Pasted by HUGE Security Resour at 2013-02-24, 09:04:28.
Highlight | Tree | Raw

  1. HUGE Security Resource+ - version 6000

  2. http://cryptome.org/2012/08/huge-sec-v6000.txt

  3. http://www.megapastebin.com/MZBYgO69


  4. CRYPTOME.ORG

  5. 31 August 2012

  6. http://pastebin.com/raw.php?i=f3Z4fQvK

  7. ===============================================================
  8. HUGE Security Resource+ - version 6000 - 08/31/2012
  9. (Security + Trimmings!)

  10. ,.-----> CHANGELOG:
  11. |
  12. | 1. Added a crazy amount of new links.
  13. | 2. Fixed 'OpenBSD' links incorrectly assigned to previous section 5000
  14. | 3. Merged 'Security Blogs' at bottom to proper section 6005
  15. | 4. Removed most titles/descriptions of links to reduce clutter & ease use
  16. | While this may make it more difficult to find exactly what you're
  17. | after, it's cleaner, leaner, and easier to navigate through. This
  18. | is especially true for the guys maintaining this document. There is
  19. | some labeling/titles here and there, but most of the heavily
  20. | verbose titles/descriptions of various entries have been removed.
  21. | 5. Merged 'Pubs' & 'Forums' to 6007 & 6006
  22. | 6. Removed several duplicate and broken links
  23. | 7. Fixed some links (pages had moved) and a few typos
  24. | 8. Sorta sorted sections
  25. | 9. Renamed project title from 'HUGE Security Resource' to
  26. | 'HUGE Security Resource+', meaning, with this version and
  27. | future versions this document will contain more than
  28. | security related material. (currently a work in progress)
  29. |10. Released v.6000 despite a large number of remaining links we
  30. | would like to include, but they will come with our next release.
  31. |___________________________________
  32. |
  33. | Sections, version 6000, 08/31/2012
  34. |
  35. | 6000: Wikipedia (all links here found within Wikipedia)
  36. | 6001: Suggested Books
  37. | 6002: Articles, Guides, How To's
  38. | 6003: Antivirus LiveCDs - boot and scan your system for malware
  39. | 6004: Random Links (flooded with links - to be organized soon)
  40. | 6005: Security Blogs
  41. | 6006: Security Forums (Web based Discussion Forums)
  42. | 6007: Security Magazines & Zines
  43. | 6008: Linux Anti-Malware Scanners
  44. | 6009: Linux Security
  45. | \_ 6009.1 Articles
  46. | \_ 6009.2 Tools
  47. | \_ 6009.3 Various+
  48. | 6010: Windows Security Tools
  49. |___________________________________

  50. ** 6000: Wikipedia :
  51. (Some links aren't directly related to security.)
  52. (This section may be split into different sections)
  53. (in a future version.)

  54. https://en.wikipedia.org/wiki/Acoustic_cryptanalysis
  55. https://en.wikipedia.org/wiki/Acoustic_fingerprint
  56. https://en.wikipedia.org/wiki/Advanced_Persistent_Threat
  57. https://en.wikipedia.org/wiki/Agent_handling
  58. https://en.wikipedia.org/wiki/Agent_provocateur
  59. https://en.wikipedia.org/wiki/Aircrack-ng
  60. https://en.wikipedia.org/wiki/Amateur_radio
  61. https://en.wikipedia.org/wiki/Anonymizer
  62. https://en.wikipedia.org/wiki/Anonymous_remailer
  63. https://en.wikipedia.org/wiki/ARP_poisoning
  64. https://en.wikipedia.org/wiki/ARP_spoofing
  65. https://en.wikipedia.org/wiki/Arpwatch
  66. https://en.wikipedia.org/wiki/Audio_signal_processing
  67. https://en.wikipedia.org/wiki/Automatic_Packet_Reporting_System
  68. https://en.wikipedia.org/wiki/Backdoor_%28computing%29
  69. https://en.wikipedia.org/wiki/Behavioral_targeting
  70. https://en.wikipedia.org/wiki/Bioacoustics
  71. https://en.wikipedia.org/wiki/BitTorrent_protocol_encryption
  72. https://en.wikipedia.org/wiki/Black_operation
  73. https://en.wikipedia.org/wiki/Black_propaganda
  74. https://en.wikipedia.org/wiki/Black_site
  75. https://en.wikipedia.org/wiki/Bluebugging
  76. https://en.wikipedia.org/wiki/Bluejacking
  77. https://en.wikipedia.org/wiki/Bluesnarfing
  78. https://en.wikipedia.org/wiki/BrainGate
  79. https://en.wikipedia.org/wiki/Category:Activism
  80. https://en.wikipedia.org/wiki/Category:Activism_by_method
  81. https://en.wikipedia.org/wiki/Category:Amateur_radio
  82. https://en.wikipedia.org/wiki/Category:American_spies
  83. https://en.wikipedia.org/wiki/Category:American_whistleblowers
  84. https://en.wikipedia.org/wiki/Category:Analysis
  85. https://en.wikipedia.org/wiki/Category:Applications_of_cryptography
  86. https://en.wikipedia.org/wiki/Category:Applied_ethics
  87. https://en.wikipedia.org/wiki/Category:Automatic_identification_and_data_capture
  88. https://en.wikipedia.org/wiki/Category:Barcodes
  89. https://en.wikipedia.org/wiki/Category:BitTorrent
  90. https://en.wikipedia.org/wiki/Category:Black_projects
  91. https://en.wikipedia.org/wiki/Category:Bluetooth
  92. https://en.wikipedia.org/wiki/Category:Books_about_the_Central_Intelligence_Agency
  93. https://en.wikipedia.org/wiki/Category:Branches_of_psychology
  94. https://en.wikipedia.org/wiki/Category:Central_Intelligence_Agency
  95. https://en.wikipedia.org/wiki/Category:Central_Intelligence_Agency_operations
  96. https://en.wikipedia.org/wiki/Category:Christianity
  97. https://en.wikipedia.org/wiki/Category:Christian_terms
  98. https://en.wikipedia.org/wiki/Category:Civil_disobedience
  99. https://en.wikipedia.org/wiki/Category:Codecs
  100. https://en.wikipedia.org/wiki/Category:Code_names
  101. https://en.wikipedia.org/wiki/Category:COINTELPRO_targets
  102. https://en.wikipedia.org/wiki/Category:Communication_of_falsehoods
  103. https://en.wikipedia.org/wiki/Category:Computational_linguistics
  104. https://en.wikipedia.org/wiki/Category:Computational_statistics
  105. https://en.wikipedia.org/wiki/Category:Computer_file_formats
  106. https://en.wikipedia.org/wiki/Category:Computer_networking
  107. https://en.wikipedia.org/wiki/Category:Computer_network_security
  108. https://en.wikipedia.org/wiki/Category:Computer_security
  109. https://en.wikipedia.org/wiki/Category:Computer_security_exploits
  110. https://en.wikipedia.org/wiki/Category:Computer_security_organizations
  111. https://en.wikipedia.org/wiki/Category:Computer_security_software
  112. https://en.wikipedia.org/wiki/Category:Concepts_in_ethics
  113. https://en.wikipedia.org/wiki/Category:Confidence_tricks
  114. https://en.wikipedia.org/wiki/Category:Conspiracy_theories
  115. https://en.wikipedia.org/wiki/Category:Counter-intelligence
  116. https://en.wikipedia.org/wiki/Category:Counter-terrorism
  117. https://en.wikipedia.org/wiki/Category:Counter-terrorist_organizations
  118. https://en.wikipedia.org/wiki/Category:Covert_organizations
  119. https://en.wikipedia.org/wiki/Category:Critical_thinking
  120. https://en.wikipedia.org/wiki/Category:Crowd_psychology
  121. https://en.wikipedia.org/wiki/Category:Cryptanalytic_devices
  122. https://en.wikipedia.org/wiki/Category:Cryptanalytic_software
  123. https://en.wikipedia.org/wiki/Category:Cryptographic_attacks
  124. https://en.wikipedia.org/wiki/Category:Cryptographic_hardware
  125. https://en.wikipedia.org/wiki/Category:Cryptography
  126. https://en.wikipedia.org/wiki/Category:Cybercrime
  127. https://en.wikipedia.org/wiki/Category:Cyberwarfare
  128. https://en.wikipedia.org/wiki/Category:Data_collection
  129. https://en.wikipedia.org/wiki/Category:Data_compression
  130. https://en.wikipedia.org/wiki/Category:Data_security
  131. https://en.wikipedia.org/wiki/Category:Data_transmission
  132. https://en.wikipedia.org/wiki/Category:Deception
  133. https://en.wikipedia.org/wiki/Category:Denial-of-service_attacks
  134. https://en.wikipedia.org/wiki/Category:Digital_signal_processing
  135. https://en.wikipedia.org/wiki/Category:Diversionary_tactics
  136. https://en.wikipedia.org/wiki/Category:Electronic_test_equipment
  137. https://en.wikipedia.org/wiki/Category:Electronic_warfare
  138. https://en.wikipedia.org/wiki/Category:Encodings
  139. https://en.wikipedia.org/wiki/Category:Encryption_devices
  140. https://en.wikipedia.org/wiki/Category:Espionage
  141. https://en.wikipedia.org/wiki/Category:Espionage_devices
  142. https://en.wikipedia.org/wiki/Category:Espionage_projects
  143. https://en.wikipedia.org/wiki/Category:Espionage_techniques
  144. https://en.wikipedia.org/wiki/Category:Etiquette
  145. https://en.wikipedia.org/wiki/Category:File_sharing_networks
  146. https://en.wikipedia.org/wiki/Category:Gambling_terminology
  147. https://en.wikipedia.org/wiki/Category:Hacking_%28computer_security%29
  148. https://en.wikipedia.org/wiki/Category:Historians_of_the_Central_Intelligence_Agency
  149. https://en.wikipedia.org/wiki/Category:History_of_radio
  150. https://en.wikipedia.org/wiki/Category:History_of_telecommunications
  151. https://en.wikipedia.org/wiki/Category:History_of_the_Internet
  152. https://en.wikipedia.org/wiki/Category:Injection_exploits
  153. https://en.wikipedia.org/wiki/Category:Intelligence_%28information_gathering%29
  154. https://en.wikipedia.org/wiki/Category:Intelligence_agencies
  155. https://en.wikipedia.org/wiki/Category:Intelligence_agencies_by_country
  156. https://en.wikipedia.org/wiki/Category:Intelligence_analysis
  157. https://en.wikipedia.org/wiki/Category:Intelligence_operations
  158. https://en.wikipedia.org/wiki/Category:International_security
  159. https://en.wikipedia.org/wiki/Category:Interrogation_techniques
  160. https://en.wikipedia.org/wiki/Category:Law_enforcement
  161. https://en.wikipedia.org/wiki/Category:Law_enforcement_equipment
  162. https://en.wikipedia.org/wiki/Category:Law_enforcement_techniques
  163. https://en.wikipedia.org/wiki/Category:Law_enforcement_terminology
  164. https://en.wikipedia.org/wiki/Category:Linux_security_software
  165. https://en.wikipedia.org/wiki/Category:Malware
  166. https://en.wikipedia.org/wiki/Category:Mass_surveillance
  167. https://en.wikipedia.org/wiki/Category:Media_manipulation
  168. https://en.wikipedia.org/wiki/Category:Metaphysics
  169. https://en.wikipedia.org/wiki/Category:Microscopy
  170. https://en.wikipedia.org/wiki/Category:Military_communications
  171. https://en.wikipedia.org/wiki/Category:Military_intelligence
  172. https://en.wikipedia.org/wiki/Category:Military_operations_by_type
  173. https://en.wikipedia.org/wiki/Category:Military_organization
  174. https://en.wikipedia.org/wiki/Category:Military_psychiatry
  175. https://en.wikipedia.org/wiki/Category:Military_science
  176. https://en.wikipedia.org/wiki/Category:Military_technology
  177. https://en.wikipedia.org/wiki/Category:Mind_control
  178. https://en.wikipedia.org/wiki/Category:Morse_code
  179. https://en.wikipedia.org/wiki/Category:National_security
  180. https://en.wikipedia.org/wiki/Category:National_Security_Agency
  181. https://en.wikipedia.org/wiki/Category:National_Security_Agency_encryption_devices
  182. https://en.wikipedia.org/wiki/Category:Network_addressing
  183. https://en.wikipedia.org/wiki/Category:Network_architecture
  184. https://en.wikipedia.org/wiki/Category:Network_management
  185. https://en.wikipedia.org/wiki/Category:Neuropsychology
  186. https://en.wikipedia.org/wiki/Category:Neuroscience
  187. https://en.wikipedia.org/wiki/Category:Non-fiction_books_about_espionage
  188. https://en.wikipedia.org/wiki/Category:Non-military_counter-terrorist_organizations
  189. https://en.wikipedia.org/wiki/Category:Nonverbal_communication
  190. https://en.wikipedia.org/wiki/Category:Operations_involving_special_forces
  191. https://en.wikipedia.org/wiki/Category:Organized_crime
  192. https://en.wikipedia.org/wiki/Category:Packet_radio
  193. https://en.wikipedia.org/wiki/Category:Paramilitary_organizations
  194. https://en.wikipedia.org/wiki/Category:People_of_the_Central_Intelligence_Agency
  195. https://en.wikipedia.org/wiki/Category:Perimeter_security
  196. https://en.wikipedia.org/wiki/Category:Persuasion_techniques
  197. https://en.wikipedia.org/wiki/Category:Philosophical_concepts
  198. https://en.wikipedia.org/wiki/Category:Philosophical_methodology
  199. https://en.wikipedia.org/wiki/Category:Philosophy
  200. https://en.wikipedia.org/wiki/Category:Philosophy_of_language
  201. https://en.wikipedia.org/wiki/Category:Privacy
  202. https://en.wikipedia.org/wiki/Category:Privacy_of_telecommunications
  203. https://en.wikipedia.org/wiki/Category:Problem_solving
  204. https://en.wikipedia.org/wiki/Category:Propaganda
  205. https://en.wikipedia.org/wiki/Category:Propaganda_in_the_United_States
  206. https://en.wikipedia.org/wiki/Category:Propaganda_techniques
  207. https://en.wikipedia.org/wiki/Category:Psychiatric_treatments
  208. https://en.wikipedia.org/wiki/Category:Psychological_manipulation
  209. https://en.wikipedia.org/wiki/Category:Psychological_warfare
  210. https://en.wikipedia.org/wiki/Category:Public-key_cryptography
  211. https://en.wikipedia.org/wiki/Category:Quantized_radio_modulation_modes
  212. https://en.wikipedia.org/wiki/Category:Radio
  213. https://en.wikipedia.org/wiki/Category:Religious_philosophy
  214. https://en.wikipedia.org/wiki/Category:Researchers_of_the_John_F._Kennedy_assassination
  215. https://en.wikipedia.org/wiki/Category:Research_methods
  216. https://en.wikipedia.org/wiki/Category:Rootkits
  217. https://en.wikipedia.org/wiki/Category:Secrecy
  218. https://en.wikipedia.org/wiki/Category:Secret_broadcasting
  219. https://en.wikipedia.org/wiki/Category:Secret_government_programs
  220. https://en.wikipedia.org/wiki/Category:Secret_military_programs
  221. https://en.wikipedia.org/wiki/Category:Security
  222. https://en.wikipedia.org/wiki/Category:Security_companies
  223. https://en.wikipedia.org/wiki/Category:Signals_intelligence
  224. https://en.wikipedia.org/wiki/Category:Signals_intelligence_agencies
  225. https://en.wikipedia.org/wiki/Category:Social_engineering_(computer_security)
  226. https://en.wikipedia.org/wiki/Category:Solid-state_computer_storage
  227. https://en.wikipedia.org/wiki/Category:Spies_by_role
  228. https://en.wikipedia.org/wiki/Category:Statistical_software
