Security and related Web bookmarks and URLs from Rob Slade
(maintained by Rob Slade)
 Computers and Technology
  specs and terms
  
   
- FOLDOC - Computing Dictionary
   - Compaq Contura Aero Frequently Asked Questions
   - What Is...every file format in the world - A through E
   - BABEL: A Glossary of Computer Related Abbreviations and Acronyms
   - Harddrive Specifications
   - Hardware Specifications
   - PC Webopaedia home page
   - Tom's Hardware Guide Mass Storage: IDE Training Course, Part 1: A Detailed Look at the Basics and Technology -
Introduction
  
 
Computer Communications
  Spam
  
   
- How to Complain About Spam, or, Put a Spammer in the Slammer
   - Anti-Spam Provisions in Sendmail 8.8
   - 
   - Anti-Spam Provisions in Microsoft Exchange Version 5.5
   - MailGate NT SPAM Filter
   - Get that spammer!
   - Join the Fight Against Spam!
   - Spam Chat.
   - Spam tools
   - SPAM-News.com - Providing daily news updates about Spam, UCE, UBE & Junk E-mail since 1996
   - A Message for Spammers: Beware
   - MAPS Realtime Blackhole List
   - Spam Calculator
   - TPROJJO: KASA: Members
   - Yahoo! Computers and Internet:Communications and Networking:Electronic Mail:Junk
Email
   - Web Interface to Whois
   - ARIN: Whois
   - carpeNet Traceroute
   - The National Fraud Information Center
   - TPROJJO: KASA: The Spam Busters
   - emailabuse.org
   - rfc2076 - Common Internet Message Headers
   - SamSpade.org
   - Abuse.net: Home Page
   - ORBS
   - ChooseYourMail
   - Chain Letter Evolution
   - 'Guinness Book of Records' Chain Letter - Urban Legends and Folklore
   - Index of /~barnowl/chain_letter
   - InformationWeek > Langa Letter > Has Spam Won? > July 9, 2001
   - Welcome to CAUCE
   - ChooseYourMail
   - SamSpade.org
   - Sam Spade
   - Smart Whois - Whois Search - Internic + many country domains
   - Allwhois.com - Search and Register any Domain Name in the World
   - Abuse.net: Home Page
   - Open Directory - Computers: Internet: Abuse
   - 
   - RE: SPAM: SPAM and the Internet
   - UXN Spam Combat
   - Emailias.com
   - SpamAssassin: Welcome to SpamAssassin
   - Spam Laws
   - G E E K T O O L S
   - SpamAssassin: Welcome to SpamAssassin
   - FAQ: Teergrubing against Spam
   - Government Addresses for Reporting Spam
   - You’ve Got Spam: How to "Can" Unwanted Email
   - Bloomba
   - MailWasher
   - POPFile Home Page
   - Why Am I Getting All This Spam?
   - Silicon.com - 'Nigerian' money scam: What happens when you reply?
   - SecuritySage - Login
   - ARIN: WHOIS Database Search
   - Query the APNIC Whois Database
   - 
   - Tracing Emails
   - MAPS - Stopping Spam at its Source
   - SpamAssassin: Welcome to SpamAssassin
   - Nuclear Elephant: DSPAM
   - A Plan for Spam
   - United States Secret Service: Advance Fee Fraud Advisory
   - United States Secret Service
   - Spam Laws
 
 
Computer Security
 
  
- access control
   
- TCPA / Palladium FAQ
   - PawSense helps you catproof your computer.
   - Face Recognition Vendor Test 2002
   - Rudimentary Treatise on the Construction of Locks
   - Is It Just My Imagination?
   - Biometric Consortium
   - Role Based Access Control
   - CAPTCHAs for authentication
  
  
- Antivirus sites
   
- Virus Encyclopedias
    
- Symantec Security Updates
    - Trend Micro virus encyclopedia, worm, trojan, virus, macro
    - Virus Encyclopedia
    - F-Secure : Security Information Center
    - Mac Virus: Home Page
    - Encyclopedia
    - McAfee.com - Virus Information Library
    - Panda Software
    - Sophos virus analyses
    - Panda Software - Global Security Solutions
    - Virus Encyclopedia [ VirusList.com® ]
    - RAV Antivirus - Web Site
    - F-Prot Antivirus for Windows, Linux, BSD, Exchange, AIX and DOS | F-Prot AVES - anti-spam and anti-virus e-mail filtering service |
   
   
- Guillermito et les virus informatiques
   - Virus Test Center - University of Hamburg
   - AntiVirus Software Database - AntiVirus Resources
   - Virus Hoaxes and false alerts
    
- Virus Hoaxes
    - CIAC Internet Hoaxes
    - Computer Virus Myths home page
    - National Computer Security Association
    - antivirus online: hype alerts!
    - Data Fellows HOAX warnings page
    - SARC - Virus Hoaxes
    - The Hoaxkill service: Let's get rid of hoaxes now!
    - HOAXBUSTERS Home Page
    - Vmyths.com- Truth About Computer Virus Myths & Hoaxes
    - Computer Virus Hoaxes
    - Don't Spread that Hoax!
    - Internet Hoaxes Email Rumors and Urban Legends - Current Netlore
    - Computer Virus Hoaxes
    - TruSecure Corporation is the worldwide leader in Internet Security Assurance.
    - TruSecure Corporation is the worldwide leader in Internet Security Assurance.
    - The Hoaxkill service: Let's get rid of hoaxes now!
    - EFF "Hoaxes" Archive
    - McAfee.com - Virus Information Library - Virus Hoaxes
    - F-Secure : Security Information Center
    - Symantec Security Updates - Hoax Page
   
