All Security Resources

No explicit questions like "how do I hack xxx.com" please!
Post Reply
User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

All Security Resources

Post by DNR »

HUGE Security Resource - version 5000 - 03/06/12

- previously known as: HUGE List of Security Blogs: Unix, Linux, Windows,
part 1, 2, 3, and 4. (see the bottom of this version for links to previous
versions under the former title)

##### Changes since last post (version 5000, previously known as "part 4"):
# 1. New revisions/posts will be by date and version number, not by "date"/"part"
# 2. New security blog links
# 3. Inclusion of more sites than "blogs", useful security related links
# 4. Established a numbering process per new section, starting with #5000
# no particular reason for beginning at this number, random choice.
# 5. Changed the name of this publication from:
# "HUGE List of Security Blogs: Unix, Linux, Windows - part #"
# to: HUGE Security Resource version # - release date
################################################################
# Sections, version 6, 03/06/2012
#
# 5000: Wikipedia (all links here found within Wikipedia)
# 5001: Suggested Books
# 5002: Articles, Guides, How To's
# 5003: Antivirus LiveCDs - boot and scan your system for malware
# 5004: Random Links
# 5005: Security Blogs
# 5006: Security Forums (Web based Discussion Forums)
# 5007: Security Magazines & Zines
# n/a : Copy/paste inclusion of previous release
################################################################

** 5000: Wikipedia:

Acoustic cryptanalysis
- https://en.wikipedia.org/wiki/Acoustic_cryptanalysis" onclick="window.open(this.href);return false;

Advanced persistent threat
- https://en.wikipedia.org/wiki/Advanced_ ... ent_Threat" onclick="window.open(this.href);return false;

ARP spoofing
- https://en.wikipedia.org/wiki/ARP_poisoning" onclick="window.open(this.href);return false;

ARP Watch
- https://en.wikipedia.org/wiki/Arpwatch" onclick="window.open(this.href);return false;

Category:Confidence_tricks
- http://en.wikipedia.org/wiki/Category:Confidence_tricks" onclick="window.open(this.href);return false;

Category: Cryptographic_attacks
- https://en.wikipedia.org/wiki/Category: ... ic_attacks" onclick="window.open(this.href);return false;

Category: Signals_intelligence
- https://en.wikipedia.org/wiki/Category: ... telligence" onclick="window.open(this.href);return false;

Category: Surveillance
- https://en.wikipedia.org/wiki/Category:Surveillance" onclick="window.open(this.href);return false;

Chaffing and winnowing (cryptographic technique)
- https://en.wikipedia.org/wiki/Chaffing_and_winnowing" onclick="window.open(this.href);return false;

Cold boot attack
- https://en.wikipedia.org/wiki/Cold_boot_attack" onclick="window.open(this.href);return false;

CyanogenMod
- https://en.wikipedia.org/wiki/CyanogenMod" onclick="window.open(this.href);return false;

Deep packet inspection
- https://en.wikipedia.org/wiki/Deep_packet_inspection" onclick="window.open(this.href);return false;

DNS cache poisoning
- https://en.wikipedia.org/wiki/DNS_poisoning" onclick="window.open(this.href);return false;

Echelon (signals intelligence)
- https://en.wikipedia.org/wiki/ECHELON" onclick="window.open(this.href);return false;

Electromagnetic interference
- https://en.wikipedia.org/wiki/Electroma ... terference" onclick="window.open(this.href);return false;

Electromagnetic radiation and health
- https://en.wikipedia.org/wiki/Electroma ... and_health" onclick="window.open(this.href);return false;

Electromagnetic shielding
- https://en.wikipedia.org/wiki/Electromagnetic_shielding" onclick="window.open(this.href);return false;

EMF meter
- https://secure.wikimedia.org/wikipedia/ ... /EMF_Meter" onclick="window.open(this.href);return false;

Frequency counter
- https://en.wikipedia.org/wiki/Frequency_counter" onclick="window.open(this.href);return false;

High-frequency direction finding (electronics)
- https://en.wikipedia.org/wiki/HF/DF" onclick="window.open(this.href);return false;

I2P
- https://en.wikipedia.org/wiki/I2P" onclick="window.open(this.href);return false;

Laser microphone
- https://en.wikipedia.org/wiki/Laser_microphone" onclick="window.open(this.href);return false;

Linux malware
- https://en.wikipedia.org/wiki/Linux_malware" onclick="window.open(this.href);return false;

Nonverbal communication
- https://en.wikipedia.org/wiki/Nonverbal_communication" onclick="window.open(this.href);return false;

Operation RAFTER
"RAFTER was a code name for the MI5 radio receiver detection technique, mostly used against clandestine Soviet agents and monitoring of domestic radio transmissions by foreign embassy personnel from the 1950s on."
- https://en.wikipedia.org/wiki/Operation_RAFTER" onclick="window.open(this.href);return false;

Spycatcher: The Candid Autobiography of a Senior Intelligence Officer (also Spycatcher), is a book written by Peter Wright, former MI5 officer and Assistant Director, and co-author Paul Greengrass. It was published first in Australia. Its allegations proved scandalous on publication, but more so because the British Government attempted to ban it, ensuring its profit and notoriety.
- https://en.wikipedia.org/wiki/Spycatcher" onclick="window.open(this.href);return false;

Palantir Technologies, Inc., headquartered in Palo Alto, California, with offices in Tysons Corner, Virginia, New York City and Covent Garden, London, is a software company that produces the Palantir Government and Palantir Finance platforms. Palantir offers a Java-based platform for analyzing, integrating, and visualizing data of all kinds, including structured, unstructured, relational, temporal, and geospatial.
- https://en.wikipedia.org/wiki/Palantir_Technologies" onclick="window.open(this.href);return false;

Paralanguage refers to the non-verbal elements of communication used to modify meaning and convey emotion. Paralanguage may be expressed consciously or unconsciously, and it includes the pitch, volume, and, in some cases, intonation of speech. Sometimes the definition is restricted to vocally-produced sounds. The study is known as paralinguistics.
- https://en.wikipedia.org/wiki/Paralanguage" onclick="window.open(this.href);return false;

Power analysis
- https://en.wikipedia.org/wiki/Power_analysis" onclick="window.open(this.href);return false;

Project MINARET was a sister project to Project SHAMROCK operated by the NSA, which, after intercepting electronic communications that contained the names of predesignated US citizens, passed them to other government law enforcement and intelligence organizations.Intercepted messages were disseminated to the FBI, CIA, Secret Service, Bureau of Narcotics and Dangerous Drugs (BNDD), and the Department of Defense.
- https://en.wikipedia.org/wiki/Project_MINARET" onclick="window.open(this.href);return false;

Project SHAMROCK, considered to be the sister project for Project MINARET, was an espionage exercise, started in August 1945 that involved the accumulation of all telegraphic data entering into or exiting from the United States. The Armed Forces Security Agency (AFSA)and its successor NSA were given direct access to daily microfilm copies of all incoming, outgoing, and transiting telegraphs via the Western Union and its associates RCA and ITT.
- https://en.wikipedia.org/wiki/Project_Shamrock" onclick="window.open(this.href);return false;

Radio direction finder
- https://en.wikipedia.org/wiki/Radio_direction_finder" onclick="window.open(this.href);return false;

Scrambler - In telecommunications, a scrambler is a device that transposes or inverts signals or otherwise encodes a message at the transmitter to make the message unintelligible at a receiver not equipped with an appropriately set descrambling device.
- https://en.wikipedia.org/wiki/Scrambler" onclick="window.open(this.href);return false;

Secure communication
- https://en.wikipedia.org/wiki/Secure_Communication" onclick="window.open(this.href);return false;

Situation awareness
- https://en.wikipedia.org/wiki/Situation_awareness" onclick="window.open(this.href);return false;

Sysctl
- https://en.wikipedia.org/wiki/Sysctl" onclick="window.open(this.href);return false;

