Computer and Network Security

Networks Security Courses offered by Global Knowledge
Course NamedaysAuthorDescription
Network Security and Firewall Administration 3David
Ford
Testing Vulnerabilites with Hacker tools, intro to Cisco ACLs and Checkpoint FW-1
Designing Security Architectures 2Bernie
Dixon
Implementing a Security Policy with Firewalls, ACLs, Bastion Hosts
Contivity Extranet Switch Installation and Configuration4Bob
Dolliver
Nortel VPN network device, IKE, IPSec
Managing Cisco Network Security 5 5 day course 

Talisker's Network Security Tools Firewall, IDSs - extensive reviews!

Network Security Products: VPNs, Firewalls
ProductDescription
Contivity Extranet SwitchVPN network device; Extranet Access Client (EAC)
Cisco VPN 3000 Concentrator (Altiga) VPN network device; Cisco VPN 3000 Client
Cisco 1700 Access Router firewall and VPN gateway
Aurorean VPN Gateway by Indus River a company just acquired by EnterasysVPN network device
SonicWall.com Internet Security Solutions including Firewall/VPN products
NetScreen.com Gigabit speed Firewall and VPN; Netscreen 1000ES reviewed in Dec 11, 2000 Network World - performs 3DES encryption at 600Mbps
Cisco PIX 535 Firewall and VPN reviewed in Dec 11, 2000 Network World, includes intrusion detection for about 50 standard attacks - can block and trigger alarms on detection.
Avaya bolstered VPN equipment family by buying VPNet, getting better client and encryption technology.
According to Infonetics Research, the worldwide market for VPN products and services will grow from $5.1B in 2000 to $35.9B in 2004. per Network World Jan 15, 2001
CheckPoint Firewall-1 firewall and VPN
Sidewinder Firewall "military grade" firewall by Secure Computing
VPcom Firewall and VPN "high performance (up to T3) integrated network security product. Included is a Firewall, VPN (Virtual Private Network), Traffic Shaping, and Intrusion Detection."
RASP Secure Access by Kasten Chase Applied Research; Orbitor Place, 5100 Orbitor Drive, Mississauga, Ontario L4W 4Z4; Phone: 905-238-6900 Toll Free: 1-800-263-1448 is the first complete remote access security solution designed to safeguard classified government data

Anti-Virus per Network World 10/22/01: Linda Musthaler of Currid & Co.
Systems and Network Security (SANS.org)
Center for Internet Security
Symantec AntiVirus Research Center
CA's Virus Information Center
Microsoft's Strategic Technology Protection Program
Anti-Spyware per Network World 9/24/01 and 10/1/01: Mark Gibbs
Web Proxy Filter: Proxomitron current site
Startup Monitor by Mike Lin
Startup Control Panel by Mike Lin
Network World; see anti-spyworld Discussion: doc finder 6228

Foundstone Free Tools
Assessment Utilities Includes - Fpipe v2.1
Forensics Tools Includes - NTLast v3.0, Forensic Toolkit v2.0, ShoWin v2.0, BinText v3.0, PatchIt v2.0, and Vision v1.0
Intrusion Detection Tools Includes - Carbonite v1.0, FileWatch v1.0, Attacker v3.0, and Fport v1.33
Scanning Tools Includes - BOPing v2.0, SuperScan v3.0, FScan v1.12, Trout v2.0 DDosPing v2.0, and SNScan v1.04
Stress Testing Tools Includes - NTOMax v2.0, Blast v2.0, and UDPFlood

From the Philadelphia Inquirer Tuesday, September 28, 2000, Section F: Tech.Life@Inquirer

  1. Privacy.net displays info about your browser, computer, previous site visited - available to any Web site you visit.
  2. Online Guide to Practical Privacy Tools per non-profit Electronic Privacy Information Center (EPIC)
  3. "Controlling Cookies" per Web site of the Michigan attorney general.
  4. How to turn off targeted advertising cookies from DoubleClick see Opt-Out.
  5. Opt-Out of online marketing per Center for Democracy and Technology (CDT)
  6. Lumeria.com
  7. Anonymizer.com
  8. Zero-Knowledge.com

From the Philadelphia Inquirer Tuesday, February 22, 2000, page C1

  1. Gibson Research Corp. test how secure your computer is.
  2. Zone Labs Inc. download free firewall called ZoneAlarm. Recommended by Steve Gibson of Gibson Research Corp., Laguna Hills, California.
  3. Symantec Corp's Norton Internet Security 2000 sells for $50 to $60.
  4. Privacy Tips: for users of Windows 95 and 98 -
    Turn off the option that lets others look at your files and use your printer. To do so, click the Windows "start" button, go to the "settings" and select the "control panel". In the control panel window, double-click the "network" icon. In the network window, click on the "file and print sharing" button, and uncheck the two checkboxes in the new window.

