Thursday, July 19, 2001

The alt.2600 FAQ file on hacking, including loops
The purpose of this FAQ is to give you a general introduction to the topics covered in alt.2600 and #hack. No document will make you a hacker.
Internet Storm Watch Project
Today Internet Storm Center gathers more than 3,000,000 intrusion detection log entries every day. It is rapidly expanding in a quest to do a better job of finding new storms faster, isolating the sites that are used for attacks, and providing authoritative data on the types of attacks that are being mounted against computers in various industries and regions around the globe. Internet Storm Center is a free service to the Internet community. The work is supported by the SANS Institute from tuition paid by students attending SANS security education programs.
www.hack.co.za
Known exploits.
.:[packet storm]:.
An extremely large and current security tools resource which is for the community, by the community. Packetstorm is a non-profit organization kept alive for the sole purpose of helping secure the World's networks.

Wednesday, July 18, 2001

GaRe's Free Security Info
This site is dedicated to protecting internet users from Denial of Services (Dos) attacks for windows, explotes, by providing ways of protecting your system. These pages up to date with the most recient attacks, and explotes. If this page is missing a protection you know is avalible, has incorrect information, or missing information on some explote, please let me know.
A rogue's gallery of denial of service attacks
Tuesday, May 22, started out as just another day at CERT Coordination Center at Carnegie Mellon University in Pittsburgh. By day's end, CERT, widely regarded as the Fort Knox of computer security, would be knocked off the net by a distributed denial of service (DDoS) attack. In 2001, even the crème de la crème of network security is vulnerable. If it can happen to CERT, it can happen to you.

Monday, July 16, 2001

Secure Online Behavior: Developing Good Security Habits

The Internet has evolved to be a fundamental business innovation with a clearly demonstrated ability to positively affect organizations as well as individuals. Unfortunately, the Internet was not designed with security in mind - it is inherently insecure. Regardless of how many anti-virus programs, firewalls, and other security programs computer users may use, security continues to be a serious issue. And human error continues to be the weakest link in the security chain.

While human error can never be entirely eliminated, it can certainly be minimized. One of the best things that users can do to protect themselves and their information is to be aware of which behaviors may place them at risk, and to eliminate those behaviors. This article is the first in a series of three that will attempt to introduce readers to good security habits. This installment will offer a brief overview of some of the security threats that prey on bad user habits, and will introduce some fundamental secure habits that should be used for all computer applications. The ensuing articles will offer more in-depth examinations of the threats posed specifically by e-mail and Internet usage, and the habits that users can adopt to minimize the risks posed by these threats.