   
- Carmel Anti Virus
   - ChekWARE's Home Site
   - Security Solutions: Virus Clinic
   - Data Fellows World-Wide Web Server Main Index
   - The SBABR Homepage (Europe 2nd mirror)
   - Welcome To Dr Solomon's On-Line
   - Welcome To Dr Solomon's On-Line
   - EliaShim - Virus Center
   - ThunderBYTE Home Page
   - IBM antivirus online
   - AVP Page by Central Command
   - Welcome To McAfee
   - Norman
   - Sophos Home Page
   - Stiller Research: Integrity Master Virus Protection / Data Integrity
   - Symantec AntiVirus Research Center
   - Trend AntiVirus Center, Antivirus Solutions, Antivirus News
   - Henri Delger's VirusHelp Home Page
   - Panda
   - Virus Bulletin Home Page
   - NCSA Anti-Virus Information
   - Welcome to Leprechaun Software
   - iRiS Software
   - Frisk Software Home Page
   - Command Software Virus Information
   - ALWIL Software Home Page
   - Disinfectant pub/mac/virus
   - University of Tampere Virus Research Unit
   - University of Michigan Virus Busters
   - Thomas Jefferson University Computer Virus Information
   - Penn State Anti-Virus Page
   - OUCS Anti-virus Information
   - UK Open University Antivirus Home Page
   - The Scanner
   - The Virus Encyclopedia
   - Virus Research Unit
   - Worms
   - Chat rooms hit by Internet flu
   - risc.ua.edu /pub/ibm-antivirus
   - PC Virus Page
   - What's NOT a Virus
   - alt.comp.virus.pictures
   - Vet Anti-Virus Software
   - mIRC SCRIPT.INI Infosheet
   - MAC VIRUS/TORJAN HORSE ALERT
   - SARC - Virus Encyclopedia
   - Doug Muth's Anti-Virus Help Page
   - Directory of /pc/virus
   - pub/mac/virus
   - Virus Bulletin Home Page
   - .Computer Virus Help Information by Henri Delger
   - .Computer Virus Help Information by Henri Delger
   - Mountain Ridge Dataworks Macintosh Consultants
   - AVP Virus Encyclopedia
   - Data Fellows Virus Information Centre
   - The Virus Encyclopedia
   - McAfee.com : Virus Information Center
   - Trend Micro Anti-Virus Software for the Enterprise, Virus Info - Virus Encyclopedia
   - SARC - Virus Encyclopedia
   - antivirus online: virus descriptions
   - Virus Descriptions
   - Descriptions of Common Viruses
   - The Joe Wells Virus Encyclopedia® - Full Listing
   - Padgett's frame page
   - Padgett's AntiVirus Page
   - Cure of Computer Viruses
   - McAfee.com World Virus Map
   - Checkmark - Home Page
   - IBM Research | Projects | Antivirus Research
   - Mac Virus II
   - www.jasons-toolbox.com
   - The Deceptive Safety of RTF Files - Breaking Antivirus News [ Kaspersky™ AntiVirus (AVP)]
   - Frisk Software International download
   - 
   - Whitehats: Lion Internet Worm Analysis
   - ALWIL Software Home Page
   - Computer Knowledge Virus Tutorial
   - A Warhol Worm: An Internet Plague in 15 Minutes!
   - Viruses Revealed
   - Homepage of Peter Szor
   - Frisk Software International / Download / Getfpdosfree
   - Are "Good" Viruses Still a Bad Idea?
   - United States
Patent: 4,975,950
   - United States
Patent: 5,121,345
   - Parasitic Computing
   - Writing Word Macro Viruses
   - Index of /pub/cert/virus-l/archives
   - AVG Anti-Virus System Main Page
   - Osborne McGraw-Hill Virus Alert
   - Robert Slade History: Contents
   - Code of Conduct
   - TruSecure Corporation is the worldwide leader in Internet Security Assurance.
   - AVG Anti-Virus System Main Page
   - ACM: Ubiquity - Crying Klez: Maybe the Sky IS Falling
   - Newhouse B1
   - AVI-EWS - Anti-Virus Information & Early Warning System
   - AVIEN - Home of the Anti-Virus Information Exchange Network
   - anti-worm throttling
   - PestPatrol
   - CIACTech02-004: Parasite Programs; Adware, Spyware, and Stealth Networks
   - Directory of /anti-virus/free/updates
   - F-Secure Welcomes You
   - SpybotSD - Spybot - Search & Destroy by PepiMK Software
   - Official website for DiamondCS TDS-3 - Trojan Defence Suite (TDS), leading anti-trojan system for Windows
   - Download latest virus identity (IDE) files
   - Download latest virus identity (IDE) files
   - Stinger - Network Associates Inc.
   - Kattoon: August 25, 2003
   - NetWorm.org
   - A 20-year plague | CNET News.com
   - 
   - SecurityFocus HOME Infocus: Worm Propagation In Protected Networks
   - Welcome to The Trojan Horses Research Mailing-List Home Page
   - TH-Research FAQ
   - AV-Test.org · Tests of Anti-Virus Software
   - Download latest virus identity (IDE) files
   - WormRadar
   - 
   - The Final Virus: A Science-Fiction Story
   - Virus Tutorial
   - Welcome to Antivirus-Review.info
   - ClamAV: Project News
   - Welcome to the SOSDG - ClamAV For Windows
   - Anti-Spyware Test (Guide)
  
