guide)
  
                                                                                                                            
  
App Dev
  
   
- malware.com
   
- BugNet Home Page
   
- ACM Classic: Reflections on Trusting Trust
   
- CIACTech02-004: Parasite Programs; Adware, Spyware, and Stealth Networks
   
- The Peon's Guide To Secure System Development
   
- Secure UNIX Programming FAQ
   
- Executing arbitrary commands without Active Scripting or ActiveX
   
- SSE-CMM Home Page
   
- CIACTech02-004: Parasite Programs; Adware, Spyware, and Stealth Networks
   
- Frequently Asked Questions about DRE Voting Systems
   
- SpybotSD - Spybot - Search & Destroy by PepiMK Software
   
- Official website for DiamondCS TDS-3 - Trojan Defence Suite (TDS), leading anti-trojan system for Windows
   
- Secure Coding: Principles & Practices
   
- 
   
- 
   
- anti-trojan, free antivirus downloads, remove trojan virus, free trojan horses remover, trojan horse virus remover, subseven, sub 7 trojan, hacking trojans,
trojan virus cleaners removers, sub7, trojan cleaner
v1.9d, about trojan horse viruses, sub7 troja
   
- Cassandra(TM) -- CERIAS
   
- Software Method HOWTO - Xbox-Linux
   
- WebGoat
   
- Threats and Countermeasures (ASP site)
  
                    
  
Backups
  
   
- NovaStor - Backup, Encryption, AntiVirus and Data Interchange
   
- iomegazine(tm)
   
- Welcome To Seagate's SeaNET
   
- Exabyte Corporation Home Page
   
- Hewlett Packard: Tape Storage
   
- @Backup | Remote Backup & Virus Protection Services
   
- ATRIEVA: Safe and Easy Online Backup
   
- Backup & offsite data storage - SafeGuard Interactive Incorporated
   
- BackMagic Home Page
   
- NetPro NorthWest Win95 Registry Backup
   
- Welcome to Seagate Software
   
- PowerQuest Corporation
   
- FreeDrive: Free Internet Hard Drive
   
- UltraBac - Windows NT Backup and Disaster Recovery - BEI Corporation's Web Site.
   
- The Non Sequitur Homepage
   
- Mike Lin's Home Page
   
- Welcome to Backup4all site
  
                 
  
bcp
  
   
- FEMA EMI CERT training
   
- Chicago personal emergency training
   
- North Shore (North and West Vancouver) Emergency Management Office
   
- BC Provincial Emergency Program
   
- Workplace emergency suppliers and instructions
   
- BC Emergency Social Services
  
      
  
blackhats
  
   
- 2600: The Hacker Quarterly
   
- Hack Canada - anything can be cracked when it's forty below
   
- the spartan horse - Test It
   
- Directory of /pub/ADM
   
- Cult of the Dead Cow Back Orifice Backdoor
   
- DigiCrime, Inc.
   
- EC-Council | 312-50
   
- EC-Council | Certified Ethical Hacker Certification
   
- Silicon.com - 'Nigerian' money scam: What happens when you reply?
  
         
  
encryption
  
   
- GNUPG - The GNU Privacy Guard
   
- National Cryptologic Museum
   
- CodedDrag
   
- Steganography & Digital Watermarking
   
- Voicecrypt Web Site
   
- Directory of /pub/crypto/pgp/pgp60
   
- Tiny IDEA Encryption Program
   
- PGP-Users Mailing List Home Page
   
- The International PGP Home Page
   
- NovaStor - Backup, Encryption, AntiVirus and Data Interchange
   
- Canadian Strategy
   
- Distributed Authentication in Kerberos Using Public Key Cryptography
   
- Niels Ferguson list of publications
   
- RSA Laboratories | Cryptography FAQ
   
- OutGuess - universal Steganography
   
- The Alice and Bob After Dinner Speech
   
- The Zimmerman Note
   
- SSL analysis from counterpane
   
- [SSL-Talk List FAQ] Secure Sockets Layer Discussion List FAQ v1.1.1
   
- [SSL-Talk List FAQ] Secure Sockets Layer Discussion List FAQ v1.1.1
   
- WEP weaknesses
   
- White Paper: hComments on "An Initial Security Analysis of the IEEE 802.1X Standard"
   
