Pastebin launched a little side project called VERYVIRAL.com, check it out ;-) Want more features on Pastebin? Sign Up, it's FREE!
Guest

HUGE Security Resource+ - version 6000 - 08/31/2012

By: a guest on Aug 30th, 2012  |  syntax: None  |  size: 111.23 KB  |  views: 226  |  expires: Never
download  |  raw  |  embed  |  report abuse  |  print
This paste has a previous version, view the difference. Text below is selected. Please press Ctrl+C to copy to your clipboard. (⌘+C on Mac)
  1.  ===============================================================
  2.       HUGE Security Resource+ - version 6000 - 08/31/2012
  3.                    (Security + Trimmings!)
  4.  
  5. ,.-----> CHANGELOG:
  6. |
  7. | 1. Added a crazy amount of new links.
  8. | 2. Fixed 'OpenBSD' links incorrectly assigned to previous section 5000
  9. | 3. Merged 'Security Blogs' at bottom to proper section 6005
  10. | 4. Removed most titles/descriptions of links to reduce clutter & ease use
  11. |    While this may make it more difficult to find exactly what you're
  12. |    after, it's cleaner, leaner, and easier to navigate through. This
  13. |    is especially true for the guys maintaining this document. There is
  14. |    some labeling/titles here and there, but most of the heavily
  15. |    verbose titles/descriptions of various entries have been removed.
  16. | 5. Merged 'Pubs' & 'Forums' to 6007 & 6006
  17. | 6. Removed several duplicate and broken links
  18. | 7. Fixed some links (pages had moved) and a few typos
  19. | 8. Sorta sorted sections
  20. | 9. Renamed project title from 'HUGE Security Resource' to
  21. |    'HUGE Security Resource+', meaning, with this version and
  22. |    future versions this document will contain more than
  23. |    security related material. (currently a work in progress)
  24. |10. Released v.6000 despite a large number of remaining links we
  25. |    would like to include, but they will come with our next release.
  26. |___________________________________
  27. |
  28. | Sections, version 6000, 08/31/2012
  29. |
  30. | 6000: Wikipedia (all links here found within Wikipedia)
  31. | 6001: Suggested Books
  32. | 6002: Articles, Guides, How To's
  33. | 6003: Antivirus LiveCDs - boot and scan your system for malware
  34. | 6004: Random Links (flooded with links - to be organized soon)
  35. | 6005: Security Blogs
  36. | 6006: Security Forums (Web based Discussion Forums)
  37. | 6007: Security Magazines & Zines
  38. | 6008: Linux Anti-Malware Scanners
  39. | 6009: Linux Security
  40. |       \_ 6009.1 Articles
  41. |       \_ 6009.2 Tools
  42. |       \_ 6009.3 Various+
  43. | 6010: Windows Security Tools
  44. |___________________________________
  45.  
  46. ** 6000: Wikipedia :
  47.          (Some links aren't directly related to security.)
  48.          (This section may be split into different sections)
  49.          (in a future version.)
  50.  
  51. https://en.wikipedia.org/wiki/Acoustic_cryptanalysis
  52. https://en.wikipedia.org/wiki/Acoustic_fingerprint
  53. https://en.wikipedia.org/wiki/Advanced_Persistent_Threat
  54. https://en.wikipedia.org/wiki/Agent_handling
  55. https://en.wikipedia.org/wiki/Agent_provocateur
  56. https://en.wikipedia.org/wiki/Aircrack-ng
  57. https://en.wikipedia.org/wiki/Amateur_radio
  58. https://en.wikipedia.org/wiki/Anonymizer
  59. https://en.wikipedia.org/wiki/Anonymous_remailer
  60. https://en.wikipedia.org/wiki/ARP_poisoning
  61. https://en.wikipedia.org/wiki/ARP_spoofing
  62. https://en.wikipedia.org/wiki/Arpwatch
  63. https://en.wikipedia.org/wiki/Audio_signal_processing
  64. https://en.wikipedia.org/wiki/Automatic_Packet_Reporting_System
  65. https://en.wikipedia.org/wiki/Backdoor_%28computing%29
  66. https://en.wikipedia.org/wiki/Behavioral_targeting
  67. https://en.wikipedia.org/wiki/Bioacoustics
  68. https://en.wikipedia.org/wiki/BitTorrent_protocol_encryption
  69. https://en.wikipedia.org/wiki/Black_operation
  70. https://en.wikipedia.org/wiki/Black_propaganda
  71. https://en.wikipedia.org/wiki/Black_site
  72. https://en.wikipedia.org/wiki/Bluebugging
  73. https://en.wikipedia.org/wiki/Bluejacking
  74. https://en.wikipedia.org/wiki/Bluesnarfing
  75. https://en.wikipedia.org/wiki/BrainGate
  76. https://en.wikipedia.org/wiki/Category:Activism
  77. https://en.wikipedia.org/wiki/Category:Activism_by_method
  78. https://en.wikipedia.org/wiki/Category:Amateur_radio
  79. https://en.wikipedia.org/wiki/Category:American_spies
  80. https://en.wikipedia.org/wiki/Category:American_whistleblowers
  81. https://en.wikipedia.org/wiki/Category:Analysis
  82. https://en.wikipedia.org/wiki/Category:Applications_of_cryptography
  83. https://en.wikipedia.org/wiki/Category:Applied_ethics
  84. https://en.wikipedia.org/wiki/Category:Automatic_identification_and_data_capture
  85. https://en.wikipedia.org/wiki/Category:Barcodes
  86. https://en.wikipedia.org/wiki/Category:BitTorrent
  87. https://en.wikipedia.org/wiki/Category:Black_projects
  88. https://en.wikipedia.org/wiki/Category:Bluetooth
  89. https://en.wikipedia.org/wiki/Category:Books_about_the_Central_Intelligence_Agency
  90. https://en.wikipedia.org/wiki/Category:Branches_of_psychology
  91. https://en.wikipedia.org/wiki/Category:Central_Intelligence_Agency
  92. https://en.wikipedia.org/wiki/Category:Central_Intelligence_Agency_operations
  93. https://en.wikipedia.org/wiki/Category:Christianity
  94. https://en.wikipedia.org/wiki/Category:Christian_terms
  95. https://en.wikipedia.org/wiki/Category:Civil_disobedience
  96. https://en.wikipedia.org/wiki/Category:Codecs
  97. https://en.wikipedia.org/wiki/Category:Code_names
  98. https://en.wikipedia.org/wiki/Category:COINTELPRO_targets
  99. https://en.wikipedia.org/wiki/Category:Communication_of_falsehoods
  100. https://en.wikipedia.org/wiki/Category:Computational_linguistics
  101. https://en.wikipedia.org/wiki/Category:Computational_statistics
  102. https://en.wikipedia.org/wiki/Category:Computer_file_formats
  103. https://en.wikipedia.org/wiki/Category:Computer_networking
  104. https://en.wikipedia.org/wiki/Category:Computer_network_security
  105. https://en.wikipedia.org/wiki/Category:Computer_security
  106. https://en.wikipedia.org/wiki/Category:Computer_security_exploits
  107. https://en.wikipedia.org/wiki/Category:Computer_security_organizations
  108. https://en.wikipedia.org/wiki/Category:Computer_security_software
  109. https://en.wikipedia.org/wiki/Category:Concepts_in_ethics
  110. https://en.wikipedia.org/wiki/Category:Confidence_tricks
  111. https://en.wikipedia.org/wiki/Category:Conspiracy_theories
  112. https://en.wikipedia.org/wiki/Category:Counter-intelligence
  113. https://en.wikipedia.org/wiki/Category:Counter-terrorism
  114. https://en.wikipedia.org/wiki/Category:Counter-terrorist_organizations
  115. https://en.wikipedia.org/wiki/Category:Covert_organizations
  116. https://en.wikipedia.org/wiki/Category:Critical_thinking
  117. https://en.wikipedia.org/wiki/Category:Crowd_psychology
  118. https://en.wikipedia.org/wiki/Category:Cryptanalytic_devices
  119. https://en.wikipedia.org/wiki/Category:Cryptanalytic_software
  120. https://en.wikipedia.org/wiki/Category:Cryptographic_attacks
  121. https://en.wikipedia.org/wiki/Category:Cryptographic_hardware
  122. https://en.wikipedia.org/wiki/Category:Cryptography
  123. https://en.wikipedia.org/wiki/Category:Cybercrime
  124. https://en.wikipedia.org/wiki/Category:Cyberwarfare
  125. https://en.wikipedia.org/wiki/Category:Data_collection
  126. https://en.wikipedia.org/wiki/Category:Data_compression
  127. https://en.wikipedia.org/wiki/Category:Data_security
  128. https://en.wikipedia.org/wiki/Category:Data_transmission
  129. https://en.wikipedia.org/wiki/Category:Deception
  130. https://en.wikipedia.org/wiki/Category:Denial-of-service_attacks
  131. https://en.wikipedia.org/wiki/Category:Digital_signal_processing
  132. https://en.wikipedia.org/wiki/Category:Diversionary_tactics
  133. https://en.wikipedia.org/wiki/Category:Electronic_test_equipment
  134. https://en.wikipedia.org/wiki/Category:Electronic_warfare
  135. https://en.wikipedia.org/wiki/Category:Encodings
  136. https://en.wikipedia.org/wiki/Category:Encryption_devices
  137. https://en.wikipedia.org/wiki/Category:Espionage
  138. https://en.wikipedia.org/wiki/Category:Espionage_devices
  139. https://en.wikipedia.org/wiki/Category:Espionage_projects
  140. https://en.wikipedia.org/wiki/Category:Espionage_techniques
  141. https://en.wikipedia.org/wiki/Category:Etiquette
  142. https://en.wikipedia.org/wiki/Category:File_sharing_networks
  143. https://en.wikipedia.org/wiki/Category:Gambling_terminology
  144. https://en.wikipedia.org/wiki/Category:Hacking_%28computer_security%29
  145. https://en.wikipedia.org/wiki/Category:Historians_of_the_Central_Intelligence_Agency
  146. https://en.wikipedia.org/wiki/Category:History_of_radio
  147. https://en.wikipedia.org/wiki/Category:History_of_telecommunications
  148. https://en.wikipedia.org/wiki/Category:History_of_the_Internet
  149. https://en.wikipedia.org/wiki/Category:Injection_exploits
  150. https://en.wikipedia.org/wiki/Category:Intelligence_%28information_gathering%29
  151. https://en.wikipedia.org/wiki/Category:Intelligence_agencies
  152. https://en.wikipedia.org/wiki/Category:Intelligence_agencies_by_country
  153. https://en.wikipedia.org/wiki/Category:Intelligence_analysis
  154. https://en.wikipedia.org/wiki/Category:Intelligence_operations
  155. https://en.wikipedia.org/wiki/Category:International_security
  156. https://en.wikipedia.org/wiki/Category:Interrogation_techniques
  157. https://en.wikipedia.org/wiki/Category:Law_enforcement
  158. https://en.wikipedia.org/wiki/Category:Law_enforcement_equipment
  159. https://en.wikipedia.org/wiki/Category:Law_enforcement_techniques
  160. https://en.wikipedia.org/wiki/Category:Law_enforcement_terminology
  161. https://en.wikipedia.org/wiki/Category:Linux_security_software
  162. https://en.wikipedia.org/wiki/Category:Malware
  163. https://en.wikipedia.org/wiki/Category:Mass_surveillance
  164. https://en.wikipedia.org/wiki/Category:Media_manipulation
  165. https://en.wikipedia.org/wiki/Category:Metaphysics
  166. https://en.wikipedia.org/wiki/Category:Microscopy
  167. https://en.wikipedia.org/wiki/Category:Military_communications
  168. https://en.wikipedia.org/wiki/Category:Military_intelligence
  169. https://en.wikipedia.org/wiki/Category:Military_operations_by_type
  170. https://en.wikipedia.org/wiki/Category:Military_organization
  171. https://en.wikipedia.org/wiki/Category:Military_psychiatry
  172. https://en.wikipedia.org/wiki/Category:Military_science
  173. https://en.wikipedia.org/wiki/Category:Military_technology
  174. https://en.wikipedia.org/wiki/Category:Mind_control
  175. https://en.wikipedia.org/wiki/Category:Morse_code
  176. https://en.wikipedia.org/wiki/Category:National_security
  177. https://en.wikipedia.org/wiki/Category:National_Security_Agency
  178. https://en.wikipedia.org/wiki/Category:National_Security_Agency_encryption_devices
  179. https://en.wikipedia.org/wiki/Category:Network_addressing
  180. https://en.wikipedia.org/wiki/Category:Network_architecture
  181. https://en.wikipedia.org/wiki/Category:Network_management
  182. https://en.wikipedia.org/wiki/Category:Neuropsychology
  183. https://en.wikipedia.org/wiki/Category:Neuroscience
  184. https://en.wikipedia.org/wiki/Category:Non-fiction_books_about_espionage
  185. https://en.wikipedia.org/wiki/Category:Non-military_counter-terrorist_organizations
  186. https://en.wikipedia.org/wiki/Category:Nonverbal_communication
  187. https://en.wikipedia.org/wiki/Category:Operations_involving_special_forces
  188. https://en.wikipedia.org/wiki/Category:Organized_crime
  189. https://en.wikipedia.org/wiki/Category:Packet_radio
  190. https://en.wikipedia.org/wiki/Category:Paramilitary_organizations
  191. https://en.wikipedia.org/wiki/Category:People_of_the_Central_Intelligence_Agency
  192. https://en.wikipedia.org/wiki/Category:Perimeter_security
  193. https://en.wikipedia.org/wiki/Category:Persuasion_techniques
  194. https://en.wikipedia.org/wiki/Category:Philosophical_concepts
  195. https://en.wikipedia.org/wiki/Category:Philosophical_methodology
  196. https://en.wikipedia.org/wiki/Category:Philosophy
  197. https://en.wikipedia.org/wiki/Category:Philosophy_of_language
  198. https://en.wikipedia.org/wiki/Category:Privacy
  199. https://en.wikipedia.org/wiki/Category:Privacy_of_telecommunications
  200. https://en.wikipedia.org/wiki/Category:Problem_solving
  201. https://en.wikipedia.org/wiki/Category:Propaganda
  202. https://en.wikipedia.org/wiki/Category:Propaganda_in_the_United_States
  203. https://en.wikipedia.org/wiki/Category:Propaganda_techniques
  204. https://en.wikipedia.org/wiki/Category:Psychiatric_treatments
  205. https://en.wikipedia.org/wiki/Category:Psychological_manipulation
  206. https://en.wikipedia.org/wiki/Category:Psychological_warfare
  207. https://en.wikipedia.org/wiki/Category:Public-key_cryptography
  208. https://en.wikipedia.org/wiki/Category:Quantized_radio_modulation_modes
  209. https://en.wikipedia.org/wiki/Category:Radio
  210. https://en.wikipedia.org/wiki/Category:Religious_philosophy
  211. https://en.wikipedia.org/wiki/Category:Researchers_of_the_John_F._Kennedy_assassination
  212. https://en.wikipedia.org/wiki/Category:Research_methods
  213. https://en.wikipedia.org/wiki/Category:Rootkits
  214. https://en.wikipedia.org/wiki/Category:Secrecy
  215. https://en.wikipedia.org/wiki/Category:Secret_broadcasting
  216. https://en.wikipedia.org/wiki/Category:Secret_government_programs
  217. https://en.wikipedia.org/wiki/Category:Secret_military_programs
  218. https://en.wikipedia.org/wiki/Category:Security
  219. https://en.wikipedia.org/wiki/Category:Security_companies
  220. https://en.wikipedia.org/wiki/Category:Signals_intelligence
  221. https://en.wikipedia.org/wiki/Category:Signals_intelligence_agencies
  222. https://en.wikipedia.org/wiki/Category:Social_engineering_(computer_security)
  223. https://en.wikipedia.org/wiki/Category:Solid-state_computer_storage
  224. https://en.wikipedia.org/wiki/Category:Spies_by_role
  225. https://en.wikipedia.org/wiki/Category:Statistical_software
  226. https://en.wikipedia.org/wiki/Category:Steganography
  227. https://en.wikipedia.org/wiki/Category:Surveillance
  228. https://en.wikipedia.org/wiki/Category:Survival_skills
  229. https://en.wikipedia.org/wiki/Category:Telecommunications
  230. https://en.wikipedia.org/wiki/Category:Telegraphy
