HUGE Security Resource

HUGE Security Resource+ – version 6000 – 08/31/2012

(Security + Trimmings!)

 

https://en.wikipedia.org/wiki/Acoustic_cryptanalysis

https://en.wikipedia.org/wiki/Acoustic_fingerprint

https://en.wikipedia.org/wiki/Advanced_Persistent_Threat

https://en.wikipedia.org/wiki/Agent_handling

https://en.wikipedia.org/wiki/Agent_provocateur

https://en.wikipedia.org/wiki/Aircrack-ng

https://en.wikipedia.org/wiki/Amateur_radio

https://en.wikipedia.org/wiki/Anonymizer

https://en.wikipedia.org/wiki/Anonymous_remailer

https://en.wikipedia.org/wiki/ARP_poisoning

https://en.wikipedia.org/wiki/ARP_spoofing

https://en.wikipedia.org/wiki/Arpwatch

https://en.wikipedia.org/wiki/Audio_signal_processing

https://en.wikipedia.org/wiki/Automatic_Packet_Reporting_System

https://en.wikipedia.org/wiki/Backdoor_%28computing%29

https://en.wikipedia.org/wiki/Behavioral_targeting

https://en.wikipedia.org/wiki/Bioacoustics

https://en.wikipedia.org/wiki/BitTorrent_protocol_encryption

https://en.wikipedia.org/wiki/Black_operation

https://en.wikipedia.org/wiki/Black_propaganda

https://en.wikipedia.org/wiki/Black_site

https://en.wikipedia.org/wiki/Bluebugging

https://en.wikipedia.org/wiki/Bluejacking

https://en.wikipedia.org/wiki/Bluesnarfing

https://en.wikipedia.org/wiki/BrainGate

https://en.wikipedia.org/wiki/Category:Activism

https://en.wikipedia.org/wiki/Category:Activism_by_method

https://en.wikipedia.org/wiki/Category:Amateur_radio

https://en.wikipedia.org/wiki/Category:American_spies

https://en.wikipedia.org/wiki/Category:American_whistleblowers

https://en.wikipedia.org/wiki/Category:Analysis

https://en.wikipedia.org/wiki/Category:Applications_of_cryptography

https://en.wikipedia.org/wiki/Category:Applied_ethics

https://en.wikipedia.org/wiki/Category:Automatic_identification_and_data_capture

https://en.wikipedia.org/wiki/Category:Barcodes

https://en.wikipedia.org/wiki/Category:BitTorrent

https://en.wikipedia.org/wiki/Category:Black_projects

https://en.wikipedia.org/wiki/Category:Bluetooth

https://en.wikipedia.org/wiki/Category:Books_about_the_Central_Intelligence_Agency

https://en.wikipedia.org/wiki/Category:Branches_of_psychology

https://en.wikipedia.org/wiki/Category:Central_Intelligence_Agency

https://en.wikipedia.org/wiki/Category:Central_Intelligence_Agency_operations

https://en.wikipedia.org/wiki/Category:Christianity

https://en.wikipedia.org/wiki/Category:Christian_terms

https://en.wikipedia.org/wiki/Category:Civil_disobedience

https://en.wikipedia.org/wiki/Category:Codecs

https://en.wikipedia.org/wiki/Category:Code_names

https://en.wikipedia.org/wiki/Category:COINTELPRO_targets

https://en.wikipedia.org/wiki/Category:Communication_of_falsehoods

https://en.wikipedia.org/wiki/Category:Computational_linguistics

https://en.wikipedia.org/wiki/Category:Computational_statistics

https://en.wikipedia.org/wiki/Category:Computer_file_formats

https://en.wikipedia.org/wiki/Category:Computer_networking

https://en.wikipedia.org/wiki/Category:Computer_network_security

https://en.wikipedia.org/wiki/Category:Computer_security

https://en.wikipedia.org/wiki/Category:Computer_security_exploits

https://en.wikipedia.org/wiki/Category:Computer_security_organizations

https://en.wikipedia.org/wiki/Category:Computer_security_software

https://en.wikipedia.org/wiki/Category:Concepts_in_ethics

https://en.wikipedia.org/wiki/Category:Confidence_tricks

https://en.wikipedia.org/wiki/Category:Conspiracy_theories

https://en.wikipedia.org/wiki/Category:Counter-intelligence

https://en.wikipedia.org/wiki/Category:Counter-terrorism

https://en.wikipedia.org/wiki/Category:Counter-terrorist_organizations

https://en.wikipedia.org/wiki/Category:Covert_organizations

https://en.wikipedia.org/wiki/Category:Critical_thinking

https://en.wikipedia.org/wiki/Category:Crowd_psychology

https://en.wikipedia.org/wiki/Category:Cryptanalytic_devices

https://en.wikipedia.org/wiki/Category:Cryptanalytic_software

https://en.wikipedia.org/wiki/Category:Cryptographic_attacks

https://en.wikipedia.org/wiki/Category:Cryptographic_hardware

https://en.wikipedia.org/wiki/Category:Cryptography

https://en.wikipedia.org/wiki/Category:Cybercrime

https://en.wikipedia.org/wiki/Category:Cyberwarfare

https://en.wikipedia.org/wiki/Category:Data_collection

https://en.wikipedia.org/wiki/Category:Data_compression

https://en.wikipedia.org/wiki/Category:Data_security

https://en.wikipedia.org/wiki/Category:Data_transmission

https://en.wikipedia.org/wiki/Category:Deception

https://en.wikipedia.org/wiki/Category:Denial-of-service_attacks

https://en.wikipedia.org/wiki/Category:Digital_signal_processing

https://en.wikipedia.org/wiki/Category:Diversionary_tactics

https://en.wikipedia.org/wiki/Category:Electronic_test_equipment

https://en.wikipedia.org/wiki/Category:Electronic_warfare

https://en.wikipedia.org/wiki/Category:Encodings

https://en.wikipedia.org/wiki/Category:Encryption_devices

https://en.wikipedia.org/wiki/Category:Espionage

https://en.wikipedia.org/wiki/Category:Espionage_devices

https://en.wikipedia.org/wiki/Category:Espionage_projects

https://en.wikipedia.org/wiki/Category:Espionage_techniques

https://en.wikipedia.org/wiki/Category:Etiquette

https://en.wikipedia.org/wiki/Category:File_sharing_networks

https://en.wikipedia.org/wiki/Category:Gambling_terminology

https://en.wikipedia.org/wiki/Category:Hacking_%28computer_security%29

https://en.wikipedia.org/wiki/Category:Historians_of_the_Central_Intelligence_Agency

https://en.wikipedia.org/wiki/Category:History_of_radio

https://en.wikipedia.org/wiki/Category:History_of_telecommunications

https://en.wikipedia.org/wiki/Category:History_of_the_Internet

https://en.wikipedia.org/wiki/Category:Injection_exploits

https://en.wikipedia.org/wiki/Category:Intelligence_%28information_gathering%29

https://en.wikipedia.org/wiki/Category:Intelligence_agencies

https://en.wikipedia.org/wiki/Category:Intelligence_agencies_by_country

https://en.wikipedia.org/wiki/Category:Intelligence_analysis

https://en.wikipedia.org/wiki/Category:Intelligence_operations

https://en.wikipedia.org/wiki/Category:International_security

https://en.wikipedia.org/wiki/Category:Interrogation_techniques

https://en.wikipedia.org/wiki/Category:Law_enforcement

https://en.wikipedia.org/wiki/Category:Law_enforcement_equipment

https://en.wikipedia.org/wiki/Category:Law_enforcement_techniques

https://en.wikipedia.org/wiki/Category:Law_enforcement_terminology

https://en.wikipedia.org/wiki/Category:Linux_security_software

https://en.wikipedia.org/wiki/Category:Malware

https://en.wikipedia.org/wiki/Category:Mass_surveillance

https://en.wikipedia.org/wiki/Category:Media_manipulation

https://en.wikipedia.org/wiki/Category:Metaphysics

https://en.wikipedia.org/wiki/Category:Microscopy

https://en.wikipedia.org/wiki/Category:Military_communications

https://en.wikipedia.org/wiki/Category:Military_intelligence

https://en.wikipedia.org/wiki/Category:Military_operations_by_type

https://en.wikipedia.org/wiki/Category:Military_organization

https://en.wikipedia.org/wiki/Category:Military_psychiatry

https://en.wikipedia.org/wiki/Category:Military_science

https://en.wikipedia.org/wiki/Category:Military_technology

https://en.wikipedia.org/wiki/Category:Mind_control

https://en.wikipedia.org/wiki/Category:Morse_code

https://en.wikipedia.org/wiki/Category:National_security

https://en.wikipedia.org/wiki/Category:National_Security_Agency

https://en.wikipedia.org/wiki/Category:National_Security_Agency_encryption_devices

https://en.wikipedia.org/wiki/Category:Network_addressing

https://en.wikipedia.org/wiki/Category:Network_architecture

https://en.wikipedia.org/wiki/Category:Network_management

https://en.wikipedia.org/wiki/Category:Neuropsychology

https://en.wikipedia.org/wiki/Category:Neuroscience

https://en.wikipedia.org/wiki/Category:Non-fiction_books_about_espionage

https://en.wikipedia.org/wiki/Category:Non-military_counter-terrorist_organizations

https://en.wikipedia.org/wiki/Category:Nonverbal_communication

https://en.wikipedia.org/wiki/Category:Operations_involving_special_forces

https://en.wikipedia.org/wiki/Category:Organized_crime

https://en.wikipedia.org/wiki/Category:Packet_radio

https://en.wikipedia.org/wiki/Category:Paramilitary_organizations

https://en.wikipedia.org/wiki/Category:People_of_the_Central_Intelligence_Agency

https://en.wikipedia.org/wiki/Category:Perimeter_security

https://en.wikipedia.org/wiki/Category:Persuasion_techniques

https://en.wikipedia.org/wiki/Category:Philosophical_concepts

https://en.wikipedia.org/wiki/Category:Philosophical_methodology

https://en.wikipedia.org/wiki/Category:Philosophy

https://en.wikipedia.org/wiki/Category:Philosophy_of_language

https://en.wikipedia.org/wiki/Category:Privacy

https://en.wikipedia.org/wiki/Category:Privacy_of_telecommunications

https://en.wikipedia.org/wiki/Category:Problem_solving

https://en.wikipedia.org/wiki/Category:Propaganda

https://en.wikipedia.org/wiki/Category:Propaganda_in_the_United_States

https://en.wikipedia.org/wiki/Category:Propaganda_techniques

https://en.wikipedia.org/wiki/Category:Psychiatric_treatments

https://en.wikipedia.org/wiki/Category:Psychological_manipulation

https://en.wikipedia.org/wiki/Category:Psychological_warfare

https://en.wikipedia.org/wiki/Category:Public-key_cryptography

https://en.wikipedia.org/wiki/Category:Quantized_radio_modulation_modes

https://en.wikipedia.org/wiki/Category:Radio

https://en.wikipedia.org/wiki/Category:Religious_philosophy

https://en.wikipedia.org/wiki/Category:Researchers_of_the_John_F._Kennedy_assassination

https://en.wikipedia.org/wiki/Category:Research_methods

https://en.wikipedia.org/wiki/Category:Rootkits

https://en.wikipedia.org/wiki/Category:Secrecy

https://en.wikipedia.org/wiki/Category:Secret_broadcasting

https://en.wikipedia.org/wiki/Category:Secret_government_programs

https://en.wikipedia.org/wiki/Category:Secret_military_programs

https://en.wikipedia.org/wiki/Category:Security

https://en.wikipedia.org/wiki/Category:Security_companies

https://en.wikipedia.org/wiki/Category:Signals_intelligence

https://en.wikipedia.org/wiki/Category:Signals_intelligence_agencies

https://en.wikipedia.org/wiki/Category:Social_engineering_(computer_security)

https://en.wikipedia.org/wiki/Category:Solid-state_computer_storage

https://en.wikipedia.org/wiki/Category:Spies_by_role

https://en.wikipedia.org/wiki/Category:Statistical_software

https://en.wikipedia.org/wiki/Category:Steganography

https://en.wikipedia.org/wiki/Category:Surveillance

https://en.wikipedia.org/wiki/Category:Survival_skills

https://en.wikipedia.org/wiki/Category:Telecommunications

https://en.wikipedia.org/wiki/Category:Telegraphy

https://en.wikipedia.org/wiki/Category:Theology

https://en.wikipedia.org/wiki/Category:United_States_Department_of_Defense_agencies

https://en.wikipedia.org/wiki/Category:United_States_government_secrecy

https://en.wikipedia.org/wiki/Category:Video_hosting

https://en.wikipedia.org/wiki/Category:Warfare_by_type

https://en.wikipedia.org/wiki/Category:Whistleblowers_by_nationality

https://en.wikipedia.org/wiki/Category:Wireless_networking

https://en.wikipedia.org/wiki/Category:Works_about_espionage

https://en.wikipedia.org/wiki/Central_Intelligence_Agency

https://en.wikipedia.org/wiki/Chaffing_and_winnowing

https://en.wikipedia.org/wiki/Christianity

https://en.wikipedia.org/wiki/Church_Committee

https://en.wikipedia.org/wiki/CIA_influence_on_public_opinion

https://en.wikipedia.org/wiki/Citizens%27_Commission_to_Investigate_the_FBI

https://en.wikipedia.org/wiki/Citizens_Rule_Book

https://en.wikipedia.org/wiki/Clandestine_operation

https://en.wikipedia.org/wiki/Cointelpro

https://en.wikipedia.org/wiki/Cold_boot_attack

https://en.wikipedia.org/wiki/Communications_Assistance_for_Law_Enforcement_Act

https://en.wikipedia.org/wiki/Comparison_of_BitTorrent_clients

https://en.wikipedia.org/wiki/Comparison_of_download_managers

https://en.wikipedia.org/wiki/Comparison_of_portable_media_players

https://en.wikipedia.org/wiki/Comparison_of_video_hosting_services

https://en.wikipedia.org/wiki/Comparison_of_VoIP_software

https://en.wikipedia.org/wiki/CompStat

https://en.wikipedia.org/wiki/Computer_and_Internet_Protocol_Address_Verifier

https://en.wikipedia.org/wiki/Computer_insecurity

https://en.wikipedia.org/wiki/Computer_surveillance

https://en.wikipedia.org/wiki/Confidence_trick

https://en.wikipedia.org/wiki/Consensus_reality

https://en.wikipedia.org/wiki/Covert_operation

https://en.wikipedia.org/wiki/Cryptographic_hash_function

https://en.wikipedia.org/wiki/Cut-out_%28espionage%29

https://en.wikipedia.org/wiki/CyanogenMod

https://en.wikipedia.org/wiki/Cygwin

https://en.wikipedia.org/wiki/Data_acquisition

https://en.wikipedia.org/wiki/Data_remanence

https://en.wikipedia.org/wiki/Deep_packet_inspection

https://en.wikipedia.org/wiki/Defense

https://en.wikipedia.org/wiki/Dehumidifier

https://en.wikipedia.org/wiki/Deluge_%28software%29

https://en.wikipedia.org/wiki/Digital_signal_processing

https://en.wikipedia.org/wiki/Digital_signature

https://en.wikipedia.org/wiki/Digital_traces

https://en.wikipedia.org/wiki/DNS_spoofing

https://en.wikipedia.org/wiki/Doctrine_of_mental_reservation

https://en.wikipedia.org/wiki/ECHELON

https://en.wikipedia.org/wiki/Electrical_measurements

https://en.wikipedia.org/wiki/Electromagnetic_interference

https://en.wikipedia.org/wiki/Electromagnetic_pulse

https://en.wikipedia.org/wiki/Electromagnetic_radiation_and_health

https://en.wikipedia.org/wiki/Electromagnetic_shielding

https://en.wikipedia.org/wiki/Electromagnetic_spectrum

https://en.wikipedia.org/wiki/Electronic_signature

https://en.wikipedia.org/wiki/EMF_measurement

https://en.wikipedia.org/wiki/Espionage

https://en.wikipedia.org/wiki/Executable_and_Linkable_Format

https://en.wikipedia.org/wiki/Exploit_%28computer_science%29

https://en.wikipedia.org/wiki/Fair_use

https://en.wikipedia.org/wiki/Family_Jewels_%28Central_Intelligence_Agency%29

https://en.wikipedia.org/wiki/Faraday_cage

https://en.wikipedia.org/wiki/Fast_Fourier_Transform

https://en.wikipedia.org/wiki/Forensic_linguistics

https://en.wikipedia.org/wiki/Freedom_of_information

https://en.wikipedia.org/wiki/Freedom_of_information_legislation

https://en.wikipedia.org/wiki/Free_software

https://en.wikipedia.org/wiki/Free_speech_zone

https://en.wikipedia.org/wiki/Frequency_analysis

https://en.wikipedia.org/wiki/Frequency_counter

https://en.wikipedia.org/wiki/Fusion_center

https://en.wikipedia.org/wiki/Gary_Webb

https://en.wikipedia.org/wiki/Gutmann_method

https://en.wikipedia.org/wiki/High-frequency_direction_finding

https://en.wikipedia.org/wiki/Honeypot_%28computing%29

https://en.wikipedia.org/wiki/Host_protected_area

https://en.wikipedia.org/wiki/Hosts_file

https://en.wikipedia.org/wiki/Htaccess

https://en.wikipedia.org/wiki/HTTP_tunnel_(software)

