Security and related Web bookmarks and URLs from Rob Slade


(maintained by Rob Slade)

Computers and Technology

specs and terms

FOLDOC - Computing Dictionary
Compaq Contura Aero Frequently Asked Questions
What Is...every file format in the world - A through E
BABEL: A Glossary of Computer Related Abbreviations and Acronyms
Harddrive Specifications
Hardware Specifications
PC Webopaedia home page
Tom's Hardware Guide Mass Storage: IDE Training Course, Part 1: A Detailed Look at the Basics and Technology - Introduction

Computer Communications

Spam

How to Complain About Spam, or, Put a Spammer in the Slammer
Anti-Spam Provisions in Sendmail 8.8
Anti-Spam Provisions in Microsoft Exchange Version 5.5
MailGate NT SPAM Filter
Get that spammer!
Join the Fight Against Spam!
Spam Chat.
Spam tools
SPAM-News.com - Providing daily news updates about Spam, UCE, UBE & Junk E-mail since 1996
A Message for Spammers: Beware
MAPS Realtime Blackhole List
Spam Calculator
TPROJJO: KASA: Members
Yahoo! Computers and Internet:Communications and Networking:Electronic Mail:Junk Email
Web Interface to Whois
ARIN: Whois
carpeNet Traceroute
The National Fraud Information Center
TPROJJO: KASA: The Spam Busters
emailabuse.org
rfc2076 - Common Internet Message Headers
SamSpade.org
Abuse.net: Home Page
ORBS
ChooseYourMail
Chain Letter Evolution
'Guinness Book of Records' Chain Letter - Urban Legends and Folklore
Index of /~barnowl/chain_letter
InformationWeek > Langa Letter > Has Spam Won? > July 9, 2001
Welcome to CAUCE
ChooseYourMail
SamSpade.org
Sam Spade
Smart Whois - Whois Search - Internic + many country domains
Allwhois.com - Search and Register any Domain Name in the World
Abuse.net: Home Page
Open Directory - Computers: Internet: Abuse
RE: SPAM: SPAM and the Internet
UXN Spam Combat
Emailias.com
SpamAssassin: Welcome to SpamAssassin
Spam Laws
G E E K T O O L S
SpamAssassin: Welcome to SpamAssassin
FAQ: Teergrubing against Spam
Government Addresses for Reporting Spam
You’ve Got Spam: How to "Can" Unwanted Email
Bloomba
MailWasher
POPFile Home Page
Why Am I Getting All This Spam?
Silicon.com - 'Nigerian' money scam: What happens when you reply?
SecuritySage - Login
ARIN: WHOIS Database Search
Query the APNIC Whois Database
Tracing Emails
MAPS - Stopping Spam at its Source
SpamAssassin: Welcome to SpamAssassin
Nuclear Elephant: DSPAM
A Plan for Spam
United States Secret Service: Advance Fee Fraud Advisory
United States Secret Service
Spam Laws

Computer Security

access control

TCPA / Palladium FAQ
PawSense helps you catproof your computer.
Face Recognition Vendor Test 2002
Rudimentary Treatise on the Construction of Locks
Is It Just My Imagination?
Biometric Consortium
Role Based Access Control
CAPTCHAs for authentication

Antivirus sites

Virus Encyclopedias

Symantec Security Updates
Trend Micro virus encyclopedia, worm, trojan, virus, macro
Virus Encyclopedia
F-Secure : Security Information Center
Mac Virus: Home Page
Encyclopedia
McAfee.com - Virus Information Library
Panda Software
Sophos virus analyses
Panda Software - Global Security Solutions
Virus Encyclopedia [ VirusList.com® ]
RAV Antivirus - Web Site
F-Prot Antivirus for Windows, Linux, BSD, Exchange, AIX and DOS | F-Prot AVES - anti-spam and anti-virus e-mail filtering service |

Guillermito et les virus informatiques
Virus Test Center - University of Hamburg
AntiVirus Software Database - AntiVirus Resources

Virus Hoaxes and false alerts

Virus Hoaxes
CIAC Internet Hoaxes
Computer Virus Myths home page
National Computer Security Association
antivirus online: hype alerts!
Data Fellows HOAX warnings page
SARC - Virus Hoaxes
The Hoaxkill service: Let's get rid of hoaxes now!
HOAXBUSTERS Home Page
Vmyths.com- Truth About Computer Virus Myths & Hoaxes
Computer Virus Hoaxes
Don't Spread that Hoax!
Internet Hoaxes Email Rumors and Urban Legends - Current Netlore
Computer Virus Hoaxes
TruSecure Corporation is the worldwide leader in Internet Security Assurance.
TruSecure Corporation is the worldwide leader in Internet Security Assurance.
The Hoaxkill service: Let's get rid of hoaxes now!
EFF "Hoaxes" Archive
McAfee.com - Virus Information Library - Virus Hoaxes
F-Secure : Security Information Center
Symantec Security Updates - Hoax Page

