Hoaxes, Scams, Viruses, Trojans
and
Security Issues
Crime
Prevention, Investigation, and the Internet
Local to Houston Texas:
Crime Prevention,
Investigation, and the Internet
http://rupd.rice.edu/cpbookmarks.html
Ask The Expert: Meet
the Security Experts of: Search
Security / techtarget
http://searchsecurity.techtarget.com/ateExpertsBios/0,289621,sid14,00.html
Ask the Experts is the place to get your technical and
implementation questions answered by some of the leading authorities in the
security field. Our experts have been chosen by our editorial team for
their knowledge of specific technology areas. To get a faster response,
please be as clear and specific as possible when you state your question.
Questions are answered on a continual basis, and we try to answer as many as possible. If
you don't hear back from us in a week, consider posting your question in our
forums.
Infragard (must be a member to access)
Infragard - public website
Infragard - Houston Chapter (must be a member to access)
Business Continuity Links and resources
http://www.business-continuity-online.com/Content/Pages/Training.aspx
http://www.disasterrecoveryforum.com/modules.php?name=Forums&file=viewforum&f=9 http://www.idsemergencymanagement.com/emergency_management/us/Business_Continuity/Business_Continuity_Management/2_0/g_supplier.html http://www.idsemergencymanagement.com/ http://www.contingencynow.com/training.htmhttp://www.strohlsystems.com/Training/default.asp
http://www.bfi.co.uk/continuity.htm http://www.mile2.com/Disaster_Recovery_and_Business_Continuity_Planning_Training.html http://www.compinfo-center.com/itman/business_continuity.htm http://www.sorm.state.tx.us/Risk_Management/Business_Continuity/init_overview.php http://www.setfocus.com/Train/Courses/CourseListing.aspx?CourseNum=7019 http://www.sun.com/service/businesscontinuity/ http://www.ocipep.gc.ca/info_pro/self_help_ad/general/busi_cont_e.asp www.BusinessContingency.com
Security Links and resources
http://www.surveillance-video.com/espionage-july-2009.html http://www.sentryx.com/http://www.cyrusone.com/newsletter/cyrusone/landing/index.html
http://www.yourwindow.to/ http://www.rothstein.com/drjbooks/drj746.htm http://www.rothstein.com/ http://www.londonprepared.gov.uk/index.htm http://www.londonprepared.gov.uk/business/businesscont/index.htm http://www.insight.co.uk/training/tc_understandingpas56.htm http://www.binomial.com/http://www.infosyssec.net/infosyssec/buscon1.htm
http://www.ffiec.gov/ffiecinfobase/booklets/bcp/bps_06_proc_other.html http://www.2c-consulting.com/training.htm http://www.bfi.co.uk/continuitytraining.htm http://www.automataservices.com/training.htm http://www.niser.org.my/training/bcp.html http://www.htinstitute.com/corp_view.asp?cid=126 http://www.survive.com/ http://www.christianet.com/business/businesstraining.htm http://www.marsh.com.au/index.htmhttp://www.theiia.org/itaudit/?fuseaction=catref&catid=8
http://www.kingswell.net/
http://vmyths.com/ Welcome To
Vmyths.com
Learn about computer virus myths, hoaxes, urban
legends, hysteria, and the implications if you believe in them. You
can also search a list of computer virus hoaxes & virus hysteria from A to Z.
http://hoaxbusters.ciac.org/
Welcome to the CIAC
Hoax Pages
Interspersed among the junk mail and spam that fills our Internet e-mail
boxes are dire warnings about devastating new viruses, Trojans that eat the
heart out of your system, and malicious software that can steal the computer
right off your desk.
Don't Spread that Hoax! http://www.nonprofit.net/hoax/
Hoax News http://www.stiller.com/hoaxes.htm
Hoax News
http://www.cknow.com/kumite.htm
Security
Responses Hoax's http://www.symantec.com/avcenter/hoax.html
The Urban Legends passed http://www.urbanlegends.com/
http://www.truthorfiction.com/
Internet registsration
Internic
http://www.internic.net/whois.html
http://www.networkassociates.com/us/index.asp
Network
Solutions http://www.networksolutions.com/cgi-bin/whois/whois
Anti-Virus-Junk-Spam
Antigen
http://www.sybari.com/home/
F-Secure http://www.datafellows.com/
McAfee
http://software.mcafee.com/
FBI
/ CSI http://www.gocsi.com/
Symantec http://www.symantec.com/
Sophos
http://www.sophos.com/
Guidescope
http://www.guidescope.com/home/
Network
Management
http://www.networkcomputing.com/
Bandwidth
Test Sites
Welcome to: DSL Results.com Are you in the market for broadband service in your area? You
have came to the right place! With our tools and helpful links, you will be on
your way to selecting from only PREFERRED DSL PROVIDERS.
