From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-0.9 required=5.0 tests=BAYES_00,FORGED_GMAIL_RCVD, FREEMAIL_FROM autolearn=no autolearn_force=no version=3.4.4 X-Google-Thread: 103376,f833240819dafe06,start X-Google-Attributes: gid103376,public,usenet X-Google-Language: ENGLISH,ASCII-7-bit Path: g2news1.google.com!postnews.google.com!e25g2000prg.googlegroups.com!not-for-mail From: Angelo.Drew.group.com@gmail.com Newsgroups: comp.lang.ada Subject: Computer Security Information and What You Can Do To Keep Your System Safe! Date: Sun, 2 Dec 2007 19:15:30 -0800 (PST) Organization: http://groups.google.com Message-ID: <844c7503-c3b4-4e59-9b60-c695a2413fa9@e25g2000prg.googlegroups.com> NNTP-Posting-Host: 125.163.74.132 Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-Trace: posting.google.com 1196651730 26507 127.0.0.1 (3 Dec 2007 03:15:30 GMT) X-Complaints-To: groups-abuse@google.com NNTP-Posting-Date: Mon, 3 Dec 2007 03:15:30 +0000 (UTC) Complaints-To: groups-abuse@google.com Injection-Info: e25g2000prg.googlegroups.com; posting-host=125.163.74.132; posting-account=Dv2gDQoAAAD_P4AR4d1Kr_Jl-EQd2-nL User-Agent: G2/1.0 X-HTTP-UserAgent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.3) Gecko/20070309 Firefox/2.0.0.3,gzip(gfe),gzip(gfe) Content-Disposition: inline Xref: g2news1.google.com comp.lang.ada:18698 Date: 2007-12-02T19:15:30-08:00 List-Id: .:: Unix and Linux Hacking and Security ::. 1. Unix - Vulnerabilities and Advisories -- Tutorials and Papers -- Specific Exploits and Vulnerabilities 2. Unix - Security Tools -- Unix Security and Audit Tools (Including IDS and Access Control Tools) -- Unix Log Analysis Tools -- Unix Proxies, Firewalls and Accessories -- Unix Miscellany 3. Unix - BSD, FreeBSD, etc... -- FreeBSD -- BSD and Misc. BSD variants -- BSD Security Tools -- BSD Micro-distributions 4. Unix - Solaris, SunOS etc... -- Solaris -- SunOS -- Cobalt Appliances -- SunOS and Solaris Security Tools 5. Unix - Other Flavors (Irix, HPUX, AIX, etc...) -- SGI/Irix -- HP-UX -- AIX -- SCO -- Miscellaneous 6. Linux - Vulnerabilities and Advisories -- Linux - General Hacking -- Linux Application Exploits -- Linux - Red Hat Specific -- Linux - Debian Specific 7. Linux - Security Tools -- Linux - Intrusion Detection -- Linux - Access Control -- Linux Log Analysis Tools -- Linux Rootkits -- Linux Proxies and Firewalls -- Linux - General Security and Audit Tools 8. Linux - Security-oriented mini- and micro-distributions -- DMZS-Biatchux -- NSA Security Enhanced Linux -- Linux Mini- and Micro-distributions -- Applications .:: Windows Hacking and Security ::. 1. Windows Vulnerabilities, Advisories, and even security flaws introduced by so-called security products!!! -- Microsoft IIS Vulnerabilities -- Microsoft FrontPage Vulnerabilities -- Microsoft Internet Explorer Vulnerabilities -- Windows Application Vulnerabilities -- Windows Internet/Networking Vulnerabilities -- Insecurities introduced by "security" programs! -- Netscape Browsers -- Windows Hacks - Miscellaneous 2. Windows Security and Auditing Tools -- Windows Registry Tools -- Windows and MSDOS Security and Auditing Tools -- Windows Local Security -- File/Disk/Log Shredders 3. Windows Miscellany -- Raw Sockets and Custom Packet Building -- A Few Little Extras for Microsoft "Fans" .:: Crypto, Virology, Cracking and Backdoors ::. 1. Cryptography, Cryptanalysis, Steganography -- Crypto: PGP and GPG -- Crypto: Cryptanalysis -- Crypto: Steganography -- Crypto: Miscellaneous -- Misc. File Encryptors 2. About Viruses and Worms -- Virus Info Files and Advisories -- Worms -- Virus/Worm Protection Utilities 3. Backdoors, Trojans and defenses -- Back Orifice and BO2K -- SubSeven and Addons -- Other Remote Administration Tools -- Trojan Detectors/Removers/Retaliators -- Information Files .:: Learn what Hackers know, how they do it, and what you can do to keep your system safe ::. 