Friday, October 19, 2001

Other Government Secrecy Related Web Sites
Mario's Cyberspace Station - The Global News Portal
This is USA mirror of the biggest one man's handmade website in Cyberspace with more than a thousand web pages and over 4.5 million hits so far.
Intelligence and Security Webring
Sites of intelligence, security, espionage, national security, computer security, competitive intelligence, economic intelligence and military intelligence. CIA, DIA, NSA, MI, NRO and others welcome. Knowledge Management and business intelligence.
National Security News
The Federation of American Scientists conducts analysis and advocacy on science, technology and public policy, including national security, nuclear weapons, arms sales, biological hazards, secrecy, education technology, information technology, energy and the environment. FAS is a privately-funded non-profit policy organization whose Board of Sponsors includes 58 of America's Nobel laureates in the sciences.
Advanced Electronic Security Company
Technical Surveillance Counter Measures (TSCM). Using The BEST Technology Available. Electronic Bug sweeps to detect and eliminate electronic eavesdropping and surveillance devices.
Technical Surveillance Counter Measures (TSCM) is our specialty. We eliminate telephone line bugs and wiretaps (using wiretap detection sweeps), computer data line taps and bugs (telecommunications security line sweeps), and bug sweep your conference rooms (using electronic room bug sweeping).

Tuesday, October 16, 2001

LANguard File Integrity Checker
LANguard File Integrity Checker is a utility that provides intrusion detection by checking whether files have been changed, added or deleted on a Windows 2000/NT system. If this happens it will alert the administrator by email. Since hackers need to change certain system files to gain access, this FREEWARE utility provides a great means to further secure any servers open to attack.
LANguard Network Scanner
LANguard Network Scanner is a freeware security & port scanner to audit your network security. It scans entire networks and provides NETBIOS information for each computer such as hostname, shares, logged on user name. It does OS detection, password strength testing, detects registry issues and more. Reports are outputted in HTML.

Monday, October 15, 2001

Meet the computer criminals: they'll see you in your office
It doesn't take technical wizardry or a cunning disguise to gain access to your confidential data, as Mark Halper discovers.

Visit the home of a computer security professional and you'd expect to see the usual trappings of the trade: a collection of keyboards, monitors, tangled phone wires and racks of anti-virus software.

But for one IBM security consultant called Paul, there's something a bit more curious. Hanging in Paul's ward-robe is a collection of tradesmen's outfits including hard hats, boiler suits, phone equipment belts and meter-reader shirts.
John the Ripper
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well.
SAINT:: Vulnerability Tool
The Security Administrator's Integrated Network Tool (SAINT™), an updated and enhanced version of SATAN, is designed to assess the security of computer networks.
Gartner: Most IT security problems self-inflicted
About 90% of security breaches occur because attackers take advantage of software that IT staffers have either misconfigured or failed to patch, a Gartner Inc. analyst said.