ThinThread is the name of a project that the United States National Security Agency engaged in during the 1990s, according to a May 17, 2006 article in the Baltimore Sun. The program involved wiretapping and sophisticated analysis of the resulting data, but according to the article, the program was discontinued after the September 11, 2001 attacks due to the changes in priorities and the consolidation of U.S. intelligence authority.
- https://en.wikipedia.org/wiki/ThinThread" onclick="window.open(this.href);return false;

Timing attack
- https://en.wikipedia.org/wiki/Timing_attack" onclick="window.open(this.href);return false;

Tradecraft is skill acquired through experience in a (typically clandestine) trade. Within the intelligence community this means the techniques used in modern espionage and generally, the activity of intelligence. This includes general topics or techniques (dead drops, for example), or the specific techniques of a nation or organization (the particular form of encryption used by the NSA, for example).
- https://en.wikipedia.org/wiki/Tradecraft" onclick="window.open(this.href);return false;

Trailblazer Project
Trailblazer was a United States National Security Agency (NSA) program intended to analyze data carried on communications networks like the internet. It was able to track communication methods such as cell phones and e-mail. It ran over budget, failed to accomplish several goals, and was cancelled.
- https://en.wikipedia.org/wiki/Trailblazer_Project" onclick="window.open(this.href);return false;

OpenBSD Journal
- https://en.wikipedia.org/wiki/OpenBSD_Journal" onclick="window.open(this.href);return false;

‘Openbsd’ Articles at Kevin Hatfield’s Blog
Articles tagged with 'Openbsd' at Kevin Hatfield's Blog
- http://www.kevinhatfield.org/?tag=openbsd" onclick="window.open(this.href);return false;

Jon Hart's Blog: OpenBSD on Soekris -- A Cheater's Guide
- http://blog.spoofed.org/2007/12/openbsd ... guide.html" onclick="window.open(this.href);return false;

Syscall Hijacking: OpenBSD - memset's blog
- https://memset.wordpress.com/2011/11/26 ... g-openbsd/" onclick="window.open(this.href);return false;

Bill’s Security Blog - OpenBSD
- http://www.wrgross.com/blogs/security/category/openbsd/" onclick="window.open(this.href);return false;

OpenBSD | Wow! eBook - Blog
- http://www.wowebook.me/tag/openbsd/" onclick="window.open(this.href);return false;
----------------------------------------

** 5001: Suggested Books:

- LOAK & CORKSCREW: Where CIA Meets Hollywood
- Radio Frequency Interference: How to Find It and Fix It
- SAS Survival Handbook, Revised Edition: For Any Climate, in Any Situation
- Spycatcher - by Peter Wright

----------------------------------------

** 5002: Articles, Guides, How To's

Owned Over Amateur Radio (Remote kernel exploitation) (PDF)
- http://vulnfactory.org/research/defcon-remote.pdf" onclick="window.open(this.href);return false;

Even Nastier: Traditional RootKits | So, What Do Traditional RootKits Do? | InformIT
When attackers get root access on a machine, a RootKit allows them to maintain that access by implementing a back door and hiding evidence of system compromise. Ed Skoudis shows how to avoid being RootKitted in this article.
- http://www.informit.com/articles/articl ... 3463&rll=1" onclick="window.open(this.href);return false;

Anonymous Blogging with Wordpress & Tor - Global Voices Advocacy
- http://advocacy.globalvoicesonline.org/projects/guide/" onclick="window.open(this.href);return false;

Attacks on Package Managers
- http://www.cs.arizona.edu/stork/package ... y/faq.html" onclick="window.open(this.href);return false;

0wning Vista from the boot; BIOS rootkit(s)
Federico Biancuzzi interviews Nitin and Vipin Kumar, authors of VBootkit, a rootkit that is able to load from Windows Vista boot-sectors.
- http://www.securityfocus.com/columnists/442/2" onclick="window.open(this.href);return false;

20 Linux Server Hardening Security Tips
Top 20 Linux hardening tutorial and tips to secure the default installation of RHEL / CentOS / Fedora / Debian Linux servers.
- http://www.cyberciti.biz/tips/linux-security.html" onclick="window.open(this.href);return false;

Linux System Monitoring Tools Every SysAdmin Should Know
Top 20 Linux Server Performance Monitoring Tools To Solve Server Bottlenecks Issues related to CPU, Memory, Disk, and networking subsystems.
- http://www.cyberciti.biz/tips/top-linux ... tools.html" onclick="window.open(this.href);return false;

NSA Releases 17 Cryptologic Articles
- http://cryptome.org/0006/nsa-17-docs.htm" onclick="window.open(this.href);return false;

Black ops: how HBGary wrote backdoors for the government
The attacks last week by Anonymous on security firm HBGary have yanked back the curtain on the dark world of government-sponsored malware. Where does the US military get its custom rootkits? It buys them and the 0-day exploits that deliver them;from private security firms.
- http://arstechnica.com/tech-policy/news ... nment.ars/" onclick="window.open(this.href);return false;

CIA 175 Spying Technology Partners
- http://cryptome.org/0005/cia-iqt-spies.htm" onclick="window.open(this.href);return false;

Detecting and Removing Malicious Code | Symantec Connect Community
by Matthew Tanase Detecting and Removing Malicious Code by Matthew Tanase last updated July 22, 2002 Introduction Has it happened yet? The phone call, the e-mail, the page, or maybe you discovered it yourself.
- http://www.symantec.com/connect/article ... cious-code" onclick="window.open(this.href);return false;

Detecting Rootkits And Kernel-level Compromises In Linux | Symantec Connect Community
by Mariusz Burdach, This article is intended to outline useful ways of detecting hidden modifications to a Linux kernel.
- http://www.symantec.com/connect/article ... ises-linux" onclick="window.open(this.href);return false;

Encryption with KGpg
- http://doc.opensuse.org/documentation/h ... rypto.html" onclick="window.open(this.href);return false;

Encryption with Passwords and Encryption Keys
- http://doc.opensuse.org/documentation/h ... rypto.html" onclick="window.open(this.href);return false;

FileIntegrityAIDE - Community Ubuntu Documentation
- https://help.ubuntu.com/community/FileIntegrityAIDE" onclick="window.open(this.href);return false;

Find Hidden Processes and Ports [ Linux / Unix / Windows ]
Explains how to find out hidden TCP / UDP ports and processes under Linux, Unix, and Windows operating systems.
- http://www.cyberciti.biz/tips/linux-uni ... ports.html" onclick="window.open(this.href);return false;

Hacker Tools and their Signatures, Part Three: Rootkits | Symantec Connect Community
by Toby Miller Hacker Tools and their Signatures, Part Three: Rootkits by Toby Miller
This is the third installment of a series devoted to examining hacker tools and their signatures. In this installment we will be looking at some of the signatures related to the KOH rootkit.
- http://www.symantec.com/connect/article ... e-rootkits" onclick="window.open(this.href);return false;

Host Integrity Monitoring: Best Practices for Deployment | Symantec Connect Community
by Brian Wotring Introduction There are now a number of commercial and open source solutions that can be used to effectively monitor the integrity of host environments.
- http://www.symantec.com/connect/article ... deployment" onclick="window.open(this.href);return false;

HowTo: AIDE: Advanced Intrusion Detection Environment
- http://www.debuntu.org/intrusion-detection-with-aide" onclick="window.open(this.href);return false;

How to: Detect ARP Spoofing under UNIX or Linux
Find out if there's a man in the middle posing as your server.
- http://www.cyberciti.biz/faq/how-to-det ... -or-linux/" onclick="window.open(this.href);return false;

How to disable loading of unnecessary kernel modules | Linux Poison
- http://linuxpoison.blogspot.com/2009/06 ... ssary.html" onclick="window.open(this.href);return false;

How to keep a detailed audit trail of what’s being done on your Linux systems
Howto log user activity using process accounting Process under Linux. Accounting allows you to keep detailed logs of every command a user runs, including CPU time and memory used.
- http://www.cyberciti.biz/tips/howto-log ... nting.html" onclick="window.open(this.href);return false;

