[94] in Intrusion Detection Systems
Re: SECURITY META HOTLIST
daemon@ATHENA.MIT.EDU (Will Spencer)
Wed May 10 16:43:05 1995
From: will@rmii.com (Will Spencer)
To: ids@uow.edu.au
Date: Wed, 10 May 1995 09:50:34 -0600 (MDT)
In-Reply-To: <9505091117.AA22953@punto.cefriel.it> from "Alberto Verga" at May 9, 95 12:17:44 pm
Reply-To: ids@uow.edu.au
av> I'm trying to collect as much as possible links and pointers to
av> _security related_ on-line documents, mailing list, books, newsgroups
av> in order to make a SECURITY META HOTLIST, a sort of Pointers Library
av> on security.
Alberto:
Here is my list. You will most likely need to cut out large portions of
it, but it should save you a great deal of time and make your search much
more complete:
FTP SITES
---------
aeneas.mit.edu
alex.sp.cs.cmu.edu /links/security (Misc)
alife.santafe.edu
aql.gatech.edu /pub (40Hex)
asylum.sf.ca.us
athena-dist.mit.edu /pub/ATHENA (Athena Project)
atlantis.utmb.edu
bellcore.com (Bellcore)
camelot.usc.edu /pub/cellular/DDIinfodemo (Cellular)
cert.org (CERT)
ciac.llnl.gov
coast.cs.purdue.edu /pub (Security/COAST)
csrc.ncsl.nist.gov
dartmouth.edu /pub/security (Security)
dg-rtp.dg.com
ds.internic.net
enlow.com
ftp.3com.com /mirrors/zip (ZipCrypt)
ftp.3com.com /Orange-Book (Orange Book)
ftp.acns.nwu.edu
ftp.alantec.com
ftp.c3.lanl.gov
ftp.cc.rochester.edu
ftp.cert.dfn.de (FIRST)
ftp.cisco.com
ftp.cnam.fr
ftp.commerce.net /pubs/standards/drafts/shttp.txt(Secure HyperText)
ftp.cs.colorado.edu
ftp.cs.ruu.nl
ftp.cs.uwm.edu /pub/comp-privacy (Privacy Digest)
ftp.cs.vu.nl
ftp.cs.yale.edu
ftp.csl.sri.com /pub/nides (SRI)
ftp.csua.berkeley.edu /pub/cypherpunks (Crypto)
ftp.cyberspace.com /pub/archive/defcon (PhoneTag)
ftp.delmarva.com
ftp.dsi.unimi.it
ftp.ee.lbl.gov
ftp.eff.org /pub/Publications/CuD (EFF)
ftp.elelab.nsc.co.jp /pub/security (Security)
ftp.etext.org (Etext)
ftp.fc.net /pub/defcon (DefCon)
ftp.fh-berlin.de
ftp.foobar.com
ftp.funet.fi
ftp.gate.net /pub/users/laura
ftp.gate.net /pub/users/wakko
ftp.greatcircle.com /pub/firewalls (Firewalls)
ftp.IEunet.ie /pub/security (Security)
ftp.ifi.uio.no
ftp.info.fundp.ac.be
ftp.informatik.uni-hamburg.de
ftp.inoc.dl.nec.com /pub/security (Security)
ftp.isi.edu
ftp.llnl.gov /pub (CIAC)
ftp.lysator.liu.se
ftp.mcs.com /mcsnet.users/crisadm (Virii)
ftp.microserve.net /ppp-pop/strata/mac (Mac)
ftp.near.net /security/archives/phrack (Zines)
ftp.nec.com
ftp.netcom.com /pub/br/bradleym (Virii)
ftp.netcom.com /pub/da/daemon9
ftp.netcom.com /pub/va/vandal (DnA)
ftp.netcom.com /pub/zz/zzyzx (H/P)
ftp.netsys.com
ftp.ocs.mq.edu.au /PC/Crypt (Crypto)
ftp.paranoia.com /pub/toneloc/tl110.zip (ToneLoc)
ftp.pop.psu.edu
ftp.primus.com /pub/armchair (Phoney)
ftp.primus.com /pub/security (Security)
ftp.psy.uq.oz.au
ftp.sert.edu.au
ftp.sgi.com