  231. https://en.wikipedia.org/wiki/Category:Theology
  232. https://en.wikipedia.org/wiki/Category:United_States_Department_of_Defense_agencies
  233. https://en.wikipedia.org/wiki/Category:United_States_government_secrecy
  234. https://en.wikipedia.org/wiki/Category:Video_hosting
  235. https://en.wikipedia.org/wiki/Category:Warfare_by_type
  236. https://en.wikipedia.org/wiki/Category:Whistleblowers_by_nationality
  237. https://en.wikipedia.org/wiki/Category:Wireless_networking
  238. https://en.wikipedia.org/wiki/Category:Works_about_espionage
  239. https://en.wikipedia.org/wiki/Central_Intelligence_Agency
  240. https://en.wikipedia.org/wiki/Chaffing_and_winnowing
  241. https://en.wikipedia.org/wiki/Christianity
  242. https://en.wikipedia.org/wiki/Church_Committee
  243. https://en.wikipedia.org/wiki/CIA_influence_on_public_opinion
  244. https://en.wikipedia.org/wiki/Citizens%27_Commission_to_Investigate_the_FBI
  245. https://en.wikipedia.org/wiki/Citizens_Rule_Book
  246. https://en.wikipedia.org/wiki/Clandestine_operation
  247. https://en.wikipedia.org/wiki/Cointelpro
  248. https://en.wikipedia.org/wiki/Cold_boot_attack
  249. https://en.wikipedia.org/wiki/Communications_Assistance_for_Law_Enforcement_Act
  250. https://en.wikipedia.org/wiki/Comparison_of_BitTorrent_clients
  251. https://en.wikipedia.org/wiki/Comparison_of_download_managers
  252. https://en.wikipedia.org/wiki/Comparison_of_portable_media_players
  253. https://en.wikipedia.org/wiki/Comparison_of_video_hosting_services
  254. https://en.wikipedia.org/wiki/Comparison_of_VoIP_software
  255. https://en.wikipedia.org/wiki/CompStat
  256. https://en.wikipedia.org/wiki/Computer_and_Internet_Protocol_Address_Verifier
  257. https://en.wikipedia.org/wiki/Computer_insecurity
  258. https://en.wikipedia.org/wiki/Computer_surveillance
  259. https://en.wikipedia.org/wiki/Confidence_trick
  260. https://en.wikipedia.org/wiki/Consensus_reality
  261. https://en.wikipedia.org/wiki/Covert_operation
  262. https://en.wikipedia.org/wiki/Cryptographic_hash_function
  263. https://en.wikipedia.org/wiki/Cut-out_%28espionage%29
  264. https://en.wikipedia.org/wiki/CyanogenMod
  265. https://en.wikipedia.org/wiki/Cygwin
  266. https://en.wikipedia.org/wiki/Data_acquisition
  267. https://en.wikipedia.org/wiki/Data_remanence
  268. https://en.wikipedia.org/wiki/Deep_packet_inspection
  269. https://en.wikipedia.org/wiki/Defense
  270. https://en.wikipedia.org/wiki/Dehumidifier
  271. https://en.wikipedia.org/wiki/Deluge_%28software%29
  272. https://en.wikipedia.org/wiki/Digital_signal_processing
  273. https://en.wikipedia.org/wiki/Digital_signature
  274. https://en.wikipedia.org/wiki/Digital_traces
  275. https://en.wikipedia.org/wiki/DNS_spoofing
  276. https://en.wikipedia.org/wiki/Doctrine_of_mental_reservation
  277. https://en.wikipedia.org/wiki/ECHELON
  278. https://en.wikipedia.org/wiki/Electrical_measurements
  279. https://en.wikipedia.org/wiki/Electromagnetic_interference
  280. https://en.wikipedia.org/wiki/Electromagnetic_pulse
  281. https://en.wikipedia.org/wiki/Electromagnetic_radiation_and_health
  282. https://en.wikipedia.org/wiki/Electromagnetic_shielding
  283. https://en.wikipedia.org/wiki/Electromagnetic_spectrum
  284. https://en.wikipedia.org/wiki/Electronic_signature
  285. https://en.wikipedia.org/wiki/EMF_measurement
  286. https://en.wikipedia.org/wiki/Espionage
  287. https://en.wikipedia.org/wiki/Executable_and_Linkable_Format
  288. https://en.wikipedia.org/wiki/Exploit_%28computer_science%29
  289. https://en.wikipedia.org/wiki/Fair_use
  290. https://en.wikipedia.org/wiki/Family_Jewels_%28Central_Intelligence_Agency%29
  291. https://en.wikipedia.org/wiki/Faraday_cage
  292. https://en.wikipedia.org/wiki/Fast_Fourier_Transform
  293. https://en.wikipedia.org/wiki/Forensic_linguistics
  294. https://en.wikipedia.org/wiki/Freedom_of_information
  295. https://en.wikipedia.org/wiki/Freedom_of_information_legislation
  296. https://en.wikipedia.org/wiki/Free_software
  297. https://en.wikipedia.org/wiki/Free_speech_zone
  298. https://en.wikipedia.org/wiki/Frequency_analysis
  299. https://en.wikipedia.org/wiki/Frequency_counter
  300. https://en.wikipedia.org/wiki/Fusion_center
  301. https://en.wikipedia.org/wiki/Gary_Webb
  302. https://en.wikipedia.org/wiki/Gutmann_method
  303. https://en.wikipedia.org/wiki/High-frequency_direction_finding
  304. https://en.wikipedia.org/wiki/Honeypot_%28computing%29
  305. https://en.wikipedia.org/wiki/Host_protected_area
  306. https://en.wikipedia.org/wiki/Hosts_file
  307. https://en.wikipedia.org/wiki/Htaccess
  308. https://en.wikipedia.org/wiki/HTTP_tunnel_(software)
  309. https://en.wikipedia.org/wiki/I2P
  310. https://en.wikipedia.org/wiki/IEEE_802.11i-2004
  311. https://en.wikipedia.org/wiki/IMSI-catcher
  312. https://en.wikipedia.org/wiki/Information_visualization
  313. https://en.wikipedia.org/wiki/Information_wants_to_be_free
  314. https://en.wikipedia.org/wiki/Infrasound
  315. https://en.wikipedia.org/wiki/Intelligence_collection_management
  316. https://en.wikipedia.org/wiki/International_Spy_Museum
  317. https://en.wikipedia.org/wiki/Internet_protocol_suite
  318. https://en.wikipedia.org/wiki/Iran-Contra_Affair
  319. https://en.wikipedia.org/wiki/John_F._Kennedy_assassination_conspiracy_theories
  320. https://en.wikipedia.org/wiki/Jury_nullification
  321. https://en.wikipedia.org/wiki/Laser_microphone
  322. https://en.wikipedia.org/wiki/Linux_malware
  323. https://en.wikipedia.org/wiki/List_of_CB_slang
  324. https://en.wikipedia.org/wiki/List_of_codecs
  325. https://en.wikipedia.org/wiki/List_of_con_artists
  326. https://en.wikipedia.org/wiki/List_of_confidence_tricks
  327. https://en.wikipedia.org/wiki/List_of_conspiracies_%28political%29
  328. https://en.wikipedia.org/wiki/List_of_counterintelligence_organizations
  329. https://en.wikipedia.org/wiki/List_of_countries_by_Failed_States_Index
  330. https://en.wikipedia.org/wiki/List_of_criminal_enterprises,_gangs_and_syndicates
  331. https://en.wikipedia.org/wiki/List_of_defunct_intelligence_agencies
  332. https://en.wikipedia.org/wiki/List_of_information_graphics_software
  333. https://en.wikipedia.org/wiki/List_of_intelligence_agencies
  334. https://en.wikipedia.org/wiki/List_of_intelligence_gathering_disciplines
  335. https://en.wikipedia.org/wiki/List_of_international_common_standards
  336. https://en.wikipedia.org/wiki/List_of_Linux_computer_viruses
  337. https://en.wikipedia.org/wiki/List_of_numerical_analysis_software
  338. https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers
  339. https://en.wikipedia.org/wiki/List_of_video_hosting_services
  340. https://en.wikipedia.org/wiki/MAC_address
  341. https://en.wikipedia.org/wiki/Magic_Lantern_%28software%29
  342. https://en.wikipedia.org/wiki/Md5
  343. https://en.wikipedia.org/wiki/Measuring_receiver
  344. https://en.wikipedia.org/wiki/Media_manipulation
  345. https://en.wikipedia.org/wiki/Microexpression
  346. https://en.wikipedia.org/wiki/Mind_control
  347. https://en.wikipedia.org/wiki/Mitrokhin_Archive
  348. https://en.wikipedia.org/wiki/Moscow_rules
  349. https://en.wikipedia.org/wiki/Musical_acoustics
  350. https://en.wikipedia.org/wiki/Music_cognition
  351. https://en.wikipedia.org/wiki/National_Cryptologic_Museum
  352. https://en.wikipedia.org/wiki/National_Security_Agency
  353. https://en.wikipedia.org/wiki/Nonverbal_communication
  354. https://en.wikipedia.org/wiki/Numbers_station
  355. https://en.wikipedia.org/wiki/OpenBSD_Journal
  356. https://en.wikipedia.org/wiki/OpenID
  357. https://en.wikipedia.org/wiki/Operation_Mockingbird
  358. https://en.wikipedia.org/wiki/Operation_Northwoods
  359. https://en.wikipedia.org/wiki/Operation_RAFTER
  360. https://en.wikipedia.org/wiki/Optical_microscope
  361. https://en.wikipedia.org/wiki/Organizationally_Unique_Identifier
  362. https://en.wikipedia.org/wiki/OSSEC
  363. https://en.wikipedia.org/wiki/Packet_radio
  364. https://en.wikipedia.org/wiki/Palantir_Technologies
  365. https://en.wikipedia.org/wiki/Panopticon
  366. https://en.wikipedia.org/wiki/Paralanguage
  367. https://en.wikipedia.org/wiki/Patriot_Act
  368. https://en.wikipedia.org/wiki/Perl
  369. https://en.wikipedia.org/wiki/Phishing
  370. https://en.wikipedia.org/wiki/Pod_slurping
  371. https://en.wikipedia.org/wiki/Police_code#The_Hundred_Code
  372. https://en.wikipedia.org/wiki/Port_forwarding
  373. https://en.wikipedia.org/wiki/Power_analysis
  374. https://en.wikipedia.org/wiki/Project_ARTICHOKE
  375. https://en.wikipedia.org/wiki/Project_Chatter
  376. https://en.wikipedia.org/wiki/Project_MINARET
  377. https://en.wikipedia.org/wiki/Project_MKDELTA
  378. https://en.wikipedia.org/wiki/Project_MKNAOMI
  379. https://en.wikipedia.org/wiki/Project_MKUltra
  380. https://en.wikipedia.org/wiki/Project_Shamrock
  381. https://en.wikipedia.org/wiki/Psikhushka
  382. https://en.wikipedia.org/wiki/Psychological_manipulation
  383. https://en.wikipedia.org/wiki/Psychological_Operations_%28United_States%29
  384. https://en.wikipedia.org/wiki/Public-key_cryptography
  385. https://en.wikipedia.org/wiki/QBittorrent
  386. https://en.wikipedia.org/wiki/Q_code
  387. https://en.wikipedia.org/wiki/QR_Code
  388. https://en.wikipedia.org/wiki/Radio_direction_finder
  389. https://en.wikipedia.org/wiki/Reality_mining
  390. https://en.wikipedia.org/wiki/Red_squad
  391. https://en.wikipedia.org/wiki/Reid_technique
  392. https://en.wikipedia.org/wiki/Richard_Stallman
  393. https://en.wikipedia.org/wiki/Rogue_DHCP
  394. https://en.wikipedia.org/wiki/Room_641A
  395. https://en.wikipedia.org/wiki/Rootkit
  396. https://en.wikipedia.org/wiki/Scopolamine#Use_in_interrogation
  397. https://en.wikipedia.org/wiki/Scrambler
  398. https://en.wikipedia.org/wiki/Screencast
  399. https://en.wikipedia.org/wiki/Secure_Communication
  400. https://en.wikipedia.org/wiki/Secure_computing
  401. https://en.wikipedia.org/wiki/Secure_digital_card
  402. https://en.wikipedia.org/wiki/Secure_telephone
  403. https://en.wikipedia.org/wiki/Security_engineering
  404. https://en.wikipedia.org/wiki/Seismology
  405. https://en.wikipedia.org/wiki/SheevaPlug
  406. https://en.wikipedia.org/wiki/Shellcode
  407. https://en.wikipedia.org/wiki/Shill
  408. https://en.wikipedia.org/wiki/Shortwave
  409. https://en.wikipedia.org/wiki/Shred_%28Unix%29
  410. https://en.wikipedia.org/wiki/Side_channel_attack
  411. https://en.wikipedia.org/wiki/Signal_analysis
  412. https://en.wikipedia.org/wiki/Silent_speech_interface
  413. https://en.wikipedia.org/wiki/Simulated_reality
  414. https://en.wikipedia.org/wiki/Situation_awareness
  415. https://en.wikipedia.org/wiki/Smartdust
  416. https://en.wikipedia.org/wiki/Snarfing
  417. https://en.wikipedia.org/wiki/Sneakernet
  418. https://en.wikipedia.org/wiki/Software_Defined_Radio
  419. https://en.wikipedia.org/wiki/Software_patent_debate
  420. https://en.wikipedia.org/wiki/Sound_synthesis
  421. https://en.wikipedia.org/wiki/Sousveillance
  422. https://en.wikipedia.org/wiki/Spectral_leakage
  423. https://en.wikipedia.org/wiki/Spectral_music
  424. https://en.wikipedia.org/wiki/Spectrogram
  425. https://en.wikipedia.org/wiki/Spectrometer
  426. https://en.wikipedia.org/wiki/Spectrum_analyzer
  427. https://en.wikipedia.org/wiki/Split_tunneling
  428. https://en.wikipedia.org/wiki/Spycatcher
  429. https://en.wikipedia.org/wiki/Spymaster
  430. https://en.wikipedia.org/wiki/Srm_%28Unix%29
  431. https://en.wikipedia.org/wiki/Stanford_prison_experiment
  432. https://en.wikipedia.org/wiki/STASI
  433. https://en.wikipedia.org/wiki/Steganography
  434. https://en.wikipedia.org/wiki/Stenomask
  435. https://en.wikipedia.org/wiki/Street_light_interference_phenomenon
  436. https://en.wikipedia.org/wiki/Subvocal_recognition
  437. https://en.wikipedia.org/wiki/Sysctl
  438. https://en.wikipedia.org/wiki/Telephone_tapping
  439. https://en.wikipedia.org/wiki/Tempest_%28codename%29
  440. https://en.wikipedia.org/wiki/Ten-code
  441. https://en.wikipedia.org/wiki/The_CIA_and_the_Cult_of_Intelligence
  442. https://en.wikipedia.org/wiki/The_COINTELPRO_Papers
  443. https://en.wikipedia.org/wiki/Thermal_insulation
  444. https://en.wikipedia.org/wiki/ThinThread
  445. https://en.wikipedia.org/wiki/Throat_microphone
  446. https://en.wikipedia.org/wiki/Timing_attack
  447. https://en.wikipedia.org/wiki/Tin_foil_hat
  448. https://en.wikipedia.org/wiki/Tor_%28anonymity_network%29
  449. https://en.wikipedia.org/wiki/Tradecraft
  450. https://en.wikipedia.org/wiki/Trailblazer_Project
  451. https://en.wikipedia.org/wiki/Transmission_%28BitTorrent_client%29
  452. https://en.wikipedia.org/wiki/TrapWire
  453. https://en.wikipedia.org/wiki/Trusted_computing
  454. https://en.wikipedia.org/wiki/Truth_drug
  455. https://en.wikipedia.org/wiki/United_States_government_security_breaches
  456. https://en.wikipedia.org/wiki/Van_Eck_phreaking
  457. https://en.wikipedia.org/wiki/Very_low_frequency
  458. https://en.wikipedia.org/wiki/Victor_Marchetti
  459. https://en.wikipedia.org/wiki/Virtual_private_network
  460. https://en.wikipedia.org/wiki/Voice_procedure
  461. https://en.wikipedia.org/wiki/Wi-Fi
  462. https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access
  463. https://en.wikipedia.org/wiki/Wireless_ad-hoc_network
  464. https://en.wikipedia.org/wiki/Wireless_mesh_network
  465. https://en.wikipedia.org/wiki/Wireless_security
  466. https://en.wikipedia.org/wiki/Write_amplification
  467. https://en.wikipedia.org/wiki/Writeprint
  468. https://en.wikipedia.org/wiki/WWV_%28radio_station%29#Standard_frequency_signals
  469. https://en.wikipedia.org/wiki/Yahweh
  470. https://en.wikipedia.org/wiki/Z_code
  471.  
  472. ----------------------------------------
  473.  
  474. ** 6001: Suggested Books:
  475.  
  476. - CLOAK & CORKSCREW: Where CIA Meets Hollywood
  477. - For the President's Eyes Only: Secret Intelligence and the American Presidency from Washington to Bush
  478. - Priceless: How I Went Undercover to Rescue the World's Stolen Treasures
  479. - Radio Frequency Interference: How to Find It and Fix It
  480. - SAS Survival Handbook, Revised Edition: For Any Climate, in Any Situation
  481. - Spycatcher - by Peter Wright
  482. - The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
  483. - Under and Alone: The True Story of the Undercover Agent Who Infiltrated America's Most Violent Outlaw Motorcycle Gang
  484.  
  485. ----------------------------------------
  486.  
  487. ** 6002: Articles, Guides, How To's:
  488.  
