CERIAS Hotlist
Page Content
- 23rd National Information Systems Security Conference
Home page for the conference with links to old presentations, calls for papers, programs, etc.
http://csrc.nist.gov/nissc/ - Added Nov 03, 2000
- A Network Router Security Resource Directory
A directory of web sites providing free information as well as commercial products and services related to Network Router Security and related topics.
http://www.routers-net.com/network_router_security/1.htm - Added Dec 11, 2005
- Access Specialties, Inc
Access Specialties manufactures the finest line of integrated access control and security products
available today.
http://www.access-specialties.com/ - Added Dec 10, 1999
- An Analysis Of Security Incidents On The Internet
This research analyzed trends in Internet security through an investigation of 4,299 security-related
incidents on the Internet reported to the CERT
http://www.cert.org/research/JHThesis/Start.html - Added Dec 10, 1999
- Anti-Phishing Working Group
A site dedicated to spreading information about, and fighting, Internet fraud.
http://www.antiphishing.org/index.html - Added Apr 01, 2005
- Anti-Virus Information Exchange Network (AVIEN)
AVIEN and AVI-EWS are international on-line communities dedicated to a cooperative, grassroots information sharing effort to reduce the impact of malicious code (viruses, worms, Trojan Horses, Spyware) and other related vulnerabilities.
http://www.avien.org - Added Apr 01, 2005
- AntiCode: AntiOnline's Software Archive
AntiCode is part of the AntiOnline Network of Security Related Sites. It contains an archive of code.
http://anticode.antionline.com/download.php - Added Feb 19, 2001
- ASK WOODY about SPOOFING ATTACKS
A list of questions and answers about Spoofing Attacks.
http://www.netsurf.com/nsf/v01/01/local/spoof.html - Added Dec 10, 1999
- ATM Security
The work done in the department is a risk analysis that show where ATM need to be protected. Current work acts on the
ATM development on introducing security features to ATM signaling.
http://www.rennes.enst-bretagne.fr/~rolin/Anglais/ATMsecurit... - Added Dec 10, 1999
- Audit and e-Security Checklists for LAN/Network, Firewalls, etc
Audit and security review checklists for: firewalls, LAN/networks, internet... essentially for the e-commerce security infrastructure.
http://www.e-security-e-commerce-security.com - Added Nov 21, 2001
- Bangkok Robot Security Guard
An armed robot as a security guard. The robot is armed with a pistol that \\"can be programmed to shoot automatically or wait for a fire order delivered witha password from anywhere through the internet.\\" I hope the password is very secret.
http://catless.ncl.ac.uk/Risks/21.02.html#subj8 - Added Sep 26, 2000
- Beyond Security's SecuriTeam.com
SecuriTeam is a group within Beyond Security dedicated to bringing you the latest news and utilities in computer security.
Having experience as Security Specialists, Programmers and System Administrators we appreciate your need for a "Security
http://www.securiteam.com/ - Added Apr 03, 2001
- Blue Kestrel Internet Security
The site was initially pitched at newcomers to internet security -
people who were new to the internet and were scared of the hype
surrounding hackers. There is a tutorial section covering most topics of
security and privacy. These tutorials were
http://www.bluekestrel.com/ - Added Feb 19, 2001
- BS7799 and ISO 17799 Open Guide
A public collaberation to document and support the BS7799 and ISO 17799 information security standards.
http://iso-17799.safemode.org - Added Feb 19, 2005
- cDc's BackOrifice, a tool to control Windows remotely
Back Orifice is a remote administration system which allows a user to control a computer across a tcpip
connection using a simple console or GUI application.
http://www.cultdeadcow.com/tools/bo.html - Added Dec 10, 1999
- Center for Information Policy at the University of Maryland
-investigates the technological, economic, and social phenomena associated with the digitization of information and the growth of the global Internet; -examines the role of information in social, economic, legal, and policy processes; and more
http://cip.umd.edu/ - Added Apr 09, 2001
- Challanges/Threats to Privacy
Slide show presentation given by Deborah Pierce, Staff Attorney (Privacy & Identity) for the Electronic Frontier Foundation.
