exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 161 RSS Feed

Files Date: 1999-10-01 to 1999-10-02

faq.txt
Posted Oct 1, 1999

Frequently Asked Questions on VIRUS-L/compvirus

tags | paper, virus
SHA-256 | 4b52313f35e3d742045819277d3c303dbb03bb0ed5fbec704526d91f08f0c5b2
farmer.txt
Posted Oct 1, 1999

Improving the Security of Your Site by Breaking Into It: Discussion of a number of commonly used attacks on UNIX systems, and how to check your systems for vulnerability to them

tags | paper
systems | unix
SHA-256 | 91575d495d1b3e2b463590766dd0e0d9decf8bbda0098a26dd02299032050ffa
fcvol1.ps
Posted Oct 1, 1999

Federal Criteria for Information Technology Security, Volume 1: The new "Orange Book"

tags | paper
SHA-256 | 91d70ede5e19abceb9d75f03f29ea485a6b0afbf947519ed1d199ecfad42c2a1
fcvol2.ps
Posted Oct 1, 1999

Federal Criteria for Information Technology Security, Volume 2: The new "Orange Book"

tags | paper
SHA-256 | b3e165a8eff1c6bde007885ac8f90edf9fafb8ca178214c906aed823f2abd8b8
ferpa.txt
Posted Oct 1, 1999

The complete text of the US Family Educational Right to Privacy Act (the Buckley Amendment), 20 USC

tags | paper
SHA-256 | 8a9b6e270a14bc31d97a6c93f5932f9596710164db08f7aec11d3ccd2141ae22
fips181.txt
Posted Oct 1, 1999

Standard for Automated Password Generator: Federal Information Processing Standard No 181

tags | paper
SHA-256 | 02952ef5f8c13c50eb6ce030fb7c7f1c01dd13574d86e18a35ba67c6136f1652
forensic.ps
Posted Oct 1, 1999
Authored by Gene Spafford

Software Forensics - Can We Track Code to its Authors? Viruses,worms,trojan horses,and crackers all exis tand threaten the security of our computer systems. Often, we are aware of an intrusion only after it has occurred. On some occasions, we may have a fragment of code left behind - used by an adversary to gain access or damage the system. A natural question to ask is ?Can we use this remnant of code to positively identify the culprit?? In this paper, we detail some of the features of code remnants that might be analyzed and then used to identify their authors. We further outline some of the difficulties involved in tracing an intruder by analyzing code. We conclude by discussing some future work that needs to be done before this approach can be properly evaluated. We refer to our process as software forensics, similar to medical forensics: we are examining the remains to obtain evidence about the factors involved.

tags | paper, worm, trojan
SHA-256 | 51ca864dc4ba5dabd2362150f8fd3492c354f24b3846f274e9535342ae6ff98b
frlaw.txt
Posted Oct 1, 1999

Information about the computer crime laws in France

tags | paper
SHA-256 | 1d886d56e35e42ebf29c68b4428e7aced7b46ef6cafb8c17fe4134757f2a2251
fuat.ps
Posted Oct 1, 1999

Security Breaches: Five Recent Incidents at Columbia University: A detailed account of five break-ins at Columbia University, and the steps taken to stop them

tags | paper
SHA-256 | 2feafb1c47fcd53a7d556a45badd13d69c04f6223800088fc3e67c73f0e5aa3e
fwalls.ps
Posted Oct 1, 1999

Thinking About Firewalls: A description of some of the considerations and trade-offs in designing network firewalls.

tags | paper
SHA-256 | 354e9098225cd71c585f2ae1f222a7df59e115bb0a5844f33feba7f2f7766af1
gatekeep.ps
Posted Oct 1, 1999

An Internet Gatekeeper: A description of how to construct an Internet firewall

tags | paper
SHA-256 | 671808d0a012bdfacec964ce161ff165a2fc9055011009556cd0724dab2ba474
greenbk.txt
Posted Oct 1, 1999

Green Book on the Security of Information Systems: A document that sets out the development of a consistent approach to Information Security in Europe, taking into account common interests with other countries.

