PDA Logo.gif (6595 bytes)

Peter T. Davis's Bookmarks

home

our services

about Peter Davis+Assoc.

contact

security/audit info

Privacy Test

Security & Audit Tools

CyberScribblings

Security & Audit Calendar

Security & Audit Products
 
Top Ten Security Links

Peter T. Davis' bookmarks 

Security & Audit Checklists
 
Computer & Security
Glossary
 
Security & Audit Bibliography  
Search Page

legal info

privacy info

Security


[button] Computer Crime and Forensics [button] Passwords
[button] Response Teams [button] Secure Programming
[button] Security Awareness [button] Security Directories & Sites
[button] Security General [button] Security Organizations
[button] Security Policies [button] Security Software
[button] Security Vendors [button] Viruses
[button] Vulnerabilities  

Computer Crime and Forensics

!Data Recovery: Vogon International Data Recovery and Forensic Computing
Conversions Plus Product Area: Don't get caught with a file you can't open
Coroner's Toolkit - Fish.com
cybermation - Enterprise Job Scheduling, Workload Management and Parallel Sysplex
Enterprise Systems | Column: Computer Forensics Resources: Where to Start
Enterprise Systems | Column: Unleash the Cyberhounds!
etree.org | software
Forensic Computing & Analysis
Foundstone - Know Vulnerabilities
Guidance Software
Handbook of Forensic Services: Introduction (1999)
Hex Editor, Disk Editor, RAM Editor - Download
IHT Con men and cash machines
Jasc Quick View Plus
NTI - Computer Evidence Leaders
rfp-policy Full Disclosure
Rob Slade's Forensic Programming course - Table of Contents
Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations (July 2002)
TECHNICAL SECURITY BRANCH - Homepage

[Back to Index][Go Back]

Passwords

c't 11/2002, page 114 - Biometrie
LASEC Welcome
Lilli's Password Gnerator
NCSA: Elimination of Clear Text Logins and Passwords
Need a Password? Just Call the Help Desk | Computerworld Communities Story
Password Recovery Software - www.lostpassword.com
SecurtyStats - Password Strength Meter
Reinhold's PassGen
The Diceware Passphrase Home Page

[Back to Index][Go Back]

Response Teams

(rfc2350.txt)
AUB Lebanon On-line
AusCERT - Australian Computer Emergency Response Team
Bibliography of Computer Security Incident Handling Documents
Canadian Computer Emergency Response Team (CanCERT) Home Page
CERT® Summaries
CERT/CC Current Activity
Cisco Product Security Incident Response
CERT/CC Overview Incident and Vulnerability Trends
Forum of Incident Response and Security Teams
Incident Response, Computer Forensic Analysis, and Electronic Investigations
Institute for Advanced Technology Training - Overview - Incident Response
Internet Security Systems, Inc.
MyCERT: List of other CERTs
Welcome to incidents.org - By The SANS Institute

[Back to Index][Go Back]

Secure Programming

(In)Secure Programming
@stake Academy Application Security
CERIAS - Network Security / Java
Cgisecurity.com Web Application security news and more
Compuware's DevPartner Product Family
Developer Lifestyle running as non-admin
Developing Software in Visual Studio .NET with Non-Administrative Privileges
Internet Programming
Java Tester
JavaScript programming
Macromedia ColdFusion - Advanced Security Overview
MandrakeSecure: Secure Programming
Microsoft coders get a bug-catcher - Tech News - CNET.com
NCSA Secure Programming Guidelines
oreilly.com -- Online Catalog Secure Coding Principles & Practices
OUSPG: Oulu University Secure Programming Group
PERL Taint Mode
Securable Objects (Security Platform SDK)
Secure Coding: Principles & Practices
Secure Internet Programming Laboratory
Secure Programming - FreeBSD Developer's Handbook
Secure Programming - Italian
Secure Programming - Security Focus
Secure Programming - Security Labs
Secure Programming for Linux and Unix HOWTO
Secure UNIX Programming FAQ
Secure UNIX Programming FAQ
SecurityFocus HOME Infocus: Secure Programming with .NET
Software Design - Error Messages for Windows
Splint Home Page
The Peon's Guide To Secure System Development
The Shmoo Group - How to Write Secure Code
The Unix Secure Programming FAQ - SunWorld - August 1998
UNIX Security Checklist v2.0 - Full Version
UW Security Site--Learn secure programming
Zend - Secure Programming in PHP

[Back to Index][Go Back]