https://en.wikipedia.org/wiki/I2P

https://en.wikipedia.org/wiki/IEEE_802.11i-2004

https://en.wikipedia.org/wiki/IMSI-catcher

https://en.wikipedia.org/wiki/Information_visualization

https://en.wikipedia.org/wiki/Information_wants_to_be_free

https://en.wikipedia.org/wiki/Infrasound

https://en.wikipedia.org/wiki/Intelligence_collection_management

https://en.wikipedia.org/wiki/International_Spy_Museum

https://en.wikipedia.org/wiki/Internet_protocol_suite

https://en.wikipedia.org/wiki/Iran-Contra_Affair

https://en.wikipedia.org/wiki/John_F._Kennedy_assassination_conspiracy_theories

https://en.wikipedia.org/wiki/Jury_nullification

https://en.wikipedia.org/wiki/Laser_microphone

https://en.wikipedia.org/wiki/Linux_malware

https://en.wikipedia.org/wiki/List_of_CB_slang

https://en.wikipedia.org/wiki/List_of_codecs

https://en.wikipedia.org/wiki/List_of_con_artists

https://en.wikipedia.org/wiki/List_of_confidence_tricks

https://en.wikipedia.org/wiki/List_of_conspiracies_%28political%29

https://en.wikipedia.org/wiki/List_of_counterintelligence_organizations

https://en.wikipedia.org/wiki/List_of_countries_by_Failed_States_Index

https://en.wikipedia.org/wiki/List_of_criminal_enterprises,_gangs_and_syndicates

https://en.wikipedia.org/wiki/List_of_defunct_intelligence_agencies

https://en.wikipedia.org/wiki/List_of_information_graphics_software

https://en.wikipedia.org/wiki/List_of_intelligence_agencies

https://en.wikipedia.org/wiki/List_of_intelligence_gathering_disciplines

https://en.wikipedia.org/wiki/List_of_international_common_standards

https://en.wikipedia.org/wiki/List_of_Linux_computer_viruses

https://en.wikipedia.org/wiki/List_of_numerical_analysis_software

https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers

https://en.wikipedia.org/wiki/List_of_video_hosting_services

https://en.wikipedia.org/wiki/MAC_address

https://en.wikipedia.org/wiki/Magic_Lantern_%28software%29

https://en.wikipedia.org/wiki/Md5

https://en.wikipedia.org/wiki/Measuring_receiver

https://en.wikipedia.org/wiki/Media_manipulation

https://en.wikipedia.org/wiki/Microexpression

https://en.wikipedia.org/wiki/Mind_control

https://en.wikipedia.org/wiki/Mitrokhin_Archive

https://en.wikipedia.org/wiki/Moscow_rules

https://en.wikipedia.org/wiki/Musical_acoustics

https://en.wikipedia.org/wiki/Music_cognition

https://en.wikipedia.org/wiki/National_Cryptologic_Museum

https://en.wikipedia.org/wiki/National_Security_Agency

https://en.wikipedia.org/wiki/Nonverbal_communication

https://en.wikipedia.org/wiki/Numbers_station

https://en.wikipedia.org/wiki/OpenBSD_Journal

https://en.wikipedia.org/wiki/OpenID

https://en.wikipedia.org/wiki/Operation_Mockingbird

https://en.wikipedia.org/wiki/Operation_Northwoods

https://en.wikipedia.org/wiki/Operation_RAFTER

https://en.wikipedia.org/wiki/Optical_microscope

https://en.wikipedia.org/wiki/Organizationally_Unique_Identifier

https://en.wikipedia.org/wiki/OSSEC

https://en.wikipedia.org/wiki/Packet_radio

https://en.wikipedia.org/wiki/Palantir_Technologies

https://en.wikipedia.org/wiki/Panopticon

https://en.wikipedia.org/wiki/Paralanguage

https://en.wikipedia.org/wiki/Patriot_Act

https://en.wikipedia.org/wiki/Perl

https://en.wikipedia.org/wiki/Phishing

https://en.wikipedia.org/wiki/Pod_slurping

https://en.wikipedia.org/wiki/Police_code#The_Hundred_Code

https://en.wikipedia.org/wiki/Port_forwarding

https://en.wikipedia.org/wiki/Power_analysis

https://en.wikipedia.org/wiki/Project_ARTICHOKE

https://en.wikipedia.org/wiki/Project_Chatter

https://en.wikipedia.org/wiki/Project_MINARET

https://en.wikipedia.org/wiki/Project_MKDELTA

https://en.wikipedia.org/wiki/Project_MKNAOMI

https://en.wikipedia.org/wiki/Project_MKUltra

https://en.wikipedia.org/wiki/Project_Shamrock

https://en.wikipedia.org/wiki/Psikhushka

https://en.wikipedia.org/wiki/Psychological_manipulation

https://en.wikipedia.org/wiki/Psychological_Operations_%28United_States%29

https://en.wikipedia.org/wiki/Public-key_cryptography

https://en.wikipedia.org/wiki/QBittorrent

https://en.wikipedia.org/wiki/Q_code

https://en.wikipedia.org/wiki/QR_Code

https://en.wikipedia.org/wiki/Radio_direction_finder

https://en.wikipedia.org/wiki/Reality_mining

https://en.wikipedia.org/wiki/Red_squad

https://en.wikipedia.org/wiki/Reid_technique

https://en.wikipedia.org/wiki/Richard_Stallman

https://en.wikipedia.org/wiki/Rogue_DHCP

https://en.wikipedia.org/wiki/Room_641A

https://en.wikipedia.org/wiki/Rootkit

https://en.wikipedia.org/wiki/Scopolamine#Use_in_interrogation

https://en.wikipedia.org/wiki/Scrambler

https://en.wikipedia.org/wiki/Screencast

https://en.wikipedia.org/wiki/Secure_Communication

https://en.wikipedia.org/wiki/Secure_computing

https://en.wikipedia.org/wiki/Secure_digital_card

https://en.wikipedia.org/wiki/Secure_telephone

https://en.wikipedia.org/wiki/Security_engineering

https://en.wikipedia.org/wiki/Seismology

https://en.wikipedia.org/wiki/SheevaPlug

https://en.wikipedia.org/wiki/Shellcode

https://en.wikipedia.org/wiki/Shill

https://en.wikipedia.org/wiki/Shortwave

https://en.wikipedia.org/wiki/Shred_%28Unix%29

https://en.wikipedia.org/wiki/Side_channel_attack

https://en.wikipedia.org/wiki/Signal_analysis

https://en.wikipedia.org/wiki/Silent_speech_interface

https://en.wikipedia.org/wiki/Simulated_reality

https://en.wikipedia.org/wiki/Situation_awareness

https://en.wikipedia.org/wiki/Smartdust

https://en.wikipedia.org/wiki/Snarfing

https://en.wikipedia.org/wiki/Sneakernet

https://en.wikipedia.org/wiki/Software_Defined_Radio

https://en.wikipedia.org/wiki/Software_patent_debate

https://en.wikipedia.org/wiki/Sound_synthesis

https://en.wikipedia.org/wiki/Sousveillance

https://en.wikipedia.org/wiki/Spectral_leakage

https://en.wikipedia.org/wiki/Spectral_music

https://en.wikipedia.org/wiki/Spectrogram

https://en.wikipedia.org/wiki/Spectrometer

https://en.wikipedia.org/wiki/Spectrum_analyzer

https://en.wikipedia.org/wiki/Split_tunneling

https://en.wikipedia.org/wiki/Spycatcher

https://en.wikipedia.org/wiki/Spymaster

https://en.wikipedia.org/wiki/Srm_%28Unix%29

https://en.wikipedia.org/wiki/Stanford_prison_experiment

https://en.wikipedia.org/wiki/STASI

https://en.wikipedia.org/wiki/Steganography

https://en.wikipedia.org/wiki/Stenomask

https://en.wikipedia.org/wiki/Street_light_interference_phenomenon

https://en.wikipedia.org/wiki/Subvocal_recognition

https://en.wikipedia.org/wiki/Sysctl

https://en.wikipedia.org/wiki/Telephone_tapping

https://en.wikipedia.org/wiki/Tempest_%28codename%29

https://en.wikipedia.org/wiki/Ten-code

https://en.wikipedia.org/wiki/The_CIA_and_the_Cult_of_Intelligence

https://en.wikipedia.org/wiki/The_COINTELPRO_Papers

https://en.wikipedia.org/wiki/Thermal_insulation

https://en.wikipedia.org/wiki/ThinThread

https://en.wikipedia.org/wiki/Throat_microphone

https://en.wikipedia.org/wiki/Timing_attack

https://en.wikipedia.org/wiki/Tin_foil_hat

https://en.wikipedia.org/wiki/Tor_%28anonymity_network%29

https://en.wikipedia.org/wiki/Tradecraft

https://en.wikipedia.org/wiki/Trailblazer_Project

https://en.wikipedia.org/wiki/Transmission_%28BitTorrent_client%29

https://en.wikipedia.org/wiki/TrapWire

https://en.wikipedia.org/wiki/Trusted_computing

https://en.wikipedia.org/wiki/Truth_drug

https://en.wikipedia.org/wiki/United_States_government_security_breaches

https://en.wikipedia.org/wiki/Van_Eck_phreaking

https://en.wikipedia.org/wiki/Very_low_frequency

https://en.wikipedia.org/wiki/Victor_Marchetti

https://en.wikipedia.org/wiki/Virtual_private_network

https://en.wikipedia.org/wiki/Voice_procedure

https://en.wikipedia.org/wiki/Wi-Fi

https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access

https://en.wikipedia.org/wiki/Wireless_ad-hoc_network

https://en.wikipedia.org/wiki/Wireless_mesh_network

https://en.wikipedia.org/wiki/Wireless_security

https://en.wikipedia.org/wiki/Write_amplification

https://en.wikipedia.org/wiki/Writeprint

https://en.wikipedia.org/wiki/WWV_%28radio_station%29#Standard_frequency_signals

https://en.wikipedia.org/wiki/Yahweh

https://en.wikipedia.org/wiki/Z_code

 

—————————————-

 

** 6001: Suggested Books:

 

– CLOAK & CORKSCREW: Where CIA Meets Hollywood

– For the President’s Eyes Only: Secret Intelligence and the American Presidency from Washington to Bush

– Priceless: How I Went Undercover to Rescue the World’s Stolen Treasures

– Radio Frequency Interference: How to Find It and Fix It

– SAS Survival Handbook, Revised Edition: For Any Climate, in Any Situation

– Spycatcher – by Peter Wright

– The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography

– Under and Alone: The True Story of the Undercover Agent Who Infiltrated America’s Most Violent Outlaw Motorcycle Gang

 

—————————————-

 

** 6002: Articles, Guides, How To’s:

 

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

+ (MS Kinect Spy System): http://www.pgpboard.com/viewtopic.php?f=2&t=691

+ (MS Kinect Spy System / Article mirrors): http://pastesite.com/41388 , http://paste.lisp.org/display/131227

+

+ (Spies at MS? / Snippet): http://www.pgpboard.com/viewtopic.php?f=2&t=702

+ (Spies at MS? / Full Article): http://www.pcpro.co.uk/news/security/375169/could-us-cyberspies-have-moles-inside-microsoft

+ (Spies at MS? / Discussion): http://it.slashdot.org/story/12/06/15/1614219/us-security-services-may-have-moles-within-microsoft-says-researcher

+

+ (links, tons of) http://www.loyola.edu/departments/academics/political-science/strategic-intelligence/index.html

+

http://aboba.drizzlehosting.com/IEEE/

http://advocacy.globalvoicesonline.org/projects/guide/

http://all.net/books/document/harvard.html

http://all.net/journal/50/crypt.html

http://all.net/journal/50/cybercop.html

http://all.net/journal/50/ecommerce.html

http://all.net/journal/50/firewall.html

http://all.net/journal/deception/index.html

http://all.net/journal/ntb/index.html

http://arstechnica.com/information-technology/2012/06/blowing-away-bloatware-a-guide-to-reinstalling-windows-on-a-new-pc/

http://arstechnica.com/information-technology/2012/07/freeing-your-router-from-ciscos-anti-porn-pro-copyright-cloud-service/

http://arstechnica.com/tech-policy/news/2011/02/black-ops-how-hbgary-wrote-backdoors-and-rootkits-for-the-government.ars/

http://arstechnica.com/uncategorized/2007/10/p2p-researchers-use-a-blocklist-or-you-will-be-tracked-100-of-the-time/

http://asm.sourceforge.net/

http://blog.bodhizazen.net/linux/ubuntu-how-to-faillog/

http://blog.spoofed.org/2007/12/openbsd-on-soekris-cheaters-guide.html

http://blog.webroot.com/2011/09/13/mebromi-the-first-bios-rootkit-in-the-wild/

http://catless.ncl.ac.uk/risks

http://citp.princeton.edu/research/memory/

http://crunchbanglinux.org/wiki/configuring_the_openbox_menu

http://cryptogon.com/?p=624

http://cryptogon.com/?p=877

http://cryptome.org/0002/siss.htm

http://cryptome.org/0005/cia-iqt-spies.htm

http://cryptome.org/0005/tor-opsec.htm

http://cryptome.org/0006/nsa-17-docs.htm

http://cryptome.org/2012/07/gent-forum-spies.htm

http://cryptome.org/2012/08/tor-exits-usg-funds-02.htm

http://cryptome.org/cisco-vile.txt

http://cryptome.org/isp-spy/online-spying.htm

http://cryptome.org/nsa-tempest.htm

http://cryptome.org/nsa-vaneck.htm

http://cryptome.org/tempest-law.htm

http://cwe.mitre.org/top25/

http://debian-handbook.info/browse/stable/

http://digitalcorpora.org/

http://en.community.dell.com/support-forums/software-os/w/microsoft_os/3316.2-1-microsoft-windows-7-official-iso-download-links-digital-river.aspx

http://forums.radioreference.com/

http://freehaven.net/anonbib/topic.html#Anonymous_20communication

http://hardware.slashdot.org/story/08/10/20/1248234/compromising-wired-keyboards

http://helpx.adobe.com/flash-player/kb/disable-local-shared-objects-flash.html

http://it.slashdot.org/story/02/03/09/199242/crt-eavesdropping-optical-tempest

http://it.slashdot.org/story/09/03/12/2038213/researchers-sniff-keystrokes-from-thin-air-wires

http://it.slashdot.org/story/09/07/12/0259246/stealing-data-via-electrical-outlet

http://joernfranz.net/2011/01/20/installing-ubuntu-10-10-with-full-disk-encryption/