  489. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
  490. + (MS Kinect Spy System): http://www.pgpboard.com/viewtopic.php?f=2&t=691
  491. + (MS Kinect Spy System / Article mirrors): http://pastesite.com/41388 , http://paste.lisp.org/display/131227
  492. +
  493. + (Spies at MS? / Snippet): http://www.pgpboard.com/viewtopic.php?f=2&t=702
  494. + (Spies at MS? / Full Article): http://www.pcpro.co.uk/news/security/375169/could-us-cyberspies-have-moles-inside-microsoft
  495. + (Spies at MS? / Discussion): http://it.slashdot.org/story/12/06/15/1614219/us-security-services-may-have-moles-within-microsoft-says-researcher
  496. +
  497. + (links, tons of) http://www.loyola.edu/departments/academics/political-science/strategic-intelligence/index.html
  498. +
  499. http://aboba.drizzlehosting.com/IEEE/
  500. http://advocacy.globalvoicesonline.org/projects/guide/
  501. http://all.net/books/document/harvard.html
  502. http://all.net/journal/50/crypt.html
  503. http://all.net/journal/50/cybercop.html
  504. http://all.net/journal/50/ecommerce.html
  505. http://all.net/journal/50/firewall.html
  506. http://all.net/journal/deception/index.html
  507. http://all.net/journal/ntb/index.html
  508. http://arstechnica.com/information-technology/2012/06/blowing-away-bloatware-a-guide-to-reinstalling-windows-on-a-new-pc/
  509. http://arstechnica.com/information-technology/2012/07/freeing-your-router-from-ciscos-anti-porn-pro-copyright-cloud-service/
  510. http://arstechnica.com/tech-policy/news/2011/02/black-ops-how-hbgary-wrote-backdoors-and-rootkits-for-the-government.ars/
  511. http://arstechnica.com/uncategorized/2007/10/p2p-researchers-use-a-blocklist-or-you-will-be-tracked-100-of-the-time/
  512. http://asm.sourceforge.net/
  513. http://blog.bodhizazen.net/linux/ubuntu-how-to-faillog/
  514. http://blog.spoofed.org/2007/12/openbsd-on-soekris-cheaters-guide.html
  515. http://blog.webroot.com/2011/09/13/mebromi-the-first-bios-rootkit-in-the-wild/
  516. http://catless.ncl.ac.uk/risks
  517. http://citp.princeton.edu/research/memory/
  518. http://crunchbanglinux.org/wiki/configuring_the_openbox_menu
  519. http://cryptogon.com/?p=624
  520. http://cryptogon.com/?p=877
  521. http://cryptome.org/0002/siss.htm
  522. http://cryptome.org/0005/cia-iqt-spies.htm
  523. http://cryptome.org/0005/tor-opsec.htm
  524. http://cryptome.org/0006/nsa-17-docs.htm
  525. http://cryptome.org/2012/07/gent-forum-spies.htm
  526. http://cryptome.org/2012/08/tor-exits-usg-funds-02.htm
  527. http://cryptome.org/cisco-vile.txt
  528. http://cryptome.org/isp-spy/online-spying.htm
  529. http://cryptome.org/nsa-tempest.htm
  530. http://cryptome.org/nsa-vaneck.htm
  531. http://cryptome.org/tempest-law.htm
  532. http://cwe.mitre.org/top25/
  533. http://debian-handbook.info/browse/stable/
  534. http://digitalcorpora.org/
  535. http://en.community.dell.com/support-forums/software-os/w/microsoft_os/3316.2-1-microsoft-windows-7-official-iso-download-links-digital-river.aspx
  536. http://forums.radioreference.com/
  537. http://freehaven.net/anonbib/topic.html#Anonymous_20communication
  538. http://hardware.slashdot.org/story/08/10/20/1248234/compromising-wired-keyboards
  539. http://helpx.adobe.com/flash-player/kb/disable-local-shared-objects-flash.html
  540. http://it.slashdot.org/story/02/03/09/199242/crt-eavesdropping-optical-tempest
  541. http://it.slashdot.org/story/09/03/12/2038213/researchers-sniff-keystrokes-from-thin-air-wires
  542. http://it.slashdot.org/story/09/07/12/0259246/stealing-data-via-electrical-outlet
  543. http://joernfranz.net/2011/01/20/installing-ubuntu-10-10-with-full-disk-encryption/
  544. http://lanl.arxiv.org/
  545. http://lasecwww.epfl.ch/keyboard/
  546. http://lifehacker.com/205090/geek-to-live--set-up-a-personal-home-ssh-server?tag=softwarehomeserver
  547. http://lifehacker.com/237227/geek-to-live--encrypt-your-web-browsing-session-with-an-ssh-socks-proxy?tag=softwaressh
  548. http://linuxpoison.blogspot.com/2009/06/how-to-disable-loading-of-unnecessary.html
  549. http://log.nadim.cc/?p=78
  550. http://mnin.org/ (Twitter: https://twitter.com/iMHLv2)
  551. http://news.cnet.com/2010-1071-997528.html?tag=fd_nc_1 (Archived: http://pastebin.com/nHZzQyB9)
  552. http://packetlife.net/library/cheat-sheets/
  553. http://pastebin.com/E1YbqUMV
  554. http://pastebin.com/JdkqxBAa
  555. http://pastebin.com/mr5WT30M
  556. http://pastebin.com/Qf2jHhAb
  557. http://pastebin.com/TRXkVJ2k
  558. http://pastebin.com/utY08tLT
  559. http://pastebin.com/YEbM3Brv
  560. http://people.csail.mit.edu/rivest/crypto-security.html
  561. http://people.howstuffworks.com/individual-privacy-channel.htm
  562. http://people.howstuffworks.com/wiretapping1.htm
  563. http://pgp.mit.edu/
  564. http://projects.gnome.org/gdm/docs/2.14/configuration.html?pagewanted=all
  565. http://projects.wsj.com/surveillance-catalog/
  566. http://research.google.com/pubs/papers.html
  567. http://research.google.com/pubs/SecurityCryptographyandPrivacy.html
  568. https://ccrma.stanford.edu/papers
  569. http://security-sh3ll.blogspot.com/search/label/Papers
  570. https://events.ccc.de/congress/2005/static/p/r/o/Category~Projects_1780.html
  571. https://events.ccc.de/congress/2005/static/r/f/i/RFID-Zapper%28EN%29_77f3.html
  572. https://isc.sans.edu/port.html
  573. http://slashdot.org/story/01/01/16/139244/NSA-Reveals-Some-Tempest-Information
  574. https://live.gnome.org/GDM/2.22/Configuration
  575. https://memset.wordpress.com/2011/11/26/syscall-hijacking-openbsd/
  576. http://srg.cs.illinois.edu/srg/biblio
  577. https://secure.dslreports.com/forum/r27289884-Forensic-Cheat-Sheet
  578. https://torrentfreak.com/stop-downloading-fakes-and-junk-torrents-071204/
  579. https://w2.eff.org/Privacy/printers/docucolor/
  580. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/index.html
  581. https://www.cl.cam.ac.uk/~mgk25/emsec/optical-faq.html
  582. https://www.cl.cam.ac.uk/~mgk25/emsec/softtempest-faq.html
  583. https://www.defcon.org/html/links/book-list.html
  584. https://www.eff.org/issues/bloggers/legal/index
  585. https://www.eff.org/issues/printers
  586. https://www.eff.org/pages/list-printers-which-do-or-do-not-display-tracking-dots
  587. https://www.eff.org/testyourisp
  588. https://www.eff.org/wp/blog-safely
  589. https://www.eff.org/wp/detecting-packet-injection
  590. https://www.eff.org/wp/how-not-get-sued-file-sharing/
  591. https://www.gnu.org/philosophy/
  592. https://www.gnu.org/philosophy/why-free.html
  593. https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xml
  594. https://www.kuro5hin.org/story/2002/11/23/14927/477
  595. https://www.kuro5hin.org/story/2004/10/26/02313/946
  596. https://www.net-security.org/articles_main.php
  597. https://www.networkworld.com/news/2009/070909-electrical-data-theft.html
  598. https://www.pcworld.com/article/248995/how_to_install_windows_7_without_the_disc.html
  599. https://www.schneier.com/blog/archives/2005/09/snooping_on_tex.html
  600. https://www.schneier.com/blog/archives/2007/09/anonymity_and_t_1.html
  601. https://www.schneier.com/blog/archives/2007/11/hushmail_turns.html
  602. https://www.schneier.com/blog/archives/2007/12/maninthemiddle.html
  603. https://www.schneier.com/blog/archives/2009/04/identifying_peo.html
  604. https://www.schneier.com/blog/archives/2010/01/web_security.html
  605. https://www.schneier.com/blog/archives/2010/05/detecting_brows.html
  606. https://www.schneier.com/blog/archives/2010/09/real-time_nsa_e.html
  607. https://www.schneier.com/blog/archives/2010/12/tor_routers.html
  608. https://www.schneier.com/blog/archives/2011/03/detecting_words.html
  609. https://www.schneier.com/blog/archives/2011/03/identifying_tor.html
  610. https://www.schneier.com/blog/archives/2011/08/identifying_peo_2.html
  611. https://www.schneier.com/blog/archives/2011/09/identifying_spe.html
  612. https://www.schneier.com/blog/archives/2011/09/tor_arms_race.html
  613. https://www.schneier.com/blog/archives/2012/07/how_to_become_a_1.html
  614. https://www.schneier.com/essay-182.html
  615. https://www.schneier.com/essay-261.html
  616. https://www.schneier.com/essay-262.html
  617. https://www.usenix.org/publications/proceedings
  618. http://techgurulive.com/2008/09/15/how-to-monitor-and-be-informed-of-ip-address-changes-from-your-network/
  619. http://tech.slashdot.org/story/99/07/19/1324207/super-shielded-pc-cases
  620. http://virus.bartolich.at/virus-writing-HOWTO/_html/index.html
  621. http://web.archive.org/web/20040608141549/http://all.net/journal/netsec/1997-12.html
  622. http://web.archive.org/web/20060220113124/http://www.dss.mil/training/salinks.htm
  623. http://web.archive.org/web/20080222191230/http://the.jhu.edu/upe/2004/03/23/about-van-eck-phreaking/
  624. http://web.archive.org/web/20080820112134/http://www.crash-override.net/bogusdns.html
  625. http://web.archive.org/web/20090210035245/http://danieldegraaf.afraid.org/info/ipv6
  626. http://web.archive.org/web/20100916111512/http://www.ibiblio.org/security/articles/ports.html
  627. http://web.mit.edu/gtmarx/www/iron.html
  628. http://web.mit.edu/newsoffice/2012/camera-sees-around-corners-0321.html
  629. http://wiki.wireshark.org/Security
  630. http://www.ac6v.com/frequencies.htm
  631. http://www.afterdawn.com/guides/
  632. http://www.au.af.mil/info-ops/perception.htm
  633. http://www.backtrack-linux.org/tutorials/
  634. http://www.backtrack-linux.org/wiki/
  635. http://www.binarywolf.com/
  636. http://www.binarywolf.com/249/
  637. http://www.catb.org/jargon/
  638. http://www.ciphersbyritter.com/
  639. http://www.ciphersbyritter.com/GLOSSARY.HTM
  640. http://www.ciphersbyritter.com/RADELECT/LITES/LEDLITES.HTM
  641. http://www.ciphersbyritter.com/RADELECT/LITES/LITESFAQ.HTM
  642. http://www.ciphersbyritter.com/RADELECT/LITES/LITESHOT.HTM
  643. http://www.ciphersbyritter.com/RADELECT/LITES/XMSLITES.HTM
  644. http://www.cisco.com/en/US/solutions/ns340/ns414/ns742/ns744/landing_safe.html
  645. http://www.crypto.com/papers/
  646. http://www.cryptome.org/0002/nsa-tempest-01.zip
  647. http://www.cs.auckland.ac.nz/~pgut001/
  648. http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
  649. http://www.cs.tau.ac.il/~tromer/acoustic/
  650. http://www.cs.wright.edu/~pmateti/InternetSecurity/Lectures/Top/index.html
  651. http://www.dedoimedo.com/computers/linux-multi-boot.html
  652. http://www.developer.nokia.com/Community/Wiki/Category:Open_Source
  653. http://www.developer.nokia.com/Community/Wiki/Nokia_Open_Source
  654. http://www.dhra.mil/perserec/adr.html
  655. http://www.dhra.mil/perserec/products.html
  656. http://www.domenech.org/homebrew-sdr/receiver-1.htm
  657. http://www.ehow.com/how_8242473_display-ip-addresses-network.html
  658. http://www.engadget.com/2005/11/15/how-to-build-a-wifi-biquad-dish-antenna/
  659. http://www.epanorama.net/documents/telecom/telephone_intercom.html
  660. http://www.ethicalhacker.net/content/view/22/2/
  661. http://www.exploit-db.com/papers/
  662. http://www.faqs.org/docs/Linux-HOWTO/XDMCP-HOWTO.html
  663. http://www.febo.com/pages/baudline/
  664. http://www.febo.com/time-freq/FMT/technique/index.html
  665. http://www.forensicswiki.org/
  666. http://www.garykessler.net/library/fsc_stego.html
  667. http://www.gnupg.org/
  668. http://www.heinz.cmu.edu/~acquisti/research.htm
  669. http://www.ibm.com/developerworks/library/l-keyc2/
  670. http://www.ibm.com/developerworks/library/l-keyc3/
  671. http://www.ibm.com/developerworks/library/l-keyc/index.html
  672. http://www.ieee-security.org/cipher.html
  673. http://www.ieee-security.org/TC/SP-Index.html
  674. http://www.ihr.org/jhr/v09/v09p305_Marchetti.html
  675. http://www.informit.com/articles/article.aspx?p=23463&rll=1
  676. http://www.itworld.com/security/64193/researchers-find-ways-sniff-keystrokes-thin-air
  677. http://www.l0t3k.org/programming/docs/reverse/
  678. http://www.linux-sec.net/Firewall/HowTo/ja.net.private.html
  679. http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager03.html
  680. http://www.madboa.com/geek/dig/
  681. http://www.madboa.com/geek/gpg-quickstart/
  682. http://www.madboa.com/geek/openssl/
  683. http://www.madboa.com/geek/openssl/#digest-file
  684. http://www.madboa.com/geek/pine-ssl/
  685. http://www.madboa.com/geek/soho-bind/
  686. http://www.neilgunton.com/doc/index.html?o=1&doc_id=8580
  687. http://www.neowin.net/forum/topic/934274-freeware-alternative-list/
  688. http://www.nononsenseselfdefense.com/five_stages.html
  689. http://www.omgubuntu.co.uk/
  690. http://www.openrce.org/articles/
  691. http://www.oreillynet.com/cs/weblog/view/wlg/448
  692. http://www.oreillynet.com/topics/wireless/802.11
  693. http://www.phrack.org/issues.html?issue=62&id=6
  694. http://www.phrack.org/issues.html?issue=66&id=11#article
  695. http://www.phrack.org/issues.html?issue=66&id=15#article
  696. http://www.phrack.org/issues.html?issue=66&id=7#article
  697. http://www.popsci.com/technology/article/2012-07/seeing-through-walls-wireless-router
  698. http://www.radioreference.com/
  699. http://www.rfidvirus.org/index.html
  700. http://www.securityfocus.com/columnists/442/2
  701. http://www.securityfocus.com/news/11372
  702. http://www.social-engineer.org/framework/Social_Engineering_Framework
  703. http://www.symantec.com/connect/articles/forensic-analysis-live-linux-system-pt-1
  704. http://www.symantec.com/connect/articles/forensic-analysis-live-linux-system-pt-2
  705. http://www.symantec.com/connect/articles/ip-spoofing-introduction
  706. http://www.symantec.com/connect/articles/reverse-engineering-hostile-code
  707. http://www.symantec.com/connect/articles/sebek-3-tracking-attackers-part-one
  708. http://www.symantec.com/connect/articles/sebek-3-tracking-attackers-part-two
  709. http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics
  710. http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-ii-combat-strategies
  711. http://www.symantec.com/connect/articles/wireless-forensics-tapping-air-part-one
  712. http://www.symantec.com/connect/articles/wireless-forensics-tapping-air-part-two
  713. http://www.theregister.co.uk/2012/07/11/multi_platform_backdoor/
  714. http://www.tuxradar.com/content/learn-hack/
  715. http://www.vanwensveen.nl/rants/microsoft/IhateMS.html
  716. http://www.wiley.com/legacy/compbooks/mcnamara/links.html
  717. http://www.williamson-labs.com/laser-mic.htm
  718. http://www.zurich.ibm.com/security/idemix/
  719. http://yro.slashdot.org/story/99/10/25/2039238/declassified-tempest-material-comes-online
  720. http://yro.slashdot.org/story/99/11/08/093250/coming-to-a-desktop-near-you-tempest-capabilities
  721. (PDF, EPUB, MOBI, leads to) http://debian-handbook.info/get/now/
  722. (PDF) ftp://ftp.tapr.org/software_lib/ether/Ham_Ethernet_GBPPR.pdf
  723. (PDF) http://ai.eller.arizona.edu/COPLINK/publications/CACM_From%20Fingerprint%20to%20Writeprint.pdf
  724. (PDF) http://cryptome.org/2012/06/ci-glossary.pdf
  725. (PDF) http://csrc.nist.gov/publications/nistpubs/800-59/SP800-59.pdf
  726. (PDF) http://csrc.nist.gov/publications/nistpubs/800-84/SP800-84.pdf
  727. (PDF) http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdf
  728. (PDF) http://lanl.arxiv.org/pdf/1004.1267v1
  729. (PDF) http://lanl.arxiv.org/pdf/1109.0597v2
  730. (PDF) http://lanl.arxiv.org/pdf/1110.5395v3
  731. (PDF) http://lanl.arxiv.org/pdf/1204.0447v1
  732. (PDF) http://lanl.arxiv.org/pdf/1208.2877v1
  733. (PDF) http://packetstormsecurity.org/filedesc/Practical_Onion_Hacking.pdf.html
  734. (PDF) http://packetstormsecurity.org/files/65944/tempest.pdf
  735. (PDF) http://srgsec.cs.uiuc.edu/bootjacker.pdf
  736. (PDF) http://srgsec.cs.uiuc.edu/cloaker.pdf
  737. (PDF) http://sunnyday.mit.edu/book2.pdf
  738. (PDF) https://www.cl.cam.ac.uk/%7Emgk25/ieee02-optical.pdf
  739. (PDF) https://www.cl.cam.ac.uk/~mgk25/ih98-tempest.pdf
  740. (PDF) https://www.cl.cam.ac.uk/~mgk25/pet2004-fpd.pdf
  741. (PDF) https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-577.pdf
  742. (PDF) https://www.eff.org/sites/default/files/packet_injection_0.pdf
  743. (PDF) https://www.usenix.org/events/sec09/tech/full_papers/sec09_attacks.pdf
  744. (PDF) http://vulnfactory.org/research/defcon-remote.pdf
  745. (PDF) http://www.cl.cam.ac.uk/~mgk25/ches2005-limits.pdf
  746. (PDF) http://www.cl.cam.ac.uk/~mgk25/ieee02-optical.pdf
  747. (PDF) http://www.cl.cam.ac.uk/~mgk25/ih98-tempest.pdf
  748. (PDF) http://www.cl.cam.ac.uk/~mgk25/ih99-stegfs.pdf
  749. (PDF) http://www.cl.cam.ac.uk/~mgk25/pet2004-fpd.pdf
  750. (PDF) http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-577.pdf
  751. (PDF) http://www.crysys.hu/skywiper/skywiper.pdf
  752. (PDF) http://www.cs.wright.edu/%7Epmateti/InternetSecurity/Lectures/TCPexploits/sec-tcpip.pdf
  753. (PDF) http://www.fas.org/irp/eprint/nsa-interview.pdf
  754. (PDF) http://www.governmentattic.org/2docs/Hist_US_COMSEC_Boak_NSA_1973.pdf
  755. (PDF) http://www.medienwissenschaft.hu-berlin.de/medientheorien/forschung/downloads/hausarbeiten/em-sniffer.pdf
  756. (PDF) http://www.rfidvirus.org/papers/percom.06.pdf
  757. (PDF) http://www.toucan-system.com/research/blackhat2012_brossard_hardware_backdooring.pdf
  758. (PDF) http://www-users.cs.umn.edu/%7Edfrankow/files/lam-etrics2006-security.pdf
  759. (PDF) http://www-users.cs.umn.edu/%7Edfrankow/files/privacy-sigir2006.pdf
  760. (PDF, leads to)
  761. (PDF, leads to a) http://about-threats.trendmicro.com/ebooks/are-you-protecting-the-data-packets-in-your-pocket/
  762. (PDF, leads to a) http://ojs.academypublisher.com/index.php/jnw/article/view/jnw0702259266
  763. (PDF, leads to a) https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-577.html
  764. (PDF, leads to a) https://www.usenix.org/conference/usenixsecurity12/feasibility-side-channel-attacks-brain-computer-interfaces
  765. (PDF, leads to a) http://ubuntu-manual.org/downloads
  766. (PDF, leads to) http://anonymouse.org/cgi-bin/anon-www.cgi/http://www.popsci.com/diy/article/2006-09/stop-dropped-calls
  767. (PDF, leads to) https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-577.html
  768. (PDF, leads to) http://wikileaks.org/wiki/Cryptome.org_takedown:_Microsoft_Global_Criminal_Compliance_Handbook,_24_Feb_2010
  769. (PDF, PS, leads to) http://cacr.uwaterloo.ca/hac/
  770. (PDF, PS, PPT, DOC, TXT, leads to) http://www.cs.washington.edu/education/courses/csep590/06wi/
  771. (PDFs, leads to) http://all.net/Analyst/index.html
  772. (PDFs, leads to) http://reality.media.mit.edu/publications.php
  773. (PDFs, leads to) https://citizenlab.org/2012/07/from-bahrain-with-love-finfishers-spy-kit-exposed/3/
  774. (PDFs, leads to) http://srgsec.cs.illinois.edu/Welcome.html
  775. (PDFs, leads to) http://sunnyday.mit.edu/
  776. (PDFs, leads to) https://www.cl.cam.ac.uk/~mgk25/
  777. (PDFs, leads to) https://www.cl.cam.ac.uk/~mgk25/publications.html
  778. (PDFs, leads to) https://www.cl.cam.ac.uk/research/security/publications/
  779. (PDFs, leads to) https://www.cl.cam.ac.uk/~rja14/book.html
  780. (PDFs, leads to) http://web.archive.org/web/20071228064639/http://www.computer.org/portal/site/csdl/index.jsp
  781. (PDFs, leads to) http://www.amsat.org/amsat/intro/faqs.html
  782. (PDFs, leads to) http://www.navsea.navy.mil/nswc/dahlgren/Leading%20Edge/default.aspx
  783. (PDFs, leads to) http://www.pgpi.org/doc/guide/
  784. (PDFs, leads to) http://www.raulsiles.com/en/Research.html
  785. (PDFs, leads to) http://www-users.cs.umn.edu/~dfrankow/pubs.htm
  786. (PDFs, PS, leads to) http://hd.media.mit.edu/TechnicalReportsList.html
  787. (PDFs, PS, leads to) https://wwws.cs.umn.edu/tech_reports_upload/
  788. (PDFs, PSs, BibTeX, leads to) http://www.freehaven.net/anonbib/
  789. recon.cx - (Various Media Formats, leads to) http://2005.recon.cx/recon2005/papers/
  790. recon.cx - (Various Media Formats, leads to) http://2006.recon.cx/en/f/
  791. recon.cx - (Various Media Formats, leads to) http://recon.cx/2008/speakers.html
  792. recon.cx - (Various Media Formats, leads to) http://recon.cx/2010/speakers.html
  793. recon.cx - (Various Media Formats, leads to) http://recon.cx/2012/schedule/index.en.html
  794. recon.cx - (Videos, leads to               ) http://archive.org/details/RECON2008
  795. recon.cx - (Videos, leads to               ) http://archive.org/search.php?query=%22recon%202011%22
  796. recon.cx - (Videos, leads to               ) http://archive.org/search.php?query=recon%202005%20AND%20mediatype%3Amovies
  797. recon.cx - (Videos, leads to               ) http://archive.org/search.php?query=recon%202006%20AND%20mediatype%3Amovies
  798. recon.cx - (Videos, leads to               ) http://archive.org/search.php?query=recon%202012%20AND%20mediatype%3Amovies
  799. (various document formats, leads to) http://www.grouplens.org/biblio
  800. (various types of media, links to) https://www.defcon.org/html/links/defcon-media-archives.html
  801. (videos, leads to) http://web.media.mit.edu/~sandy/videos.html
  802. ----------------------------------------
  803.  