  229. https://en.wikipedia.org/wiki/Category:Steganography
  230. https://en.wikipedia.org/wiki/Category:Surveillance
  231. https://en.wikipedia.org/wiki/Category:Survival_skills
  232. https://en.wikipedia.org/wiki/Category:Telecommunications
  233. https://en.wikipedia.org/wiki/Category:Telegraphy
  234. https://en.wikipedia.org/wiki/Category:Theology
  235. https://en.wikipedia.org/wiki/Category:United_States_Department_of_Defense_agencies
  236. https://en.wikipedia.org/wiki/Category:United_States_government_secrecy
  237. https://en.wikipedia.org/wiki/Category:Video_hosting
  238. https://en.wikipedia.org/wiki/Category:Warfare_by_type
  239. https://en.wikipedia.org/wiki/Category:Whistleblowers_by_nationality
  240. https://en.wikipedia.org/wiki/Category:Wireless_networking
  241. https://en.wikipedia.org/wiki/Category:Works_about_espionage
  242. https://en.wikipedia.org/wiki/Central_Intelligence_Agency
  243. https://en.wikipedia.org/wiki/Chaffing_and_winnowing
  244. https://en.wikipedia.org/wiki/Christianity
  245. https://en.wikipedia.org/wiki/Church_Committee
  246. https://en.wikipedia.org/wiki/CIA_influence_on_public_opinion
  247. https://en.wikipedia.org/wiki/Citizens%27_Commission_to_Investigate_the_FBI
  248. https://en.wikipedia.org/wiki/Citizens_Rule_Book
  249. https://en.wikipedia.org/wiki/Clandestine_operation
  250. https://en.wikipedia.org/wiki/Cointelpro
  251. https://en.wikipedia.org/wiki/Cold_boot_attack
  252. https://en.wikipedia.org/wiki/Communications_Assistance_for_Law_Enforcement_Act
  253. https://en.wikipedia.org/wiki/Comparison_of_BitTorrent_clients
  254. https://en.wikipedia.org/wiki/Comparison_of_download_managers
  255. https://en.wikipedia.org/wiki/Comparison_of_portable_media_players
  256. https://en.wikipedia.org/wiki/Comparison_of_video_hosting_services
  257. https://en.wikipedia.org/wiki/Comparison_of_VoIP_software
  258. https://en.wikipedia.org/wiki/CompStat
  259. https://en.wikipedia.org/wiki/Computer_and_Internet_Protocol_Address_Verifier
  260. https://en.wikipedia.org/wiki/Computer_insecurity
  261. https://en.wikipedia.org/wiki/Computer_surveillance
  262. https://en.wikipedia.org/wiki/Confidence_trick
  263. https://en.wikipedia.org/wiki/Consensus_reality
  264. https://en.wikipedia.org/wiki/Covert_operation
  265. https://en.wikipedia.org/wiki/Cryptographic_hash_function
  266. https://en.wikipedia.org/wiki/Cut-out_%28espionage%29
  267. https://en.wikipedia.org/wiki/CyanogenMod
  268. https://en.wikipedia.org/wiki/Cygwin
  269. https://en.wikipedia.org/wiki/Data_acquisition
  270. https://en.wikipedia.org/wiki/Data_remanence
  271. https://en.wikipedia.org/wiki/Deep_packet_inspection
  272. https://en.wikipedia.org/wiki/Defense
  273. https://en.wikipedia.org/wiki/Dehumidifier
  274. https://en.wikipedia.org/wiki/Deluge_%28software%29
  275. https://en.wikipedia.org/wiki/Digital_signal_processing
  276. https://en.wikipedia.org/wiki/Digital_signature
  277. https://en.wikipedia.org/wiki/Digital_traces
  278. https://en.wikipedia.org/wiki/DNS_spoofing
  279. https://en.wikipedia.org/wiki/Doctrine_of_mental_reservation
  280. https://en.wikipedia.org/wiki/ECHELON
  281. https://en.wikipedia.org/wiki/Electrical_measurements
  282. https://en.wikipedia.org/wiki/Electromagnetic_interference
  283. https://en.wikipedia.org/wiki/Electromagnetic_pulse
  284. https://en.wikipedia.org/wiki/Electromagnetic_radiation_and_health
  285. https://en.wikipedia.org/wiki/Electromagnetic_shielding
  286. https://en.wikipedia.org/wiki/Electromagnetic_spectrum
  287. https://en.wikipedia.org/wiki/Electronic_signature
  288. https://en.wikipedia.org/wiki/EMF_measurement
  289. https://en.wikipedia.org/wiki/Espionage
  290. https://en.wikipedia.org/wiki/Executable_and_Linkable_Format
  291. https://en.wikipedia.org/wiki/Exploit_%28computer_science%29
  292. https://en.wikipedia.org/wiki/Fair_use
  293. https://en.wikipedia.org/wiki/Family_Jewels_%28Central_Intelligence_Agency%29
  294. https://en.wikipedia.org/wiki/Faraday_cage
  295. https://en.wikipedia.org/wiki/Fast_Fourier_Transform
  296. https://en.wikipedia.org/wiki/Forensic_linguistics
  297. https://en.wikipedia.org/wiki/Freedom_of_information
  298. https://en.wikipedia.org/wiki/Freedom_of_information_legislation
  299. https://en.wikipedia.org/wiki/Free_software
  300. https://en.wikipedia.org/wiki/Free_speech_zone
  301. https://en.wikipedia.org/wiki/Frequency_analysis
  302. https://en.wikipedia.org/wiki/Frequency_counter
  303. https://en.wikipedia.org/wiki/Fusion_center
  304. https://en.wikipedia.org/wiki/Gary_Webb
  305. https://en.wikipedia.org/wiki/Gutmann_method
  306. https://en.wikipedia.org/wiki/High-frequency_direction_finding
  307. https://en.wikipedia.org/wiki/Honeypot_%28computing%29
  308. https://en.wikipedia.org/wiki/Host_protected_area
  309. https://en.wikipedia.org/wiki/Hosts_file
  310. https://en.wikipedia.org/wiki/Htaccess
  311. https://en.wikipedia.org/wiki/HTTP_tunnel_(software)
  312. https://en.wikipedia.org/wiki/I2P
  313. https://en.wikipedia.org/wiki/IEEE_802.11i-2004
  314. https://en.wikipedia.org/wiki/IMSI-catcher
  315. https://en.wikipedia.org/wiki/Information_visualization
  316. https://en.wikipedia.org/wiki/Information_wants_to_be_free
  317. https://en.wikipedia.org/wiki/Infrasound
  318. https://en.wikipedia.org/wiki/Intelligence_collection_management
  319. https://en.wikipedia.org/wiki/International_Spy_Museum
  320. https://en.wikipedia.org/wiki/Internet_protocol_suite
  321. https://en.wikipedia.org/wiki/Iran-Contra_Affair
  322. https://en.wikipedia.org/wiki/John_F._Kennedy_assassination_conspiracy_theories
  323. https://en.wikipedia.org/wiki/Jury_nullification
  324. https://en.wikipedia.org/wiki/Laser_microphone
  325. https://en.wikipedia.org/wiki/Linux_malware
  326. https://en.wikipedia.org/wiki/List_of_CB_slang
  327. https://en.wikipedia.org/wiki/List_of_codecs
  328. https://en.wikipedia.org/wiki/List_of_con_artists
  329. https://en.wikipedia.org/wiki/List_of_confidence_tricks
  330. https://en.wikipedia.org/wiki/List_of_conspiracies_%28political%29
  331. https://en.wikipedia.org/wiki/List_of_counterintelligence_organizations
  332. https://en.wikipedia.org/wiki/List_of_countries_by_Failed_States_Index
  333. https://en.wikipedia.org/wiki/List_of_criminal_enterprises,_gangs_and_syndicates
  334. https://en.wikipedia.org/wiki/List_of_defunct_intelligence_agencies
  335. https://en.wikipedia.org/wiki/List_of_information_graphics_software
  336. https://en.wikipedia.org/wiki/List_of_intelligence_agencies
  337. https://en.wikipedia.org/wiki/List_of_intelligence_gathering_disciplines
  338. https://en.wikipedia.org/wiki/List_of_international_common_standards
  339. https://en.wikipedia.org/wiki/List_of_Linux_computer_viruses
  340. https://en.wikipedia.org/wiki/List_of_numerical_analysis_software
  341. https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers
  342. https://en.wikipedia.org/wiki/List_of_video_hosting_services
  343. https://en.wikipedia.org/wiki/MAC_address
  344. https://en.wikipedia.org/wiki/Magic_Lantern_%28software%29
  345. https://en.wikipedia.org/wiki/Md5
  346. https://en.wikipedia.org/wiki/Measuring_receiver
  347. https://en.wikipedia.org/wiki/Media_manipulation
  348. https://en.wikipedia.org/wiki/Microexpression
  349. https://en.wikipedia.org/wiki/Mind_control
  350. https://en.wikipedia.org/wiki/Mitrokhin_Archive
  351. https://en.wikipedia.org/wiki/Moscow_rules
  352. https://en.wikipedia.org/wiki/Musical_acoustics
  353. https://en.wikipedia.org/wiki/Music_cognition
  354. https://en.wikipedia.org/wiki/National_Cryptologic_Museum
  355. https://en.wikipedia.org/wiki/National_Security_Agency
  356. https://en.wikipedia.org/wiki/Nonverbal_communication
  357. https://en.wikipedia.org/wiki/Numbers_station
  358. https://en.wikipedia.org/wiki/OpenBSD_Journal
  359. https://en.wikipedia.org/wiki/OpenID
  360. https://en.wikipedia.org/wiki/Operation_Mockingbird
  361. https://en.wikipedia.org/wiki/Operation_Northwoods
  362. https://en.wikipedia.org/wiki/Operation_RAFTER
  363. https://en.wikipedia.org/wiki/Optical_microscope
  364. https://en.wikipedia.org/wiki/Organizationally_Unique_Identifier
  365. https://en.wikipedia.org/wiki/OSSEC
  366. https://en.wikipedia.org/wiki/Packet_radio
  367. https://en.wikipedia.org/wiki/Palantir_Technologies
  368. https://en.wikipedia.org/wiki/Panopticon
  369. https://en.wikipedia.org/wiki/Paralanguage
  370. https://en.wikipedia.org/wiki/Patriot_Act
  371. https://en.wikipedia.org/wiki/Perl
  372. https://en.wikipedia.org/wiki/Phishing
  373. https://en.wikipedia.org/wiki/Pod_slurping
  374. https://en.wikipedia.org/wiki/Police_code#The_Hundred_Code
  375. https://en.wikipedia.org/wiki/Port_forwarding
  376. https://en.wikipedia.org/wiki/Power_analysis
  377. https://en.wikipedia.org/wiki/Project_ARTICHOKE
  378. https://en.wikipedia.org/wiki/Project_Chatter
  379. https://en.wikipedia.org/wiki/Project_MINARET
  380. https://en.wikipedia.org/wiki/Project_MKDELTA
  381. https://en.wikipedia.org/wiki/Project_MKNAOMI
  382. https://en.wikipedia.org/wiki/Project_MKUltra
  383. https://en.wikipedia.org/wiki/Project_Shamrock
  384. https://en.wikipedia.org/wiki/Psikhushka
  385. https://en.wikipedia.org/wiki/Psychological_manipulation
  386. https://en.wikipedia.org/wiki/Psychological_Operations_%28United_States%29
  387. https://en.wikipedia.org/wiki/Public-key_cryptography
  388. https://en.wikipedia.org/wiki/QBittorrent
  389. https://en.wikipedia.org/wiki/Q_code
  390. https://en.wikipedia.org/wiki/QR_Code
  391. https://en.wikipedia.org/wiki/Radio_direction_finder
  392. https://en.wikipedia.org/wiki/Reality_mining
  393. https://en.wikipedia.org/wiki/Red_squad
  394. https://en.wikipedia.org/wiki/Reid_technique
  395. https://en.wikipedia.org/wiki/Richard_Stallman
  396. https://en.wikipedia.org/wiki/Rogue_DHCP
  397. https://en.wikipedia.org/wiki/Room_641A
  398. https://en.wikipedia.org/wiki/Rootkit
  399. https://en.wikipedia.org/wiki/Scopolamine#Use_in_interrogation
  400. https://en.wikipedia.org/wiki/Scrambler
  401. https://en.wikipedia.org/wiki/Screencast
  402. https://en.wikipedia.org/wiki/Secure_Communication
  403. https://en.wikipedia.org/wiki/Secure_computing
  404. https://en.wikipedia.org/wiki/Secure_digital_card
  405. https://en.wikipedia.org/wiki/Secure_telephone
  406. https://en.wikipedia.org/wiki/Security_engineering
  407. https://en.wikipedia.org/wiki/Seismology
  408. https://en.wikipedia.org/wiki/SheevaPlug
  409. https://en.wikipedia.org/wiki/Shellcode
  410. https://en.wikipedia.org/wiki/Shill
  411. https://en.wikipedia.org/wiki/Shortwave
  412. https://en.wikipedia.org/wiki/Shred_%28Unix%29
  413. https://en.wikipedia.org/wiki/Side_channel_attack
  414. https://en.wikipedia.org/wiki/Signal_analysis
  415. https://en.wikipedia.org/wiki/Silent_speech_interface
  416. https://en.wikipedia.org/wiki/Simulated_reality
  417. https://en.wikipedia.org/wiki/Situation_awareness
  418. https://en.wikipedia.org/wiki/Smartdust
  419. https://en.wikipedia.org/wiki/Snarfing
  420. https://en.wikipedia.org/wiki/Sneakernet
  421. https://en.wikipedia.org/wiki/Software_Defined_Radio
  422. https://en.wikipedia.org/wiki/Software_patent_debate
  423. https://en.wikipedia.org/wiki/Sound_synthesis
  424. https://en.wikipedia.org/wiki/Sousveillance
  425. https://en.wikipedia.org/wiki/Spectral_leakage
  426. https://en.wikipedia.org/wiki/Spectral_music
  427. https://en.wikipedia.org/wiki/Spectrogram
  428. https://en.wikipedia.org/wiki/Spectrometer
  429. https://en.wikipedia.org/wiki/Spectrum_analyzer
  430. https://en.wikipedia.org/wiki/Split_tunneling
  431. https://en.wikipedia.org/wiki/Spycatcher
  432. https://en.wikipedia.org/wiki/Spymaster
  433. https://en.wikipedia.org/wiki/Srm_%28Unix%29
  434. https://en.wikipedia.org/wiki/Stanford_prison_experiment
  435. https://en.wikipedia.org/wiki/STASI
  436. https://en.wikipedia.org/wiki/Steganography
  437. https://en.wikipedia.org/wiki/Stenomask
  438. https://en.wikipedia.org/wiki/Street_light_interference_phenomenon
  439. https://en.wikipedia.org/wiki/Subvocal_recognition
  440. https://en.wikipedia.org/wiki/Sysctl
  441. https://en.wikipedia.org/wiki/Telephone_tapping
  442. https://en.wikipedia.org/wiki/Tempest_%28codename%29
  443. https://en.wikipedia.org/wiki/Ten-code
  444. https://en.wikipedia.org/wiki/The_CIA_and_the_Cult_of_Intelligence
  445. https://en.wikipedia.org/wiki/The_COINTELPRO_Papers
  446. https://en.wikipedia.org/wiki/Thermal_insulation
  447. https://en.wikipedia.org/wiki/ThinThread
  448. https://en.wikipedia.org/wiki/Throat_microphone
  449. https://en.wikipedia.org/wiki/Timing_attack
  450. https://en.wikipedia.org/wiki/Tin_foil_hat
  451. https://en.wikipedia.org/wiki/Tor_%28anonymity_network%29
  452. https://en.wikipedia.org/wiki/Tradecraft
  453. https://en.wikipedia.org/wiki/Trailblazer_Project
  454. https://en.wikipedia.org/wiki/Transmission_%28BitTorrent_client%29
  455. https://en.wikipedia.org/wiki/TrapWire
  456. https://en.wikipedia.org/wiki/Trusted_computing
  457. https://en.wikipedia.org/wiki/Truth_drug
  458. https://en.wikipedia.org/wiki/United_States_government_security_breaches
  459. https://en.wikipedia.org/wiki/Van_Eck_phreaking
  460. https://en.wikipedia.org/wiki/Very_low_frequency
  461. https://en.wikipedia.org/wiki/Victor_Marchetti
  462. https://en.wikipedia.org/wiki/Virtual_private_network
  463. https://en.wikipedia.org/wiki/Voice_procedure
  464. https://en.wikipedia.org/wiki/Wi-Fi
  465. https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access
  466. https://en.wikipedia.org/wiki/Wireless_ad-hoc_network
  467. https://en.wikipedia.org/wiki/Wireless_mesh_network
  468. https://en.wikipedia.org/wiki/Wireless_security
  469. https://en.wikipedia.org/wiki/Write_amplification
  470. https://en.wikipedia.org/wiki/Writeprint
  471. https://en.wikipedia.org/wiki/WWV_%28radio_station%29#Standard_frequency_signals
  472. https://en.wikipedia.org/wiki/Yahweh
  473. https://en.wikipedia.org/wiki/Z_code

