[94] in Intrusion Detection Systems

home help back first fref pref prev next nref lref last post

Re: SECURITY META HOTLIST

daemon@ATHENA.MIT.EDU (Will Spencer)
Wed May 10 16:43:05 1995

From: will@rmii.com (Will Spencer)
To: ids@uow.edu.au
Date: Wed, 10 May 1995 09:50:34 -0600 (MDT)
In-Reply-To: <9505091117.AA22953@punto.cefriel.it> from "Alberto Verga" at May 9, 95 12:17:44 pm
Reply-To: ids@uow.edu.au

av> I'm trying to collect as much as possible links and pointers to 
av> _security related_ on-line documents, mailing list, books, newsgroups
av> in order to make a SECURITY META HOTLIST, a sort of Pointers Library 
av> on security.

Alberto:

Here is my list.  You will most likely need to cut out large portions of
it, but it should save you a great deal of time and make your search much 
more complete:

 
FTP SITES
---------
 
 aeneas.mit.edu
 alex.sp.cs.cmu.edu      /links/security                 (Misc)
 alife.santafe.edu
 aql.gatech.edu          /pub                            (40Hex)
 asylum.sf.ca.us
 athena-dist.mit.edu     /pub/ATHENA                     (Athena Project)
 atlantis.utmb.edu
 bellcore.com                                            (Bellcore)
 camelot.usc.edu         /pub/cellular/DDIinfodemo       (Cellular)
 cert.org                                                (CERT)
 ciac.llnl.gov
 coast.cs.purdue.edu     /pub                            (Security/COAST)
 csrc.ncsl.nist.gov
 dartmouth.edu           /pub/security                   (Security)
 dg-rtp.dg.com
 ds.internic.net
 enlow.com
 ftp.3com.com            /mirrors/zip                    (ZipCrypt)
 ftp.3com.com            /Orange-Book                    (Orange Book)
 ftp.acns.nwu.edu
 ftp.alantec.com
 ftp.c3.lanl.gov
 ftp.cc.rochester.edu
 ftp.cert.dfn.de                                         (FIRST)
 ftp.cisco.com
 ftp.cnam.fr
 ftp.commerce.net        /pubs/standards/drafts/shttp.txt(Secure HyperText)
 ftp.cs.colorado.edu
 ftp.cs.ruu.nl
 ftp.cs.uwm.edu          /pub/comp-privacy               (Privacy Digest)
 ftp.cs.vu.nl
 ftp.cs.yale.edu
 ftp.csl.sri.com         /pub/nides                      (SRI)
 ftp.csua.berkeley.edu   /pub/cypherpunks                (Crypto)
 ftp.cyberspace.com      /pub/archive/defcon             (PhoneTag)
 ftp.delmarva.com
 ftp.dsi.unimi.it
 ftp.ee.lbl.gov
 ftp.eff.org             /pub/Publications/CuD           (EFF)
 ftp.elelab.nsc.co.jp    /pub/security                   (Security)
 ftp.etext.org                                           (Etext)
 ftp.fc.net              /pub/defcon                     (DefCon)
 ftp.fh-berlin.de
 ftp.foobar.com
 ftp.funet.fi
 ftp.gate.net            /pub/users/laura
 ftp.gate.net            /pub/users/wakko
 ftp.greatcircle.com     /pub/firewalls                  (Firewalls)
 ftp.IEunet.ie           /pub/security                   (Security)
 ftp.ifi.uio.no
 ftp.info.fundp.ac.be
 ftp.informatik.uni-hamburg.de
 ftp.inoc.dl.nec.com     /pub/security                   (Security)
 ftp.isi.edu
 ftp.llnl.gov            /pub                            (CIAC)
 ftp.lysator.liu.se
 ftp.mcs.com             /mcsnet.users/crisadm           (Virii)
 ftp.microserve.net      /ppp-pop/strata/mac             (Mac)
 ftp.near.net            /security/archives/phrack       (Zines)
