Search Amazon 
upComputer/Internet Security & Forensics
upComputer/Internet Security
Looking for freeware/shareware anti-virus and anti-spyware? See the Internet Resources Software page
Schneier.com"Bruce Schneier is an internationally renowned security technologist and author. Described by The Economist as a "security guru," Schneier is best known as a refreshingly candid and lucid security critic and commentator. When people want to know how security really works, they turn to Schneier."
DSL Reports"Shield Probe.. Get an instant security analysis now. You dont even need to know your own IP address!" - Very much like ShieldsUp! Also of interest: FAQ on Security
ShieldsUP!"Can anyone crawl into your computer while you're connected to the Internet? You may be VERY surprised to find out!" - a free service of Gibson Research Corporation makers of the famous Spinrite disk utility software.
Help Net SecurityHelp Net Security (HNS) is an online portal that covers all the major information security happenings.
LinuxSecurity.comNews and articles on Linux security issues
Incidents.org"A virtual organization of advanced intrusion detection analysts, forensics experts and incident handlers from across the globe. The organization's mission is to provide real time "threat-driven" security intelligence and support to organizations and individuals."
Cookies Central"Comprehensive resource on Internet cookies, including what they are, how to block or stop them."
securityspace"To prove that we can find problems on YOUR system, we offer this comprehensive No Risk audit, for free."
dshield.org"Distributed Intrusion Detection System. Submit your firewall log excerpts or browse through current activity reported to the system. Featuring a list of 10 Most Wanted IP Addresses"
SecurityFocus"Designed to facilitate discussion on security related topics, create security awareness, and to provide the Internet's largest and most comprehensive database of security knowledge and resources to the public."
Internet Storm Center"Internet Storm Center gathers more than 3,000,000 intrusion detection log entries every day... in a quest to do a better job of finding new storms faster, isolating the sites that are used for attacks, and providing authoritative data on the types of attacks that are being mounted against computers in various industries and regions around the globe."
AntiOnline"The Internet's Information Security Super Center"
Snort"Snort is a lightweight network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more." Available for Windows and Linux - GNU license (free)
searchSecurity.comArticles and news on computer and network security
An Overview of Cryptography"Defines some of the terms and concepts behind basic cryptographic methods, and offers a way to compare the myriad cryptographic schemes in use today. Also provides some real examples of cryptography in use today."
The Center For Democracy & Technology"CDT seeks practical solutions to enhance free expression and privacy in global communications technologies." Here you will find an online snooper, which let you know how much information you are sharing about yourself when you surf the Internet.
upComputer/Internet Forensics
Web Browser Forensics, Part 1Part 1 of a two part study that presents the techniques and tools commonly used by computer forensics experts to uncover such evidence, through a fictitious investigation that closely mimics real-world scenarios.
Web Browser Forensics, Part 2Part 2 of a two part study that presents the techniques and tools commonly used by computer forensics experts to uncover such evidence, through a fictitious investigation that closely mimics real-world scenarios.
Autopsy Forensic Browser"A graphical interface to the command line digital investigation tools in The Sleuth Kit. Together, they allow you to investigate the file system and volumes of a computer."
Search Amazon