ftp.sunet.se /pub/network/monitoring (Ethernet sniffers)
ftp.sura.net /pub/security (SURAnet)
ftp.technet.sg
ftp.tis.com /pub (TIS)
ftp.uspto.gov
ftp.uu.net /doc/literary/obi/Phracks (Zines)
ftp.vis.colostate.edu
ftp.vix.com
ftp.vortex.com
ftp.win.tue.nl /pub/security (Security)
ftp.winternet.com /users/craigb (H/P)
ftp.wustl.edu /doc/EFF (EFF)
furmint.nectar.cs.cmu.edu /security (Crypto)
garbo.uwasa.fi /pc/crypt (Crypto)
gumby.dsd.trw.com
hplyot.obspm.fr
info.mcs.anl.gov
jerico.usc.edu
lcs.mit.edu /telecom-archives (Telecom archives)
mac.archive.umich.edu
mary.iia.org /pub/users/patriot (Misc)
monet.ccs.itd.umich.edu
net.tamu.edu /pub/security/TAMU (Security)
net23.com /pub (Max Headroom)
nic.ddn.mil /scc (DDN Security)
nic.funet.fi /pub/doc/cud (Zines)
oak.oakland.edu
paradox1.denver.colorado.edu /anonymous/text-files/pyrotechnics (Pyro)
parcftp.xerox.com
pyrite.rutgers.edu /pub/security (Security)
relay.cs.toronto.edu /doc/telecom-archives (Telecom)
rena.dit.co.jp /pub/security (Security)
research.att.com /dist/internet_security (AT&T)
ripem.msu.edu /pub/crypt (Ripem)
rs1.rrz.uni-koeln.de (Wordlists)
rtfm.mit.edu (Etext)
rtfm.mit.edu /pub/usenet-by-group (Usenet FAQ's)
sable.ox.ac.uk (Wordlists)
samadams.princeton.edu
scss3.cl.msu.edu /pub/crypt (Crypto)
sierra.stanford.edu
spy.org (CSC)
suburbia.apana.org.au /pub/unix/security (Security)
sunsolve1.sun.com
tam.cs.ucdavis.edu
technion.ac.il
theta.iis.u-tokyo.ac.jp /pub1/security (Security)
thumper.bellcore.com
titania.mathematik.uni-ulm.de /pub/security (Security)
toxicwaste.mit.edu /pub/rsa129/README (Breaking RSA)
uceng.uc.edu /pub/kerberos.documentation (Kerberos)
ugle.unit.no
vic.cc.purdue.edu
wimsey.bc.ca /pub/crypto (Crypto)
NEWSGROUPS
----------
alt.comp.virus
alt.dcom.telecom Discussion of telecommunications technology
alt.security Security issues on computer systems
alt.security.index Pointers to good stuff in misc.security (Moderated)
alt.security.keydist Exchange of keys for public key encryption systems
alt.security.pgp The Pretty Good Privacy package
alt.security.ripem A secure email system illegal to export from the US
comp.org.cpsr.announce Computer Professionals for Social Responsibility
comp.org.cpsr.talk Issues of computing and social responsibility
comp.org.eff.news News from the Electronic Frontiers Foundation
comp.org.eff.talk Discussion of EFF goals, strategies, etc.
comp.protocols.kerberos The Kerberos authentification server
comp.protocols.tcp-ip TCP and IP network protocols
comp.risks Risks to the public from computers & users
comp.security.announce Announcements from the CERT about security
comp.security.misc Security issues of computers and networks
comp.security.unix Discussion of Unix security
comp.virus Computer viruses & security (Moderated)
de.org.ccc Mitteilungen des CCC e.V.
