Security - Authenticity - Integrity


"Never trust a computer
you can't throw out a window."
Apple co-founder Steve Wozniak

"Don't throw the computer out of the window,
throw Windows out of the computer!"
Unknown


Security and Firewalls: [2, 9, 16 Dec 2000]


 

  1. free WAP certificates for test purposes

 

 

Security/Firewalls: [2 Dec 2000]

  1. HavenCo
  2. The Principality of Sealand
  3. Principality of Sealand

  1. Stornet :: Engineering Complete Storage Solutions
  2. Stornet :: Engineering Complete Storage Solutions
  3. SecurityFocus
  4. Forum of Incident Response and Security Teams
  5. CERT Coordination Center
  6. SANS Institute Online - Home Page

  1. SecuriTeam.com
  2. WU-FTPD
  3. WU-FTPD
  4. Internet/Network Security
  5. Script Kiddies

TEMPEST

  1. The Complete, Unofficial TEMPEST Information Page
  2. TEMPEST monitoring in the real world
  3. Rise of the TEMPEST
  4. A Year Ago: Cypherpunks publish proof of Tempest
  5. TEMPEST 101 - Debunking the Myth
  6. Tempest, van Eck phreaking, and High Tech Tinfoil

10.0.0.0 / 172.16.0.0 / 192.168.0.0 network addresses

  1. Use of 10.0.0.0 network addresses
  2. Cambridge G-RIN Database subset listing for 172.16.0.0/12
  3. Cambridge G-RIN Database subset listing for 192.168.0.0/16
  4. Insecure.org Security Mailing List Archive
  5. https = port 443

Network Address Translation (NAT) "IP Masquerading"

  1. NMAP -- The Network Mapper
  2. Cambridge G-RIN Entire database listing
  3. Network Address Translation (NAT)
  4. Network Address Translation (NAT)
  5. Cisco IOS Network Address Translation (NAT)
  6. Network Address Translation Technical Discussion
  7. Network Address Translation
  1. UDP and TCP Port Numbers and NAT Status   [IANA assigned port_numbers file]
  2. RFC 1597 Address Allocation for Private Internets. RFC 1631 The IP Network Address Translator (NAT).
  3. Network Address Translation White Paper    @Work   @Home
  4. Network address translation
  5. IP NETWORK ADDRESS TRANSLATION    TU Chemnitz 1997
  6. The Firewall Masquerade
  7. Increasing Your Masquerading Gateway Security

  1. IP Port Numbers - Full Listing
  2. http://directory.google.com/Top/Computers/Security/
  3. http://www.infosecuritymag.com/
  4. Exodus Communications
  5. Cryptonomicon cypher-FAQ
  6. Cryptonomicon
  7. The Code Book: the Evolution of Secrecy From Mary, Queen of Scots to Quantum Cryptography by Simon Singh

Security/Firewalls: [9 Dec 2000

  1. NIPR Net
  2. Systems Internals
  3. Filemon
  4. Regmon
  5. Keyboard watcher
  6. DES
  7. DATA ENCRYPTION STANDARD (DES)
  8. DES Data Encryption Standard
  9. Data Encryption Standard
  10. The Data Encryption Standard
  11. Internet Security Association and Key Management Protocol (ISAKMP)
  12. An Auditor's Primer on Encryption
  13. The Electronic Money Mill
  14. Group Key Management
  15. Keyed hash functions for message authentication

MD5

  1. MD5 Homepage (unofficial)
  2. What is MD5 and why do I care?
  3. RSA-MD5 Signature Suite
  4. Digital Signature Initiative
  5. Electronic signature and digital signature software
  6. Digital Signature Guidelines
  7. Digital Signature Trust Co.
  8. Digital Signature Working Group
  9. Directory Server and the Secure Hash Algorithm (SHA)
  10. The IEEE P1363 Home Page Standard Specifications For Public-Key Cryptography
  11. Center for Information Standards Public Key Infrastructure (PKI) Standardization Home Page
  12. PKI Law - Public Key Infrastructure

PGP

  1. WHERE TO GET PGP
  2. North American Cryptography Archives
  3. PGP Freeware
  4. Welcome to the PGP Public Key Lookup Page.
  5. RSA Laboratories | Public Key Cryptography Standards
  6. Mike M.'s PGP Public Key
  7. Liam Quinn's PGP Public Key
  8. PGP Security
  9. BAL's PGP Public Key Server

SSL

  1. Introduction to SSL
  2. How SSL Works
  3. SSL Digital Certificate Services
  4. All about SSL
  5. SSL EXPLAINED    [Sun]
  6. Phaos: The Worldwide Leader in e-Security Development
  7. Search the SSL Survey Data
  8. Example Certificate
  9. Introduction to SSL
  10. J/SSL & C/SSL - Introduction To SSL
  11. Digital Certificates
  12. How does SSL Work
  13. Secure Sockets Layer (SSL) Primer
  14. Learning Center: Understanding Digital Certificates and SSL
  15. Fortify Check SSL
  16. Public-Key Cryptography Standards [PKCS]
  17. The TLS Protocol
  18. RFC2246 The TLS Protocol

 

 

  1. ACES
  2. ACES
  3. ACES
  4. Links on Law, Cryptography and Electronic Communications
  5. Linking Rights
  6. EFF "Privacy - Crypto - Digital Signature, ID & Authentication" Archive
  7. The PACT Acronym List
  8. Security    [Microsoft]
  9. ounce, dice, trice, quartz, quince, hence, sense, ox, nonce, dense
  10. Web Security    [Microsoft]
  11. Nonce
  12. communication ring
  13. The World Wide Web Security FAQ
  14. WUGNET
  15. Proxy Servers   1997
  16. Border Gateway Protocol (BGP)
  17. Domain Name System (DNS)

