Mike
Beaver's 3rd
Security Links Page
Articles, News & Reports
Automotive Security
|
Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk
(2/6/2015)
Using Formal Methods to Enable More Secure Vehicles: DARPA's HACMS
Program by Kathleen Fisher of Tufts University (9/16/2014)
UW 'white-hat hacker' searches for security holes (10/13/2012)
Comprehensive Experimental
Analyses of Automotive Attack Surfaces (8/8-12/2011)
Tadayoshi Kohno (Yoshi
Kohno) - Associate Professor, Department of Computer Science and Engineering
Adjunct Associate Professor, Information School University of Washington (YouTube) |
Other Security
|
Researchers Find
Some Smartphone Models More Vulnerable To Attack
Dad: Son brushed up against poisonous plant, died (11/8/14)
More Federal Agencies Are Using Undercover Operations (11/15/2014)
Los Angeles Police Use Data to Target Crime (11/14/2014)
Prisoners Run Gangs, Plan Escapes and Even Order Hits With Smuggled Cell
Phones (5/22/09)
Audit logon events - once you turn on security logging, you'll want
to know what each number means, for each event logged. This page tells
you that.
The Six Dumbest Ideas in Computer Security
Understand the risks of USB storage devices
How to Tackle
the Threat from Portable Storage Devices
Check IT List:
Keeping malware at bay (9/28/04)
Microsoft Patches 18 Security Flaws in Windows, Office (7/13/06: The
Washington Post)
Censorship, Human Rights, and Capitalism: Congress wants to protect
freedom of information on the Internet by legislating how companies work
with restrictive regimes overseas. (7/13/06: The Washington Post)
12 Microsoft Patches Plug 21 Security Holes (6/12/06: The Washington
Post)
Microsoft Reissues Anti-Piracy Tool, Lawyers Sue (The Washington
Post)
Microsoft Aims to Clean Up Its Own Mess (6/1/06: The Washington
Post)
The Dangerous Side of Search Engines (5/26/06: The Washington Post)
New Winamp Version Fixes Major Security Hole
Building A Botnet
|
MS Expands Anti-Piracy Program, Reissues Patch (4/25/05: Washington
Post)
MS Office Flaws Ideal Tools for Targeted Attacks (Washington Post)
Some Highlights from CanSecWest (4/10/06)
Microsoft to Issue Five Security Fixes (4/7/06: Washington Post)
Wireless
Security Tips
Wireless Keyboards That Blab (3/03: PC WORLD)
Users
shoring up net security with SIM (09/30/02)
CIFS: Common
Insecurities Fail Scrutiny (1/97)
Preventing Remote
OS Detection
Controlling USB storage devices
Microsoft Windows Remote Desktop 'TSShutdn.exe' Lets Remote
Authenticated Users Shutdown the System
PC Magazine's:
Secure Your Network
- ZDNET looks at, and compares,
various firewalls for all levels of computing from the desktop to the
complete corporation.
Be careful with your passwords: Experts warn that they are easy to
pilfer, particularly in public places
7 Tips for
Building a Secure Home Network
Batten Down Those Ports
Support WebCast:
Microsoft ASP.NET Security
The
Low-Tech Attack Is Often The Best
Finding and
Fixing Network Vulnerabilities
Strengthening Wireless Authentication
Why Firewalls are Not Enough
Protecting Yourself from Identity Theft
Internet Firewalls:
Frequently Asked
Questions
There Shall Come a Firewall
More Security Links... |
Books
Hardening Windows Systems by Roberta Bragg
|
Hacking Exposed: Network Security Secrets & Solutions by Stuart
McClure
Counter Hack: A Step-by-Step Guide to Computer Attacks and
Effective
Defenses by Ed Skoudis
Windows NT/2000 Network Security
by
E. Eugene Schultz
Intrusion Signatures and Analysis
by Cooper, Northcutt, Fearnow and Frederick
Windows 2000 Virtual Private Networking
by Thaddeus Fortenberry |
Linux Firewalls by Robert Ziegler
Building Internet Firewalls by Zwicky, Cooper, Chapman and Russell
Practical Unix and Internet Security
by Simson Garfinkel and Gene Spafford
Computer Security Basics
by Deborah Russell, G. T. Gangemi
Network Intrusion Detection: An Analyst's Handbook
by
Northcutt,
McLachlan,
Novak |
Glossaries
NSA
Glossary of Terms Used in Security and Intrusion Detection
esafe's:
Firewall
Glossary
Manuals, Papers, More Reports, Guides,
Indexes, Archives, Digests
& Tutorials
|
Network Security
Tutorials
The
IA Digest is a
semi-weekly news summary for information assurance professionals
protecting the global information grid.
HANDBOOK OF COMPUTER CRIME INVESTIGATION: FORENSIC TOOLS AND
TECHNOLOGY.pdf
PUBLICATIONS BY PAUL ROSENZWEIG
SANS GIAC
Certified Intrusion Analyst Practical.doc
Surf and Email Anonymously
Hardening WebSphere + IBMHTTPD for Solaris.pdf
Preventing Web Site Defacements.pdf
How Vulnerable
Are Internet Services?
Crying wolf: False alarms hide attacks
Using SNORT for
Intrusion Detection |
The SANS
Institute's:
Intrusion Detection FAQ
National Security Agency: Security
Recommendation
Guides
McAfee Firewall vs. Norton Personal Firewall 2002
vs. ZoneAlarm Pro
The Twenty Most Critical Internet Security Vulnerabilities
Are there
Vulnerabilites in VLAN Implementations?
Computer and Network Security Reference Index
How To Eliminate The Ten Most
Critical Internet Security Threats
FIRST Security Papers
NetworkWorldFusion
-
Security Archive
Network Security 2000 Paper Summaries
Vulnerability Guide
NISPOM
(National Industrial Security Program Operating Manual) |
National Security
|
Major Pages
|
Global
Security.org
Organization for Security and Co-operation in Europe |
UCLA International Institute
Saban Center for Middle
East Policy |
The
Overseas Security Advisory Council (OSAC) was established in 1985 by
the U.S. Department of State to foster the exchange of security related
information between the U.S. Government and American private sector
operating abroad. |
Think Tanks
|
American
Enterprise Institute |
Cato
Institute |
Articles by Martin
Indyk
|
The Day That Bush Took Gaza: Israel's Exit Plan Will Mean a U.S.
Entrance |
Getting the Arab-Israeli Peace Process Back on Track |
Articles by Ivo Daalder
|
.pdf articles by Ivo Daalder |
An Alliance of Democracies (Washington Post: 5/23/04) |
Interview
With Ivo Daalder (regarding merging the intelligence agencies in the
post 9/11 era) |
Articles by James B.
Steinberg
|
Building
Intelligence to Fight Terrorism (Sept. 03) |
James Steinberg:
What's next
in war on terrorism and Middle East (12/17/01) |
Other Articles
|
THE
THIRD TEMPLE'S HOLY OF HOLIES: ISRAEL'S NUCLEAR WEAPONS -- (United
States Air Force Counterproliferation Center)
|
Remote Access
|
Simpler,
Safe Remote Access
Wireless Networks That Do More: Want to
share connections, devices, and entertainment?
Here's what to buy and how to use it securely and reliably. |
Terrorism
FBI's:
Report Terrorist Activity
|
Terrorism:
Background and Threat
Assessments
|
The FBI's:
Internet Fraud Complaint
Center (IFCC) |
7-Seas
Global Intelligence is an organization made up of dedicated and
talented individuals from around the globe. 7-Seas provides real time
terrorist information, intelligence and strategic analysis to law
enforcement and military agencies in the United States and other
nations. |