- WEP additional weaknesses
   
- Handbook of Applied Cryptography
   
- 
   
- WW II Codes and Ciphers
   
- Handbook of Applied Cryptography
   
- WW II Codes and Ciphers
   
- Retrobeep - the computer museum at Bletchley Park
   
- BletchleyPark - Station X
   
- Why Johnny Can't Encrypt
   
- cryptographie militaire
   
- Cracking DES: Secrets of Encryption Research, Wiretap Politics, and Chip Design
   
- Polyalphabetic substitution
   
- Fred Cohen & Associates
   
- spammimic - hide a message in spam
   
- 
   
- JavaScrypt: Browser-Based Cryptography Tools
   
- SourceForge.net: Project Info - WinPT - Windows Privacy Tools
   
- KerbCrack
   
- CrypTool - Homepage
   
- SNEAK: Snarkles.Net Encryption Assortment Kit
   
- WWII crypto machines
   
- Kryptos sculpture
   
- Enigma Simulator
   
- ECC patent
   
- UofW crypto course
   
- AES
  
                                                
  
comseced
  
   
- Stay Safe Online | Home
   
- Consumer Information Security - Federal Trade Commission
   
- Presentations
   
- Awareness
   
- Talisker Computer Security Advice For The Home User
   
- MailFrontier Phishing IQ Test
   
- Posters for Security Awareness Training & Education
   
- archive of computer security presentations
   
- Microsoft Support WebCasts
   
- Cisco Seminar Series
  
          
  
Forensic programming
  
   
- Authorship analysis Kraul/Spaf
   
- Authorship Analysis: Identifying The Author of a Program - Krsul, Spafford (ResearchIndex)
   
- Andrew Gray's Software Metrics (Including Authorship Analysis) and Neural Network/Statistical Modelling
Page
   
- Index
   
- Last Fravia's mirror of Reverse code engineering
   
- Last Fravia's mirror of Reverse code engineering
   
- Documentation for disassembler writers
   
- Dave Dittrich
   
- LC Technology International, Inc. Home Page
   
- New Scientist
   
- IJDE
   
- Digital Forensic Links
   
- Digital Evidence: Standards and Principles, by SWGDE and IOCE (Forensic Science Communications, April 2000)
   
- Transform / DeCompilation
   
- Protools - Decompilers
   
- Decompilation of Binary Programs - dcc
   
- REC Decompiler Home Page
   
- Ralf Brown's Files
   
- Jon Kirwan: PC Assembly Programming/Where to Get PC Assembly Tools
   
- Last Fravia's mirror of Reverse code engineering
   
- Intel Architecture Software Developer's Manual, Volume 2: Instruction Set Reference Manual
   
- On-line Intel Documentation
   
- Re-engineering Scientific Credit in the Era of the Globalized information Economy
   
- CCIPS SEARCHING AND SEIZING COMPUTERS
   
- NASM-IDE, NasmEdit and S-Library homepage
   
- Computer Simulators
   
- A Beginner's Nasm Page
   
- NASM Manual
   
- Jeff Duntemann's Assembly Language Books and Links
   
- Softpanorama Assembler is not for Dummies Page
   
- Jon Kirwan: PC Assembly Programming/Where to Get PC Assembly Tools
   
- The UK Patent Office - About Us and Policies - Consultation Paper
   
- 
   
- Responsible Use of Information Technology at BCIT
   
- Antiword: a free MS Word document reader
   
- 
   
- Text Editor - HEX Editor - HTML Editor - Programmers Editor - UltraEdit
   
- Shellcoding for Linux and Windows Tutorial
   
- The Art of Disassembly
  
                                       
  
glossaries
  
   
- NETSYS.COM - Security Glossary
   
- Security Glossary | Security documentation
   
- Welcome to the MSDN Library
   
- PGP Security - Glossary
   
- RFC 2828
   
- Security Glossary of Terms
   
- Mitre Security Glossary
   
- Sun Security Glossary
   
- ISU Draft Comprehensive Information Assurance Dictionary
   
- Corporate Computer Consultants Ltd Information Security Jargon Buster at www.CCCL.net
   
