Computer Security Information and What You Can Do To Keep Your SystemSafe!

  • Thread starter Anand.Bhaskar.group.com
  • Start date
A

Anand.Bhaskar.group.com

..:: Unix and Linux Hacking and Security ::.
1. Unix - Vulnerabilities and Advisories
-- Tutorials and Papers
-- Specific Exploits and Vulnerabilities

2. Unix - Security Tools
-- Unix Security and Audit Tools (Including IDS and Access Control
Tools)
-- Unix Log Analysis Tools
-- Unix Proxies, Firewalls and Accessories
-- Unix Miscellany

3. Unix - BSD, FreeBSD, etc...
-- FreeBSD
-- BSD and Misc. BSD variants
-- BSD Security Tools
-- BSD Micro-distributions

4. Unix - Solaris, SunOS etc...
-- Solaris
-- SunOS
-- Cobalt Appliances
-- SunOS and Solaris Security Tools

5. Unix - Other Flavors (Irix, HPUX, AIX, etc...)
-- SGI/Irix
-- HP-UX
-- AIX
-- SCO
-- Miscellaneous

6. Linux - Vulnerabilities and Advisories
-- Linux - General Hacking
-- Linux Application Exploits
-- Linux - Red Hat Specific
-- Linux - Debian Specific

7. Linux - Security Tools
-- Linux - Intrusion Detection
-- Linux - Access Control
-- Linux Log Analysis Tools
-- Linux Rootkits
-- Linux Proxies and Firewalls
-- Linux - General Security and Audit Tools

8. Linux - Security-oriented mini- and micro-distributions
-- DMZS-Biatchux
-- NSA Security Enhanced Linux
-- Linux Mini- and Micro-distributions
-- Applications

..:: Windows Hacking and Security ::.
1. Windows Vulnerabilities, Advisories, and even security flaws
introduced by so-called security products!!!
-- Microsoft IIS Vulnerabilities
-- Microsoft FrontPage Vulnerabilities
-- Microsoft Internet Explorer Vulnerabilities
-- Windows Application Vulnerabilities
-- Windows Internet/Networking Vulnerabilities
-- Insecurities introduced by "security" programs!
-- Netscape Browsers
-- Windows Hacks - Miscellaneous

2. Windows Security and Auditing Tools
-- Windows Registry Tools
-- Windows and MSDOS Security and Auditing Tools
-- Windows Local Security
-- File/Disk/Log Shredders

3. Windows Miscellany
-- Raw Sockets and Custom Packet Building
-- A Few Little Extras for Microsoft "Fans"

..:: Crypto, Virology, Cracking and Backdoors ::.
1. Cryptography, Cryptanalysis, Steganography
-- Crypto: PGP and GPG
-- Crypto: Cryptanalysis
-- Crypto: Steganography
-- Crypto: Miscellaneous
-- Misc. File Encryptors

2. About Viruses and Worms
-- Virus Info Files and Advisories
-- Worms
-- Virus/Worm Protection Utilities

3. Backdoors, Trojans and defenses
-- Back Orifice and BO2K
-- SubSeven and Addons
-- Other Remote Administration Tools
-- Trojan Detectors/Removers/Retaliators
-- Information Files

..:: Learn what Hackers know, how they do it, and what you can do to
keep your system safe ::.
1. General Hacking Information
-- General Security Concepts
-- Antique Systems
-- Oracle
-- Tools, Advisories and Exploits affecting multiple platforms
-- PC Software and BIOS Hacking
-- Truly Miscellaneous Hacking Info

2. Password Security
-- Password Hacking
-- Password Generators
-- Password Security Audit Programs
-- Word Lists

3. Scanning, Fingerprinting and similar techniques
-- Network Scanning
-- "Wargames" Modem Carrier Scanning
-- Fingerprinting
-- Sniffing

4. How Hackers Attack Numerous Internet Services
-- Denial of Service Attacks
-- Email and News
-- Proxies and IP Spoofing
-- DNS and BIND
-- SPAM
-- FTP
-- General Unsorted Information
-- Indispensible Internet Utilities
-- Cable and DSL Info and Hacking

