National Infrastructure Protection Center (NIPC)
The National Infrastructure Protection Center (NIPC) serves as a national critical infrastructure threat assessment, warning, vulnerability, and law enforcement investigation and response entity. The NIPC provides timely warnings of international threats, comprehensive analysis and law enforcement investigation and response.
Saturday, September 08, 2001
Friday, September 07, 2001
Secrets of the Spies
Discover spy secrets from Mata Hari through the Cold War and meet the biggest double agents.
Discover spy secrets from Mata Hari through the Cold War and meet the biggest double agents.
Secrets Of The NSA
To find out more about America's most secretive agency, Correspondent David Martin interviewed the NSA's Robert Bogart and Vernon Shiflett. Bogart teaches code breaking and Shiflett runs the recycling facility. Here are some nuggets from his conversations with them.
To find out more about America's most secretive agency, Correspondent David Martin interviewed the NSA's Robert Bogart and Vernon Shiflett. Bogart teaches code breaking and Shiflett runs the recycling facility. Here are some nuggets from his conversations with them.
National Security Nightmare
The National Security Agency is the largest spy agency in the United States, and perhaps the world. Twice as big as the CIA, the NSA eavesdrops on communications worldwide.
News cameras have never been allowed inside the ultra-secret agency - until now.
The National Security Agency is the largest spy agency in the United States, and perhaps the world. Twice as big as the CIA, the NSA eavesdrops on communications worldwide.
News cameras have never been allowed inside the ultra-secret agency - until now.
Kerberos: The Network Authentication Protocol
Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. A free implementation of this protocol is available from the Massachusetts Institute of Technology. Kerberos is available in many commercial products as well.
Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. A free implementation of this protocol is available from the Massachusetts Institute of Technology. Kerberos is available in many commercial products as well.
Bugnosis
Detect Web bugs. A Web bug is a graphic on a Web page or in an e-mail message designed to monitor who is reading the page or message. Web bugs are often invisible because they are typically only 1-by-1 pixels in size. In many cases, Web bugs are placed on Web pages by third parties interested in collecting data about visitors to those pages.
Detect Web bugs. A Web bug is a graphic on a Web page or in an e-mail message designed to monitor who is reading the page or message. Web bugs are often invisible because they are typically only 1-by-1 pixels in size. In many cases, Web bugs are placed on Web pages by third parties interested in collecting data about visitors to those pages.
The Intelligence Network
IntellNet is dedicated to providing individuals and groups aggregated news and documents from around the world in an easy-to-access and understand format.
Our software and human experts traverse a network of more than five hundred Web sites to deliver the latest news, documents, photographs, videos and other content. We also provide original content based on reports received from our sources on the ground.
IntellNet is dedicated to providing individuals and groups aggregated news and documents from around the world in an easy-to-access and understand format.
Our software and human experts traverse a network of more than five hundred Web sites to deliver the latest news, documents, photographs, videos and other content. We also provide original content based on reports received from our sources on the ground.
Science, Technology and the CIA
Mention of the Central Intelligence Agency generally elicits visions of espionage and covert action operations. It may also produce images of the multitude of finished intelligence products the agency turns out – from the tightly controlled President’s Daily Brief, available only to the president and a select circle of advisers, to a number of less restricted intelligence assessments. The CIA’s role in the application of science and technology to the art of intelligence is far less appreciated.
Mention of the Central Intelligence Agency generally elicits visions of espionage and covert action operations. It may also produce images of the multitude of finished intelligence products the agency turns out – from the tightly controlled President’s Daily Brief, available only to the president and a select circle of advisers, to a number of less restricted intelligence assessments. The CIA’s role in the application of science and technology to the art of intelligence is far less appreciated.
Thursday, September 06, 2001
Windows XP activation technology revealed
A German copy-protection company has published details of Microsoft's technology for preventing casual copying of Windows XP but concluded the technology allows for reasonable upgrades and doesn't threaten customers' privacy.
A German copy-protection company has published details of Microsoft's technology for preventing casual copying of Windows XP but concluded the technology allows for reasonable upgrades and doesn't threaten customers' privacy.
Subscribe to:
Posts (Atom)