Mike
Beaver's 4th Security
Page
Laptop Security
E-tracking a thief, but then what?
|
LOJACK for Laptops.pdf
(another
page from Absolute Software) |
Photos from stolen laptop lead to man’s arrest |
Links Pages
|
siql.com's:
Computer Security Product Directory
siql.com's:
Everything Computer Security |
siql.com's: Everything Security
siql.com |
Linux & Unix
Freeware Intrusion Detection Tools
|
Bugtraq mailing list
archives
(UNIX)
root.shell
Matt's Web World
presents... UNIX Security |
Linux-Security Archive
Linux
Intrusion Detection
HP-UX
Security Guide |
Major Pages
Global Security.org is, by far, the best source of information about
security related topics.
|
Security
Focus
Network Security Library
PC Magazine's:
Security Watch
Security Tracker
|
Computer Emergency Response Team
The University of Texas':
Computer Security
Common Vulnerabilities and Exposures
Defense Information Systems Agency (DISA) |
CIAC - U.S. Department of Energy's Computer Incident Advisory Committee
The Univ. of Tulsa's:
Center for Information Security
ArachNIDS, a free,
up-to-date catalog of attack signatures can be fount at
White Hats.
CERT/CC Advisories - it doesn't get any more comprehensive than
this.
"'Corporate security is national security,' says Alan Paller, director
of research at
SANS Institute, a computing think tank in Bethesda, Md."
Coordination Center (CERT) is a focal point for the computer security
concerns of Internet users.
"Frank Reeder, chairman of
The Center for Internet Security, a nonprofit clearinghouse of
security information, advises companies to organize and share
technologies. 'Exploiting known vulnerabilities in software,
rather than breaking systems in new ways, accounts for more than 95% of
hacker damage,' Reeder says."
Ira Winkler's:
Internet Security Advisors Group - the
Director of Technology for the National Computer Security
Association, runs the NCSA laboratories, Firewall and Anti-Virus Product
Certification programs, investigates information-related crimes, and is
considered an expert in Social Engineering, Industrial Espionage,
Penetration Testing and Information Warfare.
All.net has samples of his penetration work.
Defcon.org has a speech of his. |
SiteMinder
Vendor
Netegrity
Configuring
|
Instructions for Using SiteMinder with an Oracle Database |
Configuring SiteMinder |
Errors / Solutions
|
Whenever I run IIS Lockdown it always fails saying "unable to edit
script map".
AD as LDAP authentication /
ldifde,exe does not return all group memberships
|
Vendors, Institutes,
Centers, Groups & Other Resources
|
Roger Tolces'
Advanced Electronic Security Co. (bugsweeps.com) - he has conducted
over 2,500 sweeps for bugs; - listen to his 11-04-03 interview
with Jeff Rense regarding electronic harassment and possible counter
measures on his
Archives page.
Texas based
Counterspies
DISA's:
COE Production Engineering Page
Foundstone
Fred Cohen & Assoc.
The Institute for Security Technology Studies at Dartmouth College |
On Click (Houston)
TruSecure
idefense
Safewww
Predictive Systems (New York)
Vernier Networks
provides security solutions for wireless networks.
Information Systems Security Association (Ottawa)
Authentor Systems (Colorado)
RiskWatch (Maryland) |
Web Based Services
|
SECURITY SEARCH: The Security
Search Engine
samspade.org allows you to trace back
to the ISP whomever is attempting to access your system
by putting in their ipaddress.
Gibson
Research Corporation has
SHIELD's UP,
which, without downloading anything, tests your computer's security.
|