pastebin - collaborative debugging tool
kpaste.net RSS


how I meat your mother
Posted by Anonymous on Sat 2nd Mar 2013 05:24
raw | new post

  1. CRYPTOME.ORG
  2.  
  3. 31 August 2012
  4.  
  5. http://pastebin.com/raw.php?i=f3Z4fQvK
  6.  
  7.  ===============================================================
  8.       HUGE Security Resource+ - version 6000 - 08/31/2012
  9.                    (Security + Trimmings!)
  10.  
  11. ,.-----> CHANGELOG:
  12. |
  13. | 1. Added a crazy amount of new links.
  14. | 2. Fixed 'OpenBSD' links incorrectly assigned to previous section 5000
  15. | 3. Merged 'Security Blogs' at bottom to proper section 6005
  16. | 4. Removed most titles/descriptions of links to reduce clutter & ease use
  17. |    While this may make it more difficult to find exactly what you're
  18. |    after, it's cleaner, leaner, and easier to navigate through. This
  19. |    is especially true for the guys maintaining this document. There is
  20. |    some labeling/titles here and there, but most of the heavily
  21. |    verbose titles/descriptions of various entries have been removed.
  22. | 5. Merged 'Pubs' & 'Forums' to 6007 & 6006
  23. | 6. Removed several duplicate and broken links
  24. | 7. Fixed some links (pages had moved) and a few typos
  25. | 8. Sorta sorted sections
  26. | 9. Renamed project title from 'HUGE Security Resource' to
  27. |    'HUGE Security Resource+', meaning, with this version and
  28. |    future versions this document will contain more than
  29. |    security related material. (currently a work in progress)
  30. |10. Released v.6000 despite a large number of remaining links we
  31. |    would like to include, but they will come with our next release.
  32. |___________________________________
  33. |
  34. | Sections, version 6000, 08/31/2012
  35. |
  36. | 6000: Wikipedia (all links here found within Wikipedia)
  37. | 6001: Suggested Books
  38. | 6002: Articles, Guides, How To's
  39. | 6003: Antivirus LiveCDs - boot and scan your system for malware
  40. | 6004: Random Links (flooded with links - to be organized soon)
  41. | 6005: Security Blogs
  42. | 6006: Security Forums (Web based Discussion Forums)
  43. | 6007: Security Magazines & Zines
  44. | 6008: Linux Anti-Malware Scanners
  45. | 6009: Linux Security
  46. |       \_ 6009.1 Articles
  47. |       \_ 6009.2 Tools
  48. |       \_ 6009.3 Various+
  49. | 6010: Windows Security Tools
  50. |___________________________________
  51.  
  52. ** 6000: Wikipedia :
  53.          (Some links aren't directly related to security.)
  54.          (This section may be split into different sections)
  55.          (in a future version.)
  56.  
  57. https://en.wikipedia.org/wiki/Acoustic_cryptanalysis
  58. https://en.wikipedia.org/wiki/Acoustic_fingerprint
  59. https://en.wikipedia.org/wiki/Advanced_Persistent_Threat
  60. https://en.wikipedia.org/wiki/Agent_handling
  61. https://en.wikipedia.org/wiki/Agent_provocateur
  62. https://en.wikipedia.org/wiki/Aircrack-ng
  63. https://en.wikipedia.org/wiki/Amateur_radio
  64. https://en.wikipedia.org/wiki/Anonymizer
  65. https://en.wikipedia.org/wiki/Anonymous_remailer
  66. https://en.wikipedia.org/wiki/ARP_poisoning
  67. https://en.wikipedia.org/wiki/ARP_spoofing
  68. https://en.wikipedia.org/wiki/Arpwatch
  69. https://en.wikipedia.org/wiki/Audio_signal_processing
  70. https://en.wikipedia.org/wiki/Automatic_Packet_Reporting_System
  71. https://en.wikipedia.org/wiki/Backdoor_%28computing%29
  72. https://en.wikipedia.org/wiki/Behavioral_targeting
  73. https://en.wikipedia.org/wiki/Bioacoustics
  74. https://en.wikipedia.org/wiki/BitTorrent_protocol_encryption
  75. https://en.wikipedia.org/wiki/Black_operation
  76. https://en.wikipedia.org/wiki/Black_propaganda
  77. https://en.wikipedia.org/wiki/Black_site
  78. https://en.wikipedia.org/wiki/Bluebugging
  79. https://en.wikipedia.org/wiki/Bluejacking
  80. https://en.wikipedia.org/wiki/Bluesnarfing
  81. https://en.wikipedia.org/wiki/BrainGate
  82. https://en.wikipedia.org/wiki/Category:Activism
  83. https://en.wikipedia.org/wiki/Category:Activism_by_method
  84. https://en.wikipedia.org/wiki/Category:Amateur_radio
  85. https://en.wikipedia.org/wiki/Category:American_spies
  86. https://en.wikipedia.org/wiki/Category:American_whistleblowers
  87. https://en.wikipedia.org/wiki/Category:Analysis
  88. https://en.wikipedia.org/wiki/Category:Applications_of_cryptography
  89. https://en.wikipedia.org/wiki/Category:Applied_ethics
  90. https://en.wikipedia.org/wiki/Category:Automatic_identification_and_data_capture
  91. https://en.wikipedia.org/wiki/Category:Barcodes
  92. https://en.wikipedia.org/wiki/Category:BitTorrent
  93. https://en.wikipedia.org/wiki/Category:Black_projects
  94. https://en.wikipedia.org/wiki/Category:Bluetooth
  95. https://en.wikipedia.org/wiki/Category:Books_about_the_Central_Intelligence_Agency
  96. https://en.wikipedia.org/wiki/Category:Branches_of_psychology
  97. https://en.wikipedia.org/wiki/Category:Central_Intelligence_Agency
  98. https://en.wikipedia.org/wiki/Category:Central_Intelligence_Agency_operations
  99. https://en.wikipedia.org/wiki/Category:Christianity
  100. https://en.wikipedia.org/wiki/Category:Christian_terms
  101. https://en.wikipedia.org/wiki/Category:Civil_disobedience
  102. https://en.wikipedia.org/wiki/Category:Codecs
  103. https://en.wikipedia.org/wiki/Category:Code_names
  104. https://en.wikipedia.org/wiki/Category:COINTELPRO_targets
  105. https://en.wikipedia.org/wiki/Category:Communication_of_falsehoods
  106. https://en.wikipedia.org/wiki/Category:Computational_linguistics
  107. https://en.wikipedia.org/wiki/Category:Computational_statistics
  108. https://en.wikipedia.org/wiki/Category:Computer_file_formats
  109. https://en.wikipedia.org/wiki/Category:Computer_networking
  110. https://en.wikipedia.org/wiki/Category:Computer_network_security
  111. https://en.wikipedia.org/wiki/Category:Computer_security
  112. https://en.wikipedia.org/wiki/Category:Computer_security_exploits
  113. https://en.wikipedia.org/wiki/Category:Computer_security_organizations
  114. https://en.wikipedia.org/wiki/Category:Computer_security_software
  115. https://en.wikipedia.org/wiki/Category:Concepts_in_ethics
  116. https://en.wikipedia.org/wiki/Category:Confidence_tricks
  117. https://en.wikipedia.org/wiki/Category:Conspiracy_theories
  118. https://en.wikipedia.org/wiki/Category:Counter-intelligence
  119. https://en.wikipedia.org/wiki/Category:Counter-terrorism
  120. https://en.wikipedia.org/wiki/Category:Counter-terrorist_organizations
  121. https://en.wikipedia.org/wiki/Category:Covert_organizations
  122. https://en.wikipedia.org/wiki/Category:Critical_thinking
  123. https://en.wikipedia.org/wiki/Category:Crowd_psychology
  124. https://en.wikipedia.org/wiki/Category:Cryptanalytic_devices
  125. https://en.wikipedia.org/wiki/Category:Cryptanalytic_software
  126. https://en.wikipedia.org/wiki/Category:Cryptographic_attacks
  127. https://en.wikipedia.org/wiki/Category:Cryptographic_hardware
  128. https://en.wikipedia.org/wiki/Category:Cryptography
  129. https://en.wikipedia.org/wiki/Category:Cybercrime
  130. https://en.wikipedia.org/wiki/Category:Cyberwarfare
  131. https://en.wikipedia.org/wiki/Category:Data_collection
  132. https://en.wikipedia.org/wiki/Category:Data_compression
  133. https://en.wikipedia.org/wiki/Category:Data_security
  134. https://en.wikipedia.org/wiki/Category:Data_transmission
  135. https://en.wikipedia.org/wiki/Category:Deception
  136. https://en.wikipedia.org/wiki/Category:Denial-of-service_attacks
  137. https://en.wikipedia.org/wiki/Category:Digital_signal_processing
  138. https://en.wikipedia.org/wiki/Category:Diversionary_tactics
  139. https://en.wikipedia.org/wiki/Category:Electronic_test_equipment
  140. https://en.wikipedia.org/wiki/Category:Electronic_warfare
  141. https://en.wikipedia.org/wiki/Category:Encodings
  142. https://en.wikipedia.org/wiki/Category:Encryption_devices
  143. https://en.wikipedia.org/wiki/Category:Espionage
  144. https://en.wikipedia.org/wiki/Category:Espionage_devices
  145. https://en.wikipedia.org/wiki/Category:Espionage_projects
  146. https://en.wikipedia.org/wiki/Category:Espionage_techniques
  147. https://en.wikipedia.org/wiki/Category:Etiquette
  148. https://en.wikipedia.org/wiki/Category:File_sharing_networks
  149. https://en.wikipedia.org/wiki/Category:Gambling_terminology
  150. https://en.wikipedia.org/wiki/Category:Hacking_%28computer_security%29
  151. https://en.wikipedia.org/wiki/Category:Historians_of_the_Central_Intelligence_Agency
  152. https://en.wikipedia.org/wiki/Category:History_of_radio
  153. https://en.wikipedia.org/wiki/Category:History_of_telecommunications
  154. https://en.wikipedia.org/wiki/Category:History_of_the_Internet
  155. https://en.wikipedia.org/wiki/Category:Injection_exploits
  156. https://en.wikipedia.org/wiki/Category:Intelligence_%28information_gathering%29
  157. https://en.wikipedia.org/wiki/Category:Intelligence_agencies
  158. https://en.wikipedia.org/wiki/Category:Intelligence_agencies_by_country
  159. https://en.wikipedia.org/wiki/Category:Intelligence_analysis
  160. https://en.wikipedia.org/wiki/Category:Intelligence_operations
  161. https://en.wikipedia.org/wiki/Category:International_security
  162. https://en.wikipedia.org/wiki/Category:Interrogation_techniques
  163. https://en.wikipedia.org/wiki/Category:Law_enforcement
  164. https://en.wikipedia.org/wiki/Category:Law_enforcement_equipment
  165. https://en.wikipedia.org/wiki/Category:Law_enforcement_techniques
  166. https://en.wikipedia.org/wiki/Category:Law_enforcement_terminology
  167. https://en.wikipedia.org/wiki/Category:Linux_security_software
  168. https://en.wikipedia.org/wiki/Category:Malware
  169. https://en.wikipedia.org/wiki/Category:Mass_surveillance
  170. https://en.wikipedia.org/wiki/Category:Media_manipulation
  171. https://en.wikipedia.org/wiki/Category:Metaphysics
  172. https://en.wikipedia.org/wiki/Category:Microscopy
  173. https://en.wikipedia.org/wiki/Category:Military_communications
  174. https://en.wikipedia.org/wiki/Category:Military_intelligence
  175. https://en.wikipedia.org/wiki/Category:Military_operations_by_type
  176. https://en.wikipedia.org/wiki/Category:Military_organization
  177. https://en.wikipedia.org/wiki/Category:Military_psychiatry
  178. https://en.wikipedia.org/wiki/Category:Military_science
  179. https://en.wikipedia.org/wiki/Category:Military_technology
  180. https://en.wikipedia.org/wiki/Category:Mind_control
  181. https://en.wikipedia.org/wiki/Category:Morse_code
  182. https://en.wikipedia.org/wiki/Category:National_security
  183. https://en.wikipedia.org/wiki/Category:National_Security_Agency
  184. https://en.wikipedia.org/wiki/Category:National_Security_Agency_encryption_devices
  185. https://en.wikipedia.org/wiki/Category:Network_addressing
  186. https://en.wikipedia.org/wiki/Category:Network_architecture
  187. https://en.wikipedia.org/wiki/Category:Network_management
  188. https://en.wikipedia.org/wiki/Category:Neuropsychology
  189. https://en.wikipedia.org/wiki/Category:Neuroscience
  190. https://en.wikipedia.org/wiki/Category:Non-fiction_books_about_espionage
  191. https://en.wikipedia.org/wiki/Category:Non-military_counter-terrorist_organizations
  192. https://en.wikipedia.org/wiki/Category:Nonverbal_communication
  193. https://en.wikipedia.org/wiki/Category:Operations_involving_special_forces
  194. https://en.wikipedia.org/wiki/Category:Organized_crime
  195. https://en.wikipedia.org/wiki/Category:Packet_radio
  196. https://en.wikipedia.org/wiki/Category:Paramilitary_organizations
  197. https://en.wikipedia.org/wiki/Category:People_of_the_Central_Intelligence_Agency
  198. https://en.wikipedia.org/wiki/Category:Perimeter_security
  199. https://en.wikipedia.org/wiki/Category:Persuasion_techniques
  200. https://en.wikipedia.org/wiki/Category:Philosophical_concepts
  201. https://en.wikipedia.org/wiki/Category:Philosophical_methodology
  202. https://en.wikipedia.org/wiki/Category:Philosophy
  203. https://en.wikipedia.org/wiki/Category:Philosophy_of_language
  204. https://en.wikipedia.org/wiki/Category:Privacy
  205. https://en.wikipedia.org/wiki/Category:Privacy_of_telecommunications
  206. https://en.wikipedia.org/wiki/Category:Problem_solving
  207. https://en.wikipedia.org/wiki/Category:Propaganda
  208. https://en.wikipedia.org/wiki/Category:Propaganda_in_the_United_States
  209. https://en.wikipedia.org/wiki/Category:Propaganda_techniques
  210. https://en.wikipedia.org/wiki/Category:Psychiatric_treatments
  211. https://en.wikipedia.org/wiki/Category:Psychological_manipulation
  212. https://en.wikipedia.org/wiki/Category:Psychological_warfare
  213. https://en.wikipedia.org/wiki/Category:Public-key_cryptography
  214. https://en.wikipedia.org/wiki/Category:Quantized_radio_modulation_modes
  215. https://en.wikipedia.org/wiki/Category:Radio
  216. https://en.wikipedia.org/wiki/Category:Religious_philosophy
  217. https://en.wikipedia.org/wiki/Category:Researchers_of_the_John_F._Kennedy_assassination
  218. https://en.wikipedia.org/wiki/Category:Research_methods
  219. https://en.wikipedia.org/wiki/Category:Rootkits
  220. https://en.wikipedia.org/wiki/Category:Secrecy
  221. https://en.wikipedia.org/wiki/Category:Secret_broadcasting
  222. https://en.wikipedia.org/wiki/Category:Secret_government_programs
  223. https://en.wikipedia.org/wiki/Category:Secret_military_programs
  224. https://en.wikipedia.org/wiki/Category:Security
  225. https://en.wikipedia.org/wiki/Category:Security_companies
  226. https://en.wikipedia.org/wiki/Category:Signals_intelligence
  227. https://en.wikipedia.org/wiki/Category:Signals_intelligence_agencies
  228. https://en.wikipedia.org/wiki/Category:Social_engineering_(computer_security)
  229. https://en.wikipedia.org/wiki/Category:Solid-state_computer_storage
  230. https://en.wikipedia.org/wiki/Category:Spies_by_role
  231. https://en.wikipedia.org/wiki/Category:Statistical_software
  232. https://en.wikipedia.org/wiki/Category:Steganography
  233. https://en.wikipedia.org/wiki/Category:Surveillance
  234. https://en.wikipedia.org/wiki/Category:Survival_skills
  235. https://en.wikipedia.org/wiki/Category:Telecommunications
  236. https://en.wikipedia.org/wiki/Category:Telegraphy
  237. https://en.wikipedia.org/wiki/Category:Theology
  238. https://en.wikipedia.org/wiki/Category:United_States_Department_of_Defense_agencies
