Security and Encryption
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
A
Air Force Computer Emergency Response Team (AFCERT) - single point of contact in the Air Force for reporting and handling computer security incidents and vulnerabilities.
Anti-Relay: Stop Third-Party Mail Relay
B
because-we-can.com - Blue Adept, Curious George, Gipper, and sundry hacker friends post security alerts from their FreeBSD site.
BootLocker - provides PC password protection. Features include administrative, multiuser, and system tray support, and thorough logging.
C
Common Vulnerabilities and Exposures (CVE) - aims to standardize the names for all publicly known vulnerabilities and security exposures.
Computer Security Survey 1997 - investigation into the perceived and actual security risks of doing business online by Colin Germain
Cypherpunks - links to PGP, remailers, rants, various crypto-tools, newspaper clippings, and a good deal of other things.
E
Electronic Frontiers Georgia - offers privacy and anonymity information and downloads.
encryption and security information
F
Frank O'Dwyer's Security Sources - security-related source code.
Freedom - a web browser that combines online pseudonyms, powerful cryptography, and network technology for personal Internet security.
H
How Electronic Encryption Works & How It Will Change Your Business - discusses the business use of encryption, with the possible failure modes highlighted.
L
Leonardo - novel encryption paradigm based on the 4-color map theorem.
Linux FreeS/WAN - an implementation of IPSEC and IKE for Linux. It uses strong cryptography and builds secure tunnels through untrusted networks, resulting in a virtual private network.
LockMaster Encryption Utility - shareware encryption tool to prevent prying eyes from viewing your data.
M
Microsoft Security Advisor
MasterPass - a network utility to synchronize passwords.
N
NIST Computer Security Resource Clearinghouse
NT Security
Network Flight Recorder - Tamper-proof architecture and toolkit for building network traffic analysis and statistical event records.
O
Our Rights - discussion of the right of a US citizen to attempt to keep secrets, even from the government.
P
Pseudo-Random Number Conditioning - UNIX code for converting a source of entropy into effectively random byte streams.
P-Synch - password management toolkit.
Safeguarding Your Technology - better understand why and how to effectively secure your organization's sensitive information, critical systems, computer equipment, and network access.
Secure Computing - reporting and reviewing all aspects of company IT Security.
Secure FileSystem (SFS) - a set of programs which create and manage a number of encrypted disk volumes, and runs under both DOS and Windows
Security Bugware - a source for UNIX and NT vulnerabilities with exploits, bugs, patches, descriptions and more.
Security Paper Archive - devoted to the collection and dissemination of computer security papers.
Security Portal - vendor of security hardware and software dedicated to providing security information to IT professionals.
SESAME project - (Secure European System for Applications in a Multi-vendor Environment.) Advanced distributed access control for the age of the open system.
SpyjureNet - tutorials on how to make and break security. Original source code and texts available.
Screensaver Application of Speaker Verification Algorithm - paper describing a screen saver protected by a voice identifcation program. Includes download.
Snake Oil Warning Signs: Encryption Software to Avoid - source of information on questionable cryptographic products.
Symantec Security Center - resource for consumers who need or want computer and network security-related information.
T
Tales of the Encrypted - puts cryptography in a historical context that gives meaning to what the technology is and what it can do.
Technotronic - full disclosure security information.
U
Using the Policy Editor (Poledit) in Windows 95 - to enhance workstation security. With emphasis on the school environment.
V
Virtually OnLine - download SEMS Personal e-mail encryption system for free.
W
Wietse's collection of tools and papers - Wietse Venema wrote tcp_wrappers and has made numerous other contributions to Internet security