  
- App Dev
   
- malware.com
   - BugNet Home Page
   - ACM Classic: Reflections on Trusting Trust
   - CIACTech02-004: Parasite Programs; Adware, Spyware, and Stealth Networks
   - The Peon's Guide To Secure System Development
   - Secure UNIX Programming FAQ
   - Executing arbitrary commands without Active Scripting or ActiveX
   - SSE-CMM Home Page
   - CIACTech02-004: Parasite Programs; Adware, Spyware, and Stealth Networks
   - Frequently Asked Questions about DRE Voting Systems
   - SpybotSD - Spybot - Search & Destroy by PepiMK Software
   - Official website for DiamondCS TDS-3 - Trojan Defence Suite (TDS), leading anti-trojan system for Windows
   - Secure Coding: Principles & Practices
   - 
   - 
   - anti-trojan, free antivirus downloads, remove trojan virus, free trojan horses remover, trojan horse virus remover, subseven, sub 7 trojan, hacking trojans,
trojan virus cleaners removers, sub7, trojan cleaner
v1.9d, about trojan horse viruses, sub7 troja
   - Cassandra(TM) -- CERIAS
   - Software Method HOWTO - Xbox-Linux
   - WebGoat
  
  
- Backups
   
- NovaStor - Backup, Encryption, AntiVirus and Data Interchange
   - iomegazine(tm)
   - Welcome To Seagate's SeaNET
   - Exabyte Corporation Home Page
   - Hewlett Packard: Tape Storage
   - @Backup | Remote Backup & Virus Protection Services
   - ATRIEVA: Safe and Easy Online Backup
   - Backup & offsite data storage - SafeGuard Interactive Incorporated
   - BackMagic Home Page
   - NetPro NorthWest Win95 Registry Backup
   - Welcome to Seagate Software
   - PowerQuest Corporation
   - FreeDrive: Free Internet Hard Drive
   - UltraBac - Windows NT Backup and Disaster Recovery - BEI Corporation's Web Site.
   - The Non Sequitur Homepage
   - Mike Lin's Home Page
   - Welcome to Backup4all site
  
  
- bcp
  
  
- blackhats
   
- 2600: The Hacker Quarterly
   - Hack Canada - anything can be cracked when it's forty below
   - the spartan horse - Test It
   - Directory of /pub/ADM
   - Cult of the Dead Cow Back Orifice Backdoor
   - DigiCrime, Inc.
   - EC-Council | 312-50
   - EC-Council | Certified Ethical Hacker Certification
   - Silicon.com - 'Nigerian' money scam: What happens when you reply?
  
  
- encryption
   
- GNUPG - The GNU Privacy Guard
   - National Cryptologic Museum
   - CodedDrag
   - Steganography & Digital Watermarking
   - Voicecrypt Web Site
   - Directory of /pub/crypto/pgp/pgp60
   - Tiny IDEA Encryption Program
   - PGP-Users Mailing List Home Page
   - The International PGP Home Page
   - NovaStor - Backup, Encryption, AntiVirus and Data Interchange
   - Canadian Strategy
   - Distributed Authentication in Kerberos Using Public Key Cryptography
   - Niels Ferguson list of publications
   - RSA Laboratories | Cryptography FAQ
   - OutGuess - universal Steganography
   - The Alice and Bob After Dinner Speech
   - The Zimmerman Note
   - SSL analysis from counterpane
   - [SSL-Talk List FAQ] Secure Sockets Layer Discussion List FAQ v1.1.1
   - [SSL-Talk List FAQ] Secure Sockets Layer Discussion List FAQ v1.1.1
   - WEP weaknesses
   - White Paper: hComments on "An Initial Security Analysis of the IEEE 802.1X Standard"
   - WEP additional weaknesses
   - Handbook of Applied Cryptography
   - 
   - WW II Codes and Ciphers
   - Handbook of Applied Cryptography
   - WW II Codes and Ciphers
   - Retrobeep - the computer museum at Bletchley Park
   - BletchleyPark - Station X
   - Why Johnny Can't Encrypt
   - cryptographie militaire
   - Cracking DES: Secrets of Encryption Research, Wiretap Politics, and Chip Design
   - Polyalphabetic substitution
   - Fred Cohen & Associates
   - spammimic - hide a message in spam
   - 
   - JavaScrypt: Browser-Based Cryptography Tools
   - SourceForge.net: Project Info - WinPT - Windows Privacy Tools
   - KerbCrack
   - CrypTool - Homepage
   - SNEAK: Snarkles.Net Encryption Assortment Kit
   - WWII crypto machines
  