Howto: Linux add remove a Linux kernel modules / drivers
- http://www.cyberciti.biz/faq/add-remove ... l-modules/" onclick="window.open(this.href);return false;

Installing Tripwire on Ubuntu
- http://netwizards.co.uk/installing-tripwire-on-ubuntu/" onclick="window.open(this.href);return false;

Installing Ubuntu 10.10 with full disk encryption
- http://joernfranz.net/2011/01/20/instal ... ncryption/" onclick="window.open(this.href);return false;

IP Spoofing: An Introduction | Symantec Connect Community
by Matthew Tanase IP Spoofing: An Introduction by Matthew Tanase
Criminals have long employed the tactic of masking their true identity, from disguises to aliases to caller-id blocking.
- http://www.symantec.com/connect/article ... troduction" onclick="window.open(this.href);return false;

Lest We Remember: Cold Boot Attacks on Encryption Keys » Center for Information Technology Policy at Princeton
- http://citp.princeton.edu/research/memory/" onclick="window.open(this.href);return false;

Linux Kernel Rootkits
- http://www.la-samhna.de/library/rootkits/index.html" onclick="window.open(this.href);return false;

Linux on-the-fly kernel patching without LKM
Phrack staff website.
- http://www.phrack.com/issues.html?issue=58&id=7#article" onclick="window.open(this.href);return false;

Manage Passwords, Encryption Keys, and More with Seahorse
Jack Wallen takes a look at Seahorse, a GUI tool for the Linux desktop to manage encryption keys, SSH keys, and passwords.
- https://www.linux.com/learn/tutorials/4 ... h-seahorse" onclick="window.open(this.href);return false;

Mebromi: the first BIOS rootkit in the wild « Webroot Threat Blog
- http://blog.webroot.com/2011/09/13/mebr ... -the-wild/" onclick="window.open(this.href);return false;

Modest Spec or Barebones Installation of Ubuntu
- http://www.psychocats.net/ubuntu/minimal" onclick="window.open(this.href);return false;

Article+PDF: Rootkits - Rootkits on a PCI Card?
- http://securitywatch.eweek.com/rootkits ... _card.html" onclick="window.open(this.href);return false;

Researchers: Rootkits headed for BIOS
UPDATE: Insider attacks and industrial espionage could become more stealthy by hiding code in the core system functions stored on the motherboard, researchers say.
- http://www.securityfocus.com/news/11372?ref=rss" onclick="window.open(this.href);return false;

Security - The Wireshark Wiki
- http://wiki.wireshark.org/Security" onclick="window.open(this.href);return false;

Setting Tripwire
How to Set up Tripwire, RedHat Linux
- http://www.alwanza.com/howTo/linux/tripwire.html" onclick="window.open(this.href);return false;

Industrial-strength Linux lockdown, Part 1
For technical and non-technical users alike, maintaining a large installed base of Linux machines can be a harrowing experience for an administrator. Technical users take advantage of Linux's extreme configurability to change everything to their liking, while non-technical users running amok within their own file systems. This tutorial is the first in a two-part series that shows you how and why to lock those machines down to streamline the associated support and administration processes. In this tutorial, you learn how to remove the interpreters from the installation base system.
- https://www.ibm.com/developerworks/linu ... lockdown1/" onclick="window.open(this.href);return false;

Industrial-strength Linux lockdown, Part 2
This tutorial, the second in a two-part series on locking your Linux machines down to streamline the associated support and administration processes, shows how to configure the Linux kernel to execute only signed binaries.
- https://www.ibm.com/developerworks/linu ... index.html" onclick="window.open(this.href);return false;

Snooping on Text by Listening to the Keyboard
- https://www.schneier.com/blog/archives/ ... n_tex.html" onclick="window.open(this.href);return false;

Articles and PDFs: Perception Warfare or War, Perceptual Conflict, Perception Space, Perception Operations, Perception Battlespace, P-Space
- http://www.au.af.mil/info-ops/perception.htm" onclick="window.open(this.href);return false;

The Mind Has No Firewall
- " onclick="window.open(this.href);return false;

Tor + Polipo 5 Minute Install Guide Ubuntu 11.04/11.10
- https://dangertux.wordpress.com/tutoria ... 1-0411-10/" onclick="window.open(this.href);return false;

Ubuntu how to faillog
- http://blog.bodhizazen.net/linux/ubuntu-how-to-faillog/" onclick="window.open(this.href);return false;

EncryptedPrivateDirectory - Ubuntu
- https://help.ubuntu.com/community/Encry ... eDirectory" onclick="window.open(this.href);return false;

FTP Attack Case Study Part I: The Analysis
- http://www.linuxsecurity.com/content/view/117644/49/" onclick="window.open(this.href);return false;

GnuPrivacyGuardHowto / Ubuntu
- https://help.ubuntu.com/community/GnuPrivacyGuardHowto" onclick="window.open(this.href);return false;

Grsecurity/Appendix/Grsecurity and PaX Configuration Options
- https://secure.wikimedia.org/wikibooks/ ... on_Options" onclick="window.open(this.href);return false;

Hacking Linux Exposed / The Hacking Linux Exposed Companion Website.
- http://www.hackinglinuxexposed.com/articles/" onclick="window.open(this.href);return false;

How to install Ubuntu 11.04 on an encrypted LVM file system
Ubuntu is one of many Linux distributions with support for LVM, the Linux Logical Volume Manager. LVM is a disk partitioning scheme that brings a level of flexibility to disk management that is not possible with the traditional method. With LVM, you can, if necessary, increase the size of a partition online, that is, while...
- http://www.linuxbsdos.com/2011/05/10/ho ... le-system/" onclick="window.open(this.href);return false;

Linux Home Networking - Tutorials and Forums
Linux tutorials and forums covering many topics needed for certification exams and university courses. PDF text books also available.
- http://www.linuxhomenetworking.com/" onclick="window.open(this.href);return false;

Linux Assembly - information on assembly programming under UNIX-like operating systems (Linux/BSD/BeOS/etc) Linux Assembly: Linux/UNIX assembly language programming portal
- http://asm.sourceforge.net/" onclick="window.open(this.href);return false;

LinuxLogFiles / Ubuntu
- https://help.ubuntu.com/community/LinuxLogFiles" onclick="window.open(this.href);return false;

Logwatch / Ubuntu
- https://help.ubuntu.com/community/Logwatch" onclick="window.open(this.href);return false;

LPI 101 and 102 training manuals - Linux (PDF)
- http://www.ledge.co.za/software/lpinotes/" onclick="window.open(this.href);return false;

Monitoring your filesystem for unauthorised change / debian-administration.org
Tips for a Debian GNU/Linux System Administrator.
- http://www.debian-administration.org/articles/49" onclick="window.open(this.href);return false;

PLT redirection through shared object injection into a running process - CodeProject®
The first part of a two-part article which will illustrate how to redirect the PLT of a process through the injection of a shared object into its address space.; Author: Quake2th
- http://www.codeproject.com/KB/cpp/share ... _str_code1" onclick="window.open(this.href);return false;

StricterDefaults / Ubuntu
- https://help.ubuntu.com/community/StricterDefaults" onclick="window.open(this.href);return false;

The ELF Virus Writing HOWTO (Linux)
- http://virus.bartolich.at/virus-writing ... index.html" onclick="window.open(this.href);return false;

Wireless Ethernet Devices For Amateur Radio (AX.25 over Ethernet) (ftp/PDF)
- ftp://ftp.tapr.org/software_lib/ether/H ... _GBPPR.pdf" onclick="window.open(this.href);return false;

Why I hate Microsoft - A personal, lengthy, but highly articulate outburst
- http://www.vanwensveen.nl/rants/microsoft/IhateMS.html" onclick="window.open(this.href);return false;

2011 CWE/SANS Top 25 Most Dangerous Software Errors
- http://cwe.mitre.org/top25/" onclick="window.open(this.href);return false;
----------------------------------------

