tag:blogger.com,1999:blog-51233768466253295202024-03-22T08:23:38.695+05:30STOP THEM. ! BEFORE THEY STOP YOUSurenhttp://www.blogger.com/profile/09789784724534128579noreply@blogger.comBlogger209125tag:blogger.com,1999:blog-5123376846625329520.post-79662959396583796302010-11-08T12:17:00.002+05:302010-11-08T12:17:51.588+05:30China unknowing punching bag for US anonymiser company<div style="font-family: Verdana,sans-serif;"><span class="postbody">I am starting to have a little bit of sympathy for the Chinese and their government. <br />
<br />
In the last week I came across a most interesting cross fertilization of American ingenuity and capitalism that took advantage of the situation in China. <br />
<br />
A rather large global anonymization service - claiming subscribers in the millions - and owned and operated in the United States - was exclusively using hosting services in China. <br />
<br />
What I found was that this United States based company was routing all their anonymized traffic through Chinese IPs. And let us be clear - this was not merely one little IP range that they were using. <br />
<br />
Instead, this United States based anonymiser company was routing all of their paid subscriber's Internet traffic through a full range of IPs that were assigned to China. They had blocks of random IPs that appear to be a deliberate attempt to disperse as widely as possible throughout the IP ranges that are assigned and traceable to China. <br />
<br />
Originally, this first came to my attention when I noticed a significant amount of malicious traffic coming at my web sites from China. On closer investigation I located the US based service that all this traffic had in common. That made it possible to start following the trail to all the Chinese IPs that they were using to route their subscriber's traffic. I was amazed by the diversity of IP ranges that they were using - but they all were within China. <br />
<br />
It struck me as a bit odd that all the IPs traced back to hosted servers in China. Why not Russia, Thailand, Korea, Vietnam... why not share the wealth of this obviously successful enterprise ? Why exclusively Chinese IPs ? I will make a giant leap for the purposes of speculation, but I have to assume the princiiples involve in this company must be quite capable in written and spoken Chinese due to their extensive and exclusive use of a great number of Chinese based web hosting companies... But I digressed and went off on a tanget... so back to our tale... <br />
<br />
I could explain the flaw in their system that makes their 'anonymous' service so easy to identify and block - but I have no desire to help them find a way to circumvent their flaw. <br />
<br />
So... isn't that beautiful ? These million's of paid subscribers to this 'anonymizer' service are all showing up in web server logs as originating from China - when in fact that user might be in Russia, Spain or even the neighbor who lives down the street from you. <br />
<br />
BUT what IP or country is going to get the blame for any malicious tricks or antics done by the subscribers to this anonymizer service ? Yup... China will get the blame - since that is where the anonymiser's trail leads you to. And from a review of our logs, it appears that this 'anonymiser' company doesn't appear to care about the type or volume of traffic that their subscribers pump through their service. <br />
<br />
As I was formulating in my mind a way to explain this interesting revelation it struck me that people using this 'anonymiser' service probably have no idea that their Internet surfing was being routed through China exclusively. <br />
<br />
And that raised a bit of a security flag in my mind. We all know that China routinely monitors all Internet traffic travelling through their country. And so that leads us to wonder if Johnny US Citizen has any idea that his 'supposedly' anonymous traffic is being routinely examined and monitored by the Chinese government ? <br />
<br />
It's all kind of funny in a way when you carefully look at what I stumbled on... <br />
<br />
a ) an American - for profit - anonymous surfing company is routing all their 'anonymous' subscribers through China <br />
<br />
b ) Chinese IPs are taking the blame for any malicious antics carried out by any of the claimed 'millions of subscribers' using this this anonymiser service. <br />
<br />
c ) Global surfers trying to 'be anonymous' are having their Internet surfing and messaging being under the microscope of the Chinese government authorities. Gee I hope they aren't trying to be anonymous while posting messages about some internal corporate secrets. They might as well have sent their message directly to the Chinese spy agency. <br />
<br />
All in all... it was a rather interesting discovery that, up until now, I have not heard anyone mention or even be slightly aware of. <br />
<br />
In a way, I have to give a tip of the hat to the clever US based capitalist behind this venture. <br />
<br />
They appear to be raking in significant dollars from their subscribers while they are incurring wrath against the Chinese IPs or Chinese hosting companies that they have engaged in this venture. <br />
<br />
But it does leave me wondering if the anonymiser company are also knowingly piping user traffic through China so that it can be monitored by the Chinese government authorities. Maybe that is where the seed money came from to start this rather large anonymiser company ? ? <br />
<br />
I wonder how many months or years it will take before the 'experts' start sharing their revelations about this anomaly of an anonymiser service and its exclusive use of IPs assigned to China ? </span></div>Surenhttp://www.blogger.com/profile/09789784724534128579noreply@blogger.com2tag:blogger.com,1999:blog-5123376846625329520.post-30854783068046381282010-11-07T04:06:00.001+05:302010-11-07T04:06:24.168+05:30<span style="color: red; font-family: Arial; font-size: medium;">Links to IDS Products (courtesy of Talisker )</span><br />
<hr color="#ff0000" /><table border="0" cellpadding="7" cellspacing="0"><tbody>
<tr><td align="middle" valign="top" width="32%"><div align="left" style="margin-left: 6px; margin-right: 6px;"><a href="http://www.infosyssec.com/infosyssec/index.shtml#Bro">Bro</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#AFJ"><br />
</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#Dragon">Dragon</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#Sentry"><br />
</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#Manhunt">Manhunt</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#Hogwash"><br />
</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#Cisco%20Secure%20IDS">Netranger</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#CyberTrace%20IDS"><br />
</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#NID">NID </a><a href="http://www.infosyssec.com/infosyssec/index.shtml#NetProwler"><br />
</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#Sentivist">Sentivist</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#Cisco%20Secure%20IDS"><br />
</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#Snort%201.6">Snort</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#SNP"><br />
</a></div></td><td align="middle" valign="top" width="39%"><div align="left" style="margin-left: 6px; margin-right: 6px;"><a href="http://www.infosyssec.com/infosyssec/index.shtml#Cisco%20Secure%20IDS">Cisco Secure IDS</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#ARMOR"><br />
</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#E-Trust%20IDS">E-Trust IDS</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#Cisco%20Secure%20IDS"><br />
</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#NetDetector">NetDetector</a><br />
<a href="http://www.infosyssec.com/infosyssec/index.shtml#RealSecure%20Engine">RealSecure Network Sensor </a><a href="http://www.infosyssec.com/infosyssec/index.shtml#NetProwler"><br />
</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#SNP"> SecureNet Pro</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#NFR"><br />
</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#SHADOW">SHADOW</a> <a href="http://www.infosyssec.com/infosyssec/index.shtml#OpenSnort"><br />
</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#Sourcefire">SourceFire</a></div></td><td align="middle" valign="top" width="29%"><div align="left" style="margin-left: 6px; margin-right: 6px;"><a href="http://www.infosyssec.com/infosyssec/index.shtml#Cyclops">Cyclops</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#BlackIce%20Agent"><br />
</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#IntruShield">IntruShield</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#Cisco%20Secure%20IDS"><br />
</a><br />
<a href="http://www.infosyssec.com/infosyssec/index.shtml#nPatrol">nPatrol</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#E-Trust%20IDS"><br />
</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#SecurityMetrics">SecurityMetrics</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#NFR"><br />
</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#Shoki">Shoki</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#Cisco%20Secure%20IDS"><br />
</a><a href="http://www.infosyssec.com/infosyssec/index.shtml#Tamandua">Tamandua</a></div></td></tr>
</tbody></table><br />
<hr color="#ff0000" /><span style="color: red; font-size: medium;">Various IDS Resources and Guides</span><br />
<hr color="#ff0000" /><a href="http://csrc.nist.gov/publications/nistir/nistir-7007.pdf"><b>An Overview of Issues in Testing Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:rlfA0nBcOawJ:csrc.nist.gov/publications/nistir/nistir-7007.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=1&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
1. An Overview of Issues in Testing Intrusion Detection. Systems. 1. Authors: National Institute of Standards and Technology ITL: Peter Mell, ...<br />
<span class="a">csrc.nist.gov/publications/nistir/nistir-7007.pdf</span><br />
<br />
<a href="http://csrc.nist.gov/publications/drafts/Draft-SP800-94.pdf"><b>Guide to Intrusion Detection and Prevention (IDP) Systems (DRAFT)</b></a> -<a href="http://72.14.205.104/search?q=cache:ugR2HOPIVdgJ:csrc.nist.gov/publications/drafts/Draft-SP800-94.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=2&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Special Publication 800-94. (Draft). Guide to Intrusion Detection. and Prevention (IDP) Systems. (DRAFT). Recommendations of the National Institute ...<br />
<span class="a">csrc.nist.gov/publications/drafts/Draft-SP800-94.pdf</span><br />
<br />
<a href="http://www.cert.org/archive/pdf/IEEE_IDS.pdf"><b>The Role of Intrusion Detection Systems</b></a> - <a href="http://72.14.205.104/search?q=cache:JF9VTOoAi4kJ:www.cert.org/archive/pdf/IEEE_IDS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=3&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;"> View as HTML</a><br />
42. IEEE SOFTWARE. September/October 2000. 0740-7459/00/$10.00 © 2000 IEEE. cycle before making its choice. When an. IDS is properly deployed, ...<br />
<span class="a">www.cert.org/archive/pdf/IEEE_IDS.pdf</span><br />
<br />
<a href="http://www.cert.org/archive/pdf/99tr028.pdf"><b>State of the Practice of Intrusion Detection Technologies</b></a><br />
State of the Practice of. Intrusion Detection. Technologies. Julia Allen. Alan Christie. William Fithen. John McHugh. Jed Pickel. Ed Stoner. Contributors: ...<br />
<span class="a">www.cert.org/archive/pdf/99tr028.pdf</span><br />
<br />
<a href="http://www.icir.org/vern/papers/norm-usenix-sec-01.pdf"><b>Network Intrusion Detection: Evasion, Traffic Normalization, and ...</b></a> -<a href="http://72.14.205.104/search?q=cache:-D8xkmnv4p0J:www.icir.org/vern/papers/norm-usenix-sec-01.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=5&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Network Intrusion Detection: Evasion,. Traffic Normalization, and End-to-End Protocol Semantics. Mark Handley and Vern Paxson ...<br />
<span class="a">www.icir.org/vern/papers/norm-usenix-sec-01.pdf</span><br />
<br />
<a href="http://www.icir.org/vern/papers/sig-ccs03.pdf"><b>Enhancing Byte-Level Network Intrusion Detection Signatures with ...</b></a> -<a href="http://72.14.205.104/search?q=cache:etQLJJAUTOYJ:www.icir.org/vern/papers/sig-ccs03.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=6&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Enhancing Byte-Level. Network Intrusion Detection Signatures with Context. Robin Sommer. TU Munchen. Germany. sommer@in.tum.de. Vern Paxson ...<br />
<span class="a">www.icir.org/vern/papers/sig-ccs03.pdf</span><br />
<br />
<a href="http://www.cs.berkeley.edu/%7Edaw/papers/ids-oakland01.pdf"><b>Intrusion Detection via Static Analysis</b></a> -<a href="http://72.14.205.104/search?q=cache:TSEPgagkEr0J:www.cs.berkeley.edu/%7Edaw/papers/ids-oakland01.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=7&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Intrusion Detection via Static Analysis. David Wagner. U.C. Berkeley. ¢¡¤£¦¥¨§ © ¢ ¤ ¦ ¦ ¤ ! " #. Drew Dean. Xerox PARC. ¦ ¡" §& (' " )"'0 1§ )¤2. Abstract ...<br />
<span class="a">www.cs.berkeley.edu/~daw/papers/ids-oakland01.pdf</span><br />
<br />
<a href="http://www.cs.berkeley.edu/%7Edaw/papers/mimicry.pdf"><b>Mimicry Attacks on Host-Based Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:gVY6Qei5oZwJ:www.cs.berkeley.edu/%7Edaw/papers/mimicry.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=8&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Mimicry Attacks on Host-Based Intrusion Detection. Systems. ∗. David Wagner. University of California, Berkeley. daw@cs.berkeley.edu. Paolo Soto ...<br />
<span class="a">www.cs.berkeley.edu/~daw/papers/mimicry.pdf</span><br />
<br />
<a href="http://www.phptr.com/content/images/0131407333/downloads/0131407333.pdf"><b>Intrusion Detection Systems with Snort Advanced IDS Techniques ...</b></a><br />
B. RUCE. P. ERENS. ’ O. PEN. S. OURCE. S. ERIES. ◆. Managing Linux Systems with Webmin: System. Administration and Module Development. Jamie Cameron ...<br />
<span class="a">www.phptr.com/content/images/<wbr></wbr>0131407333/downloads/0131407333.pdf</span><br />
<br />
<a href="http://www.cl.cam.ac.uk/%7Ecpk25/publications/honeycomb-hotnetsII.pdf"><b>Honeycomb – Creating Intrusion Detection Signatures Using Honeypots</b></a> -<a href="http://72.14.205.104/search?q=cache:RHWmRYl0KLEJ:www.cl.cam.ac.uk/%7Ecpk25/publications/honeycomb-hotnetsII.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=10&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Honeycomb – Creating Intrusion Detection. Signatures Using Honeypots. Christian Kreibich, Jon Crowcroft. University of Cambridge Computer Laboratory ...<br />
<span class="a">www.cl.cam.ac.uk/~cpk25/<wbr></wbr>publications/honeycomb-hotnetsII.pdf</span><br />
<br />
<a href="http://www.scs.carleton.ca/%7Esoma/id-2006w/readings/wagner-static.pdf"><b>Intrusion Detection via Static Analysis</b></a> -<a href="http://72.14.205.104/search?q=cache:8_XNx2cw6AwJ:www.scs.carleton.ca/%7Esoma/id-2006w/readings/wagner-static.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=11&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Intrusion Detection via Static Analysis. David Wagner. U.C. Berkeley. Û׺ÖÐݺÙ. Drew Dean. Xerox PARC. ÒÔÖºÜÖÓܺÓÑ. Abstract ...<br />
<span class="a">www.scs.carleton.ca/~soma/<wbr></wbr>id-2006w/readings/wagner-static.pdf</span><br />
<br />
<a href="http://www.scs.carleton.ca/%7Ejhall2/Publications/IEEETDSC.pdf"><b>Radio Frequency Fingerprinting for Intrusion Detection in Wireless ...</b></a> -<a href="http://72.14.205.104/search?q=cache:ONsBWX_UfCQJ:www.scs.carleton.ca/%7Ejhall2/Publications/IEEETDSC.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=12&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING. 1. Radio Frequency Fingerprinting for. Intrusion Detection in Wireless Networks ...<br />
<span class="a">www.scs.carleton.ca/~jhall2/Publications/IEEETDSC.pdf</span><br />
<br />
<a href="http://www.thss.tsinghua.edu.cn/sts/paper/1986_an_intrusion_detection_model.pdf"><b>An Intrusion-Detection Model</b></a> -<a href="http://72.14.205.104/search?q=cache:cX0Zo9H2opwJ:www.thss.tsinghua.edu.cn/sts/paper/1986_an_intrusion_detection_model.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=13&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
AN INTRUSION-DETECTION. MODEL. Dorothy. E. Denning. SRI International. 333 Ravenswood. Ave. Menlo Park, CA 94025. A model of a real-time ...<br />
<span class="a">www.thss.tsinghua.edu.cn/sts/<wbr></wbr>paper/1986_an_intrusion_detection_model.pdf</span><br />
<br />
<a href="http://www.cs.unm.edu/%7Esteveah/jcs-accepted.pdf"><b>Intrusion Detection using Sequences of System Calls</b></a> -<a href="http://72.14.205.104/search?q=cache:uFgXpRXDzf0J:www.cs.unm.edu/%7Esteveah/jcs-accepted.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=14&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Intrusion Detection using Sequences of System Calls. Steven A. Hofmeyr. Stephanie Forrest. Anil Somayaji. Dept. of Computer Science ...<br />
<span class="a">www.cs.unm.edu/~steveah/jcs-accepted.pdf</span><br />
<br />
<a href="http://users.ece.gatech.edu/%7Eowen/Research/Conference%20Publications/wireless_IAW2003.pdf"><b>Wireless Intrusion Detection and Response</b></a> -<a href="http://72.14.205.104/search?q=cache:zjHjO6mYDRQJ:users.ece.gatech.edu/%7Eowen/Research/Conference%2520Publications/wireless_IAW2003.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=15&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Proceedings of the 2003 IEEE. Workshop on Information Assurance. United States Military Academy, West Point, NY June 2003. Wireless Intrusion Detection and ...<br />
<span class="a"> users.ece.gatech.edu/~owen/Research/<wbr></wbr>Conference%20Publications/wireless_IAW2003.pdf</span><br />
<br />
<a href="http://www.juniper.net/solutions/literature/white_papers/200065.pdf"><b>Intrusion Detection and Prevention: Protetcting Your Network from ...</b></a> -<a href="http://72.14.205.104/search?q=cache:i3E5rl0-e_IJ:www.juniper.net/solutions/literature/white_papers/200065.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=16&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
White Paper. Intrusion Detection and Prevention. Protecting Your Network From Attacks. Sarah Sorensen. Product Marketing Manager. Juniper Networks, Inc. ...<br />
<span class="a">www.juniper.net/solutions/<wbr></wbr>literature/white_papers/200065.pdf</span><br />
<br />
<a href="http://www.juniper.net/solutions/literature/brochures/150025.pdf"><b>Juniper Networks Intrusion Detection and Prevention Solutions</b></a> -<a href="http://72.14.205.104/search?q=cache:xM5tm_oMWjEJ:www.juniper.net/solutions/literature/brochures/150025.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=17&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
600. ID. P. 50. Small/Mid. S. ize. Bu. sinesse. s. Reg. ional. O. ffice. ISG. 2000. Security Solutions Portfolio. Juniper Networks. Intrusion Detection and ...<br />
<span class="a">www.juniper.net/solutions/<wbr></wbr>literature/brochures/150025.pdf</span><br />
<br />
<a href="http://www.datrix.co.uk/pdf/intrusion_detection_methodologies.pdf"><b>INTRUSION DETECTION METHODOLOGIES DEMYSTIFIED</b></a> -<a href="http://72.14.205.104/search?q=cache:E732otpjzbcJ:www.datrix.co.uk/pdf/intrusion_detection_methodologies.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=18&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Contents:. EXECUTIVE-LEVEL SUMMARY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 ...<br />
<span class="a">www.datrix.co.uk/pdf/intrusion_<wbr></wbr>detection_methodologies.pdf</span><br />
<br />
<a href="http://www.pdl.cmu.edu/PDL-FTP/Secure/usenix03.pdf"><b>Storage-based Intrusion Detection: Watching storage activity for ...</b></a> -<a href="http://72.14.205.104/search?q=cache:I-Q5LC6Zr1oJ:www.pdl.cmu.edu/PDL-FTP/Secure/usenix03.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=19&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Appears in Proceedings of the 12th USENIX Security Symposium. Wasington, DC. August 2003. Storage-based Intrusion Detection: ...<br />
<span class="a">www.pdl.cmu.edu/PDL-FTP/Secure/usenix03.pdf</span><br />
<br />
<a href="http://www.pdl.cmu.edu/ftp/Secure/CMU-CS-02-179.pdf"><b>Storage-based Intrusion Detection: Watching storage activity for ...</b></a> -<a href="http://72.14.205.104/search?q=cache:KWtrWhbzDr8J:www.pdl.cmu.edu/ftp/Secure/CMU-CS-02-179.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=20&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Storage-based Intrusion Detection:. Watching storage activity for suspicious behavior. Adam G. Pennington, John D. Strunk, John Linwood Griffin, ...<br />
<span class="a">www.pdl.cmu.edu/ftp/Secure/CMU-CS-02-179.pdf</span><br />
<br />
<a href="http://www.ll.mit.edu/SST/ideval/pubs/2000/discex00_paper.pdf"><b>Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line ...</b></a> -<a href="http://72.14.205.104/search?q=cache:olLae_91kHgJ:www.ll.mit.edu/SST/ideval/pubs/2000/discex00_paper.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=21&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Evaluating Intrusion Detection Systems:. The 1998 DARPA Off-line Intrusion Detection Evaluation*. *. This work was sponsored by Rome Laboratory and the ...<br />
<span class="a">www.ll.mit.edu/SST/ideval/pubs/2000/discex00_paper.pdf</span><br />
<br />
<a href="http://www.snort.org/docs/Benchmarking-IDS-NFR.pdf"><b>Coverage in Intrusion Detection Systems</b></a><br />
NFR Security Technical Publications. IDS Benchmarking. Experiences Benchmarking. Intrusion Detection Systems. Marcus J. Ranum ...<br />
<span class="a">www.snort.org/docs/Benchmarking-IDS-NFR.pdf</span><br />
<br />
<a href="http://www.snort.org/docs/threatmanagement.pdf"><b>Describe the State of Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:HTEUX0HwIwYJ:www.snort.org/docs/threatmanagement.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=23&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Threat Management Systems. The State of Intrusion Detection. By Steven J. Scott. sjscott007@yahoo.com. August 9, 2002 ...<br />
<span class="a">www.snort.org/docs/threatmanagement.pdf</span><br />
<br />
<a href="http://suif.stanford.edu/papers/vmi-ndss03.pdf"><b>A Virtual Machine Introspection Based Architecture for Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:lSJLwvA2wyAJ:suif.stanford.edu/papers/vmi-ndss03.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=24&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
A Virtual Machine Introspection Based Architecture for Intrusion Detection. Tal Garfinkel. Mendel Rosenblum. {talg,mendel}@cs.stanford.edu ...<br />
<span class="a">suif.stanford.edu/papers/vmi-ndss03.pdf</span><br />
<br />
<a href="http://www.infosecwriters.com/text_resources/pdf/Log_Analysis_DCid.pdf"><b>Log analysis for intrusion detection.</b></a> -<a href="http://72.14.205.104/search?q=cache:OS0Mo5Q0fN4J:www.infosecwriters.com/text_resources/pdf/Log_Analysis_DCid.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=25&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
1 Introduction. Log analysis is one of the most overlooked aspects of intrusion detection. Nowadays we see every. desktop with an antivirus, ...<br />
<span class="a">www.infosecwriters.com/text_resources/<wbr></wbr>pdf/Log_Analysis_DCid.pdf</span><br />
<br />
<a href="http://www.infosecwriters.com/text_resources/pdf/Effective_NIDS_Jriden.pdf"><b>Making Effective Use of Your Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:o3STT0C84WoJ:www.infosecwriters.com/text_resources/pdf/Effective_NIDS_Jriden.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=26&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Making Effective Use of Your. Intrusion Detection System. 20. th. November 2006. Jamie Riden, CISSP (jamesr@europe.com) ...<br />
<span class="a">www.infosecwriters.com/text_resources/<wbr></wbr>pdf/Effective_NIDS_Jriden.pdf</span><br />
<br />
<a href="http://www.raid-symposium.org/raid98/Prog_RAID98/Full_Papers/Sommer_text.pdf"><b>Intrusion Detection Systems as Evidence</b></a> -<a href="http://72.14.205.104/search?q=cache:PRU4cFAwobcJ:www.raid-symposium.org/raid98/Prog_RAID98/Full_Papers/Sommer_text.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=27&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Intrusion Detection Systems as Evidence / Peter Sommer / p 1. Intrusion Detection Systems as Evidence. Peter Sommer. Computer Security Research Centre, ...<br />
<span class="a">www.raid-symposium.org/raid98/<wbr></wbr>Prog_RAID98/Full_Papers/Sommer_text.pdf</span><br />
<br />
<a href="http://www.raid-symposium.org/raid99/PAPERS/Lippmann1.pdf"><b>Improving Intrusion Detection Performance Using Keyword Selection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:0APcBXLxplgJ:www.raid-symposium.org/raid99/PAPERS/Lippmann1.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=28&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Improving Intrusion Detection Performance Using Keyword. Selection and Neural Networks. Richard P. Lippmann. Robert K. Cunningham ...<br />
<span class="a">www.raid-symposium.org/raid99/PAPERS/Lippmann1.pdf</span><br />
<br />
<a href="http://www.cs.wisc.edu/%7Evinod/domino.pdf"><b>Global Intrusion Detection in the DOMINO Overlay System</b></a> -<a href="http://72.14.205.104/search?q=cache:KiG-f2kYSyEJ:www.cs.wisc.edu/%7Evinod/domino.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=29&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Global Intrusion Detection in the DOMINO Overlay System. ∗. Vinod Yegneswaran. Paul Barford. Somesh Jha. Computer Sciences Department, ...<br />
<span class="a">www.cs.wisc.edu/~vinod/domino.pdf</span><br />
<br />
<a href="http://www.cs.wisc.edu/%7Eisca2005/papers/03A-01.pdf"><b>A High Throughput String Matching Architecture for Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:fO-vVqY3qaIJ:www.cs.wisc.edu/%7Eisca2005/papers/03A-01.PDF+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=30&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
A High Throughput String Matching Architecture. for Intrusion Detection and Prevention. Lin Tan. ∗. Timothy Sherwood. lintan2@cs.uiuc.edu, ...<br />
<span class="a">www.cs.wisc.edu/~isca2005/papers/03A-01.PDF</span><br />
<br />
<a href="http://ieeexplore.ieee.org/iel5/6220/16605/00766909.pdf"><b>A Data Mining Framework for Building Intrusion Detection Models</b></a><br />
A Data Mining Framework for Building Intrusion Detection Models. ∗. Wenke Lee. Salvatore J. Stolfo. Kui W. Mok. Computer Science Department, Columbia ...<br />
<span class="a">ieeexplore.ieee.org/iel5/6220/16605/00766909.pdf</span><br />
<br />
<a href="http://ieeexplore.ieee.org/iel5/9035/28682/01286428.pdf"><b>Adaptive neuro-fuzzy intrusion detection systems - Information ...</b></a><br />
Adaptive Neuro-Fuzzy Intrusion Detection Systems. Sampada Chavan, Khusbu Shah, Neha Dave and Sanghamitra Mukherjee. Institute of Technology for Women, ...<br />
<span class="a">ieeexplore.ieee.org/iel5/9035/28682/01286428.pdf</span><br />
<br />
<a href="http://www.csee.umbc.edu/cadip/docs/NetworkIntrusion/paperF3.pdf"><b>A Visual Mathematical Model for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:30HIt__1FksJ:www.csee.umbc.edu/cadip/docs/NetworkIntrusion/paperF3.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=33&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
A Visual Mathematical Model for Intrusion Detection. Greg Vert. Deborah A. Frincke. Jesse C. McConnell. Center for Secure and Dependable Software ...<br />
<span class="a">www.csee.umbc.edu/cadip/<wbr></wbr>docs/NetworkIntrusion/paperF3.pdf</span><br />
<br />
<a href="http://www.csee.umbc.edu/cadip/docs/NetworkIntrusion/huang_text.pdf"><b>A Large-scale Distributed Intrusion Detection Framework Based on ...</b></a> -<a href="http://72.14.205.104/search?q=cache:rfKgV2g6NHYJ:www.csee.umbc.edu/cadip/docs/NetworkIntrusion/huang_text.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=34&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Page 1. A Large-scale Distributed Intrusion Detection Framework. Based on Attack Strategy Analysis. Ming-Yuh Huang, Thomas M. Wicks ...<br />
<span class="a">www.csee.umbc.edu/cadip/<wbr></wbr>docs/NetworkIntrusion/huang_text.pdf</span><br />
<br />
<a href="http://www.isoc.org/isoc/conferences/ndss/05/workshop/hall.pdf"><b>Using Mobility Profiles for Anomaly-based Intrusion Detection in ...</b></a> -<a href="http://72.14.205.104/search?q=cache:WoI7CcUONHEJ:www.isoc.org/isoc/conferences/ndss/05/workshop/hall.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=35&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Using Mobility Profiles for Anomaly-based. Intrusion Detection in Mobile Networks. Jeyanthi Hall, Michel Barbeau, Evangelos Kranakis ...<br />
<span class="a">www.isoc.org/isoc/conferences/ndss/05/workshop/hall.pdf</span><br />
<br />
<a href="http://www.thc.org/root/docs/intrusion_detection/hids/Efficient%20ID%20using%20Automaton%20Inlining.pdf"><b>Efficient Intrusion Detection using Automaton Inlining</b></a> -<a href="http://72.14.205.104/search?q=cache:xD1PysPK6A0J:www.thc.org/root/docs/intrusion_detection/hids/Efficient%2520ID%2520using%2520Automaton%2520Inlining.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=36&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Efficient Intrusion Detection using Automaton Inlining. Rajeev Gopalakrishna. Eugene H. Spafford. Jan Vitek. Center for Education and Research in ...<br />
<span class="a"> www.thc.org/root/docs/intrusion_detection/<wbr></wbr>hids/Efficient%20ID%20using%20Automaton%20Inlining.pdf</span><br />
<br />
<a href="http://www.thc.org/root/docs/intrusion_detection/nids/Anomalous%20Payload-based%20NIDS.pdf"><b>Anomalous Payload-based Network Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:K5L2kGwda2sJ:www.thc.org/root/docs/intrusion_detection/nids/Anomalous%2520Payload-based%2520NIDS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=37&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Payload AD. 1. Anomalous Payload-based Network Intrusion Detection. 1. Ke Wang. Salvatore J. Stolfo. Computer Science Department, Columbia University ...<br />
<span class="a"> www.thc.org/root/docs/intrusion_detection/<wbr></wbr>nids/Anomalous%20Payload-based%20NIDS.pdf</span><br />
<br />
<a href="http://www-static.cc.gatech.edu/%7Eyian/Zhang_03.pdf"><b>Intrusion Detection Techniques for Mobile Wireless Networks</b></a> -<a href="http://72.14.205.104/search?q=cache:Oowd96BoE2oJ:www-static.cc.gatech.edu/%7Eyian/Zhang_03.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=38&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Mobile Networks and Applications ? (2003) 1–16. 1. Intrusion Detection Techniques for Mobile Wireless Networks. ∗. Yongguang Zhang ...<br />
<span class="a">www-static.cc.gatech.edu/~yian/Zhang_03.pdf</span><br />
<br />
<a href="http://www-static.cc.gatech.edu/%7Ewenke/ids-readings/1999Eval-ComputerNetworks2000.pdf"><b>The 1999 DARPA Off-Line Intrusion Detection Evaluation</b></a> -<a href="http://72.14.205.104/search?q=cache:VZG4mNUTtN4J:www-static.cc.gatech.edu/%7Ewenke/ids-readings/1999Eval-ComputerNetworks2000.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=39&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
1. The 1999 DARPA Off-Line Intrusion Detection. Evaluation. Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, Kumar Das ...<br />
<span class="a">www-static.cc.gatech.edu/~wenke/<wbr></wbr>ids-readings/1999Eval-ComputerNetworks2000.pdf</span><br />
<br />
<a href="http://www.loud-fat-bloke.co.uk/articles/widz_design.pdf"><b>WIDZ - The Wireless Intrusion detection system</b></a> -<a href="http://72.14.205.104/search?q=cache:vHwllkaXJKcJ:www.loud-fat-bloke.co.uk/articles/widz_design.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=40&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
WIDZ - The Wireless Intrusion detection system. The design and implementation of Version TWO. 1. Introduction. WIDZ is still a proof of concept – it does ...<br />
<span class="a">www.loud-fat-bloke.co.uk/articles/widz_design.pdf</span><br />
<br />
<a href="http://nn.cs.utexas.edu/downloads/papers/ryan.intrusion.pdf"><b>Intrusion Detection with Neural Networks</b></a> -<a href="http://72.14.205.104/search?q=cache:ehdF4O5xKSYJ:nn.cs.utexas.edu/downloads/papers/ryan.intrusion.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=41&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Intrusion Detection with Neural Networks. Jake Ryan. Department of Computer Sciences. The University of Texas at Austin. Austin, TX 78712 ...<br />
<span class="a">nn.cs.utexas.edu/downloads/papers/ryan.intrusion.pdf</span><br />
<br />
<a href="http://www.princeton.edu/%7Erblee/ELE572Papers/p407-ning.pdf"><b>Abstraction-Based Intrusion Detection In Distributed Environments</b></a> -<a href="http://72.14.205.104/search?q=cache:CB4H0G4caIcJ:www.princeton.edu/%7Erblee/ELE572Papers/p407-ning.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=42&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Abstraction-Based Intrusion Detection In. Distributed Environments. PENG NING. North Carolina State University. and. SUSHIL JAJODIA and XIAOYANG SEAN WANG ...<br />
<span class="a">www.princeton.edu/~rblee/ELE572Papers/p407-ning.pdf</span><br />
<br />
<a href="http://www.itoc.usma.edu/Workshop/2001/Authors/Submitted_Abstracts/02_Enram_CanberraMetric.pdf"><b>ROBUSTNESS OF CANBERRA METRIC IN COMPUTER INTRUSION DETECTION</b></a> -<a href="http://72.14.205.104/search?q=cache:TZI1qXQFPcAJ:www.itoc.usma.edu/Workshop/2001/Authors/Submitted_Abstracts/02_Enram_CanberraMetric.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=43&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
ROBUSTNESS OF CANBERRA METRIC IN COMPUTER. INTRUSION DETECTION. Syed Masum Emran. Department of Computer Science and Engineering, Arizona State University ...<br />
<span class="a"> www.itoc.usma.edu/Workshop/2001/Authors/<wbr></wbr>Submitted_Abstracts/02_Enram_CanberraMetric.pdf</span><br />
<br />
<a href="http://csdl.computer.org/comp/proceedings/hicss/2003/1874/09/187490335b.pdf"><b>On-Line Intrusion Detection and Attack Prevention Using Diversity ...</b></a><br />
On-Line Intrusion Detection and Attack Prevention Using Diversity,. Generate-and-Test, and Generalization. James C. Reynolds, James Just, Larry Clough, ...<br />
<span class="a">csdl.computer.org/comp/proceedings/<wbr></wbr>hicss/2003/1874/09/187490335b.pdf</span><br />
<br />
<a href="http://csdl.computer.org/comp/proceedings/icde/2004/2065/00/20650877.pdf"><b>Data Mining for Intrusion Detection: Techniques, Applications and ...</b></a><br />
Data Mining for Intrusion Detection: Techniques, Applications and Systems. ∗. Jian Pei. Shambhu J. Upadhyaya. Faisal Farooq. Venugopal Govindaraju ...<br />
<span class="a">csdl.computer.org/comp/proceedings/<wbr></wbr>icde/2004/2065/00/20650877.pdf</span><br />
<br />
<a href="http://staff.science.uva.nl/%7Edelaat/snb-2004-2005/p19/report.pdf"><b>Host-based Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:dd5re_4QZlIJ:staff.science.uva.nl/%7Edelaat/snb-2004-2005/p19/report.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=46&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Abstract. Host-based Intrusion Detection Systems can be used to determine if a system has been compromised. and can warn administrators if that happens. ...<br />
<span class="a">staff.science.uva.nl/~delaat/<wbr></wbr>snb-2004-2005/p19/report.pdf</span><br />
<br />
<a href="http://staff.science.uva.nl/%7Edelaat/snb-2004-2005/p19/presentation.pdf"><b>Hostbased Intrusion Detection Systems (HIDS)</b></a> -<a href="http://72.14.205.104/search?q=cache:3Yu4feBJ_2IJ:staff.science.uva.nl/%7Edelaat/snb-2004-2005/p19/presentation.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=47&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Contents. 09/02/2005. Hostbased Intrusion Detection Systems. 2/8. ●. HIDStypes. ●. Example breakin. ●. Protection using HIDS ...<br />
<span class="a">staff.science.uva.nl/~delaat/<wbr></wbr>snb-2004-2005/p19/presentation.pdf</span><br />
<br />
<a href="http://cs.fit.edu/%7Epkc/papers/discex01.pdf"><b>Real Time Data Mining-based Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:jqhcDyO0uywJ:cs.fit.edu/%7Epkc/papers/discex01.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=48&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Eleazar Eskin. ¡. , Wei Fan. £. , Matthew Miller. ¡. , Shlomo Hershkop. ¡. , and Junxin Zhang. ¡. Computer Science Department, North Carolina State ...<br />
<span class="a">cs.fit.edu/~pkc/papers/discex01.pdf</span><br />
<br />
<a href="http://www1.cs.columbia.edu/ids/publications/RAID4.pdf"><b>Anomalous Payload-based Network Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:zq5C2LE_NdoJ:www1.cs.columbia.edu/ids/publications/RAID4.PDF+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=49&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Anomalous Payload-based Network Intrusion. Detection. Ke Wang, Salvatore J. Stolfo. Computer Science Department, Columbia University. 500 West 120 ...<br />
<span class="a">www1.cs.columbia.edu/ids/publications/RAID4.PDF</span><br />
<br />
<a href="http://www1.cs.columbia.edu/%7Elocasto/projects/candidacy/papers/kim99human.pdf"><b>The Human Immune System and Network Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:Emtbqcn4V_kJ:www1.cs.columbia.edu/%7Elocasto/projects/candidacy/papers/kim99human.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=50&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
The Human Immune System and Network Intrusion Detection. Jungwon Kim and Peter Bentley. Department of Computer Science, University Collge London ...<br />
<span class="a">www1.cs.columbia.edu/~locasto/<wbr></wbr>projects/candidacy/papers/kim99human.pdf</span><br />
<br />
<a href="http://www.acsa-admin.org/2003/case/thu-c-1330-Pleskonjic.pdf"><b>Wireless Intrusion Detection Systems \(WIDS\)</b></a> -<a href="http://72.14.205.104/search?q=cache:1iGk8ypsN1EJ:www.acsa-admin.org/2003/case/thu-c-1330-Pleskonjic.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=51&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Wireless Intrusion Detection. Systems (WIDS). Dragan Pleskonjic. CONWEX. Dragan_Pleskonjic@conwex.net. dragan@empowerproduction.com ...<br />
<span class="a">www.acsa-admin.org/2003/case/thu-c-1330-Pleskonjic.pdf</span><br />
<br />
<a href="http://www.verisign.com/static/005296.pdf"><b>VeriSign Managed Intrusion Detection Service</b></a> - <a href="http://72.14.205.104/search?q=cache:o7C7AV2Uft0J:www.verisign.com/static/005296.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=52&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;"> View as HTML</a><br />
On the Internet, network intruders are sophisticated navigators. They come from outside. the enterprise, attacking Internet connections, altering Web pages, ...<br />
<span class="a">www.verisign.com/static/005296.pdf</span><br />
<br />
<a href="http://perso.rd.francetelecom.fr/debar/papers/DebWes01.pdf"><b>Aggregation and Correlation of Intrusion-Detection Alerts</b></a> -<a href="http://72.14.205.104/search?q=cache:a_dQjG7gEjkJ:perso.rd.francetelecom.fr/debar/papers/DebWes01.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=53&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Aggregation and Correlation of. Intrusion-Detection Alerts. Herve Debar. 1,. and Andreas Wespi. 2,. 1. France Telecom R&D. 42 Rue des Coutures, F–14000 Caen ...<br />
<span class="a">perso.rd.francetelecom.fr/debar/papers/DebWes01.pdf</span><br />
<br />
<a href="http://www.verisign.com.au/guide/mss/managedIDS.pdf"><b>Intrusion Detection Management Services</b></a> -<a href="http://72.14.205.104/search?q=cache:l8uXv3x60nMJ:www.verisign.com.au/guide/mss/managedIDS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=54&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Intrusion Detection Management Services. On the Internet, network intruders are sophisticated navigators.They come. from outside the enterprise, ...<br />
<span class="a">www.verisign.com.au/guide/mss/managedIDS.pdf</span><br />
<br />
<a href="http://seclab.cs.ucdavis.edu/papers/tse96.pdf"><b>A Methodology for Testing Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:Wn82Azx71nYJ:seclab.cs.ucdavis.edu/papers/tse96.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=55&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
A Methodology for Testing. Intrusion Detection Systems. 1. Nicholas J. Puketza, Kui Zhang, Mandy Chung,. Biswanath Mukherjee*, Ronald A. Olsson ...<br />
<span class="a">seclab.cs.ucdavis.edu/papers/tse96.pdf</span><br />
<br />
<a href="http://seclab.cs.ucdavis.edu/papers/Liao-Vemuri.pdf"><b>Using Text Categorization Techniques for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:FSUzV1d3lBIJ:seclab.cs.ucdavis.edu/papers/Liao-Vemuri.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=56&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Using Text Categorization Techniques for Intrusion Detection. Yihua Liao, V. Rao Vemuri. Department of Computer Science. University of California, Davis ...<br />
<span class="a">seclab.cs.ucdavis.edu/papers/Liao-Vemuri.pdf</span><br />
<br />
<a href="http://www.cs.rpi.edu/%7Eszymansk/papers/acsac03.pdf"><b>Intrusion Detection: A Bioinformatics Approach</b></a> -<a href="http://72.14.205.104/search?q=cache:fKSPaSdcIoQJ:www.cs.rpi.edu/%7Eszymansk/papers/acsac03.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=57&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Intrusion Detection: A Bioinformatics Approach. Scott Coull. †. coulls@cs.rpi.edu. Joel Branch. †. brancj@cs.rpi.edu. Boleslaw Szymanski ...<br />
<span class="a">www.cs.rpi.edu/~szymansk/papers/acsac03.pdf</span><br />
<br />
<a href="http://www.cs.rpi.edu/%7Ebrancj/ID_ACSAC_2003.pdf"><b>Intrusion Detection: A Bioinformatics Approach</b></a> -<a href="http://72.14.205.104/search?q=cache:BhKNU5zfgYgJ:www.cs.rpi.edu/%7Ebrancj/ID_ACSAC_2003.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=58&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Intrusion Detection: A Bioinformatics Approach. Scott Coull. 1. coulls@cs.rpi.edu. Joel Branch. 1. brancj@cs.rpi.edu. Boleslaw Szymanski ...<br />
<span class="a">www.cs.rpi.edu/~brancj/ID_ACSAC_2003.pdf</span><br />
<br />
<a href="http://www.cc.gatech.edu/%7Ewenke/papers/sasn.pdf"><b>A Cooperative Intrusion Detection System for Ad Hoc Networks</b></a> -<a href="http://72.14.205.104/search?q=cache:ROSl04pvxVEJ:www.cc.gatech.edu/%7Ewenke/papers/sasn.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=59&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
A Cooperative Intrusion Detection System for Ad Hoc. Networks. Yi-an Huang. College of Computing. Georgia Institute of Technology. yian@cc.gatech.edu ...<br />
<span class="a">www.cc.gatech.edu/~wenke/papers/sasn.pdf</span><br />
<br />
<a href="http://engr.smu.edu/%7Etchen/papers/iec2004.pdf"><b>Intrusion Detection for Viruses and Worms</b></a> -<a href="http://72.14.205.104/search?q=cache:LPPZ2t-AYaEJ:engr.smu.edu/%7Etchen/papers/iec2004.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=60&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
1. Intrusion Detection for Viruses and Worms. Thomas M. Chen. Dept. of Electrical Engineering. Southern Methodist University. PO Box 750338 ...<br />
<span class="a">engr.smu.edu/~tchen/papers/iec2004.pdf</span><br />
<br />
<a href="http://www.ics.forth.gr/carv/papers/2002.CCN02.ExB.pdf"><b>Exclusion-based Signature Matching for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:IcQbeuHx_7oJ:www.ics.forth.gr/carv/papers/2002.CCN02.ExB.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=61&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Exclusion-based Signature Matching for Intrusion Detection. Evangelos P. Markatos, Spyros Antonatos, Michalis Polychronakis, Kostas G. Anagnostakis ...<br />
<span class="a">www.ics.forth.gr/carv/papers/2002.CCN02.ExB.pdf</span><br />
<br />
<a href="http://www.ics.forth.gr/carv/papers/2003.SAINT04.idsperf.pdf"><b>Performance Analysis of Content Matching Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:QC8Ql_9AyswJ:www.ics.forth.gr/carv/papers/2003.SAINT04.idsperf.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=62&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Performance Analysis of Content Matching Intrusion Detection Systems. S. Antonatos , K. G. Anagnostakis. †. , E. P. Markatos , M. Polychronakis ...<br />
<span class="a">www.ics.forth.gr/carv/papers/2003.SAINT04.idsperf.pdf</span><br />
<br />
<a href="http://www.verisign.com.sg/guide/mss/managedIDS.pdf"><b>Intrusion Detection Services</b></a> -<a href="http://72.14.205.104/search?q=cache:AX4bNU3lSA8J:www.verisign.com.sg/guide/mss/managedIDS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=63&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Intrusion Detection Services. On the Internet, network intruders are sophisticated navigators.They come. from outside the enterprise, attacking Internet ...<br />
<span class="a">www.verisign.com.sg/guide/mss/managedIDS.pdf</span><br />
<br />
<a href="http://www.net.t-labs.tu-berlin.de/research/tm/kornexl_DA_jan2005.pdf"><b>High-Performance Packet Recording for Network Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:t68OID_cmNUJ:www.net.t-labs.tu-berlin.de/research/tm/kornexl_DA_jan2005.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=64&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
TECHNISCHE UNIVERSITÄT MÜNCHEN. INSTITUT FÜR INFORMATIK. Diplomarbeit. High-Performance. Packet Recording for Network. Intrusion Detection. Stefan Kornexl ...<br />
<span class="a">www.net.t-labs.tu-berlin.de/<wbr></wbr>research/tm/kornexl_DA_jan2005.pdf</span><br />
<br />
<a href="http://www.cse.nd.edu/%7Espanids/papers/nids_perf_raid03.pdf"><b>Characterizing the Performance of Network Intrusion Detection Sensors</b></a> -<a href="http://72.14.205.104/search?q=cache:5EIRfmGvqM4J:www.cse.nd.edu/%7Espanids/papers/nids_perf_raid03.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=65&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Characterizing the. Performance of Network. Intrusion Detection Sensors. Lambert Schaelicke, Thomas Slabach, Branden Moore and. Curt Freeland ...<br />
<span class="a">www.cse.nd.edu/~spanids/papers/nids_perf_raid03.pdf</span><br />
<br />
<a href="http://www.dfrws.org/2004/bios/day3/D3-Sieffert-SIDS.pdf"><b>Stego Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:7b6VRnkW-c8J:www.dfrws.org/2004/bios/day3/D3-Sieffert-SIDS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=66&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Stego Intrusion Detection System. Michael Sieffert. 1. , Rodney Forbes. 1. , Charles Green. 1. , Leonard Popyack. 1. , Thomas Blake ...<br />
<span class="a">www.dfrws.org/2004/bios/day3/D3-Sieffert-SIDS.pdf</span><br />
<br />
<a href="http://www.mcafee.com/us/local_content/case_studies/cs_financialsvs.pdf"><b>Intrusion Detection Pays Dividends for Major Financial Services ...</b></a><br />
Case Study. Protected. FORTUNE 100 financial services. company. The Solution. More than thirty McAfee. IntruShield 4000 and McAfee ...<br />
<span class="a">www.mcafee.com/us/local_content/<wbr></wbr>case_studies/cs_financialsvs.pdf</span><br />
<br />
<a href="http://www.mcafee.com/us/local_content/white_papers/wp_intruvertnextgenerationids.pdf"><b>Next Generation Intrusion Detection Systems (IDS)</b></a><br />
Next Generation Intrusion. Detection Systems (IDS). McAfee Network Protection Solutions. November 2003. White Paper. www.mcafee.com ...<br />
<span class="a">www.mcafee.com/us/local_content/<wbr></wbr>white_papers/wp_intruvertnextgenerationids.pdf</span><br />
<br />
<a href="http://www.rennes.supelec.fr/ren/rd/ssir/publis/tmm05.pdf"><b>COTS Diversity based Intrusion Detection and Application to Web ...</b></a> -<a href="http://72.14.205.104/search?q=cache:Thc0PLo__ZIJ:www.rennes.supelec.fr/ren/rd/ssir/publis/tmm05.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=69&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
COTS Diversity based Intrusion Detection and Application to Web. servers. Eric Totel, Frédéric Majorczyk, Ludovic Mé. firstname.lastname@supelec.fr ...<br />
<span class="a">www.rennes.supelec.fr/ren/rd/ssir/publis/tmm05.pdf</span><br />
<br />
<a href="http://www.sdl.sri.com/papers/e/x/expertbsm-acsac01/expertbsm-acsac01.pdf"><b>eXpert-BSM: A Host-based Intrusion Detection Solution for Sun Solaris</b></a> -<a href="http://72.14.205.104/search?q=cache:BRDf60bIgvIJ:www.sdl.sri.com/papers/e/x/expertbsm-acsac01/expertbsm-acsac01.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=70&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
In Proceedings of the 17th Annual Computer Security Applications Conference, pages 240–251, New Orleans, Louisiana,. Dec. 10–14, 2001, published by the IEEE ...<br />
<span class="a">www.sdl.sri.com/papers/e/x/<wbr></wbr>expertbsm-acsac01/expertbsm-acsac01.pdf</span><br />
<br />
<a href="http://www.cs.indiana.edu/%7Edoyu/listenrain/HICSS2004-SurvivableIDS.pdf"><b>Towards survivable intrusion detection system - System Sciences ...</b></a> -<a href="http://72.14.205.104/search?q=cache:fXKuEA8C4-YJ:www.cs.indiana.edu/%7Edoyu/listenrain/HICSS2004-SurvivableIDS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=71&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Towards Survivable Intrusion Detection System. Dong Yu, Deborah Frincke. Center for Secure and Dependable Software, University of Idaho ...<br />
<span class="a">www.cs.indiana.edu/~doyu/<wbr></wbr>listenrain/HICSS2004-SurvivableIDS.pdf</span><br />
<br />
<a href="http://www.cse.msu.edu/%7Ewuming/papers/lee99data.pdf"><b>A Data Mining Framework for Building Intrusion Detection Models 1 ...</b></a> -<a href="http://72.14.205.104/search?q=cache:T_aHdamsqEAJ:www.cse.msu.edu/%7Ewuming/papers/lee99data.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=72&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
A Data Mining Framework for Building Intrusion Detection Models. 1. Wenke Lee. Salvatore J. Stolfo. Kui W. Mok. Computer Science Department, Columbia ...<br />
<span class="a">www.cse.msu.edu/~wuming/papers/lee99data.pdf</span><br />
<br />
<a href="http://moss.csc.ncsu.edu/%7Emueller/crtes06/papers/003-final.pdf"><b>On-Time and Scalable Intrusion Detection in Embedded Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:H7P5mm3GcGMJ:moss.csc.ncsu.edu/%7Emueller/crtes06/papers/003-final.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=73&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
On-Time and Scalable Intrusion Detection in Embedded Systems. Albert Mo Kim Cheng. Real-Time Systems Laboratory. Department of Computer Science ...<br />
<span class="a">moss.csc.ncsu.edu/~mueller/crtes06/papers/003-final.pdf</span><br />
<br />
<a href="http://www.cs.unibo.it/%7Ebabaoglu/courses/security/lucidi/IDS.pdf"><b>IDS: Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:iGRa218rDXQJ:www.cs.unibo.it/%7Ebabaoglu/courses/security/lucidi/IDS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=74&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
ALMA MATER STUDIORUM – UNIVERSITA’ DI BOLOGNA. IDS:. Intrusion Detection. Systems. Ozalp Babaoglu. © Babaoglu 2006. Sicurezza. 2. What Is an Intrusion? ...<br />
<span class="a">www.cs.unibo.it/~babaoglu/<wbr></wbr>courses/security/lucidi/IDS.pdf</span><br />
<br />
<a href="http://gost.isi.edu/info/gaaapi/doc/papers/icdcs.pdf"><b>Integrated Access Control and Intrusion Detection for Web Servers</b></a> -<a href="http://72.14.205.104/search?q=cache:h8n3aczlGTsJ:gost.isi.edu/info/gaaapi/doc/papers/icdcs.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=75&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Integrated Access Control and Intrusion Detection for Web Servers. Tatyana Ryutov, Clifford Neuman, Dongho Kim and Li Zhou. Information Sciences Institute ...<br />
<span class="a">gost.isi.edu/info/gaaapi/doc/papers/icdcs.pdf</span><br />
<br />
<a href="http://www.acsac.org/2005/papers/127.pdf"><b>Intrusion Detection in RBAC-administered Databases</b></a> -<a href="http://72.14.205.104/search?q=cache:J9Z2cpuniAkJ:www.acsac.org/2005/papers/127.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=76&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Intrusion Detection in RBAC-administered Databases. ∗. Elisa Bertino. Purdue University. bertino@cs.purdue.edu. Ashish Kamra. Purdue University ...<br />
<span class="a">www.acsac.org/2005/papers/127.pdf</span><br />
<br />
<a href="http://www.acsac.org/2003/papers/80.pdf"><b>Log Correlation for Intrusion Detection: A Proof of Concept</b></a> -<a href="http://72.14.205.104/search?q=cache:SvAqcrQMZNAJ:www.acsac.org/2003/papers/80.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=77&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Log Correlation for Intrusion Detection:. A Proof of Concept. ∗. Cristina Abad. †‡. cabad@ncsa.uiuc.edu. Jed Taylor. †. jtaylr2@uiuc.edu. Cigdem Sengul ...<br />
<span class="a">www.acsac.org/2003/papers/80.pdf</span><br />
<br />
<a href="http://www.modsecurity.org/documentation/Web_Intrusion_Detection_with_ModSecurity.pdf"><b>Web Intrusion Detection with ModSecurity</b></a> -<a href="http://72.14.205.104/search?q=cache:9PJMZCkQXmMJ:www.modsecurity.org/documentation/Web_Intrusion_Detection_with_ModSecurity.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=78&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
2 / 50. Web Intrusion Detection with ModSecurity. Aim of This Talk. Discuss the state of Web Intrusion Detection. Introduce ModSecurity ...<br />
<span class="a">www.modsecurity.org/documentation/<wbr></wbr>Web_Intrusion_Detection_with_ModSecurity.pdf</span><br />
<br />
<a href="http://rules-saps.tamu.edu/PDFs/24.99.99.M1.11.pdf"><b>24.99.99.M1.11 Information Resources - Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:2koLNxZ9dPMJ:rules-saps.tamu.edu/PDFs/24.99.99.M1.11.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=79&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
STANDARD ADMINISTRATIVE PROCEDURE. 24.99.99.M1.11 Information Resources – Intrusion Detection. Approved July 18, 2005. Supplements University Rule 24.99.99. ...<br />
<span class="a">rules-saps.tamu.edu/PDFs/24.99.99.M1.11.pdf</span><br />
<br />
<a href="http://www.cisco.com/application/pdf/en/us/guest/netsol/ns376/c649/cdccont_0900aecd800ebd21.pdf"><b>Deploying Network-Based Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:PnpXQwAMF7sJ:www.cisco.com/application/pdf/en/us/guest/netsol/ns376/c649/cdccont_0900aecd800ebd21.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=80&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Corporate Headquarters. Cisco Systems, Inc. 170 West Tasman Drive. San Jose, CA 95134-1706. USA. http://www.cisco.com. Tel: 408 526-4000 ...<br />
