C-Q-RI-T (Security)
POWERED BY
DESIGN WITH AN ATTITUDE!
HUMANS!
Go to the Communication Dot Org Main Page
C-Q-RI-T (Security)

Publications

A Weakness in the 4.2BSD Unix TCP_IP Software
Abstract of Security Survey of Key Internet Hosts & Various Semi-Relevant Reflections
AT&T Papers - Internet Security
AUSCERT Information
Bellovin on _Security Problems in the TCP_IP Protocol Suite_
Bug in Java Security Enables Malicious Applets to Attack
Burn It - Macworld
Center for High Assurance Computer Systems Publications
CERT Advisories
CERT advisory 96.10 on default NIS+ file permissions
CERT Technical Tips
Common Criteria Draft
Common Criteria, Version 1.0
Computer Break-ins_ A Case Study
Continuous Assessment of a Unix Configuration_ Integrating Intrusion Detection and Configuratio
Citizens Internet Empowerment Coalition
Cyber Whiz Makes Crime His Business
DataSafe - CNET
Detecting Breaches in Computer Security_ A Pragmatic System with a Logic Programming Flavor
Earlier Security columns in SunWorld Online
EFF Publication Archive
Firewall Products Today (PDF)
Firewalls-Digest V5 #20 on Sequence Number Attacks
FIRST Archive of Security Papers
GAO reports on computer security
HotWired on IP Spoofing
Information Security_ Computer Attacks at Department of Defense PoseIncreasing Risks
Internet Explorer Security Flaw
IPng Specifications
It's the end of the world (as we know it)
Java security, take two
Kerberos_ An Authentication Service for Computer Networks
Languages and Tools for Rule-based Intrusion Detection
Navy Handbook for the Computer Security Certification of Trusted Systems
Navy Publicatioins
Oxford Security Papers
Center for the Study of Online Communities
PCCrypto - CNET
Predicting How Badly 'Good' Software Can Behave
Reviews of papers and tools
RFC 1948_ Defending Against Sequence Number Attacks
Security Problems in the TCP_IP Protocol Suite
Security Risks in Key Recovery
Sequence Number Attacs
Site Security Handbook
Spectre Press
TAP vs Ident
The Architecture and Implementation of Network-Layer Security Under UNIX
The Group Administration Shell and the GASH Network Computing Environment
The Revolutionaries
Time-lock puzzles and timed-release Crypto
UnixWorld Online_ Sequence Number Attack on Shimomura
Unofficial Markoff, Mitnick, Shimomura FAQ
Various papers via FTP
Virus Scanners of the year 2000
Extreme Tracking C-Q-RI-T (Security)