http://www.inetdevgrp.org/20001017/index.html - Added Nov 02, 2000
- Checkpoint
Checkpoint
http://www.checkpoint.com - Added Feb 05, 2003
- Common Criteria
CC is the outcome of efforts to develop criteria for evaluation of IT security widely used in the international community, combining the U.S., Canadian and European criteria into a common standard.
http://csrc.nist.gov/cc/ - Added Nov 02, 2000
- Computer and Network Security, University of Tennessee
Information on course CS594 at the University of Tennessee.
http://www.cs.utk.edu/~dunigan/cs594-cns/ - Added Dec 10, 1999
- Computer audit FAQ
Answers to frequently asked questions about computer and network auditing. Explains what to expect if computer auditors are about to interview you, and gives practical advice to those considering computer audit as a career.
http://www.isect.com/html/ca_faq.html - Added Jan 05, 2003
- Computer Security Resource Center
CSRC is a repository of information on Computer Security and is maintained by NIST
http://csrc.nist.gov/ - Added Aug 16, 2000
- Cosac Symposium
COSAC International Computer Security Audit and Control Symposium
http://www.cosac.net/ - Added Jul 26, 2001
- Cubic Video Technologies, Inc.
cVideo is the leading developer of software-based recording and transmission products for enterprise surveillance applications
http://www.cvideo.com/ - Added Jan 19, 2001
- Cyber-Extortion: When Data is Held Hostage
Here is an issue facing more and more e-businesses--malicious hackers who demand a payoff to keep their security breaches secret.
http://www.businessweek.com/bwdaily/dnflash/aug2000/nf200008... - Added Sep 26, 2000
- Cyber-Security Called Dismal
Vital national interests are increasingly vulnerable to computer attack by hackers and cyber-terrorists, a House panel warned yesterday as it gave federal departments and agencies a dismal average D-minus grade for poor computer security.
http://www.washingtonpost.com/ac2/wp-dyn?pagename=article&am... - Added Sep 26, 2000
- Differential Power Analysis: a smartcard attack
Differential Power Analysis (DPA) is a new class of attacks discovered by researchers at
Cryptography Research in San Francisco. DPA affects the security of smart cards and other
http://www.cryptography.com/resources/whitepapers/DPA.html - Added Dec 10, 1999
- DNSSEC - Securing the Domain Name System
Offers information about DNS Security Extensions (DNSSEC). Includes DNSSEC projects, tools, whitepapers, articles, IETF RFC\'s, drafts, and practical Howtos.
http://www.dnssec.net/ - Added Oct 17, 2003
- Do Security Holes Demand Full Disclosure?
Weld Pond's response to Marcus Ranum's keynote on full disclosure at the Black Hat Briefings.
http://cma.zdnet.com/texis/techinfobase/techinfobase/+kmseV6... - Added Sep 25, 2000
- DVD Pirates Face Watery Foe
Technology companies are working once again to protect the digital content
of DVD movies -- and may have an answer, if they can just stop squabbling over
who has the better solution.
http://www.wired.com/news/technology/0,1282,38279,00.html - Added Sep 26, 2000
- e-CFO Conference and Expo
Information about e-CFO
http://www.e-cfoexpo.com/ - Added Sep 26, 2000
- e4gle security development
e4gle concentrates on ELF format, Linux Kernel Hacking, Linux dynamic chain technology, Linux LKM Technology, Linux virus, and stack overflow, format string, heap overflow etc. All attack technology of insecure programming.
http://e4gle.org - Added Feb 04, 2002
- Echelon Corporation
Echelon Corporation is a worldwide leader in control networks used by over 3,500 companies with millions of nodes installed worldwide that deliver efficiency, safety, and productivity to building, industrial, transportation, home, and other environme
http://www.echelon.com/ - Added Nov 02, 2000
- eSecurity
eSecurity
http://www.esecurityinc.com - Added Feb 05, 2003
- Firewalls: Friend or Foe?