  474. ----------------------------------------

  475. ** 6001: Suggested Books:

  476. - CLOAK & CORKSCREW: Where CIA Meets Hollywood
  477. - For the President's Eyes Only: Secret Intelligence and the American Presidency from Washington to Bush
  478. - Priceless: How I Went Undercover to Rescue the World's Stolen Treasures
  479. - Radio Frequency Interference: How to Find It and Fix It
  480. - SAS Survival Handbook, Revised Edition: For Any Climate, in Any Situation
  481. - Spycatcher - by Peter Wright
  482. - The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
  483. - Under and Alone: The True Story of the Undercover Agent Who Infiltrated America's Most Violent Outlaw Motorcycle Gang

  484. ----------------------------------------

  485. ** 6002: Articles, Guides, How To's:

  486. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
  487. + (MS Kinect Spy System): http://www.pgpboard.com/viewtopic.php?f=2&t=691
  488. + (MS Kinect Spy System / Article mirrors): http://pastesite.com/41388 , http://paste.lisp.org/display/131227
  489. +
  490. + (Spies at MS? / Snippet): http://www.pgpboard.com/viewtopic.php?f=2&t=702
  491. + (Spies at MS? / Full Article): http://www.pcpro.co.uk/news/security/375169/could-us-cyberspies-have-moles-inside-microsoft
  492. + (Spies at MS? / Discussion): http://it.slashdot.org/story/12/06/15/1614219/us-security-services-may-have-moles-within-microsoft-says-researcher
  493. +
  494. + (links, tons of) http://www.loyola.edu/departments/academics/political-science/strategic-intelligence/index.html
  495. +
  496. http://aboba.drizzlehosting.com/IEEE/
  497. http://advocacy.globalvoicesonline.org/projects/guide/
  498. http://all.net/books/document/harvard.html
  499. http://all.net/journal/50/crypt.html
  500. http://all.net/journal/50/cybercop.html
  501. http://all.net/journal/50/ecommerce.html
  502. http://all.net/journal/50/firewall.html
  503. http://all.net/journal/deception/index.html
  504. http://all.net/journal/ntb/index.html
  505. http://arstechnica.com/information-technology/2012/06/blowing-away-bloatware-a-guide-to-reinstalling-windows-on-a-new-pc/
  506. http://arstechnica.com/information-technology/2012/07/freeing-your-router-from-ciscos-anti-porn-pro-copyright-cloud-service/
  507. http://arstechnica.com/tech-policy/news/2011/02/black-ops-how-hbgary-wrote-backdoors-and-rootkits-for-the-government.ars/
  508. http://arstechnica.com/uncategorized/2007/10/p2p-researchers-use-a-blocklist-or-you-will-be-tracked-100-of-the-time/
  509. http://asm.sourceforge.net/
  510. http://blog.bodhizazen.net/linux/ubuntu-how-to-faillog/
  511. http://blog.spoofed.org/2007/12/openbsd-on-soekris-cheaters-guide.html
  512. http://blog.webroot.com/2011/09/13/mebromi-the-first-bios-rootkit-in-the-wild/
  513. http://catless.ncl.ac.uk/risks
  514. http://citp.princeton.edu/research/memory/
  515. http://crunchbanglinux.org/wiki/configuring_the_openbox_menu
  516. http://cryptogon.com/?p=624
  517. http://cryptogon.com/?p=877
  518. http://cryptome.org/0002/siss.htm
  519. http://cryptome.org/0005/cia-iqt-spies.htm
  520. http://cryptome.org/0005/tor-opsec.htm
  521. http://cryptome.org/0006/nsa-17-docs.htm
  522. http://cryptome.org/2012/07/gent-forum-spies.htm
  523. http://cryptome.org/2012/08/tor-exits-usg-funds-02.htm
  524. http://cryptome.org/cisco-vile.txt
  525. http://cryptome.org/isp-spy/online-spying.htm
  526. http://cryptome.org/nsa-tempest.htm
  527. http://cryptome.org/nsa-vaneck.htm
  528. http://cryptome.org/tempest-law.htm
  529. http://cwe.mitre.org/top25/
  530. http://debian-handbook.info/browse/stable/
  531. http://digitalcorpora.org/
  532. http://en.community.dell.com/support-forums/software-os/w/microsoft_os/3316.2-1-microsoft-windows-7-official-iso-download-links-digital-river.aspx
  533. http://forums.radioreference.com/
  534. http://freehaven.net/anonbib/topic.html#Anonymous_20communication
  535. http://hardware.slashdot.org/story/08/10/20/1248234/compromising-wired-keyboards
  536. http://helpx.adobe.com/flash-player/kb/disable-local-shared-objects-flash.html
  537. http://it.slashdot.org/story/02/03/09/199242/crt-eavesdropping-optical-tempest
  538. http://it.slashdot.org/story/09/03/12/2038213/researchers-sniff-keystrokes-from-thin-air-wires
  539. http://it.slashdot.org/story/09/07/12/0259246/stealing-data-via-electrical-outlet
  540. http://joernfranz.net/2011/01/20/installing-ubuntu-10-10-with-full-disk-encryption/
  541. http://lanl.arxiv.org/
  542. http://lasecwww.epfl.ch/keyboard/
  543. http://lifehacker.com/205090/geek-to-live--set-up-a-personal-home-ssh-server?tag=softwarehomeserver
  544. http://lifehacker.com/237227/geek-to-live--encrypt-your-web-browsing-session-with-an-ssh-socks-proxy?tag=softwaressh
  545. http://linuxpoison.blogspot.com/2009/06/how-to-disable-loading-of-unnecessary.html
  546. http://log.nadim.cc/?p=78
  547. http://mnin.org/ (Twitter: https://twitter.com/iMHLv2)
  548. http://news.cnet.com/2010-1071-997528.html?tag=fd_nc_1 (Archived: http://pastebin.com/nHZzQyB9)
  549. http://packetlife.net/library/cheat-sheets/
  550. http://pastebin.com/E1YbqUMV
  551. http://pastebin.com/JdkqxBAa
  552. http://pastebin.com/mr5WT30M
  553. http://pastebin.com/Qf2jHhAb
  554. http://pastebin.com/TRXkVJ2k
  555. http://pastebin.com/utY08tLT
  556. http://pastebin.com/YEbM3Brv
  557. http://people.csail.mit.edu/rivest/crypto-security.html
  558. http://people.howstuffworks.com/individual-privacy-channel.htm
  559. http://people.howstuffworks.com/wiretapping1.htm
  560. http://pgp.mit.edu/
  561. http://projects.gnome.org/gdm/docs/2.14/configuration.html?pagewanted=all
  562. http://projects.wsj.com/surveillance-catalog/
  563. http://research.google.com/pubs/papers.html
  564. http://research.google.com/pubs/SecurityCryptographyandPrivacy.html
  565. https://ccrma.stanford.edu/papers
  566. http://security-sh3ll.blogspot.com/search/label/Papers
  567. https://events.ccc.de/congress/2005/static/p/r/o/Category~Projects_1780.html
  568. https://events.ccc.de/congress/2005/static/r/f/i/RFID-Zapper%28EN%29_77f3.html
  569. https://isc.sans.edu/port.html
  570. http://slashdot.org/story/01/01/16/139244/NSA-Reveals-Some-Tempest-Information
  571. https://live.gnome.org/GDM/2.22/Configuration
  572. https://memset.wordpress.com/2011/11/26/syscall-hijacking-openbsd/
  573. http://srg.cs.illinois.edu/srg/biblio
  574. https://secure.dslreports.com/forum/r27289884-Forensic-Cheat-Sheet
  575. https://torrentfreak.com/stop-downloading-fakes-and-junk-torrents-071204/
  576. https://w2.eff.org/Privacy/printers/docucolor/
  577. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/index.html
  578. https://www.cl.cam.ac.uk/~mgk25/emsec/optical-faq.html
  579. https://www.cl.cam.ac.uk/~mgk25/emsec/softtempest-faq.html
  580. https://www.defcon.org/html/links/book-list.html
  581. https://www.eff.org/issues/bloggers/legal/index
  582. https://www.eff.org/issues/printers
  583. https://www.eff.org/pages/list-printers-which-do-or-do-not-display-tracking-dots
  584. https://www.eff.org/testyourisp
  585. https://www.eff.org/wp/blog-safely
  586. https://www.eff.org/wp/detecting-packet-injection
  587. https://www.eff.org/wp/how-not-get-sued-file-sharing/
  588. https://www.gnu.org/philosophy/
  589. https://www.gnu.org/philosophy/why-free.html
  590. https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xml
  591. https://www.kuro5hin.org/story/2002/11/23/14927/477
  592. https://www.kuro5hin.org/story/2004/10/26/02313/946
  593. https://www.net-security.org/articles_main.php
  594. https://www.networkworld.com/news/2009/070909-electrical-data-theft.html
  595. https://www.pcworld.com/article/248995/how_to_install_windows_7_without_the_disc.html
  596. https://www.schneier.com/blog/archives/2005/09/snooping_on_tex.html
  597. https://www.schneier.com/blog/archives/2007/09/anonymity_and_t_1.html
  598. https://www.schneier.com/blog/archives/2007/11/hushmail_turns.html
  599. https://www.schneier.com/blog/archives/2007/12/maninthemiddle.html
  600. https://www.schneier.com/blog/archives/2009/04/identifying_peo.html
  601. https://www.schneier.com/blog/archives/2010/01/web_security.html
  602. https://www.schneier.com/blog/archives/2010/05/detecting_brows.html
  603. https://www.schneier.com/blog/archives/2010/09/real-time_nsa_e.html
  604. https://www.schneier.com/blog/archives/2010/12/tor_routers.html
  605. https://www.schneier.com/blog/archives/2011/03/detecting_words.html
  606. https://www.schneier.com/blog/archives/2011/03/identifying_tor.html
  607. https://www.schneier.com/blog/archives/2011/08/identifying_peo_2.html
  608. https://www.schneier.com/blog/archives/2011/09/identifying_spe.html
  609. https://www.schneier.com/blog/archives/2011/09/tor_arms_race.html
  610. https://www.schneier.com/blog/archives/2012/07/how_to_become_a_1.html
  611. https://www.schneier.com/essay-182.html
  612. https://www.schneier.com/essay-261.html
  613. https://www.schneier.com/essay-262.html
  614. https://www.usenix.org/publications/proceedings
  615. http://techgurulive.com/2008/09/15/how-to-monitor-and-be-informed-of-ip-address-changes-from-your-network/
  616. http://tech.slashdot.org/story/99/07/19/1324207/super-shielded-pc-cases
  617. http://virus.bartolich.at/virus-writing-HOWTO/_html/index.html
  618. http://web.archive.org/web/20040608141549/http://all.net/journal/netsec/1997-12.html
  619. http://web.archive.org/web/20060220113124/http://www.dss.mil/training/salinks.htm
  620. http://web.archive.org/web/20080222191230/http://the.jhu.edu/upe/2004/03/23/about-van-eck-phreaking/
  621. http://web.archive.org/web/20080820112134/http://www.crash-override.net/bogusdns.html
  622. http://web.archive.org/web/20090210035245/http://danieldegraaf.afraid.org/info/ipv6
  623. http://web.archive.org/web/20100916111512/http://www.ibiblio.org/security/articles/ports.html
  624. http://web.mit.edu/gtmarx/www/iron.html
  625. http://web.mit.edu/newsoffice/2012/camera-sees-around-corners-0321.html
  626. http://wiki.wireshark.org/Security
  627. http://www.ac6v.com/frequencies.htm
  628. http://www.afterdawn.com/guides/
  629. http://www.au.af.mil/info-ops/perception.htm
  630. http://www.backtrack-linux.org/tutorials/
  631. http://www.backtrack-linux.org/wiki/
  632. http://www.binarywolf.com/
  633. http://www.binarywolf.com/249/
  634. http://www.catb.org/jargon/
  635. http://www.ciphersbyritter.com/
  636. http://www.ciphersbyritter.com/GLOSSARY.HTM
  637. http://www.ciphersbyritter.com/RADELECT/LITES/LEDLITES.HTM
  638. http://www.ciphersbyritter.com/RADELECT/LITES/LITESFAQ.HTM
  639. http://www.ciphersbyritter.com/RADELECT/LITES/LITESHOT.HTM
  640. http://www.ciphersbyritter.com/RADELECT/LITES/XMSLITES.HTM
  641. http://www.cisco.com/en/US/solutions/ns340/ns414/ns742/ns744/landing_safe.html
  642. http://www.crypto.com/papers/
  643. http://www.cryptome.org/0002/nsa-tempest-01.zip
  644. http://www.cs.auckland.ac.nz/~pgut001/
  645. http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
  646. http://www.cs.tau.ac.il/~tromer/acoustic/
  647. http://www.cs.wright.edu/~pmateti/InternetSecurity/Lectures/Top/index.html
  648. http://www.dedoimedo.com/computers/linux-multi-boot.html
  649. http://www.developer.nokia.com/Community/Wiki/Category:Open_Source
  650. http://www.developer.nokia.com/Community/Wiki/Nokia_Open_Source
  651. http://www.dhra.mil/perserec/adr.html
  652. http://www.dhra.mil/perserec/products.html
  653. http://www.domenech.org/homebrew-sdr/receiver-1.htm
  654. http://www.ehow.com/how_8242473_display-ip-addresses-network.html
  655. http://www.engadget.com/2005/11/15/how-to-build-a-wifi-biquad-dish-antenna/
  656. http://www.epanorama.net/documents/telecom/telephone_intercom.html
  657. http://www.ethicalhacker.net/content/view/22/2/
  658. http://www.exploit-db.com/papers/
  659. http://www.faqs.org/docs/Linux-HOWTO/XDMCP-HOWTO.html
  660. http://www.febo.com/pages/baudline/
  661. http://www.febo.com/time-freq/FMT/technique/index.html
  662. http://www.forensicswiki.org/
  663. http://www.garykessler.net/library/fsc_stego.html
  664. http://www.gnupg.org/
  665. http://www.heinz.cmu.edu/~acquisti/research.htm
  666. http://www.ibm.com/developerworks/library/l-keyc2/
  667. http://www.ibm.com/developerworks/library/l-keyc3/
  668. http://www.ibm.com/developerworks/library/l-keyc/index.html
  669. http://www.ieee-security.org/cipher.html
  670. http://www.ieee-security.org/TC/SP-Index.html
  671. http://www.ihr.org/jhr/v09/v09p305_Marchetti.html
  672. http://www.informit.com/articles/article.aspx?p=23463&rll=1
  673. http://www.itworld.com/security/64193/researchers-find-ways-sniff-keystrokes-thin-air
  674. http://www.l0t3k.org/programming/docs/reverse/
  675. http://www.linux-sec.net/Firewall/HowTo/ja.net.private.html
  676. http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager03.html
  677. http://www.madboa.com/geek/dig/
  678. http://www.madboa.com/geek/gpg-quickstart/
  679. http://www.madboa.com/geek/openssl/
  680. http://www.madboa.com/geek/openssl/#digest-file
  681. http://www.madboa.com/geek/pine-ssl/
  682. http://www.madboa.com/geek/soho-bind/
  683. http://www.neilgunton.com/doc/index.html?o=1&doc_id=8580
  684. http://www.neowin.net/forum/topic/934274-freeware-alternative-list/
  685. http://www.nononsenseselfdefense.com/five_stages.html
  686. http://www.omgubuntu.co.uk/
  687. http://www.openrce.org/articles/
  688. http://www.oreillynet.com/cs/weblog/view/wlg/448
  689. http://www.oreillynet.com/topics/wireless/802.11
  690. http://www.phrack.org/issues.html?issue=62&id=6
  691. http://www.phrack.org/issues.html?issue=66&id=11#article
  692. http://www.phrack.org/issues.html?issue=66&id=15#article
  693. http://www.phrack.org/issues.html?issue=66&id=7#article
  694. http://www.popsci.com/technology/article/2012-07/seeing-through-walls-wireless-router
  695. http://www.radioreference.com/
  696. http://www.rfidvirus.org/index.html
  697. http://www.securityfocus.com/columnists/442/2
  698. http://www.securityfocus.com/news/11372
  699. http://www.social-engineer.org/framework/Social_Engineering_Framework
  700. http://www.symantec.com/connect/articles/forensic-analysis-live-linux-system-pt-1
  701. http://www.symantec.com/connect/articles/forensic-analysis-live-linux-system-pt-2
  702. http://www.symantec.com/connect/articles/ip-spoofing-introduction
  703. http://www.symantec.com/connect/articles/reverse-engineering-hostile-code
  704. http://www.symantec.com/connect/articles/sebek-3-tracking-attackers-part-one
  705. http://www.symantec.com/connect/articles/sebek-3-tracking-attackers-part-two
  706. http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics
  707. http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-ii-combat-strategies
  708. http://www.symantec.com/connect/articles/wireless-forensics-tapping-air-part-one
  709. http://www.symantec.com/connect/articles/wireless-forensics-tapping-air-part-two
  710. http://www.theregister.co.uk/2012/07/11/multi_platform_backdoor/
  711. http://www.tuxradar.com/content/learn-hack/
  712. http://www.vanwensveen.nl/rants/microsoft/IhateMS.html
  713. http://www.wiley.com/legacy/compbooks/mcnamara/links.html
  714. http://www.williamson-labs.com/laser-mic.htm
  715. http://www.zurich.ibm.com/security/idemix/
  716. http://yro.slashdot.org/story/99/10/25/2039238/declassified-tempest-material-comes-online
  717. http://yro.slashdot.org/story/99/11/08/093250/coming-to-a-desktop-near-you-tempest-capabilities
  718. (PDF, EPUB, MOBI, leads to) http://debian-handbook.info/get/now/
  719. (PDF) ftp://ftp.tapr.org/software_lib/ether/Ham_Ethernet_GBPPR.pdf
  720. (PDF) http://ai.eller.arizona.edu/COPLINK/publications/CACM_From%20Fingerprint%20to%20Writeprint.pdf
  721. (PDF) http://cryptome.org/2012/06/ci-glossary.pdf
  722. (PDF) http://csrc.nist.gov/publications/nistpubs/800-59/SP800-59.pdf
  723. (PDF) http://csrc.nist.gov/publications/nistpubs/800-84/SP800-84.pdf
  724. (PDF) http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdf
  725. (PDF) http://lanl.arxiv.org/pdf/1004.1267v1
  726. (PDF) http://lanl.arxiv.org/pdf/1109.0597v2
  727. (PDF) http://lanl.arxiv.org/pdf/1110.5395v3
  728. (PDF) http://lanl.arxiv.org/pdf/1204.0447v1
  729. (PDF) http://lanl.arxiv.org/pdf/1208.2877v1
  730. (PDF) http://packetstormsecurity.org/filedesc/Practical_Onion_Hacking.pdf.html
  731. (PDF) http://packetstormsecurity.org/files/65944/tempest.pdf
  732. (PDF) http://srgsec.cs.uiuc.edu/bootjacker.pdf
  733. (PDF) http://srgsec.cs.uiuc.edu/cloaker.pdf
  734. (PDF) http://sunnyday.mit.edu/book2.pdf
  735. (PDF) https://www.cl.cam.ac.uk/%7Emgk25/ieee02-optical.pdf
  736. (PDF) https://www.cl.cam.ac.uk/~mgk25/ih98-tempest.pdf
  737. (PDF) https://www.cl.cam.ac.uk/~mgk25/pet2004-fpd.pdf
  738. (PDF) https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-577.pdf
  739. (PDF) https://www.eff.org/sites/default/files/packet_injection_0.pdf
  740. (PDF) https://www.usenix.org/events/sec09/tech/full_papers/sec09_attacks.pdf
  741. (PDF) http://vulnfactory.org/research/defcon-remote.pdf
  742. (PDF) http://www.cl.cam.ac.uk/~mgk25/ches2005-limits.pdf
  743. (PDF) http://www.cl.cam.ac.uk/~mgk25/ieee02-optical.pdf
  744. (PDF) http://www.cl.cam.ac.uk/~mgk25/ih98-tempest.pdf
  745. (PDF) http://www.cl.cam.ac.uk/~mgk25/ih99-stegfs.pdf
  746. (PDF) http://www.cl.cam.ac.uk/~mgk25/pet2004-fpd.pdf
  747. (PDF) http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-577.pdf
  748. (PDF) http://www.crysys.hu/skywiper/skywiper.pdf
  749. (PDF) http://www.cs.wright.edu/%7Epmateti/InternetSecurity/Lectures/TCPexploits/sec-tcpip.pdf
  750. (PDF) http://www.fas.org/irp/eprint/nsa-interview.pdf
  751. (PDF) http://www.governmentattic.org/2docs/Hist_US_COMSEC_Boak_NSA_1973.pdf
  752. (PDF) http://www.medienwissenschaft.hu-berlin.de/medientheorien/forschung/downloads/hausarbeiten/em-sniffer.pdf
  753. (PDF) http://www.rfidvirus.org/papers/percom.06.pdf
  754. (PDF) http://www.toucan-system.com/research/blackhat2012_brossard_hardware_backdooring.pdf
  755. (PDF) http://www-users.cs.umn.edu/%7Edfrankow/files/lam-etrics2006-security.pdf
  756. (PDF) http://www-users.cs.umn.edu/%7Edfrankow/files/privacy-sigir2006.pdf
  757. (PDF, leads to)
  758. (PDF, leads to a) http://about-threats.trendmicro.com/ebooks/are-you-protecting-the-data-packets-in-your-pocket/
  759. (PDF, leads to a) http://ojs.academypublisher.com/index.php/jnw/article/view/jnw0702259266
  760. (PDF, leads to a) https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-577.html
  761. (PDF, leads to a) https://www.usenix.org/conference/usenixsecurity12/feasibility-side-channel-attacks-brain-computer-interfaces
  762. (PDF, leads to a) http://ubuntu-manual.org/downloads
  763. (PDF, leads to) http://anonymouse.org/cgi-bin/anon-www.cgi/http://www.popsci.com/diy/article/2006-09/stop-dropped-calls
  764. (PDF, leads to) https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-577.html
  765. (PDF, leads to) http://wikileaks.org/wiki/Cryptome.org_takedown:_Microsoft_Global_Criminal_Compliance_Handbook,_24_Feb_2010
  766. (PDF, PS, leads to) http://cacr.uwaterloo.ca/hac/
  767. (PDF, PS, PPT, DOC, TXT, leads to) http://www.cs.washington.edu/education/courses/csep590/06wi/
  768. (PDFs, leads to) http://all.net/Analyst/index.html
  769. (PDFs, leads to) http://reality.media.mit.edu/publications.php
  770. (PDFs, leads to) https://citizenlab.org/2012/07/from-bahrain-with-love-finfishers-spy-kit-exposed/3/
  771. (PDFs, leads to) http://srgsec.cs.illinois.edu/Welcome.html
  772. (PDFs, leads to) http://sunnyday.mit.edu/
  773. (PDFs, leads to) https://www.cl.cam.ac.uk/~mgk25/
  774. (PDFs, leads to) https://www.cl.cam.ac.uk/~mgk25/publications.html
  775. (PDFs, leads to) https://www.cl.cam.ac.uk/research/security/publications/
  776. (PDFs, leads to) https://www.cl.cam.ac.uk/~rja14/book.html
  777. (PDFs, leads to) http://web.archive.org/web/20071228064639/http://www.computer.org/portal/site/csdl/index.jsp
  778. (PDFs, leads to) http://www.amsat.org/amsat/intro/faqs.html
  779. (PDFs, leads to) http://www.navsea.navy.mil/nswc/dahlgren/Leading%20Edge/default.aspx
  780. (PDFs, leads to) http://www.pgpi.org/doc/guide/
  781. (PDFs, leads to) http://www.raulsiles.com/en/Research.html
  782. (PDFs, leads to) http://www-users.cs.umn.edu/~dfrankow/pubs.htm
  783. (PDFs, PS, leads to) http://hd.media.mit.edu/TechnicalReportsList.html
  784. (PDFs, PS, leads to) https://wwws.cs.umn.edu/tech_reports_upload/
  785. (PDFs, PSs, BibTeX, leads to) http://www.freehaven.net/anonbib/
  786. recon.cx - (Various Media Formats, leads to) http://2005.recon.cx/recon2005/papers/
  787. recon.cx - (Various Media Formats, leads to) http://2006.recon.cx/en/f/
  788. recon.cx - (Various Media Formats, leads to) http://recon.cx/2008/speakers.html
  789. recon.cx - (Various Media Formats, leads to) http://recon.cx/2010/speakers.html
  790. recon.cx - (Various Media Formats, leads to) http://recon.cx/2012/schedule/index.en.html
  791. recon.cx - (Videos, leads to ) http://archive.org/details/RECON2008
  792. recon.cx - (Videos, leads to ) http://archive.org/search.php?query=%22recon%202011%22
  793. recon.cx - (Videos, leads to ) http://archive.org/search.php?query=recon%202005%20AND%20mediatype%3Amovies
  794. recon.cx - (Videos, leads to ) http://archive.org/search.php?query=recon%202006%20AND%20mediatype%3Amovies
  795. recon.cx - (Videos, leads to ) http://archive.org/search.php?query=recon%202012%20AND%20mediatype%3Amovies
  796. (various document formats, leads to) http://www.grouplens.org/biblio
  797. (various types of media, links to) https://www.defcon.org/html/links/defcon-media-archives.html
  798. (videos, leads to) http://web.media.mit.edu/~sandy/videos.html
  799. ----------------------------------------