http://lanl.arxiv.org/

http://lasecwww.epfl.ch/keyboard/

http://lifehacker.com/205090/geek-to-live–set-up-a-personal-home-ssh-server?tag=softwarehomeserver

http://lifehacker.com/237227/geek-to-live–encrypt-your-web-browsing-session-with-an-ssh-socks-proxy?tag=softwaressh

http://linuxpoison.blogspot.com/2009/06/how-to-disable-loading-of-unnecessary.html

http://log.nadim.cc/?p=78

http://mnin.org/ (Twitter: https://twitter.com/iMHLv2)

http://news.cnet.com/2010-1071-997528.html?tag=fd_nc_1 (Archived: http://pastebin.com/nHZzQyB9)

http://packetlife.net/library/cheat-sheets/

http://pastebin.com/E1YbqUMV

http://pastebin.com/JdkqxBAa

http://pastebin.com/mr5WT30M

http://pastebin.com/Qf2jHhAb

http://pastebin.com/TRXkVJ2k

http://pastebin.com/utY08tLT

http://pastebin.com/YEbM3Brv

http://people.csail.mit.edu/rivest/crypto-security.html

http://people.howstuffworks.com/individual-privacy-channel.htm

http://people.howstuffworks.com/wiretapping1.htm

http://pgp.mit.edu/

http://projects.gnome.org/gdm/docs/2.14/configuration.html?pagewanted=all

http://projects.wsj.com/surveillance-catalog/

http://research.google.com/pubs/papers.html

http://research.google.com/pubs/SecurityCryptographyandPrivacy.html

https://ccrma.stanford.edu/papers

http://security-sh3ll.blogspot.com/search/label/Papers

https://events.ccc.de/congress/2005/static/p/r/o/Category~Projects_1780.html

https://events.ccc.de/congress/2005/static/r/f/i/RFID-Zapper%28EN%29_77f3.html

https://isc.sans.edu/port.html

http://slashdot.org/story/01/01/16/139244/NSA-Reveals-Some-Tempest-Information

https://live.gnome.org/GDM/2.22/Configuration

https://memset.wordpress.com/2011/11/26/syscall-hijacking-openbsd/

http://srg.cs.illinois.edu/srg/biblio

https://secure.dslreports.com/forum/r27289884-Forensic-Cheat-Sheet

https://torrentfreak.com/stop-downloading-fakes-and-junk-torrents-071204/

https://w2.eff.org/Privacy/printers/docucolor/

https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/index.html

https://www.cl.cam.ac.uk/~mgk25/emsec/optical-faq.html

https://www.cl.cam.ac.uk/~mgk25/emsec/softtempest-faq.html

https://www.defcon.org/html/links/book-list.html

https://www.eff.org/issues/bloggers/legal/index

https://www.eff.org/issues/printers

https://www.eff.org/pages/list-printers-which-do-or-do-not-display-tracking-dots

https://www.eff.org/testyourisp

https://www.eff.org/wp/blog-safely

https://www.eff.org/wp/detecting-packet-injection

https://www.eff.org/wp/how-not-get-sued-file-sharing/

https://www.gnu.org/philosophy/

https://www.gnu.org/philosophy/why-free.html

https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xml

https://www.kuro5hin.org/story/2002/11/23/14927/477

https://www.kuro5hin.org/story/2004/10/26/02313/946

https://www.net-security.org/articles_main.php

https://www.networkworld.com/news/2009/070909-electrical-data-theft.html

https://www.pcworld.com/article/248995/how_to_install_windows_7_without_the_disc.html

https://www.schneier.com/blog/archives/2005/09/snooping_on_tex.html

https://www.schneier.com/blog/archives/2007/09/anonymity_and_t_1.html

https://www.schneier.com/blog/archives/2007/11/hushmail_turns.html

https://www.schneier.com/blog/archives/2007/12/maninthemiddle.html

https://www.schneier.com/blog/archives/2009/04/identifying_peo.html

https://www.schneier.com/blog/archives/2010/01/web_security.html

https://www.schneier.com/blog/archives/2010/05/detecting_brows.html

https://www.schneier.com/blog/archives/2010/09/real-time_nsa_e.html

https://www.schneier.com/blog/archives/2010/12/tor_routers.html

https://www.schneier.com/blog/archives/2011/03/detecting_words.html

https://www.schneier.com/blog/archives/2011/03/identifying_tor.html

https://www.schneier.com/blog/archives/2011/08/identifying_peo_2.html

https://www.schneier.com/blog/archives/2011/09/identifying_spe.html

https://www.schneier.com/blog/archives/2011/09/tor_arms_race.html

https://www.schneier.com/blog/archives/2012/07/how_to_become_a_1.html

https://www.schneier.com/essay-182.html

https://www.schneier.com/essay-261.html

https://www.schneier.com/essay-262.html

https://www.usenix.org/publications/proceedings

http://techgurulive.com/2008/09/15/how-to-monitor-and-be-informed-of-ip-address-changes-from-your-network/

http://tech.slashdot.org/story/99/07/19/1324207/super-shielded-pc-cases

http://virus.bartolich.at/virus-writing-HOWTO/_html/index.html

http://web.archive.org/web/20040608141549/http://all.net/journal/netsec/1997-12.html

http://web.archive.org/web/20060220113124/http://www.dss.mil/training/salinks.htm

http://web.archive.org/web/20080222191230/http://the.jhu.edu/upe/2004/03/23/about-van-eck-phreaking/

http://web.archive.org/web/20080820112134/http://www.crash-override.net/bogusdns.html

http://web.archive.org/web/20090210035245/http://danieldegraaf.afraid.org/info/ipv6

http://web.archive.org/web/20100916111512/http://www.ibiblio.org/security/articles/ports.html

http://web.mit.edu/gtmarx/www/iron.html

http://web.mit.edu/newsoffice/2012/camera-sees-around-corners-0321.html

http://wiki.wireshark.org/Security

http://www.ac6v.com/frequencies.htm

http://www.afterdawn.com/guides/

http://www.au.af.mil/info-ops/perception.htm

http://www.backtrack-linux.org/tutorials/

http://www.backtrack-linux.org/wiki/

http://www.binarywolf.com/

http://www.binarywolf.com/249/

http://www.catb.org/jargon/

http://www.ciphersbyritter.com/

http://www.ciphersbyritter.com/GLOSSARY.HTM

http://www.ciphersbyritter.com/RADELECT/LITES/LEDLITES.HTM

http://www.ciphersbyritter.com/RADELECT/LITES/LITESFAQ.HTM

http://www.ciphersbyritter.com/RADELECT/LITES/LITESHOT.HTM

http://www.ciphersbyritter.com/RADELECT/LITES/XMSLITES.HTM

http://www.cisco.com/en/US/solutions/ns340/ns414/ns742/ns744/landing_safe.html

http://www.crypto.com/papers/

http://www.cryptome.org/0002/nsa-tempest-01.zip

http://www.cs.auckland.ac.nz/~pgut001/

http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html

http://www.cs.tau.ac.il/~tromer/acoustic/

http://www.cs.wright.edu/~pmateti/InternetSecurity/Lectures/Top/index.html

http://www.dedoimedo.com/computers/linux-multi-boot.html

http://www.developer.nokia.com/Community/Wiki/Category:Open_Source

http://www.developer.nokia.com/Community/Wiki/Nokia_Open_Source

http://www.dhra.mil/perserec/adr.html

http://www.dhra.mil/perserec/products.html

http://www.domenech.org/homebrew-sdr/receiver-1.htm

http://www.ehow.com/how_8242473_display-ip-addresses-network.html

http://www.engadget.com/2005/11/15/how-to-build-a-wifi-biquad-dish-antenna/

http://www.epanorama.net/documents/telecom/telephone_intercom.html

http://www.ethicalhacker.net/content/view/22/2/

http://www.exploit-db.com/papers/

http://www.faqs.org/docs/Linux-HOWTO/XDMCP-HOWTO.html

http://www.febo.com/pages/baudline/

http://www.febo.com/time-freq/FMT/technique/index.html

http://www.forensicswiki.org/

http://www.garykessler.net/library/fsc_stego.html

http://www.gnupg.org/

http://www.heinz.cmu.edu/~acquisti/research.htm

http://www.ibm.com/developerworks/library/l-keyc2/

http://www.ibm.com/developerworks/library/l-keyc3/

http://www.ibm.com/developerworks/library/l-keyc/index.html

http://www.ieee-security.org/cipher.html

http://www.ieee-security.org/TC/SP-Index.html

http://www.ihr.org/jhr/v09/v09p305_Marchetti.html

http://www.informit.com/articles/article.aspx?p=23463&rll=1

http://www.itworld.com/security/64193/researchers-find-ways-sniff-keystrokes-thin-air

http://www.l0t3k.org/programming/docs/reverse/

http://www.linux-sec.net/Firewall/HowTo/ja.net.private.html

http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager03.html

http://www.madboa.com/geek/dig/

http://www.madboa.com/geek/gpg-quickstart/

http://www.madboa.com/geek/openssl/

http://www.madboa.com/geek/openssl/#digest-file

http://www.madboa.com/geek/pine-ssl/

http://www.madboa.com/geek/soho-bind/

http://www.neilgunton.com/doc/index.html?o=1&doc_id=8580

http://www.neowin.net/forum/topic/934274-freeware-alternative-list/

http://www.nononsenseselfdefense.com/five_stages.html

http://www.omgubuntu.co.uk/

http://www.openrce.org/articles/

http://www.oreillynet.com/cs/weblog/view/wlg/448

http://www.oreillynet.com/topics/wireless/802.11

http://www.phrack.org/issues.html?issue=62&id=6

http://www.phrack.org/issues.html?issue=66&id=11#article

http://www.phrack.org/issues.html?issue=66&id=15#article

http://www.phrack.org/issues.html?issue=66&id=7#article

http://www.popsci.com/technology/article/2012-07/seeing-through-walls-wireless-router

http://www.radioreference.com/

http://www.rfidvirus.org/index.html

http://www.securityfocus.com/columnists/442/2

http://www.securityfocus.com/news/11372

http://www.social-engineer.org/framework/Social_Engineering_Framework

http://www.symantec.com/connect/articles/forensic-analysis-live-linux-system-pt-1

http://www.symantec.com/connect/articles/forensic-analysis-live-linux-system-pt-2

http://www.symantec.com/connect/articles/ip-spoofing-introduction

http://www.symantec.com/connect/articles/reverse-engineering-hostile-code

http://www.symantec.com/connect/articles/sebek-3-tracking-attackers-part-one

http://www.symantec.com/connect/articles/sebek-3-tracking-attackers-part-two

http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics

http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-ii-combat-strategies

http://www.symantec.com/connect/articles/wireless-forensics-tapping-air-part-one

http://www.symantec.com/connect/articles/wireless-forensics-tapping-air-part-two

http://www.theregister.co.uk/2012/07/11/multi_platform_backdoor/

http://www.tuxradar.com/content/learn-hack/

http://www.vanwensveen.nl/rants/microsoft/IhateMS.html

http://www.wiley.com/legacy/compbooks/mcnamara/links.html

http://www.williamson-labs.com/laser-mic.htm

http://www.zurich.ibm.com/security/idemix/

http://yro.slashdot.org/story/99/10/25/2039238/declassified-tempest-material-comes-online

http://yro.slashdot.org/story/99/11/08/093250/coming-to-a-desktop-near-you-tempest-capabilities

(PDF, EPUB, MOBI, leads to) http://debian-handbook.info/get/now/

(PDF) ftp://ftp.tapr.org/software_lib/ether/Ham_Ethernet_GBPPR.pdf

(PDF) http://ai.eller.arizona.edu/COPLINK/publications/CACM_From%20Fingerprint%20to%20Writeprint.pdf

(PDF) http://cryptome.org/2012/06/ci-glossary.pdf

(PDF) http://csrc.nist.gov/publications/nistpubs/800-59/SP800-59.pdf

(PDF) http://csrc.nist.gov/publications/nistpubs/800-84/SP800-84.pdf

(PDF) http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdf

(PDF) http://lanl.arxiv.org/pdf/1004.1267v1

(PDF) http://lanl.arxiv.org/pdf/1109.0597v2

(PDF) http://lanl.arxiv.org/pdf/1110.5395v3

(PDF) http://lanl.arxiv.org/pdf/1204.0447v1

(PDF) http://lanl.arxiv.org/pdf/1208.2877v1

(PDF) http://packetstormsecurity.org/filedesc/Practical_Onion_Hacking.pdf.html

(PDF) http://packetstormsecurity.org/files/65944/tempest.pdf

(PDF) http://srgsec.cs.uiuc.edu/bootjacker.pdf

(PDF) http://srgsec.cs.uiuc.edu/cloaker.pdf

(PDF) http://sunnyday.mit.edu/book2.pdf

(PDF) https://www.cl.cam.ac.uk/%7Emgk25/ieee02-optical.pdf

(PDF) https://www.cl.cam.ac.uk/~mgk25/ih98-tempest.pdf

(PDF) https://www.cl.cam.ac.uk/~mgk25/pet2004-fpd.pdf

(PDF) https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-577.pdf

(PDF) https://www.eff.org/sites/default/files/packet_injection_0.pdf

(PDF) https://www.usenix.org/events/sec09/tech/full_papers/sec09_attacks.pdf

(PDF) http://vulnfactory.org/research/defcon-remote.pdf

(PDF) http://www.cl.cam.ac.uk/~mgk25/ches2005-limits.pdf

(PDF) http://www.cl.cam.ac.uk/~mgk25/ieee02-optical.pdf

(PDF) http://www.cl.cam.ac.uk/~mgk25/ih98-tempest.pdf

(PDF) http://www.cl.cam.ac.uk/~mgk25/ih99-stegfs.pdf

(PDF) http://www.cl.cam.ac.uk/~mgk25/pet2004-fpd.pdf

(PDF) http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-577.pdf

(PDF) http://www.crysys.hu/skywiper/skywiper.pdf

(PDF) http://www.cs.wright.edu/%7Epmateti/InternetSecurity/Lectures/TCPexploits/sec-tcpip.pdf

(PDF) http://www.fas.org/irp/eprint/nsa-interview.pdf

(PDF) http://www.governmentattic.org/2docs/Hist_US_COMSEC_Boak_NSA_1973.pdf

(PDF) http://www.medienwissenschaft.hu-berlin.de/medientheorien/forschung/downloads/hausarbeiten/em-sniffer.pdf

(PDF) http://www.rfidvirus.org/papers/percom.06.pdf

(PDF) http://www.toucan-system.com/research/blackhat2012_brossard_hardware_backdooring.pdf

(PDF) http://www-users.cs.umn.edu/%7Edfrankow/files/lam-etrics2006-security.pdf

(PDF) http://www-users.cs.umn.edu/%7Edfrankow/files/privacy-sigir2006.pdf

(PDF, leads to)

(PDF, leads to a) http://about-threats.trendmicro.com/ebooks/are-you-protecting-the-data-packets-in-your-pocket/

(PDF, leads to a) http://ojs.academypublisher.com/index.php/jnw/article/view/jnw0702259266

(PDF, leads to a) https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-577.html

(PDF, leads to a) https://www.usenix.org/conference/usenixsecurity12/feasibility-side-channel-attacks-brain-computer-interfaces

(PDF, leads to a) http://ubuntu-manual.org/downloads

(PDF, leads to) http://anonymouse.org/cgi-bin/anon-www.cgi/http://www.popsci.com/diy/article/2006-09/stop-dropped-calls

(PDF, leads to) https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-577.html

(PDF, leads to) http://wikileaks.org/wiki/Cryptome.org_takedown:_Microsoft_Global_Criminal_Compliance_Handbook,_24_Feb_2010

(PDF, PS, leads to) http://cacr.uwaterloo.ca/hac/

(PDF, PS, PPT, DOC, TXT, leads to) http://www.cs.washington.edu/education/courses/csep590/06wi/

