Networking Security Docs & FAQ's
ACN Advisory on Windows File Sharing
 
AOL - Accessing AOL through a Corporate Firewall
 
Ars Technica - Wireless Security Blackpaper
 
Building a CD Bootable Firewall
 
Bypassing Personal Firewalls
 
CERT Popular!
  • Deploying Firewalls
    http://www.cert.org/security-improvement/...
  • Exploitation of Unprotected Windows Networking Shares
    http://www.cert.org/incident_notes/...
  • Home Network Security
    http://www.cert.org/tech_tips/...
  • Improving Security (library)
    http://www.cert.org/nav/...
  • Intruder Detection Checklist
    http://www.cert.org/tech_tips/...
  • Knowledge Base
    http://www.cert.org/kb/
  • Security of the Internet
    http://www.cert.org/encyc_article/...
  • Summaries
    http://www.cert.org/summaries/
  • Tech Tips (library)
    http://www.cert.org/tech_tips/
  • Trends in Denial of Service Attack Technology
    http://www.cert.org/archive/pdf/... (PDF document)
  •  
    Closing Ports
     
    CS 165 - Computer Security
     
    Dick Hazeleger's Crash Course Packet Sniffing
     
    Dick Hazeleger's Crash Course Packet Sniffing Files
     
    DSL Reports / Broadband Reports - Security FAQ
     
    EyeOnSecurity.org
  • About Sniffers - Their (Ab)use in Networks
    http://eyeonsecurity.org/articles/sniffers.html
  • When Your Server Ends up a Warez Site
    http://eyeonsecurity.org/papers/ftpscanning.html
  •  
    Firewall Q & A
     
    Firewall - How To
     
    Firewall & Proxy Server - How To
     
    Flexbeta - Should You Fire Your Firewall?
     
    Floydman's Security Talk
     
    GRC: Gibson Research Corporation Popular!
  • Firewalls
    http://grc.com/su-firewalls.htm
  • Network Bondage
    http://grc.com/su-bondage.htm
  •  
    Guidelines for Reporting Port Scan Abuse
     
    The Hacker High School
     
    How Firewalls Work
     
    How to Read NETSTAT -AN Results
     
    iDEFENSE — iALERT White Papers
     
    Improving the Security of Your Site by Breaking Into It
     
    Internet Firewalls: FAQ (Matt Curtin & Marcus J. Ranum) Popular!
     
    Introduction to Intrusion Protection & Network Security
     
    Introduction to Network Security (Matt Curtin)
     
    Intrusion Detection FAQ Popular!
     
    ISAlliance: Common Sense Guide for Home & Individual Users
     
    ISAlliance: Common Sense Guide to Cyber Security for Small Businesses
     
    ISS X-Force Security Center
     
    ITsecure.org
     
    Jay Beale's Linux/Unix Security Articles
     
    JMU Security Engineering
  • Microsoft File Sharing
    http://www.jmu.edu/computing/info-security/...
  • Personal Firewalls
    http://www.jmu.edu/computing/info-security/...
  •  
    Lance Spitzner Popular!
  • Building Your Firewall Rulebase
    http://www.spitzner.net/rules.html
  • Intrusion Detection
    http://www.spitzner.net/ids.html
  • White Papers & Publications
    http://www.spitzner.net/
  •  
    Marcus J. Ranum
     
    Markus Jansson - Tweaks & Tricks for Security & Privacy
     
    Navas NetBIOS FAQ Popular!
     
    Maximum Security (online book)
     
    MSDN Security Glossary
     
    My Firewall Page - "A Firewall is a concept..."
     
    MyNetWatchman - Idiot's Guide to Network Analysis
     
    Network Magazine
  • Firewalls
    http://www.networkmagazine.com/article/...
  • Intrusion Detection
    http://www.networkmagazine.com/article/...
  • Proxy Servers
    http://www.networkmagazine.com/article...
  •  
    NIH - Security FAQ's Popular!
     
    NIPC - 7 Simple Computer Security Tips
     
    NIST Popular!
  • Computer Security Publications
    http://csrc.nist.gov/publications/
  • Guidelines On Firewalls & Firewall Policy
    http://csrc.nist.gov/publications/nistpubs/index.html
    or http://csrc.nist.gov/publications/nistpubs/800-41/... (PDF document)
  • An Introduction to Computer Security: The NIST Handbook
    http://csrc.nist.gov/publications/nistpubs/800-10/
    http://csrc.nist.gov/publications/nistpubs/800-12/... (direct download)
  • Keeping Your Site Comfortably Secure: An Introduction to Internet Firewalls
    http://csrc.nist.gov/publications/nistpubs/800-10/
    http://csrc.nist.gov/publications/nistpubs/800-12/... (direct download)
  • Special Publication on IDS
    http://csrc.nist.gov/publications/nistpubs/800-10/
    or http://csrc.nist.gov/publications/nistpubs/800-10/... (direct download)
  •  
    NMRC - FAQ's
     
    NSA - Glossary of Terms Used in Security & Intrusion Detection
    >
     
    NSA - Security Configuration Guides Popular!
     