RoadRunner
cable
Firewalls
/ Security / Anti-Spyware / Anti-Malware
BlackICE(tm)
http://blackice.iss.net/index.php
Zone Alarm
http://www.zonelabs.com/
Gibson
Reserach
Ad-Aware
http://www.lavasoftusa.com/
CleanSweep (Symantec/Norton)
http://www.symantec.com/sabu/ncs/
http://www.webtrends.com/products/wsa/default.htm
http://www.cert.org/vul_notes/index.html
Pretty Good Privacy http://www.pgp.com/
MIT http://web.mit.edu/network/pgp.html
http://www.keyserver.net/
(PGP Key Server)
http://www.philzimmermann.com/
http://www.forensics-intl.com/intro.html
Linux http://www.gnupg.org/
Homeland
Security www.terrorism.com
www.w00w00.org Do the w00
(w00w00.mp3) w00w00,
with 30+ active participants, is currently the largest non-profit security team
in the world (there are no "members").
Computer
Incident Advisory Capability - www.ciac.org/ciac
Also report Terrorist activity at the IFCC.
Internet Fraud - www.fraud.org
http://www.zdelete.com/
The
purpose of Active@ ZDelete software is to protect your privacy by preventing
undesirable people to access private deleted data against your will.
E-Mail
Scanning Systems
Filter SPAM locally by targeting it into
"folders" in
Outlook.
http://popfile.sourceforge.net/
Privacy/Anon
Web Sites
Electronic Frontier Foundation http://www.eff.org/
Net
Privacy http://inetprivacy.com/
http://netsecurity.about.com/compute/netsecurity/cs/privacyissues/index.htm
Keystroke Monitors
http://www.keykatcher.com/index.htm
(hardware)
http://www.keyghost.com
(hardware)
http://www.keylogger.com/index.htm
(hardware)
http://www.spectorsoft.com (software)
http://www.winwhatwhere.com/ (software)
http://www.computer-monitoring.com/index.html
http://www.tigerdirect.com/applications/SearchTools/search.asp?keywords=a289-
IAPPS - Executive Protection Associates
National Security Agency (NSA)
Federal Bureau of Investigation - Home Page
FBI Espionage, Counterintelligence and Counterterrorism Awareness
IntelWeb What's New in Intelligence
Mossad - Israels Secret Intelligence Agency
U.S. GEOLOGICAL SURVEY - Geology and Mapping Resources
United States Department of Justice Home Page
Federal Bureau of Investigation
Federal Emergency Management Agency (FEMA)
SACLANT Undersea Research Centre
German Armed Forces University - Hamburg
German Armed Forces University - Muenchen
Lockheed Martin Missiles and Space
Rockwell International Corporation
Harris Corporation, RF Communications Division
Harris Corporation, Electronic Systems Sector
Silicon Graphics Computer Systems
50 USC Sec. 403-4 (01/24/94): DCI Authorities
National Security Institute - Resources
U.S. Intelligence Agencies - National Counterintelligence Center (NCC)
Real Time Support for the Warrior
434th Military Intelligence Detachment (Strategic)
The Army HomePage Subject Area Index - H
Intelligence and Electronic Warfare
US Army - Foreign Intelligence Agencies
US State Dept: Report by Country
IntelWeb: Intelligence Communities by Country
The Unofficial Communications Security Establishment Webpage
Palestinian Intelligence Community
WLR Cassidy and Associates - SE Asia
USSR - The Third World Countries and US
Library of Congress Soviet Archives Exhibit
NAMEBASE On-Line! telnet gateway required. Log in as "namebase"
Jane's War Machine Information
The Consortium - Investigative Reports
The Foreign Correspondent: FTP
Nautilus Institute for Security and Sustainable Development
IntelWeb - The WWW Site of Intelligence Watch Report
IPN - Information Professionals Network
Continental Investigative Service
The Integrity Center Inc.: Objective risk management information
LOYOLA HOMEPAGE ON STRATEGIC INTELLIGENCE
MILNET: Open Source Military Information Database
Sarajevo Pipeline - Creating free dialog with people in the regions of the former Yugoslavia, and Zines
Counter-Terrorism Sites
Center for National Security Studies
FAA Information Services via World Wide Web
Per National Industrial Security Program Operating Manual
(NISPOM) Standard DoD 5220.22-M
http://www.dss.mil/isec/nispom.htm
http://www.cerberussystems.com/default.htm
http://www.webroot.com/ Eraser
5.5.2 (Source code is available)
http://www.tolvanen.com/eraser/
National Do Not Call Registry http://www.donotcall.gov/default.aspx
http://www.thefreesite.com/Anonymous_Freebies/
The heart of darkness: https://www.microsoft.com/technet/default.asp
2600 Computer Security - Computer and Internet Security Resource. With news, links, and tools.
C4I.org - Comprehensive security portal offering computer security information for governments and corporations.