(PDFs, leads to) http://all.net/Analyst/index.html

(PDFs, leads to) http://reality.media.mit.edu/publications.php

(PDFs, leads to) https://citizenlab.org/2012/07/from-bahrain-with-love-finfishers-spy-kit-exposed/3/

(PDFs, leads to) http://srgsec.cs.illinois.edu/Welcome.html

(PDFs, leads to) http://sunnyday.mit.edu/

(PDFs, leads to) https://www.cl.cam.ac.uk/~mgk25/

(PDFs, leads to) https://www.cl.cam.ac.uk/~mgk25/publications.html

(PDFs, leads to) https://www.cl.cam.ac.uk/research/security/publications/

(PDFs, leads to) https://www.cl.cam.ac.uk/~rja14/book.html

(PDFs, leads to) http://web.archive.org/web/20071228064639/http://www.computer.org/portal/site/csdl/index.jsp

(PDFs, leads to) http://www.amsat.org/amsat/intro/faqs.html

(PDFs, leads to) http://www.navsea.navy.mil/nswc/dahlgren/Leading%20Edge/default.aspx

(PDFs, leads to) http://www.pgpi.org/doc/guide/

(PDFs, leads to) http://www.raulsiles.com/en/Research.html

(PDFs, leads to) http://www-users.cs.umn.edu/~dfrankow/pubs.htm

(PDFs, PS, leads to) http://hd.media.mit.edu/TechnicalReportsList.html

(PDFs, PS, leads to) https://wwws.cs.umn.edu/tech_reports_upload/

(PDFs, PSs, BibTeX, leads to) http://www.freehaven.net/anonbib/

recon.cx – (Various Media Formats, leads to) http://2005.recon.cx/recon2005/papers/

recon.cx – (Various Media Formats, leads to) http://2006.recon.cx/en/f/

recon.cx – (Various Media Formats, leads to) http://recon.cx/2008/speakers.html

recon.cx – (Various Media Formats, leads to) http://recon.cx/2010/speakers.html

recon.cx – (Various Media Formats, leads to) http://recon.cx/2012/schedule/index.en.html

recon.cx – (Videos, leads to               ) http://archive.org/details/RECON2008

recon.cx – (Videos, leads to               ) http://archive.org/search.php?query=%22recon%202011%22

recon.cx – (Videos, leads to               ) http://archive.org/search.php?query=recon%202005%20AND%20mediatype%3Amovies

recon.cx – (Videos, leads to               ) http://archive.org/search.php?query=recon%202006%20AND%20mediatype%3Amovies

recon.cx – (Videos, leads to               ) http://archive.org/search.php?query=recon%202012%20AND%20mediatype%3Amovies

(various document formats, leads to) http://www.grouplens.org/biblio

(various types of media, links to) https://www.defcon.org/html/links/defcon-media-archives.html

(videos, leads to) http://web.media.mit.edu/~sandy/videos.html

—————————————-

 

** 6003: Antivirus LiveCDs – boot and scan your system for malware

 

+ AVG:

http://www.avg.com/us-en/avg-rescue-cd-download

 

+ AVG ARL: The latest release version of the AVG Rescue CD GNU/Linux (ARL) with daily updated virus database,

latest alpha or beta version of the ARL and all the resources needed to build the ARL from scratch.

Releases are signed!

https://share.avg.com/arl

 

+ Avira:

https://www.avira.com/en/download/product/avira-antivir-rescue-system

 

+ BitDefender:

http://download.bitdefender.com/rescue_cd/

 

+ Comodo Rescue Disk (CRD):

https://www.comodo.com/business-security/network-protection/rescue-disk.php

 

+ Dr.Web LiveCD & LiveUSB:

http://www.freedrweb.com/livecd/

http://www.freedrweb.com/liveusb/

 

+ F-Secure:

https://www.f-secure.com/en/web/labs_global/removal-tools/-/carousel/view/142

https://www.f-secure.com/en/web/labs_global/removal-tools

 

+ Kaspersky:

http://support.kaspersky.com/faq/?qid=208282173

http://support.kaspersky.com/viruses/rescuedisk?level=2

http://forum.kaspersky.com/index.php?showforum=159

 

+ Microsoft Windows Defender Offline:

https://connect.microsoft.com/systemsweeper

 

—————————————-

 

** 6004: Random Links

(In a future version these links will each have their own new sections,)

(since we’ve moved beyond mere security related links! As such, many of these links are not security oriented)

(This section may appear now to be one big random blob of links, but with our next version, there will spring)

(up several new sections of which these will be filed into. We wanted to push this out as a preview of how)

(we’re expanding beyond security links.)

 

+ Tormail Hidden Service (Requires Tor in order to use):

+ Tor Mail @Hidden Service: http://jhiwjjlqpyawmpjx.onion/

+ Tor Mail Intro @Clearnet: http://www.tormail.org/

#

# (large resource) http://blockyourid.com/~gbpprorg/

# (large resource) http://blockyourid.com/~gbpprorg/mil/

# http://blockyourid.com/~gbpprorg/mil/vaneck/index.html

# (large resource) http://www.qsl.net/n9zia/

# mirrors: http://www.gbppr.org , http://projects1.gbppr.org/ , http://gbppr.dyndns.org/

#

+ Acoustic Surveillance of Physically Unmodified PCs by Michael LeMay and Jack Tan

+ (PDF) (original but broken link) http://seclab.uiuc.edu/pubs/LeMayT06.pdf

+ (PDF) (found but haven’t verified source) http://blockyourid.com/~gbpprorg/mil/vaneck/LeMayT06.pdf

+

(archive) http://mympxplayer.org/

http://10minutemail.com

http://4hv.org/e107_plugins/forum/forum.php

http://500px.com/

http://500px.com/MarcinSobas

http://ai.bpa.arizona.edu/

http://alphabetizer.flap.tv/

http://amecisco.com/

http://anythingbutipod.com/

http://anythingbutipod.com/forum/

http://applefritter.com/

http://applefritter.com/forum

http://archive.org/create/

http://archive.org/details/bittorrent

http://arstechnica.com/

http://arstechnica.com/civis/

http://artsandlettersdaily.com/

http://arxiv.org/

http://ask.metafilter.com/

http://askubuntu.com/

http://attrition.org/

http://attrition.org/mirror/

http://batteryuniversity.com/

http://betanews.com/

http://bibliodyssey.blogspot.com/

http://biosbits.org/

http://blog.bodhizazen.net/

http://blog.makezine.com/

http://blogs.amd.com/

http://blogs.scientificamerican.com/

http://blogs.valvesoftware.com/linux/steamd-penguins/

http://boingboing.net/

http://boston.com/bigpicture/

http://browserspy.dk/

http://busybox.net/

http://cdburnerxp.se/

http://centralops.net/co/

http://classical-music-online.net/

http://commons.wikimedia.org/

http://consumerist.com/

http://cubesat.calpoly.edu/

http://cwe.mitre.org/

http://cybernetnews.com/

http://cygwin.com/

http://cylinders.library.ucsb.edu/index.php

http://dedoimedo.com/

http://depositfiles.com/

http://digg.com/

http://diit.sourceforge.net/

http://distrowatch.com/

http://dmml.asu.edu/resources

http://documentaryheaven.com/

http://doihaveadeadpixel.com/

http://drudgereport.com/

http://en.memory-alpha.org/wiki/Portal:Main

http://en.rsf.org/

http://fab.cba.mit.edu/

http://faststone.org/

http://faxzero.com/

http://fcw.com/Home.aspx

http://filecrop.com/

http://forum.crucial.com/

http://forum.japantoday.com/

http://forum.notebookreview.com/

http://forums.anandtech.com/

http://forums.computeractive.co.uk/

http://forums.fedoraforum.org/

http://forums.linuxmint.com

http://forums.overclockers.com.au

http://forums.techarena.in/

http://forums.wi-fiplanet.com/

http://freeculture.org/

http://fsi-language-courses.org

http://gizmodo.com/

http://glassgiant.com/ascii/

http://gonullyourself.com/

http://groupmedia.media.mit.edu/

http://hardocp.com/

http://hd.media.mit.edu/

http://hintsforums.macworld.com/

http://howtogrowtobacco.com/forum/

http://howto.wired.com/wiki/Main_Page

http://html.adobe.com/

http://imakeprojects.com/Projects/wifi-heartbeat/

http://imgur.com/

http://improveverywhere.com/

http://info.ee.surrey.ac.uk/Personal/Z.Kalal/tld.html

http://ip-check.info

http://issihosts.com/haveged/

http://jesus-is-savior.com/

http://lanl.arxiv.org/

http://la-samhna.de/library/rootkits/detect.html

http://leakdirectory.org/index.php/Leak_Site_Directory

http://lifehacker.com/

http://linuxmanpages.com/

http://linuxmint.com/

http://linuxpoison.blogspot.com/

http://linuxscrew.com/

http://mail.yandex.com/

http://memegenerator.net/

http://mentalfloss.com/

http://meta.wikimedia.org/

http://mindjustice.org/

http://mitnicksecurity.com/

http://multiupload.nl/

http://mybannermaker.com/

http://mympx.org/

http://narus.com/

http://naturalnews.com/

http://news.cnet.com/

http://news.cnet.com/cheapskate/

http://news.cnet.com/tech-blogs/

http://news.netcraft.com/

http://nmap-online.com/

http://online.wsj.com/

http://onpointtactical.com/

http://onstrat.com/osint/#startingpoints

http://oreilly.com/blogs/

http://oyc.yale.edu/

http://packetstormsecurity.org/

http://pastebin.com/KNtCVkpN

http://patriotmemory.com/

http://pdos.csail.mit.edu/~baford/vm/

http://people.csail.mit.edu/mrub/vidmag/

http://personal.ee.surrey.ac.uk/Personal/L.Wood/constellations/index.html

http://photomuse.org/

http://pipl.com/

http://portforward.com/

http://preyproject.com/

http://project-byzantium.org/

http://projects.washingtonpost.com/top-secret-america/

http://qubes-os.org/

http://rense.com/

http://rfidguardian.org/

http://rootzwiki.com/

http://samate.nist.gov/index.php/Source_Code_Security_Analyzers.html

https://blog.mozilla.org/

https://blog.mozilla.org/addons/

https://blog.mozilla.org/beyond-the-code/

https://blog.mozilla.org/bhearsum/

https://blog.mozilla.org/blog/author/chrismozillacom/

https://blog.mozilla.org/blog/category/firefox/

https://blog.mozilla.org/calendar/

https://blog.mozilla.org/futurereleases/

https://blog.mozilla.org/gen/

https://blog.mozilla.org/it/

https://blog.mozilla.org/labs/

https://blog.mozilla.org/ligong/

https://blog.mozilla.org/mobile/

https://blog.mozilla.org/nnethercote/

https://blog.mozilla.org/privacy/

https://blog.mozilla.org/services/

https://blog.mozilla.org/theden/

https://blog.mozilla.org/thunderbird/

https://blog.mozilla.org/tilt/

https://blog.mozilla.org/webdev/

https://blog.mozilla.org/website-archive/

http://schizophrenia.com/

http://sclipo.com/

https://code.google.com/p/corkami/

https://code.google.com/p/googlecl/

https://community.rapid7.com/community/infosec/blog/2012/08/08/finfisher

https://creativecommons.org/

http://screenshots.debian.net/

http://searchengineland.com/

https://en.wikipedia.org/wiki/Bing_Mobile#Bing_411

https://en.wikipedia.org/wiki/List_of_PDF_software

https://en.wikipedia.org/wiki/Main_Page

https://epic.org/

https://epic.org/privacy/tools.html

https://fedoraproject.org/

https://freedom-to-tinker.com/

https://github.com/djrbliss/rose-exploit

http://slashdot.org/

http://slickdeals.net/

https://lists.apple.com/mailman/listinfo/security-announce

https://mashable.com/

https://one.ubuntu.com/services/

http://soundcloud.com/

http://sourceforge.net/projects/diit/

http://sourceforge.net/projects/nfienfcollector/

https://panopticlick.eff.org/

http://species.wikimedia.org/

http://spectrum.ieee.org/

http://spectrum.ieee.org/blogs

http://spectrum.ieee.org/blog/tech-talk

http://spectrum.mit.edu/articles/normal/fab-lab/ (article)

https://personaltelco.net/wiki

http://spywareinfoforum.com/

https://s3.amazonaws.com/data.tumblr.com/tumblr_lxyvchLFXx1r1ylbfo1_500.jpg

https://secure.dslreports.com/faq

http://stallman.org/

https://torrentfreak.com/

https://twitter.com/corkami

http://support.ntp.org/bin/view/Support/WebHome

http://swann.com

https://www.amnesty.org/

https://www.blackhat.com/index.html

https://www.ccc.de/

https://www.cert.org/

https://www.chillingeffects.org/

https://www.commondreams.org/

https://www.computerworld.com/

https://www.defcon.org/

https://www.defcon.org/html/links/dc-tools.html

https://www.eff.org/

https://www.eff.org/deeplinks/

https://www.eff.org/pages/switzerland-network-testing-tool

https://www.erowid.org/

https://www.flickr.com/

https://www.grc.com

https://www.imagineshop.co.uk/

https://www.infoworld.com/

https://www.libreoffice.org/

https://www.linuxquestions.org/

https://www.linuxquestions.org/questions/

https://www.mi5.gov.uk/

https://www.microsoft.com/communities/forums/default.mspx

https://www.microsoft.com/security/scanner/en-us/default.aspx

https://www.myspace.com/

https://www.networkworld.com/

https://www.npr.org/blogs/health/

https://www.opendns.com/technology/dnscrypt/

https://www.propublica.org/

https://www.safe-mail.net/

https://www.sans.org/

https://www.technologyreview.com/computing/

https://www.un.org/

https://www.un.org/en/documents/udhr/index.shtml

https://www.youtube.com/

https://www.youtube.com/results?search_query=Randy+Quaid+Star+Whackers

https://www.youtube.com/ucberkeley

http://techliberation.com/

http://technorati.com/

http://techreport.com/

http://techreport.com/forums/

http://thebrowser.com/

http://topdocumentaryfilms.com/

http://totse2.com/

http://trapkit.de/

http://truth-out.org/

http://turnoffyourtv.com/

http://tutvid.com

http://ubuntuforums.org/

http://urlget.sourceforge.net/

http://usahitman.com/

http://vigilantcitizen.com/

http://vigilantcitizen.com/vcboards/

http://web.archive.org/web/20040202004210/http://www.cs.auckland.ac.nz/~pgut001/links.html

http://web.archive.org/web/20040206214035/http://www.cs.auckland.ac.nz/~pgut001/links/archives.html

http://web.archive.org/web/20060831063210/http://faculty.ncwc.edu/toconnor/reform.htm

http://web.archive.org/web/20060831063224/http://faculty.ncwc.edu/toconnor/data.htm

http://web.archive.org/web/20060831081811/http://faculty.ncwc.edu/toconnor/thnktank.htm

http://web.archive.org/web/20070207050215/http://faculty.ncwc.edu/toconnor/sources.htm

http://web.archive.org/web/20070217052232/http://faculty.ncwc.edu/TOConnor/427/427links.htm