  239. https://en.wikipedia.org/wiki/Category:United_States_government_secrecy
  240. https://en.wikipedia.org/wiki/Category:Video_hosting
  241. https://en.wikipedia.org/wiki/Category:Warfare_by_type
  242. https://en.wikipedia.org/wiki/Category:Whistleblowers_by_nationality
  243. https://en.wikipedia.org/wiki/Category:Wireless_networking
  244. https://en.wikipedia.org/wiki/Category:Works_about_espionage
  245. https://en.wikipedia.org/wiki/Central_Intelligence_Agency
  246. https://en.wikipedia.org/wiki/Chaffing_and_winnowing
  247. https://en.wikipedia.org/wiki/Christianity
  248. https://en.wikipedia.org/wiki/Church_Committee
  249. https://en.wikipedia.org/wiki/CIA_influence_on_public_opinion
  250. https://en.wikipedia.org/wiki/Citizens%27_Commission_to_Investigate_the_FBI
  251. https://en.wikipedia.org/wiki/Citizens_Rule_Book
  252. https://en.wikipedia.org/wiki/Clandestine_operation
  253. https://en.wikipedia.org/wiki/Cointelpro
  254. https://en.wikipedia.org/wiki/Cold_boot_attack
  255. https://en.wikipedia.org/wiki/Communications_Assistance_for_Law_Enforcement_Act
  256. https://en.wikipedia.org/wiki/Comparison_of_BitTorrent_clients
  257. https://en.wikipedia.org/wiki/Comparison_of_download_managers
  258. https://en.wikipedia.org/wiki/Comparison_of_portable_media_players
  259. https://en.wikipedia.org/wiki/Comparison_of_video_hosting_services
  260. https://en.wikipedia.org/wiki/Comparison_of_VoIP_software
  261. https://en.wikipedia.org/wiki/CompStat
  262. https://en.wikipedia.org/wiki/Computer_and_Internet_Protocol_Address_Verifier
  263. https://en.wikipedia.org/wiki/Computer_insecurity
  264. https://en.wikipedia.org/wiki/Computer_surveillance
  265. https://en.wikipedia.org/wiki/Confidence_trick
  266. https://en.wikipedia.org/wiki/Consensus_reality
  267. https://en.wikipedia.org/wiki/Covert_operation
  268. https://en.wikipedia.org/wiki/Cryptographic_hash_function
  269. https://en.wikipedia.org/wiki/Cut-out_%28espionage%29
  270. https://en.wikipedia.org/wiki/CyanogenMod
  271. https://en.wikipedia.org/wiki/Cygwin
  272. https://en.wikipedia.org/wiki/Data_acquisition
  273. https://en.wikipedia.org/wiki/Data_remanence
  274. https://en.wikipedia.org/wiki/Deep_packet_inspection
  275. https://en.wikipedia.org/wiki/Defense
  276. https://en.wikipedia.org/wiki/Dehumidifier
  277. https://en.wikipedia.org/wiki/Deluge_%28software%29
  278. https://en.wikipedia.org/wiki/Digital_signal_processing
  279. https://en.wikipedia.org/wiki/Digital_signature
  280. https://en.wikipedia.org/wiki/Digital_traces
  281. https://en.wikipedia.org/wiki/DNS_spoofing
  282. https://en.wikipedia.org/wiki/Doctrine_of_mental_reservation
  283. https://en.wikipedia.org/wiki/ECHELON
  284. https://en.wikipedia.org/wiki/Electrical_measurements
  285. https://en.wikipedia.org/wiki/Electromagnetic_interference
  286. https://en.wikipedia.org/wiki/Electromagnetic_pulse
  287. https://en.wikipedia.org/wiki/Electromagnetic_radiation_and_health
  288. https://en.wikipedia.org/wiki/Electromagnetic_shielding
  289. https://en.wikipedia.org/wiki/Electromagnetic_spectrum
  290. https://en.wikipedia.org/wiki/Electronic_signature
  291. https://en.wikipedia.org/wiki/EMF_measurement
  292. https://en.wikipedia.org/wiki/Espionage
  293. https://en.wikipedia.org/wiki/Executable_and_Linkable_Format
  294. https://en.wikipedia.org/wiki/Exploit_%28computer_science%29
  295. https://en.wikipedia.org/wiki/Fair_use
  296. https://en.wikipedia.org/wiki/Family_Jewels_%28Central_Intelligence_Agency%29
  297. https://en.wikipedia.org/wiki/Faraday_cage
  298. https://en.wikipedia.org/wiki/Fast_Fourier_Transform
  299. https://en.wikipedia.org/wiki/Forensic_linguistics
  300. https://en.wikipedia.org/wiki/Freedom_of_information
  301. https://en.wikipedia.org/wiki/Freedom_of_information_legislation
  302. https://en.wikipedia.org/wiki/Free_software
  303. https://en.wikipedia.org/wiki/Free_speech_zone
  304. https://en.wikipedia.org/wiki/Frequency_analysis
  305. https://en.wikipedia.org/wiki/Frequency_counter
  306. https://en.wikipedia.org/wiki/Fusion_center
  307. https://en.wikipedia.org/wiki/Gary_Webb
  308. https://en.wikipedia.org/wiki/Gutmann_method
  309. https://en.wikipedia.org/wiki/High-frequency_direction_finding
  310. https://en.wikipedia.org/wiki/Honeypot_%28computing%29
  311. https://en.wikipedia.org/wiki/Host_protected_area
  312. https://en.wikipedia.org/wiki/Hosts_file
  313. https://en.wikipedia.org/wiki/Htaccess
  314. https://en.wikipedia.org/wiki/HTTP_tunnel_(software)
  315. https://en.wikipedia.org/wiki/I2P
  316. https://en.wikipedia.org/wiki/IEEE_802.11i-2004
  317. https://en.wikipedia.org/wiki/IMSI-catcher
  318. https://en.wikipedia.org/wiki/Information_visualization
  319. https://en.wikipedia.org/wiki/Information_wants_to_be_free
  320. https://en.wikipedia.org/wiki/Infrasound
  321. https://en.wikipedia.org/wiki/Intelligence_collection_management
  322. https://en.wikipedia.org/wiki/International_Spy_Museum
  323. https://en.wikipedia.org/wiki/Internet_protocol_suite
  324. https://en.wikipedia.org/wiki/Iran-Contra_Affair
  325. https://en.wikipedia.org/wiki/John_F._Kennedy_assassination_conspiracy_theories
  326. https://en.wikipedia.org/wiki/Jury_nullification
  327. https://en.wikipedia.org/wiki/Laser_microphone
  328. https://en.wikipedia.org/wiki/Linux_malware
  329. https://en.wikipedia.org/wiki/List_of_CB_slang
  330. https://en.wikipedia.org/wiki/List_of_codecs
  331. https://en.wikipedia.org/wiki/List_of_con_artists
  332. https://en.wikipedia.org/wiki/List_of_confidence_tricks
  333. https://en.wikipedia.org/wiki/List_of_conspiracies_%28political%29
  334. https://en.wikipedia.org/wiki/List_of_counterintelligence_organizations
  335. https://en.wikipedia.org/wiki/List_of_countries_by_Failed_States_Index
  336. https://en.wikipedia.org/wiki/List_of_criminal_enterprises,_gangs_and_syndicates
  337. https://en.wikipedia.org/wiki/List_of_defunct_intelligence_agencies
  338. https://en.wikipedia.org/wiki/List_of_information_graphics_software
  339. https://en.wikipedia.org/wiki/List_of_intelligence_agencies
  340. https://en.wikipedia.org/wiki/List_of_intelligence_gathering_disciplines
  341. https://en.wikipedia.org/wiki/List_of_international_common_standards
  342. https://en.wikipedia.org/wiki/List_of_Linux_computer_viruses
  343. https://en.wikipedia.org/wiki/List_of_numerical_analysis_software
  344. https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers
  345. https://en.wikipedia.org/wiki/List_of_video_hosting_services
  346. https://en.wikipedia.org/wiki/MAC_address
  347. https://en.wikipedia.org/wiki/Magic_Lantern_%28software%29
  348. https://en.wikipedia.org/wiki/Md5
  349. https://en.wikipedia.org/wiki/Measuring_receiver
  350. https://en.wikipedia.org/wiki/Media_manipulation
  351. https://en.wikipedia.org/wiki/Microexpression
  352. https://en.wikipedia.org/wiki/Mind_control
  353. https://en.wikipedia.org/wiki/Mitrokhin_Archive
  354. https://en.wikipedia.org/wiki/Moscow_rules
  355. https://en.wikipedia.org/wiki/Musical_acoustics
  356. https://en.wikipedia.org/wiki/Music_cognition
  357. https://en.wikipedia.org/wiki/National_Cryptologic_Museum
  358. https://en.wikipedia.org/wiki/National_Security_Agency
  359. https://en.wikipedia.org/wiki/Nonverbal_communication
  360. https://en.wikipedia.org/wiki/Numbers_station
  361. https://en.wikipedia.org/wiki/OpenBSD_Journal
  362. https://en.wikipedia.org/wiki/OpenID
  363. https://en.wikipedia.org/wiki/Operation_Mockingbird
  364. https://en.wikipedia.org/wiki/Operation_Northwoods
  365. https://en.wikipedia.org/wiki/Operation_RAFTER
  366. https://en.wikipedia.org/wiki/Optical_microscope
  367. https://en.wikipedia.org/wiki/Organizationally_Unique_Identifier
  368. https://en.wikipedia.org/wiki/OSSEC
  369. https://en.wikipedia.org/wiki/Packet_radio
  370. https://en.wikipedia.org/wiki/Palantir_Technologies
  371. https://en.wikipedia.org/wiki/Panopticon
  372. https://en.wikipedia.org/wiki/Paralanguage
  373. https://en.wikipedia.org/wiki/Patriot_Act
  374. https://en.wikipedia.org/wiki/Perl
  375. https://en.wikipedia.org/wiki/Phishing
  376. https://en.wikipedia.org/wiki/Pod_slurping
  377. https://en.wikipedia.org/wiki/Police_code#The_Hundred_Code
  378. https://en.wikipedia.org/wiki/Port_forwarding
  379. https://en.wikipedia.org/wiki/Power_analysis
  380. https://en.wikipedia.org/wiki/Project_ARTICHOKE
  381. https://en.wikipedia.org/wiki/Project_Chatter
  382. https://en.wikipedia.org/wiki/Project_MINARET
  383. https://en.wikipedia.org/wiki/Project_MKDELTA
  384. https://en.wikipedia.org/wiki/Project_MKNAOMI
  385. https://en.wikipedia.org/wiki/Project_MKUltra
  386. https://en.wikipedia.org/wiki/Project_Shamrock
  387. https://en.wikipedia.org/wiki/Psikhushka
  388. https://en.wikipedia.org/wiki/Psychological_manipulation
  389. https://en.wikipedia.org/wiki/Psychological_Operations_%28United_States%29
  390. https://en.wikipedia.org/wiki/Public-key_cryptography
  391. https://en.wikipedia.org/wiki/QBittorrent
  392. https://en.wikipedia.org/wiki/Q_code
  393. https://en.wikipedia.org/wiki/QR_Code
  394. https://en.wikipedia.org/wiki/Radio_direction_finder
  395. https://en.wikipedia.org/wiki/Reality_mining
  396. https://en.wikipedia.org/wiki/Red_squad
  397. https://en.wikipedia.org/wiki/Reid_technique
  398. https://en.wikipedia.org/wiki/Richard_Stallman
  399. https://en.wikipedia.org/wiki/Rogue_DHCP
  400. https://en.wikipedia.org/wiki/Room_641A
  401. https://en.wikipedia.org/wiki/Rootkit
  402. https://en.wikipedia.org/wiki/Scopolamine#Use_in_interrogation
  403. https://en.wikipedia.org/wiki/Scrambler
  404. https://en.wikipedia.org/wiki/Screencast
  405. https://en.wikipedia.org/wiki/Secure_Communication
  406. https://en.wikipedia.org/wiki/Secure_computing
  407. https://en.wikipedia.org/wiki/Secure_digital_card
  408. https://en.wikipedia.org/wiki/Secure_telephone
  409. https://en.wikipedia.org/wiki/Security_engineering
  410. https://en.wikipedia.org/wiki/Seismology
  411. https://en.wikipedia.org/wiki/SheevaPlug
  412. https://en.wikipedia.org/wiki/Shellcode
  413. https://en.wikipedia.org/wiki/Shill
  414. https://en.wikipedia.org/wiki/Shortwave
  415. https://en.wikipedia.org/wiki/Shred_%28Unix%29
  416. https://en.wikipedia.org/wiki/Side_channel_attack
  417. https://en.wikipedia.org/wiki/Signal_analysis
  418. https://en.wikipedia.org/wiki/Silent_speech_interface
  419. https://en.wikipedia.org/wiki/Simulated_reality
  420. https://en.wikipedia.org/wiki/Situation_awareness
  421. https://en.wikipedia.org/wiki/Smartdust
  422. https://en.wikipedia.org/wiki/Snarfing
  423. https://en.wikipedia.org/wiki/Sneakernet
  424. https://en.wikipedia.org/wiki/Software_Defined_Radio
  425. https://en.wikipedia.org/wiki/Software_patent_debate
  426. https://en.wikipedia.org/wiki/Sound_synthesis
  427. https://en.wikipedia.org/wiki/Sousveillance
  428. https://en.wikipedia.org/wiki/Spectral_leakage
  429. https://en.wikipedia.org/wiki/Spectral_music
  430. https://en.wikipedia.org/wiki/Spectrogram
  431. https://en.wikipedia.org/wiki/Spectrometer
  432. https://en.wikipedia.org/wiki/Spectrum_analyzer
  433. https://en.wikipedia.org/wiki/Split_tunneling
  434. https://en.wikipedia.org/wiki/Spycatcher
  435. https://en.wikipedia.org/wiki/Spymaster
  436. https://en.wikipedia.org/wiki/Srm_%28Unix%29
  437. https://en.wikipedia.org/wiki/Stanford_prison_experiment
  438. https://en.wikipedia.org/wiki/STASI
  439. https://en.wikipedia.org/wiki/Steganography
  440. https://en.wikipedia.org/wiki/Stenomask
  441. https://en.wikipedia.org/wiki/Street_light_interference_phenomenon
  442. https://en.wikipedia.org/wiki/Subvocal_recognition
  443. https://en.wikipedia.org/wiki/Sysctl
  444. https://en.wikipedia.org/wiki/Telephone_tapping
  445. https://en.wikipedia.org/wiki/Tempest_%28codename%29
  446. https://en.wikipedia.org/wiki/Ten-code
  447. https://en.wikipedia.org/wiki/The_CIA_and_the_Cult_of_Intelligence
  448. https://en.wikipedia.org/wiki/The_COINTELPRO_Papers
  449. https://en.wikipedia.org/wiki/Thermal_insulation
  450. https://en.wikipedia.org/wiki/ThinThread
  451. https://en.wikipedia.org/wiki/Throat_microphone
  452. https://en.wikipedia.org/wiki/Timing_attack
  453. https://en.wikipedia.org/wiki/Tin_foil_hat
  454. https://en.wikipedia.org/wiki/Tor_%28anonymity_network%29
  455. https://en.wikipedia.org/wiki/Tradecraft
  456. https://en.wikipedia.org/wiki/Trailblazer_Project
  457. https://en.wikipedia.org/wiki/Transmission_%28BitTorrent_client%29
  458. https://en.wikipedia.org/wiki/TrapWire
  459. https://en.wikipedia.org/wiki/Trusted_computing
  460. https://en.wikipedia.org/wiki/Truth_drug
  461. https://en.wikipedia.org/wiki/United_States_government_security_breaches
  462. https://en.wikipedia.org/wiki/Van_Eck_phreaking
  463. https://en.wikipedia.org/wiki/Very_low_frequency
  464. https://en.wikipedia.org/wiki/Victor_Marchetti
  465. https://en.wikipedia.org/wiki/Virtual_private_network
  466. https://en.wikipedia.org/wiki/Voice_procedure
  467. https://en.wikipedia.org/wiki/Wi-Fi
  468. https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access
  469. https://en.wikipedia.org/wiki/Wireless_ad-hoc_network
  470. https://en.wikipedia.org/wiki/Wireless_mesh_network
  471. https://en.wikipedia.org/wiki/Wireless_security
  472. https://en.wikipedia.org/wiki/Write_amplification
  473. https://en.wikipedia.org/wiki/Writeprint
  474. https://en.wikipedia.org/wiki/WWV_%28radio_station%29#Standard_frequency_signals
  475. https://en.wikipedia.org/wiki/Yahweh
  476. https://en.wikipedia.org/wiki/Z_code
  477.  
  478. ----------------------------------------
  479.  
  480. ** 6001: Suggested Books:
  481.  
  482. - CLOAK & CORKSCREW: Where CIA Meets Hollywood
  483. - For the President's Eyes Only: Secret Intelligence and the American Presidency from Washington to Bush
  484. - Priceless: How I Went Undercover to Rescue the World's Stolen Treasures
  485. - Radio Frequency Interference: How to Find It and Fix It
  486. - SAS Survival Handbook, Revised Edition: For Any Climate, in Any Situation
  487. - Spycatcher - by Peter Wright
  488. - The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
  489. - Under and Alone: The True Story of the Undercover Agent Who Infiltrated America's Most Violent Outlaw Motorcycle Gang
  490.  
  491. ----------------------------------------
  492.  
  493. ** 6002: Articles, Guides, How To's:
  494.  