Security Awareness

Black Hat Multimedia - Audio and Video Archives
Brainbench - The Measure of Achievement
Computer Security Poster 1
Computer Security Poster 2
Federated identities create new security risks
ITworldcanada.com Security Portal
Journal of Electronic Commerce
Microsoft 5-Min Security Advisor
Old hard drives yield data bonanza | CNET News.com
Password sharing
Rob Slade's Pointers to Community Security Education Contacts
searchSecurity.com: The Security Specific Search Engine presented by TechTarget.com
Security Awareness, Inc. - Home page
SHOCKWAVEWRITERS
Special supplement: Homeland security
SubIntSoc.net: Create Your Own Terror Warning
Symantec Enterprise Solutions 10 Steps
The Ten Immutable Laws of Security
Visible Statement
Welcome to the Saltmeadow Privacy Package

[Back to Index][Go Back]

Security Directories & Sites

Ask the Experts - searchSecurity.com: The Security Specific Search Engine
Best Security Web Links - searchSecurity.com: The Security Specific Search Engine
CompInfo - Systems Management and System Security - Information Sources & Suppliers
Computer Security Information
Kurt Seifried - information security
Neohapsis Archives - http://archives.neohapsis.com/
Network Security Library
SearchSecurity.com
searchSecurity.com: The Security Specific Search Engine presented by TechTarget.com
Security.NL maakt Nederland veilig - Nederlandse nieuwssite over gegevensbeveiliging en privacy
Security: Index - Glossary
Security Benchmark :: Summary
Security Reference - MonitorWare
Security Supersite from Ziff Davis | Computer, Internet and Network Security News and Insight
Security World Wide Web (WWW) Sites
The ABCs of Security - Security & Privacy Research Center
The Security Search Engine - Firewalls, Antivirus, Intrusion Detection, Vulnerabilities, Advisories and Auditing Software.
The w00w00 Security Research Group

[Back to Index][Go Back]

Security General

Autoclave - Secure Disk Deletion
Commweb - Managed Security Services
Computer Security Resources
Contents of PC Security and Confidentiality Pages
Executive Security International Online Catalog
Information Security Magazine
LAN Security Guidelines
Network Computing | Feature | The Survivor's Guide to 2001 | Service Providers & Outsourcing | Full Article | December 11, 2000
SANS Resources - How To Eliminate The Ten Most Critical Internet Security Threats
Secure Deletion of Data from Magnetic and Solid-State Memory
Security Benchmark - Comprehensive Information Security Resources
Security Resources
Story: Technology Out of Control? Why Insiders are Afraid
Telecommuters On Security Alert
The Fat of the LAN | Page 1 | February 7, 2000
TILE.NET/LISTS
Visa to Require E-Security Rules

[Back to Index][Go Back]

Security Organizations

(http://www.pcis.org/)
(ISC)²
ASIS International: Certified Protection Professional
ASQ Quality Central
Canadian Alarm and Security Association - (CANASA)
Center for Education and Research in Information Assurance and Security (CERIAS)
Center for Internet Security
Certification & Accreditation
Consumer Information Security - Federal Trade Commission
DARPA/IAO
Economic Crime Investigation Institute
FS-ISAC Home
FSP - Federation of Security Professionals
Human Firewall - Be aware. Be secure.
Information Protection Association of Manitoba
Information Technology Association of America Website
Institute for Advanced Technology Training - Overview - Incident Response
International Association for Cryptographic Variety
Internet Fraud Complaint Center
ISIS initiative
ISSA - Information Systems Security Association
National Center for Manufacturing Sciences
National Infrastructure Protection Center (NIPC) - Home Page
National Infrastructure Protection Center (NIPC) - Information Sharing - Key Asset Initiative
National Infrastructure Protection Center (NIPC) - Related Sites
National White Collar Crime Center
New England Information Security User Group
NIST Computer Security Resource Clearinghouse
OASIS - Technical Committees - Security Services TC - SSTC
Pink Elephant - Leading the Way in IT Service Management Best Practices
Privacy International - Stupid Security
SANS
Security Certifications for the IT Pro
Security Groups and Organizations
security resource net's computer security
SEI Home Page
Technical Analysis Group (TAG) - The Law Enforcement Tools and Technologies for Investigating Cyber Attacks: A National Needs Assessment - Institute for Security Technology Studies (ISTS) - Research Products that identify and Address Critical Federal, State, and Local Law Enforcement Needs
TCPA / Palladium FAQ
The Black Forest Group
The Computer Security Institute
The Horde Project
The Ideahamster Organization
The Institute for Applied Network Security
The Institute for Information Infrastruture Protection (I3P)
TruSecure Corporation Security Solutions - Certifications
Trusted Computing Platform Alliance
Welcome to InfraGard
Welcome to the e-Authentication home page
www.condemned.org