Carmel Anti Virus
ChekWARE's Home Site
Security Solutions: Virus Clinic
Data Fellows World-Wide Web Server Main Index
The SBABR Homepage (Europe 2nd mirror)
Welcome To Dr Solomon's On-Line
Welcome To Dr Solomon's On-Line
EliaShim - Virus Center
ThunderBYTE Home Page
IBM antivirus online
AVP Page by Central Command
Welcome To McAfee
Norman
Sophos Home Page
Stiller Research: Integrity Master Virus Protection / Data Integrity
Symantec AntiVirus Research Center
Trend AntiVirus Center, Antivirus Solutions, Antivirus News
Henri Delger's VirusHelp Home Page
Panda
Virus Bulletin Home Page
NCSA Anti-Virus Information
Welcome to Leprechaun Software
iRiS Software
Frisk Software Home Page
Command Software Virus Information
ALWIL Software Home Page
Disinfectant pub/mac/virus
University of Tampere Virus Research Unit
University of Michigan Virus Busters
Thomas Jefferson University Computer Virus Information
Penn State Anti-Virus Page
OUCS Anti-virus Information
UK Open University Antivirus Home Page
The Scanner
The Virus Encyclopedia
Virus Research Unit
Worms
Chat rooms hit by Internet flu
risc.ua.edu /pub/ibm-antivirus
PC Virus Page
What's NOT a Virus
alt.comp.virus.pictures
Vet Anti-Virus Software
mIRC SCRIPT.INI Infosheet
MAC VIRUS/TORJAN HORSE ALERT
SARC - Virus Encyclopedia
Doug Muth's Anti-Virus Help Page
Directory of /pc/virus
pub/mac/virus
Virus Bulletin Home Page
.Computer Virus Help Information by Henri Delger
.Computer Virus Help Information by Henri Delger
Mountain Ridge Dataworks Macintosh Consultants
AVP Virus Encyclopedia
Data Fellows Virus Information Centre
The Virus Encyclopedia
McAfee.com : Virus Information Center
Trend Micro Anti-Virus Software for the Enterprise, Virus Info - Virus Encyclopedia
SARC - Virus Encyclopedia
antivirus online: virus descriptions
Virus Descriptions
Descriptions of Common Viruses
The Joe Wells Virus Encyclopedia® - Full Listing
Padgett's frame page
Padgett's AntiVirus Page
Cure of Computer Viruses
McAfee.com World Virus Map
Checkmark - Home Page
IBM Research | Projects | Antivirus Research
Mac Virus II
www.jasons-toolbox.com
The Deceptive Safety of RTF Files - Breaking Antivirus News [ Kaspersky™ AntiVirus (AVP)]
Frisk Software International download
Whitehats: Lion Internet Worm Analysis
ALWIL Software Home Page
Computer Knowledge Virus Tutorial
A Warhol Worm: An Internet Plague in 15 Minutes!
Viruses Revealed
Homepage of Peter Szor
Frisk Software International / Download / Getfpdosfree
Are "Good" Viruses Still a Bad Idea?
United States Patent: 4,975,950
United States Patent: 5,121,345
Parasitic Computing
Writing Word Macro Viruses
Index of /pub/cert/virus-l/archives
AVG Anti-Virus System Main Page
Osborne McGraw-Hill Virus Alert
Robert Slade History: Contents
Code of Conduct
TruSecure Corporation is the worldwide leader in Internet Security Assurance.
AVG Anti-Virus System Main Page
ACM: Ubiquity - Crying Klez: Maybe the Sky IS Falling
Newhouse B1
AVI-EWS - Anti-Virus Information & Early Warning System
AVIEN - Home of the Anti-Virus Information Exchange Network
anti-worm throttling
PestPatrol
CIACTech02-004: Parasite Programs; Adware, Spyware, and Stealth Networks
Directory of /anti-virus/free/updates
F-Secure Welcomes You
SpybotSD - Spybot - Search & Destroy by PepiMK Software
Official website for DiamondCS TDS-3 - Trojan Defence Suite (TDS), leading anti-trojan system for Windows
Download latest virus identity (IDE) files
Download latest virus identity (IDE) files
Stinger - Network Associates Inc.
Kattoon: August 25, 2003
NetWorm.org
A 20-year plague | CNET News.com
SecurityFocus HOME Infocus: Worm Propagation In Protected Networks
Welcome to The Trojan Horses Research Mailing-List Home Page
TH-Research FAQ
AV-Test.org · Tests of Anti-Virus Software
Download latest virus identity (IDE) files
WormRadar
The Final Virus: A Science-Fiction Story
Virus Tutorial
Welcome to Antivirus-Review.info
ClamAV: Project News
Welcome to the SOSDG - ClamAV For Windows
Anti-Spyware Test (Guide)