tags | paper
SHA-256 | 6bba7e535a52a3ed4bd2e857d3e04ef255318bcaf6861df330b237ed20bf63fb
handbook.txt
Posted Oct 1, 1999

Site Security Handbook - RFC 1244: The product of the Site Security Policy Handbook Working Group of the Internet Engineering Task Force

tags | paper
SHA-256 | 6e39442e679f0ad24c62d14bf04440c4c84b44a9e9837f03bf71cf161ed4c17e
holland.ps
Posted Oct 1, 1999

Computer Break-ins: A Case Study: A study of multiple break-in attempts at Vrije Universiteit in Amsterdam

tags | paper
SHA-256 | e6d02e3a0fd550ee1247757d53e59b8cf26e8af72d363ffca0dc5307195dd7a0
horses.ps
Posted Oct 1, 1999

Horses and Barn Doors: Evolution of Corporate Guidelines for Internet Usage: A description of how Intel Corp's Internet usage policies were developed.

tags | paper
SHA-256 | 0c9cf01eae7b116a04dad028cc5069300632ba32ec63eeecf157dff031d6f4b9
ident.txt
Posted Oct 1, 1999

Identification Protocol - RFC 1413: A description of the Identification Protocol, a means to determine the identity of the user of a particular TCP connection

tags | paper, tcp, protocol
SHA-256 | 02347bfce69a6303df9e02a554abd0bca82e25e751243d7c950ae3d61dedcf9b
internet.txt
Posted Oct 1, 1999

Guidelines for the Secure Operation of the Internet - RFC 1281: Provides a set of guidelines to aid in the secure operation of the Internet.

tags | paper
SHA-256 | 5d0a6db1a5cde0c7608453b7a8f8107a1edbb8805e5fffa26f876ce9b2f5f224
isoc94.ps
Posted Oct 1, 1999

A Network Perimeter With Secure External Access: A description of the firewall in use at whitehousegov

tags | paper
SHA-256 | 2a0f0711b46a6fae3725b69d6340fabe2aa888202189559596ef0f5b0fc9a166
itsec.txt
Posted Oct 1, 1999

Information Technology Security Evaluation Criteria: The European "Orange Book".

tags | paper
SHA-256 | 47b4843b69ff9cbc8f110c8acbd01ed2fc796a597b79577798c555d2b280ca4e
iworm1.ps
Posted Oct 1, 1999

The Internet Worm Program: An Analysis: A description of the algorithms used by the Internet Worm program of November 2, 1988

tags | paper, worm, virus
SHA-256 | affa84c4a62ed1123918b7a64289ba5cf8cc9d19567ee5cdad990ab88edae0ba
iworm2.ps
Posted Oct 1, 1999

The Internet Worm Incident A description of the events involved in the Internet Worm of November 2, 1988

tags | paper, worm, virus
SHA-256 | 8eb9f7185ac48e4ccca04ccc9a7510dabb32136d2718846650061924075abaa7
kerbdial.ps
Posted Oct 1, 1999

Designing an Authentication System: A Dialogue in Four Scenes: A "play" in which the characters end up designing an authentication system much like Kerberos Provides an easy-to-understand description of why Kerberos is the way it is.

tags | paper
SHA-256 | 16fe80c2e2de29d853ad40a1310a0473a61da8860453522091e89e3a20ca97c1
kerberos.ps
Posted Oct 1, 1999

Kerberos: An Authentication Service for Open Network Systems: A description of the Kerberos authentication system

tags | paper
SHA-256 | 6368a099d905b089968075a87f72e845d263ed0ee2a25e21ddb465b7b7558a9e
kerblim.ps
Posted Oct 1, 1999

Limitations of the Kerberos Authentication System: A description of some limitations and weaknesses in the Kerberos authentication system.

tags | paper
SHA-256 | b56bc24f8eb0acdda7f968de1e80f956ec7ce19d1301212bbdd564a0672b9a21
kknight.ps
Posted Oct 1, 1999

KryptoKnight Authentication and Key Distribution System: An authentication and key distribution system that provides facilities for secure communication in any type of network environment

tags | paper
SHA-256 | 5239521a40929028d5693e30df4f661a3e4fdffce637545fb696a359735a47a8
Page 3 of 7
Back12345Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close