Mike
Beaver's
5th Security Links
Page
Mike Beaver's:
How to Secure Your PC
How to Secure Your PC
Other Mike Beaver
How To Cheat Sheets
Blocking Someone From a Domain
Once You Have Their IP Address - using Cisco Works and the Core Switch.
Knoppix
This Knoppix readme
file gives the key codes and command line command to use this program to wipe
your drive clean so that it can NOT be un-formatted.
Microsoft Alerts
& Patches
|
Cumulative Patch for
Internet Explorer (810847)
Unchecked Buffer in Windows Redirector Could Allow Privilege Elevation
(810577) |
Microsoft issues patch for IE hole |
News
|
"Shambhu
Upadhyaya has been awarded a $25,000 grant by the Air Force Office
of Scientific Research to conduct research on" ... "a new, online
intrusion detection and restoration scheme based on a signaturing
mechanism." More information about the
Center of Excellence in
Information Systems Assurance Research and Education at New York
state's Univ. of Buffalo.
Technology Insider:
Network-based intrusion-detection systems
Without XPdite, or XP's
Service Pack 1,
clicking on a simple, but malicious, URL can
delete the entire contents of your directories.
techtv.com: news>security>archive
WinXP security row: Expert hits back
|
Update: Zone Labs Now Says It Will Patch Free Firewall
USB
flash drives spreading like mushrooms (3/1/05)
Cyber-Attacks by Al Qaeda Feared
Camera
flash opens up smart cards
Increasing Security for Less
Modem-Dialing Scam
Targets Web Surfers
White House cyber security plan avoids calls for new rules
Corporate security gets urgent:
10 tips for creating a network security policy |
Other Microsoft Security Links
|
Windows XP Security Guide
Windows XP Security Tweaking for the paranoid
Microsoft's
HotFix & Security Bulletin Service
How to stop Messenger SPAM:
Disable Windows Messenger Service |
Microsoft's
Strategic Technology Protection Program (STPP)
Microsoft's TechNet
Security
Practical Recommendations for Securing Internet-Connected Windows NT
Systems
Securing Windows NT/2000 Servers for the Internet: Chapter 1 |
Ports
|
Internet Assigned Numbers Authority's:
Port Numbers
Port Assignments for Commonly-Used Services (Microsoft)
The Nohack
Project's:
|
Port Numbers and Services
Database
FAQ:
Firewall Forensics (What am I seeing?) is a little more informative
regarding each port.
Another
port list |
Root
Kits
|
Strider
GhostBuster: Why It’s A Bad Idea For Stealth Software To Hide Files
(the
.doc file) |
Microsoft on 'rootkits': Be afraid. Be very afraid |
Shields UP!! - Test To See If
Your Ports Are Open
Gibson Research Corporation
|
Spyware
|
Top 10 Spyware Threats
Spyware Runs Rampant, Study Says: Many PCs also contain Trojans or
system monitoring apps, Earthlink finds. (4/15/04: PC World)
Anti-Spyware Leader Unfazed by Microsoft (5/20/06: Washington
Post) - "Thanks to its market-leading anti-spyware software,
Spy
Sweeper, sales have soared Thanks to its market-leading anti-spyware
software, Spy Sweeper, sales have soared..."
Anti-adware misses most malware |
Add Blocking Resources:
IE-SPYAD:
Restricted Sites List for Internet Explorer
Prevent spyware from installing in the first place with
SpywareBlaster 3.3
Benjamin Edelman's:
Investors
Supporting Spyware
Eric L. Howes has
created THE best test of anti-spyware applications on the planet. He
compares them and gives all of the details on his
tests
page. He has also compiled a list of list of
Rogue/Suspect Anti-Spyware Products & Web Sites.
AudioGalaxy
Satellite - SPYware |
Other Links
|
The
PKI page
International Armoring Corporation
TCP/IP from a Security Viewpoint
What is a secure
password?
Packet-Level.com
Security
Security
Focus
1999 Internet Security Diary
|
squirrel.com home page (security)
Computer Security Information
COAST
Repent
"Harrison
K-9 Security Services has provided the finest European German
Shepherd protectors and loyal companions to families, business
executives, entertainers, professional athletes, and law enforcement
agencies worldwide for over 25 years."
|