http://webcast.berkeley.edu/

http://web.media.mit.edu/~sandy/

http://web.mit.edu/mitei/news/index.html

http://web.mit.edu/newsoffice/

http://web.mit.edu/zacka/www/midas.html

http://web.mit.edu/zacka/www/projects.html

http://wificamera.propositions.org.uk/

http://wificamera.propositions.org.uk/Panoramic-Wifi-Camera

http://wiki.echelon2.org/wiki/Main_Page

http://wikitravel.org/

http://wisp.wikispaces.com

http://www1.informatik.uni-erlangen.de/tresor

http://www.4shared.com/

http://www.5min.com/

http://www.academicearth.org/

http://www.aclu.org/

http://www.addictivetips.com/

http://www.allmyfaves.com/

http://www.anandtech.com/

http://www.au.af.mil/au/awc/awcgate/awc-ndex.htm

http://www.au.af.mil/au/awc/awcgate/awc-port.htm

http://www.au.af.mil/au/awc/awcgate/awc-ref.htm

http://www.au.af.mil/au/awc/awcgate/awc-thkg.htm

http://www.au.af.mil/au/awc/awcgate/awc-thkg.htm#critical

http://www.avforums.com/forums/

http://www.bashoneliners.com/

http://www.bbb.org/

http://www.bbc.co.uk/iplayer/radio

http://www.betabeat.com/

http://www.bloomberg.com/news/worldwide/

http://www.bluesnews.com/

http://www.brainpickings.org/

http://www.brickhousesecurity.com/

http://www.brokentoaster.com/butterflymp3/index.html

http://www.bugmenot.com/

http://www.businessweek.com/

http://www.buzzfeed.com/

http://www.cbradiotalk.com/index.php

http://www.cerias.purdue.edu/

http://www.chromium.org/

http://www.cicentre.com/

http://www.codecademy.com/

http://www.complaints.com/

http://www.consumerworld.org/

http://www.copyscape.com/

http://www.coreboot.org/

http://www.coreboot.org/SeaBIOS

http://www.cosmolearning.com/

http://www.cracked.com/

http://www.crucial.com

http://www.cryptome.org/

http://www.c-spanvideo.org/videoLibrary/

http://www.cultdeadcow.com/

http://www.cyberciti.biz/

http://www.dafont.com/

http://www.dailymotion.com/

http://www.damninteresting.com/

http://www.defectivebydesign.org/

http://www.differencebetween.net/

http://www.digital-detective.co.uk/

http://www.digital-digest.com/index.php

http://www.disclose.tv/

http://www.disclose.tv/forum/

http://www.discoverbing.com/mobile

http://www.dlib.indiana.edu/collections/

http://www.dmoz.org/Computers/Internet/E-mail/Spam/Preventing/Temporary_Addresses/

http://www.dogbitelaw.com/

http://www.doom9.org/

http://www.downforeveryoneorjustme.com/

http://www.economist.com/

http://www.ehow.com/

http://www.emaildiscussions.com/

http://www.endangeredlanguages.com/

http://www.engadget.com

http://www.engadget.com/

http://www.epanorama.net/index2.php?section=documents&index=audio

http://www.evga.com/forums/

http://www.ew.com/ew/

http://www.eweek.com/

http://www.extremetech.com/

http://www.fabathome.org/

http://www.fakenamegenerator.com/

http://www.fark.com/

http://www.filestube.com/

http://www.folkstreams.net/

http://www.forbes.com/

http://www.freerepublic.com

http://www.freesoftwaremagazine.com/

http://www.ft.com/

http://www.gamefront.com/

http://www.gameinformer.com/

http://www.geekstogo.com/forum/

http://www.giveawayoftheday.com/

http://www.gizmag.com/

http://www.godlikeproductions.com

http://www.groklaw.net/

http://www.gutenberg.org/wiki/Main_Page

http://www.gwu.edu/~nsarchiv/

http://www.hackermedia.org/

http://www.head-fi.org/f/

http://www.hellomagazine.com/

http://www.hitb.org/

http://www.howcast.com/

http://www.howstuffworks.com/

http://www.hulu.com/

http://www.i2p2.de/

http://www.ibiblio.org/

http://www.ic3.gov/default.aspx

http://www.imdb.com/title/tt0071360/

http://www.imdb.com/title/tt0120660/

http://www.imdb.com/title/tt0128278/

http://www.imdb.com/title/tt0308808/

http://www.imdb.com/title/tt0489037/

http://www.inchem.org/

http://www.informationclearinghouse.info/

http://www.informationweek.com/

http://www.infowars.com/

http://www.internetnews.com/

http://www.inventgeek.com/blog/

http://www.irfanview.com/

http://www.itworld.com/

http://www.itworld.com/blogs/sandra-henry-stocker

http://www.japantoday.com/

http://www.jjtc.com/Security/stegtools.htm

http://www.jjtc.com/Steganography/

http://www.khanacademy.org/

http://www.ladyada.net/make/

http://www.ladyada.net/make/mintyboost/index.html

http://www.ladyada.net/make/minty/index.html

http://www.last.fm/

http://www.linuxfoundation.org/

http://www.lipstickalley.com/

http://www.liveleak.com/

http://www.mail-archive.com/

http://www.mcgrewsecurity.com/tools/msramdmp/

http://www.mediafire.com/

http://www.medicalnewstoday.com/

http://www.metafilter.com/

http://www.minutemanproject.com/

http://www.myfishtank.net/forum/

http://www.nasdaq.com/

http://www.nationaldefensemagazine.org

http://www.nationmaster.com/

http://www.neowin.net/

http://www.neowin.net/forum/

http://www.net.princeton.edu/software/dhcp_probe/

http://www.nist.gov/public_affairs/tech-beat (archives:) http://www.nist.gov/public_affairs/tech-beat/archives.cfm

http://www.nutsvolts.com/

http://www.nutsvolts.com/index.php?/blog/

http://www.officer.com/

http://www.ok.co.uk/home/

http://www.okmagazine.com/

http://www.omgubuntu.co.uk/

http://www.opcva.com/watchdog/

http://www.openculture.com/

http://www.openrightsgroup.org/

http://www.openstreetmap.org/

http://www.opentopia.com/hiddencam.php

http://www.open-video.org/

http://www.osnews.com/

http://www.patriotmemory.com/forums

http://www.pbs.org/

http://www.pbs.org/wgbh/pages/frontline/

http://www.people.com/people/

http://www.phonescoop.com/

http://www.phoronix.com/

http://www.phoronix.com/forums/

http://www.pool.ntp.org/en/

http://www.princeton.edu/WebMedia/lectures/

http://www.printfriendly.com/

http://www.psychologytoday.com/

http://www.quora.com/

http://www.qwiki.com/

http://www.radaronline.com/

http://www.raspberrypi.org/

http://www.readprint.com/

http://www.reddit.com/

http://www.reuters.com/

http://www.rollingstone.com/

http://www.rootkit.nl/projects/lynis.html

http://www.rssweather.com

http://www.scientificamerican.com/article.cfm?id=hackers-can-steal-from-reflections

http://www.seabios.org/SeaBIOS

http://www.seattle.intel-research.net/wisp/

http://www.shacknews.com/

http://www.sigsac.org/

http://www.slashfilm.com/

http://www.slashgear.com/

http://www.songkick.com/

http://www.soyouwanna.com/

http://www.spamhaus.org/

http://www.spychips.com/

http://www.stallman.org/

http://www.stallman.org/archives/

http://www.sutree.com/

http://www.synchtube.com/

http://www.tcpipguide.com/free/t_toc.htm

http://www.techdirt.com/

http://www.technologyreview.com/

http://www.tech-recipes.com/

http://www.techspot.com/

http://www.techsupportforum.com/

http://www.techsupportforum.com/forums/

http://www.ted.com/

http://www.theregister.co.uk/

http://www.theverge.com/

http://www.thisiscolossal.com/

http://www.thoughtcrime.org/software/sslsniff/

http://www.timeanddate.com/worldclock/

http://www.tmz.com/

http://www.tomshardware.com/index.html

http://www.tuxradar.com/

http://www.tvguide.com/

http://www.ubuntu.com/

http://www.urbandictionary.com/

http://www.usbwifi.orconhosting.net.nz/

http://www.ustream.tv/

http://www.vanityfair.com/

http://www.variety.com/Home/

http://www.videojug.com/

http://www.vidipedia.org/

http://www.wardriving.com/

http://www.warriorsofthe.net/index.html

http://www.weather.com/

http://www.webcitation.org/

http://www.wi-fiplanet.com/

http://www.wikibooks.org/

http://www.wikihow.com/Main-Page

http://www.wikileaks.org/

http://www.wikinews.org/

http://www.wikipedia.org/

http://www.wikiquote.org/

http://www.wikisource.org/

http://www.wikiversity.org/

http://www.wiktionary.org/

http://www.winsupersite.com/

http://www.winsupersite.com/blogcontent/supersite-blog-39

http://www.wired.com/

http://www.wired.com/about/blogs

http://www.wireimage.com/

http://www.wotsit.org/

http://www.xnview.com/

http://www.youtube-mp3.org/

http://www.zoklet.net/

http://www.zophar.net/

http://zombiehunters.org/forum/

(magazine) http://www.linuxidentity.com/

(online virus scanner) https://www.virustotal.com/

(online virus scanner) http://virusscan.jotti.org/en

(PDF)  http://csrc.nist.gov/publications/nistir/7316/NISTIR-7316.pdf

(PDFs, leads to) http://dmml.asu.edu/research/pubs

(PDFs, leads to) http://groupmedia.media.mit.edu/publications.php

(PDFs, leads to) http://hd.media.mit.edu/badges/publications.html

(PDFs, leads to) http://linuxnewmedia.com/Products/Print

(PDFs, leads to) http://www.public.asu.edu/~huanliu/publications.html

(PDFs, leads to) http://www.public.asu.edu/~huanliu/sbp09/program.html

(PDFs, leads to) http://www.seattle.intel-research.net/pubs.php

(PDFs, PPTs, leads to) http://www.public.asu.edu/~huanliu/sbp08/program.html

(Power Pwn) http://hardware.slashdot.org/story/12/07/22/0335223/the-darpa-funded-power-strip-that-will-hack-your-network

(Power Pwn) http://pwnieexpress.com/

(Power Pwn) http://pwnieexpress.com/blogs/news

(Power Pwn) http://www.zdnet.com/power-pwn-this-darpa-funded-power-strip-will-hack-your-network-7000001331/

(Power Pwn – PDF) http://cryptome.org/2012/07/cbp072312.pdf

(view PDFs online!) http://view.samurajdata.se/

—————————————-

 

** 6005: Security Blogs:

 

#

# Most Powerful Voices in Security Who are the Top 25?

# The Rest of the Top 100 –

# * 100 security guru’s listed with their Twitter pages

# and personal/blog sites: (Sep. 8, 2011) Posted here as one

# link rather than posting around 100 Twitter personal pages.

# http://www.sys-con.com/node/1974029

#

+

+ http://blog.layeredsec.com/ (Archive) – https://twitter.com/brycegalbraith (Author moved to Twitter)

+

+ (archive) https://pinvoke.wordpress.com/

+

+ (archive) http://superantispyware.com/blog/

+

+ (click month at right for archives) https://yorkporc.wordpress.com/

*

* https://wiki.debian.org/FreedomBox

*

+

+ http://anonymouse.org/cgi-bin/anon-www.cgi/http://www.malwaredomainlist.com/

+ (via Anonymouse because of ban on Tor exit nodes)

+

+ http://anonymouse.org/cgi-bin/anon-www.cgi/http://www.securitywire.com/

+ (via Anonymouse to evade Tor exit node ban)

+

+ (archive) http://www.teamfurry.com/wordpress/

+

+ (archive) http://securityincite.com/blog/mike-rothman

+

+ http://anonymouse.org/cgi-bin/anon-www.cgi/http://robert.penz.name/

+ (via Anonymouse: Tor exit node ban evasion by proxy)

+

http://aconaway.com/

http://anonymous.livelyblog.com/

http://anti-virus-rants.blogspot.com/

http://bgpmon.net/blog/

http://blog.brickhousesecurity.com/

http://blog.c22.cc/

http://blog.clamav.net/

http://blog.commandlinekungfu.com/

http://blog.crysys.hu/

http://blog.cuckoosandbox.org/

http://blog.cyberwar.nl/

http://blog.deepsec.net/

http://blog.didierstevens.com/

http://blog.emsisoft.com/

http://blog.eset.com/

http://blog.fireeye.com/research

http://blog.gerhards.net/

http://blog.ine.com/

http://blog.infosanity.co.uk/

http://blog.ioshints.info/

http://blog.lse.epita.fr/

http://blog.mandiant.com/

http://blog.oxff.net/

http://blog.rootshell.be/

http://blogs.appriver.com/

http://blogs.cisco.com/category/security

http://blog.secureideas.net/

http://blog.security4all.be/

http://blogs.iss.net/

http://blog.snort.org/

http://blogs.pcmag.com/securitywatch/

http://blog.spiderlabs.com/

http://blog.spywareguide.com/

http://blogs.securiteam.com/

http://blog.stopbadware.org/

http://blog.tenablesecurity.com/

http://blog.threatexpert.com/

http://blog.trendmicro.com/

http://blog.tsa.gov/

http://blog.uncommonsensesecurity.com/

http://blog.watchfire.com/wfblog/

http://blog.webroot.com/

http://blog.zoller.lu/

http://blog.zx2c4.com/

http://blog.zynamics.com/

http://brandonjcarroll.com/

http://cansecwest.com/

http://carnal0wnage.attackresearch.com/

http://cerias.purdue.edu/site/blog/author/spaf

http://chargen.matasano.com/

http://chris-intel-corner.blogspot.com/

http://chuvakin.blogspot.com/

http://ciscoiseasy.blogspot.com/

http://coffeetocode.net/

http://community.websense.com/blogs/securitylabs/

http://community.websense.com/blogs/securitylabs/default.aspx

http://computer-forensics.sans.org/blog

http://computer-forensics.sans.org/blog/

http://computer.forensikblog.de/en/

http://comsecllc.blogspot.com/

http://contagiodump.blogspot.com/

http://cryptocomb.org/

http://crypto.stanford.edu/

http://cyb3rcrim3.blogspot.com/

http://cyberspeak.libsyn.com/

http://dankaminsky.com/

http://darkreading.com/

http://daveshackleford.com/

http://ddanchev.blogspot.com/

http://ddos.arbornetworks.com/

http://deadliestwebattacks.com/

http://deepsec.net/

http://dhs-daily-report.blogspot.com/

http://digfor.blogspot.com/

http://digitalforensicsisascience.blogspot.com

http://dshield.org/

http://dvlabs.tippingpoint.com/blog

http://dvlabs.tippingpoint.com/blog/

http://elie.im/blog/

http://emergentchaos.com/

http://erratasec.blogspot.com/

http://etherealmind.com/category/blog/

http://etherealmind.com/category/blog/security/

http://eusecwest.com/

http://evilrouters.net/

http://fasthorizon.blogspot.com/

http://forensicaliente.blogspot.com/

http://forensicfocus.blogspot.com/

http://forensicmethods.com/

http://forensicsfromthesausagefactory.blogspot.com/

http://fraudwar.blogspot.com/

http://fumalwareanalysis.blogspot.com/

http://garwarner.blogspot.com/

http://girlunallocated.blogspot.com

http://gleeda.blogspot.com/

http://googleonlinesecurity.blogspot.com/

http://grandstreamdreams.blogspot.com/

http://gregsowell.com/

http://ha.ckers.org/blog (Archive)

http://hackingcisco.blogspot.com/

http://holisticinfosec.blogspot.com/

http://honeyblog.org/

http://inciweb.org/

http://infolookup.securegossip.com/

http://infosecisland.com/

http://intelnews.org/

http://invisiblethings.org/

http://it-audit.sans.org/blog/

http://jeremiahgrossman.blogspot.com/

http://jessekornblum.livejournal.com/

http://journeyintoir.blogspot.com/

http://justaskweg.com/

http://krebsonsecurity.com/

http://labs.m86security.com/ (Archive)

http://lastwatchdog.com/

http://log.nadim.cc

http://lonesysadmin.net/

http://maliciousattacker.blogspot.com/

http://marienfeldt.com/

http://mnin.org/

http://nakedsecurity.sophos.com/

http://netsecurity.about.com/

http://netsecurity.about.com/compute/netsecurity/

http://network-101.blogspot.com/

http://news.cnet.com/security

http://news.hitb.org/

http://news.softpedia.com/cat/Security/

http://news.techworld.com/security/

http://offensivecoder.com/blog/

http://p4r4n0id.com/ (appears to be gone, we’ll see)