    PC Flank Popular!
  • Home Page
    http://www.pcflank.com/
  • Firewall Rulesets
    http://www.pcflank.com/fw_rules_db.htm
  • How Can You Be Attacked?
    http://www.pcflank.com/art3.htm
  • How To Protect Your Computer From Attacks
    http://www.pcflank.com/art4.htm
  • PC Firewalls Roadmap
    http://www.pcflank.com/art24.htm
  • Personal Firewalls vs Leak Tests
    http://www.pcflank.com/art21.htm
  • Personal Firewall Tests
    http://www.pcflank.com/art19.htm
  • What are "Ports" & "Protocols"?
    http://www.pcflank.com/art2.htm
  •  
    PC Help Popular!
  • File & Printer Sharing & The Internet
    http://www.nwinternet.com/~pchelp/security/issues/...
  • What Is a Firewall?
    http://www.nwinternet.com/~pchelp/security/...
  •  
    Personal Firewalls - What They Can, and What They Cannot Do - A Non-Technical Overview
     
    Personal Firewalls: Why They're Not Useful
  • cyberpunks.org - Personal Firewalls
    http://cyberpunks.org/display/356/article/
  • FireHole
    http://keir.net/firehole.html
  • Personal Firewall Security FAQ
    http://www.fefe.de/pffaq/
  • SamSpade.org - Personal Firewalls Are Mostly Snake-Oil
    http://classic.samspade.org/zonelog.html Down
    or http://samspade.org/d/firewalls.html
    or http://www.samspade.org/d/persfire.html
  • To Stealth or Not
    http://www.hansenonline.net/Networking/stealth.html
  • "Why Your Firewall Sucks"
    http://tooleaky.zensoft.com/
  •  
    PhoneBoy's FireWall FAQ Popular!
     
    RFC ICMP Protocol Specification
     
    Robert Graham's InfoSec Pubs Popular!
  • Carnivore FAQ
    http://www.robertgraham.com/pubs/carnivore-faq.html
  • FAQ: Firewall Forensics (What am I seeing?)
    http://www.robertgraham.com/pubs/firewall-seen.html
  • FAQ: Firewall Admins Guide to Porn
    http://www.robertgraham.com/pubs/firewall-pr0n.html
  • Hacking Lexicon
    http://www.robertgraham.com/pubs/hacking-dict.html
  • Intrusion Detection FAQ
    http://www.robertgraham.com/pubs/...
  • Sniffing (network wiretap, sniffer) FAQ
    http://www.robertgraham.com/pubs/sniffing-faq.html
  •  
    SamSpade.org - The Library
     
    SANS Institute Information Reading Room Popular!
     
    Security for Cable Networks (DSL Reports) Popular!
     
    SecurityFocus.com Popular!
  • Always On, Always Vulnerable: Securing Broadband Connections
    http://www.securityfocus.com/infocus/1560
  • Basic Security Checklist for Home & Office Users
    http://www.securityfocus.com/infocus/1504
  • The Enemy Within: Firewalls & Backdoors
    http://securityfocus.com/infocus/1701
  • Firewalls for Beginners
    http://www.securityfocus.com/infocus/1182
  • The Future of IDS
    http://www.securityfocus.com/infocus/1518
  • Home User Security: Personal Firewalls
    http://www.securityfocus.com/infocus/1750
  • Internet Security & Your Business - Knowing the Risks
    http://www.securityfocus.com/infocus/1194
  • Introduction to Security Policies, Part 1
    http://www.securityfocus.com/infocus/1193
  • Introduction to Security Policies, Part 2
    http://www.securityfocus.com/infocus/1473
  • Introduction to Security Policies, Part 3
    http://www.securityfocus.com/infocus/1487
  • Introduction to Security Policies, Part 4
    http://www.securityfocus.com/infocus/1497
  • ONLINE Library Archive
    http://www.securityfocus.com/library
  • Preventing and Detecting Insider Attacks Using IDS
    http://www.securityfocus.com/infocus/1558
  • Sniffers: What They Are and How to Protect Yourself
    http://www.securityfocus.com/infocus/1549
  •  
    SmartComputing - All About Firewalls: Protect Your PC From The Evils Of Would-Be Hackers
     
    SoftHeap Security FAQ
     
    Sponge - How to Configure a Firewall for Maximum Protection
     
    TCP/IP Protocol Directory
     
    Tiny & Kerio Personal Firewalls FAQ
     
    Tiny Personal Firewall FAQ
     
    The Unofficial @Guard FAQ
     
    U-G-W - The Research Lab
     
    Unofficial ShieldsUP! Forum FAQ Popular!
     
    Wilders.org - Firewall Vulnerability
     
    Windows IT Library Firewall FAQ
     
    WindowsITSecurity.com
  • How Firewalls Work
    http://www.secadministrator.com/Articles/Index.cfm?...
  • Secure Your SOHO, Part 1
    http://www.secadministrator.com/Articles/Index.cfm?..
  • Secure Your SOHO, Part 2
    http://www.secadministrator.com/Articles/Index.cfm?...
  • Three Big Security Problems
    http://www.windowsitsecurity.com/Articles/Index.cfm?..
  •  
    Wireless LAN Security FAQ
     
    The WWW Security FAQ Popular!
     
    ZDNet - PC Security Basics
    • Entries that are marked Popular! indicate web sites that are popularly recommended by other users, not necessarily the author of this web site. The author of this web site does not endorse or recommend web sites or services unless explicitly noted.

    Home [frames]          Home [no frames]

    © 2000-2003 Eric L. Howes