.comment-link {margin-left:.6em;}

Old Army's Blog

My Life and Opinions about life in Nevada & now Texas!!!

Name:
Location: Texas, United States

I am a Retired Army guy, who is old fashioned and progressive. You know a living oxymoron! My Favorite blogs: http://jetiranger.tripod.com/BLOG/ & http://www.usinkorea.org/

Thursday, March 23, 2006

Computer Security

This is a great list of reading Web Sites and Blogs as I copied it from Jesper Johanssons Blog (See Link below) and will be adding to it as I find more. Most of these sites I already have in my Favorites. In addition I would (if you are interested in computer Security) visit the NSA Site there are others but they are DoD sites so I will not list them! Before you say it, they can be a little dry in reading but there is a wealth of information to be had at these sites. A good list of General computer security is listed here. I think items 8 & 9 are for those that really need to lock down their access but the others are good practices for all.

2600 – The original hacker magazine. 2600 refers to the frequency used for certain control signals on the US telephone system. By sending a signal at that frequency the hacker was able to control the telephone switch.

Phrack – An intensely technical hacker mag that sometimes has really insightful articles, often lots of noise and posturing. Still worth keeping up on though.

Security Focus – Now owned by Symantec, Security Focus appears to still be operating largely independently providing good value. They host the biggest security mailing list, BugTraq, which, frankly, is not nearly as good as it used to be. Too much of the traffic now seems to be just posturing and advertising by security bug finders.

TechNet Security – Contains just about all of Microsoft's technical security documentation

MSDN Security – Microsoft's developer security center, contains, among other things, the famous Microsoft

Security Development Lifecycle. Microsoft Security Notifications – Anyone who runs Microsoft systems should sign up to get notified of new security issues.

Security Management Columns Archive – This is the archive for the Security Management Column on Microsoft TechNet. Many, although not all, of Steve Riley's and Jesper Johansson's articles are listed there.

Bruce Schneier's blog – Bruce Schneier is an opinionated pundit. He is also one of the worlds leading cryptographers. His blog has all kinds of odd things in it. Worth looking at every now and then.

Michael Howard's blog – Michael has forgotten more about writing secure software than most of us will ever know. Luckily, he wrote a lot of it in his blog before he forgot it.

Aaron Margosis' blog – Aaron speaks more about least privilege than just about anyone around. His blog has great information about how to do it for real.

Mark Russinovich's blog – Mark knows more about the Windows operating system than most of the people who actually work on it. He also is starting to get really good at security and of course has written some of the best tools out there. His blog is usually full of articles that he should have been paid for by some magazine.

Steve Riley's blog – Steve travels the world and teaches people how to be more secure and how to use Microsoft products more securely. He pontificates in many places, but all of them are usually listed in the blog.

Jesper Johansson's blog – One of the few people who is more opinionated than Steve Riley, or was that the other way around? In any case, I also have a blog now, and also spend most of my time talking to Microsoft customers about security, or on a plane on the way to do so.

Computer Security - This is a list of links to different security sites. It has everything from FAQ to system hardening. It is a great information resource. *updated 3 April 2006 by me

1 Comments:

Anonymous cenforce 150 said...

Organization security is the act of making sure about a PC network from interlopers, regardless of whether focused aggressors or deft malware. Application security centers around keeping programming and gadgets liberated from dangers. An undermined application could give admittance to the information it intended to secure.

8:52 PM  

Post a Comment

<< Home