|
Awesome All-Around Security Links
- 2600 The Hacker Quarterly
- AntiCode - Exploits
Sorted By OS - Computer Security - Hacking & Hackers
- ASTALAVISTA.BOX.SK
- because-we-can.com
Tons of HTTP POST, JAVA, and Java-script vulnerabilities
-
Black Crawling Systems Archives
- Cerberus Information
Security
Home of the NTIS/CIS security scanner, and many NT vulnerabilities
- Crewl Underground
Madness
Belgian hacking group specialized in network (in)security and phreaking
- Interesting HTTP scanning scripts.
- CyberArmy
- Decent proxy server and files
- DefCon's FTP Site
- Defcon.org
- DoD Rainbow
Books Online!
or even here on Downlink's
files page
- Dug Song's
Page
Great tools, papers, and links
- HDC
: Archive --[ 2 ]
- Human Firewall Council
- FREE Benchmarking of your Security Management Practices
against ISO-17799!!
-
Known NT Exploits
- l0pht Heavy Industries
If you don't know who these guys are, leave now!
- Network
Associates
Virus Information Library
- Nomad Mobile Research Command
Good files and texts
- PacketStorm
HUGE security file and text archives -- searchable
-
packet factory projects
Ngrep (Network Grep) and several other cool GNU tools
- Pavel Krauz's
Home Page
The author of HUNT -- TCP Hijacking software
- Rain.Forrest.Puppy
Awesome site for NT and IIS vulnerabilities and exploits
- route
Route's Page -- Awesome Linux tools
- SecureRoot
- Top 50 HPVC Sites
- SECURITY
BUGWARE
Bug lists for numerous OSes
-
Security Topics
- SecurityStats.com
Great source of computer security related statistics, as well as awareness
tools like a password strength meter, and several others.
- Silicon Toad's Hacking
Resources
Better known as HACKERS.COM. Excellent page for files, links, info,
etc.
-
TearDrop ICMP OUT-OF-BAND and other bug fixes/patches
- Terrible
Secret
- Whitehats
IDS Index
Excellent source for ports, exploit signatures, etc. Also searchable.
CISSP Study
-
Cryptography Tutorial
One of the best online crypto classes I've seen.
-
Godzilla crypto tutorial
Another great crypto tutorial, which is very in depth. Many, many
slides in PDF format.
- Human Firewall Council
- FREE Benchmarking of your Security Management Practices
against ISO-17799!!
-
Information Security Management, Vol2
The most highly recommended CISSP study book out there. Divided up
into the 10 CBK domains, and does a great job of summarizing concepts within
them. Also a great reference.
- (ISC)^2
Home of the exam, register, get study outlines, schedules, etc.
-
Lattice Based Access Control Models
- Ravi S. Sandhu, Nov. 1993. Discusses information flow policies,
security labels, and the Bell LaPadula and Biba security models.
-
Rainbow Books
- On our textfiles.html page.
-
Security Models
- By John McLean. Discusses theoretical security models including the Bell-LaPadula
and Clark-Wilson models.
-
Theft of Information in the Take-Grant Protection Model
Abstract.
Exploits and Bug Archives
Strictly Phreaks
Firewall-1 Sites
Finding Information on People (Skip Tracing, Background
Checks, etc.)
Wireless Tools
Hardware Hacking
Search Engines
Finding a High Paying Technical Career
- Dice.com
- High Tech Jobs Online - Search for jobs, post your resume, etc - Excellent
- Developers.net
- Searchable high-tech job indicees. Contains a great number
of jobs in a variety of cities
- Headhunter.net
Search for jobs by keyword, state, salary range! Can also post
resumes for free, but expect LOTS of calls!!
- Recruiters Online Network
Search for jobs, post resumes for free
Free Software
-
TUCOWS
An excellent place to get shareware/freeware
Identity Theft Protection
|