misc.security Security in general, not just computers (Moderated)
sci.crypt Different methods of data en/decryption
TELNET SITES
------------
ntiabbs.ntia.doc.gov (NTIA)
GOPHER SITES
------------
ba.com (Bell Atlantic)
csrc.ncsl.nist.gov (NIST Security Gopher)
gopher.acm.org (SIGSAC (Security, Audit & Control))
gopher.cpsr.org (Computer Professionals for Social Responsibility)
gopher.cs.uwm.edu
gopher.eff.org (Electonic Frontier Foundation)
gw.PacBell.com (Pacific Bell)
iitf.doc.gov (NITA -- IITF)
oss.net (Open Source Solutions)
spy.org (Computer Systems Consulting)
WWW SITES
---------
http://alumni.caltech.edu/~dank/isdn/ (ISDN)
http://aset.rsoc.rockwell.com (NASA/MOD AIS Security)
http://aset.rsoc.rockwell.com/exhibit.html (Tech. for Info Sec)
http://att.net/dir800 (800 directory)
http://ausg.dartmouth.edu/security.html (Security)
http://cs.purdue.edu/coast/coast.html (Coast)
http://csrc.ncsl.nist.gov (NIST)
http://dhp.com/~pluvius
http://dfw.net/~aleph1 (Eubercrackers)
http://draco.centerline.com:8080/~franl/crypto.html (Crypto)
http://everest.cs.ucdavis.edu/Security.html (Security)
http://everest.cs.ucdavis.edu/slides/slides.html(Security Lab Slides)
http://ezinfo.ethz.ch/ETH/D-REOK/fsk/fsk_homepage.html (CSSCR)
http://first.org (FIRST)
http://ftp.tamu.edu/~abr8030/security.html (Security)
http://hightop.nrl.navy.mil/potpourri.html (Security)
http://hightop.nrl.navy.mil/rainbow.html (Rainbow Books)
http://ice-www.larc.nasa.gov/ICE/papers/hacker-crackdown.html (Sterling)
http://ice-www.larc.nasa.gov/ICE/papers/nis-requirements.html (ICE NIS)
http://info.bellcore.com/BETSI/betsi.html (Betsi)
http://infosec.nosc.mil/infosec.html (SPAWAR INFOSEC)
http://l0pht.com (The l0pht)
http://l0pht.com/~oblivion/IIRG.html (Phantasy Magazine)
http://mindlink.jolt.com (The Secrets of LockPicking)
http://mls.saic.com (SAIC MLS)
http://naic.nasa.gov/fbi/FBI_homepage.html (FBI Homepage)
http://nasirc.hq.nasa.gov (NASA ASIRC)
http://ophie.hughes.american.edu/~ophie
http://ripco.com:8080/~glr/glr.html (Full Disclosure)
http://spy.org (CSC)
http://tansu.com.au/Info/security.html (Comp and Net Security)
http://the-tech.mit.edu (LaMacchia case info)
http://ucs.orst.edu:8001/mintro.html (Micro Power Broadcasting)
http://wintermute.itd.nrl.navy.mil/5544.html (Network Security)
http://www.aads.net (Ameritech)
http://www.alw.nih.gov/WWW/security.html (Unix Security)
http://www.artcom.de/CCC (CCC Homepage)
http://www.aspentec.com/~frzmtdb/fun/hacker.html
http://www.aus.xanadu.com:70/1/EFA (EFF Australia)
http://www.ba.com (Bell Atlantic)
http://www.beckman.uiuc.edu/groups/biss/VirtualLibrary/xsecurity.html(X-Win)
http://www.bell.com (MFJ Task Force)
http://www.bellcore.com/SECURITY/security.html (Bellcore Security Products)
http://www.brad.ac.uk/~nasmith/index.html
http://www.bst.bls.com (BellSouth)
http://www.c3.lanl.gov/~mcn (Lanl)
http://www.cert.dfn.de/ (German First Team)
http://www.commerce.net/information/standards/drafts/shttp.txt (HyperText)
http://www.contrib.andrew.cmu.edu:8001/usr/dscw/home.html
