New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 20)
· Marcia's (QA2)
· Bill G's (CO9)
· Paul's (AR 5)
· Robin's (AR 1)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· Recommend Us
· RegChat
· Reviews
· Search (Topics)
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 565
Comments: 14
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image



[ Links Main | Add Link | New | Popular | Top Rated | Random ]

Category: Main/Security How-To


Sort Links by: Title (A\D) Date (A\D) Rating (A\D) Popularity (A\D)
Sites currently sorted by: Title (A to Z)


Computer Security Resource 
Description: OS security, fresh news about underground computer security, informatyion about virii, anonimity, cyberlaw( organization, cyber crimes, computer espionage), books devoted to computer security, tools
Added on: 05-Mar-2003 Hits: 232
Rate this Site | Report Broken Link

DNSstuff.com! 
Description: There is currently no cost for the DNS report or the other tests, and it is ad-free. You are free to link directly to this site. The 2,000,000+ hits a month are all sponsored by Computerized Horizons. If you use these tools and need anti-spam or anti-virus software for your mail server, please consider looking at their Declude products. If you want your email filtered for you, consider Spam Soap. Thanks!
Added on: 08-May-2004 Hits: 12
Rate this Site | Report Broken Link

For Home Computer Users and Families 
Description: A CALL TO ACTION: BE A CYBER SECURE CITIZEN! Securing your personal computer plays a crucial role in protecting our nation's Internet infrastructure. This web site is designed to give you the information needed to secure your home or small business computer. You'll find tips on how to safeguard your system, a self-guided cyber security test, educational materials, and other Internet resources, as well as valuable information from our sponsor organizations.
Added on: 09-Jul-2003 Hits: 213
Rate this Site | Report Broken Link

Home Computer Security (CERT Co-ordination Center) 
Description: Securing your home computer is not a trivial task. There are many topics to consider and many steps to follow. They take time to learn and do. If you can, read this entire document before you begin to secure your computer. You’ll have a better understanding of the effort and all its facets. This ought to help you when you begin to tackle the tasks described here. In the next part of this document, we describe two types of activities. Some you can do using the programs that came with your computer: working with passwords and email attachments, running programs, and backing up your work. For other activities, you might need to obtain some specialized programs: applying patches, and running anti-virus, firewall, and file encryption programs. Though some vendors’ products provide these features, we’ll assume your computer doesn’t have any of them so you’ll need to add all of them. Here then is the list of tasks you need to do to secure your home computer. Their order is based on how intruders attack computers, beginning with the most-often used attack methods. By starting with the lower numbered tasks, you address the biggest problems you face in securing your home computer. Remember that most sections end with a reference to a web site that you can use to find an example of how to do the task on a Microsoft Windows 2000 computer.
Added on: 08-Jul-2003 Hits: 229
Rate this Site | Report Broken Link

Home Network Security (CERT Co-ordination Center) 
Description: This document gives home users an overview of the security risks and countermeasures associated with Internet connectivity, especially in the context of “always-on” or broadband access services (such as cable modems and DSL). However, much of the content is also relevant to traditional dial-up users (users who connect to the Internet using a modem).
Added on: 10-Jul-2003 Hits: 161
Rate this Site | Report Broken Link

How to Obscure Any URL 
Description: Not exactly security related, this page by PCHelp describes how spammers, scammers and the likes, hide their origin by obfuscating URLs. It describes the techniques using various examples. Note: Both IE and Netscape handle URLs slightly different starting in the generation 6.x browsers. Some examples or forms may no longer work in these browsers.
Added on: 12-May-2002 Hits: 226
Rate this Site | Report Broken Link

How to Report Internet-Related Crime 
Description: Computer Crime and Intellectual Property Section (CCIPS): Internet-related crime, like any other crime, should be reported to appropriate law enforcement authorities at the local, state, federal, or international levels, depending on the scope of the crime.
Added on: 31-Jan-2004 Hits: 1750
Rate this Site | Report Broken Link

How to Report Internet-Related Security Incidents 
Description: CERT® Coordination Center Incident Reporting System: The CERT Coordination Center focuses on reports of security incidents involving the Internet. Definition=The act of violating an explicit or implied security policy. Widely recognized violations of a typical security policy are characterized at the Center.
Added on: 31-Jan-2004 Hits: 1461
Rate this Site | Report Broken Link

Implementing row level security in SQL Server 
Description: Microsoft SQL Server doesn't provide built-in row level security for data stored in tables. This articles shows you, how to implement row level security, with the use of views, and system functions. Complete code is provided.
Added on: 01-Jan-2003 Hits: 205
Rate this Site | Report Broken Link

Improve Security (CERT Co-ordination Center) 
Description: Although you cannot make it completely immune to attacks, there are ways to improve the overall security of your system to make it less vulnerable. To help you improve your system's security, we have developed a method for evaluating your security risks, security practices that you can implement, and training courses for managers and technical personnel. We also have information on how to develop your own computer security incident response team or expand the skills of a team you already have.
Added on: 08-Jul-2003 Hits: 153
Rate this Site | Report Broken Link



Select Page: 1 2   [ Next Page >> ]
Login
User Login

Nickname:
Password:
Security Code: Security Code
Type Security Code:
 
· New User? ·
Click here to create a registered account.
image
Forums Topics
Syndication