REFERENCES

 
CERT http://www.cert.org/nav/index.html
CERT Advisories http://www.cert.org/advisories/
CERT Incident Notes http://www.cert.org/incident_notes/
CERT Summaries http://www.cert.org/summaries/
CERT Current Activity http://www.cert.org/current/current_activity.html
DoD CERT http://www.cert.mil
Computer Weekly http://www.computerweekly.com
DeepSight Threat Management System https://tms.symantec.com
DHS Daily Report Archives http://www.nipc.gov/dailyreports/dailyindex.htm
Federal Computer Incident Response Center (FedCIRC) http://www.fedcirc.gov/
iDefense http://www.idefense.com/
Infosyssec http://www.infosyssec.com/
SANS http://www.sans.org
NIST Computer Security Resource Center (SCRC) http://csrc.nist.gov/
NIST Vulnerability and Threat Portal http://icat.nist.gov/vt_portal.cfm
NIST Security Bulletins http://csrc.nist.gov/publications/nistbul/
Navy Information Security Techical Assistance Center (ITAC) https://infosec.navy.mil
Navy Information Assurance https://infosec.navy.mil/ps/?t=main/main.tag&bc=main/bc_main.html
Navy NAVCIRT Advisories Database (IAVAs) https://infosec.navy.mil/Advisory/advi?
IATAC http://iac.dtic.mil/iatac/
IATAC Digest http://iac.dtic.mil/iatac/products/ia_digest.htm
Hacker Intel http://www.hackerintel.com/
CERT Tech Tips on Improving Security   http://www.cert.org/tech_tips/
CIAC Documents http://ciac.llnl.gov/cgi-bin/index/documents  http://ciac.llnl.gov/cgi-bin/index/documents
The Cryptography Project   http://www.cosc.georgetown.edu/~denning/crypto
FIRST Security Papers   http://www.alw.nih.gov/Security/first-papers.html
Hideaway.Net - Security Texts   http://www.hideaway.net/Server_Security/Library/library.html
Information Warehouse! Technical Publications   http://iwi.com/iw-pubs.htm
Miscellaneous Security Papers (ftp)   ftp://jhunix.hcf.jhu.edu/pub/miscellaneous_security_papers
Model Security Policies (SANS Institute Resources)   http://www.sans.org/newlook/resources/policies/policies.htm
Rainbow Series Books   http://csrc.nist.gov/secpubs/rainbow/
Raptor Systems Security Library   http://www.raptor.com/lib/index.html
NSA Security Configuration Guides http://www.nsa.gov/snac/
   

General Topics

 
Security Glossary of Terms   http://www.setsolutions.com/security.htm
Glossary of Terms Used in Security and Intrusion Detection   http://www.sans.org/resources/glossary.php
An Introduction to Computer Security , NIST Special Publication 800-12  http://csrc.nist.gov/publications/nistpubs/index.html
IT Baseline Protection Manual from BSI  http://www.bsi.bund.de/gshb/english/menue.htm
How To Eliminate The Ten Most Critical Internet Security Threats - SANS  http://www.sans.org/top20/top10.php
   
   

DATABASES

 
NIST - ICAT Vulnerability Database http://icat.nist.gov/icat.cfm
NIST - ICAT Vulnerability Database - Top Ten Vulnerabilities http://icat.nist.gov/icat.cfm?function=topten
NIST Computer Security Resource Center (SCRC) - Virus Information http://csrc.nist.gov/virus/
Computer Vulnerabilities and Exposure (CVE) http://cve.mitre.org/about/
CVE Index and Search http://cve.mitre.org/cve/index.html
CVE Concordance http://www.iss.net/security_center/advice/Concordance/default.htm
Full-Disclosure Archives http://lists.netsys.com/pipermail/full-disclosure/
Virus Bulletin http://www.virusbtn.com/resources/
eEye Digital Security http://www.eeye.com/html/Research/Advisories/index.html
zone-h http://www.zone-h.org/en/defacements/special
ICAT Metabase http://icat.nist.gov
Open Source Vulnerability Database http://www.osvdb.org
   