  
- comseced
   
- Stay Safe Online | Home
   - Consumer Information Security - Federal Trade Commission
   - Presentations
   - Awareness
   - Talisker Computer Security Advice For The Home User
   - MailFrontier Phishing IQ Test
   - Posters for Security Awareness Training & Education
   - archive of computer security presentations
   - Microsoft Support WebCasts
   - Cisco Seminar Series
  
  
- Forensic programming
   
- Authorship analysis Kraul/Spaf
   - Authorship Analysis: Identifying The Author of a Program - Krsul, Spafford (ResearchIndex)
   - Andrew Gray's Software Metrics (Including Authorship Analysis) and Neural Network/Statistical Modelling
Page
   - Index
   - Last Fravia's mirror of Reverse code engineering
   - Last Fravia's mirror of Reverse code engineering
   - Documentation for disassembler writers
   - Dave Dittrich
   - LC Technology International, Inc. Home Page
   - New Scientist
   - IJDE
   - Digital Forensic Links
   - Digital Evidence: Standards and Principles, by SWGDE and IOCE (Forensic Science Communications, April 2000)
   - Transform / DeCompilation
   - Protools - Decompilers
   - Decompilation of Binary Programs - dcc
   - REC Decompiler Home Page
   - Ralf Brown's Files
   - Jon Kirwan: PC Assembly Programming/Where to Get PC Assembly Tools
   - Last Fravia's mirror of Reverse code engineering
   - Intel Architecture Software Developer's Manual, Volume 2: Instruction Set Reference Manual
   - On-line Intel Documentation
   - Re-engineering Scientific Credit in the Era of the Globalized information Economy
   - CCIPS SEARCHING AND SEIZING COMPUTERS
   - NASM-IDE, NasmEdit and S-Library homepage
   - Computer Simulators
   - A Beginner's Nasm Page
   - NASM Manual
   - Jeff Duntemann's Assembly Language Books and Links
   - Softpanorama Assembler is not for Dummies Page
   - Jon Kirwan: PC Assembly Programming/Where to Get PC Assembly Tools
   - The UK Patent Office - About Us and Policies - Consultation Paper
   - 
   - Responsible Use of Information Technology at BCIT
   - Antiword: a free MS Word document reader
   - 
   - Text Editor - HEX Editor - HTML Editor - Programmers Editor - UltraEdit
   - Shellcoding for Linux and Windows Tutorial
   - The Art of Disassembly
  
  
- glossaries
   
- NETSYS.COM - Security Glossary
   - Security Glossary | Security documentation
   - Welcome to the MSDN Library
   - PGP Security - Glossary
   - RFC 2828
   - Security Glossary of Terms
   - Mitre Security Glossary
   - Sun Security Glossary
   - ISU Draft Comprehensive Information Assurance Dictionary
   - Corporate Computer Consultants Ltd Information Security Jargon Buster at www.CCCL.net
   - President's Commission - Critical Infrastructure Assurance Office Glossary
   - ISU Security Publications
   - ISU dictionary
   - More glossaries online , 12/05/01
   - National Information Systems Security (INFOSEC) Glossary
   - Hacking Lexicon
   - Hacking Lexicon
   - <draft-shirey-security-glossary-00.txt> attached
   - OASIS security glossary (pdf)
   - BABEL: A Glossary of Computer Related Abbreviations and Acronyms
   - security glossary by DigitalGuards
   - Security Glossary - Lynn Wheeler
   - Rob Slade's Security Glossary
   - Rob Slade's Security Glossary
  
  
- LIE
   
- email tampering - Suni Munshani v. Signal Lake Venture Fund II, LP, et al., Massachusetts Superior Court, Civil Action No. 00-5529 BLS
   - RFC 2350 Expectations for Computer Security Incident Response
   - Ethics and Information Technology
   - Lawful Access – Consultation Document
   - Home of the Digital Forensics Information Network
   - Welcome To Joel A. Wuesthoff JD, CISSP
   - Privacy & Human Rights 2002
   - Privacy & Human Rights 2002
   - Department of Justice Canada
   - Prime Curios!: 48565...29443 (1401-digits)
   - DeCSS, JILT 2002 (3): Guadamuz
   