  495. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
  496. + (MS Kinect Spy System): http://www.pgpboard.com/viewtopic.php?f=2&t=691
  497. + (MS Kinect Spy System / Article mirrors): http://pastesite.com/41388 , http://paste.lisp.org/display/131227
  498. +
  499. + (Spies at MS? / Snippet): http://www.pgpboard.com/viewtopic.php?f=2&t=702
  500. + (Spies at MS? / Full Article): http://www.pcpro.co.uk/news/security/375169/could-us-cyberspies-have-moles-inside-microsoft
  501. + (Spies at MS? / Discussion): http://it.slashdot.org/story/12/06/15/1614219/us-security-services-may-have-moles-within-microsoft-says-researcher
  502. +
  503. + (links, tons of) http://www.loyola.edu/departments/academics/political-science/strategic-intelligence/index.html
  504. +
  505. http://aboba.drizzlehosting.com/IEEE/
  506. http://advocacy.globalvoicesonline.org/projects/guide/
  507. http://all.net/books/document/harvard.html
  508. http://all.net/journal/50/crypt.html
  509. http://all.net/journal/50/cybercop.html
  510. http://all.net/journal/50/ecommerce.html
  511. http://all.net/journal/50/firewall.html
  512. http://all.net/journal/deception/index.html
  513. http://all.net/journal/ntb/index.html
  514. http://arstechnica.com/information-technology/2012/06/blowing-away-bloatware-a-guide-to-reinstalling-windows-on-a-new-pc/
  515. http://arstechnica.com/information-technology/2012/07/freeing-your-router-from-ciscos-anti-porn-pro-copyright-cloud-service/
  516. http://arstechnica.com/tech-policy/news/2011/02/black-ops-how-hbgary-wrote-backdoors-and-rootkits-for-the-government.ars/
  517. http://arstechnica.com/uncategorized/2007/10/p2p-researchers-use-a-blocklist-or-you-will-be-tracked-100-of-the-time/
  518. http://asm.sourceforge.net/
  519. http://blog.bodhizazen.net/linux/ubuntu-how-to-faillog/
  520. http://blog.spoofed.org/2007/12/openbsd-on-soekris-cheaters-guide.html
  521. http://blog.webroot.com/2011/09/13/mebromi-the-first-bios-rootkit-in-the-wild/
  522. http://catless.ncl.ac.uk/risks
  523. http://citp.princeton.edu/research/memory/
  524. http://crunchbanglinux.org/wiki/configuring_the_openbox_menu
  525. http://cryptogon.com/?p=624
  526. http://cryptogon.com/?p=877
  527. http://cryptome.org/0002/siss.htm
  528. http://cryptome.org/0005/cia-iqt-spies.htm
  529. http://cryptome.org/0005/tor-opsec.htm
  530. http://cryptome.org/0006/nsa-17-docs.htm
  531. http://cryptome.org/2012/07/gent-forum-spies.htm
  532. http://cryptome.org/2012/08/tor-exits-usg-funds-02.htm
  533. http://cryptome.org/cisco-vile.txt
  534. http://cryptome.org/isp-spy/online-spying.htm
  535. http://cryptome.org/nsa-tempest.htm
  536. http://cryptome.org/nsa-vaneck.htm
  537. http://cryptome.org/tempest-law.htm
  538. http://cwe.mitre.org/top25/
  539. http://debian-handbook.info/browse/stable/
  540. http://digitalcorpora.org/
  541. http://en.community.dell.com/support-forums/software-os/w/microsoft_os/3316.2-1-microsoft-windows-7-official-iso-download-links-digital-river.aspx
  542. http://forums.radioreference.com/
  543. http://freehaven.net/anonbib/topic.html#Anonymous_20communication
  544. http://hardware.slashdot.org/story/08/10/20/1248234/compromising-wired-keyboards
  545. http://helpx.adobe.com/flash-player/kb/disable-local-shared-objects-flash.html
  546. http://it.slashdot.org/story/02/03/09/199242/crt-eavesdropping-optical-tempest
  547. http://it.slashdot.org/story/09/03/12/2038213/researchers-sniff-keystrokes-from-thin-air-wires
  548. http://it.slashdot.org/story/09/07/12/0259246/stealing-data-via-electrical-outlet
  549. http://joernfranz.net/2011/01/20/installing-ubuntu-10-10-with-full-disk-encryption/
  550. http://lanl.arxiv.org/
  551. http://lasecwww.epfl.ch/keyboard/
  552. http://lifehacker.com/205090/geek-to-live--set-up-a-personal-home-ssh-server?tag=softwarehomeserver
  553. http://lifehacker.com/237227/geek-to-live--encrypt-your-web-browsing-session-with-an-ssh-socks-proxy?tag=softwaressh
  554. http://linuxpoison.blogspot.com/2009/06/how-to-disable-loading-of-unnecessary.html
  555. http://log.nadim.cc/?p=78
  556. http://mnin.org/ (Twitter: https://twitter.com/iMHLv2)
  557. http://news.cnet.com/2010-1071-997528.html?tag=fd_nc_1 (Archived: http://pastebin.com/nHZzQyB9)
  558. http://packetlife.net/library/cheat-sheets/
  559. http://pastebin.com/E1YbqUMV
  560. http://pastebin.com/JdkqxBAa
  561. http://pastebin.com/mr5WT30M
  562. http://pastebin.com/Qf2jHhAb
  563. http://pastebin.com/TRXkVJ2k
  564. http://pastebin.com/utY08tLT
  565. http://pastebin.com/YEbM3Brv
  566. http://people.csail.mit.edu/rivest/crypto-security.html
  567. http://people.howstuffworks.com/individual-privacy-channel.htm
  568. http://people.howstuffworks.com/wiretapping1.htm
  569. http://pgp.mit.edu/
  570. http://projects.gnome.org/gdm/docs/2.14/configuration.html?pagewanted=all
  571. http://projects.wsj.com/surveillance-catalog/
  572. http://research.google.com/pubs/papers.html
  573. http://research.google.com/pubs/SecurityCryptographyandPrivacy.html
  574. https://ccrma.stanford.edu/papers
  575. http://security-sh3ll.blogspot.com/search/label/Papers
  576. https://events.ccc.de/congress/2005/static/p/r/o/Category~Projects_1780.html
  577. https://events.ccc.de/congress/2005/static/r/f/i/RFID-Zapper%28EN%29_77f3.html
  578. https://isc.sans.edu/port.html
  579. http://slashdot.org/story/01/01/16/139244/NSA-Reveals-Some-Tempest-Information
  580. https://live.gnome.org/GDM/2.22/Configuration
  581. https://memset.wordpress.com/2011/11/26/syscall-hijacking-openbsd/
  582. http://srg.cs.illinois.edu/srg/biblio
  583. https://secure.dslreports.com/forum/r27289884-Forensic-Cheat-Sheet
  584. https://torrentfreak.com/stop-downloading-fakes-and-junk-torrents-071204/
  585. https://w2.eff.org/Privacy/printers/docucolor/
  586. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/index.html
  587. https://www.cl.cam.ac.uk/~mgk25/emsec/optical-faq.html
  588. https://www.cl.cam.ac.uk/~mgk25/emsec/softtempest-faq.html
  589. https://www.defcon.org/html/links/book-list.html
  590. https://www.eff.org/issues/bloggers/legal/index
  591. https://www.eff.org/issues/printers
  592. https://www.eff.org/pages/list-printers-which-do-or-do-not-display-tracking-dots
  593. https://www.eff.org/testyourisp
  594. https://www.eff.org/wp/blog-safely
  595. https://www.eff.org/wp/detecting-packet-injection
  596. https://www.eff.org/wp/how-not-get-sued-file-sharing/
  597. https://www.gnu.org/philosophy/
  598. https://www.gnu.org/philosophy/why-free.html
  599. https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xml
  600. https://www.kuro5hin.org/story/2002/11/23/14927/477
  601. https://www.kuro5hin.org/story/2004/10/26/02313/946
  602. https://www.net-security.org/articles_main.php
  603. https://www.networkworld.com/news/2009/070909-electrical-data-theft.html
  604. https://www.pcworld.com/article/248995/how_to_install_windows_7_without_the_disc.html
  605. https://www.schneier.com/blog/archives/2005/09/snooping_on_tex.html
  606. https://www.schneier.com/blog/archives/2007/09/anonymity_and_t_1.html
  607. https://www.schneier.com/blog/archives/2007/11/hushmail_turns.html
  608. https://www.schneier.com/blog/archives/2007/12/maninthemiddle.html
  609. https://www.schneier.com/blog/archives/2009/04/identifying_peo.html
  610. https://www.schneier.com/blog/archives/2010/01/web_security.html
  611. https://www.schneier.com/blog/archives/2010/05/detecting_brows.html
  612. https://www.schneier.com/blog/archives/2010/09/real-time_nsa_e.html
  613. https://www.schneier.com/blog/archives/2010/12/tor_routers.html
  614. https://www.schneier.com/blog/archives/2011/03/detecting_words.html
  615. https://www.schneier.com/blog/archives/2011/03/identifying_tor.html
  616. https://www.schneier.com/blog/archives/2011/08/identifying_peo_2.html
  617. https://www.schneier.com/blog/archives/2011/09/identifying_spe.html
  618. https://www.schneier.com/blog/archives/2011/09/tor_arms_race.html
  619. https://www.schneier.com/blog/archives/2012/07/how_to_become_a_1.html
  620. https://www.schneier.com/essay-182.html
  621. https://www.schneier.com/essay-261.html
  622. https://www.schneier.com/essay-262.html
  623. https://www.usenix.org/publications/proceedings
  624. http://techgurulive.com/2008/09/15/how-to-monitor-and-be-informed-of-ip-address-changes-from-your-network/
  625. http://tech.slashdot.org/story/99/07/19/1324207/super-shielded-pc-cases
  626. http://virus.bartolich.at/virus-writing-HOWTO/_html/index.html
  627. http://web.archive.org/web/20040608141549/http://all.net/journal/netsec/1997-12.html
  628. http://web.archive.org/web/20060220113124/http://www.dss.mil/training/salinks.htm
  629. http://web.archive.org/web/20080222191230/http://the.jhu.edu/upe/2004/03/23/about-van-eck-phreaking/
  630. http://web.archive.org/web/20080820112134/http://www.crash-override.net/bogusdns.html
  631. http://web.archive.org/web/20090210035245/http://danieldegraaf.afraid.org/info/ipv6
  632. http://web.archive.org/web/20100916111512/http://www.ibiblio.org/security/articles/ports.html
  633. http://web.mit.edu/gtmarx/www/iron.html
  634. http://web.mit.edu/newsoffice/2012/camera-sees-around-corners-0321.html
  635. http://wiki.wireshark.org/Security
  636. http://www.ac6v.com/frequencies.htm
  637. http://www.afterdawn.com/guides/
  638. http://www.au.af.mil/info-ops/perception.htm
  639. http://www.backtrack-linux.org/tutorials/
  640. http://www.backtrack-linux.org/wiki/
  641. http://www.binarywolf.com/
  642. http://www.binarywolf.com/249/
  643. http://www.catb.org/jargon/
  644. http://www.ciphersbyritter.com/
  645. http://www.ciphersbyritter.com/GLOSSARY.HTM
  646. http://www.ciphersbyritter.com/RADELECT/LITES/LEDLITES.HTM
  647. http://www.ciphersbyritter.com/RADELECT/LITES/LITESFAQ.HTM
  648. http://www.ciphersbyritter.com/RADELECT/LITES/LITESHOT.HTM
  649. http://www.ciphersbyritter.com/RADELECT/LITES/XMSLITES.HTM
  650. http://www.cisco.com/en/US/solutions/ns340/ns414/ns742/ns744/landing_safe.html
  651. http://www.crypto.com/papers/
  652. http://www.cryptome.org/0002/nsa-tempest-01.zip
  653. http://www.cs.auckland.ac.nz/~pgut001/
  654. http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
  655. http://www.cs.tau.ac.il/~tromer/acoustic/
  656. http://www.cs.wright.edu/~pmateti/InternetSecurity/Lectures/Top/index.html
  657. http://www.dedoimedo.com/computers/linux-multi-boot.html
  658. http://www.developer.nokia.com/Community/Wiki/Category:Open_Source
  659. http://www.developer.nokia.com/Community/Wiki/Nokia_Open_Source
  660. http://www.dhra.mil/perserec/adr.html
  661. http://www.dhra.mil/perserec/products.html
  662. http://www.domenech.org/homebrew-sdr/receiver-1.htm
  663. http://www.ehow.com/how_8242473_display-ip-addresses-network.html
  664. http://www.engadget.com/2005/11/15/how-to-build-a-wifi-biquad-dish-antenna/
  665. http://www.epanorama.net/documents/telecom/telephone_intercom.html
  666. http://www.ethicalhacker.net/content/view/22/2/
  667. http://www.exploit-db.com/papers/
  668. http://www.faqs.org/docs/Linux-HOWTO/XDMCP-HOWTO.html
  669. http://www.febo.com/pages/baudline/
  670. http://www.febo.com/time-freq/FMT/technique/index.html
  671. http://www.forensicswiki.org/
  672. http://www.garykessler.net/library/fsc_stego.html
  673. http://www.gnupg.org/
  674. http://www.heinz.cmu.edu/~acquisti/research.htm
  675. http://www.ibm.com/developerworks/library/l-keyc2/
  676. http://www.ibm.com/developerworks/library/l-keyc3/
  677. http://www.ibm.com/developerworks/library/l-keyc/index.html
  678. http://www.ieee-security.org/cipher.html
  679. http://www.ieee-security.org/TC/SP-Index.html
  680. http://www.ihr.org/jhr/v09/v09p305_Marchetti.html
  681. http://www.informit.com/articles/article.aspx?p=23463&rll=1
  682. http://www.itworld.com/security/64193/researchers-find-ways-sniff-keystrokes-thin-air
  683. http://www.l0t3k.org/programming/docs/reverse/
  684. http://www.linux-sec.net/Firewall/HowTo/ja.net.private.html
  685. http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager03.html
  686. http://www.madboa.com/geek/dig/
  687. http://www.madboa.com/geek/gpg-quickstart/
  688. http://www.madboa.com/geek/openssl/
  689. http://www.madboa.com/geek/openssl/#digest-file
  690. http://www.madboa.com/geek/pine-ssl/
  691. http://www.madboa.com/geek/soho-bind/
  692. http://www.neilgunton.com/doc/index.html?o=1&doc_id=8580
  693. http://www.neowin.net/forum/topic/934274-freeware-alternative-list/
  694. http://www.nononsenseselfdefense.com/five_stages.html
  695. http://www.omgubuntu.co.uk/
  696. http://www.openrce.org/articles/
  697. http://www.oreillynet.com/cs/weblog/view/wlg/448
  698. http://www.oreillynet.com/topics/wireless/802.11
  699. http://www.phrack.org/issues.html?issue=62&id=6
  700. http://www.phrack.org/issues.html?issue=66&id=11#article
  701. http://www.phrack.org/issues.html?issue=66&id=15#article
  702. http://www.phrack.org/issues.html?issue=66&id=7#article
  703. http://www.popsci.com/technology/article/2012-07/seeing-through-walls-wireless-router
  704. http://www.radioreference.com/
  705. http://www.rfidvirus.org/index.html
  706. http://www.securityfocus.com/columnists/442/2
  707. http://www.securityfocus.com/news/11372
  708. http://www.social-engineer.org/framework/Social_Engineering_Framework
  709. http://www.symantec.com/connect/articles/forensic-analysis-live-linux-system-pt-1
  710. http://www.symantec.com/connect/articles/forensic-analysis-live-linux-system-pt-2
  711. http://www.symantec.com/connect/articles/ip-spoofing-introduction
  712. http://www.symantec.com/connect/articles/reverse-engineering-hostile-code
  713. http://www.symantec.com/connect/articles/sebek-3-tracking-attackers-part-one
  714. http://www.symantec.com/connect/articles/sebek-3-tracking-attackers-part-two
  715. http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics
  716. http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-ii-combat-strategies
  717. http://www.symantec.com/connect/articles/wireless-forensics-tapping-air-part-one
  718. http://www.symantec.com/connect/articles/wireless-forensics-tapping-air-part-two
  719. http://www.theregister.co.uk/2012/07/11/multi_platform_backdoor/
  720. http://www.tuxradar.com/content/learn-hack/
  721. http://www.vanwensveen.nl/rants/microsoft/IhateMS.html
  722. http://www.wiley.com/legacy/compbooks/mcnamara/links.html
  723. http://www.williamson-labs.com/laser-mic.htm
  724. http://www.zurich.ibm.com/security/idemix/
  725. http://yro.slashdot.org/story/99/10/25/2039238/declassified-tempest-material-comes-online
  726. http://yro.slashdot.org/story/99/11/08/093250/coming-to-a-desktop-near-you-tempest-capabilities
  727. (PDF, EPUB, MOBI, leads to) http://debian-handbook.info/get/now/
  728. (PDF) ftp://ftp.tapr.org/software_lib/ether/Ham_Ethernet_GBPPR.pdf
  729. (PDF) http://ai.eller.arizona.edu/COPLINK/publications/CACM_From%20Fingerprint%20to%20Writeprint.pdf
  730. (PDF) http://cryptome.org/2012/06/ci-glossary.pdf
  731. (PDF) http://csrc.nist.gov/publications/nistpubs/800-59/SP800-59.pdf
  732. (PDF) http://csrc.nist.gov/publications/nistpubs/800-84/SP800-84.pdf
  733. (PDF) http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdf
  734. (PDF) http://lanl.arxiv.org/pdf/1004.1267v1
  735. (PDF) http://lanl.arxiv.org/pdf/1109.0597v2
  736. (PDF) http://lanl.arxiv.org/pdf/1110.5395v3
  737. (PDF) http://lanl.arxiv.org/pdf/1204.0447v1
  738. (PDF) http://lanl.arxiv.org/pdf/1208.2877v1
  739. (PDF) http://packetstormsecurity.org/filedesc/Practical_Onion_Hacking.pdf.html
  740. (PDF) http://packetstormsecurity.org/files/65944/tempest.pdf
  741. (PDF) http://srgsec.cs.uiuc.edu/bootjacker.pdf
  742. (PDF) http://srgsec.cs.uiuc.edu/cloaker.pdf
  743. (PDF) http://sunnyday.mit.edu/book2.pdf
  744. (PDF) https://www.cl.cam.ac.uk/%7Emgk25/ieee02-optical.pdf
  745. (PDF) https://www.cl.cam.ac.uk/~mgk25/ih98-tempest.pdf
  746. (PDF) https://www.cl.cam.ac.uk/~mgk25/pet2004-fpd.pdf
  747. (PDF) https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-577.pdf
  748. (PDF) https://www.eff.org/sites/default/files/packet_injection_0.pdf
  749. (PDF) https://www.usenix.org/events/sec09/tech/full_papers/sec09_attacks.pdf
  750. (PDF) http://vulnfactory.org/research/defcon-remote.pdf
  751. (PDF) http://www.cl.cam.ac.uk/~mgk25/ches2005-limits.pdf
  752. (PDF) http://www.cl.cam.ac.uk/~mgk25/ieee02-optical.pdf
  753. (PDF) http://www.cl.cam.ac.uk/~mgk25/ih98-tempest.pdf
  754. (PDF) http://www.cl.cam.ac.uk/~mgk25/ih99-stegfs.pdf
  755. (PDF) http://www.cl.cam.ac.uk/~mgk25/pet2004-fpd.pdf
  756. (PDF) http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-577.pdf
  757. (PDF) http://www.crysys.hu/skywiper/skywiper.pdf
  758. (PDF) http://www.cs.wright.edu/%7Epmateti/InternetSecurity/Lectures/TCPexploits/sec-tcpip.pdf
  759. (PDF) http://www.fas.org/irp/eprint/nsa-interview.pdf
  760. (PDF) http://www.governmentattic.org/2docs/Hist_US_COMSEC_Boak_NSA_1973.pdf
  761. (PDF) http://www.medienwissenschaft.hu-berlin.de/medientheorien/forschung/downloads/hausarbeiten/em-sniffer.pdf
  762. (PDF) http://www.rfidvirus.org/papers/percom.06.pdf
  763. (PDF) http://www.toucan-system.com/research/blackhat2012_brossard_hardware_backdooring.pdf
  764. (PDF) http://www-users.cs.umn.edu/%7Edfrankow/files/lam-etrics2006-security.pdf
  765. (PDF) http://www-users.cs.umn.edu/%7Edfrankow/files/privacy-sigir2006.pdf
  766. (PDF, leads to)
  767. (PDF, leads to a) http://about-threats.trendmicro.com/ebooks/are-you-protecting-the-data-packets-in-your-pocket/
  768. (PDF, leads to a) http://ojs.academypublisher.com/index.php/jnw/article/view/jnw0702259266
  769. (PDF, leads to a) https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-577.html
  770. (PDF, leads to a) https://www.usenix.org/conference/usenixsecurity12/feasibility-side-channel-attacks-brain-computer-interfaces
  771. (PDF, leads to a) http://ubuntu-manual.org/downloads
  772. (PDF, leads to) http://anonymouse.org/cgi-bin/anon-www.cgi/http://www.popsci.com/diy/article/2006-09/stop-dropped-calls
  773. (PDF, leads to) https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-577.html
  774. (PDF, leads to) http://wikileaks.org/wiki/Cryptome.org_takedown:_Microsoft_Global_Criminal_Compliance_Handbook,_24_Feb_2010
  775. (PDF, PS, leads to) http://cacr.uwaterloo.ca/hac/
  776. (PDF, PS, PPT, DOC, TXT, leads to) http://www.cs.washington.edu/education/courses/csep590/06wi/
  777. (PDFs, leads to) http://all.net/Analyst/index.html
  778. (PDFs, leads to) http://reality.media.mit.edu/publications.php
  779. (PDFs, leads to) https://citizenlab.org/2012/07/from-bahrain-with-love-finfishers-spy-kit-exposed/3/
  780. (PDFs, leads to) http://srgsec.cs.illinois.edu/Welcome.html
  781. (PDFs, leads to) http://sunnyday.mit.edu/
  782. (PDFs, leads to) https://www.cl.cam.ac.uk/~mgk25/
  783. (PDFs, leads to) https://www.cl.cam.ac.uk/~mgk25/publications.html
  784. (PDFs, leads to) https://www.cl.cam.ac.uk/research/security/publications/
  785. (PDFs, leads to) https://www.cl.cam.ac.uk/~rja14/book.html
  786. (PDFs, leads to) http://web.archive.org/web/20071228064639/http://www.computer.org/portal/site/csdl/index.jsp
  787. (PDFs, leads to) http://www.amsat.org/amsat/intro/faqs.html
  788. (PDFs, leads to) http://www.navsea.navy.mil/nswc/dahlgren/Leading%20Edge/default.aspx
  789. (PDFs, leads to) http://www.pgpi.org/doc/guide/
  790. (PDFs, leads to) http://www.raulsiles.com/en/Research.html
  791. (PDFs, leads to) http://www-users.cs.umn.edu/~dfrankow/pubs.htm
  792. (PDFs, PS, leads to) http://hd.media.mit.edu/TechnicalReportsList.html
  793. (PDFs, PS, leads to) https://wwws.cs.umn.edu/tech_reports_upload/
  794. (PDFs, PSs, BibTeX, leads to) http://www.freehaven.net/anonbib/
  795. recon.cx - (Various Media Formats, leads to) http://2005.recon.cx/recon2005/papers/
  796. recon.cx - (Various Media Formats, leads to) http://2006.recon.cx/en/f/
  797. recon.cx - (Various Media Formats, leads to) http://recon.cx/2008/speakers.html
  798. recon.cx - (Various Media Formats, leads to) http://recon.cx/2010/speakers.html
  799. recon.cx - (Various Media Formats, leads to) http://recon.cx/2012/schedule/index.en.html
  800. recon.cx - (Videos, leads to               ) http://archive.org/details/RECON2008
  801. recon.cx - (Videos, leads to               ) http://archive.org/search.php?query=%22recon%202011%22
  802. recon.cx - (Videos, leads to               ) http://archive.org/search.php?query=recon%202005%20AND%20mediatype%3Amovies
  803. recon.cx - (Videos, leads to               ) http://archive.org/search.php?query=recon%202006%20AND%20mediatype%3Amovies
  804. recon.cx - (Videos, leads to               ) http://archive.org/search.php?query=recon%202012%20AND%20mediatype%3Amovies
  805. (various document formats, leads to) http://www.grouplens.org/biblio
  806. (various types of media, links to) https://www.defcon.org/html/links/defcon-media-archives.html
  807. (videos, leads to) http://web.media.mit.edu/~sandy/videos.html
  808. ----------------------------------------
  809.  