- President's Commission - Critical Infrastructure Assurance Office Glossary
   
- ISU Security Publications
   
- ISU dictionary
   
- More glossaries online , 12/05/01
   
- National Information Systems Security (INFOSEC) Glossary
   
- Hacking Lexicon
   
- Hacking Lexicon
   
- <draft-shirey-security-glossary-00.txt> attached
   
- OASIS security glossary (pdf)
   
- BABEL: A Glossary of Computer Related Abbreviations and Acronyms
   
- security glossary by DigitalGuards
   
- Security Glossary - Lynn Wheeler
   
- Rob Slade's Security Glossary
   
- Rob Slade's Security Glossary
  
                        
  
LIE
  
   
- email tampering - Suni Munshani v. Signal Lake Venture Fund II, LP, et al., Massachusetts Superior Court, Civil Action No. 00-5529 BLS
   
- RFC 2350 Expectations for Computer Security Incident Response
   
- Ethics and Information Technology
   
- Lawful Access – Consultation Document
   
- Home of the Digital Forensics Information Network
   
- Welcome To Joel A. Wuesthoff JD, CISSP
   
- Privacy & Human Rights 2002
   
- Privacy & Human Rights 2002
   
- Department of Justice Canada
   
- Prime Curios!: 48565...29443 (1401-digits)
   
- DeCSS, JILT 2002 (3): Guadamuz
   
- ID Theft: When Bad Things Happen To Your Good Name
   
- Centers for Medicare & Medicaid Services
   
- THE LEGAL FRAMEWORK
   
- The Frontiers of Privacy and Security: New Challenges for a New Century - 2003 FOIPP Conference
   
- GIAC: Global Information Assurance Certification -  GIAC Code of Ethics
   
- Online Ethics Center: NSPE Case 92-6: Public Welfare -- Hazardous Waste
   
- C Y B E R C R I M E
   
- 
   
- Tom's Hardware Guide Mass Storage: IDE Training Course, Part 1: A Detailed Look at the Basics and Technology -
Introduction
   
- EPIC Bill Track - 108th Congress Privacy and Cyber-Liberties Legislation
   
- Spam Laws
   
- Home Page - Privacy Commissioner of Canada
   
- Privacy Legislation - Privacy Commissioner of Canada
   
- The European Union Directive on Data Protection
   
- Zeichner Risk Analytics LLC
   
- International Association of Privacy Professionals - IAPP
   
- Microsoft TechNet
   
- Creating a Computer Security Incident Response Team: A Process for Getting Started
   
- 
   
- FORENSICS.ORG
   
- SecurityFocus HOME Infocus: U.S. Information Security Law, Part 1
   
- Antiword: a free MS Word document reader
   
- catdoc and xls2csv - free MS-Office format readers
   
- FORENSICS.ORG
   
- GROKLAW
   
- Pew Internet and American Life Project
   
- IOCE - Guidelines for Best Practice in the Forensic Examination of Digital Technology
   
- NLECTC JustNet-Law Enforcement Links
   
- knackit.net :: every 0 makes a difference
   
- SourceForge.net: Project Info - Open Source Computer Forensics Manual
   
- Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations (July 2002)
   
- The Guide - Privacy and Security on your PC Part I
   
- Knoppix STD
   
- Office of the Information & Privacy Commissioner
   
- Rahmenlayout Schüler STM Homepage
   
- Cybercrime Law
   
- EUROPA - The European Union On-Line
   
- Privacy Commissioner of Canada / Commissaire à la protection de la vie privée du Canada
   
- OIPC
   
- IPC - Information & Privacy Commissioner of Ontario
   
- Office of the Information & Privacy Commissioner
   
- Putercops.org
   
- [strike out]
   
- Privacy International - Country Archives
   
- USA PATRIOT Act (H.R. 3162)
   
- Digital Forensic Research Workshop - Bringing together the digital forensics comminity [Home Page]
   
- SB 1386 Senate Bill - CHAPTERED
   
- Consequentialism - Wikipedia, the free encyclopedia
   
- Ethics - Wikipedia, the free encyclopedia
   
- ForensicsWeb :: Forensics Web - Technology investigation & forensics.
   