<span class="a">www.cisco.com/application/pdf/en/us/<wbr></wbr>guest/netsol/ns376/c649/cdccont_0900aecd800ebd21.pdf</span><br />
<br />
<a href="http://www.erdc.usace.army.mil/pls/erdcpub/docs/erdc/images/ids.pdf"><b>Environmental Effects on Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:08zPdWubassJ:www.erdc.usace.army.mil/pls/erdcpub/docs/erdc/images/ids.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=81&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
U.S. Army Engineer Research and Development Center. March 2003. www.erdc.usace.army.mil. Environmental Effects on. Intrusion Detection Systems ...<br />
<span class="a">www.erdc.usace.army.mil/<wbr></wbr>pls/erdcpub/docs/erdc/images/ids.pdf</span><br />
<br />
<a href="http://www.cs.nps.navy.mil/people/faculty/bmichael/pubs/T2B2_IA2002_229.pdf"><b>Software Decoys: Intrusion Detection and Countermeasures</b></a> -<a href="http://72.14.205.104/search?q=cache:9QKRq1SR2ncJ:www.cs.nps.navy.mil/people/faculty/bmichael/pubs/T2B2_IA2002_229.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=82&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Proceedings of the 2002 IEEE. Workshop on Information Assurance. United States Military Academy, West Point, NY June 2002 ...<br />
<span class="a">www.cs.nps.navy.mil/people/<wbr></wbr>faculty/bmichael/pubs/T2B2_IA2002_229.pdf</span><br />
<br />
<a href="http://www.blackhat.com/presentations/bh-federal-03/bh-fed-03-miller.pdf"><b>Application Intrusion Detection</b></a><br />
Application Intrusion Detection. • Introduction. • Mitigating Exposures. • Monitoring Exposures. • Response Times. • Proactive Risk Analysis. • Summary ...<br />
<span class="a">www.blackhat.com/presentations/<wbr></wbr>bh-federal-03/bh-fed-03-miller.pdf</span><br />
<br />
<a href="http://www.oracle.com/technology/products/bi/odm/pdf/odm_based_intrusion_detection_paper_1205.pdf"><b>Creation and Deployment of Data Mining-Based Intrusion Detection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:Lj4JalR5B3QJ:www.oracle.com/technology/products/bi/odm/pdf/odm_based_intrusion_detection_paper_1205.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=84&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Creation and Deployment of Data Mining-Based Intrusion Detection Systems. in Oracle Database 10g. Marcos M. Campos. Boriana L. Milenova ...<br />
<span class="a">www.oracle.com/technology/products/<wbr></wbr>bi/odm/pdf/odm_based_intrusion_detection_paper_1205.pdf</span><br />
<br />
<a href="http://www.raid06.tu-harburg.de/2006-RAID-CFParticipation-1Page.pdf"><b>Recent Advances in Intrusion Detection 2006 September 20-22, 2006</b></a> -<a href="http://72.14.205.104/search?q=cache:Xlxl2kz9_ysJ:www.raid06.tu-harburg.de/2006-RAID-CFParticipation-1Page.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=85&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Recent Advances in Intrusion Detection 2006. September 20-22, 2006. University of Hamburg "Edmund Siemers Allee 1," Hamburg, Germany ...<br />
<span class="a">www.raid06.tu-harburg.de/<wbr></wbr>2006-RAID-CFParticipation-1Page.pdf</span><br />
<br />
<a href="http://www.esisac.com/publicdocs/Guides/V1-Cyber-IDS.pdf"><b>Security Guidelines for the Electricity Sector: Cyber Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:6Z4Ihohj5gYJ:www.esisac.com/publicdocs/Guides/V1-Cyber-IDS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=86&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Security Guidelines for the Electricity Sector:. Cyber Intrusion Detection. Version 1.0. Security Guideline: Cyber . June 14, 2002. Intrusion Detection ...<br />
<span class="a">www.esisac.com/publicdocs/Guides/V1-Cyber-IDS.pdf</span><br />
<br />
<a href="http://www.zurich.ibm.com/%7Ekju/KDD2002.pdf"><b>Mining Intrusion Detection Alarms for Actionable Knowledge</b></a> -<a href="http://72.14.205.104/search?q=cache:ZCsU90RIbHgJ:www.zurich.ibm.com/%7Ekju/KDD2002.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=87&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Mining Intrusion Detection Alarms for Actionable. Knowledge. Klaus Julisch. IBM Research. Zurich Research Laboratory. kju@zurich.ibm.com. Marc Dacier ...<br />
<span class="a">www.zurich.ibm.com/~kju/KDD2002.pdf</span><br />
<br />
<a href="http://www.seas.upenn.edu/%7Eswati/PID21898_final.pdf"><b>Signature based Intrusion Detection for Wireless Ad-Hoc Networks ...</b></a> -<a href="http://72.14.205.104/search?q=cache:3IQJ9wsgYs4J:www.seas.upenn.edu/%7Eswati/PID21898_final.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=88&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative. study of various routing protocols. Farooq Anjum. Applied Research ...<br />
<span class="a">www.seas.upenn.edu/~swati/PID21898_final.pdf</span><br />
<br />
<a href="http://www.securecomputing.com/pdf/sf_ca_id_oem_ds.pdf"><b>SmartFilter for eTrust Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:mUQlh_nI51IJ:www.securecomputing.com/pdf/sf_ca_id_oem_ds.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=89&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
O E M D A T A S H E E T. Comprehensive network security. eTrust Intrusion Detection delivers state-of-the-art. network protection by automatically detecting ...<br />
<span class="a">www.securecomputing.com/pdf/sf_ca_id_oem_ds.pdf</span><br />
<br />
<a href="http://www.projects.ncassr.org/sift/papers/hfes06.pdf"><b>Network Intrusion Detection Cognitive Task Analysis: Textual and ...</b></a> -<a href="http://72.14.205.104/search?q=cache:6tuLHRNjUFEJ:www.projects.ncassr.org/sift/papers/hfes06.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=90&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
NETWORK INTRUSION DETECTION COGNITIVE TASK ANALYSIS:. TEXTUAL AND VISUAL TOOL USAGE AND RECOMMENDATIONS. Ramona Su Thompson, Esa M. Rantanen and William ...<br />
<span class="a">www.projects.ncassr.org/sift/papers/hfes06.pdf</span><br />
<br />
<a href="http://www.mnlab.cs.depaul.edu/seminar/spr2003/IDSSurvey.pdf"><b>Intrusion Detection Systems: A Survey and Taxonomy</b></a> -<a href="http://72.14.205.104/search?q=cache:PsCxvstRnHcJ:www.mnlab.cs.depaul.edu/seminar/spr2003/IDSSurvey.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=91&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Intrusion Detection Systems:. A Survey and Taxonomy. Stefan Axelsson. Department of Computer Engineering. Chalmers University of Technology ...<br />
<span class="a">www.mnlab.cs.depaul.edu/seminar/spr2003/IDSSurvey.pdf</span><br />
<br />
<a href="http://www.isso.sparta.com/research/documents/iidr_abstract.pdf"><b>Infrastructure for Intrusion Detection and Response</b></a> -<a href="http://72.14.205.104/search?q=cache:uXduY_L94xgJ:www.isso.sparta.com/research/documents/iidr_abstract.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=92&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Infrastructure for Intrusion Detection and Response. Dan Schnackenberg. Boeing Phantom Works. daniel.d.schnackenberg@boeing.com. Kelly Djahandari ...<br />
<span class="a">www.isso.sparta.com/research/<wbr></wbr>documents/iidr_abstract.pdf</span><br />
<br />
<a href="http://www.cse.fau.edu/%7Ejie/research/publications/Publication_files/intrusion06.pdf"><b>Chapter 7 A Survey on Intrusion Detection in Mobile Ad Hoc ...</b></a> -<a href="http://72.14.205.104/search?q=cache:xA91PAjAX-sJ:www.cse.fau.edu/%7Ejie/research/publications/Publication_files/intrusion06.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=93&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Wireless/Mobile Network Security. Y. Xiao, X. Shen, and D.-Z. Du (Eds.) pp. 170 - 196. c 2006 Springer. Chapter 7. A Survey on Intrusion Detection in Mobile ...<br />
<span class="a">www.cse.fau.edu/~jie/research/<wbr></wbr>publications/Publication_files/intrusion06.pdf</span><br />
<br />
<a href="http://www.fujitsu.com/downloads/TEL/fnc/whitepapers/Atrica_PIDS.pdf"><b>Perimeter Intrusion Detection Systems (PIDS)</b></a> -<a href="http://72.14.205.104/search?q=cache:M29vnhbN63kJ:www.fujitsu.com/downloads/TEL/fnc/whitepapers/Atrica_PIDS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=94&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
FUJITSU NETWORK COMMUNICATIONS INC. 2801 Telecom Parkway,Richardson,Texas 75082-3515. Telephone: (972) 690-6000. (800) 777-FAST (U.S.) ...<br />
<span class="a">www.fujitsu.com/downloads/<wbr></wbr>TEL/fnc/whitepapers/Atrica_PIDS.pdf</span><br />
<br />
<a href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/OG-cav05.pdf"><b>The O Intrusion Detection Tool</b></a> -<a href="http://72.14.205.104/search?q=cache:XTAcfajfUHYJ:www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/OG-cav05.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=95&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
The O. RCHIDS. Intrusion Detection Tool. Julien Olivain. Jean Goubault-Larrecq. LSV/CNRS UMR 8643 & INRIA Futurs projet SECSI & ENS Cachan ...<br />
<span class="a">www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/OG-cav05.pdf</span><br />
<br />
<a href="http://www.viawest.net/ids.pdf"><b>Managed Intrusion Detection Solutions</b></a> - <a href="http://72.14.205.104/search?q=cache:Bog4aFIHimEJ:www.viawest.net/ids.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=96&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
c. t. i. o. n. S. o. l. u. t. i. o. n. s. Managed Intrusion. Detection Solutions. These days, keeping your systems safe requires multiple levels of security ...<br />
<span class="a">www.viawest.net/ids.pdf</span><br />
<br />
<a href="http://www.usenix.org/publications/login/2006-12/pdfs/goebel.pdf"><b>advanced honeypot-based intrusion detection</b></a><br />
;LOGIN: DECEMBER 2006. ADVANCED HONEYPOT-BASED INTRUSION DETECTION. 17. J A N G Ö B E L , J E N S H E K T O R , A N D. T H O R S T E N H O L Z. advanced ...<br />
<span class="a">www.usenix.org/publications/<wbr></wbr>login/2006-12/pdfs/goebel.pdf</span><br />
<br />
<a href="http://security.polito.it/doc/pub/iscc2006_wirelessIDS_attack_model.pdf"><b>A wireless distributed intrusion detection system and a new attack ...</b></a> -<a href="http://72.14.205.104/search?q=cache:iiNVKOC8xowJ:security.polito.it/doc/pub/iscc2006_wirelessIDS_attack_model.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=98&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
A wireless distributed intrusion detection system and a new attack model. Marco Domenico Aime. Giorgio Calandriello. Antonio Lioy. Politecnico di Torino ...<br />
<span class="a">security.polito.it/doc/pub/<wbr></wbr>iscc2006_wirelessIDS_attack_model.pdf</span><br />
<br />
<a href="http://www.softwarespectrum.com/business/TAAP_Library/Symantec_docs/A_Justification_for_Intrusion_Detection.pdf"><b>A Justification for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:auBCi8UEW6oJ:www.softwarespectrum.com/business/TAAP_Library/Symantec_docs/A_Justification_for_Intrusion_Detection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=99&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
A Justification for Intrusion Detection. by Linda McCarthy. Executive Security Advisor. Office of the CTO. WHITE PAPER. Symantec Enterprise Security ...<br />
<span class="a"> www.softwarespectrum.com/business/TAAP_Library/<wbr></wbr>Symantec_docs/A_Justification_for_Intrusion_Detection.pdf</span><br />
<br />
<a href="http://h71028.www7.hp.com/ERC/downloads/4AA0-1999ENW.pdf"><b>Menlo Worldwide utilizes HP-UX 11i and HIDS for intrusion detection</b></a> -<a href="http://72.14.205.104/search?q=cache:ngNH9Zf4MQwJ:h71028.www7.hp.com/ERC/downloads/4AA0-1999ENW.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=100&lr=lang_en" style="color: #0000cc; font-family: arial,sans-serif; font-size: 10pt; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none;">View as HTML</a><br />
Menlo Worldwide utilizes HP-UX 11i and HIDS. for intrusion detection. Many of Menlo’s HP 9000 (PA-RISC) production systems ...<br />
<span class="a">h71028.www7.hp.com/ERC/downloads/4AA0-1999ENW.pdf</span><br />
<br />
<br />
<div><a href="http://www.springerlink.com/index/W9PJ7JC835EV42V4.pdf"><b>LNCS 2776 - Real-Time Intrusion Detection with Emphasis on Insider ...</b></a><br />
V. Gorodetsky et al. (Eds.): MMM-ACNS 2003, LNCS 2776, pp. 82–85, 2003. © Springer-Verlag Berlin Heidelberg 2003. Real-Time Intrusion Detection ...<br />
<span class="a">www.springerlink.com/index/W9PJ7JC835EV42V4.pdf</span><br />
<br />
<a href="http://www.simson.net/clips/academic/1998.Evaluating_IDs_DARPA.pdf"><b>Evaluating Intrusion Detection Systems...</b></a> -<a href="http://72.14.205.104/search?q=cache:qmqffag2Sn0J:www.simson.net/clips/academic/1998.Evaluating_IDs_DARPA.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=102&lr=lang_en">View as HTML</a><br />
Evaluating Intrusion Detection Systems without Attacking your. Friends: The 1998 DARPA Intrusion Detection Evaluation. R. K. Cunningham, R. P. Lippmann, ...<br />
<span class="a">www.simson.net/clips/academic/<wbr></wbr>1998.Evaluating_IDs_DARPA.pdf</span><br />
<br />
<a href="http://www.rietta.com/papers/rietta_acmse2006.pdf"><b>Application Layer Intrusion Detection for SQL Injection</b></a> -<a href="http://72.14.205.104/search?q=cache:OrKU6gNAbUIJ:www.rietta.com/papers/rietta_acmse2006.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=103&lr=lang_en">View as HTML</a><br />
Application Layer Intrusion Detection for SQL Injection. Frank S. Rietta. 10630 Greenock Way. Duluth, Georgia 30097. frank@rietta.com. ABSTRACT ...<br />
<span class="a">www.rietta.com/papers/rietta_acmse2006.pdf</span><br />
<br />
<a href="http://www.cs.iastate.edu/%7Ehonavar/Papers/jss-lightweight.pdf"><b>Lightweight agents for intrusion detection</b></a> -<a href="http://72.14.205.104/search?q=cache:vmfzu9uOJSQJ:www.cs.iastate.edu/%7Ehonavar/Papers/jss-lightweight.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=104&lr=lang_en">View as HTML</a><br />
Lightweight agents for intrusion detection. q. Guy Helmer, Johnny S.K. Wong. *. , Vasant Honavar, Les Miller, Yanxin Wang. Department of Computer Science, ...<br />
<span class="a"> www.cs.iastate.edu/~honavar/Papers/jss-lightweight.pdf</span><br />
<br />
<a href="http://www.la-samhna.de/samhain/Samhain.pdf"><b>Centralized Intrusion Detection with SAMHAIN</b></a> -<a href="http://72.14.205.104/search?q=cache:ckpykmSsTiQJ:www.la-samhna.de/samhain/Samhain.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=105&lr=lang_en">View as HTML</a><br />
Centralized Intrusion Detection. with SAMHAIN. Rainer Wichmann. rwichmann@la-samhna.de. samhain labs. Centralized Intrusion Detection with Samhain – p.1 ...<br />
<span class="a">www.la-samhna.de/samhain/Samhain.pdf</span><br />
<br />
<a href="http://www-serl.cs.colorado.edu/%7Ecarzanig/debs04/debs04gross.pdf"><b>Secure “Selecticast” for Collaborative Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:Y4gomB9YGbQJ:www-serl.cs.colorado.edu/%7Ecarzanig/debs04/debs04gross.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=106&lr=lang_en">View as HTML</a><br />
Secure “Selecticast” for Collaborative Intrusion Detection Systems. Philip Gross, Janak Parekh and Gail Kaiser. Columbia University. Programming Systems Lab ...<br />
<span class="a">www-serl.cs.colorado.edu/<wbr></wbr>~carzanig/debs04/debs04gross.pdf</span><br />
<br />
<a href="http://www.baylisa.org/library/slides/2001/baylisa-may01.pdf"><b>Real World Intrusion Detection</b></a><br />
1. Real World Intrusion Detection. Copyright 1999 SystemExperts Corporation. All Rights Reserved. Real World Intrusion. Detection ...<br />
<span class="a">www.baylisa.org/library/slides/2001/baylisa-may01.pdf</span><br />
<br />
<a href="http://www.cnec.org/CONFERENCES/cnec10/praesentationen/riordan.pdf"><b>Intrusion Detection Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:064A0XBln24J:www.cnec.org/CONFERENCES/cnec10/praesentationen/riordan.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=108&lr=lang_en">View as HTML</a><br />
1. Intrusion Detection. Intrusion Detection. Dr. James Riordan. Dr. James Riordan. Global Security Analysis Lab. Global Security Analysis Lab ...<br />
<span class="a">www.cnec.org/CONFERENCES/<wbr></wbr>cnec10/praesentationen/riordan.pdf</span><br />
<br />
<a href="http://issrl.cs.memphis.edu/papers/issrl/2001/MMM-sub.pdf"><b>An Intelligent Decision Support System for Intrusion Detection and ...</b></a> -<a href="http://72.14.205.104/search?q=cache:OJ3wD10mLa0J:issrl.cs.memphis.edu/papers/issrl/2001/MMM-sub.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=109&lr=lang_en">View as HTML</a><br />
V.I. Gorodetski et al. (Eds.): MMM-ACNS 2001, LNCS 2052, pp. 1-14, 2001. © Springer-Verlag Berlin Heidelberg 2001. An Intelligent Decision Support System ...<br />
<span class="a">issrl.cs.memphis.edu/papers/issrl/2001/MMM-sub.pdf</span><br />
<br />
<a href="http://www.rennes.supelec.fr/ren/rd/ssir/publis/tvm04.pdf"><b>A LANGUAGE DRIVEN INTRUSION DETECTION SYSTEM FOR EVENT AND ALERT ...</b></a> -<a href="http://72.14.205.104/search?q=cache:gGkvZbYccJUJ:www.rennes.supelec.fr/ren/rd/ssir/publis/tvm04.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=110&lr=lang_en">View as HTML</a><br />
A LANGUAGE DRIVEN INTRUSION. DETECTION SYSTEM FOR EVENT. AND ALERT CORRELATION. Eric Totel, Bernard Vivinis, Ludovic Me. Eric.Totel@supelec.fr, Bernard. ...<br />
<span class="a">www.rennes.supelec.fr/ren/rd/ssir/publis/tvm04.pdf</span><br />
<br />
<a href="http://www.cl.cam.ac.uk/%7Ecpk25/publications/bro-events-debs2005.pdf"><b>Policy-controlled Event Management for Distributed Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:ndAInpLaNYcJ:www.cl.cam.ac.uk/%7Ecpk25/publications/bro-events-debs2005.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=111&lr=lang_en">View as HTML</a><br />
Policy-controlled Event Management for Distributed Intrusion Detection. Christian Kreibich. University of Cambridge. Computer Laboratory ...<br />
<span class="a">www.cl.cam.ac.uk/~cpk25/<wbr></wbr>publications/bro-events-debs2005.pdf</span><br />
<br />
<a href="http://www.raid06.tu-harburg.de/2006-RAID-CFP.pdf"><b>Recent Advances in Intrusion Detection 2006 Ninth International ...</b></a> -<a href="http://72.14.205.104/search?q=cache:oT9dgiJv0XUJ:www.raid06.tu-harburg.de/2006-RAID-CFP.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=112&lr=lang_en">View as HTML</a><br />
Recent Advances in Intrusion Detection 2006. Ninth International Symposium. "Big Challenges, Big Ideas". September 20-22, 2006 ...<br />
<span class="a">www.raid06.tu-harburg.de/2006-RAID-CFP.pdf</span><br />
<br />
<a href="http://www.total-network-visibility.com/wildpackets/pdfs/Intrusion_Detection.pdf"><b>Intrusion Detection Using EtherPeek NX and EtherPeek</b></a> -<a href="http://72.14.205.104/search?q=cache:K6xt8ghTtxQJ:www.total-network-visibility.com/wildpackets/pdfs/Intrusion_Detection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=113&lr=lang_en">View as HTML</a><br />
Intrusion Detection Using EtherPeek NX and EtherPeek. Page 1. A WildPackets Academy Tutorial. Intrusion Detection Using EtherPeek NX and EtherPeek. Contents ...<br />
<span class="a"> www.total-network-visibility.com/<wbr></wbr>wildpackets/pdfs/Intrusion_Detection.pdf</span><br />
<br />
<a href="http://transit-safety.volpe.dot.gov/Security/SecurityInitiatives/Top20/1%20--%20Management%20and%20Accountability/3B%20--%20Security%20Design%20Criteria/Essential/tcrp_rpt_86v4.pdf"><b>TCRP Report 86: Volume 4 -- Intrusion Detection for Public ...</b></a><br />
TCRP. REPORT 86. Public Transportation Security. Volume 4. Intrusion Detection. for Public Transportation. Facilities Handbook. TRANSIT. COOPERA ...<br />
<span class="a">transit-safety.volpe.dot.gov/.../<wbr></wbr>3B%20--%20Security%20Design%20Criteria/Essential/tcrp_rpt_86v4.pdf</span><br />
<br />
<a href="http://www.sss.co.nz/pdfs/netscreen/netscreen_intrusion_detection_prevention.pdf"><b>Intrusion Detection and Prevention</b></a> -<a href="http://72.14.205.104/search?q=cache:Dby2RZ1nLFAJ:www.sss.co.nz/pdfs/netscreen/netscreen_intrusion_detection_prevention.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=115&lr=lang_en">View as HTML</a><br />
Intrusion Detection and Prevention. Protecting Your Network From Attacks. A White Paper By. NetScreen Technologies Inc. http://www.netscreen.com ...<br />
<span class="a">www.sss.co.nz/pdfs/netscreen/<wbr></wbr>netscreen_intrusion_detection_prevention.pdf</span><br />
<br />
<a href="http://www.sevecom.org/Presentations/2006-06_Paris/Sevecom_2006-06-26_L%20Vanet-Ids%20Schoch.pdf"><b>Microsoft PowerPoint - Intrusion detection in VANETs Sevecom 2.ppt</b></a> -<a href="http://72.14.205.104/search?q=cache:Tq_ssLF_ZR8J:www.sevecom.org/Presentations/2006-06_Paris/Sevecom_2006-06-26_L%2520Vanet-Ids%2520Schoch.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=116&lr=lang_en">View as HTML</a><br />
Secure Vehicle Communication. Intrusion Detection in VANETs. Elmar Schoch ▪ elmar.schoch@uni-ulm.de. SEVECOM Workshop ▪ June 27th, 2006 ▪ Paris ...<br />
<span class="a"> www.sevecom.org/Presentations/2006-06_Paris/<wbr></wbr>Sevecom_2006-06-26_L%20Vanet-Ids%20Schoch.pdf</span><br />
<br />
<a href="http://www.sevecom.org/Presentations/2006-02_Lausanne/Sevecom_2006-02-02_P%20Intrusion%20detection.pdf"><b>Concepts for V2X Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:w_-5shnzRMIJ:www.sevecom.org/Presentations/2006-02_Lausanne/Sevecom_2006-02-02_P%2520Intrusion%2520detection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=117&lr=lang_en">View as HTML</a><br />
Overview. Motivation. Intrusion Detection for V2X communication. Active Safety Applications. Position Dependent Routing. Concepts ...<br />
<span class="a"> www.sevecom.org/Presentations/2006-02_Lausanne/<wbr></wbr>Sevecom_2006-02-02_P%20Intrusion%20detection.pdf</span><br />
<br />
<a href="http://www.isi.qut.edu.au/events/conferences/raid07/cfp/PreliminaryCFP.RAID07.pdf"><b>Preliminary Call for Papers Recent Advances in Intrusion Detection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:rBa444KzghoJ:www.isi.qut.edu.au/events/conferences/raid07/cfp/PreliminaryCFP.RAID07.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=118&lr=lang_en">View as HTML</a><br />
Preliminary Call for Papers. Recent Advances in Intrusion Detection 2007. 10th International Symposium. September 5-7, 2007. Crowne Plaza, Gold Coast, ...<br />
<span class="a"> www.isi.qut.edu.au/events/conferences/<wbr></wbr>raid07/cfp/PreliminaryCFP.RAID07.pdf</span><br />
<br />
<a href="http://www.mitre.org/work/tech_papers/tech_papers_01/bloedorn_datamining/bloedorn_datamining.pdf"><b>Data Mining for Network Intrusion Detection: How to Get Started</b></a> -<a href="http://72.14.205.104/search?q=cache:z073MmD6W-YJ:www.mitre.org/work/tech_papers/tech_papers_01/bloedorn_datamining/bloedorn_datamining.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=119&lr=lang_en">View as HTML</a><br />
Data Mining for Network Intrusion Detection: How to Get Started. Eric Bloedorn, Alan D. Christiansen, William Hill,. Clement Skorupka, Lisa M. Talbot, ...<br />
<span class="a"> www.mitre.org/work/tech_papers/tech_papers_01/<wbr></wbr>bloedorn_datamining/bloedorn_datamining.pdf</span><br />
<br />
<a href="http://www.seas.upenn.edu/%7Eswati/infocom06_security.pdf"><b>A Statistical Framework for Intrusion Detection in Ad Hoc Networks</b></a> -<a href="http://72.14.205.104/search?q=cache:N8aGxywkVkgJ:www.seas.upenn.edu/%7Eswati/infocom06_security.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=120&lr=lang_en">View as HTML</a><br />
A Statistical Framework for Intrusion Detection in. Ad Hoc Networks. Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anjum. Abstract— We focus on detecting ...<br />
<span class="a">www.seas.upenn.edu/~swati/infocom06_security.pdf</span><br />
<br />
<a href="http://www.acm.org/sigs/sigkdd/explorations/issue4-2/lee.pdf"><b>Applying Data Mining to Intrusion Detection: the Quest for ...</b></a> -<a href="http://72.14.205.104/search?q=cache:_YoEXDWoqMgJ:www.acm.org/sigs/sigkdd/explorations/issue4-2/lee.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=121&lr=lang_en">View as HTML</a><br />
Applying Data Mining to Intrusion Detection: the Quest for. Automation, Efficiency, and Credibility. Wenke Lee. College of Computing ...<br />
<span class="a">www.acm.org/sigs/sigkdd/explorations/issue4-2/lee.pdf</span><br />
<br />
<a href="http://www.acm.org/sigs/sigcomm/sigcomm2005/poster-121.pdf"><b>Towards a High-speed Router-based Anomaly/Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:JtHzAPZOr1cJ:www.acm.org/sigs/sigcomm/sigcomm2005/poster-121.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=122&lr=lang_en">View as HTML</a><br />
1. Towards a High-speed Router-based. Anomaly/Intrusion Detection System. Zhichun Li, Yan Gao, Yan Chen. Northwestern University ...<br />
<span class="a">www.acm.org/sigs/sigcomm/sigcomm2005/poster-121.pdf</span><br />
<br />
<a href="http://www-lor.int-evry.fr/sar05/Contributions/Papers/9-autrel.pdf"><b>Using an Intrusion Detection Alert Similarity Operator to ...</b></a> -<a href="http://72.14.205.104/search?q=cache:TlJrVTzDMowJ:www-lor.int-evry.fr/sar05/Contributions/Papers/9-autrel.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=123&lr=lang_en">View as HTML</a><br />
Using an Intrusion Detection Alert Similarity. Operator to Aggregate and Fuse Alerts. Fabien Autrel et Frederic Cuppens. GET-ENST-Bretagne, 35576 Cesson ...<br />
<span class="a">www-lor.int-evry.fr/sar05/<wbr></wbr>Contributions/Papers/9-autrel.pdf</span><br />
<br />
<a href="http://documents.iss.net/literature/mss/IDS_datasheet.pdf"><b>Managed Intrusion Detection and Prevention Service (IDS/IPS)</b></a> -<a href="http://72.14.205.104/search?q=cache:si7zIJfjAecJ:documents.iss.net/literature/mss/IDS_datasheet.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=124&lr=lang_en">View as HTML</a><br />
Managed Intrusion Detection and Prevention Service (IDS/IPS). Internet security is now a critical factor in IT performance, impacting everything from ...<br />
<span class="a">documents.iss.net/literature/mss/IDS_datasheet.pdf</span><br />
<br />
<a href="http://documents.iss.net/whitepapers/nvh_ids.pdf"><b>Network- vs. Host-based Intrusion Detection</b></a><br />
Network- vs. Host-based Intrusion Detection. A Guide to Intrusion Detection Technology. 6600 Peachtree-Dunwoody Road. 300 Embassy Row. Atlanta, GA 30348 ...<br />
<span class="a">documents.iss.net/whitepapers/nvh_ids.pdf</span><br />
<br />
<a href="http://www.cs.utah.edu/%7Edraperg/research/IAS05.pdf"><b>A Visualization Paradigm for Network Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:c5uJQaiKXCwJ:www.cs.utah.edu/%7Edraperg/research/IAS05.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=126&lr=lang_en">View as HTML</a><br />
Proceedings of the 2005 IEEE. Workshop on Information Assurance and Security. United States Military Academy, West Point, NY, 17–19 June 2005 ...<br />
<span class="a">www.cs.utah.edu/~draperg/research/IAS05.pdf</span><br />
<br />
<a href="http://www.salford-systems.com/doc/ICEIS-final.pdf"><b>INTRUSION DETECTION SYSTEMS USING ADAPTIVE REGRESSION SPLINES</b></a> -<a href="http://72.14.205.104/search?q=cache:EyjdkDpEtvoJ:www.salford-systems.com/doc/ICEIS-final.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=127&lr=lang_en">View as HTML</a><br />
INTRUSION DETECTION SYSTEMS. USING ADAPTIVE REGRESSION SPLINES. Srinivas Mukkamala, Andrew H. Sung. Department of Computer Science, New Mexico Tech, ...<br />
<span class="a">www.salford-systems.com/doc/ICEIS-final.pdf</span><br />
<br />
<a href="http://www.salford-systems.com/doc/srilatha-cos-final.pdf"><b>Feature deduction and ensemble design of intrusion detection systems</b></a> -<a href="http://72.14.205.104/search?q=cache:1Du6_QYTz_IJ:www.salford-systems.com/doc/srilatha-cos-final.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=128&lr=lang_en">View as HTML</a><br />
Feature deduction and ensemble. design of intrusion detection systems. Srilatha Chebrolu. a. , Ajith Abraham. a,b,. *, Johnson P. Thomas ...<br />
<span class="a">www.salford-systems.com/doc/srilatha-cos-final.pdf</span><br />
<br />
<a href="http://www.cs.ucsb.edu/%7Evigna/ids/2002_kruegel_valeur_vigna_kemmerer_secpriv02.pdf"><b>Stateful Intrusion Detection for High-Speed Networks</b></a> -<a href="http://72.14.205.104/search?q=cache:dFN_0-kDW-0J:www.cs.ucsb.edu/%7Evigna/ids/2002_kruegel_valeur_vigna_kemmerer_secpriv02.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=129&lr=lang_en">View as HTML</a><br />
Stateful Intrusion Detection for High-Speed Networks. Christopher Kruegel. Fredrik Valeur. Giovanni Vigna. Richard Kemmerer. Reliable Software Group ...<br />
<span class="a"> www.cs.ucsb.edu/~vigna/ids/2002_<wbr></wbr>kruegel_valeur_vigna_kemmerer_secpriv02.pdf</span><br />
<br />
<a href="http://www.cs.ucsb.edu/%7Evigna/ids/2004_vigna_robertson_balzarotti_CCS04.pdf"><b>Testing Network-based Intrusion Detection Signatures Using Mutant ...</b></a> -<a href="http://72.14.205.104/search?q=cache:MoNYg_O8R5QJ:www.cs.ucsb.edu/%7Evigna/ids/2004_vigna_robertson_balzarotti_CCS04.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=130&lr=lang_en">View as HTML</a><br />
Testing Network-based Intrusion Detection Signatures. Using Mutant Exploits. Giovanni Vigna. vigna@cs.ucsb.edu. William Robertson. wkr@cs.ucsb.edu ...<br />
<span class="a">www.cs.ucsb.edu/~vigna/ids/<wbr></wbr>2004_vigna_robertson_balzarotti_CCS04.pdf</span><br />
<br />
<a href="http://www-935.ibm.com/services/us/bcrs/pdf/wp_wireless-intrusion-detection.pdf"><b>Page 1 Wireless Intrusion Detection Joshua Lackey, Ph.D. lackeyj ...</b></a> -<a href="http://72.14.205.104/search?q=cache:T-6HOJyuipIJ:www-935.ibm.com/services/us/bcrs/pdf/wp_wireless-intrusion-detection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=131&lr=lang_en">View as HTML</a><br />
Page 1. Wireless Intrusion Detection. Joshua Lackey, Ph.D. lackeyj@us.ibm.com. Andrew Roths. ajroths@us.ibm.com. James Goddard, CISSP. goddardj@us.ibm.com ...<br />
<span class="a"> www-935.ibm.com/services/us/<wbr></wbr>bcrs/pdf/wp_wireless-intrusion-detection.pdf</span><br />
<br />
<a href="http://www-935.ibm.com/services/us/bcrs/pdf/br_intrusion-detection.pdf"><b>Intrusion Detection Services</b></a> -<a href="http://72.14.205.104/search?q=cache:jQpH5xN-7DsJ:www-935.ibm.com/services/us/bcrs/pdf/br_intrusion-detection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=132&lr=lang_en">View as HTML</a><br />
IBM Security and Privacy Services. Intrusion Detection Services. Helping prevent and detect. unauthorized activities. Your Web page has been altered, ...<br />
<span class="a">www-935.ibm.com/services/<wbr></wbr>us/bcrs/pdf/br_intrusion-detection.pdf</span><br />
<br />
<a href="http://www.isoc.org/isoc/conferences/ndss/04/proceedings/Papers/Giffin.pdf"><b>Efficient Context-Sensitive Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:5Oeos0govTUJ:www.isoc.org/isoc/conferences/ndss/04/proceedings/Papers/Giffin.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=133&lr=lang_en">View as HTML</a><br />
Efficient Context-Sensitive Intrusion Detection. Jonathon T. Giffin. Somesh Jha. Barton P. Miller. Computer Sciences Department ...<br />
<span class="a">www.isoc.org/isoc/conferences/<wbr></wbr>ndss/04/proceedings/Papers/Giffin.pdf</span><br />
<br />
<a href="http://www.enterasys.com/products/ids/DSNSS7/DSNSS7.pdf"><b>Dragon 7 Network Intrusion Detection and Prevention</b></a> -<a href="http://72.14.205.104/search?q=cache:BVwWfGX2KAIJ:www.enterasys.com/products/ids/DSNSS7/DSNSS7.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=134&lr=lang_en">View as HTML</a><br />
Page 1 of 6 • Data Sheet. Dragon. ®. 7 Network Intrusion Detection. and Prevention. •. Stealth Network Intrusion Prevention appliances that stop ...<br />
<span class="a">www.enterasys.com/products/ids/DSNSS7/DSNSS7.pdf</span><br />
<br />
<a href="http://www.cs.nott.ac.uk/%7Euxa/papers/04icaris_ids_review.pdf"><b>Immune System Approaches to Intrusion Detection - A Review</b></a> -<a href="http://72.14.205.104/search?q=cache:Nsvg4XhH_CMJ:www.cs.nott.ac.uk/%7Euxa/papers/04icaris_ids_review.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=135&lr=lang_en">View as HTML</a><br />
Immune System Approaches to. Intrusion Detection - A Review. Uwe Aickelin, Julie Greensmith, Jamie Twycross. School of Computer Science, University of ...<br />
<span class="a"> www.cs.nott.ac.uk/~uxa/papers/04icaris_ids_review.pdf</span><br />
<br />
<a href="http://dev.hil.unb.ca/Texts/PST/pdf/couture.pdf"><b>A Declarative Approach to Stateful Intrusion Detection and Network ...</b></a> -<a href="http://72.14.205.104/search?q=cache:7F58JL8vBXIJ:dev.hil.unb.ca/Texts/PST/pdf/couture.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=136&lr=lang_en">View as HTML</a><br />
A Declarative Approach to Stateful Intrusion. Detection and Network Monitoring. M. Couture, B. Ktari and M. Mejri. Departement d’informatique et de genie ...<br />
<span class="a">dev.hil.unb.ca/Texts/PST/pdf/couture.pdf</span><br />
<br />
<a href="http://www.ccpa.net/cumberland/lib/cumberland/rfp_bids/RFP_Managed_Intrusion_Detection_Services.pdf"><b>CUMBERLAND COUNTY REQUEST FOR PROPOSALS MANAGED INTRUSION ...</b></a> -<a href="http://72.14.205.104/search?q=cache:dD_F3XxivVIJ:www.ccpa.net/cumberland/lib/cumberland/rfp_bids/RFP_Managed_Intrusion_Detection_Services.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=137&lr=lang_en">View as HTML</a><br />
1. CUMBERLAND COUNTY. REQUEST FOR PROPOSALS. MANAGED INTRUSION DETECTION SERVICES FOR. CUMBERLAND COUNTY GOVERNMENT. The County of Cumberland, ...<br />
<span class="a"> www.ccpa.net/cumberland/lib/cumberland/<wbr></wbr>rfp_bids/RFP_Managed_Intrusion_Detection_Services.pdf</span><br />
<br />
<a href="http://www.inmon.com/pdf/sFlowSecurity.pdf"><b>Using sFlow and InMon Traffic Server for Intrusion Detection and ...</b></a><br />
INMON CORP. 1404 IRVING ST., SAN FRANCISCO, CA 94122. WWW.INMON.COM. COPYRIGHT 2001 INMON CORP. ALL RIGHTS RESERVED. Using sFlow and InMon Traffic Server ...<br />
<span class="a"> www.inmon.com/pdf/sFlowSecurity.pdf</span><br />
<br />
<a href="http://home.eng.iastate.edu/%7Ejulied/publications/NAFIPS2001-%20Fuzzy%20Intrusion%20Detection,%20v6.pdf"><b>Fuzzy Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:0fYE9uRCFdAJ:home.eng.iastate.edu/%7Ejulied/publications/NAFIPS2001-%2520Fuzzy%2520Intrusion%2520Detection,%2520v6.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=139&lr=lang_en">View as HTML</a><br />
Fuzzy Intrusion Detection. John E. Dickerson, Jukka Juslin, Ourania Koukousoula, Julie A. Dickerson. Electrical and Computer Engineering Department ...<br />
<span class="a"> home.eng.iastate.edu/~julied/publications/<wbr></wbr>NAFIPS2001-%20Fuzzy%20Intrusion%20Detection,%20v6.pdf</span><br />
<br />
<a href="http://home.eng.iastate.edu/%7Ejulied/publications/NAFIPSpaper2000.pdf"><b>Fuzzy Network Profiling for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:PnEY6-A-w8UJ:home.eng.iastate.edu/%7Ejulied/publications/NAFIPSpaper2000.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=140&lr=lang_en">View as HTML</a><br />
Fuzzy Network Profiling for Intrusion Detection. John E. Dickerson (jedicker@iastate.edu) and Julie A. Dickerson (julied@iastate.edu) ...<br />
<span class="a">home.eng.iastate.edu/~julied/<wbr></wbr>publications/NAFIPSpaper2000.pdf</span><br />
<br />
<a href="http://www.systemexperts.com/tutors/rwid.pdf"><b>Real World Intrusion Detection</b></a><br />
1. Real W. o. r. l. d I. n. t. r. usion Det. e. ct. ion. Copyright 1999 SystemExperts Corporation. All Rights Reserved. Real World Intrusion. Detection ...<br />
<span class="a">www.systemexperts.com/tutors/rwid.pdf</span><br />
<br />
<a href="http://www.cs.ubbcluj.ro/%7Ecgrosan/ids-chapter.pdf"><b>1 Evolving Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:urBbYtI-l8IJ:www.cs.ubbcluj.ro/%7Ecgrosan/ids-chapter.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=142&lr=lang_en">View as HTML</a><br />
1. Evolving Intrusion Detection Systems. Ajith Abraham. 1. and Crina Grosan. 2. 1. School of Computer Science and Engineering, Chung-Ang University, 221, ...<br />
<span class="a">www.cs.ubbcluj.ro/~cgrosan/ids-chapter.pdf</span><br />
<br />
<a href="http://www.usenix.org/events/sec05/wips/chen.pdf"><b>Towards Anomaly/Intrusion Detection and Mitigation on High-Speed ...</b></a> -<a href="http://72.14.205.104/search?q=cache:em2oCGf6V7UJ:www.usenix.org/events/sec05/wips/chen.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=143&lr=lang_en">View as HTML</a><br />
1. Towards Anomaly/Intrusion. Detection and Mitigation on. High-Speed Networks. Yan Gao, Zhichun Li, Yan Chen. Northwestern Lab for Internet and Security ...<br />
<span class="a">www.usenix.org/events/sec05/wips/chen.pdf</span><br />
<br />
<a href="http://newsroom.cisco.com/dlls/IOSIDSDS.pdf"><b>Cisco IOS Firewall Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:x_UD9VYL_cwJ:newsroom.cisco.com/dlls/IOSIDSDS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=144&lr=lang_en">View as HTML</a><br />
Cisco Systems, Inc. All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 1 of 7 ...<br />
<span class="a">newsroom.cisco.com/dlls/IOSIDSDS.pdf</span><br />
<br />
<a href="http://www.cs.utsa.edu/%7Edanlo/talk/2006/hNIDS.pdf"><b>Hardware Network Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:Rj6sMeJFbCwJ:www.cs.utsa.edu/%7Edanlo/talk/2006/hNIDS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=145&lr=lang_en">View as HTML</a><br />
1. Hardware Network Intrusion Detection. Chia-Tien Dan Lo. Department of Computer Science. University of Texas at San Antonio ...<br />
<span class="a">www.cs.utsa.edu/~danlo/talk/2006/hNIDS.pdf</span><br />
<br />
<a href="http://www.bruggerink.com/%7Ezow/papers/brugger_dmnid.pdf"><b>Data Mining Methods for Network Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:H4CNLAzP6WoJ:www.bruggerink.com/%7Ezow/papers/brugger_dmnid.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=146&lr=lang_en">View as HTML</a><br />
Data Mining Methods for Network Intrusion. Detection. S TERRY BRUGGER. University of California, Davis. June 9, 2004 ...<br />
<span class="a">www.bruggerink.com/~zow/papers/brugger_dmnid.pdf</span><br />
<br />
<a href="http://www.blackhat.com/presentations/bh-usa-04/bh-us-04-butler/bh-us-04-butler.pdf"><b>Hidden Processes: The Implication for Intrusion Detection</b></a><br />
Agenda. • Introduction to Rootkits. • Where to Hook. • VICE detection. • Direct Kernel Object Manipulation. (DKOM). – No hooking required! ...<br />
<span class="a">www.blackhat.com/presentations/<wbr></wbr>bh-usa-04/bh-us-04-butler/bh-us-04-butler.pdf</span><br />
<br />
<a href="http://www.cs.chalmers.se/%7Esax/pub/worm-web-vis.pdf"><b>Visualisation for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:bxmoKkIQ5xoJ:www.cs.chalmers.se/%7Esax/pub/worm-web-vis.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=148&lr=lang_en">View as HTML</a><br />
Visualisation for Intrusion Detection. Hooking the Worm. Stefan Axelsson. Department of Computer Science. Chalmers University of Technology ...<br />
<span class="a">www.cs.chalmers.se/~sax/pub/worm-web-vis.pdf</span><br />
<br />
<a href="http://www.softwarespectrum.com/business/pdf/4413_TAS_IDS_IPS.pdf"><b>Intrusion Detection Systems (IDS) and Intrusion Prevention Systems ...</b></a> -<a href="http://72.14.205.104/search?q=cache:mDZqMYJKxs8J:www.softwarespectrum.com/business/pdf/4413_TAS_IDS_IPS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=149&lr=lang_en">View as HTML</a><br />
Technology Assessment Services (TAS): Product Evaluation Guide. Intrusion Detection Systems (IDS) and. Intrusion Prevention Systems (IPS). Overview ...<br />
<span class="a">www.softwarespectrum.com/<wbr></wbr>business/pdf/4413_TAS_IDS_IPS.pdf</span><br />
<br />
<a href="http://www.cerias.purdue.edu/symposium/2001/talks/tlk_07.pdf"><b>Dominant and Deviant Pattern Detection in Event Traces for ...</b></a> -<a href="http://72.14.205.104/search?q=cache:vuJT1NfjjgMJ:www.cerias.purdue.edu/symposium/2001/talks/tlk_07.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=150&lr=lang_en">View as HTML</a><br />
1 of 14. Dominant and Deviant Pattern Detection. in Event Traces for Intrusion Detection. Ananth Grama. CERIAS and Department of Computer Sciences ...<br />
<span class="a">www.cerias.purdue.edu/symposium/2001/talks/tlk_07.pdf</span><br />
<br />
<a href="http://www.tisp.org/files/isbe2004/panel_5b/swiecick.pdf"><b>Intrusion Detection Evolution at TriMet</b></a> -<a href="http://72.14.205.104/search?q=cache:peG9HQSwursJ:www.tisp.org/files/isbe2004/panel_5b/swiecick.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=151&lr=lang_en">View as HTML</a><br />
11. Intrusion Detection Origins. • CCTV on Westside Project. • Video on Trains and Busses. • Access Control System. Page 12. 12. Intrusion Detection Origins ...<br />
<span class="a"> www.tisp.org/files/isbe2004/panel_5b/swiecick.pdf</span><br />
<br />
<a href="http://perso.rd.francetelecom.fr/debar/papers/Debar00a.pdf"><b>An Introduction to Intrusion-Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:dhGdfZivs98J:perso.rd.francetelecom.fr/debar/papers/Debar00a.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=152&lr=lang_en">View as HTML</a><br />
An Introduction to Intrusion-Detection Systems. Herve Debar. IBM Research, Zurich Research Laboratory,. Saumerstrasse 4, CH–8803 Ruschlikon, Switzerland ...<br />
<span class="a"> perso.rd.francetelecom.fr/debar/papers/Debar00a.pdf</span><br />
<br />
<a href="http://www.eecs.harvard.edu/%7Egreenie/qual-slides.pdf"><b>Intrusion Detection and Response in LOCKSS</b></a> -<a href="http://72.14.205.104/search?q=cache:sbjgFc0GiGMJ:www.eecs.harvard.edu/%7Egreenie/qual-slides.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=153&lr=lang_en">View as HTML</a><br />
Intrusion Detection and. Response in LOCKSS. Rachel Greenstadt. greenie@eecs.harvard.edu. Harvard University. Advisors: HT Kung and Mike Smith ...<br />
<span class="a">www.eecs.harvard.edu/~greenie/qual-slides.pdf</span><br />
<br />
<a href="http://www.loria.fr/%7Eabbes/index_files/files/abbes_f_itcc.pdf"><b>Protocol Analysis in Intrusion Detection Using Decision Tree</b></a> -<a href="http://72.14.205.104/search?q=cache:FZB3ldiqlo8J:www.loria.fr/%7Eabbes/index_files/files/abbes_f_itcc.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=154&lr=lang_en">View as HTML</a><br />
Protocol Analysis in Intrusion Detection Using Decision Tree. Tarek Abbes. LORIA/INRIA-Lorraine. 54602 Villers-lès-Nancy,. France. abbes@loria.fr ...<br />
<span class="a">www.loria.fr/~abbes/index_files/files/abbes_f_itcc.pdf</span><br />
<br />
<a href="https://www.cs.tcd.ie/coghlan/pubs/egc05-snort-santag.pdf"><b>Towards a Grid-wide Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:i-ES31-9dtEJ:https://www.cs.tcd.ie/coghlan/pubs/egc05-snort-santag.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=155&lr=lang_en">View as HTML</a><br />
Towards a Grid-wide Intrusion Detection System. Stuart Kenny and Brian Coghlan. {stuart.kenny, coghlan}@cs.tcd.ie. Trinity College Dublin, Ireland ...<br />
<span class="a">https://www.cs.tcd.ie/<wbr></wbr>coghlan/pubs/egc05-snort-santag.pdf</span><br />
<br />
<a href="http://www.intelcom.co.ma/catalogues/TRN-CSIDS.pdf"><b>COURSE Cisco Secure Intrusion Detection Systems v3.0 CONTENT WHO ...</b></a> -<a href="http://72.14.205.104/search?q=cache:uHndrIhojK0J:www.intelcom.co.ma/catalogues/TRN-CSIDS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=156&lr=lang_en">View as HTML</a><br />
INTECOM, S.A. - www.intelcom.co.ma / info-training@intelcom.co.ma. Information sur le cursus: +212 (0)37 68 79 54. COURSE. Cisco Secure Intrusion Detection ...<br />
<span class="a">www.intelcom.co.ma/catalogues/TRN-CSIDS.pdf</span><br />
<br />
<a href="http://www.bmc.com/products/documents/90/41/49041/49041.pdf"><b>Real-Time Intrusion Detection and Prevention for the Mainframe</b></a> -<a href="http://72.14.205.104/search?q=cache:PPeMEWtcUgcJ:www.bmc.com/products/documents/90/41/49041/49041.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=157&lr=lang_en">View as HTML</a><br />
WWW.BMC.COM/SECURITY. How for. Real-Time Intrusion Detection and. Prevention for the Mainframe*. ZAlert™ for CONTROL-SA by Consul ...<br />
<span class="a">www.bmc.com/products/documents/90/41/49041/49041.pdf</span><br />
<br />
<a href="http://www.iaik.tugraz.at/teaching/03_advanced%20computer%20networks/ss2005/vo10/Intrusion%20Detection%20Systems%20%282%29HZ.pdf"><b>Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:ySHD_prPdwgJ:www.iaik.tugraz.at/teaching/03_advanced%2520computer%2520networks/ss2005/vo10/Intrusion%2520Detection%2520Systems%2520%282%29HZ.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=158&lr=lang_en">View as HTML</a><br />
1. Intrusion Detection. Systems. 2. Roadmap. Understanding Intrusion Detection. Intrusion Detection Systems Architecture ...<br />
<span class="a"> www.iaik.tugraz.at/.../ss2005/vo10/<wbr></wbr>Intrusion%20Detection%20Systems%20(2)HZ.pdf</span><br />
<br />
<a href="http://www-03.ibm.com/industries/wireless/doc/content/bin/ibmwide.pdf"><b>IBM Wireless Intrusion Detection Extensions</b></a> -<a href="http://72.14.205.104/search?q=cache:WTy1DUU8EyMJ:www-03.ibm.com/industries/wireless/doc/content/bin/ibmwide.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=159&lr=lang_en">View as HTML</a><br />
Security vulnerabilities:. The worry of wireless. It’s no wonder that wireless networks. have become increasingly pervasive. in both the public and private ...<br />
<span class="a">www-03.ibm.com/industries/<wbr></wbr>wireless/doc/content/bin/ibmwide.pdf</span><br />
<br />
<a href="http://www.infoworld.com/pdf/special_report/2004/34SRinspect.pdf"><b>Intrusion Detection Systems at Work</b></a> -<a href="http://72.14.205.104/search?q=cache:OchlzoD3lsYJ:www.infoworld.com/pdf/special_report/2004/34SRinspect.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=160&lr=lang_en">View as HTML</a><br />
August 23, 2004 b Issue 34. ECM Bigwigs Work. to Retain Records. p18. JON UDELL. Social Networks. Wise Up. p36. i. INFOWORLD.COM. TEST CENTER REVIEW ...<br />
<span class="a">www.infoworld.com/pdf/<wbr></wbr>special_report/2004/34SRinspect.pdf</span><br />
<br />
<a href="http://users.ece.gatech.edu/%7Eowen/Research/Conference%20Publications/Schmoyer_WCNC2004.pdf"><b>Wireless Intrusion Detection and Response</b></a> -<a href="http://72.14.205.104/search?q=cache:k92_kSX5ICYJ:users.ece.gatech.edu/%7Eowen/Research/Conference%2520Publications/Schmoyer_WCNC2004.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=161&lr=lang_en">View as HTML</a><br />
Wireless Intrusion Detection and Response. A case study using the classic man-in-the-middle attack. Timothy R. Schmoyer, Yu Xi Lim and Henry L. Owen ...<br />
<span class="a"> users.ece.gatech.edu/~owen/Research/<wbr></wbr>Conference%20Publications/Schmoyer_WCNC2004.pdf</span><br />
<br />
<a href="http://sdu.ictp.it/lowbandwidth/program/richard/Richard-intrusiondetection.pdf"><b>INTRUSION DETECTION</b></a> -<a href="http://72.14.205.104/search?q=cache:kFNqmeF9eSsJ:sdu.ictp.it/lowbandwidth/program/richard/Richard-intrusiondetection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=162&lr=lang_en">View as HTML</a><br />
Table of Contents. INTRUSION DETECTION. Intrusion Detection with an IDS (Intrusion Detection Sensor). ◊. Why Do Intrusion Detection ...<br />
<span class="a">sdu.ictp.it/lowbandwidth/program/<wbr></wbr>richard/Richard-intrusiondetection.pdf</span><br />
<br />
<a href="http://www.sei.cmu.edu/news-at-sei/features/2001/1q01/pdf/feature-3-1q01.pdf"><b>Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:UFvCRk4mifkJ:www.sei.cmu.edu/news-at-sei/features/2001/1q01/pdf/feature-3-1q01.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=163&lr=lang_en">View as HTML</a><br />
news@sei interactive, March 2001. http://interactive.sei.cmu.edu. 1. Intrusion Detection Systems. Intrusion Detection Systems (IDSs) are an important, ...<br />
<span class="a">www.sei.cmu.edu/news-at-sei/<wbr></wbr>features/2001/1q01/pdf/feature-3-1q01.pdf</span><br />
<br />
<a href="http://gridsec.usc.edu/files/TR/TR11_zbakerHPEC04.pdf"><b>Automated Incremental Design of Flexible Intrusion Detection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:DYPn_D0W7oMJ:gridsec.usc.edu/files/TR/TR11_zbakerHPEC04.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=164&lr=lang_en">View as HTML</a><br />
Automated Incremental Design of Flexible Intrusion Detection Systems on. FPGAs. 1. Zachary K. Baker and Viktor K. Prasanna ...<br />
<span class="a">gridsec.usc.edu/files/TR/TR11_zbakerHPEC04.pdf</span><br />
<br />
<a href="http://gridsec.usc.edu/files/TR/TR1_zbakerUSCfccm.pdf"><b>A Methodology for Synthesis of Efficient Intrusion Detection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:rFlcMucbJ98J:gridsec.usc.edu/files/TR/TR1_zbakerUSCfccm.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=165&lr=lang_en">View as HTML</a><br />
A Methodology for Synthesis of Efficient Intrusion Detection Systems on FPGAs. 1. Zachary K. Baker and Viktor K. Prasanna. University of Southern California ...<br />
<span class="a">gridsec.usc.edu/files/TR/TR1_zbakerUSCfccm.pdf</span><br />
<br />
<a href="http://crd.lbl.gov/DOEresources/SC04/Tierney_Bro_SC04.pdf"><b>An Overview of the Bro Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:MwTUtabTcWUJ:crd.lbl.gov/DOEresources/SC04/Tierney_Bro_SC04.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=166&lr=lang_en">View as HTML</a><br />
1. 1. GGF. Bro. An Overview of the. Bro Intrusion Detection System. Lawrence Berkeley National Laboratory. Brian L. Tierney, Vern Paxson, James Rothfuss ...<br />
<span class="a">crd.lbl.gov/DOEresources/SC04/Tierney_Bro_SC04.pdf</span><br />
<br />
<a href="http://www.cs.northwestern.edu/%7Ezli109/publication/vizsec05.pdf"><b>IDGraphs: Intrusion Detection and Analysis Using Histographs</b></a> -<a href="http://72.14.205.104/search?q=cache:6sSeLSHyBDYJ:www.cs.northwestern.edu/%7Ezli109/publication/vizsec05.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=167&lr=lang_en">View as HTML</a><br />
Pin Ren. ∗. Yan Gao. †. Zhichun Li. ‡. Yan Chen. §. Benjamin Watson. ¶. Department of Computer Science. Northwestern University ...<br />
<span class="a">www.cs.northwestern.edu/<wbr></wbr>~zli109/publication/vizsec05.pdf</span><br />
<br />
<a href="http://infohost.nmt.edu/%7Eitheory/papers/eiland-Information.pdf"><b>An Application of Information Theory to Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:0ZTyHvlbdBoJ:infohost.nmt.edu/%7Eitheory/papers/eiland-Information.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=168&lr=lang_en">View as HTML</a><br />
An Application of Information Theory to Intrusion Detection. E. Earl Eiland. Computer Science Department. New Mexico Inst. of Mining and Technology ...<br />
<span class="a"> infohost.nmt.edu/~itheory/papers/eiland-Information.pdf</span><br />
<br />
<a href="http://www.cis.tamuk.edu/help/policies/1_090_Intrusion%20Detection%20Policy.pdf"><b>Intrusion Detection Policy</b></a> -<a href="http://72.14.205.104/search?q=cache:4VLg6oRIHHYJ:www.cis.tamuk.edu/help/policies/1_090_Intrusion%2520Detection%2520Policy.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=169&lr=lang_en">View as HTML</a><br />
Section. Information Resource Security Policies. 04/01/2004. -Effective. mm/dd/yyyy. -Revised. Policy 1.090.0. Intrusion Detection Policy ...<br />
<span class="a">www.cis.tamuk.edu/help/policies/<wbr></wbr>1_090_Intrusion%20Detection%20Policy.pdf</span><br />
<br />
<a href="http://www.cigital.com/papers/download/sans_id99.pdf"><b>Using Program Behavior Proles for Intrusion Detection 1 Introduction</b></a> -<a href="http://72.14.205.104/search?q=cache:tmR6lXxpZoUJ:www.cigital.com/papers/download/sans_id99.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=170&lr=lang_en">View as HTML</a><br />
Using Program Behavior Proles for Intrusion Detection. Anup K. Ghosh, Aaron Schwartzbard, & Michael Schatz. Reliable Software Technologies Corporation ...<br />
<span class="a">www.cigital.com/papers/download/sans_id99.pdf</span><br />
<br />
<a href="http://www.research.ibm.com/iui-workshop/papers/williams-iui04w.pdf"><b>Toward interface customization in intrusion detection systems</b></a> -<a href="http://72.14.205.104/search?q=cache:e-ypUx2mJewJ:www.research.ibm.com/iui-workshop/papers/williams-iui04w.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=171&lr=lang_en">View as HTML</a><br />
Toward interface customization. in intrusion detection systems. Lloyd Williams, Sean P. McBride, Robert St. Amant, and Peng Ning ...<br />
<span class="a">www.research.ibm.com/iui-workshop/<wbr></wbr>papers/williams-iui04w.pdf</span><br />
<br />
<a href="http://woozle.org/%7Emfisk/papers/ucsd-tr-cs2001-0670.pdf"><b>Fast Content-Based Packet Handling for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:ShB4bSobB1UJ:woozle.org/%7Emfisk/papers/ucsd-tr-cs2001-0670.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=172&lr=lang_en">View as HTML</a><br />
UCSD Technical Report CS2001-0670, May 2001. Fast Content-Based Packet Handling for Intrusion Detection. ∗. Mike Fisk. †§. mfisk@lanl.gov. George Varghese ...<br />
<span class="a">woozle.org/~mfisk/papers/ucsd-tr-cs2001-0670.pdf</span><br />
<br />
<a href="http://www.cse.msstate.edu/%7Ebridges/papers/nafips2001.pdf"><b>FUZZY COGNITIVE MAPS FOR DECISION SUPPORT IN AN INTELLIGENT ...</b></a> -<a href="http://72.14.205.104/search?q=cache:kfmYDCkI-XQJ:www.cse.msstate.edu/%7Ebridges/papers/nafips2001.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=173&lr=lang_en">View as HTML</a><br />
FUZZY COGNITIVE MAPS FOR DECISION SUPPORT IN AN. INTELLIGENT INTRUSION DETECTION SYSTEM. Ambareen Siraj. Susan M. Bridges. Rayford B. Vaughn ...<br />
<span class="a">www.cse.msstate.edu/~bridges/papers/nafips2001.pdf</span><br />
<br />
<a href="http://ls6-www.informatik.uni-dortmund.de/issi/archive/literature/2004/Meier_Flegel_Koenig:2004a.pdf"><b>Reactive Security – Intrusion Detection, Honeypots, and ...</b></a> -<a href="http://72.14.205.104/search?q=cache:AoWJXneDENQJ:ls6-www.informatik.uni-dortmund.de/issi/archive/literature/2004/Meier_Flegel_Koenig:2004a.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=174&lr=lang_en">View as HTML</a><br />
186. PIK 27 (2004) 4. EDITORIAL. K.G. Saur Verlag, München, 2004. M. Meier, U. Flegel, and H. König. Reactive Security –. Intrusion Detection, Honeypots, ...<br />
<span class="a"> ls6-www.informatik.uni-dortmund.de/issi/<wbr></wbr>archive/literature/2004/Meier_Flegel_Koenig:2004a.pdf</span><br />
<br />
<a href="http://www.fujitsu-ten.co.jp/english/company/researchdev/gihou/en_pdf/23/23-4.pdf"><b>24GHz Intrusion Detection Sensor for Vehicle Antitheft Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:0z95CeNaTsoJ:www.fujitsu-ten.co.jp/english/company/researchdev/gihou/en_pdf/23/23-4.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=175&lr=lang_en">View as HTML</a><br />