  800. ** 6003: Antivirus LiveCDs - boot and scan your system for malware

  801. + AVG:
  802. http://www.avg.com/us-en/avg-rescue-cd-download

  803. + AVG ARL: The latest release version of the AVG Rescue CD GNU/Linux (ARL) with daily updated virus database,
  804. latest alpha or beta version of the ARL and all the resources needed to build the ARL from scratch.
  805. Releases are signed!
  806. https://share.avg.com/arl

  807. + Avira:
  808. https://www.avira.com/en/download/product/avira-antivir-rescue-system

  809. + BitDefender:
  810. http://download.bitdefender.com/rescue_cd/

  811. + Comodo Rescue Disk (CRD):
  812. https://www.comodo.com/business-security/network-protection/rescue-disk.php

  813. + Dr.Web LiveCD & LiveUSB:
  814. http://www.freedrweb.com/livecd/
  815. http://www.freedrweb.com/liveusb/

  816. + F-Secure:
  817. https://www.f-secure.com/en/web/labs_global/removal-tools/-/carousel/view/142
  818. https://www.f-secure.com/en/web/labs_global/removal-tools

  819. + Kaspersky:
  820. http://support.kaspersky.com/faq/?qid=208282173
  821. http://support.kaspersky.com/viruses/rescuedisk?level=2
  822. http://forum.kaspersky.com/index.php?showforum=159

  823. + Microsoft Windows Defender Offline:
  824. https://connect.microsoft.com/systemsweeper

  825. ----------------------------------------

  826. ** 6004: Random Links
  827. (In a future version these links will each have their own new sections,)
  828. (since we've moved beyond mere security related links! As such, many of these links are not security oriented)
  829. (This section may appear now to be one big random blob of links, but with our next version, there will spring)
  830. (up several new sections of which these will be filed into. We wanted to push this out as a preview of how)
  831. (we're expanding beyond security links.)

  832. + Tormail Hidden Service (Requires Tor in order to use):
  833. + Tor Mail @Hidden Service: http://jhiwjjlqpyawmpjx.onion/
  834. + Tor Mail Intro @Clearnet: http://www.tormail.org/
  835. #
  836. # (large resource) http://blockyourid.com/~gbpprorg/
  837. # (large resource) http://blockyourid.com/~gbpprorg/mil/
  838. # http://blockyourid.com/~gbpprorg/mil/vaneck/index.html
  839. # (large resource) http://www.qsl.net/n9zia/
  840. # mirrors: http://www.gbppr.org , http://projects1.gbppr.org/ , http://gbppr.dyndns.org/
  841. #
  842. + Acoustic Surveillance of Physically Unmodified PCs by Michael LeMay and Jack Tan
  843. + (PDF) (original but broken link) http://seclab.uiuc.edu/pubs/LeMayT06.pdf
  844. + (PDF) (found but haven't verified source) http://blockyourid.com/~gbpprorg/mil/vaneck/LeMayT06.pdf
  845. +
  846. (archive) http://mympxplayer.org/
  847. http://10minutemail.com
  848. http://4hv.org/e107_plugins/forum/forum.php
  849. http://500px.com/
  850. http://500px.com/MarcinSobas
  851. http://ai.bpa.arizona.edu/
  852. http://alphabetizer.flap.tv/
  853. http://amecisco.com/
  854. http://anythingbutipod.com/
  855. http://anythingbutipod.com/forum/
  856. http://applefritter.com/
  857. http://applefritter.com/forum
  858. http://archive.org/create/
  859. http://archive.org/details/bittorrent
  860. http://arstechnica.com/
  861. http://arstechnica.com/civis/
  862. http://artsandlettersdaily.com/
  863. http://arxiv.org/
  864. http://ask.metafilter.com/
  865. http://askubuntu.com/
  866. http://attrition.org/
  867. http://attrition.org/mirror/
  868. http://batteryuniversity.com/
  869. http://betanews.com/
  870. http://bibliodyssey.blogspot.com/
  871. http://biosbits.org/
  872. http://blog.bodhizazen.net/
  873. http://blog.makezine.com/
  874. http://blogs.amd.com/
  875. http://blogs.scientificamerican.com/
  876. http://blogs.valvesoftware.com/linux/steamd-penguins/
  877. http://boingboing.net/
  878. http://boston.com/bigpicture/
  879. http://browserspy.dk/
  880. http://busybox.net/
  881. http://cdburnerxp.se/
  882. http://centralops.net/co/
  883. http://classical-music-online.net/
  884. http://commons.wikimedia.org/
  885. http://consumerist.com/
  886. http://cubesat.calpoly.edu/
  887. http://cwe.mitre.org/
  888. http://cybernetnews.com/
  889. http://cygwin.com/
  890. http://cylinders.library.ucsb.edu/index.php
  891. http://dedoimedo.com/
  892. http://depositfiles.com/
  893. http://digg.com/
  894. http://diit.sourceforge.net/
  895. http://distrowatch.com/
  896. http://dmml.asu.edu/resources
  897. http://documentaryheaven.com/
  898. http://doihaveadeadpixel.com/
  899. http://drudgereport.com/
  900. http://en.memory-alpha.org/wiki/Portal:Main
  901. http://en.rsf.org/
  902. http://fab.cba.mit.edu/
  903. http://faststone.org/
  904. http://faxzero.com/
  905. http://fcw.com/Home.aspx
  906. http://filecrop.com/
  907. http://forum.crucial.com/
  908. http://forum.japantoday.com/
  909. http://forum.notebookreview.com/
  910. http://forums.anandtech.com/
  911. http://forums.computeractive.co.uk/
  912. http://forums.fedoraforum.org/
  913. http://forums.linuxmint.com
  914. http://forums.overclockers.com.au
  915. http://forums.techarena.in/
  916. http://forums.wi-fiplanet.com/
  917. http://freeculture.org/
  918. http://fsi-language-courses.org
  919. http://gizmodo.com/
  920. http://glassgiant.com/ascii/
  921. http://gonullyourself.com/
  922. http://groupmedia.media.mit.edu/
  923. http://hardocp.com/
  924. http://hd.media.mit.edu/
  925. http://hintsforums.macworld.com/
  926. http://howtogrowtobacco.com/forum/
  927. http://howto.wired.com/wiki/Main_Page
  928. http://html.adobe.com/
  929. http://imakeprojects.com/Projects/wifi-heartbeat/
  930. http://imgur.com/
  931. http://improveverywhere.com/
  932. http://info.ee.surrey.ac.uk/Personal/Z.Kalal/tld.html
  933. http://ip-check.info
  934. http://issihosts.com/haveged/
  935. http://jesus-is-savior.com/
  936. http://lanl.arxiv.org/
  937. http://la-samhna.de/library/rootkits/detect.html
  938. http://leakdirectory.org/index.php/Leak_Site_Directory
  939. http://lifehacker.com/
  940. http://linuxmanpages.com/
  941. http://linuxmint.com/
  942. http://linuxpoison.blogspot.com/
  943. http://linuxscrew.com/
  944. http://mail.yandex.com/
  945. http://memegenerator.net/
  946. http://mentalfloss.com/
  947. http://meta.wikimedia.org/
  948. http://mindjustice.org/
  949. http://mitnicksecurity.com/
  950. http://multiupload.nl/
  951. http://mybannermaker.com/
  952. http://mympx.org/
  953. http://narus.com/
  954. http://naturalnews.com/
  955. http://news.cnet.com/
  956. http://news.cnet.com/cheapskate/
  957. http://news.cnet.com/tech-blogs/
  958. http://news.netcraft.com/
  959. http://nmap-online.com/
  960. http://online.wsj.com/
  961. http://onpointtactical.com/
  962. http://onstrat.com/osint/#startingpoints
  963. http://oreilly.com/blogs/
  964. http://oyc.yale.edu/
  965. http://packetstormsecurity.org/
  966. http://pastebin.com/KNtCVkpN
  967. http://patriotmemory.com/
  968. http://pdos.csail.mit.edu/~baford/vm/
  969. http://people.csail.mit.edu/mrub/vidmag/
  970. http://personal.ee.surrey.ac.uk/Personal/L.Wood/constellations/index.html
  971. http://photomuse.org/
  972. http://pipl.com/
  973. http://portforward.com/
  974. http://preyproject.com/
  975. http://project-byzantium.org/
  976. http://projects.washingtonpost.com/top-secret-america/
  977. http://qubes-os.org/
  978. http://rense.com/
  979. http://rfidguardian.org/
  980. http://rootzwiki.com/
  981. http://samate.nist.gov/index.php/Source_Code_Security_Analyzers.html
  982. https://blog.mozilla.org/
  983. https://blog.mozilla.org/addons/
  984. https://blog.mozilla.org/beyond-the-code/
  985. https://blog.mozilla.org/bhearsum/
  986. https://blog.mozilla.org/blog/author/chrismozillacom/
  987. https://blog.mozilla.org/blog/category/firefox/
  988. https://blog.mozilla.org/calendar/
  989. https://blog.mozilla.org/futurereleases/
  990. https://blog.mozilla.org/gen/
  991. https://blog.mozilla.org/it/
  992. https://blog.mozilla.org/labs/
  993. https://blog.mozilla.org/ligong/
  994. https://blog.mozilla.org/mobile/
  995. https://blog.mozilla.org/nnethercote/
  996. https://blog.mozilla.org/privacy/
  997. https://blog.mozilla.org/services/
  998. https://blog.mozilla.org/theden/
  999. https://blog.mozilla.org/thunderbird/
  1000. https://blog.mozilla.org/tilt/
  1001. https://blog.mozilla.org/webdev/
  1002. https://blog.mozilla.org/website-archive/
  1003. http://schizophrenia.com/
  1004. http://sclipo.com/
  1005. https://code.google.com/p/corkami/
  1006. https://code.google.com/p/googlecl/
  1007. https://community.rapid7.com/community/infosec/blog/2012/08/08/finfisher
  1008. https://creativecommons.org/
  1009. http://screenshots.debian.net/
  1010. http://searchengineland.com/
  1011. https://en.wikipedia.org/wiki/Bing_Mobile#Bing_411
  1012. https://en.wikipedia.org/wiki/List_of_PDF_software
  1013. https://en.wikipedia.org/wiki/Main_Page
  1014. https://epic.org/
  1015. https://epic.org/privacy/tools.html
  1016. https://fedoraproject.org/
  1017. https://freedom-to-tinker.com/
  1018. https://github.com/djrbliss/rose-exploit
  1019. http://slashdot.org/
  1020. http://slickdeals.net/
  1021. https://lists.apple.com/mailman/listinfo/security-announce
  1022. https://mashable.com/
  1023. https://one.ubuntu.com/services/
  1024. http://soundcloud.com/
  1025. http://sourceforge.net/projects/diit/
  1026. http://sourceforge.net/projects/nfienfcollector/
  1027. https://panopticlick.eff.org/
  1028. http://species.wikimedia.org/
  1029. http://spectrum.ieee.org/
  1030. http://spectrum.ieee.org/blogs
  1031. http://spectrum.ieee.org/blog/tech-talk
  1032. http://spectrum.mit.edu/articles/normal/fab-lab/ (article)
  1033. https://personaltelco.net/wiki
  1034. http://spywareinfoforum.com/
  1035. https://s3.amazonaws.com/data.tumblr.com/tumblr_lxyvchLFXx1r1ylbfo1_500.jpg
  1036. https://secure.dslreports.com/faq
  1037. http://stallman.org/
  1038. https://torrentfreak.com/
  1039. https://twitter.com/corkami
  1040. http://support.ntp.org/bin/view/Support/WebHome
  1041. http://swann.com
  1042. https://www.amnesty.org/
  1043. https://www.blackhat.com/index.html
  1044. https://www.ccc.de/
  1045. https://www.cert.org/
  1046. https://www.chillingeffects.org/
  1047. https://www.commondreams.org/
  1048. https://www.computerworld.com/
  1049. https://www.defcon.org/
  1050. https://www.defcon.org/html/links/dc-tools.html
  1051. https://www.eff.org/
  1052. https://www.eff.org/deeplinks/
  1053. https://www.eff.org/pages/switzerland-network-testing-tool
  1054. https://www.erowid.org/
  1055. https://www.flickr.com/
  1056. https://www.grc.com
  1057. https://www.imagineshop.co.uk/
  1058. https://www.infoworld.com/
  1059. https://www.libreoffice.org/
  1060. https://www.linuxquestions.org/
  1061. https://www.linuxquestions.org/questions/
  1062. https://www.mi5.gov.uk/
  1063. https://www.microsoft.com/communities/forums/default.mspx
  1064. https://www.microsoft.com/security/scanner/en-us/default.aspx
  1065. https://www.myspace.com/
  1066. https://www.networkworld.com/
  1067. https://www.npr.org/blogs/health/
  1068. https://www.opendns.com/technology/dnscrypt/
  1069. https://www.propublica.org/
  1070. https://www.safe-mail.net/
  1071. https://www.sans.org/
  1072. https://www.technologyreview.com/computing/
  1073. https://www.un.org/
  1074. https://www.un.org/en/documents/udhr/index.shtml
  1075. https://www.youtube.com/
  1076. https://www.youtube.com/results?search_query=Randy+Quaid+Star+Whackers
  1077. https://www.youtube.com/ucberkeley
  1078. http://techliberation.com/
  1079. http://technorati.com/
  1080. http://techreport.com/
  1081. http://techreport.com/forums/
  1082. http://thebrowser.com/
  1083. http://topdocumentaryfilms.com/
  1084. http://totse2.com/
  1085. http://trapkit.de/
  1086. http://truth-out.org/
  1087. http://turnoffyourtv.com/