   - ID Theft: When Bad Things Happen To Your Good Name
   - Centers for Medicare & Medicaid Services
   - THE LEGAL FRAMEWORK
   - The Frontiers of Privacy and Security: New Challenges for a New Century - 2003 FOIPP Conference
   - GIAC: Global Information Assurance Certification -  GIAC Code of Ethics
   - Online Ethics Center: NSPE Case 92-6: Public Welfare -- Hazardous Waste
   - C Y B E R C R I M E
   - 
   - Tom's Hardware Guide Mass Storage: IDE Training Course, Part 1: A Detailed Look at the Basics and Technology -
Introduction
   - EPIC Bill Track - 108th Congress Privacy and Cyber-Liberties Legislation
   - Spam Laws
   - Home Page - Privacy Commissioner of Canada
   - Privacy Legislation - Privacy Commissioner of Canada
   - The European Union Directive on Data Protection
   - Zeichner Risk Analytics LLC
   - International Association of Privacy Professionals - IAPP
   - Microsoft TechNet
   - Creating a Computer Security Incident Response Team: A Process for Getting Started
   - 
   - FORENSICS.ORG
   - SecurityFocus HOME Infocus: U.S. Information Security Law, Part 1
   - Antiword: a free MS Word document reader
   - catdoc and xls2csv - free MS-Office format readers
   - FORENSICS.ORG
   - GROKLAW
   - Pew Internet and American Life Project
   - IOCE - Guidelines for Best Practice in the Forensic Examination of Digital Technology
   - NLECTC JustNet-Law Enforcement Links
   - knackit.net :: every 0 makes a difference
   - SourceForge.net: Project Info - Open Source Computer Forensics Manual
   - Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations (July 2002)
   - The Guide - Privacy and Security on your PC Part I
   - Knoppix STD
   - Office of the Information & Privacy Commissioner
   - Rahmenlayout Schüler STM Homepage
   - Cybercrime Law
   - EUROPA - The European Union On-Line
   - Privacy Commissioner of Canada / Commissaire à la protection de la vie privée du Canada
   - OIPC
   - IPC - Information & Privacy Commissioner of Ontario
   - Office of the Information & Privacy Commissioner
   - Putercops.org
   - [strike out]
   - Privacy International - Country Archives
   - USA PATRIOT Act (H.R. 3162)
   - Digital Forensic Research Workshop - Bringing together the digital forensics comminity [Home Page]
   - SB 1386 Senate Bill - CHAPTERED
   - Consequentialism - Wikipedia, the free encyclopedia
   - Ethics - Wikipedia, the free encyclopedia
   - ForensicsWeb :: Forensics Web - Technology investigation & forensics.
   - ID Fraud Home Page
   - Federal Trade Commission - Your National Resource for ID Theft
   - The 2001 Daftas Longest Email Disclaimer | The Register
   - Personal Information Protection and Electronic Documents Act
   - Scientific Working Group on Digital Evidence
   - United States Secret Service: Best Practices for Siezing Electronic Evidence
   - Tracing Emails
   - Childfind and Cybertip.ca/Cyberaide.ca Splash Page
   - EU approved clauses for international data transfers
  
  
- magazines
   
- INFORMATION SECURITY Free Subscription Form
   - Index of /Cipher
   - 2600: The Hacker Quarterly
   - SC Magazine On-line
   - JCS Home Page
   - ACM: ACM Transactions on Information and System Security
   - ICSA Information Security Magazine
   - Ethics and Information Technology
   - SECURITY Magazine
   - ICSA Information Security Magazine
   - Information security Digest
   - Security News Portal - A Different Kind of News
   - Security Pipeline
  
  
- mailing lists
   
- Cipher - Newsletter of the IEEE CS TC on Security and Privacy
   - PRIVACY Forum
   - Security Mailing List Archives
   - Bugtraq mailing list archives
   - RISKS-LIST: RISKS-FORUM Digest
   - Crypto-Gram Newsletter
   - Cipher: The Newsletter of the IEEE Computer Society Technical Committee on Security and Privacy
   - Internet Security Systems, Inc. : X-Force
   - NTBugtraq - NTBugtraq Home
   - Information Security Zeitgeist
   - Full-Disclosure Information
   - RISKS Info Page
  
  
- NT security
   
- Windows NT Frequently Asked Questions (FAQ)
   - NT Security - Frequently Asked Questions
   - NTBugTraq - NTBugtraq Home
   - NT Exploit(ed) Page
   - NT Configuration Guide for the Paranoid
   - NSA/Windows NT Security Guidelines
   - Nessus for WindowsNT
   - Nomad Mobile Research Centre - NT Files
   - ISS – Internet Security Systems
   - Windows NT Killer Utilities
   - Russ Cooper's NT Fixes Status Page
   - Offline NT-password-utility
   - Secure Windows NT Installation and Configuration Guide
   - Green Bullet Home at MIKO s.c.
   - Utilities for Windows NT
   - eEye™ Digital Security
   - NT Security - Frequently Asked Questions
   - NT Security - Frequently Asked Questions
   - Next-Generation Win32 exploits: fundamental API flaws
   - Scott Schnoll's Internet Explorer Security Center
   - Microsoft Baseline Security Analyzer
   - Windows XP Security Checklist from LabMice.net
   - IEBUG News
   - BasicSec.org | Security and Privacy for Regular Folks
  
  
- ops
   
- Microsoft Baseline Security Analyzer
   - BasicSec.org | Security and Privacy for Regular Folks
  
  
- Physical security
   
- SECURITY Magazine
   - Deborah Quilter's RSI Web Site
   - Fire
    
- Talking Sense About Foam
    - Howstuffworks "How Fire Extinguishers Work"
    - Fire Safety and Fire Extinguishers in a Chemistry Laboratory
   
   
- Handbook of Forensic Services: Evidence Examinations--Crime Scene Search (1999)
   - RCMP - TSB
   - FEMA: Are You Ready? A Guide to Citizen Preparedness
   - Master-Keyed Lock Vulnerability
   - Rudimentary Treatise on the Construction of Locks
   - Master-Keyed Lock Vulnerability
   - FM 3-19.30 Table of Contents
   - 
   - 
   - Howstuffworks "How Lock Picking Works"
   - IntelCenter
   - FM 3-19.30 Table of Contents
   - The Art of War
   - 
   - 9-11 Commission Final Report
  