5. How Hackers Attack Web Servers, CGIs, PHP, ASP, etc...
-- Web Site Hacking - General and Miscellaneous
-- Web Site Hacking - Specific Sites
-- Web Site Hacking - Servers
-- Web Site Hacking - CGI, Perl, ASP, PHP etc.
-- Web BBSes
-- Web Site Hacking - Audit Tools

6. How Hackers attack IRC, Instant Messaging, and Multiplayer Games
-- ICQ Hacking
-- IRC Hacking, Scripts and Bots
-- AOL Instant Messenger (AIM)
-- Miscellaneous Chat/gaming Systems

7. Vulnerabilities found in Platforms with Smaller Market Share
-- Macintosh
-- PalmOS
-- Printers
-- Dedicated Network Appliances, Hubs, Routers, etc...
-- Cisco Equipment
-- Miscellaneous

8. How Hackers Attack Novell and 802.11b Networks
-- Novell Networks
-- Wireless LANs
-- X.25 Networks
-- Miscellaneous Networking Information

..:: Computer Security Information ::.
-- Access Control
-- Basics
-- Chat Systems
-- Cryptography
-- Denial Of Service
-- Hacking Security Groups
-- Hardening Securing Papers
-- ICQ
-- Intrusion Detection Systems
-- IRC
-- Miscellaneous
-- Network Auditing Secuirty Penetration
-- Online Privacy
-- Operating Systems
-- Protocols

..:: Phreaking - The black art of telephony ::.
1. GENERAL - General Information About the Phone Company
-- Hacking Answering Machines and Voice Mail
-- Phreaking Programs

2. Electronic Toll Fraud and Other Phone Devices
-- The Fixer's Box Review - Read this before you read the rest of
these files!
-- Blue and Green Boxes
-- Red Box
-- Beige and Bridge Boxes
-- Various new boxes
-- Programs to generate phreak tones

3. All about Payphones, COCOTs, BOCOTs, etc...
-- Payphones
-- COCOTs
-- Nortel/Quortech Millennium
-- Smart Cards/Phone Cards

4. Cellular Telephones and the Hacking Thereof
-- Cellular Phones by Manufacturer
-- Miscellaneous Info
-- Miscellaneous Utilities

5. Caller ID and ANI
-- Caller ID and CLASS
-- ANI and ANAC

6. Scans, numbers of interest
-- Lists of Phone Numbers

7. Sounds from the phone system
-- SIT Tones are said to thwart predictive dialers used by
Telemarketers!

..:: Security Publications ::.
-- Computer Incident Advisory Capability
-- Call And Response Telephone Compilations
-- Forbidden Knowledge
-- Keen Veracity
-- Lexxicor
-- Midnight Hackers Private Club
-- Phrack
-- Risks Forum Digest
-- Tricks Of The Trade
-- Underground Periodical

..:: Law, Privacy, Wetware, Hardware, File Sharing and more ::.
1. HARDWARE - Hardware, Electronics, Radio etc.
-- TEMPEST
-- Bugs and Listening Devices
-- Miscellaneous

2. Hackers and the Law
-- Copyright Law and Cases
-- Net Censorship
-- Cases involving 2600 Magazine
-- The SDMI affair
-- Brian West
-- September 11th Backlash Legislation
-- General Legal Bufu

3. About Napster, Gnutella, and other File Sharing schemes

4. About your dwindling privacy
-- Privacy Digest
-- Internet Privacy
-- Espionage
-- Privacy Deprivation Tools

5. Wetware Hacking!
-- Social Engineering and NLP
-- Seduction
-- Miscellaneous Wetware Hacking

6. Physical Security, Scams etc...
-- Physical Security and Countersecurity
-- Financial Crimes Detection and Prevention
-- Vending Machine Hacking

..:: The standards that define the Internet ::.
1. RFCs - Internet RFCs 3094 to 3195
-- Internet RFCs 3094 to 3195

2. Other Standards and Official Publications
-- US Department of Energy CIAC-2300 Documents
-- NIPC CyberNotes

--- Thank You ---

Source: http://www.fx-vista.com
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Members online

Forum statistics

Threads
473,982
Messages
2,570,190
Members
46,736
Latest member
zacharyharris

Latest Threads

Top