  804. ** 6003: Antivirus LiveCDs - boot and scan your system for malware
  805.  
  806. + AVG:
  807. http://www.avg.com/us-en/avg-rescue-cd-download
  808.  
  809. + AVG ARL: The latest release version of the AVG Rescue CD GNU/Linux (ARL) with daily updated virus database,
  810. latest alpha or beta version of the ARL and all the resources needed to build the ARL from scratch.
  811. Releases are signed!
  812. https://share.avg.com/arl
  813.  
  814. + Avira:
  815. https://www.avira.com/en/download/product/avira-antivir-rescue-system
  816.  
  817. + BitDefender:
  818. http://download.bitdefender.com/rescue_cd/
  819.  
  820. + Comodo Rescue Disk (CRD):
  821. https://www.comodo.com/business-security/network-protection/rescue-disk.php
  822.  
  823. + Dr.Web LiveCD & LiveUSB:
  824. http://www.freedrweb.com/livecd/
  825. http://www.freedrweb.com/liveusb/
  826.  
  827. + F-Secure:
  828. https://www.f-secure.com/en/web/labs_global/removal-tools/-/carousel/view/142
  829. https://www.f-secure.com/en/web/labs_global/removal-tools
  830.  
  831. + Kaspersky:
  832. http://support.kaspersky.com/faq/?qid=208282173
  833. http://support.kaspersky.com/viruses/rescuedisk?level=2
  834. http://forum.kaspersky.com/index.php?showforum=159
  835.  
  836. + Microsoft Windows Defender Offline:
  837. https://connect.microsoft.com/systemsweeper
  838.  
  839. ----------------------------------------
  840.  
  841. ** 6004: Random Links
  842.          (In a future version these links will each have their own new sections,)
  843.          (since we've moved beyond mere security related links! As such, many of these links are not security oriented)
  844.          (This section may appear now to be one big random blob of links, but with our next version, there will spring)
  845.          (up several new sections of which these will be filed into. We wanted to push this out as a preview of how)
  846.          (we're expanding beyond security links.)
  847.  
  848. + Tormail Hidden Service (Requires Tor in order to use):
  849. + Tor Mail @Hidden Service: http://jhiwjjlqpyawmpjx.onion/
  850. + Tor Mail Intro @Clearnet: http://www.tormail.org/
  851. #
  852. # (large resource) http://blockyourid.com/~gbpprorg/
  853. # (large resource) http://blockyourid.com/~gbpprorg/mil/
  854. # http://blockyourid.com/~gbpprorg/mil/vaneck/index.html
  855. # (large resource) http://www.qsl.net/n9zia/
  856. # mirrors: http://www.gbppr.org , http://projects1.gbppr.org/ , http://gbppr.dyndns.org/
  857. #
  858. + Acoustic Surveillance of Physically Unmodified PCs by Michael LeMay and Jack Tan
  859. + (PDF) (original but broken link) http://seclab.uiuc.edu/pubs/LeMayT06.pdf
  860. + (PDF) (found but haven't verified source) http://blockyourid.com/~gbpprorg/mil/vaneck/LeMayT06.pdf
  861. +
  862. (archive) http://mympxplayer.org/
  863. http://10minutemail.com
  864. http://4hv.org/e107_plugins/forum/forum.php
  865. http://500px.com/
  866. http://500px.com/MarcinSobas
  867. http://ai.bpa.arizona.edu/
  868. http://alphabetizer.flap.tv/
  869. http://amecisco.com/
  870. http://anythingbutipod.com/
  871. http://anythingbutipod.com/forum/
  872. http://applefritter.com/
  873. http://applefritter.com/forum
  874. http://archive.org/create/
  875. http://archive.org/details/bittorrent
  876. http://arstechnica.com/
  877. http://arstechnica.com/civis/
  878. http://artsandlettersdaily.com/
  879. http://arxiv.org/
  880. http://ask.metafilter.com/
  881. http://askubuntu.com/
  882. http://attrition.org/
  883. http://attrition.org/mirror/
  884. http://batteryuniversity.com/
  885. http://betanews.com/
  886. http://bibliodyssey.blogspot.com/
  887. http://biosbits.org/
  888. http://blog.bodhizazen.net/
  889. http://blog.makezine.com/
  890. http://blogs.amd.com/
  891. http://blogs.scientificamerican.com/
  892. http://blogs.valvesoftware.com/linux/steamd-penguins/
  893. http://boingboing.net/
  894. http://boston.com/bigpicture/
  895. http://browserspy.dk/
  896. http://busybox.net/
  897. http://cdburnerxp.se/
  898. http://centralops.net/co/
  899. http://classical-music-online.net/
  900. http://commons.wikimedia.org/
  901. http://consumerist.com/
  902. http://cubesat.calpoly.edu/
  903. http://cwe.mitre.org/
  904. http://cybernetnews.com/
  905. http://cygwin.com/
  906. http://cylinders.library.ucsb.edu/index.php
  907. http://dedoimedo.com/
  908. http://depositfiles.com/
  909. http://digg.com/
  910. http://diit.sourceforge.net/
  911. http://distrowatch.com/
  912. http://dmml.asu.edu/resources
  913. http://documentaryheaven.com/
  914. http://doihaveadeadpixel.com/
  915. http://drudgereport.com/
  916. http://en.memory-alpha.org/wiki/Portal:Main
  917. http://en.rsf.org/
  918. http://fab.cba.mit.edu/
  919. http://faststone.org/
  920. http://faxzero.com/
  921. http://fcw.com/Home.aspx
  922. http://filecrop.com/
  923. http://forum.crucial.com/
  924. http://forum.japantoday.com/
  925. http://forum.notebookreview.com/
  926. http://forums.anandtech.com/
  927. http://forums.computeractive.co.uk/
  928. http://forums.fedoraforum.org/
  929. http://forums.linuxmint.com
  930. http://forums.overclockers.com.au
  931. http://forums.techarena.in/
  932. http://forums.wi-fiplanet.com/
  933. http://freeculture.org/
  934. http://fsi-language-courses.org
  935. http://gizmodo.com/
  936. http://glassgiant.com/ascii/
  937. http://gonullyourself.com/
  938. http://groupmedia.media.mit.edu/
  939. http://hardocp.com/
  940. http://hd.media.mit.edu/
  941. http://hintsforums.macworld.com/
  942. http://howtogrowtobacco.com/forum/
  943. http://howto.wired.com/wiki/Main_Page
  944. http://html.adobe.com/
  945. http://imakeprojects.com/Projects/wifi-heartbeat/
  946. http://imgur.com/
  947. http://improveverywhere.com/
  948. http://info.ee.surrey.ac.uk/Personal/Z.Kalal/tld.html
  949. http://ip-check.info
  950. http://issihosts.com/haveged/
  951. http://jesus-is-savior.com/
  952. http://lanl.arxiv.org/
  953. http://la-samhna.de/library/rootkits/detect.html
  954. http://leakdirectory.org/index.php/Leak_Site_Directory
  955. http://lifehacker.com/
  956. http://linuxmanpages.com/
  957. http://linuxmint.com/
  958. http://linuxpoison.blogspot.com/
  959. http://linuxscrew.com/
  960. http://mail.yandex.com/
  961. http://memegenerator.net/
  962. http://mentalfloss.com/
  963. http://meta.wikimedia.org/
  964. http://mindjustice.org/
  965. http://mitnicksecurity.com/
  966. http://multiupload.nl/
  967. http://mybannermaker.com/
  968. http://mympx.org/
  969. http://narus.com/
  970. http://naturalnews.com/
  971. http://news.cnet.com/
  972. http://news.cnet.com/cheapskate/
  973. http://news.cnet.com/tech-blogs/
  974. http://news.netcraft.com/
  975. http://nmap-online.com/
  976. http://online.wsj.com/
  977. http://onpointtactical.com/
  978. http://onstrat.com/osint/#startingpoints
  979. http://oreilly.com/blogs/
  980. http://oyc.yale.edu/
  981. http://packetstormsecurity.org/
  982. http://pastebin.com/KNtCVkpN
  983. http://patriotmemory.com/
  984. http://pdos.csail.mit.edu/~baford/vm/
  985. http://people.csail.mit.edu/mrub/vidmag/
  986. http://personal.ee.surrey.ac.uk/Personal/L.Wood/constellations/index.html
  987. http://photomuse.org/
  988. http://pipl.com/
  989. http://portforward.com/
  990. http://preyproject.com/
  991. http://project-byzantium.org/
  992. http://projects.washingtonpost.com/top-secret-america/
  993. http://qubes-os.org/
  994. http://rense.com/
  995. http://rfidguardian.org/
  996. http://rootzwiki.com/
  997. http://samate.nist.gov/index.php/Source_Code_Security_Analyzers.html
  998. https://blog.mozilla.org/
  999. https://blog.mozilla.org/addons/
  1000. https://blog.mozilla.org/beyond-the-code/
  1001. https://blog.mozilla.org/bhearsum/
  1002. https://blog.mozilla.org/blog/author/chrismozillacom/
  1003. https://blog.mozilla.org/blog/category/firefox/
  1004. https://blog.mozilla.org/calendar/
  1005. https://blog.mozilla.org/futurereleases/
  1006. https://blog.mozilla.org/gen/
  1007. https://blog.mozilla.org/it/
  1008. https://blog.mozilla.org/labs/
  1009. https://blog.mozilla.org/ligong/
  1010. https://blog.mozilla.org/mobile/
  1011. https://blog.mozilla.org/nnethercote/
  1012. https://blog.mozilla.org/privacy/
  1013. https://blog.mozilla.org/services/
  1014. https://blog.mozilla.org/theden/
  1015. https://blog.mozilla.org/thunderbird/
  1016. https://blog.mozilla.org/tilt/
  1017. https://blog.mozilla.org/webdev/
  1018. https://blog.mozilla.org/website-archive/
  1019. http://schizophrenia.com/
  1020. http://sclipo.com/
  1021. https://code.google.com/p/corkami/
  1022. https://code.google.com/p/googlecl/
  1023. https://community.rapid7.com/community/infosec/blog/2012/08/08/finfisher
  1024. https://creativecommons.org/
  1025. http://screenshots.debian.net/
  1026. http://searchengineland.com/
  1027. https://en.wikipedia.org/wiki/Bing_Mobile#Bing_411
  1028. https://en.wikipedia.org/wiki/List_of_PDF_software
  1029. https://en.wikipedia.org/wiki/Main_Page
  1030. https://epic.org/
  1031. https://epic.org/privacy/tools.html
  1032. https://fedoraproject.org/
  1033. https://freedom-to-tinker.com/
  1034. https://github.com/djrbliss/rose-exploit
  1035. http://slashdot.org/
  1036. http://slickdeals.net/
  1037. https://lists.apple.com/mailman/listinfo/security-announce
  1038. https://mashable.com/
  1039. https://one.ubuntu.com/services/
  1040. http://soundcloud.com/
  1041. http://sourceforge.net/projects/diit/
  1042. http://sourceforge.net/projects/nfienfcollector/
  1043. https://panopticlick.eff.org/
  1044. http://species.wikimedia.org/
  1045. http://spectrum.ieee.org/
  1046. http://spectrum.ieee.org/blogs
  1047. http://spectrum.ieee.org/blog/tech-talk
  1048. http://spectrum.mit.edu/articles/normal/fab-lab/ (article)
  1049. https://personaltelco.net/wiki
  1050. http://spywareinfoforum.com/
  1051. https://s3.amazonaws.com/data.tumblr.com/tumblr_lxyvchLFXx1r1ylbfo1_500.jpg
  1052. https://secure.dslreports.com/faq
  1053. http://stallman.org/
  1054. https://torrentfreak.com/
  1055. https://twitter.com/corkami
  1056. http://support.ntp.org/bin/view/Support/WebHome
  1057. http://swann.com
  1058. https://www.amnesty.org/
  1059. https://www.blackhat.com/index.html
  1060. https://www.ccc.de/
  1061. https://www.cert.org/
  1062. https://www.chillingeffects.org/
  1063. https://www.commondreams.org/
  1064. https://www.computerworld.com/
  1065. https://www.defcon.org/
  1066. https://www.defcon.org/html/links/dc-tools.html
  1067. https://www.eff.org/
  1068. https://www.eff.org/deeplinks/
  1069. https://www.eff.org/pages/switzerland-network-testing-tool
  1070. https://www.erowid.org/
  1071. https://www.flickr.com/
  1072. https://www.grc.com
  1073. https://www.imagineshop.co.uk/
  1074. https://www.infoworld.com/
  1075. https://www.libreoffice.org/
  1076. https://www.linuxquestions.org/
  1077. https://www.linuxquestions.org/questions/
  1078. https://www.mi5.gov.uk/
  1079. https://www.microsoft.com/communities/forums/default.mspx
  1080. https://www.microsoft.com/security/scanner/en-us/default.aspx
  1081. https://www.myspace.com/
  1082. https://www.networkworld.com/
  1083. https://www.npr.org/blogs/health/
  1084. https://www.opendns.com/technology/dnscrypt/
  1085. https://www.propublica.org/
  1086. https://www.safe-mail.net/
  1087. https://www.sans.org/
  1088. https://www.technologyreview.com/computing/
  1089. https://www.un.org/
  1090. https://www.un.org/en/documents/udhr/index.shtml
  1091. https://www.youtube.com/
  1092. https://www.youtube.com/results?search_query=Randy+Quaid+Star+Whackers
  1093. https://www.youtube.com/ucberkeley
  1094. http://techliberation.com/
  1095. http://technorati.com/
  1096. http://techreport.com/
  1097. http://techreport.com/forums/
  1098. http://thebrowser.com/
  1099. http://topdocumentaryfilms.com/
  1100. http://totse2.com/
  1101. http://trapkit.de/
  1102. http://truth-out.org/
  1103. http://turnoffyourtv.com/
  1104. http://tutvid.com
  1105. http://ubuntuforums.org/
  1106. http://urlget.sourceforge.net/
  1107. http://usahitman.com/
  1108. http://vigilantcitizen.com/
  1109. http://vigilantcitizen.com/vcboards/
  1110. http://web.archive.org/web/20040202004210/http://www.cs.auckland.ac.nz/~pgut001/links.html
  1111. http://web.archive.org/web/20040206214035/http://www.cs.auckland.ac.nz/~pgut001/links/archives.html
  1112. http://web.archive.org/web/20060831063210/http://faculty.ncwc.edu/toconnor/reform.htm
  1113. http://web.archive.org/web/20060831063224/http://faculty.ncwc.edu/toconnor/data.htm
  1114. http://web.archive.org/web/20060831081811/http://faculty.ncwc.edu/toconnor/thnktank.htm
  1115. http://web.archive.org/web/20070207050215/http://faculty.ncwc.edu/toconnor/sources.htm
  1116. http://web.archive.org/web/20070217052232/http://faculty.ncwc.edu/TOConnor/427/427links.htm
  1117. http://webcast.berkeley.edu/
  1118. http://web.media.mit.edu/~sandy/
  1119. http://web.mit.edu/mitei/news/index.html
  1120. http://web.mit.edu/newsoffice/
  1121. http://web.mit.edu/zacka/www/midas.html
  1122. http://web.mit.edu/zacka/www/projects.html
  1123. http://wificamera.propositions.org.uk/
  1124. http://wificamera.propositions.org.uk/Panoramic-Wifi-Camera
  1125. http://wiki.echelon2.org/wiki/Main_Page
  1126. http://wikitravel.org/
  1127. http://wisp.wikispaces.com
  1128. http://www1.informatik.uni-erlangen.de/tresor
  1129. http://www.4shared.com/
  1130. http://www.5min.com/
  1131. http://www.academicearth.org/
  1132. http://www.aclu.org/
  1133. http://www.addictivetips.com/
  1134. http://www.allmyfaves.com/
  1135. http://www.anandtech.com/
  1136. http://www.au.af.mil/au/awc/awcgate/awc-ndex.htm
  1137. http://www.au.af.mil/au/awc/awcgate/awc-port.htm
  1138. http://www.au.af.mil/au/awc/awcgate/awc-ref.htm
  1139. http://www.au.af.mil/au/awc/awcgate/awc-thkg.htm
  1140. http://www.au.af.mil/au/awc/awcgate/awc-thkg.htm#critical
  1141. http://www.avforums.com/forums/
  1142. http://www.bashoneliners.com/
  1143. http://www.bbb.org/
  1144. http://www.bbc.co.uk/iplayer/radio
  1145. http://www.betabeat.com/
  1146. http://www.bloomberg.com/news/worldwide/
  1147. http://www.bluesnews.com/
  1148. http://www.brainpickings.org/
  1149. http://www.brickhousesecurity.com/
  1150. http://www.brokentoaster.com/butterflymp3/index.html
  1151. http://www.bugmenot.com/
  1152. http://www.businessweek.com/
  1153. http://www.buzzfeed.com/
  1154. http://www.cbradiotalk.com/index.php
  1155. http://www.cerias.purdue.edu/
  1156. http://www.chromium.org/
  1157. http://www.cicentre.com/
  1158. http://www.codecademy.com/
  1159. http://www.complaints.com/
  1160. http://www.consumerworld.org/
  1161. http://www.copyscape.com/
  1162. http://www.coreboot.org/
  1163. http://www.coreboot.org/SeaBIOS
  1164. http://www.cosmolearning.com/
  1165. http://www.cracked.com/
  1166. http://www.crucial.com
  1167. http://www.cryptome.org/
  1168. http://www.c-spanvideo.org/videoLibrary/
  1169. http://www.cultdeadcow.com/
  1170. http://www.cyberciti.biz/
  1171. http://www.dafont.com/