  810. ** 6003: Antivirus LiveCDs - boot and scan your system for malware
  811.  
  812. + AVG:
  813. http://www.avg.com/us-en/avg-rescue-cd-download
  814.  
  815. + AVG ARL: The latest release version of the AVG Rescue CD GNU/Linux (ARL) with daily updated virus database,
  816. latest alpha or beta version of the ARL and all the resources needed to build the ARL from scratch.
  817. Releases are signed!
  818. https://share.avg.com/arl
  819.  
  820. + Avira:
  821. https://www.avira.com/en/download/product/avira-antivir-rescue-system
  822.  
  823. + BitDefender:
  824. http://download.bitdefender.com/rescue_cd/
  825.  
  826. + Comodo Rescue Disk (CRD):
  827. https://www.comodo.com/business-security/network-protection/rescue-disk.php
  828.  
  829. + Dr.Web LiveCD & LiveUSB:
  830. http://www.freedrweb.com/livecd/
  831. http://www.freedrweb.com/liveusb/
  832.  
  833. + F-Secure:
  834. https://www.f-secure.com/en/web/labs_global/removal-tools/-/carousel/view/142
  835. https://www.f-secure.com/en/web/labs_global/removal-tools
  836.  
  837. + Kaspersky:
  838. http://support.kaspersky.com/faq/?qid=208282173
  839. http://support.kaspersky.com/viruses/rescuedisk?level=2
  840. http://forum.kaspersky.com/index.php?showforum=159
  841.  
  842. + Microsoft Windows Defender Offline:
  843. https://connect.microsoft.com/systemsweeper
  844.  
  845. ----------------------------------------
  846.  
  847. ** 6004: Random Links
  848.          (In a future version these links will each have their own new sections,)
  849.          (since we've moved beyond mere security related links! As such, many of these links are not security oriented)
  850.          (This section may appear now to be one big random blob of links, but with our next version, there will spring)
  851.          (up several new sections of which these will be filed into. We wanted to push this out as a preview of how)
  852.          (we're expanding beyond security links.)
  853.  
  854. + Tormail Hidden Service (Requires Tor in order to use):
  855. + Tor Mail @Hidden Service: http://jhiwjjlqpyawmpjx.onion/
  856. + Tor Mail Intro @Clearnet: http://www.tormail.org/
  857. #
  858. # (large resource) http://blockyourid.com/~gbpprorg/
  859. # (large resource) http://blockyourid.com/~gbpprorg/mil/
  860. # http://blockyourid.com/~gbpprorg/mil/vaneck/index.html
  861. # (large resource) http://www.qsl.net/n9zia/
  862. # mirrors: http://www.gbppr.org , http://projects1.gbppr.org/ , http://gbppr.dyndns.org/
  863. #
  864. + Acoustic Surveillance of Physically Unmodified PCs by Michael LeMay and Jack Tan
  865. + (PDF) (original but broken link) http://seclab.uiuc.edu/pubs/LeMayT06.pdf
  866. + (PDF) (found but haven't verified source) http://blockyourid.com/~gbpprorg/mil/vaneck/LeMayT06.pdf
  867. +
  868. (archive) http://mympxplayer.org/
  869. http://10minutemail.com
  870. http://4hv.org/e107_plugins/forum/forum.php
  871. http://500px.com/
  872. http://500px.com/MarcinSobas
  873. http://ai.bpa.arizona.edu/
  874. http://alphabetizer.flap.tv/
  875. http://amecisco.com/
  876. http://anythingbutipod.com/
  877. http://anythingbutipod.com/forum/
  878. http://applefritter.com/
  879. http://applefritter.com/forum
  880. http://archive.org/create/
  881. http://archive.org/details/bittorrent
  882. http://arstechnica.com/
  883. http://arstechnica.com/civis/
  884. http://artsandlettersdaily.com/
  885. http://arxiv.org/
  886. http://ask.metafilter.com/
  887. http://askubuntu.com/
  888. http://attrition.org/
  889. http://attrition.org/mirror/
  890. http://batteryuniversity.com/
  891. http://betanews.com/
  892. http://bibliodyssey.blogspot.com/
  893. http://biosbits.org/
  894. http://blog.bodhizazen.net/
  895. http://blog.makezine.com/
  896. http://blogs.amd.com/
  897. http://blogs.scientificamerican.com/
  898. http://blogs.valvesoftware.com/linux/steamd-penguins/
  899. http://boingboing.net/
  900. http://boston.com/bigpicture/
  901. http://browserspy.dk/
  902. http://busybox.net/
  903. http://cdburnerxp.se/
  904. http://centralops.net/co/
  905. http://classical-music-online.net/
  906. http://commons.wikimedia.org/
  907. http://consumerist.com/
  908. http://cubesat.calpoly.edu/
  909. http://cwe.mitre.org/
  910. http://cybernetnews.com/
  911. http://cygwin.com/
  912. http://cylinders.library.ucsb.edu/index.php
  913. http://dedoimedo.com/
  914. http://depositfiles.com/
  915. http://digg.com/
  916. http://diit.sourceforge.net/
  917. http://distrowatch.com/
  918. http://dmml.asu.edu/resources
  919. http://documentaryheaven.com/
  920. http://doihaveadeadpixel.com/
  921. http://drudgereport.com/
  922. http://en.memory-alpha.org/wiki/Portal:Main
  923. http://en.rsf.org/
  924. http://fab.cba.mit.edu/
  925. http://faststone.org/
  926. http://faxzero.com/
  927. http://fcw.com/Home.aspx
  928. http://filecrop.com/
  929. http://forum.crucial.com/
  930. http://forum.japantoday.com/
  931. http://forum.notebookreview.com/
  932. http://forums.anandtech.com/
  933. http://forums.computeractive.co.uk/
  934. http://forums.fedoraforum.org/
  935. http://forums.linuxmint.com
  936. http://forums.overclockers.com.au
  937. http://forums.techarena.in/
  938. http://forums.wi-fiplanet.com/
  939. http://freeculture.org/
  940. http://fsi-language-courses.org
  941. http://gizmodo.com/
  942. http://glassgiant.com/ascii/
  943. http://gonullyourself.com/
  944. http://groupmedia.media.mit.edu/
  945. http://hardocp.com/
  946. http://hd.media.mit.edu/
  947. http://hintsforums.macworld.com/
  948. http://howtogrowtobacco.com/forum/
  949. http://howto.wired.com/wiki/Main_Page
  950. http://html.adobe.com/
  951. http://imakeprojects.com/Projects/wifi-heartbeat/
  952. http://imgur.com/
  953. http://improveverywhere.com/
  954. http://info.ee.surrey.ac.uk/Personal/Z.Kalal/tld.html
  955. http://ip-check.info
  956. http://issihosts.com/haveged/
  957. http://jesus-is-savior.com/
  958. http://lanl.arxiv.org/
  959. http://la-samhna.de/library/rootkits/detect.html
  960. http://leakdirectory.org/index.php/Leak_Site_Directory
  961. http://lifehacker.com/
  962. http://linuxmanpages.com/
  963. http://linuxmint.com/
  964. http://linuxpoison.blogspot.com/
  965. http://linuxscrew.com/
  966. http://mail.yandex.com/
  967. http://memegenerator.net/
  968. http://mentalfloss.com/
  969. http://meta.wikimedia.org/
  970. http://mindjustice.org/
  971. http://mitnicksecurity.com/
  972. http://multiupload.nl/
  973. http://mybannermaker.com/
  974. http://mympx.org/
  975. http://narus.com/
  976. http://naturalnews.com/
  977. http://news.cnet.com/
  978. http://news.cnet.com/cheapskate/
  979. http://news.cnet.com/tech-blogs/
  980. http://news.netcraft.com/
  981. http://nmap-online.com/
  982. http://online.wsj.com/
  983. http://onpointtactical.com/
  984. http://onstrat.com/osint/#startingpoints
  985. http://oreilly.com/blogs/
  986. http://oyc.yale.edu/
  987. http://packetstormsecurity.org/
  988. http://pastebin.com/KNtCVkpN
  989. http://patriotmemory.com/
  990. http://pdos.csail.mit.edu/~baford/vm/
  991. http://people.csail.mit.edu/mrub/vidmag/
  992. http://personal.ee.surrey.ac.uk/Personal/L.Wood/constellations/index.html
  993. http://photomuse.org/
  994. http://pipl.com/
  995. http://portforward.com/
  996. http://preyproject.com/
  997. http://project-byzantium.org/
  998. http://projects.washingtonpost.com/top-secret-america/
  999. http://qubes-os.org/
  1000. http://rense.com/
  1001. http://rfidguardian.org/
  1002. http://rootzwiki.com/
  1003. http://samate.nist.gov/index.php/Source_Code_Security_Analyzers.html
  1004. https://blog.mozilla.org/
  1005. https://blog.mozilla.org/addons/
  1006. https://blog.mozilla.org/beyond-the-code/
  1007. https://blog.mozilla.org/bhearsum/
  1008. https://blog.mozilla.org/blog/author/chrismozillacom/
  1009. https://blog.mozilla.org/blog/category/firefox/
  1010. https://blog.mozilla.org/calendar/
  1011. https://blog.mozilla.org/futurereleases/
  1012. https://blog.mozilla.org/gen/
  1013. https://blog.mozilla.org/it/
  1014. https://blog.mozilla.org/labs/
  1015. https://blog.mozilla.org/ligong/
  1016. https://blog.mozilla.org/mobile/
  1017. https://blog.mozilla.org/nnethercote/
  1018. https://blog.mozilla.org/privacy/
  1019. https://blog.mozilla.org/services/
  1020. https://blog.mozilla.org/theden/
  1021. https://blog.mozilla.org/thunderbird/
  1022. https://blog.mozilla.org/tilt/
  1023. https://blog.mozilla.org/webdev/
  1024. https://blog.mozilla.org/website-archive/
  1025. http://schizophrenia.com/
  1026. http://sclipo.com/
  1027. https://code.google.com/p/corkami/
  1028. https://code.google.com/p/googlecl/
  1029. https://community.rapid7.com/community/infosec/blog/2012/08/08/finfisher
  1030. https://creativecommons.org/
  1031. http://screenshots.debian.net/
  1032. http://searchengineland.com/
  1033. https://en.wikipedia.org/wiki/Bing_Mobile#Bing_411
  1034. https://en.wikipedia.org/wiki/List_of_PDF_software
  1035. https://en.wikipedia.org/wiki/Main_Page
  1036. https://epic.org/
  1037. https://epic.org/privacy/tools.html
  1038. https://fedoraproject.org/
  1039. https://freedom-to-tinker.com/
  1040. https://github.com/djrbliss/rose-exploit
  1041. http://slashdot.org/
  1042. http://slickdeals.net/
  1043. https://lists.apple.com/mailman/listinfo/security-announce
  1044. https://mashable.com/
  1045. https://one.ubuntu.com/services/
  1046. http://soundcloud.com/
  1047. http://sourceforge.net/projects/diit/
  1048. http://sourceforge.net/projects/nfienfcollector/
  1049. https://panopticlick.eff.org/
  1050. http://species.wikimedia.org/
  1051. http://spectrum.ieee.org/
  1052. http://spectrum.ieee.org/blogs
  1053. http://spectrum.ieee.org/blog/tech-talk
  1054. http://spectrum.mit.edu/articles/normal/fab-lab/ (article)
  1055. https://personaltelco.net/wiki
  1056. http://spywareinfoforum.com/
  1057. https://s3.amazonaws.com/data.tumblr.com/tumblr_lxyvchLFXx1r1ylbfo1_500.jpg
  1058. https://secure.dslreports.com/faq
  1059. http://stallman.org/
  1060. https://torrentfreak.com/
  1061. https://twitter.com/corkami
  1062. http://support.ntp.org/bin/view/Support/WebHome
  1063. http://swann.com
  1064. https://www.amnesty.org/
  1065. https://www.blackhat.com/index.html
  1066. https://www.ccc.de/
  1067. https://www.cert.org/
  1068. https://www.chillingeffects.org/
  1069. https://www.commondreams.org/
  1070. https://www.computerworld.com/
  1071. https://www.defcon.org/
  1072. https://www.defcon.org/html/links/dc-tools.html
  1073. https://www.eff.org/
  1074. https://www.eff.org/deeplinks/
  1075. https://www.eff.org/pages/switzerland-network-testing-tool
  1076. https://www.erowid.org/
  1077. https://www.flickr.com/
  1078. https://www.grc.com
  1079. https://www.imagineshop.co.uk/
  1080. https://www.infoworld.com/
  1081. https://www.libreoffice.org/
  1082. https://www.linuxquestions.org/
  1083. https://www.linuxquestions.org/questions/
  1084. https://www.mi5.gov.uk/
  1085. https://www.microsoft.com/communities/forums/default.mspx
  1086. https://www.microsoft.com/security/scanner/en-us/default.aspx
  1087. https://www.myspace.com/
  1088. https://www.networkworld.com/
  1089. https://www.npr.org/blogs/health/
  1090. https://www.opendns.com/technology/dnscrypt/
  1091. https://www.propublica.org/
  1092. https://www.safe-mail.net/
  1093. https://www.sans.org/
  1094. https://www.technologyreview.com/computing/
  1095. https://www.un.org/
  1096. https://www.un.org/en/documents/udhr/index.shtml
  1097. https://www.youtube.com/
  1098. https://www.youtube.com/results?search_query=Randy+Quaid+Star+Whackers
  1099. https://www.youtube.com/ucberkeley
  1100. http://techliberation.com/
  1101. http://technorati.com/
  1102. http://techreport.com/
  1103. http://techreport.com/forums/
  1104. http://thebrowser.com/
  1105. http://topdocumentaryfilms.com/
  1106. http://totse2.com/
  1107. http://trapkit.de/
  1108. http://truth-out.org/
  1109. http://turnoffyourtv.com/
  1110. http://tutvid.com
  1111. http://ubuntuforums.org/
  1112. http://urlget.sourceforge.net/
  1113. http://usahitman.com/
  1114. http://vigilantcitizen.com/
  1115. http://vigilantcitizen.com/vcboards/
  1116. http://web.archive.org/web/20040202004210/http://www.cs.auckland.ac.nz/~pgut001/links.html
  1117. http://web.archive.org/web/20040206214035/http://www.cs.auckland.ac.nz/~pgut001/links/archives.html
  1118. http://web.archive.org/web/20060831063210/http://faculty.ncwc.edu/toconnor/reform.htm
  1119. http://web.archive.org/web/20060831063224/http://faculty.ncwc.edu/toconnor/data.htm
  1120. http://web.archive.org/web/20060831081811/http://faculty.ncwc.edu/toconnor/thnktank.htm
  1121. http://web.archive.org/web/20070207050215/http://faculty.ncwc.edu/toconnor/sources.htm
  1122. http://web.archive.org/web/20070217052232/http://faculty.ncwc.edu/TOConnor/427/427links.htm
  1123. http://webcast.berkeley.edu/
  1124. http://web.media.mit.edu/~sandy/
  1125. http://web.mit.edu/mitei/news/index.html
  1126. http://web.mit.edu/newsoffice/
  1127. http://web.mit.edu/zacka/www/midas.html
  1128. http://web.mit.edu/zacka/www/projects.html
  1129. http://wificamera.propositions.org.uk/
  1130. http://wificamera.propositions.org.uk/Panoramic-Wifi-Camera
  1131. http://wiki.echelon2.org/wiki/Main_Page
  1132. http://wikitravel.org/
  1133. http://wisp.wikispaces.com
  1134. http://www1.informatik.uni-erlangen.de/tresor
  1135. http://www.4shared.com/
  1136. http://www.5min.com/
  1137. http://www.academicearth.org/
  1138. http://www.aclu.org/
  1139. http://www.addictivetips.com/
  1140. http://www.allmyfaves.com/
  1141. http://www.anandtech.com/
  1142. http://www.au.af.mil/au/awc/awcgate/awc-ndex.htm
  1143. http://www.au.af.mil/au/awc/awcgate/awc-port.htm
  1144. http://www.au.af.mil/au/awc/awcgate/awc-ref.htm
  1145. http://www.au.af.mil/au/awc/awcgate/awc-thkg.htm
  1146. http://www.au.af.mil/au/awc/awcgate/awc-thkg.htm#critical
  1147. http://www.avforums.com/forums/
  1148. http://www.bashoneliners.com/
  1149. http://www.bbb.org/
  1150. http://www.bbc.co.uk/iplayer/radio
  1151. http://www.betabeat.com/
  1152. http://www.bloomberg.com/news/worldwide/
  1153. http://www.bluesnews.com/
  1154. http://www.brainpickings.org/
  1155. http://www.brickhousesecurity.com/
  1156. http://www.brokentoaster.com/butterflymp3/index.html
  1157. http://www.bugmenot.com/
  1158. http://www.businessweek.com/
  1159. http://www.buzzfeed.com/
  1160. http://www.cbradiotalk.com/index.php
  1161. http://www.cerias.purdue.edu/
  1162. http://www.chromium.org/
  1163. http://www.cicentre.com/
  1164. http://www.codecademy.com/
  1165. http://www.complaints.com/
  1166. http://www.consumerworld.org/
  1167. http://www.copyscape.com/
  1168. http://www.coreboot.org/
  1169. http://www.coreboot.org/SeaBIOS
  1170. http://www.cosmolearning.com/
  1171. http://www.cracked.com/
  1172. http://www.crucial.com
  1173. http://www.cryptome.org/
  1174. http://www.c-spanvideo.org/videoLibrary/
  1175. http://www.cultdeadcow.com/
  1176. http://www.cyberciti.biz/
  1177. http://www.dafont.com/