- ID Fraud Home Page
   
- Federal Trade Commission - Your National Resource for ID Theft
   
- The 2001 Daftas Longest Email Disclaimer | The Register
   
- Personal Information Protection and Electronic Documents Act
   
- Scientific Working Group on Digital Evidence
   
- United States Secret Service: Best Practices for Siezing Electronic Evidence
   
- Tracing Emails
   
- Childfind and Cybertip.ca/Cyberaide.ca Splash Page
   
- EU approved clauses for international data transfers
   
- "Forensic Discovery" by Farmer and Venema
   
- Guide to Digital Investigations
  
                                                                        
  
magazines
  
   
- INFORMATION SECURITY Free Subscription Form
   
- Index of /Cipher
   
- 2600: The Hacker Quarterly
   
- SC Magazine On-line
   
- JCS Home Page
   
- ACM: ACM Transactions on Information and System Security
   
- ICSA Information Security Magazine
   
- Ethics and Information Technology
   
- SECURITY Magazine
   
- ICSA Information Security Magazine
   
- Information security Digest
   
- Security News Portal - A Different Kind of News
   
- Security Pipeline
   
- Infosecurity Today
  
              
  
mailing lists
  
   
- Cipher - Newsletter of the IEEE CS TC on Security and Privacy
   
- PRIVACY Forum
   
- Security Mailing List Archives
   
- Bugtraq mailing list archives
   
- RISKS-LIST: RISKS-FORUM Digest
   
- Crypto-Gram Newsletter
   
- Cipher: The Newsletter of the IEEE Computer Society Technical Committee on Security and Privacy
   
- Internet Security Systems, Inc. : X-Force
   
- NTBugtraq - NTBugtraq Home
   
- Information Security Zeitgeist
   
- Full-Disclosure Information
   
- RISKS Info Page
  
            
  
NT security
  
   
- Windows NT Frequently Asked Questions (FAQ)
   
- NT Security - Frequently Asked Questions
   
- NTBugTraq - NTBugtraq Home
   
- NT Exploit(ed) Page
   
- NT Configuration Guide for the Paranoid
   
- NSA/Windows NT Security Guidelines
   
- Nessus for WindowsNT
   
- Nomad Mobile Research Centre - NT Files
   
- ISS – Internet Security Systems
   
- Windows NT Killer Utilities
   
- Russ Cooper's NT Fixes Status Page
   
- Offline NT-password-utility
   
- Secure Windows NT Installation and Configuration Guide
   
- Green Bullet Home at MIKO s.c.
   
- Utilities for Windows NT
   
- eEye™ Digital Security
   
- NT Security - Frequently Asked Questions
   
- NT Security - Frequently Asked Questions
   
- Next-Generation Win32 exploits: fundamental API flaws
   
- Scott Schnoll's Internet Explorer Security Center
   
- Microsoft Baseline Security Analyzer
   
- Windows XP Security Checklist from LabMice.net
   
- IEBUG News
   
- BasicSec.org | Security and Privacy for Regular Folks
  
                        
  
ops
  
   
- Microsoft Baseline Security Analyzer
   
- BasicSec.org | Security and Privacy for Regular Folks
  
  
  
Physical security
  
   
- SECURITY Magazine
   
- Deborah Quilter's RSI Web Site
   
- IBM physical site (computer room) planning
   
- EBIOS risk management info and tools
   
Fire
       
    
- Talking Sense About Foam
    
- Howstuffworks "How Fire Extinguishers Work"
    
- Fire Safety and Fire Extinguishers in a Chemistry Laboratory
   
   
   
- Handbook of Forensic Services: Evidence Examinations--Crime Scene Search (1999)
   
- RCMP - TSB
   
- FEMA: Are You Ready? A Guide to Citizen Preparedness
   
- Master-Keyed Lock Vulnerability
   
- Rudimentary Treatise on the Construction of Locks
   
- Master-Keyed Lock Vulnerability
   
- FM 3-19.30 Table of Contents
   
- 
   
- 
   
- Howstuffworks "How Lock Picking Works"
   
- IntelCenter
   
- FM 3-19.30 Table of Contents
   
- The Art of War
   
- 
   
- 9-11 Commission Final Report
  
               
  