** 5003: Antivirus LiveCDs - boot and scan your system for malware

AVG Rescue LiveCD
Recover your data after your PC has been infected. Download AVG Rescue CD and start data recovery process. Free recovery software.
- http://www.avg.com/us-en/avg-rescue-cd-download" onclick="window.open(this.href);return false;

F-Secure Rescue CD / LiveCD
- http://www.f-secure.com/en/web/labs_glo ... /rescue-cd" onclick="window.open(this.href);return false;

Kaspersky Rescue Disk / LiveCD
- http://support.kaspersky.com/viruses/rescuedisk?level=2" onclick="window.open(this.href);return false;

Microsoft Standalone System Sweeper Beta | LiveCD
- https://connect.microsoft.com/systemsweeper" onclick="window.open(this.href);return false;

Windows Defender LiveCD
- http://windows.microsoft.com/en-US/wind ... er-offline" onclick="window.open(this.href);return false;
----------------------------------------

** 5004: Random Links

rose-exploit - Remote kernel exploit for ROSE amateur radio (code)
"This is an exploit for CVE-2011-1493, a remote stack overflow in the Linux implementation of the ROSE amateur radio protocol. THIS IS PROOF OF CONCEPT.It should work very reliably on the kernel I tested (Ubuntu Server 10.04), but I make no promises about other kernels. Obviously, any hard-coded addresses and offsets (in payload.h) must be adjusted for the targeted kernel."
- https://github.com/djrbliss/rose-exploit" onclick="window.open(this.href);return false;

Switzerland Network Testing Tool
# Is your ISP interfering with your BitTorrent connections? Cutting off your VOIP calls? Undermining the principles of network neutrality? In order to answer those questions, concerned Internet users need tools to test their Internet connections and gather evidence about ISP interference practices. After all, if it weren't for the testing efforts of Rob Topolski, the Associated Press, and EFF, Comcast would still be stone-walling about their now-infamous BitTorrent blocking efforts.
# Developed by the Electronic Frontier Foundation, Switzerland is an open source software tool for testing the integrity of data communications over networks, ISPs and firewalls. It will spot IP packets which are forged or modified between clients, inform you, and give you copies of the modified packets.
- https://www.eff.org/pages/switzerland-n ... sting-tool" onclick="window.open(this.href);return false;

Ask Ubuntu - Ubuntu Q&A
- http://askubuntu.com/" onclick="window.open(this.href);return false;

OMG! Ubuntu! | Everything Ubuntu. Daily.
- http://www.omgubuntu.co.uk/" onclick="window.open(this.href);return false;

Trapkit.de
- http://trapkit.de/" onclick="window.open(this.href);return false;

InfoWorld.com
- https://www.infoworld.com/" onclick="window.open(this.href);return false;

RootzWiki is a community of Android enthusiasts, developers, themers, and experts. RootzWiki is formed by the community for the community. We pride ourselves on giving back to the people who make Android great: you. We regularly give phones to developers using a portion of the funds created by the advertisements you see here at RootzWiki. We do this to help ensure the Android world keeps on spinning. We love seeing all the amazing things that come from the community. You make this platform great. You make our phones great. We want to be your number one source for Android information, community, and, of course, free devices for developers.
- http://rootzwiki.com/" onclick="window.open(this.href);return false;

Beta Beat - tech blog
- http://www.betabeat.com/" onclick="window.open(this.href);return false;

BIOS Implementation Test Suite
- http://biosbits.org/" onclick="window.open(this.href);return false;

Black Alchemy's Fake AP generates thousands of counterfeit 802.11b access points.
- http://blackalchemy.to/project/fakeap/" onclick="window.open(this.href);return false;

bodhizazen's Ubuntu Blog
- http://blog.bodhizazen.net/" onclick="window.open(this.href);return false;

BorderFire Report - Reporting The Invasion of America
- http://borderfirereport.net/" onclick="window.open(this.href);return false;

BrickHouse Security | Home Security Camera Systems | GPS Surveillance
BrickHouse Security is the Global Leader in Home Security, Cameras for Covert Video Surveillance & GPS Tracking. Government-Grade Home Security, Wireless Cameras, & Spy GPS Products are Now Available To The Public
- http://www.brickhousesecurity.com/" onclick="window.open(this.href);return false;

Linux Man Pages
- http://linuxmanpages.com/" onclick="window.open(this.href);return false;

coreboot / BIOS related
- http://www.coreboot.org/" onclick="window.open(this.href);return false;

SeaBIOS @ coreboot
- http://www.coreboot.org/SeaBIOS" onclick="window.open(this.href);return false;

SeaBIOS
- http://www.seabios.org/SeaBIOS" onclick="window.open(this.href);return false;

Detecting Kernel Rootkits
- http://la-samhna.de/library/rootkits/detect.html" onclick="window.open(this.href);return false;

DNSCrypt
- https://www.opendns.com/technology/dnscrypt/" onclick="window.open(this.href);return false;

Dedoimedo offers detailed, step-by-step tutorials on a wide range of computer-related topics, including operating system installation guides and reviews, security tips and tricks, virtualization, general computing, and more, all accompanied by screenshots and tons of examples. There's something for everyone, from newbies to experts.
- http://dedoimedo.com/" onclick="window.open(this.href);return false;

I2P Anonymous Network
- http://www.i2p2.de/" onclick="window.open(this.href);return false;

Lynis - Security and system auditing tool for Linux
- http://www.rootkit.nl/projects/lynis.html" onclick="window.open(this.href);return false;

MI5 - The Security Service
The Security Service (MI5) is a British intelligence agency working to protect the UK's national security against threats such as terrorism and espionage.
- https://www.mi5.gov.uk/" onclick="window.open(this.href);return false;

Microsoft Safety Scanner
Do you think your PC has a virus? The Microsoft Safety Scanner is a free downloadable security tool that provides on-demand scanning and helps remove viruses, spyware, and other malicious software. It works with your existing antivirus software. Note: The Microsoft Safety Scanner expires 10 days after being downloaded. To rerun a scan with the latest anti-malware definitions, download and run the Microsoft Safety Scanner again.
Remove spyware, malware, viruses and other malicious software with this free Microsoft Safety Scanner for your PC.
- https://www.microsoft.com/security/scan ... fault.aspx" onclick="window.open(this.href);return false;

msramdmp:
McGrew Security RAM Dumper Creating bootable USB drives for capturing the contents of memory
- http://www.mcgrewsecurity.com/tools/msramdmp/" onclick="window.open(this.href);return false;

nixCraft: Linux Tips, Hacks, Tutorials, And Ideas In Blog Format
Linux blog by Vivek - Includes news, help, tutorials, programming, tips and how-to guides for Linux, UNIX, and BSD.
- http://www.cyberciti.biz/" onclick="window.open(this.href);return false;

onPoint Tactical LLC - Legendary Skills for Today's Professional
onPoint Tactical offers superior training for military, law enforcement, and select professionals & civilians who require advanced outdoor skill sets to survive and thrive in today's demanding world.
- http://onpointtactical.com/" onclick="window.open(this.href);return false;

Prey Project: Open source anti-theft solution for your laptop, phone and tablet
Prey is a lightweight tracking software that helps you find, lock and recover your stuff if it's stolen or goes missing. For Mac, Windows, Linux, iPhone, iPad & Android.
- http://preyproject.com/" onclick="window.open(this.href);return false;

Qubes is an open source operating system designed to provide strong security for desktop computing. Qubes is based on Xen, X Window System, and Linux, and can run most Linux applications and utilize most of the Linux drivers. In the future it might also run Windows apps. by Joanna Rutkowska
- http://qubes-os.org/" onclick="window.open(this.href);return false;

Source Code Security Analyzers - SAMATE
- http://samate.nist.gov/index.php/Source ... yzers.html" onclick="window.open(this.href);return false;

sslsniff
- http://www.thoughtcrime.org/software/sslsniff/" onclick="window.open(this.href);return false;

Taiwan spy agency denies magnetic attack
- " onclick="window.open(this.href);return false;