  1178. http://www.dailymotion.com/
  1179. http://www.damninteresting.com/
  1180. http://www.defectivebydesign.org/
  1181. http://www.differencebetween.net/
  1182. http://www.digital-detective.co.uk/
  1183. http://www.digital-digest.com/index.php
  1184. http://www.disclose.tv/
  1185. http://www.disclose.tv/forum/
  1186. http://www.discoverbing.com/mobile
  1187. http://www.dlib.indiana.edu/collections/
  1188. http://www.dmoz.org/Computers/Internet/E-mail/Spam/Preventing/Temporary_Addresses/
  1189. http://www.dogbitelaw.com/
  1190. http://www.doom9.org/
  1191. http://www.downforeveryoneorjustme.com/
  1192. http://www.economist.com/
  1193. http://www.ehow.com/
  1194. http://www.emaildiscussions.com/
  1195. http://www.endangeredlanguages.com/
  1196. http://www.engadget.com
  1197. http://www.engadget.com/
  1198. http://www.epanorama.net/index2.php?section=documents&index=audio
  1199. http://www.evga.com/forums/
  1200. http://www.ew.com/ew/
  1201. http://www.eweek.com/
  1202. http://www.extremetech.com/
  1203. http://www.fabathome.org/
  1204. http://www.fakenamegenerator.com/
  1205. http://www.fark.com/
  1206. http://www.filestube.com/
  1207. http://www.folkstreams.net/
  1208. http://www.forbes.com/
  1209. http://www.freerepublic.com
  1210. http://www.freesoftwaremagazine.com/
  1211. http://www.ft.com/
  1212. http://www.gamefront.com/
  1213. http://www.gameinformer.com/
  1214. http://www.geekstogo.com/forum/
  1215. http://www.giveawayoftheday.com/
  1216. http://www.gizmag.com/
  1217. http://www.godlikeproductions.com
  1218. http://www.groklaw.net/
  1219. http://www.gutenberg.org/wiki/Main_Page
  1220. http://www.gwu.edu/~nsarchiv/
  1221. http://www.hackermedia.org/
  1222. http://www.head-fi.org/f/
  1223. http://www.hellomagazine.com/
  1224. http://www.hitb.org/
  1225. http://www.howcast.com/
  1226. http://www.howstuffworks.com/
  1227. http://www.hulu.com/
  1228. http://www.i2p2.de/
  1229. http://www.ibiblio.org/
  1230. http://www.ic3.gov/default.aspx
  1231. http://www.imdb.com/title/tt0071360/
  1232. http://www.imdb.com/title/tt0120660/
  1233. http://www.imdb.com/title/tt0128278/
  1234. http://www.imdb.com/title/tt0308808/
  1235. http://www.imdb.com/title/tt0489037/
  1236. http://www.inchem.org/
  1237. http://www.informationclearinghouse.info/
  1238. http://www.informationweek.com/
  1239. http://www.infowars.com/
  1240. http://www.internetnews.com/
  1241. http://www.inventgeek.com/blog/
  1242. http://www.irfanview.com/
  1243. http://www.itworld.com/
  1244. http://www.itworld.com/blogs/sandra-henry-stocker
  1245. http://www.japantoday.com/
  1246. http://www.jjtc.com/Security/stegtools.htm
  1247. http://www.jjtc.com/Steganography/
  1248. http://www.khanacademy.org/
  1249. http://www.ladyada.net/make/
  1250. http://www.ladyada.net/make/mintyboost/index.html
  1251. http://www.ladyada.net/make/minty/index.html
  1252. http://www.last.fm/
  1253. http://www.linuxfoundation.org/
  1254. http://www.lipstickalley.com/
  1255. http://www.liveleak.com/
  1256. http://www.mail-archive.com/
  1257. http://www.mcgrewsecurity.com/tools/msramdmp/
  1258. http://www.mediafire.com/
  1259. http://www.medicalnewstoday.com/
  1260. http://www.metafilter.com/
  1261. http://www.minutemanproject.com/
  1262. http://www.myfishtank.net/forum/
  1263. http://www.nasdaq.com/
  1264. http://www.nationaldefensemagazine.org
  1265. http://www.nationmaster.com/
  1266. http://www.neowin.net/
  1267. http://www.neowin.net/forum/
  1268. http://www.net.princeton.edu/software/dhcp_probe/
  1269. http://www.nist.gov/public_affairs/tech-beat (archives:) http://www.nist.gov/public_affairs/tech-beat/archives.cfm
  1270. http://www.nutsvolts.com/
  1271. http://www.nutsvolts.com/index.php?/blog/
  1272. http://www.officer.com/
  1273. http://www.ok.co.uk/home/
  1274. http://www.okmagazine.com/
  1275. http://www.omgubuntu.co.uk/
  1276. http://www.opcva.com/watchdog/
  1277. http://www.openculture.com/
  1278. http://www.openrightsgroup.org/
  1279. http://www.openstreetmap.org/
  1280. http://www.opentopia.com/hiddencam.php
  1281. http://www.open-video.org/
  1282. http://www.osnews.com/
  1283. http://www.patriotmemory.com/forums
  1284. http://www.pbs.org/
  1285. http://www.pbs.org/wgbh/pages/frontline/
  1286. http://www.people.com/people/
  1287. http://www.phonescoop.com/
  1288. http://www.phoronix.com/
  1289. http://www.phoronix.com/forums/
  1290. http://www.pool.ntp.org/en/
  1291. http://www.princeton.edu/WebMedia/lectures/
  1292. http://www.printfriendly.com/
  1293. http://www.psychologytoday.com/
  1294. http://www.quora.com/
  1295. http://www.qwiki.com/
  1296. http://www.radaronline.com/
  1297. http://www.raspberrypi.org/
  1298. http://www.readprint.com/
  1299. http://www.reddit.com/
  1300. http://www.reuters.com/
  1301. http://www.rollingstone.com/
  1302. http://www.rootkit.nl/projects/lynis.html
  1303. http://www.rssweather.com
  1304. http://www.scientificamerican.com/article.cfm?id=hackers-can-steal-from-reflections
  1305. http://www.seabios.org/SeaBIOS
  1306. http://www.seattle.intel-research.net/wisp/
  1307. http://www.shacknews.com/
  1308. http://www.sigsac.org/
  1309. http://www.slashfilm.com/
  1310. http://www.slashgear.com/
  1311. http://www.songkick.com/
  1312. http://www.soyouwanna.com/
  1313. http://www.spamhaus.org/
  1314. http://www.spychips.com/
  1315. http://www.stallman.org/
  1316. http://www.stallman.org/archives/
  1317. http://www.sutree.com/
  1318. http://www.synchtube.com/
  1319. http://www.tcpipguide.com/free/t_toc.htm
  1320. http://www.techdirt.com/
  1321. http://www.technologyreview.com/
  1322. http://www.tech-recipes.com/
  1323. http://www.techspot.com/
  1324. http://www.techsupportforum.com/
  1325. http://www.techsupportforum.com/forums/
  1326. http://www.ted.com/
  1327. http://www.theregister.co.uk/
  1328. http://www.theverge.com/
  1329. http://www.thisiscolossal.com/
  1330. http://www.thoughtcrime.org/software/sslsniff/
  1331. http://www.timeanddate.com/worldclock/
  1332. http://www.tmz.com/
  1333. http://www.tomshardware.com/index.html
  1334. http://www.tuxradar.com/
  1335. http://www.tvguide.com/
  1336. http://www.ubuntu.com/
  1337. http://www.urbandictionary.com/
  1338. http://www.usbwifi.orconhosting.net.nz/
  1339. http://www.ustream.tv/
  1340. http://www.vanityfair.com/
  1341. http://www.variety.com/Home/
  1342. http://www.videojug.com/
  1343. http://www.vidipedia.org/
  1344. http://www.wardriving.com/
  1345. http://www.warriorsofthe.net/index.html
  1346. http://www.weather.com/
  1347. http://www.webcitation.org/
  1348. http://www.wi-fiplanet.com/
  1349. http://www.wikibooks.org/
  1350. http://www.wikihow.com/Main-Page
  1351. http://www.wikileaks.org/
  1352. http://www.wikinews.org/
  1353. http://www.wikipedia.org/
  1354. http://www.wikiquote.org/
  1355. http://www.wikisource.org/
  1356. http://www.wikiversity.org/
  1357. http://www.wiktionary.org/
  1358. http://www.winsupersite.com/
  1359. http://www.winsupersite.com/blogcontent/supersite-blog-39
  1360. http://www.wired.com/
  1361. http://www.wired.com/about/blogs
  1362. http://www.wireimage.com/
  1363. http://www.wotsit.org/
  1364. http://www.xnview.com/
  1365. http://www.youtube-mp3.org/
  1366. http://www.zoklet.net/
  1367. http://www.zophar.net/
  1368. http://zombiehunters.org/forum/
  1369. (magazine) http://www.linuxidentity.com/
  1370. (online virus scanner) https://www.virustotal.com/
  1371. (online virus scanner) http://virusscan.jotti.org/en
  1372. (PDF)  http://csrc.nist.gov/publications/nistir/7316/NISTIR-7316.pdf
  1373. (PDFs, leads to) http://dmml.asu.edu/research/pubs
  1374. (PDFs, leads to) http://groupmedia.media.mit.edu/publications.php
  1375. (PDFs, leads to) http://hd.media.mit.edu/badges/publications.html
  1376. (PDFs, leads to) http://linuxnewmedia.com/Products/Print
  1377. (PDFs, leads to) http://www.public.asu.edu/~huanliu/publications.html
  1378. (PDFs, leads to) http://www.public.asu.edu/~huanliu/sbp09/program.html
  1379. (PDFs, leads to) http://www.seattle.intel-research.net/pubs.php
  1380. (PDFs, PPTs, leads to) http://www.public.asu.edu/~huanliu/sbp08/program.html
  1381. (Power Pwn) http://hardware.slashdot.org/story/12/07/22/0335223/the-darpa-funded-power-strip-that-will-hack-your-network
  1382. (Power Pwn) http://pwnieexpress.com/
  1383. (Power Pwn) http://pwnieexpress.com/blogs/news
  1384. (Power Pwn) http://www.zdnet.com/power-pwn-this-darpa-funded-power-strip-will-hack-your-network-7000001331/
  1385. (Power Pwn - PDF) http://cryptome.org/2012/07/cbp072312.pdf
  1386. (view PDFs online!) http://view.samurajdata.se/
  1387. ----------------------------------------
  1388.  
  1389. ** 6005: Security Blogs:
  1390.  
  1391. #
  1392. # Most Powerful Voices in Security Who are the Top 25?
  1393. # The Rest of the Top 100 -
  1394. # * 100 security guru's listed with their Twitter pages
  1395. # and personal/blog sites: (Sep. 8, 2011) Posted here as one
  1396. # link rather than posting around 100 Twitter personal pages.
  1397. # http://www.sys-con.com/node/1974029
  1398. #
  1399. +
  1400. + http://blog.layeredsec.com/ (Archive) - https://twitter.com/brycegalbraith (Author moved to Twitter)
  1401. +
  1402. + (archive) https://pinvoke.wordpress.com/
  1403. +
  1404. + (archive) http://superantispyware.com/blog/
  1405. +
  1406. + (click month at right for archives) https://yorkporc.wordpress.com/
  1407. *
  1408. * https://wiki.debian.org/FreedomBox
  1409. *
  1410. +
  1411. + http://anonymouse.org/cgi-bin/anon-www.cgi/http://www.malwaredomainlist.com/
  1412. + (via Anonymouse because of ban on Tor exit nodes)
  1413. +
  1414. + http://anonymouse.org/cgi-bin/anon-www.cgi/http://www.securitywire.com/
  1415. + (via Anonymouse to evade Tor exit node ban)
  1416. +
  1417. + (archive) http://www.teamfurry.com/wordpress/
  1418. +
  1419. + (archive) http://securityincite.com/blog/mike-rothman
  1420. +
  1421. + http://anonymouse.org/cgi-bin/anon-www.cgi/http://robert.penz.name/
  1422. + (via Anonymouse: Tor exit node ban evasion by proxy)
  1423. +
  1424. http://aconaway.com/
  1425. http://anonymous.livelyblog.com/
  1426. http://anti-virus-rants.blogspot.com/
  1427. http://bgpmon.net/blog/
  1428. http://blog.brickhousesecurity.com/
  1429. http://blog.c22.cc/
  1430. http://blog.clamav.net/
  1431. http://blog.commandlinekungfu.com/
  1432. http://blog.crysys.hu/
  1433. http://blog.cuckoosandbox.org/
  1434. http://blog.cyberwar.nl/
  1435. http://blog.deepsec.net/
  1436. http://blog.didierstevens.com/
  1437. http://blog.emsisoft.com/
  1438. http://blog.eset.com/
  1439. http://blog.fireeye.com/research
  1440. http://blog.gerhards.net/
  1441. http://blog.ine.com/
  1442. http://blog.infosanity.co.uk/
  1443. http://blog.ioshints.info/
  1444. http://blog.lse.epita.fr/
  1445. http://blog.mandiant.com/
  1446. http://blog.oxff.net/
  1447. http://blog.rootshell.be/
  1448. http://blogs.appriver.com/
  1449. http://blogs.cisco.com/category/security
  1450. http://blog.secureideas.net/
  1451. http://blog.security4all.be/
  1452. http://blogs.iss.net/
  1453. http://blog.snort.org/
  1454. http://blogs.pcmag.com/securitywatch/
  1455. http://blog.spiderlabs.com/
  1456. http://blog.spywareguide.com/
  1457. http://blogs.securiteam.com/
  1458. http://blog.stopbadware.org/
  1459. http://blog.tenablesecurity.com/
  1460. http://blog.threatexpert.com/
  1461. http://blog.trendmicro.com/
  1462. http://blog.tsa.gov/
  1463. http://blog.uncommonsensesecurity.com/
  1464. http://blog.watchfire.com/wfblog/
  1465. http://blog.webroot.com/
  1466. http://blog.zoller.lu/
  1467. http://blog.zx2c4.com/
  1468. http://blog.zynamics.com/
  1469. http://brandonjcarroll.com/
  1470. http://cansecwest.com/
  1471. http://carnal0wnage.attackresearch.com/
  1472. http://cerias.purdue.edu/site/blog/author/spaf
  1473. http://chargen.matasano.com/
  1474. http://chris-intel-corner.blogspot.com/
  1475. http://chuvakin.blogspot.com/
  1476. http://ciscoiseasy.blogspot.com/
  1477. http://coffeetocode.net/
  1478. http://community.websense.com/blogs/securitylabs/
  1479. http://community.websense.com/blogs/securitylabs/default.aspx
  1480. http://computer-forensics.sans.org/blog
  1481. http://computer-forensics.sans.org/blog/
  1482. http://computer.forensikblog.de/en/
  1483. http://comsecllc.blogspot.com/
  1484. http://contagiodump.blogspot.com/
  1485. http://cryptocomb.org/
  1486. http://crypto.stanford.edu/
  1487. http://cyb3rcrim3.blogspot.com/
  1488. http://cyberspeak.libsyn.com/
  1489. http://dankaminsky.com/
  1490. http://darkreading.com/
  1491. http://daveshackleford.com/
  1492. http://ddanchev.blogspot.com/
  1493. http://ddos.arbornetworks.com/
  1494. http://deadliestwebattacks.com/
  1495. http://deepsec.net/
  1496. http://dhs-daily-report.blogspot.com/
  1497. http://digfor.blogspot.com/
  1498. http://digitalforensicsisascience.blogspot.com
  1499. http://dshield.org/
  1500. http://dvlabs.tippingpoint.com/blog
  1501. http://dvlabs.tippingpoint.com/blog/
  1502. http://elie.im/blog/
  1503. http://emergentchaos.com/
  1504. http://erratasec.blogspot.com/
  1505. http://etherealmind.com/category/blog/
  1506. http://etherealmind.com/category/blog/security/
  1507. http://eusecwest.com/
  1508. http://evilrouters.net/
  1509. http://fasthorizon.blogspot.com/
  1510. http://forensicaliente.blogspot.com/
  1511. http://forensicfocus.blogspot.com/
  1512. http://forensicmethods.com/
  1513. http://forensicsfromthesausagefactory.blogspot.com/
  1514. http://fraudwar.blogspot.com/
  1515. http://fumalwareanalysis.blogspot.com/
  1516. http://garwarner.blogspot.com/
  1517. http://girlunallocated.blogspot.com
  1518. http://gleeda.blogspot.com/
  1519. http://googleonlinesecurity.blogspot.com/
  1520. http://grandstreamdreams.blogspot.com/
  1521. http://gregsowell.com/
  1522. http://ha.ckers.org/blog (Archive)
  1523. http://hackingcisco.blogspot.com/
  1524. http://holisticinfosec.blogspot.com/
  1525. http://honeyblog.org/
  1526. http://inciweb.org/
  1527. http://infolookup.securegossip.com/
  1528. http://infosecisland.com/
  1529. http://intelnews.org/
  1530. http://invisiblethings.org/
  1531. http://it-audit.sans.org/blog/
  1532. http://jeremiahgrossman.blogspot.com/
  1533. http://jessekornblum.livejournal.com/
  1534. http://journeyintoir.blogspot.com/
  1535. http://justaskweg.com/
  1536. http://krebsonsecurity.com/
  1537. http://labs.m86security.com/ (Archive)
  1538. http://lastwatchdog.com/
  1539. http://log.nadim.cc
  1540. http://lonesysadmin.net/
  1541. http://maliciousattacker.blogspot.com/
  1542. http://marienfeldt.com/
  1543. http://mnin.org/
  1544. http://nakedsecurity.sophos.com/
  1545. http://netsecurity.about.com/
  1546. http://netsecurity.about.com/compute/netsecurity/
  1547. http://network-101.blogspot.com/
  1548. http://news.cnet.com/security
  1549. http://news.hitb.org/
  1550. http://news.softpedia.com/cat/Security/
  1551. http://news.techworld.com/security/
  1552. http://offensivecoder.com/blog/