http://www.cpsr.org/home (CPSR)
http://www.cs.tufts.edu/~mcable/cypher/alerts/alerts.html (Cypherpunk)
http://www.cs.tufts.edu/~mcable/HackerCrackdown (Hacker Crackdown)
http://www.cs.umd.edu/~lgas
http://www.cs.cmu.edu:8001/afs/cs.cmu.edu/user/bsy/www/sec.html (Security)
http://www.csd.harris.com/secure_info.html (Harris)
http://www.csl.sri.com (SRI Computer Science Lab)
http://www.cybercafe.org/cybercafe/pubtel/pubdir.html (CyberCafe)
http://www.datafellows.fi (Data Fellows)
http://www.delmarva.com/raptor/raptor.html (Raptor Network Isolator)
http://www.demon.co.uk/kbridge (KarlBridge)
http://www.digicash.com/ecash/ecash-home.html (Digital Cash)
http://www.digital.com/info/key-secure-index.html(Digital Secure Systems)
http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html(Bugtraq)
http://www.eecs.nwu.edu/~jmyers/ids/index.html (Intrusion Detection Systems)
http://www.eff.org/papers.html (EFF)
http://www.engin.umich.edu/~jgotts/boxes.html (Box info)
http://www.engin.umich.edu/~jgotts/underground/hack-faq.html(alt.2600 FAQ)
http://www.ensta.fr/internet/unix/sys_admin (System administration)
http://www.etext.org/Zines/ (Zines)
http://www.fc.net/defcon (DefCon)
http://www.fedworld.gov (Federal Government)
http://www.first.org/first/ (FIRST)
http://www.getnet.com/crak or (CRAK Software)
http://www.greatcircle.com (Great Circle Associates)
http://www.hpcc.gov/blue94/section.4.6.html (NSA)
http://www.ic.gov (The CIA)
http://www.indirect.com/www/johnk/ (CRAK Software)
http://www.lerc.nasa.gov/Unix_Team/Dist_Computing_Security.html (Security)
http://www.mpr.ca/ (MPR Teltech Ltd)
http://www.net23.com (Max Headroom)
http://www.nist.gov (NIST)
http://www.ntt.jp (Nippon Telephone)
http://www.pacbell.com (Pacific Bell)
http://www.paranoia.com/mthreat (ToneLoc)
http://www.pegasus.esprit.ec.org/people/arne/pgp.html (PGP)
http://www.phantom.com/~king (Taran King)
http://www.primenet.com/~kludge/haqr.html (Kludge)
http://www.quadralay.com/www/Crypt/Crypt.html (Quadralay Cryptography)
http://www.qualcomm.com/cdma/wireless.html (Qualcomm CDMA)
http://www.research.att.com (AT&T)
http://www.rsa.com (RSA Data Security)
http://www.satelnet.org/~ccappuc
http://www.service.com/cm/uswest/usw1.html (USWest)
http://www.shore.net/~oz/welcome.html (Hack TV)
http://www.spy.org (Computer Systems Consulting)
http://www.sri.com (SRI)
http://www.tansu.com.au/Info/security.html (Security Reference Index)
http://www.tis.com (Trusted Information Systems)
http://www.tri.sbc.com (Southwestern Bell)
http://www.uci.agh.edu.pl/pub/security (Security)
http://www.umcc.umich.edu/~doug/virus-faq.html (Virus)
http://www.usfca.edu/crackdown/crack.html (Hacker Crackdown)
http://www.wam.umd.edu/~ankh/Public/devil_does_unix
http://www.wiltel.com (Wiltel)
http://www.winternet.com/~carolann/dreams.html
http://www.wired.com (Wired Magazine)
BOOKS
------
General Computer Security
~~~~~~~~~~~~~~~~~~~~~~~~~
Computer Security Basics
Author: Deborah Russell and G.T. Gengemi Sr.