  1172. http://www.dailymotion.com/
  1173. http://www.damninteresting.com/
  1174. http://www.defectivebydesign.org/
  1175. http://www.differencebetween.net/
  1176. http://www.digital-detective.co.uk/
  1177. http://www.digital-digest.com/index.php
  1178. http://www.disclose.tv/
  1179. http://www.disclose.tv/forum/
  1180. http://www.discoverbing.com/mobile
  1181. http://www.dlib.indiana.edu/collections/
  1182. http://www.dmoz.org/Computers/Internet/E-mail/Spam/Preventing/Temporary_Addresses/
  1183. http://www.dogbitelaw.com/
  1184. http://www.doom9.org/
  1185. http://www.downforeveryoneorjustme.com/
  1186. http://www.economist.com/
  1187. http://www.ehow.com/
  1188. http://www.emaildiscussions.com/
  1189. http://www.endangeredlanguages.com/
  1190. http://www.engadget.com
  1191. http://www.engadget.com/
  1192. http://www.epanorama.net/index2.php?section=documents&index=audio
  1193. http://www.evga.com/forums/
  1194. http://www.ew.com/ew/
  1195. http://www.eweek.com/
  1196. http://www.extremetech.com/
  1197. http://www.fabathome.org/
  1198. http://www.fakenamegenerator.com/
  1199. http://www.fark.com/
  1200. http://www.filestube.com/
  1201. http://www.folkstreams.net/
  1202. http://www.forbes.com/
  1203. http://www.freerepublic.com
  1204. http://www.freesoftwaremagazine.com/
  1205. http://www.ft.com/
  1206. http://www.gamefront.com/
  1207. http://www.gameinformer.com/
  1208. http://www.geekstogo.com/forum/
  1209. http://www.giveawayoftheday.com/
  1210. http://www.gizmag.com/
  1211. http://www.godlikeproductions.com
  1212. http://www.groklaw.net/
  1213. http://www.gutenberg.org/wiki/Main_Page
  1214. http://www.gwu.edu/~nsarchiv/
  1215. http://www.hackermedia.org/
  1216. http://www.head-fi.org/f/
  1217. http://www.hellomagazine.com/
  1218. http://www.hitb.org/
  1219. http://www.howcast.com/
  1220. http://www.howstuffworks.com/
  1221. http://www.hulu.com/
  1222. http://www.i2p2.de/
  1223. http://www.ibiblio.org/
  1224. http://www.ic3.gov/default.aspx
  1225. http://www.imdb.com/title/tt0071360/
  1226. http://www.imdb.com/title/tt0120660/
  1227. http://www.imdb.com/title/tt0128278/
  1228. http://www.imdb.com/title/tt0308808/
  1229. http://www.imdb.com/title/tt0489037/
  1230. http://www.inchem.org/
  1231. http://www.informationclearinghouse.info/
  1232. http://www.informationweek.com/
  1233. http://www.infowars.com/
  1234. http://www.internetnews.com/
  1235. http://www.inventgeek.com/blog/
  1236. http://www.irfanview.com/
  1237. http://www.itworld.com/
  1238. http://www.itworld.com/blogs/sandra-henry-stocker
  1239. http://www.japantoday.com/
  1240. http://www.jjtc.com/Security/stegtools.htm
  1241. http://www.jjtc.com/Steganography/
  1242. http://www.khanacademy.org/
  1243. http://www.ladyada.net/make/
  1244. http://www.ladyada.net/make/mintyboost/index.html
  1245. http://www.ladyada.net/make/minty/index.html
  1246. http://www.last.fm/
  1247. http://www.linuxfoundation.org/
  1248. http://www.lipstickalley.com/
  1249. http://www.liveleak.com/
  1250. http://www.mail-archive.com/
  1251. http://www.mcgrewsecurity.com/tools/msramdmp/
  1252. http://www.mediafire.com/
  1253. http://www.medicalnewstoday.com/
  1254. http://www.metafilter.com/
  1255. http://www.minutemanproject.com/
  1256. http://www.myfishtank.net/forum/
  1257. http://www.nasdaq.com/
  1258. http://www.nationaldefensemagazine.org
  1259. http://www.nationmaster.com/
  1260. http://www.neowin.net/
  1261. http://www.neowin.net/forum/
  1262. http://www.net.princeton.edu/software/dhcp_probe/
  1263. http://www.nist.gov/public_affairs/tech-beat (archives:) http://www.nist.gov/public_affairs/tech-beat/archives.cfm
  1264. http://www.nutsvolts.com/
  1265. http://www.nutsvolts.com/index.php?/blog/
  1266. http://www.officer.com/
  1267. http://www.ok.co.uk/home/
  1268. http://www.okmagazine.com/
  1269. http://www.omgubuntu.co.uk/
  1270. http://www.opcva.com/watchdog/
  1271. http://www.openculture.com/
  1272. http://www.openrightsgroup.org/
  1273. http://www.openstreetmap.org/
  1274. http://www.opentopia.com/hiddencam.php
  1275. http://www.open-video.org/
  1276. http://www.osnews.com/
  1277. http://www.patriotmemory.com/forums
  1278. http://www.pbs.org/
  1279. http://www.pbs.org/wgbh/pages/frontline/
  1280. http://www.people.com/people/
  1281. http://www.phonescoop.com/
  1282. http://www.phoronix.com/
  1283. http://www.phoronix.com/forums/
  1284. http://www.pool.ntp.org/en/
  1285. http://www.princeton.edu/WebMedia/lectures/
  1286. http://www.printfriendly.com/
  1287. http://www.psychologytoday.com/
  1288. http://www.quora.com/
  1289. http://www.qwiki.com/
  1290. http://www.radaronline.com/
  1291. http://www.raspberrypi.org/
  1292. http://www.readprint.com/
  1293. http://www.reddit.com/
  1294. http://www.reuters.com/
  1295. http://www.rollingstone.com/
  1296. http://www.rootkit.nl/projects/lynis.html
  1297. http://www.rssweather.com
  1298. http://www.scientificamerican.com/article.cfm?id=hackers-can-steal-from-reflections
  1299. http://www.seabios.org/SeaBIOS
  1300. http://www.seattle.intel-research.net/wisp/
  1301. http://www.shacknews.com/
  1302. http://www.sigsac.org/
  1303. http://www.slashfilm.com/
  1304. http://www.slashgear.com/
  1305. http://www.songkick.com/
  1306. http://www.soyouwanna.com/
  1307. http://www.spamhaus.org/
  1308. http://www.spychips.com/
  1309. http://www.stallman.org/
  1310. http://www.stallman.org/archives/
  1311. http://www.sutree.com/
  1312. http://www.synchtube.com/
  1313. http://www.tcpipguide.com/free/t_toc.htm
  1314. http://www.techdirt.com/
  1315. http://www.technologyreview.com/
  1316. http://www.tech-recipes.com/
  1317. http://www.techspot.com/
  1318. http://www.techsupportforum.com/
  1319. http://www.techsupportforum.com/forums/
  1320. http://www.ted.com/
  1321. http://www.theregister.co.uk/
  1322. http://www.theverge.com/
  1323. http://www.thisiscolossal.com/
  1324. http://www.thoughtcrime.org/software/sslsniff/
  1325. http://www.timeanddate.com/worldclock/
  1326. http://www.tmz.com/
  1327. http://www.tomshardware.com/index.html
  1328. http://www.tuxradar.com/
  1329. http://www.tvguide.com/
  1330. http://www.ubuntu.com/
  1331. http://www.urbandictionary.com/
  1332. http://www.usbwifi.orconhosting.net.nz/
  1333. http://www.ustream.tv/
  1334. http://www.vanityfair.com/
  1335. http://www.variety.com/Home/
  1336. http://www.videojug.com/
  1337. http://www.vidipedia.org/
  1338. http://www.wardriving.com/
  1339. http://www.warriorsofthe.net/index.html
  1340. http://www.weather.com/
  1341. http://www.webcitation.org/
  1342. http://www.wi-fiplanet.com/
  1343. http://www.wikibooks.org/
  1344. http://www.wikihow.com/Main-Page
  1345. http://www.wikileaks.org/
  1346. http://www.wikinews.org/
  1347. http://www.wikipedia.org/
  1348. http://www.wikiquote.org/
  1349. http://www.wikisource.org/
  1350. http://www.wikiversity.org/
  1351. http://www.wiktionary.org/
  1352. http://www.winsupersite.com/
  1353. http://www.winsupersite.com/blogcontent/supersite-blog-39
  1354. http://www.wired.com/
  1355. http://www.wired.com/about/blogs
  1356. http://www.wireimage.com/
  1357. http://www.wotsit.org/
  1358. http://www.xnview.com/
  1359. http://www.youtube-mp3.org/
  1360. http://www.zoklet.net/
  1361. http://www.zophar.net/
  1362. http://zombiehunters.org/forum/
  1363. (magazine) http://www.linuxidentity.com/
  1364. (online virus scanner) https://www.virustotal.com/
  1365. (online virus scanner) http://virusscan.jotti.org/en
  1366. (PDF)  http://csrc.nist.gov/publications/nistir/7316/NISTIR-7316.pdf
  1367. (PDFs, leads to) http://dmml.asu.edu/research/pubs
  1368. (PDFs, leads to) http://groupmedia.media.mit.edu/publications.php
  1369. (PDFs, leads to) http://hd.media.mit.edu/badges/publications.html
  1370. (PDFs, leads to) http://linuxnewmedia.com/Products/Print
  1371. (PDFs, leads to) http://www.public.asu.edu/~huanliu/publications.html
  1372. (PDFs, leads to) http://www.public.asu.edu/~huanliu/sbp09/program.html
  1373. (PDFs, leads to) http://www.seattle.intel-research.net/pubs.php
  1374. (PDFs, PPTs, leads to) http://www.public.asu.edu/~huanliu/sbp08/program.html
  1375. (Power Pwn) http://hardware.slashdot.org/story/12/07/22/0335223/the-darpa-funded-power-strip-that-will-hack-your-network
  1376. (Power Pwn) http://pwnieexpress.com/
  1377. (Power Pwn) http://pwnieexpress.com/blogs/news
  1378. (Power Pwn) http://www.zdnet.com/power-pwn-this-darpa-funded-power-strip-will-hack-your-network-7000001331/
  1379. (Power Pwn - PDF) http://cryptome.org/2012/07/cbp072312.pdf
  1380. (view PDFs online!) http://view.samurajdata.se/
  1381. ----------------------------------------
  1382.  
  1383. ** 6005: Security Blogs:
  1384.  
  1385. #
  1386. # Most Powerful Voices in Security Who are the Top 25?
  1387. # The Rest of the Top 100 -
  1388. # * 100 security guru's listed with their Twitter pages
  1389. # and personal/blog sites: (Sep. 8, 2011) Posted here as one
  1390. # link rather than posting around 100 Twitter personal pages.
  1391. # http://www.sys-con.com/node/1974029
  1392. #
  1393. +
  1394. + http://blog.layeredsec.com/ (Archive) - https://twitter.com/brycegalbraith (Author moved to Twitter)
  1395. +
  1396. + (archive) https://pinvoke.wordpress.com/
  1397. +
  1398. + (archive) http://superantispyware.com/blog/
  1399. +
  1400. + (click month at right for archives) https://yorkporc.wordpress.com/
  1401. *
  1402. * https://wiki.debian.org/FreedomBox
  1403. *
  1404. +
  1405. + http://anonymouse.org/cgi-bin/anon-www.cgi/http://www.malwaredomainlist.com/
  1406. + (via Anonymouse because of ban on Tor exit nodes)
  1407. +
  1408. + http://anonymouse.org/cgi-bin/anon-www.cgi/http://www.securitywire.com/
  1409. + (via Anonymouse to evade Tor exit node ban)
  1410. +
  1411. + (archive) http://www.teamfurry.com/wordpress/
  1412. +
  1413. + (archive) http://securityincite.com/blog/mike-rothman
  1414. +
  1415. + http://anonymouse.org/cgi-bin/anon-www.cgi/http://robert.penz.name/
  1416. + (via Anonymouse: Tor exit node ban evasion by proxy)
  1417. +
  1418. http://aconaway.com/
  1419. http://anonymous.livelyblog.com/
  1420. http://anti-virus-rants.blogspot.com/
  1421. http://bgpmon.net/blog/
  1422. http://blog.brickhousesecurity.com/
  1423. http://blog.c22.cc/
  1424. http://blog.clamav.net/
  1425. http://blog.commandlinekungfu.com/
  1426. http://blog.crysys.hu/
  1427. http://blog.cuckoosandbox.org/
  1428. http://blog.cyberwar.nl/
  1429. http://blog.deepsec.net/
  1430. http://blog.didierstevens.com/
  1431. http://blog.emsisoft.com/
  1432. http://blog.eset.com/
  1433. http://blog.fireeye.com/research
  1434. http://blog.gerhards.net/
  1435. http://blog.ine.com/
  1436. http://blog.infosanity.co.uk/
  1437. http://blog.ioshints.info/
  1438. http://blog.lse.epita.fr/
  1439. http://blog.mandiant.com/
  1440. http://blog.oxff.net/
  1441. http://blog.rootshell.be/
  1442. http://blogs.appriver.com/
  1443. http://blogs.cisco.com/category/security
  1444. http://blog.secureideas.net/
  1445. http://blog.security4all.be/
  1446. http://blogs.iss.net/
  1447. http://blog.snort.org/
  1448. http://blogs.pcmag.com/securitywatch/
  1449. http://blog.spiderlabs.com/
  1450. http://blog.spywareguide.com/
  1451. http://blogs.securiteam.com/
  1452. http://blog.stopbadware.org/
  1453. http://blog.tenablesecurity.com/
  1454. http://blog.threatexpert.com/
  1455. http://blog.trendmicro.com/
  1456. http://blog.tsa.gov/
  1457. http://blog.uncommonsensesecurity.com/
  1458. http://blog.watchfire.com/wfblog/
  1459. http://blog.webroot.com/
  1460. http://blog.zoller.lu/
  1461. http://blog.zx2c4.com/
  1462. http://blog.zynamics.com/
  1463. http://brandonjcarroll.com/
  1464. http://cansecwest.com/
  1465. http://carnal0wnage.attackresearch.com/
  1466. http://cerias.purdue.edu/site/blog/author/spaf
  1467. http://chargen.matasano.com/
  1468. http://chris-intel-corner.blogspot.com/
  1469. http://chuvakin.blogspot.com/
  1470. http://ciscoiseasy.blogspot.com/
  1471. http://coffeetocode.net/
  1472. http://community.websense.com/blogs/securitylabs/
  1473. http://community.websense.com/blogs/securitylabs/default.aspx
  1474. http://computer-forensics.sans.org/blog
  1475. http://computer-forensics.sans.org/blog/
  1476. http://computer.forensikblog.de/en/
  1477. http://comsecllc.blogspot.com/
  1478. http://contagiodump.blogspot.com/
  1479. http://cryptocomb.org/
  1480. http://crypto.stanford.edu/
  1481. http://cyb3rcrim3.blogspot.com/
  1482. http://cyberspeak.libsyn.com/
  1483. http://dankaminsky.com/
  1484. http://darkreading.com/
  1485. http://daveshackleford.com/
  1486. http://ddanchev.blogspot.com/
  1487. http://ddos.arbornetworks.com/
  1488. http://deadliestwebattacks.com/
  1489. http://deepsec.net/
  1490. http://dhs-daily-report.blogspot.com/
  1491. http://digfor.blogspot.com/
  1492. http://digitalforensicsisascience.blogspot.com
  1493. http://dshield.org/
  1494. http://dvlabs.tippingpoint.com/blog
  1495. http://dvlabs.tippingpoint.com/blog/
  1496. http://elie.im/blog/
  1497. http://emergentchaos.com/
  1498. http://erratasec.blogspot.com/
  1499. http://etherealmind.com/category/blog/
  1500. http://etherealmind.com/category/blog/security/
  1501. http://eusecwest.com/
  1502. http://evilrouters.net/
  1503. http://fasthorizon.blogspot.com/
  1504. http://forensicaliente.blogspot.com/
  1505. http://forensicfocus.blogspot.com/
  1506. http://forensicmethods.com/
  1507. http://forensicsfromthesausagefactory.blogspot.com/
  1508. http://fraudwar.blogspot.com/
  1509. http://fumalwareanalysis.blogspot.com/
  1510. http://garwarner.blogspot.com/
  1511. http://girlunallocated.blogspot.com
  1512. http://gleeda.blogspot.com/
  1513. http://googleonlinesecurity.blogspot.com/
  1514. http://grandstreamdreams.blogspot.com/
  1515. http://gregsowell.com/
  1516. http://ha.ckers.org/blog (Archive)
  1517. http://hackingcisco.blogspot.com/
  1518. http://holisticinfosec.blogspot.com/
  1519. http://honeyblog.org/
  1520. http://inciweb.org/
  1521. http://infolookup.securegossip.com/
  1522. http://infosecisland.com/
  1523. http://intelnews.org/
  1524. http://invisiblethings.org/
  1525. http://it-audit.sans.org/blog/
  1526. http://jeremiahgrossman.blogspot.com/
  1527. http://jessekornblum.livejournal.com/
  1528. http://journeyintoir.blogspot.com/
  1529. http://justaskweg.com/
  1530. http://krebsonsecurity.com/
  1531. http://labs.m86security.com/ (Archive)
  1532. http://lastwatchdog.com/
  1533. http://log.nadim.cc
  1534. http://lonesysadmin.net/
  1535. http://maliciousattacker.blogspot.com/
  1536. http://marienfeldt.com/
  1537. http://mnin.org/
  1538. http://nakedsecurity.sophos.com/
  1539. http://netsecurity.about.com/
  1540. http://netsecurity.about.com/compute/netsecurity/
  1541. http://network-101.blogspot.com/
  1542. http://news.cnet.com/security
  1543. http://news.hitb.org/
  1544. http://news.softpedia.com/cat/Security/
  1545. http://news.techworld.com/security/
  1546. http://offensivecoder.com/blog/