  1553. http://p4r4n0id.com/ (appears to be gone, we'll see)
  1554. http://packetlife.net/blog/
  1555. http://packetstormsecurity.org/news/
  1556. http://pacsec.jp/
  1557. http://paranoia.dubfire.net/ (Home: http://www.dubfire.net/) (Twitter: https://twitter.com/csoghoian)
  1558. http://pauldotcom.com/
  1559. http://penguininside.blogspot.com/
  1560. http://pen-testing.sans.org/blog/
  1561. http://philosecurity.org/
  1562. http://polarwave.blogspot.com/
  1563. http://praetorianprefect.com/
  1564. http://pseudo-flaw.net/log/index
  1565. http://publicintelligence.net/
  1566. http://randomthoughtsofforensics.blogspot.com
  1567. http://rdist.root.org/
  1568. http://recon.cx
  1569. http://resources.infosecinstitute.com/
  1570. http://revolutionwifi.blogspot.com/
  1571. http://rijmenants.blogspot.com/
  1572. https://365.rsaconference.com/blogs/critical-infrastructure
  1573. https://365.rsaconference.com/blogs/ediscovery
  1574. https://365.rsaconference.com/blogs/fred-stock
  1575. https://365.rsaconference.com/blogs/ira-winkler
  1576. https://365.rsaconference.com/blogs/rsa-conference-blog
  1577. https://365.rsaconference.com/blogs/securityreading
  1578. https://amtso.wordpress.com/
  1579. https://blog.avast.com/
  1580. https://blog.mozilla.org/security/
  1581. https://blog.opendns.com/
  1582. https://blogs.adobe.com/psirt/
  1583. https://blogs.mcafee.com/
  1584. https://blogs.mcafee.com/mcafee-labs
  1585. https://blogs.technet.com/b/sysinternals/
  1586. https://blogs.technet.com/mmpc/default.aspx
  1587. https://blogs.technet.com/msrc/
  1588. https://blog.torproject.org/
  1589. https://blog.whitehatsec.com/
  1590. https://chainmailcheck.wordpress.com/
  1591. https://citizenlab.org/category/news/
  1592. https://community.rapid7.com/community/infosec/blog
  1593. https://community.rapid7.com/community/metasploit/blog
  1594. https://devcentral.f5.com/Home/Blogs/tabid/1082195/Default.aspx
  1595. https://devcentral.f5.com/weblogs/macvittie/Default.aspx
  1596. http://seclists.org/
  1597. http://securityandrisk.blogspot.com/
  1598. http://securityblog.verizonbusiness.com/
  1599. http://securitybraindump.blogspot.com/
  1600. http://security-sh3ll.blogspot.com/
  1601. http://securityvulns.com/
  1602. http://securosis.com/blog
  1603. https://fightinginsecurity.wordpress.com/
  1604. https://gregness.wordpress.com/
  1605. http://sketchymoose.blogspot.com/
  1606. https://memset.wordpress.com/
  1607. https://news.ycombinator.com/
  1608. http://software-security.sans.org/blog/
  1609. http://spectrum.ieee.org/blog/riskfactor
  1610. https://psal.cs.drexel.edu/index.php/Main_Page
  1611. http://spyblog.org.uk/
  1612. https://secunia.com/advisories/
  1613. https://ssd.eff.org/
  1614. https://techbuddha.wordpress.com/
  1615. http://stratsec.blogspot.com/
  1616. https://twitter.com/hackinthebox
  1617. https://twitter.com/markrussinovich
  1618. http://superconductor.voltage.com/
  1619. http://swann.com/s/products/newsrelease/
  1620. https://www.adobe.com/support/security/
  1621. https://www.brandenwilliams.com/blog/
  1622. https://www.eff.org/
  1623. https://www.grc.com/securitynow.htm
  1624. https://www.ibm.com/developerworks/
  1625. https://www.ibm.com/developerworks/aix/library/
  1626. https://www.ibm.com/developerworks/linux/
  1627. https://www.ibm.com/developerworks/topics/
  1628. https://www.mozilla.org/security/announce/
  1629. https://www.net-security.org/
  1630. https://www.sans.org/newsletters/
  1631. https://www.sans.org/newsletters/#newsbites
  1632. https://www.sans.org/newsletters/#ouch
  1633. https://www.sans.org/newsletters/#risk
  1634. https://www.schneier.com/
  1635. https://www.securelist.com/en/weblog
  1636. https://www.trustedsec.com/news-and-events/
  1637. https://www.usenix.org/conferences
  1638. https://www.veracode.com/blog/
  1639. http://taosecurity.blogspot.com/
  1640. http://technicalinfodotnet.blogspot.com/
  1641. http://thehackernews.com/
  1642. http://thehiddenevil.com/
  1643. http://theinvisiblethings.blogspot.com/
  1644. http://threatpost.com/
  1645. http://threatthoughts.com/
  1646. http://ticklethewire.com/
  1647. http://tk-blog.blogspot.com/
  1648. http://toorcon.org/
  1649. http://travisgoodspeed.blogspot.com/
  1650. http://volatility.tumblr.com/
  1651. http://vrt-blog.snort.org/
  1652. http://vulnfactory.org/blog/
  1653. http://web.archive.org/web/20100528020113/http://milw0rm.com/
  1654. http://windowsir.blogspot.com/
  1655. http://wordpress.bladeforensics.com/
  1656. http://www.acunetix.com/blog/
  1657. http://www.afcea.org/signal/signalscape/
  1658. http://www.allspammedup.com/
  1659. http://www.backtrack-linux.org/blog/
  1660. http://www.bigbrotherwatch.org.uk/
  1661. http://www.blackbag.nl/
  1662. http://www.blindhog.net/
  1663. http://www.bunniestudios.com/wordpress/
  1664. http://www.businessinsider.com/defense
  1665. http://www.businessinsider.com/defense/infosec
  1666. http://www.businessinsider.com/warroom
  1667. http://www.capnfreedom.com/
  1668. http://www.catonmat.net/
  1669. http://www.cerias.purdue.edu/site/blog
  1670. http://www.cerias.purdue.edu/site/blog/
  1671. http://www.cgisecurity.com/
  1672. http://www.ciscoarticles.com/
  1673. http://www.clerkendweller.com/
  1674. http://www.corecom.com/html/wlan.html
  1675. http://www.cristoncox.com/
  1676. http://www.cryptogon.com/
  1677. http://www.cryptome.org/
  1678. http://www.cryptosmith.com/
  1679. http://www.cyberwarnews.info/
  1680. http://www.darknet.org.uk/
  1681. http://www.darkreading.com/blog
  1682. http://www.devttys0.com/blog/
  1683. http://www.educatedguesswork.org/
  1684. http://www.ehacking.net/
  1685. http://www.emergingthreatspro.com/blog/
  1686. http://www.ericjhuber.com/
  1687. http://www.esecurityplanet.com/
  1688. http://www.esecurityplanet.com/hackers
  1689. http://www.esecurityplanet.com/malware
  1690. http://www.eweek.com/c/s/Security/
  1691. http://www.exploit-db.com/
  1692. http://www.exploit-id.com/
  1693. http://www.fas.org/blog/secrecy/
  1694. http://www.fas.org/blog/ssp/
  1695. http://www.federaltimes.com/
  1696. http://www.financialcryptography.com/
  1697. http://www.flyingpenguin.com/
  1698. http://www.forensic4cast.com/
  1699. http://www.forensickb.com/
  1700. http://www.forensicswiki.org/
  1701. http://www.frontlinesentinel.com/
  1702. http://www.f-secure.com/weblog
  1703. http://www.gfi.com/blog/
  1704. http://www.gfi.com/blog/labs/
  1705. http://www.hackaday.com/
  1706. http://www.heinz.cmu.edu/~acquisti/shb/participants.htm
  1707. http://www.hexacorn.com/blog/
  1708. http://www.hexblog.com/
  1709. http://www.honeynet.org/
  1710. http://www.h-online.com/
  1711. http://www.h-online.com/developer/
  1712. http://www.h-online.com/open/
  1713. http://www.h-online.com/security/
  1714. http://www.hotforsecurity.com/
  1715. http://www.ibm.com/developerworks/security/
  1716. http://www.infosecblog.org/
  1717. http://www.infosecurity-magazine.com/blog/
  1718. http://www.insearchoftech.com/
  1719. http://www.irongeek.com/
  1720. http://www.irongeek.com/
  1721. http://www.itstactical.com/
  1722. http://www.l0t3k.org/en/
  1723. http://www.ledge.co.za/software/lpinotes/
  1724. http://www.lightbluetouchpaper.org/
  1725. http://www.links.org/
  1726. http://www.liquidmatrix.org/blog/
  1727. http://www.lovemytool.com/
  1728. http://www.mckeay.net/
  1729. http://www.my80211.com/
  1730. http://www.neowin.net/forum/topic/934274-freeware-alternative-list/
  1731. http://www.net-security.org/
  1732. http://www.networkworld.com/topics/security.html
  1733. http://www.nowtheendbegins.com/blog/
  1734. http://www.nowtheendbegins.com/blog/?cat=4
  1735. http://www.nsa.gov/
  1736. http://www.offensivecomputing.net/ (moving to: http://openmalware.org/)
  1737. http://www.offensive-security.com/blog/
  1738. http://www.officer.com/latest-news
  1739. http://www.openrce.org/articles/
  1740. http://www.packetstormsecurity.org/
  1741. http://www.paranoidprose.com/
  1742. http://www.pgpboard.com/
  1743. http://www.pinewswire.net/
  1744. http://www.policemisconduct.net
  1745. http://www.prevx.com/blog.asp
  1746. http://www.rationalsurvivability.com/blog/
  1747. http://www.reddit.com/r/malware
  1748. http://www.reddit.com/r/reverseengineering
  1749. http://www.reversinglabs.com/blog
  1750. http://www.schneier.com/
  1751. http://www.scmagazine.com/the-data-breach-blog/section/1263/
  1752. http://www.seclist.us/
  1753. http://www.secsocial.com/blog/
  1754. http://www.securingthehuman.org/blog/
  1755. http://www.securitybsides.com
  1756. http://www.securityfocus.com/
  1757. http://www.securityfocus.com/archive
  1758. http://www.security-ray.com/
  1759. http://www.securitytracker.com/
  1760. http://www.securityweek.com/
  1761. http://www.sensepost.com/blog/
  1762. http://www.shellguardians.com/
  1763. http://www.shmoo.com/news/
  1764. http://www.shmoocon.org/
  1765. http://www.skullbox.net/index.php
  1766. http://www.social-engineer.org/framework/Social_Engineering_Framework
  1767. http://www.standalone-sysadmin.com/blog/
  1768. http://www.stratumsecurity.com/company/blog/
  1769. http://www.survivalblog.com/
  1770. http://www.symantec.com/business/security_response/weblog/
  1771. http://www.symantec.com/connect/security/blogs
  1772. http://www.sysadminblogs.com/planet/
  1773. http://www.sysforensics.org/
  1774. http://www.teamshatter.com/
  1775. http://www.techrepublic.com/blog/security
  1776. http://www.thedarkvisitor.com/
  1777. http://www.thedigitalstandard.blogspot.com/
  1778. http://www.theemailadmin.com/
  1779. http://www.thegeekstuff.com/
  1780. http://www.thegeekstuff.com/best-of-the-blog/
  1781. http://www.theintelligencenews.com/
  1782. http://www.theregister.co.uk/security/
  1783. http://www.thesecuritysamurai.com/
  1784. http://www.thetechherald.com/security
  1785. http://www.troyhunt.com/
  1786. http://www.trusteer.com/blog
  1787. http://www.whenisfive.com
  1788. http://www.wikileaks.org/
  1789. http://www.wired.com/about/blogs/
  1790. http://www.wired.com/dangerroom
  1791. http://www.wired.com/threatlevel/
  1792. http://www.wlanpros.com/
  1793. http://www.wmarkbrooks.com/
  1794. http://www.woodmann.com/forum/blog.php
  1795. http://www.wrgross.com/blogs/security/
  1796. http://www.wrgross.com/blogs/security/category/openbsd/
  1797. http://www.zdnet.com/blog/security/
  1798. http://www.zerodayinitiative.com/advisories/published/
  1799. http://www.zerodayinitiative.com/advisories/upcoming
  1800. (videos, leads to) http://www.irongeek.com/i.php?page=security/hackingillustrated
  1801.  
  1802. ----------------------------------------
  1803.  
  1804. ** 6006: Security Forums (Web based Discussion Forums)
  1805.  
  1806. http://cocoontech.com/forums/
  1807. http://forum.bitdefender.com
  1808. http://forum.prisonplanet.com
  1809. http://forums.avg.com/
  1810. http://forums.comodo.com/
  1811. http://forums.hak5.org/
  1812. http://forums.officer.com/forums/
  1813. http://forums.windowsecurity.com
  1814. http://glocktalk.com/forums/
  1815. http://hardforum.com/showthread.php?t=781545
  1816. http://homecommunity.cisco.com/
  1817. http://www.antionline.com/
  1818. http://www.ar15.com/forums/
  1819. http://www.backtrack-linux.org/forums
  1820. http://www.binrev.com/forums/
  1821. http://www.defencetalk.com/forums/
  1822. http://www.dslreports.com/forum/cleanup
  1823. http://www.dslreports.com/forum/scambusters
  1824. http://www.dslreports.com/forum/security
  1825. http://www.dslreports.com/forum/wsecurity
  1826. http://www.hex-rays.com/forum/
  1827. http://www.networking-forum.com/
  1828. http://www.sherdog.net/forums/
  1829. http://www.survivalistboards.com/
  1830. http://www.wilderssecurity.com/
  1831. http://www.wilderssecurity.com/showthread.php?t=242949
  1832. http://www.woodmann.com/forum/forum.php
  1833. ----------------------------------------
  1834.  
  1835. ** 6007: Security Magazines & Zines
  1836.  
  1837. http://about-threats.trendmicro.com/ebooks/
  1838. http://bsdmag.org/
  1839. http://chmag.in/
  1840. http://chmag.in/issue/all
  1841. http://commons.oreilly.com/wiki/index.php/O%27Reilly_Commons
  1842. http://gonullyourself.com/ezines/
  1843. http://gonullyourself.com/zine/
  1844. http://hakin9.org/
  1845. http://linuxformat.com/
  1846. http://magazine.hackinthebox.org/
  1847. http://magazine.hitb.org/
  1848. http://secureviewmag.com/
  1849. https://www.net-security.org/insecuremag.php
  1850. http://ubuntupocketguide.com/index_main.html
  1851. http://www.2600.com/
  1852. http://www.admin-magazine.com/
  1853. http://www.dwheeler.com/secure-programs/
  1854. http://www.linuxpromagazine.com/
  1855. http://www.linuxuser.co.uk/
  1856. http://www.phrack.com/
  1857. http://www.textfiles.com/ (RE: https://en.wikipedia.org/wiki/Textfiles.com)
  1858. http://www.thegeekstuff.com/linux-101-hacks-ebook/
  1859. http://www.uninformed.org/
  1860. ----------------------------------------
  1861.  
  1862. ** 6008: Linux Anti-Malware Scanners
  1863.  
  1864. See Also: 6003: Antivirus LiveCDs - boot and scan your system for malware
  1865.  
  1866. + Avast:
  1867. http://www.avast.com/linux-home-edition
  1868.  
  1869. + AVG:
  1870. http://free.avg.com/ww-en/download.prd-alf.tpl-stdfull
  1871.  
  1872. + Bitdefender:
  1873. http://www.bitdefender.com/media/html/en/unicesportal/
  1874. http://www.bitdefender.com/business/antivirus-for-unices.html
  1875. http://unices.bitdefender.com
  1876. http://www.bitdefender.com/support/Bitdefender-for-Linux-manual-updates-224.html
  1877.  
  1878. ++ Bitdefender repos (may be older than version obtainable above via registration & email):
  1879. http://download.bitdefender.com/repos/deb/
  1880. http://download.bitdefender.com/repos/rpm/
  1881.  
  1882. + ClamAV:
  1883. http://www.clamav.net/
  1884. http://sourceforge.net/projects/clamav/
  1885.  
  1886. + ClamTk is a GUI front-end for ClamAV
  1887. http://clamtk.sourceforge.net/
  1888. http://sourceforge.net/projects/clamtk/
  1889.  
  1890. + Collage:
  1891. http://gtnoise.net/projects/7-anti-censorship/7-collage-defeating-censorship-with-user-generated-content
  1892.  
  1893. + Comodo Antivirus for Linux (CAVL):
  1894. http://forums.comodo.com/comodo-antivirus-for-linux-cavl/comodo-antivirus-for-linux-cavl-v102398181-is-formally-released-t85030.0.html
  1895. http://forums.comodo.com/comodo-antivirus-for-linux-cavl-b275.0/
  1896.  
  1897. + Coroner's Toolkit, The:
  1898. http://www.porcupine.org/forensics/tct.html
  1899.  
  1900. + F-PROT:
  1901. http://www.f-prot.com/download/home_user/download_fplinux.html
  1902.  
  1903. + F-PROT FRONT-END: QtFprot is a frontend for FPROT 4.x, a free (for personal use) Linux virus-scanner
  1904. http://freecode.com/projects/qtfprot
  1905.  
  1906. + F-PROT FRONT-END: XFPROT is a graphical frontend for the F-Prot Antivirus for Linux Small Business Edition.
  1907. http://freecode.com/projects/xfprot
  1908. http://web.tiscali.it/sharp/xfprot/
  1909.  
  1910. ----------------------------------------
  1911.  
