New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO12)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 1094
Comments: 21
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image



[ Links Main | Add Link | New | Popular | Top Rated | Random ]

Category: Main/Security How-To


Sort Links by: Title (A\D) Date (A\D) Rating (A\D) Popularity (A\D)
Sites currently sorted by: Title (A to Z)


Insecure.org 
Description: security tools, security list, Nmap stelath port scanner, about microsoft, linux, solaris and more
Added on: 26-Jan-2003 Hits: 219
Rate this Site | Report Broken Link

IT Security Cookbook Now Available 
Description: Over the past five years, Sean Boran has put together what has become the most comprehensive online Internet security resource available. LinuxSecurity recently had an opportunity to chat with the author, talk about its new home at LinuxSecurity.com, and a few words about the resource itself.
Added on: 27-Feb-2002 Hits: 198
Rate this Site | Report Broken Link

Octave@ 
Description: Information Security Risk Evaluation: What is OCTAVE®? Operationally Critical Threat, Asset, and Vulnerability EvaluationSM (OCTAVE), is an approach for self-directed information security risk evaluations that puts organizations in charge: Balances critical information assets, business needs, threats, and vulnerabilities. Measures the organization against known or accepted good security practices. Establishes an organization-wide protection strategy and information security risk mitigation plans. This approach, includes criteria that define the requirements for a comprehensive, self-directed information security risk evaluation, and for methods consistent with these criteria. The OCTAVE Method, available now, was built with large organizations in mind. A second method, OCTAVE-S, will focus on small organizations. These two methods will provide the end-points of a continuum of various methods aimed at different sizes and types of organizations. We expect many of these other methods to be developed by other organizations, using the criteria as basic requirements. OCTAVE helps you look beyond the technology infrastructure at the entire organization. OCTAVE has three phases to first determine what information assets really need to be protected. Only then is the technology infrastructure evaluated to determine if it can protect those assets and how vulnerable it is. Then, risks to critical assets are defined. Finally, good security practices are used to establish an organization-wide protection strategy and mitigation plans for specific risks to critical assets.
Added on: 08-Jul-2003 Hits: 96
Rate this Site | Report Broken Link

RobertGraham.com Infosec Publications 
Description: An article on IDS (Intrusion Detection Systems), Traffic Sniffing in general, figuring out if traffic is hostile and how to sniff out intruder's traffic. A Lexicon for used terms and an explanation of what might be seen in firewall logs
Added on: 12-May-2002 Hits: 652
Rate this Site | Report Broken Link

Security Solutions (F-Secure) 
Description: F-Secure Corporation is the leading provider of centrally managed security solutions for the mobile enterprise. The company's award-winning products include anti-virus, file encryption and network security solutions for all major platforms from desktops to servers and from laptops to handhelds. Customers in nearly every industry - Government, Manufacturing, Retail, Telecommunications, Finance, Energy, Transportation, High Tech and more - rely on F-Secure products to make information secure, reliable and accessible. Mobility challenges many of the fundamental assumptions upon which traditional IT systems have been based on. F-Secure supports businesses with a broad range of centrally managed and up to date security solutions to enable a truly mobile enterprise. For the administrator, F-Secure enables a dispersed user base with: Policy-based management Automatic enforcement Instant alerts Reports For the end-user, with F-Secure, security is: Invisible Automatic Reliable Always operating Up-to-date
Added on: 27-Jun-2003 Hits: 59
Rate this Site | Report Broken Link

Security Wizards 
Description: The SecWiz Guide to Network Security is a web collection of documents helping to solve your network security problems in system-specific detail. This website is filled a wide variety of firewall-related information, including: technical articles, firewall rulesets, news, links to white papers, and listings of new tools and products. Security Wizards aims to be the largest central repository of security related information, with the objective of providing clarity on the burning issues regarding network security deployment and implementation. This site is aimed at security engineers and technical executives and will be updated on a fortnightly basis. (non- commercial site)
Added on: 10-Aug-2003 Hits: 67
Rate this Site | Report Broken Link



Select Page:   [ << Previous Page ] 1 2 
Login
User Login

Nickname:
Password:
Security Code: Security Code
Type Security Code:
 
· New User? ·
Click here to create a registered account.
image
Forums Topics
Syndication