Security agencies
  
   
- (ISC)2 Reference Materials
   
- SecurityFocus
   
- CERT Coordination Center
   
- SANS Institute Online - Home Page
   
- Cissp.com The web portal for the certified information systems security professionals
   
- CISSPworld (www.cisspworld.com)
   
- CISSPworld CA (www.ca.cisspworld.com)
   
- About the CERT® Coordination Center
   
- C S R C - Computer Security Resource Center
   
- CIPS Vancouver Security Special Interest Group
   
- ICSA
   
- COAST
   
- The United States Navy INFOSEC Home Page
   
- Office of the Director of Central Intelligence
   
- Central Intelligence Agency
   
- CIA Directorate of Intelligence Homepage
   
- DS&T Main Page
   
- The Intelligence Community
   
- Center for the Study of Intelligence
   
- Central Intelligence Agency - Electronic Document Release Center
   
- DIA HOME PAGE
   
- National Security Agency
   
- U.S. Navy: Welcome Aboard
   
- Access Denied
   
- Air Force Command Section
   
- MarineLINK
   
- WELCOME TO NIMA's PUBLIC HOME PAGE
   
- National Reconnaissance Office
   
- Federal Bureau of Investigation Home Page
   
- U.S. Department of Energy Home Page
   
- Canadian Security Intelligence Service -- Service canadien du renseignement de sécurité
   
- ITS Home
   
- TECHNICAL SECURITY BRANCH - Homepage
   
- Encyclopedia
   
- National Infrastructure Protection Center (NIPC) - CyberNotes
   
- CCITS Home Page - Canadian Centre for Information Technology Security
   
- National Infrastructure Protection Center (NIPC) - Home Page
   
- 
   
- IATRP Home Page
   
- CASPR Home-Page Commonly Accepted Security Practices & Recommendations
   
- SCI: InfoSec Certification FAQ
   
- Government Security Policy
   
- Government Security Policy
   
- Security Policy - Policies and Publications
   
- Information Technology Security Standard
   
- OCIPEP - Public Communications
   
- OCIPEP - Critical Infrastructure Protection
   
- IFCC 2001 fraud report
   
- Science and Technology - Information Security Committee
   
- FTC Issues Financial Information Safeguards Rule
   
- CSORT - Chief Security Officer's Round Table
   
- Draft Publications
   
- IJDE
   
- NCIX - One Evil
   
- Network Security from the Pros
   
- Science and Technology - Information Security Committee
   
- 53 Questions for Developing the National Strategy to Secure Cyberspace
   
- CIPS Vancouver Security Special Interest Group
   
- www.phrack.org
   
- Welcome to InfraGard
   
- National Crime Squad, Combating Serious and Organised Crime
   
- Electronic Crimes Task Force Website
   
- NIST Computer Security Special Publications
   
- Draft National Strategy to Secure Cyberspace
   
- Information Security Forum
   
- UNITED STATES INTELLIGENCE COMMUNITY
   
- RCMP - TSB
   
- Internet Fraud Complaint Center
   
- C4I.org - Computer Security and Intelligence
   
- R.U.N.S.A.F.E.
   
- Computer Security
   
- Welcome to the Society for the Policing of Cyberspace (POLCYB)
   
- Community Ed in security
   
- Computer Security
   
- R a i n F o r e s t P u p p y
   
- IASE Public Home Page
   
- CompTIA Security+ Certification - Welcome to Security+
   
- About CSE
   
- Manuals
   
- RCMP TSSIT
   
- (ISC)2 Canada public CISSP directory
   
- US Cyberspace security strategy
   
- 2003 FISSEA Conference - homepage
   
- Home Page - Privacy Commissioner of Canada
   
- Pew Internet and American Life Project
   
- Security Tools
   
- Security Scene Errata - Charlatans
   
- MI5 > Home
   
- ISSA - Vancouver
   
- Federal Trade Commission - Consumer Information Security
   
- Organization for Internet Safety
   
- ISECOM - Institute for Security and Open Methodologies
   
- OpenCSOProject.org: The Ultimate Resource for Aspiring Security Professionals
   
- ISSPCS: The International Systems Security Professional Certification Scheme
   
- Treachery Unlimited: A Computer & Network Security Information Site
   
- Office of the National Counterintelligence Executive-What's New Section
   
- NIST Computer Security: Federal Information Processing Standards (FIPS) page
   
- United States Secret Service
   
- How many CISSPs are there?
   