  1547. http://p4r4n0id.com/ (appears to be gone, we'll see)
  1548. http://packetlife.net/blog/
  1549. http://packetstormsecurity.org/news/
  1550. http://pacsec.jp/
  1551. http://paranoia.dubfire.net/ (Home: http://www.dubfire.net/) (Twitter: https://twitter.com/csoghoian)
  1552. http://pauldotcom.com/
  1553. http://penguininside.blogspot.com/
  1554. http://pen-testing.sans.org/blog/
  1555. http://philosecurity.org/
  1556. http://polarwave.blogspot.com/
  1557. http://praetorianprefect.com/
  1558. http://pseudo-flaw.net/log/index
  1559. http://publicintelligence.net/
  1560. http://randomthoughtsofforensics.blogspot.com
  1561. http://rdist.root.org/
  1562. http://recon.cx
  1563. http://resources.infosecinstitute.com/
  1564. http://revolutionwifi.blogspot.com/
  1565. http://rijmenants.blogspot.com/
  1566. https://365.rsaconference.com/blogs/critical-infrastructure
  1567. https://365.rsaconference.com/blogs/ediscovery
  1568. https://365.rsaconference.com/blogs/fred-stock
  1569. https://365.rsaconference.com/blogs/ira-winkler
  1570. https://365.rsaconference.com/blogs/rsa-conference-blog
  1571. https://365.rsaconference.com/blogs/securityreading
  1572. https://amtso.wordpress.com/
  1573. https://blog.avast.com/
  1574. https://blog.mozilla.org/security/
  1575. https://blog.opendns.com/
  1576. https://blogs.adobe.com/psirt/
  1577. https://blogs.mcafee.com/
  1578. https://blogs.mcafee.com/mcafee-labs
  1579. https://blogs.technet.com/b/sysinternals/
  1580. https://blogs.technet.com/mmpc/default.aspx
  1581. https://blogs.technet.com/msrc/
  1582. https://blog.torproject.org/
  1583. https://blog.whitehatsec.com/
  1584. https://chainmailcheck.wordpress.com/
  1585. https://citizenlab.org/category/news/
  1586. https://community.rapid7.com/community/infosec/blog
  1587. https://community.rapid7.com/community/metasploit/blog
  1588. https://devcentral.f5.com/Home/Blogs/tabid/1082195/Default.aspx
  1589. https://devcentral.f5.com/weblogs/macvittie/Default.aspx
  1590. http://seclists.org/
  1591. http://securityandrisk.blogspot.com/
  1592. http://securityblog.verizonbusiness.com/
  1593. http://securitybraindump.blogspot.com/
  1594. http://security-sh3ll.blogspot.com/
  1595. http://securityvulns.com/
  1596. http://securosis.com/blog
  1597. https://fightinginsecurity.wordpress.com/
  1598. https://gregness.wordpress.com/
  1599. http://sketchymoose.blogspot.com/
  1600. https://memset.wordpress.com/
  1601. https://news.ycombinator.com/
  1602. http://software-security.sans.org/blog/
  1603. http://spectrum.ieee.org/blog/riskfactor
  1604. https://psal.cs.drexel.edu/index.php/Main_Page
  1605. http://spyblog.org.uk/
  1606. https://secunia.com/advisories/
  1607. https://ssd.eff.org/
  1608. https://techbuddha.wordpress.com/
  1609. http://stratsec.blogspot.com/
  1610. https://twitter.com/hackinthebox
  1611. https://twitter.com/markrussinovich
  1612. http://superconductor.voltage.com/
  1613. http://swann.com/s/products/newsrelease/
  1614. https://www.adobe.com/support/security/
  1615. https://www.brandenwilliams.com/blog/
  1616. https://www.eff.org/
  1617. https://www.grc.com/securitynow.htm
  1618. https://www.ibm.com/developerworks/
  1619. https://www.ibm.com/developerworks/aix/library/
  1620. https://www.ibm.com/developerworks/linux/
  1621. https://www.ibm.com/developerworks/topics/
  1622. https://www.mozilla.org/security/announce/
  1623. https://www.net-security.org/
  1624. https://www.sans.org/newsletters/
  1625. https://www.sans.org/newsletters/#newsbites
  1626. https://www.sans.org/newsletters/#ouch
  1627. https://www.sans.org/newsletters/#risk
  1628. https://www.schneier.com/
  1629. https://www.securelist.com/en/weblog
  1630. https://www.trustedsec.com/news-and-events/
  1631. https://www.usenix.org/conferences
  1632. https://www.veracode.com/blog/
  1633. http://taosecurity.blogspot.com/
  1634. http://technicalinfodotnet.blogspot.com/
  1635. http://thehackernews.com/
  1636. http://thehiddenevil.com/
  1637. http://theinvisiblethings.blogspot.com/
  1638. http://threatpost.com/
  1639. http://threatthoughts.com/
  1640. http://ticklethewire.com/
  1641. http://tk-blog.blogspot.com/
  1642. http://toorcon.org/
  1643. http://travisgoodspeed.blogspot.com/
  1644. http://volatility.tumblr.com/
  1645. http://vrt-blog.snort.org/
  1646. http://vulnfactory.org/blog/
  1647. http://web.archive.org/web/20100528020113/http://milw0rm.com/
  1648. http://windowsir.blogspot.com/
  1649. http://wordpress.bladeforensics.com/
  1650. http://www.acunetix.com/blog/
  1651. http://www.afcea.org/signal/signalscape/
  1652. http://www.allspammedup.com/
  1653. http://www.backtrack-linux.org/blog/
  1654. http://www.bigbrotherwatch.org.uk/
  1655. http://www.blackbag.nl/
  1656. http://www.blindhog.net/
  1657. http://www.bunniestudios.com/wordpress/
  1658. http://www.businessinsider.com/defense
  1659. http://www.businessinsider.com/defense/infosec
  1660. http://www.businessinsider.com/warroom
  1661. http://www.capnfreedom.com/
  1662. http://www.catonmat.net/
  1663. http://www.cerias.purdue.edu/site/blog
  1664. http://www.cerias.purdue.edu/site/blog/
  1665. http://www.cgisecurity.com/
  1666. http://www.ciscoarticles.com/
  1667. http://www.clerkendweller.com/
  1668. http://www.corecom.com/html/wlan.html
  1669. http://www.cristoncox.com/
  1670. http://www.cryptogon.com/
  1671. http://www.cryptome.org/
  1672. http://www.cryptosmith.com/
  1673. http://www.cyberwarnews.info/
  1674. http://www.darknet.org.uk/
  1675. http://www.darkreading.com/blog
  1676. http://www.devttys0.com/blog/
  1677. http://www.educatedguesswork.org/
  1678. http://www.ehacking.net/
  1679. http://www.emergingthreatspro.com/blog/
  1680. http://www.ericjhuber.com/
  1681. http://www.esecurityplanet.com/
  1682. http://www.esecurityplanet.com/hackers
  1683. http://www.esecurityplanet.com/malware
  1684. http://www.eweek.com/c/s/Security/
  1685. http://www.exploit-db.com/
  1686. http://www.exploit-id.com/
  1687. http://www.fas.org/blog/secrecy/
  1688. http://www.fas.org/blog/ssp/
  1689. http://www.federaltimes.com/
  1690. http://www.financialcryptography.com/
  1691. http://www.flyingpenguin.com/
  1692. http://www.forensic4cast.com/
  1693. http://www.forensickb.com/
  1694. http://www.forensicswiki.org/
  1695. http://www.frontlinesentinel.com/
  1696. http://www.f-secure.com/weblog
  1697. http://www.gfi.com/blog/
  1698. http://www.gfi.com/blog/labs/
  1699. http://www.hackaday.com/
  1700. http://www.heinz.cmu.edu/~acquisti/shb/participants.htm
  1701. http://www.hexacorn.com/blog/
  1702. http://www.hexblog.com/
  1703. http://www.honeynet.org/
  1704. http://www.h-online.com/
  1705. http://www.h-online.com/developer/
  1706. http://www.h-online.com/open/
  1707. http://www.h-online.com/security/
  1708. http://www.hotforsecurity.com/
  1709. http://www.ibm.com/developerworks/security/
  1710. http://www.infosecblog.org/
  1711. http://www.infosecurity-magazine.com/blog/
  1712. http://www.insearchoftech.com/
  1713. http://www.irongeek.com/
  1714. http://www.irongeek.com/
  1715. http://www.itstactical.com/
  1716. http://www.l0t3k.org/en/
  1717. http://www.ledge.co.za/software/lpinotes/
  1718. http://www.lightbluetouchpaper.org/
  1719. http://www.links.org/
  1720. http://www.liquidmatrix.org/blog/
  1721. http://www.lovemytool.com/
  1722. http://www.mckeay.net/
  1723. http://www.my80211.com/
  1724. http://www.neowin.net/forum/topic/934274-freeware-alternative-list/
  1725. http://www.net-security.org/
  1726. http://www.networkworld.com/topics/security.html
  1727. http://www.nowtheendbegins.com/blog/
  1728. http://www.nowtheendbegins.com/blog/?cat=4
  1729. http://www.nsa.gov/
  1730. http://www.offensivecomputing.net/ (moving to: http://openmalware.org/)
  1731. http://www.offensive-security.com/blog/
  1732. http://www.officer.com/latest-news
  1733. http://www.openrce.org/articles/
  1734. http://www.packetstormsecurity.org/
  1735. http://www.paranoidprose.com/
  1736. http://www.pgpboard.com/
  1737. http://www.pinewswire.net/
  1738. http://www.policemisconduct.net
  1739. http://www.prevx.com/blog.asp
  1740. http://www.rationalsurvivability.com/blog/
  1741. http://www.reddit.com/r/malware
  1742. http://www.reddit.com/r/reverseengineering
  1743. http://www.reversinglabs.com/blog
  1744. http://www.schneier.com/
  1745. http://www.scmagazine.com/the-data-breach-blog/section/1263/
  1746. http://www.seclist.us/
  1747. http://www.secsocial.com/blog/
  1748. http://www.securingthehuman.org/blog/
  1749. http://www.securitybsides.com
  1750. http://www.securityfocus.com/
  1751. http://www.securityfocus.com/archive
  1752. http://www.security-ray.com/
  1753. http://www.securitytracker.com/
  1754. http://www.securityweek.com/
  1755. http://www.sensepost.com/blog/
  1756. http://www.shellguardians.com/
  1757. http://www.shmoo.com/news/
  1758. http://www.shmoocon.org/
  1759. http://www.skullbox.net/index.php
  1760. http://www.social-engineer.org/framework/Social_Engineering_Framework
  1761. http://www.standalone-sysadmin.com/blog/
  1762. http://www.stratumsecurity.com/company/blog/
  1763. http://www.survivalblog.com/
  1764. http://www.symantec.com/business/security_response/weblog/
  1765. http://www.symantec.com/connect/security/blogs
  1766. http://www.sysadminblogs.com/planet/
  1767. http://www.sysforensics.org/
  1768. http://www.teamshatter.com/
  1769. http://www.techrepublic.com/blog/security
  1770. http://www.thedarkvisitor.com/
  1771. http://www.thedigitalstandard.blogspot.com/
  1772. http://www.theemailadmin.com/
  1773. http://www.thegeekstuff.com/
  1774. http://www.thegeekstuff.com/best-of-the-blog/
  1775. http://www.theintelligencenews.com/
  1776. http://www.theregister.co.uk/security/
  1777. http://www.thesecuritysamurai.com/
  1778. http://www.thetechherald.com/security
  1779. http://www.troyhunt.com/
  1780. http://www.trusteer.com/blog
  1781. http://www.whenisfive.com
  1782. http://www.wikileaks.org/
  1783. http://www.wired.com/about/blogs/
  1784. http://www.wired.com/dangerroom
  1785. http://www.wired.com/threatlevel/
  1786. http://www.wlanpros.com/
  1787. http://www.wmarkbrooks.com/
  1788. http://www.woodmann.com/forum/blog.php
  1789. http://www.wrgross.com/blogs/security/
  1790. http://www.wrgross.com/blogs/security/category/openbsd/
  1791. http://www.zdnet.com/blog/security/
  1792. http://www.zerodayinitiative.com/advisories/published/
  1793. http://www.zerodayinitiative.com/advisories/upcoming
  1794. (videos, leads to) http://www.irongeek.com/i.php?page=security/hackingillustrated
  1795.  
  1796. ----------------------------------------
  1797.  
  1798. ** 6006: Security Forums (Web based Discussion Forums)
  1799.  
  1800. http://cocoontech.com/forums/
  1801. http://forum.bitdefender.com
  1802. http://forum.prisonplanet.com
  1803. http://forums.avg.com/
  1804. http://forums.comodo.com/
  1805. http://forums.hak5.org/
  1806. http://forums.officer.com/forums/
  1807. http://forums.windowsecurity.com
  1808. http://glocktalk.com/forums/
  1809. http://hardforum.com/showthread.php?t=781545
  1810. http://homecommunity.cisco.com/
  1811. http://www.antionline.com/
  1812. http://www.ar15.com/forums/
  1813. http://www.backtrack-linux.org/forums
  1814. http://www.binrev.com/forums/
  1815. http://www.defencetalk.com/forums/
  1816. http://www.dslreports.com/forum/cleanup
  1817. http://www.dslreports.com/forum/scambusters
  1818. http://www.dslreports.com/forum/security
  1819. http://www.dslreports.com/forum/wsecurity
  1820. http://www.hex-rays.com/forum/
  1821. http://www.networking-forum.com/
  1822. http://www.sherdog.net/forums/
  1823. http://www.survivalistboards.com/
  1824. http://www.wilderssecurity.com/
  1825. http://www.wilderssecurity.com/showthread.php?t=242949
  1826. http://www.woodmann.com/forum/forum.php
  1827. ----------------------------------------
  1828.  
  1829. ** 6007: Security Magazines & Zines
  1830.  
  1831. http://about-threats.trendmicro.com/ebooks/
  1832. http://bsdmag.org/
  1833. http://chmag.in/
  1834. http://chmag.in/issue/all
  1835. http://commons.oreilly.com/wiki/index.php/O%27Reilly_Commons
  1836. http://gonullyourself.com/ezines/
  1837. http://gonullyourself.com/zine/
  1838. http://hakin9.org/
  1839. http://linuxformat.com/
  1840. http://magazine.hackinthebox.org/
  1841. http://magazine.hitb.org/
  1842. http://secureviewmag.com/
  1843. https://www.net-security.org/insecuremag.php
  1844. http://ubuntupocketguide.com/index_main.html
  1845. http://www.2600.com/
  1846. http://www.admin-magazine.com/
  1847. http://www.dwheeler.com/secure-programs/
  1848. http://www.linuxpromagazine.com/
  1849. http://www.linuxuser.co.uk/
  1850. http://www.phrack.com/
  1851. http://www.textfiles.com/ (RE: https://en.wikipedia.org/wiki/Textfiles.com)
  1852. http://www.thegeekstuff.com/linux-101-hacks-ebook/
  1853. http://www.uninformed.org/
  1854. ----------------------------------------
  1855.  
  1856. ** 6008: Linux Anti-Malware Scanners
  1857.  
  1858. See Also: 6003: Antivirus LiveCDs - boot and scan your system for malware
  1859.  
  1860. + Avast:
  1861. http://www.avast.com/linux-home-edition
  1862.  
  1863. + AVG:
  1864. http://free.avg.com/ww-en/download.prd-alf.tpl-stdfull
  1865.  
  1866. + Bitdefender:
  1867. http://www.bitdefender.com/media/html/en/unicesportal/
  1868. http://www.bitdefender.com/business/antivirus-for-unices.html
  1869. http://unices.bitdefender.com
  1870. http://www.bitdefender.com/support/Bitdefender-for-Linux-manual-updates-224.html
  1871.  
  1872. ++ Bitdefender repos (may be older than version obtainable above via registration & email):
  1873. http://download.bitdefender.com/repos/deb/
  1874. http://download.bitdefender.com/repos/rpm/
  1875.  
  1876. + ClamAV:
  1877. http://www.clamav.net/
  1878. http://sourceforge.net/projects/clamav/
  1879.  
  1880. + ClamTk is a GUI front-end for ClamAV
  1881. http://clamtk.sourceforge.net/
  1882. http://sourceforge.net/projects/clamtk/
  1883.  
  1884. + Collage:
  1885. http://gtnoise.net/projects/7-anti-censorship/7-collage-defeating-censorship-with-user-generated-content
  1886.  
  1887. + Comodo Antivirus for Linux (CAVL):
  1888. http://forums.comodo.com/comodo-antivirus-for-linux-cavl/comodo-antivirus-for-linux-cavl-v102398181-is-formally-released-t85030.0.html
  1889. http://forums.comodo.com/comodo-antivirus-for-linux-cavl-b275.0/
  1890.  
  1891. + Coroner's Toolkit, The:
  1892. http://www.porcupine.org/forensics/tct.html
  1893.  
  1894. + F-PROT:
  1895. http://www.f-prot.com/download/home_user/download_fplinux.html
  1896.  
  1897. + F-PROT FRONT-END: QtFprot is a frontend for FPROT 4.x, a free (for personal use) Linux virus-scanner
  1898. http://freecode.com/projects/qtfprot
  1899.  
  1900. + F-PROT FRONT-END: XFPROT is a graphical frontend for the F-Prot Antivirus for Linux Small Business Edition.
  1901. http://freecode.com/projects/xfprot
  1902. http://web.tiscali.it/sharp/xfprot/
  1903.  
  1904. ----------------------------------------
  1905.  