Network firewalls are important security tools, but they have significant disadvantages, and their effectiveness is often overstated. This is especially true of enterprise border firewalls, which attempt to create a moat around an entire organization. Border firewall capability is essential for dealing with cyberattack emergencies, but used routinely, it tends to be autocratic and inflexible, thereby encouraging various kinds of subversion, and it can encourage sloppy security practices within the border.
http://staff.washington.edu/gray/papers/fff-final.htm - Added Jan 10, 2003
- Georgi Guninski Security Research
This site is dedicated to security research on various topics.
I am independent security consultant. The works on this site were developed by me for free in my free time. I am Bulgarian. I am running a security mailing list
http://www.guninski.com/ - Added Apr 05, 2001
- Global Incident Analysis Center
Roadmap to Defeating DoS Attacks
http://www.sans.org/ddos_roadmap.htm - Added Sep 28, 2000
- Got Cyber Insurance?
An article on hacking insurance
http://www.computerworld.com/cwi/story/0,1199,NAV47_STO48721... - Added Sep 26, 2000
- Harrier Group PLC
Harrier have been providing Europe's leading organizations with comprehensive security and data management solutions for over a decade.
http://www.harrier.com/ - Added Apr 10, 2001
- How To Eliminate The Ten Most Critical
Information on how to protect yourself from the most common security threats.
http://www.sans.org/topten.htm - Added Sep 28, 2000
- How to Install Solaris and Have a Good Host Security
This is a short how to, dedicated to people having to deal with host security under Solaris 2.6, 2. 7 and Solaris 8.
http://www.yassp.org/ - Added Sep 28, 2000
- Hunting the Wily Hacker
A PDF presentation by the FBI at SANS DC2000.
http://www.sans.org/dc2000/FBI-%20Wily%20Hacker.pdf - Added Sep 28, 2000
- ICAT Vulnerability Metabase
ICAT is a searchable index of computer vulnerabilities. ICAT links users into a variety of publicly available vulnerability databases and patch sites, thus enabling one to find and fix the vulnerabilities existing on their systems. ICAT is not itself
http://icat.nist.gov/icat.cfm - Added Aug 16, 2000
- IDSs Bolster Network Defense
Intrusion detection systems from companies such as Internet
Security Systems and NFR can give you real-time security
protection. But IDS complexity may make or break your buying
decision.
http://techupdate.zdnet.com/techupdate/stories/main/0,14179,... - Added Oct 23, 2001
- InfoExpress, Inc.
InfoExpress is a leader in secure remote access and extranet solutions. InfoExpress develops and markets the FireWalker VPN Suite?, based on a remote user and extranet VPN with a personal firewall that enables organizations to provide safe access to
http://www.infoexpress.com/ - Added Mar 21, 2000
- Information Warfare and Information Security on the Web
This metapage is a comprehensive guide to information warfare resources on the Web, as well as a directory of points of entry to related resources. If you know of any resources that are not listed here, please let us know about them.
http://www.fas.org/irp/wwwinfo.html - Added Apr 10, 2001
- InfoSec and InfoWar Portal
Information warfare, security, cybercrime information
http://www.infowar.com/ - Added Apr 10, 2001
- Intellitactics
Intellitactics
http://www.intellitactics.com - Added Feb 05, 2003
- International Biometric Group
International Biometric Group is the biometric industrys leading integration and consulting firm. Good information under the Network Security section.
http://www.biometricgroup.com/ - Added Jan 08, 2001
- IP Filter
IP Filter is a TCP/IP packet filter, suitable for use in a firewall environment.
http://caligula.anu.edu.au/~avalon/ - Added Dec 10, 1999
- ISAserver.org
ISAserver.org is your only resource for Microsoft\'s ISA Server, with news, downloads, articles, 3rd party products, tutorials, newsletters, FAQs, message boards and much more. Also has various FAQs and articles on Windows 2000 security related issues.