App Dev

malware.com
BugNet Home Page
ACM Classic: Reflections on Trusting Trust
CIACTech02-004: Parasite Programs; Adware, Spyware, and Stealth Networks
The Peon's Guide To Secure System Development
Secure UNIX Programming FAQ
Executing arbitrary commands without Active Scripting or ActiveX
SSE-CMM Home Page
CIACTech02-004: Parasite Programs; Adware, Spyware, and Stealth Networks
Frequently Asked Questions about DRE Voting Systems
SpybotSD - Spybot - Search & Destroy by PepiMK Software
Official website for DiamondCS TDS-3 - Trojan Defence Suite (TDS), leading anti-trojan system for Windows
Secure Coding: Principles & Practices
anti-trojan, free antivirus downloads, remove trojan virus, free trojan horses remover, trojan horse virus remover, subseven, sub 7 trojan, hacking trojans, trojan virus cleaners removers, sub7, trojan cleaner v1.9d, about trojan horse viruses, sub7 troja
Cassandra(TM) -- CERIAS
Software Method HOWTO - Xbox-Linux
WebGoat
Threats and Countermeasures (ASP site)

Backups

NovaStor - Backup, Encryption, AntiVirus and Data Interchange
iomegazine(tm)
Welcome To Seagate's SeaNET
Exabyte Corporation Home Page
Hewlett Packard: Tape Storage
@Backup | Remote Backup & Virus Protection Services
ATRIEVA: Safe and Easy Online Backup
Backup & offsite data storage - SafeGuard Interactive Incorporated
BackMagic Home Page
NetPro NorthWest Win95 Registry Backup
Welcome to Seagate Software
PowerQuest Corporation
FreeDrive: Free Internet Hard Drive
UltraBac - Windows NT Backup and Disaster Recovery - BEI Corporation's Web Site.
The Non Sequitur Homepage
Mike Lin's Home Page
Welcome to Backup4all site

bcp

FEMA EMI CERT training
Chicago personal emergency training
North Shore (North and West Vancouver) Emergency Management Office
BC Provincial Emergency Program
Workplace emergency suppliers and instructions
BC Emergency Social Services

blackhats

2600: The Hacker Quarterly
Hack Canada - anything can be cracked when it's forty below
the spartan horse - Test It
Directory of /pub/ADM
Cult of the Dead Cow Back Orifice Backdoor
DigiCrime, Inc.
EC-Council | 312-50
EC-Council | Certified Ethical Hacker Certification
Silicon.com - 'Nigerian' money scam: What happens when you reply?

encryption

GNUPG - The GNU Privacy Guard
National Cryptologic Museum
CodedDrag
Steganography & Digital Watermarking
Voicecrypt Web Site
Directory of /pub/crypto/pgp/pgp60
Tiny IDEA Encryption Program
PGP-Users Mailing List Home Page
The International PGP Home Page
NovaStor - Backup, Encryption, AntiVirus and Data Interchange
Canadian Strategy
Distributed Authentication in Kerberos Using Public Key Cryptography
Niels Ferguson list of publications
RSA Laboratories | Cryptography FAQ
OutGuess - universal Steganography
The Alice and Bob After Dinner Speech
The Zimmerman Note
SSL analysis from counterpane
[SSL-Talk List FAQ] Secure Sockets Layer Discussion List FAQ v1.1.1
[SSL-Talk List FAQ] Secure Sockets Layer Discussion List FAQ v1.1.1
WEP weaknesses
White Paper: hComments on "An Initial Security Analysis of the IEEE 802.1X Standard"
WEP additional weaknesses
Handbook of Applied Cryptography
WW II Codes and Ciphers
Handbook of Applied Cryptography
WW II Codes and Ciphers
Retrobeep - the computer museum at Bletchley Park
BletchleyPark - Station X
Why Johnny Can't Encrypt
cryptographie militaire
Cracking DES: Secrets of Encryption Research, Wiretap Politics, and Chip Design
Polyalphabetic substitution
Fred Cohen & Associates
spammimic - hide a message in spam
JavaScrypt: Browser-Based Cryptography Tools
SourceForge.net: Project Info - WinPT - Windows Privacy Tools
KerbCrack
CrypTool - Homepage
SNEAK: Snarkles.Net Encryption Assortment Kit
WWII crypto machines
Kryptos sculpture
Enigma Simulator
ECC patent
UofW crypto course
AES

comseced

Stay Safe Online | Home
Consumer Information Security - Federal Trade Commission
Presentations
Awareness
Talisker Computer Security Advice For The Home User
MailFrontier Phishing IQ Test
Posters for Security Awareness Training & Education
archive of computer security presentations
Microsoft Support WebCasts
Cisco Seminar Series