ACTIVITY MONITORING and REPORTS

Symantec Threat Monitoring System https://tms.symantec.com
Internet Storm Center http://isc.incidents.org
Internet Storm Center - Top 10 http://isc.incidents.org/top10.html
my NetWatchman -  Top Ports http://www.mynetwatchman.com/tp.asp
my NetWatchman - Top Port Increase http://www.mynetwatchman.com/tpincr.asp
Dshield - General Lookup http://www.dshield.org/reports.php
Dshield - Top 10 Most Wanted IP http://www.infosyssec.com/cgi-bin/flink.cgi?target=www.infosyssec.com/infosyssec/bor1.htm
Dshield - Top 10 Target Ports http://www.infosyssec.com/cgi-bin/flink.cgi?target=www.infosyssec.com/infosyssec/bor2.htm
   

IP ADDRESS LOOKUP

 
INTERNET REGISTRIES  
American Registry for Internet Numbers (ARIN) http://www.arin.net
Asia Pacific Network Information Centre http://www.apnic.net
Réseaux IP Européens (RIPE) http://www.ripe.net
Latin America and Caribbean Internet Registration (LACNIC) http://lacnic.net/cgi-bin/lacnic/whois?lg=EN
APJII - Indonesia  
CNNIC - China  
JPNIC - Japan http://whois.nic.ad.jp/cgi-bin/whois_gw
KRNIC - Korea http://www.nic.or.kr/www/english/
TWNIC http://www.twnic.net/index2.php
VNNIC - Vietnam  
Military networks http://www.nic.mil
Symantec TMS https://tms.symantec.com
Dshield - General Lookup http://www.dshield.org/reports.php
   

TOOLS

 
Network Calculator http://www.telusplanet.net/public/sparkman/netcalc.htm
Visual Route http://visualroute.visualware.com
Open Vulnerability Assessment Language http://oval.mitre.org/
SPEW.org http://spews.org
GeekTools http://www.geektools.com/tools.php
Karen's Power Tools http://www.karenware.com/powertools.asp
Mozilla Firefox 0.8 http://www.mozilla.org
New Work and Security Tools http://thc.org
String encoder and decoder http://umbrella.name/codenow.htm
Canvas http://www.immunitysec.com/downloads.shtml
Datarescue http://www.datarescue.com/idabase/index.htm
Ascii , dex , oct reference  http://www.asciitable.com/
Solidshell http://solidshell.net/#
Fosh http://www.fosh.com.au/Fosh/Support/hextoascii.htm
Spychecker http://www.spychecker.com/
Hfnetchk http://hfnetchk.shavlik.com/default.asp
netcraft http://news.netcraft.com/
Proxypot http://www.proxypot.org/
multiproxy www.multiproxy.org
webferret www.webferret.com
   