http://www.isaserver.org - Added Mar 21, 2005
- ITtoolbox Security
ITtoolbox Security offers forums for technical discussion, an integrated directory, white papers and daily news geared towards Security professionals and users of Security products. The portal also provides
content, community, job postings and much
http://security.ittoolbox.com/ - Added Jun 13, 2001
- Janus, A Secure Environment for Untrusted Helper Applications
http://www.cs.berkeley.edu/~daw/janus/ - Added Dec 10, 1999
- John the Ripper password cracker
John the Ripper is a password cracker, currently available for UNIX, DOS, Win32. Its primary purpose is to
detect weak UNIX passwords.
http://www.openwall.com/john/ - Added Dec 10, 1999
- Kerberos: An Authentication Service for Computer Networks
When using authentication based on cryptography, an attacker listening to the network gains no information that would enable it to
falsely claim another\'s identity. Kerberos is the most commonly used example of this type of authentication technolog
http://www.isi.edu/gost/publications/kerberos-neuman-tso.htm... - Added Dec 10, 1999
- L0pht Heavy Industries Services
@Stake's L0pht Research Labs spends considerable time researching and documenting security flaws
exist in the internet infrastructure.
http://www.atstake.com/research/advisories/index.html - Added Dec 10, 1999
- Linux Not Ready for DOD Prime Time
A site about why Linux is not ready for the comand and control market.
http://www.linuxsecurity.com/articles/government_article-142... - Added Sep 14, 2000
- Microsoft Lacks Motivation to Change Security
Every week, some headline seems to call attention to a
security vulnerability in a Microsoft product. Because
Microsoft products are so widely used, they will be the targets of more attacks, so more vulnerabilities will come to light.
http://news.com.com/2100-1023-244498.html?legacy=cnet - Added Sep 25, 2000
- MimeStar, Inc.
MimeStar, Inc. is a developer of advanced network monitoring and intrusion detection solutions.
http://www.MimeStar.com/ - Added Dec 10, 1999
- Mistakes People Make the Lead to Security Breaches
Mistakes made by the common user that lead to security breaches.
http://www.sans.org/mistakes.htm - Added Sep 28, 2000
- National Information Assurance Partnership (NIAP)
An NSA and NIST initiative designed to meet the security testing needs for both information technology producers and users.
http://niap.nist.gov/ - Added Nov 02, 2000
- NaughtyRobot
Human beings are always suspicious of that which they don't understand, and computers are the least understood appliances to enter most homes and offices since the invention of electricity.
http://www.rah96.com/rah96/naughtyr.shtml - Added Dec 10, 1999
- NelliCo
Strategy for Security Technology and Security Policy interdependence
http://pages.sbcglobal.net/nellico/ - Added Mar 05, 2002
- NelliCo
Strategy, Architecture for Security Technology and Security Policy balance
http://pages.sbcglobal.net/nellico/ - Added Mar 08, 2002
- Netsurfer Focus: Computer and Network Security
Welcome to Netsurfer Focus! In putting together Netsurfer Digest we have discovered that sometimes a topic
deserves more attention and depth than can be provided in the Digest. Netsurfer Focus is designed to
address these topics.
http://www.netsurf.com/nsf/v01/01/nsf.01.01.html - Added Dec 10, 1999
- netTracers
netTracers security auditing services provide the best combination of testing: standardized, automated testing augmented by hands-on evaluation, review, and reporting by experts, specifically knowledgeable in IT and network management.
http://www.netTracers.com/ - Added Feb 09, 2003
- Network and Network Monitoring Programs
Below is a list of programs that gathers information from the network or improve the
security of the network.
http://www.alw.nih.gov/Security/prog-network.html - Added Dec 10, 1999
- Network Gateway Security, Visibility and Control
Network Composer for SMB allows you to easily detect spyware, filter internet content, implement bandwidth limit controls, monitor bandwidth, implement virus protection, block p2p, block im and log im, deliver true application shaping and more.
http://www.cymphonix.com/ - Added Aug 03, 2006
- Network Security Credo
Computer system security has many dimensions, and they overlap. While this document is focused primarily on network-level security issues, it is impossible to avoid some discussion of other parts of the picture, most notably, application and OS security. Network security is a subset of general computer system security, but a rather large subset, since virtually all access to contemporary hosts is via a network connection.
http://staff.washington.edu/gray/papers/credo.html - Added Jan 10, 2003
- Network Security Policies & IT Security Policies
Where to find network security policies, IT security policies and a unique method to deliver them
http://www.network-and-it-security-policies.com - Added Apr 25, 2001
- NFR Security Inc.