Security/Firewalls: [16 Dec 2000]

  1. Introduction to XML
  2. getconnected.com
  3. ACSA
  4. SecurityFocus
  5. l0pht.com
  6. L0phtCrack
  7. @Stake
  8. Defcon
  9. Defcon: Links-o-Rama
  10. Argus Revolution - Open Security Discussion
  11. ei.com
  12. The Black Hat Briefings
  13. Nomad Mobile Research Centre
  14. SecurityPortal

SSH

  1. port 22
  2. SSH COMMUNICATIONS SECURITY
  3. Getting started with SSH
  4. NiftyTelnet 1.1 SSH r3
  5. The Secure Shell (SSH) Frequently Asked Questions

 

  1. CERT Advisory CA-2000-02 Malicious HTML Tags Embedded in Client Web Requests
  2. How To Remove Meta-characters From User-Supplied Data In CGI Scripts
  3. CERT: Other Resources for Security Information
  4. Telocity
  5. Flashcom
  6. Microsoft TechNet Security
  7. Installing, configuring, and using Tripwire
  8. TruSecure
  9. pptp: port to port tunnling protocal
  10. global crossings
  11. Andrew File System
  12. NETWORK FILE SYSTEM (NFS) Sun
  13. L0pht Scanning l0pht
  14. Hacking Exposed: unix info: book
  15. CERT: CA 2000 02

ROXEN

  1. Roxen
  2. DevShed - Roxen
  3. Roxen Community: Home
  4. Roxen - an HTTP Server
  5. Roxen Platform does it all for a Web site

FIREWALL

  1. Firewall Product Overview
  2. Welcome To ICSA Labs Firewall Community
  3. Commercial Firewall Products
  4. Firewall Vendor Homepages
  5. Firewalls - ServerWatch
  6. CWSApps - Stroud's Consummate Winsock Apps List
  7. BorderWare Technologies Inc.
  8. Screened Subnet Firewall
  9. screened subnet architecture
  10. @NETSYS.COM - The Intelligent Hacker's Choice!     Articles Index
  11. REALITY.NETSYS.COM REALTIME
  12. ServerWatch: Proxy Server Overview
  13. Building a Windows NT bastion host in practice
  14. Web Server Compare: The definitive guide to Web Server and HTTP specs
  15. Computer Systems Vulnerability Thesaurus Index
  16. Secure Internet Programming Laboratory
  17. Ports: http 80/tcp World Wide Web HTTP and https 443/tcp ssh 22/tcp SSH Remote Login Protocol

Richard Powers

  1. Richard Powers
  2. Plowing the Dark by Richard Powers
  3. Plowing the Dark by Richard Powers
  4. Richard Powers: A Bibliography

Palm Visor PDA

  1. OS
  2. Great PalmOS How To's
  3. Mark/Space Softworks: Online - VT-100 Terminal Emulator for PalmOS
  4. Telnet & Terminal software for Palm Pilot
  5. Internet Software for the Palm Pilot
  6. PalmPilotArchives.com
  7. ProxiWeb
  8. Welcome to PalmGear H.Q.!
  9. Palmtops/PDAs Handheld Devices
  10. EuroCool - Palm software archive
  11. DevZone Mobile Applications
  12. ccWAP.com: Free WAP-Browser
  13. AvantGo
  14. EXTERNAL RESOURCES       DEMO CHANNELS AND CONTENT SAMPLES
  15. Cacheability Engine at web-caching.com
  16.   Caching Tutorial for Web Authors and Webmasters
  17. Online Web Caching Resources
  18. streamingserver.org

mit media lab / virtual reality / the cave

  1. 3-D Science Scene
  2. MIT Media lab
  3. SGI VR
  4. Interactive Cinema
  5. THE CAVE OF TIME

Other

  1. Telestrategies
  2. Media Metrix
  3. Pittsburgh Supercomputing Center
  4. http://www.anime.net/
  5. The Threshold Network
  6. YouSuck/suckograms
  7. MSDN Online Web Workshop    [function BrowserData()]
  8. HTTP Explained
  9. How a Web Server Works - Overview
  10. Resources for Web site administrators       What server should I use?
  11. 3D-Sitemap requires the CYBERWORLD Browser        Cyberworld
  12. CWARP: The Ultimate Jaw-Dropping Multimedia Web Destination
  13. Earth Browser
  14. Win Treese's Internet Index
  15. NASA Human SpaceFlight     International Space Station Reference: Ham Radio
  16. Communications Technology and its Impact between Now and 2010        David J. Farber         Farberisms.
  17. Phone.com's Software Developer Kit, UP.SDK     Phone.com Developer Web Site
  18. Focus Array     Vision For Apache     Apache 3rd-Party Modules

Other / Other

  1. Paulo Barreto's Crypto Page
  2. C S R C - Cryptographic Toolkit

 


** Home ** Class Pages ** Site Map **


David J. Hark
HARK/INTERNET-HELP
P. O. Box 201 Shepherdstown, WV 25443-0201
304-876-2607
dhark@fred.net
http://www.dhark.com
http://www.fred.net/dhark
http://www.ohurley.com/dhark
Last updated: 13 March 2004