 ftp.nec.com
 ftp.netcom.com          /pub/br/bradleym                (Virii)
 ftp.netcom.com          /pub/da/daemon9
 ftp.netcom.com          /pub/va/vandal                  (DnA)
 ftp.netcom.com          /pub/zz/zzyzx                   (H/P)
 ftp.netsys.com
 ftp.ocs.mq.edu.au       /PC/Crypt                       (Crypto)
 ftp.paranoia.com        /pub/toneloc/tl110.zip          (ToneLoc)
 ftp.pop.psu.edu
 ftp.primus.com          /pub/armchair                   (Phoney)
 ftp.primus.com          /pub/security                   (Security)
 ftp.psy.uq.oz.au
 ftp.sert.edu.au
 ftp.sgi.com
 ftp.sunet.se            /pub/network/monitoring         (Ethernet sniffers)
 ftp.sura.net            /pub/security                   (SURAnet)
 ftp.technet.sg
 ftp.tis.com             /pub                            (TIS)
 ftp.uspto.gov
 ftp.uu.net              /doc/literary/obi/Phracks       (Zines)
 ftp.vis.colostate.edu
 ftp.vix.com
 ftp.vortex.com
 ftp.win.tue.nl          /pub/security                   (Security)
 ftp.winternet.com       /users/craigb                   (H/P)
 ftp.wustl.edu           /doc/EFF                        (EFF)
 furmint.nectar.cs.cmu.edu /security                     (Crypto)
 garbo.uwasa.fi          /pc/crypt                       (Crypto)
 gumby.dsd.trw.com
 hplyot.obspm.fr
 info.mcs.anl.gov
 jerico.usc.edu
 lcs.mit.edu             /telecom-archives               (Telecom archives)
 mac.archive.umich.edu
 mary.iia.org            /pub/users/patriot              (Misc)
 monet.ccs.itd.umich.edu
 net.tamu.edu            /pub/security/TAMU              (Security)
 net23.com               /pub                            (Max Headroom)
 nic.ddn.mil             /scc                            (DDN Security)
 nic.funet.fi            /pub/doc/cud                    (Zines)
 oak.oakland.edu
 paradox1.denver.colorado.edu  /anonymous/text-files/pyrotechnics (Pyro)
 parcftp.xerox.com
 pyrite.rutgers.edu      /pub/security                   (Security)
 relay.cs.toronto.edu    /doc/telecom-archives           (Telecom)
 rena.dit.co.jp          /pub/security                   (Security)
 research.att.com        /dist/internet_security         (AT&T)
 ripem.msu.edu           /pub/crypt                      (Ripem)
 rs1.rrz.uni-koeln.de                                    (Wordlists)
 rtfm.mit.edu                                            (Etext)
 rtfm.mit.edu            /pub/usenet-by-group            (Usenet FAQ's)
 sable.ox.ac.uk                                          (Wordlists)
 samadams.princeton.edu
 scss3.cl.msu.edu        /pub/crypt                      (Crypto)
 sierra.stanford.edu
 spy.org                                                 (CSC)
 suburbia.apana.org.au   /pub/unix/security              (Security)
 sunsolve1.sun.com
 tam.cs.ucdavis.edu
 technion.ac.il
 theta.iis.u-tokyo.ac.jp /pub1/security                  (Security)
 thumper.bellcore.com
 titania.mathematik.uni-ulm.de /pub/security             (Security)
 toxicwaste.mit.edu      /pub/rsa129/README              (Breaking RSA)
 uceng.uc.edu            /pub/kerberos.documentation     (Kerberos)
 ugle.unit.no
 vic.cc.purdue.edu
 wimsey.bc.ca            /pub/crypto                     (Crypto)
 