http://packetlife.net/blog/

http://packetstormsecurity.org/news/

http://pacsec.jp/

http://paranoia.dubfire.net/ (Home: http://www.dubfire.net/) (Twitter: https://twitter.com/csoghoian)

http://pauldotcom.com/

http://penguininside.blogspot.com/

http://pen-testing.sans.org/blog/

http://philosecurity.org/

http://polarwave.blogspot.com/

http://praetorianprefect.com/

http://pseudo-flaw.net/log/index

http://publicintelligence.net/

http://randomthoughtsofforensics.blogspot.com

http://rdist.root.org/

http://recon.cx

http://resources.infosecinstitute.com/

http://revolutionwifi.blogspot.com/

http://rijmenants.blogspot.com/

https://365.rsaconference.com/blogs/critical-infrastructure

https://365.rsaconference.com/blogs/ediscovery

https://365.rsaconference.com/blogs/fred-stock

https://365.rsaconference.com/blogs/ira-winkler

https://365.rsaconference.com/blogs/rsa-conference-blog

https://365.rsaconference.com/blogs/securityreading

https://amtso.wordpress.com/

https://blog.avast.com/

https://blog.mozilla.org/security/

https://blog.opendns.com/

https://blogs.adobe.com/psirt/

https://blogs.mcafee.com/

https://blogs.mcafee.com/mcafee-labs

https://blogs.technet.com/b/sysinternals/

https://blogs.technet.com/mmpc/default.aspx

https://blogs.technet.com/msrc/

https://blog.torproject.org/

https://blog.whitehatsec.com/

https://chainmailcheck.wordpress.com/

https://citizenlab.org/category/news/

https://community.rapid7.com/community/infosec/blog

https://community.rapid7.com/community/metasploit/blog

https://devcentral.f5.com/Home/Blogs/tabid/1082195/Default.aspx

https://devcentral.f5.com/weblogs/macvittie/Default.aspx

http://seclists.org/

http://securityandrisk.blogspot.com/

http://securityblog.verizonbusiness.com/

http://securitybraindump.blogspot.com/

http://security-sh3ll.blogspot.com/

http://securityvulns.com/

http://securosis.com/blog

https://fightinginsecurity.wordpress.com/

https://gregness.wordpress.com/

http://sketchymoose.blogspot.com/

https://memset.wordpress.com/

https://news.ycombinator.com/

http://software-security.sans.org/blog/

http://spectrum.ieee.org/blog/riskfactor

https://psal.cs.drexel.edu/index.php/Main_Page

http://spyblog.org.uk/

https://secunia.com/advisories/

https://ssd.eff.org/

https://techbuddha.wordpress.com/

http://stratsec.blogspot.com/

https://twitter.com/hackinthebox

https://twitter.com/markrussinovich

http://superconductor.voltage.com/

http://swann.com/s/products/newsrelease/

https://www.adobe.com/support/security/

https://www.brandenwilliams.com/blog/

https://www.eff.org/

https://www.grc.com/securitynow.htm

https://www.ibm.com/developerworks/

https://www.ibm.com/developerworks/aix/library/

https://www.ibm.com/developerworks/linux/

https://www.ibm.com/developerworks/topics/

https://www.mozilla.org/security/announce/

https://www.net-security.org/

https://www.sans.org/newsletters/

https://www.sans.org/newsletters/#newsbites

https://www.sans.org/newsletters/#ouch

https://www.sans.org/newsletters/#risk

https://www.schneier.com/

https://www.securelist.com/en/weblog

https://www.trustedsec.com/news-and-events/

https://www.usenix.org/conferences

https://www.veracode.com/blog/

http://taosecurity.blogspot.com/

http://technicalinfodotnet.blogspot.com/

http://thehackernews.com/

http://thehiddenevil.com/

http://theinvisiblethings.blogspot.com/

http://threatpost.com/

http://threatthoughts.com/

http://ticklethewire.com/

http://tk-blog.blogspot.com/

http://toorcon.org/

http://travisgoodspeed.blogspot.com/

http://volatility.tumblr.com/

http://vrt-blog.snort.org/

http://vulnfactory.org/blog/

http://web.archive.org/web/20100528020113/http://milw0rm.com/

http://windowsir.blogspot.com/

http://wordpress.bladeforensics.com/

http://www.acunetix.com/blog/

http://www.afcea.org/signal/signalscape/

http://www.allspammedup.com/

http://www.backtrack-linux.org/blog/

http://www.bigbrotherwatch.org.uk/

http://www.blackbag.nl/

http://www.blindhog.net/

http://www.bunniestudios.com/wordpress/

http://www.businessinsider.com/defense

http://www.businessinsider.com/defense/infosec

http://www.businessinsider.com/warroom

http://www.capnfreedom.com/

http://www.catonmat.net/

http://www.cerias.purdue.edu/site/blog

http://www.cerias.purdue.edu/site/blog/

http://www.cgisecurity.com/

http://www.ciscoarticles.com/

http://www.clerkendweller.com/

http://www.corecom.com/html/wlan.html

http://www.cristoncox.com/

http://www.cryptogon.com/

http://www.cryptome.org/

http://www.cryptosmith.com/

http://www.cyberwarnews.info/

http://www.darknet.org.uk/

http://www.darkreading.com/blog

http://www.devttys0.com/blog/

http://www.educatedguesswork.org/

http://www.ehacking.net/

http://www.emergingthreatspro.com/blog/

http://www.ericjhuber.com/

http://www.esecurityplanet.com/

http://www.esecurityplanet.com/hackers

http://www.esecurityplanet.com/malware

http://www.eweek.com/c/s/Security/

http://www.exploit-db.com/

http://www.exploit-id.com/

http://www.fas.org/blog/secrecy/

http://www.fas.org/blog/ssp/

http://www.federaltimes.com/

http://www.financialcryptography.com/

http://www.flyingpenguin.com/

http://www.forensic4cast.com/

http://www.forensickb.com/

http://www.forensicswiki.org/

http://www.frontlinesentinel.com/

http://www.f-secure.com/weblog

http://www.gfi.com/blog/

http://www.gfi.com/blog/labs/

http://www.hackaday.com/

http://www.heinz.cmu.edu/~acquisti/shb/participants.htm

http://www.hexacorn.com/blog/

http://www.hexblog.com/

http://www.honeynet.org/

http://www.h-online.com/

http://www.h-online.com/developer/

http://www.h-online.com/open/

http://www.h-online.com/security/

http://www.hotforsecurity.com/

http://www.ibm.com/developerworks/security/

http://www.infosecblog.org/

http://www.infosecurity-magazine.com/blog/

http://www.insearchoftech.com/

http://www.irongeek.com/

http://www.irongeek.com/

http://www.itstactical.com/

http://www.l0t3k.org/en/

http://www.ledge.co.za/software/lpinotes/

http://www.lightbluetouchpaper.org/

http://www.links.org/

http://www.liquidmatrix.org/blog/

http://www.lovemytool.com/

http://www.mckeay.net/

http://www.my80211.com/

http://www.neowin.net/forum/topic/934274-freeware-alternative-list/

http://www.net-security.org/

http://www.networkworld.com/topics/security.html

http://www.nowtheendbegins.com/blog/

http://www.nowtheendbegins.com/blog/?cat=4

http://www.nsa.gov/

http://www.offensivecomputing.net/ (moving to: http://openmalware.org/)

http://www.offensive-security.com/blog/

http://www.officer.com/latest-news

http://www.openrce.org/articles/

http://www.packetstormsecurity.org/

http://www.paranoidprose.com/

http://www.pgpboard.com/

http://www.pinewswire.net/

http://www.policemisconduct.net

http://www.prevx.com/blog.asp

http://www.rationalsurvivability.com/blog/

http://www.reddit.com/r/malware

http://www.reddit.com/r/reverseengineering

http://www.reversinglabs.com/blog

http://www.schneier.com/

http://www.scmagazine.com/the-data-breach-blog/section/1263/

http://www.seclist.us/

http://www.secsocial.com/blog/

http://www.securingthehuman.org/blog/

http://www.securitybsides.com

http://www.securityfocus.com/

http://www.securityfocus.com/archive

http://www.security-ray.com/

http://www.securitytracker.com/

http://www.securityweek.com/

http://www.sensepost.com/blog/

http://www.shellguardians.com/

http://www.shmoo.com/news/

http://www.shmoocon.org/

http://www.skullbox.net/index.php

http://www.social-engineer.org/framework/Social_Engineering_Framework

http://www.standalone-sysadmin.com/blog/

http://www.stratumsecurity.com/company/blog/

http://www.survivalblog.com/

http://www.symantec.com/business/security_response/weblog/

http://www.symantec.com/connect/security/blogs

http://www.sysadminblogs.com/planet/

http://www.sysforensics.org/

http://www.teamshatter.com/

http://www.techrepublic.com/blog/security

http://www.thedarkvisitor.com/

http://www.thedigitalstandard.blogspot.com/

http://www.theemailadmin.com/

http://www.thegeekstuff.com/

http://www.thegeekstuff.com/best-of-the-blog/

http://www.theintelligencenews.com/

http://www.theregister.co.uk/security/

http://www.thesecuritysamurai.com/

http://www.thetechherald.com/security

http://www.troyhunt.com/

http://www.trusteer.com/blog

http://www.whenisfive.com

http://www.wikileaks.org/

http://www.wired.com/about/blogs/

http://www.wired.com/dangerroom

http://www.wired.com/threatlevel/

http://www.wlanpros.com/

http://www.wmarkbrooks.com/

http://www.woodmann.com/forum/blog.php

http://www.wrgross.com/blogs/security/

http://www.wrgross.com/blogs/security/category/openbsd/

http://www.zdnet.com/blog/security/

http://www.zerodayinitiative.com/advisories/published/

http://www.zerodayinitiative.com/advisories/upcoming

(videos, leads to) http://www.irongeek.com/i.php?page=security/hackingillustrated

 

—————————————-

 

** 6006: Security Forums (Web based Discussion Forums)

 

http://cocoontech.com/forums/

http://forum.bitdefender.com

http://forum.prisonplanet.com

http://forums.avg.com/

http://forums.comodo.com/

http://forums.hak5.org/

http://forums.officer.com/forums/

http://forums.windowsecurity.com

http://glocktalk.com/forums/

http://hardforum.com/showthread.php?t=781545

http://homecommunity.cisco.com/

http://www.antionline.com/

http://www.ar15.com/forums/

http://www.backtrack-linux.org/forums

http://www.binrev.com/forums/

http://www.defencetalk.com/forums/

http://www.dslreports.com/forum/cleanup

http://www.dslreports.com/forum/scambusters

http://www.dslreports.com/forum/security

http://www.dslreports.com/forum/wsecurity

http://www.hex-rays.com/forum/

http://www.networking-forum.com/

http://www.sherdog.net/forums/

http://www.survivalistboards.com/

http://www.wilderssecurity.com/

http://www.wilderssecurity.com/showthread.php?t=242949

http://www.woodmann.com/forum/forum.php

—————————————-

 

** 6007: Security Magazines & Zines

 

http://about-threats.trendmicro.com/ebooks/

http://bsdmag.org/

http://chmag.in/

http://chmag.in/issue/all

http://commons.oreilly.com/wiki/index.php/O%27Reilly_Commons

http://gonullyourself.com/ezines/

http://gonullyourself.com/zine/

http://hakin9.org/

http://linuxformat.com/

http://magazine.hackinthebox.org/

http://magazine.hitb.org/

http://secureviewmag.com/

https://www.net-security.org/insecuremag.php

http://ubuntupocketguide.com/index_main.html

http://www.2600.com/

http://www.admin-magazine.com/

http://www.dwheeler.com/secure-programs/

http://www.linuxpromagazine.com/

http://www.linuxuser.co.uk/

http://www.phrack.com/

http://www.textfiles.com/ (RE: https://en.wikipedia.org/wiki/Textfiles.com)

http://www.thegeekstuff.com/linux-101-hacks-ebook/

http://www.uninformed.org/

—————————————-

 

** 6008: Linux Anti-Malware Scanners

 

See Also: 6003: Antivirus LiveCDs – boot and scan your system for malware

 

+ Avast:

http://www.avast.com/linux-home-edition

 

+ AVG:

http://free.avg.com/ww-en/download.prd-alf.tpl-stdfull

 

+ Bitdefender:

http://www.bitdefender.com/media/html/en/unicesportal/

http://www.bitdefender.com/business/antivirus-for-unices.html

http://unices.bitdefender.com

http://www.bitdefender.com/support/Bitdefender-for-Linux-manual-updates-224.html

 

++ Bitdefender repos (may be older than version obtainable above via registration & email):

http://download.bitdefender.com/repos/deb/

http://download.bitdefender.com/repos/rpm/

 

+ ClamAV:

http://www.clamav.net/

http://sourceforge.net/projects/clamav/

 

+ ClamTk is a GUI front-end for ClamAV

http://clamtk.sourceforge.net/

http://sourceforge.net/projects/clamtk/

 

+ Collage:

http://gtnoise.net/projects/7-anti-censorship/7-collage-defeating-censorship-with-user-generated-content

 

+ Comodo Antivirus for Linux (CAVL):

http://forums.comodo.com/comodo-antivirus-for-linux-cavl/comodo-antivirus-for-linux-cavl-v102398181-is-formally-released-t85030.0.html

http://forums.comodo.com/comodo-antivirus-for-linux-cavl-b275.0/

 

+ Coroner’s Toolkit, The:

http://www.porcupine.org/forensics/tct.html

 

+ F-PROT:

http://www.f-prot.com/download/home_user/download_fplinux.html

 

+ F-PROT FRONT-END: QtFprot is a frontend for FPROT 4.x, a free (for personal use) Linux virus-scanner

http://freecode.com/projects/qtfprot

 

+ F-PROT FRONT-END: XFPROT is a graphical frontend for the F-Prot Antivirus for Linux Small Business Edition.

http://freecode.com/projects/xfprot

http://web.tiscali.it/sharp/xfprot/

 

—————————————-

 

** 6009: Linux Security

————–

* 6009.1: Linux Articles (a few of these aren’t security related and will eventually be moved to a new section):