BACKGROUND / REFERENCES

Internet Security Systems http://www.iss.net/security_center/advice
DeepSight Alert Services https://alerts.symantec.com
Trojan List with Sorting Options http://www.simovits.com/trojans/trojans.html
Trojan List v, Ports http://www.jlathamsite.com/dslr/suspectports.htm
DosHelp.com Intrusion and Attack Reporting Center http://www.doshelp.com/trojanports.htm
ONCTek - Trojan / Backdoor and TCP/UDP ports http://www.onctek.com/trojanports.html
Linux Firewall Tools - Commonly Probed Ports http://www.linux-firewall-tools.com/linux/ports.html
Commodon Communications http://www.commodon.com/threat/frame.htm
InfoSysSec http://www.infosyssec.org/
Commodon Communications-Current List of Trojans http://www.commodon.com/threat/threat-all.htm
Internet Ports, Services and Trojans http://andrew.triumf.ca/ports/other.html
X-Force Research http://xforce.iss.net/
X-Force Research - Alerts and Advisories http://xforce.iss.net/xforce/alerts
Port Knowledgebase http://www.iss.net/security_center/advice/Exploits/Ports/
IANA Port Assignments http://www.iana.org/assignments/port-numbers
astalavista http://www.astalavista.com
Blackcode http://www.blackcode.com
Church of the Swimming Elephant http://www.cotse.com
CyHackPortal http://www.cyhackportal.com
DShield http://dshield.org
E-Week http://www.eweek.com/
fatelabs http://www.fatelabs.com
Hack in the Box http://www.hackinthebox.com
HACK R. COM http://www.hack3r.com
Hackersplayground http://www.hackersplayground.org
Hackerthreads.org Security Forum http://www.hackerthreads.org
Insecure.Org http://www.insecure.org
Lame Industries http://www.lameindustries.org
Linux Security.com http://www.linuxsecurity.com
my NetWatchman http://www.mynetwatchman.com
New Order http://neworder.box.sk
Packet Storm http://www.packetstormsecurity.com
ProgenicDotCom http://www.progenic.com
Root Hack http://www.roothack.org
SecurityFocus http://www.securityfocus.com
The Hacktivist http://www.thehacktivist.com/index.php
the Honeynet Project http://www.honeynet.org
Zone-h http;//www.zone-h.org
GoDaddy http://www.godaddy.com
Security News Portal http://securitynewsportal.com/index.html
Ziff Davis http://www.zdnet.com
The Register http://www.theregister.co.uk/content/1/index.html
Internet Assigned Numbers Authority http://www.iana.org/
mlsecurity http://www.mlsecurity.com/research/
Bsdhound http://bsdhound.com/link.php
Security horizon http://www.securityhorizon.com/security_whitepapers/
Cisco aironet moding http://www.mrx.com.au/wireless/AironetModifications.htm
Cyruxnet http://www.cyruxnet.org/news.htm
Deamonnews  http://www.daemonnews.org/200108/security-howto.html
I-eye http://www.i-eye.de/dokumentation/index.php
bugtraq.underattack http://bugtraq.underattack.co.kr/xploit.php3?line_1=0&line_2=10
Freebsd security http://www.watson.org/fbsd-hardening/
hack canada http://www.hackcanada.com/
rootkit http://rootkit.host.sk/
Government security http://www.governmentsecurity.org/
markusjansson http://www.markusjansson.net/exp.html
HSC http://www.hsc.fr/ressources/outils/idswakeup/index.html.en#copieecran
haxworx http://www.haxworx.com/index.php
securiteam http://www.securiteam.com/
hernanracciatti http://www.hernanracciatti.com.ar/papers_and_download.html
Shellcode http://www.shellcode.com.ar/
Security.ku.edu http://security.ku.edu/hardening/freebsd.shtml
Securitytrap http://www.securitytrap.com/
Sysinternals http://www.sysinternals.com/
Cartel-Securite http://www.cartel-securite.fr/pbiondi/projects/shellforge.html
Networkintrustion http://www.networkintrusion.co.uk/fortools.htm
Community core sdi  http://community.core-sdi.com/~juliano/bufo.html
Security Corporation http://www.security-corporation.com/
Underground Mac http://undergroundmac.com/
theory X http://www.theory-x.org/
windows security http://www.windowsecurity.com/
critical security  http://www.criticalsecurity.com/
firewall http://www.firewall.cx/
blackhate info http://www.blackhat.info/live/
hacker news http://www.hackers-news.com/
elcomsoft http://www.elcomsoft.com/prs.html
Xatrix http://www.xatrix.org/
Security Forums http://www.security-forums.com/
Hack in the Box http://www.hackinthebox.org
Camelot Newsletters and Library  http://www.camelot.com/newsletter.asp?PageID=69
Cipher Newsletter  http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/
Computer Incident Advisory Capability (CIAC) Notes  http://ciac.llnl.gov/cgi-bin/cnotes
Computer Security News Daily  http://www.MountainWave.com
Internet Security Newsletter   http://www.securecomputing.com/U_New_ISN.html
Internet Security Review  http://www.isr.net/index1.html
Hacker  Quarterly http://www.2600.com
   

USEFUL PRODUCTS

Technorati online forum search engine http://www.technorati.com
Dogpile Search Engine http://www.dogpile.com
Google Search Engine http://www.google.coom
Babelfish Machine Translation http://babelfish.altavista.com
All nettools http://www.all-nettools.com/tools4.htm
Proxify  https://proxify.com/
CGIProxy 2.0.1 http://www.jmarshall.com/tools/cgiproxy/
eventlongscan http://www.eventlogscan.com/
Eunet http://home.eunet.no/~pnordahl/ntpasswd/bootdisk.html
Free Translation.com http://Freetranslation.com
   

Security Software

   
Public Domain Security Software by Category  
Authentication and Encryption Software   http://www.alw.nih.gov/Security/prog-auth.html
Firewall Software /Security/prog-firewall.html  http://www.alw.nih.gov/Security/prog-firewall.html
Network and Network Monitoring Software   http://www.alw.nih.gov/Security/prog-network.html
System Enhancements Software /  http://www.alw.nih.govSecurity/prog-enhance.html
System Monitoring Software / http://www.alw.nih.govSecurity/prog-monitor.html
   