26. Yoshijiro Hori. Toshiyuki Moribayashi. Choichiro Tsuchihashi. Yoshihiro Sasaki. Many European, North American and other countries have high demand for ...<br />
<span class="a"> www.fujitsu-ten.co.jp/english/<wbr></wbr>company/researchdev/gihou/en_pdf/23/23-4.pdf</span><br />
<br />
<a href="http://www.itoc.usma.edu/Workshop/2006/Program/Presentations/IAW2006-13-2.pdf"><b>An Integrated Visualisation Framework for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:M3c3hiZIojUJ:www.itoc.usma.edu/Workshop/2006/Program/Presentations/IAW2006-13-2.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=176&lr=lang_en">View as HTML</a><br />
An Integrated Visualisation Framework for Intrusion. Detection. Mr. Huw Read, School of Computing, University of Glamorgan, UK. holread@glam.ac.uk ...<br />
<span class="a">www.itoc.usma.edu/Workshop/2006/<wbr></wbr>Program/Presentations/IAW2006-13-2.pdf</span><br />
<br />
<a href="http://events.ccc.de/congress/2005/fahrplan/attachments/560-Paper_IntrusionDetectionSystems.pdf"><b>Intrusion Detection Systems Elevated to the Next Level</b></a> -<a href="http://72.14.205.104/search?q=cache:cYlQ5LRVB8gJ:events.ccc.de/congress/2005/fahrplan/attachments/560-Paper_IntrusionDetectionSystems.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=177&lr=lang_en">View as HTML</a><br />
Intrusion Detection Systems. Elevated to the Next Level. Frank Becker, Matthias Petermann. December 4, 2005. 1 Introduction ...<br />
<span class="a">events.ccc.de/congress/2005/fahrplan/<wbr></wbr>attachments/560-Paper_IntrusionDetectionSystems.pdf</span><br />
<br />
<a href="http://events.ccc.de/congress/2005/fahrplan/attachments/638-22c3_ids.pdf"><b>Intrusion Detection Systems Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:alem-VecgkMJ:events.ccc.de/congress/2005/fahrplan/attachments/638-22c3_ids.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=178&lr=lang_en">View as HTML</a><br />
Intrusion Detection Systems. Intrusion Detection Systems. Elevated to the. Next Level. 22. nd. Chaos Communication Congress. Alien8 - Matthias Petermann ...<br />
<span class="a">events.ccc.de/congress/2005/<wbr></wbr>fahrplan/attachments/638-22c3_ids.pdf</span><br />
<br />
<a href="http://ccss.usc.edu/530/papers/anderson_nides.pdf"><b>Next-generation Intrusion Detection Expert System (NIDES) A Summary</b></a> -<a href="http://72.14.205.104/search?q=cache:mUeO00ZnlWEJ:ccss.usc.edu/530/papers/anderson_nides.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=179&lr=lang_en">View as HTML</a><br />
Next-generation Intrusion Detection Expert System (NIDES). A Summary. 1. Debra Anderson. Thane Frivold. Alfonso Valdes. Computer Science Laboratory ...<br />
<span class="a">ccss.usc.edu/530/papers/anderson_nides.pdf</span><br />
<br />
<a href="http://www.icasa.nmt.edu/Content/publication/feature.pdf"><b>1 Feature Selection for Intrusion Detection using Neural Networks ...</b></a> -<a href="http://72.14.205.104/search?q=cache:r5Cd2qlF7ZYJ:www.icasa.nmt.edu/Content/publication/feature.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=180&lr=lang_en">View as HTML</a><br />
Mukkamala, Sung. 1. Feature Selection for Intrusion Detection using. Neural Networks and Support Vector Machines. Srinivas Mukkamala. 1. & Andrew H. Sung ...<br />
<span class="a">www.icasa.nmt.edu/Content/publication/feature.pdf</span><br />
<br />
<a href="http://www.cs.unc.edu/%7Ejeffay/courses/nidsS05/slides/1-Introduction.pdf"><b>COMP 290-040 Network Intrusion Detection Introduction & Overview ...</b></a> -<a href="http://72.14.205.104/search?q=cache:xuUgbtPuiJcJ:www.cs.unc.edu/%7Ejeffay/courses/nidsS05/slides/1-Introduction.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=181&lr=lang_en">View as HTML</a><br />
1. ©2005 by Kevin Jeffay. COMP 290-040. Network Intrusion Detection. http://www.cs.unc.edu/jeffay/courses/nidsS05. Introduction & Overview. Kevin Jeffay ...<br />
<span class="a">www.cs.unc.edu/~jeffay/courses/<wbr></wbr>nidsS05/slides/1-Introduction.pdf</span><br />
<br />
<a href="http://www.lib.unb.ca/Texts/PST/2005/pdf/massicote.pdf"><b>Context-Based Intrusion Detection Using Snort, Nessus and Bugtraq ...</b></a> -<a href="http://72.14.205.104/search?q=cache:-jvOHeqC74YJ:www.lib.unb.ca/Texts/PST/2005/pdf/massicote.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=182&lr=lang_en">View as HTML</a><br />
Context-Based Intrusion Detection. Using Snort, Nessus and Bugtraq Databases. Frederic Massicotte. 1,2. Mathieu Couture ...<br />
<span class="a">www.lib.unb.ca/Texts/PST/2005/pdf/massicote.pdf</span><br />
<br />
<a href="http://osl.cs.uiuc.edu/docs/intrusion/intrusion.pdf"><b>A Temporal Logic Based Framework for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:umGRbyXP5jQJ:osl.cs.uiuc.edu/docs/intrusion/intrusion.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=183&lr=lang_en">View as HTML</a><br />
A Temporal Logic Based Framework for Intrusion. Detection. Prasad Naldurg, Koushik Sen, and Prasanna Thati. Department of Computer Science, ...<br />
<span class="a">osl.cs.uiuc.edu/docs/intrusion/intrusion.pdf</span><br />
<br />
<a href="http://www.comsoc.org/oeb/Past_Presentations/Intrusion_Detection_%20Prevention_Solanki.pdf"><b>Network Intrusion Detection and Prevention</b></a> -<a href="http://72.14.205.104/search?q=cache:YsThVFXDo3gJ:www.comsoc.org/oeb/Past_Presentations/Intrusion_Detection_%2520Prevention_Solanki.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=184&lr=lang_en">View as HTML</a><br />
ramesh@intruvert.com. 408-434-8302. 3200-A North First Street. San Jose, CA 95134. Network Intrusion Detection and Prevention. March 15, 2003. Ramesh Gupta ...<br />
<span class="a"> www.comsoc.org/oeb/Past_Presentations/<wbr></wbr>Intrusion_Detection_%20Prevention_Solanki.pdf</span><br />
<br />
<a href="http://enpub.fulton.asu.edu/ye/Published_Journal_Papers/Ye_41.pdf"><b>Computer intrusion detection through EWMA for autocorrelated and ...</b></a> -<a href="http://72.14.205.104/search?q=cache:dYC87zfXvToJ:enpub.fulton.asu.edu/ye/Published_Journal_Papers/Ye_41.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=185&lr=lang_en">View as HTML</a><br />
IEEE TRANSACTIONS ON RELIABILITY, VOL. 52, NO. 1, MARCH 2003. 75. Computer Intrusion Detection Through EWMA for. Autocorrelated and Uncorrelated Data ...<br />
<span class="a">enpub.fulton.asu.edu/ye/<wbr></wbr>Published_Journal_Papers/Ye_41.pdf</span><br />
<br />
<a href="http://www.ece.cmu.edu/%7Edgao/raid05.pdf"><b>LNCS 3858 - Behavioral Distance for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:kTGE5PHXHMgJ:www.ece.cmu.edu/%7Edgao/raid05.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=186&lr=lang_en">View as HTML</a><br />
Behavioral Distance for Intrusion Detection. Debin Gao. 1. , Michael K. Reiter. 2. , and Dawn Song. 2. 1. Electrical & Computer Engineering Department, ...<br />
<span class="a">www.ece.cmu.edu/~dgao/raid05.pdf</span><br />
<br />
<a href="http://www.cs.virginia.edu/%7Ejones/IDS-research/Documents/jones-sielken-survey-v11.pdf"><b>Computer System Intrusion Detection: A Survey</b></a> -<a href="http://72.14.205.104/search?q=cache:2pJJ0_LIRlgJ:www.cs.virginia.edu/%7Ejones/IDS-research/Documents/jones-sielken-survey-v11.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=187&lr=lang_en">View as HTML</a><br />
Intrusion Detection. 1. 02/09/00. Computer System Intrusion Detection:. A Survey. 1. Anita K. Jones and Robert S. Sielken. Department of Computer Science ...<br />
<span class="a"> www.cs.virginia.edu/~jones/IDS-research/<wbr></wbr>Documents/jones-sielken-survey-v11.pdf</span><br />
<br />
<a href="http://www.rennes.enst-bretagne.fr/%7Efcuppens/articles/sar04.pdf"><b>Efficient Intrusion Detection Using Principal Component Analysis</b></a> -<a href="http://72.14.205.104/search?q=cache:cYqOhlEDKhcJ:www.rennes.enst-bretagne.fr/%7Efcuppens/articles/sar04.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=188&lr=lang_en">View as HTML</a><br />
Efficient Intrusion Detection Using Principal. Component Analysis. Yacine Bouzida, Frederic Cuppens, Nora Cuppens-Boulahia and Sylvain. Gombault ...<br />
<span class="a">www.rennes.enst-bretagne.fr/<wbr></wbr>~fcuppens/articles/sar04.pdf</span><br />
<br />
<a href="http://glass.cs.unb.ca/ias/papers/ccece03.pdf"><b>Y-MEANS: A CLUSTERING METHOD FOR INTRUSION DETECTION</b></a> -<a href="http://72.14.205.104/search?q=cache:m2ghHJaZusEJ:glass.cs.unb.ca/ias/papers/ccece03.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=189&lr=lang_en">View as HTML</a><br />
Y-MEANS: A CLUSTERING METHOD FOR INTRUSION DETECTION. Yu Guan and Ali A. Ghorbani. Faculty of Computer Science. University of New Brunswick ...<br />
<span class="a">glass.cs.unb.ca/ias/papers/ccece03.pdf</span><br />
<br />
<a href="http://www.ist-scampi.org/publications/papers/charitakis-mascots2003.pdf"><b>An Active Traffic Splitter Architecture for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:EdvzTyDy0tIJ:www.ist-scampi.org/publications/papers/charitakis-mascots2003.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=190&lr=lang_en">View as HTML</a><br />
E. Markatos. ⋆. ⋆. Institute of Computer Science. †. Distributed Systems Laboratory. Foundation for Research and Technology - Hellas ...<br />
<span class="a">www.ist-scampi.org/publications/<wbr></wbr>papers/charitakis-mascots2003.pdf</span><br />
<br />
<a href="http://www.sis.uncc.edu/LIISP/slides00/PENG.pdf"><b>1 Intrusion Detection -- A 20 year practice Outline Till 1980 ...</b></a> -<a href="http://72.14.205.104/search?q=cache:V-TTIS_MzscJ:www.sis.uncc.edu/LIISP/slides00/PENG.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=191&lr=lang_en">View as HTML</a><br />
1. IFSM, UMBC. 1. Intrusion Detection. -- A 20 year practice. Peng Liu. UMBC. IFSM, UMBC. 2. Outline. Motivation. Intrusion Detection Techniques ...<br />
<span class="a">www.sis.uncc.edu/LIISP/slides00/PENG.pdf</span><br />
<br />
<a href="http://www.csc.ncsu.edu/faculty/stamant/papers/LWetal-iui04w.pdf"><b>Toward interface customization in intrusion detection systems</b></a> -<a href="http://72.14.205.104/search?q=cache:Ka2eWtNPu-cJ:www.csc.ncsu.edu/faculty/stamant/papers/LWetal-iui04w.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=192&lr=lang_en">View as HTML</a><br />
Toward interface customization. in intrusion detection systems. Lloyd Williams, Sean McBride, Robert St. Amant, and Peng Ning ...<br />
<span class="a">www.csc.ncsu.edu/faculty/<wbr></wbr>stamant/papers/LWetal-iui04w.pdf</span><br />
<br />
<a href="http://www.securepipe.com/pdf/solution.sheets/ids.pdf"><b>Intrusion Detection Management</b></a> -<a href="http://72.14.205.104/search?q=cache:siyuw3PQ0OsJ:www.securepipe.com/pdf/solution.sheets/ids.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=193&lr=lang_en">View as HTML</a><br />
SOLUTION. SHEET. S. ECURE. P. IPE. INTRUSION DETECTION. Intrusion Detection Management. Intrusion detection technology plays a ...<br />
<span class="a">www.securepipe.com/pdf/solution.sheets/ids.pdf</span><br />
<br />
<a href="http://www.gi-ev.de/fachbereiche/sicherheit/fg/sidar/dimva/dimva2005/materials/sommer.pdf"><b>Enhancing the Accuracy of Network-based Intrusion Detection with ...</b></a> -<a href="http://72.14.205.104/search?q=cache:90Xs_fF21skJ:www.gi-ev.de/fachbereiche/sicherheit/fg/sidar/dimva/dimva2005/materials/sommer.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=194&lr=lang_en">View as HTML</a><br />
Enhancing the Accuracy of Network-based. Intrusion Detection with Host-based Context. Holger Dreger. 1. , Christian Kreibich ...<br />
<span class="a">www.gi-ev.de/fachbereiche/sicherheit/<wbr></wbr>fg/sidar/dimva/dimva2005/materials/sommer.pdf</span><br />
<br />
<a href="http://www.netmode.ntua.gr/papers/gkoutep/sids-ISSEA.pdf"><b>Integrating Intrusion Detection and Network Management</b></a> -<a href="http://72.14.205.104/search?q=cache:ETMIvIUhIFYJ:www.netmode.ntua.gr/papers/gkoutep/sids-ISSEA.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=195&lr=lang_en">View as HTML</a><br />
SIDS - A system for enterprise-wide Intrusion Detection. Panagiotis Astithas, Georgios Koutepas, Athanassios Moralis, Basil Maglaris ...<br />
<span class="a">www.netmode.ntua.gr/papers/gkoutep/sids-ISSEA.pdf</span><br />
<br />
<a href="http://space.iias.spb.su/ai/publications/2005-gorodetsky-karsaev-samoilov-MMM-ACNS-05.pdf"><b>Asynchronous Alert Correlation in Multi-agent Intrusion Detection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:VgXWoPd1TvgJ:space.iias.spb.su/ai/publications/2005-gorodetsky-karsaev-samoilov-MMM-ACNS-05.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=196&lr=lang_en">View as HTML</a><br />
V. Gorodetsky, I. Kotenko, and V. Skormin (Eds.): MMM-ACNS 2005, LNCS 3685, pp. 366–379, 2005. © Springer-Verlag Berlin Heidelberg 2005 ...<br />
<span class="a">space.iias.spb.su/ai/publications/<wbr></wbr>2005-gorodetsky-karsaev-samoilov-MMM-ACNS-05.pdf</span><br />
<br />
<a href="http://www.arl.wustl.edu/Publications/2005-09/fpga05.pdf"><b>Efficient Packet Classification for Network Intrusion Detection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:qfo8P2p86P0J:www.arl.wustl.edu/Publications/2005-09/fpga05.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=197&lr=lang_en">View as HTML</a><br />
Efficient Packet Classification for Network Intrusion. Detection using FPGA. ∗. Haoyu Song. Department of CSE. Washington University. St. Louis, USA ...<br />
<span class="a">www.arl.wustl.edu/Publications/2005-09/fpga05.pdf</span><br />
<br />
<a href="http://www.ncassr.org/projects/sift/papers/uclog.pdf"><b>UCLog: A Unified, Correlated Logging Architecture for Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:mFIFTbC3-GgJ:www.ncassr.org/projects/sift/papers/uclog.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=198&lr=lang_en">View as HTML</a><br />
UCLog: A Unified, Correlated Logging Architecture for. Intrusion Detection. Zhenmin Li. †. , Jed Taylor. †. , Elizabeth Partridge ...<br />
<span class="a">www.ncassr.org/projects/sift/papers/uclog.pdf</span><br />
<br />
<a href="http://www.usenix.net/events/sec05/wips/campbell.pdf"><b>Making Intrusion Detection Systems Interactive and Collaborative</b></a> -<a href="http://72.14.205.104/search?q=cache:wPmzaRp88KcJ:www.usenix.net/events/sec05/wips/campbell.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=199&lr=lang_en">View as HTML</a><br />
Making Intrusion Detection Systems. Interactive and Collaborative. Scott Campbell scottc@nersc.gov. Stephen Chan sychan@lbl.gov. Lawrence Berkeley Lab ...<br />
<span class="a">www.usenix.net/events/sec05/wips/campbell.pdf</span><br />
<br />
<a href="http://www.ifi.unizh.ch/archive/mastertheses/DA_Arbeiten_2003/Besson_Jean_Luc.pdf"><b>Next Generation Intrusion Detection and Prevention for Complex ...</b></a> -<a href="http://72.14.205.104/search?q=cache:zBMHYDPEOY8J:www.ifi.unizh.ch/archive/mastertheses/DA_Arbeiten_2003/Besson_Jean_Luc.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=200&lr=lang_en">View as HTML</a><br />
Next Generation Intrusion Detection and. Prevention for Complex Environments. Master Thesis in Computer Science. submitted by. Jean-Luc Besson ...<br />
<span class="a"> www.ifi.unizh.ch/archive/mastertheses/<wbr></wbr>DA_Arbeiten_2003/Besson_Jean_Luc.pdf</span><br />
<br />
<a href="http://www.cs.umn.edu/research/MINDS/papers/nsf_ngdm_2002.pdf"><b>Data Mining for Network Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:sfXYrKbTGDMJ:www.cs.umn.edu/research/MINDS/papers/nsf_ngdm_2002.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=201&lr=lang_en">View as HTML</a><br />
0. 90 91 92 93 94 95 96 97 98 99 00 01. 20000. 40000. 60000. Data Mining for Network Intrusion Detection. Paul Dokas, Levent Ertoz, Vipin Kumar, ...<br />
<span class="a">www.cs.umn.edu/research/MINDS/papers/nsf_ngdm_2002.pdf</span><br />
<br />
<a href="http://www.cs.umn.edu/research/MINDS/papers/minds_chapter.pdf"><b>MINDS - Minnesota Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:_5zXQuk92QoJ:www.cs.umn.edu/research/MINDS/papers/minds_chapter.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=202&lr=lang_en">View as HTML</a><br />
Chapter 3. MINDS - Minnesota Intrusion. Detection System. Levent Ertoz. , Eric Eilertson. , Aleksandar Lazarevic. ¡. ,. Pang-Ning Tan. , Vipin Kumar ...<br />
<span class="a"> www.cs.umn.edu/research/MINDS/papers/minds_chapter.pdf</span><br />
<br />
<a href="http://crypto.stanford.edu/cs155-spring02/lecture13.pdf"><b>1 Virus Protection and Intrusion Detection Topics What is a Virus ...</b></a> -<a href="http://72.14.205.104/search?q=cache:zPIShHW5oLIJ:crypto.stanford.edu/cs155-spring02/lecture13.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=203&lr=lang_en">View as HTML</a><br />
1. Virus Protection and. Intrusion Detection. John Mitchell. Topics. u Trojans, worms, and viruses. u Virus protection. • Virus scanning methods ...<br />
<span class="a">crypto.stanford.edu/cs155-spring02/lecture13.pdf</span><br />
<br />
<a href="http://crypto.stanford.edu/cs155-spring03/lecture12.pdf"><b>Virus Protection and Intrusion Detection Topics What is a Virus ...</b></a> -<a href="http://72.14.205.104/search?q=cache:bPw4A5Q_5VUJ:crypto.stanford.edu/cs155-spring03/lecture12.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=204&lr=lang_en">View as HTML</a><br />
1. Virus Protection and. Intrusion Detection. John Mitchell. Topics. Trojans, worms, and viruses. Virus protection. • Virus scanning methods ...<br />
<span class="a">crypto.stanford.edu/cs155-spring03/lecture12.pdf</span><br />
<br />
<a href="http://www.tml.tkk.fi/Nordsec2004/Presentations/giunti.pdf"><b>Security Properties for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:xOvrJ2H8OMUJ:www.tml.tkk.fi/Nordsec2004/Presentations/giunti.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=205&lr=lang_en">View as HTML</a><br />
Security Properties for. Intrusion Detection. Marco Giunti. Universita Ca’ Foscari di Venezia. Nordsec 2004. Nordsec 2004 - Marco Giunti – p. 1/24 ...<br />
<span class="a">www.tml.tkk.fi/Nordsec2004/Presentations/giunti.pdf</span><br />
<br />
<a href="http://www.cs.kau.se/%7Esimone/Swits-IV/lundin.pdf"><b>Logging for fraud and intrusion detection Emilie Lundin Barse ...</b></a> -<a href="http://72.14.205.104/search?q=cache:d5LD6GFH-FcJ:www.cs.kau.se/%7Esimone/Swits-IV/lundin.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=206&lr=lang_en">View as HTML</a><br />
Logging for fraud and intrusion detection. Emilie Lundin Barse. Abstract:. A crucial part of intrusion or fraud detection is to have good quality ...<br />
<span class="a">www.cs.kau.se/~simone/Swits-IV/lundin.pdf</span><br />
<br />
<a href="http://www.cs.kau.se/%7Esimone/Swits-IV/karresand.pdf"><b>Intrusion Detection in Hybrid Overlay Networks (work in progress)</b></a> -<a href="http://72.14.205.104/search?q=cache:7tG82E8sF3AJ:www.cs.kau.se/%7Esimone/Swits-IV/karresand.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=207&lr=lang_en">View as HTML</a><br />
Intrusion Detection in Hybrid Overlay Networks. (work in progress). Martin Karresand. 19th May 2004. As the wireless technology matures the topology of ...<br />
<span class="a">www.cs.kau.se/~simone/Swits-IV/karresand.pdf</span><br />
<br />
<a href="http://www.verisign.co.uk/static/029805.pdf"><b>VeriSign Managed Intrusion Detection Services (IDS)</b></a> -<a href="http://72.14.205.104/search?q=cache:ON6RQMOHqbgJ:www.verisign.co.uk/static/029805.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=208&lr=lang_en">View as HTML</a><br />
DATA SHEET. On the Internet, network intruders are sophisticated navigators. They come from. outside the enterprise, attacking Internet connections, ...<br />
<span class="a">www.verisign.co.uk/static/029805.pdf</span><br />
<br />
<a href="http://www.isso.sparta.com/research/documents/anidr.pdf"><b>Active Networks Intrusion Detection and Response (AN-IDR)</b></a> -<a href="http://72.14.205.104/search?q=cache:aiS1hAw-6Z0J:www.isso.sparta.com/research/documents/anidr.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=209&lr=lang_en">View as HTML</a><br />
Active Networks Intrusion Detection and Response (AN-IDR). Overview. The Network Associates Laboratories Active Networks Intrusion ...<br />
<span class="a">www.isso.sparta.com/research/documents/anidr.pdf</span><br />
<br />
<a href="http://www.aimlearning.com/LGP%20Based%20IDS.pdf"><b>Modeling Intrusion Detection Systems Using Linear Genetic ...</b></a> -<a href="http://72.14.205.104/search?q=cache:cLrWUCVTm9YJ:www.aimlearning.com/LGP%2520Based%2520IDS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=210&lr=lang_en">View as HTML</a><br />
Modeling Intrusion Detection Systems Using Linear. Genetic Programming Approach. Srinivas Mukkamala, Andrew H. Sung, Ajith Abrham* ...<br />
<span class="a">www.aimlearning.com/LGP%20Based%20IDS.pdf</span><br />
<br />
<a href="http://www.apan.net/meetings/taipei2005/presentation/APAN_IPS_NFHUANG_0826-2005.pdf"><b>Intrusion Detection and Prevention System (IPS) – Technology ...</b></a> -<a href="http://72.14.205.104/search?q=cache:6HFbeLnlkFQJ:www.apan.net/meetings/taipei2005/presentation/APAN_IPS_NFHUANG_0826-2005.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=211&lr=lang_en">View as HTML</a><br />
2005/8/26. 1/42. Intrusion Detection and Prevention. System (IPS) – Technology,. Applications, and Trend. Dr. Nen-Fu (Fred) Huang ...<br />
<span class="a">www.apan.net/meetings/taipei2005/<wbr></wbr>presentation/APAN_IPS_NFHUANG_0826-2005.pdf</span><br />
<br />
<a href="http://www.rennes.enst-bretagne.fr/%7Efcuppens/articles/monam06.pdf"><b>Neural networks vs. decision trees for intrusion detection</b></a> -<a href="http://72.14.205.104/search?q=cache:5IibMzSOaQEJ:www.rennes.enst-bretagne.fr/%7Efcuppens/articles/monam06.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=212&lr=lang_en">View as HTML</a><br />
Neural networks vs. decision trees for intrusion. detection. Yacine Bouzida. Mitsubishi Electric ITE-TCL. 1, allee de Beaulieu CS 10806 ...<br />
<span class="a">www.rennes.enst-bretagne.fr/<wbr></wbr>~fcuppens/articles/monam06.pdf</span><br />
<br />
<a href="http://www.cs.cmu.edu/%7Ewls/isri/merideth-elephant-hicss-38.pdf"><b>Elephant: Network Intrusion Detection Systems that Don’t Forget</b></a> -<a href="http://72.14.205.104/search?q=cache:9rXOKaUAXBQJ:www.cs.cmu.edu/%7Ewls/isri/merideth-elephant-hicss-38.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=213&lr=lang_en">View as HTML</a><br />
To appear in the proceedings of the 38. th. Hawaii International Conference on System Sciences (HICSS-38). January, 2005. ...<br />
<span class="a">www.cs.cmu.edu/~wls/isri/merideth-elephant-hicss-38.pdf</span><br />
<br />
<a href="http://www.cs.cmu.edu/afs/cs.cmu.edu/user/maxion/www/pubs/TanKillourhyMaxion02.pdf"><b>Undermining an Anomaly-Based Intrusion Detection System Using ...</b></a> -<a href="http://72.14.205.104/search?q=cache:Prigl7Q5HAsJ:www.cs.cmu.edu/afs/cs.cmu.edu/user/maxion/www/pubs/TanKillourhyMaxion02.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=214&lr=lang_en">View as HTML</a><br />
Undermining an Anomaly-Based Intrusion. Detection System Using Common Exploits. Kymie M.C. Tan, Kevin S. Killourhy, and Roy A. Maxion ...<br />
<span class="a">www.cs.cmu.edu/afs/cs.cmu.edu/<wbr></wbr>user/maxion/www/pubs/TanKillourhyMaxion02.pdf</span><br />
<br />
<a href="http://www.cs.northwestern.edu/%7Ezli109/publication/icdcs06.pdf"><b>A DoS Resilient Flow-level Intrusion Detection Approach for High ...</b></a> -<a href="http://72.14.205.104/search?q=cache:9x_xGWdJxQ0J:www.cs.northwestern.edu/%7Ezli109/publication/icdcs06.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=215&lr=lang_en">View as HTML</a><br />
A DoS Resilient Flow-level Intrusion Detection Approach for. High-speed Networks. Yan Gao, Zhichun Li, Yan Chen. Department of EECS, Northwestern University ...<br />
<span class="a"> www.cs.northwestern.edu/~zli109/publication/icdcs06.pdf</span><br />
<br />
<a href="http://www.cse.lehigh.edu/%7Echuah/publications/semantics-ssn06.pdf"><b>Network Intrusion Detection with Semantics-Aware Capability</b></a> -<a href="http://72.14.205.104/search?q=cache:UWSnATqa29IJ:www.cse.lehigh.edu/%7Echuah/publications/semantics-ssn06.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=216&lr=lang_en">View as HTML</a><br />
Network Intrusion Detection with Semantics-Aware Capability. Walter Scheirer and Mooi Choo Chuah. Lehigh University. Dept. of Computer Science and ...<br />
<span class="a">www.cse.lehigh.edu/~chuah/<wbr></wbr>publications/semantics-ssn06.pdf</span><br />
<br />
<a href="http://sunset.usc.edu/gsaw/gsaw2002/s5/erlinger.pdf"><b>Creating the IETF IDWG Intrusion Detection Protocols IDMEF & IDXP</b></a><br />
Creating the IETF IDWG. Intrusion Detection Protocols. IDMEF & IDXP. Ground System Architectures Workshop. GSAW 2002. March 12-15, 2002. Joe Betser ...<br />
<span class="a">sunset.usc.edu/gsaw/gsaw2002/s5/erlinger.pdf</span><br />
<br />
<a href="http://homes.cerias.purdue.edu/%7Ezamboni/pubs/thesis-techreport.pdf"><b>USING INTERNAL SENSORS FOR COMPUTER INTRUSION DETECTION A Thesis ...</b></a><br />
USING INTERNAL SENSORS FOR. COMPUTER INTRUSION DETECTION. A Thesis. Submitted to the Faculty of. Purdue University. by Diego Zamboni. CERIAS TR 2001-42 ...<br />
<span class="a">homes.cerias.purdue.edu/<wbr></wbr>~zamboni/pubs/thesis-techreport.pdf</span><br />
<br />
<a href="http://www.enformatika.org/data/v6/v6-70.pdf"><b>Hybrid Intelligent Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:a9oWpSSurUIJ:www.enformatika.org/data/v6/v6-70.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=219&lr=lang_en">View as HTML</a><br />
Abstract—. Intrusion Detection Systems are increasingly a key. part of systems defense. Various approaches to Intrusion Detection. are currently being used, ...<br />
<span class="a">www.enformatika.org/data/v6/v6-70.pdf</span><br />
<br />
<a href="http://www.enformatika.org/data/v5/v5-27.pdf"><b>Multisensor Agent Based Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:pgiBvmynHrcJ:www.enformatika.org/data/v5/v5-27.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=220&lr=lang_en">View as HTML</a><br />
Abstract—. In this paper we propose a framework for. multisensor intrusion detection called Fuzzy Agent-Based Intrusion. Detection System. ...<br />
<span class="a">www.enformatika.org/data/v5/v5-27.pdf</span><br />
<br />
<a href="http://www.fsl.cs.sunysb.edu/docs/cost-jcs-lee/jcs_lee.pdf"><b>Toward Cost-Sensitive Modeling for Intrusion Detection and Response</b></a> -<a href="http://72.14.205.104/search?q=cache:ujtf8cd3JV8J:www.fsl.cs.sunysb.edu/docs/cost-jcs-lee/jcs_lee.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=221&lr=lang_en">View as HTML</a><br />
Toward Cost-Sensitive Modeling for Intrusion Detection and. Response. Wenke Lee. College of Computing. Georgia Institute of Technology ...<br />
<span class="a">www.fsl.cs.sunysb.edu/docs/cost-jcs-lee/jcs_lee.pdf</span><br />
<br />
<a href="http://www.xs4all.nl/%7Ercdeboer/rcdb_thesis.pdf"><b>A Generic Architecture for Fusion-Based Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:3heSnYiuJpIJ:www.xs4all.nl/%7Ercdeboer/rcdb_thesis.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=222&lr=lang_en">View as HTML</a><br />
Erasmus University Rotterdam. Rotterdam School of Economics. Master Thesis. Business Informatics (Bestuurlijke Informatica). Supervised by dr. ir. ...<br />
<span class="a">www.xs4all.nl/~rcdeboer/rcdb_thesis.pdf</span><br />
<br />
<a href="http://www.nacio.com/site/images/stories/pdfs/nacio%20product%20brief%20-%20network%20intrusion%20detection%20service.pdf"><b>Network Intrusion Detection Service</b></a><br />
PRODUCT BRIEF. Network Intrusion Detection Service. Detects and facilitates. the prevention of. network intrusions. and vulnerabilities. Includes regular ...<br />
<span class="a">www.nacio.com/.../stories/pdfs/<wbr></wbr>nacio%20product%20brief%20-%20network%20intrusion%20detection%20service.pdf</span><br />
<br />
<a href="http://www-sop.inria.fr/coprin/Congress/ISDG06/Abstract/alpcan.pdf"><b>An Intrusion Detection Game with Limited Observations</b></a> -<a href="http://72.14.205.104/search?q=cache:QOs-bhsDvZUJ:www-sop.inria.fr/coprin/Congress/ISDG06/Abstract/alpcan.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=224&lr=lang_en">View as HTML</a><br />
An Intrusion Detection Game. with Limited Observations. Tansu Alpcan. 1. and Tamer Basar. 1. Keywords: Non-zero-sum games, stochastic games, system security ...<br />
<span class="a">www-sop.inria.fr/coprin/<wbr></wbr>Congress/ISDG06/Abstract/alpcan.pdf</span><br />
<br />
<a href="http://www.cs.ubbcluj.ro/%7Ecgrosan/kerala.pdf"><b>Cyber Security and the Evolution of Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:z8a7WS1tkUUJ:www.cs.ubbcluj.ro/%7Ecgrosan/kerala.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=225&lr=lang_en">View as HTML</a><br />
2. , Yuehui Chen. 3. School of Computer Science and Engineering, Chung-Ang University, Korea. 2. Department of Computer Science ...<br />
<span class="a">www.cs.ubbcluj.ro/~cgrosan/kerala.pdf</span><br />
<br />
<a href="http://www.cs.ucr.edu/%7Eroccc/papers/ARC-2006-Bloom.pdf"><b>Automatic compilation framework for Bloom filter based intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:i09FZkk1pK8J:www.cs.ucr.edu/%7Eroccc/papers/ARC-2006-Bloom.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=226&lr=lang_en">View as HTML</a><br />
Automatic compilation framework for Bloom filter based. intrusion detection. Dinesh C Suresh, Zhi Guo*, Betul Buyukkurt and Walid A. Najjar ...<br />
<span class="a">www.cs.ucr.edu/~roccc/papers/ARC-2006-Bloom.pdf</span><br />
<br />
<a href="http://ce.et.tudelft.nl/publicationfiles/1201_564_ancs5169-sourdis.pdf"><b>Packet Pre-filtering for Network Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:8DujvPEWbSgJ:ce.et.tudelft.nl/publicationfiles/1201_564_ancs5169-sourdis.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=227&lr=lang_en">View as HTML</a><br />
Packet Pre-filtering for Network Intrusion Detection. Ioannis Sourdis,. ∗. Vasilis Dimopoulos,. ♯. Dionisios Pnevmatikatos,. ♯‡. Stamatis Vassiliadis ...<br />
<span class="a">ce.et.tudelft.nl/publicationfiles/<wbr></wbr>1201_564_ancs5169-sourdis.pdf</span><br />
<br />
<a href="http://www.projects.ncassr.org/sift/papers/lcn02.pdf"><b>Controlling Intrusion Detection Systems by Generating False ...</b></a> -<a href="http://72.14.205.104/search?q=cache:ApYJ96rhiCUJ:www.projects.ncassr.org/sift/papers/lcn02.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=228&lr=lang_en">View as HTML</a><br />
Controlling Intrusion Detection Systems by Generating False Positives:. Squealing Proof-of-Concept. William Yurcik. 1. National Center for Supercomputing ...<br />
<span class="a">www.projects.ncassr.org/sift/papers/lcn02.pdf</span><br />
<br />
<a href="http://4lx.free.fr/articles/CM02.pdf"><b>Alert Correlation in a Cooperative Intrusion Detection Framework</b></a> -<a href="http://72.14.205.104/search?q=cache:-fquKAAi7PIJ:4lx.free.fr/articles/CM02.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=229&lr=lang_en">View as HTML</a><br />
Alert Correlation in a Cooperative Intrusion Detection Framework. Frédéric Cuppens Alexandre Miège. ONERA Centre de Toulouse. 2, av. Edouard Belin ...<br />
<span class="a">4lx.free.fr/articles/CM02.pdf</span><br />
<br />
<a href="http://www.research.umbc.edu/%7Elutters/pubs/2004_CHI_LBR_Komlodi,Goodall,Lutters.pdf"><b>An Information Visualization Framework for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:3LD3DUGpqtMJ:www.research.umbc.edu/%7Elutters/pubs/2004_CHI_LBR_Komlodi,Goodall,Lutters.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=230&lr=lang_en">View as HTML</a><br />
1743. An Information Visualization Framework. for Intrusion Detection. Anita Komlodi, John R. Goodall, Wayne G. Lutters. Department of Information Systems, ...<br />
<span class="a"> www.research.umbc.edu/~lutters/<wbr></wbr>pubs/2004_CHI_LBR_Komlodi,Goodall,Lutters.pdf</span><br />
<br />
<a href="http://www.research.umbc.edu/%7Elutters/pubs/2004_AMCIS_Note_Goodall,Lutters,Komlodi.pdf"><b>The Work of Intrusion Detection: Rethinking the Role of Security ...</b></a> -<a href="http://72.14.205.104/search?q=cache:EKkuCdEgZ_IJ:www.research.umbc.edu/%7Elutters/pubs/2004_AMCIS_Note_Goodall,Lutters,Komlodi.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=231&lr=lang_en">View as HTML</a><br />
Goodall et al. The Work of Intrusion Detection. The Work of Intrusion Detection:. Rethinking the Role of Security Analysts. John R. Goodall ...<br />
<span class="a">www.research.umbc.edu/~lutters/<wbr></wbr>pubs/2004_AMCIS_Note_Goodall,Lutters,Komlodi.pdf</span><br />
<br />
<a href="http://www-users.cs.umn.edu/%7Ealeks/sdm04w/yli.pdf"><b>Correlation between NetFlow System and Network Views for Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:s45EzNCY0aAJ:www-users.cs.umn.edu/%7Ealeks/sdm04w/yli.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=232&lr=lang_en">View as HTML</a><br />
National Center for Supercomputing Applications. Correlation between NetFlow System and. Network Views for Intrusion Detection. Cristina Abad, Yifan Li*, ...<br />
<span class="a">www-users.cs.umn.edu/~aleks/sdm04w/yli.pdf</span><br />
<br />
<a href="http://www.cs.umd.edu/%7Ewaa/pubs/komoku.pdf"><b>Using Independent Auditors as Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:9jokl4A8cCsJ:www.cs.umd.edu/%7Ewaa/pubs/komoku.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=233&lr=lang_en">View as HTML</a><br />
Using Independent Auditors. as Intrusion Detection Systems. Jesus Molina and William Arbaugh. Department of Computer Science. University of Maryland ...<br />
<span class="a">www.cs.umd.edu/~waa/pubs/komoku.pdf</span><br />
<br />
<a href="http://www.cerias.purdue.edu/symposium/2001/posters/post_36.pdf"><b>“Interest”ing Intrusion Detection Motivation</b></a> -<a href="http://72.14.205.104/search?q=cache:1ZdY-LxWcWoJ:www.cerias.purdue.edu/symposium/2001/posters/post_36.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=234&lr=lang_en">View as HTML</a><br />
1. “Interest”ing Intrusion Detection. Rajeev Gopalakrishna. And. Gene Spafford. Motivation. • Concept of agents to perform intrusion. detection ...<br />
<span class="a">www.cerias.purdue.edu/<wbr></wbr>symposium/2001/posters/post_36.pdf</span><br />
<br />
<a href="http://www.cs.nott.ac.uk/%7Euxa/papers/04acdm_jools.pdf"><b>DETECTING DANGER: APPLYING A NOVEL IMMUNOLOGICAL CONCEPT TO ...</b></a> -<a href="http://72.14.205.104/search?q=cache:osFNJ6K-b7AJ:www.cs.nott.ac.uk/%7Euxa/papers/04acdm_jools.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=235&lr=lang_en">View as HTML</a><br />
Poster Proceedings of ACDM 2004. Engineers’ House, Bristol, UK. DETECTING DANGER: APPLYING A NOVEL IMMUNOLOGICAL CONCEPT TO. INTRUSION DETECTION SYSTEMS ...<br />
<span class="a">www.cs.nott.ac.uk/~uxa/papers/04acdm_jools.pdf</span><br />
<br />
<a href="http://www.cs.columbia.edu/techreports/cucs-035-99.pdf"><b>Learning Cost-Sensitve Classification Rules for Network Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:_ns43v5gSIIJ:www.cs.columbia.edu/techreports/cucs-035-99.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=236&lr=lang_en">View as HTML</a><br />
Learning Cost-Sensitve Classification Rules for. Network Intrusion Detection using RIPPER. Technical Report CUCS-035-1999 ...<br />
<span class="a">www.cs.columbia.edu/techreports/cucs-035-99.pdf</span><br />
<br />
<a href="http://www.netoptics.com/products/pdf/Taps-and-IDSs.pdf"><b>White Paper: Deploying Network Taps with Intrusion Detection Systems</b></a><br />
White Paper: Deploying Network Taps. with Intrusion Detection Systems. -1-. Executive Summary. Network Security is a large and growing area of concern for ...<br />
<span class="a">www.netoptics.com/products/pdf/Taps-and-IDSs.pdf</span><br />
<br />
<a href="http://www.ist-scampi.org/publications/papers/antonatos-saint2004.pdf"><b>Performance Analysis of Content Matching Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:dRRcRKCo6Z8J:www.ist-scampi.org/publications/papers/antonatos-saint2004.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=238&lr=lang_en">View as HTML</a><br />
Performance Analysis of Content Matching Intrusion Detection Systems. S. Antonatos. ⋆. , K. G. Anagnostakis. †. , E. P. Markatos. ⋆. , M. Polychronakis ...<br />
<span class="a">www.ist-scampi.org/publications/<wbr></wbr>papers/antonatos-saint2004.pdf</span><br />
<br />
<a href="http://www.cs.vu.nl/%7Eherbertb/papers/trixpid.pdf"><b>A network intrusion detection system on IXP1200 network processors ...</b></a> -<a href="http://72.14.205.104/search?q=cache:4vFjfEhWPMwJ:www.cs.vu.nl/%7Eherbertb/papers/trixpid.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=239&lr=lang_en">View as HTML</a><br />
A network intrusion detection system on IXP1200 network. processors with support for large rule sets. (Technical Report 2004-02). Herbert Bos. Kaiming Huang ...<br />
<span class="a">www.cs.vu.nl/~herbertb/papers/trixpid.pdf</span><br />
<br />
<a href="http://www.netmode.ntua.gr/papers/gandr/hpovua04-netmode.pdf"><b>A Distributed Intrusion Detection Prototype using Security Agents</b></a> -<a href="http://72.14.205.104/search?q=cache:rj5DA6qTLIkJ:www.netmode.ntua.gr/papers/gandr/hpovua04-netmode.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=240&lr=lang_en">View as HTML</a><br />
A Distributed Intrusion Detection Prototype. using Security Agents. V. Chatzigiannakis, G. Androulidakis, M. Grammatikou, B. Maglaris ...<br />
<span class="a">www.netmode.ntua.gr/papers/gandr/hpovua04-netmode.pdf</span><br />
<br />
<a href="http://www.auto.tuwien.ac.at/%7Echris/research/doc/2001_01.pdf"><b>Applying Mobile Agent Technology to Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:7jiSwBUDxAMJ:www.auto.tuwien.ac.at/%7Echris/research/doc/2001_01.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=241&lr=lang_en">View as HTML</a><br />
Applying Mobile Agent Technology. to Intrusion Detection. Christopher Krugel. chris@infosys.tuwien.ac.at. Thomas Toth. ttoth@infosys.tuwien.ac.at ...<br />
<span class="a">www.auto.tuwien.ac.at/~chris/research/doc/2001_01.pdf</span><br />
<br />
<a href="http://www.sun.com/servicelist/ss/mssintrusionmonitoring-us-eng-20040723.pdf"><b>MSS-Monitored Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:TTQ8uPJK4SwJ:www.sun.com/servicelist/ss/mssintrusionmonitoring-us-eng-20040723.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=242&lr=lang_en">View as HTML</a><br />
SUN MONITORED INTRUSION DETECTION SYSTEM (IDS) SERVICE. United States. 1. S. COPE. This Service provides Customer with, and consists of, monitoring by Sun ...<br />
<span class="a">www.sun.com/servicelist/ss/<wbr></wbr>mssintrusionmonitoring-us-eng-20040723.pdf</span><br />
<br />
<a href="http://www.sun.com/servicelist/ss/mssintrusionmgmt-us-eng-20040723.pdf"><b>MSS-Managed Intrusion Detection System Services</b></a> -<a href="http://72.14.205.104/search?q=cache:TUGad2O0AW4J:www.sun.com/servicelist/ss/mssintrusionmgmt-us-eng-20040723.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=243&lr=lang_en">View as HTML</a><br />
SUN MANAGED INTRUSION DETECTION SYSTEM SERVICES (IDS). United States. 1. S. COPE. This Service provides Customer with, and consists of, management and ...<br />
<span class="a">www.sun.com/servicelist/ss/<wbr></wbr>mssintrusionmgmt-us-eng-20040723.pdf</span><br />
<br />
<a href="http://www.inixindosurabaya.com/download/sylabus/cisco/Cisco%20Secure%20Intrusion%20Detection%20System%20-%20v0202e.pdf"><b>Cisco Secure Intrusion Detection System (CSIDS)</b></a> -<a href="http://72.14.205.104/search?q=cache:eC1mC_0YhYEJ:www.inixindosurabaya.com/download/sylabus/cisco/Cisco%2520Secure%2520Intrusion%2520Detection%2520System%2520-%2520v0202e.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=244&lr=lang_en">View as HTML</a><br />
Cisco Secure Intrusion Detection System. (CSIDS). COURSE DESCRIPTION. Cisco Secure Intrusion Detection System (CSIDS) is a lab intensive course ...<br />
<span class="a">www.inixindosurabaya.com/.../sylabus/cisco/<wbr></wbr>Cisco%20Secure%20Intrusion%20Detection%20System%20-%20v0202e.pdf</span><br />
<br />
<a href="http://emarketing.propoint.com/propoint/outline/CSIDS_ftr.pdf"><b>Cisco® Secure Intrusion Detection System (CSIDS)*</b></a> -<a href="http://72.14.205.104/search?q=cache:LK6Pgm25TOgJ:emarketing.propoint.com/propoint/outline/CSIDS_ftr.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=245&lr=lang_en">View as HTML</a><br />
Cisco® Secure Intrusion Detection System (CSIDS)*. (4 day Instructor-Led Course). Course Overview. Gain the knowledge and skills needed to design, ...<br />
<span class="a"> emarketing.propoint.com/propoint/outline/CSIDS_ftr.pdf</span><br />
<br />
<a href="http://www.ll.mit.edu/IST/pubs/discex2000-rpl-paper.pdf"><b>Evaluating Intrusion Detection Systems: The 1998 DARPA Off-line ...</b></a> -<a href="http://72.14.205.104/search?q=cache:-5mkmzKs3tAJ:www.ll.mit.edu/IST/pubs/discex2000-rpl-paper.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=246&lr=lang_en">View as HTML</a><br />
1. Evaluating Intrusion Detection Systems:. The 1998 DARPA Off-line Intrusion Detection Evaluation*. Richard P. Lippmann, David J. Fried, Isaac Graf, ...<br />
<span class="a">www.ll.mit.edu/IST/pubs/discex2000-rpl-paper.pdf</span><br />
<br />
<a href="http://www.ncs.gov/nstac/reports/1997/FIDSGREP.pdf"><b>NETWORK GROUP INTRUSION DETECTION SUBGROUP REPORT Report on the NS ...</b></a> -<a href="http://72.14.205.104/search?q=cache:TyaEm8Sp4DMJ:www.ncs.gov/nstac/reports/1997/FIDSGREP.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=247&lr=lang_en">View as HTML</a><br />
THE PRESIDENT’S. NATIONAL SECURITY TELECOMMUNICATIONS. ADVISORY COMMITTEE. NETWORK GROUP. INTRUSION DETECTION SUBGROUP ...<br />
<span class="a">www.ncs.gov/nstac/reports/1997/FIDSGREP.pdf</span><br />
<br />
<a href="http://www.eng.miami.edu/%7Eshyu/Paper/2006/SUTC06.pdf"><b>A Distributed Agent-Based Approach to Intrusion Detection Using ...</b></a> -<a href="http://72.14.205.104/search?q=cache:HQmuCCccHFQJ:www.eng.miami.edu/%7Eshyu/Paper/2006/SUTC06.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=248&lr=lang_en">View as HTML</a><br />
A Distributed Agent-Based Approach to Intrusion Detection Using the. Lightweight PCC Anomaly Detection Classifier. Zongxing Xie, Thiago Quirino, ...<br />
<span class="a">www.eng.miami.edu/~shyu/Paper/2006/SUTC06.pdf</span><br />
<br />
<a href="http://www.eng.miami.edu/%7Eshyu/Paper/2005/SDMA05.pdf"><b>Handling Nominal Features in Anomaly Intrusion Detection Problems</b></a> -<a href="http://72.14.205.104/search?q=cache:3nreUg2SwGgJ:www.eng.miami.edu/%7Eshyu/Paper/2005/SDMA05.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=249&lr=lang_en">View as HTML</a><br />
Handling Nominal Features in Anomaly Intrusion Detection Problems. Mei-Ling Shyu. 1. , Kanoksri Sarinnapakorn. 1. , Indika Kuruppu-Appuhamilage ...<br />
<span class="a">www.eng.miami.edu/~shyu/Paper/2005/SDMA05.pdf</span><br />
<br />
<a href="http://www.csse.monash.edu.au/research/san/An_Intrusion_Detection_System_for_Suburban_Ad-hoc_Networks.pdf"><b>An Intrusion Detection System for Suburban Ad-hoc Networks</b></a> -<a href="http://72.14.205.104/search?q=cache:OU_ecxfx_WcJ:www.csse.monash.edu.au/research/san/An_Intrusion_Detection_System_for_Suburban_Ad-hoc_Networks.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=250&lr=lang_en">View as HTML</a><br />
An Intrusion Detection System for Suburban Ad-hoc. Networks. Muhammad Mahmudul Islam, Ronald Pose and Carlo Kopp. School of Computer Science and Software ...<br />
<span class="a"> www.csse.monash.edu.au/research/san/An_<wbr></wbr>Intrusion_Detection_System_for_Suburban_Ad-hoc_Networks.pdf</span><br />
<br />
<a href="http://www.niksula.hut.fi/%7Emdobruck/thesis/thesis.pdf"><b>Priorities in the deployment of network intrusion detection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:l20QS--cfGIJ:www.niksula.hut.fi/%7Emdobruck/thesis/thesis.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=251&lr=lang_en">View as HTML</a><br />
Priorities in the deployment of network. intrusion detection systems. Master’s Thesis. Marcin Dobrucki. Helsinki University of Technology ...<br />
<span class="a">www.niksula.hut.fi/~mdobruck/thesis/thesis.pdf</span><br />
<br />
<a href="https://www.cs.tcd.ie/publications/tech-reports/reports.03/TCD-CS-2003-54.pdf"><b>Real-time Intrusion Detection for Ad hoc Networks</b></a> -<a href="http://72.14.205.104/search?q=cache:lk5CWfXURLkJ:https://www.cs.tcd.ie/publications/tech-reports/reports.03/TCD-CS-2003-54.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=252&lr=lang_en">View as HTML</a><br />
Real-time Intrusion Detection for Ad hoc Networks. Ioanna Stamouli. A dissertation submitted to the University of Dublin, in partial fulfilment of ...<br />
<span class="a"> https://www.cs.tcd.ie/publications/<wbr></wbr>tech-reports/reports.03/TCD-CS-2003-54.pdf</span><br />
<br />
<a href="http://www.teja.com/content/5276_IntrusDataSht.pdf"><b>Teja NP Intrusion Detection System Application</b></a> -<a href="http://72.14.205.104/search?q=cache:FYilh9B6o7oJ:www.teja.com/content/5276_IntrusDataSht.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=253&lr=lang_en">View as HTML</a><br />
(Preliminary). Intrusion detection technology provides the critical alerts necessary to identify. and ultimately prevent attacks threatening the security of ...<br />
<span class="a">www.teja.com/content/5276_IntrusDataSht.pdf</span><br />
<br />
<a href="http://www.cs.hut.fi/%7Ejtjuslin/OREILLY_v2.pdf"><b>Intrusion Detection and Visualization Using Perl</b></a> -<a href="http://72.14.205.104/search?q=cache:9Ivg3JDVqZcJ:www.cs.hut.fi/%7Ejtjuslin/OREILLY_v2.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=254&lr=lang_en">View as HTML</a><br />
Intrusion Detection and Visualization Using Perl, slide 1. Jukka Juslin 7-23-2001. Lightning Talk. O’Reilly Open Source Convention. San Diego. California ...<br />
<span class="a">www.cs.hut.fi/~jtjuslin/OREILLY_v2.pdf</span><br />
<br />
<a href="http://newsroom.spie.org/documents/Imported/282/2006090282.pdf"><b>An intrusion detection system based on immune mechanisms</b></a> -<a href="http://72.14.205.104/search?q=cache:Ffm9MvjzjKgJ:newsroom.spie.org/documents/Imported/282/2006090282.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=255&lr=lang_en">View as HTML</a><br />
SPIE Newsroom. 10.1117/2.1200609.0282. An intrusion detection system. based on immune mechanisms. Yan Qiao. Bio-inspired approach affords better protection ...<br />
<span class="a"> newsroom.spie.org/documents/Imported/282/2006090282.pdf</span><br />
<br />
<a href="http://ietfec.oxfordjournals.org/cgi/reprint/E89-A/6/1630.pdf"><b>A Novel Intelligent Intrusion Detection, Decision, Response System</b></a><br />
1630. IEICE TRANS. FUNDAMENTALS, VOL.E89–A, NO.6 JUNE 2006. PAPER. Special Section on Papers Selected from ITC-CSCC 2005 ...<br />
<span class="a">ietfec.oxfordjournals.org/cgi/reprint/E89-A/6/1630.pdf</span><br />
<br />
<a href="http://glass.cs.unb.ca/ias/papers/ymeans-ai03.pdf"><b>AN UNSUPERVISED CLUSTERING ALGORITHM FOR INTRUSION DETECTION</b></a> -<a href="http://72.14.205.104/search?q=cache:UsGs1fYPgAAJ:glass.cs.unb.ca/ias/papers/ymeans-ai03.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=257&lr=lang_en">View as HTML</a><br />
AN UNSUPERVISED CLUSTERING. ALGORITHM FOR INTRUSION DETECTION. Yu Guan. 1. , Ali A. Ghorbani. 1. , and Nabil Belacel. 2. 1. Faculty of Computer Science ...<br />
<span class="a">glass.cs.unb.ca/ias/papers/ymeans-ai03.pdf</span><br />
<br />
<a href="http://www.cutr.usf.edu/bussafety/documents/tcrp-86v4.pdf"><b>Intrusion Detection for Public Transportation Facilities Handbook ...</b></a><br />
TRANSIT. COOPERATIVE. T. RESEARCH. RESEARCH. PROGRAM. Sponsored by. the Federal. e. Transit. r. Administration. A. Public Transportation Security. Volume 4 ...<br />
<span class="a">www.cutr.usf.edu/bussafety/documents/tcrp-86v4.pdf</span><br />
<br />
<a href="http://multimedia.ece.uic.edu/FIT03/Day-1/S12/p1.pdf"><b>MINDS – Data Mining based Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:1CqfzubuplwJ:multimedia.ece.uic.edu/FIT03/Day-1/S12/p1.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=259&lr=lang_en">View as HTML</a><br />
MINDS – Data Mining based Intrusion Detection System. Levent Ertöz. 1. , Eric Eilertson. 1. , Aleksandar Lazarevic. 1. , Pang-Ning Tan ...<br />
<span class="a">multimedia.ece.uic.edu/FIT03/Day-1/S12/p1.pdf</span><br />
<br />
<a href="http://halcyon.usc.edu/%7Epk/prasannawebsite/papers/zbakerFPL04.pdf"><b>Automatic Synthesis of Efficient Intrusion Detection Systems on FPGAs</b></a> -<a href="http://72.14.205.104/search?q=cache:pAKa_eFmGX0J:halcyon.usc.edu/%7Epk/prasannawebsite/papers/zbakerFPL04.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=260&lr=lang_en">View as HTML</a><br />
Automatic Synthesis of Efficient Intrusion. Detection Systems on FPGAs. Zachary K. Baker and Viktor K. Prasanna. University of Southern California, ...<br />
<span class="a">halcyon.usc.edu/~pk/prasannawebsite/<wbr></wbr>papers/zbakerFPL04.pdf</span><br />
<br />
<a href="http://www.openbsdsupport.org/usenix-usebsd-nids.pdf"><b>Using OpenBSD and Snort to build ready to roll Network Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:OF1_d9bHouEJ:www.openbsdsupport.org/usenix-usebsd-nids.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=261&lr=lang_en">View as HTML</a><br />
Using OpenBSD and Snort. to build ready to roll Network. Intrusion Detection System. Sensor. USENIX'04 / UseBSD. Tuesday, June 29, 2004 ...<br />
<span class="a">www.openbsdsupport.org/usenix-usebsd-nids.pdf</span><br />
<br />
<a href="http://www.sreis.org/old/2001/papers/sreis013.pdf"><b>Adapting Safety Requirements Analysis to Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:Dvyn2rJwVs4J:www.sreis.org/old/2001/papers/sreis013.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=262&lr=lang_en">View as HTML</a><br />
Adapting Safety Requirements Analysis to Intrusion Detection. Robyn R. Lutz. Jet Propulsion Laboratory, and. Department of Computer Science ...<br />
<span class="a">www.sreis.org/old/2001/papers/sreis013.pdf</span><br />
<br />
<a href="http://mithras.itworld.com/download/book_chapters_and_wps/intrusion_detection/Intrusion_c01.pdf"><b>Understanding Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:nSzjxHG713sJ:mithras.itworld.com/download/book_chapters_and_wps/intrusion_detection/Intrusion_c01.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=263&lr=lang_en">View as HTML</a><br />
CHAPTER. 1. Understanding. Intrusion Detection. 3. Hacking Incident / Intrusion Detection & Prevention / Endorf, Schultz, Mellander / 222954-3 / Chapter 1 ...<br />
<span class="a"> mithras.itworld.com/download/book_chapters_and_wps/<wbr></wbr>intrusion_detection/Intrusion_c01.pdf</span><br />
<br />
<a href="http://crpit.com/confpapers/CRPITV38Leung.pdf"><b>Unsupervised Anomaly Detection in Network Intrusion Detection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:xYidQQAOCwMJ:crpit.com/confpapers/CRPITV38Leung.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=264&lr=lang_en">View as HTML</a><br />
Unsupervised Anomaly Detection in Network Intrusion Detection. Using Clusters. Kingsly Leung. Christopher Leckie †. †NICTA Victoria Laboratory ...<br />
<span class="a">crpit.com/confpapers/CRPITV38Leung.pdf</span><br />
<br />
<a href="http://www.ieee-infocom.org/2004/Papers/54_5.pdf"><b>Deterministic Memory-Efficient String Matching Algorithms for ...</b></a> -<a href="http://72.14.205.104/search?q=cache:AN8oRZYVqqsJ:www.ieee-infocom.org/2004/Papers/54_5.PDF+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=265&lr=lang_en">View as HTML</a><br />
Deterministic Memory-Efficient String Matching. Algorithms for Intrusion Detection. Nathan Tuck. †. Timothy Sherwood. ‡. Brad Calder. †. George Varghese ...<br />
<span class="a">www.ieee-infocom.org/2004/Papers/54_5.PDF</span><br />
<br />
<a href="http://www.osti.gov/bridge/servlets/purl/764840-doIlzA/webviewable/764840.pdf"><b>Intrusion detection considerations for switched networks</b></a> -<a href="http://72.14.205.104/search?q=cache:x997q1mIhFEJ:www.osti.gov/bridge/servlets/purl/764840-doIlzA/webviewable/764840.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=266&lr=lang_en">View as HTML</a><br />
Intrusion detection considerations for switched networks. Thomas D. Tarman and Edward L. Witzke. Advanced Networking Integration Department ...<br />
<span class="a">www.osti.gov/bridge/servlets/<wbr></wbr>purl/764840-doIlzA/webviewable/764840.pdf</span><br />
<br />
<a href="http://www.cs.utexas.edu/%7Emoore/acl2/workshop-2003/contrib/tsong/shim.pdf"><b>Using ACL2 to Verify Security Properties of Specification- based ...</b></a> -<a href="http://72.14.205.104/search?q=cache:y34PtZuT1RYJ:www.cs.utexas.edu/%7Emoore/acl2/workshop-2003/contrib/tsong/shim.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=267&lr=lang_en">View as HTML</a><br />
Using ACL2 to Verify Security Properties of Specification-. based Intrusion Detection Systems. Tao Song. 1. , Jim Alves-Foss ...<br />
<span class="a">www.cs.utexas.edu/~moore/acl2/<wbr></wbr>workshop-2003/contrib/tsong/shim.pdf</span><br />
<br />
<a href="http://home.jwu.edu/jwright/papers/l2-wlan-ids.pdf"><b>Layer 2 Analysis of WLAN Discovery Applications for Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:_kgNKCTWb6oJ:home.jwu.edu/jwright/papers/l2-wlan-ids.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=268&lr=lang_en">View as HTML</a><br />
Copyright © 2002, Joshua Wright. All rights reserved. 1 of 13. Layer 2 Analysis of WLAN Discovery Applications for Intrusion Detection ...<br />
<span class="a">home.jwu.edu/jwright/papers/l2-wlan-ids.pdf</span><br />
<br />
<a href="http://www.cs.ucsd.edu/%7Ecalder/papers/INFOCOM-04-IDS.pdf"><b>Deterministic Memory-Efficient String Matching Algorithms for ...</b></a> -<a href="http://72.14.205.104/search?q=cache:6Ur1juWujuEJ:www.cs.ucsd.edu/%7Ecalder/papers/INFOCOM-04-IDS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=269&lr=lang_en">View as HTML</a><br />
1. Deterministic Memory-Efficient String Matching. Algorithms for Intrusion Detection. Nathan Tuck. †. Timothy Sherwood. ‡. Brad Calder. †. George Varghese ...<br />
<span class="a">www.cs.ucsd.edu/~calder/papers/INFOCOM-04-IDS.pdf</span><br />
<br />
<a href="https://www.csg.unizh.ch/staff/schaffrath/NIDSEnc_FoF.pdf"><b>Network Intrusion Detection Systems & Encryption: Friends or Foes?</b></a> -<a href="http://72.14.205.104/search?q=cache:VMH1VfDEfMgJ:https://www.csg.unizh.ch/staff/schaffrath/NIDSEnc_FoF.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=270&lr=lang_en">View as HTML</a><br />
Background. Problem. Approaches. Discussion. Network Intrusion Detection Systems &. Encryption: Friends or Foes? Gregor Schaffrath ...<br />
<span class="a">https://www.csg.unizh.ch/<wbr></wbr>staff/schaffrath/NIDSEnc_FoF.pdf</span><br />
<br />
