Friday, September 14, 2001

Global Network Security Services
GNSS is an Internet and network security company established by pioneers of data transfer and secure communications.
GNSS provides data and network protection for businesses connected to the internet, networks, and businesses that transmit and store digitally formatted information and proprietary assets.

Thursday, September 13, 2001

CounterPunch
CounterPunch is the bi-weekly muckraking newsletter edited by Alexander Cockburn and Jeffrey St. Clair. Twice a month we bring our readers the stories that the corporate press never prints. We aren't side-line journalists here at CounterPunch. Ours is muckraking with a radical attitude and nothing makes us happier than when CounterPunch readers write in to say how useful they've found our newsletter in their battles against the war machine, big business and the rapers of nature.
Did the CIA Push An Aussie Officer Over the Edge?
From the Bloodbaths In East Timor to a Suicide in Arlington.

Wednesday, September 12, 2001

Internet Fraud Complaint Center
The Internet Fraud Complaint Center (IFCC) is a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C).
IFCC's mission is to address fraud committed over the Internet. For victims of Internet fraud, IFCC provides a convenient and easy-to-use reporting mechanism that alerts authorities of a suspected criminal or civil violation. For law enforcement and regulatory agencies at all levels, IFCC offers a central repository for complaints related to Internet fraud, works to quantify fraud patterns, and provides timely statistical data of current fraud trends.

Tuesday, September 11, 2001

Encryption Information
The intention of this page is to introduce the reader to the processes of encryption techniques. It will first begin with a definition of what exactly encryption is, followed by a description of the origins of encryption. Then I will discuss a few of the different types of encryption systems and definitions.

This chapter is not going to be a mathematical description of encryption. It has been written with the non-mathematical person in mind. If you wish to know more about encryption systems there are many good books that have been written on every type of encryption system. This chapter will just give a brief overview of the types of encryption systems and how they work.

Monday, September 10, 2001

Typhon
Typhon, an updated version of Cerberus Internet Scanner, is a vulnerability assessment tool. It will scan a given host for known security holes and vulnerabilities. It does this by looking at the services offered by a host and each of these are examined for holes. For example, Typhon will check for over 180 known vulnerabilities in the web service or daemon offered by a server. Once a scan has been completed a report in HTML is produced detailing what security holes were found, the impact of those holes and how to fix them. Once these holes have been removed then the host will be more secure against attacks. As new vulnerabilities are discovered almost on a daily basis it is necessary to ensure that the Typhon is kept upto date and hosts are scanned on a regular basis.
Linux Administrators Security Guide
New version!
PGP Security - PGPsdk 2.1.1. Source Code for Peer Review
Download the PGP SKD source code for Mac, Unix or Windows.
NSA upgrades
The National Security Agency is beginning a 15-year, multibillion-dollar effort to modernize the nation's cryptographic systems, which are rapidly growing obsolete and vulnerable.