One of the big issues for information technology and our course is security. We are bringing together here links and online resources that will help us do our jobs when we finish our course. It is a sprawling topic that can ranges from computer virus to data encryption to hacking.
The Internet has been turned into an increasing hostile place. Not just from a systems point of view, but also on a personal one. No personal user can be without a anti-virus protection, a firewall (software and hardward), protection against spyware and other threats. You can't just assume that a sole user is too small a target. In fact, there is increasing evidence that isolated users have having their computers hijacked by Trojan horses and other malware. Anyone connected to the Internet needs to be prepared.
I have felt compelled to bring together a set of links that can keep personal computer users up to date on threats and tools for mitigating them.
- Spyware-fighting Tools: PestPatrol ::: Spybot ::: Lavasoft's Ad-Ware ::: X-Cleaner
- Anti-Virus: In an emergency, you need to have quick access to several anti-virus programs because no single manufacturer can have a quick solution for removing a virus infection. An online service, usually free, is a useful tool to recommend to people who need assistance without installing a software package. It's also smart to have a floppy disk or CD to restart your computer from. Norton Updates ::: Grisoft's AVG AntiVirus ::: Trend Micro's Housecall ::: McAfee Security's FreeScan ::: Panda's free ActiveScan ::: FSecure Info Center ::: MessageLabs' Viruseye ::: Avast
- Rumors about viruses abound so it's smart to know where to go for accurate information. Even the antivirus companies should be taken with a grain of salt because they are pumping theire products. A first place to turn is Computer Virus Myths ::: Symantec's AntiVirus Research Center, Tutorials and Removal Tools ::: European Institute for Computer Anti-Virus Research ::: WildList International ::: Malware ::: BadGuys ::: Open Directory's Listing ::: Sophos ::: About.com's Listing ::: Virus Bulletin
- CNET: Decades after creation, viruses defy cure
- Firewalls: ZoneAlarm ::: Symantec's personal firewall comes as part of a larger package but I've heard of it causing complications
- Spam: Spam prevention ::: Spambot
- Gibson Research: from the Click of Death on Iomega Zip drives to Denial of Service Attacks, Steve Gibson has done something about them.
- Risk Digest
- 10 Myths of Windows Passwords
- Spam: Spambayes
- Computer Security Resource Center (CSRC) ::: CERT Coordination Center (CERT/CC) ::: Internet Security Alliance ::: Federal Computer Incidence Response Center ::: Computer Incident Advisory Capability
- SANS Institute's Reading Room ::: Internet Storm Center ::: Security Force ::: Secunia's Security Advisories ::: DShield ::: Wilders
- Computer Security Institute
- Magazine: Information Security
The rising use of wireless networks means that a whole new dimension of data and infrastructure become vulnerable to risk. The nonchalant implementation of wireless, both at work and home, makes i
- Security of the WEP algorithm
- Learn how to deploy safe wireless LANs
- The ABCs of 802.11 standards
- An Initial Security Analysis of the IEEE 802.1X Standard
- Using the Fluhrer, Mantin, and Shamir Attack to Break WEP
- Cheap, Cool and Dangerous
- Crypto-Gram Newsletter