<a href="http://www.security-gurus.de/papers/anomaly_rules_def.pdf"><b>Rules definition for anomaly based intrusion detection</b></a> -<a href="http://72.14.205.104/search?q=cache:2DOCTJAQwIQJ:www.security-gurus.de/papers/anomaly_rules_def.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=271&lr=lang_en">View as HTML</a><br />
Rules definition for anomaly based intrusion detection © 2002-2003 Lubomir Nistor. 2. Introduction. Intrusion detection systems (IDS) are one of the fastest ...<br />
<span class="a"> www.security-gurus.de/papers/anomaly_rules_def.pdf</span><br />
<br />
<a href="http://cybertrain.labworks.org/conferences/april2005/Acampora_Joseph_XML-DNR.pdf"><b>XML-DNR: A Bandwidth-Saving Technique For Distributed Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:XDb7eDs7V7AJ:cybertrain.labworks.org/conferences/april2005/Acampora_Joseph_XML-DNR.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=272&lr=lang_en">View as HTML</a><br />
XML-DNR:. A Bandwidth-Saving Technique For Distributed Intrusion. Detection Systems. Joseph Acampora. School of Computer Science and Information Systems ...<br />
<span class="a"> cybertrain.labworks.org/conferences/<wbr></wbr>april2005/Acampora_Joseph_XML-DNR.pdf</span><br />
<br />
<a href="http://www.eecs.umich.edu/techreports/cse/2004/CSE-TR-493-04.pdf"><b>CIDS: Causality-based Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:BgVdrq7-6KYJ:www.eecs.umich.edu/techreports/cse/2004/CSE-TR-493-04.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=273&lr=lang_en">View as HTML</a><br />
1. CIDS: Causality-based Intrusion Detection System. Samuel T. King, Z. Morley Mao, and Peter M. Chen. Department of Electrical Engineering and Computer ...<br />
<span class="a">www.eecs.umich.edu/techreports/<wbr></wbr>cse/2004/CSE-TR-493-04.pdf</span><br />
<br />
<a href="http://www.cs.washington.edu/homes/roxana/pdfs/nids_dbms-tech06.pdf"><b>Exploiting History in a Network Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:n2DH5GNLgb0J:www.cs.washington.edu/homes/roxana/pdfs/nids_dbms-tech06.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=274&lr=lang_en">View as HTML</a><br />
Exploiting History in a Network Intrusion Detection System. Roxana Geambasu, Tanya Bragin. University of Washington. Abstract ...<br />
<span class="a">www.cs.washington.edu/homes/<wbr></wbr>roxana/pdfs/nids_dbms-tech06.pdf</span><br />
<br />
<a href="http://www.cigital.com/papers/download/usenix_id99.pdf"><b>Learning Program Behavior Proles for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:Rv4sf5OLIeAJ:www.cigital.com/papers/download/usenix_id99.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=275&lr=lang_en">View as HTML</a><br />
Learning Program Behavior Proles for Intrusion Detection. Anup K. Ghosh, Aaron Schwartzbard & Michael Schatz. Reliable Software Technologies Corporation ...<br />
<span class="a">www.cigital.com/papers/download/usenix_id99.pdf</span><br />
<br />
<a href="http://www.cs.stonybrook.edu/skm2006/papers/paper/paper14.pdf"><b>Optimal Configuration of Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:7YOyopSadCgJ:www.cs.stonybrook.edu/skm2006/papers/paper/paper14.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=276&lr=lang_en">View as HTML</a><br />
Optimal Configuration of Intrusion Detection Systems, Cavusoglu, Mishra and Raghunathan. 1. Abstract—An important requirement of an Intrusion Detection ...<br />
<span class="a"> www.cs.stonybrook.edu/skm2006/papers/paper/paper14.pdf</span><br />
<br />
<a href="http://www.cse.unl.edu/%7Eelbaum/papers/workshops/IntrusionDetection99.pdf"><b>Intrusion Detection through Dynamic Software Measurement</b></a> -<a href="http://72.14.205.104/search?q=cache:jwUxRlGMMxgJ:www.cse.unl.edu/%7Eelbaum/papers/workshops/IntrusionDetection99.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=277&lr=lang_en">View as HTML</a><br />
Intrusion Detection through Dynamic Software Measurement. Sebastian Elbaum. John C. Munson. Computer Science Department. University of Idaho ...<br />
<span class="a">www.cse.unl.edu/~elbaum/papers/<wbr></wbr>workshops/IntrusionDetection99.pdf</span><br />
<br />
<a href="http://www.vs.inf.ethz.ch/res/papers/vogt05recovery.pdf"><b>Intrusion Detection and Failure Recovery in Sensor Nodes</b></a> -<a href="http://72.14.205.104/search?q=cache:SIBO7H9sW8IJ:www.vs.inf.ethz.ch/res/papers/vogt05recovery.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=278&lr=lang_en">View as HTML</a><br />
Intrusion Detection and Failure Recovery in Sensor Nodes. Harald Vogt, Matthias Ringwald, Mario Strasser. Institute for Pervasive Computing ...<br />
<span class="a">www.vs.inf.ethz.ch/res/papers/vogt05recovery.pdf</span><br />
<br />
<a href="http://www.fortinet.co.th/doc/ServiceDS.pdf"><b>• Antivirus • Web Filtering • Intrusion Detection & Prevention ...</b></a> -<a href="http://72.14.205.104/search?q=cache:ELCjZ252KlkJ:www.fortinet.co.th/doc/ServiceDS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=279&lr=lang_en">View as HTML</a><br />
Antivirus. • Web Filtering. • Intrusion Detection & Prevention. • Antispam. F O R T I G U A R D S U B S C R I P T I O N S E R V I C E S ...<br />
<span class="a">www.fortinet.co.th/doc/ServiceDS.pdf</span><br />
<br />
<a href="http://www.springerlink.com/index/CX4A3A2PU94RR0JQ.pdf"><b>Comparison of BPL and RBF Network in Intrusion Detection System</b></a><br />
Comparison of BPL and RBF Network in. Intrusion Detection System. Chunlin Zhang, Ju Jiang, and Mohamed Kamel. Pattern Analysis and Machine Intelligence ...<br />
<span class="a">www.springerlink.com/index/CX4A3A2PU94RR0JQ.pdf</span><br />
<br />
<a href="http://www.kavado.com/pdf/Defiance_Monitor_Datasheet.pdf"><b>APPLICATION-LAYER INTRUSION DETECTION NON-INTRUSIVE MONITORING ...</b></a> -<a href="http://72.14.205.104/search?q=cache:GDpPDvm2uPcJ:www.kavado.com/pdf/Defiance_Monitor_Datasheet.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=281&lr=lang_en">View as HTML</a><br />
H. A C K E R. S. AV V Y . E. N T E R P R I S E. S. M A R T . Defiance™ Monitor is the first policy-based Web application. Intrusion Detection System (IDS) ...<br />
<span class="a">www.kavado.com/pdf/Defiance_Monitor_Datasheet.pdf</span><br />
<br />
<a href="http://www.k2defender.com/products/Rising_to_the_Challenge_Moving_from_Intrusion_Detection_to_Security_Monitoring.pdf"><b>Rising to the challenge: Moving from Intrusion Detection to ...</b></a><br />
White Paper. “Transforming. Network Data into. Security Knowledge.” Intrusion Detection System. Rising to the challenge:. Moving from Intrusion ...<br />
<span class="a">www.k2defender.com/.../Rising_to_the_Challenge_<wbr></wbr>Moving_from_Intrusion_Detection_to_Security_Monitoring.pdf</span><br />
<br />
<a href="http://www.sanog.org/resources/sanog4-prasad-intrusion-dandp.pdf"><b>Network Security Intrusion Detection and Prevention</b></a> -<a href="http://72.14.205.104/search?q=cache:wPLR3gqov_YJ:www.sanog.org/resources/sanog4-prasad-intrusion-dandp.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=283&lr=lang_en">View as HTML</a><br />
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential. www.juniper.net. 1. Network Security. Intrusion Detection and. Prevention. Prasad Babu ...<br />
<span class="a">www.sanog.org/resources/<wbr></wbr>sanog4-prasad-intrusion-dandp.pdf</span><br />
<br />
<a href="https://www.elet.polimi.it/dottorato/poster/balzarotti.pdf"><b>Testing Network Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:5WW9WVBxrGUJ:https://www.elet.polimi.it/dottorato/poster/balzarotti.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=284&lr=lang_en">View as HTML</a><br />
Testing Network Intrusion Detection Systems. Davide Balzarotti. [davide.balzarotti@polimi.it]. The problem. Each mutant can be represented as a point in a ...<br />
<span class="a">https://www.elet.polimi.it/<wbr></wbr>dottorato/poster/balzarotti.pdf</span><br />
<br />
<a href="http://www.lri.fr/%7Exlzhang/papers/A%20Novel%20Intrusion%20Detection%20Method%20Based%20on%20Principal%20Component%20Analysis%20in%20Computer%20Security.pdf"><b>LNCS 3174 - A Novel Intrusion Detection Method Based on Principle ...</b></a> -<a href="http://72.14.205.104/search?q=cache:f0vBCzUcXO8J:www.lri.fr/%7Exlzhang/papers/A%2520Novel%2520Intrusion%2520Detection%2520Method%2520Based%2520on%2520Principal%2520Component%2520Analysis%2520in%2520Computer%2520Security.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=285&lr=lang_en">View as HTML</a><br />
F. Yin, J. Wang, and C. Guo (Eds.): ISNN 2004, LNCS 3174, pp. 657–662, 2004. © Springer-Verlag Berlin Heidelberg 2004. A Novel Intrusion Detection Method ...<br />
<span class="a">www.lri.fr/~xlzhang/papers/<wbr></wbr>A%20Novel%20Intrusion%20Detection%20Method%20Based%20on%20Principal%20Componen...</span><br />
<br />
<a href="http://www.networkintegritysystems.com/pdf/NIS-FiberOpticIntrusionDetectionSystems.pdf"><b>Fiber Optic Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:ghmQuxVjjWYJ:www.networkintegritysystems.com/pdf/NIS-FiberOpticIntrusionDetectionSystems.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=286&lr=lang_en">View as HTML</a><br />
Fiber Optic Intrusion Detection Systems. ©2005 Network Integrity Systems. All rights reserved. NETWORK INTEGRITY SYSTEMS: We Bring Security To Light ...<br />
<span class="a"> www.networkintegritysystems.com/<wbr></wbr>pdf/NIS-FiberOpticIntrusionDetectionSystems.pdf</span><br />
<br />
<a href="http://www.netlab.tkk.fi/opetus/s384030/k07/materials/IDSIEEE.pdf"><b>Intrusion Detection Techniques and Approaches</b></a> -<a href="http://72.14.205.104/search?q=cache:1DftD10F0tQJ:www.netlab.tkk.fi/opetus/s384030/k07/materials/IDSIEEE.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=287&lr=lang_en">View as HTML</a><br />
Intrusion Detection Techniques and Approaches. Theuns Verwoerd and Ray Hunt,. Department of Computer Science. University of Canterbury, New Zealand ...<br />
<span class="a">www.netlab.tkk.fi/opetus/<wbr></wbr>s384030/k07/materials/IDSIEEE.pdf</span><br />
<br />
<a href="http://www.ee.hacettepe.edu.tr/%7Ealkar/IDS.pdf"><b>An Intrusion Detection System with Active Response Generation</b></a> -<a href="http://72.14.205.104/search?q=cache:OWqMtmjT0mEJ:www.ee.hacettepe.edu.tr/%7Ealkar/IDS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=288&lr=lang_en">View as HTML</a><br />
Levent Özgür Özalp, Ali Ziya Alkar. Abstract— In this study an Intrusion Detection System. (IDS) is designed as a network based intursion detection ...<br />
<span class="a">www.ee.hacettepe.edu.tr/~alkar/IDS.pdf</span><br />
<br />
<a href="http://www.galaxy.gmu.edu/stats/syllabi/stat753/STAT753_Lecture11.pdf"><b>STAT 753 Computer Intrusion Detection Visual Analytics for ...</b></a> -<a href="http://72.14.205.104/search?q=cache:uIQXxcW1RAMJ:www.galaxy.gmu.edu/stats/syllabi/stat753/STAT753_Lecture11.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=289&lr=lang_en">View as HTML</a><br />
Visual Analytics for Intrusion Detection. The following discussion is based on joint work with. Karen Kafadar of the University of Colorado, Denver. ...<br />
<span class="a">www.galaxy.gmu.edu/stats/<wbr></wbr>syllabi/stat753/STAT753_Lecture11.pdf</span><br />
<br />
<a href="http://www.ncassr.org/projects/sift/papers/icdm04.pdf"><b>Correlation between NetFlow System and Network Views for Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:iZ5NuslY3-AJ:www.ncassr.org/projects/sift/papers/icdm04.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=290&lr=lang_en">View as HTML</a><br />
Correlation between NetFlow System and Network Views. for Intrusion Detection. ∗. Cristina Abad. †‡. Yifan Li. †‡. Kiran Lakkaraju ...<br />
<span class="a">www.ncassr.org/projects/sift/papers/icdm04.pdf</span><br />
<br />
<a href="http://nvl.nist.gov/pub/nistpubs/jres/108/6/j86ulv.pdf"><b>Evaluation of Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:iwfdyc35ALwJ:nvl.nist.gov/pub/nistpubs/jres/108/6/j86ulv.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=291&lr=lang_en">View as HTML</a><br />
1. Introduction. Little was done to evaluate computer intrusion detec-. tion systems (IDSs) prior to the evaluations conducted ...<br />
<span class="a">nvl.nist.gov/pub/nistpubs/jres/108/6/j86ulv.pdf</span><br />
<br />
<a href="http://ietisy.oxfordjournals.org/cgi/reprint/E89-D/1/201.pdf"><b>An Anomaly Intrusion Detection System Based on Vector Quantization</b></a><br />
IEICE TRANS. INF. & SYST., VOL.E89–D, NO.1 JANUARY 2006. 201. PAPER. Special Section on New Technologies and their Applications of the Internet III ...<br />
<span class="a">ietisy.oxfordjournals.org/cgi/reprint/E89-D/1/201.pdf</span><br />
<br />
<a href="http://woozle.org/%7Emfisk/papers/setmatch-raid.pdf"><b>Applying Fast String Matching to Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:g8ovlWCiQfkJ:woozle.org/%7Emfisk/papers/setmatch-raid.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=293&lr=lang_en">View as HTML</a><br />
Applying Fast String Matching to Intrusion Detection. Mike Fisk. †§. mfisk@lanl.gov. and. George Varghese. †. varghese@cs.ucsd.edu ...<br />
<span class="a">woozle.org/~mfisk/papers/setmatch-raid.pdf</span><br />
<br />
<a href="http://www2.cs.uregina.ca/%7Ejtyao/Papers/detection.pdf"><b>A study on fuzzy intrusion detection</b></a> -<a href="http://72.14.205.104/search?q=cache:1g2APTBfChwJ:www2.cs.uregina.ca/%7Ejtyao/Papers/detection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=294&lr=lang_en">View as HTML</a><br />
A study on fuzzy intrusion detection. J.T. Yao. S.L. Zhao. L. V. Saxton. Department of Computer Science. University of Regina ...<br />
<span class="a">www2.cs.uregina.ca/~jtyao/Papers/detection.pdf</span><br />
<br />
<a href="http://www.cs.wpi.edu/%7Efcco/classes/cs525F-2004/readings/datamining-techniques.pdf"><b>Data Mining Approaches for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:Pxv-4sUVzCEJ:www.cs.wpi.edu/%7Efcco/classes/cs525F-2004/readings/datamining-techniques.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=295&lr=lang_en">View as HTML</a><br />
Data Mining Approaches for Intrusion Detection. Wenke Lee. Salvatore J. Stolfo. Computer Science Department. Columbia University. 500 West 120th Street, ...<br />
<span class="a"> www.cs.wpi.edu/~fcco/classes/<wbr></wbr>cs525F-2004/readings/datamining-techniques.pdf</span><br />
<br />
<a href="http://iptel.org/voipsecurity/doc/09%20-%20Nassar%20-%20Intrusion%20Detection%20Mechanisms%20for%20VoIP%20Applications.pdf"><b>Intrusion detection mechanisms for VoIP applications</b></a> -<a href="http://72.14.205.104/search?q=cache:vkmGx-K-jAMJ:iptel.org/voipsecurity/doc/09%2520-%2520Nassar%2520-%2520Intrusion%2520Detection%2520Mechanisms%2520for%2520VoIP%2520Applications.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=296&lr=lang_en">View as HTML</a><br />
Intrusion detection mechanisms. for VoIP applications. Mohamed Nassar, Radu State and Olivier Festor. LORIA-INRIA Lorraine ...<br />
<span class="a">iptel.org/.../doc/<wbr></wbr>09%20-%20Nassar%20-%20Intrusion%20Detection%20Mechanisms%20for%20VoIP%20Applications.pdf</span><br />
<br />
<a href="http://cobweb.ecn.purdue.edu/%7Edcsl/Publications/papers/scidive_dsn04_submit.pdf"><b>SCIDIVE: A Stateful and Cross Protocol Intrusion Detection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:kokYjlFGN_UJ:cobweb.ecn.purdue.edu/%7Edcsl/Publications/papers/scidive_dsn04_submit.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=297&lr=lang_en">View as HTML</a><br />
1. Abstract. Voice over IP (VoIP) systems are gaining in popularity as the technology for transmitting voice traffic over. IP networks. ...<br />
<span class="a">cobweb.ecn.purdue.edu/~dcsl/<wbr></wbr>Publications/papers/scidive_dsn04_submit.pdf</span><br />
<br />
<a href="http://info.freeman.tulane.edu/huseyin/paper/ids.pdf"><b>The Value of Intrusion Detection Systems in Information Technology ...</b></a> -<a href="http://72.14.205.104/search?q=cache:RgAiS2gwMDQJ:info.freeman.tulane.edu/huseyin/paper/ids.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=298&lr=lang_en">View as HTML</a><br />
Information Systems Research. Vol. 16, No. 1, March 2005, pp. 28–46. issn 1047-7047 eissn 1526-5536 05 1601 0028. informs. ®. doi 10.1287/isre.1050.0041 ...<br />
<span class="a">info.freeman.tulane.edu/huseyin/paper/ids.pdf</span><br />
<br />
<a href="http://www.securecomputing.com/pdf/swind_strikeback_sb.pdf"><b>Strikeback : The Sidewinder G 2 Firewall Strategy for Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:s1nUEPKMJTQJ:www.securecomputing.com/pdf/swind_strikeback_sb.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=299&lr=lang_en">View as HTML</a><br />
S O L U T I O N S B R I E F. Strikeback. ®. : The. Sidewinder. ®. G. 2. Firewall. ™. Strategy for Intrusion Detection. and Response ...<br />
<span class="a">www.securecomputing.com/pdf/swind_strikeback_sb.pdf</span><br />
<br />
<a href="http://www.net.in.tum.de/%7Ehdreger/papers/DIMVA05_HostContext.pdf"><b>Enhancing the Accuracy of Network-based Intrusion Detection with ...</b></a> -<a href="http://72.14.205.104/search?q=cache:TvuhkoZcgucJ:www.net.in.tum.de/%7Ehdreger/papers/DIMVA05_HostContext.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=300&lr=lang_en">View as HTML</a><br />
Enhancing the Accuracy of Network-based. Intrusion Detection with Host-based Context. Holger Dreger. Christian Kreibich. TU Munchen. University of Cambridge ...<br />
<span class="a">www.net.in.tum.de/~hdreger/<wbr></wbr>papers/DIMVA05_HostContext.pdf</span><br />
<br />
<div><a href="http://cobweb.ecn.purdue.edu/%7Esbagchi/Research/Papers/cids_acsac03.pdf"><b>Collaborative Intrusion Detection System (CIDS): A Framework for ...</b></a> -<a href="http://72.14.205.104/search?q=cache:EUjn8o6L1gIJ:cobweb.ecn.purdue.edu/%7Esbagchi/Research/Papers/cids_acsac03.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=301&lr=lang_en">View as HTML</a><br />
1. Collaborative Intrusion Detection System (CIDS): A Framework for. Accurate and Efficient IDS. Paper Number 127. Submitted to ACSAC 2003. Abstract ...<br />
<span class="a">cobweb.ecn.purdue.edu/~sbagchi/<wbr></wbr>Research/Papers/cids_acsac03.pdf</span><br />
<br />
<a href="http://www.model.in.tum.de/um/courses/seminar/worm/WS0405/albag.pdf"><b>Network & Agent Based Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:pfI7tTFfbjgJ:www.model.in.tum.de/um/courses/seminar/worm/WS0405/albag.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=302&lr=lang_en">View as HTML</a><br />
1. Network & Agent Based Intrusion Detection Systems. Hakan Albag. TU Munich, Dep. of Computer Science – Exchange Student. Istanbul Tech. Uni., Dep. ...<br />
<span class="a">www.model.in.tum.de/um/courses/<wbr></wbr>seminar/worm/WS0405/albag.pdf</span><br />
<br />
<a href="http://www.phptr.com/content/images/0131407333/samplechapter/0131407333_ch01.pdf"><b>Introduction to Intrusion Detection and Snort</b></a> -<a href="http://72.14.205.104/search?q=cache:z4NBqXcjXe4J:www.phptr.com/content/images/0131407333/samplechapter/0131407333_ch01.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=303&lr=lang_en">View as HTML</a><br />
1. C. H A P T E R. 1. Introduction to. Intrusion Detection. and Snort. ecurity is a big issue for all networks in today’s enterprise environ- ...<br />
<span class="a">www.phptr.com/content/images/<wbr></wbr>0131407333/samplechapter/0131407333_ch01.pdf</span><br />
<br />
<a href="http://www.rootsecure.net/content/downloads/pdf/wlan_ids.pdf"><b>Layer 2 Analysis of WLAN Discovery Applications for Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:TuRuxV3LGfEJ:www.rootsecure.net/content/downloads/pdf/wlan_ids.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=304&lr=lang_en">View as HTML</a><br />
1 of 13. Layer 2 Analysis of WLAN Discovery Applications for Intrusion Detection. Joshua Wright, GCIH, CCNA. 11/8/2002. Abstract ...<br />
<span class="a">www.rootsecure.net/content/downloads/pdf/wlan_ids.pdf</span><br />
<br />
<a href="http://www.inf.ed.ac.uk/publications/thesis/online/IM030059.pdf"><b>Log Analysis-Based Intrusion Detection via Unsupervised Learning</b></a> -<a href="http://72.14.205.104/search?q=cache:kxxXKs3ZyNcJ:www.inf.ed.ac.uk/publications/thesis/online/IM030059.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=305&lr=lang_en">View as HTML</a><br />
Log Analysis-Based Intrusion Detection via. Unsupervised Learning. Pingchuan Ma. Master of Science. School of Informatics. University of Edinburgh ...<br />
<span class="a">www.inf.ed.ac.uk/publications/<wbr></wbr>thesis/online/IM030059.pdf</span><br />
<br />
<a href="http://www.taosecurity.com/nid_3pe_v101.pdf"><b>Network Intrusion Detection of Third Party Effects Introduction ...</b></a> -<a href="http://72.14.205.104/search?q=cache:nAMIB6wHYqEJ:www.taosecurity.com/nid_3pe_v101.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=306&lr=lang_en">View as HTML</a><br />
1. Network Intrusion Detection of Third Party Effects. by. Richard Bejtlich, TaoSecurity. richard@bejtlich.net. www.bejtlich.net. v1.01, 05 September 2000 ...<br />
<span class="a">www.taosecurity.com/nid_3pe_v101.pdf</span><br />
<br />
<a href="http://www.cs.wustl.edu/cs/techreports/2001/wucs-01-30.pdf"><b>Indra: A Distributed Approach to Network Intrusion Detection and ...</b></a> -<a href="http://72.14.205.104/search?q=cache:TNwm7eTap3oJ:www.cs.wustl.edu/cs/techreports/2001/wucs-01-30.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=307&lr=lang_en">View as HTML</a><br />
1. Indra: A Distributed Approach to Network Intrusion. Detection and Prevention. Qi Zhang. Ramaprabhu Janakiraman. Department of Computer Science ...<br />
<span class="a">www.cs.wustl.edu/cs/techreports/2001/wucs-01-30.pdf</span><br />
<br />
<a href="http://ebiquity.umbc.edu/get/a/publication/307.pdf"><b>LNCS 2820 - Modeling Computer Attacks: An Ontology for Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:-C24TOfvN44J:ebiquity.umbc.edu/get/a/publication/307.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=308&lr=lang_en">View as HTML</a><br />
Modeling Computer Attacks:. An Ontology for Intrusion Detection. Jeffrey Undercoffer, Anupam Joshi, and John Pinkston ...<br />
<span class="a">ebiquity.umbc.edu/get/a/publication/307.pdf</span><br />
<br />
<a href="http://ebiquity.umbc.edu/get/a/publication/155.pdf"><b>Secure Routing and Intrusion Detection in Ad Hoc Networks</b></a> -<a href="http://72.14.205.104/search?q=cache:FSBbgqr8R8EJ:ebiquity.umbc.edu/get/a/publication/155.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=309&lr=lang_en">View as HTML</a><br />
To appear in the Proceedings of the 3rd International Conference on Pervasive Computing and. Communications(PerCom 2005), Kauai Island, Hawaii. ...<br />
<span class="a">ebiquity.umbc.edu/get/a/publication/155.pdf</span><br />
<br />
<a href="http://userpages.umbc.edu/%7Ejgood/publications/goodall-dis06.pdf"><b>Visualizing Network Traffic for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:-AAMac7uX24J:userpages.umbc.edu/%7Ejgood/publications/goodall-dis06.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=310&lr=lang_en">View as HTML</a><br />
Visualizing Network Traffic for Intrusion Detection. John R. Goodall. Dept. of Information Systems, UMBC. 1000 Hilltop Circle, Baltimore, MD 21250 USA ...<br />
<span class="a">userpages.umbc.edu/~jgood/<wbr></wbr>publications/goodall-dis06.pdf</span><br />
<br />
<a href="http://eprints.eemcs.utwente.nl/1326/02/01610007.pdf"><b>POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:nQG9LJmLHgoJ:eprints.eemcs.utwente.nl/1326/02/01610007.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=311&lr=lang_en">View as HTML</a><br />
POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System. ∗. Damiano Bolzoni, Sandro Etalle, Pieter Hartel. University of Twente, ...<br />
<span class="a">eprints.eemcs.utwente.nl/1326/02/01610007.pdf</span><br />
<br />
<a href="http://www.iwia.org/2003/Teo.pdf"><b>Intrusion Detection Force: An Infrastructure For Internet-Scale ...</b></a> -<a href="http://72.14.205.104/search?q=cache:WJMUvaZNEHMJ:www.iwia.org/2003/Teo.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=312&lr=lang_en">View as HTML</a><br />
Copyright (c) 2003 L. Teo & Y. Zheng. 1. 2003 IEEE International Workshop on. Information Assurance (IWIA 2003). March 24, 2003. Lawrence Teo ...<br />
<span class="a">www.iwia.org/2003/Teo.pdf</span><br />
<br />
<a href="http://ieee-cis.org/_files/EAC_Research_2003_Report_Horeis.pdf"><b>Intrusion Detection with Neural Networks – Combination of Self ...</b></a> -<a href="http://72.14.205.104/search?q=cache:Qf9yVoUImVwJ:ieee-cis.org/_files/EAC_Research_2003_Report_Horeis.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=313&lr=lang_en">View as HTML</a><br />
Intrusion Detection with Neural Networks – Combination of. Self-Organizing Maps and Radial Basis Function Networks. for Human Expert Integration ...<br />
<span class="a"> ieee-cis.org/_files/EAC_Research_2003_Report_Horeis.pdf</span><br />
<br />
<a href="http://docs.hp.com/en/J5083-90004/J5083-90004.pdf"><b>HP Praesidium Intrusion Detection System/9000 Release Notes</b></a> -<a href="http://72.14.205.104/search?q=cache:po8PF-oe3s4J:docs.hp.com/en/J5083-90004/J5083-90004.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=314&lr=lang_en">View as HTML</a><br />
HP Praesidium. Intrusion Detection System/9000. Release Notes. Version 1.0. Update 1.1. Customer Order Number: J5083-90004 ...<br />
<span class="a">docs.hp.com/en/J5083-90004/J5083-90004.pdf</span><br />
<br />
<a href="http://www.docs.hp.com/en/5991-5413/5991-5413.pdf"><b>HP-UX Host Intrusion Detection System Release 4.0 Release Notes</b></a> -<a href="http://72.14.205.104/search?q=cache:0VJhRIOA0BoJ:www.docs.hp.com/en/5991-5413/5991-5413.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=315&lr=lang_en">View as HTML</a><br />
HP-UX Host Intrusion Detection System. Release 4.0 Release Notes. HP-UX 11i v1 and 11i v2. Manufacturing Part Number: 5991-5413. June 2006 ...<br />
<span class="a">www.docs.hp.com/en/5991-5413/5991-5413.pdf</span><br />
<br />
<a href="http://www.wbdg.org/ccb/DOD/UFGS/UFGS%2028%2016%2001.00%2010.pdf"><b>UFGS 28 16 01.00 10 (13721A) Small Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:Cgq4sJMugnAJ:www.wbdg.org/ccb/DOD/UFGS/UFGS%252028%252016%252001.00%252010.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=316&lr=lang_en">View as HTML</a><br />
USACE / NAVFAC / AFCESA / NASA UFGS-28 16 01.00 10 (April 2006). --------------------------------. Preparing Activity: USACE Replacing without change ...<br />
<span class="a">www.wbdg.org/ccb/DOD/UFGS/<wbr></wbr>UFGS%2028%2016%2001.00%2010.pdf</span><br />
<br />
<a href="http://www.wbdg.org/ccb/DOD/UFGS/UFGS%2028%2016%2000.00%2020.pdf"><b>UFGS 28 16 00.00 20 (13702N) Basic Intrusion Detection Systems (IDS)</b></a> -<a href="http://72.14.205.104/search?q=cache:ojxMTKZsg4cJ:www.wbdg.org/ccb/DOD/UFGS/UFGS%252028%252016%252000.00%252020.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=317&lr=lang_en">View as HTML</a><br />
USACE / NAVFAC / AFCESA / NASA UFGS-28 16 00.00 20 (April 2006). ------------------------------. Preparing Activity: NAVFAC Superseding ...<br />
<span class="a">www.wbdg.org/ccb/DOD/UFGS/<wbr></wbr>UFGS%2028%2016%2000.00%2020.pdf</span><br />
<br />
<a href="http://www.allisonsystems.com/files/enterprise_security.pdf"><b>VIDEO SURVEILLANCE ACCESS CONTROL INTRUSION DETECTION GATES ...</b></a> -<a href="http://72.14.205.104/search?q=cache:FUwyJaLjX54J:www.allisonsystems.com/files/enterprise_security.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=318&lr=lang_en">View as HTML</a><br />
VIDEO SURVEILLANCE. - Closed Circuit Television Systems. - High quality Analog and Digital Cameras. - IP Addressable Network Cameras ...<br />
<span class="a">www.allisonsystems.com/files/enterprise_security.pdf</span><br />
<br />
<a href="http://www.maftia.org/deliverables/D10.pdf"><b>Design of an Intrusion-Tolerant Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:h2nsS9ICQsoJ:www.maftia.org/deliverables/D10.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=319&lr=lang_en">View as HTML</a><br />
Project IST-1999-11583. Malicious- and Accidental-Fault Tolerance. for Internet Applications. Design of an Intrusion-Tolerant. Intrusion Detection System ...<br />
<span class="a">www.maftia.org/deliverables/D10.pdf</span><br />
<br />
<a href="http://www.savvis.net/NR/rdonlyres/2BE3B25C-4FCF-4D45-852B-93A53084C80D/14581/HIDS.pdf"><b>Managed Security Services Host-based Intrusion Detection Service ...</b></a> -<a href="http://72.14.205.104/search?q=cache:E4vJkGi2v9gJ:www.savvis.net/NR/rdonlyres/2BE3B25C-4FCF-4D45-852B-93A53084C80D/14581/HIDS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=320&lr=lang_en">View as HTML</a><br />
Managed Security Services. Host-based Intrusion Detection Service (HIDS). ©2006 SAVVIS, Inc. All rights reserved. All trademarks property of their ...<br />
<span class="a">www.savvis.net/NR/rdonlyres/<wbr></wbr>2BE3B25C-4FCF-4D45-852B-93A53084C80D/14581/HIDS.pdf</span><br />
<br />
<a href="http://www.rfcomm.harris.com/products/sensors/Falcon%20Watch%20RF-5400.pdf"><b>Falcon Watch RF-5400 Remote Intrusion Detection and Surveillance ...</b></a> -<a href="http://72.14.205.104/search?q=cache:5Ju-v9L57jgJ:www.rfcomm.harris.com/products/sensors/Falcon%2520Watch%2520RF-5400.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=321&lr=lang_en">View as HTML</a><br />
assuredcommunications. ™. FALCON WATCH. ™. RF-5400. REMOTE INTRUSION. DETECTION AND. SURVEILLANCE SYSTEM. rugged, easy-to-use. intelligent remote sensing ...<br />
<span class="a"> www.rfcomm.harris.com/products/<wbr></wbr>sensors/Falcon%20Watch%20RF-5400.pdf</span><br />
<br />
<a href="http://www.cs.ucc.ie/misl/publications/files/idssteinebach.pdf"><b>Intrusion Detection Systems for IP Telephony Networks Summary 1 ...</b></a> -<a href="http://72.14.205.104/search?q=cache:NtNoLo7WcHcJ:www.cs.ucc.ie/misl/publications/files/idssteinebach.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=322&lr=lang_en">View as HTML</a><br />
17-1. Intrusion Detection Systems for IP Telephony Networks. Martin Steinebach. Fraunhofer Institute IPSI. Dolivostr.15. 64293 Darmstadt. Germany ...<br />
<span class="a"> www.cs.ucc.ie/misl/publications/files/idssteinebach.pdf</span><br />
<br />
<a href="http://www.niksula.hut.fi/%7Emdobruck/thesis/presentation.pdf"><b>Priorities in the deployment of network intrusion detection systems</b></a> -<a href="http://72.14.205.104/search?q=cache:jAY6hMPhnHsJ:www.niksula.hut.fi/%7Emdobruck/thesis/presentation.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=323&lr=lang_en">View as HTML</a><br />
Priorities in the deployment of network intrusion detection. systems. Marcin Dobrucki. Marcin.Dobrucki@hut.fi. tutor Jonna Särs, Nixu Ltd. supervisor ...<br />
<span class="a">www.niksula.hut.fi/~mdobruck/thesis/presentation.pdf</span><br />
<br />
<a href="http://www.forum-intrusion.com/archive/IDSB_White_Papera141002.pdf"><b>Network Intrusion Detection Systems: Important IDS Network ...</b></a> -<a href="http://72.14.205.104/search?q=cache:-P90MNLQauoJ:www.forum-intrusion.com/archive/IDSB_White_Papera141002.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=324&lr=lang_en">View as HTML</a><br />
The Case for Load Balancing through Flow Mirroring. Top Layer Networks. Network Intrusion Detection Systems:. Important IDS Network Security ...<br />
<span class="a">www.forum-intrusion.com/<wbr></wbr>archive/IDSB_White_Papera141002.pdf</span><br />
<br />
<a href="http://www.jaist.ac.jp/jinzai/Report16/Zonghua%20Zhang.pdf"><b>Analysis and Design of Effective Methods for Anomaly-based ...</b></a> -<a href="http://72.14.205.104/search?q=cache:Mv8M6XhIb54J:www.jaist.ac.jp/jinzai/Report16/Zonghua%2520Zhang.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=325&lr=lang_en">View as HTML</a><br />
Analysis and Design of Effective Methods for. Anomaly-based Intrusion Detection. ∗. Zonghua Zhang, Student No. 320017. zonghua@jaist.ac.jp, ...<br />
<span class="a">www.jaist.ac.jp/jinzai/Report16/Zonghua%20Zhang.pdf</span><br />
<br />
<a href="http://www.jaist.ac.jp/jinzai/Report17/Zonghua%20Zhang%20320017.pdf"><b>Adaptive Observation-Centric Anomaly-Based Intrusion Detection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:yKEhNhJAFnEJ:www.jaist.ac.jp/jinzai/Report17/Zonghua%2520Zhang%2520320017.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=326&lr=lang_en">View as HTML</a><br />
Adaptive Observation-Centric Anomaly-Based Intrusion. Detection: Modeling, Analysis and Evaluation. ∗. Zonghua Zhang. School of Information Science, JAIST ...<br />
<span class="a">www.jaist.ac.jp/jinzai/Report17/<wbr></wbr>Zonghua%20Zhang%20320017.pdf</span><br />
<br />
<a href="http://www.cs.vu.nl/%7Eheiner/IJCAI-03/Papers/Undercoffer.pdf"><b>A Target-Centric Ontology for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:e-Dvvs5iHaAJ:www.cs.vu.nl/%7Eheiner/IJCAI-03/Papers/Undercoffer.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=327&lr=lang_en">View as HTML</a><br />
A Target-Centric Ontology for Intrusion Detection. Jeffrey Undercoffer, John Pinkston, Anupam Joshi and Timothy Finin ...<br />
<span class="a">www.cs.vu.nl/~heiner/IJCAI-03/Papers/Undercoffer.pdf</span><br />
<br />
<a href="http://forensics.utas.edu.au/files/EICAR2003.pdf"><b>Intrusion Detection: Forensic Computing Insights arising from a ...</b></a> -<a href="http://72.14.205.104/search?q=cache:k1cAcSBLn_kJ:forensics.utas.edu.au/files/EICAR2003.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=328&lr=lang_en">View as HTML</a><br />
Authors: Broucek, Vlasti & Turner, Paul. EICAR Conference Best Paper Proceedings 2003. This paper is submitted for Best Student Paper Award ...<br />
<span class="a">forensics.utas.edu.au/files/EICAR2003.pdf</span><br />
<br />
<a href="http://www.net.in.tum.de/%7Ehdreger/papers/CCS04_OperationalExperiences.pdf"><b>Operational Experiences with High-Volume Network Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:67NvfMwvoZ8J:www.net.in.tum.de/%7Ehdreger/papers/CCS04_OperationalExperiences.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=329&lr=lang_en">View as HTML</a><br />
Operational Experiences with High-Volume. Network Intrusion Detection. Holger Dreger. Anja Feldmann. Vern Paxson. Robin Sommer. TU Munchen. TU Munchen ...<br />
<span class="a">www.net.in.tum.de/~hdreger/<wbr></wbr>papers/CCS04_OperationalExperiences.pdf</span><br />
<br />
<a href="http://issrl.cs.memphis.edu/papers/issrl/2002/IDSPaperIEEE-2.pdf"><b>Evolving Fuzzy Classifiers for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:5MomyauxPH4J:issrl.cs.memphis.edu/papers/issrl/2002/IDSPaperIEEE-2.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=330&lr=lang_en">View as HTML</a><br />
Proceedings of the 2002 IEEE. Workshop on Information Assurance. United States Military Academy, West Point, NY June 2001. ISBN 555555555/$10.00 © 2002 IEEE ...<br />
<span class="a">issrl.cs.memphis.edu/papers/<wbr></wbr>issrl/2002/IDSPaperIEEE-2.pdf</span><br />
<br />
<a href="http://www.cse.ohio-state.edu/%7Enarravul/papers/TowardsNIC.pdf"><b>Towards NIC-based Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:4ACFbhDJ0P4J:www.cse.ohio-state.edu/%7Enarravul/papers/TowardsNIC.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=331&lr=lang_en">View as HTML</a><br />
Towards NIC-based Intrusion Detection. M. Otey, S. Parthasarathy, A. Ghoting, G. Li, S. Narravula. Department of Computer and Information Science, ...<br />
<span class="a"> www.cse.ohio-state.edu/~narravul/papers/TowardsNIC.pdf</span><br />
<br />
<a href="http://www.ics.kth.se/Publikationer/Diploma/2002/Asplund%20M.%202002.pdf"><b>Framework for Theoretical Evaluation of Intrusion Detection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:nEirDYuYh9IJ:www.ics.kth.se/Publikationer/Diploma/2002/Asplund%2520M.%25202002.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=332&lr=lang_en">View as HTML</a><br />
Framework for Theoretical Evaluation of. Intrusion Detection Systems, IDS. Michael Asplund. Stockholm, december 2002. Abstract ...<br />
<span class="a">www.ics.kth.se/Publikationer/<wbr></wbr>Diploma/2002/Asplund%20M.%202002.pdf</span><br />
<br />
<a href="http://worminator.cs.columbia.edu/papers/2004/dnad-final-report.pdf"><b>On The Feasibility of Distributed Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:YJdWJ95yR34J:worminator.cs.columbia.edu/papers/2004/dnad-final-report.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=333&lr=lang_en">View as HTML</a><br />
On The Feasibility of Distributed Intrusion Detection. Columbia University DNAD Team. Department of Computer Science. Columbia University ...<br />
<span class="a">worminator.cs.columbia.edu/<wbr></wbr>papers/2004/dnad-final-report.pdf</span><br />
<br />
<a href="http://www.educause.edu/ir/library/pdf/CYB0513B.pdf"><b>Intrusion Detection and Incident Response Breakout Session</b></a> -<a href="http://72.14.205.104/search?q=cache:-Aj_1WMFxbQJ:www.educause.edu/ir/library/pdf/CYB0513B.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=334&lr=lang_en">View as HTML</a><br />
Intrusion Detection and Incident Response Breakout Session. Session Leaders: Jim Barlow, Stephen Lau. The Intrusion Detection and Incident Response breakout ...<br />
<span class="a">www.educause.edu/ir/library/pdf/CYB0513B.pdf</span><br />
<br />
<a href="http://www.cscic.state.ny.us/security/conferences/security/2006/iasymposium.pdf"><b>1 Annual Symposium on Information Assurance: Intrusion Detection ...</b></a><br />
1. st. Annual Symposium on. Information Assurance:. Intrusion Detection and Prevention. conference proceedings. Academic Track of the 9 ...<br />
<span class="a">www.cscic.state.ny.us/security/<wbr></wbr>conferences/security/2006/iasymposium.pdf</span><br />
<br />
<a href="http://sconce.ics.uci.edu/ics243g/slides/lec15.pdf"><b>Lecture 15 Intrusion Detection: Basics and Current Methods</b></a> -<a href="http://72.14.205.104/search?q=cache:eFTlGnbqAaEJ:sconce.ics.uci.edu/ics243g/slides/lec15.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=336&lr=lang_en">View as HTML</a><br />
Views and Access Control. 1. Lecture 15. Intrusion Detection:. Basics and Current Methods. 2. Intrusion detection. Anomaly detection models: compare a ...<br />
<span class="a">sconce.ics.uci.edu/ics243g/slides/lec15.pdf</span><br />
<br />
<a href="http://www.objectsecurity.com/doc/openpmf-rmll.pdf"><b>OpenPMF: Using Open Source for Security Policy Integration and ...</b></a> -<a href="http://72.14.205.104/search?q=cache:MiegiRpVO9EJ:www.objectsecurity.com/doc/openpmf-rmll.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=337&lr=lang_en">View as HTML</a><br />
Published at the CALIBRE Open Source Conference in Dijon, France, 5.-9.07.2005 – © 2005 ObjectSecurity Ltd. OpenPMF:. Using Open Source for Security Policy ...<br />
<span class="a">www.objectsecurity.com/doc/openpmf-rmll.pdf</span><br />
<br />
<a href="http://www.syngress.com/book_catalog/267_cssp_ids/sample.pdf"><b>Introduction to Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:zZC15bTDI18J:www.syngress.com/book_catalog/267_cssp_ids/sample.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=338&lr=lang_en">View as HTML</a><br />
Introduction to. Intrusion Detection. Systems. Solutions in this Chapter:. I. Understanding the AVVID Architecture. I. Understanding the SAFE Blueprint ...<br />
<span class="a"> www.syngress.com/book_catalog/267_cssp_ids/sample.pdf</span><br />
<br />
<a href="http://projects.cs.dal.ca/projectx/files/NIMS06-2003.pdf"><b>Using Intrusion Detection Systems with a Firewall: Evaluation on ...</b></a> -<a href="http://72.14.205.104/search?q=cache:H09NNY6qyawJ:projects.cs.dal.ca/projectx/files/NIMS06-2003.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=339&lr=lang_en">View as HTML</a><br />
Abstract—In this paper, two open-source network intrusion. detection systems –Snort and Pakemon– are combined with. Cisco IOS Firewall intrusion detection ...<br />
<span class="a">projects.cs.dal.ca/projectx/files/NIMS06-2003.pdf</span><br />
<br />
<a href="http://www.cs.mu.oz.au/%7Ecvzhou/pub/icon05.pdf"><b>A Peer-to-Peer Collaborative Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:dPRh9w8JjTcJ:www.cs.mu.oz.au/%7Ecvzhou/pub/icon05.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=340&lr=lang_en">View as HTML</a><br />
A Peer-to-Peer Collaborative Intrusion Detection. System. Chenfeng Vincent Zhou, Shanika Karunasekera and Christopher Leckie. National ICT Australia ...<br />
<span class="a">www.cs.mu.oz.au/~cvzhou/pub/icon05.pdf</span><br />
<br />
<a href="http://www.cs.mu.oz.au/645/IntDetHO.pdf"><b>Microsoft PowerPoint - System Security and Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:OJjpT00RpPgJ:www.cs.mu.oz.au/645/IntDetHO.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=341&lr=lang_en">View as HTML</a><br />
1. System Security and Intrusion. Detection. Tao Peng. tpeng@cs.mu.oz.au. The University of Melbourne. VIC, Australia 3010. Tao Peng 16 May 2005 ...<br />
<span class="a">www.cs.mu.oz.au/645/IntDetHO.pdf</span><br />
<br />
<a href="http://www.csc.com/solutions/security/knowledgelibrary/uploads/1373_1.pdf"><b>Managed Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:VG-8TwBiYCUJ:www.csc.com/solutions/security/knowledgelibrary/uploads/1373_1.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=342&lr=lang_en">View as HTML</a><br />
Managed Intrusion Detection. Part of CSC’s global. service offerings portfolio. BENEFITS. • Ensures maximum protection. for business-critical operations ...<br />
<span class="a">www.csc.com/solutions/security/<wbr></wbr>knowledgelibrary/uploads/1373_1.pdf</span><br />
<br />
<a href="http://www.lix.polytechnique.fr/hipercom/Events/OLSR_Interop_06/Papers/semantics.pdf"><b>Findings on a Semantically-Based Intrusion Detection Approach for ...</b></a> -<a href="http://72.14.205.104/search?q=cache:15v6B_2YOMIJ:www.lix.polytechnique.fr/hipercom/Events/OLSR_Interop_06/Papers/semantics.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=343&lr=lang_en">View as HTML</a><br />
3. rd. OLSR Interop / Workshop 2006. V2.0. Page 1. Findings on a Semantically-Based Intrusion. Detection Approach for OLSR MANET Protocol ...<br />
<span class="a">www.lix.polytechnique.fr/hipercom/<wbr></wbr>Events/OLSR_Interop_06/Papers/semantics.pdf</span><br />
<br />
<a href="http://www.rstack.org/docs/Prelude_mod.pdf"><b>Global Intrusion Detection: Prelude Hybrid IDS</b></a> -<a href="http://72.14.205.104/search?q=cache:RjlTIaWysTEJ:www.rstack.org/docs/Prelude_mod.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=344&lr=lang_en">View as HTML</a><br />
Global Intrusion Detection: Prelude Hybrid IDS. Mathieu Blanc. 1. , Laurent Oudot. 1. , and Vincent Glaume. 12. 1. rstack.org. {moutane,oudot,vg}@rstack.org ...<br />
<span class="a">www.rstack.org/docs/Prelude_mod.pdf</span><br />
<br />
<a href="http://lucidea.com/uploadedfiles/IntrusionDetectionGuide3.pdf"><b>Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:rceaI-RQ5g4J:lucidea.com/uploadedfiles/IntrusionDetectionGuide3.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=345&lr=lang_en">View as HTML</a><br />
Practical Overview. 1220 L Street, NW Suite 100-208 • Washington, DC 20005-4018. tel 202.393.4646 fax 202.393.4633 web www.lucidea.com ...<br />
<span class="a">lucidea.com/uploadedfiles/IntrusionDetectionGuide3.pdf</span><br />
<br />
<a href="http://www.s0ftpj.org/docs/csw04_ids.pdf"><b>Unsupervised Learning and Data Mining for Intrusion Detection ...</b></a><br />
Politecnico di Milano. Dip. Elettronica e Informazione. Milano, Italy. Unsupervised Learning and. Data Mining for Intrusion Detection. Stefano Zanero ...<br />
<span class="a">www.s0ftpj.org/docs/csw04_ids.pdf</span><br />
<br />
<a href="http://www.cs.toronto.edu/%7Ellitty/papers/MS.pdf"><b>Hypervisor-based Intrusion Detection by Lionel Litty A thesis ...</b></a> -<a href="http://72.14.205.104/search?q=cache:-_Vp8iJMYkgJ:www.cs.toronto.edu/%7Ellitty/papers/MS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=347&lr=lang_en">View as HTML</a><br />
Hypervisor-based Intrusion Detection. by. Lionel Litty. A thesis submitted in conformity with the requirements. for the degree of Master of Science ...<br />
<span class="a">www.cs.toronto.edu/~llitty/papers/MS.pdf</span><br />
<br />
<a href="http://www.cs.ucsd.edu/classes/fa01/cse221/projects/group10.pdf"><b>A Survey of Intrusion Detection Systems 1 Introduction 2 ...</b></a> -<a href="http://72.14.205.104/search?q=cache:NisYdSbwoRcJ:www.cs.ucsd.edu/classes/fa01/cse221/projects/group10.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=348&lr=lang_en">View as HTML</a><br />
A Survey of Intrusion Detection Systems. DOUGLAS J. BROWN, BILL SUCKOW, and TIANQIU WANG. Department of Computer Science, University of California, ...<br />
<span class="a">www.cs.ucsd.edu/classes/<wbr></wbr>fa01/cse221/projects/group10.pdf</span><br />
<br />
<a href="http://www.epcc.edu/Portals/62/documents/Intrusion%20Detection%20Standard.pdf"><b>Intrusion Detection Standard</b></a> -<a href="http://72.14.205.104/search?q=cache:XD8m14JYgYAJ:www.epcc.edu/Portals/62/documents/Intrusion%2520Detection%2520Standard.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=349&lr=lang_en">View as HTML</a><br />
Intrusion Detection Standard. Revision Date:. 1. Purpose: Intrusion detection provides two important functions in protecting. information resources: ...<br />
<span class="a"> www.epcc.edu/Portals/62/documents/<wbr></wbr>Intrusion%20Detection%20Standard.pdf</span><br />
<br />
<a href="http://www.tippingpoint.com/pdf/press/2003/IDSDeclination_031803.pdf"><b>-more- TIPPINGPOINT DECLINES INTRUSION DETECTION AWARD NOMINATION ...</b></a> -<a href="http://72.14.205.104/search?q=cache:cupe1hypbK0J:www.tippingpoint.com/pdf/press/2003/IDSDeclination_031803.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=350&lr=lang_en">View as HTML</a><br />
-more-. CONTACT:. Laura Parker. 512-681-8441. lparker@tippingpoint.com. TIPPINGPOINT DECLINES INTRUSION DETECTION AWARD ...<br />
<span class="a">www.tippingpoint.com/pdf/<wbr></wbr>press/2003/IDSDeclination_031803.pdf</span><br />
<br />
<a href="http://www.rippletech.com/PDF/New/SOX/Auditing%20Best%20Practices.pdf"><b>Windows 2000 Auditing and Intrusion Detection http://www.microsoft ...</b></a> -<a href="http://72.14.205.104/search?q=cache:z7QgqglMNNQJ:www.rippletech.com/PDF/New/SOX/Auditing%2520Best%2520Practices.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=351&lr=lang_en">View as HTML</a><br />
Auditing - Best Practices. The following guidelines for auditing is an excerpt from the article “Windows 2000 Auditing and ...<br />
<span class="a">www.rippletech.com/PDF/New/<wbr></wbr>SOX/Auditing%20Best%20Practices.pdf</span><br />
<br />
<a href="http://homepages.inf.ed.ac.uk/cgeib/DISCEXIIGeib.pdf"><b>Plan Recognition in Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:siSuuWgxcp8J:homepages.inf.ed.ac.uk/cgeib/DISCEXIIGeib.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=352&lr=lang_en">View as HTML</a><br />
Plan Recognition in Intrusion Detection Systems. Christopher W. Geib and Robert P. Goldman. Honeywell Labs. 3660 Technology Drive. Minneapolis, MN 55418 USA ...<br />
<span class="a">homepages.inf.ed.ac.uk/cgeib/DISCEXIIGeib.pdf</span><br />
<br />
<a href="http://www.cs.utah.edu/%7Elambert/pdf/TR-03-10.pdf"><b>Improving the Database Logging Performance of the Snort Network ...</b></a> -<a href="http://72.14.205.104/search?q=cache:6o-z7diRBZgJ:www.cs.utah.edu/%7Elambert/pdf/TR-03-10.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=353&lr=lang_en">View as HTML</a><br />
-0-. Improving the Database Logging Performance of. the Snort Network Intrusion Detection Sensor. Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland ...<br />
<span class="a">www.cs.utah.edu/~lambert/pdf/TR-03-10.pdf</span><br />
<br />
<a href="http://www.cs.columbia.edu/%7Esmb/classes/f06/l19.pdf"><b>Intrusion Detection Systems Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:Yzi-15PcXPQJ:www.cs.columbia.edu/%7Esmb/classes/f06/l19.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=354&lr=lang_en">View as HTML</a><br />
Intrusion Detection Systems. Intrusion Detection Systems. (slides courtesy Prof. Stolfo). (slides courtesy Prof. Stolfo) ...<br />
<span class="a">www.cs.columbia.edu/~smb/classes/f06/l19.pdf</span><br />
<br />
<a href="http://www-users.cs.umn.edu/%7Ekumar/papers/minds_chapter.pdf"><b>The MINDS - Minnesota Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:HFUuEA2dpGcJ:www-users.cs.umn.edu/%7Ekumar/papers/minds_chapter.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=355&lr=lang_en">View as HTML</a><br />
Chapter 3. The MINDS - Minnesota. Intrusion Detection System. Levent Ertoz. ∗. , Eric Eilertson. ∗. , Aleksandar Lazarevic ...<br />
<span class="a">www-users.cs.umn.edu/~kumar/papers/minds_chapter.pdf</span><br />
<br />
<a href="http://www.cs.wm.edu/%7Ehnw/paper/dsn06.pdf"><b>VoIP Intrusion Detection Through Interacting Protocol State Machines</b></a> -<a href="http://72.14.205.104/search?q=cache:X1gb0i4KVY8J:www.cs.wm.edu/%7Ehnw/paper/dsn06.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=356&lr=lang_en">View as HTML</a><br />
VoIP Intrusion Detection Through Interacting Protocol State Machines. Hemant Sengar† Duminda Wijesekera† Haining Wang ‡ Sushil Jajodia† ...<br />
<span class="a">www.cs.wm.edu/~hnw/paper/dsn06.pdf</span><br />
<br />
<a href="http://www.pcsupportadvisor.com/nasample/t1523.pdf"><b>122 - Understanding intrusion detection systems</b></a> -<a href="http://72.14.205.104/search?q=cache:1ouqmZBON4gJ:www.pcsupportadvisor.com/nasample/t1523.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=357&lr=lang_en">View as HTML</a><br />
T. he proliferation of applications (especially Web sites) requiring some form. of e-commerce, and the increasingly important role that networks play in ...<br />
<span class="a">www.pcsupportadvisor.com/nasample/t1523.pdf</span><br />
<br />
<a href="http://cisse.info/history/CISSE%20J/2001/Smit.pdf"><b>1 An Examination of an Intrusion Detection Architecture for ...</b></a> -<a href="http://72.14.205.104/search?q=cache:89Yct7pYMWgJ:cisse.info/history/CISSE%2520J/2001/Smit.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=358&lr=lang_en">View as HTML</a><br />
1. An Examination of an Intrusion Detection Architecture for Wireless Ad Hoc Networks. *. Andrew B. Smith, Undergraduate. Department of Computer Science, ...<br />
<span class="a">cisse.info/history/CISSE%20J/2001/Smit.pdf</span><br />
<br />
<a href="http://www.cobaltmicro.com/servicelist/ss/mssintrusionmonitoring-cl-eng-20040723.pdf"><b>MSS-Monitored Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:oxlePKbtxXIJ:www.cobaltmicro.com/servicelist/ss/mssintrusionmonitoring-cl-eng-20040723.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=359&lr=lang_en">View as HTML</a><br />
SUN MONITORED INTRUSION DETECTION SYSTEM (IDS) SERVICE. Chile. 1. S. COPE. This Service provides Customer with, and consists of, monitoring by Sun in ...<br />
<span class="a"> www.cobaltmicro.com/servicelist/<wbr></wbr>ss/mssintrusionmonitoring-cl-eng-20040723.pdf</span><br />
<br />
<a href="http://www.cobaltmicro.com/servicelist/ss/mssintrusionmgmt-it-eng-20040723.pdf"><b>MSS-Managed Intrusion Detection System Services</b></a> -<a href="http://72.14.205.104/search?q=cache:ovWTwBwu4zAJ:www.cobaltmicro.com/servicelist/ss/mssintrusionmgmt-it-eng-20040723.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=360&lr=lang_en">View as HTML</a><br />
SUN MANAGED INTRUSION DETECTION SYSTEM SERVICES (IDS). Italy. 1. S. COPE. This Service provides Customer with, and consists of, management and monitoring, ...<br />
<span class="a"> www.cobaltmicro.com/servicelist/<wbr></wbr>ss/mssintrusionmgmt-it-eng-20040723.pdf</span><br />
<br />
<a href="http://www.cpd.iit.edu/innovations/SI-nids.pdf"><b>Network Intrusion Detection System (NIDS)</b></a> -<a href="http://72.14.205.104/search?q=cache:X36q6opKweEJ:www.cpd.iit.edu/innovations/SI-nids.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=361&lr=lang_en">View as HTML</a><br />
Databases. Students:. Ashok Bhojwani. Graduate, Information Technology and Management. Jeremy Hajek. Undergraduate, Information Technology and Management ...<br />
<span class="a">www.cpd.iit.edu/innovations/SI-nids.pdf</span><br />
<br />
<a href="http://www.fulton.asu.edu/%7Eie/IEatASU/alumni/Newsletter1006.pdf"><b>Computer Intrusion Detection Joint Master’s Degree with Monterrey Tech</b></a> -<a href="http://72.14.205.104/search?q=cache:F2UVeoFHPpcJ:www.fulton.asu.edu/%7Eie/IEatASU/alumni/Newsletter1006.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=362&lr=lang_en">View as HTML</a><br />
Computer Intrusion Detection. InsideLook:. A publication of the. Department of. Industrial Engineering. Fall 2006. Are You Getting. IE Impact? ...<br />
<span class="a">www.fulton.asu.edu/~ie/<wbr></wbr>IEatASU/alumni/Newsletter1006.pdf</span><br />
<br />
<a href="http://www.l-3klein.com/intrusion_detection/ecidr1000.pdf"><b>Advanced Capability Waterside Intrusion Detection Radar</b></a> -<a href="http://72.14.205.104/search?q=cache:2ckxN73RWCYJ:www.l-3klein.com/intrusion_detection/ecidr1000.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=363&lr=lang_en">View as HTML</a><br />
Series 1000. Water Side Security. Intrusion Detection Radar. Background. Typical waterside surveillance/security systems use standard marine ...<br />
<span class="a">www.l-3klein.com/intrusion_detection/ecidr1000.pdf</span><br />
<br />
<a href="http://people.cs.uchicago.edu/%7Ecldumitr/docs/intrusiondetection2.pdf"><b>INTCTD: A Peer-to-Peer Approach for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:olYn2dFs3vYJ:people.cs.uchicago.edu/%7Ecldumitr/docs/intrusiondetection2.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=364&lr=lang_en">View as HTML</a><br />
INTCTD: A Peer-to-Peer Approach for Intrusion Detection. Catalin L. Dumitrescu. Computer Science Department, The University of Chicago ...<br />
<span class="a">people.cs.uchicago.edu/~cldumitr/<wbr></wbr>docs/intrusiondetection2.pdf</span><br />
<br />
<a href="http://ida.first.fraunhofer.de/%7Erieck/docs/talks/ml-ids-en.pdf"><b>An Intelligent Host-Based Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:fLQt_NQeuAEJ:ida.first.fraunhofer.de/%7Erieck/docs/talks/ml-ids-en.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=365&lr=lang_en">View as HTML</a><br />
An Intelligent Host-Based. Intrusion Detection System. Konrad Rieck. Spring 2004. Department of Mathematics and Computer Science. Freie Universitat Berlin ...<br />
<span class="a"> ida.first.fraunhofer.de/~rieck/docs/talks/ml-ids-en.pdf</span><br />
<br />
<a href="http://engr.smu.edu/%7Etchen/papers/talk-rockwell-May2004.pdf"><b>Intrusion Detection for Mobile Ad Hoc Networks</b></a> -<a href="http://72.14.205.104/search?q=cache:E_-I3dNApAAJ:engr.smu.edu/%7Etchen/papers/talk-rockwell-May2004.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=366&lr=lang_en">View as HTML</a><br />