  1912. ** 6009: Linux Security
  1913.          --------------
  1914. * 6009.1: Linux Articles (a few of these aren't security related and will eventually be moved to a new section):
  1915.          ---------------
  1916. http://alien.slackbook.org/dokuwiki/doku.php?id=slackware:parentalcontrol
  1917. http://ask.slashdot.org/story/05/07/20/1457252/network-intrusion-detection-and-prevention
  1918. http://csrc.nist.gov/
  1919. http://csrc.nist.gov/publications/PubsSPs.html
  1920. http://doc.opensuse.org/documentation/html/openSUSE_113/opensuse-apps/cha.crypto.html
  1921. http://doc.opensuse.org/documentation/html/openSUSE_113/opensuse-apps/cha.gnome.crypto.html
  1922. http://emergingthreats.net/
  1923. http://en.gentoo-wiki.com/wiki/HOWTO_Iptables_for_newbies
  1924. http://freeworld.thc.org/papers/anonymous-unix.html
  1925. http://honeypots.sourceforge.net/modified_script.html
  1926. http://it.slashdot.org/story/05/04/19/232230/bastille-adds-reporting-grabs-fed-attention
  1927. http://it.slashdot.org/story/06/03/14/1842248/pgp-creators-zfone-encrypts-voip
  1928. http://linuxblog.darkduck.com/
  1929. http://linuxgazette.net/121/anonymous.html
  1930. http://linux-ip.net/html/ether-arp.html
  1931. http://linuxpoison.blogspot.com/2008/01/howto-check-disk-drive-for-errors-and.html
  1932. http://netwizards.co.uk/installing-tripwire-on-ubuntu/
  1933. http://nmap.org/book/osdetect.html
  1934. http://nmap.org/book/toc.html
  1935. http://ornellas.apanela.com/dokuwiki/pub:firewall_and_adv_routing
  1936. http://penguininside.blogspot.se/2009/09/10-panel-dock-applications-for-your.html
  1937. http://people.redhat.com/pvrabec/openscap/guide.html
  1938. http://planet.netfilter.org/
  1939. http://project.honeynet.org/papers/individual/
  1940. http://project.honeynet.org/papers/kye.html
  1941. http://projects.gnome.org/gdm/docs/2.14/configuration.html
  1942. http://psychocats.net/ubuntu/index.php
  1943. https://delightlylinux.wordpress.com/
  1944. https://delightlylinux.wordpress.com/2012/06/14/secure-delete/
  1945. http://securitywatch.eweek.com/rootkits/rootkits_on_a_pci_card.html
  1946. https://fedoraproject.org/wiki/DocsProject/UsingGpg/CreatingKeys
  1947. https://fedoraproject.org/wiki/How_to_create_and_use_a_Live_CD
  1948. https://fedoraproject.org/wiki/How_to_create_and_use_Live_USB
  1949. https://fedoraproject.org/wiki/JeroenVanMeeuwen/Revisor/FedoraRebrandRemixGuidelines
  1950. https://help.ubuntu.com/community/EncryptedPrivateDirectory
  1951. https://help.ubuntu.com/community/FileIntegrityAIDE
  1952. https://help.ubuntu.com/community/GnuPrivacyGuardHowto
  1953. https://help.ubuntu.com/community/LinuxLogFiles
  1954. https://help.ubuntu.com/community/Logwatch
  1955. https://help.ubuntu.com/community/StricterDefaults
  1956. https://secure.wikimedia.org/wikibooks/en/wiki/Grsecurity/Appendix/Grsecurity_and_PaX_Configuration_Options
  1957. https://wiki.debian.org/
  1958. https://wiki.debian.org/iptables
  1959. https://wiki.debian.org/SecureApt
  1960. https://wiki.debian.org/SystemAdministration
  1961. https://wiki.ubuntu.com/
  1962. https://wiki.ubuntu.com/BasicSecurity
  1963. https://wiki.ubuntu.com/BasicSecurity/DidIJustGetOwned
  1964. https://wiki.ubuntu.com/Security/Features
  1965. https://www.cert.org/tech_tips/unix_configuration_guidelines.html
  1966. https://www.cs.arizona.edu/stork/packagemanagersecurity/faq.html
  1967. https://www.ibm.com/developerworks/linux/library/l-proc/index.html
  1968. https://www.ibm.com/developerworks/linux/tutorials/l-lockdown1/
  1969. https://www.ibm.com/developerworks/linux/tutorials/l-lockdown2/index.html
  1970. https://www.linux.com/
  1971. https://www.linux.com/learn/tutorials/456149-manage-passwords-encryption-keys-and-more-with-seahorse
  1972. https://www.linuxquestions.org/questions/linux-security-4/security-references-45261/
  1973. https://www.owasp.org
  1974. https://www.sans.org/reading_room/
  1975. https://www.schneier.com/crypto-gram.html
  1976. http://tldp.org/HOWTO/AX25-HOWTO/index.html
  1977. http://tldp.org/HOWTO/Secure-Programs-HOWTO/buffer-overflow.html
  1978. http://tldp.org/LDP/nag2/index.html
  1979. http://trac.secdev.org/scapy/wiki/IdentifyingRogueDHCPServers
  1980. http://web.archive.org/web/20040215020827/http://www.linux-mag.com/2003-09/acls_01.html
  1981. http://web.archive.org/web/20041031074320/http://sun.soci.niu.edu/~rslade/secgloss.htm
  1982. http://web.archive.org/web/20041125131921/http://tips.linux.com/tips/04/11/23/2022252.shtml?tid=100&tid=47&tid=35
  1983. http://web.archive.org/web/20041231085409/http://www.cs.auckland.ac.nz/~pgut001/links.html
  1984. http://web.archive.org/web/20050306035558/http://www.spitzner.net/linux.html
  1985. http://web.archive.org/web/20060712182215/http://linuxgazette.net/128/saha.html
  1986. http://web.archive.org/web/20090109020415/http://www.securityfocus.com/print/infocus/1414
  1987. http://web.archive.org/web/20100529035423/http://www.cert.org/current/services_ports.html
  1988. http://wiki.centos.org/HowTos/Network/IPTables
  1989. http://winhelp2002.mvps.org/hosts.htm
  1990. http://www.acsu.buffalo.edu/~charngda/elf.html
  1991. http://www.alwanza.com/howTo/linux/tripwire.html
  1992. http://www.bitbull.ch/wiki/index.php/Hacking_Notes
  1993. http://www.bitbull.ch/wiki/index.php/Linux_Short_Reference
  1994. http://www.brandonhutchinson.com/iptables_fw.html
  1995. http://www.codeproject.com/KB/cpp/shared_object_injection_1.aspx#brief_elf_str_code1
  1996. http://www.cromwell-intl.com/security/intrusion-analysis/
  1997. http://www.cryptovirology.com/cryptovfiles/cryptovirologyfaqver1.html#whatiscryptoviralextortion
  1998. http://www.cs.arizona.edu/stork/packagemanagersecurity/faq.html
  1999. http://www.cs.wright.edu/~pmateti/Courses/233/Labs/OS-on-USB/OSonUSBLabKnoppix671DVD.html
  2000. http://www.cs.wright.edu/~pmateti/InternetSecurity/Lectures/BufferOverflow/alephOne.html
  2001. http://www.cs.wright.edu/~pmateti/InternetSecurity/Lectures/Fortification/obrien.html
  2002. http://www.cs.wright.edu/~pmateti/InternetSecurity/Lectures/Probing/How%20to%20Handle%20Network%20Probes.htm
  2003. http://www.cyberciti.biz/
  2004. http://www.cyberciti.biz/faq/add-remove-list-linux-kernel-modules/
  2005. http://www.cyberciti.biz/faq/how-to-detect-arp-spoofing-under-unix-or-linux/
  2006. http://www.cyberciti.biz/hardware/linux-iotop-simple-top-like-io-monitor/
  2007. http://www.cyberciti.biz/tips/howto-log-user-activity-using-process-accounting.html
  2008. http://www.cyberciti.biz/tips/iptables-mac-address-filtering.html
  2009. http://www.cyberciti.biz/tips/linux-iptables-10-how-to-block-common-attack.html
  2010. http://www.cyberciti.biz/tips/linux-iptables-8-how-to-avoid-spoofing-and-bad-addresses-attack.html
  2011. http://www.cyberciti.biz/tips/linux-security.html
  2012. http://www.cyberciti.biz/tips/linux-unix-windows-find-hidden-processes-tcp-udp-ports.html
  2013. http://www.cyberciti.biz/tips/top-linux-monitoring-tools.html
  2014. http://www.debianadmin.com/
  2015. http://www.debianadmin.com/filesystem-encryption-tools-for-linux.html
  2016. http://www.debian-administration.org/
  2017. http://www.debian-administration.org/articles/49
  2018. http://www.debian.org/doc/
  2019. http://www.debian.org/doc/manuals/
  2020. http://www.debian.org/doc/manuals/securing-debian-howto/
  2021. http://www.debian.org/doc/manuals/securing-debian-howto/ch-sec-services.en.html#s-firewall-setup
  2022. http://www.debian.org/events/keysigning
  2023. http://www.debuntu.org/intrusion-detection-with-aide
  2024. http://www.desktoplinux.com/articles/AT3341468184.html
  2025. http://www.desktoplinux.com/articles/AT7966076367.html
  2026. http://www.dshield.org/diary.html?storyid=13057
  2027. http://www.exploit-db.com/
  2028. http://www.faqs.org/docs/Linux-HOWTO/User-Authentication-HOWTO.html
  2029. http://www.gentoo.org/doc/en/gnupg-user.xml
  2030. http://www.hackinglinuxexposed.com/articles/
  2031. http://www.hackinglinuxexposed.com/articles/20030703.html
  2032. http://www.hackinglinuxexposed.com/articles/20030709.html
  2033. http://www.howtoforge.com/intrusion_detection_base_snort
  2034. http://www.ibiblio.org/pub/Linux/docs/HOWTO/other-formats/html_single/Disk-Encryption-HOWTO.html
  2035. http://www.ibm.com/developerworks/aix/library/au-aix-manage-ruby/index.html
  2036. http://www.ibm.com/developerworks/aix/library/au-speakingunix10/index.html
  2037. http://www.ibm.com/developerworks/aix/library/au-speakingunix11/index.html
  2038. http://www.ibm.com/developerworks/aix/library/au-speakingunix12/index.html
  2039. http://www.ibm.com/developerworks/aix/library/au-speakingunix13/index.html
  2040. http://www.ibm.com/developerworks/aix/library/au-speakingunix2.html
  2041. http://www.ibm.com/developerworks/aix/library/au-speakingunix3.html
  2042. http://www.ibm.com/developerworks/aix/library/au-speakingunix4/index.html
  2043. http://www.ibm.com/developerworks/aix/library/au-speakingunix5.html
  2044. http://www.ibm.com/developerworks/aix/library/au-speakingunix6.html
  2045. http://www.ibm.com/developerworks/aix/library/au-speakingunix7.html
  2046. http://www.ibm.com/developerworks/aix/library/au-speakingunix8/index.html
  2047. http://www.ibm.com/developerworks/aix/library/au-speakingunix9/index.html
  2048. http://www.ibm.com/developerworks/aix/library/au-spunix_greattools/index.html
  2049. http://www.ibm.com/developerworks/aix/library/au-unix-commandline/index.html
  2050. http://www.ibm.com/developerworks/library/l-keyc2/
  2051. http://www.ibm.com/developerworks/library/l-keyc3/
  2052. http://www.ibm.com/developerworks/library/l-keyc/index.html
  2053. http://www.ibm.com/developerworks/linux/library/l-livecdsec/?ca=dgr-lnxw07SecurityLiveCD
  2054. http://www.justlinux.com/nhf/Security/IPtables_Basics.html
  2055. http://www.la-samhna.de/library/rootkits/index.html
  2056. http://www.ledge.co.za/software/lpinotes/
  2057. http://www.linuxbsdos.com/2011/05/10/how-to-install-ubuntu-11-04-on-an-encrypted-lvm-file-system/
  2058. http://www.linuxforums.org/articles/understanding-elf-using-readelf-and-objdump_125.html
  2059. http://www.linuxhomenetworking.com/
  2060. http://www.linuxhomenetworking.com/wiki/index.php/Quick_HOWTO_:_Ch14_:_Linux_Firewalls_Using_iptables
  2061. http://www.linuxjournal.com/
  2062. http://www.linux.org/
  2063. http://www.linuxplanet.com/linuxplanet/tutorials/4505/1
  2064. http://www.linuxsecurity.com
  2065. http://www.linuxsecurity.com/
  2066. http://www.linuxsecurity.com/content/view/117644/49/
  2067. http://www.linuxsecurity.com/content/view/118211/49/
  2068. http://www.linuxsecurity.com/content/view/119415/49/
  2069. http://www.linuxsecurity.com/docs/colsfaq.html
  2070. http://www.livecdlist.com/
  2071. http://www.madboa.com/geek/gpg-quickstart/
  2072. http://www.madboa.com/geek/openssl/#digest-file
  2073. http://www.madboa.com/geek/pine-ssl/
  2074. http://www.netfilter.org/documentation/
  2075. http://www.novell.com/communities/node/4971/detecting-arp-poisoning-attacks
  2076. http://www.phrack.com/issues.html?issue=58&id=7#article
  2077. http://www.phrack.org/issues.html?issue=68&id=9#article
  2078. http://www.porcupine.org/forensics/column.html
  2079. http://www.psychocats.net/ubuntu/minimal
  2080. http://www.securityfocus.com/firewalls
  2081. http://www.securityfocus.com/ids
  2082. http://www.securityfocus.com/incidents
  2083. http://www.securityfocus.com/unix
  2084. http://www.seifried.org/security/ids/20020107-honeypot-vmware-basics.html
  2085. http://www.symantec.com/connect/articles/alien-autopsy-reverse-engineering-win32-trojans-linux
  2086. http://www.symantec.com/connect/articles/detecting-and-removing-malicious-code
  2087. http://www.symantec.com/connect/articles/detecting-rootkits-and-kernel-level-compromises-linux
  2088. http://www.symantec.com/connect/articles/forensic-analysis-live-linux-system-pt-1
  2089. http://www.symantec.com/connect/articles/forensic-analysis-live-linux-system-pt-2
  2090. http://www.symantec.com/connect/articles/hacker-tools-and-their-signatures-part-three-rootkits
  2091. http://www.symantec.com/connect/articles/hardening-tcpip-stack-syn-attacks
  2092. http://www.symantec.com/connect/articles/host-integrity-monitoring-best-practices-deployment
  2093. http://www.symantec.com/connect/articles/reverse-engineering-hostile-code
  2094. http://www.symantec.com/connect/articles/sniffers-what-they-are-and-how-protect-yourself
  2095. http://www.symantec.com/connect/topics/security/securityfocus
  2096. http://www.techrepublic.com/article/10-things-you-should-do-to-a-new-linux-pc-before-exposing-it-to-the-internet/5987648
  2097. http://www.thc.org/
  2098. http://www.thc.org/papers/fw-backd.htm
  2099. http://www.thegeekstuff.com/2010/03/netstat-command-examples/
  2100. http://www.thegeekstuff.com/2010/11/50-linux-commands/
  2101. http://www.thegeekstuff.com/2010/12/50-unix-linux-sysadmin-tutorials/
  2102. http://www.thegeekstuff.com/2011/06/iptables-rules-examples/
  2103. http://www.thegeekstuff.com/2011/12/linux-performance-monitoring-tools/
  2104. http://www.tldp.org/HOWTO/Encrypted-Root-Filesystem-HOWTO/
  2105. http://www.tldp.org/HOWTO/Linux%2BIPv6-HOWTO/index.html
  2106. http://www.tracking-hackers.com/misc/faq.html
  2107. http://www.ubuntugeek.com/tools-to-delete-files-securely-in-ubuntu-linux.html
  2108. http://www.unixwiz.net/techtips/iguide-crypto-hashes.html
  2109. http://www.whenisfive.com/tutorials/tor-polipo-5-minute-install-guide-ubuntu-11-0411-10/
  2110. http://www.yolinux.com/TUTORIALS/LinuxSecurityTools.html
  2111. (multicd script) http://multicd.tuxfamily.org/
  2112. (multicd script related) http://ubuntuforums.org/showthread.php?t=1071869
  2113. (PDF) http://csrc.nist.gov/publications/nistir/7316/NISTIR-7316.pdf
  2114. (PDF) http://csrc.nist.gov/publications/nistpubs/800-84/SP800-84.pdf
  2115. (PDF) http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdf
  2116. (PDF) http://events.ccc.de/congress/2006/Fahrplan/attachments/1167-SpeakingAnonymously.pdf
  2117. (PDF) http://web.archive.org/web/20070717124745/http://www.tldp.org/linuxfocus/English/Archives/lf-2003_01-0278.pdf
  2118. (PDF) http://www.linux-magazine.com/issue/01/File_Permissions.pdf
  2119. (PDFs) http://www.nsa.gov/ia/mitigation_guidance/security_configuration_guides/operating_systems.shtml
  2120.  
  2121.           --------------------
  2122. * 6009.2: Linux Security Tools
  2123.          (the intention here is not to list everything, hence the link to BackTrack which
  2124.           contains a number of useful tools which could otherwise be linked here.)
  2125.           --------------------
  2126.  
  2127. ++ SecTools.Org: Top 125 Network Security Tools
  2128. http://sectools.org/
  2129.  
  2130. + AIDE:
  2131. http://sourceforge.net/projects/aide/
  2132. http://sourceforge.net/projects/aide
  2133. http://freecode.com/projects/aide
  2134.  
  2135. + AppArmor:
  2136. http://wiki.apparmor.net/index.php/Main_Page
  2137. http://www.linux-magazine.com/Issues/2006/69/AppArmor-vs.-SELinux
  2138. (PDF) http://www.linux-magazine.com/content/download/63096/487061/file/AppArmor_vs_SELinux.pdf
  2139. https://lkml.org/lkml/2006/4/19/199
  2140.  
  2141. + BackTrack Linux (contains MANY tools)
  2142. http://www.backtrack-linux.org/
  2143.  
  2144. + Bastille:
  2145. http://bastille-linux.sourceforge.net/
  2146.  
  2147. + Baudline:
  2148. http://www.baudline.com/
  2149. https://en.wikipedia.org/wiki/Baudline
  2150.  
  2151. + BleachBit:
  2152. http://bleachbit.sourceforge.net/
  2153. http://sourceforge.net/projects/bleachbit/
  2154.  
  2155. + BotHunter:
  2156. http://www.bothunter.net/
  2157.  
  2158. + Cacti
  2159. http://www.cacti.net/
  2160.  
  2161. + Chkrootkit:
  2162. https://en.wikipedia.org/wiki/Chkrootkit
  2163. http://freecode.com/projects/chkrootkit
  2164. (not directly linking to official site url because it's been up/down)
  2165. (the past few weeks)
  2166.  
  2167. + Combofix:
  2168. http://www.combofix.org/
  2169.  
  2170. + Cuckoo Sandbox:
  2171. http://www.cuckoosandbox.org/
  2172.  
  2173. + Dan's Guardian:
  2174. http://dansguardian.org/
  2175.  
  2176. + DBAN (Darik's Boot and Nuke):
  2177. http://www.dban.org/
  2178. http://sourceforge.net/projects/dban/
  2179.  
  2180. + DDRescue:
  2181. https://www.gnu.org/software/ddrescue/ddrescue.html
  2182.  
  2183. + debsecan:
  2184. http://www.enyo.de/fw/software/debsecan/
  2185.  
  2186. + Deny Hosts:
  2187. http://denyhosts.sourceforge.net/
  2188.  
  2189. + DNSCrypt
  2190. https://www.opendns.com/technology/dnscrypt/
  2191. https://blog.opendns.com/2012/02/16/tales-from-the-dnscrypt-linux-rising/
  2192. https://github.com/opendns/dnscrypt-proxy/blob/master/README.markdown
  2193. https://github.com/opendns/dnscrypt-proxy
  2194.  
  2195. + DNSTop:
  2196. http://dns.measurement-factory.com/tools/dnstop/
  2197.  
  2198. + EckBox:
  2199. http://eckbox.sourceforge.net
  2200. (offsite article): http://blockyourid.com/~gbpprorg/mil/eckbox/index.html
  2201.  
  2202. + Enigmail - a security extension to Mozilla Thunderbird and Seamonkey:
  2203. http://www.enigmail.net/home/index.php
  2204.  
  2205. + Enscribe:
  2206. http://www.coppercloudmusic.com/enscribe/
  2207. http://freecode.com/projects/enscribe
  2208. (old) http://web.archive.org/web/20060712151452/http://jbd.zayda.net/enscribe/
  2209.  
  2210. + FakeAP
  2211. http://blackalchemy.to/project/fakeap/
  2212.  
  2213. + Foremost:
  2214. http://foremost.sourceforge.net/
  2215.  
  2216. + GNUPG (GPG):
  2217. http://www.gnupg.org/
  2218. http://www.gnupg.org/related_software/frontends.en.html
  2219. http://www.gnupg.org/related_software/gpa/index.en.html
  2220. http://utils.kde.org/projects/kgpg/
  2221.  
  2222. + Honeypots (The Honeynet Project):
  2223. http://project.honeynet.org/tools/index.html
  2224.  
  2225. + HTTPS Everywhere (Firefox and Chrome extension):
  2226. https://www.eff.org/https-everywhere
  2227.  
  2228. + IPTraf:
  2229. http://iptraf.seul.org/
  2230. http://freecode.com/projects/iptraf
  2231.  
  2232. + Jhead:
  2233. http://www.sentex.net/~mwandel/jhead/
  2234. http://freecode.com/projects/jhead
  2235.  
  2236. + John The Ripper:
  2237. http://www.openwall.com/john/
  2238.  
  2239. + Linux Kernel Archives:
  2240. https://www.kernel.org/
  2241.  
  2242. + Kismet:
  2243. https://kismetwireless.net/
  2244. http://freecode.com/projects/kismet
  2245.  
  2246. + LaBrea:
  2247. http://labrea.sourceforge.net/
  2248.  
  2249. + Liberté Linux (uses Tor):
  2250. http://dee.su/liberte
  2251.  