1. General Hacking Information -- General Security Concepts -- Antique Systems -- Oracle -- Tools, Advisories and Exploits affecting multiple platforms -- PC Software and BIOS Hacking -- Truly Miscellaneous Hacking Info 2. Password Security -- Password Hacking -- Password Generators -- Password Security Audit Programs -- Word Lists 3. Scanning, Fingerprinting and similar techniques -- Network Scanning -- "Wargames" Modem Carrier Scanning -- Fingerprinting -- Sniffing 4. How Hackers Attack Numerous Internet Services -- Denial of Service Attacks -- Email and News -- Proxies and IP Spoofing -- DNS and BIND -- SPAM -- FTP -- General Unsorted Information -- Indispensible Internet Utilities -- Cable and DSL Info and Hacking 5. How Hackers Attack Web Servers, CGIs, PHP, ASP, etc... -- Web Site Hacking - General and Miscellaneous -- Web Site Hacking - Specific Sites -- Web Site Hacking - Servers -- Web Site Hacking - CGI, Perl, ASP, PHP etc. -- Web BBSes -- Web Site Hacking - Audit Tools 6. How Hackers attack IRC, Instant Messaging, and Multiplayer Games -- ICQ Hacking -- IRC Hacking, Scripts and Bots -- AOL Instant Messenger (AIM) -- Miscellaneous Chat/gaming Systems 7. Vulnerabilities found in Platforms with Smaller Market Share -- Macintosh -- PalmOS -- Printers -- Dedicated Network Appliances, Hubs, Routers, etc... -- Cisco Equipment -- Miscellaneous 8. How Hackers Attack Novell and 802.11b Networks -- Novell Networks -- Wireless LANs -- X.25 Networks -- Miscellaneous Networking Information .:: Computer Security Information ::. -- Access Control -- Basics -- Chat Systems -- Cryptography -- Denial Of Service -- Hacking Security Groups -- Hardening Securing Papers -- ICQ -- Intrusion Detection Systems -- IRC -- Miscellaneous -- Network Auditing Secuirty Penetration -- Online Privacy -- Operating Systems -- Protocols .:: Phreaking - The black art of telephony ::. 1. GENERAL - General Information About the Phone Company -- Hacking Answering Machines and Voice Mail -- Phreaking Programs 2. Electronic Toll Fraud and Other Phone Devices -- The Fixer's Box Review - Read this before you read the rest of these files! -- Blue and Green Boxes -- Red Box -- Beige and Bridge Boxes -- Various new boxes -- Programs to generate phreak tones 3. All about Payphones, COCOTs, BOCOTs, etc... -- Payphones -- COCOTs -- Nortel/Quortech Millennium -- Smart Cards/Phone Cards 4. Cellular Telephones and the Hacking Thereof -- Cellular Phones by Manufacturer -- Miscellaneous Info -- Miscellaneous Utilities 5. Caller ID and ANI -- Caller ID and CLASS -- ANI and ANAC 6. Scans, numbers of interest -- Lists of Phone Numbers 7. Sounds from the phone system -- SIT Tones are said to thwart predictive dialers used by Telemarketers! .:: Security Publications ::. -- Computer Incident Advisory Capability -- Call And Response Telephone Compilations -- Forbidden Knowledge -- Keen Veracity -- Lexxicor -- Midnight Hackers Private Club -- Phrack -- Risks Forum Digest -- Tricks Of The Trade -- Underground Periodical .:: Law, Privacy, Wetware, Hardware, File Sharing and more ::. 1. HARDWARE - Hardware, Electronics, Radio etc. -- TEMPEST -- Bugs and Listening Devices -- Miscellaneous 2. Hackers and the Law -- Copyright Law and Cases -- Net Censorship -- Cases involving 2600 Magazine -- The SDMI affair -- Brian West -- September 11th Backlash Legislation -- General Legal Bufu 3. About Napster, Gnutella, and other File Sharing schemes 4. About your dwindling privacy -- Privacy Digest -- Internet Privacy -- Espionage -- Privacy Deprivation Tools 5. Wetware Hacking! -- Social Engineering and NLP -- Seduction -- Miscellaneous Wetware Hacking 6. Physical Security, Scams etc... -- Physical Security and Countersecurity -- Financial Crimes Detection and Prevention -- Vending Machine Hacking .:: The standards that define the Internet ::. 1. RFCs - Internet RFCs 3094 to 3195 -- Internet RFCs 3094 to 3195 2. Other Standards and Official Publications -- US Department of Energy CIAC-2300 Documents -- NIPC CyberNotes --- Thank You --- Source: http://www.fx-vista.com