TC/Rockwell/5-20-04. SMU Engineering p. 1. Tom Chen. SMU, Dept of Electrical Engineering. tchen@engr.smu.edu. http://www.engr.smu.edu/tchen ...<br />
<span class="a">engr.smu.edu/~tchen/papers/talk-rockwell-May2004.pdf</span><br />
<br />
<a href="http://queens.db.toronto.edu/%7Eamit//projects/ids.pdf"><b>Network Intrusion Detection Sequence mining - stide methodology</b></a> -<a href="http://72.14.205.104/search?q=cache:9UW2QErYDxEJ:queens.db.toronto.edu/%7Eamit//projects/ids.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=367&lr=lang_en">View as HTML</a><br />
Network Intrusion Detection. Sequence mining - stide methodology. Course Project. IT 608. Data Mining and Warehousing. by. Ashish (03329012) ...<br />
<span class="a">queens.db.toronto.edu/~amit//projects/ids.pdf</span><br />
<br />
<a href="http://www.hkcert.org/ppt/event096/idp.pdf"><b>Intrusion Detection & Prevention</b></a> -<a href="http://72.14.205.104/search?q=cache:7ZKZHDBNIjEJ:www.hkcert.org/ppt/event096/idp.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=368&lr=lang_en">View as HTML</a><br />
Intrusion Detection & Prevention. Mark Webb. Mark Webb--Johnson. Johnson. Chief Technical Officer. Chief Technical Officer. Network Box Corporation ...<br />
<span class="a">www.hkcert.org/ppt/event096/idp.pdf</span><br />
<br />
<a href="http://www.cs.ucla.edu/wing/publication/CSDRR02SCAN.pdf"><b>Challenges Design Goals System Framework Authentication Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:0VWnrtWSGNAJ:www.cs.ucla.edu/wing/publication/CSDRR02SCAN.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=369&lr=lang_en">View as HTML</a><br />
SCAN: SeCurity for Ad Hoc Networks. •Network performance centric security design. Scalability. Availability. Robustness. Communication overhead ...<br />
<span class="a">www.cs.ucla.edu/wing/publication/CSDRR02SCAN.pdf</span><br />
<br />
<a href="http://www.penteledata.net/support/literature/pdf/nids.pdf"><b>Network Intrusion Detection System (NIDS)</b></a> -<a href="http://72.14.205.104/search?q=cache:vSoIiWGB74IJ:www.penteledata.net/support/literature/pdf/nids.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=370&lr=lang_en">View as HTML</a><br />
“As a security. defense, both small. and large organizations. are turning to. PenTeleData to create. customized Network. Intrusion Detection ...<br />
<span class="a">www.penteledata.net/support/literature/pdf/nids.pdf</span><br />
<br />
<a href="http://www.cs.iastate.edu/%7Ehonavar/Papers/jss-automated.pdf"><b>Towards the automatic generation of mobile agents for distributed ...</b></a> -<a href="http://72.14.205.104/search?q=cache:C_uzhkrwNM8J:www.cs.iastate.edu/%7Ehonavar/Papers/jss-automated.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=371&lr=lang_en">View as HTML</a><br />
Towards the automatic generation of mobile agents for. distributed intrusion detection system. Yanxin Wang. *. , Smruti Ranjan Behera, Johnny Wong, ...<br />
<span class="a">www.cs.iastate.edu/~honavar/Papers/jss-automated.pdf</span><br />
<br />
<a href="http://www.seas.ucla.edu/coopcontrol/papers/02uc02.pdf"><b>Natural Language Interface to an Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:kJWmfg0oQX0J:www.seas.ucla.edu/coopcontrol/papers/02uc02.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=372&lr=lang_en">View as HTML</a><br />
ICCAS2001. International Conference on Control, Automation and Systems. 1. Introduction. Computer security has become an important issue ...<br />
<span class="a">www.seas.ucla.edu/coopcontrol/papers/02uc02.pdf</span><br />
<br />
<a href="http://www.cobaltnet.com/servicelist/ss/mssintrusionmonitoring-se-eng-20040723.pdf"><b>MSS-Monitored Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:Y1tEP7c0D8kJ:www.cobaltnet.com/servicelist/ss/mssintrusionmonitoring-se-eng-20040723.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=373&lr=lang_en">View as HTML</a><br />
SUN MONITORED INTRUSION DETECTION SYSTEM (IDS) SERVICE. Sweden. 1. S. COPE. This Service provides Customer with, and consists of, monitoring by Sun in ...<br />
<span class="a"> www.cobaltnet.com/servicelist/<wbr></wbr>ss/mssintrusionmonitoring-se-eng-20040723.pdf</span><br />
<br />
<a href="http://www.cobaltnet.com/servicelist/ss/mssintrusionmgmt-co-eng-20040723.pdf"><b>MSS-Managed Intrusion Detection System Services</b></a> -<a href="http://72.14.205.104/search?q=cache:vu8ri-DVU28J:www.cobaltnet.com/servicelist/ss/mssintrusionmgmt-co-eng-20040723.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=374&lr=lang_en">View as HTML</a><br />
SUN MANAGED INTRUSION DETECTION SYSTEM SERVICES (IDS). Colombia. 1. S. COPE. This Service provides Customer with, and consists of, management and monitoring ...<br />
<span class="a"> www.cobaltnet.com/servicelist/<wbr></wbr>ss/mssintrusionmgmt-co-eng-20040723.pdf</span><br />
<br />
<a href="http://www.fgan.de/fkie/site/c68_f5_en.pdf"><b>MITE - MANET Intrusion detection for Tactical Environments</b></a> -<a href="http://72.14.205.104/search?q=cache:dn5HbfWV6FIJ:www.fgan.de/fkie/site/c68_f5_en.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=375&lr=lang_en">View as HTML</a><br />
Projects. MITE - MANET Intrusion detection for Tactical Environments. Research Area: Intrusion Detection Systems. MITE - MANET Intrusion detection for ...<br />
<span class="a">www.fgan.de/fkie/site/c68_f5_en.pdf</span><br />
<br />
<a href="http://www.fgan.de/fkie/site/c56_f5_en.pdf"><b>Intrusion Detection Systems</b></a> - <a href="http://72.14.205.104/search?q=cache:Z-sF7r0bO0oJ:www.fgan.de/fkie/site/c56_f5_en.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=376&lr=lang_en"> View as HTML</a><br />
Research Areas. Intrusion Detection Systems. Research Area: Intrusion Detection Systems. Intrusion Detection Systems. Dr. Markus Antweiler ...<br />
<span class="a">www.fgan.de/fkie/site/c56_f5_en.pdf</span><br />
<br />
<a href="http://cisr.nps.navy.mil/downloads/98paper_idtutor.pdf"><b>An Intelligent Tutor for Intrusion Detection on Computer Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:SYu9yktXR3MJ:cisr.nps.navy.mil/downloads/98paper_idtutor.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=377&lr=lang_en">View as HTML</a><br />
An Intelligent Tutor for Intrusion Detection on Computer Systems. An Intelligent Tutor for Intrusion Detection on Computer Systems ...<br />
<span class="a">cisr.nps.navy.mil/downloads/98paper_idtutor.pdf</span><br />
<br />
<a href="http://www.protiviti.com/downloads/PRO/pro-us/product_sheets/technology_risk/intrusion_detection.pdf"><b>Intrusion Detection and Monitoring Services</b></a> -<a href="http://72.14.205.104/search?q=cache:WNGO-wmL1uoJ:www.protiviti.com/downloads/PRO/pro-us/product_sheets/technology_risk/intrusion_detection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=378&lr=lang_en">View as HTML</a><br />
The implementation of a layered defense is critical in today’s interconnected enterprise. In. order to communicate with customers, business partners, ...<br />
<span class="a"> www.protiviti.com/downloads/PRO/pro-us/<wbr></wbr>product_sheets/technology_risk/intrusion_detection.pdf</span><br />
<br />
<a href="http://www.touchbriefings.com/pdf/1418/cannady.pdf"><b>Intrusion Detection – Capabilities and Considerations</b></a> -<a href="http://72.14.205.104/search?q=cache:3SwBW07Z2SAJ:www.touchbriefings.com/pdf/1418/cannady.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=379&lr=lang_en">View as HTML</a><br />
76. Dr James Cannady is a research. scientist within the Georgia Tech. Research Institute (GTRI) Information. Technology and Telecommunications. Laboratory. ...<br />
<span class="a">www.touchbriefings.com/pdf/1418/cannady.pdf</span><br />
<br />
<a href="http://www.cab-cds.org/pp/draft_pps/archived/U.S.%20Government%20IEEE%20802.11%20Wireless%20Intrusion%20Detection%20Protection%20Profile%20for%20Medium%20Robustness%20Environments%20v.0.74.pdf"><b>U.S. Government IEEE 802.11 Wireless Intrusion Detection System ...</b></a> -<a href="http://72.14.205.104/search?q=cache:MvmZ1fQa_pIJ:www.cab-cds.org/pp/draft_pps/archived/U.S.%2520Government%2520IEEE%2520802.11%2520Wireless%2520Intrusion%2520Detection%2520Protection%2520Profile%2520for%2520Medium%2520Robustness%2520Environments%2520v.0.74.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=380&lr=lang_en">View as HTML</a><br />
U.S. Government. IEEE 802.11 Wireless Intrusion. Detection System. Protection Profile. For. Medium Robustness Environments. Information. Assurance ...<br />
<span class="a">www.cab-cds.org/pp/draft_pps/archived/<wbr></wbr>U.S.%20Government%20IEEE%20802.11%20Wireless%20Intrusion%20Detectio...</span><br />
<br />
<a href="http://www.duxbury.co.za/Products/Enterasys/Products/Dragon/DS005.pdf"><b>DRAGON™ SQUIRE FOR DRAGON 5 INTRUSION DETECTION SYSTEM Data Sheet</b></a> -<a href="http://72.14.205.104/search?q=cache:7lkx3Pd4XTAJ:www.duxbury.co.za/Products/Enterasys/Products/Dragon/DS005.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=381&lr=lang_en">View as HTML</a><br />
DRAGON™ SQUIRE FOR DRAGON 5 INTRUSION DETECTION SYSTEM. Intrusion Detection at the Host—For Extended Network Security. A host-based intrusion detection and ...<br />
<span class="a">www.duxbury.co.za/Products/<wbr></wbr>Enterasys/Products/Dragon/DS005.pdf</span><br />
<br />
<a href="http://www.mli.gmu.edu/papers/2005/05-6.pdf"><b>Learning User Models for Computer Intrusion Detection: Preliminary ...</b></a><br />
Reports. Machine Learning and Inference Laboratory. Learning User Models. for Computer Intrusion Detection:. Preliminary Results from Natural Induction ...<br />
<span class="a">www.mli.gmu.edu/papers/2005/05-6.pdf</span><br />
<br />
<a href="http://www.emeraldinsight.com/Insight/html/Output/Published/EmeraldFullTextArticle/Pdf/0460070202.pdf"><b>An introduction to automated intrusion detection approaches</b></a><br />
An introduction to automated intrusion detection. approaches. Rod Hart. Graduate Student, James Madison University, Harrisonburg, Virginia, USA ...<br />
<span class="a">www.emeraldinsight.com/Insight/html/Output/<wbr></wbr>Published/EmeraldFullTextArticle/Pdf/0460070202.pdf</span><br />
<br />
<a href="http://www.ece.northwestern.edu/%7Echoudhar/publications/pdf/NguDas06A.pdf"><b>A Reconfigurable Architecture for Network Intrusion Detection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:UAE3J3m7fggJ:www.ece.northwestern.edu/%7Echoudhar/publications/pdf/NguDas06A.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=384&lr=lang_en">View as HTML</a><br />
A Reconfigurable Architecture for Network Intrusion. Detection using Principal Component Analysis. ∗. David Nguyen, Abhishek Das, Gokhan Memik, ...<br />
<span class="a">www.ece.northwestern.edu/<wbr></wbr>~choudhar/publications/pdf/NguDas06A.pdf</span><br />
<br />
<a href="http://www.21cfrpart11.com/files/library/reg_guid_docs/nist_intrusiondetectionsys.pdf"><b>NIST Special Publication on Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:Tn2pvgPxygIJ:www.21cfrpart11.com/files/library/reg_guid_docs/nist_intrusiondetectionsys.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=385&lr=lang_en">View as HTML</a><br />
NIST Special Publication on Intrusion Detection Systems. Page 1 of 51. NIST Special Publication. on Intrusion Detection. Systems. Rebecca Bace ...<br />
<span class="a"> www.21cfrpart11.com/files/library/<wbr></wbr>reg_guid_docs/nist_intrusiondetectionsys.pdf</span><br />
<br />
<a href="http://vip.poly.edu/kulesh/forensics/docs/intrusion-detection-systems-and.pdf"><b>Intrusion Detection Systems and A View To Its Forensic ...</b></a> -<a href="http://72.14.205.104/search?q=cache:5wAc3NVK97wJ:vip.poly.edu/kulesh/forensics/docs/intrusion-detection-systems-and.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=386&lr=lang_en">View as HTML</a><br />
Intrusion Detection Systems and A View To Its Forensic Applications. The University of Melbourne. Department of Computer Science. Parkville 3052, Australia ...<br />
<span class="a"> vip.poly.edu/kulesh/forensics/<wbr></wbr>docs/intrusion-detection-systems-and.pdf</span><br />
<br />
<a href="http://www.dfrws.org/2002/papers/Papers/Srinivas_Mukkamala.pdf"><b>Intrusion detection is a critical component of secure systems</b></a> -<a href="http://72.14.205.104/search?q=cache:4bea5uNI3MwJ:www.dfrws.org/2002/papers/Papers/Srinivas_Mukkamala.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=387&lr=lang_en">View as HTML</a><br />
Feature Ranking and Selection for Intrusion Detection Systems. Using Support Vector Machines. Srinivas Mukkamala, Andrew H. Sung ...<br />
<span class="a">www.dfrws.org/2002/papers/Papers/Srinivas_Mukkamala.pdf</span><br />
<br />
<a href="http://www.cs.unc.edu/%7Ejeffay/courses/nidsS05/ai/00816048.pdf"><b>An Application of Machine Learning to Network Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:nyGSx3MKK-0J:www.cs.unc.edu/%7Ejeffay/courses/nidsS05/ai/00816048.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=388&lr=lang_en">View as HTML</a><br />
An Application of Machine Learning to Network Intrusion Detection. Chris Sinclair. Applied Research Laboratories. The University of Texas at Austin ...<br />
<span class="a"> www.cs.unc.edu/~jeffay/courses/nidsS05/ai/00816048.pdf</span><br />
<br />
<a href="http://www.cs.hut.fi/%7Ejtjuslin/Juslin-IEEE-United-States-Military-Academy.pdf"><b>Automatic Backdoor Analysis with a Network Intrusion Detection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:VF23bbJalFAJ:www.cs.hut.fi/%7Ejtjuslin/Juslin-IEEE-United-States-Military-Academy.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=389&lr=lang_en">View as HTML</a><br />
Proceedings of the 2003 IEEE. Workshop on Information Assurance. United States Military Academy, West Point, NY June 2003. ISBN 555555555/$10.00 © 2003 IEEE ...<br />
<span class="a">www.cs.hut.fi/~jtjuslin/<wbr></wbr>Juslin-IEEE-United-States-Military-Academy.pdf</span><br />
<br />
<a href="http://www.facweb.iitkgp.ernet.in/%7Eisg/PAPERS/RETIS-jaydip.pdf"><b>A Territory-Based Intrusion Detection Scheme for Mobile Ad Hoc ...</b></a> -<a href="http://72.14.205.104/search?q=cache:OBZeIr2lYGMJ:www.facweb.iitkgp.ernet.in/%7Eisg/PAPERS/RETIS-jaydip.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=390&lr=lang_en">View as HTML</a><br />
A Territory-Based Intrusion Detection Scheme for Mobile Ad Hoc Networks. Jaydip Sen. 1. , Indranil Sengupta. 1. , Piyali Roy Chowdhury ...<br />
<span class="a">www.facweb.iitkgp.ernet.in/~isg/PAPERS/RETIS-jaydip.pdf</span><br />
<br />
<a href="http://www.cs.unm.edu/%7Eforrest/publications/NSPW-2002.pdf"><b>Anomaly Intrusion Detection in Dynamic Execution Environments</b></a> -<a href="http://72.14.205.104/search?q=cache:qFg3og-TLlYJ:www.cs.unm.edu/%7Eforrest/publications/NSPW-2002.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=391&lr=lang_en">View as HTML</a><br />
Anomaly Intrusion Detection in Dynamic Execution. Environments. Hajime Inoue. Department of Computer Science. University of New Mexico ...<br />
<span class="a">www.cs.unm.edu/~forrest/publications/NSPW-2002.pdf</span><br />
<br />
<a href="http://www.cs.virginia.edu/%7Eevans/theses/pickering.pdf"><b>EVALUATING THE VIABILITY OF INTRUSION DETECTION SYSTEM BENCHMARKING</b></a> -<a href="http://72.14.205.104/search?q=cache:WxEqsfOVUO0J:www.cs.virginia.edu/%7Eevans/theses/pickering.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=392&lr=lang_en">View as HTML</a><br />
EVALUATING THE VIABILITY OF INTRUSION. DETECTION SYSTEM BENCHMARKING. A Thesis in TCC 402. Presented to:. The Faculty of the School of Engineering and ...<br />
<span class="a">www.cs.virginia.edu/~evans/theses/pickering.pdf</span><br />
<br />
<a href="http://www.cs.binghamton.edu/%7Emhines/papers/netsec-ID.pdf"><b>Going Beyond Behavior-Based Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:voCr7aL4mMEJ:www.cs.binghamton.edu/%7Emhines/papers/netsec-ID.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=393&lr=lang_en">View as HTML</a><br />
1. Going Beyond Behavior-Based Intrusion Detection. Michael R. Hines. Abstract: Today’s Intrusion Detection (ID) ideas focus on two solutions: detecting ...<br />
<span class="a">www.cs.binghamton.edu/~mhines/papers/netsec-ID.pdf</span><br />
<br />
<a href="http://www.cs.fsu.edu/research/reports/TR-020301.pdf"><b>An Intrusion Detection System for Security Protocol Traffic</b></a> -<a href="http://72.14.205.104/search?q=cache:nkInRCRedO0J:www.cs.fsu.edu/research/reports/TR-020301.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=394&lr=lang_en">View as HTML</a><br />
An Intrusion Detection System for Security Protocol Traffic. Abstract. The Internet has emerged as a medium for wide-scale electronic communication ...<br />
<span class="a">www.cs.fsu.edu/research/reports/TR-020301.pdf</span><br />
<br />
<a href="http://www.cs.kent.ac.uk/people/staff/gewt/ids-wp180903.pdf"><b>An Intrusion Detection System for Gigabit Networks</b></a> -<a href="http://72.14.205.104/search?q=cache:EFTb0KC7bqYJ:www.cs.kent.ac.uk/people/staff/gewt/ids-wp180903.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=395&lr=lang_en">View as HTML</a><br />
DRAFT. 18-09-2003. An Intrusion Detection System for Gigabit Networks. (Working paper: describing ongoing work). (Working paper: describing ongoing work) ...<br />
<span class="a"> www.cs.kent.ac.uk/people/staff/gewt/ids-wp180903.pdf</span><br />
<br />
<a href="http://necsi.org/events/iccs/2002/NAp03_gudkov_iccsFixed02.pdf"><b>Multidimensional Network Monitoring for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:u6-Sux9IdecJ:necsi.org/events/iccs/2002/NAp03_gudkov_iccsFixed02.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=396&lr=lang_en">View as HTML</a><br />
Multidimensional Network. Monitoring. for Intrusion Detection. Vladimir Gudkov and Joseph E. Johnson. Department of Physics and Astronomy ...<br />
<span class="a">necsi.org/events/iccs/2002/NAp03_gudkov_iccsFixed02.pdf</span><br />
<br />
<a href="http://www2.informatik.hu-berlin.de/wm/journalclub/dimva2004.pdf"><b>Intrusion detection in unlabeled data with quarter-sphere Support ...</b></a> -<a href="http://72.14.205.104/search?q=cache:0tgQZwSPUTIJ:www2.informatik.hu-berlin.de/wm/journalclub/dimva2004.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=397&lr=lang_en">View as HTML</a><br />
Intrusion detection in unlabeled data with quarter-sphere. Support Vector Machines. Pavel Laskov and Christin Schafer. Igor Kotenko. Fraunhofer-FIRST ...<br />
<span class="a">www2.informatik.hu-berlin.de/<wbr></wbr>wm/journalclub/dimva2004.pdf</span><br />
<br />
<a href="http://www.security.iitk.ac.in/contents/repository/papers/pan-tilt.pdf"><b>Intrusion Detection and Tracking with Pan-Tilt Cameras</b></a> -<a href="http://72.14.205.104/search?q=cache:iSRkMZagYP0J:www.security.iitk.ac.in/contents/repository/papers/pan-tilt.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=398&lr=lang_en">View as HTML</a><br />
Arindam Biswas. 1. , Prithwijit Guha. 2. , Amitabha Mukerjee. 1. , K.S. Venkatesh. 2. 1. Dept. of Computer Sc. & Engg., IIT Kanpur, India. arindam,amit ...<br />
<span class="a">www.security.iitk.ac.in/contents/<wbr></wbr>repository/papers/pan-tilt.pdf</span><br />
<br />
<a href="http://www.arcert.gov.ar/webs/textos/idmethods.pdf"><b>Intrusion Detection Methodologies</b></a> -<a href="http://72.14.205.104/search?q=cache:nEWHn0MkamwJ:www.arcert.gov.ar/webs/textos/idmethods.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=399&lr=lang_en">View as HTML</a><br />
Intrusion Detection Methodologies. A White Paper. By Robert A. Clyde. AXENT Technologies, Inc. 1. The "business problem": Keeping the bad guys out ...<br />
<span class="a">www.arcert.gov.ar/webs/textos/idmethods.pdf</span><br />
<br />
<a href="http://www.infosys.tuwien.ac.at/Staff/tt/publications/Service_Specific_Anomaly_Detection_for_Network_Intrusion_Detection.pdf"><b>Service Specific Anomaly Detection for Network Intrusion Detection.</b></a> -<a href="http://72.14.205.104/search?q=cache:WysbxgGjGWAJ:www.infosys.tuwien.ac.at/Staff/tt/publications/Service_Specific_Anomaly_Detection_for_Network_Intrusion_Detection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=400&lr=lang_en">View as HTML</a><br />
Service Specific Anomaly. Detection for Network. Intrusion Detection. Christopher Kruegel, Thomas Toth. and Engin Kirda. chris@infosys.tuwien.ac.at ...<br />
<span class="a">www.infosys.tuwien.ac.at/.../Service_Specific_<wbr></wbr>Anomaly_Detection_for_Network_Intrusion_Detection.pdf</span><br />
<br />
<a href="http://ids.surfnet.nl/downloads/abstract-DIDS.pdf"><b>A Distributed Intrusion Detection System based on passive sensors</b></a> -<a href="http://72.14.205.104/search?q=cache:y0qe1iyKRe4J:ids.surfnet.nl/downloads/abstract-DIDS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=401&lr=lang_en">View as HTML</a><br />
A Distributed Intrusion Detection System based on passive sensors. The experience of setting up and rolling out a Distributed Intrusion Detection System ...<br />
<span class="a">ids.surfnet.nl/downloads/abstract-DIDS.pdf</span><br />
<br />
<a href="http://www.mnlab.cs.depaul.edu/seminar/spr2003/IDS.pdf"><b>Survey of Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:85Jd7TcsnI8J:www.mnlab.cs.depaul.edu/seminar/spr2003/IDS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=402&lr=lang_en">View as HTML</a><br />
Agenda. • Introduction. • Types of intrusions. • IDS characteristics. • IDS principles. • IDS Implementations. • Conclusions ...<br />
<span class="a">www.mnlab.cs.depaul.edu/seminar/spr2003/IDS.pdf</span><br />
<br />
<a href="http://homes.cerias.purdue.edu/%7Ergk/papers/2001-44.pdf"><b>A Framework for Distributed Intrusion Detection using Interest ...</b></a> -<a href="http://72.14.205.104/search?q=cache:bmA1NVpAAoAJ:homes.cerias.purdue.edu/%7Ergk/papers/2001-44.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=403&lr=lang_en">View as HTML</a><br />
CERIAS Tech Report 2001-44. A Framework for Distributed Intrusion. Detection using Interest-Driven. Cooperative Agents. Rajeev Gopalakrishna ...<br />
<span class="a">homes.cerias.purdue.edu/~rgk/papers/2001-44.pdf</span><br />
<br />
<a href="http://products.watchit.com/20020803.pdf"><b>Implementing Network Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:wQSiv3tcQ2oJ:products.watchit.com/20020803.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=404&lr=lang_en">View as HTML</a><br />
Implementing Network Intrusion Detection. Gayle Humphrey. Job Title. WatchIT.com Host. Program Track:. The Game Plan. Program duration:. 47 Minutes ...<br />
<span class="a">products.watchit.com/20020803.pdf</span><br />
<br />
<a href="http://www.warf.org/pdfs/P04220US_Summary.pdf"><b>Systems and Methods for Testing and Evaluating an Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:cUh_uE_sHrAJ:www.warf.org/pdfs/P04220US_Summary.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=405&lr=lang_en">View as HTML</a><br />
WARF: P04220US. Systems and Methods for Testing and Evaluating an. Intrusion Detection System. Network intrusion detection systems (NIDS) alert a system ...<br />
<span class="a">www.warf.org/pdfs/P04220US_Summary.pdf</span><br />
<br />
<a href="http://www.warf.org/pdfs/P06192US_Summary.pdf"><b>Protomatching Network Traffic for High Throughput Network ...</b></a> -<a href="http://72.14.205.104/search?q=cache:7qGUgG9jdMQJ:www.warf.org/pdfs/P06192US_Summary.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=406&lr=lang_en">View as HTML</a><br />
WARF: P06192US. Protomatching Network Traffic for High Throughput. Network Intrusion Detection. Network intrusion detection systems (NIDS) use ...<br />
<span class="a">www.warf.org/pdfs/P06192US_Summary.pdf</span><br />
<br />
<a href="http://www.lib.unb.ca/Texts/PST/2005/pdf/kayacik.pdf"><b>Selecting Features for Intrusion Detection: A Feature Relevance ...</b></a> -<a href="http://72.14.205.104/search?q=cache:_6ottbBjQHAJ:www.lib.unb.ca/Texts/PST/2005/pdf/kayacik.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=407&lr=lang_en">View as HTML</a><br />
Abstract. KDD 99 intrusion detection datasets, which are based on. DARPA 98 dataset, provides labeled data for researchers ...<br />
<span class="a">www.lib.unb.ca/Texts/PST/2005/pdf/kayacik.pdf</span><br />
<br />
<a href="http://www-lor.int-evry.fr/%7Eanna/Atva_intrusion.pdf"><b>An EFSM-based intrusion detection system for ad hoc networks</b></a> -<a href="http://72.14.205.104/search?q=cache:kd2VCUHQZpYJ:www-lor.int-evry.fr/%7Eanna/Atva_intrusion.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=408&lr=lang_en">View as HTML</a><br />
An EFSM-based intrusion detection system for. ad hoc networks. Jean-Marie Orset, Baptiste Alcalde, and Ana Cavalli. Institut National des Telecommunications ...<br />
<span class="a">www-lor.int-evry.fr/~anna/Atva_intrusion.pdf</span><br />
<br />
<a href="http://www.elet.polimi.it/upload/zanero/papers/IDS-SAC.pdf"><b>Unsupervised learning techniques for an intrusion detection system</b></a> -<a href="http://72.14.205.104/search?q=cache:vxxjuHzx8WkJ:www.elet.polimi.it/upload/zanero/papers/IDS-SAC.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=409&lr=lang_en">View as HTML</a><br />
Unsupervised learning techniques for an intrusion. detection system. Stefano Zanero. zanero@elet.polimi.it. Sergio M. Savaresi. savaresi@elet.polimi.it ...<br />
<span class="a">www.elet.polimi.it/upload/zanero/papers/IDS-SAC.pdf</span><br />
<br />
<a href="http://www.cs.fsu.edu/%7Ebreno/CIS-5357/fall2004/detection.pdf"><b>Network Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:ct9CfLMAVGQJ:www.cs.fsu.edu/%7Ebreno/CIS-5357/fall2004/detection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=410&lr=lang_en">View as HTML</a><br />
Pictures reproduced from Ptacek and Newsham. Insertion, Evasion and Denial of Service: Eluding. Network Intrusion Detection. Goal of NIDS ...<br />
<span class="a">www.cs.fsu.edu/~breno/CIS-5357/fall2004/detection.pdf</span><br />
<br />
<a href="http://www.executrain.com/course/outline/100045-1.pdf"><b>Cisco Secure Intrusion Detection Systems (CSIDS) v3.0</b></a> -<a href="http://72.14.205.104/search?q=cache:RndVcm2EaKoJ:www.executrain.com/course/outline/100045-1.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=411&lr=lang_en">View as HTML</a><br />
Page 1 of 2. # 100045 Rev. January 2004. ExecuTrain Course Outline. Cisco Secure Intrusion Detection. Systems (CSIDS) v3.0 ...<br />
<span class="a">www.executrain.com/course/outline/100045-1.pdf</span><br />
<br />
<a href="http://www2.cs.uregina.ca/%7Ejtyao/Papers/Detection_RSKT_rev.pdf"><b>An Enhanced Support Vector Machine Model for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:oQofV7sNpdMJ:www2.cs.uregina.ca/%7Ejtyao/Papers/Detection_RSKT_rev.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=412&lr=lang_en">View as HTML</a><br />
An Enhanced Support Vector Machine Model. for Intrusion Detection. JingTao Yao, Songlun Zhao, and Lisa Fan. Department of Computer Science, University of ...<br />
<span class="a"> www2.cs.uregina.ca/~jtyao/Papers/Detection_RSKT_rev.pdf</span><br />
<br />
<a href="http://www.eecs.case.edu/courses/eecs444/notes/IntrusionDetectionSystems.pdf"><b>1 Intrusion Detection Systems Sources: • Computer System Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:VT9j0h4TzWIJ:www.eecs.case.edu/courses/eecs444/notes/IntrusionDetectionSystems.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=413&lr=lang_en">View as HTML</a><br />
1. Intrusion Detection Systems. Sources:. •. Computer System Intrusion Detection: A Survey. by A. K. Jones and R. S. Sielken ...<br />
<span class="a">www.eecs.case.edu/courses/eecs444/<wbr></wbr>notes/IntrusionDetectionSystems.pdf</span><br />
<br />
<a href="http://www.fujitsu-ten.co.jp/english/company/researchdev/gihou/en_pdf/14/14-4.pdf"><b>Development of Intrusion Detection Sensor for Vehicle Anti-theft ...</b></a><br />
23. Abstract. The demand for automobile security devices is high throughout Europe and North America, among other. regions.Automobile insurers, especially ...<br />
<span class="a">www.fujitsu-ten.co.jp/english/<wbr></wbr>company/researchdev/gihou/en_pdf/14/14-4.pdf</span><br />
<br />
<a href="http://www-serl.cs.colorado.edu/%7Ecarzanig/edu/csci7000-001/csci7000-001-f01-24.pdf"><b>CSCI 7000-001 — Principles of Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:NOZfL7OEjtYJ:www-serl.cs.colorado.edu/%7Ecarzanig/edu/csci7000-001/csci7000-001-f01-24.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=415&lr=lang_en">View as HTML</a><br />
CSCI 7000-001 — Principles of Intrusion. Detection. December 4, 2001. 1 Motivations. So far, we have studied (mostly) prevention mechanisms. ...<br />
<span class="a">www-serl.cs.colorado.edu/~carzanig/<wbr></wbr>edu/csci7000-001/csci7000-001-f01-24.pdf</span><br />
<br />
<a href="http://www.gmsecurity.com/Downloads-gm/Introduction%20to%20GM%20Electric%20Fencing.pdf"><b>GM Electric Fencing Intrusion Detection System INTRODUCTION TO ...</b></a> -<a href="http://72.14.205.104/search?q=cache:3a49qcZN2NkJ:www.gmsecurity.com/Downloads-gm/Introduction%2520to%2520GM%2520Electric%2520Fencing.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=416&lr=lang_en">View as HTML</a><br />
G.M.. Advanced Fencing and Security Technologies Ltd. P.O. Box 2327 Kfar Sava Industrial Area 44425, Israel. Tel +972-9-7662965 Fax + 972-9-7662964 ...<br />
<span class="a"> www.gmsecurity.com/Downloads-gm/<wbr></wbr>Introduction%20to%20GM%20Electric%20Fencing.pdf</span><br />
<br />
<a href="http://www.first.org/conference/2004/papers/c01.pdf"><b>A Framework for Collection and Management of Intrusion Detection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:LUnk1coMt58J:www.first.org/conference/2004/papers/c01.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=417&lr=lang_en">View as HTML</a><br />
A Framework for Collection and Management of Intrusion Detection Data Sets. Benjamin D. Uphoff. Los Alamos National Laboratory. bduphoff@lanl.gov ...<br />
<span class="a">www.first.org/conference/2004/papers/c01.pdf</span><br />
<br />
<a href="http://www.globalcrossing.com/docs/enterprise_managed_security/global_crossing_intrusion_detection.pdf"><b>GLOBAL CROSSING INTRUSION DETECTION SERVICES</b></a> -<a href="http://72.14.205.104/search?q=cache:6SU0W1Eu07IJ:www.globalcrossing.com/docs/enterprise_managed_security/global_crossing_intrusion_detection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=418&lr=lang_en">View as HTML</a><br />
rof. On the Internet, network intruders are sophisticated navigators. They come from outside the enterprise,. attacking Internet connections, altering Web ...<br />
<span class="a"> www.globalcrossing.com/docs/enterprise_managed_security/<wbr></wbr>global_crossing_intrusion_detection.pdf</span><br />
<br />
<a href="http://www.visualinsights.com/Intrusion%20Detection.pdf"><b>Intrusion Detection: Visualizing Attacks in IDS Data</b></a> -<a href="http://72.14.205.104/search?q=cache:_YOEiz19V3cJ:www.visualinsights.com/Intrusion%2520Detection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=419&lr=lang_en">View as HTML</a><br />
SANS Institute 2003, Author retains full rights. Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46. © SANS Institute 2003, ...<br />
<span class="a">www.visualinsights.com/Intrusion%20Detection.pdf</span><br />
<br />
<a href="http://www.verniernetworks.com/products-and-solutions/documents/cs_TAMUK.pdf"><b>The University selected the EdgeWall 8800 for its Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:BKG0XoFL31sJ:www.verniernetworks.com/products-and-solutions/documents/cs_TAMUK.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=420&lr=lang_en">View as HTML</a><br />
The University selected the. EdgeWall 8800 for its Intrusion. Detection and Prevention (IDP). capabilities which continuously. inspects and performs threat ...<br />
<span class="a">www.verniernetworks.com/<wbr></wbr>products-and-solutions/documents/cs_TAMUK.pdf</span><br />
<br />
<a href="http://www.hotchips.org/archives/hc17/2_Mon/HC17.S2/HC17.S2T3.pdf"><b>HC17.S2T3 High-Performance Pattern-Matching Engine for Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:-d_3q3pjsB8J:www.hotchips.org/archives/hc17/2_Mon/HC17.S2/HC17.S2T3.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=421&lr=lang_en">View as HTML</a><br />
Zurich Research Laboratory. Hot Chips 17 August 2005. • Presentation subtitle:. 20pt Arial Regular,. teal R045 | G182 | B179. Recommended ...<br />
<span class="a">www.hotchips.org/archives/<wbr></wbr>hc17/2_Mon/HC17.S2/HC17.S2T3.pdf</span><br />
<br />
<a href="http://people.cs.vt.edu/%7Efinkga/ids/WPDRTS-abstract-Jan02.pdf"><b>A Metrics-Based Approach to Intrusion Detection System Evaluation ...</b></a> -<a href="http://72.14.205.104/search?q=cache:GxhBO0M_nqsJ:people.cs.vt.edu/%7Efinkga/ids/WPDRTS-abstract-Jan02.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=422&lr=lang_en">View as HTML</a><br />
A Metrics-Based Approach to Intrusion Detection System Evaluation. for Distributed Real-Time Systems. Authors: Glenn Fink (finkga@nswc.navy.mil), ...<br />
<span class="a">people.cs.vt.edu/~finkga/ids/WPDRTS-abstract-Jan02.pdf</span><br />
<br />
<a href="http://ftp.cerias.purdue.edu/pub/papers/Tripwire/Tripwire-appdev.pdf"><b>Experiences with Tripwire: Using Integrity Checkers for Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:pStieQyLQkgJ:ftp.cerias.purdue.edu/pub/papers/Tripwire/Tripwire-appdev.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=423&lr=lang_en">View as HTML</a><br />
Experiences with Tripwire:. Using Integrity Checkers for Intrusion Detection. Gene H. Kim and Eugene H. Spafford. COAST Laboratory ...<br />
<span class="a">ftp.cerias.purdue.edu/pub/<wbr></wbr>papers/Tripwire/Tripwire-appdev.pdf</span><br />
<br />
<a href="http://publib.boulder.ibm.com/infocenter/ieduasst/stgv1r0/topic/com.ibm.iea.commserv_v1/commserv/1.6z/security/zOS_CS_Security_Broadcast_IDS.pdf"><b>zOS CS Security: Controlling Broadcast Applications Intrusion ...</b></a><br />
Copyright International Business Machines Corporation 2004. Al rights reserved. Communications Server z/OS V1R5 and V1R6 Technical Update. zOS CS Security: ...<br />
<span class="a"> publib.boulder.ibm.com/.../com.ibm.iea.commserv_v1/<wbr></wbr>commserv/1.6z/security/zOS_CS_Security_Broadcast_IDS.pdf</span><br />
<br />
<a href="http://www-users.cs.york.ac.uk/%7Easervin/docs/attacks_ids.pdf"><b>Security Attacks and Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:odoJmSaKaekJ:www-users.cs.york.ac.uk/%7Easervin/docs/attacks_ids.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=425&lr=lang_en">View as HTML</a><br />
Agenda. Security Attacks. Definition. Attack Workflow. Attack Taxonomy. Attack Mitigation. Intrusion Detection. Introduction. IDS Taxonomy. IDS Challenges ...<br />
<span class="a"> www-users.cs.york.ac.uk/~aservin/docs/attacks_ids.pdf</span><br />
<br />
<a href="http://www.galaxy.gmu.edu/stats/syllabi/stat753/STAT753_Lecture1.pdf"><b>STAT 753 Computer Intrusion Detection Edward J. Wegman</b></a> -<a href="http://72.14.205.104/search?q=cache:kf7_VbYMCskJ:www.galaxy.gmu.edu/stats/syllabi/stat753/STAT753_Lecture1.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=426&lr=lang_en">View as HTML</a><br />
Computer Intrusion Detection. Focus:. Statistical, Visualization and Some Machine Learning. Techniques. Meeting:. 316 Innovation Hall, 4:30 pm to 7:10 pm, ...<br />
<span class="a">www.galaxy.gmu.edu/stats/<wbr></wbr>syllabi/stat753/STAT753_Lecture1.pdf</span><br />
<br />
<a href="http://www.it.iitb.ac.in/%7Epraj/acads/dm/report.pdf"><b>Intrusion Detection Using Datamining Techniques</b></a> -<a href="http://72.14.205.104/search?q=cache:zSfC7g-svZUJ:www.it.iitb.ac.in/%7Epraj/acads/dm/report.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=427&lr=lang_en">View as HTML</a><br />
Intrusion Detection Using Datamining Techniques. Anshu Veda(04329022). KReSIT,IIT Bombay. Prajakta Kalekar(04329008). KReSIT,IIT Bombay ...<br />
<span class="a">www.it.iitb.ac.in/~praj/acads/dm/report.pdf</span><br />
<br />
<a href="http://www.ossec.net/ossec-docs/ossec-hids_oahmet_eng.pdf"><b>OSSEC-HIDS ( Open Source – Host-based Intrusion Detection System )</b></a> -<a href="http://72.14.205.104/search?q=cache:TNVt0QgWEPQJ:www.ossec.net/ossec-docs/ossec-hids_oahmet_eng.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=428&lr=lang_en">View as HTML</a><br />
OSSEC-HIDS. (Open Source – Host-based. Intrusion Detection System). Daniel B. Cid (daniel.cid@gmail.com). Ahmet Ozturk (oahmet@metu.edu.tr) ...<br />
<span class="a">www.ossec.net/ossec-docs/ossec-hids_oahmet_eng.pdf</span><br />
<br />
<a href="http://emist.ist.psu.edu/IDS/EMIST%20NID%20Manual.pdf"><b>EMIST Network Intrusion Detection (NID) Tool Manual (Version I)</b></a> -<a href="http://72.14.205.104/search?q=cache:cDV5pCRzOqQJ:emist.ist.psu.edu/IDS/EMIST%2520NID%2520Manual.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=429&lr=lang_en">View as HTML</a><br />
Copyright (c) 2006 The Pennsylvania State University. EMIST Network Intrusion Detection (NID). Tool Manual (Version I). J. Wang, D.J. Miller and G. Kesidis ...<br />
<span class="a">emist.ist.psu.edu/IDS/EMIST%20NID%20Manual.pdf</span><br />
<br />
<a href="http://www.itsec.gov.cn/webportal/download/2003-Characterizing%20the%20Performance%20of%20Network%20Intrusion%20Detection%20Sensors.pdf"><b>LNCS 2820 - Characterizing the Performance of Network Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:f8uyFG9l7zIJ:www.itsec.gov.cn/webportal/download/2003-Characterizing%2520the%2520Performance%2520of%2520Network%2520Intrusion%2520Detection%2520Sensors.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=430&lr=lang_en">View as HTML</a><br />
G. Vigna, E. Jonsson, and C. Kruegel (Eds.): RAID 2003, LNCS 2820, pp. 155–172, 2003. © Springer-Verlag Berlin Heidelberg 2003 ...<br />
<span class="a">www.itsec.gov.cn/webportal/download/<wbr></wbr>2003-Characterizing%20the%20Performance%20of%20Network%20Intrusion%20...</span><br />
<br />
<a href="http://cisr.nps.navy.mil/downloads/98paper_barrus.pdf"><b>A Distributed Autonomous Agent Network Intrusion Detection and ...</b></a> -<a href="http://72.14.205.104/search?q=cache:oRw64pppNfwJ:cisr.nps.navy.mil/downloads/98paper_barrus.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=431&lr=lang_en">View as HTML</a><br />
A Distributed Autonomous Agent Network Intrusion Detection and Response System. A Distributed Autonomous-Agent Network-Intrusion Detection and Response ...<br />
<span class="a">cisr.nps.navy.mil/downloads/98paper_barrus.pdf</span><br />
<br />
<a href="http://www.cs.cityu.edu.hk/seminars/sem433-2005-2006-no12.pdf"><b>Anomaly Intrusion Detection using Multi-Objective Genetic Fuzzy ...</b></a> -<a href="http://72.14.205.104/search?q=cache:Onx8X4rXQ0gJ:www.cs.cityu.edu.hk/seminars/sem433-2005-2006-no12.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=432&lr=lang_en">View as HTML</a><br />
Date :. Time :. Venue :. Department of Computer Science. City University of Hong Kong. (Departmental Seminar Seminar 2005/2006 - No 12) ...<br />
<span class="a">www.cs.cityu.edu.hk/seminars/sem433-2005-2006-no12.pdf</span><br />
<br />
<a href="http://www.cs.cityu.edu.hk/seminars/sem428-2004-2005-no50.pdf"><b>Unsupervised Anomaly Intrusion Detection Using Ant Colony ...</b></a> -<a href="http://72.14.205.104/search?q=cache:azVIxQSf-McJ:www.cs.cityu.edu.hk/seminars/sem428-2004-2005-no50.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=433&lr=lang_en">View as HTML</a><br />
Date :. Time :. Venue :. Department of Computer Science. City University of Hong Kong. (Departmental Seminar Seminar 2004/2005 - No 50) ...<br />
<span class="a">www.cs.cityu.edu.hk/seminars/sem428-2004-2005-no50.pdf</span><br />
<br />
<a href="http://ida.first.fraunhofer.de/%7Erieck/docs/iciap2005.pdf"><b>Learning intrusion detection: supervised or unsupervised?</b></a> -<a href="http://72.14.205.104/search?q=cache:O7PmHM2VIeUJ:ida.first.fraunhofer.de/%7Erieck/docs/iciap2005.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=434&lr=lang_en">View as HTML</a><br />
Learning intrusion detection:. supervised or unsupervised? Pavel Laskov, Patrick Dussel, Christin Schafer and Konrad Rieck. Fraunhofer-FIRST.IDA, ...<br />
<span class="a">ida.first.fraunhofer.de/~rieck/docs/iciap2005.pdf</span><br />
<br />
<a href="http://www.cse.msstate.edu/%7Ebridges/papers/canada-00.pdf"><b>INTRUSION DETECTION VIA FUZZY DATA MINING Abstract</b></a> -<a href="http://72.14.205.104/search?q=cache:wAKaS6nN4z8J:www.cse.msstate.edu/%7Ebridges/papers/canada-00.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=435&lr=lang_en">View as HTML</a><br />
Accepted for Presentation at The. Twelfth Annual Canadian Information Technology. Security Symposium June 19-23, 2000, The Ottawa Congress Centre ...<br />
<span class="a">www.cse.msstate.edu/~bridges/papers/canada-00.pdf</span><br />
<br />
<a href="http://www.cs.queensu.ca/home/cisc499/2007W/Projects/Zulkernine.pdf"><b>Project Title: A Soft Computing Technique for Automatic Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:qzglz5aZmSQJ:www.cs.queensu.ca/home/cisc499/2007W/Projects/Zulkernine.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=436&lr=lang_en">View as HTML</a><br />
Project 1: Improving Snort Based on Signature Evaluation and Classification. (Group Members: 2 to 3). Snort (http://www.snort.org/) is a widely used ...<br />
<span class="a">www.cs.queensu.ca/home/cisc499/<wbr></wbr>2007W/Projects/Zulkernine.pdf</span><br />
<br />
<a href="http://flame.cs.dal.ca/%7Epiotr/CITSS-2k2.pdf"><b>Dynamic Intrusion Detection Using Self-Organizing Maps I ...</b></a> -<a href="http://72.14.205.104/search?q=cache:U9vbuV79tJEJ:flame.cs.dal.ca/%7Epiotr/CITSS-2k2.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=437&lr=lang_en">View as HTML</a><br />
Dynamic Intrusion Detection Using Self-Organizing. Maps. Peter Lichodzijewski. piotr@cs.dal.ca. A.Nur Zincir-Heywood. zincir@cs.dal.ca. Faculty of Comp. ...<br />
<span class="a">flame.cs.dal.ca/~piotr/CITSS-2k2.pdf</span><br />
<br />
<a href="http://www.asiweb.com/products/computer_associates/security/PDF_eTrust_Intr_Detect_PD.pdf"><b>eTrust Intrusion Detection: Complete Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:EqfELOS8eaEJ:www.asiweb.com/products/computer_associates/security/PDF_eTrust_Intr_Detect_PD.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=438&lr=lang_en">View as HTML</a><br />
Complete Intrusion Prevention. TM. eTrust Intrusion Detection delivers comprehensive. network protection capabilities, with built-in, ...<br />
<span class="a"> www.asiweb.com/products/computer_associates/<wbr></wbr>security/PDF_eTrust_Intr_Detect_PD.pdf</span><br />
<br />
<a href="http://www.fusepoint.com/english/pdf/Fusepoint%20Chief%20Exec%20Shares%20hi%20Vision.pdf"><b>Fusepoint chief exec shares his views on security, redundancy and ...</b></a> -<a href="http://72.14.205.104/search?q=cache:G5Kx5YKFAoUJ:www.fusepoint.com/english/pdf/Fusepoint%2520Chief%2520Exec%2520Shares%2520hi%2520Vision.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=439&lr=lang_en">View as HTML</a><br />
Communications & Networking, June 2003, Vol. 6 No. 6. Fusepoint chief exec shares his views on security, redundancy and. intrusion detection ...<br />
<span class="a"> www.fusepoint.com/english/pdf/<wbr></wbr>Fusepoint%20Chief%20Exec%20Shares%20hi%20Vision.pdf</span><br />
<br />
<a href="http://www.cs.uidaho.edu/%7Ejimaf/docs/nate01.pdf"><b>“Low Cost” Network Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:xs9COaLlZcAJ:www.cs.uidaho.edu/%7Ejimaf/docs/nate01.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=440&lr=lang_en">View as HTML</a><br />
1. “Low Cost” Network Intrusion Detection. Carol Taylor and Jim Alves-Foss. Center for Secure and Dependable Software. University of Idaho, Moscow, ...<br />
<span class="a">www.cs.uidaho.edu/~jimaf/docs/nate01.pdf</span><br />
<br />
<a href="http://www.deutsche-telekom-laboratories.de/%7Edousse/Publications_files/mobihoc06.pdf"><b>Delay of Intrusion Detection in Wireless Sensor Networks</b></a> -<a href="http://72.14.205.104/search?q=cache:X6dABY26_ogJ:www.deutsche-telekom-laboratories.de/%7Edousse/Publications_files/mobihoc06.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=441&lr=lang_en">View as HTML</a><br />
Delay of Intrusion Detection in Wireless Sensor Networks. Olivier Dousse. Deutsche Telekom. Laboratories. Ernst-Reuter Platz 7. 10587 Berlin, Germany ...<br />
<span class="a"> www.deutsche-telekom-laboratories.de/<wbr></wbr>~dousse/Publications_files/mobihoc06.pdf</span><br />
<br />
<a href="http://www.ipsi.fraunhofer.de/merit/forschung/papers/RTO_intrusion.pdf"><b>Intrusion detection systems for IP telephony networks Summary 1 ...</b></a> -<a href="http://72.14.205.104/search?q=cache:UUyHsEooNqIJ:www.ipsi.fraunhofer.de/merit/forschung/papers/RTO_intrusion.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=442&lr=lang_en">View as HTML</a><br />
1. Intrusion detection systems for IP telephony networks. Martin Steinebach*, Frank Siebenhaar. x. , Jana Dittmann. #. ,. Utz Roedig. +. , Ralf Ackermann ...<br />
<span class="a">www.ipsi.fraunhofer.de/merit/<wbr></wbr>forschung/papers/RTO_intrusion.pdf</span><br />
<br />
<a href="http://www.idob.state.ia.us/bank/docs/privacy_policy.pdf"><b>Information Collected When You Visit Our Web Site Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:JLmXz4SHfy0J:www.idob.state.ia.us/bank/docs/privacy_policy.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=443&lr=lang_en">View as HTML</a><br />
The Iowa Division of Banking (IDOB) is strongly committed to maintaining the privacy of your personal. information. The following discloses the Division’s ...<br />
<span class="a">www.idob.state.ia.us/bank/docs/privacy_policy.pdf</span><br />
<br />
<a href="http://www.csee.wvu.edu/%7Ecukic/Security/StP_Intrusion.pdf"><b>Microsoft PowerPoint - Intrusion detection presentation</b></a> -<a href="http://72.14.205.104/search?q=cache:K5AIuPERLRcJ:www.csee.wvu.edu/%7Ecukic/Security/StP_Intrusion.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=444&lr=lang_en">View as HTML</a><br />
1. Intrusion Detection Systems. Oussama El-Rawas. History and Concepts of IDSs. Overview. ●. A brief description about the history of ...<br />
<span class="a">www.csee.wvu.edu/~cukic/Security/StP_Intrusion.pdf</span><br />
<br />
<a href="http://www.osti.gov/bridge/servlets/purl/142538-gwSsVj/native/142538.pdf"><b>An Evaluation of Fib er Optic Intrusion Detection Systems in ...</b></a> -<a href="http://72.14.205.104/search?q=cache:Uu78OBMow60J:www.osti.gov/bridge/servlets/purl/142538-gwSsVj/native/142538.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=445&lr=lang_en">View as HTML</a><br />
SANDIA REPORT. SAND94--O020. • UC-706. Unlimited Release. Printed March 1994. I. An Evaluation of Fiber Optic. Intrusion Detection Systems ...<br />
<span class="a">www.osti.gov/bridge/servlets/<wbr></wbr>purl/142538-gwSsVj/native/142538.pdf</span><br />
<br />
<a href="http://ks.fernuni-hagen.de/aktivitaeten/praesentationen/pubs/Intrusion_Detection.pdf"><b>Intrusion Detection - Introduction and Outline</b></a> -<a href="http://72.14.205.104/search?q=cache:sWUNg9Eo7GYJ:ks.fernuni-hagen.de/aktivitaeten/praesentationen/pubs/Intrusion_Detection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=446&lr=lang_en">View as HTML</a><br />
17.06.2004. Department of Communication Systems / FTK. 2. Talk Outline. Motivation. Intrusions. Intrusion Prevention. Intrusion Detection ...<br />
<span class="a">ks.fernuni-hagen.de/aktivitaeten/<wbr></wbr>praesentationen/pubs/Intrusion_Detection.pdf</span><br />
<br />
<a href="http://atrak.usc.edu/%7Emassoud/Papers/lids-ipsn05.pdf"><b>Lifetime-Aware Intrusion Detection under Safeguarding Constraints</b></a> -<a href="http://72.14.205.104/search?q=cache:IvgCEiVURqkJ:atrak.usc.edu/%7Emassoud/Papers/lids-ipsn05.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=447&lr=lang_en">View as HTML</a><br />
Lifetime-Aware Intrusion Detection under. Safeguarding Constraints. Ali Iranli, Hanif Fatemi, Massoud Pedram. Dept. of Electrical Engineering ...<br />
<span class="a">atrak.usc.edu/~massoud/Papers/lids-ipsn05.pdf</span><br />
<br />
<a href="http://peter.its.me.cnr.it/net/idssa_wp.pdf"><b>The Science of Intrusion Detection System Attack Identification</b></a> -<a href="http://72.14.205.104/search?q=cache:jfwtVuYgfeUJ:peter.its.me.cnr.it/net/idssa_wp.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=448&lr=lang_en">View as HTML</a><br />
Cisco Systems, Inc. All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 1 of 4 ...<br />
<span class="a">peter.its.me.cnr.it/net/idssa_wp.pdf</span><br />
<br />
<a href="http://www.eps.mondragon.edu/investigacion/secgroup/archivos/2004_12.IADAT_Correlation_Survey.pdf"><b>INTRUSION DETECTION ALARM CORRELATION: A SURVEY</b></a> -<a href="http://72.14.205.104/search?q=cache:NufrmMNCKAgJ:www.eps.mondragon.edu/investigacion/secgroup/archivos/2004_12.IADAT_Correlation_Survey.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=449&lr=lang_en">View as HTML</a><br />
INTRUSION DETECTION ALARM CORRELATION: A SURVEY. Urko Zurutuza, Roberto Uribeetxeberria. Computer Science Department, Mondragon University ...<br />
<span class="a"> www.eps.mondragon.edu/investigacion/<wbr></wbr>secgroup/archivos/2004_12.IADAT_Correlation_Survey.pdf</span><br />
<br />
<a href="http://web.njit.edu/%7Emanikopo/papers/published/wses2001final.pdf"><b>A Hierarchical Anomaly Network Intrusion Detection System using ...</b></a> -<a href="http://72.14.205.104/search?q=cache:8nNHVIYyYp4J:web.njit.edu/%7Emanikopo/papers/published/wses2001final.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=450&lr=lang_en">View as HTML</a><br />
A Hierarchical Anomaly Network Intrusion Detection System. using Neural Network Classification. ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and ...<br />
<span class="a">web.njit.edu/~manikopo/<wbr></wbr>papers/published/wses2001final.pdf</span><br />
<br />
<a href="http://web.njit.edu/%7Emanikopo/papers/published/cscc01-final.pdf"><b>Neural Networks in Statistical Anomaly Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:CQzoElrhFE4J:web.njit.edu/%7Emanikopo/papers/published/cscc01-final.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=451&lr=lang_en">View as HTML</a><br />
Neural Networks in Statistical Anomaly Intrusion Detection. ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ...<br />
<span class="a">web.njit.edu/~manikopo/<wbr></wbr>papers/published/cscc01-final.pdf</span><br />
<br />
<a href="http://www.scaramanga.co.uk/firestorm/documentation/firestorm-doc.pdf"><b>Firestorm Network Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:o3vS58-s2_IJ:www.scaramanga.co.uk/firestorm/documentation/firestorm-doc.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=452&lr=lang_en">View as HTML</a><br />
Firestorm Network Intrusion Detection. System. John Leach. john@ecsc.co.uk. Gianni Tedesco. gianni@scaramanga.co.uk. Page 2 ...<br />
<span class="a">www.scaramanga.co.uk/firestorm/<wbr></wbr>documentation/firestorm-doc.pdf</span><br />
<br />
<a href="http://www.ecsl.cs.sunysb.edu/tr/packet_analysis_final.pdf"><b>Traffic Analysis: From Stateful Firewall to Network Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:rTI5sqSOi1gJ:www.ecsl.cs.sunysb.edu/tr/packet_analysis_final.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=453&lr=lang_en">View as HTML</a><br />
1. Traffic Analysis: From Stateful Firewall to Network. Intrusion Detection System. Fanglu Guo. Tzi-cker Chiueh. Computer Science Department ...<br />
<span class="a">www.ecsl.cs.sunysb.edu/tr/packet_analysis_final.pdf</span><br />
<br />
<a href="http://www.indevis.de/dokumente/enterasys_ids.pdf"><b>DRAGON 6.0 INTRUSION DETECTION SYSTEM Data Sheet</b></a> -<a href="http://72.14.205.104/search?q=cache:8GfPIIeQDScJ:www.indevis.de/dokumente/enterasys_ids.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=454&lr=lang_en">View as HTML</a><br />
DRAGON 6.0 INTRUSION DETECTION SYSTEM. Data Sheet. Security and Intrusion Detection for Enterprise Networks. Designed specifically to meet the unique ...<br />
<span class="a">www.indevis.de/dokumente/enterasys_ids.pdf</span><br />
<br />
<a href="http://www.cs.ucl.ac.uk/staff/J.Kim/pub/CEC2002.pdf"><b>Towards an Artificial Immune System for Network Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:6tAoX0CzI3YJ:www.cs.ucl.ac.uk/staff/J.Kim/pub/CEC2002.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=455&lr=lang_en">View as HTML</a><br />
Towards an Artificial Immune System for Network Intrusion Detection:. An Investigation of Dynamic Clonal Selection. Jungwon Kim ...<br />
<span class="a">www.cs.ucl.ac.uk/staff/J.Kim/pub/CEC2002.pdf</span><br />
<br />
<a href="http://www.infosys.tuwien.ac.at/Staff/tt/publications/Flexible_Mobile_Agent_based_Intrusion_Detection_for_Dynamic_Networks.pdf"><b>Flexible, Mobile Agent based Intrusion Detection for Dynamic Networks.</b></a> -<a href="http://72.14.205.104/search?q=cache:VqDWvRpTLyQJ:www.infosys.tuwien.ac.at/Staff/tt/publications/Flexible_Mobile_Agent_based_Intrusion_Detection_for_Dynamic_Networks.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=456&lr=lang_en">View as HTML</a><br />
Flexible, Mobile Agent based. Intrusion Detection for. Dynamic Networks. Christopher Kruegel and Thomas Toth. chris@infosys.tuwien.ac.at ...<br />
<span class="a">www.infosys.tuwien.ac.at/.../Flexible_Mobile_<wbr></wbr>Agent_based_Intrusion_Detection_for_Dynamic_Networks.pdf</span><br />
<br />
<a href="http://searchsecurity.techtarget.com/searchSecurity/downloads/IDP_Ch17.pdf"><b>The Future of Intrusion Detection and Prevention</b></a> -<a href="http://72.14.205.104/search?q=cache:ReHJdmmLhLAJ:searchsecurity.techtarget.com/searchSecurity/downloads/IDP_Ch17.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=457&lr=lang_en">View as HTML</a><br />
CHAPTER. 17. The Future of Intrusion. Detection and. Prevention. 345. Hacking Incident / Intrusion Detection & Prevention / Endorf, Schultz, ...<br />
<span class="a">searchsecurity.techtarget.com/<wbr></wbr>searchSecurity/downloads/IDP_Ch17.pdf</span><br />
<br />
<a href="http://tadek.pietraszek.org/publications/pietraszek04_using.pdf"><b>Using Adaptive Alert Classification to Reduce False Positives in ...</b></a> -<a href="http://72.14.205.104/search?q=cache:JXcFD3PfffcJ:tadek.pietraszek.org/publications/pietraszek04_using.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=458&lr=lang_en">View as HTML</a><br />
Using Adaptive Alert Classification to Reduce. False Positives in Intrusion Detection. Tadeusz Pietraszek. IBM Zurich Research Laboratory ...<br />
<span class="a">tadek.pietraszek.org/publications/<wbr></wbr>pietraszek04_using.pdf</span><br />
<br />
<a href="http://www.laas.fr/METROSEC/DOC/An%20Intrusion-Detection%20Model%20.pdf"><b>An Intrusion-Detection Model</b></a> -<a href="http://72.14.205.104/search?q=cache:55tgPDwlCE4J:www.laas.fr/METROSEC/DOC/An%2520Intrusion-Detection%2520Model%2520.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=459&lr=lang_en">View as HTML</a><br />