Public Domain Security Software  
Abacus Sentry  http://www.psionic.com/abacus/abacus_sentry.html
AIDE  http://www.cs.tut.fi/~rammer/aide.html
Anonftpd  ftp://koobera.math.uic.edu/pub/software
Additional Info: anonftd  ftp://koobera.math.uic.edu/www/anonftpd.html
Argus  ftp.andrew.cmu.edu/pub/argus
Arpwatch  ftp://ftp.ee.lbl.gov/
COPS (Computer Oracle and Password System)  ftp://ftp.cerias.purdue.edu/pub/tools/unix/scanners/cops
Courtney  ftp://ciac.llnl.gov/pub/ciac/sectools/unix
  http://www.alw.nih.gov/Security/CIAC-Notes/CIAC-Notes-08.html
Crack lib  ftp://ftp.cerias.purdue.edu/pub/tools/unix/libs/cracklib/
Deslogin  ftp://ftp.uu.net/pub/security/des/
Dig  ftp://venera.isi.edu/pub/
Drawbridge  ftp://net.tamu.edu/pub/security/TAMU/
Fcheck  http://sites.netscape.net/fcheck
Fping  ftp://ftp.stanford.edu/pub/packages/fping/
Icmpinfo  ftp://hplyot.obspm.fr/net/
Additional Info: icmpinfo man page  http://hplyot.obspm.fr/~dl/icmpinfo.html
Iss  ftp://ftp.cerias.purdue.edu/pub/tools/unix/scanners/iss/
Additional Info: CERT Advisory 93:14.Internet.Security.Scanner  http://www.cert.org/advisories/CA-1993-14.html
IPACL  ftp://ftp.porcupine.org/pub/security/
Jetmon  http://jetmon.uoregon.edu/
Kerberos  http://web.mit.edu/network/kerberos-form.html
Additional Info: Kerberos: The Network Authentication Protocol  http://web.mit.edu/kerberos/www/
Klaxon  ftp://ftp.eng.auburn.edu/pub/doug/
L6  ftp://ftp.pgci.ca/pub/l6
Additional Info: L6 http://www.pgci.ca/l6.html
Lcrzo  http://www.laurentconstantin.com/us/lcrzo/lcrzo/
Lcrzoex  http://www.laurentconstantin.com/us/lcrzo/lcrzoex/
Logdaemon  ftp.porcupine.orgftp://ftp.porcupine.org/pub/security/
Additional Info: Wietse's tools and papers  ftp://ftp.porcupine.org/pub/security/index.html
Logsurfer  ftp.cert.dfn.deftp://ftp.cert.dfn.de/pub/tools/audit/logsurfer/
Additional Info: Lo gsurfer Homepage  http://www.cert.dfn.de/eng/team/wl/logsurf/
Lsof  ftp://vic.cc.purdue.edu/pub/tools/unix/lsof
Mangle  ftp://ftp.informatik.uni-erlangen.de/pub/utilities/pwtest/
Additional Info: Readme file for Mangle ftp://ftp.informatik.uni-erlangen.de/pub/utilities/pwtest/README.mangle
Mason  http://www.pobox.com/~wstearns/mason/
Merlin  ftp://ciac.llnl.gov/pub/ciac/sectools/unix/merlin/merlin.tar.gz
Additional Info: Merlin Information  http://ciac.llnl.gov/ciac/ToolsMerlin.html
MD5  ftp://rsa.com/pub/
Additional Info: RFC 1544  http://www.rsa.com
MIME Object Security Services (MOSS)  ftp://ftp.tis.com/pub/MOSS
Additional Info: MOSS FAQ ftp://ftp.tis.com/pub/MOSS/FAQ
The Nessus Project  http://www.nessus.org/
Netlog  ftp://net.tamu.edu/pub/security/TAMU/
Network Security Scanner (NSS)  ftp://jhunix.hcf.jhu.edu/pub/nss/
NFSWatch  ftp://ftp.cerias.purdue.edu/pub/tools/unix/nfswatch/
Nmap  http://www.insecure.org/nmap/index.html
Nnap for NT Download  http://www.eeye.com/html/Databases/Software/nmapnt.html
Npasswd  ftp://ftp.cc.utexas.edu/pub/npasswd/