TLD is an award-winning, real-time algorithm for tracking of unknown objects in video streams. The object of interest is defined by a bounding box in a single frame. TLD simultaneously Tracks the object, Learns its appearance and Detects it whenever it appears in the video. The result is a real-time tracking that typically improves over time. Due to its learning abilities, TLD has been advertised under name Predator
- http://info.ee.surrey.ac.uk/Personal/Z.Kalal/tld.html" onclick="window.open(this.href);return false;

Top Secret America | washingtonpost.com
Washington Post reporters Dana Priest and William M. Arkin's investigation of the government's response to 9/11. Top Secret America explores what they found.
- http://projects.washingtonpost.com/top-secret-america/" onclick="window.open(this.href);return false;

Tor Mail - free e-mail (not related to the Official Tor Project, requires Tor to access)
- Intro: http://tormail.net/" onclick="window.open(this.href);return false;
- Hidden Service: http://jhiwjjlqpyawmpjx.onion/" onclick="window.open(this.href);return false;

TRESOR Runs Encryption Securely Outside RAM | IT-Sicherheitsinfrastrukturen (Informatik 1)
- http://www1.informatik.uni-erlangen.de/tresor" onclick="window.open(this.href);return false;

Vigilant Citizen
- http://vigilantcitizen.com/" onclick="window.open(this.href);return false;

Vigilant Citizen Forums
- http://vigilantcitizen.com/vcboards/" onclick="window.open(this.href);return false;

VX32 Virtual Extension Environment
- http://pdos.csail.mit.edu/~baford/vm/" onclick="window.open(this.href);return false;

Mind Justice. A nonprofit 501(c)3 human rights group working for the rights and protections of mental integrity and freedom from new technologies and weapons which target the mind and nervous system. Formed to stop nonconsensual experimentation by the U.S. and other governments. Includes victims advocacy, research, legislative, legal and international remedies and public education.
- http://mindjustice.org/" onclick="window.open(this.href);return false;

bashoneliners.com, a place for practical or just pure awesome bash one-liners or shell script tips and tricks for GNU Linux, UNIX or BSD systems.
- http://www.bashoneliners.com/" onclick="window.open(this.href);return false;

Search Engine Land is a news and information site covering search engine marketing, searching issues and the search engine industry.
- http://searchengineland.com/" onclick="window.open(this.href);return false;

winsupersite.com / Microsoft Windows News
- http://www.winsupersite.com/" onclick="window.open(this.href);return false;
-- http://www.winsupersite.com/blogcontent ... te-blog-39" onclick="window.open(this.href);return false;

----------------------------------------

** 5005: Security Blogs

SANS Computer Security News/Newsletters
- https://www.sans.org/newsletters/" onclick="window.open(this.href);return false;
-- https://www.sans.org/newsletters/#newsbites" onclick="window.open(this.href);return false;
-- https://www.sans.org/newsletters/#risk" onclick="window.open(this.href);return false;
-- https://www.sans.org/newsletters/#ouch" onclick="window.open(this.href);return false;

ReversingLabs has been founded with the goal to provide the best file analysis tools and the best software protection tools. Our expertise in building superior software reversing tools, gives ReversingLabs a unique background for creating superior software protection tools. Reverse Engineering is an Art where the most complex protection schemas are the least publicly available. Our tools enable the security industry, governments and research institutions to rapidly and effectively reduce the spread of malware.
- http://blog.reversinglabs.com/" onclick="window.open(this.href);return false;

blog.zx2c4.com - The technical writings and blog of Jason A. Donenfeld, aka ZX2C4: Nerdling Sapple. Articles about coding, technology, programming, open source, kde, linux, kernel hacking, C, javascript, bash, and a modicum of other topics.
- http://blog.zx2c4.com/" onclick="window.open(this.href);return false;

Infosanity's Blog - Offensive and Defensive IT Security
- http://blog.infosanity.co.uk/" onclick="window.open(this.href);return false;

AppRiver Blog
- http://blogs.appriver.com/blog/appriver" onclick="window.open(this.href);return false;
-- http://blogs.appriver.com/" onclick="window.open(this.href);return false;

BrickHouse Security Blog (See Section 5004, company selling security products)
- http://blog.brickhousesecurity.com/" onclick="window.open(this.href);return false;

Dan Kaminsky's Blog (Or: The Blog Formerly Known As DoxPara Research)
- http://dankaminsky.com/" onclick="window.open(this.href);return false;

eweek.com - Security News
Network IT security hardware purchases can be costly...be sure to do your research with eWeek and get the Security you need. The latest IT security news, insight, analysis and product reviews covering network security, Anti Spam and Anti Virus. Coverage includes topics such as Network Access Control (NAC), botnets, phishing, wireless network security hardware, computer network security, data security, malware and the latest security trends.
- http://www.eweek.com/c/s/Security/" onclick="window.open(this.href);return false;

Mozilla Foundation Security Advisories
- https://www.mozilla.org/security/announce/" onclick="window.open(this.href);return false;

Security News @ Softpedia
- http://news.softpedia.com/cat/Security/" onclick="window.open(this.href);return false;

SurvivalBlog.com
- http://www.survivalblog.com/" onclick="window.open(this.href);return false;

The Security Ray - TSR | Hacking News| Security News| Hacker News| Tech News
The Ultimate Source Of Underground Hacking And Security News.All kinds of hacking news,tech news,security news,hackers news,hackers interview,hackers activities,security bug,vulnerability news,security patched news,exploit news,linux news is here.The full Cyber Space tech news security and hacking news is here
- http://www.security-ray.com/" onclick="window.open(this.href);return false;

The SSD Project | EFF Surveillance Self-Defense Project
- https://ssd.eff.org/" onclick="window.open(this.href);return false;

Webroot Threat Blog
- http://blog.webroot.com/" onclick="window.open(this.href);return false;

Network Tutorials, Server Tutorials, School For IT | SKULLBOX.NET
- http://www.skullbox.net/index.php" onclick="window.open(this.href);return false;

TheHiddenEvil.com - This website is devoted to explaining a global program of torture, murder & persecution which the webmaster calls the Hidden Evil. It includes a vast network of plain-clothed citizen informants, which is used for public stalking, & the use of Directed Energy Weapons on targeted individuals. All core factions of the community are involved, & everyone, from seniors to children, participates in Gang Stalking. Governments have used these groups in some form since the Roman Empire. The Hidden Evil is an example of this pattern repeating itself. (Book and Blog)
- http://thehiddenevil.com/" onclick="window.open(this.href);return false;

trapkit.de blog
- http://tk-blog.blogspot.com/" onclick="window.open(this.href);return false;

Denny's Blog
- http://polarwave.blogspot.com/" onclick="window.open(this.href);return false;

Captain Freedom's Blog - Blog about OpenBSD, network security, and cryptography
- http://www.capnfreedom.com/" onclick="window.open(this.href);return false;

shellguardians.com - When a shell is not enough
- http://www.shellguardians.com/" onclick="window.open(this.href);return false;

OpenDNS Blog - News & Notes from the OpenDNS team
- https://blog.opendns.com/" onclick="window.open(this.href);return false;

Trusteer Blog
- http://www.trusteer.com/blog" onclick="window.open(this.href);return false;
----------------------------------------

** 5006: Security Forums (Web based Discussion Forums)

Comodo.com forums
- http://forums.comodo.com/" onclick="window.open(this.href);return false;

Defense Forum - Military Defence Technology Air Force Army Navy
Global defence forum on topics for military aviation, air force, army, navy, missiles, defense technology, space and nuclear forces as well as post military pictures and videos. Discuss world security issues in areas such as war on terror, piracy and nuclear weapons threats.
- http://www.defencetalk.com/forums/" onclick="window.open(this.href);return false;

survivalistboards.com - Survival forum gear reviews self sufficiency disaster emergency preparedness primitive skills wilderness survival
- http://www.survivalistboards.com/" onclick="window.open(this.href);return false;
----------------------------------------

