craig> computer> admin>
     security
:
Links about network security.
1.
   The World Wide Web Security FAQ
URL: http://www.w3.org/Security/Faq
2.
   Computer security bulletins [CIAC] [operating systems]
Computer Incident Advisory Capability website.
URL: http://www.ciac.org/ciac
3.
   Secure Shell
Strong cryptography for protecting all transmitted confidential data, including passwords, binary files, and administrative commands.
URL: http://www.cs.hut.fi/ssh
4.
   Tripwire
Software that montors system for security break-in attempts.
URL: ftp://www.wuarchive.ustl.edu/packages/security/tripwire
5.
   Tiger [Overview]
Scans a system for potential security problems.
URL: ftp://wuarchive.wustl.edu/packages/security/TAMU
6.
   Merlin
Takes a popular security tool (such as tiger, tripwire, cops, crack, or spi) and provides it with an easy-to-use, consistens graphical interface, simplifying and enhancing its capabilities.
URL: http://ciac.llnl.gov/ciac/ToolsUnixSysMon.html#Merlin
7.
   Linux Administrator's Security Guide
The Linux guides section has two documents about Linux security which I find very good: * Get Acquainted with Linux Security and Optimization System * Linux Administrator's Security Guide
URL: http://linuxdoc.org/docs.html#guide
8.
   Computer Security Update
Keeping up on computer security and privacy issues isn't just for the experts."Hideaway.net" offers updates and resources, including access to free programs.
URL: http://hideaway.net
9.
   linuxnewbie security
Articles about maintaining a secure Linux computer.
URL: http://www.linuxnewbie.org/nhf/intel/security/index.html
10.
   Steps for Recovering from a UNIX or NT System Compromise
This document is being published jointly by the CERT Coordination Center and AusCERT (Australian Computer Emergency Response Team). It describes suggested steps for responding to a UNIX or NT system compromise. Your response should be carried out in several stages.
URL: http://www.cert.org/tech_tips/win-UNIX-system_compromise.html
11.
   eEye [news]
eEye is your security partner, watching over your networks. We provide security products and services to help you secure your networks and the vital corporate data that resides on your servers.
URL: http://www.eeye.com/html/
12.
   Securing a RedHat Linux 6.2 machine (Basics)
This article will cover the basics of making a virgin redhat install more or less secure before putting it on the internet. Remember all of this work should be done before the box is put online, as machines can be rooted in minutes of being on the net.
URL: http://www.net-security.org/text/articles/srh.shtml
13.
   Understanding the Attackers Toolkit
A rootkit is defined by the NSA Glossary of Terms Used in Security and Intrusion Detection as an "A hacker security tool that captures passwords and message traffic to and from a computer.
URL: http://www.sans.org/infosecFAQ/linux/toolkit.htm
14.
   putty [download]
PuTTY: A Free Microsoft Windows Telnet/SSH Client.
URL: http://www.chiark.greenend.org.uk/~sgtatham/putty/
15.
   Secure Computer information at Stanford
Did you know that when you connect a computer to the Internet, it is usually scanned by hackers within the first few minutes to discover whether it can be broken into? As an open research and education organization connected to the Internet, Stanford's network is accessible to most anyone worldwide.
URL: http://securecomputing.stanford.edu/
16.
   chkrootkit
chkrootkit is a tool to locally check for signs of a rootkit.
URL: http://www.chkrootkit.org/
17.
   Rootkit Hunter
More support for rootkits, more support for operatings systems, more options, more parameters. It's time for a new release, so here it is!
URL: http://www.rootkit.nl/

  Jump:
  Search:
toolbar help Random Link   Map   Flat Listing   Brief Listing   Login