Additional Info: Information about npasswd  http://uts.cc.utexas.edu/~clyde/npasswd.html
OPIE  ftp://ftp.nrl.navy.mil/pub/security/opie/
Osh  ftp://ftp.c3.lanl.gov/pub/mcn/
Additional Info: The Operator Shell  http://www.c3.lanl.gov/~mcn/osh.html
Passwd+  ftp://ftp.dartmouth.edu/pub/security/
PGP  ftp://www.eff.org/pub/Net_info/Tools/Crypto
Additional Info: Cryptography, PGP, and Your Privacy  http://world.std.com/~franl/crypto.html
Pidentd  ftp://ftp.lysator.liu.se/pub/ident/servers
PingLogger  http://www.students.uiuc.edu/~jwthomp/code
Portmapper  ftp.porcupine.orgftp://ftp.porcupine.org/pub/security/
RIPEM  ftp://ripem.msu.edu/pub/crypt/GETTING_ACCESS
Additional Info: Information about RIPEM  http://www.cs.indiana.edu/ripem/dir.html
Rpcbind  ftp://ftp.porcupine.org/pub/security/
Rscan  ftp://ftp.vis.colostate.edu/pub/rscan/
Additional Info: Rscan: Heterogeneous Network Interrogation  http://www.vis.colostate.edu/rscan
SAINT  ftp://ftp.cerias.purdue.edu/pub/tools/unix/scanners/saint/
SARA  http://www-arc.com/sara/
SATAN  ftp://ftp.cerias.purdue.edu/pub/\tools/unix/scanners/satan/
Additional Info: Cert Advisory CA-95:06.satan  http://www.cert.org/advisories/CA-1995-06.html
Scan-Detector  ftp://ftp.cerias.purdue.edu/pub/tools/unix/logutils/scan-detector/
Additional Info: COAST Projects' Tools  http://www.cs.purdue.edu/coast/coast-tools.html
Sendmail  ftp://ftp.cs.berkeley.edu/ucb/sendmail
Sendmail Wrapper  ftp://ftp.auscert.org.au/pub/auscert/tools
SENSS  http://www.sun.com/software/communitysource/senss
Shadow  ftp://ftp.cs.widener.edu/pub/src/adm
Simple Socksd  http://www.leverage.com/users/tlod/ssockd.html
Additional Info: Simple SOCKS Daemon  http://waynesworld.ucsd.edu/~tlod/ssockd/ssockd.html
SKey  ftp://ftp.cerias.purdue.edu/pub/tools/unix/netutils/skey/
Simple Key-Management For Internet Protocols (SKIP)  http://skip.incog.com/form.html
Additional Info: SKIP Information http://skip.incog.com/
Siphon  http://www.subterrain.net/projects/siphon/
Smrsh  ftp://ftp.nec.com/pub/security/smrsh
Snort http://www.snort.org
Socks  ftp://ftp.nec.com/pub/security
Additional Info: Welcome to SOCKS   http://www.socks.nec.com/
SSH  ftp://ftp.cs.hut.fi/pub/ssh
Additional Info: Ssh (Secure Shell) Home Page  http://www.cs.hut.fi/ssh
STEL  ftp://idea.sec.dsi.unimi.it/cert-it/
Strobe  ftp://suburbia.apana.org.au/pub/
Sudo  ftp://ftp.cs.colorado.edu/pub/sysadmin/utilities
Additional Info: Sudo - a utility to allow restricted root access   http://www.cs.colorado.edu/~millert/sudo/
Swatch  ftp://ftp.stanford.edu/general/security-tools/swatch
Syn  ftp://ftp.pgci.ca/pub/syn/
Additional Info: Syn   http://www.pgci.ca/syn.html
TCP Wrapper  ftp://ftp.porcupine.org/pub/security/
Additional Info: TCP Wrapper   ftp://ftp.porcupine.org/pub/security/tcp_wrapper.txt.Z
Tcpdump  ftp://ftp.ee.lbl.gov/
Tcpr  ftp://ftp.alantec.com/pub/tcpr/
Tiger  ftp://net.tamu.edu/pub/security/TAMU/
Traceroute  ftp://ftp.psc.edu/pub/net_tools/
   
