Mark Jacobson's Links to Security Info
Computer and Network Security Links
- Cybersecurity and
- Five tips for home and small business users.
- DeepSight Analyzer.
- How many threats have been detected in the last 7 days?
How many were detected in Europe? ...Australia? ...North
- UMR Trustworthy Systems
- University of Missouri-Rolla
- Computer Security Institute.
- CSI around since 1974. NetSec conference every June.
- Firewall products.
- Marcus Ranum/Matt Curtin's Frequently Asked Questions on Firewalls.
- Deborah Frinke's Network Security class
- RSA Security.
- Good Time magazine article on
the Snoops. The need for encryption for wireless networking
and the RSA solution to WEPCrack and AirSnort.
- Detailed information about how it (RSA cipher and encryption
algorithm) works. Quite technical.
- Firewall products.
- Critique of IPSec
- Crytographic evaluation of IPSec protocol by Bruce Schneier.
- Counterpane Internet
- 4,000 events per second processed? Monitoring the internet
and networks for suspicious activity requires lots of
processing power, software tools and expertise.
- War Games movie.
- Way ahead of its time predicting problems with Internet security.
- Hijacking a session using
Hunt software to achieve intrusion.
- Attack scenario explained in 15 steps.
Administrator Tool for Analyzing Networks.
SATAN was written because we realized that computer systems are becoming
more and more dependent on the network, and at the same becoming more and
more vulnerable to attack via that same network.
For each type or problem found, SATAN offers a tutorial that explains the
problem and what its impact could be. The tutorial also explains what can
be done about the problem: correct an error in a configuration file,
install a bugfix from the vendor, use other means to restrict access, or
simply disable service.
SATAN collects information that is available to everyone on with access to
the network. With a properly-configured firewall in place, that should be
near-zero information for outsiders.
into your site.
- Goal: Improving security by finding the vulnerabilities and
fixing them. The uebercracker (Nietzsche reference).
We will illustrate that even seemingly harmless network services can
become valuable tools in the search for weak points of a system, even when
these services are operating exactly as they are intended to.
- Another tool available for sniffing network packets
- Using a Honeypot
to watch and surveil intruders could land
you in jail or a big lawsuit???
- Pretty Good Privacy, aka via
TLA as PGP.
- Shortcut to Cryptography.
More links that you could ever need.