- Navy Info Assurance Tips
   
- Committee on National Security Systems (CNSS)
   
- Open Information Systems Security Group
   
- CERT Virtual Training Environment Library
  
                                                                                                       
  
sec arch
  
   
- The ISO17799 Security Newsletter
   
- In-Depth Review of the Bell-Lapadula Model
   
- TCPA / Palladium FAQ
   
- Common Criteria Project -- HomePage
   
- Common Criteria
   
- Multics Home page
   
- NIAP - NATIONAL INFORMATION ASSURANCE PARTNERSHIP ®
   
- Common Criteria, Parts 1-3
   
- The Common Criteria Home Page
   
- 
   
- CC - Common Criteria for Information Technology Security Evaluation
  
           
  
sec man
  
   
- The ISO17799 Security Newsletter
   
- GASSP Home Page
   
- Common Criteria Project -- HomePage
   
- Common Criteria Validated Products List
   
- GASSP Version 2
   
- CobiT: Download the Executive Summary, Framework, and Control Objectives
   
- NIST Computer Security Special Publications
   
- Special Pub 800-12 -- An Introduction to Computer Security: The NIST Handbook
   
- The CISSP and SSCP Open Study Guides Web site
   
- Common Criteria, Parts 1-3
   
- SANS Institute - Security Policy Project
   
- Privacy International - Stupid Security
   
- Rudimentary Treatise on the Construction of Locks
   
- On the discussion of security vulnerabilities
   
- CobiT: Download the Executive Summary, Framework, and Control Objectives
   
- ISECOM Open Source Security Testing Methodology Manual
   
- Handbook AS-805, Information Security
   
- CobiT: Download the Executive Summary, Framework, and Control Objectives
   
- rfc1244 - Site Security Handbook
   
- Simtel - DownLoad: b4all130.zip
   
- Risk Support index
   
- 
   
- 
   
- NRIC - Network Reliability & Interoperability Council
   
- NRIC Best Practices
   
- Internal Audit: Resources for Internal Auditors
   
- Threat and Risk Assessment Working Guide (ITSG-04)
   
- Common Criteria - Developers - Official CC/CEM versions
   
- fault-tree.net Selected Readings on Fault Tree and related analytical methods.
   
- COSO
   
- 
   
- Security Officers Management & Analysis Project
   
- Schneier on the psychology of risk assessment
   
- Schneier on the psychology of risk assessment
  
                                  
  
telecom
  
   
- COTSE-IP Tools
   
- net stumbler dot com
   
- Commonly Probed Ports
   
- alt.spam FAQ or "Figuring out fake E-Mail & Posts". Rev 19991122
   
- Media Awarness Network - The Three Little Cyber Pigs
   
- RE: SPAM: SPAM and the Internet
   
- SRI/CSL's: Intrusion Detection Page
   
- The WWW Security FAQ
   
- Intro to IPsec
   
- CERIAS - Security Trends
   
- NIST on wireless security
   
- Warchalking || Warchalking Legality FAQ
   
- RFC 1492 - An Access Control Protocol, Sometimes Called TACACS. C. Finseth.
   
- The Attacks on GRC.COM
   
- HoneyNet Project
   
- The Distributed Reflection DoS Attack
   
- Guidelines on Internet Access for Children and Parents
   
- FAQ: Teergrubing against Spam
   
- Internet Storm Center
   
- Home Network Security
   
- Internet Tutorial
   
- SANS / FBI The Twenty Most Critical Internet Security Vulnerabilities
   
- FBI Publications - A Parent's Guide to Internet Safety
   
- Guidelines on Internet Access for Children and Parents
   
- SafeKids.Com Home Page
   
- Web Wise Kids - Provides Internet Safety program for Adults & Children
   
- AT&T Fraud Education: At Home
   
- Bloomba
   
- Top 75 Network Security Tools
   
- Web Security Field Guide by Steve Kalman
   
- Pew Internet and American Life Project
   
- 
   
- Washington Internet Project
   
- Free Firewall Software for Windows - download
   
- Loaf
   
- 
   
- Marcus J. Ranum
   
- WormRadar
   
- Tracing Emails
   
- MailFrontier Phishing IQ Test
   
- IMlogic :: Instant Messaging Infrastructure
   
- Stupid Email Disclaimers
  
                                          
  
vendors
  
   
- Riptech
   
- Zone Labs
   
- Gibson Research Corporation Homepage
   
- Cerberus Information Security, Ltd
   
- ASR Data
   
- data recovery
   
- Counterpane Homepage
   
- Gibson Research Corporation Homepage
   
- Ontrack Data International, Inc. - Data Recovery, Software, Computer Evidence Services
   