1. An Intrusion-Detection Model. DOROTHY E. DENNING. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. SE-13, NO. 2, FEBRUARY 1987,. 222-232. ...<br />
<span class="a">www.laas.fr/METROSEC/DOC/<wbr></wbr>An%20Intrusion-Detection%20Model%20.pdf</span><br />
<br />
<a href="http://www.oberonwireless.com/OMNI-%20WIDLS_outdoors.pdf"><b>4 Beam Omni-directional Wireless LAN Intrusion Detection and ...</b></a> -<a href="http://72.14.205.104/search?q=cache:ZgswKabnEfQJ:www.oberonwireless.com/OMNI-%2520WIDLS_outdoors.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=460&lr=lang_en">View as HTML</a><br />
Copyright 2006, Oberon, Inc. www.oberonwireless.com. 4 Beam Omni-directional Wireless LAN Intrusion Detection and. Location System (OMNI-WIDLS™) for Outdoor ...<br />
<span class="a"> www.oberonwireless.com/OMNI-%20WIDLS_outdoors.pdf</span><br />
<br />
<a href="http://tldp.org/linuxfocus/English/Archives/lf-2003_01-0274.pdf"><b>Intrusion detection with Debian GNU/Linux Introduction</b></a> -<a href="http://72.14.205.104/search?q=cache:jzM__JSplWUJ:tldp.org/linuxfocus/English/Archives/lf-2003_01-0274.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=461&lr=lang_en">View as HTML</a><br />
LinuxFocus article number 274. http://linuxfocus.org. by José Salvador González. Rivera. <jsgr(at)tec.com.mx>. About the author:. José Salvador González ...<br />
<span class="a">tldp.org/linuxfocus/English/<wbr></wbr>Archives/lf-2003_01-0274.pdf</span><br />
<br />
<a href="http://www.ioc.ornl.gov/projects/documents/containment.pdf"><b>Distributed Intrusion Detection and Attack Containment for ...</b></a> -<a href="http://72.14.205.104/search?q=cache:QSiT36w9gzMJ:www.ioc.ornl.gov/projects/documents/containment.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=462&lr=lang_en">View as HTML</a><br />
Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security. Stephen G. Batsell. 1. , Nageswara S. Rao ...<br />
<span class="a">www.ioc.ornl.gov/projects/documents/containment.pdf</span><br />
<br />
<a href="http://www.nersc.gov/%7Escottc/papers/LL_data_anal.pdf"><b>Comparing Classic Intrusion Detection Test Data against Data Found ...</b></a> -<a href="http://72.14.205.104/search?q=cache:Wdq5fO2-KuwJ:www.nersc.gov/%7Escottc/papers/LL_data_anal.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=463&lr=lang_en">View as HTML</a><br />
Comparing Classic Intrusion Detection Test Data against Data Found in the Wild. Matthew Morgan and Scott Campbell. Office of Science, SULI Program ...<br />
<span class="a">www.nersc.gov/~scottc/papers/LL_data_anal.pdf</span><br />
<br />
<a href="http://discovery.csc.ncsu.edu/pubs/tissec04-Ning&Xu.pdf"><b>Hypothesizing and Reasoning about Attacks Missed by Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:YIpkxOoXA1sJ:discovery.csc.ncsu.edu/pubs/tissec04-Ning%26Xu.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=464&lr=lang_en">View as HTML</a><br />
Hypothesizing and Reasoning about Attacks. Missed by Intrusion Detection Systems. PENG NING and DINGBANG XU. North Carolina State University ...<br />
<span class="a">discovery.csc.ncsu.edu/pubs/tissec04-Ning&Xu.pdf</span><br />
<br />
<a href="http://www.cs.albany.edu/%7Eerbacher/publications/IntrusionDataCollectionAnalysis.pdf"><b>Word Pro - Intrusion detection data collection and analysis-Final2.lwp</b></a> -<a href="http://72.14.205.104/search?q=cache:iAbZK4ZgtVwJ:www.cs.albany.edu/%7Eerbacher/publications/IntrusionDataCollectionAnalysis.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=465&lr=lang_en">View as HTML</a><br />
Abstract. Identifying intrusions, misuses, and attacks in. general, require that systems be monitored for anoma-. lous behavior. This includes the online ...<br />
<span class="a"> www.cs.albany.edu/~erbacher/publications/<wbr></wbr>IntrusionDataCollectionAnalysis.pdf</span><br />
<br />
<a href="http://www.wildpackets.com/elements/tutorials/IntrusionDetection.pdf"><b>Intrusion Detection Using EtherPeek NX and EtherPeek</b></a> -<a href="http://72.14.205.104/search?q=cache:sIngOSB7iegJ:www.wildpackets.com/elements/tutorials/IntrusionDetection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=466&lr=lang_en">View as HTML</a><br />
Intrusion Detection Using EtherPeek NX and EtherPeek. Page 1. A WildPackets Academy Tutuorial. Intrusion Detection Using EtherPeek NX and EtherPeek ...<br />
<span class="a">www.wildpackets.com/elements/<wbr></wbr>tutorials/IntrusionDetection.pdf</span><br />
<br />
<a href="http://groups.csail.mit.edu/medg/ftp/hastings/IBS.pdf"><b>Incremental Bayesian Segmentation for Intrusion Detection Joseph R ...</b></a> -<a href="http://72.14.205.104/search?q=cache:HCViOPRFDiYJ:groups.csail.mit.edu/medg/ftp/hastings/IBS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=467&lr=lang_en">View as HTML</a><br />
Incremental Bayesian Segmentation for Intrusion. Detection. by. Joseph R. Hastings. Submitted to the Department of Electrical Engineering and Computer ...<br />
<span class="a">groups.csail.mit.edu/medg/ftp/hastings/IBS.pdf</span><br />
<br />
<a href="http://www.seclab.tuwien.ac.at/papers/dimva.pdf"><b>Using Static Program Analysis to Aid Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:ge4e2UQzI68J:www.seclab.tuwien.ac.at/papers/dimva.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=468&lr=lang_en">View as HTML</a><br />
Using Static Program Analysis. to Aid Intrusion Detection. Manuel Egele, Martin Szydlowski, Engin Kirda, and Christopher Kruegel ...<br />
<span class="a">www.seclab.tuwien.ac.at/papers/dimva.pdf</span><br />
<br />
<a href="http://www.ce.chalmers.se/%7Eemilie/papers/Kvarnstrom_nordsec2000.pdf"><b>Combining fraud and intrusion detection - meeting new requirements -</b></a> -<a href="http://72.14.205.104/search?q=cache:xqyb9LT0KhkJ:www.ce.chalmers.se/%7Eemilie/papers/Kvarnstrom_nordsec2000.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=469&lr=lang_en">View as HTML</a><br />
1. Abstract. This paper studies the area of fraud detection in the. light of existing intrusion detection research. Fraud. detection and intrusion detection ...<br />
<span class="a">www.ce.chalmers.se/~emilie/<wbr></wbr>papers/Kvarnstrom_nordsec2000.pdf</span><br />
<br />
<a href="http://www.ensl.cs.gwu.edu/cs-netsec/CS-NetSec?action=AttachFile&do=get&target=lecture13.pdf"><b>Network Security CS 192/286 Secure Architectures and Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:lz3jeuJ7-GwJ:www.ensl.cs.gwu.edu/cs-netsec/CS-NetSec%3Faction%3DAttachFile%26do%3Dget%26target%3Dlecture13.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=470&lr=lang_en">View as HTML</a><br />
Jonathan Stanton. 1. Spring 2006 / Lecture 13. Network Security. CS 192/286. Secure Architectures and. Intrusion Detection. Department of Computer Science ...<br />
<span class="a"> www.ensl.cs.gwu.edu/cs-netsec/<wbr></wbr>CS-NetSec?action=AttachFile&do=get&target=lecture13.pdf</span><br />
<br />
<a href="http://www.commoncriteriaportal.org/public/files/ppfiles/pp_idssepp_v1.1.pdf"><b>Intrusion Detection System Sensor PROTECTION PROFILE (PP), Version ...</b></a> -<a href="http://72.14.205.104/search?q=cache:WKfpXl-AroEJ:www.commoncriteriaportal.org/public/files/ppfiles/pp_idssepp_v1.1.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=471&lr=lang_en">View as HTML</a><br />
Intrusion Detection System Sensor. Protection Profile. Version 1.1. December 10, 2001. Prepared for. National Security Agency. 9800 Savage Road ...<br />
<span class="a">www.commoncriteriaportal.org/<wbr></wbr>public/files/ppfiles/pp_idssepp_v1.1.pdf</span><br />
<br />
<a href="http://www.commoncriteriaportal.org/public/files/ppfiles/pp_idsscpp_v1.1.pdf"><b>Intrusion Detection System Scanner PROTECTION PROFILE (PP ...</b></a> -<a href="http://72.14.205.104/search?q=cache:LI3CdjEddrgJ:www.commoncriteriaportal.org/public/files/ppfiles/pp_idsscpp_v1.1.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=472&lr=lang_en">View as HTML</a><br />
Intrusion Detection System Scanner. Protection Profile. Version 1.1. December 10, 2001. Prepared for. National Security Agency. 9800 Savage Road ...<br />
<span class="a">www.commoncriteriaportal.org/<wbr></wbr>public/files/ppfiles/pp_idsscpp_v1.1.pdf</span><br />
<br />
<a href="http://hires.physics.utah.edu/miscfiles/idsl_1_3.pdf"><b>Tripwire Intrusion Detection System 1.3 for LINUX User Manual</b></a> -<a href="http://72.14.205.104/search?q=cache:GcYPQl16Wm0J:hires.physics.utah.edu/miscfiles/idsl_1_3.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=473&lr=lang_en">View as HTML</a><br />
2. COPYRIGHT NOTICE. All files in this distribution of Tripwire. ®. are Copyright 1992-1998 by the Purdue Research. Foundation of Purdue University and are ...<br />
<span class="a">hires.physics.utah.edu/miscfiles/idsl_1_3.pdf</span><br />
<br />
<a href="http://www.supercomp.org/sc2003/archive/sc2003final/paperpdfs/M10_Out.pdf"><b>Intrusion Detection: Principles and Practice – Vern Paxson Why ...</b></a> -<a href="http://72.14.205.104/search?q=cache:MFQHk2_S--YJ:www.supercomp.org/sc2003/archive/sc2003final/paperpdfs/M10_Out.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=474&lr=lang_en">View as HTML</a><br />
Intrusion Detection: Principles and Practice – Vern Paxson. Why Network Intrusion Detection? Why Not? Styles of Approaches ...<br />
<span class="a">www.supercomp.org/sc2003/archive/<wbr></wbr>sc2003final/paperpdfs/M10_Out.pdf</span><br />
<br />
<a href="http://www.cse.ohio-state.edu/%7Elina/reading/modeling/dos/Early%20Statistical%20Anomaly%20Intrusion%20Detection.pdf"><b>Early statistical anomaly intrusion detection of dos attacks using ...</b></a> -<a href="http://72.14.205.104/search?q=cache:5nbybNqSxboJ:www.cse.ohio-state.edu/%7Elina/reading/modeling/dos/Early%2520Statistical%2520Anomaly%2520Intrusion%2520Detection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=475&lr=lang_en">View as HTML</a><br />
Proceedings of. the. 2003. IEEE. Workshop on Information Assurance. United States Military. Academy, West Point, NY June ...<br />
<span class="a"> www.cse.ohio-state.edu/~lina/reading/modeling/<wbr></wbr>dos/Early%20Statistical%20Anomaly%20Intrusion%20Detection.pdf</span><br />
<br />
<a href="http://www.cs.sunysb.edu/%7Esion/research/sion2002idss-itcc.pdf"><b>On-the-fly Intrusion Detection for Web Portals (draft)</b></a> -<a href="http://72.14.205.104/search?q=cache:STwBQqGXc48J:www.cs.sunysb.edu/%7Esion/research/sion2002idss-itcc.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=476&lr=lang_en">View as HTML</a><br />
On-the-fly Intrusion Detection for Web Portals. (draft). Radu Sion. Computer Sciences & CERIAS. Purdue University. (sion@cs.purdue.edu). Mikhail Atallah ...<br />
<span class="a"> www.cs.sunysb.edu/~sion/research/sion2002idss-itcc.pdf</span><br />
<br />
<a href="http://www.umbc.edu/%7Efinin/papers/ijcai03ontologyWorkshop.pdf"><b>A Target-Centric Ontology for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:_Skj3vvMhCIJ:www.umbc.edu/%7Efinin/papers/ijcai03ontologyWorkshop.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=477&lr=lang_en">View as HTML</a><br />
A Target-Centric Ontology for Intrusion Detection. John Pinkston, Jeffrey Undercoffer, Anupam Joshi and Timothy Finin ...<br />
<span class="a">www.umbc.edu/~finin/papers/ijcai03ontologyWorkshop.pdf</span><br />
<br />
<a href="http://www.lsv.ens-cachan.fr/%7Egoubault/SECI-02/Final/actes-seci02/pdf/014-cuppens.pdf"><b>Correlation in an intrusion detection process</b></a> -<a href="http://72.14.205.104/search?q=cache:8rBB62p_8j0J:www.lsv.ens-cachan.fr/%7Egoubault/SECI-02/Final/actes-seci02/pdf/014-cuppens.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=478&lr=lang_en">View as HTML</a><br />
septembre. 2002. –. SEcurite. des. Communications. sur. Internet–. SECI02. Correlation in an intrusion detection process. Frederic Cuppens. , Fabien Autrel ...<br />
<span class="a"> www.lsv.ens-cachan.fr/~goubault/<wbr></wbr>SECI-02/Final/actes-seci02/pdf/014-cuppens.pdf</span><br />
<br />
<a href="http://www.diadem-firewall.org/publications/arc06.pdf"><b>UNITE: Uniform hardware-based Network Intrusion deTection Engine</b></a> -<a href="http://72.14.205.104/search?q=cache:reCofeudjHIJ:www.diadem-firewall.org/publications/arc06.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=479&lr=lang_en">View as HTML</a><br />
UNITE: Uniform hardware-based Network. Intrusion deTection Engine. S. Yusuf and W. Luk and M. K. N. Szeto and W. Osborne ...<br />
<span class="a">www.diadem-firewall.org/publications/arc06.pdf</span><br />
<br />
<a href="http://www.ccatsandiego.org/quads/quad_AIRSIS.pdf"><b>Next Generation Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:zbYYIzOhnOYJ:www.ccatsandiego.org/quads/quad_AIRSIS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=480&lr=lang_en">View as HTML</a><br />
CCAT Client: AIRSIS. Next Generation Intrusion Detection System. Technology Explanation. • Combined sensor and satellite communications ...<br />
<span class="a">www.ccatsandiego.org/quads/quad_AIRSIS.pdf</span><br />
<br />
<a href="http://www.cs.kent.ac.uk/pubs/2004/1893/content.pdf"><b>An Intrusion Detection System for Gigabit Networks</b></a> -<a href="http://72.14.205.104/search?q=cache:jXc6OIcLUjUJ:www.cs.kent.ac.uk/pubs/2004/1893/content.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=481&lr=lang_en">View as HTML</a><br />
Computer Science at Kent. An Intrusion Detection System for. Gigabit Networks – Architecture and an. example system. Gerald Tripp. Technical Report No. 7-04 ...<br />
<span class="a">www.cs.kent.ac.uk/pubs/2004/1893/content.pdf</span><br />
<br />
<a href="https://jobs.utmb.edu/is/policy/Search/ps112_11-10-03.pdf"><b>Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:ao3FPYth0REJ:https://jobs.utmb.edu/is/policy/Search/ps112_11-10-03.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=482&lr=lang_en">View as HTML</a><br />
UTMB INFORMATION RESOURCES PRACTICE STANDARD. Section 1. Security Management. 09/03/02. -Effective. Subject 1. Monitoring and Compliance. -Revised ...<br />
<span class="a">https://jobs.utmb.edu/<wbr></wbr>is/policy/Search/ps112_11-10-03.pdf</span><br />
<br />
<a href="http://www2.ing.unipi.it/ew2002/proceedings/081.pdf"><b>Flexible, Mobile Agent Based Intrusion Detection for Dynamic Networks</b></a> -<a href="http://72.14.205.104/search?q=cache:TLkPO_1OxUcJ:www2.ing.unipi.it/ew2002/proceedings/081.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=483&lr=lang_en">View as HTML</a><br />
Flexible, Mobile Agent Based Intrusion Detection for Dynamic Networks. Christopher Krügel. Thomas Toth. Distributed Systems Group, Technical University ...<br />
<span class="a">www2.ing.unipi.it/ew2002/proceedings/081.pdf</span><br />
<br />
<a href="https://www-inst.eecs.berkeley.edu/%7Ecs161/fa05/Notes/cs161.0914.pdf"><b>Intrusion Detection Outline Intrusion Detection History Some ...</b></a> -<a href="http://72.14.205.104/search?q=cache:QjQ_8Yg2X2oJ:https://www-inst.eecs.berkeley.edu/%7Ecs161/fa05/Notes/cs161.0914.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=484&lr=lang_en">View as HTML</a><br />
1. Intrusion Detection. CS 161/194-1. Anthony D. Joseph. September 14, 2005. September 14, 2005. CS161 Fall 2005. Joseph/Tygar/Vazirani/Wagner ...<br />
<span class="a">https://www-inst.eecs.berkeley.edu/<wbr></wbr>~cs161/fa05/Notes/cs161.0914.pdf</span><br />
<br />
<a href="http://www.ida.liu.se/%7Ertslab/publications/2004/Chyssler04_DIMVA.pdf"><b>Alarm Reduction and Correlation in Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:zwE7aBpyTWUJ:www.ida.liu.se/%7Ertslab/publications/2004/Chyssler04_DIMVA.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=485&lr=lang_en">View as HTML</a><br />
Alarm Reduction and Correlation in Intrusion. Detection Systems. Tobias Chyssler. 1. , Stefan Burschka. 2. , Michael Semling. 2. , Tomas Lingvall ...<br />
<span class="a">www.ida.liu.se/~rtslab/publications/<wbr></wbr>2004/Chyssler04_DIMVA.pdf</span><br />
<br />
<a href="http://www.forum-intrusion.com/wireless_intrusion_detection.pdf"><b>Wireless Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:ALhhTEiN0CgJ:www.forum-intrusion.com/wireless_intrusion_detection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=486&lr=lang_en">View as HTML</a><br />
IBM Global Services. April 2003. Wireless Intrusion Detection. Dr. Joshua Lackey, PhD. Andrew Roths. Jim Goddard, CISSP ...<br />
<span class="a">www.forum-intrusion.com/<wbr></wbr>wireless_intrusion_detection.pdf</span><br />
<br />
<a href="http://www.glue.umd.edu/%7Eacardena/Papers/Oakland06.pdf"><b>A Framework for the Evaluation of Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:7l-YIxcnKH4J:www.glue.umd.edu/%7Eacardena/Papers/Oakland06.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=487&lr=lang_en">View as HTML</a><br />
A Framework for the Evaluation of Intrusion Detection Systems. Alvaro A. Cardenas John S. Baras Karl Seamon. ∗. Department of Electrical and Computer ...<br />
<span class="a">www.glue.umd.edu/~acardena/Papers/Oakland06.pdf</span><br />
<br />
<a href="http://www.di.univaq.it/mostarda/sito/articoli/MEGFF5HAHRKB7VKQ.pdf"><b>A Distributed Intrusion Detection Approach for Secure Software ...</b></a> -<a href="http://72.14.205.104/search?q=cache:ZTTbfJ542O8J:www.di.univaq.it/mostarda/sito/articoli/MEGFF5HAHRKB7VKQ.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=488&lr=lang_en">View as HTML</a><br />
A Distributed Intrusion Detection Approach for. Secure Software Architecture. Paola Inverardi and Leonardo Mostarda. Dip. di Informatica, Universit`a di ...<br />
<span class="a">www.di.univaq.it/mostarda/<wbr></wbr>sito/articoli/MEGFF5HAHRKB7VKQ.pdf</span><br />
<br />
<a href="http://space.iias.spb.su/ai/publications/2003-gorodetsky-kotenko-karsaev-MAT.for.CNS.pdf"><b>Multi-agent technologies for computer network security: Attack ...</b></a> -<a href="http://72.14.205.104/search?q=cache:pLQ9YcXw2N0J:space.iias.spb.su/ai/publications/2003-gorodetsky-kotenko-karsaev-MAT.for.CNS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=489&lr=lang_en">View as HTML</a><br />
1. INTRODUCTION. During the last few years the computer network security. remains a problem of great concern within information tech-. nology research area. ...<br />
<span class="a"> space.iias.spb.su/ai/publications/<wbr></wbr>2003-gorodetsky-kotenko-karsaev-MAT.for.CNS.pdf</span><br />
<br />
<a href="http://www.cs.uiowa.edu/%7Erlawrenc/teaching/244/Project/Samples/Proposal/Intrusion_Proposal.pdf"><b>Using Data Mining for Syslog-based Denial-of-Service and Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:2feNPWQv2e4J:www.cs.uiowa.edu/%7Erlawrenc/teaching/244/Project/Samples/Proposal/Intrusion_Proposal.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=490&lr=lang_en">View as HTML</a><br />
Database Tools for Syslog-based Intrusion Detection. Your Name Here. The University of Iowa, Iowa City, IA. aaa@bbb.com. Introduction ...<br />
<span class="a"> www.cs.uiowa.edu/~rlawrenc/teaching/<wbr></wbr>244/Project/Samples/Proposal/Intrusion_Proposal.pdf</span><br />
<br />
<a href="http://www.rpi.edu/%7Ebonisp/NASA-course/evangelista_esann.pdf"><b>UNSUPERVISED FUZZY ENSEMBLES APPLIED TO INTRUSION DETECTION</b></a> -<a href="http://72.14.205.104/search?q=cache:JeP4N6DvaT0J:www.rpi.edu/%7Ebonisp/NASA-course/evangelista_esann.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=491&lr=lang_en">View as HTML</a><br />
UNSUPERVISED FUZZY ENSEMBLES. APPLIED TO INTRUSION DETECTION. Paul F. Evangelista. 1. , Piero Bonissone. 2. , Mark J. Embrechts ...<br />
<span class="a">www.rpi.edu/~bonisp/NASA-course/evangelista_esann.pdf</span><br />
<br />
<a href="http://www.iwia.org/2005/Yin2005.pdf"><b>Log Correlation for Intrusion Detection: A Proof of Concept</b></a> -<a href="http://72.14.205.104/search?q=cache:-Zmm81jco5UJ:www.iwia.org/2005/Yin2005.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=492&lr=lang_en">View as HTML</a><br />
National Center for Supercomputing Applications. The Design of VisFlowConnect-IP:. a Link Analysis System for IP Security. Situational Awareness ...<br />
<span class="a">www.iwia.org/2005/Yin2005.pdf</span><br />
<br />
<a href="http://www.trivadis.com/Images/050615_ZKB_englisch_tcm18-14344.pdf"><b>Zürcher Kantonalbank - Even better security with a new intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:ow6T31Q2SRcJ:www.trivadis.com/Images/050615_ZKB_englisch_tcm18-14344.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=493&lr=lang_en">View as HTML</a><br />
_Application Development. _Application Performance Management. _Business Communication. _Business Intelligence. _Managed Services. _Security _Training ...<br />
<span class="a">www.trivadis.com/Images/<wbr></wbr>050615_ZKB_englisch_tcm18-14344.pdf</span><br />
<br />
<a href="http://halcyon.usc.edu/%7Ezbaker/zbakerUSCraw.pdf"><b>Performance of FPGA Implementation of Bit-split Architecture for ...</b></a> -<a href="http://72.14.205.104/search?q=cache:l698eoQHCAcJ:halcyon.usc.edu/%7Ezbaker/zbakerUSCraw.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=494&lr=lang_en">View as HTML</a><br />
Performance of FPGA Implementation of Bit-split Architecture. for Intrusion Detection Systems. Hong-Jip Jung, Zachary K. Baker and Viktor K. Prasanna ...<br />
<span class="a">halcyon.usc.edu/~zbaker/zbakerUSCraw.pdf</span><br />
<br />
<a href="http://www.facweb.iitkgp.ernet.in/%7Eisg/PAPERS/icdcit05-jaydip.pdf"><b>Autonomous Agent Based Distributed Fault-Tolerant Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:GtlggZNGL5wJ:www.facweb.iitkgp.ernet.in/%7Eisg/PAPERS/icdcit05-jaydip.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=495&lr=lang_en">View as HTML</a><br />
2. Department of Computer Science and Engineering,. Indian Institute of Technology, Kharagpur-721302, INDIA. 1. sen_jaydip@yahoo.com,. 2. isg@iitkgp.ac.in ...<br />
<span class="a">www.facweb.iitkgp.ernet.in/<wbr></wbr>~isg/PAPERS/icdcit05-jaydip.pdf</span><br />
<br />
<a href="http://eudoxus.usc.edu/IW/dynamic.pdf"><b>Dynamic Modeling of Internet Traffic for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:JEkO2mbZD5kJ:eudoxus.usc.edu/IW/dynamic.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=496&lr=lang_en">View as HTML</a><br />
Dynamic Modeling of Internet Traffic for Intrusion. Detection. E. Jonckheere, K. Shah and S. Bohacek. University of Southern California, ...<br />
<span class="a">eudoxus.usc.edu/IW/dynamic.pdf</span><br />
<br />
<a href="http://wwwhome.cs.utwente.nl/%7Efranqueirav/Publication/AccessReport.pdf"><b>Access Control from an Intrusion Detection Perspective</b></a> -<a href="http://72.14.205.104/search?q=cache:agdrd-ylfA8J:wwwhome.cs.utwente.nl/%7Efranqueirav/Publication/AccessReport.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=497&lr=lang_en">View as HTML</a><br />
Access Control from an Intrusion Detection. Perspective. 1. Virginia Nunes Leal Franqueira. Centre for Telematics and Information Technology, University of ...<br />
<span class="a">wwwhome.cs.utwente.nl/~franqueirav/<wbr></wbr>Publication/AccessReport.pdf</span><br />
<br />
<a href="http://www.cs.unb.ca/profs/ghorbani/ali/papers/leij-Intrusion-cnsr2004.pdf"><b>Network Intrusion Detection Using an Improved Competitive Learning ...</b></a> -<a href="http://72.14.205.104/search?q=cache:MZTh4CUOjvEJ:www.cs.unb.ca/profs/ghorbani/ali/papers/leij-Intrusion-cnsr2004.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=498&lr=lang_en">View as HTML</a><br />
Network Intrusion Detection Using. an Improved Competitive Learning Neural Network. John Zhong Lei and Ali Ghorbani. Faculty of Computer Science ...<br />
<span class="a">www.cs.unb.ca/profs/ghorbani/<wbr></wbr>ali/papers/leij-Intrusion-cnsr2004.pdf</span><br />
<br />
<a href="http://decision.csl.uiuc.edu/%7Etbasar/cdc03-intrusion.pdf"><b>A Game Theoretic Approach to Decision and Analysis in Network ...</b></a> -<a href="http://72.14.205.104/search?q=cache:Amc1W-C7zccJ:decision.csl.uiuc.edu/%7Etbasar/cdc03-intrusion.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=499&lr=lang_en">View as HTML</a><br />
A Game Theoretic Approach to Decision and Analysis. in Network Intrusion Detection. 1. Tansu Alpcan and Tamer Basar. Coordinated Science Laboratory ...<br />
<span class="a">decision.csl.uiuc.edu/~tbasar/cdc03-intrusion.pdf</span><br />
<br />
<a href="http://www.cmpe.boun.edu.tr/%7Eilker/IlkerDEMIRKOL_COMML_ext_abstract.pdf"><b>Wireless Sensor Networks for Intrusion Detection: Packet Traffic ...</b></a> -<a href="http://72.14.205.104/search?q=cache:BjSEhLvjKDYJ:www.cmpe.boun.edu.tr/%7Eilker/IlkerDEMIRKOL_COMML_ext_abstract.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=500&lr=lang_en">View as HTML</a><br />
IEEE COMMUNICATIONS LETTERS, EXTENDED ABSTRACT. 1. Wireless Sensor Networks for Intrusion Detection:. Packet Traffic Modeling ...<br />
<span class="a">www.cmpe.boun.edu.tr/~ilker/<wbr></wbr>IlkerDEMIRKOL_COMML_ext_abstract.pdf</span><br />
<br />
<a href="http://homepage.westmont.edu/kimkihls/WORDS03.pdf"><b>The Starfish System: Providing Intrusion Detection and Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:PSgUFU0jOd0J:homepage.westmont.edu/kimkihls/WORDS03.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=501&lr=lang_en">View as HTML</a><br />
The Starfish System: Providing Intrusion Detection and. Intrusion Tolerance for Middleware Systems. Kim Potter Kihlstrom ...<br />
<span class="a">homepage.westmont.edu/kimkihls/WORDS03.pdf</span><br />
<br />
<a href="http://www.mli.gmu.edu/papers/2006/06-5.pdf"><b>Learning Symbolic User Models for Intrusion Detection: A Method ...</b></a> -<a href="http://72.14.205.104/search?q=cache:fZ1hQ9hQN0UJ:www.mli.gmu.edu/papers/2006/06-5.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=502&lr=lang_en">View as HTML</a><br />
Learning Symbolic User Models for Intrusion. Detection: A Method and Initial Results. Ryszard S. Michalski. 1,2. , Kenneth A. Kaufman ...<br />
<span class="a">www.mli.gmu.edu/papers/2006/06-5.pdf</span><br />
<br />
<a href="http://www.ce.chalmers.se/%7Eulfla/LIC.pdf"><b>Aspects of Adapting Data Collection to Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:IR47XPUZT-kJ:www.ce.chalmers.se/%7Eulfla/LIC.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=503&lr=lang_en">View as HTML</a><br />
T. HESIS FOR THE DEGREE OF. L. ICENTIATE OF. E. NGINEERING. Aspects of Adapting Data Collection to. Intrusion Detection. ULF LARSON ...<br />
<span class="a">www.ce.chalmers.se/~ulfla/LIC.pdf</span><br />
<br />
<a href="http://www.iir.com.au/user_pages/conf/pdf/I0352.pdf"><b>INTRUSION DETECTION IDENTITY MANAGEMENT USING BIOMETRIC SYSTEMS ...</b></a> -<a href="http://72.14.205.104/search?q=cache:4bNEFKJGn8IJ:www.iir.com.au/user_pages/conf/pdf/I0352.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=504&lr=lang_en">View as HTML</a><br />
Book & Pay by the Early Bird date to SAVE up to $695. 26 - 28 JULY 2006. Rydges Lakeside CANBERRA. FEATURING CASE STUDIES & PRESENTATIONS FROM: ...<br />
<span class="a">www.iir.com.au/user_pages/conf/pdf/I0352.pdf</span><br />
<br />
<a href="http://downloads.openchannelsoftware.org/Spitfire/Handbook_v5.pdf"><b>Spitfire Intrusion Detection Environment User Guide</b></a> -<a href="http://72.14.205.104/search?q=cache:oRtgcy41M8IJ:downloads.openchannelsoftware.org/Spitfire/Handbook_v5.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=505&lr=lang_en">View as HTML</a><br />
Page ii. Version 5.0. Printed 8/3/01. Table of Contents. 1. Introduction.......<wbr></wbr>.....................................................................1 ...<br />
<span class="a">downloads.openchannelsoftware.org/<wbr></wbr>Spitfire/Handbook_v5.pdf</span><br />
<br />
<a href="http://cops.csci.unt.edu/publications/2003-04/2003-04.pdf"><b>ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:tAe3pbW6HyQJ:cops.csci.unt.edu/publications/2003-04/2003-04.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=506&lr=lang_en">View as HTML</a><br />
Published in 2004 IEEE Conference on Information Technology: Coding and Computing (ITCC). 81. ProtoMon: Embedded Monitors for Cryptographic Protocol ...<br />
<span class="a">cops.csci.unt.edu/publications/2003-04/2003-04.pdf</span><br />
<br />
<a href="http://www.owlriver.com/issa/CandW-intrusion_detection.pdf"><b>Cable & Wireless Intrusion Detection and Response service info</b></a> -<a href="http://72.14.205.104/search?q=cache:bLg8-6RifvsJ:www.owlriver.com/issa/CandW-intrusion_detection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=507&lr=lang_en">View as HTML</a><br />
Ensure prompt detection of any potential intrusion or security. attack and provide the rapid response necessary to minimise. the impact on your business. ...<br />
<span class="a"> www.owlriver.com/issa/CandW-intrusion_detection.pdf</span><br />
<br />
<a href="http://www.diadem-firewall.org/publications/fpl05.pdf"><b>BITWISE OPTIMISED CAM FOR NETWORK INTRUSION DETECTION SYSTEMS ...</b></a> -<a href="http://72.14.205.104/search?q=cache:R1MHAZsIHs0J:www.diadem-firewall.org/publications/fpl05.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=508&lr=lang_en">View as HTML</a><br />
BITWISE OPTIMISED CAM FOR NETWORK INTRUSION DETECTION SYSTEMS. Sherif Yusuf. ∗. and Wayne Luk. Department of Computing, Imperial College London, ...<br />
<span class="a">www.diadem-firewall.org/publications/fpl05.pdf</span><br />
<br />
<a href="http://www.bruggerink.com/%7Ezow/papers/dmnid_qualpres.pdf"><b>Data Mining for Network Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:PZiRNTnTwdwJ:www.bruggerink.com/%7Ezow/papers/dmnid_qualpres.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=509&lr=lang_en">View as HTML</a><br />
Data Mining for Network. Intrusion Detection. S Terry Brugger. UC Davis. Department of Computer Science. Data Mining for Network Intrusion Detection – p.1/ ...<br />
<span class="a">www.bruggerink.com/~zow/papers/dmnid_qualpres.pdf</span><br />
<br />
<a href="http://www.cse.sc.edu/research/isl/Publications/paid.pdf"><b>PAID: A Probabilistic Agent-Based Intrusion Detection System</b></a><br />
PAID: A Probabilistic Agent-Based Intrusion. Detection System. Vaibhav Gowadia Csilla Farkas Marco Valtorta. Information Security Laboratory ...<br />
<span class="a">www.cse.sc.edu/research/isl/Publications/paid.pdf</span><br />
<br />
<a href="http://www.ee.ucl.ac.uk/lcs/papers2002/LCS116.pdf"><b>Active Platform Security through Intrusion Detection Using Naïve ...</b></a> -<a href="http://72.14.205.104/search?q=cache:yCAtobEqlf4J:www.ee.ucl.ac.uk/lcs/papers2002/LCS116.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=511&lr=lang_en">View as HTML</a><br />
1. Active Platform Security through Intrusion Detection Using Naïve. Bayesian Network for Anomaly Detection. Abdallah Abbey Sebyala. †. , Temitope Olukemi ...<br />
<span class="a">www.ee.ucl.ac.uk/lcs/papers2002/LCS116.pdf</span><br />
<br />
<a href="http://www.sreis.org/old/2001/papers/sreis005.pdf"><b>A Software Fault Tree Approach to Requirements Analysis of an ...</b></a> -<a href="http://72.14.205.104/search?q=cache:y3clJ7MrjC8J:www.sreis.org/old/2001/papers/sreis005.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=512&lr=lang_en">View as HTML</a><br />
A Software Fault Tree Approach to Requirements. Analysis of an Intrusion Detection System. £. Guy Helmer, Johnny Wong, Mark Slagell, Vasant Honavar, ...<br />
<span class="a">www.sreis.org/old/2001/papers/sreis005.pdf</span><br />
<br />
<a href="http://www.cse.buffalo.edu/caeiae/skm2004/presentation_slides/A-Sessions/2A-01-Yue/2A-01-Yue_.pdf"><b>A Queuing Formulation of Intrusion Detection with Active and ...</b></a> -<a href="http://72.14.205.104/search?q=cache:DCauirp69W4J:www.cse.buffalo.edu/caeiae/skm2004/presentation_slides/A-Sessions/2A-01-Yue/2A-01-Yue_.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=513&lr=lang_en">View as HTML</a><br />
1. A Queuing Formulation of Intrusion Detection. with Active and Passive Responses. Wei T. Yue, Metin Cakanyildirim, Young U. Ryu ...<br />
<span class="a"> www.cse.buffalo.edu/caeiae/skm2004/<wbr></wbr>presentation_slides/A-Sessions/2A-01-Yue/2A-01-Yue_.pdf</span><br />
<br />
<a href="http://www.security.cse.msstate.edu/docs/Publications/wli/DOECSG2004.pdf"><b>Using Genetic Algorithm for Network Intrusion Detection Wei Li ...</b></a> -<a href="http://72.14.205.104/search?q=cache:o8fd8T_wiTkJ:www.security.cse.msstate.edu/docs/Publications/wli/DOECSG2004.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=514&lr=lang_en">View as HTML</a><br />
Using Genetic Algorithm for Network Intrusion Detection. Wei Li. Department of Computer Science and Engineering. Mississippi State University, Mississippi ...<br />
<span class="a">www.security.cse.msstate.edu/<wbr></wbr>docs/Publications/wli/DOECSG2004.pdf</span><br />
<br />
<a href="http://www.ripublication.com/ijcirv3/ijcirv3n1_2.pdf"><b>Intrusion Detection by Backpropagation Neural Networks with Sample ...</b></a> -<a href="http://72.14.205.104/search?q=cache:tblobuTlDGwJ:www.ripublication.com/ijcirv3/ijcirv3n1_2.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=515&lr=lang_en">View as HTML</a><br />
International Journal of Computational Intelligence Research. ISSN 0973-1873 Vol.3, No. 1 (2007), pp. 6-10. © Research India Publications http://www.ijcir. ...<br />
<span class="a">www.ripublication.com/ijcirv3/ijcirv3n1_2.pdf</span><br />
<br />
<a href="http://www.dmst.aueb.gr/dds/pubs/conf/2000-CCS-DSLID/html/paper.pdf"><b>A Domain-specific Language for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:xARdEcOppewJ:www.dmst.aueb.gr/dds/pubs/conf/2000-CCS-DSLID/html/paper.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=516&lr=lang_en">View as HTML</a><br />
A Domain-specific Language for Intrusion Detection. Diomidis Spinellis and Dimitris Gritzalis. May 30, 2000. Abstract ...<br />
<span class="a">www.dmst.aueb.gr/dds/pubs/<wbr></wbr>conf/2000-CCS-DSLID/html/paper.pdf</span><br />
<br />
<a href="http://www.dmst.aueb.gr/dds/pubs/jrnl/2002-JCS-Panoptis/html/paper.pdf"><b>Panoptis: Intrusion Detection using a Domain-specific Language</b></a><br />
Panoptis: Intrusion Detection using a Domain-specific. Language. £Ý. Diomidis Spinellis. Þ. and Dimitris Gritzalis. Ü. June 19, 2002. Abstract ...<br />
<span class="a">www.dmst.aueb.gr/dds/pubs/<wbr></wbr>jrnl/2002-JCS-Panoptis/html/paper.pdf</span><br />
<br />
<a href="http://www.cs.queensu.ca/%7Emoradi/148-04-MM-MZ.pdf"><b>A Neural Network Based System for Intrusion Detection and ...</b></a> -<a href="http://72.14.205.104/search?q=cache:FR8LVgjqzwcJ:www.cs.queensu.ca/%7Emoradi/148-04-MM-MZ.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=518&lr=lang_en">View as HTML</a><br />
148-04. Abstract-- With the rapid expansion of computer networks. during the past decade, security has become a crucial issue for. computer systems. ...<br />
<span class="a">www.cs.queensu.ca/~moradi/148-04-MM-MZ.pdf</span><br />
<br />
<a href="http://www.loud-fat-bloke.co.uk/tools/idsmethv7.pdf"><b>1 Intrusion Detection System deployment Methodology</b></a> -<a href="http://72.14.205.104/search?q=cache:z6D7zUeInk0J:www.loud-fat-bloke.co.uk/tools/idsmethv7.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=519&lr=lang_en">View as HTML</a><br />
1. Intrusion Detection System deployment Methodology. Its almost ten years since the firewall became the foremost security tool for network. administrators. ...<br />
<span class="a">www.loud-fat-bloke.co.uk/tools/idsmethv7.pdf</span><br />
<br />
<a href="http://security.riit.tsinghua.edu.cn/seminar/2006_5_25/30_03.pdf"><b>High-Performance Pattern-Matching for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:qrsx1TSwq8kJ:security.riit.tsinghua.edu.cn/seminar/2006_5_25/30_03.PDF+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=520&lr=lang_en">View as HTML</a><br />
High-Performance Pattern-Matching. for Intrusion Detection. Jan van Lunteren. IBM Research, Zurich Research Laboratory. CH-8803 Ruschlikon, Switzerland ...<br />
<span class="a">security.riit.tsinghua.edu.cn/<wbr></wbr>seminar/2006_5_25/30_03.PDF</span><br />
<br />
<a href="http://www.niss.org/technicalreports/tr91.pdf"><b>Computer Intrusion Detection Based on Bayes Factors for Comparing ...</b></a> -<a href="http://72.14.205.104/search?q=cache:6_fY4mOfRbQJ:www.niss.org/technicalreports/tr91.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=521&lr=lang_en">View as HTML</a><br />
Computer Intrusion Detection. Based on Bayes Factors for. Comparing Command Transition. Probabilities. William DuMouchel. Technical Report Number 91 ...<br />
<span class="a">www.niss.org/technicalreports/tr91.pdf</span><br />
<br />
<a href="http://www.niss.org/technicalreports/tr92.pdf"><b>A Hybrid High-order Markov Chain Model for Computer Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:XUzEM5H3LrEJ:www.niss.org/technicalreports/tr92.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=522&lr=lang_en">View as HTML</a><br />
A Hybrid High-order Markov. Chain Model for Computer. Intrusion Detection. W-H Ju and Y. Vardi. Technical Report Number 92. February, 1999 ...<br />
<span class="a">www.niss.org/technicalreports/tr92.pdf</span><br />
<br />
<a href="http://www.stillsecure.com/docs/StillSecure_CyberDefense_IPS_v_IDS_0304.pdf"><b>Intrusion Detection vs. Intrusion Prevention: The difference and ...</b></a> -<a href="http://72.14.205.104/search?q=cache:DXaxeaKO9ZUJ:www.stillsecure.com/docs/StillSecure_CyberDefense_IPS_v_IDS_0304.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=523&lr=lang_en">View as HTML</a><br />
©2005 Latis Networks, Inc. (d.b.a. StillSecure). All rights reserved. Page 1 of 4. Intrusion Detection vs. Intrusion Prevention: ...<br />
<span class="a">www.stillsecure.com/docs/StillSecure_<wbr></wbr>CyberDefense_IPS_v_IDS_0304.pdf</span><br />
<br />
<a href="http://www.arl.wustl.edu/%7Esarang/jsac_cameraready.pdf"><b>Fast and Scalable Pattern Matching for Network Intrusion Detection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:L0ErjGbyVXUJ:www.arl.wustl.edu/%7Esarang/jsac_cameraready.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=524&lr=lang_en">View as HTML</a><br />
1. Fast and Scalable Pattern Matching for. Network Intrusion Detection Systems. Sarang Dharmapurikar, and John Lockwood, Member IEEE ...<br />
<span class="a">www.arl.wustl.edu/~sarang/jsac_cameraready.pdf</span><br />
<br />
<a href="http://www.iee.org/Events/SM_MarshallZhou.pdf"><b>Title of the presentation: SVM Classification for 802.11 Wireless ...</b></a> -<a href="http://72.14.205.104/search?q=cache:KkgTr7LS5z4J:www.iee.org/Events/SM_MarshallZhou.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=525&lr=lang_en">View as HTML</a><br />
Title of the presentation:. SVM Classification for 802.11 Wireless Intrusion Detection System Based. on MAC Layer frame Clustering. Author: ...<br />
<span class="a">www.iee.org/Events/SM_MarshallZhou.pdf</span><br />
<br />
<a href="http://www.cs.unt.edu/%7Esrt/papers/protomon-jucs.pdf"><b>ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:YCOlm0pgsioJ:www.cs.unt.edu/%7Esrt/papers/protomon-jucs.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=526&lr=lang_en">View as HTML</a><br />
ProtoMon: Embedded Monitors for Cryptographic Protocol. Intrusion Detection and Prevention. Sachin P. Joglekar. (University of North Texas, Denton, TX ...<br />
<span class="a">www.cs.unt.edu/~srt/papers/protomon-jucs.pdf</span><br />
<br />
<a href="http://www.ece.stevens-tech.edu/%7Eccomanic/gamenets_acm.pdf"><b>A Bayesian Game Approach for Intrusion Detection in Wireless Ad ...</b></a> -<a href="http://72.14.205.104/search?q=cache:3QUb8LzcpgAJ:www.ece.stevens-tech.edu/%7Eccomanic/gamenets_acm.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=527&lr=lang_en">View as HTML</a><br />
A Bayesian Game Approach for Intrusion Detection in. Wireless Ad Hoc Networks. ∗. Yu Liu. Department of Electrical and. Computer Engineering ...<br />
<span class="a">www.ece.stevens-tech.edu/~ccomanic/gamenets_acm.pdf</span><br />
<br />
<a href="http://scaramanga.co.uk/words/hpl-2004-01-23.pdf"><b>The Tao of Network Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:VeBMEdGdjAAJ:scaramanga.co.uk/words/hpl-2004-01-23.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=528&lr=lang_en">View as HTML</a><br />
Overview of Firestorms. Architecture. ●. Firestorm is a data-processing pipeline like. any other. ●. That is to say, network packets get stuffed in ...<br />
<span class="a">scaramanga.co.uk/words/hpl-2004-01-23.pdf</span><br />
<br />
<a href="http://www.am-utils.org/docs/i3fs/i3fs.pdf"><b>I FS: An In-Kernel Integrity Checker and Intrusion Detection File ...</b></a> -<a href="http://72.14.205.104/search?q=cache:bcl6m37rct8J:www.am-utils.org/docs/i3fs/i3fs.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=529&lr=lang_en">View as HTML</a><br />
I. 3. FS: An In-Kernel Integrity Checker and Intrusion Detection File System. Swapnil Patil, Anand Kashyap, Gopalan Sivathanu, and Erez Zadok ...<br />
<span class="a">www.am-utils.org/docs/i3fs/i3fs.pdf</span><br />
<br />
<a href="http://www.wtamu.edu/policies/documents/pdfs/security/intrustion_detection.pdf"><b>I.T. DIVISION TANDARD DMINISTRATIVE ROCEDURES Intrusion Detection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:Sg5BRmVx_RIJ:www.wtamu.edu/policies/documents/pdfs/security/intrustion_detection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=530&lr=lang_en">View as HTML</a><br />
I.T. DIVISION. S. TANDARD. A. DMINISTRATIVE. P. ROCEDURES. Intrusion Detection. 1. General. Intrusion detection plays an important role in implementing and ...<br />
<span class="a"> www.wtamu.edu/policies/documents/<wbr></wbr>pdfs/security/intrustion_detection.pdf</span><br />
<br />
<a href="http://tadek.pietraszek.org/publications/pietraszek05_data.pdf"><b>Data Mining and Machine Learning—Towards Reducing False Positives ...</b></a> -<a href="http://72.14.205.104/search?q=cache:AtSZZJ6VqsUJ:tadek.pietraszek.org/publications/pietraszek05_data.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=531&lr=lang_en">View as HTML</a><br />
Data Mining and Machine Learning—Towards Reducing False Positives. in Intrusion Detection. ∗. Tadeusz Pietraszek. a. and Axel Tanner ...<br />
<span class="a">tadek.pietraszek.org/publications/pietraszek05_data.pdf</span><br />
<br />
<a href="http://ww1.ucmss.com/books/LFS/CSREA2006/SAM5054.pdf"><b>Network Intrusion Detection System with Data Mart</b></a> -<a href="http://72.14.205.104/search?q=cache:OpSLHY6LipYJ:ww1.ucmss.com/books/LFS/CSREA2006/SAM5054.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=532&lr=lang_en">View as HTML</a><br />
Network Intrusion Detection System with Data Mart. R. A. Wasniowski. Computer Science Department. California State University Dominguez Hills ...<br />
<span class="a">ww1.ucmss.com/books/LFS/CSREA2006/SAM5054.pdf</span><br />
<br />
<a href="http://ww1.ucmss.com/books/LFS/CSREA2006/DMI8166.pdf"><b>Novel Evaluation Framework of Intrusion Detection Systems with ...</b></a> -<a href="http://72.14.205.104/search?q=cache:zaocxlJBJOAJ:ww1.ucmss.com/books/LFS/CSREA2006/DMI8166.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=533&lr=lang_en">View as HTML</a><br />
Novel Evaluation Framework of Intrusion Detection Systems. with Respect to Security Policies. Negmat Mullodzhanov. Computer Science. Graduate Center, CUNY ...<br />
<span class="a">ww1.ucmss.com/books/LFS/CSREA2006/DMI8166.pdf</span><br />
<br />
<a href="http://users.cs.dal.ca/%7Emheywood/X-files/Publications/PeterSOM-ids.pdf"><b>Host-Based Intrusion Detection Using Self-Organizing Maps</b></a> -<a href="http://72.14.205.104/search?q=cache:IgxGRZ7-pCUJ:users.cs.dal.ca/%7Emheywood/X-files/Publications/PeterSOM-ids.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=534&lr=lang_en">View as HTML</a><br />
Host-Based Intrusion Detection Using Self-Organizing Maps. Peter Lichodzijewski, A. Nur Zincir-Heywood, Member, IEEE, Malcolm I. Heywood, Member, IEEE ...<br />
<span class="a">users.cs.dal.ca/~mheywood/<wbr></wbr>X-files/Publications/PeterSOM-ids.pdf</span><br />
<br />
<a href="http://users.cs.dal.ca/%7Emheywood/X-files/Publications/27242325.pdf"><b>LNCS 2724 - A Linear Genetic Programming Approach to Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:MyCBEkYxNyQJ:users.cs.dal.ca/%7Emheywood/X-files/Publications/27242325.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=535&lr=lang_en">View as HTML</a><br />
E. Cantú-Paz et al. (Eds.): GECCO 2003, LNCS 2724, pp. 2325–2336, 2003. © Springer-Verlag Berlin Heidelberg 2003. A Linear Genetic Programming Approach to ...<br />
<span class="a">users.cs.dal.ca/~mheywood/<wbr></wbr>X-files/Publications/27242325.pdf</span><br />
<br />
<a href="http://www.crazylinux.net/downloads/projects/IDS.pdf"><b>By Aaron and Demetrios Intrusion Detection Systems (IDS)</b></a> -<a href="http://72.14.205.104/search?q=cache:3Ci8QsO6LP8J:www.crazylinux.net/downloads/projects/IDS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=536&lr=lang_en">View as HTML</a><br />
By Aaron and Demetrios. Intrusion Detection Systems (IDS). IDS detect attacks against your network by generating alarms when they observe an ...<br />
<span class="a">www.crazylinux.net/downloads/projects/IDS.pdf</span><br />
<br />
<a href="http://homestead.unl.edu/netgroup/alumnidocs/mchirumamilla.pdf"><b>An Agent Based Intrusion Detection and Response System for ...</b></a> -<a href="http://72.14.205.104/search?q=cache:DLg3UEmvqR4J:homestead.unl.edu/netgroup/alumnidocs/mchirumamilla.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=537&lr=lang_en">View as HTML</a><br />
An Agent Based Intrusion Detection and. Response System for Wireless LANs. By. Mohan K Chirumamilla. A master’s project presented to the faculty of the ...<br />
<span class="a"> homestead.unl.edu/netgroup/alumnidocs/mchirumamilla.pdf</span><br />
<br />
<a href="https://nws.niif.hu/ncd2005/docs/aen/066.pdf"><b>Distributed Anomaly-based Intrusion Detection System Judit Gyimesi ...</b></a> -<a href="http://72.14.205.104/search?q=cache:-B3REr0jdIcJ:https://nws.niif.hu/ncd2005/docs/aen/066.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=538&lr=lang_en">View as HTML</a><br />
Distributed Anomaly-based Intrusion Detection System. Judit Gyimesi. Budapest University of Technology and Economics. Intrusion Detection Systems (IDS) are ...<br />
<span class="a">https://nws.niif.hu/ncd2005/docs/aen/066.pdf</span><br />
<br />
<a href="http://www.engr.uvic.ca/%7Eforum/abstracts/aahmed.pdf"><b>BioTracker , Biometrics based Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:CtVmZXwr-sEJ:www.engr.uvic.ca/%7Eforum/abstracts/aahmed.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=539&lr=lang_en">View as HTML</a><br />
BioTracker. 1. , Biometrics based Intrusion Detection System. Ahmed Awad E. A. and Issa Traore, ISOT Research Lab, University of Victoria ...<br />
<span class="a">www.engr.uvic.ca/~forum/abstracts/aahmed.pdf</span><br />
<br />
<a href="http://www.cs.fit.edu/%7Epkc/papers/ieaaie04.pdf"><b>Motif-oriented Representation of Sequences for a Host- based ...</b></a> -<a href="http://72.14.205.104/search?q=cache:0kOqsubHhx8J:www.cs.fit.edu/%7Epkc/papers/ieaaie04.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=540&lr=lang_en">View as HTML</a><br />
Motif-oriented Representation of Sequences for a Host-. based Intrusion Detection System. Gaurav Tandon, Debasis Mitra, and Philip K. Chan ...<br />
<span class="a">www.cs.fit.edu/~pkc/papers/ieaaie04.pdf</span><br />
<br />
<a href="http://www.cs.utep.edu/vladik/2006/tr06-22.pdf"><b>Interval and Fuzzy Techniques in Business-Related Computer ...</b></a> -<a href="http://72.14.205.104/search?q=cache:TIDbbmLA0F0J:www.cs.utep.edu/vladik/2006/tr06-22.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=541&lr=lang_en">View as HTML</a><br />
Interval and Fuzzy Techniques in. Business-Related Computer Security:. Intrusion Detection, Privacy Protection. Mohsen Beheshti. 1. , Jianchao Han ...<br />
<span class="a">www.cs.utep.edu/vladik/2006/tr06-22.pdf</span><br />
<br />
<a href="http://mcn.cse.psu.edu/paper/zhang/milicom03-security.pdf"><b>SECURE ROUTING IN AD HOC NETWORKS AND A RELATED INTRUSION ...</b></a> -<a href="http://72.14.205.104/search?q=cache:dkFvGNgEjRwJ:mcn.cse.psu.edu/paper/zhang/milicom03-security.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=542&lr=lang_en">View as HTML</a><br />
SECURE ROUTING IN AD HOC NETWORKS AND A RELATED INTRUSION. DETECTION PROBLEM. Wensheng Zhang, R. Rao, Guohong Cao, and George Kesidis ...<br />
<span class="a">mcn.cse.psu.edu/paper/zhang/milicom03-security.pdf</span><br />
<br />
<a href="http://www.oregon.gov/ODOT/TD/TP_RES/docs/Reports/EvalIntrusionDetcTech.pdf"><b>EVALUATION OF INTRUSION DETECTION TECHNOLOGIES FOR HIGH SPEED RAIL ...</b></a><br />
EVALUATION OF INTRUSION DETECTION TECHNOLOGIES. FOR HIGH SPEED RAIL GRADE CROSSINGS. Final Report. by. Dr. J.R. Zaworski and Dr. K M. Hunter-Zaworski ...<br />
<span class="a">www.oregon.gov/ODOT/TD/TP_RES/<wbr></wbr>docs/Reports/EvalIntrusionDetcTech.pdf</span><br />
<br />
<a href="http://worminator.cs.columbia.edu/papers/2004/cs25th-20041022.pdf"><b>Collabor a tive Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:xm1-__yolTEJ:worminator.cs.columbia.edu/papers/2004/cs25th-20041022.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=544&lr=lang_en">View as HTML</a><br />
Collabor. a. tive. Intrusion. Detection. 010. 011. 101010011001110101. 110100001. XXX. XX. XX. Columbia. University. Intrusion. Detection ...<br />
<span class="a">worminator.cs.columbia.edu/<wbr></wbr>papers/2004/cs25th-20041022.pdf</span><br />
<br />
<a href="http://www.cs.ucdavis.edu/%7Evemuri/papers/som-ids.pdf"><b>NSOM: A Real-Time Network-Based Intrusion Detection System Using ...</b></a> -<a href="http://72.14.205.104/search?q=cache:6OGABKcsc-0J:www.cs.ucdavis.edu/%7Evemuri/papers/som-ids.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=545&lr=lang_en">View as HTML</a><br />
NSOM: A Real-Time Network-Based Intrusion. Detection System Using Self-Organizing Maps. Khaled Labib and Rao Vemuri. Department of Applied Science ...<br />
<span class="a">www.cs.ucdavis.edu/~vemuri/papers/som-ids.pdf</span><br />
<br />
<a href="http://www.cs.ucdavis.edu/research/tech-reports/2006/CSE-2006-18.pdf"><b>Techniques for Improving the Performance of Signature-Based ...</b></a> -<a href="http://72.14.205.104/search?q=cache:L9xJvfFF8h8J:www.cs.ucdavis.edu/research/tech-reports/2006/CSE-2006-18.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=546&lr=lang_en">View as HTML</a><br />
Techniques for Improving the Performance of. Signature-Based Network Intrusion Detection Systems. By. PATRICK STUART WHEELER ...<br />
<span class="a">www.cs.ucdavis.edu/research/<wbr></wbr>tech-reports/2006/CSE-2006-18.pdf</span><br />
<br />
<a href="http://www.ashleylaurent.com/documents/intrusion_detection.pdf"><b>Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:CmBQCmtSpgEJ:www.ashleylaurent.com/documents/intrusion_detection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=547&lr=lang_en">View as HTML</a><br />
Intrusion Detection System. Customizable Network Intrusion Detection Component. Overview. Network attacks and threats are becoming. more common and complex. ...<br />
<span class="a"> www.ashleylaurent.com/documents/intrusion_detection.pdf</span><br />
<br />
<a href="http://www.wolthusen.com/publications/IAW2002.pdf"><b>Distributed Intrusion Detection for Policy-Controlled ...</b></a> -<a href="http://72.14.205.104/search?q=cache:LyLW3_36YvUJ:www.wolthusen.com/publications/IAW2002.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=548&lr=lang_en">View as HTML</a><br />
1. Proceedings of the 2002 IEEE. Workshop on Information Assurance and Security. T1B2. 1555. United States Military Academy, West Point, NY, 17–19 June 2002 ...<br />
<span class="a">www.wolthusen.com/publications/IAW2002.pdf</span><br />
<br />
<a href="http://www.csg.is.titech.ac.jp/paper/kourai-vee2005.pdf"><b>HyperSpector: Virtual Distributed Monitoring Environments for ...</b></a> -<a href="http://72.14.205.104/search?q=cache:R_8lrm0_VskJ:www.csg.is.titech.ac.jp/paper/kourai-vee2005.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=549&lr=lang_en">View as HTML</a><br />
HyperSpector: Virtual Distributed Monitoring. Environments for Secure Intrusion Detection. Kenichi Kourai. Department of Mathematical and ...<br />
<span class="a">www.csg.is.titech.ac.jp/paper/kourai-vee2005.pdf</span><br />
<br />
<a href="http://img.lightreading.com/uni/pdf/0104toc.pdf"><b>Intrusion Detection and Prevention for 802.11 Wireless LANs</b></a><br />
January Highlights. • Wireless IDS will soon. become vital to large. enterprise wireless LANs –. major infrastructure vendors. know this and are set to ...<br />
<span class="a">img.lightreading.com/uni/pdf/0104toc.pdf</span><br />
<br />
<a href="http://www.ja.net/services/events/archive/2000/protecting-network/nlpresentation.pdf"><b>Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:1aBCoqiR-G8J:www.ja.net/services/events/archive/2000/protecting-network/nlpresentation.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=551&lr=lang_en">View as HTML</a><br />
Introduction. Network Intrusion Detection Systems (IDS). are used to monitor attempts (successful. or otherwise) to use remote exploits . ...<br />
<span class="a">www.ja.net/services/events/archive/<wbr></wbr>2000/protecting-network/nlpresentation.pdf</span><br />
<br />
<a href="http://www.cs.utexas.edu/%7Ejayeshs/SPAID.pdf"><b>A System for Power-aware Agent-based Intrusion Detection (SPAID ...</b></a> -<a href="http://72.14.205.104/search?q=cache:pALDUHctjMQJ:www.cs.utexas.edu/%7Ejayeshs/SPAID.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=552&lr=lang_en">View as HTML</a><br />
A System for Power-aware Agent-based Intrusion. Detection (SPAID) in Wireless Ad Hoc Networks. T.Srinivasan. 1. , Jayesh Seshadri ...<br />
<span class="a">www.cs.utexas.edu/~jayeshs/SPAID.pdf</span><br />
<br />
<a href="http://www.infosec.co.kr/english/documentation/secoshield31_brochure.pdf"><b>INTRUSION DETECTION SYSTEM</b></a><br />
SecoShield v3.1 is a network-based, real-time, 'reactive' intrusion detection and. response system that provides unmatched security performance. ...<br />
<span class="a">www.infosec.co.kr/english/<wbr></wbr>documentation/secoshield31_brochure.pdf</span><br />
<br />
<a href="http://www.entropy.ie/research/snort4-latest.pdf"><b>Intrusion Detection Intrusion Detection Intrusion Detection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:8MBHvNC1Q1YJ:www.entropy.ie/research/snort4-latest.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=554&lr=lang_en">View as HTML</a><br />
File Name: snort4-latest.doc. 1. Intrusion Detection. Intrusion Detection. Intrusion Detection. Intrusion Detection –– 1.1 ...<br />
<span class="a">www.entropy.ie/research/snort4-latest.pdf</span><br />
<br />
<a href="http://www.inf.uni-konstanz.de/disy/publications/waldvogel/janakiraman03indra.pdf"><b>Indra: A peer-to-peer approach to network intrusion detection and ...</b></a> -<a href="http://72.14.205.104/search?q=cache:Q__3AXZ1qp0J:www.inf.uni-konstanz.de/disy/publications/waldvogel/janakiraman03indra.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=555&lr=lang_en">View as HTML</a><br />