  1906. ** 6009: Linux Security
  1907.          --------------
  1908. * 6009.1: Linux Articles (a few of these aren't security related and will eventually be moved to a new section):
  1909.          ---------------
  1910. http://alien.slackbook.org/dokuwiki/doku.php?id=slackware:parentalcontrol
  1911. http://ask.slashdot.org/story/05/07/20/1457252/network-intrusion-detection-and-prevention
  1912. http://csrc.nist.gov/
  1913. http://csrc.nist.gov/publications/PubsSPs.html
  1914. http://doc.opensuse.org/documentation/html/openSUSE_113/opensuse-apps/cha.crypto.html
  1915. http://doc.opensuse.org/documentation/html/openSUSE_113/opensuse-apps/cha.gnome.crypto.html
  1916. http://emergingthreats.net/
  1917. http://en.gentoo-wiki.com/wiki/HOWTO_Iptables_for_newbies
  1918. http://freeworld.thc.org/papers/anonymous-unix.html
  1919. http://honeypots.sourceforge.net/modified_script.html
  1920. http://it.slashdot.org/story/05/04/19/232230/bastille-adds-reporting-grabs-fed-attention
  1921. http://it.slashdot.org/story/06/03/14/1842248/pgp-creators-zfone-encrypts-voip
  1922. http://linuxblog.darkduck.com/
  1923. http://linuxgazette.net/121/anonymous.html
  1924. http://linux-ip.net/html/ether-arp.html
  1925. http://linuxpoison.blogspot.com/2008/01/howto-check-disk-drive-for-errors-and.html
  1926. http://netwizards.co.uk/installing-tripwire-on-ubuntu/
  1927. http://nmap.org/book/osdetect.html
  1928. http://nmap.org/book/toc.html
  1929. http://ornellas.apanela.com/dokuwiki/pub:firewall_and_adv_routing
  1930. http://penguininside.blogspot.se/2009/09/10-panel-dock-applications-for-your.html
  1931. http://people.redhat.com/pvrabec/openscap/guide.html
  1932. http://planet.netfilter.org/
  1933. http://project.honeynet.org/papers/individual/
  1934. http://project.honeynet.org/papers/kye.html
  1935. http://projects.gnome.org/gdm/docs/2.14/configuration.html
  1936. http://psychocats.net/ubuntu/index.php
  1937. https://delightlylinux.wordpress.com/
  1938. https://delightlylinux.wordpress.com/2012/06/14/secure-delete/
  1939. http://securitywatch.eweek.com/rootkits/rootkits_on_a_pci_card.html
  1940. https://fedoraproject.org/wiki/DocsProject/UsingGpg/CreatingKeys
  1941. https://fedoraproject.org/wiki/How_to_create_and_use_a_Live_CD
  1942. https://fedoraproject.org/wiki/How_to_create_and_use_Live_USB
  1943. https://fedoraproject.org/wiki/JeroenVanMeeuwen/Revisor/FedoraRebrandRemixGuidelines
  1944. https://help.ubuntu.com/community/EncryptedPrivateDirectory
  1945. https://help.ubuntu.com/community/FileIntegrityAIDE
  1946. https://help.ubuntu.com/community/GnuPrivacyGuardHowto
  1947. https://help.ubuntu.com/community/LinuxLogFiles
  1948. https://help.ubuntu.com/community/Logwatch
  1949. https://help.ubuntu.com/community/StricterDefaults
  1950. https://secure.wikimedia.org/wikibooks/en/wiki/Grsecurity/Appendix/Grsecurity_and_PaX_Configuration_Options
  1951. https://wiki.debian.org/
  1952. https://wiki.debian.org/iptables
  1953. https://wiki.debian.org/SecureApt
  1954. https://wiki.debian.org/SystemAdministration
  1955. https://wiki.ubuntu.com/
  1956. https://wiki.ubuntu.com/BasicSecurity
  1957. https://wiki.ubuntu.com/BasicSecurity/DidIJustGetOwned
  1958. https://wiki.ubuntu.com/Security/Features
  1959. https://www.cert.org/tech_tips/unix_configuration_guidelines.html
  1960. https://www.cs.arizona.edu/stork/packagemanagersecurity/faq.html
  1961. https://www.ibm.com/developerworks/linux/library/l-proc/index.html
  1962. https://www.ibm.com/developerworks/linux/tutorials/l-lockdown1/
  1963. https://www.ibm.com/developerworks/linux/tutorials/l-lockdown2/index.html
  1964. https://www.linux.com/
  1965. https://www.linux.com/learn/tutorials/456149-manage-passwords-encryption-keys-and-more-with-seahorse
  1966. https://www.linuxquestions.org/questions/linux-security-4/security-references-45261/
  1967. https://www.owasp.org
  1968. https://www.sans.org/reading_room/
  1969. https://www.schneier.com/crypto-gram.html
  1970. http://tldp.org/HOWTO/AX25-HOWTO/index.html
  1971. http://tldp.org/HOWTO/Secure-Programs-HOWTO/buffer-overflow.html
  1972. http://tldp.org/LDP/nag2/index.html
  1973. http://trac.secdev.org/scapy/wiki/IdentifyingRogueDHCPServers
  1974. http://web.archive.org/web/20040215020827/http://www.linux-mag.com/2003-09/acls_01.html
  1975. http://web.archive.org/web/20041031074320/http://sun.soci.niu.edu/~rslade/secgloss.htm
  1976. http://web.archive.org/web/20041125131921/http://tips.linux.com/tips/04/11/23/2022252.shtml?tid=100&tid=47&tid=35
  1977. http://web.archive.org/web/20041231085409/http://www.cs.auckland.ac.nz/~pgut001/links.html
  1978. http://web.archive.org/web/20050306035558/http://www.spitzner.net/linux.html
  1979. http://web.archive.org/web/20060712182215/http://linuxgazette.net/128/saha.html
  1980. http://web.archive.org/web/20090109020415/http://www.securityfocus.com/print/infocus/1414
  1981. http://web.archive.org/web/20100529035423/http://www.cert.org/current/services_ports.html
  1982. http://wiki.centos.org/HowTos/Network/IPTables
  1983. http://winhelp2002.mvps.org/hosts.htm
  1984. http://www.acsu.buffalo.edu/~charngda/elf.html
  1985. http://www.alwanza.com/howTo/linux/tripwire.html
  1986. http://www.bitbull.ch/wiki/index.php/Hacking_Notes
  1987. http://www.bitbull.ch/wiki/index.php/Linux_Short_Reference
  1988. http://www.brandonhutchinson.com/iptables_fw.html
  1989. http://www.codeproject.com/KB/cpp/shared_object_injection_1.aspx#brief_elf_str_code1
  1990. http://www.cromwell-intl.com/security/intrusion-analysis/
  1991. http://www.cryptovirology.com/cryptovfiles/cryptovirologyfaqver1.html#whatiscryptoviralextortion
  1992. http://www.cs.arizona.edu/stork/packagemanagersecurity/faq.html
  1993. http://www.cs.wright.edu/~pmateti/Courses/233/Labs/OS-on-USB/OSonUSBLabKnoppix671DVD.html
  1994. http://www.cs.wright.edu/~pmateti/InternetSecurity/Lectures/BufferOverflow/alephOne.html
  1995. http://www.cs.wright.edu/~pmateti/InternetSecurity/Lectures/Fortification/obrien.html
  1996. http://www.cs.wright.edu/~pmateti/InternetSecurity/Lectures/Probing/How%20to%20Handle%20Network%20Probes.htm
  1997. http://www.cyberciti.biz/
  1998. http://www.cyberciti.biz/faq/add-remove-list-linux-kernel-modules/
  1999. http://www.cyberciti.biz/faq/how-to-detect-arp-spoofing-under-unix-or-linux/
  2000. http://www.cyberciti.biz/hardware/linux-iotop-simple-top-like-io-monitor/
  2001. http://www.cyberciti.biz/tips/howto-log-user-activity-using-process-accounting.html
  2002. http://www.cyberciti.biz/tips/iptables-mac-address-filtering.html
  2003. http://www.cyberciti.biz/tips/linux-iptables-10-how-to-block-common-attack.html
  2004. http://www.cyberciti.biz/tips/linux-iptables-8-how-to-avoid-spoofing-and-bad-addresses-attack.html
  2005. http://www.cyberciti.biz/tips/linux-security.html
  2006. http://www.cyberciti.biz/tips/linux-unix-windows-find-hidden-processes-tcp-udp-ports.html
  2007. http://www.cyberciti.biz/tips/top-linux-monitoring-tools.html
  2008. http://www.debianadmin.com/
  2009. http://www.debianadmin.com/filesystem-encryption-tools-for-linux.html
  2010. http://www.debian-administration.org/
  2011. http://www.debian-administration.org/articles/49
  2012. http://www.debian.org/doc/
  2013. http://www.debian.org/doc/manuals/
  2014. http://www.debian.org/doc/manuals/securing-debian-howto/
  2015. http://www.debian.org/doc/manuals/securing-debian-howto/ch-sec-services.en.html#s-firewall-setup
  2016. http://www.debian.org/events/keysigning
  2017. http://www.debuntu.org/intrusion-detection-with-aide
  2018. http://www.desktoplinux.com/articles/AT3341468184.html
  2019. http://www.desktoplinux.com/articles/AT7966076367.html
  2020. http://www.dshield.org/diary.html?storyid=13057
  2021. http://www.exploit-db.com/
  2022. http://www.faqs.org/docs/Linux-HOWTO/User-Authentication-HOWTO.html
  2023. http://www.gentoo.org/doc/en/gnupg-user.xml
  2024. http://www.hackinglinuxexposed.com/articles/
  2025. http://www.hackinglinuxexposed.com/articles/20030703.html
  2026. http://www.hackinglinuxexposed.com/articles/20030709.html
  2027. http://www.howtoforge.com/intrusion_detection_base_snort
  2028. http://www.ibiblio.org/pub/Linux/docs/HOWTO/other-formats/html_single/Disk-Encryption-HOWTO.html
  2029. http://www.ibm.com/developerworks/aix/library/au-aix-manage-ruby/index.html
  2030. http://www.ibm.com/developerworks/aix/library/au-speakingunix10/index.html
  2031. http://www.ibm.com/developerworks/aix/library/au-speakingunix11/index.html
  2032. http://www.ibm.com/developerworks/aix/library/au-speakingunix12/index.html
  2033. http://www.ibm.com/developerworks/aix/library/au-speakingunix13/index.html
  2034. http://www.ibm.com/developerworks/aix/library/au-speakingunix2.html
  2035. http://www.ibm.com/developerworks/aix/library/au-speakingunix3.html
  2036. http://www.ibm.com/developerworks/aix/library/au-speakingunix4/index.html
  2037. http://www.ibm.com/developerworks/aix/library/au-speakingunix5.html
  2038. http://www.ibm.com/developerworks/aix/library/au-speakingunix6.html
  2039. http://www.ibm.com/developerworks/aix/library/au-speakingunix7.html
  2040. http://www.ibm.com/developerworks/aix/library/au-speakingunix8/index.html
  2041. http://www.ibm.com/developerworks/aix/library/au-speakingunix9/index.html
  2042. http://www.ibm.com/developerworks/aix/library/au-spunix_greattools/index.html
  2043. http://www.ibm.com/developerworks/aix/library/au-unix-commandline/index.html
  2044. http://www.ibm.com/developerworks/library/l-keyc2/
  2045. http://www.ibm.com/developerworks/library/l-keyc3/
  2046. http://www.ibm.com/developerworks/library/l-keyc/index.html
  2047. http://www.ibm.com/developerworks/linux/library/l-livecdsec/?ca=dgr-lnxw07SecurityLiveCD
  2048. http://www.justlinux.com/nhf/Security/IPtables_Basics.html
  2049. http://www.la-samhna.de/library/rootkits/index.html
  2050. http://www.ledge.co.za/software/lpinotes/
  2051. http://www.linuxbsdos.com/2011/05/10/how-to-install-ubuntu-11-04-on-an-encrypted-lvm-file-system/
  2052. http://www.linuxforums.org/articles/understanding-elf-using-readelf-and-objdump_125.html
  2053. http://www.linuxhomenetworking.com/
  2054. http://www.linuxhomenetworking.com/wiki/index.php/Quick_HOWTO_:_Ch14_:_Linux_Firewalls_Using_iptables
  2055. http://www.linuxjournal.com/
  2056. http://www.linux.org/
  2057. http://www.linuxplanet.com/linuxplanet/tutorials/4505/1
  2058. http://www.linuxsecurity.com
  2059. http://www.linuxsecurity.com/
  2060. http://www.linuxsecurity.com/content/view/117644/49/
  2061. http://www.linuxsecurity.com/content/view/118211/49/
  2062. http://www.linuxsecurity.com/content/view/119415/49/
  2063. http://www.linuxsecurity.com/docs/colsfaq.html
  2064. http://www.livecdlist.com/
  2065. http://www.madboa.com/geek/gpg-quickstart/
  2066. http://www.madboa.com/geek/openssl/#digest-file
  2067. http://www.madboa.com/geek/pine-ssl/
  2068. http://www.netfilter.org/documentation/
  2069. http://www.novell.com/communities/node/4971/detecting-arp-poisoning-attacks
  2070. http://www.phrack.com/issues.html?issue=58&id=7#article
  2071. http://www.phrack.org/issues.html?issue=68&id=9#article
  2072. http://www.porcupine.org/forensics/column.html
  2073. http://www.psychocats.net/ubuntu/minimal
  2074. http://www.securityfocus.com/firewalls
  2075. http://www.securityfocus.com/ids
  2076. http://www.securityfocus.com/incidents
  2077. http://www.securityfocus.com/unix
  2078. http://www.seifried.org/security/ids/20020107-honeypot-vmware-basics.html
  2079. http://www.symantec.com/connect/articles/alien-autopsy-reverse-engineering-win32-trojans-linux
  2080. http://www.symantec.com/connect/articles/detecting-and-removing-malicious-code
  2081. http://www.symantec.com/connect/articles/detecting-rootkits-and-kernel-level-compromises-linux
  2082. http://www.symantec.com/connect/articles/forensic-analysis-live-linux-system-pt-1
  2083. http://www.symantec.com/connect/articles/forensic-analysis-live-linux-system-pt-2
  2084. http://www.symantec.com/connect/articles/hacker-tools-and-their-signatures-part-three-rootkits
  2085. http://www.symantec.com/connect/articles/hardening-tcpip-stack-syn-attacks
  2086. http://www.symantec.com/connect/articles/host-integrity-monitoring-best-practices-deployment
  2087. http://www.symantec.com/connect/articles/reverse-engineering-hostile-code
  2088. http://www.symantec.com/connect/articles/sniffers-what-they-are-and-how-protect-yourself
  2089. http://www.symantec.com/connect/topics/security/securityfocus
  2090. http://www.techrepublic.com/article/10-things-you-should-do-to-a-new-linux-pc-before-exposing-it-to-the-internet/5987648
  2091. http://www.thc.org/
  2092. http://www.thc.org/papers/fw-backd.htm
  2093. http://www.thegeekstuff.com/2010/03/netstat-command-examples/
  2094. http://www.thegeekstuff.com/2010/11/50-linux-commands/
  2095. http://www.thegeekstuff.com/2010/12/50-unix-linux-sysadmin-tutorials/
  2096. http://www.thegeekstuff.com/2011/06/iptables-rules-examples/
  2097. http://www.thegeekstuff.com/2011/12/linux-performance-monitoring-tools/
  2098. http://www.tldp.org/HOWTO/Encrypted-Root-Filesystem-HOWTO/
  2099. http://www.tldp.org/HOWTO/Linux%2BIPv6-HOWTO/index.html
  2100. http://www.tracking-hackers.com/misc/faq.html
  2101. http://www.ubuntugeek.com/tools-to-delete-files-securely-in-ubuntu-linux.html
  2102. http://www.unixwiz.net/techtips/iguide-crypto-hashes.html
  2103. http://www.whenisfive.com/tutorials/tor-polipo-5-minute-install-guide-ubuntu-11-0411-10/
  2104. http://www.yolinux.com/TUTORIALS/LinuxSecurityTools.html
  2105. (multicd script) http://multicd.tuxfamily.org/
  2106. (multicd script related) http://ubuntuforums.org/showthread.php?t=1071869
  2107. (PDF) http://csrc.nist.gov/publications/nistir/7316/NISTIR-7316.pdf
  2108. (PDF) http://csrc.nist.gov/publications/nistpubs/800-84/SP800-84.pdf
  2109. (PDF) http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdf
  2110. (PDF) http://events.ccc.de/congress/2006/Fahrplan/attachments/1167-SpeakingAnonymously.pdf
  2111. (PDF) http://web.archive.org/web/20070717124745/http://www.tldp.org/linuxfocus/English/Archives/lf-2003_01-0278.pdf
  2112. (PDF) http://www.linux-magazine.com/issue/01/File_Permissions.pdf
  2113. (PDFs) http://www.nsa.gov/ia/mitigation_guidance/security_configuration_guides/operating_systems.shtml
  2114.  
  2115.           --------------------
  2116. * 6009.2: Linux Security Tools
  2117.          (the intention here is not to list everything, hence the link to BackTrack which
  2118.           contains a number of useful tools which could otherwise be linked here.)
  2119.           --------------------
  2120.  
  2121. ++ SecTools.Org: Top 125 Network Security Tools
  2122. http://sectools.org/
  2123.  
  2124. + AIDE:
  2125. http://sourceforge.net/projects/aide/
  2126. http://sourceforge.net/projects/aide
  2127. http://freecode.com/projects/aide
  2128.  
  2129. + AppArmor:
  2130. http://wiki.apparmor.net/index.php/Main_Page
  2131. http://www.linux-magazine.com/Issues/2006/69/AppArmor-vs.-SELinux
  2132. (PDF) http://www.linux-magazine.com/content/download/63096/487061/file/AppArmor_vs_SELinux.pdf
  2133. https://lkml.org/lkml/2006/4/19/199
  2134.  
  2135. + BackTrack Linux (contains MANY tools)
  2136. http://www.backtrack-linux.org/
  2137.  
  2138. + Bastille:
  2139. http://bastille-linux.sourceforge.net/
  2140.  
  2141. + Baudline:
  2142. http://www.baudline.com/
  2143. https://en.wikipedia.org/wiki/Baudline
  2144.  
  2145. + BleachBit:
  2146. http://bleachbit.sourceforge.net/
  2147. http://sourceforge.net/projects/bleachbit/
  2148.  
  2149. + BotHunter:
  2150. http://www.bothunter.net/
  2151.  
  2152. + Cacti
  2153. http://www.cacti.net/
  2154.  
  2155. + Chkrootkit:
  2156. https://en.wikipedia.org/wiki/Chkrootkit
  2157. http://freecode.com/projects/chkrootkit
  2158. (not directly linking to official site url because it's been up/down)
  2159. (the past few weeks)
  2160.  
  2161. + Combofix:
  2162. http://www.combofix.org/
  2163.  
  2164. + Cuckoo Sandbox:
  2165. http://www.cuckoosandbox.org/
  2166.  
  2167. + Dan's Guardian:
  2168. http://dansguardian.org/
  2169.  
  2170. + DBAN (Darik's Boot and Nuke):
  2171. http://www.dban.org/
  2172. http://sourceforge.net/projects/dban/
  2173.  
  2174. + DDRescue:
  2175. https://www.gnu.org/software/ddrescue/ddrescue.html
  2176.  
  2177. + debsecan:
  2178. http://www.enyo.de/fw/software/debsecan/
  2179.  
  2180. + Deny Hosts:
  2181. http://denyhosts.sourceforge.net/
  2182.  
  2183. + DNSCrypt
  2184. https://www.opendns.com/technology/dnscrypt/
  2185. https://blog.opendns.com/2012/02/16/tales-from-the-dnscrypt-linux-rising/
  2186. https://github.com/opendns/dnscrypt-proxy/blob/master/README.markdown
  2187. https://github.com/opendns/dnscrypt-proxy
  2188.  
  2189. + DNSTop:
  2190. http://dns.measurement-factory.com/tools/dnstop/
  2191.  
  2192. + EckBox:
  2193. http://eckbox.sourceforge.net
  2194. (offsite article): http://blockyourid.com/~gbpprorg/mil/eckbox/index.html
  2195.  
  2196. + Enigmail - a security extension to Mozilla Thunderbird and Seamonkey:
  2197. http://www.enigmail.net/home/index.php
  2198.  
  2199. + Enscribe:
  2200. http://www.coppercloudmusic.com/enscribe/
  2201. http://freecode.com/projects/enscribe
  2202. (old) http://web.archive.org/web/20060712151452/http://jbd.zayda.net/enscribe/
  2203.  
  2204. + FakeAP
  2205. http://blackalchemy.to/project/fakeap/
  2206.  
  2207. + Foremost:
  2208. http://foremost.sourceforge.net/
  2209.  
  2210. + GNUPG (GPG):
  2211. http://www.gnupg.org/
  2212. http://www.gnupg.org/related_software/frontends.en.html
  2213. http://www.gnupg.org/related_software/gpa/index.en.html
  2214. http://utils.kde.org/projects/kgpg/
  2215.  
  2216. + Honeypots (The Honeynet Project):
  2217. http://project.honeynet.org/tools/index.html
  2218.  
  2219. + HTTPS Everywhere (Firefox and Chrome extension):
  2220. https://www.eff.org/https-everywhere
  2221.  
  2222. + IPTraf:
  2223. http://iptraf.seul.org/
  2224. http://freecode.com/projects/iptraf
  2225.  
  2226. + Jhead:
  2227. http://www.sentex.net/~mwandel/jhead/
  2228. http://freecode.com/projects/jhead
  2229.  
  2230. + John The Ripper:
  2231. http://www.openwall.com/john/
  2232.  
  2233. + Linux Kernel Archives:
  2234. https://www.kernel.org/
  2235.  
  2236. + Kismet:
  2237. https://kismetwireless.net/
  2238. http://freecode.com/projects/kismet
  2239.  