[Back to Index][Go Back]

Security Policies

ADL Jewish Security Manual
Best Security Web Links - searchSecurity.com: Policy & Infrastructure
BSI Releases Update to Information Security Standard
CASPR Home-Page Commonly Accepted Security Practices & Recommendations
Computer and Communication Standards
COMPUTERS - SECURITY resources from Nerd World Media
DISC Standard's
ftp://ftp.mr.net/pub/MRNet-info/MRNet-AUP.txt
ftp://ftp.sesqui.net/pu....policies/sesquinet.txt
Model may provide security benchmark
NIST Computer Security DRAFT Publications
Rainbow Series Library
Security Policies
Treasury Board of Canada - Security - Policies and Publications
US Government Security Reporting

[Back to Index][Go Back]

Security Software

CIAC's Security Tools
It's the Software, Stupid! (Security Scanner) -- ITS4 [Reliable Software Technologies]
Netsurfer Focus: Computer and Network Security
Safetynet's Security and Anti-Virus Cafe'
TSCM.COM - Counterintelligence and Technical Security WWW Page

[Back to Index][Go Back]

Security Vendors

:: RSNetworks.net ::
:: Virtela Communications ::
+ ITSEC Associates Limited +
--InternetSecure -- Real Time Credit Card Processing
ActionFront.com - The Best in Data Recovery Services.
ASPG - Advanced Software Products Group
Avatier Corporation : Command Your Greatest Asset
AVENTAIL CORPORATION
Blockade - Password Synchronization and Enterprise Access Control
CAI Security
Cerberus Information Security - Advisories
Cerberus Information Security - Tools
ContinuityPlanner.com - Continuity Planner - business continuity / disaster recovery / contingency planning
Courion
Edgetech Services
eEye™ Digital Security
Emergency Notification - Alertcast Emergency Notification Service
Entegrity Solutions Corporation - Ensuring the Integrity of Information Throughout the Enterprise
Entercept - protection of Web applications and Web servers
EnvestOnline
eSecurityOnline
Fred Cohen & Associates
Gibson Research Corporation Homepage
Gilian Technologies
InformationWeek > Security > Global Information Security 2002 > July 5, 2002
Intellitactics
Interpact Security Awareness and Information Security Services
Intiss Links Page
KaVaDo Inc. - Homepage
NetWorth
Oblix | Identity-Based Security Solutions(TM)
Outsourced Security On The Rise
NetVision - Directory Enabled Security
PLANS AND KITS UNLIMITED
Pointsec mobile device security hard disk encryption authentication access control
PowerTech: Demo
Proginet - Secure file transfer, secure FTP transfer, secure data transfer, secure information transfer,
RemarQ - The Internet's Best Discussion Services -- www.remarQ.com
SafeHarbor - Customer Support Outsource
Sandstorm Enterprises, Inc.
Secunia - Stay Secure
SecureLogix Corporation, a leader in the information security community.
Security Automation, Inc.
SecurityFocus
SecurNET - Providing Internet Threat Assessment and Internet Security Audits
Symantec Enterprise Solutions
Tivoli software from IBM: security, storage, and e-business systems management
Total Password Management
V-one
Vigilar
Waveset Technologies - Secure Identity Management
Welcome to Pro-Ware Computing Inc.
Welcome to Southwest Telecom Services
Welcome to Wick Hill Group
World Wide Digital Security, Inc.
Zero-Knowledge Systems

[Back to Index][Go Back]

Viruses

avast! antivirus software - computer virus, worm and Trojan protection by ALWIL Software
AVG Anti-Virus System Main Page
AVIEN.ORG - Homepage
CyberSoft Home Page
Internet Security News: [ISN] FrontPage Bug Opens Microsoft Sites To Attackers
McAfee - AVERT
McAfee - AVERT Tools
McAfee ASaP - Security HQ
MessageLabs - VirusEye
NH&A WWW page
Trend Micro Incorporated
Vmyths.com- Rants
Vmyths.com- Truth About Computer Virus Myths & Hoaxes

[Back to Index][Go Back]

Vulnerabilities

CVE - Common Vulnerabilities and Exposures List
Immunity - Main
ISS X-Force
SecurityTracker.com - Keep Track of the Lastest Vulnerabilities!
TESO Security Group
Vulnerabilities dot org - Security Analysis Services
VulnWatch vulnerability disclosure list

[Back to Index][Go Back]