Forensic programming

Authorship analysis Kraul/Spaf
Authorship Analysis: Identifying The Author of a Program - Krsul, Spafford (ResearchIndex)
Andrew Gray's Software Metrics (Including Authorship Analysis) and Neural Network/Statistical Modelling Page
Index
Last Fravia's mirror of Reverse code engineering
Last Fravia's mirror of Reverse code engineering
Documentation for disassembler writers
Dave Dittrich
LC Technology International, Inc. Home Page
New Scientist
IJDE
Digital Forensic Links
Digital Evidence: Standards and Principles, by SWGDE and IOCE (Forensic Science Communications, April 2000)
Transform / DeCompilation
Protools - Decompilers
Decompilation of Binary Programs - dcc
REC Decompiler Home Page
Ralf Brown's Files
Jon Kirwan: PC Assembly Programming/Where to Get PC Assembly Tools
Last Fravia's mirror of Reverse code engineering
Intel Architecture Software Developer's Manual, Volume 2: Instruction Set Reference Manual
On-line Intel Documentation
Re-engineering Scientific Credit in the Era of the Globalized information Economy
CCIPS SEARCHING AND SEIZING COMPUTERS
NASM-IDE, NasmEdit and S-Library homepage
Computer Simulators
A Beginner's Nasm Page
NASM Manual
Jeff Duntemann's Assembly Language Books and Links
Softpanorama Assembler is not for Dummies Page
Jon Kirwan: PC Assembly Programming/Where to Get PC Assembly Tools
The UK Patent Office - About Us and Policies - Consultation Paper
Responsible Use of Information Technology at BCIT
Antiword: a free MS Word document reader
Text Editor - HEX Editor - HTML Editor - Programmers Editor - UltraEdit
Shellcoding for Linux and Windows Tutorial
The Art of Disassembly

glossaries

NETSYS.COM - Security Glossary
Security Glossary | Security documentation
Welcome to the MSDN Library
PGP Security - Glossary
RFC 2828
Security Glossary of Terms
Mitre Security Glossary
Sun Security Glossary
ISU Draft Comprehensive Information Assurance Dictionary
Corporate Computer Consultants Ltd Information Security Jargon Buster at www.CCCL.net
President's Commission - Critical Infrastructure Assurance Office Glossary
ISU Security Publications
ISU dictionary
More glossaries online , 12/05/01
National Information Systems Security (INFOSEC) Glossary
Hacking Lexicon
Hacking Lexicon
<draft-shirey-security-glossary-00.txt> attached
OASIS security glossary (pdf)
BABEL: A Glossary of Computer Related Abbreviations and Acronyms
security glossary by DigitalGuards
Security Glossary - Lynn Wheeler
Rob Slade's Security Glossary
Rob Slade's Security Glossary