—————

http://alien.slackbook.org/dokuwiki/doku.php?id=slackware:parentalcontrol

http://ask.slashdot.org/story/05/07/20/1457252/network-intrusion-detection-and-prevention

http://csrc.nist.gov/

http://csrc.nist.gov/publications/PubsSPs.html

http://doc.opensuse.org/documentation/html/openSUSE_113/opensuse-apps/cha.crypto.html

http://doc.opensuse.org/documentation/html/openSUSE_113/opensuse-apps/cha.gnome.crypto.html

http://emergingthreats.net/

http://en.gentoo-wiki.com/wiki/HOWTO_Iptables_for_newbies

http://freeworld.thc.org/papers/anonymous-unix.html

http://honeypots.sourceforge.net/modified_script.html

http://it.slashdot.org/story/05/04/19/232230/bastille-adds-reporting-grabs-fed-attention

http://it.slashdot.org/story/06/03/14/1842248/pgp-creators-zfone-encrypts-voip

http://linuxblog.darkduck.com/

http://linuxgazette.net/121/anonymous.html

http://linux-ip.net/html/ether-arp.html

http://linuxpoison.blogspot.com/2008/01/howto-check-disk-drive-for-errors-and.html

http://netwizards.co.uk/installing-tripwire-on-ubuntu/

http://nmap.org/book/osdetect.html

http://nmap.org/book/toc.html

http://ornellas.apanela.com/dokuwiki/pub:firewall_and_adv_routing

http://penguininside.blogspot.se/2009/09/10-panel-dock-applications-for-your.html

http://people.redhat.com/pvrabec/openscap/guide.html

http://planet.netfilter.org/

http://project.honeynet.org/papers/individual/

http://project.honeynet.org/papers/kye.html

http://projects.gnome.org/gdm/docs/2.14/configuration.html

http://psychocats.net/ubuntu/index.php

https://delightlylinux.wordpress.com/

https://delightlylinux.wordpress.com/2012/06/14/secure-delete/

http://securitywatch.eweek.com/rootkits/rootkits_on_a_pci_card.html

https://fedoraproject.org/wiki/DocsProject/UsingGpg/CreatingKeys

https://fedoraproject.org/wiki/How_to_create_and_use_a_Live_CD

https://fedoraproject.org/wiki/How_to_create_and_use_Live_USB

https://fedoraproject.org/wiki/JeroenVanMeeuwen/Revisor/FedoraRebrandRemixGuidelines

https://help.ubuntu.com/community/EncryptedPrivateDirectory

https://help.ubuntu.com/community/FileIntegrityAIDE

https://help.ubuntu.com/community/GnuPrivacyGuardHowto

https://help.ubuntu.com/community/LinuxLogFiles

https://help.ubuntu.com/community/Logwatch

https://help.ubuntu.com/community/StricterDefaults

https://secure.wikimedia.org/wikibooks/en/wiki/Grsecurity/Appendix/Grsecurity_and_PaX_Configuration_Options

https://wiki.debian.org/

https://wiki.debian.org/iptables

https://wiki.debian.org/SecureApt

https://wiki.debian.org/SystemAdministration

https://wiki.ubuntu.com/

https://wiki.ubuntu.com/BasicSecurity

https://wiki.ubuntu.com/BasicSecurity/DidIJustGetOwned

https://wiki.ubuntu.com/Security/Features

https://www.cert.org/tech_tips/unix_configuration_guidelines.html

https://www.cs.arizona.edu/stork/packagemanagersecurity/faq.html

https://www.ibm.com/developerworks/linux/library/l-proc/index.html

https://www.ibm.com/developerworks/linux/tutorials/l-lockdown1/

https://www.ibm.com/developerworks/linux/tutorials/l-lockdown2/index.html

https://www.linux.com/

https://www.linux.com/learn/tutorials/456149-manage-passwords-encryption-keys-and-more-with-seahorse

https://www.linuxquestions.org/questions/linux-security-4/security-references-45261/

https://www.owasp.org

https://www.sans.org/reading_room/

https://www.schneier.com/crypto-gram.html

http://tldp.org/HOWTO/AX25-HOWTO/index.html

http://tldp.org/HOWTO/Secure-Programs-HOWTO/buffer-overflow.html

http://tldp.org/LDP/nag2/index.html

http://trac.secdev.org/scapy/wiki/IdentifyingRogueDHCPServers

http://web.archive.org/web/20040215020827/http://www.linux-mag.com/2003-09/acls_01.html

http://web.archive.org/web/20041031074320/http://sun.soci.niu.edu/~rslade/secgloss.htm

http://web.archive.org/web/20041125131921/http://tips.linux.com/tips/04/11/23/2022252.shtml?tid=100&tid=47&tid=35

http://web.archive.org/web/20041231085409/http://www.cs.auckland.ac.nz/~pgut001/links.html

http://web.archive.org/web/20050306035558/http://www.spitzner.net/linux.html

http://web.archive.org/web/20060712182215/http://linuxgazette.net/128/saha.html

http://web.archive.org/web/20090109020415/http://www.securityfocus.com/print/infocus/1414

http://web.archive.org/web/20100529035423/http://www.cert.org/current/services_ports.html

http://wiki.centos.org/HowTos/Network/IPTables

http://winhelp2002.mvps.org/hosts.htm

http://www.acsu.buffalo.edu/~charngda/elf.html

http://www.alwanza.com/howTo/linux/tripwire.html

http://www.bitbull.ch/wiki/index.php/Hacking_Notes

http://www.bitbull.ch/wiki/index.php/Linux_Short_Reference

http://www.brandonhutchinson.com/iptables_fw.html

http://www.codeproject.com/KB/cpp/shared_object_injection_1.aspx#brief_elf_str_code1

http://www.cromwell-intl.com/security/intrusion-analysis/

http://www.cryptovirology.com/cryptovfiles/cryptovirologyfaqver1.html#whatiscryptoviralextortion

http://www.cs.arizona.edu/stork/packagemanagersecurity/faq.html

http://www.cs.wright.edu/~pmateti/Courses/233/Labs/OS-on-USB/OSonUSBLabKnoppix671DVD.html

http://www.cs.wright.edu/~pmateti/InternetSecurity/Lectures/BufferOverflow/alephOne.html

http://www.cs.wright.edu/~pmateti/InternetSecurity/Lectures/Fortification/obrien.html

http://www.cs.wright.edu/~pmateti/InternetSecurity/Lectures/Probing/How%20to%20Handle%20Network%20Probes.htm

http://www.cyberciti.biz/

http://www.cyberciti.biz/faq/add-remove-list-linux-kernel-modules/

http://www.cyberciti.biz/faq/how-to-detect-arp-spoofing-under-unix-or-linux/

http://www.cyberciti.biz/hardware/linux-iotop-simple-top-like-io-monitor/

http://www.cyberciti.biz/tips/howto-log-user-activity-using-process-accounting.html

http://www.cyberciti.biz/tips/iptables-mac-address-filtering.html

http://www.cyberciti.biz/tips/linux-iptables-10-how-to-block-common-attack.html

http://www.cyberciti.biz/tips/linux-iptables-8-how-to-avoid-spoofing-and-bad-addresses-attack.html

http://www.cyberciti.biz/tips/linux-security.html

http://www.cyberciti.biz/tips/linux-unix-windows-find-hidden-processes-tcp-udp-ports.html

http://www.cyberciti.biz/tips/top-linux-monitoring-tools.html

http://www.debianadmin.com/

http://www.debianadmin.com/filesystem-encryption-tools-for-linux.html

http://www.debian-administration.org/

http://www.debian-administration.org/articles/49

http://www.debian.org/doc/

http://www.debian.org/doc/manuals/

http://www.debian.org/doc/manuals/securing-debian-howto/

http://www.debian.org/doc/manuals/securing-debian-howto/ch-sec-services.en.html#s-firewall-setup

http://www.debian.org/events/keysigning

http://www.debuntu.org/intrusion-detection-with-aide

http://www.desktoplinux.com/articles/AT3341468184.html

http://www.desktoplinux.com/articles/AT7966076367.html

http://www.dshield.org/diary.html?storyid=13057

http://www.exploit-db.com/

http://www.faqs.org/docs/Linux-HOWTO/User-Authentication-HOWTO.html

http://www.gentoo.org/doc/en/gnupg-user.xml

http://www.hackinglinuxexposed.com/articles/

http://www.hackinglinuxexposed.com/articles/20030703.html

http://www.hackinglinuxexposed.com/articles/20030709.html

http://www.howtoforge.com/intrusion_detection_base_snort

http://www.ibiblio.org/pub/Linux/docs/HOWTO/other-formats/html_single/Disk-Encryption-HOWTO.html

http://www.ibm.com/developerworks/aix/library/au-aix-manage-ruby/index.html

http://www.ibm.com/developerworks/aix/library/au-speakingunix10/index.html

http://www.ibm.com/developerworks/aix/library/au-speakingunix11/index.html

http://www.ibm.com/developerworks/aix/library/au-speakingunix12/index.html

http://www.ibm.com/developerworks/aix/library/au-speakingunix13/index.html

http://www.ibm.com/developerworks/aix/library/au-speakingunix2.html

http://www.ibm.com/developerworks/aix/library/au-speakingunix3.html

http://www.ibm.com/developerworks/aix/library/au-speakingunix4/index.html

http://www.ibm.com/developerworks/aix/library/au-speakingunix5.html

http://www.ibm.com/developerworks/aix/library/au-speakingunix6.html

http://www.ibm.com/developerworks/aix/library/au-speakingunix7.html

http://www.ibm.com/developerworks/aix/library/au-speakingunix8/index.html

http://www.ibm.com/developerworks/aix/library/au-speakingunix9/index.html

http://www.ibm.com/developerworks/aix/library/au-spunix_greattools/index.html

http://www.ibm.com/developerworks/aix/library/au-unix-commandline/index.html

http://www.ibm.com/developerworks/library/l-keyc2/

http://www.ibm.com/developerworks/library/l-keyc3/

http://www.ibm.com/developerworks/library/l-keyc/index.html

http://www.ibm.com/developerworks/linux/library/l-livecdsec/?ca=dgr-lnxw07SecurityLiveCD

http://www.justlinux.com/nhf/Security/IPtables_Basics.html

http://www.la-samhna.de/library/rootkits/index.html

http://www.ledge.co.za/software/lpinotes/

http://www.linuxbsdos.com/2011/05/10/how-to-install-ubuntu-11-04-on-an-encrypted-lvm-file-system/

http://www.linuxforums.org/articles/understanding-elf-using-readelf-and-objdump_125.html

http://www.linuxhomenetworking.com/

http://www.linuxhomenetworking.com/wiki/index.php/Quick_HOWTO_:_Ch14_:_Linux_Firewalls_Using_iptables

http://www.linuxjournal.com/

http://www.linux.org/

http://www.linuxplanet.com/linuxplanet/tutorials/4505/1

http://www.linuxsecurity.com

http://www.linuxsecurity.com/

http://www.linuxsecurity.com/content/view/117644/49/

http://www.linuxsecurity.com/content/view/118211/49/

http://www.linuxsecurity.com/content/view/119415/49/

http://www.linuxsecurity.com/docs/colsfaq.html

http://www.livecdlist.com/

http://www.madboa.com/geek/gpg-quickstart/

http://www.madboa.com/geek/openssl/#digest-file

http://www.madboa.com/geek/pine-ssl/

http://www.netfilter.org/documentation/

http://www.novell.com/communities/node/4971/detecting-arp-poisoning-attacks

http://www.phrack.com/issues.html?issue=58&id=7#article

http://www.phrack.org/issues.html?issue=68&id=9#article

http://www.porcupine.org/forensics/column.html

http://www.psychocats.net/ubuntu/minimal

http://www.securityfocus.com/firewalls

http://www.securityfocus.com/ids

http://www.securityfocus.com/incidents

http://www.securityfocus.com/unix

http://www.seifried.org/security/ids/20020107-honeypot-vmware-basics.html

http://www.symantec.com/connect/articles/alien-autopsy-reverse-engineering-win32-trojans-linux

http://www.symantec.com/connect/articles/detecting-and-removing-malicious-code

http://www.symantec.com/connect/articles/detecting-rootkits-and-kernel-level-compromises-linux

http://www.symantec.com/connect/articles/forensic-analysis-live-linux-system-pt-1

http://www.symantec.com/connect/articles/forensic-analysis-live-linux-system-pt-2

http://www.symantec.com/connect/articles/hacker-tools-and-their-signatures-part-three-rootkits

http://www.symantec.com/connect/articles/hardening-tcpip-stack-syn-attacks

http://www.symantec.com/connect/articles/host-integrity-monitoring-best-practices-deployment

http://www.symantec.com/connect/articles/reverse-engineering-hostile-code

http://www.symantec.com/connect/articles/sniffers-what-they-are-and-how-protect-yourself

http://www.symantec.com/connect/topics/security/securityfocus

http://www.techrepublic.com/article/10-things-you-should-do-to-a-new-linux-pc-before-exposing-it-to-the-internet/5987648

http://www.thc.org/

http://www.thc.org/papers/fw-backd.htm

http://www.thegeekstuff.com/2010/03/netstat-command-examples/

http://www.thegeekstuff.com/2010/11/50-linux-commands/

http://www.thegeekstuff.com/2010/12/50-unix-linux-sysadmin-tutorials/

http://www.thegeekstuff.com/2011/06/iptables-rules-examples/

http://www.thegeekstuff.com/2011/12/linux-performance-monitoring-tools/

http://www.tldp.org/HOWTO/Encrypted-Root-Filesystem-HOWTO/

http://www.tldp.org/HOWTO/Linux%2BIPv6-HOWTO/index.html

http://www.tracking-hackers.com/misc/faq.html

http://www.ubuntugeek.com/tools-to-delete-files-securely-in-ubuntu-linux.html

http://www.unixwiz.net/techtips/iguide-crypto-hashes.html

http://www.whenisfive.com/tutorials/tor-polipo-5-minute-install-guide-ubuntu-11-0411-10/

http://www.yolinux.com/TUTORIALS/LinuxSecurityTools.html

(multicd script) http://multicd.tuxfamily.org/

(multicd script related) http://ubuntuforums.org/showthread.php?t=1071869

(PDF) http://csrc.nist.gov/publications/nistir/7316/NISTIR-7316.pdf

(PDF) http://csrc.nist.gov/publications/nistpubs/800-84/SP800-84.pdf

(PDF) http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdf

(PDF) http://events.ccc.de/congress/2006/Fahrplan/attachments/1167-SpeakingAnonymously.pdf

(PDF) http://web.archive.org/web/20070717124745/http://www.tldp.org/linuxfocus/English/Archives/lf-2003_01-0278.pdf

(PDF) http://www.linux-magazine.com/issue/01/File_Permissions.pdf

(PDFs) http://www.nsa.gov/ia/mitigation_guidance/security_configuration_guides/operating_systems.shtml

 

——————–

* 6009.2: Linux Security Tools

(the intention here is not to list everything, hence the link to BackTrack which

contains a number of useful tools which could otherwise be linked here.)

——————–

 

++ SecTools.Org: Top 125 Network Security Tools

http://sectools.org/

 

+ AIDE:

http://sourceforge.net/projects/aide/

http://sourceforge.net/projects/aide

http://freecode.com/projects/aide

 

+ AppArmor:

http://wiki.apparmor.net/index.php/Main_Page

http://www.linux-magazine.com/Issues/2006/69/AppArmor-vs.-SELinux

(PDF) http://www.linux-magazine.com/content/download/63096/487061/file/AppArmor_vs_SELinux.pdf

https://lkml.org/lkml/2006/4/19/199

 

+ BackTrack Linux (contains MANY tools)

http://www.backtrack-linux.org/

 

+ Bastille:

http://bastille-linux.sourceforge.net/

 

+ Baudline:

http://www.baudline.com/

https://en.wikipedia.org/wiki/Baudline

 

+ BleachBit:

http://bleachbit.sourceforge.net/

http://sourceforge.net/projects/bleachbit/

 

+ BotHunter:

http://www.bothunter.net/

 

+ Cacti

http://www.cacti.net/

 

+ Chkrootkit:

https://en.wikipedia.org/wiki/Chkrootkit

http://freecode.com/projects/chkrootkit

(not directly linking to official site url because it’s been up/down)

(the past few weeks)

 

+ Combofix:

http://www.combofix.org/

 

+ Cuckoo Sandbox:

http://www.cuckoosandbox.org/

 

+ Dan’s Guardian:

http://dansguardian.org/

 

+ DBAN (Darik’s Boot and Nuke):

http://www.dban.org/

http://sourceforge.net/projects/dban/

 

+ DDRescue:

https://www.gnu.org/software/ddrescue/ddrescue.html

 

+ debsecan:

http://www.enyo.de/fw/software/debsecan/

 

+ Deny Hosts:

http://denyhosts.sourceforge.net/

 

+ DNSCrypt

https://www.opendns.com/technology/dnscrypt/

https://blog.opendns.com/2012/02/16/tales-from-the-dnscrypt-linux-rising/

https://github.com/opendns/dnscrypt-proxy/blob/master/README.markdown

https://github.com/opendns/dnscrypt-proxy

 

+ DNSTop:

http://dns.measurement-factory.com/tools/dnstop/

 

+ EckBox:

http://eckbox.sourceforge.net

(offsite article): http://blockyourid.com/~gbpprorg/mil/eckbox/index.html

 

+ Enigmail – a security extension to Mozilla Thunderbird and Seamonkey:

http://www.enigmail.net/home/index.php

 

+ Enscribe:

http://www.coppercloudmusic.com/enscribe/

http://freecode.com/projects/enscribe

(old) http://web.archive.org/web/20060712151452/http://jbd.zayda.net/enscribe/

 

+ FakeAP

http://blackalchemy.to/project/fakeap/

 

+ Foremost:

http://foremost.sourceforge.net/

 

+ GNUPG (GPG):

http://www.gnupg.org/

http://www.gnupg.org/related_software/frontends.en.html

http://www.gnupg.org/related_software/gpa/index.en.html

http://utils.kde.org/projects/kgpg/

 

+ Honeypots (The Honeynet Project):

http://project.honeynet.org/tools/index.html

 

+ HTTPS Everywhere (Firefox and Chrome extension):

https://www.eff.org/https-everywhere

 

+ IPTraf:

http://iptraf.seul.org/

http://freecode.com/projects/iptraf

 

+ Jhead:

http://www.sentex.net/~mwandel/jhead/

http://freecode.com/projects/jhead

 

+ John The Ripper:

http://www.openwall.com/john/

 

+ Linux Kernel Archives:

https://www.kernel.org/

 

+ Kismet:

https://kismetwireless.net/

http://freecode.com/projects/kismet

 

+ LaBrea:

http://labrea.sourceforge.net/

 

+ Liberté Linux (uses Tor):

http://dee.su/liberte

 

+ libemu (x86 Shellcode Emulation):

http://libemu.carnivore.it/

 

+ Lynis (Security and system auditing tool):

http://www.rootkit.nl/projects/lynis.html

https://en.wikipedia.org/wiki/Lynis

http://freecode.com/projects/lynis

 

+ Mac Changer:

http://www.alobbs.com/macchanger

 

+ MAT – Metadata Anonymisation Toolkit:

https://mat.boum.org/

 

+ md5deep and hashdeep: (md5deep is a set of programs to compute MD5, SHA-1, SHA-256, Tiger, or Whirlpool message digests on an arbitrary number of files.)