  
- Security agencies
   
- (ISC)2 Reference Materials
   - SecurityFocus
   - CERT Coordination Center
   - SANS Institute Online - Home Page
   - Cissp.com The web portal for the certified information systems security professionals
   - CISSPworld (www.cisspworld.com)
   - CISSPworld CA (www.ca.cisspworld.com)
   - About the CERT® Coordination Center
   - C S R C - Computer Security Resource Center
   - CIPS Vancouver Security Special Interest Group
   - ICSA
   - COAST
   - The United States Navy INFOSEC Home Page
   - Office of the Director of Central Intelligence
   - Central Intelligence Agency
   - CIA Directorate of Intelligence Homepage
   - DS&T Main Page
   - The Intelligence Community
   - Center for the Study of Intelligence
   - Central Intelligence Agency - Electronic Document Release Center
   - DIA HOME PAGE
   - National Security Agency
   - U.S. Navy: Welcome Aboard
   - Access Denied
   - Air Force Command Section
   - MarineLINK
   - WELCOME TO NIMA's PUBLIC HOME PAGE
   - National Reconnaissance Office
   - Federal Bureau of Investigation Home Page
   - U.S. Department of Energy Home Page
   - Canadian Security Intelligence Service -- Service canadien du renseignement de sécurité
   - ITS Home
   - TECHNICAL SECURITY BRANCH - Homepage
   - Encyclopedia
   - National Infrastructure Protection Center (NIPC) - CyberNotes
   - CCITS Home Page - Canadian Centre for Information Technology Security
   - National Infrastructure Protection Center (NIPC) - Home Page
   - 
   - IATRP Home Page
   - CASPR Home-Page Commonly Accepted Security Practices & Recommendations
   - SCI: InfoSec Certification FAQ
   - Government Security Policy
   - Government Security Policy
   - Security Policy - Policies and Publications
   - Information Technology Security Standard
   - OCIPEP - Public Communications
   - OCIPEP - Critical Infrastructure Protection
   - IFCC 2001 fraud report
   - Science and Technology - Information Security Committee
   - FTC Issues Financial Information Safeguards Rule
   - CSORT - Chief Security Officer's Round Table
   - Draft Publications
   - IJDE
   - NCIX - One Evil
   - Network Security from the Pros
   - Science and Technology - Information Security Committee
   - 53 Questions for Developing the National Strategy to Secure Cyberspace
   - CIPS Vancouver Security Special Interest Group
   - www.phrack.org
   - Welcome to InfraGard
   - National Crime Squad, Combating Serious and Organised Crime
   - Electronic Crimes Task Force Website
   - NIST Computer Security Special Publications
   - Draft National Strategy to Secure Cyberspace
   - Information Security Forum
   - UNITED STATES INTELLIGENCE COMMUNITY
   - RCMP - TSB
   - Internet Fraud Complaint Center
   - C4I.org - Computer Security and Intelligence
   - R.U.N.S.A.F.E.
   - Computer Security
   - Welcome to the Society for the Policing of Cyberspace (POLCYB)
   - Community Ed in security
   - Computer Security
   - R a i n F o r e s t P u p p y
   - IASE Public Home Page
   - CompTIA Security+ Certification - Welcome to Security+
   - About CSE
   - Manuals
   - RCMP TSSIT
   - (ISC)2 Canada public CISSP directory
   - US Cyberspace security strategy
   - 2003 FISSEA Conference - homepage
   - Home Page - Privacy Commissioner of Canada
   - Pew Internet and American Life Project
   - Security Tools
   - Security Scene Errata - Charlatans
   - MI5 > Home
   - ISSA - Vancouver
   - Federal Trade Commission - Consumer Information Security
   - Organization for Internet Safety
   - ISECOM - Institute for Security and Open Methodologies
   - OpenCSOProject.org: The Ultimate Resource for Aspiring Security Professionals
   - ISSPCS: The International Systems Security Professional Certification Scheme
   - Treachery Unlimited: A Computer & Network Security Information Site
   - Office of the National Counterintelligence Executive-What's New Section
   - NIST Computer Security: Federal Information Processing Standards (FIPS) page
   - United States Secret Service
   - How many CISSPs are there?
   - Navy Info Assurance Tips
  
  
- sec arch
   
- The ISO17799 Security Newsletter
   - In-Depth Review of the Bell-Lapadula Model
   - TCPA / Palladium FAQ
   - Common Criteria Project -- HomePage
   - Multics Home page
   - NIAP - NATIONAL INFORMATION ASSURANCE PARTNERSHIP ®
   - Common Criteria, Parts 1-3
   - The Common Criteria Home Page
   - 
   - CC - Common Criteria for Information Technology Security Evaluation
  