LIE

email tampering - Suni Munshani v. Signal Lake Venture Fund II, LP, et al., Massachusetts Superior Court, Civil Action No. 00-5529 BLS
RFC 2350 Expectations for Computer Security Incident Response
Ethics and Information Technology
Lawful Access – Consultation Document
Home of the Digital Forensics Information Network
Welcome To Joel A. Wuesthoff JD, CISSP
Privacy & Human Rights 2002
Privacy & Human Rights 2002
Department of Justice Canada
Prime Curios!: 48565...29443 (1401-digits)
DeCSS, JILT 2002 (3): Guadamuz
ID Theft: When Bad Things Happen To Your Good Name
Centers for Medicare & Medicaid Services
THE LEGAL FRAMEWORK
The Frontiers of Privacy and Security: New Challenges for a New Century - 2003 FOIPP Conference
GIAC: Global Information Assurance Certification - GIAC Code of Ethics
Online Ethics Center: NSPE Case 92-6: Public Welfare -- Hazardous Waste
C Y B E R C R I M E
Tom's Hardware Guide Mass Storage: IDE Training Course, Part 1: A Detailed Look at the Basics and Technology - Introduction
EPIC Bill Track - 108th Congress Privacy and Cyber-Liberties Legislation
Spam Laws
Home Page - Privacy Commissioner of Canada
Privacy Legislation - Privacy Commissioner of Canada
The European Union Directive on Data Protection
Zeichner Risk Analytics LLC
International Association of Privacy Professionals - IAPP
Microsoft TechNet
Creating a Computer Security Incident Response Team: A Process for Getting Started
FORENSICS.ORG
SecurityFocus HOME Infocus: U.S. Information Security Law, Part 1
Antiword: a free MS Word document reader
catdoc and xls2csv - free MS-Office format readers
FORENSICS.ORG
GROKLAW
Pew Internet and American Life Project
IOCE - Guidelines for Best Practice in the Forensic Examination of Digital Technology
NLECTC JustNet-Law Enforcement Links
knackit.net :: every 0 makes a difference
SourceForge.net: Project Info - Open Source Computer Forensics Manual
Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations (July 2002)
The Guide - Privacy and Security on your PC Part I
Knoppix STD
Office of the Information & Privacy Commissioner
Rahmenlayout Schüler STM Homepage
Cybercrime Law
EUROPA - The European Union On-Line
Privacy Commissioner of Canada / Commissaire à la protection de la vie privée du Canada
OIPC
IPC - Information & Privacy Commissioner of Ontario
Office of the Information & Privacy Commissioner
Putercops.org
[strike out]
Privacy International - Country Archives
USA PATRIOT Act (H.R. 3162)
Digital Forensic Research Workshop - Bringing together the digital forensics comminity [Home Page]
SB 1386 Senate Bill - CHAPTERED
Consequentialism - Wikipedia, the free encyclopedia
Ethics - Wikipedia, the free encyclopedia
ForensicsWeb :: Forensics Web - Technology investigation & forensics.
ID Fraud Home Page
Federal Trade Commission - Your National Resource for ID Theft
The 2001 Daftas Longest Email Disclaimer | The Register
Personal Information Protection and Electronic Documents Act
Scientific Working Group on Digital Evidence
United States Secret Service: Best Practices for Siezing Electronic Evidence
Tracing Emails
Childfind and Cybertip.ca/Cyberaide.ca Splash Page
EU approved clauses for international data transfers
"Forensic Discovery" by Farmer and Venema
Guide to Digital Investigations

magazines

INFORMATION SECURITY Free Subscription Form
Index of /Cipher
2600: The Hacker Quarterly
SC Magazine On-line
JCS Home Page
ACM: ACM Transactions on Information and System Security
ICSA Information Security Magazine
Ethics and Information Technology
SECURITY Magazine
ICSA Information Security Magazine
Information security Digest
Security News Portal - A Different Kind of News
Security Pipeline
Infosecurity Today

mailing lists

Cipher - Newsletter of the IEEE CS TC on Security and Privacy
PRIVACY Forum
Security Mailing List Archives
Bugtraq mailing list archives
RISKS-LIST: RISKS-FORUM Digest
Crypto-Gram Newsletter
Cipher: The Newsletter of the IEEE Computer Society Technical Committee on Security and Privacy
Internet Security Systems, Inc. : X-Force
NTBugtraq - NTBugtraq Home
Information Security Zeitgeist
Full-Disclosure Information
RISKS Info Page

NT security

Windows NT Frequently Asked Questions (FAQ)
NT Security - Frequently Asked Questions
NTBugTraq - NTBugtraq Home
NT Exploit(ed) Page
NT Configuration Guide for the Paranoid
NSA/Windows NT Security Guidelines
Nessus for WindowsNT
Nomad Mobile Research Centre - NT Files
ISS – Internet Security Systems
Windows NT Killer Utilities
Russ Cooper's NT Fixes Status Page
Offline NT-password-utility
Secure Windows NT Installation and Configuration Guide
Green Bullet Home at MIKO s.c.
Utilities for Windows NT
eEye™ Digital Security
NT Security - Frequently Asked Questions
NT Security - Frequently Asked Questions
Next-Generation Win32 exploits: fundamental API flaws
Scott Schnoll's Internet Explorer Security Center
Microsoft Baseline Security Analyzer
Windows XP Security Checklist from LabMice.net
IEBUG News
BasicSec.org | Security and Privacy for Regular Folks

ops

Microsoft Baseline Security Analyzer
BasicSec.org | Security and Privacy for Regular Folks

Physical security

SECURITY Magazine
Deborah Quilter's RSI Web Site
IBM physical site (computer room) planning
EBIOS risk management info and tools

Fire

Talking Sense About Foam
Howstuffworks "How Fire Extinguishers Work"
Fire Safety and Fire Extinguishers in a Chemistry Laboratory

Handbook of Forensic Services: Evidence Examinations--Crime Scene Search (1999)
RCMP - TSB
FEMA: Are You Ready? A Guide to Citizen Preparedness
Master-Keyed Lock Vulnerability
Rudimentary Treatise on the Construction of Locks
Master-Keyed Lock Vulnerability
FM 3-19.30 Table of Contents
Howstuffworks "How Lock Picking Works"
IntelCenter
FM 3-19.30 Table of Contents
The Art of War
9-11 Commission Final Report

