exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 37 RSS Feed

Files

auditool.txt
Posted Aug 17, 1999

1991-04-16 Summary of the Trusted Information Systems (TIS) Report on Intrusion Detection Systems

tags | paper
SHA-256 | 19413a68af48a59badc7f1c5e05b723c779be1d0727cbb7a5fbfd57fbb2899d5
stewart.ps
Posted Aug 17, 1999

1992-11-08 Potential Liabilities of Computer Security Response Centers

tags | paper
SHA-256 | 3e6d58efc67dd5c9663d74fc5959d67e4aed6cc8cfa31ef99181d18f704e2dad
tempest.txt
Posted Aug 17, 1999

1990-06-06 Eavesdropping on the electronic emanations of digital equipment, by C. Seline

tags | paper
SHA-256 | 74cecca0e78151f4c0a17e292f4c7f7c547d7cd3cbfcdeef4ac6a1c9b0f2b57b
terms.ps
Posted Aug 17, 1999

1993-02-26 Foundations for the Harmonization ofInformation Technology Security Standards

tags | paper
SHA-256 | aa716e8462f1186a03f9a42cb2ca1dad7a97dd21fb332b2b96eea0e56f5ba852
tr993.ps
Posted Aug 17, 1999

1992-12-07 "The COPS Security Checker System"

tags | paper
SHA-256 | 79fdf8758d6c40f680946c446e094038d670b315811e836c394ba44598e3617c
tr994.ps
Posted Aug 17, 1999

1992-12-07 "Are Cmputer Hacker Break-ins Ethical"Eugene H. Spafford, Purdue

tags | paper
SHA-256 | 6424ef6d0f3270fb0e8d3c4ce309f69a6932ca8adf7d95a9458b68139e7d6df7
unix_security_checklist.txt
Posted Aug 17, 1999

1995-12-19 AUSCERT UNIX Computer Security Checklist (Version 1.1)

tags | paper
systems | unix
SHA-256 | ba663874a112c5fb30101b4bcc3702f4814775109d3f52cbc6255bbad9d352e3
kerblim.ps
Posted Aug 17, 1999

1992-12-08 "Limitations of the Kerberos Authentication System" Steven M. Bellovin & Michael Merrit, AT&T Bell Labs

tags | paper
SHA-256 | 7600aaf625d22ca09b5074a7ce5d0504da19e0122eb1c3d7b172b4475dc8adb1
laws-for.wp
Posted Aug 17, 1999

1994-03-01 ID & analysis of foreign laws & regs. pertaining to the use of commercial encryption products for voice and data communications

tags | paper
SHA-256 | d2d90d375988d8b174942ddfde3b2e5809cdb574e282a3e6bc5c1fe6fe3dfd8f
laws-us.wp
Posted Aug 17, 1999

1994-03-01 review and analysis of U.S. Laws, reg.& case laws pertaining to the use of commercial encryption products for voice and data communications

tags | paper
SHA-256 | 0846e1fc4eefd4672569a8435021a68c1d213731142165ee5004dbd4c7e64a17
ncsc_etl.txt
Posted Aug 17, 1999

1993-11-10 National Computer Security Center "Endorsed Tools List"

tags | paper
SHA-256 | 517856156b93697a5f3a9d274273e4f59b346f831fe539c1882565750b10a981
ncsc_oa.txt
Posted Aug 17, 1999

1993-11-10 National Computer Security Center "A Guideline on Office Automation Security" 12/5/86

tags | paper
SHA-256 | dc5e73209fd2a726fc7e5db195fada8c3e05d9fb5fb9449dd3264147ea3b1a7c
oarsec.ps
Posted Aug 17, 1999

1992-12-08 "OARnet Security Procedures" Kannan Varadhan, OARnet

tags | paper
SHA-256 | 99e437342c5da869cf2326c86d76da2561d6e195fbd57ded284fe53a95df8863
pktfilt.ps
Posted Aug 17, 1999

1993-07-20 "Network (In)Security Through IP Packet Filtering" by Brent Chapman

tags | paper
SHA-256 | 05be1ac4256ef2316c39ff07e7067d5753fd39e114cf5b0a5f41e04755185659
primer.ps
Posted Aug 17, 1999

1992-12-07 "Coping with the Threat of Computer Security Incidents-A Primer from Prevention through Recovery" Russell L. Brand"

tags | paper
SHA-256 | f790806a0b8ed078cfa1b5b9379dadb0ba3769539df4f2810bb1b06e098298dc
rfc1281.ps
Posted Aug 17, 1999

1992-12-07 "Guidelines for the Secure Operation of the Internet" R. Pethia, CERT, S.Crocker, TIS, and B. Fraser, CERT

tags | paper
SHA-256 | 3beef5292eefb6fa5616290c221aaace136190d4a26b5ceb195194230af51412
faq-k.ps
Posted Aug 17, 1999

1992-12-08 "Answers to Frequently Asked Questions About Today's Cryptography" Paul Fahn, RSA Laboratories

tags | paper
SHA-256 | 4d1e485a9433b72e688c8448519a6ee5c1f78dedeb91d236004f56468d7936f1
faq-sec.txt
Posted Aug 17, 1999

1993-02-10 Frequently asked questions on the USENET News groups, "comp.security.misc" and "alt.security"

tags | paper
SHA-256 | 15247d4b27063423c90047d85e2f0d0990afe4fe68228bdf4bfa44835882cacc
fedeli.txt
Posted Aug 17, 1999

1993-03-18 Organizing a Corporate Anti-Virus Program

tags | paper, virus
SHA-256 | 755ebe861aa018ae92b8327f5dc9a9fd1386e48071ec68bdc5516f6c2f8c58b0
form-irt.ps
Posted Aug 17, 1999

1994-10-18 Forming an Incident Response Team - Danny Smith, Austrlian SERT

tags | paper
SHA-256 | c8fff2d10900e1096fc99200510564a1a1bb4299f53b8df6679417e3acb2dbd0
fwalls.ps
Posted Aug 17, 1999

1993-07-20 "Thinking About Firewalls" by Marcus Ranum

tags | paper
SHA-256 | a2fbd0a3c2c6ea92d8a77701357cf5296f6ee83f39b717df3310469a23442821
gateway.ps
Posted Aug 17, 1999

1992-12-04 "The Design of a Secure Internet Gateway"

tags | paper
SHA-256 | f9b5104de8210146f3c409e1a05a6a4a42b9df29e872f67f23e5bf1a8f846114
guidance.txt
Posted Aug 17, 1999

1985-12-01 Suggested Actions & Proc. for Software Maintenance

tags | paper
SHA-256 | c609a91befc342ab2edc7f52c9bb0ee5533dd798c09288c67e1eb615924c579c
hacker.txt
Posted Aug 17, 1999

1990-06-04 The social organization of the computer underground, Thesis, G. Meyer, Illinois

tags | paper
SHA-256 | 4fd2e91cee2a52e8450fe85c8c799eea3c0ec7fc9465f1f28d881967fee92d90
hansen.txt
Posted Aug 17, 1999

1993-03-18 Legal Issues - A Site Manager's Nightmare

tags | paper
SHA-256 | fc9d456a9c27d265b6fb1029880e36ebffd26aed61540379405fbffc6503cdbe
Page 1 of 2
Back12Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close