9. |
-
The World Wide Web Security FAQ
-
URL: http://www.w3.org/Security/Faq
|
10. |
-
Computer security bulletins [CIAC] [operating systems]
- Computer Incident Advisory Capability website.
URL: http://www.ciac.org/ciac
|
11. |
-
Secure Shell
- Strong cryptography for protecting all transmitted confidential data, including passwords, binary files, and administrative commands.
URL: http://www.cs.hut.fi/ssh
|
12. |
-
Tripwire
- Software that montors system for security break-in attempts.
URL: ftp://www.wuarchive.ustl.edu/packages/security/tripwire
|
13. |
-
Tiger [Overview]
- Scans a system for potential security problems.
URL: ftp://wuarchive.wustl.edu/packages/security/TAMU
|
14. |
-
Merlin
- Takes a popular security tool (such as tiger, tripwire,
cops, crack, or spi) and provides it with an easy-to-use, consistens
graphical interface, simplifying and enhancing its capabilities.
URL: http://ciac.llnl.gov/ciac/ToolsUnixSysMon.html#Merlin
|
15. |
-
Linux Administrator's Security Guide
- The Linux guides section has two documents about Linux security which I find very good: * Get Acquainted with Linux Security and Optimization System * Linux Administrator's Security Guide
URL: http://linuxdoc.org/docs.html#guide
|
16. |
-
Computer Security Update
- Keeping up on computer security and privacy issues isn't just for the experts."Hideaway.net" offers updates and resources, including access to free programs.
URL: http://hideaway.net
|
17. |
-
linuxnewbie security
- Articles about maintaining a secure Linux computer.
URL: http://www.linuxnewbie.org/nhf/intel/security/index.html
|
18. |
-
Steps for Recovering from a UNIX or NT System Compromise
- This document is being published jointly by the CERT Coordination Center and AusCERT (Australian Computer Emergency Response Team). It describes suggested steps for responding to a UNIX or NT system compromise. Your response should be carried out in several stages.
URL: http://www.cert.org/tech_tips/win-UNIX-system_compromise.html
|
19. |
-
eEye [news]
- eEye is your security partner, watching over your networks. We provide security products and services to help you secure your networks and the vital corporate data that resides on your servers.
URL: http://www.eeye.com/html/
|
20. |
-
Securing a RedHat Linux 6.2 machine (Basics)
- This article will cover the basics of making a virgin redhat install more or less secure before putting it on the internet. Remember all of this work should be done before the box is put online, as machines can be rooted in minutes of being on the net.
URL: http://www.net-security.org/text/articles/srh.shtml
|
21. |
-
Understanding the Attackers Toolkit
- A rootkit is defined by the NSA Glossary of Terms Used in Security and Intrusion Detection as an "A hacker security tool that captures passwords and message traffic to and from a computer.
URL: http://www.sans.org/infosecFAQ/linux/toolkit.htm
|
22. |
-
putty [download]
- PuTTY: A Free Microsoft Windows Telnet/SSH
Client.
URL: http://www.chiark.greenend.org.uk/~sgtatham/putty/
|
23. |
-
Secure Computer information at Stanford
- Did you know that when you connect a computer to the Internet, it is usually scanned by hackers within the first few minutes to discover whether it can be broken into? As an open research and education organization connected to the Internet, Stanford's network is accessible to most anyone worldwide.
URL: http://securecomputing.stanford.edu/
|
24. |
-
chkrootkit
- chkrootkit is a tool to locally check for signs of a rootkit.
URL: http://www.chkrootkit.org/
|
25. |
-
Rootkit Hunter
- More support for rootkits, more support for operatings systems, more options, more parameters. It's time for a new release, so here it is!
URL: http://www.rootkit.nl/
|