Security agencies

(ISC)2 Reference Materials
SecurityFocus
CERT Coordination Center
SANS Institute Online - Home Page
Cissp.com The web portal for the certified information systems security professionals
CISSPworld (www.cisspworld.com)
CISSPworld CA (www.ca.cisspworld.com)
About the CERT® Coordination Center
C S R C - Computer Security Resource Center
CIPS Vancouver Security Special Interest Group
ICSA
COAST
The United States Navy INFOSEC Home Page
Office of the Director of Central Intelligence
Central Intelligence Agency
CIA Directorate of Intelligence Homepage
DS&T Main Page
The Intelligence Community
Center for the Study of Intelligence
Central Intelligence Agency - Electronic Document Release Center
DIA HOME PAGE
National Security Agency
U.S. Navy: Welcome Aboard
Access Denied
Air Force Command Section
MarineLINK
WELCOME TO NIMA's PUBLIC HOME PAGE
National Reconnaissance Office
Federal Bureau of Investigation Home Page
U.S. Department of Energy Home Page
Canadian Security Intelligence Service -- Service canadien du renseignement de sécurité
ITS Home
TECHNICAL SECURITY BRANCH - Homepage
Encyclopedia
National Infrastructure Protection Center (NIPC) - CyberNotes
CCITS Home Page - Canadian Centre for Information Technology Security
National Infrastructure Protection Center (NIPC) - Home Page
IATRP Home Page
CASPR Home-Page Commonly Accepted Security Practices & Recommendations
SCI: InfoSec Certification FAQ
Government Security Policy
Government Security Policy
Security Policy - Policies and Publications
Information Technology Security Standard
OCIPEP - Public Communications
OCIPEP - Critical Infrastructure Protection
IFCC 2001 fraud report
Science and Technology - Information Security Committee
FTC Issues Financial Information Safeguards Rule
CSORT - Chief Security Officer's Round Table
Draft Publications
IJDE
NCIX - One Evil
Network Security from the Pros
Science and Technology - Information Security Committee
53 Questions for Developing the National Strategy to Secure Cyberspace
CIPS Vancouver Security Special Interest Group
www.phrack.org
Welcome to InfraGard
National Crime Squad, Combating Serious and Organised Crime
Electronic Crimes Task Force Website
NIST Computer Security Special Publications
Draft National Strategy to Secure Cyberspace
Information Security Forum
UNITED STATES INTELLIGENCE COMMUNITY
RCMP - TSB
Internet Fraud Complaint Center
C4I.org - Computer Security and Intelligence
R.U.N.S.A.F.E.
Computer Security
Welcome to the Society for the Policing of Cyberspace (POLCYB)
Community Ed in security
Computer Security
R a i n F o r e s t P u p p y
IASE Public Home Page
CompTIA Security+ Certification - Welcome to Security+
About CSE
Manuals
RCMP TSSIT
(ISC)2 Canada public CISSP directory
US Cyberspace security strategy
2003 FISSEA Conference - homepage
Home Page - Privacy Commissioner of Canada
Pew Internet and American Life Project
Security Tools
Security Scene Errata - Charlatans
MI5 > Home
ISSA - Vancouver
Federal Trade Commission - Consumer Information Security
Organization for Internet Safety
ISECOM - Institute for Security and Open Methodologies
OpenCSOProject.org: The Ultimate Resource for Aspiring Security Professionals
ISSPCS: The International Systems Security Professional Certification Scheme
Treachery Unlimited: A Computer & Network Security Information Site
Office of the National Counterintelligence Executive-What's New Section
NIST Computer Security: Federal Information Processing Standards (FIPS) page
United States Secret Service
How many CISSPs are there?
Navy Info Assurance Tips
Committee on National Security Systems (CNSS)
Open Information Systems Security Group
CERT Virtual Training Environment Library

sec arch

The ISO17799 Security Newsletter
In-Depth Review of the Bell-Lapadula Model
TCPA / Palladium FAQ
Common Criteria Project -- HomePage
Common Criteria
Multics Home page
NIAP - NATIONAL INFORMATION ASSURANCE PARTNERSHIP ®
Common Criteria, Parts 1-3
The Common Criteria Home Page
CC - Common Criteria for Information Technology Security Evaluation