Canada's Export Controls - Summary of Canada's export controls on cryptographic software
Center for INFOSEC Studies and Research - Official US Navy Site providing information, publications and news on general security issues.
CERIAS Hotlist - The CCERIAS hotlist is the most comprehensive security site on the WWW, covering all aspects of security.
Code-Storm - Computer programming and security information.
comp.security Newsgroup FAQs - Security related FAQ covering a variety of subjects
Computer Security Book List - Provides a list of security books with their online availability and short review, currently has 105 books and growing.
CriticalSecurity.com - Computer security resources including free security planning templates and whitepapers.
DSH - Commercial and GSA reseller for Arbor Networks, Entercept, Netforensics and Solsoft.
e-TimeStamp - Commercial TimeStamping service that provides digital third-party witness of any file on a computer system.
eSecurityOnline, LLC - Offering security and eBusiness professionals with immediate access to one of the industry¹s most complete security-related information resources.
Forensic-computing.co.uk - Provides links to organisations involved in one or more aspects of forensic computing.
General Computer Security forum at Tek-Tips - General Computer Security technical support forums and mutual help system for computer professionals. Selling and recruiting forbidden.
Information Security Conference 2003 - Provides information on the sixth year of this international conference to be held in October. Call for papers, venue and registration details.
InfoSysSec - Computer, network and information security resource portal. Meta index of security resources maintained by students of Algonquin College.
IntoIT - The journal of the INTOSAI EDP Audit Committee. Its main focuses are on information systems auditing, IT performance auditing, and IT support for auditing.
ISSA - International Systems Security Association - An international non-profit organization of information security professionals and practitioners. It provides education forums, publications and peer interaction opportunities.
IT Baseline Protection Manual - Standard security safeguards for Unix, Novell, Windows NT, Firewalls, PBX, Databases, Email, ITSEC Management, Infrastructure, and ISDN.
Kruse Security Advisement - Many security topics in English and Danish.
LockDown - Home Computer Security Centre - Security information and free advice for home computer computer users about choosing passwords, encryption, steganography and securing your PC.
North Texas Chapter ISSA - The Dallas and Fort Worth chapter of the Information Systems Security Association (ISSA).
Novell Security Services - Information about Novell's network security solutions.
O'Reilly Security Center - O'Reilly is a leader in technical and computer book documentation for Security.
RCMP Technical Security Branch - Canadian organization dedicated to providing federal government clients with a full range of professional physical and information technology security services and police forces with high technology forensic services.
Ronald L. Rivest's Cryptography and Security - Provides links to cryptography and security sites.
Security Forum - Security Forum was created to bring together industry professionals to present and discuss information security challenges and solutions.
Security Forums Dot Com - UK-based forum for discussions about all aspects of computer security.
Security Information Directory and Hacking Portal - Comprehensive directory of security and hacking articles, links, downloads, FAQs, tools, utilities, virus, anti-virus, trojans, cellular, phreaking, physical security, tutorials, telecommunications, and daily security news.
Security.tao.ca - Resources and information on securing your internet transactions and computer data.
SecurityConfig.com - Providing security software and news for both Windows and Linux.
SecuritySearch - Industry news, security headlines and books as well as various security-related communities.
SecurityWatch.com - Global e-security knowledge portal includes security news, technical advice, vulnerability database, hacking/virus info, industry analysis, events calendar, careers, and related resources.
Technical Info - Provides plain language technical papers on security and securing orgnaisations.
The Encyclopedia of Computer Security - A complete one-source location for information security news, products, whitepapers, events, and definitions requires the use of JavaScript for navigation and display purposes.
The Freefire Project - Provides information about open source security software.
The Peon's Guide To Secure System Development - A short, hard-hitting paper which puts forth and argues for various basic principles which must be understood by all programmers in order to make systems secure.
The Shmoo Group - Privacy, crypto, and security tools and resources with daily news updates.
CERIAS - Center for Education and Research in Information Assurance and Security - University center for multidisciplinary research and education in areas of information security. Provides hotlist covering all aspects of security.
CERT Coordination Center - The CERT Coordination Center studies Internet security vulnerabilities, provides incident response services to sites that have been the victims of attack, publishes a variety of security alerts, researches security and survivability in wide-area-networked computing, and develops information to help you improve security at your site.