  1088. http://tutvid.com
  1089. http://ubuntuforums.org/
  1090. http://urlget.sourceforge.net/
  1091. http://usahitman.com/
  1092. http://vigilantcitizen.com/
  1093. http://vigilantcitizen.com/vcboards/
  1094. http://web.archive.org/web/20040202004210/http://www.cs.auckland.ac.nz/~pgut001/links.html
  1095. http://web.archive.org/web/20040206214035/http://www.cs.auckland.ac.nz/~pgut001/links/archives.html
  1096. http://web.archive.org/web/20060831063210/http://faculty.ncwc.edu/toconnor/reform.htm
  1097. http://web.archive.org/web/20060831063224/http://faculty.ncwc.edu/toconnor/data.htm
  1098. http://web.archive.org/web/20060831081811/http://faculty.ncwc.edu/toconnor/thnktank.htm
  1099. http://web.archive.org/web/20070207050215/http://faculty.ncwc.edu/toconnor/sources.htm
  1100. http://web.archive.org/web/20070217052232/http://faculty.ncwc.edu/TOConnor/427/427links.htm
  1101. http://webcast.berkeley.edu/
  1102. http://web.media.mit.edu/~sandy/
  1103. http://web.mit.edu/mitei/news/index.html
  1104. http://web.mit.edu/newsoffice/
  1105. http://web.mit.edu/zacka/www/midas.html
  1106. http://web.mit.edu/zacka/www/projects.html
  1107. http://wificamera.propositions.org.uk/
  1108. http://wificamera.propositions.org.uk/Panoramic-Wifi-Camera
  1109. http://wiki.echelon2.org/wiki/Main_Page
  1110. http://wikitravel.org/
  1111. http://wisp.wikispaces.com
  1112. http://www1.informatik.uni-erlangen.de/tresor
  1113. http://www.4shared.com/
  1114. http://www.5min.com/
  1115. http://www.academicearth.org/
  1116. http://www.aclu.org/
  1117. http://www.addictivetips.com/
  1118. http://www.allmyfaves.com/
  1119. http://www.anandtech.com/
  1120. http://www.au.af.mil/au/awc/awcgate/awc-ndex.htm
  1121. http://www.au.af.mil/au/awc/awcgate/awc-port.htm
  1122. http://www.au.af.mil/au/awc/awcgate/awc-ref.htm
  1123. http://www.au.af.mil/au/awc/awcgate/awc-thkg.htm
  1124. http://www.au.af.mil/au/awc/awcgate/awc-thkg.htm#critical
  1125. http://www.avforums.com/forums/
  1126. http://www.bashoneliners.com/
  1127. http://www.bbb.org/
  1128. http://www.bbc.co.uk/iplayer/radio
  1129. http://www.betabeat.com/
  1130. http://www.bloomberg.com/news/worldwide/
  1131. http://www.bluesnews.com/
  1132. http://www.brainpickings.org/
  1133. http://www.brickhousesecurity.com/
  1134. http://www.brokentoaster.com/butterflymp3/index.html
  1135. http://www.bugmenot.com/
  1136. http://www.businessweek.com/
  1137. http://www.buzzfeed.com/
  1138. http://www.cbradiotalk.com/index.php
  1139. http://www.cerias.purdue.edu/
  1140. http://www.chromium.org/
  1141. http://www.cicentre.com/
  1142. http://www.codecademy.com/
  1143. http://www.complaints.com/
  1144. http://www.consumerworld.org/
  1145. http://www.copyscape.com/
  1146. http://www.coreboot.org/
  1147. http://www.coreboot.org/SeaBIOS
  1148. http://www.cosmolearning.com/
  1149. http://www.cracked.com/
  1150. http://www.crucial.com
  1151. http://www.cryptome.org/
  1152. http://www.c-spanvideo.org/videoLibrary/
  1153. http://www.cultdeadcow.com/
  1154. http://www.cyberciti.biz/
  1155. http://www.dafont.com/
  1156. http://www.dailymotion.com/
  1157. http://www.damninteresting.com/
  1158. http://www.defectivebydesign.org/
  1159. http://www.differencebetween.net/
  1160. http://www.digital-detective.co.uk/
  1161. http://www.digital-digest.com/index.php
  1162. http://www.disclose.tv/
  1163. http://www.disclose.tv/forum/
  1164. http://www.discoverbing.com/mobile
  1165. http://www.dlib.indiana.edu/collections/
  1166. http://www.dmoz.org/Computers/Internet/E-mail/Spam/Preventing/Temporary_Addresses/
  1167. http://www.dogbitelaw.com/
  1168. http://www.doom9.org/
  1169. http://www.downforeveryoneorjustme.com/
  1170. http://www.economist.com/
  1171. http://www.ehow.com/
  1172. http://www.emaildiscussions.com/
  1173. http://www.endangeredlanguages.com/
  1174. http://www.engadget.com
  1175. http://www.engadget.com/
  1176. http://www.epanorama.net/index2.php?section=documents&index=audio
  1177. http://www.evga.com/forums/
  1178. http://www.ew.com/ew/
  1179. http://www.eweek.com/
  1180. http://www.extremetech.com/
  1181. http://www.fabathome.org/
  1182. http://www.fakenamegenerator.com/
  1183. http://www.fark.com/
  1184. http://www.filestube.com/
  1185. http://www.folkstreams.net/
  1186. http://www.forbes.com/
  1187. http://www.freerepublic.com
  1188. http://www.freesoftwaremagazine.com/
  1189. http://www.ft.com/
  1190. http://www.gamefront.com/
  1191. http://www.gameinformer.com/
  1192. http://www.geekstogo.com/forum/
  1193. http://www.giveawayoftheday.com/
  1194. http://www.gizmag.com/
  1195. http://www.godlikeproductions.com
  1196. http://www.groklaw.net/
  1197. http://www.gutenberg.org/wiki/Main_Page
  1198. http://www.gwu.edu/~nsarchiv/
  1199. http://www.hackermedia.org/
  1200. http://www.head-fi.org/f/
  1201. http://www.hellomagazine.com/
  1202. http://www.hitb.org/
  1203. http://www.howcast.com/
  1204. http://www.howstuffworks.com/
  1205. http://www.hulu.com/
  1206. http://www.i2p2.de/
  1207. http://www.ibiblio.org/
  1208. http://www.ic3.gov/default.aspx
  1209. http://www.imdb.com/title/tt0071360/
  1210. http://www.imdb.com/title/tt0120660/
  1211. http://www.imdb.com/title/tt0128278/
  1212. http://www.imdb.com/title/tt0308808/
  1213. http://www.imdb.com/title/tt0489037/
  1214. http://www.inchem.org/
  1215. http://www.informationclearinghouse.info/
  1216. http://www.informationweek.com/
  1217. http://www.infowars.com/
  1218. http://www.internetnews.com/
  1219. http://www.inventgeek.com/blog/
  1220. http://www.irfanview.com/
  1221. http://www.itworld.com/
  1222. http://www.itworld.com/blogs/sandra-henry-stocker
  1223. http://www.japantoday.com/
  1224. http://www.jjtc.com/Security/stegtools.htm
  1225. http://www.jjtc.com/Steganography/
  1226. http://www.khanacademy.org/
  1227. http://www.ladyada.net/make/
  1228. http://www.ladyada.net/make/mintyboost/index.html
  1229. http://www.ladyada.net/make/minty/index.html
  1230. http://www.last.fm/
  1231. http://www.linuxfoundation.org/
  1232. http://www.lipstickalley.com/
  1233. http://www.liveleak.com/
  1234. http://www.mail-archive.com/
  1235. http://www.mcgrewsecurity.com/tools/msramdmp/
  1236. http://www.mediafire.com/
  1237. http://www.medicalnewstoday.com/
  1238. http://www.metafilter.com/
  1239. http://www.minutemanproject.com/
  1240. http://www.myfishtank.net/forum/
  1241. http://www.nasdaq.com/
  1242. http://www.nationaldefensemagazine.org
  1243. http://www.nationmaster.com/
  1244. http://www.neowin.net/
  1245. http://www.neowin.net/forum/
  1246. http://www.net.princeton.edu/software/dhcp_probe/
  1247. http://www.nist.gov/public_affairs/tech-beat (archives:) http://www.nist.gov/public_affairs/tech-beat/archives.cfm
  1248. http://www.nutsvolts.com/
  1249. http://www.nutsvolts.com/index.php?/blog/
  1250. http://www.officer.com/
  1251. http://www.ok.co.uk/home/
  1252. http://www.okmagazine.com/
  1253. http://www.omgubuntu.co.uk/
  1254. http://www.opcva.com/watchdog/
  1255. http://www.openculture.com/
  1256. http://www.openrightsgroup.org/
  1257. http://www.openstreetmap.org/
  1258. http://www.opentopia.com/hiddencam.php
  1259. http://www.open-video.org/
  1260. http://www.osnews.com/
  1261. http://www.patriotmemory.com/forums
  1262. http://www.pbs.org/
  1263. http://www.pbs.org/wgbh/pages/frontline/
  1264. http://www.people.com/people/
  1265. http://www.phonescoop.com/
  1266. http://www.phoronix.com/
  1267. http://www.phoronix.com/forums/
  1268. http://www.pool.ntp.org/en/
  1269. http://www.princeton.edu/WebMedia/lectures/
  1270. http://www.printfriendly.com/
  1271. http://www.psychologytoday.com/
  1272. http://www.quora.com/
  1273. http://www.qwiki.com/
  1274. http://www.radaronline.com/
  1275. http://www.raspberrypi.org/
  1276. http://www.readprint.com/
  1277. http://www.reddit.com/
  1278. http://www.reuters.com/
  1279. http://www.rollingstone.com/
  1280. http://www.rootkit.nl/projects/lynis.html
  1281. http://www.rssweather.com
  1282. http://www.scientificamerican.com/article.cfm?id=hackers-can-steal-from-reflections
  1283. http://www.seabios.org/SeaBIOS
  1284. http://www.seattle.intel-research.net/wisp/
  1285. http://www.shacknews.com/
  1286. http://www.sigsac.org/
  1287. http://www.slashfilm.com/
  1288. http://www.slashgear.com/
  1289. http://www.songkick.com/
  1290. http://www.soyouwanna.com/
  1291. http://www.spamhaus.org/
  1292. http://www.spychips.com/
  1293. http://www.stallman.org/
  1294. http://www.stallman.org/archives/
  1295. http://www.sutree.com/
  1296. http://www.synchtube.com/
  1297. http://www.tcpipguide.com/free/t_toc.htm
  1298. http://www.techdirt.com/
  1299. http://www.technologyreview.com/
  1300. http://www.tech-recipes.com/
  1301. http://www.techspot.com/
  1302. http://www.techsupportforum.com/
  1303. http://www.techsupportforum.com/forums/
  1304. http://www.ted.com/
  1305. http://www.theregister.co.uk/
  1306. http://www.theverge.com/
  1307. http://www.thisiscolossal.com/
  1308. http://www.thoughtcrime.org/software/sslsniff/
  1309. http://www.timeanddate.com/worldclock/
  1310. http://www.tmz.com/
  1311. http://www.tomshardware.com/index.html
  1312. http://www.tuxradar.com/
  1313. http://www.tvguide.com/
  1314. http://www.ubuntu.com/
  1315. http://www.urbandictionary.com/
  1316. http://www.usbwifi.orconhosting.net.nz/
  1317. http://www.ustream.tv/
  1318. http://www.vanityfair.com/
  1319. http://www.variety.com/Home/
  1320. http://www.videojug.com/
  1321. http://www.vidipedia.org/
  1322. http://www.wardriving.com/
  1323. http://www.warriorsofthe.net/index.html
  1324. http://www.weather.com/
  1325. http://www.webcitation.org/
  1326. http://www.wi-fiplanet.com/
  1327. http://www.wikibooks.org/
  1328. http://www.wikihow.com/Main-Page
  1329. http://www.wikileaks.org/
  1330. http://www.wikinews.org/
  1331. http://www.wikipedia.org/
  1332. http://www.wikiquote.org/
  1333. http://www.wikisource.org/
  1334. http://www.wikiversity.org/
  1335. http://www.wiktionary.org/
  1336. http://www.winsupersite.com/
  1337. http://www.winsupersite.com/blogcontent/supersite-blog-39
  1338. http://www.wired.com/
  1339. http://www.wired.com/about/blogs
  1340. http://www.wireimage.com/
  1341. http://www.wotsit.org/
  1342. http://www.xnview.com/
  1343. http://www.youtube-mp3.org/
  1344. http://www.zoklet.net/
  1345. http://www.zophar.net/
  1346. http://zombiehunters.org/forum/
  1347. (magazine) http://www.linuxidentity.com/
  1348. (online virus scanner) https://www.virustotal.com/
  1349. (online virus scanner) http://virusscan.jotti.org/en
  1350. (PDF) http://csrc.nist.gov/publications/nistir/7316/NISTIR-7316.pdf
  1351. (PDFs, leads to) http://dmml.asu.edu/research/pubs
  1352. (PDFs, leads to) http://groupmedia.media.mit.edu/publications.php
  1353. (PDFs, leads to) http://hd.media.mit.edu/badges/publications.html
  1354. (PDFs, leads to) http://linuxnewmedia.com/Products/Print
  1355. (PDFs, leads to) http://www.public.asu.edu/~huanliu/publications.html
  1356. (PDFs, leads to) http://www.public.asu.edu/~huanliu/sbp09/program.html
  1357. (PDFs, leads to) http://www.seattle.intel-research.net/pubs.php
  1358. (PDFs, PPTs, leads to) http://www.public.asu.edu/~huanliu/sbp08/program.html
  1359. (Power Pwn) http://hardware.slashdot.org/story/12/07/22/0335223/the-darpa-funded-power-strip-that-will-hack-your-network
  1360. (Power Pwn) http://pwnieexpress.com/
  1361. (Power Pwn) http://pwnieexpress.com/blogs/news
  1362. (Power Pwn) http://www.zdnet.com/power-pwn-this-darpa-funded-power-strip-will-hack-your-network-7000001331/
  1363. (Power Pwn - PDF) http://cryptome.org/2012/07/cbp072312.pdf
  1364. (view PDFs online!) http://view.samurajdata.se/
  1365. ----------------------------------------