 
NEWSGROUPS
----------
 
 alt.comp.virus
 alt.dcom.telecom        Discussion of telecommunications technology
 alt.security            Security issues on computer systems
 alt.security.index      Pointers to good stuff in misc.security (Moderated)
 alt.security.keydist    Exchange of keys for public key encryption systems
 alt.security.pgp        The Pretty Good Privacy package
 alt.security.ripem      A secure email system illegal to export from the US
 comp.org.cpsr.announce  Computer Professionals for Social Responsibility
 comp.org.cpsr.talk      Issues of computing and social responsibility
 comp.org.eff.news       News from the Electronic Frontiers Foundation
 comp.org.eff.talk       Discussion of EFF goals, strategies, etc.
 comp.protocols.kerberos The Kerberos authentification server
 comp.protocols.tcp-ip   TCP and IP network protocols
 comp.risks              Risks to the public from computers & users
 comp.security.announce  Announcements from the CERT about security
 comp.security.misc      Security issues of computers and networks
 comp.security.unix      Discussion of Unix security
 comp.virus              Computer viruses & security (Moderated)
 de.org.ccc              Mitteilungen des CCC e.V.
 misc.security           Security in general, not just computers (Moderated)
 sci.crypt               Different methods of data en/decryption
 
 
TELNET SITES
------------
 
 ntiabbs.ntia.doc.gov                  (NTIA)
 
 
GOPHER SITES
------------
 
  ba.com                  (Bell Atlantic)
  csrc.ncsl.nist.gov      (NIST Security Gopher)
  gopher.acm.org          (SIGSAC (Security, Audit & Control))
  gopher.cpsr.org         (Computer Professionals for Social Responsibility)
  gopher.cs.uwm.edu
  gopher.eff.org          (Electonic Frontier Foundation)
  gw.PacBell.com          (Pacific Bell)
  iitf.doc.gov            (NITA -- IITF)
  oss.net                 (Open Source Solutions)
  spy.org                 (Computer Systems Consulting)
 
 
 
