Mike Beaver's 3rd Security Links Page

Articles, News & Reports

Automotive Security
Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk (2/6/2015)

Using Formal Methods to Enable More Secure Vehicles: DARPA's HACMS Program by Kathleen Fisher of Tufts University (9/16/2014)

UW 'white-hat hacker' searches for security holes (10/13/2012)

Comprehensive Experimental Analyses of Automotive Attack Surfaces (8/8-12/2011)

Tadayoshi Kohno (Yoshi Kohno) - Associate Professor, Department of Computer Science and Engineering Adjunct Associate Professor, Information School University of Washington (YouTube)

Other Security

Researchers Find Some Smartphone Models More Vulnerable To Attack

Dad: Son brushed up against poisonous plant, died (11/8/14)

More Federal Agencies Are Using Undercover Operations (11/15/2014)

Los Angeles Police Use Data to Target Crime (11/14/2014)

Prisoners Run Gangs, Plan Escapes and Even Order Hits With Smuggled Cell  Phones (5/22/09)

Audit logon events - once you turn on security logging, you'll want to know what each number means, for each event logged. This page tells you that.

The Six Dumbest Ideas in Computer Security


Understand the risks of USB storage devices

How to Tackle the Threat from Portable Storage Devices

Check IT List: Keeping malware at bay (9/28/04)


Microsoft Patches 18 Security Flaws in Windows, Office (7/13/06: The Washington Post)

Censorship, Human Rights, and Capitalism: Congress wants to protect freedom of information on the Internet by legislating how companies work with restrictive regimes overseas. (7/13/06: The Washington Post)

12 Microsoft Patches Plug 21 Security Holes (6/12/06: The Washington Post)

Microsoft Reissues Anti-Piracy Tool, Lawyers Sue (The Washington Post)

Microsoft Aims to Clean Up Its Own Mess (6/1/06: The Washington Post)

The Dangerous Side of Search Engines (5/26/06: The Washington Post)

New Winamp Version Fixes Major Security Hole

Building A Botnet
 

MS Expands Anti-Piracy Program, Reissues Patch (4/25/05: Washington Post) 

MS Office Flaws Ideal Tools for Targeted Attacks (Washington Post)

Some Highlights from CanSecWest (4/10/06)

Microsoft to Issue Five Security Fixes (4/7/06: Washington Post)

Wireless Security Tips

Wireless Keyboards That Blab (3/03: PC WORLD)

Users shoring up net security with SIM (09/30/02)

CIFS: Common Insecurities Fail Scrutiny (1/97)

Preventing Remote OS Detection


Controlling USB storage devices

Microsoft Windows Remote Desktop 'TSShutdn.exe' Lets Remote
Authenticated Users Shutdown the System

PC Magazine's:
Secure Your Network - ZDNET looks at, and compares, various firewalls for all levels of computing from the desktop to the complete corporation.


Be careful with your passwords: Experts warn that they are easy to pilfer, particularly in public places

7 Tips for Building a Secure Home Network


Batten Down Those Ports

Support WebCast: Microsoft ASP.NET Security


The Low-Tech Attack Is Often The Best

Finding and Fixing Network Vulnerabilities

Strengthening Wireless Authentication

Why Firewalls are Not Enough

Protecting Yourself from Identity Theft

Internet Firewalls: Frequently Asked Questions
There Shall Come a Firewall


More Security Links...

Books

Hardening Windows Systems by Roberta Bragg

Hacking Exposed: Network Security Secrets & Solutions by Stuart McClure

Counter Hack: A Step-by-Step Guide to Computer Attacks and
Effective Defenses by Ed Skoudis


Windows NT/2000 Network Security by E. Eugene Schultz

Intrusion Signatures and Analysis by Cooper, Northcutt, Fearnow and Frederick

Windows 2000 Virtual Private Networking by Thaddeus Fortenberry
Linux Firewalls by Robert Ziegler

Building Internet Firewalls by Zwicky, Cooper, Chapman and Russell

Practical Unix and Internet Security by Simson Garfinkel and Gene Spafford

Computer Security Basics by Deborah Russell, G. T. Gangemi


Network Intrusion Detection: An Analyst's Handbook by Northcutt, McLachlan, Novak


Glossaries




NSA Glossary of Terms Used in Security and Intrusion Detection esafe's: Firewall Glossary



Manuals, Papers, More Reports, Guides, Indexes, Archives, Digests & Tutorials

Network Security Tutorials

The IA Digest is a semi-weekly news summary for information assurance professionals protecting the global information grid.


HANDBOOK OF COMPUTER CRIME INVESTIGATION: FORENSIC TOOLS AND TECHNOLOGY.pdf

PUBLICATIONS BY PAUL ROSENZWEIG

SANS GIAC Certified Intrusion Analyst Practical.doc


Surf and Email Anonymously

Hardening WebSphere + IBMHTTPD for Solaris.pdf

Preventing Web Site Defacements.pdf

How Vulnerable Are Internet Services?


Crying wolf: False alarms hide attacks

Using SNORT for Intrusion Detection
The SANS Institute's: Intrusion Detection FAQ

National Security Agency: Security Recommendation
Guides


McAfee Firewall vs. Norton Personal Firewall 2002 vs. ZoneAlarm Pro

The Twenty Most Critical Internet Security Vulnerabilities

Are there Vulnerabilites in VLAN Implementations?

Computer and Network Security Reference Index

How To Eliminate The Ten Most Critical Internet Security Threats


FIRST Security Papers

NetworkWorldFusion -
Security Archive


Network Security 2000 Paper Summaries

Vulnerability Guide


NISPOM (National Industrial Security Program Operating Manual)

National Security

Major Pages


Global Security.org

Organization for Security and Co-operation in Europe
UCLA International Institute

Saban Center for Middle East Policy

The Overseas Security Advisory Council (OSAC) was established in 1985 by the U.S. Department of State to foster the exchange of security related information between the U.S. Government and American private sector operating abroad.

Think Tanks


American Enterprise Institute Cato Institute

Articles by Martin Indyk


The Day That Bush Took Gaza: Israel's Exit Plan Will Mean a U.S. Entrance Getting the Arab-Israeli Peace Process Back on Track

Articles by Ivo Daalder


.pdf articles by Ivo Daalder An Alliance of Democracies (Washington Post: 5/23/04)

Interview With Ivo Daalder (regarding merging the intelligence agencies in the post 9/11 era)

Articles by James B. Steinberg


Building Intelligence to Fight Terrorism (Sept. 03) James Steinberg: What's next in war on terrorism and Middle East (12/17/01)

Other Articles


THE THIRD TEMPLE'S HOLY OF HOLIES: ISRAEL'S NUCLEAR WEAPONS -- (United States Air Force Counterproliferation Center)  


Remote Access

Simpler, Safe Remote Access

Wireless Networks That Do More: Want to share connections, devices, and entertainment?
Here's what to buy and how to use it securely and reliably.

Terrorism

FBI's: Report Terrorist Activity


Terrorism: Background and Threat Assessments

The FBI's: Internet Fraud Complaint Center (IFCC)

7-Seas Global Intelligence is an organization made up of dedicated and talented individuals from around the globe. 7-Seas provides real time terrorist information, intelligence and strategic analysis to law enforcement and military agencies in the United States and other nations.

Back to Mike Beaver's Hypnotherapy Home Page

If you are the original creator of material featured on this website and want it removed, please contact the webmaster.
Copyright © 1998-2006 Charles Michael Beaver.