................................
IT Security
...............................
|
|
Cyber Security |
News
|
The Surveillance State Goes Mainstream: Windows 10 Is Watching (&
Logging) Everything (8/5/15)
Using Windows 10? Microsoft Is Watching (NEWSWEEK: 8/1/15) |
Major
Pages
National Vulnerability Database
|
Carnegie Mellon's
Software
Engineering Institute |
Center For Internet Security |
CVE
International in scope and free for
public use, CVE is a dictionary of
publicly known information security
vulnerabilities and exposures. |
Hacker Tools For Hardening Your Network
|
To test passwords across the enterprise,
use automated tools such as THC Hydra,
LophtCrack and John the Ripper to check
for blank and simple/common passwords. |
The Hacker's Choice (for TYC Hydra)
John the Ripper password cracker |
Anti-Phishing Working Group |
Hardening
Windows
|
The Administrator Accounts Security
Planning Guide (1/1/99)
Windows XP Security Compliance
Management Toolkit (5/22/03)
(Updated: 2/18/09)
Windows 2000 Security Hardening Guide
|
Microsoft policy on third-party security
configuration guidance support
Windows Server 2003 Security Compliance
Management Toolkit
Security and Auditing
|
Using Administrative and
Security Templates
|
Understanding Security Templates
Using Administrative Template Files with
Registry-Based Group Policy
Step-by-Step Guide to Using the Security
Configuration Tool Set |
Using Restricted Groups
Increasing Security with Limited User
Accounts and Restricted Groups
|
DOD
|
DISA's
Information Assurance Web Page
NIST: Computer Security Division:
Computer Security Resource Center
(CSRC)
guides.ritchie.disa.mil
DODI 8500.2.pdf (2/6/03)
DODI 8570.01-M: Information Assurance
Workforce Improvement Program.pdf
(WIP) |
iase.disa.smil.mil
COMPUTER SECURITY ACT OF 1987
FISMA of 2002
DoDD 8500.01E.pdf
OMB Circular A-130 Appendix III
The DIACAP Interim Guidance.pdf |
Cisco Hardening
|
Cisco SNMP Community Strings: Disabling
default accounts and changing default
passwords |
Lock down Cisco switch port security
Cisco TCP and UDP Small Services:
Disabling Unnecessary Services |
Configure your company's firewall to redirect certain domains that carry ads to
127.0.0.1 (or another "black hole" address). This particular
Search Windows Security Tech Target page contains a ready-made list of hosts
to block. Simply copy and paste into a hosts file, or feed the list into a
firewall or routing appliance. Not only does this prevent spyware from being
downloaded, it also prevents that much more bandwidth from being eaten up by
advertising in general. |
Anti-Virus Software
|
Malwarebytes - It's an excellent free
virus scanner. |
ClamWin FREE Anti-Virus |
Anti-Virus
|
Virus Total is a free service that analyzes suspicious files and
URLs (using a huge number of anti-virus engines at the same time) and
facilitates
the quick detection of viruses, worms, trojans, and all kinds of
malware.
|
Tools for a Safer PC
Submit a file for
malware analysis
(Microsoft)
More Anti-Virus
Links... |
Miscellaneous
5 Ways
to Secure Your Wireless Router
|
MSRPC null
sessions: exploitation and protection |
Restricting Anonymous Access
(Updated: 3/28/03) |
Client, service, and program
incompatibilities that may occur when
you modify security settings and user
rights assignments
Stop bad BHOs from installing themselves on IE using a
predefined list of objects that loads into a segment of the registry
used to define BHOs that should not run.
Spyware Guide /
block file maintains just such a list, which can be loaded as a
simple registry file.
How to Spot Fake Torrent File Downloads: Don't get fooled into downloading
viruses & codec scam files |