** 5007 : Security Magazines & Zines

SECUREVIEW is an electronic publication from Kaspersky Lab that provides information about all aspects of the IT security industry.
- http://secureviewmag.com/" onclick="window.open(this.href);return false;

HITB Quarterly Magazine / hackinthebox.org
- http://magazine.hackinthebox.org/" onclick="window.open(this.href);return false;

O'Reilly Commons - Free Linux Books
- http://commons.oreilly.com/wiki/index.p ... ly_Commons" onclick="window.open(this.href);return false;

ClubHACK - ClubHack decided to come up with its own 1st Indian "Hacking" Magazine called CHmag
- http://chmag.in/" onclick="window.open(this.href);return false;
-- http://chmag.in/issue/all" onclick="window.open(this.href);return false;

Ubuntu Pocket Guide and Reference (PDF)
- http://ubuntupocketguide.com/index_main.html" onclick="window.open(this.href);return false;

----------------------------------------

This is the end of HUGE Security Resource - version 5000 - 03/06/12

We post this publication first at pastebin.com. Please stay tuned
for the next version of HUGE Security Resource. It's not the best
of names for a publication, but we're lazy, and this is free for
you.
----------------------------------------
As the top of this version's post explains, the name of this updated
guide is now the above, but for reference we're displaying the previous
versions with the previous name:

(old) HUGE List of Security Blogs: Unix, Linux, Windows:

PART # URL Release Date
------ - ---------------------------- - -------------
- part 1: " onclick="window.open(this.href);return false; - Dec 30th,2011
- part 2: " onclick="window.open(this.href);return false; - Jan 3rd, 2012
- part 3: " onclick="window.open(this.href);return false; - Jan 3rd, 2012
- part 4: " onclick="window.open(this.href);return false; - Jan 5th, 2012
------ - ---------------------------- - -------------

Thanks for reading!

Consideration #1: Are crossword puzzles and similar puzzles
published in print simply devices to alter the brain by
inserting carefully prepared words, phrases, and
numbers into your thought processes in order to trigger
or establish some type of action, or... connection.. to
something?

Consideration #2: What if all secret agencies were of one
accord spiritually, like in the paintings of dogs playing
poker, just using humanity to play out one big game of
destruction and domination with humans as the visible and
spiritual puppets?
===============================================================
Previous version, part 4:

(old) HUGE List of Security Blogs: Unix, Linux, Windows - Part 4

==> HUGE List of Security Blogs (Unix/Linux/Windows) <==
==> all packed with superb information & updated frequently <==
--> <Updated> [01/05/2012] <==

http://blogs.adobe.com/psirt/" onclick="window.open(this.href);return false;
http://anti-virus-rants.blogspot.com/" onclick="window.open(this.href);return false;
http://asert.arbornetworks.com/" onclick="window.open(this.href);return false;
http://blog.avast.com/" onclick="window.open(this.href);return false;
http://www.blackbag.nl/" onclick="window.open(this.href);return false;
http://www.bunniestudios.com/wordpress/" onclick="window.open(this.href);return false;
http://cansecwest.com/" onclick="window.open(this.href);return false;
http://carnal0wnage.attackresearch.com/" onclick="window.open(this.href);return false;
http://www.cerias.purdue.edu/site/blog" onclick="window.open(this.href);return false;
http://cerias.purdue.edu/site/blog/author/spaf" onclick="window.open(this.href);return false;
http://blogs.cisco.com/security" onclick="window.open(this.href);return false;
http://blog.clamav.net/" onclick="window.open(this.href);return false;
http://blog.commandlinekungfu.com/" onclick="window.open(this.href);return false;
http://computer.forensikblog.de/en/" onclick="window.open(this.href);return false;
http://www.cryptogon.com/" onclick="window.open(this.href);return false;
http://www.cryptome.org/" onclick="window.open(this.href);return false;
http://www.cutawaysecurity.com/blog/" onclick="window.open(this.href);return false;
http://cyb3rcrim3.blogspot.com/" onclick="window.open(this.href);return false;
http://garwarner.blogspot.com/" onclick="window.open(this.href);return false;
http://cyberspeak.libsyn.com/" onclick="window.open(this.href);return false;
http://ddanchev.blogspot.com/" onclick="window.open(this.href);return false;
http://darknet.org.uk/" onclick="window.open(this.href);return false;
http://darkreading.com/" onclick="window.open(this.href);return false;
http://www.thedarkvisitor.com/" onclick="window.open(this.href);return false;
http://blog.didierstevens.com/" onclick="window.open(this.href);return false;
http://digfor.blogspot.com/" onclick="window.open(this.href);return false;
http://edsmiley.com/" onclick="window.open(this.href);return false;
http://emergentchaos.com/" onclick="window.open(this.href);return false;
http://blog.emsisoft.com/" onclick="window.open(this.href);return false;
http://blog.eset.com/" onclick="window.open(this.href);return false;
http://fasthorizon.blogspot.com/" onclick="window.open(this.href);return false;
http://www.financialcryptography.com/" onclick="window.open(this.href);return false;
http://blog.fireeye.com/research" onclick="window.open(this.href);return false;
http://www.forensickb.com/" onclick="window.open(this.href);return false;
http://fraudwar.blogspot.com/" onclick="window.open(this.href);return false;
http://www.f-secure.com/weblog" onclick="window.open(this.href);return false;
http://blog.oxff.net/" onclick="window.open(this.href);return false;
http://gleeda.blogspot.com/" onclick="window.open(this.href);return false;
http://googleonlinesecurity.blogspot.com/" onclick="window.open(this.href);return false;
http://www.sophos.com/blogs/gc" onclick="window.open(this.href);return false;
http://grandstreamdreams.blogspot.com/" onclick="window.open(this.href);return false;
http://www.hackaday.com/" onclick="window.open(this.href);return false;
http://ha.ckers.org/blog" onclick="window.open(this.href);return false;
http://www.hexblog.com/" onclick="window.open(this.href);return false;
http://holisticinfosec.blogspot.com/" onclick="window.open(this.href);return false;
http://honeyblog.org/" onclick="window.open(this.href);return false;
http://www.h-online.com/security/" onclick="window.open(this.href);return false;
http://blogs.iss.net/" onclick="window.open(this.href);return false;
http://invisiblethings.org/" onclick="window.open(this.href);return false;
http://theinvisiblethings.blogspot.com/" onclick="window.open(this.href);return false;
http://jeremiahgrossman.blogspot.com/" onclick="window.open(this.href);return false;
http://krebsonsecurity.com/" onclick="window.open(this.href);return false;
http://www.l0t3k.org/en/" onclick="window.open(this.href);return false;
http://blog.layeredsec.com/" onclick="window.open(this.href);return false;
http://www.lightbluetouchpaper.org/" onclick="window.open(this.href);return false;
http://blog.trendmicro.com/" onclick="window.open(this.href);return false;
http://www.malwaredomainlist.com/" onclick="window.open(this.href);return false;
http://chargen.matasano.com/" onclick="window.open(this.href);return false;
http://www.avertlabs.com/research/blog/" onclick="window.open(this.href);return false;
http://blog.metasploit.com/" onclick="window.open(this.href);return false;
http://blogs.technet.com/mmpc/default.aspx" onclick="window.open(this.href);return false;
http://securityincite.com/blog/mike-rothman" onclick="window.open(this.href);return false;
http://www.milw0rm.com/" onclick="window.open(this.href);return false;
http://blog.mandiant.com/" onclick="window.open(this.href);return false;
http://www.offensivecomputing.net/" onclick="window.open(this.href);return false;
http://www.offensive-security.com/blog/" onclick="window.open(this.href);return false;
http://www.openrce.org/articles/" onclick="window.open(this.href);return false;
http://www.packetstormsecurity.org/" onclick="window.open(this.href);return false;
http://philosecurity.org/" onclick="window.open(this.href);return false;
http://praetorianprefect.com/" onclick="window.open(this.href);return false;
http://www.prevx.com/blog.asp" onclick="window.open(this.href);return false;
http://pseudo-flaw.net/log/" onclick="window.open(this.href);return false;
http://www.rationalsurvivability.com/blog/" onclick="window.open(this.href);return false;
http://rdist.root.org/" onclick="window.open(this.href);return false;
http://blogs.sans.org/" onclick="window.open(this.href);return false;
https://blogs.sans.org/computer-forensics/" onclick="window.open(this.href);return false;
http://www.schneier.com/blog" onclick="window.open(this.href);return false;
http://blog.zoller.lu/" onclick="window.open(this.href);return false;
http://www.fas.org/blog/secrecy/" onclick="window.open(this.href);return false;
http://www.secsocial.com/blog/" onclick="window.open(this.href);return false;
http://secunia.com/advisories/" onclick="window.open(this.href);return false;
http://www.securelist.com/en/weblog" onclick="window.open(this.href);return false;
http://blogs.securiteam.com/" onclick="window.open(this.href);return false;
http://blog.security4all.be/" onclick="window.open(this.href);return false;
http://securosis.com/blog" onclick="window.open(this.href);return false;
http://www.shmoocon.org/" onclick="window.open(this.href);return false;
http://www.shmoo.com/news/" onclick="window.open(this.href);return false;
http://blog.snort.org/" onclick="window.open(this.href);return false;
http://blog.stopbadware.org/" onclick="window.open(this.href);return false;
http://sunbeltblog.blogspot.com/" onclick="window.open(this.href);return false;
http://www.symantec.com/business/securi ... se/weblog/" onclick="window.open(this.href);return false;
http://taosecurity.blogspot.com/" onclick="window.open(this.href);return false;
http://www.teamfurry.com/wordpress/" onclick="window.open(this.href);return false;
http://blogs.technet.com/msrc/" onclick="window.open(this.href);return false;
http://blog.threatexpert.com/" onclick="window.open(this.href);return false;
http://threatpost.com/" onclick="window.open(this.href);return false;
http://blog.tsa.gov/" onclick="window.open(this.href);return false;
http://blog.uncommonsensesecurity.com/" onclick="window.open(this.href);return false;
http://volatility.tumblr.com/" onclick="window.open(this.href);return false;
http://securitylabs.websense.com/" onclick="window.open(this.href);return false;
http://windowsir.blogspot.com/" onclick="window.open(this.href);return false;
http://www.wired.com/threatlevel/" onclick="window.open(this.href);return false;
http://blogs.zdnet.com/security/" onclick="window.open(this.href);return false;
http://blog.zynamics.com/" onclick="window.open(this.href);return false;
http://www.afcea.org/signal/signalscape/" onclick="window.open(this.href);return false;
http://dhs-daily-report.blogspot.com/" onclick="window.open(this.href);return false;
https://blog.torproject.org/" onclick="window.open(this.href);return false;
http://www.securitywire.com/" onclick="window.open(this.href);return false;
http://pauldotcom.com/" onclick="window.open(this.href);return false;
http://www.exploit-db.com/" onclick="window.open(this.href);return false;
http://www.networkworld.com/topics/security.html" onclick="window.open(this.href);return false;
http://www.acunetix.com/blog/" onclick="window.open(this.href);return false;
http://www.allspammedup.com/" onclick="window.open(this.href);return false;
http://www.gfi.com/blog/" onclick="window.open(this.href);return false;
http://www.infosecblog.org/" onclick="window.open(this.href);return false;
http://www.techrepublic.com/blog/security" onclick="window.open(this.href);return false;
http://www.theemailadmin.com/" onclick="window.open(this.href);return false;
http://www.theregister.co.uk/security/" onclick="window.open(this.href);return false;
http://seclists.org/" onclick="window.open(this.href);return false;
http://www.afcea.org/signal/signalscape/" onclick="window.open(this.href);return false;
http://www.woodmann.com/forum/blog.php" onclick="window.open(this.href);return false;
http://www.nsa.gov/" onclick="window.open(this.href);return false;
http://blogs.technet.com/b/sysinternals/" onclick="window.open(this.href);return false;
http://www.securityweek.com/" onclick="window.open(this.href);return false;
http://superantispyware.com/blog/" onclick="window.open(this.href);return false;
http://www.securitytracker.com/" onclick="window.open(this.href);return false;
http://spyblog.org.uk/" onclick="window.open(this.href);return false;
http://www.net-security.org/" onclick="window.open(this.href);return false;
http://news.cnet.com/security" onclick="window.open(this.href);return false;
http://www.fas.org/blog/ssp/" onclick="window.open(this.href);return false;