sec man

The ISO17799 Security Newsletter
GASSP Home Page
Common Criteria Project -- HomePage
Common Criteria Validated Products List
GASSP Version 2
CobiT: Download the Executive Summary, Framework, and Control Objectives
NIST Computer Security Special Publications
Special Pub 800-12 -- An Introduction to Computer Security: The NIST Handbook
The CISSP and SSCP Open Study Guides Web site
Common Criteria, Parts 1-3
SANS Institute - Security Policy Project
Privacy International - Stupid Security
Rudimentary Treatise on the Construction of Locks
On the discussion of security vulnerabilities
CobiT: Download the Executive Summary, Framework, and Control Objectives
ISECOM Open Source Security Testing Methodology Manual
Handbook AS-805, Information Security
CobiT: Download the Executive Summary, Framework, and Control Objectives
rfc1244 - Site Security Handbook
Simtel - DownLoad: b4all130.zip
Risk Support index
NRIC - Network Reliability & Interoperability Council
NRIC Best Practices
Internal Audit: Resources for Internal Auditors
Threat and Risk Assessment Working Guide (ITSG-04)
Common Criteria - Developers - Official CC/CEM versions
fault-tree.net Selected Readings on Fault Tree and related analytical methods.
COSO
Security Officers Management & Analysis Project
Schneier on the psychology of risk assessment
Schneier on the psychology of risk assessment

telecom

COTSE-IP Tools
net stumbler dot com
Commonly Probed Ports
alt.spam FAQ or "Figuring out fake E-Mail & Posts". Rev 19991122
Media Awarness Network - The Three Little Cyber Pigs
RE: SPAM: SPAM and the Internet
SRI/CSL's: Intrusion Detection Page
The WWW Security FAQ
Intro to IPsec
CERIAS - Security Trends
NIST on wireless security
Warchalking || Warchalking Legality FAQ
RFC 1492 - An Access Control Protocol, Sometimes Called TACACS. C. Finseth.
The Attacks on GRC.COM
HoneyNet Project
The Distributed Reflection DoS Attack
Guidelines on Internet Access for Children and Parents
FAQ: Teergrubing against Spam
Internet Storm Center
Home Network Security
Internet Tutorial
SANS / FBI The Twenty Most Critical Internet Security Vulnerabilities
FBI Publications - A Parent's Guide to Internet Safety
Guidelines on Internet Access for Children and Parents
SafeKids.Com Home Page
Web Wise Kids - Provides Internet Safety program for Adults & Children
AT&T Fraud Education: At Home
Bloomba
Top 75 Network Security Tools
Web Security Field Guide by Steve Kalman
Pew Internet and American Life Project
Washington Internet Project
Free Firewall Software for Windows - download
Loaf
Marcus J. Ranum
WormRadar
Tracing Emails
MailFrontier Phishing IQ Test
IMlogic :: Instant Messaging Infrastructure
Stupid Email Disclaimers

vendors

Riptech
Zone Labs
Gibson Research Corporation Homepage
Cerberus Information Security, Ltd
ASR Data
data recovery
Counterpane Homepage
Gibson Research Corporation Homepage
Ontrack Data International, Inc. - Data Recovery, Software, Computer Evidence Services
Fred Cohen & Associates
ArcSight - Security Management for the Enterprise
Clearswift
Computer Associates
Corbett delivers network security and information security services.
DataSec Limited
Ernst & Young - Global Home
Guidance Software - Home of the world's leading computer forensic solutions
Welcome to Integralis
Computer Forensics - NTI Training, Tools and Consulting
PentaSafe Security Technologies, Inc. The safest way to grow your business.
QinetiQ
Sanctum Inc. - Save Your Site
savvy data
SilentRunner - Information Rules. Protect Yours.
TheTrainingCo. Techno-Security Training Website
TLSI Inc. - Electronics Solutions Worldwide
Vogon International
Web services security ::Vordel::
WetStone Technologies, Inc.
RDA Homepage
LaBrea - The Tarpit
Technology Section - Virtual Matrix Encryption | Meganet Corporation
IntelliRecovery- Global data recovery services company specializing in hard disk & hard drive recovery
IntelliRecovery- Global data recovery services company specializing in hard disk & hard drive recovery
cansecwest 2004
Security Volition
Ad-aware - Software - Lavasoft
The home of Spybot-S&D!
SpywareInfo :· Spyware and hijackware Removal Specialists
Webroot Software Inc - Home Page
Spyaudit
www.comparespywareremovers.com
Spyware Remove :: Spyware Remove Deletes all Spyware From Your Machine. FREE DOWNLOAD
SpyKiller - The #1 Rated SpyWare and AdWare Killer for your PC!
OmniPass Enterprise Edition
University of Fairfax
Security University
Data Recovery Centers
Data Recovery, Computer Forensics, Raid Data Recovery and Hard Disk Data Recovery by Ibas
InfoDev-Security.net
Amenaza Technologies Limited | Home
Security Risk Assessment Software Tool - Relational Security
Computer Forensics Training, Computer Forensic Investigation, Computer Forensics Houston - CyberEvidence, Inc.
SearchSecurity.com's Security School

