Advanced |
Search: Only in category " Security" All sites |
Categories |
Web pages Security
1. About.com VPN directory |
A smattering of VPN resources including several articles and guides. |
http://compnetworking.about.com/od/vpn/ |
2. All about VPN |
Explains VPN features, protocols and solutions. |
http://vpn.sockslist.net/ |
3. COAST Internet Firewalls Hotlist |
A list of firewall vendors, white papers, resources, and FAQs. |
http://www.cerias.purdue.edu/about/history/coast_resources/firewalls/ |
4. comp.virus Newsgroup FAQs |
FAQs from the comp.virus newsgroup |
http://www.faqs.org/faqs/by-newsgroup/comp/comp.virus.html |
5. Corecom VPN FAQ Page |
Geared towards those new to VPN. |
http://www.corecom.com/external/vpn/vpnfaq.htm |
6. DShield |
Distributed Intrusion Detection System collects firewall log excerpts from volunteers. The |
http://www.dshield.org/ |
7. European Institute for Computer Anti-Virus Research (EICAR) |
Combines universities, industry, media, technical, security, and legal experts from civil |
http://www.eicar.org/ |
8. Examples of Malicious Computer Programs |
Long essay that describes harm done by major computer viruses or worms, and discusses the |
http://www.rbs2.com/cvirus.htm |
9. F-Secure Virus Information Centre |
A searchable database of virus descriptions, from the provider of F-Secure range of anti-v |
http://www.f-secure.com/v-descs/ |
10. How Virtual Private Networks Work |
Gives definition of VPN and an overview of general VPN topics, includes diagrams and an an |
http://www.howstuffworks.com/vpn.htm |
11. Malware-Traffic-Analysis.net |
News about current malware strains, tutorials and examples of traffic analysis and samples |
http://www.malware-traffic-analysis.net/ |
12. McAfee Virus Information |
Virus alerts, mailing list, and searchable descriptions of common viruses. |
http://us.mcafee.com/virusInfo/default.asp |
13. Secure Programming for Linux and Unix Howto |
Design and implementation guidelines for writing secure programs for POSIX operating syste |
http://www.dwheeler.com/secure-programs/ |
14. Secure Programming Techniques |
First installment in multipart series of excerpts from Practical Unix and Internet Securit |
http://www.onlamp.com/pub/a/onlamp/excerpt/PUIS3_chap16/index1.html |
15. Tom Dunigan's Virtual Private Networks page |
Describes IP-based VPN technology over the Internet. |
http://www.csm.ornl.gov/~dunigan/vpn.html |
16. Virtual Private Network Consortium |
VPNC is the international trade association for manufacturers in the VPN market. |
http://www.vpnc.org/ |
17. VPN Land |
Creates a secure network connection over a public network to enable remote users to secure |
https://www.vpnland.com/ |
Terms of Use Help Advertise Add website Feedback Make donation