(hashdeep is a program to compute, match, and audit hashsets.)

http://md5deep.sourceforge.net/

http://sourceforge.net/projects/md5deep/

 

+ MCrypt:

http://mcrypt.sourceforge.net/

http://sourceforge.net/projects/mcrypt/

 

+ Monkeysphere:

http://web.monkeysphere.info/

 

+ Nemesis:

http://nemesis.sourceforge.net/

 

+ Nessus:

http://www.nessus.org/

 

+ Network Monitoring Tools @ Stanford.edu:

http://www.slac.stanford.edu/xorg/nmtf/nmtf-tools.html

 

+ Ninite:

https://ninite.com/

 

+ NGrep:

http://ngrep.sourceforge.net/

 

+ NMap:

http://nmap.org/download.html

 

+ NoMachine NX:

http://nomachine.com/

 

+ NoScript (Firefox Extension)

https://addons.mozilla.org/en-US/firefox/addon/noscript/

 

+ NTop:

http://www.ntop.org/

http://freecode.com/projects/ntop

 

+ OphCrack:

http://ophcrack.sourceforge.net/

 

+ OpenSSH:

http://www.openssh.com/

 

+ OpenSSL:

http://www.openssl.org/

 

+ Openwall:

http://www.openwall.com/

 

+ OSSEC:

http://www.ossec.net/

 

+ PhotoRec:

http://www.cgsecurity.org/wiki/PhotoRec

 

+ Polipo (Proxy commonly associated with Tor and TAILS):

http://freecode.com/projects/polipo

 

+ Rootkits:

http://packetstormsecurity.org/UNIX/penetration/rootkits/

 

+ Rkhunter:

https://en.wikipedia.org/wiki/Rkhunter

http://rkhunter.sourceforge.net/

(old) http://www.rootkit.nl/projects/rootkit_hunter.html

 

+ Scapy:

http://www.secdev.org/projects/scapy/

 

+ Seahorse:

http://projects.gnome.org/seahorse/

 

+ Secure-Delete:

http://freeworld.thc.org/releases/secure_delete-3.1.tar.gz

http://packages.ubuntu.com/search?keywords=secure+delete

 

+ Skipfish:

https://code.google.com/p/skipfish/

 

+ Sleuth Kit (TSK) & Autopsy:

http://www.sleuthkit.org/

http://sourceforge.net/projects/sleuthkit/

 

+ SNARE:

http://sourceforge.net/projects/snare/

 

+ Snort

http://www.snort.org/

 

+ socat:

http://www.dest-unreach.org/socat/

 

+ Sophos Linux/RST-B detection tool:

http://www.sophos.com/rst-detection-tool

 

+ srm – secure file deletion:

http://srm.sourceforge.net/

http://sourceforge.net/projects/srm/

http://freecode.com/projects/srm

 

+ SSDeep:

http://ssdeep.sourceforge.net/

 

+ SSHMenu:

http://sshmenu.sourceforge.net/

 

+ SSLStrip:

http://www.thoughtcrime.org/software/sslstrip/index.html

 

+ SSSS (Shamir’s Secret Sharing Scheme):

http://point-at-infinity.org/ssss/

 

+ Stegdetect:

http://www.outguess.org/detection.php

http://freecode.com/projects/stegdetect

 

+ Steghide:

http://steghide.sourceforge.net/

http://www.freecode.com/projects/steghide

 

+ Suricata:

http://www.openinfosecfoundation.org/

http://www.openinfosecfoundation.org/index.php/download-suricata

 

+ Switzerland (Network Testing Tool):

https://www.eff.org/pages/switzerland-network-testing-tool

 

+ System Rescue CD:

http://www.sysresccd.org/

 

+ Tails LiveCD (uses Tor):

https://tails.boum.org/

 

+ Tempest for Eliza

http://www.erikyyy.de/tempest/

 

+ Tiger – Unix security audit and intrusion detection tool:

http://nongnu.org/tiger/

 

+ Tiger – Cryptographic Hash Function:

http://www.cs.technion.ac.il/~biham/Reports/Tiger/

 

+ Tor:

http://metrics.torproject.org/

https://blog.torproject.org/blog/

https://bridges.torproject.org/

https://check.torproject.org/

https://lists.torproject.org/

https://weather.torproject.org/

https://www.torproject.org/

https://www.torproject.org/about/overview.html.en

https://www.torproject.org/docs/documentation.html.en

https://www.torproject.org/download/download-easy.html.en

https://www.torproject.org/press/press.html.en

https://www.torproject.org/projects/projects.html.en

https://www.torproject.org/torbutton/

https://www.torproject.org/vidalia/

 

+ Tor Chat2:

https://github.com/prof7bit/TorChat

https://github.com/prof7bit/TorChat/downloads

(old/original) https://code.google.com/p/torchat/

 

+ Tor Stats:

http://torstatus.blutmagie.de/

 

+ Tripwire:

https://en.wikipedia.org/wiki/Open_Source_Tripwire

http://sourceforge.net/projects/tripwire/

 

+ TrueCrypt:

http://www.truecrypt.org/

http://www.truecrypt.org/docs/

http://www.truecrypt.org/downloads

http://www.truecrypt.org/news

http://forums.truecrypt.org/

 

+ VOIP Hopper:

http://voiphopper.sourceforge.net/

 

+ Volatility Framework

https://www.volatilesystems.com/default/volatility#overview

https://code.google.com/p/volatility/w/list

http://lists.volatilesystems.com/mailman/listinfo

 

+ WarVOX:

http://warvox.org/

 

+ Webmin:

http://www.webmin.com/

 

+ Whirlpool – a cryptographic hash function:

https://en.wikipedia.org/wiki/Whirlpool_%28cryptography%29

http://www.larc.usp.br/~pbarreto/WhirlpoolPage.html

 

+ Wipe:

http://wipe.sourceforge.net/

 

+ Wireshark:

https://www.wireshark.org/

 

+ Yersinia:

http://www.yersinia.net/

 

+ Zfone

http://zfoneproject.com/

https://en.wikipedia.org/wiki/Zfone

—————————————-

 

* 6009.3: Linux Various+

(most are not directly security related)

——————–

http://appdb.winehq.org/

http://blogs.valvesoftware.com/linux/steamd-penguins/

http://distrowatch.com/

http://frankscorner.org/

http://lbproject.sourceforge.net/

http://linuxgazette.net/

http://linux.slashdot.org/

http://linux.sys-con.com/

http://lxer.com/

http://olpcnews.com/

http://oreilly.com/linux/

http://osdir.com/

http://packetstormsecurity.org/

http://planet.debian.org/

http://planet.gentoo.org/

http://planet.ubuntu.com/

https://lwn.net/

https://wiki.ubuntu.com/UbuntuWeeklyNewsletter/

https://www.kernel.org/

https://www.linux.com/

http://techrights.org/wiki/index.php/Main_Page

http://tllts.org/

http://ubuntupocketguide.com/index_main.html

http://wine-review.blogspot.com/

http://www.codeweavers.com/

http://www.gnu.org/philosophy/

http://www.linuxformat.com/

http://www.linuxjournal.com/

http://www.linux-magazine.com/

http://www.linux-mag.com/

http://www.linux.org/

http://www.linuxpromagazine.com/

http://www.linuxsecurity.com/

http://www.linuxtag.org

http://www.linuxuser.co.uk/

http://www.mail-archive.com/funsec@linuxbox.org/

http://www.osnews.com/

http://www.playonlinux.com/en

http://www.thegeekstuff.com/linux-101-hacks-ebook/

http://www.tuxarena.com/

http://www.winehq.org/

http://www.wine-reviews.net/

(in limbo?) http://www.desktoplinux.com/news/

 

—————————————-

** 6010: Windows Security (that’s a joke) Tools:

 

+ Attack Surface Analyzer

https://www.microsoft.com/en-us/download/details.aspx?id=24487

 

+ Flame Removal Tool (32 & 64bit versions):

http://labs.bitdefender.com/2012/5/cyber-espionage-reaches-new-levels-with-flamer/

 

+ GNUPG (GPG):

http://www.gnupg.org/

http://www.gnupg.org/related_software/frontends.en.html

https://code.google.com/p/cryptophane/

 

+ MobaXterm:

http://mobaxterm.mobatek.net/

http://mobaxterm.mobatek.net/download-home-edition

http://mobaxterm.mobatek.net/download.html

 

+ PhotoRec:

http://www.cgsecurity.org/wiki/PhotoRec

 

+ PuTTY:

https://en.wikipedia.org/wiki/PuTTY

 

+ SNARE:

http://sourceforge.net/projects/snare/

 

+ TDSSKiller Anti-Rootkit Tool:

http://support.kaspersky.com/faq/?qid=208283363

 

+ WinSCP:

https://en.wikipedia.org/wiki/WinSCP

 

+ Zfone

http://zfoneproject.com/

https://en.wikipedia.org/wiki/Zfone

 

(Archive/Alive) https://www.techsupportalert.com/content/probably-best-free-security-list-world.htm

(Article, DOC) http://msdn.microsoft.com/en-us/windows/hardware/gg487309

(Article) http://resources.infosecinstitute.com/tuluka/

(Article) https://social.technet.microsoft.com/wiki/contents/articles/942.hyper-v-how-to-detect-if-a-computer-is-a-vm-using-script.aspx

(Article) http://technet.microsoft.com/library/gg176673.aspx?ITPID=sprblog

(Article) http://technet.microsoft.com/library/gg176676.aspx?ITPID=sprblog

(Article) http://www.symantec.com/connect/articles/alien-autopsy-reverse-engineering-win32-trojans-linux

(Article/Wiki) https://en.wikipedia.org/wiki/Comparison_of_SSH_clients

(Discontinued Magazine / File downloads) http://www.magnesiummedia.com/pcutilities/

(doc, leads to ) https://www.microsoft.com/en-us/download/details.aspx?id=24373

(doc, leads to ) https://www.microsoft.com/en-us/download/details.aspx?id=3118

(docx, leads to) https://www.microsoft.com/en-us/download/details.aspx?id=20092

(Forum) https://www.microsoft.com/communities/forums/default.mspx

(Forum) http://www.sevenforums.com/

(Forum) http://www.w7forums.com/

(PDFs) http://www.nsa.gov/ia/mitigation_guidance/security_configuration_guides/operating_systems.shtml

(Spreadsheet xlsx, leads to) https://www.microsoft.com/en-us/download/details.aspx?id=19990

(Tutorial) Creating a Steady State by Using Microsoft Technologies / Windows 7 – Part 1/3

(Tutorial) Creating a Steady State by Using Microsoft Technologies / Windows 7 – Part 2/3

(Tutorial) Creating a Steady State by Using Microsoft Technologies / Windows 7 – Part 3/3

(Tutorial) mechBgon’s guide 1/3 http://www.mechbgon.com/build/router.html

(Tutorial) mechBgon’s guide 2/3 http://www.mechbgon.com/build/security1.html

(Tutorial) mechBgon’s guide 3/3 http://www.mechbgon.com/build/security2.html

——————————————————————————–

This is the end of HUGE Security Resource+ – version 6000 – 08/31/2012

——————————————————————————–

We post this publication first at PasteBin.com. Please stay tuned

for the next version of HUGE Security Resource+. It’s not the best

of names for a publication, but we’re lazy, and this is free for

you.

 

We do not name, credit, or otherwise pimp out who we are. None of us

will ever claim credit for this document, previous, present, and future

versions, anyone who does is lying.

 

We’re not on Facebook, Twitter, or any other whore social media circles,

nor are we active in the traditional and non traditional areas

of chatter – including IRC. Every version of this document

has, is, and will be released as a text file because it’s

easier to share with friends and it lacks ugly metadata.

 

Please share this document with others, convert it to PDF

and other formats, but please do not modify the document

from its original design. Do not add your own links

for redistribution, rename the document, or claim that

you wrote it. Please provide a link back to the original

location @ PasteBin where it’s released first.

 

We don’t want anything other than to provide you with a solid

list of specially chosen sites. Anyone can toss together a

document with links, but we stay on the hunt for useful links,

for quality links. It takes time to harvest, prepare, and

print new links, especially when we have to check the previously

posted links to ensure they are alive and at the same location

and if not, we bring the links up to date. Some links are archives,

some lead directly to PDF files. Surely you’ve noticed as we’ve

made it quite simple to navigate this document with tagging

special URLs.

 

A few of the blogs linked within this document haven’t been updated

in awhile, but they remain as a useful archive of information

generated in past entries, and some bloggers go several weeks,

months, or a year before returning to their blogs. This does

not bring down the quality of the blogs linked within, as

the chosen ones published here were selected on the basis

of quality.

 

We’d like to say thanks to CRYPTOME who has been linking

to our official release pages at PasteBin shortly after

we release a new version. Thanks Cryptome! And thank you

to PASTEBIN!

—————————————-

 

When this document began, in previous versions, it was previously

known as: HUGE List of Security Blogs: Unix, Linux, Windows,

part 1, 2, 3, and 4 and changed document names with version

5000. With version 6000 we renamed the project title from

‘HUGE Security Resource’ to ‘HUGE Security Resource+’,

meaning, with this version and future versions this document will

contain more than security related material.

(currently a work in progress)

 

PART   #  URL                            Release Date

—— –  —————————- – ————-

– part 1: http://pastebin.com/FwjBMJib – Dec 30th,2011

– part 2: http://pastebin.com/R9gpVemL – Jan 3rd, 2012

– part 3: http://pastebin.com/vgj3qKDW – Jan 3rd, 2012

– part 4: http://pastebin.com/F1JcZHLz – Jan 5th, 2012

– version 5000:

http://pastebin.com/M7ZwwVCA – Mar 6th, 2012

– version 6000:

– Aug 31th, 2012

—— –  —————————- – ————-

 

Thanks for reading!

 

If you enjoy this document please tell the admins of the

websites you visit from within this document where you

found them and provide them with a link to this

document.

=========================================================

Consideration #1: Are crossword puzzles and similar puzzles

published in print simply devices to alter the brain by

inserting carefully prepared words, phrases, and

numbers into your thought processes in order to trigger

or establish some type of action, or… connection.. to

something?

 

Consideration #2: What if all secret agencies were of one

accord spiritually, like in the paintings of dogs playing

poker, just using humanity to play out one big game of

destruction and domination with humans as the visible and

spiritual puppets?

=========================================================

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: