No information is available for this file.
fbd56f3eabbca3a10dca1bbefbe109f686660529eb9dd1762a91164d5fec52ca
No information is available for this file.
d42519d162985b9ecdfb0d4debe5ac768b8af2f1c65120686a081ffccf4e51af
No information is available for this file.
c91bd52d2390731d121fdc3c4c461c6c9cc45b0b057c62dcb63f808f0217842b
99 of the Technologies (hardware, software, networking), Companies, Internet Businesses and Policies, People, and User Strategies that you should watch and/or get involved (or avoid) in '99. Internet Week Magazine.
368abed37d29665cf18c7d8d1bb2eb4bee1b67cc1c3f06fab578b1d883c1548d
"An anatomy of a fairly easy attack" - a very informative, concise outline of the penetration aspect of an external security audit.
d5aa957938c6f7c95d0307972c7105cf4ea8ae24f96f024c12fde2e6c4a92990
Complete archive of the excellent threads recently posted on the BugTraq mailing list regarding Intrusion Detection Systems. IDS theories, implementations, problems, and reviews of commercial products are among the topics covered.
386afb1848dbd2cc1c596aad069812c23a7a3372405c5cc3f46fc936d33430a8
Computer_Security_Evaluation_FAQ,_Version_2.1
0bcae62d6a629049ed20fd91841a8397e3b934c43053d27c122022f1ec95e75c
computer-security_anonymous-ftp_FAQ
3cf04cfcaee28a844d50b2582a2b35436669e8d825c5c70c94514ad0def42c26
computer-security_compromise_FAQ
c401bbee11812eb37ef8d6a58ccc25fe0e3db5c4c875ced7a1ed4a94fd146632
computer-security_secmaillist_FAQ
7da20f271be84d322b5639a9318c34e25d1b3385bb0e6ce3c155f1dfa91585c0
computer-security_security-patches_FAQ
9cb2625fee10641c7c708d2948e77fb076cb9fab7c7d02c343ab5e33c0f4c021
computer-security_sniffers_FAQ
0a459c20a38a6c03de38d94216040e120add316a5699d7abb9c8106bf617316f
computer-security_vendor-contacts_FAQ
db5ea6231b37b846189e632123b6f952737e65acf073b6410748bbea4fa15e63
computer-security_Windows_NT_Security_FAQ
2ce47692a1e95a1196fec33741f69f838e7cb0a1a9be6ba1662934b9ef4a1545
Cyber UL - "Paper discussing the way computer security systems are rated and how out of whack these ratings are from reality. Maybe a system based on the ratings the UL uses for alarm systems and safes makes more sense."
2fb5fdc74087f7f16ef45a10719b228a3b3baeb8530c0c9b54dd15051e5c3589
deception.toolkit.faq.980311
abf23f604388335ffb004dc10928a798e3e48fe2ad27f5318169d4c503fca515
"Is U.S. Ready for Cyberwarfare?"
94c17b9411412fd3399fc644664cbc91f708919944a2fbbd9fd0eca7bd50a6e1
"Security - Hacking Methodology" - A paper that attempts to analyze "hacking" as an operations research problem with a mathematical foundation.
ef436aa5b8ba8bb01f60ce1ca7cc2b6fb9ee2ffcd87cd0c59238e9e38aad6350
HP-UX: A Security Overview, Part One - Excellent whitepaper on HP-UX security, covering many of the basics.
0e6015efeb1e3a835053ad73aa39fb6026d7aea92f7eb3ccc5603d698e336eb9
HP-UX: A Security Overview, Part Two - Excellent whitepaper on HP-UX security, covering many of the basics.
197e48faee242eb217237480a25b7518dfeef6bafaf0cca8af83a25e810f4238
An details
ff13b079650c758cc922993e49eac1f39a9e058ac44fba765d7e37ec5bdf5f9f
No information is available for this file.
f9da8b2449f53fab086c7f03cdaf81db1295ad622b80dc65317787d2c62ab97c
"Another Paper on Linux Security" - Yes, another whitepaper on Linux security. This is a good place to start reading when you decide to get serious and lock down your Linux box.
264893901e6700713f0aeeb79f23824ca7ecd4d76d79aaaf6a805719cee007ce
No Security is Bad Security - Very interesting and detailed description of the consequences faced when security is ignored, and general precautions that should be taken to improve computer/information security.
0add6ad843909292495d9e072e84afe96807a2bde1d815e1922523c050d1b3db
"Part 1 of 3 : Understanding Risks In Networked Systems" - Whitepaper in a series about "Understanding Concepts In Enterprise Network Security And Risk Management". Includes information about common remote security hazards, impact of effective information gathering, identifying security risks present, tools and utilities, vulnerability listing for common TCP, UDP, and RPC services, and much more.
bd18274d78b416bad7186e8b9ba985dd18da395d9b9cda90fab66b7cd2c486fa