WWW SITES
---------
 
 http://alumni.caltech.edu/~dank/isdn/           (ISDN)
 http://aset.rsoc.rockwell.com                   (NASA/MOD AIS Security)
 http://aset.rsoc.rockwell.com/exhibit.html      (Tech. for Info Sec)
 http://att.net/dir800                           (800 directory)
 http://ausg.dartmouth.edu/security.html         (Security)
 http://cs.purdue.edu/coast/coast.html           (Coast)
 http://csrc.ncsl.nist.gov                       (NIST)
 http://dhp.com/~pluvius
 http://dfw.net/~aleph1                          (Eubercrackers)
 http://draco.centerline.com:8080/~franl/crypto.html (Crypto)
 http://everest.cs.ucdavis.edu/Security.html     (Security)
 http://everest.cs.ucdavis.edu/slides/slides.html(Security Lab Slides)
 http://ezinfo.ethz.ch/ETH/D-REOK/fsk/fsk_homepage.html  (CSSCR)
 http://first.org                                (FIRST)
 http://ftp.tamu.edu/~abr8030/security.html      (Security)
 http://hightop.nrl.navy.mil/potpourri.html      (Security)
 http://hightop.nrl.navy.mil/rainbow.html        (Rainbow Books)
 http://ice-www.larc.nasa.gov/ICE/papers/hacker-crackdown.html (Sterling)
 http://ice-www.larc.nasa.gov/ICE/papers/nis-requirements.html (ICE NIS)
 http://info.bellcore.com/BETSI/betsi.html       (Betsi)
 http://infosec.nosc.mil/infosec.html            (SPAWAR INFOSEC)
 http://l0pht.com                                (The l0pht)
 http://l0pht.com/~oblivion/IIRG.html            (Phantasy Magazine)
 http://mindlink.jolt.com                        (The Secrets of LockPicking)
 http://mls.saic.com                             (SAIC MLS)
 http://naic.nasa.gov/fbi/FBI_homepage.html      (FBI Homepage)
 http://nasirc.hq.nasa.gov                       (NASA ASIRC)
 http://ophie.hughes.american.edu/~ophie
 http://ripco.com:8080/~glr/glr.html             (Full Disclosure)
 http://spy.org                                  (CSC)
 http://tansu.com.au/Info/security.html          (Comp and Net Security)
 http://the-tech.mit.edu                         (LaMacchia case info)
 http://ucs.orst.edu:8001/mintro.html            (Micro Power Broadcasting)
 http://wintermute.itd.nrl.navy.mil/5544.html    (Network Security)
 http://www.aads.net                             (Ameritech)
 http://www.alw.nih.gov/WWW/security.html        (Unix Security)
 http://www.artcom.de/CCC                        (CCC Homepage)
 http://www.aspentec.com/~frzmtdb/fun/hacker.html
 http://www.aus.xanadu.com:70/1/EFA              (EFF Australia)
 http://www.ba.com                               (Bell Atlantic)
 http://www.beckman.uiuc.edu/groups/biss/VirtualLibrary/xsecurity.html(X-Win)
 http://www.bell.com                             (MFJ Task Force)
 http://www.bellcore.com/SECURITY/security.html  (Bellcore Security Products)
 http://www.brad.ac.uk/~nasmith/index.html
 http://www.bst.bls.com                          (BellSouth)
 http://www.c3.lanl.gov/~mcn                     (Lanl)
 http://www.cert.dfn.de/                         (German First Team)
 http://www.commerce.net/information/standards/drafts/shttp.txt (HyperText)
 http://www.contrib.andrew.cmu.edu:8001/usr/dscw/home.html
 http://www.cpsr.org/home                        (CPSR)
 http://www.cs.tufts.edu/~mcable/cypher/alerts/alerts.html (Cypherpunk)
 http://www.cs.tufts.edu/~mcable/HackerCrackdown (Hacker Crackdown)
 http://www.cs.umd.edu/~lgas
 http://www.cs.cmu.edu:8001/afs/cs.cmu.edu/user/bsy/www/sec.html (Security)
 http://www.csd.harris.com/secure_info.html      (Harris)
 http://www.csl.sri.com                          (SRI Computer Science Lab)
 http://www.cybercafe.org/cybercafe/pubtel/pubdir.html (CyberCafe)
 http://www.datafellows.fi                       (Data Fellows)
 http://www.delmarva.com/raptor/raptor.html      (Raptor Network Isolator)
 http://www.demon.co.uk/kbridge                  (KarlBridge)
 http://www.digicash.com/ecash/ecash-home.html   (Digital Cash)
 http://www.digital.com/info/key-secure-index.html(Digital Secure Systems)
 http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html(Bugtraq)
 http://www.eecs.nwu.edu/~jmyers/ids/index.html  (Intrusion Detection Systems)
 http://www.eff.org/papers.html                  (EFF)
 http://www.engin.umich.edu/~jgotts/boxes.html   (Box info)
 http://www.engin.umich.edu/~jgotts/underground/hack-faq.html(alt.2600 FAQ)
 http://www.ensta.fr/internet/unix/sys_admin     (System administration)
 http://www.etext.org/Zines/                     (Zines)
 http://www.fc.net/defcon                        (DefCon)
 http://www.fedworld.gov                         (Federal Government)
 http://www.first.org/first/                     (FIRST)
 http://www.getnet.com/crak or                   (CRAK Software)
 http://www.greatcircle.com                      (Great Circle Associates)
 http://www.hpcc.gov/blue94/section.4.6.html     (NSA)
 http://www.ic.gov                               (The CIA)
 http://www.indirect.com/www/johnk/              (CRAK Software)
 http://www.lerc.nasa.gov/Unix_Team/Dist_Computing_Security.html (Security)
 http://www.mpr.ca/                              (MPR Teltech Ltd)
 http://www.net23.com                            (Max Headroom)
 http://www.nist.gov                             (NIST)
 http://www.ntt.jp                               (Nippon Telephone)
 http://www.pacbell.com                          (Pacific Bell)
 http://www.paranoia.com/mthreat                 (ToneLoc)
 http://www.pegasus.esprit.ec.org/people/arne/pgp.html (PGP)
 http://www.phantom.com/~king                    (Taran King)
 http://www.primenet.com/~kludge/haqr.html       (Kludge)
 http://www.quadralay.com/www/Crypt/Crypt.html   (Quadralay Cryptography)
 http://www.qualcomm.com/cdma/wireless.html      (Qualcomm CDMA)
 http://www.research.att.com                     (AT&T)
 http://www.rsa.com                              (RSA Data Security)
 http://www.satelnet.org/~ccappuc
 http://www.service.com/cm/uswest/usw1.html      (USWest)
 http://www.shore.net/~oz/welcome.html           (Hack TV)
 http://www.spy.org                              (Computer Systems Consulting)
 http://www.sri.com                              (SRI)
 http://www.tansu.com.au/Info/security.html      (Security Reference Index)
 http://www.tis.com                              (Trusted Information Systems)
 http://www.tri.sbc.com                          (Southwestern Bell)
 http://www.uci.agh.edu.pl/pub/security          (Security)
 http://www.umcc.umich.edu/~doug/virus-faq.html  (Virus)
 http://www.usfca.edu/crackdown/crack.html       (Hacker Crackdown)
 http://www.wam.umd.edu/~ankh/Public/devil_does_unix
 http://www.wiltel.com                           (Wiltel)
 http://www.winternet.com/~carolann/dreams.html
 http://www.wired.com                            (Wired Magazine)
 
 
 