Web info grabbers

Analyze Your Internet Privacy
The Limit Software, Inc.
The Consumer Information Organization's Consumer.Net.
Privacy Analysis of your Internet Connection
Fat-Free Software News
Shields UP! -- Internet Connection Security Analysis
E-Soft Inc.
Security Space
eEye™ Digital Security
MC2 Security Wire Computer and Network/Security Solution, hacking, operating systems, virus information and more!
COTSE-IP Tools
network tool v2.41
DSL - DSLreports.com - the place for BROADBAND
HACKER WHACKER Remote Computer Network Security Scan
Online Security Check
Security Space
Anonymizer.com - Test #1: Your Unique IP Address

CIAC Internet Hoaxes
RISKS-LIST: RISKS-FORUM Digest
SecSIG - WWW DEC Notes Server on MUKLUK
SekOrg Security Library
The Center for Democracy and Technology
Books on the Social Aspects of Computing
Experimental Interaction Unit
TECS: The Encyclopaedia of Computer Security
Computer Security - Suite101.com
L0pht Heavy Industries Security Advisories
Ph thesis by Suzana Stojakovic-Celustka
Security Search - The Security Search Engine
s e c u r i t y f o c u s
Common Vulnerabilities and Exposures
Pueblo High Tech Crimes Unit - Slide Shows
attrition.org
Perspectives of the Smithsonian: Smithsonian Computer History
Security Solutions Online Presented By Access Control & Security Systems Integration
IT Crime - IT Security and crime prevention methods
Security Information
Security Tools
Security News
Handbook of Information Security Management:Introduction
Security Publications from Other Organizations
Rainbow Series
Information Security Resources
Publications
Frequently Asked Questions (FAQ)
Whitepapers
Wiretapped - Computer Security Software etc.
The Security Writers Guild
Common Vulnerabilities and Exposures
ICAT Metabase: A CVE Based Searchable Vulnerability Index
SecurityPortal - July, 2001
SecurityPortal - July, 2001
Linux Security - The Community's Center For Security
Microsoft TechNet
rain forest puppy - choose your skin
@stake Research Labs - Advisories
Scott Schnoll's Internet Explorer Security Center
Certificate in Internet & Technology Security at UBC Continuing Studies: Computers & Technology
s e c u r i t y w a t c h . c o m
Security books by Chuvakin
Books on the Social Aspects of Computing
Censorship in action: why I don't publish my HDCP results
The SANS Security Policy Project
Fact Squad
Home Network Security
Access Control Journal Papers
CCCL's collection of information security and computer audit web resources at PowerFavorites
Information Security Education Resources for Professional Development
The Ideahamster Organization - About The Open Source Security Testing Methodology Manual
COAST Library (23-Feb-1998)
SecurityFocus home columnists: A Certified Waste of Time
Try2Hack
IA-CMM
Introduction to Computer Security
Nessus
SecurityFocus home tools archive
NSS Group - Europe's foremost independent network testing facility, security and consultancy organisation
Distributed Denial of Service (DDoS) Attacks/tools
SANS Reading Room: Home and Small Office Computing
IWS - The Information Warfare Site
2002 Report of the Auditor General of Canada - April - Chapter 3 - Information Technology Security
EUROPA - Internal Market - Data Protection - Third countries: Canada/FAQ
Symantec Security reference handbook
Hacking and Hackers - Computer Security Programs Downloading Search Engines Portal News
Security | Sage
Network Security Library
Whitehats Network Security Resource
Security Search
Cracking the hackers' code - smh.com.au
Next-Generation Win32 exploits: fundamental API flaws
CyberSmart! : Home
RobertGraham.com Infosec Publications
Illustrative Risks compendium
NetDay Cyber Security Kit for Schools
Handbook of Information Security Management:Table of Contents
TEMPEST 101 - Debunking the Myth
Top 75 Network Security Tools
Summit Training
Security Awareness Graphics from Interpact's Artists
concepts - security clipart - Clip Art Directory
Security Awareness Posters by Native Intelligence
Summit Training
CISSP Study Guide
Les Bell and Associates Pty Ltd: Security Tech-Notes and White Papers
Personal Page - Dan Houser, CISSP
Guidelines on Internet Access for Children and Parents
History of Computer Security
Computer Security Day
InfoSecByte!
BasicSec.org -- Tools and Resources
A Taste of Computer Security
OpenCSOProject.org: The Ultimate Resource for Aspiring Security Professionals
Talisker Computer Security Advice For The Home User
Security Engineering book online version
CISSPforum FAQ


Book reviews main topic menu

Recommended security books by domain menu

Virus information main menu