The Center for Education and Research in Information Assurance and Security, or CERIAS, is the world's foremost University center for multidisciplinary research and education in areas of information security. Our areas of research include computer, network, and communications security as well as information assurance.

This site's design is only visible in a graphical browser that supports web standards, but its content is accessible to any browser or Internet device. (Why?)

Center for Education and Research in Information Assurance and Security

COAST Security Archive Logo The Classification

  • alert Advisories on various security vulnerabilities
  • dict Dictionaries and word lists
  • doc Security related documents
    • access_control Documents related to access control
    • alert Security advisories, security bulletins, patches, fixes, etc.
    • authentication Documents related to authentication
    • books+reviews Blurbs about security books, and reviews of books and software
    • commercials Documents that describe commercial packages
    • cryptology Documents related to cryptology
    • email Documents related to security and e-mail, privacy enhancement, etc.
    • equipment Documents that contain information relevant to security related equipment
    • evaluation Documents that contain information relevant to the evaluation of the security aspects of systems
    • faq Documents that contains answers to Frequently Asked Questions (FAQs)
    • firewalls Documents related to Firewalls
    • forensics Documents related to software forensics
    • general Documents regarding the general aspects of security
    • genetic_algorithms Documents regarding genetic algorithms
    • guidelines Guidelines on how to keep your system secure (or securer)
    • institutional_policies Documents related to policies on various kinds of institutions.
    • intrusion_detection Documents on intrusion detection
    • law+ethics Documents on computer security and the law, and computer use/abuse and ethics.
    • maintenance Documents on software maintenance
    • misc Documents that don't fit anywhere else
    • morris_worm Papers about Robert T.'s 1988 escapade.
    • network Documents on network security
    • passwords Documents on password security
    • policy Documents on security policy
    • privacy Documents on privacy
    • rfc RFC indexes, information about RFCs and information on how to retrieve them.
    • risk Documents on risk on computers
    • social Documents on the social aspects of security and privacy
    • standards Standards and documents about standards
    • tech_tips Tech tips
    • tools Documents about various security tools
    • true_stories True Stories regarding security and privacy issues
    • trusted_systems Documents about trusted systems
    • viruses+alife Documents about viruses, anti-viruses and artificial life
  • news+lists Security newsgroups and mailing lists
  • patches Bug-fixes that mend security holes on various systems
  • tools Software tools
    • amiga Tools for Amiga systems
      • privacy/cryptology Tools for enciphering documents, breaking ciphers, creating digital signatures, etc.
      • maintenance System maintenance
      • viruses Virus detectors and related tools.
      • tripwires Tools for installing tripwires in systems
      • misc Tools that don't fit anywhere else
    • dos Tools for DOS/PC
      • access_control Tools related to access control
      • authentication User authentication and verification
      • privacy/cryptology Tools for enciphering documents, breaking ciphers, creating digital signatures, etc.
      • firewalls Firewalls and firewall related tools and utilities
      • maintenance System maintenance
      • networking Network management tools, network browsers, network analyzers, network tools, etc.
      • integrity_checking Tools for verifying the integrity of files, file systems, etc.
      • passwords Tools for checking password, password programs, tools for breaking passwords, etc.
      • viruses Virus detectors and related tools.
      • tripwires Tools for installing tripwires in systems
      • accounting Tools for analyzing accounting information, managing user accounting, etc.
      • message_digests Message digest programs and programs related to message digests
      • shells Restricted shells and command interpreters
      • monitor_tools Tools for monitoring systems, users, resources, etc.
      • misc Tools that don't fit anywhere else
    • mac Tools for Macintosh systems
      • access_control Tools related to access control
      • authentication User authentication and verification
      • privacy/cryptology Tools for enciphering documents, breaking ciphers, creating digital signatures, etc.
      • utils Miscellaneous Utilities
      • maintenance System maintenance
      • networking Network management tools, network browsers, network analyzers, network tools, etc.
      • integrity_checking Tools for verifying the integrity of files, file systems, etc.
      • viruses Virus detectors and related tools.
      • misc Tools that don't fit anywhere else
    • unix Tools for UNIX systems
      • access_control Tools related to access control
      • authentication User authentication and verification
      • privacy/cryptology Tools for enciphering documents, breaking ciphers, creating digital signatures, etc.
      • firewalls Firewalls and firewall related tools and utilities
      • genetic_algorithms Tools and programs that use genetic algorithms and/or artificial life
      • intrusion_detection Tools for detecting intrusions or related to intrusion detection
      • penetration_testing Tools for or related to penetration testing
      • maintenance System maintenance
      • networking Network management tools, network browsers, network analyzers, network tools, etc.
      • integrity_checking Tools for verifying the integrity of files, file systems, etc.
      • passwords Tools for checking password, password programs, tools for breaking passwords, etc.
      • viruses Virus detectors and related tools.
      • X Tools for X
      • tripwires Tools for installing tripwires in systems
      • accounting Tools for analyzing accounting information, managing user accounting, etc.
      • message_digests Message digest programs and programs related to message digests
      • shells Restricted shells and command interpreters
      • file_systems Secure file systems, file system extensions and utilities related to file systems.
      • monitor_tools Tools for monitoring systems, users, resources, etc.
      • log_analysis Tools for analyzing and compressing logs and audit trails.
      • misc Tools that don't fit anywhere else

_____

O Built by Mark Crosbie and Ivan Krsul.

click here Searching the Archive --- click here COAST Project page --- click here Purdue CS Dept page

Last Modified: 4 March, 1995.

security-archive@cerias.purdue.edu (COAST Security Archive)