Publisher: O'Reilly & Associates, Inc.
Copyright Date: 1991
ISBN: 0-937175-71-4
This is an excellent book. It gives a broad overview of
computer security without sacrificing detail. A must read for
the beginning security expert.
Computer Security Management
Author: Karen Forcht
Publisher: Boyd and Fraser
Copyright Date: 1994
ISBN: 0-87835-881-1
Information Systems Security
Author: Philip Fites and Martin Kratz
Publisher: Van Nostrad Reinhold
Copyright Date: 1993
ISBN: 0-442-00180-0
Computer Related Risks
Author: Peter G. Neumann
Publisher: Addison-Wesley
Copyright Date: 1995
ISBN: 0-201-55805-X
Computer Security Management
Author: Karen Forcht
Publisher: boyd & fraser publishing company
Copyright Date: 1994
ISBN: 0-87835-881-1
The Stephen Cobb Complete Book of PC and LAN Security
Author: Stephen Cobb
Publisher: Windcrest Books
Copyright Date: 1992
ISBN: 0-8306-9280-0 (hardback) 0-8306-3280-8 (paperback)
Security in Computing
Author: Charles P. Pfleeger
Publisher: Prentice Hall
Copyright Date: 1989
ISBN: 0-13-798943-1.
Building a Secure Computer System
Author: Morrie Gasser
Publisher: Van Nostrand Reinhold Co., New York.
Copyright Date:
ISBN: 0-442-23022-2
Modern Methods for Computer Security
Author: Lance Hoffman
Publisher: Prentice Hall
Copyright Date: 1977
ISBN:
Windows NT 3.5 Guidelines for Security, Audit and Control
Author:
Publisher: Microsoft Press
Copyright Date:
ISBN: 1-55615-814-9
Unix System Security
~~~~~~~~~~~~~~~~~~~~
Practical Unix Security
Author: Simson Garfinkel and Gene Spafford
Publisher: O'Reilly & Associates, Inc.
Copyright Date: 1991
ISBN: 0-937175-72-2
Finally someone with a very firm grasp of Unix system security
gets down to writing a book on the subject. Buy this book.
Read this book.
Firewalls and Internet Security
Author: William Cheswick and Steven Bellovin
Publisher: Addison Wesley
Copyright Date: 1994
ISBN: 0-201-63357-4
Unix System Security
Author: Rik Farrow
Publisher: Addison Wesley
Copyright Date: 1991
ISBN: 0-201-57030-0
Unix Security: A Practical Tutorial
Author: N. Derek Arnold
Publisher: McGraw Hill
Copyright Date: 1993
ISBN: 0-07-002560-6
Unix System Security: A Guide for Users and Systems Administrators
Author: David A. Curry
Publisher: Addison-Wesley
Copyright Date: 1992
ISBN: 0-201-56327-4
Unix System Security
Author: Patrick H. Wood and Stephen G. Kochan
Publisher: Hayden Books
Copyright Date: 1985
ISBN: 0-672-48494-3
Unix Security for the Organization
Author: Richard Bryant
Publisher: Sams
Copyright Date: 1994
ISBN: 0-672-30571-2
Network Security
~~~~~~~~~~~~~~~~
Network Security Secrets
Author: David J. Stang and Sylvia Moon
Publisher: IDG Books
Copyright Date: 1993
ISBN: 1-56884-021-7
Not a total waste of paper, but definitely not worth the
$49.95 purchase price. The book is a rehash of previously
published information. The only secret we learn from reading
the book is that Sylvia Moon is a younger woman madly in love
with the older David Stang.
