Difference between revisions of "Bookmarks/security"
From Flavio's wiki
(Import) |
(add Bruce Schneier's stuff) |
||
(6 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
− | + | {{TOCright}} | |
− | + | * [http://www.counterpane.com/ Counterpane Internet Security] | |
− | * [http://www.counterpane.com/ Counterpane Internet Security] | + | |
** [http://www.counterpane.com/pptp.html Analysis of Microsoft PPTP Version 2] | ** [http://www.counterpane.com/pptp.html Analysis of Microsoft PPTP Version 2] | ||
− | * [http://www.attrition.org/ Attrition.org] | + | |
+ | * [http://www.attrition.org/ Attrition.org] | ||
** [http://www.attrition.org/postal/ Going Postal] | ** [http://www.attrition.org/postal/ Going Postal] | ||
− | * [http://www.bastille-linux.org/jay/ Jay Beale's Linux and Unix Security Site] | + | |
+ | * [http://www.bastille-linux.org/jay/ Jay Beale's Linux and Unix Security Site] | ||
** [http://www.bastille-linux.org/jay/security-articles-jjb.html Jay Beale's Linux/UNIX Security Articles] | ** [http://www.bastille-linux.org/jay/security-articles-jjb.html Jay Beale's Linux/UNIX Security Articles] | ||
+ | |||
+ | * [http://www.schneier.com/ Bruce Schneier] | ||
+ | ** [http://www.schneier.com/blog/archives/2007/02/drm_in_windows.html DRM in Windows Vista] | ||
+ | |||
+ | * [http://www.cs.auckland.ac.nz/~pgut001/ Peter Gutmann] - Professional Paranoid | ||
+ | ** [http://www.cs.auckland.ac.nz/~pgut001/pubs/linux_vpn.txt Linux's answer to MS-PPTP] - on open-source VPN tools | ||
+ | ** [http://www.cs.auckland.ac.nz/~pgut001/pubs/vista_cost.html A Cost Analysis of Windows Vista Content Protection] | ||
+ | |||
* [http://www.guninski.com/ Georgi Guninski Security Research] | * [http://www.guninski.com/ Georgi Guninski Security Research] | ||
+ | |||
* [http://www.securityfocus.com/ SecurityFocus] | * [http://www.securityfocus.com/ SecurityFocus] | ||
+ | ** [http://www.securityfocus.com/columnists/320 Security for the Paranoid] by Mark Burnett: "Is it time to worry when other security professionals consider you too paranoid?" | ||
+ | |||
* [http://www.simovits.com/ Simovits Consulting] | * [http://www.simovits.com/ Simovits Consulting] | ||
* [http://www.linuxsecurity.com/docs/colsfaq.html comp.os.linux.security FAQ] | * [http://www.linuxsecurity.com/docs/colsfaq.html comp.os.linux.security FAQ] | ||
Line 16: | Line 28: | ||
** [http://www.research.ibm.com/gsal/tcpa/ TCPA Resources] at IBM Watson Research - Global Security Analysis Lab | ** [http://www.research.ibm.com/gsal/tcpa/ TCPA Resources] at IBM Watson Research - Global Security Analysis Lab | ||
*** [http://www.research.ibm.com/gsal/tcpa/tcpa_rebuttal.pdf Clarifying Misinformation on TCPA] by David Safford, IBM Research | *** [http://www.research.ibm.com/gsal/tcpa/tcpa_rebuttal.pdf Clarifying Misinformation on TCPA] by David Safford, IBM Research | ||
+ | |||
* [http://interviews.slashdot.org/article.pl?sid=03/05/30/1148235 Fyodor Answers Your Network Security Questions] (on Slashdot) | * [http://interviews.slashdot.org/article.pl?sid=03/05/30/1148235 Fyodor Answers Your Network Security Questions] (on Slashdot) | ||
* [http://www.theregister.co.uk/content/55/35175.html A visit from the FBI] - FBI agent talks about online security | * [http://www.theregister.co.uk/content/55/35175.html A visit from the FBI] - FBI agent talks about online security | ||
Line 32: | Line 45: | ||
** [http://www.cs.berkeley.edu/~nweaver/sapphire/ The Spread of the Sapphire/Slammer Worm] | ** [http://www.cs.berkeley.edu/~nweaver/sapphire/ The Spread of the Sapphire/Slammer Worm] | ||
** [http://www.robertgraham.com/journal/030126-sqlslammer.html Advisory: SQL slammer] | ** [http://www.robertgraham.com/journal/030126-sqlslammer.html Advisory: SQL slammer] | ||
+ | |||
* Witty Worm: | * Witty Worm: | ||
** [http://www.theregister.co.uk/2004/04/07/witty_evil_firsts/ Witty extinction] | ** [http://www.theregister.co.uk/2004/04/07/witty_evil_firsts/ Witty extinction] | ||
Line 44: | Line 58: | ||
* [http://www.theregister.co.uk/content/55/28836.html Kevin Mitnick's 'lost' bio] | * [http://www.theregister.co.uk/content/55/28836.html Kevin Mitnick's 'lost' bio] | ||
** [http://www.theregister.co.uk/content/55/28835.html Chapter One: Kevin Mitnick's story] | ** [http://www.theregister.co.uk/content/55/28835.html Chapter One: Kevin Mitnick's story] | ||
+ | |||
+ | [[Category:Bookmarks]] |
Latest revision as of 14:29, 13 February 2007
Contents |
- Peter Gutmann - Professional Paranoid
- Linux's answer to MS-PPTP - on open-source VPN tools
- A Cost Analysis of Windows Vista Content Protection
- SecurityFocus
- Security for the Paranoid by Mark Burnett: "Is it time to worry when other security professionals consider you too paranoid?"
- Simovits Consulting
- comp.os.linux.security FAQ
- TCPA
- TCPA / Palladium Frequently Asked Questions by Ross Anderson
- The TCPA; What's wrong; What's right and what to do about by William A. Arbaugh
- TCPA Resources at IBM Watson Research - Global Security Analysis Lab
- Clarifying Misinformation on TCPA by David Safford, IBM Research
- Fyodor Answers Your Network Security Questions (on Slashdot)
- A visit from the FBI - FBI agent talks about online security
- Aggiornamento sul virus Mydoom (Paolo Attivissimo)
Tools
Analysis
- Sapphire/Slammer Worm:
- Witty Worm:
Advisories
- Multiple Vulnerabilities in Alcatel ADSL Modems (look here for official Alcatel statements)