Access

Cisco

Cisco certification

Database

Exchange

Fedora Core

Hacking

ICQ

IRC

JavaScript

JBoss

Linux

Microsoft

.NET

NT 4.0 & Group Policy

Microsoft Office & Excel 2002

Outlook & Office

Plugins

Security

SharePoint

SNMP & Network Monitoring

Software

SQL

Tech Support

Unix

Viruses, Worms & Trojans

Webmaster

Windows 7

XML

Useful

DNS Stuff - at the command line, type the netstat command, then come here and search the odd connections that you see to trace them back to anyone who may be on your PC remotely. 

NSA

Cyber Security

Steps To Secure Web Browsing


Anti-SPAM

Project Honey Pot lists the IP addresses of many of the major email spam senders.

SQL Security

SQL security

SQL Server 2005 Security Overview for Database Administrators

Windows Server Security

SECEDIT: Working With Microsoft's Security Policy Editor.doc
 
Hexadecimal Converter - is very useful when a STIG requires a hexadecimal value and you need to convert that to something that you can type into a computer.

MANUAL SYSTEM CHECK PROCEDURES FOR WINDOWS SERVER 2003 (DISA)

MS Windows Server 2003 Security Guide.doc (download) (overview)

Security Technical Implementation Guides (DISA)

Vulnerability Scanners

Vulnerability scanner (wiki)

Vulnerability Scanners (ZDNET)

Top 10 Web Vulnerability Scanners

Syslog

Syslog (wiki)

set syslog server

Central Loghost Mini-HOW TO

Cisco & Syslog

Syslog Configuration and Cisco Devices

Welcome to Profound States - brought to you by Positive Change Hypnosis of Atlanta, Georgia.

................................ IT Security ...............................
 

Hacking News Cyber Security

News

The Surveillance State Goes Mainstream: Windows 10 Is Watching (& Logging) Everything (8/5/15)

Using Windows 10? Microsoft Is Watching (NEWSWEEK: 8/1/15)

Major Pages


National Vulnerability Database

Carnegie Mellon's Software Engineering Institute Center For Internet Security
CVE International in scope and free for public use, CVE is a dictionary of publicly known information security vulnerabilities and exposures.

Hacker Tools For Hardening Your Network

To test passwords across the enterprise, use automated tools such as THC Hydra, LophtCrack and John the Ripper to check for blank and simple/common passwords.
The Hacker's Choice (for TYC Hydra)

John the Ripper password cracker
Anti-Phishing Working Group
Hardening Windows

The Administrator Accounts Security Planning Guide (1/1/99)

Windows XP Security Compliance Management Toolkit (5/22/03) (Updated: 2/18/09)

Windows 2000 Security Hardening Guide
Microsoft policy on third-party security configuration guidance support

Windows Server 2003 Security Compliance Management Toolkit

Security and Auditing

Using Administrative and Security Templates

Understanding Security Templates

Using Administrative Template Files with Registry-Based Group Policy

Step-by-Step Guide to Using the Security Configuration Tool Set
Using Restricted Groups

Increasing Security with Limited User Accounts and Restricted Groups

DOD

DISA's Information Assurance Web Page

NIST: Computer Security Division: Computer Security Resource Center (CSRC)

guides.ritchie.disa.mil

DODI 8500.2.pdf (2/6/03)

DODI 8570.01-M: Information Assurance Workforce Improvement Program.pdf (WIP)
iase.disa.smil.mil

COMPUTER SECURITY ACT OF 1987

FISMA of 2002

DoDD 8500.01E.pdf

OMB Circular A-130 Appendix III

The DIACAP Interim Guidance.pdf

Cisco Hardening

Cisco SNMP Community Strings: Disabling default accounts and changing default passwords Lock down Cisco switch port security

Cisco TCP and UDP Small Services: Disabling Unnecessary Services
Configure your company's firewall to redirect certain domains that carry ads to 127.0.0.1 (or another "black hole" address). This particular Search Windows Security Tech Target page contains a ready-made list of hosts to block. Simply copy and paste into a hosts file, or feed the list into a firewall or routing appliance. Not only does this prevent spyware from being downloaded, it also prevents that much more bandwidth from being eaten up by advertising in general.


Anti-Virus Software

Malwarebytes - It's an excellent free virus scanner. ClamWin FREE Anti-Virus
Anti-Virus

Virus Total is a free service that analyzes suspicious files and URLs (using a huge number of anti-virus engines at the same time) and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware. Tools for a Safer PC

Submit a file for malware analysis (Microsoft)

                                        More Anti-Virus Links...
Miscellaneous


5 Ways to Secure Your Wireless Router


MSRPC null sessions: exploitation and protection Restricting Anonymous Access (Updated: 3/28/03)
Client, service, and program incompatibilities that may occur when you modify security settings and user rights assignments

Stop bad BHOs from installing themselves on IE using a predefined list of objects that loads into a segment of the registry used to define BHOs that should not run.

Spyware Guide / block file maintains just such a list, which can be loaded as a simple registry file.

How to Spot Fake Torrent File Downloads: Don't get fooled into downloading viruses & codec scam files

Privacy

Tails: Privacy for anyone anywhere

Hacking News


Cyber Weapons: The New Arms Race (7/20/11)

The Data Brokers: Selling your personal information: Steve Kroft investigates the multibillion-dollar industry that collects, analyzes and sells the personal information of millions of Americans with virtually no oversight (CBS NEWS: 60 Minutes - Aired 3/9/2014 and rebroadcast 8/24/2014)

More Hacking News...

FREE Security Software


Microsoft Safety Scanner

Microsoft Security Essentials Download

True Key by Intel Security Review


Disconnect

Nessus Home

Detekt: A New Malware Detection Tool That Can Expose Illegitimate State Surveillance (11/20/14)

Rootkit Revealer v1.71 from Microsoft's Sysinternals

Ten free security utilities you should already be using (ZDNET)

Haute Secure - Unlike any other product, prevents malware from attacking your PC. Stop "drive by" malware from loading itself onto your computer when you visit web pages that automatically add malicious programming to your computer; even when you haven't clicked on anything on their web page.


Site Advisor - "since March McAfee has been offering a browser plug-in that works with Mozilla Firefox and Microsoft Internet Explorer. Site Advisor puts a little rectangular button in the bottom corner of the browser. If a site you're visiting is safe, the Site Advisor button stays green. When you visit a questionable Web site the button turns red or yellow (depending on the risk level) and a little balloon expands with details on why Site Advisor has rated the site as such."

Free utility looks for missing security patches (7/24/07: ZDNET)

Google updates open-source anti-malware tool (6/11/07)

ThreatFire Free Edition (exe) offers protection against viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware. It uses behavioral analysis to hunt down and paralyze threats that are too new or too clever to be recognized by traditional "signature-based" antivirus software.

Sophos Anti-Rootkit (exe)

CallerIP monitors activity on open ports on your system, which are often not protected by firewalls, and identifies backdoors that could allow harmful Trojans to steal your information.

More Cyber Security Software...

Miscellaneous Windows Security

Simple Steps To Protect Yourself On Public Wi-Fi

Microsoft Security Central

Microsoft Baseline Security Analyzer

Windows Live Scanner

SMS

How to prevent Windows from storing a LAN manager hash of your password in Active Directory and local SAM databases

Cisco Monitoring Software

Cisco Works

RANCID - Cisco configuration monitoring tool


Unix / Linux

Bastille


If you are the original creator of material featured on this website and want it removed,
please contact the webmaster
Copyright © 1998-2006 Charles Michael Beaver.