Indra: A peer-to-peer approach to network intrusion. detection and prevention. Ramaprabhu Janakiraman. Marcel Waldvogel. Qi Zhang ...<br />
<span class="a">www.inf.uni-konstanz.de/disy/<wbr></wbr>publications/waldvogel/janakiraman03indra.pdf</span><br />
<br />
<a href="http://www.utdallas.edu/%7Eogut/WITS2003.pdf"><b>Intrusion Detection Policies for IT Security Breaches Hulisi Ogut ...</b></a> -<a href="http://72.14.205.104/search?q=cache:TiNWE8LSL08J:www.utdallas.edu/%7Eogut/WITS2003.PDF+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=556&lr=lang_en">View as HTML</a><br />
Intrusion Detection Policies for IT Security Breaches. Hulisi Ogut, Srinivasan Raghunathan. Huseyin Cavusoglu. School of Management ...<br />
<span class="a">www.utdallas.edu/~ogut/WITS2003.PDF</span><br />
<br />
<a href="http://chacs.nrl.navy.mil/publications/CHACS/2001/2001moskowitz-rra.pdf"><b>Randomly Roving Agents for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:OdY82X2UNgsJ:chacs.nrl.navy.mil/publications/CHACS/2001/2001moskowitz-rra.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=557&lr=lang_en">View as HTML</a><br />
Randomly Roving Agents for Intrusion. Detection. Ira S. Moskowitz. y. , Myong H. Kang. z. , LiWu Chang, & Garth E. Longdon ...<br />
<span class="a">chacs.nrl.navy.mil/publications/<wbr></wbr>CHACS/2001/2001moskowitz-rra.pdf</span><br />
<br />
<a href="https://eldorado.uni-dortmund.de/bitstream/2003/22795/1/AbendrothSlides.pdf"><b>New Intrusion Detection Strategies by the use of Partial Outsourcing</b></a> -<a href="http://72.14.205.104/search?q=cache:xITQATD3xXEJ:https://eldorado.uni-dortmund.de/bitstream/2003/22795/1/AbendrothSlides.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=558&lr=lang_en">View as HTML</a><br />
New Intrusion Detection Strategies. by the use of Partial Outsourcing. Implemented in the ASCap Framework. Jorg Abendroth. Distributed Systems Group ...<br />
<span class="a"> https://eldorado.uni-dortmund.de/<wbr></wbr>bitstream/2003/22795/1/AbendrothSlides.pdf</span><br />
<br />
<a href="https://eldorado.uni-dortmund.de/bitstream/2003/22808/1/LaskovSlides.pdf"><b>Intrusion detection in unlabeled data with quarter-sphere Support ...</b></a> -<a href="http://72.14.205.104/search?q=cache:w6KhO-xT294J:https://eldorado.uni-dortmund.de/bitstream/2003/22808/1/LaskovSlides.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=559&lr=lang_en">View as HTML</a><br />
Intrusion detection in unlabeled data with. quarter-sphere Support Vector Machines. Pavel Laskov. Christin Schäfer. Igor Kotenko. Fraunhofer FIRST.IDA ...<br />
<span class="a"> https://eldorado.uni-dortmund.de/<wbr></wbr>bitstream/2003/22808/1/LaskovSlides.pdf</span><br />
<br />
<a href="http://www.cs.ucl.ac.uk/teaching/dcnds/group-reports/2003/2003-hailes-b-summary.pdf"><b>Network Intrusion Detection & Active-Response System</b></a> -<a href="http://72.14.205.104/search?q=cache:xvmbRaqVF1sJ:www.cs.ucl.ac.uk/teaching/dcnds/group-reports/2003/2003-hailes-b-summary.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=560&lr=lang_en">View as HTML</a><br />
NIRS. Network Intrusion Detection &. Active-Response System. EXECUTIVE SUMMARY. MSc DCNDS Group 4. Department of Computer Science, University College London ...<br />
<span class="a"> www.cs.ucl.ac.uk/teaching/dcnds/<wbr></wbr>group-reports/2003/2003-hailes-b-summary.pdf</span><br />
<br />
<a href="http://storageconference.org/2005/papers/11_BanikazemiM_storagebased.pdf"><b>Storage-Based Intrusion Detection for Storage Area Networks (SANs)</b></a> -<a href="http://72.14.205.104/search?q=cache:ZCzIOnq1ovQJ:storageconference.org/2005/papers/11_BanikazemiM_storagebased.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=561&lr=lang_en">View as HTML</a><br />
Storage-Based Intrusion Detection. for Storage Area Networks (SANs). Mohammad Banikazemi. Dan Poff. Bulent Abali. Thomas J. Watson Research Center ...<br />
<span class="a">storageconference.org/2005/<wbr></wbr>papers/11_BanikazemiM_storagebased.pdf</span><br />
<br />
<a href="http://www.securitydocs.com/pdf/2650.pdf"><b>The Use of Network Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:nqgIE2Y2gWUJ:www.securitydocs.com/pdf/2650.PDF+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=562&lr=lang_en">View as HTML</a><br />
The Use of Network Intrusion Detection System. by: YY Ngai, 10/25/2004. http://www.securitydocs.com/library/2650. About the author: ...<br />
<span class="a">www.securitydocs.com/pdf/2650.PDF</span><br />
<br />
<a href="http://www.securitydocs.com/pdf/2641.pdf"><b>Intelligent Distributed Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:4WGarbrD-toJ:www.securitydocs.com/pdf/2641.PDF+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=563&lr=lang_en">View as HTML</a><br />
Intelligent Distributed Intrusion Detection Systems. by: Rajesh T Sivanandan, 10/14/2004. http://www.securitydocs.com/library/2641. Abstract ...<br />
<span class="a">www.securitydocs.com/pdf/2641.PDF</span><br />
<br />
<a href="http://www.journal.au.edu/au_techno/2003/jan2003/aujt6-3_article01.pdf"><b>Router-Based Intrusion Detection with Soft Computing</b></a> -<a href="http://72.14.205.104/search?q=cache:bLi1inZVOFMJ:www.journal.au.edu/au_techno/2003/jan2003/aujt6-3_article01.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=564&lr=lang_en">View as HTML</a><br />
AU J.T. 6(2): 109-114 (Oct. 2002). 109. Fuzzy Intrusion Detection System. Piyakul Tillapart, Thanachai Thumthawatworn and Pratit Santiprabhob ...<br />
<span class="a">www.journal.au.edu/au_techno/<wbr></wbr>2003/jan2003/aujt6-3_article01.pdf</span><br />
<br />
<a href="http://www.cs.uvic.ca/%7Ewkui/research/IDS.pdf"><b>Zone-Based Intrusion Detection for Mobile Ad Hoc Networks*</b></a> -<a href="http://72.14.205.104/search?q=cache:iztTxbj_hCIJ:www.cs.uvic.ca/%7Ewkui/research/IDS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=565&lr=lang_en">View as HTML</a><br />
Zone-Based Intrusion Detection for Mobile Ad Hoc. Networks*. Bo Sun. Dept. of Computer Science. Texas A&M University. College Station TX 77843-3112 ...<br />
<span class="a">www.cs.uvic.ca/~wkui/research/IDS.pdf</span><br />
<br />
<a href="http://www.dice.ucl.ac.be/Proceedings/esann/esannpdf/es2005-145.pdf"><b>UNSUPERVISED FUZZY ENSEMBLES AND THEIR USE IN INTRUSION DETECTION</b></a> -<a href="http://72.14.205.104/search?q=cache:sMr7KRB2w48J:www.dice.ucl.ac.be/Proceedings/esann/esannpdf/es2005-145.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=566&lr=lang_en">View as HTML</a><br />
UNSUPERVISED FUZZY ENSEMBLES AND. THEIR USE IN INTRUSION DETECTION. Paul F. Evangelista. 1. , Piero Bonissone. 2. , Mark J. Embrechts ...<br />
<span class="a">www.dice.ucl.ac.be/Proceedings/<wbr></wbr>esann/esannpdf/es2005-145.pdf</span><br />
<br />
<a href="http://www.iadat.org/tcn2004/abstracts_web/IADAT-tcn2004_42.pdf"><b>INTRUSION DETECTION ALARM CORRELATION: A SURVEY</b></a> -<a href="http://72.14.205.104/search?q=cache:B_rwVKSGlhYJ:www.iadat.org/tcn2004/abstracts_web/IADAT-tcn2004_42.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=567&lr=lang_en">View as HTML</a><br />
INTRUSION DETECTION ALARM CORRELATION: A SURVEY. Urko Zurutuza, Roberto Uribeetxeberria. Abstract. It is 17 years since Dorothy Denning proposed the first ...<br />
<span class="a">www.iadat.org/tcn2004/<wbr></wbr>abstracts_web/IADAT-tcn2004_42.pdf</span><br />
<br />
<a href="http://www.cse.fau.edu/%7Ezhong/papers/idclust.pdf"><b>f CLUSTERING-BASED NETWORK INTRUSION DETECTION and 1. Introduction</b></a> -<a href="http://72.14.205.104/search?q=cache:sK7WUXjdqNYJ:www.cse.fau.edu/%7Ezhong/papers/idclust.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=568&lr=lang_en">View as HTML</a><br />
International Journal of Reliability, Quality and Safety Engineering. f. c World Scientific Publishing Company. CLUSTERING-BASED NETWORK INTRUSION DETECTION ...<br />
<span class="a">www.cse.fau.edu/~zhong/papers/idclust.pdf</span><br />
<br />
<a href="http://userpages.umbc.edu/%7Ejgood/publications/goodall-iaw05.pdf"><b>User Requirements and Design of a Visualization for Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:ElhdD449htcJ:userpages.umbc.edu/%7Ejgood/publications/goodall-iaw05.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=569&lr=lang_en">View as HTML</a><br />
Abstract – This paper reports on the user requirements. gathering activities and design of an information visualization. tool for analyzing network data for ...<br />
<span class="a">userpages.umbc.edu/~jgood/<wbr></wbr>publications/goodall-iaw05.pdf</span><br />
<br />
<a href="http://cms.isn.ch/public/docs/doc_6961_259_en.pdf"><b>IMoViS: A SYSTEM FOR MOBILE VISUALIZATION OF INTRUSION DETECTION DATA</b></a><br />
INFORMATION & SECURITY. An International Journal, Vol.12, No.2, 2003, 235-249. ++. I&S. IMoViS: A SYSTEM FOR MOBILE VISUALIZATION ...<br />
<span class="a">cms.isn.ch/public/docs/doc_6961_259_en.pdf</span><br />
<br />
<a href="http://www.netlab.tkk.fi/opetus/s38310/02-03/jussila_060503.pdf"><b>Intrusion Detection Systems Principles, Architecture and Measurements</b></a> -<a href="http://72.14.205.104/search?q=cache:Qk5rGFtqxasJ:www.netlab.tkk.fi/opetus/s38310/02-03/jussila_060503.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=571&lr=lang_en">View as HTML</a><br />
Intrusion Detection Systems. Principles, Architecture. and Measurements. S3 HUT,6.5.2003, Ville Jussila (vsjussil@netlab.hut.fi). Supervisor: prof. ...<br />
<span class="a">www.netlab.tkk.fi/opetus/<wbr></wbr>s38310/02-03/jussila_060503.pdf</span><br />
<br />
<a href="http://www.sistelsrl.it/networking/net_attivo/pdf/fortigate50.pdf"><b>FEA TURE LIST Antivirus Protection Web Content Filtering Firewall ...</b></a> -<a href="http://72.14.205.104/search?q=cache:HJx3wU2JplkJ:www.sistelsrl.it/networking/net_attivo/pdf/fortigate50.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=572&lr=lang_en">View as HTML</a><br />
50. FEA. TURE LIST. B R E A K. T H E. C O N T E N T. P R O C E S S I N G. B A R R I E R. DELIVERING. FUNCTIONALITY &. PERFORMANCE TO. THE SMALL OFFICE ...<br />
<span class="a">www.sistelsrl.it/networking/<wbr></wbr>net_attivo/pdf/fortigate50.pdf</span><br />
<br />
<a href="http://www.potaroo.net/t4/docs/sim001.pdf"><b>m01 Intrusion Detection</b></a> - <a href="http://72.14.205.104/search?q=cache:2xvebaRUs4cJ:www.potaroo.net/t4/docs/sim001.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=573&lr=lang_en">View as HTML</a><br />
Security Improvement Module. CMU/SEI-SIM-001. Detecting Signs of Intrusion. Robert Firth. Gary Ford. Barbara Fraser. John Kochmar. Suresh Konda ...<br />
<span class="a">www.potaroo.net/t4/docs/sim001.pdf</span><br />
<br />
<a href="http://www.tu-ilmenau.de/fakia/fileadmin/template/startIA/telematik/Mitarbeiter/schaefer/Publications/dfn03.pdf"><b>Combining Multiple Intrusion Detection and Response Technologies ...</b></a> -<a href="http://72.14.205.104/search?q=cache:4Bnhcbz_dpcJ:www.tu-ilmenau.de/fakia/fileadmin/template/startIA/telematik/Mitarbeiter/schaefer/Publications/dfn03.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=574&lr=lang_en">View as HTML</a><br />
Combining Multiple Intrusion Detection and Response Technologies in an. Active Networking Based Architecture. A. Hess, M. Jung, G. Schafer ...<br />
<span class="a"> www.tu-ilmenau.de/fakia/fileadmin/template/<wbr></wbr>startIA/telematik/Mitarbeiter/schaefer/Publications/dfn03.pdf</span><br />
<br />
<a href="http://tldp.org/linuxfocus/English/Archives/lf-2003_07-0294.pdf"><b>IDS - Intrusion Detection System, Part II Analysis Possibilities</b></a> -<a href="http://72.14.205.104/search?q=cache:svPfonKDxxoJ:tldp.org/linuxfocus/English/Archives/lf-2003_07-0294.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=575&lr=lang_en">View as HTML</a><br />
LinuxFocus article number 294. http://linuxfocus.org. by Klaus Müller. <socma(at)gmx.net>. About the author:. At present "Klaus Müller ...<br />
<span class="a">tldp.org/linuxfocus/English/<wbr></wbr>Archives/lf-2003_07-0294.pdf</span><br />
<br />
<a href="http://www.tkn.tu-berlin.de/publications/papers/dfn03.pdf"><b>Combining Multiple Intrusion Detection and Response Technologies ...</b></a> -<a href="http://72.14.205.104/search?q=cache:BHEIx1EJcpAJ:www.tkn.tu-berlin.de/publications/papers/dfn03.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=576&lr=lang_en">View as HTML</a><br />
Combining Multiple Intrusion Detection and Response Technologies. in an Active Networking Based Architecture. A. Hess, M. Jung, G. Schafer ...<br />
<span class="a">www.tkn.tu-berlin.de/publications/papers/dfn03.pdf</span><br />
<br />
<a href="http://research.cs.ncl.ac.uk/cabernet/www.laas.research.ec.org/cabernet/workshops/radicals/2003/papers/paper.pdf_3.pdf"><b>The Vernes architecture: Dependable Wide-Area Intrusion Detection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:xusMzbK8TRMJ:research.cs.ncl.ac.uk/cabernet/www.laas.research.ec.org/cabernet/workshops/radicals/2003/papers/paper.pdf_3.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=577&lr=lang_en">View as HTML</a><br />
The Vernes architecture:. Dependable Wide-Area. Intrusion Detection Systems. Nuno Miguel Neves. ∗. nneves@di.fc.ul.pt. July 2003. 1 Abstract ...<br />
<span class="a"> research.cs.ncl.ac.uk/.../www.laas.research.ec.org/<wbr></wbr>cabernet/workshops/radicals/2003/papers/paper.pdf_3.pdf</span><br />
<br />
<a href="http://eudoxus.usc.edu/CHAOS/dyn_modelingfinal17.pdf"><b>Dynamic Modeling of Internet Traffic for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:HBiGlwh5fBkJ:eudoxus.usc.edu/CHAOS/dyn_modelingfinal17.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=578&lr=lang_en">View as HTML</a><br />
Hindawi Publishing Corporation. EURASIP Journal on Advances in Signal Processing. Volume 2007, Article ID 90312, 14 pages. doi:10.1155/2007/90312 ...<br />
<span class="a">eudoxus.usc.edu/CHAOS/dyn_modelingfinal17.pdf</span><br />
<br />
<a href="http://www.informatics.sussex.ac.uk/prizes/2002_ellis.pdf"><b>COGS Final Year Project Computer Science and Artificial ...</b></a> -<a href="http://72.14.205.104/search?q=cache:rWMCUzfs-b0J:www.informatics.sussex.ac.uk/prizes/2002_ellis.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=579&lr=lang_en">View as HTML</a><br />
David Ellis. Candidate No:. COGS Final Year Project. Computer Science and Artificial Intelligence. Supervisor: Ian Wakeman. May 2002 ...<br />
<span class="a">www.informatics.sussex.ac.uk/prizes/2002_ellis.pdf</span><br />
<br />
<a href="http://ftp.cerias.purdue.edu/pub/papers/Tripwire/Tripwire-SANS.pdf"><b>Experiences with Tripwire: Using Integrity Checkers for Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:noDklOQlkekJ:ftp.cerias.purdue.edu/pub/papers/Tripwire/Tripwire-SANS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=580&lr=lang_en">View as HTML</a><br />
Experiences with Tripwire:. Using Integrity Checkers for Intrusion Detection. Purdue Technical Report CSD-TR-93-071. Gene H. Kim and Eugene H. Spafford ...<br />
<span class="a">ftp.cerias.purdue.edu/pub/<wbr></wbr>papers/Tripwire/Tripwire-SANS.pdf</span><br />
<br />
<a href="http://www-i4.informatik.rwth-aachen.de/sap/publications/41.pdf"><b>Privacy Enhanced Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:lWERlvQJMXkJ:www-i4.informatik.rwth-aachen.de/sap/publications/41.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=581&lr=lang_en">View as HTML</a><br />
Privacy Enhanced Intrusion Detection. Roland Büschkes. Aachen University of Technology – Department of Computer Science. Informatik 4 (Communication Systems ...<br />
<span class="a">www-i4.informatik.rwth-aachen.de/<wbr></wbr>sap/publications/41.pdf</span><br />
<br />
<a href="http://seclab.cs.sunysb.edu/seclab1/pubs/papers/raid01.pdf"><b>Experiences with Specification-based Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:CwxaAMeJHtUJ:seclab.cs.sunysb.edu/seclab1/pubs/papers/raid01.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=582&lr=lang_en">View as HTML</a><br />
Experiences with. Specification-based Intrusion Detection. P. Uppuluri and R. Sekar. Department of Computer Science. SUNY at Stony Brook, NY 11794. ...<br />
<span class="a">seclab.cs.sunysb.edu/seclab1/pubs/papers/raid01.pdf</span><br />
<br />
<a href="http://www.cs.purdue.edu/homes/ninghui/courses/426_Fall06/lectures/ids_intro.pdf"><b>An Introduction to Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:tefQiH8tsR4J:www.cs.purdue.edu/homes/ninghui/courses/426_Fall06/lectures/ids_intro.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=583&lr=lang_en">View as HTML</a><br />
Terminology. • What is an intrusion? – Examples include. • Breaching a locked door. • Password guessing. • Escalation of privilege ...<br />
<span class="a">www.cs.purdue.edu/homes/ninghui/<wbr></wbr>courses/426_Fall06/lectures/ids_intro.pdf</span><br />
<br />
<a href="http://www.l-3klein.com/intrusion_detection/ais-pdf.pdf"><b>Advanced Capability Waterside Intrusion Detection Radar</b></a> -<a href="http://72.14.205.104/search?q=cache:XLQgNXKRH9YJ:www.l-3klein.com/intrusion_detection/ais-pdf.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=584&lr=lang_en">View as HTML</a><br />
Automatic Identification System (AIS). Ground Station and Shipboard Equipment. Overview. AIS was developed in response to international and national ...<br />
<span class="a">www.l-3klein.com/intrusion_detection/ais-pdf.pdf</span><br />
<br />
<a href="http://www.iacwcu.com/documents/NCA2004.pdf"><b>Intrusion Detection in Sensor Networks: A Non-cooperative Game ...</b></a> -<a href="http://72.14.205.104/search?q=cache:y7iQ7RrzT-AJ:www.iacwcu.com/documents/NCA2004.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=585&lr=lang_en">View as HTML</a><br />
Intrusion Detection in Sensor Networks: A. Non-cooperative Game Approach. Afrand Agah*, Sajal K. Das*, Kalyan Basu*. Mehran Asadi** ...<br />
<span class="a">www.iacwcu.com/documents/NCA2004.pdf</span><br />
<br />
<a href="http://webdia.cem.itesm.mx/ac/raulm/pub/awic04.pdf"><b>Attribute Reduction for Effective Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:gsCT96L08jsJ:webdia.cem.itesm.mx/ac/raulm/pub/awic04.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=586&lr=lang_en">View as HTML</a><br />
Attribute Reduction for Effective Intrusion. Detection. Fernando Godınez. 1. and Dieter Hutter. 2. and Raul Monroy. 3. 1. Centre for Intelligent Systems, ...<br />
<span class="a">webdia.cem.itesm.mx/ac/raulm/pub/awic04.pdf</span><br />
<br />
<a href="http://www.stee.stengg.com/newsrm/Vol18No2/Page14.pdf"><b>A Foolproof Intrusion Detection System FOMGuard ST9100</b></a> -<a href="http://72.14.205.104/search?q=cache:xe8ktvizNZgJ:www.stee.stengg.com/newsrm/Vol18No2/Page14.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=587&lr=lang_en">View as HTML</a><br />
page 14 electronics review. A Foolproof Intrusion Detection System. FOMGuard ST9100. FOMGuard ST9100 is an intrusion. detection system designed to protect ...<br />
<span class="a">www.stee.stengg.com/newsrm/Vol18No2/Page14.pdf</span><br />
<br />
<a href="http://www.hawaii.edu/brownbags/security/sthi2.handouts.pdf"><b>Firewalls and Intrusion Detection Systems handouts</b></a> -<a href="http://72.14.205.104/search?q=cache:KArODyGdUFIJ:www.hawaii.edu/brownbags/security/sthi2.handouts.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=588&lr=lang_en">View as HTML</a><br />
1. Proprietary and Confidential to STHI and University of Hawai. Firewalls and Intrusion Detection. Evaluating the technology,. capabilities, and issues ...<br />
<span class="a"> www.hawaii.edu/brownbags/security/sthi2.handouts.pdf</span><br />
<br />
<a href="http://www.hawaii.edu/brownbags/security/sthi2.pdf"><b>Firewalls and Intrusion Detection powerpoint</b></a><br />
Proprietary and Confidential to STHI and University of Hawaii. Firewalls and Intrusion Detection. Evaluating the technology,. capabilities, and issues ...<br />
<span class="a">www.hawaii.edu/brownbags/security/sthi2.pdf</span><br />
<br />
<a href="http://penguin.ewu.edu/%7Eainoue/inacm051005/fuzz04svm_slide.pdf"><b>Support Vector Classifiers and Network Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:paTFah6cJ94J:penguin.ewu.edu/%7Eainoue/inacm051005/fuzz04svm_slide.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=590&lr=lang_en">View as HTML</a><br />
Support Vector Classifiers and. Network Intrusion Detection. John Mill. Spokane Falls Community College, USA. Atsushi Inoue. Eastern Washington University ...<br />
<span class="a"> penguin.ewu.edu/~ainoue/inacm051005/fuzz04svm_slide.pdf</span><br />
<br />
<a href="http://www.cs.ubc.ca/%7Emalam/aphids/MohammedSAlamMastersThesis05.pdf"><b>APHIDS++: Evolution of A Programmable Hybrid Intrusion Detection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:MdClC_M8W98J:www.cs.ubc.ca/%7Emalam/aphids/MohammedSAlamMastersThesis05.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=591&lr=lang_en">View as HTML</a><br />
APHIDS++: Evolution of A Programmable Hybrid. Intrusion Detection System. by. Mohammed Shahidul Alam. B.Sc., The University of Texas at Austin, 2002 ...<br />
<span class="a">www.cs.ubc.ca/~malam/aphids/<wbr></wbr>MohammedSAlamMastersThesis05.pdf</span><br />
<br />
<a href="http://www.first.org/events/progconf/2000/SP-03.pdf"><b>Temporal-Probabilistic Network Approach for Anomaly Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:mrHi1NKSnDQJ:www.first.org/events/progconf/2000/SP-03.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=592&lr=lang_en">View as HTML</a><br />
Temporal-Probabilistic Network Approach for Anomaly Intrusion. Detection. Alexandr Seleznyov. 1. , Vagan Terziyan. 2. , Seppo Puuronen ...<br />
<span class="a">www.first.org/events/progconf/2000/SP-03.pdf</span><br />
<br />
<a href="http://www.cs.dal.ca/research/techreports/2005/CS-2005-15.pdf"><b>Information Visualization for an Intrusion Detection System ...</b></a> -<a href="http://72.14.205.104/search?q=cache:z9uWwaL21NwJ:www.cs.dal.ca/research/techreports/2005/CS-2005-15.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=593&lr=lang_en">View as HTML</a><br />
Information Visualization for an Intrusion Detection System. James Blustein. Daniel L. Silver. Ching-Lung Fu. Technical Report CS-2005-15. July 28, 2005 ...<br />
<span class="a"> www.cs.dal.ca/research/techreports/2005/CS-2005-15.pdf</span><br />
<br />
<a href="http://www.expsys.com/solutions/intrusion_detection_flyer2.pdf"><b>Intrusion Detection & Virus Protection!</b></a> -<a href="http://72.14.205.104/search?q=cache:I1NJL6LWl7IJ:www.expsys.com/solutions/intrusion_detection_flyer2.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=594&lr=lang_en">View as HTML</a><br />
Expert Systems. Resources inc. Call us today to arrange. for your complimentary. consultation at:. 416-299-7017. Providing piece-of-mind ...<br />
<span class="a">www.expsys.com/solutions/intrusion_detection_flyer2.pdf</span><br />
<br />
<a href="http://www.dis.uniroma1.it/%7Edottorato/db/relazioni/relaz_chirichiello_1.pdf"><b>Automated Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:KEtsj9qYyskJ:www.dis.uniroma1.it/%7Edottorato/db/relazioni/relaz_chirichiello_1.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=595&lr=lang_en">View as HTML</a><br />
Automated Intrusion Detection. Antonella Chirichiello. Rome, 17th October 2005. 1 Introduction to Security Management. Security Management is gaining more ...<br />
<span class="a">www.dis.uniroma1.it/~dottorato/<wbr></wbr>db/relazioni/relaz_chirichiello_1.pdf</span><br />
<br />
<a href="http://www.fortinet.com/doc/press/FortiOS250FeaturesFunctionalityR103.pdf"><b>New Features and Enhancements in FortiOS™ 2.5 Intrusion Detection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:nKP_v9sVaqMJ:www.fortinet.com/doc/press/FortiOS250FeaturesFunctionalityR103.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=596&lr=lang_en">View as HTML</a><br />
New Features and Enhancements in FortiOS™ 2.5. Intrusion Detection/Prevention Support. Preventive protection against 30+ common DoS and DDos attacks ...<br />
<span class="a">www.fortinet.com/doc/press/<wbr></wbr>FortiOS250FeaturesFunctionalityR103.pdf</span><br />
<br />
<a href="http://www.cs.uidaho.edu/%7Ekrings/CS448/Notes.2006/2006-13-ssn.pdf"><b>Dealing with Patterns Dealing with Patterns Intrusion Detection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:_bkca1Dk19oJ:www.cs.uidaho.edu/%7Ekrings/CS448/Notes.2006/2006-13-ssn.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=597&lr=lang_en">View as HTML</a><br />
1. Page: 1. © 2006 A.W. Krings. CS448/548 Survivable Systems and Networks, Lecture 13. Dealing with Patterns. Dealing with Patterns ...<br />
<span class="a">www.cs.uidaho.edu/~krings/<wbr></wbr>CS448/Notes.2006/2006-13-ssn.pdf</span><br />
<br />
<a href="http://www.cs.utsa.edu/%7Elortiz/2006Fall_PreNov22.pdf"><b>Recent Advances in Network Intrusion Detection System Tuning</b></a> -<a href="http://72.14.205.104/search?q=cache:i1Lb-U9JU_EJ:www.cs.utsa.edu/%7Elortiz/2006Fall_PreNov22.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=598&lr=lang_en">View as HTML</a><br />
Recent Advances in Network Intrusion Detection. System Tuning. Joel Sommers. University of Wisconsin-Madison. jsommers@cs.wisc.edu. Vinod Yegneswaran ...<br />
<span class="a">www.cs.utsa.edu/~lortiz/2006Fall_PreNov22.pdf</span><br />
<br />
<a href="http://www.icsalabs.com/icsa/docs/html/communities/ids/whitepaper/Intrusion1.pdf"><b>Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:dBfJKrU_OM4J:www.icsalabs.com/icsa/docs/html/communities/ids/whitepaper/Intrusion1.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=599&lr=lang_en">View as HTML</a><br />
ICSA, Inc. For more information, call 888-396-8348. 2. An Introduction to Intrusion Detection and Assessment. Participating Vendors: ...<br />
<span class="a">www.icsalabs.com/icsa/docs/html/<wbr></wbr>communities/ids/whitepaper/Intrusion1.pdf</span><br />
<br />
<a href="http://www.gmasterinc.com/ca-pdf/eTrust-Intrusion.pdf"><b>Trust Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:zDfvLYmHs_0J:www.gmasterinc.com/ca-pdf/eTrust-Intrusion.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=600&lr=lang_en">View as HTML</a><br />
Managing eBusiness Security. eTrust Intrusion Detection delivers comprehensive. network protection capabilities, with built-in, ...<br />
<span class="a">www.gmasterinc.com/ca-pdf/eTrust-Intrusion.pdf</span><br />
<br />
<div><a href="http://seclab.cs.sunysb.edu/seclab1/pubs/papers/ccs99.pdf"><b>A High-Performance Network Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:_QAhVUOQohcJ:seclab.cs.sunysb.edu/seclab1/pubs/papers/ccs99.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=601&lr=lang_en">View as HTML</a><br />
A High-Performance Network Intrusion Detection System. R. Sekar. Y. Guang. S. Verma. T. Shanbhag. SUNY at Stony Brook, NY. Iowa State University, Ames, IA ...<br />
<span class="a"> seclab.cs.sunysb.edu/seclab1/pubs/papers/ccs99.pdf</span><br />
<br />
<a href="http://www.itsec.gov.cn/webportal/download/88.pdf"><b>Wireless intrusion detection</b></a> -<a href="http://72.14.205.104/search?q=cache:Yu3YdMFr7voJ:www.itsec.gov.cn/webportal/download/88.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=602&lr=lang_en">View as HTML</a><br />
Wireless IDS systems have started to. emerge in an effort to assist IT person-. nel in detecting malicious activities on a. wireless network. ...<br />
<span class="a">www.itsec.gov.cn/webportal/download/88.pdf</span><br />
<br />
<a href="http://www.mhl.tuc.gr/research/publications/PCI2005-HeaderClassification.pdf"><b>On The Importance of Header Classification in HW/SW Network ...</b></a> -<a href="http://72.14.205.104/search?q=cache:O7GZ8D6BsgkJ:www.mhl.tuc.gr/research/publications/PCI2005-HeaderClassification.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=603&lr=lang_en">View as HTML</a><br />
On The Importance of Header Classification in. HW/SW Network Intrusion Detection Systems. Vassilis Dimopoulos. 1. , Giorgos Papadopoulos ...<br />
<span class="a">www.mhl.tuc.gr/research/publications/<wbr></wbr>PCI2005-HeaderClassification.pdf</span><br />
<br />
<a href="https://txspace.tamu.edu/bitstream/1969.1/2215/1/etd-tamu-2004A-CPSC-Sun-1.pdf"><b>INTRUSION DETECTION IN MOBILE AD HOC NETWORKS A Dissertation by BO ...</b></a> -<a href="http://72.14.205.104/search?q=cache:azrWg89H1aMJ:https://txspace.tamu.edu/bitstream/1969.1/2215/1/etd-tamu-2004A-CPSC-Sun-1.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=604&lr=lang_en">View as HTML</a><br />
INTRUSION DETECTION IN MOBILE AD HOC NETWORKS. A Dissertation. by. BO SUN. Submitted to the Office of Graduate Studies of. Texas A&M University ...<br />
<span class="a"> https://txspace.tamu.edu/bitstream/<wbr></wbr>1969.1/2215/1/etd-tamu-2004A-CPSC-Sun-1.pdf</span><br />
<br />
<a href="http://www.cse.sc.edu/%7Efarkas/publications/j8.pdf"><b>PAID: A Probabilistic Agent-Based Intrusion Detection system</b></a> -<a href="http://72.14.205.104/search?q=cache:0vTmHoAHFT4J:www.cse.sc.edu/%7Efarkas/publications/j8.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=605&lr=lang_en">View as HTML</a><br />
PAID: A Probabilistic Agent-Based Intrusion. Detection system. Vaibhav Gowadia, Csilla Farkas*, Marco Valtorta. Information Security Laboratory, Department ...<br />
<span class="a">www.cse.sc.edu/~farkas/publications/j8.pdf</span><br />
<br />
<a href="http://www.cse.iitb.ac.in/%7Epchandra/seminar/Intrusion%20Detection%20Systems.pdf"><b>Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:CSvS-19MG38J:www.cse.iitb.ac.in/%7Epchandra/seminar/Intrusion%2520Detection%2520Systems.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=606&lr=lang_en">View as HTML</a><br />
Intrusion Detection Systems. Seminar Presentation By. Pratyush Chandra. 03D05003. Under Guidance of. Prof. Bernard Menezes. April 11,2006 ...<br />
<span class="a">www.cse.iitb.ac.in/~pchandra/<wbr></wbr>seminar/Intrusion%20Detection%20Systems.pdf</span><br />
<br />
<a href="http://s-router.cs.tsinghua.edu.cn/%7Ehuchengchen/Pub/ICNC-FSKD2006.pdf"><b>LNAI 4223 - Fuzzy Optimization for Security Sensors Deployment in ...</b></a> -<a href="http://72.14.205.104/search?q=cache:DTmE2mL5XuAJ:s-router.cs.tsinghua.edu.cn/%7Ehuchengchen/Pub/ICNC-FSKD2006.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=607&lr=lang_en">View as HTML</a><br />
L. Wang et al. (Eds.): FSKD 2006, LNAI 4223, pp. 743–752, 2006. © Springer-Verlag Berlin Heidelberg 2006. Fuzzy Optimization for Security Sensors Deployment ...<br />
<span class="a">s-router.cs.tsinghua.edu.cn/<wbr></wbr>~huchengchen/Pub/ICNC-FSKD2006.pdf</span><br />
<br />
<a href="http://decision.csl.uiuc.edu/%7Ealpcan/papers/alpcan-basar-cdc04_WeA05_6.pdf"><b>A Game Theoretic Analysis of Intrusion Detection in Access Control ...</b></a> -<a href="http://72.14.205.104/search?q=cache:uboSuLjGtsMJ:decision.csl.uiuc.edu/%7Ealpcan/papers/alpcan-basar-cdc04_WeA05_6.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=608&lr=lang_en">View as HTML</a><br />
A Game Theoretic Analysis of Intrusion Detection in Access. Control Systems. Tansu Alpcan and Tamer Basar. Abstract— We present a game-theoretic analysis of ...<br />
<span class="a">decision.csl.uiuc.edu/~alpcan/<wbr></wbr>papers/alpcan-basar-cdc04_WeA05_6.pdf</span><br />
<br />
<a href="http://www.zurich.ibm.com/%7Ekju/excerpt.pdf"><b>Chapter 1 DATA MINING FOR INTRUSION DETECTION A Critical Review</b></a> -<a href="http://72.14.205.104/search?q=cache:avk3D7rVeGEJ:www.zurich.ibm.com/%7Ekju/excerpt.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=609&lr=lang_en">View as HTML</a><br />
Chapter 1. DATA MINING FOR INTRUSION DETECTION. A Critical Review. Klaus Julisch. IBM Research. Zurich Research Laboratory. kju@zurich.ibm.com. Abstract ...<br />
<span class="a">www.zurich.ibm.com/~kju/excerpt.pdf</span><br />
<br />
<a href="http://www.zju.edu.cn/jzus/2004/0409/040909.pdf"><b>Intrusion detection using rough set classification</b></a> -<a href="http://72.14.205.104/search?q=cache:4JLi_9Bk7YYJ:www.zju.edu.cn/jzus/2004/0409/040909.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=610&lr=lang_en">View as HTML</a><br />
Zhang et al. / J Zhejiang Univ SCI 2004 5(9):1076-1086. 1076. Intrusion detection using rough set classification. *. ZHANG Lian-hua (张连华) ...<br />
<span class="a">www.zju.edu.cn/jzus/2004/0409/040909.pdf</span><br />
<br />
<a href="http://www.simplexgrinnell.com/resourcecenter/documents/PACEBook5.pdf"><b>Security PACE Book 5 - Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:NThacsrZT1EJ:www.simplexgrinnell.com/resourcecenter/documents/PACEBook5.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=611&lr=lang_en">View as HTML</a><br />
Security PACE Book 5 - Intrusion Detection. Course · Introduction. Intrusion. Detection. Systems and. Concepts. Intrusion. Detection. Overview. Perimeter ...<br />
<span class="a">www.simplexgrinnell.com/<wbr></wbr>resourcecenter/documents/PACEBook5.pdf</span><br />
<br />
<a href="http://www.imsccs-conference.org/imsccs06/finalPapers/paper123final.pdf"><b>A Wireless Intrusion Detection Method Based on Dynamic Growing ...</b></a> -<a href="http://72.14.205.104/search?q=cache:TjzkOrDuVPYJ:www.imsccs-conference.org/imsccs06/finalPapers/paper123final.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=612&lr=lang_en">View as HTML</a><br />
A Wireless Intrusion Detection Method Based on Dynamic Growing. Neural Network. Yanheng Liu, Daxin Tian. College of Computer Science and Technology, ...<br />
<span class="a">www.imsccs-conference.org/<wbr></wbr>imsccs06/finalPapers/paper123final.pdf</span><br />
<br />
<a href="http://www.tkn.tu-berlin.de/publications/papers/iscc03.pdf"><b>FIDRAN: A Flexible Intrusion Detection and Response Framework for ...</b></a> -<a href="http://72.14.205.104/search?q=cache:vzI2zIGW2LMJ:www.tkn.tu-berlin.de/publications/papers/iscc03.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=613&lr=lang_en">View as HTML</a><br />
FIDRAN: A Flexible Intrusion Detection and. Response Framework for Active Networks. A. Hess, M. Jung, G. Schäfer. Telecommunication Networks Group ...<br />
<span class="a">www.tkn.tu-berlin.de/publications/papers/iscc03.pdf</span><br />
<br />
<a href="http://166.111.248.20/seminar/2006_09_14/usenix06.pdf"><b>Dynamic Application-Layer Protocol Analysis for Network Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:_cufQ--RxosJ:166.111.248.20/seminar/2006_09_14/usenix06.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=614&lr=lang_en">View as HTML</a><br />
Dynamic Application-Layer Protocol Analysis. for Network Intrusion Detection. Holger Dreger. TU Munchen. dreger@in.tum.de. Anja Feldmann. TU Munchen ...<br />
<span class="a">166.111.248.20/seminar/2006_09_14/usenix06.pdf</span><br />
<br />
<a href="http://www.cs.ust.hk/%7Edyyeung/paper/pdf/yeung.pr2003.pdf"><b>Host-Based Intrusion Detection Using Dynamic and Static Behavioral ...</b></a> -<a href="http://72.14.205.104/search?q=cache:FtdddnONavgJ:www.cs.ust.hk/%7Edyyeung/paper/pdf/yeung.pr2003.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=615&lr=lang_en">View as HTML</a><br />
Host-Based Intrusion Detection Using Dynamic and Static. Behavioral Models. Dit-Yan Yeung. Yuxin Ding. Department of Computer Science ...<br />
<span class="a">www.cs.ust.hk/~dyyeung/paper/pdf/yeung.pr2003.pdf</span><br />
<br />
<a href="http://www.duxbury.co.za/Products/Enterasys/Whitepapers/ID_Methodologies_Demystified.pdf"><b>Intrusion Detection Methodologies Demystified</b></a> -<a href="http://72.14.205.104/search?q=cache:3F0oruM6zOUJ:www.duxbury.co.za/Products/Enterasys/Whitepapers/ID_Methodologies_Demystified.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=616&lr=lang_en">View as HTML</a><br />
Intrusion Detection Methodologies. Demystified. Revision History:. Version. Date. Comments. 1.0. 02-07-2003. Gary Golomb. 1.1. 02-12-2003 ...<br />
<span class="a"> www.duxbury.co.za/Products/Enterasys/<wbr></wbr>Whitepapers/ID_Methodologies_Demystified.pdf</span><br />
<br />
<a href="http://www.diee.unica.it/informatica/en/publications/papers-prag/IDS-Conference-01.pdf"><b>Intrusion Detection in Computer Networks by Multiple Classifier ...</b></a> -<a href="http://72.14.205.104/search?q=cache:st7ZPcQ4aCgJ:www.diee.unica.it/informatica/en/publications/papers-prag/IDS-Conference-01.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=617&lr=lang_en">View as HTML</a><br />
Intrusion Detection in Computer Networks by Multiple Classifier Systems. Giorgio Giacinto and Fabio Roli. Department of Electrical and Electronic ...<br />
<span class="a"> www.diee.unica.it/informatica/en/<wbr></wbr>publications/papers-prag/IDS-Conference-01.pdf</span><br />
<br />
<a href="http://www.diee.unica.it/informatica/en/publications/papers-prag/IDS-Conference-02.pdf"><b>Ensemble Learning for Intrusion Detection in Computer Networks</b></a> -<a href="http://72.14.205.104/search?q=cache:529-kYLp59sJ:www.diee.unica.it/informatica/en/publications/papers-prag/IDS-Conference-02.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=618&lr=lang_en">View as HTML</a><br />
Ensemble Learning for Intrusion Detection in. Computer Networks. Luca Didaci, Giorgio Giacinto and Fabio Roli. Department of Electrical and Electronic ...<br />
<span class="a"> www.diee.unica.it/informatica/en/<wbr></wbr>publications/papers-prag/IDS-Conference-02.pdf</span><br />
<br />
<a href="http://www.it.iitb.ac.in/%7Ekaushal/downloads/seminarreport.pdf"><b>Seminar Report Classification, Clustering and Application in ...</b></a> -<a href="http://72.14.205.104/search?q=cache:E9JhWvm2AXgJ:www.it.iitb.ac.in/%7Ekaushal/downloads/seminarreport.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=619&lr=lang_en">View as HTML</a><br />
Seminar Report. Classification, Clustering and Application in Intrusion Detection. System. Kaushal Mittal 04329024. M.Tech I Year ...<br />
<span class="a">www.it.iitb.ac.in/~kaushal/downloads/seminarreport.pdf</span><br />
<br />
<a href="http://www.cs.fiu.edu/%7Echens/PDF/ICTAI06_UNPCC.pdf"><b>UNPCC: A Novel Unsupervised Classification Scheme for Network ...</b></a> -<a href="http://72.14.205.104/search?q=cache:xu7rxA6IrTQJ:www.cs.fiu.edu/%7Echens/PDF/ICTAI06_UNPCC.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=620&lr=lang_en">View as HTML</a><br />
UNPCC: A Novel Unsupervised Classification Scheme for Network Intrusion. Detection. Zongxing Xie, Thiago Quirino, Mei-Ling Shyu ...<br />
<span class="a">www.cs.fiu.edu/~chens/PDF/ICTAI06_UNPCC.pdf</span><br />
<br />
<a href="http://www.iu.hio.no/teaching/materials/MS004A/html/L5.en.pdf"><b>MS004A Intrusion Detection and Firewall Security</b></a> -<a href="http://72.14.205.104/search?q=cache:ycDepTizH5IJ:www.iu.hio.no/teaching/materials/MS004A/html/L5.en.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=621&lr=lang_en">View as HTML</a><br />
Goals. ●. Understand the field of Intrusion Detection. ●. Design a network security policy. ●. In- depth knowledge of a Linux firewall ...<br />
<span class="a">www.iu.hio.no/teaching/materials/MS004A/html/L5.en.pdf</span><br />
<br />
<a href="http://homes.dico.unimi.it/%7Emonga/sess/rossi.pdf"><b>A Formal Approach to Sensor Placement in a Network Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:uvd8PM_Uar0J:homes.dico.unimi.it/%7Emonga/sess/rossi.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=622&lr=lang_en">View as HTML</a><br />
A Formal Approach to Sensor. Placement in a Network Intrusion. Detection System. M. Rolando, M. Rossi, N. Sanarico and D. Mandrioli ...<br />
<span class="a">homes.dico.unimi.it/~monga/sess/rossi.pdf</span><br />
<br />
<a href="http://www.njnet.edu.cn/njcert/papers/2003/shlu_2003_1.pdf"><b>A Load Balancing Algorithm for High Speed Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:QG8Uth6NZcQJ:www.njnet.edu.cn/njcert/papers/2003/shlu_2003_1.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=623&lr=lang_en">View as HTML</a><br />
A Load Balancing Algorithm for High Speed. Intrusion Detection. LU Sheng, GONG Jian, RUI Suying. Department of Computer Science and Engineering, ...<br />
<span class="a">www.njnet.edu.cn/njcert/papers/2003/shlu_2003_1.pdf</span><br />
<br />
<a href="http://www.utdallas.edu/%7Eaxv028100/courses/cs6390/paper/IDS_paper_may01.pdf"><b>The Many Faces of Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:HeKlVJ3lzU4J:www.utdallas.edu/%7Eaxv028100/courses/cs6390/paper/IDS_paper_may01.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=624&lr=lang_en">View as HTML</a><br />
1. The Many Faces of Intrusion Detection System. Ameya Anil Velankar. Department of Computer Science. The University of Texas at Dallas ...<br />
<span class="a">www.utdallas.edu/~axv028100/<wbr></wbr>courses/cs6390/paper/IDS_paper_may01.pdf</span><br />
<br />
<a href="http://www.macos.utah.edu/documentation/security/intrusion_detection/mainColumnParagraphs/00/document/20030618-intrustion_detection.pdf"><b>Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:H1lL6FFAsyUJ:www.macos.utah.edu/documentation/security/intrusion_detection/mainColumnParagraphs/00/document/20030618-intrustion_detection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=625&lr=lang_en">View as HTML</a><br />
Overview. • Intrusion Detection. • What is it? • Why do I need it? • How do I do it? • Intrusion Detection Software. • Network based. • Host based ...<br />
<span class="a">www.macos.utah.edu/.../mainColumnParagraphs/<wbr></wbr>00/document/20030618-intrustion_detection.pdf</span><br />
<br />
<a href="http://www.lcc.uma.es/%7Eroman/files/roman-ccnc06.pdf"><b>Applying Intrusion Detection Systems to Wireless Sensor Networks</b></a> -<a href="http://72.14.205.104/search?q=cache:dGoUCiJXv9gJ:www.lcc.uma.es/%7Eroman/files/roman-ccnc06.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=626&lr=lang_en">View as HTML</a><br />
Applying Intrusion Detection Systems. to Wireless Sensor Networks. Rodrigo Roman. E.T.S. Ing. Informatica. University of Malaga. 29071, Malaga, Spain ...<br />
<span class="a">www.lcc.uma.es/~roman/files/roman-ccnc06.pdf</span><br />
<br />
<a href="http://www.cs.jhu.edu/%7Efabian/courses/CS600.424/course_papers/samples/Bayesian.pdf"><b>CS424 Network Security: Bayesian Network Intrusion Detection (BNIDS)</b></a> -<a href="http://72.14.205.104/search?q=cache:uvckDVKKwvAJ:www.cs.jhu.edu/%7Efabian/courses/CS600.424/course_papers/samples/Bayesian.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=627&lr=lang_en">View as HTML</a><br />
CS424 Network Security: Bayesian Network Intrusion Detection. (BNIDS). Krister Johansen and Stephen Lee. May 3, 2003. 1 Introduction ...<br />
<span class="a">www.cs.jhu.edu/~fabian/courses/<wbr></wbr>CS600.424/course_papers/samples/Bayesian.pdf</span><br />
<br />
<a href="http://www.pilmerpr.com/casestudyAmericanWater.pdf"><b>American Water makes Demarc Sentarus the Enterprise Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:3u-bjOkvoIgJ:www.pilmerpr.com/casestudyAmericanWater.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=628&lr=lang_en">View as HTML</a><br />
Introduction. American Water is the largest water resource organization in North. America, founded in 1886. With annual revenues of more than $2 billion, ...<br />
<span class="a">www.pilmerpr.com/casestudyAmericanWater.pdf</span><br />
<br />
<a href="http://webdia.cem.itesm.mx/ac/raulm/pub/WISA04.pdf"><b>Service Discrimination and Audit File Reduction for Effective ...</b></a> -<a href="http://72.14.205.104/search?q=cache:ZY_u9XtvQ5UJ:webdia.cem.itesm.mx/ac/raulm/pub/WISA04.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=629&lr=lang_en">View as HTML</a><br />
Service Discrimination and Audit File Reduction. for Effective Intrusion Detection. ⋆. Fernando Godınez. 1. and Dieter Hutter. 2. and Raul Monroy ...<br />
<span class="a">webdia.cem.itesm.mx/ac/raulm/pub/WISA04.pdf</span><br />
<br />
<a href="http://www.maftia.org/deliverables/D3.pdf"><b>Towards a Taxonomy of Intrusion Detection Systems and Attacks</b></a> -<a href="http://72.14.205.104/search?q=cache:9lMzj5xYyDwJ:www.maftia.org/deliverables/D3.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=630&lr=lang_en">View as HTML</a><br />
Project IST-1999-11583. Malicious- and Accidental-Fault Tolerance. for Internet Applications. Towards a Taxonomy of Intrusion Detection. Systems and Attacks ...<br />
<span class="a">www.maftia.org/deliverables/D3.pdf</span><br />
<br />
<a href="http://www.researchandmarkets.com/reports/363326/world_wireless_intrusion_detection_and.pdf"><b>World Wireless Intrusion Detection and Prevention Systems Markets</b></a> -<a href="http://72.14.205.104/search?q=cache:g7zARHrMaggJ:www.researchandmarkets.com/reports/363326/world_wireless_intrusion_detection_and.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=631&lr=lang_en">View as HTML</a><br />
Brochure. More information from http://www.researchandmarkets.com/reports/363326/. World Wireless Intrusion Detection and Prevention Systems. Markets ...<br />
<span class="a"> www.researchandmarkets.com/reports/<wbr></wbr>363326/world_wireless_intrusion_detection_and.pdf</span><br />
<br />
<a href="http://www.fcet.staffs.ac.uk/rs17/Notes/Forensics/Semester%201/MSc/Msc%20Intrusion%20Detection.pdf"><b>Msc Intrusion Detection</b></a><br />
1. Intrusion Detection. R. Shaw. MSc2. Forensic Computing Concepts. • History. • Concepts & definitions. • Information sources. • Analysis schemes ...<br />
<span class="a"> www.fcet.staffs.ac.uk/rs17/Notes/Forensics/<wbr></wbr>Semester%201/MSc/Msc%20Intrusion%20Detection.pdf</span><br />
<br />
<a href="http://www.security.cse.msstate.edu/docs/Publications/asiraj/Monterrey_IIDS-2.pdf"><b>Intrusion Detection System (IDS) Work For interclustering, TCP/IP ...</b></a> -<a href="http://72.14.205.104/search?q=cache:GumQLo8o0KEJ:www.security.cse.msstate.edu/docs/Publications/asiraj/Monterrey_IIDS-2.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=633&lr=lang_en">View as HTML</a><br />
AI Techniques Applied to High Performance Computing. Intrusion Detection. 1. Susan M. Bridges, Rayford B. Vaughn, and Ambareen Siraj ...<br />
<span class="a">www.security.cse.msstate.edu/<wbr></wbr>docs/Publications/asiraj/Monterrey_IIDS-2.pdf</span><br />
<br />
<a href="http://www.cs.utep.edu/%7Ebdauriol/publications/node27-paper.pdf"><b>A State Transition Model Case Study for Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:nuTpENU0CVQJ:www.cs.utep.edu/%7Ebdauriol/publications/node27-paper.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=634&lr=lang_en">View as HTML</a><br />
A State Transition Model Case Study for Intrusion. Detection Systems. Brian J. d’Auriol. Department of Computer Science. The University of Texas at El Paso ...<br />
<span class="a"> www.cs.utep.edu/~bdauriol/publications/node27-paper.pdf</span><br />
<br />
<a href="http://ecet.ecs.ru.acad.bg/cst06/Docs/cp/SIII/IIIA.9.pdf"><b>About Some Applications of Hidden Markov Model in Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:pFimVPutnhAJ:ecet.ecs.ru.acad.bg/cst06/Docs/cp/SIII/IIIA.9.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=635&lr=lang_en">View as HTML</a><br />
International Conference on Computer Systems and Technologies - CompSysTech’06. About Some Applications of Hidden Markov Model in Intrusion ...<br />
<span class="a">ecet.ecs.ru.acad.bg/cst06/Docs/cp/SIII/IIIA.9.pdf</span><br />
<br />
<a href="http://www.cs.huji.ac.il/labs/danss/sensor/adhoc/zhang_2000intrusiondetection.pdf"><b>Intrusion Detection in Wireless Ad-Hoc Networks</b></a> -<a href="http://72.14.205.104/search?q=cache:pLtLbWiXUhEJ:www.cs.huji.ac.il/labs/danss/sensor/adhoc/zhang_2000intrusiondetection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=636&lr=lang_en">View as HTML</a><br />
Intrusion Detection in Wireless Ad-Hoc Networks. Yongguang Zhang. HRL Laboratories, LLC. Malibu, CA 90265. ygz@hrl.com. Wenke Lee ...<br />
<span class="a">www.cs.huji.ac.il/labs/danss/<wbr></wbr>sensor/adhoc/zhang_2000intrusiondetection.pdf</span><br />
<br />
<a href="http://people.cs.vt.edu/%7Efinkga/published/WPDRTS-paper-Jan02.pdf"><b>Intrusion Detection System (IDS) Evaluation</b></a> -<a href="http://72.14.205.104/search?q=cache:zv0-uUlUyJYJ:people.cs.vt.edu/%7Efinkga/published/WPDRTS-paper-Jan02.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=637&lr=lang_en">View as HTML</a><br />
Fink, Chappell, Turner, O’Donoghue. NSWCDD, Code B 35, Dahlgren, VA. WPDRTS, 15-17 April 2002. Ft. Lauderdale, Florida. Page 1 of 8 ...<br />
<span class="a">people.cs.vt.edu/~finkga/<wbr></wbr>published/WPDRTS-paper-Jan02.pdf</span><br />
<br />
<a href="http://discovery.csc.ncsu.edu/Courses/csc774-S03/IDTechniques.pdf"><b>Intrusion Detection Techniques</b></a> -<a href="http://72.14.205.104/search?q=cache:wLjyBCVt284J:discovery.csc.ncsu.edu/Courses/csc774-S03/IDTechniques.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=638&lr=lang_en">View as HTML</a><br />
Intrusion Detection Techniques. Peng Ning, North Carolina State University. Sushil Jajodia, George Mason University. Introduction. Anomaly Detection ...<br />
<span class="a">discovery.csc.ncsu.edu/<wbr></wbr>Courses/csc774-S03/IDTechniques.pdf</span><br />
<br />
<a href="http://www.operativesoft.com/Product/Continous%20Scan.pdf"><b>Continuous Scan intrusion detection system identifies and stops ...</b></a> -<a href="http://72.14.205.104/search?q=cache:MsEjT8xvv1wJ:www.operativesoft.com/Product/Continous%2520Scan.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=639&lr=lang_en">View as HTML</a><br />
Continuous Scan intrusion detection system. identifies and stops rogue network nodes. Organizations realize the importance of maintaining secure networks. ...<br />
<span class="a"> www.operativesoft.com/Product/Continous%20Scan.pdf</span><br />
<br />
<a href="http://www.iwwst.org.uk/Files/2003/FinalPN.pdf"><b>Wireless Intrusion Detection 1</b></a><br />
Wireless Intrusion Detection. Joshua Lackey, Ph.D. 1. , Andrew Roths. 2. , James Goddard, CISSP. 3. 1. lackeyj@us.ibm.com. 2. ajroths@us.ibm.com ...<br />
<span class="a">www.iwwst.org.uk/Files/2003/FinalPN.pdf</span><br />
<br />
<a href="http://techreports.isr.umd.edu/reports/2003/TR_2003-47.pdf"><b>HMM Sequential Hypothesis Tests for Intrusion Detection in MANETs ...</b></a> -<a href="http://72.14.205.104/search?q=cache:TPQ_ONygJ08J:techreports.isr.umd.edu/reports/2003/TR_2003-47.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=641&lr=lang_en">View as HTML</a><br />
HMM Sequential Hypothesis Tests for Intrusion. Detection in MANETs. Extended Abstract. Alvaro A. Cardenas, Vahid Ramezani, John S. Baras ...<br />
<span class="a">techreports.isr.umd.edu/reports/2003/TR_2003-47.pdf</span><br />
<br />
<a href="http://dmrl.cse.ohio-state.edu/papers/kdd03.pdf"><b>Towards NIC-based Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:ahI5pQo-D2oJ:dmrl.cse.ohio-state.edu/papers/kdd03.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=642&lr=lang_en">View as HTML</a><br />
Towards NIC-based Intrusion Detection. M. Otey, S. Parthasarathy, A. Ghoting, G. Li, S. Narravula, D. Panda. Department of Computer and Information Science, ...<br />
<span class="a">dmrl.cse.ohio-state.edu/papers/kdd03.pdf</span><br />
<br />
<a href="http://dmrl.cse.ohio-state.edu/papers/ICDM02-ws.pdf"><b>NIC-based intrusion detection: A feasibility study</b></a> -<a href="http://72.14.205.104/search?q=cache:gJkHm0kFFTMJ:dmrl.cse.ohio-state.edu/papers/ICDM02-ws.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=643&lr=lang_en">View as HTML</a><br />
NIC-based intrusion detection: A feasibility study. M. Otey R. Noronha G. Li S. Parthasarathy. ¡. D. K. Panda. Department of Computer and Information ...<br />
<span class="a">dmrl.cse.ohio-state.edu/papers/ICDM02-ws.pdf</span><br />
<br />
<a href="http://www.mitre.org/work/tech_papers/tech_papers_00/bloedorn_datamining/bloedorn_spss.pdf"><b>Data Mining for Improving Intrusion Detection</b></a><br />
Data Mining for Improving. Intrusion Detection. presented by: Dr. Eric Bloedorn. Team members:. Bill Hill (PI). Dr. Alan Christiansen, Dr. Clem Skorupka, ...<br />
<span class="a">www.mitre.org/work/tech_papers/tech_papers_00/<wbr></wbr>bloedorn_datamining/bloedorn_spss.pdf</span><br />
<br />
<a href="http://www.nortel.com/products/01/tps/collateral/nn114161.pdf"><b>An intrusion detection/prevention design guide</b></a> -<a href="http://72.14.205.104/search?q=cache:iHAY3plPrcEJ:www.nortel.com/products/01/tps/collateral/nn114161.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=645&lr=lang_en">View as HTML</a><br />
>THIS IS THE WAY. >THIS IS. Product Brief. An intrusion detection/prevention design guide. Deploying Nortel Threat Protection Sensors in your network for ...<br />
<span class="a"> www.nortel.com/products/01/tps/collateral/nn114161.pdf - 29 Dec 2006</span><br />
<br />
<a href="http://homepages.alumni.os3.nl/%7Ejvb/docs/DistributedIntrusionDetectionPlatform.pdf"><b>Distributed Intrusion Detection Platform</b></a><br />
‘Distributed Intrusion. Detection Platform’. by. Tjerk Nan & Jeroen van Beek. under supervision of. Jaap van Ginkel. July 2. nd. 2004. Page 2 ...<br />
<span class="a">homepages.alumni.os3.nl/~jvb/<wbr></wbr>docs/DistributedIntrusionDetectionPlatform.pdf</span><br />
<br />
<a href="http://members.iinet.com.au/%7Esouvla/ncs2006.pdf"><b>A STUDY ON CLASSIFICATION TECHNIQUES FOR NETWORK INTRUSION DETECTION</b></a> -<a href="http://72.14.205.104/search?q=cache:b5tDRcmv24IJ:members.iinet.com.au/%7Esouvla/ncs2006.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=647&lr=lang_en">View as HTML</a><br />
A STUDY ON CLASSIFICATION TECHNIQUES FOR NETWORK. INTRUSION DETECTION. Sophia Kaplantzis. Electrical & Comp Systems Eng. Monash University Australia ...<br />
<span class="a">members.iinet.com.au/~souvla/ncs2006.pdf</span><br />
<br />
<a href="http://www.cs.bham.ac.uk/%7Ejxh/2006ukci.pdf"><b>Evolving discrete-valued anomaly detectors for a network intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:ZMMfATtjvHoJ:www.cs.bham.ac.uk/%7Ejxh/2006ukci.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=648&lr=lang_en">View as HTML</a><br />
Evolving discrete-valued anomaly detectors for a network. intrusion detection system using negative selection. Simon T. Powers. School of Computer Science ...<br />
<span class="a">www.cs.bham.ac.uk/~jxh/2006ukci.pdf</span><br />
<br />
<a href="http://www.eurecom.fr/%7Ensteam/Papers/jsac.pdf"><b>IDAMN: an Intrusion Detection Architecture for Mobile Networks</b></a> -<a href="http://72.14.205.104/search?q=cache:3SATcnkAsOoJ:www.eurecom.fr/%7Ensteam/Papers/jsac.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=649&lr=lang_en">View as HTML</a><br />
1. IDAMN: an Intrusion Detection Architecture. for Mobile Networks. 1. Didier Samfat, Refik Molva. INSTITUT EURÉCOM. 2229, route des Crêtes, ...<br />
<span class="a">www.eurecom.fr/~nsteam/Papers/jsac.pdf</span><br />
<br />
<a href="http://4lx.free.fr/articles/CAMB202.pdf"><b>Recognizing Malicious Intention in an Intrusion Detection Process</b></a> -<a href="http://72.14.205.104/search?q=cache:nVYPfeI0TxMJ:4lx.free.fr/articles/CAMB202.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=650&lr=lang_en">View as HTML</a><br />
