Year 2000 Computer Viruses and Hoaxes - List of the approximate number of reports the CERT/CC has received on viruses and hoaxes that reference Y2K. There are also links to anti-virus vendors having Y2K virus and hoax web pages.
76945e53c71e450c6468224359a90fd3e3fd4372c3e8b036ef211eccd2994420
CERT Expectations During Y2K - "Cyber Infrastructure and Malicious Expectations during the Y2K Transition Period" discusses potential activities associated with Y2K and offers recommendations.
ae21eabdf7cf09db59fca3e2ba160447a1c6a2ef9b03e26b9ab42e6fde225b6a
CERT Y2K FAQ - Includes information to help sites determine whether a failure is Y2K related or an attack.
2380768c6451a4cfb53db684471538c198e1fe40f50bc442053724b576f7e573
CERT Quarterly Summary #5 - Currently exploited vulnerabilities include am-utils package and RPC vulnerabilities. Also has Y2K/security Information sources.
73d076a1d46e60bf08ea93291abe8457424ded6288f087e755102d8e05a0cbc9
Fwctl is a program that intends to make it easier to configure a tight firewall. It provides a configuration syntax that is easier to use and more expressive than the low-level primitives offered by ipchains. It supports multiple interfaces, masquerading and packet accounting. Fwctl doesn't replace a good security engineer, but it can make the job of the security engineer simpler.
374331b057718bb23ee61c904c9b8e9a394d3334af5e3ee44a0b97e5c2b623c2
SuperScan version 2.06 - "This is a powerful connect-based TCP port scanner, pinger and hostname resolver. Multithreaded and asynchronous techniques make this program extremely fast and versatile. Perform ping scans and port scans using any IP range or specify a text file to extract addresses from. Scan any port range from a built in list or any given range. Resolve and reverse-lookup any IP address or range. Modify the port list and port descriptions using the built in editor. Connect to any discovered open port using user-specified "helper" applications and assign a custom helper application to any port. View responses from connected hosts. Save the scan list to a text file. Transmission speed control. User friendly interface."
92c89d8f919b34f4668f0eee16d20d496d09e42b605c4d768c713e934368c296
Remote DoS attack in Symantec's Email protection in NAV2000. The Protection program leaves a pop server running on the local workstation NAV2000 is installed on, which is vulnerable to a buffer overflow in a long user name.
aaccfd8e405ec8b7ba562a2709ab7e65d5140e07269bdaa79017d2aff4dbcb5d
Windows / Dos CGI scanner (binary only) which checks for 65 remote vulnerabilities.
aedc3208c7a21b9e8a00fc2e2d7fb8b9fb39bfa9c14af7eedb1af8a4bb1e4f98