HOME

Security and Encryption

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

A

Air Force Computer Emergency Response Team (AFCERT) - single point of contact in the Air Force for reporting and handling computer security incidents and vulnerabilities.

Anti-Relay: Stop Third-Party Mail Relay

B

because-we-can.com - Blue Adept, Curious George, Gipper, and sundry hacker friends post security alerts from their FreeBSD site.
BootLocker - provides PC password protection. Features include administrative, multiuser, and system tray support, and thorough logging.

C

Common Vulnerabilities and Exposures (CVE) - aims to standardize the names for all publicly known vulnerabilities and security exposures.

Computer Security Survey 1997 - investigation into the perceived and actual security risks of doing business online by Colin Germain

CypherNet

Cypherpunks - links to PGP, remailers, rants, various crypto-tools, newspaper clippings, and a good deal of other things.

D



E

Electronic Frontiers Georgia - offers privacy and anonymity information and downloads.

encryption and security information

F

Frank O'Dwyer's Security Sources - security-related source code.

Freedom - a web browser that combines online pseudonyms, powerful cryptography, and network technology for personal Internet security.

G



H

How Electronic Encryption Works & How It Will Change Your Business - discusses the business use of encryption, with the possible failure modes highlighted.

I



J



K



L

Leonardo - novel encryption paradigm based on the 4-color map theorem.

Linux FreeS/WAN - an implementation of IPSEC and IKE for Linux. It uses strong cryptography and builds secure tunnels through untrusted networks, resulting in a virtual private network.

LockMaster Encryption Utility - shareware encryption tool to prevent prying eyes from viewing your data.

M

Microsoft Security Advisor
MasterPass - a network utility to synchronize passwords.

N

NIST Computer Security Resource Clearinghouse

NT Security
Network Flight Recorder - Tamper-proof architecture and toolkit for building network traffic analysis and statistical event records.

O

Our Rights - discussion of the right of a US citizen to attempt to keep secrets, even from the government.

P

Pseudo-Random Number Conditioning - UNIX code for converting a source of entropy into effectively random byte streams.
P-Synch - password management toolkit.

Q



R



S

Safe Internet Programming

Safeguarding Your Technology - better understand why and how to effectively secure your organization's sensitive information, critical systems, computer equipment, and network access.

Secure Computing - reporting and reviewing all aspects of company IT Security.

Secure FileSystem (SFS) - a set of programs which create and manage a number of encrypted disk volumes, and runs under both DOS and Windows

Security Bugware - a source for UNIX and NT vulnerabilities with exploits, bugs, patches, descriptions and more.

Security Paper Archive - devoted to the collection and dissemination of computer security papers.

Security Portal - vendor of security hardware and software dedicated to providing security information to IT professionals.

SESAME project - (Secure European System for Applications in a Multi-vendor Environment.) Advanced distributed access control for the age of the open system.

SKIP - IP-level Encryption

SpyjureNet - tutorials on how to make and break security. Original source code and texts available.
Screensaver Application of Speaker Verification Algorithm - paper describing a screen saver protected by a voice identifcation program. Includes download.

Snake Oil Warning Signs: Encryption Software to Avoid - source of information on questionable cryptographic products.

Symantec Security Center - resource for consumers who need or want computer and network security-related information.

T

Tales of the Encrypted - puts cryptography in a historical context that gives meaning to what the technology is and what it can do.

Technotronic - full disclosure security information.

U

Using the Policy Editor (Poledit) in Windows 95 - to enhance workstation security. With emphasis on the school environment.

V

Virtually OnLine - download SEMS Personal e-mail encryption system for free.

W

Wietse's collection of tools and papers - Wietse Venema wrote tcp_wrappers and has made numerous other contributions to Internet security

X



Y



Z