Project/Wiki:
Freedom Box: http://wiki.debian.org/freedombox" onclick="window.open(this.href);return false;

http://blogs.pcmag.com/securitywatch/" onclick="window.open(this.href);return false;
http://labs.m86security.com/" onclick="window.open(this.href);return false;
http://www.irongeek.com/" onclick="window.open(this.href);return false;

http://rijmenants.blogspot.com/" onclick="window.open(this.href);return false;
Cipher Machines & Cryptology / Intelligence / Security
"Cipher machines & cryptology, history of Signals Intelligence and Communications Security, espionage and intelligence services, from WW2, over the Cold World era, to date."

http://blog.webroot.com/" onclick="window.open(this.href);return false;
http://crypto.stanford.edu/" onclick="window.open(this.href);return false;
https://ssd.eff.org/" onclick="window.open(this.href);return false;
http://publicintelligence.net/" onclick="window.open(this.href);return false;
http://www.wikileaks.org/" onclick="window.open(this.href);return false;
http://www.itstactical.com/" onclick="window.open(this.href);return false;
http://www.forensicswiki.org/" onclick="window.open(this.href);return false;
http://p4r4n0id.com/" onclick="window.open(this.href);return false;
http://cryptocomb.org/" onclick="window.open(this.href);return false;
http://anonymous.livelyblog.com/" onclick="window.open(this.href);return false;
https://trac.torproject.org/projects/tor/wiki" onclick="window.open(this.href);return false;
http://www.security-ray.com/" onclick="window.open(this.href);return false;
http://ticklethewire.com/" onclick="window.open(this.href);return false;
http://vulnfactory.org/blog/" onclick="window.open(this.href);return false;
https://psal.cs.drexel.edu/index.php/Main_Page" onclick="window.open(this.href);return false;
http://www.pgpboard.com/" onclick="window.open(this.href);return false;
https://yorkporc.wordpress.com/" onclick="window.open(this.href);return false;
http://www.catonmat.net/" onclick="window.open(this.href);return false;
http://www.heinz.cmu.edu/~acquisti/shb/participants.htm" onclick="window.open(this.href);return false;
http://www.cyberciti.biz/" onclick="window.open(this.href);return false;
http://www.omgubuntu.co.uk/" onclick="window.open(this.href);return false;
http://www.ledge.co.za/software/lpinotes/" onclick="window.open(this.href);return false;
http://inciweb.org/" onclick="window.open(this.href);return false;
https://www.ibm.com/developerworks/linux/" onclick="window.open(this.href);return false;
https://www.ibm.com/developerworks/topics/" onclick="window.open(this.href);return false;
https://www.ibm.com/developerworks/" onclick="window.open(this.href);return false;
https://www.ibm.com/developerworks/aix/library/" onclick="window.open(this.href);return false;
http://www.neowin.net/forum/topic/93427 ... tive-list/" onclick="window.open(this.href);return false;
http://www.hackinglinuxexposed.com/articles/" onclick="window.open(this.href);return false;
http://dankaminsky.com/" onclick="window.open(this.href);return false;
http://blog.bodhizazen.net/" onclick="window.open(this.href);return false;
http://askubuntu.com/" onclick="window.open(this.href);return false;