BOOKS
------
 
General Computer Security
~~~~~~~~~~~~~~~~~~~~~~~~~
 Computer Security Basics
 Author: Deborah Russell and G.T. Gengemi Sr.
 Publisher: O'Reilly & Associates, Inc.
 Copyright Date: 1991
 ISBN: 0-937175-71-4
 
       This is an excellent book.  It gives a broad overview of
       computer security without sacrificing detail.  A must read for
       the beginning security expert.
 
 Computer Security Management
 Author: Karen Forcht
 Publisher: Boyd and Fraser
 Copyright Date: 1994
 ISBN: 0-87835-881-1
 
 Information Systems Security
 Author: Philip Fites and Martin Kratz
 Publisher: Van Nostrad Reinhold
 Copyright Date: 1993
 ISBN: 0-442-00180-0
 
 Computer Related Risks
 Author: Peter G. Neumann
 Publisher: Addison-Wesley
 Copyright Date: 1995
 ISBN: 0-201-55805-X
 
 Computer Security Management
 Author: Karen Forcht
 Publisher: boyd & fraser publishing company
 Copyright Date: 1994
 ISBN: 0-87835-881-1
 
 The Stephen Cobb Complete Book of PC and LAN Security
 Author: Stephen Cobb
 Publisher: Windcrest Books
 Copyright Date: 1992
 ISBN: 0-8306-9280-0 (hardback) 0-8306-3280-8 (paperback)
 
 Security in Computing
 Author: Charles P. Pfleeger
 Publisher: Prentice Hall
 Copyright Date: 1989
 ISBN: 0-13-798943-1.
 
 Building a Secure Computer System
 Author: Morrie Gasser
 Publisher: Van Nostrand Reinhold Co., New York.
 Copyright Date:
 ISBN: 0-442-23022-2
 
 Modern Methods for Computer Security
 Author: Lance Hoffman
 Publisher: Prentice Hall
 Copyright Date: 1977
 ISBN:
 
 Windows NT 3.5 Guidelines for Security, Audit and Control
 Author:
 Publisher: Microsoft Press
 Copyright Date:
 ISBN: 1-55615-814-9
 
 
Unix System Security
~~~~~~~~~~~~~~~~~~~~
 Practical Unix Security
 Author: Simson Garfinkel and Gene Spafford
 Publisher: O'Reilly & Associates, Inc.
 Copyright Date: 1991
 ISBN: 0-937175-72-2
 
       Finally someone with a very firm grasp of Unix system security
       gets down to writing a book on the subject.  Buy this book.
       Read this book.
 
 
 Firewalls and Internet Security
 Author: William Cheswick and Steven Bellovin
 Publisher: Addison Wesley
 Copyright Date: 1994
 ISBN: 0-201-63357-4
 
 Unix System Security
 Author: Rik Farrow
 Publisher: Addison Wesley
 Copyright Date: 1991
 ISBN: 0-201-57030-0
 
 Unix Security: A Practical Tutorial
 Author: N. Derek Arnold
 Publisher: McGraw Hill
 Copyright Date: 1993
 ISBN: 0-07-002560-6
 
 Unix System Security: A Guide for Users and Systems Administrators
 Author: David A. Curry
 Publisher: Addison-Wesley
 Copyright Date: 1992
 ISBN: 0-201-56327-4
 
 Unix System Security
 Author: Patrick H. Wood and Stephen G. Kochan
 Publisher: Hayden Books
 Copyright Date: 1985
 ISBN: 0-672-48494-3
 
 Unix Security for the Organization
 Author: Richard Bryant
 Publisher: Sams
 Copyright Date: 1994
 ISBN: 0-672-30571-2
 
 
Network Security
~~~~~~~~~~~~~~~~
 Network Security Secrets
 Author: David J. Stang and Sylvia Moon
 Publisher: IDG Books
 Copyright Date: 1993
 ISBN: 1-56884-021-7
 
       Not a total waste of paper, but definitely not worth the
       $49.95 purchase price.  The book is a rehash of previously
       published information.  The only secret we learn from reading
       the book is that Sylvia Moon is a younger woman madly in love
       with the older David Stang.
 
 Complete Lan Security and Control
 Author: Peter Davis
 Publisher: Windcrest / McGraw Hill
 Copyright Date: 1994
 ISBN: 0-8306-4548-9 and 0-8306-4549-7
 
 Network Security
 Author: Steven Shaffer and Alan Simon
 Publisher: AP Professional
 Copyright Date: 1994
 ISBN: 0-12-638010-4
 
 
Cryptography
~~~~~~~~~~~~
 Applied Cryptography: Protocols, Algorithms, and Source Code in C
 Author: Bruce Schneier
 Publisher: John Wiley & Sons
 Copyright Date: 1994
 ISBN: 0-471-59756-2
 
       Bruce Schneier's book replaces all other texts on
       cryptography.  If you are interested in cryptography, this is
       a must read.  This may be the first and last book on
       cryptography you may ever need to buy.
 