  2240. + LaBrea:
  2241. http://labrea.sourceforge.net/
  2242.  
  2243. + Liberté Linux (uses Tor):
  2244. http://dee.su/liberte
  2245.  
  2246. + libemu (x86 Shellcode Emulation):
  2247. http://libemu.carnivore.it/
  2248.  
  2249. + Lynis (Security and system auditing tool):
  2250. http://www.rootkit.nl/projects/lynis.html
  2251. https://en.wikipedia.org/wiki/Lynis
  2252. http://freecode.com/projects/lynis
  2253.  
  2254. + Mac Changer:
  2255. http://www.alobbs.com/macchanger
  2256.  
  2257. + MAT - Metadata Anonymisation Toolkit:
  2258. https://mat.boum.org/
  2259.  
  2260. + md5deep and hashdeep: (md5deep is a set of programs to compute MD5, SHA-1, SHA-256, Tiger, or Whirlpool message digests on an arbitrary number of files.)
  2261.                         (hashdeep is a program to compute, match, and audit hashsets.)
  2262. http://md5deep.sourceforge.net/
  2263. http://sourceforge.net/projects/md5deep/
  2264.  
  2265. + MCrypt:
  2266. http://mcrypt.sourceforge.net/
  2267. http://sourceforge.net/projects/mcrypt/
  2268.  
  2269. + Monkeysphere:
  2270. http://web.monkeysphere.info/
  2271.  
  2272. + Nemesis:
  2273. http://nemesis.sourceforge.net/
  2274.  
  2275. + Nessus:
  2276. http://www.nessus.org/
  2277.  
  2278. + Network Monitoring Tools @ Stanford.edu:
  2279. http://www.slac.stanford.edu/xorg/nmtf/nmtf-tools.html
  2280.  
  2281. + Ninite:
  2282. https://ninite.com/
  2283.  
  2284. + NGrep:
  2285. http://ngrep.sourceforge.net/
  2286.  
  2287. + NMap:
  2288. http://nmap.org/download.html
  2289.  
  2290. + NoMachine NX:
  2291. http://nomachine.com/
  2292.  
  2293. + NoScript (Firefox Extension)
  2294. https://addons.mozilla.org/en-US/firefox/addon/noscript/
  2295.  
  2296. + NTop:
  2297. http://www.ntop.org/
  2298. http://freecode.com/projects/ntop
  2299.  
  2300. + OphCrack:
  2301. http://ophcrack.sourceforge.net/
  2302.  
  2303. + OpenSSH:
  2304. http://www.openssh.com/
  2305.  
  2306. + OpenSSL:
  2307. http://www.openssl.org/
  2308.  
  2309. + Openwall:
  2310. http://www.openwall.com/
  2311.  
  2312. + OSSEC:
  2313. http://www.ossec.net/
  2314.  
  2315. + PhotoRec:
  2316. http://www.cgsecurity.org/wiki/PhotoRec
  2317.  
  2318. + Polipo (Proxy commonly associated with Tor and TAILS):
  2319. http://freecode.com/projects/polipo
  2320.  
  2321. + Rootkits:
  2322. http://packetstormsecurity.org/UNIX/penetration/rootkits/
  2323.  
  2324. + Rkhunter:
  2325. https://en.wikipedia.org/wiki/Rkhunter
  2326. http://rkhunter.sourceforge.net/
  2327. (old) http://www.rootkit.nl/projects/rootkit_hunter.html
  2328.  
  2329. + Scapy:
  2330. http://www.secdev.org/projects/scapy/
  2331.  
  2332. + Seahorse:
  2333. http://projects.gnome.org/seahorse/
  2334.  
  2335. + Secure-Delete:
  2336. http://freeworld.thc.org/releases/secure_delete-3.1.tar.gz
  2337. http://packages.ubuntu.com/search?keywords=secure+delete
  2338.  
  2339. + Skipfish:
  2340. https://code.google.com/p/skipfish/
  2341.  
  2342. + Sleuth Kit (TSK) & Autopsy:
  2343. http://www.sleuthkit.org/
  2344. http://sourceforge.net/projects/sleuthkit/
  2345.  
  2346. + SNARE:
  2347. http://sourceforge.net/projects/snare/
  2348.  
  2349. + Snort
  2350. http://www.snort.org/
  2351.  
  2352. + socat:
  2353. http://www.dest-unreach.org/socat/
  2354.  
  2355. + Sophos Linux/RST-B detection tool:
  2356. http://www.sophos.com/rst-detection-tool
  2357.  
  2358. + srm - secure file deletion:
  2359. http://srm.sourceforge.net/
  2360. http://sourceforge.net/projects/srm/
  2361. http://freecode.com/projects/srm
  2362.  
  2363. + SSDeep:
  2364. http://ssdeep.sourceforge.net/
  2365.  
  2366. + SSHMenu:
  2367. http://sshmenu.sourceforge.net/
  2368.  
  2369. + SSLStrip:
  2370. http://www.thoughtcrime.org/software/sslstrip/index.html
  2371.  
  2372. + SSSS (Shamir's Secret Sharing Scheme):
  2373. http://point-at-infinity.org/ssss/
  2374.  
  2375. + Stegdetect:
  2376. http://www.outguess.org/detection.php
  2377. http://freecode.com/projects/stegdetect
  2378.  
  2379. + Steghide:
  2380. http://steghide.sourceforge.net/
  2381. http://www.freecode.com/projects/steghide
  2382.  
  2383. + Suricata:
  2384. http://www.openinfosecfoundation.org/
  2385. http://www.openinfosecfoundation.org/index.php/download-suricata
  2386.  
  2387. + Switzerland (Network Testing Tool):
  2388. https://www.eff.org/pages/switzerland-network-testing-tool
  2389.  
  2390. + System Rescue CD:
  2391. http://www.sysresccd.org/
  2392.  
  2393. + Tails LiveCD (uses Tor):
  2394. https://tails.boum.org/
  2395.  
  2396. + Tempest for Eliza
  2397. http://www.erikyyy.de/tempest/
  2398.  
  2399. + Tiger - Unix security audit and intrusion detection tool:
  2400. http://nongnu.org/tiger/
  2401.  
  2402. + Tiger - Cryptographic Hash Function:
  2403. http://www.cs.technion.ac.il/~biham/Reports/Tiger/
  2404.  
  2405. + Tor:
  2406. http://metrics.torproject.org/
  2407. https://blog.torproject.org/blog/
  2408. https://bridges.torproject.org/
  2409. https://check.torproject.org/
  2410. https://lists.torproject.org/
  2411. https://weather.torproject.org/
  2412. https://www.torproject.org/
  2413. https://www.torproject.org/about/overview.html.en
  2414. https://www.torproject.org/docs/documentation.html.en
  2415. https://www.torproject.org/download/download-easy.html.en
  2416. https://www.torproject.org/press/press.html.en
  2417. https://www.torproject.org/projects/projects.html.en
  2418. https://www.torproject.org/torbutton/
  2419. https://www.torproject.org/vidalia/
  2420.  
  2421. + Tor Chat2:
  2422. https://github.com/prof7bit/TorChat
  2423. https://github.com/prof7bit/TorChat/downloads
  2424. (old/original) https://code.google.com/p/torchat/
  2425.  
  2426. + Tor Stats:
  2427. http://torstatus.blutmagie.de/
  2428.  
  2429. + Tripwire:
  2430. https://en.wikipedia.org/wiki/Open_Source_Tripwire
  2431. http://sourceforge.net/projects/tripwire/
  2432.  
  2433. + TrueCrypt:
  2434. http://www.truecrypt.org/
  2435. http://www.truecrypt.org/docs/
  2436. http://www.truecrypt.org/downloads
  2437. http://www.truecrypt.org/news
  2438. http://forums.truecrypt.org/
  2439.  
  2440. + VOIP Hopper:
  2441. http://voiphopper.sourceforge.net/
  2442.  
  2443. + Volatility Framework
  2444. https://www.volatilesystems.com/default/volatility#overview
  2445. https://code.google.com/p/volatility/w/list
  2446. http://lists.volatilesystems.com/mailman/listinfo
  2447.  
  2448. + WarVOX:
  2449. http://warvox.org/
  2450.  
  2451. + Webmin:
  2452. http://www.webmin.com/
  2453.  
  2454. + Whirlpool - a cryptographic hash function:
  2455. https://en.wikipedia.org/wiki/Whirlpool_%28cryptography%29
  2456. http://www.larc.usp.br/~pbarreto/WhirlpoolPage.html
  2457.  
  2458. + Wipe:
  2459. http://wipe.sourceforge.net/
  2460.  
  2461. + Wireshark:
  2462. https://www.wireshark.org/
  2463.  
  2464. + Yersinia:
  2465. http://www.yersinia.net/
  2466.  
  2467. + Zfone
  2468. http://zfoneproject.com/
  2469. https://en.wikipedia.org/wiki/Zfone
  2470. ----------------------------------------
  2471.  
  2472. * 6009.3: Linux Various+
  2473.           (most are not directly security related)
  2474.           --------------------
  2475. http://appdb.winehq.org/
  2476. http://blogs.valvesoftware.com/linux/steamd-penguins/
  2477. http://distrowatch.com/
  2478. http://frankscorner.org/
  2479. http://lbproject.sourceforge.net/
  2480. http://linuxgazette.net/
  2481. http://linux.slashdot.org/
  2482. http://linux.sys-con.com/
  2483. http://lxer.com/
  2484. http://olpcnews.com/
  2485. http://oreilly.com/linux/
  2486. http://osdir.com/
  2487. http://packetstormsecurity.org/
  2488. http://planet.debian.org/
  2489. http://planet.gentoo.org/
  2490. http://planet.ubuntu.com/
  2491. https://lwn.net/
  2492. https://wiki.ubuntu.com/UbuntuWeeklyNewsletter/
  2493. https://www.kernel.org/
  2494. https://www.linux.com/
  2495. http://techrights.org/wiki/index.php/Main_Page
  2496. http://tllts.org/
  2497. http://ubuntupocketguide.com/index_main.html
  2498. http://wine-review.blogspot.com/
  2499. http://www.codeweavers.com/
  2500. http://www.gnu.org/philosophy/
  2501. http://www.linuxformat.com/
  2502. http://www.linuxjournal.com/
  2503. http://www.linux-magazine.com/
  2504. http://www.linux-mag.com/
  2505. http://www.linux.org/
  2506. http://www.linuxpromagazine.com/
  2507. http://www.linuxsecurity.com/
  2508. http://www.linuxtag.org
  2509. http://www.linuxuser.co.uk/
  2510. http://www.mail-archive.com/funsec@linuxbox.org/
  2511. http://www.osnews.com/
  2512. http://www.playonlinux.com/en
  2513. http://www.thegeekstuff.com/linux-101-hacks-ebook/
  2514. http://www.tuxarena.com/
  2515. http://www.winehq.org/
  2516. http://www.wine-reviews.net/
  2517. (in limbo?) http://www.desktoplinux.com/news/
  2518.  
  2519. ----------------------------------------
  2520. ** 6010: Windows Security (that's a joke) Tools:
  2521.  
  2522. + Attack Surface Analyzer
  2523. https://www.microsoft.com/en-us/download/details.aspx?id=24487
  2524.  
  2525. + Flame Removal Tool (32 & 64bit versions):
  2526. http://labs.bitdefender.com/2012/5/cyber-espionage-reaches-new-levels-with-flamer/
  2527.  
  2528. + GNUPG (GPG):
  2529. http://www.gnupg.org/
  2530. http://www.gnupg.org/related_software/frontends.en.html
  2531. https://code.google.com/p/cryptophane/
  2532.  
  2533. + MobaXterm:
  2534. http://mobaxterm.mobatek.net/
  2535. http://mobaxterm.mobatek.net/download-home-edition
  2536. http://mobaxterm.mobatek.net/download.html
  2537.  
  2538. + PhotoRec:
  2539. http://www.cgsecurity.org/wiki/PhotoRec
  2540.  
  2541. + PuTTY:
  2542. https://en.wikipedia.org/wiki/PuTTY
  2543.  
  2544. + SNARE:
  2545. http://sourceforge.net/projects/snare/
  2546.  
  2547. + TDSSKiller Anti-Rootkit Tool:
  2548. http://support.kaspersky.com/faq/?qid=208283363
  2549.  
  2550. + WinSCP:
  2551. https://en.wikipedia.org/wiki/WinSCP
  2552.  
  2553. + Zfone
  2554. http://zfoneproject.com/
  2555. https://en.wikipedia.org/wiki/Zfone
  2556.  
  2557. (Archive/Alive) https://www.techsupportalert.com/content/probably-best-free-security-list-world.htm
  2558. (Article, DOC) http://msdn.microsoft.com/en-us/windows/hardware/gg487309
  2559. (Article) http://resources.infosecinstitute.com/tuluka/
  2560. (Article) https://social.technet.microsoft.com/wiki/contents/articles/942.hyper-v-how-to-detect-if-a-computer-is-a-vm-using-script.aspx
  2561. (Article) http://technet.microsoft.com/library/gg176673.aspx?ITPID=sprblog
  2562. (Article) http://technet.microsoft.com/library/gg176676.aspx?ITPID=sprblog
  2563. (Article) http://www.symantec.com/connect/articles/alien-autopsy-reverse-engineering-win32-trojans-linux
  2564. (Article/Wiki) https://en.wikipedia.org/wiki/Comparison_of_SSH_clients
  2565. (Discontinued Magazine / File downloads) http://www.magnesiummedia.com/pcutilities/
  2566. (doc, leads to ) https://www.microsoft.com/en-us/download/details.aspx?id=24373
  2567. (doc, leads to ) https://www.microsoft.com/en-us/download/details.aspx?id=3118
  2568. (docx, leads to) https://www.microsoft.com/en-us/download/details.aspx?id=20092
  2569. (Forum) https://www.microsoft.com/communities/forums/default.mspx
  2570. (Forum) http://www.sevenforums.com/
  2571. (Forum) http://www.w7forums.com/
  2572. (PDFs) http://www.nsa.gov/ia/mitigation_guidance/security_configuration_guides/operating_systems.shtml
  2573. (Spreadsheet xlsx, leads to) https://www.microsoft.com/en-us/download/details.aspx?id=19990
  2574. (Tutorial) Creating a Steady State by Using Microsoft Technologies / Windows 7 - Part 1/3
  2575. (Tutorial) Creating a Steady State by Using Microsoft Technologies / Windows 7 - Part 2/3
  2576. (Tutorial) Creating a Steady State by Using Microsoft Technologies / Windows 7 - Part 3/3
  2577. (Tutorial) mechBgon's guide 1/3 http://www.mechbgon.com/build/router.html
  2578. (Tutorial) mechBgon's guide 2/3 http://www.mechbgon.com/build/security1.html
  2579. (Tutorial) mechBgon's guide 3/3 http://www.mechbgon.com/build/security2.html
  2580. --------------------------------------------------------------------------------
  2581. This is the end of HUGE Security Resource+ - version 6000 - 08/31/2012
  2582. --------------------------------------------------------------------------------
  2583. We post this publication first at PasteBin.com. Please stay tuned
  2584. for the next version of HUGE Security Resource+. It's not the best
  2585. of names for a publication, but we're lazy, and this is free for
  2586. you.
  2587.  
  2588. We do not name, credit, or otherwise pimp out who we are. None of us
  2589. will ever claim credit for this document, previous, present, and future
  2590. versions, anyone who does is lying.
  2591.  
  2592. We're not on Facebook, Twitter, or any other whore social media circles,
  2593. nor are we active in the traditional and non traditional areas
  2594. of chatter - including IRC. Every version of this document
  2595. has, is, and will be released as a text file because it's
  2596. easier to share with friends and it lacks ugly metadata.
  2597.  
  2598. Please share this document with others, convert it to PDF
  2599. and other formats, but please do not modify the document
  2600. from its original design. Do not add your own links
  2601. for redistribution, rename the document, or claim that
  2602. you wrote it. Please provide a link back to the original
  2603. location @ PasteBin where it's released first.
  2604.  
  2605. We don't want anything other than to provide you with a solid
  2606. list of specially chosen sites. Anyone can toss together a
  2607. document with links, but we stay on the hunt for useful links,
  2608. for quality links. It takes time to harvest, prepare, and
  2609. print new links, especially when we have to check the previously
  2610. posted links to ensure they are alive and at the same location
  2611. and if not, we bring the links up to date. Some links are archives,
  2612. some lead directly to PDF files. Surely you've noticed as we've
  2613. made it quite simple to navigate this document with tagging
  2614. special URLs.
  2615.  
  2616. A few of the blogs linked within this document haven't been updated
  2617. in awhile, but they remain as a useful archive of information
  2618. generated in past entries, and some bloggers go several weeks,
  2619. months, or a year before returning to their blogs. This does
  2620. not bring down the quality of the blogs linked within, as
  2621. the chosen ones published here were selected on the basis
  2622. of quality.
  2623.  
  2624. We'd like to say thanks to CRYPTOME who has been linking
  2625. to our official release pages at PasteBin shortly after
  2626. we release a new version. Thanks Cryptome! And thank you
  2627. to PASTEBIN!
  2628. ----------------------------------------
  2629.  
  2630. When this document began, in previous versions, it was previously
  2631. known as: HUGE List of Security Blogs: Unix, Linux, Windows,
  2632. part 1, 2, 3, and 4 and changed document names with version
  2633. 5000. With version 6000 we renamed the project title from
  2634. 'HUGE Security Resource' to 'HUGE Security Resource+',
  2635. meaning, with this version and future versions this document will
  2636. contain more than security related material.
  2637. (currently a work in progress)
  2638.  
  2639. PART   #  URL                            Release Date
  2640. ------ -  ---------------------------- - -------------
  2641. - part 1: http://pastebin.com/FwjBMJib - Dec 30th,2011
  2642. - part 2: http://pastebin.com/R9gpVemL - Jan 3rd, 2012
  2643. - part 3: http://pastebin.com/vgj3qKDW - Jan 3rd, 2012
  2644. - part 4: http://pastebin.com/F1JcZHLz - Jan 5th, 2012
  2645. - version 5000:
  2646.           http://pastebin.com/M7ZwwVCA - Mar 6th, 2012
  2647. - version 6000:
  2648.                                        - Aug 31th, 2012
  2649. ------ -  ---------------------------- - -------------
  2650.  
  2651.              Thanks for reading!
  2652.  
  2653. If you enjoy this document please tell the admins of the
  2654. websites you visit from within this document where you
  2655. found them and provide them with a link to this
  2656. document.
  2657. =========================================================
  2658. Consideration #1: Are crossword puzzles and similar puzzles
  2659. published in print simply devices to alter the brain by
  2660. inserting carefully prepared words, phrases, and
  2661. numbers into your thought processes in order to trigger
  2662. or establish some type of action, or... connection.. to
  2663. something?
  2664.  
  2665. Consideration #2: What if all secret agencies were of one
  2666. accord spiritually, like in the paintings of dogs playing
  2667. poker, just using humanity to play out one big game of
  2668. destruction and domination with humans as the visible and
  2669. spiritual puppets?
  2670. =========================================================