NFR Security provides a comprehensive, integrated intrusion detection system that protects networks and hosts from known/unknown attacks, misuse, abuse and anomalies.
http://www.nfr.com - Added May 04, 2002
- NIS and Security
The following is a brief compendium of what we at Auburn Univeristy College of Engineering use to secure our NIS networks.
http://www.eng.auburn.edu/users/doug/nis.html - Added Dec 10, 1999
- Now is the Time for Two-Factor Security
Solutions exist for tamper-proof digital credentials, but
they're not compatible with each other. The problem, David
Berlind notes, is a lack of standards.
http://techupdate.zdnet.com/techupdate/stories/main/0,14179,... - Added Oct 30, 2001
- Pentagon 'Hacker' Speaks Out
One of the two teenagers rousted last week by the FBI for hacking government
servers said that he still has high-level access to hundreds of government and military
networks.
http://www.wired.com/news/news/technology/story/10666.html - Added Dec 10, 1999
- PHF Prober Perl Script
The phf probe perl script is a perl script that probe the site that is tring to exploit the phf bug.
http://www.eng.auburn.edu/users/rayh/software/phf.html - Added Dec 10, 1999
- phreak.se
Enormous telecom- & phreaking related archives.
Information, software, images. Never-before seen
material from the insides of telcos worldwide.
http://www.phreak.se - Added Oct 12, 2003
- Portcullis Products
Portcullis is a Wellington New Zealand based company offering Professional Project Management Services
http://www.portcullis.co.nz/ - Added Dec 10, 1999
- Publications on Distributed Communications
A list of publications in the "On Distributed Communications" Series.
http://www.rand.org/publications/RM/baran.list.html - Added Dec 10, 1999
- QuickLinks--Computer Crime
Links to current articles and news stories about computer crime.
http://www.qlinks.net/quicklinks/comcrime.htm - Added Nov 06, 2000
- Rating of Application Layer Proxies
This document defines a rating system for application layer proxies. The purpose of these definitions is inject some sanity into the proxy debate by defining 5 levels of proxies.
http://www.sandelman.ottawa.on.ca/SSW/proxyrating/proxyratin... - Added Dec 10, 1999
- RFP: VPNs Across Mutiple Sites
VPNs are
marketed as the next big technology that will push
your network backbone out to the Internet, where
connectivity costs are lower than leased lines and
multiple pathways between sites provide some fault
tolerance
http://www.networkcomputing.com/912/912f1.html - Added Dec 10, 1999
- Risk-Free Access Into The Global Information Infrastructure Via Anonymous Re-Mailers
By far the greatest threat to the commercial, economic and political viability of the Global
Information Infrastructure will come from information terrorists.
http://www.strassmann.com/pubs/anon-remail.html - Added Dec 10, 1999
- Sans Tools
Sans Tools
http://www.sans.org/tools.php - Added Feb 05, 2003
- Search for Security Sites
The only search engine dedicated to security sites.
http://Astalavista.box.sk/ - Added Oct 24, 2000
- Secrets and Lies: Digital Security in a Networked World
Information security expert Bruce Schneier explains what everyone in business needs to know about security in order to survive and be competitive.
http://www.counterpane.com/sandl.html - Added Sep 25, 2000
- Security Activities @ San Diego Supercomputer Center & NPACI
Happenings with security at SDSC and NPACI.
http://security.sdsc.edu/activities/ - Added Jan 11, 2001
- Security Options for the CTI FastSync Hub
This document briefly discusses the security options available for the CTI FastSync Hub (Windows version).