 Cryptography and Data Security
 Author: Dorothy Denning
 Publisher: Addison-Wesley Publishing Co.
 Copyright Date: 1982
 ISBN: 0-201-10150-5
 
 Protect Your Privacy: A Guide for PGP Users
 Author: William Stallings
 Publisher: Prentice-Hall
 Copyright Date: 1994
 ISBN: 0-13-185596-4
 
 
Programmed Threats
~~~~~~~~~~~~~~~~~~
 The Little Black Book of Computer Viruses
 Author: Mark Ludwig
 Publisher: American Eagle Publications
 Copyright Date: 1990
 ISBN: 0-929408-02-0
 
       The original, and still the best, book on computer viruses.
       No media hype here, just good clean technical information.
 
 Computer Viruses, Artificial Life and Evolution
 Author: Mark Ludwig
 Publisher: American Eagle Publications
 Copyright Date: 1993
 ISBN: 0-929408-07-1
 
 Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other
       Threats to Your System
 Author: John McAfee and Colin Haynes
 Publisher: St. Martin's Press
 Copyright Date: 1989
 ISBN: 0-312-03064-9 and 0-312-02889-X
 
 The Virus Creation Labs: A Journey Into the Underground
 Author: George Smith
 Publisher: American Eagle Publications
 Copyright Date: 1994
 ISBN:
 
 
Telephony
~~~~~~~~~
 Engineering and Operations in the Bell System
 Author: R.F. Rey
 Publisher: Bell Telephont Laboratories
 Copyright Date: 1983
 ISBN: 0-932764-04-5
 
       Although hopelessly out of date, this book remains *THE* book
       on telephony.  This book is 100% Bell, and is loved by phreaks
       the world over.
 
 Telephony: Today and Tomorrow
 Author: Dimitris N. Chorafas
 Publisher: Prentice-Hall
 Copyright Date: 1984
 ISBN: 0-13-902700-9
 
 The Telecommunications Fact Book and Illustrated Dictionary
 Author: Ahmed S. Khan
 Publisher: Delmar Publishers, Inc.
 Copyright Date: 1992
 ISBN: 0-8273-4615-8
 
       I find this dictionary to be an excellent reference book on
       telephony, and I recommend it to anyone with serious
       intentions in the field.
 
 Tandy/Radio Shack Cellular Hardware
 Author: Judas Gerard and Damien Thorn
 Publisher: Phoenix Rising Communications
 Copyright Date: 1994
 ISBN:
 
 The Phone Book
 Author: Carl Oppendahl
 Publisher: Consumer Reports
 Copyright Date:
 ISBN: 0-89043-364-x
 
       Listing of every cellular ID in the us, plus roaming ports,
       and info numbers for each carrier.
 
 Principles of Caller I.D.
 Author:
 Publisher: International MicroPower Corp.
 Copyright Date:
 ISBN:
 
 
Hacking History and Culture
~~~~~~~~~~~~~~~~~~~~~~~~~~~
 The Hacker Crackdown: Law and Disorder on the Electronic Frontier
 Author: Bruce Sterling
 Publisher: Bantam Books
 Copyright Date: 1982
 ISBN: 0-553-56370-X
 
       Bruce Sterling has recently released the book FREE to the net.
       The book is much easier to read in print form, and the
       paperback is only $5.99.  Either way you read it, you will be
       glad you did.  Mr. Sterling is an excellent science fiction
       author and has brought his talent with words to bear on the
       hacking culture.  A very enjoyable reading experience.
 
 Cyberpunk
 Author: Katie Hafner and John Markoff
 Publisher: Simon and Schuster
 Copyright Date: 1991
 ISBN: 0-671-77879-X
 
 The Cuckoo's Egg
 Author: Cliff Stoll
 Publisher: Simon and Schuster
 Copyright Date: 1989
 ISBN: 0-671-72688-9
 
 Hackers: Heroes of the Computer Revolution
 Author: Steven Levy
 Publisher: Doubleday
 Copyright Date: 1984
 ISBN: 0-440-13495-6
 
 
Unclassified
~~~~~~~~~~~~
 The Hacker's Handbook
 Author: Hugo Cornwall
 Publisher: E. Arthur Brown Company
 Copyright Date:
 ISBN: 0-912579-06-4
 