- Fred Cohen & Associates
   
- ArcSight - Security Management for the Enterprise
   
- Clearswift
   
- Computer Associates
   
- Corbett delivers network security and information security services.
   
- DataSec Limited
   
- Ernst & Young - Global Home
   
- Guidance Software - Home of the world's leading computer forensic solutions
   
- Welcome to Integralis
   
- Computer Forensics - NTI Training, Tools and Consulting
   
- PentaSafe Security Technologies, Inc. The safest way to grow your business.
   
- QinetiQ
   
- Sanctum Inc. - Save Your Site
   
- savvy data
   
- SilentRunner - Information Rules. Protect Yours.
   
- TheTrainingCo. Techno-Security  Training Website
   
- TLSI Inc. - Electronics Solutions Worldwide
   
- Vogon International
   
- Web services security ::Vordel::
   
- WetStone Technologies, Inc.
   
- RDA Homepage
   
- LaBrea - The Tarpit
   
- Technology Section - Virtual Matrix Encryption | Meganet Corporation
   
- IntelliRecovery- Global data recovery services company specializing in hard disk & hard drive recovery
   
- IntelliRecovery- Global data recovery services company specializing in hard disk & hard drive recovery
   
- cansecwest 2004
   
- Security Volition
   
- Ad-aware - Software - Lavasoft
   
- The home of Spybot-S&D!
   
- SpywareInfo :· Spyware and hijackware Removal Specialists
   
- Webroot Software Inc - Home Page
   
- Spyaudit
   
- www.comparespywareremovers.com
   
- Spyware Remove ::  Spyware Remove Deletes all Spyware From Your Machine.  FREE DOWNLOAD
   
- SpyKiller - The #1 Rated SpyWare and AdWare Killer for your PC!
   
- OmniPass Enterprise Edition
   
- University of Fairfax
   
- Security University
   
- Data Recovery Centers
   
- Data Recovery, Computer Forensics, Raid Data Recovery and Hard Disk Data Recovery by Ibas
   
- InfoDev-Security.net
   
- Amenaza Technologies Limited | Home
   
- Security Risk Assessment Software Tool - Relational Security
   
- Computer Forensics Training, Computer Forensic Investigation, Computer Forensics Houston - CyberEvidence, Inc.
   
- SearchSecurity.com's Security School
  
                                                      
  
Web info grabbers
  
   
- Analyze Your Internet Privacy
   
- The Limit Software, Inc.
   
- The Consumer Information Organization's Consumer.Net.
   
- Privacy Analysis of your Internet Connection
   
- Fat-Free Software News
   
- Shields UP! -- Internet Connection Security Analysis
   
- E-Soft Inc.
   
- Security Space
   
- eEye™ Digital Security
   
- MC2 Security Wire Computer and Network/Security Solution, hacking, operating systems, virus information and more!
   
- COTSE-IP Tools
   
- network tool v2.41
   
- DSL - DSLreports.com - the place for BROADBAND
   
- HACKER WHACKER Remote Computer Network Security Scan
   
- Online Security Check
   
- Security Space
   
- Anonymizer.com - Test #1: Your Unique IP Address
  
                 
  
- CIAC Internet Hoaxes
  
- RISKS-LIST: RISKS-FORUM Digest
  
- SecSIG - WWW DEC Notes Server on MUKLUK
  
- SekOrg Security Library
  
- The Center for Democracy and Technology
  
- Books on the Social Aspects of Computing
  
- Experimental Interaction Unit
  
- TECS: The Encyclopaedia of Computer Security
  
- Computer Security - Suite101.com
  
- L0pht Heavy Industries Security Advisories
  
- Ph thesis by Suzana Stojakovic-Celustka
  
- Security Search - The Security Search Engine
  
- s e c u r i t y f o c u s
  
- Common Vulnerabilities and Exposures
  
- Pueblo High Tech Crimes Unit - Slide Shows
  
- attrition.org
  
- Perspectives of the Smithsonian: Smithsonian Computer History
  
- Security Solutions Online Presented By Access Control & Security Systems Integration
  