Tripwire  ftp://ftp.cerias.purdue.edu
Additional Info: Tripwire   ftp://ftp.cerias.purdue.edu/pub/tools/unix/ids/tripwire/
TTY-Watcher  ftp.cerias.purdue.edu
Wu-ftpd  wuarchive.wustl.edu
Xinetd  qiclab.scn.rain.com
Xp-BETA  ftp.mri.co.jp
YPX  ftp.uu.net
   

SUBSCRIPTION SERVICES

IATAC NEWS LETTER http://iac.dtic.mil/iatac
Microsoft Windows Security Bulletin http://www.microsoft.com/technet/security/bulletin/notify.mspx
Sophos Alert System Tosubscribetothelist,sendanemailto

notification-subscribe@lists.sophos.com

orvisithttp://www.sophos.com/virusinfo/notifications/
Full-Disclosure digest http://lists.netsys.com/mailman/listinfo/full-disclosure
morning wood http://exploitlabs.com/menu.html
   
   

FOCUS ON BROWSER SECURITY

People   
Liu Die Yu http://www.safecenter.net/UMBRELLAWEBV4/DirSvc/index.html
Jelmer http://62.131.86.111/
Georgi Guninski http://www.guninski.com/
http-eqiv http://www.malware.com/
   

PENETRATION TESTING

Hammer of the gods http://ettercap
Netbios attacks using samba  http://www.sorgonet.com/security/windows-shared-resources/
Netbios attacks using samba  http://www.hackinthebox.org/print.php?sid=5719
Secfr http://secfr.nerim.net/docs/fingerprint/en/ttl_default.html
Enumeration http://home.ubalt.edu/abento/753/enumeration/enumerationtools.html
Ettercap http://ettercap.sourceforge.net/
Excoll http://ers.pp.ru/excoll/
Rosiello http://www.rosiello.org/en/index.html
Sql injection http://www.sitepoint.com/article/sql-injection-attacks-safe
Rootexploit http://rootexploit.net/docs/dictionaries/
Session hijack http://staff.washington.edu/dittrich/talks/agora/script.html
Skopesix http://www.skopesix.com/
Webhack http://www.web-hack.ru/exploit/
lcamtuf http://lcamtuf.coredump.cx/p0f.shtml
Wordlist ftp://ftp.ox.ac.uk/pub/wordlists/
   

SECURITY TRAINING COMPANIES

Dave Aitel http://www.immunitysec.com/news-latest.shtml
Foundstone www.foundstone.com
Hacker Degree http://www.hackerdegree.com/?source=adwords
   

SHELL SCRIPTING AND PROGRAMMING

Bash shell  http://www.tldp.org/LDP/abs/html/
Bash shell  http://www.arachnoid.com/linux/shell_programming.html
Bash shell  http://steve-parker.org/sh/loops.shtml
C basics http://www.haxworx.com/texts/c_documentation.html
C programming XOR-Encryption http://www.cprogramming.com/tutorial/xor.html
Buffer overflow  http://www.shellcode.com.ar/docz/bof/mixter-smash.txt
XML  http://64.26.23.218/gpage.html
   
   

Advisories from Independent Groups

   
8LGM Advisories http://www.alw.nih.gov/Security/8lgm.html
AUSCERT Advisories http://www.auscert.org.au/Information/advisories.html
Bugtraq Archives  http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html
CIAC Bulletins http://ciac.llnl.gov/cgi-bin/index/bulletins/
DFN-CERT http://www.cert.dfn.de/eng/
(@) Stake Advisories http://www.atstake.com/research/advisories/
Rootshell http://www.rootshell.com/
Secure Networks, Inc. (SNI) Advisories  http://www.secnet.com/advisories/
VulnWatch - Vulnerability Disclosure List http:///  http://www.vulnwatch.org/
   

Advisories from Vendors

   
Microsoft Security Advisor   http://www.microsoft.com/security/
OpenBSD Security Views  http://www.openbsd.org/security.html
Silicon Graphics Security Advisories   http://www.sgi.com/Support/security/advisories.html
   
   

Specialized Topics

   

Java

 
Java Security   http://swissnet.ai.mit.edu/~jbank/javapaper/javapaper.html
Java Security: From HotJava to Netscape and Beyond   http://www.cs.princeton.edu/sip/pub/secure96.html
Low Level Security in Java   http://java.sun.com/sfaq/verifier.html
Security in Java   http://java.sun.com/whitePaper/java-whitepaper-8.html
   

Network 

 
Home PC Firewall Guide for Internet Security   http://www.FireWallGuide.Com
Internet Spoofing Reference http:// http://www.articsoft.com/web_spoofing.htm
Security in a Public World: A Survey   http://www.stanford.edu/group/DCE/Gaurav/sec_doc.html
Things that Go Bump in the Net http://www.research.ibm.com/massdist/bump.html
   