  1366. ** 6005: Security Blogs:

  1367. #
  1368. # Most Powerful Voices in Security Who are the Top 25?
  1369. # The Rest of the Top 100 -
  1370. # * 100 security guru's listed with their Twitter pages
  1371. # and personal/blog sites: (Sep. 8, 2011) Posted here as one
  1372. # link rather than posting around 100 Twitter personal pages.
  1373. # http://www.sys-con.com/node/1974029
  1374. #
  1375. +
  1376. + http://blog.layeredsec.com/ (Archive) - https://twitter.com/brycegalbraith (Author moved to Twitter)
  1377. +
  1378. + (archive) https://pinvoke.wordpress.com/
  1379. +
  1380. + (archive) http://superantispyware.com/blog/
  1381. +
  1382. + (click month at right for archives) https://yorkporc.wordpress.com/
  1383. *
  1384. * https://wiki.debian.org/FreedomBox
  1385. *
  1386. +
  1387. + http://anonymouse.org/cgi-bin/anon-www.cgi/http://www.malwaredomainlist.com/
  1388. + (via Anonymouse because of ban on Tor exit nodes)
  1389. +
  1390. + http://anonymouse.org/cgi-bin/anon-www.cgi/http://www.securitywire.com/
  1391. + (via Anonymouse to evade Tor exit node ban)
  1392. +
  1393. + (archive) http://www.teamfurry.com/wordpress/
  1394. +
  1395. + (archive) http://securityincite.com/blog/mike-rothman
  1396. +
  1397. + http://anonymouse.org/cgi-bin/anon-www.cgi/http://robert.penz.name/
  1398. + (via Anonymouse: Tor exit node ban evasion by proxy)
  1399. +
  1400. http://aconaway.com/
  1401. http://anonymous.livelyblog.com/
  1402. http://anti-virus-rants.blogspot.com/
  1403. http://bgpmon.net/blog/
  1404. http://blog.brickhousesecurity.com/
  1405. http://blog.c22.cc/
  1406. http://blog.clamav.net/
  1407. http://blog.commandlinekungfu.com/
  1408. http://blog.crysys.hu/
  1409. http://blog.cuckoosandbox.org/
  1410. http://blog.cyberwar.nl/
  1411. http://blog.deepsec.net/
  1412. http://blog.didierstevens.com/
  1413. http://blog.emsisoft.com/
  1414. http://blog.eset.com/
  1415. http://blog.fireeye.com/research
  1416. http://blog.gerhards.net/
  1417. http://blog.ine.com/
  1418. http://blog.infosanity.co.uk/
  1419. http://blog.ioshints.info/
  1420. http://blog.lse.epita.fr/
  1421. http://blog.mandiant.com/
  1422. http://blog.oxff.net/
  1423. http://blog.rootshell.be/
  1424. http://blogs.appriver.com/
  1425. http://blogs.cisco.com/category/security
  1426. http://blog.secureideas.net/
  1427. http://blog.security4all.be/
  1428. http://blogs.iss.net/
  1429. http://blog.snort.org/
  1430. http://blogs.pcmag.com/securitywatch/
  1431. http://blog.spiderlabs.com/
  1432. http://blog.spywareguide.com/
  1433. http://blogs.securiteam.com/
  1434. http://blog.stopbadware.org/
  1435. http://blog.tenablesecurity.com/
  1436. http://blog.threatexpert.com/
  1437. http://blog.trendmicro.com/
  1438. http://blog.tsa.gov/
  1439. http://blog.uncommonsensesecurity.com/
  1440. http://blog.watchfire.com/wfblog/
  1441. http://blog.webroot.com/
  1442. http://blog.zoller.lu/
  1443. http://blog.zx2c4.com/
  1444. http://blog.zynamics.com/
  1445. http://brandonjcarroll.com/
  1446. http://cansecwest.com/
  1447. http://carnal0wnage.attackresearch.com/
  1448. http://cerias.purdue.edu/site/blog/author/spaf
  1449. http://chargen.matasano.com/
  1450. http://chris-intel-corner.blogspot.com/
  1451. http://chuvakin.blogspot.com/
  1452. http://ciscoiseasy.blogspot.com/
  1453. http://coffeetocode.net/
  1454. http://community.websense.com/blogs/securitylabs/
  1455. http://community.websense.com/blogs/securitylabs/default.aspx
  1456. http://computer-forensics.sans.org/blog
  1457. http://computer-forensics.sans.org/blog/
  1458. http://computer.forensikblog.de/en/
  1459. http://comsecllc.blogspot.com/
  1460. http://contagiodump.blogspot.com/
  1461. http://cryptocomb.org/
  1462. http://crypto.stanford.edu/
  1463. http://cyb3rcrim3.blogspot.com/
  1464. http://cyberspeak.libsyn.com/
  1465. http://dankaminsky.com/
  1466. http://darkreading.com/
  1467. http://daveshackleford.com/
  1468. http://ddanchev.blogspot.com/
  1469. http://ddos.arbornetworks.com/
  1470. http://deadliestwebattacks.com/
  1471. http://deepsec.net/
  1472. http://dhs-daily-report.blogspot.com/
  1473. http://digfor.blogspot.com/
  1474. http://digitalforensicsisascience.blogspot.com
  1475. http://dshield.org/
  1476. http://dvlabs.tippingpoint.com/blog
  1477. http://dvlabs.tippingpoint.com/blog/
  1478. http://elie.im/blog/
  1479. http://emergentchaos.com/
  1480. http://erratasec.blogspot.com/
  1481. http://etherealmind.com/category/blog/
  1482. http://etherealmind.com/category/blog/security/
  1483. http://eusecwest.com/
  1484. http://evilrouters.net/
  1485. http://fasthorizon.blogspot.com/
  1486. http://forensicaliente.blogspot.com/
  1487. http://forensicfocus.blogspot.com/
  1488. http://forensicmethods.com/
  1489. http://forensicsfromthesausagefactory.blogspot.com/
  1490. http://fraudwar.blogspot.com/
  1491. http://fumalwareanalysis.blogspot.com/
  1492. http://garwarner.blogspot.com/
  1493. http://girlunallocated.blogspot.com
  1494. http://gleeda.blogspot.com/
  1495. http://googleonlinesecurity.blogspot.com/
  1496. http://grandstreamdreams.blogspot.com/
  1497. http://gregsowell.com/
  1498. http://ha.ckers.org/blog (Archive)
  1499. http://hackingcisco.blogspot.com/
  1500. http://holisticinfosec.blogspot.com/
  1501. http://honeyblog.org/
  1502. http://inciweb.org/
  1503. http://infolookup.securegossip.com/
  1504. http://infosecisland.com/
  1505. http://intelnews.org/
  1506. http://invisiblethings.org/
  1507. http://it-audit.sans.org/blog/
  1508. http://jeremiahgrossman.blogspot.com/
  1509. http://jessekornblum.livejournal.com/
  1510. http://journeyintoir.blogspot.com/
  1511. http://justaskweg.com/
  1512. http://krebsonsecurity.com/
  1513. http://labs.m86security.com/ (Archive)
  1514. http://lastwatchdog.com/
  1515. http://log.nadim.cc
  1516. http://lonesysadmin.net/
  1517. http://maliciousattacker.blogspot.com/
  1518. http://marienfeldt.com/
  1519. http://mnin.org/
  1520. http://nakedsecurity.sophos.com/
  1521. http://netsecurity.about.com/
  1522. http://netsecurity.about.com/compute/netsecurity/
  1523. http://network-101.blogspot.com/
  1524. http://news.cnet.com/security
  1525. http://news.hitb.org/
  1526. http://news.softpedia.com/cat/Security/
  1527. http://news.techworld.com/security/
  1528. http://offensivecoder.com/blog/
  1529. http://p4r4n0id.com/ (appears to be gone, we'll see)
  1530. http://packetlife.net/blog/
  1531. http://packetstormsecurity.org/news/
  1532. http://pacsec.jp/
  1533. http://paranoia.dubfire.net/ (Home: http://www.dubfire.net/) (Twitter: https://twitter.com/csoghoian)
  1534. http://pauldotcom.com/
  1535. http://penguininside.blogspot.com/
  1536. http://pen-testing.sans.org/blog/
  1537. http://philosecurity.org/
  1538. http://polarwave.blogspot.com/
  1539. http://praetorianprefect.com/
  1540. http://pseudo-flaw.net/log/index
  1541. http://publicintelligence.net/
  1542. http://randomthoughtsofforensics.blogspot.com
  1543. http://rdist.root.org/
  1544. http://recon.cx
  1545. http://resources.infosecinstitute.com/
  1546. http://revolutionwifi.blogspot.com/
  1547. http://rijmenants.blogspot.com/
  1548. https://365.rsaconference.com/blogs/critical-infrastructure
  1549. https://365.rsaconference.com/blogs/ediscovery
  1550. https://365.rsaconference.com/blogs/fred-stock
  1551. https://365.rsaconference.com/blogs/ira-winkler
  1552. https://365.rsaconference.com/blogs/rsa-conference-blog
  1553. https://365.rsaconference.com/blogs/securityreading
  1554. https://amtso.wordpress.com/
  1555. https://blog.avast.com/
  1556. https://blog.mozilla.org/security/
  1557. https://blog.opendns.com/
  1558. https://blogs.adobe.com/psirt/
  1559. https://blogs.mcafee.com/
  1560. https://blogs.mcafee.com/mcafee-labs
  1561. https://blogs.technet.com/b/sysinternals/
  1562. https://blogs.technet.com/mmpc/default.aspx
  1563. https://blogs.technet.com/msrc/
  1564. https://blog.torproject.org/
  1565. https://blog.whitehatsec.com/
  1566. https://chainmailcheck.wordpress.com/
  1567. https://citizenlab.org/category/news/
  1568. https://community.rapid7.com/community/infosec/blog
  1569. https://community.rapid7.com/community/metasploit/blog
  1570. https://devcentral.f5.com/Home/Blogs/tabid/1082195/Default.aspx
  1571. https://devcentral.f5.com/weblogs/macvittie/Default.aspx
  1572. http://seclists.org/
  1573. http://securityandrisk.blogspot.com/
  1574. http://securityblog.verizonbusiness.com/
  1575. http://securitybraindump.blogspot.com/
  1576. http://security-sh3ll.blogspot.com/
  1577. http://securityvulns.com/
  1578. http://securosis.com/blog
  1579. https://fightinginsecurity.wordpress.com/
  1580. https://gregness.wordpress.com/
  1581. http://sketchymoose.blogspot.com/
  1582. https://memset.wordpress.com/
  1583. https://news.ycombinator.com/
  1584. http://software-security.sans.org/blog/
  1585. http://spectrum.ieee.org/blog/riskfactor
  1586. https://psal.cs.drexel.edu/index.php/Main_Page
  1587. http://spyblog.org.uk/
  1588. https://secunia.com/advisories/
  1589. https://ssd.eff.org/
  1590. https://techbuddha.wordpress.com/
  1591. http://stratsec.blogspot.com/
  1592. https://twitter.com/hackinthebox
  1593. https://twitter.com/markrussinovich
  1594. http://superconductor.voltage.com/
  1595. http://swann.com/s/products/newsrelease/
  1596. https://www.adobe.com/support/security/
  1597. https://www.brandenwilliams.com/blog/
  1598. https://www.eff.org/
  1599. https://www.grc.com/securitynow.htm
  1600. https://www.ibm.com/developerworks/
  1601. https://www.ibm.com/developerworks/aix/library/
  1602. https://www.ibm.com/developerworks/linux/
  1603. https://www.ibm.com/developerworks/topics/
  1604. https://www.mozilla.org/security/announce/
  1605. https://www.net-security.org/
  1606. https://www.sans.org/newsletters/
  1607. https://www.sans.org/newsletters/#newsbites
  1608. https://www.sans.org/newsletters/#ouch
  1609. https://www.sans.org/newsletters/#risk
  1610. https://www.schneier.com/
  1611. https://www.securelist.com/en/weblog
  1612. https://www.trustedsec.com/news-and-events/
  1613. https://www.usenix.org/conferences
  1614. https://www.veracode.com/blog/
  1615. http://taosecurity.blogspot.com/
  1616. http://technicalinfodotnet.blogspot.com/
  1617. http://thehackernews.com/
  1618. http://thehiddenevil.com/
  1619. http://theinvisiblethings.blogspot.com/
  1620. http://threatpost.com/
  1621. http://threatthoughts.com/
  1622. http://ticklethewire.com/
  1623. http://tk-blog.blogspot.com/
  1624. http://toorcon.org/
  1625. http://travisgoodspeed.blogspot.com/
  1626. http://volatility.tumblr.com/
  1627. http://vrt-blog.snort.org/
  1628. http://vulnfactory.org/blog/
  1629. http://web.archive.org/web/20100528020113/http://milw0rm.com/
  1630. http://windowsir.blogspot.com/
  1631. http://wordpress.bladeforensics.com/
  1632. http://www.acunetix.com/blog/
  1633. http://www.afcea.org/signal/signalscape/
  1634. http://www.allspammedup.com/
  1635. http://www.backtrack-linux.org/blog/
  1636. http://www.bigbrotherwatch.org.uk/
  1637. http://www.blackbag.nl/
  1638. http://www.blindhog.net/
  1639. http://www.bunniestudios.com/wordpress/
  1640. http://www.businessinsider.com/defense
  1641. http://www.businessinsider.com/defense/infosec
  1642. http://www.businessinsider.com/warroom
  1643. http://www.capnfreedom.com/
  1644. http://www.catonmat.net/
  1645. http://www.cerias.purdue.edu/site/blog
  1646. http://www.cerias.purdue.edu/site/blog/
  1647. http://www.cgisecurity.com/
  1648. http://www.ciscoarticles.com/
  1649. http://www.clerkendweller.com/
  1650. http://www.corecom.com/html/wlan.html
  1651. http://www.cristoncox.com/
  1652. http://www.cryptogon.com/
  1653. http://www.cryptome.org/
  1654. http://www.cryptosmith.com/
  1655. http://www.cyberwarnews.info/
  1656. http://www.darknet.org.uk/
  1657. http://www.darkreading.com/blog
  1658. http://www.devttys0.com/blog/
  1659. http://www.educatedguesswork.org/
  1660. http://www.ehacking.net/
  1661. http://www.emergingthreatspro.com/blog/
  1662. http://www.ericjhuber.com/
  1663. http://www.esecurityplanet.com/
  1664. http://www.esecurityplanet.com/hackers
  1665. http://www.esecurityplanet.com/malware
  1666. http://www.eweek.com/c/s/Security/
  1667. http://www.exploit-db.com/
  1668. http://www.exploit-id.com/
  1669. http://www.fas.org/blog/secrecy/
  1670. http://www.fas.org/blog/ssp/
  1671. http://www.federaltimes.com/
  1672. http://www.financialcryptography.com/
  1673. http://www.flyingpenguin.com/
  1674. http://www.forensic4cast.com/
  1675. http://www.forensickb.com/
  1676. http://www.forensicswiki.org/
  1677. http://www.frontlinesentinel.com/
  1678. http://www.f-secure.com/weblog
  1679. http://www.gfi.com/blog/
  1680. http://www.gfi.com/blog/labs/
  1681. http://www.hackaday.com/
  1682. http://www.heinz.cmu.edu/~acquisti/shb/participants.htm
  1683. http://www.hexacorn.com/blog/
  1684. http://www.hexblog.com/
  1685. http://www.honeynet.org/
  1686. http://www.h-online.com/
  1687. http://www.h-online.com/developer/
  1688. http://www.h-online.com/open/
  1689. http://www.h-online.com/security/
  1690. http://www.hotforsecurity.com/
  1691. http://www.ibm.com/developerworks/security/
  1692. http://www.infosecblog.org/
  1693. http://www.infosecurity-magazine.com/blog/
  1694. http://www.insearchoftech.com/
  1695. http://www.irongeek.com/
  1696. http://www.irongeek.com/
  1697. http://www.itstactical.com/
  1698. http://www.l0t3k.org/en/
  1699. http://www.ledge.co.za/software/lpinotes/
  1700. http://www.lightbluetouchpaper.org/
  1701. http://www.links.org/
  1702. http://www.liquidmatrix.org/blog/
  1703. http://www.lovemytool.com/
  1704. http://www.mckeay.net/
  1705. http://www.my80211.com/
  1706. http://www.neowin.net/forum/topic/934274-freeware-alternative-list/
  1707. http://www.net-security.org/
  1708. http://www.networkworld.com/topics/security.html
  1709. http://www.nowtheendbegins.com/blog/
  1710. http://www.nowtheendbegins.com/blog/?cat=4
  1711. http://www.nsa.gov/
  1712. http://www.offensivecomputing.net/ (moving to: http://openmalware.org/)
  1713. http://www.offensive-security.com/blog/
  1714. http://www.officer.com/latest-news
  1715. http://www.openrce.org/articles/
  1716. http://www.packetstormsecurity.org/
  1717. http://www.paranoidprose.com/
  1718. http://www.pgpboard.com/
  1719. http://www.pinewswire.net/
  1720. http://www.policemisconduct.net
  1721. http://www.prevx.com/blog.asp
  1722. http://www.rationalsurvivability.com/blog/
  1723. http://www.reddit.com/r/malware
  1724. http://www.reddit.com/r/reverseengineering
  1725. http://www.reversinglabs.com/blog
  1726. http://www.schneier.com/
  1727. http://www.scmagazine.com/the-data-breach-blog/section/1263/
  1728. http://www.seclist.us/
  1729. http://www.secsocial.com/blog/
  1730. http://www.securingthehuman.org/blog/
  1731. http://www.securitybsides.com
  1732. http://www.securityfocus.com/
  1733. http://www.securityfocus.com/archive
  1734. http://www.security-ray.com/
  1735. http://www.securitytracker.com/
  1736. http://www.securityweek.com/
  1737. http://www.sensepost.com/blog/
  1738. http://www.shellguardians.com/
  1739. http://www.shmoo.com/news/
  1740. http://www.shmoocon.org/
  1741. http://www.skullbox.net/index.php
  1742. http://www.social-engineer.org/framework/Social_Engineering_Framework
  1743. http://www.standalone-sysadmin.com/blog/
  1744. http://www.stratumsecurity.com/company/blog/
  1745. http://www.survivalblog.com/
  1746. http://www.symantec.com/business/security_response/weblog/
  1747. http://www.symantec.com/connect/security/blogs
  1748. http://www.sysadminblogs.com/planet/
  1749. http://www.sysforensics.org/
  1750. http://www.teamshatter.com/
  1751. http://www.techrepublic.com/blog/security
  1752. http://www.thedarkvisitor.com/
  1753. http://www.thedigitalstandard.blogspot.com/
  1754. http://www.theemailadmin.com/
  1755. http://www.thegeekstuff.com/
  1756. http://www.thegeekstuff.com/best-of-the-blog/
  1757. http://www.theintelligencenews.com/
  1758. http://www.theregister.co.uk/security/
  1759. http://www.thesecuritysamurai.com/
  1760. http://www.thetechherald.com/security
  1761. http://www.troyhunt.com/
  1762. http://www.trusteer.com/blog
  1763. http://www.whenisfive.com
  1764. http://www.wikileaks.org/
  1765. http://www.wired.com/about/blogs/
  1766. http://www.wired.com/dangerroom
  1767. http://www.wired.com/threatlevel/
  1768. http://www.wlanpros.com/
  1769. http://www.wmarkbrooks.com/
  1770. http://www.woodmann.com/forum/blog.php
  1771. http://www.wrgross.com/blogs/security/
  1772. http://www.wrgross.com/blogs/security/category/openbsd/
  1773. http://www.zdnet.com/blog/security/
  1774. http://www.zerodayinitiative.com/advisories/published/
  1775. http://www.zerodayinitiative.com/advisories/upcoming
  1776. (videos, leads to) http://www.irongeek.com/i.php?page=security/hackingillustrated

  1777. ----------------------------------------

  1778. ** 6006: Security Forums (Web based Discussion Forums)

  1779. http://cocoontech.com/forums/
  1780. http://forum.bitdefender.com
  1781. http://forum.prisonplanet.com
  1782. http://forums.avg.com/
  1783. http://forums.comodo.com/
  1784. http://forums.hak5.org/
  1785. http://forums.officer.com/forums/
  1786. http://forums.windowsecurity.com
  1787. http://glocktalk.com/forums/
  1788. http://hardforum.com/showthread.php?t=781545
  1789. http://homecommunity.cisco.com/
  1790. http://www.antionline.com/
  1791. http://www.ar15.com/forums/
  1792. http://www.backtrack-linux.org/forums
  1793. http://www.binrev.com/forums/
  1794. http://www.defencetalk.com/forums/
  1795. http://www.dslreports.com/forum/cleanup
  1796. http://www.dslreports.com/forum/scambusters
  1797. http://www.dslreports.com/forum/security
  1798. http://www.dslreports.com/forum/wsecurity
  1799. http://www.hex-rays.com/forum/
  1800. http://www.networking-forum.com/
  1801. http://www.sherdog.net/forums/
  1802. http://www.survivalistboards.com/
  1803. http://www.wilderssecurity.com/
  1804. http://www.wilderssecurity.com/showthread.php?t=242949
  1805. http://www.woodmann.com/forum/forum.php
  1806. ----------------------------------------

  1807. ** 6007: Security Magazines & Zines

  1808. http://about-threats.trendmicro.com/ebooks/
  1809. http://bsdmag.org/
  1810. http://chmag.in/
  1811. http://chmag.in/issue/all
  1812. http://commons.oreilly.com/wiki/index.php/O%27Reilly_Commons
  1813. http://gonullyourself.com/ezines/
  1814. http://gonullyourself.com/zine/
  1815. http://hakin9.org/
  1816. http://linuxformat.com/
  1817. http://magazine.hackinthebox.org/
  1818. http://magazine.hitb.org/
  1819. http://secureviewmag.com/
  1820. https://www.net-security.org/insecuremag.php
  1821. http://ubuntupocketguide.com/index_main.html
  1822. http://www.2600.com/
  1823. http://www.admin-magazine.com/
  1824. http://www.dwheeler.com/secure-programs/
  1825. http://www.linuxpromagazine.com/
  1826. http://www.linuxuser.co.uk/
  1827. http://www.phrack.com/
  1828. http://www.textfiles.com/ (RE: https://en.wikipedia.org/wiki/Textfiles.com)
  1829. http://www.thegeekstuff.com/linux-101-hacks-ebook/
  1830. http://www.uninformed.org/
  1831. ----------------------------------------

  1832. ** 6008: Linux Anti-Malware Scanners

  1833. See Also: 6003: Antivirus LiveCDs - boot and scan your system for malware

  1834. + Avast:
  1835. http://www.avast.com/linux-home-edition

  1836. + AVG:
  1837. http://free.avg.com/ww-en/download.prd-alf.tpl-stdfull

  1838. + Bitdefender:
  1839. http://www.bitdefender.com/media/html/en/unicesportal/
  1840. http://www.bitdefender.com/business/antivirus-for-unices.html
  1841. http://unices.bitdefender.com
  1842. http://www.bitdefender.com/support/Bitdefender-for-Linux-manual-updates-224.html

  1843. ++ Bitdefender repos (may be older than version obtainable above via registration & email):
  1844. http://download.bitdefender.com/repos/deb/
  1845. http://download.bitdefender.com/repos/rpm/

  1846. + ClamAV:
  1847. http://www.clamav.net/
  1848. http://sourceforge.net/projects/clamav/

  1849. + ClamTk is a GUI front-end for ClamAV
  1850. http://clamtk.sourceforge.net/
  1851. http://sourceforge.net/projects/clamtk/

  1852. + Collage:
  1853. http://gtnoise.net/projects/7-anti-censorship/7-collage-defeating-censorship-with-user-generated-content

  1854. + Comodo Antivirus for Linux (CAVL):
  1855. http://forums.comodo.com/comodo-antivirus-for-linux-cavl/comodo-antivirus-for-linux-cavl-v102398181-is-formally-released-t85030.0.html
  1856. http://forums.comodo.com/comodo-antivirus-for-linux-cavl-b275.0/

  1857. + Coroner's Toolkit, The:
  1858. http://www.porcupine.org/forensics/tct.html

  1859. + F-PROT:
  1860. http://www.f-prot.com/download/home_user/download_fplinux.html

  1861. + F-PROT FRONT-END: QtFprot is a frontend for FPROT 4.x, a free (for personal use) Linux virus-scanner
  1862. http://freecode.com/projects/qtfprot

  1863. + F-PROT FRONT-END: XFPROT is a graphical frontend for the F-Prot Antivirus for Linux Small Business Edition.
  1864. http://freecode.com/projects/xfprot
  1865. http://web.tiscali.it/sharp/xfprot/