- IT Crime - IT Security and crime prevention methods
  
- Security Information
  
- Security Tools
  
- Security News
  
- Handbook of Information Security Management:Introduction
  
- Security Publications from Other Organizations
  
- Rainbow Series
  
- Information Security Resources
  
- Publications
  
- Frequently Asked Questions (FAQ)
  
- Whitepapers
  
- Wiretapped - Computer Security Software etc.
  
- The Security Writers Guild
  
- Common Vulnerabilities and Exposures
  
- ICAT Metabase: A CVE Based Searchable Vulnerability Index
  
- SecurityPortal - July, 2001
  
- SecurityPortal - July, 2001
  
- Linux Security - The Community's Center For Security
  
- Microsoft TechNet
  
- rain forest puppy - choose your skin
  
- @stake Research Labs - Advisories
  
- Scott Schnoll's Internet Explorer Security Center
  
- Certificate in Internet & Technology Security at UBC Continuing Studies: Computers & Technology
  
- s e c u r i t y w a t c h . c o m
  
- Security books by Chuvakin
  
- Books on the Social Aspects of Computing
  
- Censorship in action: why I don't publish my HDCP results
  
- The SANS Security Policy Project
  
- Fact Squad
  
- Home Network Security
  
- Access Control Journal Papers
  
- CCCL's collection of information security and computer audit web resources at PowerFavorites
  
- Information Security Education Resources for Professional Development
  
- The Ideahamster Organization - About The Open Source Security Testing Methodology Manual
  
- COAST Library (23-Feb-1998)
  
- SecurityFocus home columnists: A Certified Waste of Time
  
- Try2Hack
  
- IA-CMM
  
- Introduction to Computer Security
  
- Nessus
  
- SecurityFocus home tools archive
  
- NSS Group - Europe's foremost independent network testing facility, security and consultancy organisation
  
- Distributed Denial of Service (DDoS) Attacks/tools
  
- SANS Reading Room: Home and Small Office Computing
  
- IWS - The Information Warfare Site
  
- 2002 Report of the Auditor General of Canada - April - Chapter 3 - Information Technology Security
  
- EUROPA - Internal Market - Data Protection - Third countries: Canada/FAQ
  
- Symantec Security reference handbook
  
- Hacking and Hackers - Computer Security Programs Downloading Search Engines Portal News
  
- Security | Sage
  
- Network Security Library
  
- Whitehats Network Security Resource
  
- Security Search
  
- Cracking the hackers' code - smh.com.au
  
- Next-Generation Win32 exploits: fundamental API flaws
  
- CyberSmart! : Home
  
- RobertGraham.com Infosec Publications
  
- Illustrative Risks compendium
  
- NetDay Cyber Security Kit for Schools
  
- Handbook of Information Security Management:Table of Contents
  
- TEMPEST 101 - Debunking the Myth
  
- Top 75 Network Security Tools
  
- Summit Training
  
- Security Awareness Graphics from Interpact's Artists
  
- concepts - security clipart - Clip Art Directory
  
- Security Awareness Posters by Native Intelligence
  
- Summit Training
  
- CISSP Study Guide
  
- Les Bell and Associates Pty Ltd: Security Tech-Notes and White Papers
  
- Personal Page - Dan Houser, CISSP
  
- 
  
- Guidelines on Internet Access for Children and Parents
  
- History of Computer Security
  
- Computer Security Day
  
- InfoSecByte!
  
- BasicSec.org -- Tools and Resources
  
- A Taste of Computer Security
  
- OpenCSOProject.org: The Ultimate Resource for Aspiring Security Professionals
  
- Talisker Computer Security Advice For The Home User
  
- Security Engineering book online version
  
- CISSPforum FAQ
 
                                                                                                   
Book reviews main topic menu
Recommended security books by domain
menu
Virus information main menu