PGP 

 
PGP: a Nutshell Overview  (PDF)  http://www.jjgb.com/public_files/pgpnut.pdf
PGP User's Guide Volume 1  (PDF)  http://www.jjgb.com/public_files/pgpvol1.pdf
PGP User's Guide Volume 2  (PDF)  http://www.jjgb.com/public_files/pgpvol2.pdf
   

Kerberos 

 
Kerberos: Authentication for computer networks  http://nii.isi.edu/gost-group/products/kerberos/
Kerberos Information and Help by Lenny Miceli of SUNY at Buffalo  http://ubvms.cc.buffalo.edu/~tkslen/kerberos.html
Kerberos: The Network Authentication Protocol   http://web.mit.edu/kerberos/www/
Kerberos Reference Page l by Derrick Brashear of CMU  http://www.cs.cmu.edu/afs/andrew.cmu.edu/usr/shadow/www/kerberos.htm
State of Macintosh Kerberos Authentication   http://ccmc17.cc.ncsu.edu/sma/sma.html
Troubleshooting and Configuring Kerberos V5 Client Support  in Cisco IOS Router Configuration  http://www.cisco.com/warp/public/106/kerb_pt1.html
   

Unix 

 
An Architectural Overview of Unix Network Security http://www.alw.nih.gov/Security/Docs/network-security.html
How to improve Security on SunOS 4.1.3 ftp://ftp.hawaii.edu/pub/security/doc/
Hardening Solaris. This article presents a concise step-by-step approach to securely installing Solaris for use in a firewall DMZ. l  http://securityportal.com/direct.cgi?/coverstory19991025.htm
Improving the Security of Your Site by Breaking Into it   http://www.alw.nih.gov/Security/Docs/admin-guide-to-cracking.101.html
Securing X Windows   http://ciac.llnl.gov/ciac/documents/ciac2316.html
   

Windows NT 

 
The Hardening of Microsoft Windows NT   http://pw2.netcom.com/~honeyluv/HardNT40rev1.pdf
Windows NT Security Information   http://www.microsoft.com/security/products/windowsnt.asp.htm
Understanding Virus Behavior in the Windows NT Environment   http://www.symantec.com/avcenter/reference/vbnt.html
Windows NT Security l  http://world.std.com/~jimf/papers/nt-security/nt-security.htm
Windows NT Security Issues   http://www.somarsoft.com/security.htm
   
Netsurfer Focus  http://www.netsurf.com/nsf/
Secure News  http://www.isecure.com/newslet.htm
SecurityTracker.com   http://securitytracker.com/
   

Steganography 

 
Steganography   http://www.thur.de/ulf/stegano/
Steganography by Neil F. Johnson  http://http://www.jjtc.com/stegdoc
   

Viruses

 
Security (Computer Technology)  http://www.einet.net/galaxy/Engineering-and-Technology/Computer-Technology/Security.html
Hideaway.Net - Anti-Virus Links http://www.hideaway.net/Anti-Virus/anti-virus.html   
ICSA Labs Anti-Virus site   http://www.icsalabs.com/html/communities/antivirus/index.shtml
Internet Hoaxes   http://ciac.llnl.gov/ciac/CIACHoaxes.html
ITtoolbox Security   http://security.ittoolbox.com/
Macintosh Virus Information   http://wwwhost.ots.utexas.edu/mac/pub-mac-virus.html
Symantec Security Response   http://www.sarc.com
Virus Bulletin   http://www.virusbtn.com/
   

World Wide Web (WWW)

Netscape: On Security  http://home.netscape.com/info/security-doc.html
The World Wide Web Consortium http://www.w3c.org/
Writing Secure CGI Scripts   http://hoohoo.ncsa.uiuc.edu/cgi/security.html
WWW Security   http://www-ns.rutgers.edu/www-security/index.html
   

Miscellaneous 

 
ITtoolbox Security  http://security.ittoolbox.com/
Security on the Net  by Law Journal Extra!  http://www.ljextra.com/securitynet
Hideaway.Net - Security Links http://www.hideaway.net/Server_Security/Library/library.html
securitypointer.com - Computer Security Privacy and Tools http://www.securitypointer.com   
SecuritySearch.Net - The Internet security resource   http://www.securitysearch.net/
   
   

Computer Security Organizations

   
American Society for Industrial Security   http://www.securitymanagement.com/asismore.html
Canadian Society for Industrial Security   http://www.csis-scsi.org
   