  1866. ----------------------------------------

  1867. ** 6009: Linux Security
  1868. --------------
  1869. * 6009.1: Linux Articles (a few of these aren't security related and will eventually be moved to a new section):
  1870. ---------------
  1871. http://alien.slackbook.org/dokuwiki/doku.php?id=slackware:parentalcontrol
  1872. http://ask.slashdot.org/story/05/07/20/1457252/network-intrusion-detection-and-prevention
  1873. http://csrc.nist.gov/
  1874. http://csrc.nist.gov/publications/PubsSPs.html
  1875. http://doc.opensuse.org/documentation/html/openSUSE_113/opensuse-apps/cha.crypto.html
  1876. http://doc.opensuse.org/documentation/html/openSUSE_113/opensuse-apps/cha.gnome.crypto.html
  1877. http://emergingthreats.net/
  1878. http://en.gentoo-wiki.com/wiki/HOWTO_Iptables_for_newbies
  1879. http://freeworld.thc.org/papers/anonymous-unix.html
  1880. http://honeypots.sourceforge.net/modified_script.html
  1881. http://it.slashdot.org/story/05/04/19/232230/bastille-adds-reporting-grabs-fed-attention
  1882. http://it.slashdot.org/story/06/03/14/1842248/pgp-creators-zfone-encrypts-voip
  1883. http://linuxblog.darkduck.com/
  1884. http://linuxgazette.net/121/anonymous.html
  1885. http://linux-ip.net/html/ether-arp.html
  1886. http://linuxpoison.blogspot.com/2008/01/howto-check-disk-drive-for-errors-and.html
  1887. http://netwizards.co.uk/installing-tripwire-on-ubuntu/
  1888. http://nmap.org/book/osdetect.html
  1889. http://nmap.org/book/toc.html
  1890. http://ornellas.apanela.com/dokuwiki/pub:firewall_and_adv_routing
  1891. http://penguininside.blogspot.se/2009/09/10-panel-dock-applications-for-your.html
  1892. http://people.redhat.com/pvrabec/openscap/guide.html
  1893. http://planet.netfilter.org/
  1894. http://project.honeynet.org/papers/individual/
  1895. http://project.honeynet.org/papers/kye.html
  1896. http://projects.gnome.org/gdm/docs/2.14/configuration.html
  1897. http://psychocats.net/ubuntu/index.php
  1898. https://delightlylinux.wordpress.com/
  1899. https://delightlylinux.wordpress.com/2012/06/14/secure-delete/
  1900. http://securitywatch.eweek.com/rootkits/rootkits_on_a_pci_card.html
  1901. https://fedoraproject.org/wiki/DocsProject/UsingGpg/CreatingKeys
  1902. https://fedoraproject.org/wiki/How_to_create_and_use_a_Live_CD
  1903. https://fedoraproject.org/wiki/How_to_create_and_use_Live_USB
  1904. https://fedoraproject.org/wiki/JeroenVanMeeuwen/Revisor/FedoraRebrandRemixGuidelines
  1905. https://help.ubuntu.com/community/EncryptedPrivateDirectory
  1906. https://help.ubuntu.com/community/FileIntegrityAIDE
  1907. https://help.ubuntu.com/community/GnuPrivacyGuardHowto
  1908. https://help.ubuntu.com/community/LinuxLogFiles
  1909. https://help.ubuntu.com/community/Logwatch
  1910. https://help.ubuntu.com/community/StricterDefaults
  1911. https://secure.wikimedia.org/wikibooks/en/wiki/Grsecurity/Appendix/Grsecurity_and_PaX_Configuration_Options
  1912. https://wiki.debian.org/
  1913. https://wiki.debian.org/iptables
  1914. https://wiki.debian.org/SecureApt
  1915. https://wiki.debian.org/SystemAdministration
  1916. https://wiki.ubuntu.com/
  1917. https://wiki.ubuntu.com/BasicSecurity
  1918. https://wiki.ubuntu.com/BasicSecurity/DidIJustGetOwned
  1919. https://wiki.ubuntu.com/Security/Features
  1920. https://www.cert.org/tech_tips/unix_configuration_guidelines.html
  1921. https://www.cs.arizona.edu/stork/packagemanagersecurity/faq.html
  1922. https://www.ibm.com/developerworks/linux/library/l-proc/index.html
  1923. https://www.ibm.com/developerworks/linux/tutorials/l-lockdown1/
  1924. https://www.ibm.com/developerworks/linux/tutorials/l-lockdown2/index.html
  1925. https://www.linux.com/
  1926. https://www.linux.com/learn/tutorials/456149-manage-passwords-encryption-keys-and-more-with-seahorse
  1927. https://www.linuxquestions.org/questions/linux-security-4/security-references-45261/
  1928. https://www.owasp.org
  1929. https://www.sans.org/reading_room/
  1930. https://www.schneier.com/crypto-gram.html
  1931. http://tldp.org/HOWTO/AX25-HOWTO/index.html
  1932. http://tldp.org/HOWTO/Secure-Programs-HOWTO/buffer-overflow.html
  1933. http://tldp.org/LDP/nag2/index.html
  1934. http://trac.secdev.org/scapy/wiki/IdentifyingRogueDHCPServers
  1935. http://web.archive.org/web/20040215020827/http://www.linux-mag.com/2003-09/acls_01.html
  1936. http://web.archive.org/web/20041031074320/http://sun.soci.niu.edu/~rslade/secgloss.htm
  1937. http://web.archive.org/web/20041125131921/http://tips.linux.com/tips/04/11/23/2022252.shtml?tid=100&tid=47&tid=35
  1938. http://web.archive.org/web/20041231085409/http://www.cs.auckland.ac.nz/~pgut001/links.html
  1939. http://web.archive.org/web/20050306035558/http://www.spitzner.net/linux.html
  1940. http://web.archive.org/web/20060712182215/http://linuxgazette.net/128/saha.html
  1941. http://web.archive.org/web/20090109020415/http://www.securityfocus.com/print/infocus/1414
  1942. http://web.archive.org/web/20100529035423/http://www.cert.org/current/services_ports.html
  1943. http://wiki.centos.org/HowTos/Network/IPTables
  1944. http://winhelp2002.mvps.org/hosts.htm
  1945. http://www.acsu.buffalo.edu/~charngda/elf.html
  1946. http://www.alwanza.com/howTo/linux/tripwire.html
  1947. http://www.bitbull.ch/wiki/index.php/Hacking_Notes
  1948. http://www.bitbull.ch/wiki/index.php/Linux_Short_Reference
  1949. http://www.brandonhutchinson.com/iptables_fw.html
  1950. http://www.codeproject.com/KB/cpp/shared_object_injection_1.aspx#brief_elf_str_code1
  1951. http://www.cromwell-intl.com/security/intrusion-analysis/
  1952. http://www.cryptovirology.com/cryptovfiles/cryptovirologyfaqver1.html#whatiscryptoviralextortion
  1953. http://www.cs.arizona.edu/stork/packagemanagersecurity/faq.html
  1954. http://www.cs.wright.edu/~pmateti/Courses/233/Labs/OS-on-USB/OSonUSBLabKnoppix671DVD.html
  1955. http://www.cs.wright.edu/~pmateti/InternetSecurity/Lectures/BufferOverflow/alephOne.html
  1956. http://www.cs.wright.edu/~pmateti/InternetSecurity/Lectures/Fortification/obrien.html
  1957. http://www.cs.wright.edu/~pmateti/InternetSecurity/Lectures/Probing/How%20to%20Handle%20Network%20Probes.htm
  1958. http://www.cyberciti.biz/
  1959. http://www.cyberciti.biz/faq/add-remove-list-linux-kernel-modules/
  1960. http://www.cyberciti.biz/faq/how-to-detect-arp-spoofing-under-unix-or-linux/
  1961. http://www.cyberciti.biz/hardware/linux-iotop-simple-top-like-io-monitor/
  1962. http://www.cyberciti.biz/tips/howto-log-user-activity-using-process-accounting.html
  1963. http://www.cyberciti.biz/tips/iptables-mac-address-filtering.html
  1964. http://www.cyberciti.biz/tips/linux-iptables-10-how-to-block-common-attack.html
  1965. http://www.cyberciti.biz/tips/linux-iptables-8-how-to-avoid-spoofing-and-bad-addresses-attack.html
  1966. http://www.cyberciti.biz/tips/linux-security.html
  1967. http://www.cyberciti.biz/tips/linux-unix-windows-find-hidden-processes-tcp-udp-ports.html
  1968. http://www.cyberciti.biz/tips/top-linux-monitoring-tools.html
  1969. http://www.debianadmin.com/
  1970. http://www.debianadmin.com/filesystem-encryption-tools-for-linux.html
  1971. http://www.debian-administration.org/
  1972. http://www.debian-administration.org/articles/49
  1973. http://www.debian.org/doc/
  1974. http://www.debian.org/doc/manuals/
  1975. http://www.debian.org/doc/manuals/securing-debian-howto/
  1976. http://www.debian.org/doc/manuals/securing-debian-howto/ch-sec-services.en.html#s-firewall-setup
  1977. http://www.debian.org/events/keysigning
  1978. http://www.debuntu.org/intrusion-detection-with-aide
  1979. http://www.desktoplinux.com/articles/AT3341468184.html
  1980. http://www.desktoplinux.com/articles/AT7966076367.html
  1981. http://www.dshield.org/diary.html?storyid=13057
  1982. http://www.exploit-db.com/
  1983. http://www.faqs.org/docs/Linux-HOWTO/User-Authentication-HOWTO.html
  1984. http://www.gentoo.org/doc/en/gnupg-user.xml
  1985. http://www.hackinglinuxexposed.com/articles/
  1986. http://www.hackinglinuxexposed.com/articles/20030703.html
  1987. http://www.hackinglinuxexposed.com/articles/20030709.html
  1988. http://www.howtoforge.com/intrusion_detection_base_snort
  1989. http://www.ibiblio.org/pub/Linux/docs/HOWTO/other-formats/html_single/Disk-Encryption-HOWTO.html
  1990. http://www.ibm.com/developerworks/aix/library/au-aix-manage-ruby/index.html
  1991. http://www.ibm.com/developerworks/aix/library/au-speakingunix10/index.html
  1992. http://www.ibm.com/developerworks/aix/library/au-speakingunix11/index.html
  1993. http://www.ibm.com/developerworks/aix/library/au-speakingunix12/index.html
  1994. http://www.ibm.com/developerworks/aix/library/au-speakingunix13/index.html
  1995. http://www.ibm.com/developerworks/aix/library/au-speakingunix2.html
  1996. http://www.ibm.com/developerworks/aix/library/au-speakingunix3.html
  1997. http://www.ibm.com/developerworks/aix/library/au-speakingunix4/index.html
  1998. http://www.ibm.com/developerworks/aix/library/au-speakingunix5.html
  1999. http://www.ibm.com/developerworks/aix/library/au-speakingunix6.html
  2000. http://www.ibm.com/developerworks/aix/library/au-speakingunix7.html
  2001. http://www.ibm.com/developerworks/aix/library/au-speakingunix8/index.html
  2002. http://www.ibm.com/developerworks/aix/library/au-speakingunix9/index.html
  2003. http://www.ibm.com/developerworks/aix/library/au-spunix_greattools/index.html
  2004. http://www.ibm.com/developerworks/aix/library/au-unix-commandline/index.html
  2005. http://www.ibm.com/developerworks/library/l-keyc2/
  2006. http://www.ibm.com/developerworks/library/l-keyc3/
  2007. http://www.ibm.com/developerworks/library/l-keyc/index.html
  2008. http://www.ibm.com/developerworks/linux/library/l-livecdsec/?ca=dgr-lnxw07SecurityLiveCD
  2009. http://www.justlinux.com/nhf/Security/IPtables_Basics.html
  2010. http://www.la-samhna.de/library/rootkits/index.html
  2011. http://www.ledge.co.za/software/lpinotes/
  2012. http://www.linuxbsdos.com/2011/05/10/how-to-install-ubuntu-11-04-on-an-encrypted-lvm-file-system/
  2013. http://www.linuxforums.org/articles/understanding-elf-using-readelf-and-objdump_125.html
  2014. http://www.linuxhomenetworking.com/
  2015. http://www.linuxhomenetworking.com/wiki/index.php/Quick_HOWTO_:_Ch14_:_Linux_Firewalls_Using_iptables
  2016. http://www.linuxjournal.com/
  2017. http://www.linux.org/
  2018. http://www.linuxplanet.com/linuxplanet/tutorials/4505/1
  2019. http://www.linuxsecurity.com
  2020. http://www.linuxsecurity.com/
  2021. http://www.linuxsecurity.com/content/view/117644/49/
  2022. http://www.linuxsecurity.com/content/view/118211/49/
  2023. http://www.linuxsecurity.com/content/view/119415/49/
  2024. http://www.linuxsecurity.com/docs/colsfaq.html
  2025. http://www.livecdlist.com/
  2026. http://www.madboa.com/geek/gpg-quickstart/
  2027. http://www.madboa.com/geek/openssl/#digest-file
  2028. http://www.madboa.com/geek/pine-ssl/
  2029. http://www.netfilter.org/documentation/
  2030. http://www.novell.com/communities/node/4971/detecting-arp-poisoning-attacks
  2031. http://www.phrack.com/issues.html?issue=58&id=7#article
  2032. http://www.phrack.org/issues.html?issue=68&id=9#article
  2033. http://www.porcupine.org/forensics/column.html
  2034. http://www.psychocats.net/ubuntu/minimal
  2035. http://www.securityfocus.com/firewalls
  2036. http://www.securityfocus.com/ids
  2037. http://www.securityfocus.com/incidents
  2038. http://www.securityfocus.com/unix
  2039. http://www.seifried.org/security/ids/20020107-honeypot-vmware-basics.html
  2040. http://www.symantec.com/connect/articles/alien-autopsy-reverse-engineering-win32-trojans-linux
  2041. http://www.symantec.com/connect/articles/detecting-and-removing-malicious-code
  2042. http://www.symantec.com/connect/articles/detecting-rootkits-and-kernel-level-compromises-linux
  2043. http://www.symantec.com/connect/articles/forensic-analysis-live-linux-system-pt-1
  2044. http://www.symantec.com/connect/articles/forensic-analysis-live-linux-system-pt-2
  2045. http://www.symantec.com/connect/articles/hacker-tools-and-their-signatures-part-three-rootkits
  2046. http://www.symantec.com/connect/articles/hardening-tcpip-stack-syn-attacks
  2047. http://www.symantec.com/connect/articles/host-integrity-monitoring-best-practices-deployment
  2048. http://www.symantec.com/connect/articles/reverse-engineering-hostile-code
  2049. http://www.symantec.com/connect/articles/sniffers-what-they-are-and-how-protect-yourself
  2050. http://www.symantec.com/connect/topics/security/securityfocus
  2051. http://www.techrepublic.com/article/10-things-you-should-do-to-a-new-linux-pc-before-exposing-it-to-the-internet/5987648
  2052. http://www.thc.org/
  2053. http://www.thc.org/papers/fw-backd.htm
  2054. http://www.thegeekstuff.com/2010/03/netstat-command-examples/
  2055. http://www.thegeekstuff.com/2010/11/50-linux-commands/
  2056. http://www.thegeekstuff.com/2010/12/50-unix-linux-sysadmin-tutorials/
  2057. http://www.thegeekstuff.com/2011/06/iptables-rules-examples/
  2058. http://www.thegeekstuff.com/2011/12/linux-performance-monitoring-tools/
  2059. http://www.tldp.org/HOWTO/Encrypted-Root-Filesystem-HOWTO/
  2060. http://www.tldp.org/HOWTO/Linux%2BIPv6-HOWTO/index.html
  2061. http://www.tracking-hackers.com/misc/faq.html
  2062. http://www.ubuntugeek.com/tools-to-delete-files-securely-in-ubuntu-linux.html
  2063. http://www.unixwiz.net/techtips/iguide-crypto-hashes.html
  2064. http://www.whenisfive.com/tutorials/tor-polipo-5-minute-install-guide-ubuntu-11-0411-10/
  2065. http://www.yolinux.com/TUTORIALS/LinuxSecurityTools.html
  2066. (multicd script) http://multicd.tuxfamily.org/
  2067. (multicd script related) http://ubuntuforums.org/showthread.php?t=1071869
  2068. (PDF) http://csrc.nist.gov/publications/nistir/7316/NISTIR-7316.pdf
  2069. (PDF) http://csrc.nist.gov/publications/nistpubs/800-84/SP800-84.pdf
  2070. (PDF) http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdf
  2071. (PDF) http://events.ccc.de/congress/2006/Fahrplan/attachments/1167-SpeakingAnonymously.pdf
  2072. (PDF) http://web.archive.org/web/20070717124745/http://www.tldp.org/linuxfocus/English/Archives/lf-2003_01-0278.pdf
  2073. (PDF) http://www.linux-magazine.com/issue/01/File_Permissions.pdf
  2074. (PDFs) http://www.nsa.gov/ia/mitigation_guidance/security_configuration_guides/operating_systems.shtml

  2075. --------------------
  2076. * 6009.2: Linux Security Tools
  2077. (the intention here is not to list everything, hence the link to BackTrack which
  2078. contains a number of useful tools which could otherwise be linked here.)
  2079. --------------------

  2080. ++ SecTools.Org: Top 125 Network Security Tools
  2081. http://sectools.org/

  2082. + AIDE:
  2083. http://sourceforge.net/projects/aide/
  2084. http://sourceforge.net/projects/aide
  2085. http://freecode.com/projects/aide

  2086. + AppArmor:
  2087. http://wiki.apparmor.net/index.php/Main_Page
  2088. http://www.linux-magazine.com/Issues/2006/69/AppArmor-vs.-SELinux
  2089. (PDF) http://www.linux-magazine.com/content/download/63096/487061/file/AppArmor_vs_SELinux.pdf
  2090. https://lkml.org/lkml/2006/4/19/199

  2091. + BackTrack Linux (contains MANY tools)
  2092. http://www.backtrack-linux.org/

  2093. + Bastille:
  2094. http://bastille-linux.sourceforge.net/

  2095. + Baudline:
  2096. http://www.baudline.com/
  2097. https://en.wikipedia.org/wiki/Baudline

  2098. + BleachBit:
  2099. http://bleachbit.sourceforge.net/
  2100. http://sourceforge.net/projects/bleachbit/

  2101. + BotHunter:
  2102. http://www.bothunter.net/

  2103. + Cacti
  2104. http://www.cacti.net/

  2105. + Chkrootkit:
  2106. https://en.wikipedia.org/wiki/Chkrootkit
  2107. http://freecode.com/projects/chkrootkit
  2108. (not directly linking to official site url because it's been up/down)
  2109. (the past few weeks)

  2110. + Combofix:
  2111. http://www.combofix.org/

  2112. + Cuckoo Sandbox:
  2113. http://www.cuckoosandbox.org/

  2114. + Dan's Guardian:
  2115. http://dansguardian.org/

  2116. + DBAN (Darik's Boot and Nuke):
  2117. http://www.dban.org/
  2118. http://sourceforge.net/projects/dban/

  2119. + DDRescue:
  2120. https://www.gnu.org/software/ddrescue/ddrescue.html

  2121. + debsecan:
  2122. http://www.enyo.de/fw/software/debsecan/

  2123. + Deny Hosts:
  2124. http://denyhosts.sourceforge.net/

  2125. + DNSCrypt
  2126. https://www.opendns.com/technology/dnscrypt/
  2127. https://blog.opendns.com/2012/02/16/tales-from-the-dnscrypt-linux-rising/
  2128. https://github.com/opendns/dnscrypt-proxy/blob/master/README.markdown
  2129. https://github.com/opendns/dnscrypt-proxy

  2130. + DNSTop:
  2131. http://dns.measurement-factory.com/tools/dnstop/

  2132. + EckBox:
  2133. http://eckbox.sourceforge.net
  2134. (offsite article): http://blockyourid.com/~gbpprorg/mil/eckbox/index.html

  2135. + Enigmail - a security extension to Mozilla Thunderbird and Seamonkey:
  2136. http://www.enigmail.net/home/index.php

  2137. + Enscribe:
  2138. http://www.coppercloudmusic.com/enscribe/
  2139. http://freecode.com/projects/enscribe
  2140. (old) http://web.archive.org/web/20060712151452/http://jbd.zayda.net/enscribe/