  
- sec man
   
- The ISO17799 Security Newsletter
   - GASSP Home Page
   - Common Criteria Project -- HomePage
   - GASSP Version 2
   - CobiT: Download the Executive Summary, Framework, and Control Objectives
   - NIST Computer Security Special Publications
   - Special Pub 800-12 -- An Introduction to Computer Security: The NIST Handbook
   - The CISSP and SSCP Open Study Guides Web site
   - Common Criteria, Parts 1-3
   - SANS Institute - Security Policy Project
   - Privacy International - Stupid Security
   - Rudimentary Treatise on the Construction of Locks
   - On the discussion of security vulnerabilities
   - CobiT: Download the Executive Summary, Framework, and Control Objectives
   - ISECOM Open Source Security Testing Methodology Manual
   - Handbook AS-805, Information Security
   - CobiT: Download the Executive Summary, Framework, and Control Objectives
   - rfc1244 - Site Security Handbook
   - Simtel - DownLoad: b4all130.zip
   - Risk Support index
   - 
   - 
   - NRIC - Network Reliability & Interoperability Council
   - NRIC Best Practices
   - Internal Audit: Resources for Internal Auditors
   - Threat and Risk Assessment Working Guide (ITSG-04)
   - Common Criteria - Developers - Official CC/CEM versions
   - fault-tree.net Selected Readings on Fault Tree and related analytical methods.
   - COSO
   - 
  
  
- telecom
   
- COTSE-IP Tools
   - net stumbler dot com
   - Commonly Probed Ports
   - alt.spam FAQ or "Figuring out fake E-Mail & Posts". Rev 19991122
   - Media Awarness Network - The Three Little Cyber Pigs
   - RE: SPAM: SPAM and the Internet
   - SRI/CSL's: Intrusion Detection Page
   - The WWW Security FAQ
   - Intro to IPsec
   - CERIAS - Security Trends
   - NIST on wireless security
   - Warchalking || Warchalking Legality FAQ
   - RFC 1492 - An Access Control Protocol, Sometimes Called TACACS. C. Finseth.
   - The Attacks on GRC.COM
   - HoneyNet Project
   - The Distributed Reflection DoS Attack
   - Guidelines on Internet Access for Children and Parents
   - FAQ: Teergrubing against Spam
   - Internet Storm Center
   - Home Network Security
   - Internet Tutorial
   - SANS / FBI The Twenty Most Critical Internet Security Vulnerabilities
   - FBI Publications - A Parent's Guide to Internet Safety
   - Guidelines on Internet Access for Children and Parents
   - SafeKids.Com Home Page
   - Web Wise Kids - Provides Internet Safety program for Adults & Children
   - AT&T Fraud Education: At Home
   - Bloomba
   - Top 75 Network Security Tools
   - Web Security Field Guide by Steve Kalman
   - Pew Internet and American Life Project
   - 
   - Washington Internet Project
   - Free Firewall Software for Windows - download
   - Loaf
   - 
   - Marcus J. Ranum
   - WormRadar
   - Tracing Emails
   - MailFrontier Phishing IQ Test
   - IMlogic :: Instant Messaging Infrastructure
  
  
- vendors
   
- Riptech
   - Zone Labs
   - Gibson Research Corporation Homepage
   - Cerberus Information Security, Ltd
   - ASR Data
   - data recovery
   - Counterpane Homepage
   - Gibson Research Corporation Homepage
   - Ontrack Data International, Inc. - Data Recovery, Software, Computer Evidence Services
   - Fred Cohen & Associates
   - ArcSight - Security Management for the Enterprise
   - Clearswift
   - Computer Associates
   - Corbett delivers network security and information security services.
   - DataSec Limited
   - Ernst & Young - Global Home
   - Guidance Software - Home of the world's leading computer forensic solutions
   - Welcome to Integralis
   - Computer Forensics - NTI Training, Tools and Consulting
   - PentaSafe Security Technologies, Inc. The safest way to grow your business.
   - QinetiQ
   - Sanctum Inc. - Save Your Site
   - savvy data
   - SilentRunner - Information Rules. Protect Yours.
   - TheTrainingCo. Techno-Security  Training Website
   - TLSI Inc. - Electronics Solutions Worldwide
   - Vogon International
   - Web services security ::Vordel::
   - WetStone Technologies, Inc.
   - RDA Homepage
   - LaBrea - The Tarpit
   - Technology Section - Virtual Matrix Encryption | Meganet Corporation
   - IntelliRecovery- Global data recovery services company specializing in hard disk & hard drive recovery
   - IntelliRecovery- Global data recovery services company specializing in hard disk & hard drive recovery
   - cansecwest 2004
   - Security Volition
   - Ad-aware - Software - Lavasoft
   - The home of Spybot-S&D!
   - SpywareInfo :· Spyware and hijackware Removal Specialists
   - Webroot Software Inc - Home Page
   - Spyaudit
   - www.comparespywareremovers.com
   - Spyware Remove ::  Spyware Remove Deletes all Spyware From Your Machine.  FREE DOWNLOAD
   - SpyKiller - The #1 Rated SpyWare and AdWare Killer for your PC!
   - OmniPass Enterprise Edition
   - University of Fairfax
   - Security University
   - Data Recovery Centers
   - Data Recovery, Computer Forensics, Raid Data Recovery and Hard Disk Data Recovery by Ibas
   - InfoDev-Security.net
   - Amenaza Technologies Limited | Home
   - Security Risk Assessment Software Tool - Relational Security
   - Computer Forensics Training, Computer Forensic Investigation, Computer Forensics Houston - CyberEvidence, Inc.
  