Communications Security Establishment  http://www.cse.dnd.ca/
Computer Security Institute http://www.gocsi.com/   
   
Electronic Frontier Foundation   http://www.eff.org/
Forum of Incident Response and Security Teams (FIRST)   http://www.first.org/
FIRST Member Security Teams   http://www.first.org/team-info/www.html
High-Tech Crime Network   http://www.htcn.org
   
Information Systems Security Association (ISSA)   http://www.issa-intl.org
The Institute Of Information Security - INSTIS   http://www.instis.com
International Association for Cryptologic Research   http://www.swcp.com/~iacr/
ICSA Labs   http://www.icsalabs.com/
Italian Computer Antivirus Research Organization   http://www-iwi.unisg.ch/~sambucci/icaro/index.html
National Security Institute   http://nsi.org/
SANS Institute   http://www.sans.org/
The USENIX Association   http://www.usenix.org/
   

USENET Computer Security NewsGroups

   
alt.disasters.planning news:alt.disasters.planning  news:alt.disasters.planning
alt.hackers   news:alt.hackers
alt.security   news:alt.security
alt.security.alarms y  news:alt.security
alt.security.keydist   news:alt.security.keydist
alt.security.pgp   news:alt.security.pgp
alt.security.ripem   news:alt.security.ripem
alt.security.tscm   news:alt.security.tscm
comp.lang.java.security   news:comp.lang.java.security
comp.os.ms-windows.nt.admin.security   news:comp.os.ms-windows.nt.admin.security
comp.os.netware.security   news:comp.os.netware.security
comp.protocols.kerberos   news:comp.protocols.kerberos
comp.risks   news:comp.risks
comp.security.announce   news:comp.security.announce
comp.security.firewalls   news:comp.security.firewalls
comp.security.gss-api   news:comp.security.gss-api
comp.security.misc   news:comp.security.misc
comp.security.pgp   news:comp.security.pgp
comp.security.pgp.announce   news:comp.security.pgp.announce
comp.security.pgp.discuss   news:comp.security.pgp.discuss
comp.security.pgp.resources   news:comp.security.pgp.resources
comp.security.pgp.tech   news:comp.security.pgp.tech
comp.security.unix   news:comp.security.unix
comp.virus   news:comp.virus
info.firewalls-digest t  news:info.firewalls-diges
misc.security   news:misc.security
sci.crypt   news:sci.crypt
sci.crypt.research   news:sci.crypt.research
   
   
   

NEW

 
   
The Center for Education and Research in Information Assurance and Security (CERIAS) http://www.cs.purdue.edu/coast/coast.html
SNP Security New Portal http://www.securitynewsportal.com/index.shtml
Security Tracker http://www.securitytracker.com/
  http://www.theregister.co.uk/
  http://www.infosecnews.com/home/index.cfm
Secunia Graphical Advisories page http://secunia.com/
  http://www.securityfocus.com/
  http://www.zone-h.org/
  http://www.viruslist.com/en/weblog
  http://www.f-secure.com/weblog/
  http://securitywizardry.com/radar.htm
  http://www.internettrafficreport.com/main.htm
  http://www.internetpulse.net/
  http://www.us-cert.gov/current/current_activity.html
  http://www.security-forums.com/
   
Public Cooperative Vulnerability Database https://cirdb.cerias.purdue.edu/coopvdb/public/pub_search.php
X-force DataBase (ISS) http://xforce.iss.net/xforce/search.php
  http://www.auscert.org.au/
Hideaway.net http://www.hideaway.net/home/public_html/index.php
United States Computer Security Emergency Readiness Team. (DHS) http://www.us-cert.gov/current/current_activity.html
United States Computer Security Emergency Readiness Team. (DHS) Resources Page http://www.us-cert.gov/resources.html
United States Computer Security Emergency Readiness Team. (DHS) Resources Page http://www.us-cert.gov/federal/
Dartmouth College ISTS http://www.ists.dartmouth.edu/library.php
The Information Warfare Site (UK mailing list) http://www.iwar.org.uk/mailman/listinfo/infocon/
Attrition - / Defaced Commentary Mail List Archive http://www.attrition.org/security/commentary/
   
Safemode  - inactive defacement archive http://www.safemode.org/
   
Zone-H  - The Internet Thermometer - Defacement Archive and IT Security http://www.zone-h.org/en/defacements