Complete Lan Security and Control
Author: Peter Davis
Publisher: Windcrest / McGraw Hill
Copyright Date: 1994
ISBN: 0-8306-4548-9 and 0-8306-4549-7
Network Security
Author: Steven Shaffer and Alan Simon
Publisher: AP Professional
Copyright Date: 1994
ISBN: 0-12-638010-4
Cryptography
~~~~~~~~~~~~
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Author: Bruce Schneier
Publisher: John Wiley & Sons
Copyright Date: 1994
ISBN: 0-471-59756-2
Bruce Schneier's book replaces all other texts on
cryptography. If you are interested in cryptography, this is
a must read. This may be the first and last book on
cryptography you may ever need to buy.
Cryptography and Data Security
Author: Dorothy Denning
Publisher: Addison-Wesley Publishing Co.
Copyright Date: 1982
ISBN: 0-201-10150-5
Protect Your Privacy: A Guide for PGP Users
Author: William Stallings
Publisher: Prentice-Hall
Copyright Date: 1994
ISBN: 0-13-185596-4
Programmed Threats
~~~~~~~~~~~~~~~~~~
The Little Black Book of Computer Viruses
Author: Mark Ludwig
Publisher: American Eagle Publications
Copyright Date: 1990
ISBN: 0-929408-02-0
The original, and still the best, book on computer viruses.
No media hype here, just good clean technical information.
Computer Viruses, Artificial Life and Evolution
Author: Mark Ludwig
Publisher: American Eagle Publications
Copyright Date: 1993
ISBN: 0-929408-07-1
Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other
Threats to Your System
Author: John McAfee and Colin Haynes
Publisher: St. Martin's Press
Copyright Date: 1989
ISBN: 0-312-03064-9 and 0-312-02889-X
The Virus Creation Labs: A Journey Into the Underground
Author: George Smith
Publisher: American Eagle Publications
Copyright Date: 1994
ISBN:
Telephony
~~~~~~~~~
Engineering and Operations in the Bell System
Author: R.F. Rey
Publisher: Bell Telephont Laboratories
Copyright Date: 1983
ISBN: 0-932764-04-5
Although hopelessly out of date, this book remains *THE* book
on telephony. This book is 100% Bell, and is loved by phreaks
the world over.
Telephony: Today and Tomorrow
Author: Dimitris N. Chorafas
Publisher: Prentice-Hall
Copyright Date: 1984
ISBN: 0-13-902700-9
The Telecommunications Fact Book and Illustrated Dictionary
Author: Ahmed S. Khan
Publisher: Delmar Publishers, Inc.
Copyright Date: 1992
ISBN: 0-8273-4615-8
I find this dictionary to be an excellent reference book on
telephony, and I recommend it to anyone with serious
intentions in the field.
Tandy/Radio Shack Cellular Hardware
Author: Judas Gerard and Damien Thorn
Publisher: Phoenix Rising Communications
Copyright Date: 1994
ISBN:
The Phone Book
Author: Carl Oppendahl
Publisher: Consumer Reports
Copyright Date:
ISBN: 0-89043-364-x
Listing of every cellular ID in the us, plus roaming ports,
and info numbers for each carrier.
Principles of Caller I.D.
Author:
Publisher: International MicroPower Corp.
Copyright Date:
ISBN:
Hacking History and Culture
~~~~~~~~~~~~~~~~~~~~~~~~~~~
The Hacker Crackdown: Law and Disorder on the Electronic Frontier
Author: Bruce Sterling
Publisher: Bantam Books
Copyright Date: 1982
ISBN: 0-553-56370-X
Bruce Sterling has recently released the book FREE to the net.
The book is much easier to read in print form, and the
paperback is only $5.99. Either way you read it, you will be
glad you did. Mr. Sterling is an excellent science fiction
author and has brought his talent with words to bear on the
hacking culture. A very enjoyable reading experience.