 Secrets of a Super Hacker
 Author: The Knightmare
 Publisher: Loompanics
 Copyright Date: 1994
 ISBN: 1-55950-106-5
 
       The Knightmare is no super hacker.  There is little or no real
       information in this book.  The Knightmare gives useful advice
       like telling you not to dress up before going trashing.
       The Knightmare's best hack is fooling Loompanics into
       publishing this garbage.
 
 The Day The Phones Stopped
 Author: Leonard Lee
 Publisher: Primus / Donald I Fine, Inc.
 Copyright Date: 1992
 ISBN: 1-55611-286-6
 
       Total garbage.  Paranoid delusions of a lunatic.  Less factual
       data that an average issue of the Enquirer.
 
 Information Warfare
 Author: Winn Swartau
 Publisher: Thunder Mountain Press
 Copyright Date: 1994
 ISBN: 1-56025-080-1
 
 An Illustrated Guide to the Techniques and Equipment of Electronic Warfare
 Author: Doug Richardson
 Publisher: Salamander Press
 Copyright Date:
 ISBN: 0-668-06497-8
 
 
 
VIDEOS
------
 
'Unauthorized Access' by Annaliza Savage
$25 on VH S format in 38-min
Savage Productions
1803 Mission St., #406
Santa Cruz, CA 95060
 
 
 
MAILING LISTS
-------------
 
 Academic Firewalls
 Reflector Address:
 Registration Address: Send a message to majordomo@greatcircle.com
                       containing the line "subscribe firewalls user@host"
 
 Bugtraq
 Reflector Address:    bugtraq@fc.net
 Registration Address: bugtraq-request@fc.net
 
 Cert Tools
 Reflector Address:    cert-tools@cert.org
 Registration Address: cert-tools-request@cert.org
 
 Computers and Society
 Reflector Address:    Comp-Soc@limbo.intuitive.com
 Registration Address: taylor@limbo.intuitive.com
 
 Coordinated Feasibility Effort to Unravel State Data
 Reflector Address:    ldc-sw@cpsr.org
 Registration Address:
 
 CPSR Announcement List
 Reflector Address:    cpsr-announce@cpsr.org
 Registration Address:
 
 CPSR - Intellectual Property
 Reflector Address:    cpsr-int-prop@cpsr.org
 Registration Address:
 
 CPSR - Internet Library
 Reflector Address:    cpsr-library@cpsr.org
 Registration Address:
 
 DefCon Announcement List
 Reflector Address:
 Registration Address: Send a message to majordomo@fc.net containing
                       the line "subscribe dc-announce"
 
 DefCon Chat List
 Reflector Address:
 Registration Address: Send a message to majordomo@fc.net containing
                       the line "subscribe dc-stuff"
 
 IDS (Intruder Detection Systems)
 Reflector Address:
 Registration Address: Send a message to majordomo@wyrm.cc.uow.edu.au
                       containing the line "subscribe ids"
 
 Macintosh Security
 Reflector Address:    mac-security@eclectic.com
 Registration Address: mac-security-request@eclectic.com
 
 NeXT Managers
 Reflector Address:
 Registration Address: next-managers-request@stolaf.edu
 
 Phiber-Scream
 Reflector Address:
 Registration Address: Send a message to listserv@netcom.com
                       containing the line "subscribe phiber-scream user@host"
 
 phruwt-l (Macintosh H/P)
 Reflector Address:
 Registration Address: Send a message to filbert@netcom.com
                       with the subject "phruwt-l"
 
 rfc931-users
 Reflector Address:    rfc931-users@kramden.acf.nyu.edu
 Registration Address: brnstnd@nyu.edu
 
 RSA Users
 Reflector Address:    rsaref-users@rsa.com
 Registration Address: rsaref-users-request@rsa.com


home help back first fref pref prev next nref lref last post