-==> New Links below! 01/05/2012 <==-

http://computer-forensics.sans.org/blog" onclick="window.open(this.href);return false;
https://365.rsaconference.com/blogs/rsa-conference-blog" onclick="window.open(this.href);return false;
https://365.rsaconference.com/blogs/cri ... astructure" onclick="window.open(this.href);return false;
https://365.rsaconference.com/blogs/ira-winkler" onclick="window.open(this.href);return false;
https://365.rsaconference.com/blogs/ediscovery" onclick="window.open(this.href);return false;
https://365.rsaconference.com/blogs/securityreading" onclick="window.open(this.href);return false;
https://365.rsaconference.com/blogs/fred-stock" onclick="window.open(this.href);return false;
http://securityblog.verizonbusiness.com/" onclick="window.open(this.href);return false;
http://www.flyingpenguin.com/" onclick="window.open(this.href);return false;
https://blog.whitehatsec.com/" onclick="window.open(this.href);return false;
http://robert.penz.name/" onclick="window.open(this.href);return false;
https://fightinginsecurity.wordpress.com/" onclick="window.open(this.href);return false;
http://www.cristoncox.com/" onclick="window.open(this.href);return false;
http://www.paranoidprose.com/" onclick="window.open(this.href);return false;
http://dvlabs.tippingpoint.com/blog/" onclick="window.open(this.href);return false;

"For those who are interested in mobile/wireless in general, and wireless LANs in particular, this page provides resource links about 802.11 and related security and mobility topics"
-- Lisa Phifer, Core Competence, Inc.
http://www.corecom.com/html/wlan.html" onclick="window.open(this.href);return false;

http://www.wmarkbrooks.com/" onclick="window.open(this.href);return false;
https://www.veracode.com/blog/" onclick="window.open(this.href);return false;
http://devcentral.f5.com/weblogs/macvittie/Default.aspx" onclick="window.open(this.href);return false;
http://chuvakin.blogspot.com/" onclick="window.open(this.href);return false;
http://gigaom.com/cloud/" onclick="window.open(this.href);return false;
http://lastwatchdog.com/" onclick="window.open(this.href);return false;
http://www.cryptosmith.com/" onclick="window.open(this.href);return false;
http://blogs.verisign.com/innovation/" onclick="window.open(this.href);return false;
https://chainmailcheck.wordpress.com/" onclick="window.open(this.href);return false;
http://superconductor.voltage.com/" onclick="window.open(this.href);return false;
http://www.educatedguesswork.org/" onclick="window.open(this.href);return false;
https://techbuddha.wordpress.com/" onclick="window.open(this.href);return false;
http://www.scmagazine.com/the-data-brea ... tion/1263/" onclick="window.open(this.href);return false;
https://www.brandenwilliams.com/blog/" onclick="window.open(this.href);return false;
http://infosecplace.com/blog/" onclick="window.open(this.href);return false;
http://www.thetechherald.com/security" onclick="window.open(this.href);return false;
http://www.clerkendweller.com/" onclick="window.open(this.href);return false;
http://blog.tenablesecurity.com/" onclick="window.open(this.href);return false;
http://coffeetocode.net/" onclick="window.open(this.href);return false;
http://technicalinfodotnet.blogspot.com/" onclick="window.open(this.href);return false;
http://www.teamshatter.com/" onclick="window.open(this.href);return false;
http://www.stratumsecurity.com/blog/" onclick="window.open(this.href);return false;
http://www.cgisecurity.com/" onclick="window.open(this.href);return false;
http://blog.spywareguide.com/" onclick="window.open(this.href);return false;
https://amtso.wordpress.com/" onclick="window.open(this.href);return false;
http://blog.spiderlabs.com/" onclick="window.open(this.href);return false;
https://gregness.wordpress.com/" onclick="window.open(this.href);return false;
http://daveshackleford.com/" onclick="window.open(this.href);return false;
https://marienfeldt.wordpress.com/" onclick="window.open(this.href);return false;
http://blog.rootshell.be/" onclick="window.open(this.href);return false;
http://www.thesecuritysamurai.com/" onclick="window.open(this.href);return false;
http://community.websense.com/blogs/sec ... fault.aspx" onclick="window.open(this.href);return false;
http://securitybraindump.blogspot.com/" onclick="window.open(this.href);return false;
http://dsecrg.blogspot.com/" onclick="window.open(this.href);return false;
http://blog.c22.cc/" onclick="window.open(this.href);return false;
http://securityandrisk.blogspot.com/" onclick="window.open(this.href);return false;
http://www.social-engineer.org/framewor ... _Framework" onclick="window.open(this.href);return false;
http://blog.gerhards.net/" onclick="window.open(this.href);return false;
http://www.paranoidprose.com/" onclick="window.open(this.href);return false;
http://www.sensepost.com/blog/" onclick="window.open(this.href);return false;
https://pinvoke.wordpress.com/" onclick="window.open(this.href);return false;
http://www.liquidmatrix.org/blog/" onclick="window.open(this.href);return false;
http://www.standalone-sysadmin.com/blog/" onclick="window.open(this.href);return false;
http://infolookup.securegossip.com/" onclick="window.open(this.href);return false;
http://blog.watchfire.com/wfblog/" onclick="window.open(this.href);return false;
http://www.frontlinesentinel.com/" onclick="window.open(this.href);return false;
http://elie.im/blog/" onclick="window.open(this.href);return false;
http://maliciousattacker.blogspot.com/" onclick="window.open(this.href);return false;

Most Powerful Voices in Security Who are the Top 25?
The Rest of the Top 100 -
* 100 security guru's listed with their Twitter pages
and personal/blog sites: (Sep. 8, 2011) Posted here as one
link rather than posting around 100 Twitter personal pages.
http://www.sys-con.com/node/1974029" onclick="window.open(this.href);return false;

- Publications:
http://bsdmag.org/" onclick="window.open(this.href);return false;
http://hakin9.org/" onclick="window.open(this.href);return false;
http://magazine.hackinthebox.org/" onclick="window.open(this.href);return false;
http://www.uninformed.org/" onclick="window.open(this.href);return false;
https://www.net-security.org/insecuremag.php" onclick="window.open(this.href);return false;

- Forums:
http://www.wilderssecurity.com/" onclick="window.open(this.href);return false;
http://www.wilderssecurity.com/showthread.php?t=242949" onclick="window.open(this.href);return false;
http://hardforum.com/showthread.php?t=781545" onclick="window.open(this.href);return false;
http://www.binrev.com/forums/" onclick="window.open(this.href);return false;
http://hak5.org/forums/" onclick="window.open(this.href);return false;

was here - " onclick="window.open(this.href);return false;

DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
ph0bYx
Staff Member
Staff Member
Posts: 2039
Joined: 22 Sep 2008, 16:00
15
Contact:

Re: All Security Resources

Post by ph0bYx »

Exactly what I needed. Thanks for sharing! *thumb*

User avatar
ayu
Staff
Staff
Posts: 8109
Joined: 27 Aug 2005, 16:00
18
Contact:

Re: All Security Resources

Post by ayu »

Sexy post *thumb*
"The best place to hide a tree, is in a forest"

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Re: All Security Resources

Post by DNR »

FIGJAM*

8)
*Fuck I'm Good Just Ask Me

DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
ph0bYx
Staff Member
Staff Member
Posts: 2039
Joined: 22 Sep 2008, 16:00
15
Contact:

Re: All Security Resources

Post by ph0bYx »

There are a few SANS links but not this one, so I'd like to add it to this collection:

http://www.sans.org/reading_room/" onclick="window.open(this.href);return false;

lonewolf
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 185
Joined: 02 Dec 2010, 19:03
13

Re: All Security Resources

Post by lonewolf »

Thanks DNR

scatter
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 366
Joined: 01 Jan 2014, 05:22
10

Re: All Security Resources

Post by scatter »

I just found this post so will enjoy checking the links one by one ( I copied pasted the list to my bookmarks list too) so thx even after long time ^_^

User avatar
bad_brain
Site Owner
Site Owner
Posts: 11636
Joined: 06 Apr 2005, 16:00
18
Location: In your eye floaters.
Contact:

Re: All Security Resources

Post by bad_brain »

if you are that hot for links feel free to check all the ones in the web links section of suck-o and let me know which ones are dead so I can remove them.... :lol:
Image

Post Reply