  2141. + FakeAP
  2142. http://blackalchemy.to/project/fakeap/

  2143. + Foremost:
  2144. http://foremost.sourceforge.net/

  2145. + GNUPG (GPG):
  2146. http://www.gnupg.org/
  2147. http://www.gnupg.org/related_software/frontends.en.html
  2148. http://www.gnupg.org/related_software/gpa/index.en.html
  2149. http://utils.kde.org/projects/kgpg/

  2150. + Honeypots (The Honeynet Project):
  2151. http://project.honeynet.org/tools/index.html

  2152. + HTTPS Everywhere (Firefox and Chrome extension):
  2153. https://www.eff.org/https-everywhere

  2154. + IPTraf:
  2155. http://iptraf.seul.org/
  2156. http://freecode.com/projects/iptraf

  2157. + Jhead:
  2158. http://www.sentex.net/~mwandel/jhead/
  2159. http://freecode.com/projects/jhead

  2160. + John The Ripper:
  2161. http://www.openwall.com/john/

  2162. + Linux Kernel Archives:
  2163. https://www.kernel.org/

  2164. + Kismet:
  2165. https://kismetwireless.net/
  2166. http://freecode.com/projects/kismet

  2167. + LaBrea:
  2168. http://labrea.sourceforge.net/

  2169. + Liberté Linux (uses Tor):
  2170. http://dee.su/liberte

  2171. + libemu (x86 Shellcode Emulation):
  2172. http://libemu.carnivore.it/

  2173. + Lynis (Security and system auditing tool):
  2174. http://www.rootkit.nl/projects/lynis.html
  2175. https://en.wikipedia.org/wiki/Lynis
  2176. http://freecode.com/projects/lynis

  2177. + Mac Changer:
  2178. http://www.alobbs.com/macchanger

  2179. + MAT - Metadata Anonymisation Toolkit:
  2180. https://mat.boum.org/

  2181. + md5deep and hashdeep: (md5deep is a set of programs to compute MD5, SHA-1, SHA-256, Tiger, or Whirlpool message digests on an arbitrary number of files.)
  2182. (hashdeep is a program to compute, match, and audit hashsets.)
  2183. http://md5deep.sourceforge.net/
  2184. http://sourceforge.net/projects/md5deep/

  2185. + MCrypt:
  2186. http://mcrypt.sourceforge.net/
  2187. http://sourceforge.net/projects/mcrypt/

  2188. + Monkeysphere:
  2189. http://web.monkeysphere.info/

  2190. + Nemesis:
  2191. http://nemesis.sourceforge.net/

  2192. + Nessus:
  2193. http://www.nessus.org/

  2194. + Network Monitoring Tools @ Stanford.edu:
  2195. http://www.slac.stanford.edu/xorg/nmtf/nmtf-tools.html

  2196. + Ninite:
  2197. https://ninite.com/

  2198. + NGrep:
  2199. http://ngrep.sourceforge.net/

  2200. + NMap:
  2201. http://nmap.org/download.html

  2202. + NoMachine NX:
  2203. http://nomachine.com/

  2204. + NoScript (Firefox Extension)
  2205. https://addons.mozilla.org/en-US/firefox/addon/noscript/

  2206. + NTop:
  2207. http://www.ntop.org/
  2208. http://freecode.com/projects/ntop

  2209. + OphCrack:
  2210. http://ophcrack.sourceforge.net/

  2211. + OpenSSH:
  2212. http://www.openssh.com/

  2213. + OpenSSL:
  2214. http://www.openssl.org/

  2215. + Openwall:
  2216. http://www.openwall.com/

  2217. + OSSEC:
  2218. http://www.ossec.net/

  2219. + PhotoRec:
  2220. http://www.cgsecurity.org/wiki/PhotoRec

  2221. + Polipo (Proxy commonly associated with Tor and TAILS):
  2222. http://freecode.com/projects/polipo

  2223. + Rootkits:
  2224. http://packetstormsecurity.org/UNIX/penetration/rootkits/

  2225. + Rkhunter:
  2226. https://en.wikipedia.org/wiki/Rkhunter
  2227. http://rkhunter.sourceforge.net/
  2228. (old) http://www.rootkit.nl/projects/rootkit_hunter.html

  2229. + Scapy:
  2230. http://www.secdev.org/projects/scapy/

  2231. + Seahorse:
  2232. http://projects.gnome.org/seahorse/

  2233. + Secure-Delete:
  2234. http://freeworld.thc.org/releases/secure_delete-3.1.tar.gz
  2235. http://packages.ubuntu.com/search?keywords=secure+delete

  2236. + Skipfish:
  2237. https://code.google.com/p/skipfish/

  2238. + Sleuth Kit (TSK) & Autopsy:
  2239. http://www.sleuthkit.org/
  2240. http://sourceforge.net/projects/sleuthkit/

  2241. + SNARE:
  2242. http://sourceforge.net/projects/snare/

  2243. + Snort
  2244. http://www.snort.org/

  2245. + socat:
  2246. http://www.dest-unreach.org/socat/

  2247. + Sophos Linux/RST-B detection tool:
  2248. http://www.sophos.com/rst-detection-tool

  2249. + srm - secure file deletion:
  2250. http://srm.sourceforge.net/
  2251. http://sourceforge.net/projects/srm/
  2252. http://freecode.com/projects/srm

  2253. + SSDeep:
  2254. http://ssdeep.sourceforge.net/

  2255. + SSHMenu:
  2256. http://sshmenu.sourceforge.net/

  2257. + SSLStrip:
  2258. http://www.thoughtcrime.org/software/sslstrip/index.html

  2259. + SSSS (Shamir's Secret Sharing Scheme):
  2260. http://point-at-infinity.org/ssss/

  2261. + Stegdetect:
  2262. http://www.outguess.org/detection.php
  2263. http://freecode.com/projects/stegdetect

  2264. + Steghide:
  2265. http://steghide.sourceforge.net/
  2266. http://www.freecode.com/projects/steghide

  2267. + Suricata:
  2268. http://www.openinfosecfoundation.org/
  2269. http://www.openinfosecfoundation.org/index.php/download-suricata

  2270. + Switzerland (Network Testing Tool):
  2271. https://www.eff.org/pages/switzerland-network-testing-tool

  2272. + System Rescue CD:
  2273. http://www.sysresccd.org/

  2274. + Tails LiveCD (uses Tor):
  2275. https://tails.boum.org/

  2276. + Tempest for Eliza
  2277. http://www.erikyyy.de/tempest/

  2278. + Tiger - Unix security audit and intrusion detection tool:
  2279. http://nongnu.org/tiger/

  2280. + Tiger - Cryptographic Hash Function:
  2281. http://www.cs.technion.ac.il/~biham/Reports/Tiger/

  2282. + Tor:
  2283. http://metrics.torproject.org/
  2284. https://blog.torproject.org/blog/
  2285. https://bridges.torproject.org/
  2286. https://check.torproject.org/
  2287. https://lists.torproject.org/
  2288. https://weather.torproject.org/
  2289. https://www.torproject.org/
  2290. https://www.torproject.org/about/overview.html.en
  2291. https://www.torproject.org/docs/documentation.html.en
  2292. https://www.torproject.org/download/download-easy.html.en
  2293. https://www.torproject.org/press/press.html.en
  2294. https://www.torproject.org/projects/projects.html.en
  2295. https://www.torproject.org/torbutton/
  2296. https://www.torproject.org/vidalia/

  2297. + Tor Chat2:
  2298. https://github.com/prof7bit/TorChat
  2299. https://github.com/prof7bit/TorChat/downloads
  2300. (old/original) https://code.google.com/p/torchat/

  2301. + Tor Stats:
  2302. http://torstatus.blutmagie.de/

  2303. + Tripwire:
  2304. https://en.wikipedia.org/wiki/Open_Source_Tripwire
  2305. http://sourceforge.net/projects/tripwire/

  2306. + TrueCrypt:
  2307. http://www.truecrypt.org/
  2308. http://www.truecrypt.org/docs/
  2309. http://www.truecrypt.org/downloads
  2310. http://www.truecrypt.org/news
  2311. http://forums.truecrypt.org/

  2312. + VOIP Hopper:
  2313. http://voiphopper.sourceforge.net/

  2314. + Volatility Framework
  2315. https://www.volatilesystems.com/default/volatility#overview
  2316. https://code.google.com/p/volatility/w/list
  2317. http://lists.volatilesystems.com/mailman/listinfo

  2318. + WarVOX:
  2319. http://warvox.org/

  2320. + Webmin:
  2321. http://www.webmin.com/

  2322. + Whirlpool - a cryptographic hash function:
  2323. https://en.wikipedia.org/wiki/Whirlpool_%28cryptography%29
  2324. http://www.larc.usp.br/~pbarreto/WhirlpoolPage.html

  2325. + Wipe:
  2326. http://wipe.sourceforge.net/

  2327. + Wireshark:
  2328. https://www.wireshark.org/

  2329. + Yersinia:
  2330. http://www.yersinia.net/

  2331. + Zfone
  2332. http://zfoneproject.com/
  2333. https://en.wikipedia.org/wiki/Zfone
  2334. ----------------------------------------

  2335. * 6009.3: Linux Various+
  2336. (most are not directly security related)
  2337. --------------------
  2338. http://appdb.winehq.org/
  2339. http://blogs.valvesoftware.com/linux/steamd-penguins/
  2340. http://distrowatch.com/
  2341. http://frankscorner.org/
  2342. http://lbproject.sourceforge.net/
  2343. http://linuxgazette.net/
  2344. http://linux.slashdot.org/
  2345. http://linux.sys-con.com/
  2346. http://lxer.com/
  2347. http://olpcnews.com/
  2348. http://oreilly.com/linux/
  2349. http://osdir.com/
  2350. http://packetstormsecurity.org/
  2351. http://planet.debian.org/
  2352. http://planet.gentoo.org/
  2353. http://planet.ubuntu.com/
  2354. https://lwn.net/
  2355. https://wiki.ubuntu.com/UbuntuWeeklyNewsletter/
  2356. https://www.kernel.org/
  2357. https://www.linux.com/
  2358. http://techrights.org/wiki/index.php/Main_Page
  2359. http://tllts.org/
  2360. http://ubuntupocketguide.com/index_main.html
  2361. http://wine-review.blogspot.com/
  2362. http://www.codeweavers.com/
  2363. http://www.gnu.org/philosophy/
  2364. http://www.linuxformat.com/
  2365. http://www.linuxjournal.com/
  2366. http://www.linux-magazine.com/
  2367. http://www.linux-mag.com/
  2368. http://www.linux.org/
  2369. http://www.linuxpromagazine.com/
  2370. http://www.linuxsecurity.com/
  2371. http://www.linuxtag.org
  2372. http://www.linuxuser.co.uk/
  2373. http://www.mail-archive.com/funsec@linuxbox.org/
  2374. http://www.osnews.com/
  2375. http://www.playonlinux.com/en
  2376. http://www.thegeekstuff.com/linux-101-hacks-ebook/
  2377. http://www.tuxarena.com/
  2378. http://www.winehq.org/
  2379. http://www.wine-reviews.net/
  2380. (in limbo?) http://www.desktoplinux.com/news/

  2381. ----------------------------------------
  2382. ** 6010: Windows Security (that's a joke) Tools:

  2383. + Attack Surface Analyzer
  2384. https://www.microsoft.com/en-us/download/details.aspx?id=24487

  2385. + Flame Removal Tool (32 & 64bit versions):
  2386. http://labs.bitdefender.com/2012/5/cyber-espionage-reaches-new-levels-with-flamer/

  2387. + GNUPG (GPG):
  2388. http://www.gnupg.org/
  2389. http://www.gnupg.org/related_software/frontends.en.html
  2390. https://code.google.com/p/cryptophane/

  2391. + MobaXterm:
  2392. http://mobaxterm.mobatek.net/
  2393. http://mobaxterm.mobatek.net/download-home-edition
  2394. http://mobaxterm.mobatek.net/download.html

  2395. + PhotoRec:
  2396. http://www.cgsecurity.org/wiki/PhotoRec

  2397. + PuTTY:
  2398. https://en.wikipedia.org/wiki/PuTTY

  2399. + SNARE:
  2400. http://sourceforge.net/projects/snare/

  2401. + TDSSKiller Anti-Rootkit Tool:
  2402. http://support.kaspersky.com/faq/?qid=208283363

  2403. + WinSCP:
  2404. https://en.wikipedia.org/wiki/WinSCP

  2405. + Zfone
  2406. http://zfoneproject.com/
  2407. https://en.wikipedia.org/wiki/Zfone

  2408. (Archive/Alive) https://www.techsupportalert.com/content/probably-best-free-security-list-world.htm
  2409. (Article, DOC) http://msdn.microsoft.com/en-us/windows/hardware/gg487309
  2410. (Article) http://resources.infosecinstitute.com/tuluka/
  2411. (Article) https://social.technet.microsoft.com/wiki/contents/articles/942.hyper-v-how-to-detect-if-a-computer-is-a-vm-using-script.aspx
  2412. (Article) http://technet.microsoft.com/library/gg176673.aspx?ITPID=sprblog
  2413. (Article) http://technet.microsoft.com/library/gg176676.aspx?ITPID=sprblog
  2414. (Article) http://www.symantec.com/connect/articles/alien-autopsy-reverse-engineering-win32-trojans-linux
  2415. (Article/Wiki) https://en.wikipedia.org/wiki/Comparison_of_SSH_clients
  2416. (Discontinued Magazine / File downloads) http://www.magnesiummedia.com/pcutilities/
  2417. (doc, leads to ) https://www.microsoft.com/en-us/download/details.aspx?id=24373
  2418. (doc, leads to ) https://www.microsoft.com/en-us/download/details.aspx?id=3118
  2419. (docx, leads to) https://www.microsoft.com/en-us/download/details.aspx?id=20092
  2420. (Forum) https://www.microsoft.com/communities/forums/default.mspx
  2421. (Forum) http://www.sevenforums.com/
  2422. (Forum) http://www.w7forums.com/
  2423. (PDFs) http://www.nsa.gov/ia/mitigation_guidance/security_configuration_guides/operating_systems.shtml
  2424. (Spreadsheet xlsx, leads to) https://www.microsoft.com/en-us/download/details.aspx?id=19990
  2425. (Tutorial) Creating a Steady State by Using Microsoft Technologies / Windows 7 - Part 1/3
  2426. (Tutorial) Creating a Steady State by Using Microsoft Technologies / Windows 7 - Part 2/3
  2427. (Tutorial) Creating a Steady State by Using Microsoft Technologies / Windows 7 - Part 3/3
  2428. (Tutorial) mechBgon's guide 1/3 http://www.mechbgon.com/build/router.html
  2429. (Tutorial) mechBgon's guide 2/3 http://www.mechbgon.com/build/security1.html
  2430. (Tutorial) mechBgon's guide 3/3 http://www.mechbgon.com/build/security2.html
  2431. --------------------------------------------------------------------------------
  2432. This is the end of HUGE Security Resource+ - version 6000 - 08/31/2012
  2433. --------------------------------------------------------------------------------
  2434. We post this publication first at PasteBin.com. Please stay tuned
  2435. for the next version of HUGE Security Resource+. It's not the best
  2436. of names for a publication, but we're lazy, and this is free for
  2437. you.

  2438. We do not name, credit, or otherwise pimp out who we are. None of us
  2439. will ever claim credit for this document, previous, present, and future
  2440. versions, anyone who does is lying.

  2441. We're not on Facebook, Twitter, or any other whore social media circles,
  2442. nor are we active in the traditional and non traditional areas
  2443. of chatter - including IRC. Every version of this document
  2444. has, is, and will be released as a text file because it's
  2445. easier to share with friends and it lacks ugly metadata.

  2446. Please share this document with others, convert it to PDF
  2447. and other formats, but please do not modify the document
  2448. from its original design. Do not add your own links
  2449. for redistribution, rename the document, or claim that
  2450. you wrote it. Please provide a link back to the original
  2451. location @ PasteBin where it's released first.

  2452. We don't want anything other than to provide you with a solid
  2453. list of specially chosen sites. Anyone can toss together a
  2454. document with links, but we stay on the hunt for useful links,
  2455. for quality links. It takes time to harvest, prepare, and
  2456. print new links, especially when we have to check the previously
  2457. posted links to ensure they are alive and at the same location
  2458. and if not, we bring the links up to date. Some links are archives,
  2459. some lead directly to PDF files. Surely you've noticed as we've
  2460. made it quite simple to navigate this document with tagging
  2461. special URLs.

  2462. A few of the blogs linked within this document haven't been updated
  2463. in awhile, but they remain as a useful archive of information
  2464. generated in past entries, and some bloggers go several weeks,
  2465. months, or a year before returning to their blogs. This does
  2466. not bring down the quality of the blogs linked within, as
  2467. the chosen ones published here were selected on the basis
  2468. of quality.

  2469. We'd like to say thanks to CRYPTOME who has been linking
  2470. to our official release pages at PasteBin shortly after
  2471. we release a new version. Thanks Cryptome! And thank you
  2472. to PASTEBIN!
  2473. ----------------------------------------

  2474. When this document began, in previous versions, it was previously
  2475. known as: HUGE List of Security Blogs: Unix, Linux, Windows,
  2476. part 1, 2, 3, and 4 and changed document names with version
  2477. 5000. With version 6000 we renamed the project title from
  2478. 'HUGE Security Resource' to 'HUGE Security Resource+',
  2479. meaning, with this version and future versions this document will
  2480. contain more than security related material.
  2481. (currently a work in progress)

  2482. PART # URL Release Date
  2483. ------ - ---------------------------- - -------------
  2484. - part 1: http://pastebin.com/FwjBMJib - Dec 30th,2011
  2485. - part 2: http://pastebin.com/R9gpVemL - Jan 3rd, 2012
  2486. - part 3: http://pastebin.com/vgj3qKDW - Jan 3rd, 2012
  2487. - part 4: http://pastebin.com/F1JcZHLz - Jan 5th, 2012
  2488. - version 5000:
  2489. http://pastebin.com/M7ZwwVCA - Mar 6th, 2012
  2490. - version 6000:
  2491. - Aug 31th, 2012
  2492. ------ - ---------------------------- - -------------

  2493. Thanks for reading!

  2494. If you enjoy this document please tell the admins of the
  2495. websites you visit from within this document where you
  2496. found them and provide them with a link to this
  2497. document.
  2498. =========================================================
  2499. Consideration #1: Are crossword puzzles and similar puzzles
  2500. published in print simply devices to alter the brain by
  2501. inserting carefully prepared words, phrases, and
  2502. numbers into your thought processes in order to trigger
  2503. or establish some type of action, or... connection.. to
  2504. something?

  2505. Consideration #2: What if all secret agencies were of one
  2506. accord spiritually, like in the paintings of dogs playing
  2507. poker, just using humanity to play out one big game of
  2508. destruction and domination with humans as the visible and
  2509. spiritual puppets?
  2510. =========================================================