http://www.cticomm.com/security.htm - Added Dec 10, 1999
- Security Resource Net - Computer Security
The site features industry and product news, computer alerts, travel advisories, a
calendar of events, a directory of products and services, and access to an extensive virtual security
library.
http://nsi.org/ - Added Dec 10, 1999
- SecurNet Consulting
The Premier Internet Security Auditing Firm Providing Your Organization with Internet Security
Audits, Threat Assessment, Counteroffensive Security Planning and Site Security Certifications.
http://www.securnet.com/ - Added Dec 10, 1999
- SNMP Link
a complete list for snmp related sites
http://www.snmplink.org - Added Mar 18, 2002
- Sun Microsystems Security Bulletin
Bulletins from Sun Security Coordination Team
http://sunsolve.sun.com/pub-cgi/show.pl?target=security/sec - Added Dec 10, 1999
- SuraSoft.com Security
SuraSoft.com has articles on security subjects including firewalls, packet sniffing, encrption and online privacy. SuraSoft also hosts a number of security forums for visitor discussions
http://www.surasoft.com - Added Mar 03, 2002
- Sys Admin: The Journal for UNIX System Administrators
Sys Admin magazine delivers information for systems and network administrators whose duties include administration of UNIX systems. Every month we'll give you the information you need to handle the daily challenges of systems administration.
http://www.sysadminmag.com/ - Added Mar 28, 2001
- TCP Bug Threatens Networked Computers (land attack)
yet another pesky critter has
popped up with designs on crashing computers
http://www.wired.com/news/news/technology/story/8707.html - Added Dec 10, 1999
- TCP Loopback DoS Attack (land) and Cisco Devices
Somebody has released a program, known as land.c, which can be used to launch denial of service attacks against various TCP
implementations.
http://www.cisco.com/warp/public/770/land-pub.shtml - Added Dec 10, 1999
- Terminal Services Over a Virtual Private Network
A demo site for using Terminal Services over a VPN with Windows2000 server and it's advantages.
http://www.microsoft.com/windows2000/guide/autodemos/demos/m... - Added Apr 12, 2001
- The Computer Technology Documentation Project
Provides computer documentation and information in various technological areas including markup and web languages, operating systems, hardware, programming, and networking. Information available on this site is intended for beginners and experts.
http://ctdp.tripod.com/ - Added Sep 10, 2000
- The Internet Developer / Technology Group
The Internet Developer / Technology Group promotes discussion of relevant technologies and issues affecting the usefulness of the internet such as:
appropriate personal privacy enhancements,
information location technologies,
developing devices
http://www.inetdevgrp.org/ - Added Nov 02, 2000
- The Internet Engineering Task Force
The Internet Engineering Task Force (IETF) is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet.
http://www.ietf.cnri.reston.va.us/home.html - Added Apr 02, 2001
- The Kerberos Network Authentication Service
http://www.isi.edu/gost/info/Kerberos/ - Added Dec 10, 1999
- The NESSUS Project
The "Nessus" Project aims to provide to the internet community a free, powerful, up-to-date and easy to use remote security
scanner.
http://www.nessus.org/ - Added Dec 10, 1999
- The OpenBSD team's security auditing 'stance'
OpenBSD believes in strong security. Our aspiration is to be NUMBER ONE in the industry for security (if we are not already
there). Our open software development model permits us to take a more uncompromising view towards increased security than
Su
http://www.openbsd.org/security.html - Added Dec 10, 1999
- The Orange Book Site
The Orange Book Site - covers the DoD's Trusted Computer System Evaluation Criteria (DOD-5200.28-STD) and other related topics.
http://www.dynamoo.com/orange/index.htm - Added May 06, 2001
- The PKI page
Comprehensive list of PKI links,
esp. links to certification authorities
http://www.pki-page.org/ - Added Jul 25, 2000
- The Privacy Foundation
Lists bugs, advisories, top privacy stories, etc.
http://www.privacyfoundation.org/ - Added Sep 26, 2000
- The Secure Shell (SSH) FAQ
The Secure Shell (SSH) Frequently Asked Questions page.
