AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determening which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.
0eb1a79e5e0b96f876033310ee047535
iss.99-08-23.oracle_8_ii
55442a7332ef566e8ea7ebd5fc3f3a45
iss.99-08-23.oracle_8
c56b48f430aaa41dee1a2d355840fa45
iss.99-08-23.lotus_dos
a5a311167f7bae5b555d992e2df64d64
iss.summary.4.6
80db8dc674ff11b0e2262c03b47b23f9
No information is available for this file.
463e3c904fbf43efc726603e3fb7bd72
An interesting interview with Aleph One, the moderator of the BugTraq mailing list.
43c6f4f90eea44f40b7b3473c2eb6047
Stay anonymous on the web - How to maintain your anonymity on the web.
f258f2f0594f37747ee77d54570cec9a
No information is available for this file.
11b83e05ea194b94d1e6ead92ae0d19f
Text about hacking from your web browser by checking the PHF bug and some CGI bugs.
7cb969458fd0637495077cab9e8695b3
No information is available for this file.
1ec369d5d0b7dcd7b797798e788ec243
No information is available for this file.
37d5a7f67f80896d58235100b06503c9
No information is available for this file.
720e42c2b4434577b0ead888174c7c27
No information is available for this file.
c2240bf1bb97bee494c592182cf72d71
"Cyber-Christ meets Lady Luck" - With DEFCON is, read this excellent chronicle of Winn's trip to DEFCON II in Las Vegas.
fbeae57ac574e0ff1689c5595b2e491b
"Cyber Christ Bites The Big Apple" - We couldn't post Part I of the Cyber Christ series, HOPE (Hackers On Planet Earth) in New York City on August 13-14, 1994.
de24524d8e5fd6ab19fa79b787123bb8
No information is available for this file.
86c46667d109c84fb05ee257d8c39741
No information is available for this file.
710ee6c0cab46bf389e7a1ecbe51c846
Interesting text explaining how to cover your tracks when you leave the system.
4a2e105548abea403482893d5f03dd68
No information is available for this file.
5265f683ee20b581c656737f057e658d
Defunct IPs can be used to over ride restrictions set by proxies.
d7d6dc474001a2146daadc3614878b76
The complete text about very old old Denial Of Service Attacks - Contains info on the following attacks: Finger, UDP and SunOS, freezing Xwindows, malicious use of UDP services, attacking with lynx clients.
680613f88b0ffff7812c9cf31f15ba66
No information is available for this file.
3ca3f0f2ed0cab36501f7fc045e46ca0
No information is available for this file.
a0b79b186373469ce1ffd24ca770e2e1
Interesting and well thought out rant sent in by Anonymous.
d8fef91f6404b31ba1df5bb2a3cdcb90