  
- Web info grabbers
   
- Analyze Your Internet Privacy
   - The Limit Software, Inc.
   - The Consumer Information Organization's Consumer.Net.
   - Privacy Analysis of your Internet Connection
   - Fat-Free Software News
   - Shields UP! -- Internet Connection Security Analysis
   - E-Soft Inc.
   - Security Space
   - eEye™ Digital Security
   - MC2 Security Wire Computer and Network/Security Solution, hacking, operating systems, virus information and more!
   - COTSE-IP Tools
   - network tool v2.41
   - DSL - DSLreports.com - the place for BROADBAND
   - HACKER WHACKER Remote Computer Network Security Scan
   - Online Security Check
   - Security Space
   - Anonymizer.com - Test #1: Your Unique IP Address
  
  
- CIAC Internet Hoaxes
  - RISKS-LIST: RISKS-FORUM Digest
  - SecSIG - WWW DEC Notes Server on MUKLUK
  - SekOrg Security Library
  - The Center for Democracy and Technology
  - Books on the Social Aspects of Computing
  - Experimental Interaction Unit
  - TECS: The Encyclopaedia of Computer Security
  - Computer Security - Suite101.com
  - L0pht Heavy Industries Security Advisories
  - Ph thesis by Suzana Stojakovic-Celustka
  - Security Search - The Security Search Engine
  - s e c u r i t y f o c u s
  - Common Vulnerabilities and Exposures
  - Pueblo High Tech Crimes Unit - Slide Shows
  - attrition.org
  - Perspectives of the Smithsonian: Smithsonian Computer History
  - Security Solutions Online Presented By Access Control & Security Systems Integration
  - IT Crime - IT Security and crime prevention methods
  - Security Information
  - Security Tools
  - Security News
  - Handbook of Information Security Management:Introduction
  - Security Publications from Other Organizations
  - Rainbow Series
  - Information Security Resources
  - Publications
  - Frequently Asked Questions (FAQ)
  - Whitepapers
  - Wiretapped - Computer Security Software etc.
  - The Security Writers Guild
  - Common Vulnerabilities and Exposures
  - ICAT Metabase: A CVE Based Searchable Vulnerability Index
  - SecurityPortal - July, 2001
  - SecurityPortal - July, 2001
  - Linux Security - The Community's Center For Security
  - Microsoft TechNet
  - rain forest puppy - choose your skin
  - @stake Research Labs - Advisories
  - Scott Schnoll's Internet Explorer Security Center
  - Certificate in Internet & Technology Security at UBC Continuing Studies: Computers & Technology
  - s e c u r i t y w a t c h . c o m
  - Security books by Chuvakin
  - Books on the Social Aspects of Computing
  - Censorship in action: why I don't publish my HDCP results
  - The SANS Security Policy Project
  - Fact Squad
  - Home Network Security
  - Access Control Journal Papers
  - CCCL's collection of information security and computer audit web resources at PowerFavorites
  - Information Security Education Resources for Professional Development
  - The Ideahamster Organization - About The Open Source Security Testing Methodology Manual
  - COAST Library (23-Feb-1998)
  - SecurityFocus home columnists: A Certified Waste of Time
  - Try2Hack
  - IA-CMM
  - Introduction to Computer Security
  - Nessus
  - SecurityFocus home tools archive
  - NSS Group - Europe's foremost independent network testing facility, security and consultancy organisation
  - Distributed Denial of Service (DDoS) Attacks/tools
  - SANS Reading Room: Home and Small Office Computing
  - IWS - The Information Warfare Site
  - 2002 Report of the Auditor General of Canada - April - Chapter 3 - Information Technology Security
  - EUROPA - Internal Market - Data Protection - Third countries: Canada/FAQ
  - Symantec Security reference handbook
  - Hacking and Hackers - Computer Security Programs Downloading Search Engines Portal News
  - Security | Sage
  - Network Security Library
  - Whitehats Network Security Resource
  - Security Search
  - Cracking the hackers' code - smh.com.au
  - Next-Generation Win32 exploits: fundamental API flaws
  - CyberSmart! : Home
  - RobertGraham.com Infosec Publications
  - Illustrative Risks compendium
  - NetDay Cyber Security Kit for Schools
  - Handbook of Information Security Management:Table of Contents
  - TEMPEST 101 - Debunking the Myth
  - Top 75 Network Security Tools
  - Summit Training
  - Security Awareness Graphics from Interpact's Artists
  - concepts - security clipart - Clip Art Directory
  - Security Awareness Posters by Native Intelligence
  - Summit Training
  - CISSP Study Guide
  - Les Bell and Associates Pty Ltd: Security Tech-Notes and White Papers
  - Personal Page - Dan Houser, CISSP
  - 
  - Guidelines on Internet Access for Children and Parents
  - History of Computer Security
  - Computer Security Day
  - InfoSecByte!
  - BasicSec.org -- Tools and Resources
  - A Taste of Computer Security
  - OpenCSOProject.org: The Ultimate Resource for Aspiring Security Professionals
  - Talisker Computer Security Advice For The Home User
 
Book reviews main topic menu
Recommended security books by domain
menu
Virus information main menu