http://www.employees.org/~satch/ssh/faq/ - Added Apr 12, 2001
- The Security Audit and Internal Audit Shop
Checklists, plans and resources for security audit and internal audit
http://www.security-audit-internal-audit.com - Added Nov 25, 2001
- The Software Risk Management Conference
Learn how to guarantee your success by attending ISACC 2000.
http://www.isacc.com/ - Added Sep 25, 2000
- TINY Software
Founded in 1997, Tiny Software has been developing sophisticated, powerful software products that have been offered to customers in small, easy-to-use packages. Products include WinRoute Pro, WinRoute Lite, and Tiny Personal Firewall.
http://www.tinysoftware.com/home/tiny - Added Feb 01, 2001
- Tripwire
Open Source Tripwire
http://www.tripwire.org/ - Added Sep 15, 2000
- UK Group Slams Sophos Linus Virus Threat Claims
Linux response to claim by Sophos that viruses targeting Linux systems already exist
http://www.linuxsecurity.com/articles/general_article-1332.h... - Added Sep 14, 2000
- Unix Host and Network Security Tools
A listing of network security tools and sites where they can be obtained. If you have any comments or updates, please send email
to the address below.
http://cs-www.ncsl.nist.gov/tools/tools.htm - Added Dec 10, 1999
- Virus Myths
Learn about computer virus myths, hoaxes, urban legends, hysteria, and the implications if you believe in them. You can also search a list of computer virus hoaxes and virus hysteria from A to Z.
http://www.vmyths.com - Added Apr 01, 2005
- Viruslist.com
Information about viruses, hackers and spam.
http://www.viruslist.com/ - Added Apr 01, 2005
- VPN Info on the World Wide Web
This Web site is focussed on "roll your own" VPN systems, not subscription VPN services. As defined by the members of the mailing list, virtual private networks are secured private network connections . . .
http://kubarb.phsx.ukans.edu/~tbird/vpn.html - Added Apr 12, 2001
- WebSense
WebSense
http://www.websense.com - Added Feb 05, 2003
- Why one virus engine is not enough
There is no single anti-virus engine on the market today that is always the fastest and most effective at identifying viruses, trojans and other threats. This white paper examines why having multiple anti-virus scanners at mail server level substantially reduces the chance of virus infection and explores ways in which this can be achieved.
http://www.gfi.com/whitepapers/why-one-virus-engine-is-not-e... - Added Nov 07, 2006
- WildPackets - Network Taming Experts
WildPackets, Inc. is a customer-driven, world-class provider of affordable networking software. Our products allow IT Professionals to easily manage, monitor, analyze, troubleshoot, optimize and expand mixed-platform, multi-protocol networks.
http://www.wildpackets.com/ - Added Mar 30, 2001
- Williams Associates Protective Services, LLC.
We are a full service Security Consulting and Training firm. Which offer network security and other computer related services to small and medium sized companies.
http://www.wa-protective.com - Added Aug 10, 2001
- Wireless Networks in Big Trouble
Wireless networks are a little less secure today with the public release of "AirSnort", a tool that can surreptitiously
grab and analyze data moving across just about every major wireless network.
http://www.wired.com/news/wireless/0,1382,46187,00.html - Added Aug 22, 2001
- Word documents susceptible to Word Bug
Microsoft is weathering complaints that documents created with Microsoft Word and
some of its other popular desktop applications can be embedded with electronic
surveillance tags allowing document authors to track their use.
http://news.com.com/2100-1023-245160.html?legacy=cnet - Added Sep 26, 2000
- XP Vulnerable to DoS Attack
Windows XP's new feature could spell doom for Internet
businesses. But Wayne Rash tells you how to work around the
security holes.
http://techupdate.zdnet.com/techupdate/stories/main/0,14179,... - Added Oct 23, 2001
- Ypghost: spoof of yp passwd
The current version of ypghost is now version 0.6. This version has a few minor improvements, one of which greatly improves
performance on some platforms.
http://www.unix.geek.org.uk/~arny/progs/ypghost/ypghost.html - Added Dec 10, 1999