Cyberpunk
Author: Katie Hafner and John Markoff
Publisher: Simon and Schuster
Copyright Date: 1991
ISBN: 0-671-77879-X
The Cuckoo's Egg
Author: Cliff Stoll
Publisher: Simon and Schuster
Copyright Date: 1989
ISBN: 0-671-72688-9
Hackers: Heroes of the Computer Revolution
Author: Steven Levy
Publisher: Doubleday
Copyright Date: 1984
ISBN: 0-440-13495-6
Unclassified
~~~~~~~~~~~~
The Hacker's Handbook
Author: Hugo Cornwall
Publisher: E. Arthur Brown Company
Copyright Date:
ISBN: 0-912579-06-4
Secrets of a Super Hacker
Author: The Knightmare
Publisher: Loompanics
Copyright Date: 1994
ISBN: 1-55950-106-5
The Knightmare is no super hacker. There is little or no real
information in this book. The Knightmare gives useful advice
like telling you not to dress up before going trashing.
The Knightmare's best hack is fooling Loompanics into
publishing this garbage.
The Day The Phones Stopped
Author: Leonard Lee
Publisher: Primus / Donald I Fine, Inc.
Copyright Date: 1992
ISBN: 1-55611-286-6
Total garbage. Paranoid delusions of a lunatic. Less factual
data that an average issue of the Enquirer.
Information Warfare
Author: Winn Swartau
Publisher: Thunder Mountain Press
Copyright Date: 1994
ISBN: 1-56025-080-1
An Illustrated Guide to the Techniques and Equipment of Electronic Warfare
Author: Doug Richardson
Publisher: Salamander Press
Copyright Date:
ISBN: 0-668-06497-8
VIDEOS
------
'Unauthorized Access' by Annaliza Savage
$25 on VH S format in 38-min
Savage Productions
1803 Mission St., #406
Santa Cruz, CA 95060
MAILING LISTS
-------------
Academic Firewalls
Reflector Address:
Registration Address: Send a message to majordomo@greatcircle.com
containing the line "subscribe firewalls user@host"
Bugtraq
Reflector Address: bugtraq@fc.net
Registration Address: bugtraq-request@fc.net
Cert Tools
Reflector Address: cert-tools@cert.org
Registration Address: cert-tools-request@cert.org
Computers and Society
Reflector Address: Comp-Soc@limbo.intuitive.com
Registration Address: taylor@limbo.intuitive.com
Coordinated Feasibility Effort to Unravel State Data
Reflector Address: ldc-sw@cpsr.org
Registration Address:
CPSR Announcement List
Reflector Address: cpsr-announce@cpsr.org
Registration Address:
CPSR - Intellectual Property
Reflector Address: cpsr-int-prop@cpsr.org
Registration Address:
CPSR - Internet Library
Reflector Address: cpsr-library@cpsr.org
Registration Address:
DefCon Announcement List
Reflector Address:
Registration Address: Send a message to majordomo@fc.net containing
the line "subscribe dc-announce"
DefCon Chat List
Reflector Address:
Registration Address: Send a message to majordomo@fc.net containing
the line "subscribe dc-stuff"
IDS (Intruder Detection Systems)
Reflector Address:
Registration Address: Send a message to majordomo@wyrm.cc.uow.edu.au
containing the line "subscribe ids"
Macintosh Security
Reflector Address: mac-security@eclectic.com
Registration Address: mac-security-request@eclectic.com
NeXT Managers
Reflector Address:
Registration Address: next-managers-request@stolaf.edu
Phiber-Scream
Reflector Address:
Registration Address: Send a message to listserv@netcom.com
containing the line "subscribe phiber-scream user@host"
phruwt-l (Macintosh H/P)
Reflector Address:
Registration Address: Send a message to filbert@netcom.com
with the subject "phruwt-l"
rfc931-users
Reflector Address: rfc931-users@kramden.acf.nyu.edu
Registration Address: brnstnd@nyu.edu
RSA Users
Reflector Address: rsaref-users@rsa.com
Registration Address: rsaref-users-request@rsa.com