Symantec SecurityCheck check your computer's vulnerabilities to hacker attack ONLINE. Best with Internet Explorer 4.01 as it uses ActiveX and other stuff that doesn't run on Netscape browser...


Computer Theft Protection

  1. Lucira.com Lucira Technologies, Inc. offers the solution to the problem of laptop theft. Based in Boston, MA, Lucira's Secure PC product allows stolen or misplaced laptops to be located within minutes after notifying our 24-hour Internet Cyber Recovery Center™.
    A consumer version of Secure PC is free and can be downloaded from our website after product launch in Fall 2000.


Computer Security

  1. Attrition.org non-profit site that monitors the computer security community and maintains an archive of defaced web sites.
  2. AntiOnline use hacker tools to test vulnerabilities of your site (thanks Mike Wionzek, Bell Canada, 11/16/00) - join the antionline mail list (eGroups).
  3. SANS.org System and Network Security.org - Global Intrusion Alert Center (GIAC) certification courses, Security conferences, white papers from vendors (thanks Mike Wionzek, Bell Canada, 11/16/00)
  4. HappyHacker.org whitehat site by dean of georgetown U compsci - stories of intrusions - good for educating an organization!
  5. Elron SW.com commercial IDS and packet monitoring, statistics on packet type, sources. Internet Policy Management or IM.. (thanks Don Legge, Cyberplex, Inc. 11/16/00)
  6. Computer Security per Advanced Laboratory Workstation System at nih.gov
  7. Network Security Library has a Handbook of Information Security Management, refers to the International Information Systems Security Certification Consortium (ISC)2.
    also has Internet Security Professional Handbook
  8. International Information Systems Security Certification Consortium (ISC)2
  9. GNU Privacy Guard (gnupg.org) with great cryptographic links page. a PGP replacement.
  10. WebAttack.com - WinVNC Windows VNC, Virtual Network Computing. It is, in essence, a remote display system which allows you to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures.
  11. EasyCrypto from Handybits.com Easy to use Blowfish 128 bit strong encryption of files and/or folders
  12. Warez.com hackers' site
  13. HotWarez.com.br CD with 100's of text files explaining hot to crack variety of packages including Nortel VPN.
  14. ISSA.org Information Systems Security Association
  15. ITSecurity.com TECS - The Encyclopedia of Computer Security

Security Services

  1. @Stake.com will help you understand and manage the security risks inherent in your on-line business model.
  2. CounterPane.com Couterpane Internet Security, Inc., Bruce Schneier's Cryptography page (he's the author of Applied Cryptography).
  3. L0PHT.com Heavy Industries - to merge with @Stake.com

Encryption

  1. NIST selects AES National Institute of Standards and Technology selects an algo for the Advanced Encryption Standard to replace DES, Data Encryption Standard - per October 9, 2000 issue of Network World. The Rijndael algo by Vincent Rijmen of EE dept, Catholic University, Leuven, Belgium, and Joan Daemen of Proton World International. This algo selected over 4 others but has best combination of security, performance, efficiency, ease of implementation and flexibility.
  2. Tom McCune's PGP Page Updated! 8-21-2002
  3. PGP.com encrypt email with Pretty Good Privacy. PGP uses asymetric key encryption to encrypt the symmetric key used to encrypt the payload data. (Asymmetric key encryption is much slower than symmetric key encryption but avoids the key management difficulties of symmetric key encryption - PGP combines the methods to get the best of both.)
    Download installation wizard.
  4. MIT Distribution Center for PGP PGP Freeware v6.5.8 now available
  5. NAI.com Network Associates, Inc. - distributors of PGP, McAfee Virus Scan,... maybe NetXray too
  6. Trojan Remover by Simply Super Software, 30 day trial, $24.95
  7. ICSA.net International Computer Security Association - but they say it's not an acronym! - "Through ten years of growth, our company has adopted what was once our acronym to accruately portray our direction and scope of services."
  8. Net Resources: VPNs nwfusion.com
  9. Firewall FAQs by interhack.net/pubs/fwfaq
  10. Tim Weil's Hot List includes MANY topics including VPN white papers, info sites.
  11. NetSys "unix, internet, security" - distributers of Hacker's Choice Newsletter, technical archives bulletin board on firewalls.
  12. Security Project at the TCM Laboratory Finland. IPsec tutorial.


PKI Links

VPNs

Data Compression


back to dkerr | back to Links


last updated 3-16-2002
8-21-2002 dek