  2252. + libemu (x86 Shellcode Emulation):
  2253. http://libemu.carnivore.it/
  2254.  
  2255. + Lynis (Security and system auditing tool):
  2256. http://www.rootkit.nl/projects/lynis.html
  2257. https://en.wikipedia.org/wiki/Lynis
  2258. http://freecode.com/projects/lynis
  2259.  
  2260. + Mac Changer:
  2261. http://www.alobbs.com/macchanger
  2262.  
  2263. + MAT - Metadata Anonymisation Toolkit:
  2264. https://mat.boum.org/
  2265.  
  2266. + md5deep and hashdeep: (md5deep is a set of programs to compute MD5, SHA-1, SHA-256, Tiger, or Whirlpool message digests on an arbitrary number of files.)
  2267.                         (hashdeep is a program to compute, match, and audit hashsets.)
  2268. http://md5deep.sourceforge.net/
  2269. http://sourceforge.net/projects/md5deep/
  2270.  
  2271. + MCrypt:
  2272. http://mcrypt.sourceforge.net/
  2273. http://sourceforge.net/projects/mcrypt/
  2274.  
  2275. + Monkeysphere:
  2276. http://web.monkeysphere.info/
  2277.  
  2278. + Nemesis:
  2279. http://nemesis.sourceforge.net/
  2280.  
  2281. + Nessus:
  2282. http://www.nessus.org/
  2283.  
  2284. + Network Monitoring Tools @ Stanford.edu:
  2285. http://www.slac.stanford.edu/xorg/nmtf/nmtf-tools.html
  2286.  
  2287. + Ninite:
  2288. https://ninite.com/
  2289.  
  2290. + NGrep:
  2291. http://ngrep.sourceforge.net/
  2292.  
  2293. + NMap:
  2294. http://nmap.org/download.html
  2295.  
  2296. + NoMachine NX:
  2297. http://nomachine.com/
  2298.  
  2299. + NoScript (Firefox Extension)
  2300. https://addons.mozilla.org/en-US/firefox/addon/noscript/
  2301.  
  2302. + NTop:
  2303. http://www.ntop.org/
  2304. http://freecode.com/projects/ntop
  2305.  
  2306. + OphCrack:
  2307. http://ophcrack.sourceforge.net/
  2308.  
  2309. + OpenSSH:
  2310. http://www.openssh.com/
  2311.  
  2312. + OpenSSL:
  2313. http://www.openssl.org/
  2314.  
  2315. + Openwall:
  2316. http://www.openwall.com/
  2317.  
  2318. + OSSEC:
  2319. http://www.ossec.net/
  2320.  
  2321. + PhotoRec:
  2322. http://www.cgsecurity.org/wiki/PhotoRec
  2323.  
  2324. + Polipo (Proxy commonly associated with Tor and TAILS):
  2325. http://freecode.com/projects/polipo
  2326.  
  2327. + Rootkits:
  2328. http://packetstormsecurity.org/UNIX/penetration/rootkits/
  2329.  
  2330. + Rkhunter:
  2331. https://en.wikipedia.org/wiki/Rkhunter
  2332. http://rkhunter.sourceforge.net/
  2333. (old) http://www.rootkit.nl/projects/rootkit_hunter.html
  2334.  
  2335. + Scapy:
  2336. http://www.secdev.org/projects/scapy/
  2337.  
  2338. + Seahorse:
  2339. http://projects.gnome.org/seahorse/
  2340.  
  2341. + Secure-Delete:
  2342. http://freeworld.thc.org/releases/secure_delete-3.1.tar.gz
  2343. http://packages.ubuntu.com/search?keywords=secure+delete
  2344.  
  2345. + Skipfish:
  2346. https://code.google.com/p/skipfish/
  2347.  
  2348. + Sleuth Kit (TSK) & Autopsy:
  2349. http://www.sleuthkit.org/
  2350. http://sourceforge.net/projects/sleuthkit/
  2351.  
  2352. + SNARE:
  2353. http://sourceforge.net/projects/snare/
  2354.  
  2355. + Snort
  2356. http://www.snort.org/
  2357.  
  2358. + socat:
  2359. http://www.dest-unreach.org/socat/
  2360.  
  2361. + Sophos Linux/RST-B detection tool:
  2362. http://www.sophos.com/rst-detection-tool
  2363.  
  2364. + srm - secure file deletion:
  2365. http://srm.sourceforge.net/
  2366. http://sourceforge.net/projects/srm/
  2367. http://freecode.com/projects/srm
  2368.  
  2369. + SSDeep:
  2370. http://ssdeep.sourceforge.net/
  2371.  
  2372. + SSHMenu:
  2373. http://sshmenu.sourceforge.net/
  2374.  
  2375. + SSLStrip:
  2376. http://www.thoughtcrime.org/software/sslstrip/index.html
  2377.  
  2378. + SSSS (Shamir's Secret Sharing Scheme):
  2379. http://point-at-infinity.org/ssss/
  2380.  
  2381. + Stegdetect:
  2382. http://www.outguess.org/detection.php
  2383. http://freecode.com/projects/stegdetect
  2384.  
  2385. + Steghide:
  2386. http://steghide.sourceforge.net/
  2387. http://www.freecode.com/projects/steghide
  2388.  
  2389. + Suricata:
  2390. http://www.openinfosecfoundation.org/
  2391. http://www.openinfosecfoundation.org/index.php/download-suricata
  2392.  
  2393. + Switzerland (Network Testing Tool):
  2394. https://www.eff.org/pages/switzerland-network-testing-tool
  2395.  
  2396. + System Rescue CD:
  2397. http://www.sysresccd.org/
  2398.  
  2399. + Tails LiveCD (uses Tor):
  2400. https://tails.boum.org/
  2401.  
  2402. + Tempest for Eliza
  2403. http://www.erikyyy.de/tempest/
  2404.  
  2405. + Tiger - Unix security audit and intrusion detection tool:
  2406. http://nongnu.org/tiger/
  2407.  
  2408. + Tiger - Cryptographic Hash Function:
  2409. http://www.cs.technion.ac.il/~biham/Reports/Tiger/
  2410.  
  2411. + Tor:
  2412. http://metrics.torproject.org/
  2413. https://blog.torproject.org/blog/
  2414. https://bridges.torproject.org/
  2415. https://check.torproject.org/
  2416. https://lists.torproject.org/
  2417. https://weather.torproject.org/
  2418. https://www.torproject.org/
  2419. https://www.torproject.org/about/overview.html.en
  2420. https://www.torproject.org/docs/documentation.html.en
  2421. https://www.torproject.org/download/download-easy.html.en
  2422. https://www.torproject.org/press/press.html.en
  2423. https://www.torproject.org/projects/projects.html.en
  2424. https://www.torproject.org/torbutton/
  2425. https://www.torproject.org/vidalia/
  2426.  
  2427. + Tor Chat2:
  2428. https://github.com/prof7bit/TorChat
  2429. https://github.com/prof7bit/TorChat/downloads
  2430. (old/original) https://code.google.com/p/torchat/
  2431.  
  2432. + Tor Stats:
  2433. http://torstatus.blutmagie.de/
  2434.  
  2435. + Tripwire:
  2436. https://en.wikipedia.org/wiki/Open_Source_Tripwire
  2437. http://sourceforge.net/projects/tripwire/
  2438.  
  2439. + TrueCrypt:
  2440. http://www.truecrypt.org/
  2441. http://www.truecrypt.org/docs/
  2442. http://www.truecrypt.org/downloads
  2443. http://www.truecrypt.org/news
  2444. http://forums.truecrypt.org/
  2445.  
  2446. + VOIP Hopper:
  2447. http://voiphopper.sourceforge.net/
  2448.  
  2449. + Volatility Framework
  2450. https://www.volatilesystems.com/default/volatility#overview
  2451. https://code.google.com/p/volatility/w/list
  2452. http://lists.volatilesystems.com/mailman/listinfo
  2453.  
  2454. + WarVOX:
  2455. http://warvox.org/
  2456.  
  2457. + Webmin:
  2458. http://www.webmin.com/
  2459.  
  2460. + Whirlpool - a cryptographic hash function:
  2461. https://en.wikipedia.org/wiki/Whirlpool_%28cryptography%29
  2462. http://www.larc.usp.br/~pbarreto/WhirlpoolPage.html
  2463.  
  2464. + Wipe:
  2465. http://wipe.sourceforge.net/
  2466.  
  2467. + Wireshark:
  2468. https://www.wireshark.org/
  2469.  
  2470. + Yersinia:
  2471. http://www.yersinia.net/
  2472.  
  2473. + Zfone
  2474. http://zfoneproject.com/
  2475. https://en.wikipedia.org/wiki/Zfone
  2476. ----------------------------------------
  2477.  
  2478. * 6009.3: Linux Various+
  2479.           (most are not directly security related)
  2480.           --------------------
  2481. http://appdb.winehq.org/
  2482. http://blogs.valvesoftware.com/linux/steamd-penguins/
  2483. http://distrowatch.com/
  2484. http://frankscorner.org/
  2485. http://lbproject.sourceforge.net/
  2486. http://linuxgazette.net/
  2487. http://linux.slashdot.org/
  2488. http://linux.sys-con.com/
  2489. http://lxer.com/
  2490. http://olpcnews.com/
  2491. http://oreilly.com/linux/
  2492. http://osdir.com/
  2493. http://packetstormsecurity.org/
  2494. http://planet.debian.org/
  2495. http://planet.gentoo.org/
  2496. http://planet.ubuntu.com/
  2497. https://lwn.net/
  2498. https://wiki.ubuntu.com/UbuntuWeeklyNewsletter/
  2499. https://www.kernel.org/
  2500. https://www.linux.com/
  2501. http://techrights.org/wiki/index.php/Main_Page
  2502. http://tllts.org/
  2503. http://ubuntupocketguide.com/index_main.html
  2504. http://wine-review.blogspot.com/
  2505. http://www.codeweavers.com/
  2506. http://www.gnu.org/philosophy/
  2507. http://www.linuxformat.com/
  2508. http://www.linuxjournal.com/
  2509. http://www.linux-magazine.com/
  2510. http://www.linux-mag.com/
  2511. http://www.linux.org/
  2512. http://www.linuxpromagazine.com/
  2513. http://www.linuxsecurity.com/
  2514. http://www.linuxtag.org
  2515. http://www.linuxuser.co.uk/
  2516. http://www.mail-archive.com/funsec@linuxbox.org/
  2517. http://www.osnews.com/
  2518. http://www.playonlinux.com/en
  2519. http://www.thegeekstuff.com/linux-101-hacks-ebook/
  2520. http://www.tuxarena.com/
  2521. http://www.winehq.org/
  2522. http://www.wine-reviews.net/
  2523. (in limbo?) http://www.desktoplinux.com/news/
  2524.  
  2525. ----------------------------------------
  2526. ** 6010: Windows Security (that's a joke) Tools:
  2527.  
  2528. + Attack Surface Analyzer
  2529. https://www.microsoft.com/en-us/download/details.aspx?id=24487
  2530.  
  2531. + Flame Removal Tool (32 & 64bit versions):
  2532. http://labs.bitdefender.com/2012/5/cyber-espionage-reaches-new-levels-with-flamer/
  2533.  
  2534. + GNUPG (GPG):
  2535. http://www.gnupg.org/
  2536. http://www.gnupg.org/related_software/frontends.en.html
  2537. https://code.google.com/p/cryptophane/
  2538.  
  2539. + MobaXterm:
  2540. http://mobaxterm.mobatek.net/
  2541. http://mobaxterm.mobatek.net/download-home-edition
  2542. http://mobaxterm.mobatek.net/download.html
  2543.  
  2544. + PhotoRec:
  2545. http://www.cgsecurity.org/wiki/PhotoRec
  2546.  
  2547. + PuTTY:
  2548. https://en.wikipedia.org/wiki/PuTTY
  2549.  
  2550. + SNARE:
  2551. http://sourceforge.net/projects/snare/
  2552.  
  2553. + TDSSKiller Anti-Rootkit Tool:
  2554. http://support.kaspersky.com/faq/?qid=208283363
  2555.  
  2556. + WinSCP:
  2557. https://en.wikipedia.org/wiki/WinSCP
  2558.  
  2559. + Zfone
  2560. http://zfoneproject.com/
  2561. https://en.wikipedia.org/wiki/Zfone
  2562.  
  2563. (Archive/Alive) https://www.techsupportalert.com/content/probably-best-free-security-list-world.htm
  2564. (Article, DOC) http://msdn.microsoft.com/en-us/windows/hardware/gg487309
  2565. (Article) http://resources.infosecinstitute.com/tuluka/
  2566. (Article) https://social.technet.microsoft.com/wiki/contents/articles/942.hyper-v-how-to-detect-if-a-computer-is-a-vm-using-script.aspx
  2567. (Article) http://technet.microsoft.com/library/gg176673.aspx?ITPID=sprblog
  2568. (Article) http://technet.microsoft.com/library/gg176676.aspx?ITPID=sprblog
  2569. (Article) http://www.symantec.com/connect/articles/alien-autopsy-reverse-engineering-win32-trojans-linux
  2570. (Article/Wiki) https://en.wikipedia.org/wiki/Comparison_of_SSH_clients
  2571. (Discontinued Magazine / File downloads) http://www.magnesiummedia.com/pcutilities/
  2572. (doc, leads to ) https://www.microsoft.com/en-us/download/details.aspx?id=24373
  2573. (doc, leads to ) https://www.microsoft.com/en-us/download/details.aspx?id=3118
  2574. (docx, leads to) https://www.microsoft.com/en-us/download/details.aspx?id=20092
  2575. (Forum) https://www.microsoft.com/communities/forums/default.mspx
  2576. (Forum) http://www.sevenforums.com/
  2577. (Forum) http://www.w7forums.com/
  2578. (PDFs) http://www.nsa.gov/ia/mitigation_guidance/security_configuration_guides/operating_systems.shtml
  2579. (Spreadsheet xlsx, leads to) https://www.microsoft.com/en-us/download/details.aspx?id=19990
  2580. (Tutorial) Creating a Steady State by Using Microsoft Technologies / Windows 7 - Part 1/3
  2581. (Tutorial) Creating a Steady State by Using Microsoft Technologies / Windows 7 - Part 2/3
  2582. (Tutorial) Creating a Steady State by Using Microsoft Technologies / Windows 7 - Part 3/3
  2583. (Tutorial) mechBgon's guide 1/3 http://www.mechbgon.com/build/router.html
  2584. (Tutorial) mechBgon's guide 2/3 http://www.mechbgon.com/build/security1.html
  2585. (Tutorial) mechBgon's guide 3/3 http://www.mechbgon.com/build/security2.html
  2586. --------------------------------------------------------------------------------
  2587. This is the end of HUGE Security Resource+ - version 6000 - 08/31/2012
  2588. --------------------------------------------------------------------------------
  2589. We post this publication first at PasteBin.com. Please stay tuned
  2590. for the next version of HUGE Security Resource+. It's not the best
  2591. of names for a publication, but we're lazy, and this is free for
  2592. you.
  2593.  
  2594. We do not name, credit, or otherwise pimp out who we are. None of us
  2595. will ever claim credit for this document, previous, present, and future
  2596. versions, anyone who does is lying.
  2597.  
  2598. We're not on Facebook, Twitter, or any other whore social media circles,
  2599. nor are we active in the traditional and non traditional areas
  2600. of chatter - including IRC. Every version of this document
  2601. has, is, and will be released as a text file because it's
  2602. easier to share with friends and it lacks ugly metadata.
  2603.  
  2604. Please share this document with others, convert it to PDF
  2605. and other formats, but please do not modify the document
  2606. from its original design. Do not add your own links
  2607. for redistribution, rename the document, or claim that
  2608. you wrote it. Please provide a link back to the original
  2609. location @ PasteBin where it's released first.
  2610.  
  2611. We don't want anything other than to provide you with a solid
  2612. list of specially chosen sites. Anyone can toss together a
  2613. document with links, but we stay on the hunt for useful links,
  2614. for quality links. It takes time to harvest, prepare, and
  2615. print new links, especially when we have to check the previously
  2616. posted links to ensure they are alive and at the same location
  2617. and if not, we bring the links up to date. Some links are archives,
  2618. some lead directly to PDF files. Surely you've noticed as we've
  2619. made it quite simple to navigate this document with tagging
  2620. special URLs.
  2621.  
  2622. A few of the blogs linked within this document haven't been updated
  2623. in awhile, but they remain as a useful archive of information
  2624. generated in past entries, and some bloggers go several weeks,
  2625. months, or a year before returning to their blogs. This does
  2626. not bring down the quality of the blogs linked within, as
  2627. the chosen ones published here were selected on the basis
  2628. of quality.
  2629.  
  2630. We'd like to say thanks to CRYPTOME who has been linking
  2631. to our official release pages at PasteBin shortly after
  2632. we release a new version. Thanks Cryptome! And thank you
  2633. to PASTEBIN!
  2634. ----------------------------------------
  2635.  
  2636. When this document began, in previous versions, it was previously
  2637. known as: HUGE List of Security Blogs: Unix, Linux, Windows,
  2638. part 1, 2, 3, and 4 and changed document names with version
  2639. 5000. With version 6000 we renamed the project title from
  2640. 'HUGE Security Resource' to 'HUGE Security Resource+',
  2641. meaning, with this version and future versions this document will
  2642. contain more than security related material.
  2643. (currently a work in progress)
  2644.  
  2645. PART   #  URL                            Release Date
  2646. ------ -  ---------------------------- - -------------
  2647. - part 1: http://pastebin.com/FwjBMJib - Dec 30th,2011
  2648. - part 2: http://pastebin.com/R9gpVemL - Jan 3rd, 2012
  2649. - part 3: http://pastebin.com/vgj3qKDW - Jan 3rd, 2012
  2650. - part 4: http://pastebin.com/F1JcZHLz - Jan 5th, 2012
  2651. - version 5000:
  2652.           http://pastebin.com/M7ZwwVCA - Mar 6th, 2012
  2653. - version 6000:
  2654.                                        - Aug 31th, 2012
  2655. ------ -  ---------------------------- - -------------
  2656.  
  2657.              Thanks for reading!
  2658.  
  2659. If you enjoy this document please tell the admins of the
  2660. websites you visit from within this document where you
  2661. found them and provide them with a link to this
  2662. document.
  2663. =========================================================
  2664. Consideration #1: Are crossword puzzles and similar puzzles
  2665. published in print simply devices to alter the brain by
  2666. inserting carefully prepared words, phrases, and
  2667. numbers into your thought processes in order to trigger
  2668. or establish some type of action, or... connection.. to
  2669. something?
  2670.  
  2671. Consideration #2: What if all secret agencies were of one
  2672. accord spiritually, like in the paintings of dogs playing
  2673. poker, just using humanity to play out one big game of
  2674. destruction and domination with humans as the visible and
  2675. spiritual puppets?
  2676. =========================================================

Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.

Syntax highlighting:

To highlight particular lines, prefix each line with {%HIGHLIGHT}




All content is user-submitted.
The administrators of this site (kpaste.net) are not responsible for their content.
Abuse reports should be emailed to us at