Recognizing Malicious Intention in an. Intrusion Detection Process. Frederic Cuppens. , Fabien Autrel. , Alexandre Mi`ege. ¡. & Salem Benferhat ...<br />
<span class="a">4lx.free.fr/articles/CAMB202.pdf</span><br />
<br />
<a href="http://www.dsto.defence.gov.au/corporate/reports/DSTO-GD-0286.pdf"><b>IDDM: Intrusion Detection using Data Mining Techniques</b></a><br />
IDDM: Intrusion Detection using Data Mining. Techniques. Tamas Abraham. Information Technology Division. Electronics and Surveillance Research Laboratory ...<br />
<span class="a">www.dsto.defence.gov.au/<wbr></wbr>corporate/reports/DSTO-GD-0286.pdf</span><br />
<br />
<a href="http://opensource.nailabs.com/wrappers/docs/aspec-reprint.pdf"><b>Logic Induction of Valid Behavior Specifications for Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:Gd6NJR9JYewJ:opensource.nailabs.com/wrappers/docs/aspec-reprint.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=652&lr=lang_en">View as HTML</a><br />
Logic Induction of Valid Behavior Specifications for Intrusion Detection. Calvin Ko. NAI Labs, Network Associates, Inc. calvin ko@nai.com. Abstract ...<br />
<span class="a"> opensource.nailabs.com/wrappers/docs/aspec-reprint.pdf</span><br />
<br />
<a href="http://www.ccsl.carleton.ca/mmcna/publications/NS0907.pdf"><b>Anomaly Based Network Intrusion Detection with Unsupervised ...</b></a> -<a href="http://72.14.205.104/search?q=cache:_4dD4Rncq68J:www.ccsl.carleton.ca/mmcna/publications/NS0907.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=653&lr=lang_en">View as HTML</a><br />
Anomaly Based Network Intrusion Detection with. Unsupervised Outlier Detection. Jiong Zhang and Mohammad Zulkernine. School of Computing ...<br />
<span class="a">www.ccsl.carleton.ca/mmcna/publications/NS0907.pdf</span><br />
<br />
<a href="http://www.elet.polimi.it/upload/zanero/papers/ids-ethology.pdf"><b>Behavioral Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:oydh2moMhXUJ:www.elet.polimi.it/upload/zanero/papers/ids-ethology.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=654&lr=lang_en">View as HTML</a><br />
Behavioral Intrusion Detection. Stefano Zanero. ⋆. Dipartimento di Elettronica e Informazione, Politecnico di Milano,. Via Ponzio 34/5, 20133 Milano, ...<br />
<span class="a">www.elet.polimi.it/upload/<wbr></wbr>zanero/papers/ids-ethology.pdf</span><br />
<br />
<a href="http://www.compudyne.com/ap/fiber_sensys/prod_specs/SecurLAN_brochure_RevB.pdf"><b>Layer One Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:7R-eaG0cAlgJ:www.compudyne.com/ap/fiber_sensys/prod_specs/SecurLAN_brochure_RevB.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=655&lr=lang_en">View as HTML</a><br />
II. II. nformation. has become one of the most sought-. after commodities in the world today. Protecting the vital flow of data from ...<br />
<span class="a">www.compudyne.com/ap/fiber_sensys/<wbr></wbr>prod_specs/SecurLAN_brochure_RevB.pdf</span><br />
<br />
<a href="http://www.cas.mcmaster.ca/%7Ewmfarmer/SE-4C03-01/papers/Bielewicz-IDS.pdf"><b>Intrusion Detection Systems: Securing a Network Environment By ...</b></a> -<a href="http://72.14.205.104/search?q=cache:mcuLY-v68xEJ:www.cas.mcmaster.ca/%7Ewmfarmer/SE-4C03-01/papers/Bielewicz-IDS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=656&lr=lang_en">View as HTML</a><br />
Intrusion Detection Systems: Securing a Network Environment. By Asha Bielewicz (9718446). Traditionally, Web servers were connected directly to the Net ...<br />
<span class="a">www.cas.mcmaster.ca/~wmfarmer/<wbr></wbr>SE-4C03-01/papers/Bielewicz-IDS.pdf</span><br />
<br />
<a href="http://www.iacwcu.com/documents/vtc2004.pdf"><b>A Non-cooperative Game Approach for Intrusion Detection in Sensor ...</b></a> -<a href="http://72.14.205.104/search?q=cache:0sLi3OTxe-UJ:www.iacwcu.com/documents/vtc2004.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=657&lr=lang_en">View as HTML</a><br />
1. A Non-cooperative Game Approach for Intrusion. Detection in Sensor Networks. Afrand Agah, Sajal K. Das and Kalyan Basu. Center for Research in Wireless ...<br />
<span class="a">www.iacwcu.com/documents/vtc2004.pdf</span><br />
<br />
<a href="http://www.tml.tkk.fi/Publications/Thesis/janttila.pdf"><b>INTRUSION DETECTION IN CRITICAL E- BUSINESS ENVIRONMENT</b></a> -<a href="http://72.14.205.104/search?q=cache:9CWPbcSMAe8J:www.tml.tkk.fi/Publications/Thesis/janttila.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=658&lr=lang_en">View as HTML</a><br />
HELSINKI UNIVERSITY OF TECHNOLOGY. Department of Computer Science and Engineering. Janne Anttila. INTRUSION DETECTION IN CRITICAL E-. BUSINESS ENVIRONMENT ...<br />
<span class="a">www.tml.tkk.fi/Publications/Thesis/janttila.pdf</span><br />
<br />
<a href="http://www.wooster.edu/cs/mcurcsm2005/papers/paper22final.pdf"><b>A TECHNIQUE INDEPENDENT FUSION MODEL FOR NETWORK INTRUSION ...</b></a> -<a href="http://72.14.205.104/search?q=cache:Z_xvaa_TIpoJ:www.wooster.edu/cs/mcurcsm2005/papers/paper22final.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=659&lr=lang_en">View as HTML</a><br />
PROCEEDINGS OF THE. MIDSTATES CONFERENCE ON. UNDERGRADUATE RESEARCH IN. COMPUTER SCIENCE AND MATHEMATICS. Volume 3, Number 1, Pages 13–19 ...<br />
<span class="a">www.wooster.edu/cs/mcurcsm2005/papers/paper22final.pdf</span><br />
<br />
<a href="http://eceweb.uccs.edu/ziemer/Presentations_pdf/Kalita_DeLooze_Applic_of_Neuro.pdf"><b>Soft Computing Components for Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:-Pt35cGkQK0J:eceweb.uccs.edu/ziemer/Presentations_pdf/Kalita_DeLooze_Applic_of_Neuro.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=660&lr=lang_en">View as HTML</a><br />
Applications of Neuro-fuzzy. Methods for Intrusion Detection. Systems. Dr Jugal Kalita. Associate Professor. Computer Science. Lori L. DeLooze ...<br />
<span class="a"> eceweb.uccs.edu/ziemer/Presentations_pdf/<wbr></wbr>Kalita_DeLooze_Applic_of_Neuro.pdf</span><br />
<br />
<a href="http://erwan.lemonnier.free.fr/exjobb/report/IDS_Guidelines-Lemonnier-200110.pdf"><b>Guidelines for a Long Term Competitive Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:_DU1CFDC2ncJ:erwan.lemonnier.free.fr/exjobb/report/IDS_Guidelines-Lemonnier-200110.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=661&lr=lang_en">View as HTML</a><br />
Guidelines for a Long Term Competitive. Intrusion Detection System. Erwan Lemonnier - r1@defcom.com. 5th October 2001 ...<br />
<span class="a">erwan.lemonnier.free.fr/exjobb/<wbr></wbr>report/IDS_Guidelines-Lemonnier-200110.pdf</span><br />
<br />
<a href="http://www.vjc.edu/uploadedFiles/For_Distant_Learners/Courses/FSIS650syllabusSHORTVERSION5.22.06.pdf"><b>Villa Julie College Forensics Studies Graduate Program Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:PICtFJ8FppQJ:www.vjc.edu/uploadedFiles/For_Distant_Learners/Courses/FSIS650syllabusSHORTVERSION5.22.06.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=662&lr=lang_en">View as HTML</a><br />
Villa Julie College. Forensics Studies. Graduate Program. Intrusion Detection. Systems (IDS) , Firewalls,. Auditing: FSIS 650 ...<br />
<span class="a"> www.vjc.edu/uploadedFiles/For_Distant_Learners/<wbr></wbr>Courses/FSIS650syllabusSHORTVERSION5.22.06.pdf</span><br />
<br />
<a href="http://www.anidirect.com/products/intrusiondetection/solution-brief.pdf"><b>DRAGON™ INTRUSION DETECTION SYSTEM</b></a> -<a href="http://72.14.205.104/search?q=cache:0EET8SQEEfkJ:www.anidirect.com/products/intrusiondetection/solution-brief.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=663&lr=lang_en">View as HTML</a><br />
Protect Corporate Assets with a High-Performance, Cost-Effective. Network Security Monitoring Solution. All corporations today suffer at the hand of hackers ...<br />
<span class="a">www.anidirect.com/products/<wbr></wbr>intrusiondetection/solution-brief.pdf</span><br />
<br />
<a href="http://eprints.otago.ac.nz/21/01/dp2005-07.pdf"><b>Framework for Intrusion Detection Inspired by the Immune System ...</b></a> -<a href="http://72.14.205.104/search?q=cache:K9hlDCL1pegJ:eprints.otago.ac.nz/21/01/dp2005-07.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=664&lr=lang_en">View as HTML</a><br />
Framework for Intrusion Detection. Inspired by the Immune System. Melanie Middlemiss. The Information Science. Discussion Paper Series. Number 2005/07 ...<br />
<span class="a">eprints.otago.ac.nz/21/01/dp2005-07.pdf</span><br />
<br />
<a href="http://www.skaion.com/research/tgc-rsd-raid.pdf"><b>Combining Evasion Techniques to Avoid Network Intrusion Detection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:vEulYYNpXQsJ:www.skaion.com/research/tgc-rsd-raid.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=665&lr=lang_en">View as HTML</a><br />
Combining Evasion Techniques to Avoid. Network Intrusion Detection Systems. A. Samuel Gorton and Terrence G. Champion. Skaion Corporation, ...<br />
<span class="a">www.skaion.com/research/tgc-rsd-raid.pdf</span><br />
<br />
<a href="http://www.ota.be/linux/workshops/20000527/LIDS/lids.pdf"><b>Linux Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:s6PBnoFSSDQJ:www.ota.be/linux/workshops/20000527/LIDS/lids.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=666&lr=lang_en">View as HTML</a><br />
2. What is LIDS? ·. Limit the rights of "root" on its own server. ·. Using Linux 2.2 capabilities to restrict root. ·. Protect files, processes and network ...<br />
<span class="a">www.ota.be/linux/workshops/20000527/LIDS/lids.pdf</span><br />
<br />
<a href="http://enpub.fulton.asu.edu/ye/Published_Journal_Papers/Ye_32.pdf"><b>EWMA Techniques for Computer Intrusion Detection through Anomalous ...</b></a> -<a href="http://72.14.205.104/search?q=cache:D8YaUZ7lYTUJ:enpub.fulton.asu.edu/ye/Published_Journal_Papers/Ye_32.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=667&lr=lang_en">View as HTML</a><br />
QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL. Qual. Reliab. Engng. Int. 2002; 18: 443–451 (DOI: 10.1002/qre.493) ...<br />
<span class="a">enpub.fulton.asu.edu/ye/<wbr></wbr>Published_Journal_Papers/Ye_32.pdf</span><br />
<br />
<a href="http://dacs.ewi.utwente.nl/documents/reports/master/MSc-Thesis-Dossay%20Oryspayev.pdf"><b>What intrusion detection approaches work well if only TCP/IP ...</b></a> -<a href="http://72.14.205.104/search?q=cache:i2P7LOgfGHIJ:dacs.ewi.utwente.nl/documents/reports/master/MSc-Thesis-Dossay%2520Oryspayev.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=668&lr=lang_en">View as HTML</a><br />
by. O. RYSPAYEV. D. OSSAY. O. RYSPAYULI. Master Thesis. Supervisor:. Dr.ir. Aiko Pras (INF/DACS). Dr.ir. Remco van de Meent (INF/DACS) ...<br />
<span class="a">dacs.ewi.utwente.nl/documents/reports/<wbr></wbr>master/MSc-Thesis-Dossay%20Oryspayev.pdf</span><br />
<br />
<a href="http://fox1.csie.ncu.edu.tw/%7Eycjian/A%20Robust%20Sensor%20Connection%20for%20Intrusion%20Detection.pdf"><b>A Robust Sensor Connection for Intrusion Detection E-mail:</b></a> -<a href="http://72.14.205.104/search?q=cache:8VjeYcIuAfsJ:fox1.csie.ncu.edu.tw/%7Eycjian/A%2520Robust%2520Sensor%2520Connection%2520for%2520Intrusion%2520Detection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=669&lr=lang_en">View as HTML</a><br />
-1-. A Robust Sensor Connection for Intrusion Detection. Yi-Tsung Chien (簡逸聰), Hung-Xin Zhao (趙鴻欣) , Yea-Shuan Huang (黃雅軒) ...<br />
<span class="a"> fox1.csie.ncu.edu.tw/~ycjian/<wbr></wbr>A%20Robust%20Sensor%20Connection%20for%20Intrusion%20Detection.pdf</span><br />
<br />
<a href="http://faculty.uoit.ca/vargas/vargasMartin-MexIHC06.pdf"><b>Towards a Multimodal Human-Computer Interface to Analyze Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:lHewC9Aoc1MJ:faculty.uoit.ca/vargas/vargasMartin-MexIHC06.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=670&lr=lang_en">View as HTML</a><br />
Towards a Multimodal Human-Computer Interface. to Analyze Intrusion Detection in Computer. Networks. Miguel A. Garcia-Ruiz. Faculty of Telematics, ...<br />
<span class="a">faculty.uoit.ca/vargas/vargasMartin-MexIHC06.pdf</span><br />
<br />
<a href="http://www.idcglobal.net/IDCWeb/downloads/Glossary%20-%20Definitions_website.pdf"><b>IDS: Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:aUmyjE0fwhoJ:www.idcglobal.net/IDCWeb/downloads/Glossary%2520-%2520Definitions_website.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=671&lr=lang_en">View as HTML</a><br />
Anti-Virus / Anti Spam. Antivirus (or "anti-virus") software is a class of program that searches your hard drive and floppy ...<br />
<span class="a">www.idcglobal.net/IDCWeb/downloads/<wbr></wbr>Glossary%20-%20Definitions_website.pdf</span><br />
<br />
<a href="http://www.corp.att.com/gov/docs/6_5_5_mids.pdf"><b>6.5.5 AT&T Managed Intrusion Detection Service</b></a> -<a href="http://72.14.205.104/search?q=cache:ND5gCfoA8m0J:www.corp.att.com/gov/docs/6_5_5_mids.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=672&lr=lang_en">View as HTML</a><br />
Contract # GS00T99AHD0004. Proposal to Add Federal Telecommunications Service – Long Distance (FTS-LD). Use or disclosure of data contained on this sheet is ...<br />
<span class="a">www.corp.att.com/gov/docs/6_5_5_mids.pdf</span><br />
<br />
<a href="http://www.iis.sinica.edu.tw/JISE/2001/200111_03.pdf"><b>An Intrusion Detection Model Based Upon Intrusion Detection Markup ...</b></a> -<a href="http://72.14.205.104/search?q=cache:NL1mYc9uDC8J:www.iis.sinica.edu.tw/JISE/2001/200111_03.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=673&lr=lang_en">View as HTML</a><br />
J. OURNAL OF. I. NFORMATION. S. CIENCE AND. E. NGINEERING. 17, 899-919 (2001). 899. An Intrusion Detection Model Based Upon ...<br />
<span class="a">www.iis.sinica.edu.tw/JISE/2001/200111_03.pdf</span><br />
<br />
<a href="http://www.cs.ndsu.nodak.edu/%7Ekawamura/doc/IDSinWirelessAdHocNetworksSybilAttack.pdf"><b>Intrusion Detection System in Wireless Ad-Hoc Networks: Sybil ...</b></a> -<a href="http://72.14.205.104/search?q=cache:WzRDG4hHSv0J:www.cs.ndsu.nodak.edu/%7Ekawamura/doc/IDSinWirelessAdHocNetworksSybilAttack.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=674&lr=lang_en">View as HTML</a><br />
1. Intrusion Detection System in Wireless Ad-Hoc Networks:. Sybil Attack Detection and Others. Christopher Besemann, Satoshi Kawamura, Florent Rizzo ...<br />
<span class="a"> www.cs.ndsu.nodak.edu/~kawamura/<wbr></wbr>doc/IDSinWirelessAdHocNetworksSybilAttack.pdf</span><br />
<br />
<a href="http://www.dis.uniroma1.it/%7Edottorato/db/relazioni/relaz_chirichiello_2.pdf"><b>A Logical Framework for Plan Recognition for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:bdYzr1r2FZsJ:www.dis.uniroma1.it/%7Edottorato/db/relazioni/relaz_chirichiello_2.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=675&lr=lang_en">View as HTML</a><br />
A Logical Framework for Plan Recognition for. Intrusion Detection. Antonella Chirichiello. Dipartimento di Informatica e Sistemistica ”Antonio Ruberti” ...<br />
<span class="a">www.dis.uniroma1.it/~dottorato/<wbr></wbr>db/relazioni/relaz_chirichiello_2.pdf</span><br />
<br />
<a href="http://www.cs.ucf.edu/csdept/faculty/lang/pubs/mzhousci2003final.pdf"><b>A Frequency-Based Approach to Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:0Ab0HINTmBMJ:www.cs.ucf.edu/csdept/faculty/lang/pubs/mzhousci2003final.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=676&lr=lang_en">View as HTML</a><br />
A Frequency-Based Approach to Intrusion Detection. Mian Zhou and Sheau-Dong Lang. School of Electrical Engineering & Computer Science ...<br />
<span class="a">www.cs.ucf.edu/csdept/faculty/<wbr></wbr>lang/pubs/mzhousci2003final.pdf</span><br />
<br />
<a href="http://www.crhc.uiuc.edu/%7Eadnan/papers/agbariaa_detection.pdf"><b>A Replication- and Checkpoint-Based Approach for Anomaly-Based ...</b></a> -<a href="http://72.14.205.104/search?q=cache:JrVAYthEwZAJ:www.crhc.uiuc.edu/%7Eadnan/papers/agbariaa_detection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=677&lr=lang_en">View as HTML</a><br />
A Replication- and Checkpoint-Based Approach for Anomaly-Based Intrusion. Detection and Recovery. Adnan Agbaria. ∗. Roy Friedman ...<br />
<span class="a">www.crhc.uiuc.edu/~adnan/papers/agbariaa_detection.pdf</span><br />
<br />
<a href="http://www.laureano.eti.br/projetos/vmids/vmids_euromicro.pdf"><b>Intrusion Detection in Virtual Machine Environments</b></a> -<a href="http://72.14.205.104/search?q=cache:2h0GjUJEo1EJ:www.laureano.eti.br/projetos/vmids/vmids_euromicro.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=678&lr=lang_en">View as HTML</a><br />
Intrusion Detection in Virtual Machine Environments. Marcos Laureano, Carlos Maziero, Edgard Jamhour. Graduate Program in Applied Computer Science ...<br />
<span class="a"> www.laureano.eti.br/projetos/vmids/vmids_euromicro.pdf</span><br />
<br />
<a href="http://webfea.fea.aub.edu.lb/proceedings/2004/SRC-ECE-43.pdf"><b>A New Mobile Agent-Based Intrusion Detection System Using ...</b></a> -<a href="http://72.14.205.104/search?q=cache:13t79tbL6_MJ:webfea.fea.aub.edu.lb/proceedings/2004/SRC-ECE-43.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=679&lr=lang_en">View as HTML</a><br />
Abstract. This paper presents a distributed intrusion. detection system (IDS), based on mobile agents,. that detects intrusion from outside the network ...<br />
<span class="a"> webfea.fea.aub.edu.lb/proceedings/2004/SRC-ECE-43.pdf</span><br />
<br />
<a href="http://faculty.cs.tamu.edu/bettati/Papers/usenix99/paper.pdf"><b>Real-Time Intrusion Detection and Suppression in ATM Networks</b></a> -<a href="http://72.14.205.104/search?q=cache:DBkvmI4kvo4J:faculty.cs.tamu.edu/bettati/Papers/usenix99/paper.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=680&lr=lang_en">View as HTML</a><br />
Appeared in: Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network. Monitoring, Santa Clara, CA, April 1999 ...<br />
<span class="a">faculty.cs.tamu.edu/bettati/Papers/usenix99/paper.pdf</span><br />
<br />
<a href="http://www4.ncsu.edu/%7Ejjyuill/Professional/Research/Publications/first-color.pdf"><b>Intrusion-Detection During Incident-Response,</b></a> -<a href="http://72.14.205.104/search?q=cache:KVp7GlhnRmsJ:www4.ncsu.edu/%7Ejjyuill/Professional/Research/Publications/first-color.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=681&lr=lang_en">View as HTML</a><br />
Intrusion-Detection. During. Incident-Response,. using a military battlefield-intelligence process. Jim Yuill, PhD Candidate. Computer Science Dept. ...<br />
<span class="a"> www4.ncsu.edu/~jjyuill/Professional/<wbr></wbr>Research/Publications/first-color.pdf</span><br />
<br />
<a href="http://www.cs.ucr.edu/%7Ebrett/cs165_s01/LECTURE23/intrusion-4up.pdf"><b>Intrusion Detection Intrusion Targets IDS Evaluation</b></a> -<a href="http://72.14.205.104/search?q=cache:pyvc6_knwp8J:www.cs.ucr.edu/%7Ebrett/cs165_s01/LECTURE23/intrusion-4up.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=682&lr=lang_en">View as HTML</a><br />
Brett D. Fleisch. 5/28/2001. CS202 Advanced Operating Systems. 1. CS165, B. D. Fleisch. 1. Intrusion Detection. Based on notes of Alec Yasinsac ...<br />
<span class="a">www.cs.ucr.edu/~brett/cs165_s01/<wbr></wbr>LECTURE23/intrusion-4up.pdf</span><br />
<br />
<a href="http://leria.epitech.net/site/tree/publications/AF2.pdf"><b>Intelligent and Mobile Agent for Intrusion Detection System : IMA-IDS</b></a> -<a href="http://72.14.205.104/search?q=cache:ssxTQ_3OnBEJ:leria.epitech.net/site/tree/publications/AF2.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=683&lr=lang_en">View as HTML</a><br />
Intelligent and Mobile Agent. for Intrusion Detection System :. IMA-IDS. Farah. Barika. Nabil. El Kadhi. farah.barika@ragingbull.com el-kad_n@epitech.net ...<br />
<span class="a">leria.epitech.net/site/tree/publications/AF2.pdf</span><br />
<br />
<a href="http://www.csl.sri.com/projects/emerald/releases/eXpert-BSM/eXpert-BSM-DataSheet.pdf"><b>eXpert-BSM™ – Intrusion Detection System for Solaris</b></a> -<a href="http://72.14.205.104/search?q=cache:YmY9ptBQGMoJ:www.csl.sri.com/projects/emerald/releases/eXpert-BSM/eXpert-BSM-DataSheet.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=684&lr=lang_en">View as HTML</a><br />
PROTECTING CRITICAL SERVERS. IS THE HEART OF DATA SECURITY. Organizations with sensitive information require. fail-safe protection of critical systems ...<br />
<span class="a"> www.csl.sri.com/projects/emerald/<wbr></wbr>releases/eXpert-BSM/eXpert-BSM-DataSheet.pdf</span><br />
<br />
<a href="http://www.giac.org/practicals/archives/gcia/30.pdf"><b>Intrusion Detection In Depth GCIA Practical Assignment</b></a> -<a href="http://72.14.205.104/search?q=cache:Be4K7bS_9RIJ:www.giac.org/practicals/archives/gcia/30.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=685&lr=lang_en">View as HTML</a><br />
Intrusion Detection In Depth. GCIA Practical Assignment. Version 3.0 (revised August 13, 2001). NOTE: This version of the assignment has passed its due date ...<br />
<span class="a">www.giac.org/practicals/archives/gcia/30.pdf</span><br />
<br />
<a href="http://www.cse.msu.edu/%7Ewuming/papers/IDS%20chapter.pdf"><b>MODERN INTRUSION DETECTION, DATA MINING, AND DEGREES OF ATTACK GUILT</b></a> -<a href="http://72.14.205.104/search?q=cache:tnFZMs96F5cJ:www.cse.msu.edu/%7Ewuming/papers/IDS%2520chapter.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=686&lr=lang_en">View as HTML</a><br />
MODERN INTRUSION DETECTION, DATA. MINING, AND DEGREES OF ATTACK GUILT. Steven Noel. Center for Secure Information Systems ...<br />
<span class="a">www.cse.msu.edu/~wuming/papers/IDS%20chapter.pdf</span><br />
<br />
<a href="http://www.hpovua.org/PUBLICATIONS/PROCEEDINGS/7_HPOVUAWS/papers/session6-2.pdf"><b>Integrating Intrusion Detection and Network Management</b></a> -<a href="http://72.14.205.104/search?q=cache:W1npi0VCOzUJ:www.hpovua.org/PUBLICATIONS/PROCEEDINGS/7_HPOVUAWS/papers/session6-2.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=687&lr=lang_en">View as HTML</a><br />
Security management in large enterprise networks. Panagiotis Astithas, Giorgos Koutepas, Athanassios Moralis, Basil Maglaris. Network Management and Optimal ...<br />
<span class="a"> www.hpovua.org/PUBLICATIONS/<wbr></wbr>PROCEEDINGS/7_HPOVUAWS/papers/session6-2.pdf</span><br />
<br />
<a href="http://www.dcninc.com/PDF/tn-securnoc.pdf"><b>Intrusion Detection and Prevention Accurate Powerful Flexible</b></a> -<a href="http://72.14.205.104/search?q=cache:BND5xj6XQnQJ:www.dcninc.com/PDF/tn-securnoc.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=688&lr=lang_en">View as HTML</a><br />
Why Outsource? If you have just one computer on the Inter-. net, then network security is an issue for. your institution. It is quite common for busi- ...<br />
<span class="a">www.dcninc.com/PDF/tn-securnoc.pdf</span><br />
<br />
<a href="http://etd.gatech.edu/theses/available/etd-04062006-131015/unrestricted/abdullah_kulsoom_b_200605_phd.pdf"><b>Scaling and Visualizing Network Data to Facilitate in Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:wHLECgQodbIJ:etd.gatech.edu/theses/available/etd-04062006-131015/unrestricted/abdullah_kulsoom_b_200605_phd.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=689&lr=lang_en">View as HTML</a><br />
Scaling and Visualizing Network Data to Facilitate in. Intrusion Detection Tasks. A Thesis. Presented to. The Academic Faculty. by. Kulsoom Abdullah ...<br />
<span class="a"> etd.gatech.edu/theses/available/etd-04062006-131015/<wbr></wbr>unrestricted/abdullah_kulsoom_b_200605_phd.pdf</span><br />
<br />
<a href="http://niap.bahialab.com/pp/draft_pps/pp_draft_idsscanner_mr_v0.9.pdf"><b>U.S. Government Protection Profile Intrusion Detection System ...</b></a><br />
U.S. Government Protection Profile. Intrusion Detection System –. Scanner. For. Medium Robustness Environments. Version 0.9. December 30, 2004. Information ...<br />
<span class="a">niap.bahialab.com/pp/draft_pps/<wbr></wbr>pp_draft_idsscanner_mr_v0.9.pdf</span><br />
<br />
<a href="http://niap.bahialab.com/pp/draft_pps/pp_draft_idsanalyzer_mr_v0.9.pdf"><b>U.S. Government Protection Profile Intrusion Detection System ...</b></a><br />
U.S. Government Protection Profile. Intrusion Detection System –. Analyzer. For. Medium Robustness Environments. Version 0.9. December 30, 2004. Information ...<br />
<span class="a">niap.bahialab.com/pp/draft_pps/<wbr></wbr>pp_draft_idsanalyzer_mr_v0.9.pdf</span><br />
<br />
<a href="http://www.biblioteca.co.cr/pdf/network-intrusion-detection.pdf"><b>FAQ: Network Intrusion Detection Systems 0. Information about this FAQ</b></a> -<a href="http://72.14.205.104/search?q=cache:KyyeUtlQPAkJ:www.biblioteca.co.cr/pdf/network-intrusion-detection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=692&lr=lang_en">View as HTML</a><br />
FAQ: Network Intrusion Detection Systems. Version 0.8.3, March 21, 2000. This FAQ answers simple questions related to detecting intruders who attack systems ...<br />
<span class="a">www.biblioteca.co.cr/pdf/<wbr></wbr>network-intrusion-detection.pdf</span><br />
<br />
<a href="http://walrandpc.eecs.berkeley.edu/228S06/Projects/KrishnanProject.pdf"><b>Intrusion Detection in Wireless Sensor Networks</b></a> -<a href="http://72.14.205.104/search?q=cache:SEyliJtdMGAJ:walrandpc.eecs.berkeley.edu/228S06/Projects/KrishnanProject.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=693&lr=lang_en">View as HTML</a><br />
1. Intrusion Detection in Wireless Sensor Networks. Michael Krishnan. Abstract. Wireless Sensor Networks (WSNs) offer an excellent opportunity to monitor ...<br />
<span class="a">walrandpc.eecs.berkeley.edu/<wbr></wbr>228S06/Projects/KrishnanProject.pdf</span><br />
<br />
<a href="http://thor.auto.tuwien.ac.at/%7Echris/research/doc/dimva06_static.pdf"><b>Using Static Program Analysis to Aid Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:JYfoZpMRBMIJ:thor.auto.tuwien.ac.at/%7Echris/research/doc/dimva06_static.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=694&lr=lang_en">View as HTML</a><br />
Using Static Program Analysis. to Aid Intrusion Detection. Manuel Egele, Martin Szydlowski, Engin Kirda, and Christopher Kruegel. Secure Systems Lab ...<br />
<span class="a">thor.auto.tuwien.ac.at/~chris/<wbr></wbr>research/doc/dimva06_static.pdf</span><br />
<br />
<a href="http://www.canaudit.com/Outlines/ITBootCamp.pdf"><b>CONTROL & SECURITY OF FIREWALLS AND INTRUSION DETECTION SYSTEMS</b></a> -<a href="http://72.14.205.104/search?q=cache:T7jEMQYBpFMJ:www.canaudit.com/Outlines/ITBootCamp.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=695&lr=lang_en">View as HTML</a><br />
IT Audit & Security Boot Camp. COURSE DURATION: 5-days. CPE HOURS: 40. LEVEL: Intermediate / Group-Live. PREREQUISITES: None ...<br />
<span class="a">www.canaudit.com/Outlines/ITBootCamp.pdf</span><br />
<br />
<a href="http://elvex.ugr.es/icdm2005/pdf/icdm2005-mohan.pdf"><b>An Adaptive Intrusion Detection System using a Data Mining Approach</b></a> -<a href="http://72.14.205.104/search?q=cache:ALgeMSUXY0YJ:elvex.ugr.es/icdm2005/pdf/icdm2005-mohan.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=696&lr=lang_en">View as HTML</a><br />
An Adaptive Intrusion Detection System using a Data Mining Approach. Sujaa Rani Mohan, E.K. Park, Yijie Han. University of Missouri, Kansas City ...<br />
<span class="a">elvex.ugr.es/icdm2005/pdf/icdm2005-mohan.pdf</span><br />
<br />
<a href="http://www.johnmhall.net/research/immunology/CCCT2003/isnids.pdf"><b>An Architecture for Intrusion Detection Modeled After the Human ...</b></a> -<a href="http://72.14.205.104/search?q=cache:DJUMY8DErewJ:www.johnmhall.net/research/immunology/CCCT2003/isnids.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=697&lr=lang_en">View as HTML</a><br />
An Architecture for Intrusion Detection. Modeled After the Human Immune System. John M. HALL. Computer Science, University of Idaho ...<br />
<span class="a">www.johnmhall.net/research/<wbr></wbr>immunology/CCCT2003/isnids.pdf</span><br />
<br />
<a href="http://www.cab-cds.org/pp/draft_pps/pp_draft_idssystem_mr_v0.10.pdf"><b>U.S. Government Protection Profile Intrusion Detection System ...</b></a><br />
U.S. Government Protection Profile. Intrusion Detection System –. System. For. Medium Robustness Environments. Version 0.10. December 30, 2004. Information ...<br />
<span class="a">www.cab-cds.org/pp/draft_pps/<wbr></wbr>pp_draft_idssystem_mr_v0.10.pdf</span><br />
<br />
<a href="http://www.lib.ncsu.edu/theses/available/etd-12072006-052347/unrestricted/etd.pdf"><b>CONFIGURABLE STRING MATCHING HARDWARE FOR SPEEDING UP INTRUSION ...</b></a> -<a href="http://72.14.205.104/search?q=cache:hkQ_eEH6hl0J:www.lib.ncsu.edu/theses/available/etd-12072006-052347/unrestricted/etd.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=699&lr=lang_en">View as HTML</a><br />
ABSTRACT. ALDWAIRI, MONTHER MUSTAFA. Hardware Efficient Pattern Matching Algorithms and. Architectures for Fast Intrusion Detection. ...<br />
<span class="a">www.lib.ncsu.edu/theses/available/<wbr></wbr>etd-12072006-052347/unrestricted/etd.pdf</span><br />
<br />
<a href="http://www.cs.purdue.edu/homes/akamra/cs541/Proj4_IntrusionDetection_report.pdf"><b>CS 541 Project Report An Intrusion Detection System in MySQL</b></a> -<a href="http://72.14.205.104/search?q=cache:spBYuPRD1QkJ:www.cs.purdue.edu/homes/akamra/cs541/Proj4_IntrusionDetection_report.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=700&lr=lang_en">View as HTML</a><br />
CS 541 Project Report. An Intrusion Detection System in MySQL. Daeho Seo. Jing Li. Yinian Qi. Dec. 5th, 2006. 1 The Motivation ...<br />
<span class="a">www.cs.purdue.edu/homes/akamra/<wbr></wbr>cs541/Proj4_IntrusionDetection_report.pdf</span><br />
<br />
<div><a href="http://taesic.googlepages.com/2006_Allerton_Intrusion_Detection_preprint.pdf"><b>Sensor Deployment Optimization for Network Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:1ub1QeZLn1QJ:taesic.googlepages.com/2006_Allerton_Intrusion_Detection_preprint.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=701&lr=lang_en">View as HTML</a><br />
Sensor Deployment Optimization. for Network Intrusion Detection. Tae-Sic Yoo and Humberto E. Garcia. Sensors and Decision Systems Group ...<br />
<span class="a">taesic.googlepages.com/2006_<wbr></wbr>Allerton_Intrusion_Detection_preprint.pdf</span><br />
<br />
<a href="http://www.giac.org/practicals/archives/gcia/211.pdf"><b>SANS2000 San Jose > GIAC Intrusion Detection Curriculum Pract...</b></a> -<a href="http://72.14.205.104/search?q=cache:kxZMv5OWwcYJ:www.giac.org/practicals/archives/gcia/211.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=702&lr=lang_en">View as HTML</a><br />
Home. Faculty. Basics Module. FAQ. Contact. GIAC Intrusion Detection Curriculum. Practical Assignment for SNAP San Jose. May 8 - 13, 2000. Version 2.1.1 ...<br />
<span class="a">www.giac.org/practicals/archives/gcia/211.pdf</span><br />
<br />
<a href="http://ls6-www.informatik.uni-dortmund.de/%7Emeier/papers/issa2002.pdf"><b>An Efficient Intrusion Detection Design</b></a> -<a href="http://72.14.205.104/search?q=cache:mNovEPPFvEkJ:ls6-www.informatik.uni-dortmund.de/%7Emeier/papers/issa2002.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=703&lr=lang_en">View as HTML</a><br />
1. An Efficient Intrusion Detection System Design. Thomas Holz, Michael Meier, Hartmut Koenig. Brandenburg University of Technology Cottbus ...<br />
<span class="a">ls6-www.informatik.uni-dortmund.de/<wbr></wbr>~meier/papers/issa2002.pdf</span><br />
<br />
<a href="http://www.auto.tuwien.ac.at/%7Echris/research/doc/infsec05_hids.pdf"><b>Host-Based Intrusion Detection Host-Based Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:Jyzh7d5Bpf0J:www.auto.tuwien.ac.at/%7Echris/research/doc/infsec05_hids.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=704&lr=lang_en">View as HTML</a><br />
P1: PDB. JWBS001C-184.tex. WL041/Bidgoli WL041-Bidgoli.cls. June 15, 2005. 10:43. Char Count= 0. Host-Based Intrusion Detection ...<br />
<span class="a">www.auto.tuwien.ac.at/~chris/<wbr></wbr>research/doc/infsec05_hids.pdf</span><br />
<br />
<a href="http://www.samspublishing.com/content/images/0735712654/Errata/Errata2654.pdf"><b>Network Intrusion Detection, Third Edition 0735712654 Stephen ...</b></a> -<a href="http://72.14.205.104/search?q=cache:qlHPYubMrVMJ:www.samspublishing.com/content/images/0735712654/Errata/Errata2654.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=705&lr=lang_en">View as HTML</a><br />
Network Intrusion Detection, Third Edition. 0735712654. Stephen Northcutt and Judy Novak. Copyright. . 2003 by New Riders Publishing ...<br />
<span class="a">www.samspublishing.com/content/<wbr></wbr>images/0735712654/Errata/Errata2654.pdf</span><br />
<br />
<a href="http://www.globalcrossing.com/docs/terms_slas/GC_SLA_ManagedSecurity-ManagedIntrusionDetectionServiceJune2005.pdf"><b>Global Crossing Managed Security Services – Managed Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:sVjdVk_y15gJ:www.globalcrossing.com/docs/terms_slas/GC_SLA_ManagedSecurity-ManagedIntrusionDetectionServiceJune2005.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=706&lr=lang_en">View as HTML</a><br />
Global Crossing. Managed Security Services – Managed Intrusion Detection Service. June 2005. ©. Global Crossing 2005. Page 1 of 5 ...<br />
<span class="a"> www.globalcrossing.com/docs/terms_slas/GC_<wbr></wbr>SLA_ManagedSecurity-ManagedIntrusionDetectionServiceJune2005.pdf</span><br />
<br />
<a href="http://nob.cs.ucdavis.edu/book-aands/slides/25.pdf"><b>Chapter 25: Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:TyuHgcReQcgJ:nob.cs.ucdavis.edu/book-aands/slides/25.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=707&lr=lang_en">View as HTML</a><br />
June 1, 2004. Computer Security: Art and Science. ©2002-2004 Matt Bishop. Slide #25-1. Chapter 25: Intrusion Detection. • Principles. • Basics ...<br />
<span class="a">nob.cs.ucdavis.edu/book-aands/slides/25.pdf</span><br />
<br />
<a href="http://nob.cs.ucdavis.edu/book-intro/slides/22.pdf"><b>Chapter 22: Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:-oBsMvQzxEkJ:nob.cs.ucdavis.edu/book-intro/slides/22.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=708&lr=lang_en">View as HTML</a><br />
November 1, 2004. Introduction to Computer Security. ©2004 Matt Bishop. Slide #22-1. Chapter 22: Intrusion Detection. • Principles. • Basics ...<br />
<span class="a">nob.cs.ucdavis.edu/book-intro/slides/22.pdf</span><br />
<br />
<a href="http://isis.poly.edu/courses/cs682/labs/393lab4.pdf"><b>CS393/682 Lab 3: Introduction to Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:Sd9RQ0mWlcwJ:isis.poly.edu/courses/cs682/labs/393lab4.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=709&lr=lang_en">View as HTML</a><br />
CS393/682 Lab 3: Introduction to Intrusion Detection Systems. Introduction. Intrusion Detection Systems (IDS) are used in a network to monitor traffic or in ...<br />
<span class="a">isis.poly.edu/courses/cs682/labs/393lab4.pdf</span><br />
<br />
<a href="http://www.seas.gwu.edu/%7Ejjchryan/VAIDS051402.pdf"><b>Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:NIoUrf1JsGQJ:www.seas.gwu.edu/%7Ejjchryan/VAIDS051402.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=710&lr=lang_en">View as HTML</a><br />
Intrusion Detection. Issues and Technologies. Julie J.C.H. Ryan, D.Sc. Presented to the Department of Veteran. Affairs. InfoSec2002 New Orleans May 2002 ...<br />
<span class="a">www.seas.gwu.edu/~jjchryan/VAIDS051402.pdf</span><br />
<br />
<a href="http://www.acsa-admin.org/2000/papers/82.pdf"><b>A Network Audit System for Host-based Intrusion Detection (NASHID ...</b></a> -<a href="http://72.14.205.104/search?q=cache:-AvmENf9VbEJ:www.acsa-admin.org/2000/papers/82.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=711&lr=lang_en">View as HTML</a><br />
A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux. £. Thomas E. Daniels, Eugene H. Spafford. CERIAS. Purdue University ...<br />
<span class="a">www.acsa-admin.org/2000/papers/82.pdf</span><br />
<br />
<a href="http://www.airespace.com/pdf/WP_Intrusion_Detection.pdf"><b>White Paper Wireless Intrusion Detection & Prevention</b></a> -<a href="http://72.14.205.104/search?q=cache:yXJFPM3ge_kJ:www.airespace.com/pdf/WP_Intrusion_Detection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=712&lr=lang_en">View as HTML</a><br />
2004 Airespace, Inc. All Rights Reserved. White Paper. Wireless Intrusion Detection & Prevention. 2. Table of Contents. The Need for Intrusion Detection and ...<br />
<span class="a">www.airespace.com/pdf/WP_Intrusion_Detection.pdf</span><br />
<br />
<a href="http://www.neurosecurity.com/articles/IDS/TISC96.pdf"><b>A Comparative Analysis of Current Intrusion Detection Technologies</b></a> -<a href="http://72.14.205.104/search?q=cache:Wlm4dCmi-0gJ:www.neurosecurity.com/articles/IDS/TISC96.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=713&lr=lang_en">View as HTML</a><br />
A Comparative Analysis of Current Intrusion Detection Technologies. James Cannady Jay Harrell. Georgia Tech Research Institute Georgia Tech Research ...<br />
<span class="a">www.neurosecurity.com/articles/IDS/TISC96.pdf</span><br />
<br />
<a href="http://www.emtecinc.com/Aug03Adviser.pdf"><b>Intrusion Detection Gets Smarter</b></a> - <a href="http://72.14.205.104/search?q=cache:4VN_5AmnbSwJ:www.emtecinc.com/Aug03Adviser.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=714&lr=lang_en"> View as HTML</a><br />
I. ntrusion detection systems (IDS). are essentially network burglar. alarms. They supplement firewalls. by hunting for suspicious activity ...<br />
<span class="a">www.emtecinc.com/Aug03Adviser.pdf</span><br />
<br />
<a href="http://www.cse.psu.edu/%7Eszhu/teach/cse597b/IDS.pdf"><b>Motivation Intrusion Detection Techniques Intrusion Detection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:-ycPXFVRTNQJ:www.cse.psu.edu/%7Eszhu/teach/cse597b/IDS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=715&lr=lang_en">View as HTML</a><br />
1. Copyright (c) Peng Liu, The. Pennsylvania State Unviersity. 1. Intrusion Detection. -- A 20 year practice. Peng Liu. School of IST. Penn State University ...<br />
<span class="a">www.cse.psu.edu/~szhu/teach/cse597b/IDS.pdf</span><br />
<br />
<a href="http://ist.uwaterloo.ca/security/position/20050524/paper.pdf"><b>Intrusion Detection -- First Steps at UW</b></a> -<a href="http://72.14.205.104/search?q=cache:D3jcpVEICHIJ:ist.uwaterloo.ca/security/position/20050524/paper.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=716&lr=lang_en">View as HTML</a><br />
Intrusion Detection -- First Steps at UW. Information Systems and Technology. University of Waterloo. Synopsis. At the University of Waterloo over the last ...<br />
<span class="a"> ist.uwaterloo.ca/security/position/20050524/paper.pdf</span><br />
<br />
<a href="http://www.atc-nycorp.com/papers/Stillerman_CACM_1999.pdf"><b>Intrusion Detection for Distributed Applications</b></a> -<a href="http://72.14.205.104/search?q=cache:vDQGZVb8ZH4J:www.atc-nycorp.com/papers/Stillerman_CACM_1999.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=717&lr=lang_en">View as HTML</a><br />
Intrusion Detection for Distributed Applications. Matthew Stillerman. Carla Marceau. Maureen Stillman. Odyssey Research Associates (ORA) ...<br />
<span class="a">www.atc-nycorp.com/papers/Stillerman_CACM_1999.pdf</span><br />
<br />
<a href="http://www.remainsecure.com/whitepapers/ids/IDS%20Myths.pdf"><b>Myths and Principles of Intrusion Detection Systems By: Darrin M ...</b></a> -<a href="http://72.14.205.104/search?q=cache:9PdqVJe06o4J:www.remainsecure.com/whitepapers/ids/IDS%2520Myths.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=718&lr=lang_en">View as HTML</a><br />
Myths and Principles of Intrusion Detection Systems. By: Darrin M Mourer, CISSP CISA. Even with information security trends placing Intrusion Detection ...<br />
<span class="a"> www.remainsecure.com/whitepapers/ids/IDS%20Myths.pdf</span><br />
<br />
<a href="http://www.micsymposium.org/mics_2001/lawal_guster.pdf"><b>Developing Intrusion Detection/Defense Capability for Networks</b></a> -<a href="http://72.14.205.104/search?q=cache:i-96taE2qpUJ:www.micsymposium.org/mics_2001/lawal_guster.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=719&lr=lang_en">View as HTML</a><br />
The Development of a Intrusion Detection/Defense System for. Linux Hosts. Banji K. Lawal. Department of Microcomputer Studies. St. Cloud State University ...<br />
<span class="a">www.micsymposium.org/mics_2001/lawal_guster.pdf</span><br />
<br />
<a href="http://www.cse.lehigh.edu/%7Echuah/publications/paper-ijsn-revised.pdf"><b>Syntax vs. Semantics: Competing Approaches to Dynamic Network ...</b></a> -<a href="http://72.14.205.104/search?q=cache:4VKYMeK7ansJ:www.cse.lehigh.edu/%7Echuah/publications/paper-ijsn-revised.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=720&lr=lang_en">View as HTML</a><br />
Int. J. Security and Networks, Vol. X, Nos. X/X/X, 2006. 1. Copyright © 2006 Inderscience Enterprises Ltd. Syntax vs. Semantics: Competing ...<br />
<span class="a">www.cse.lehigh.edu/~chuah/<wbr></wbr>publications/paper-ijsn-revised.pdf</span><br />
<br />
<a href="http://www.cis.fiu.edu/%7Etking003/strg/files/autonomic/cucs-002-06%5B1%5D.pdf"><b>Binary-level Function Profiling for Intrusion Detection and Smart ...</b></a> -<a href="http://72.14.205.104/search?q=cache:xx5hW5zXkJEJ:www.cis.fiu.edu/%7Etking003/strg/files/autonomic/cucs-002-06%255B1%255D.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=721&lr=lang_en">View as HTML</a><br />
Binary-level Function Profiling for Intrusion Detection and Smart. Error Virtualization. Michael E. Locasto. Angelos D. Keromytis. Columbia University ...<br />
<span class="a"> www.cis.fiu.edu/~tking003/strg/<wbr></wbr>files/autonomic/cucs-002-06%5B1%5D.pdf</span><br />
<br />
<a href="http://courses.umass.edu/cs415/labs/lab2/415-lab2-Snort.pdf"><b>Lab exercise: Working with Snort for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:8H6Q6v1NTRoJ:courses.umass.edu/cs415/labs/lab2/415-lab2-Snort.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=722&lr=lang_en">View as HTML</a><br />
CS 415: Computer and Network Security. Fall 2005. Lab exercise: Working with Snort for. Intrusion Detection. Abstract: ...<br />
<span class="a">courses.umass.edu/cs415/labs/lab2/415-lab2-Snort.pdf</span><br />
<br />
<a href="http://courses.umass.edu/cs415/slides-pdf/415-lec14-ids.pdf"><b>Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:TeE5HA6rlPgJ:courses.umass.edu/cs415/slides-pdf/415-lec14-ids.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=723&lr=lang_en">View as HTML</a><br />
1. Monitoring/Sniffing. Normally, ethernet cards and other broadcast NICs. receive all traffic on the subnet. Unless the card is in promiscuous mode, ...<br />
<span class="a">courses.umass.edu/cs415/slides-pdf/415-lec14-ids.pdf</span><br />
<br />
<a href="http://stat.gmu.edu/interface/I03/I2003Proceedings/GoldringTom/GoldringTom.paper.pdf"><b>User Pro ling for Intrusion Detection in Windows NT</b></a> -<a href="http://72.14.205.104/search?q=cache:Dx6AzippiC0J:stat.gmu.edu/interface/I03/I2003Proceedings/GoldringTom/GoldringTom.paper.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=724&lr=lang_en">View as HTML</a><br />
User Pro ling for Intrusion Detection in Windows NT. Tom Goldring. National Security Agency, 9800 Savage Road, Fort Meade, MD, 20755. Abstract ...<br />
<span class="a"> stat.gmu.edu/interface/I03/I2003Proceedings/<wbr></wbr>GoldringTom/GoldringTom.paper.pdf</span><br />
<br />
<a href="http://www.cs.ubc.ca/%7Esingh/publication/aphids_cameraready.pdf"><b>APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:0D92y-PdYrEJ:www.cs.ubc.ca/%7Esingh/publication/aphids_cameraready.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=725&lr=lang_en">View as HTML</a><br />
APHIDS: A Mobile Agent-Based Programmable. Hybrid Intrusion Detection System. Ken Deeter. 1. , Kapil Singh. 1. , Steve Wilson. 1. , Luca Filipozzi ...<br />
<span class="a"> www.cs.ubc.ca/~singh/publication/aphids_cameraready.pdf</span><br />
<br />
<a href="http://www.researchandmarkets.com/reports/29048/optimizing_intrusion_detection_systems.pdf"><b>Optimizing Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:4pbBD3MIpkYJ:www.researchandmarkets.com/reports/29048/optimizing_intrusion_detection_systems.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=726&lr=lang_en">View as HTML</a><br />
Brochure. More information from http://www.researchandmarkets.com/reports/29048/. Optimizing Intrusion Detection Systems. Description: ...<br />
<span class="a">www.researchandmarkets.com/reports/<wbr></wbr>29048/optimizing_intrusion_detection_systems.pdf</span><br />
<br />
<a href="http://www.inf.ucp.br/profs/pcerq/redes3/downloads/snort4-latest.pdf"><b>Intrusion Detection Intrusion Detection Intrusion Detection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:Ctcd4MRV37AJ:www.inf.ucp.br/profs/pcerq/redes3/downloads/snort4-latest.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=727&lr=lang_en">View as HTML</a><br />
File Name: snort5-latest.doc. 1. Intrusion Detection. Intrusion Detection. Intrusion Detection. Intrusion Detection –– 1.2 ...<br />
<span class="a">www.inf.ucp.br/profs/pcerq/<wbr></wbr>redes3/downloads/snort4-latest.pdf</span><br />
<br />
<a href="http://www.guardlink.com/downloads/Alarm.pdf"><b>Intrusion Detection/Alarm Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:Na31qUjXQ1kJ:www.guardlink.com/downloads/Alarm.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=728&lr=lang_en">View as HTML</a><br />
916 Monmouth Street. Newport, KY 41071. Tel: 859.491.7711. Fax: 859.491.5985. www.guardlink.com. Intrusion Detection/Alarm Systems ...<br />
<span class="a">www.guardlink.com/downloads/Alarm.pdf</span><br />
<br />
<a href="http://www.johnmhall.net/research/immunology/TechReports/isnids%20vs%20rule.pdf"><b>Comparing an Immunological and a Rule-Based Intrusion Detection Method</b></a> -<a href="http://72.14.205.104/search?q=cache:-gQSVAeD338J:www.johnmhall.net/research/immunology/TechReports/isnids%2520vs%2520rule.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=729&lr=lang_en">View as HTML</a><br />
Comparing an Immunological and a Rule-Based. Intrusion Detection Method. John Hall. Abstract. This paper compares an immunological based detection style ...<br />
<span class="a"> www.johnmhall.net/research/immunology/<wbr></wbr>TechReports/isnids%20vs%20rule.pdf</span><br />
<br />
<a href="http://docs.idsresearch.org/OptimizingPatternMatchingForIDS.pdf"><b>Optimizing Pattern Matching for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:Va6PMqxtwBAJ:docs.idsresearch.org/OptimizingPatternMatchingForIDS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=730&lr=lang_en">View as HTML</a><br />
1. Optimizing Pattern Matching for Intrusion Detection. Marc Norton. Abstract – This paper presents an optimized version of. the Aho-Corasick [1] algorithm. ...<br />
<span class="a">docs.idsresearch.org/<wbr></wbr>OptimizingPatternMatchingForIDS.pdf</span><br />
<br />
<a href="http://cnscenter.future.co.kr/resource/security/ids/1284.pdf"><b>Intrusion detection evasion: How Attackers get past the burglar alarm</b></a> -<a href="http://72.14.205.104/search?q=cache:Ux79UCGcJxEJ:cnscenter.future.co.kr/resource/security/ids/1284.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=731&lr=lang_en">View as HTML</a><br />
SANS Institute 2003, Author retains full rights. Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46. Key fingerprint = AF19 FA27 2F94 998D ...<br />
<span class="a"> cnscenter.future.co.kr/resource/security/ids/1284.pdf</span><br />
<br />
<a href="http://www.gnist.org/%7Elars/studies/master/IDS/IDS-pres121203.pdf"><b>Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:LQVlWJBTS4oJ:www.gnist.org/%7Elars/studies/master/IDS/IDS-pres121203.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=732&lr=lang_en">View as HTML</a><br />
Intrusion Detection. or. “Technologies for detecting anomalous. behavior in distributed systems”. Copyleft (GNU FDL) 2003 Lars Strand ...<br />
<span class="a">www.gnist.org/~lars/studies/<wbr></wbr>master/IDS/IDS-pres121203.pdf</span><br />
<br />
<a href="http://www.polarcove.com/whitepapers/layer2.pdf"><b>Layer 2 Analysis of WLAN Discovery Applications for Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:l_H8TaGgjasJ:www.polarcove.com/whitepapers/layer2.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=733&lr=lang_en">View as HTML</a><br />
Abstract. Wireless LAN discovery through the use of applications such as NetStumbler, DStumbler,. Wellenreiter and others is an increasingly popular ...<br />
<span class="a">www.polarcove.com/whitepapers/layer2.pdf</span><br />
<br />
<a href="http://ultimavi.arc.net.my/ave/PRICAI2002/Papers.new/Sung-BaeCho.pdf"><b>Privilege Flows Modeling for Effective Intrusion Detection based ...</b></a> -<a href="http://72.14.205.104/search?q=cache:GQ985V0XwrkJ:ultimavi.arc.net.my/ave/PRICAI2002/Papers.new/Sung-BaeCho.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=734&lr=lang_en">View as HTML</a><br />
Privilege Flows Modeling for Effective Intrusion. Detection based on HMM. *. ¢¡¤£¤¥§¦© %'&)(. 021§3. 46587@98ACB D¢58EFB G)HPIQGRDS7FTFB 58AVU@WYX 58E@WY5Y` ...<br />
<span class="a">ultimavi.arc.net.my/ave/<wbr></wbr>PRICAI2002/Papers.new/Sung-BaeCho.pdf</span><br />
<br />
<a href="http://knight.cis.temple.edu/%7Evasilis/Publications/SPIEDSS05.pdf"><b>A Clustering Algorithm for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:FwCzCclAm-MJ:knight.cis.temple.edu/%7Evasilis/Publications/SPIEDSS05.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=735&lr=lang_en">View as HTML</a><br />
A Clustering Algorithm for Intrusion Detection. Qiang Wang. Vasileios Megalooikonomou. Data Engineering Laboratory (DEnLab) ...<br />
<span class="a">knight.cis.temple.edu/<wbr></wbr>~vasilis/Publications/SPIEDSS05.pdf</span><br />
<br />
<a href="http://www.cs.jhu.edu/%7Efabian/courses/CS600.424/course_papers/wagner01intrusion.pdf"><b>Intrusion Detection via Static Analysis</b></a> -<a href="http://72.14.205.104/search?q=cache:A7oVsD_S1AQJ:www.cs.jhu.edu/%7Efabian/courses/CS600.424/course_papers/wagner01intrusion.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=736&lr=lang_en">View as HTML</a><br />
Intrusion Detection via Static Analysis. David Wagner. U.C. Berkeley. ¢¡¤£¢¥§¦©. Drew Dean. Xerox PARC. © ¢ $¡&% ¥('§¡ )¦ 10¢ §2&0! 3¦©254. Abstract ...<br />
<span class="a"> www.cs.jhu.edu/~fabian/courses/<wbr></wbr>CS600.424/course_papers/wagner01intrusion.pdf</span><br />
<br />
<a href="http://www.dbm.maryland.gov/dbm_publishing/public_content/dbm_search/security/2004_conference/IntrusionDetSnortStyle.pdf"><b>Intrusion Detection Snort Style</b></a> -<a href="http://72.14.205.104/search?q=cache:gRbPg98umY8J:www.dbm.maryland.gov/dbm_publishing/public_content/dbm_search/security/2004_conference/IntrusionDetSnortStyle.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=737&lr=lang_en">View as HTML</a><br />
Intrusion Detection. Snort Style. 2004 State of Maryland IT Security and. Privacy Conference. 2:40 PM September 30. Page 2. Contact Information ...<br />
<span class="a">www.dbm.maryland.gov/.../public_content/<wbr></wbr>dbm_search/security/2004_conference/IntrusionDetSnortStyle.pdf</span><br />
<br />
<a href="http://www.reagansystems.com/pdf/csids.pdf"><b>Cisco Secure Intrusion Detection System Version 2.1</b></a> -<a href="http://72.14.205.104/search?q=cache:om4T7iN2cfUJ:www.reagansystems.com/pdf/csids.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=738&lr=lang_en">View as HTML</a><br />
Cisco Secure Intrusion Detection System Version 2.1. Course Length: 3 days. Course Description:. This course provides systems engineers the knowledge and ...<br />
<span class="a">www.reagansystems.com/pdf/csids.pdf</span><br />
<br />
<a href="http://ir.bcc.ctc.edu/itsa/standards/Intrusion%20Detection%20and%20Incident%20Response.pdf"><b>IT Security Standard: Intrusion Detection and Incident Response</b></a> -<a href="http://72.14.205.104/search?q=cache:FKvxNxFZJPoJ:ir.bcc.ctc.edu/itsa/standards/Intrusion%2520Detection%2520and%2520Incident%2520Response.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=739&lr=lang_en">View as HTML</a><br />
Computer Security Information. Page 1 of 5. IT Security Standard:. Intrusion Detection and Incident Response. Introduction. This standard defines the steps ...<br />
<span class="a"> ir.bcc.ctc.edu/itsa/standards/<wbr></wbr>Intrusion%20Detection%20and%20Incident%20Response.pdf</span><br />
<br />
<a href="http://isedj.org/isecon/2001/36b/ISECON.2001.Raggad.pdf"><b>Abstract: Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:SXQ1ov2gtBgJ:isedj.org/isecon/2001/36b/ISECON.2001.Raggad.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=740&lr=lang_en">View as HTML</a><br />
Intrusion Detection Systems. Bel G. Raggad. 1. Information Systems Department, Pace University. Pleasantville, NY, 10570, USA ...<br />
<span class="a">isedj.org/isecon/2001/36b/ISECON.2001.Raggad.pdf</span><br />
<br />
<a href="http://webfea.fea.aub.edu.lb/proceedings/2004/SRC-ECE-04.pdf"><b>A Dynamic Honeypot Design for Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:lCmKo2vRgDAJ:webfea.fea.aub.edu.lb/proceedings/2004/SRC-ECE-04.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=741&lr=lang_en">View as HTML</a><br />
A Dynamic Honeypot Design for Intrusion Detection. Iyad Kuwatly, Malek Sraj, Zaid Al Masri. American University of Beirut ...<br />
<span class="a">webfea.fea.aub.edu.lb/proceedings/2004/SRC-ECE-04.pdf</span><br />
<br />
<a href="http://taylorandfrancis.metapress.com/index/JQ0B4AVV0AM323W0.pdf"><b>Intrusion Detection: Issues and Challenges in Evidence Acquisition</b></a><br />
R. EVIEW OF. L. AW. C. OMPUTERS. & T. ECHNOLOGY. , V. OLUME. 18, N. O . 2, P. AGES. 149–164, J. ULY. 2004. Intrusion Detection: Issues and Challenges in ...<br />
<span class="a">taylorandfrancis.metapress.com/<wbr></wbr>index/JQ0B4AVV0AM323W0.pdf</span><br />
<br />
<a href="http://taylorandfrancis.metapress.com/index/K258205U13774842.pdf"><b>An FPGA-based network intrusion detection system with on-chip ...</b></a><br />
International Journal of Electronics,. Vol. 93, No. 6, June 2006, 403–420. An FPGA-based network intrusion detection system with on-chip. network interfaces ...<br />
<span class="a">taylorandfrancis.metapress.com/<wbr></wbr>index/K258205U13774842.pdf</span><br />
<br />
<a href="http://newsroom.cisco.com/dlls/IDSM2DS.pdf"><b>Cisco Catalyst 6500 Series Intrusion Detection System (IDSM-2 ...</b></a> -<a href="http://72.14.205.104/search?q=cache:s8zSOFIrpKoJ:newsroom.cisco.com/dlls/IDSM2DS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=744&lr=lang_en">View as HTML</a><br />
Cisco Systems, Inc. All contents are Copyright © 1992–2003 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 1 of 5 ...<br />
<span class="a">newsroom.cisco.com/dlls/IDSM2DS.pdf</span><br />
<br />
<a href="http://www.jucs.org/jucs_11_1/protomon_embedded_monitors_for/Joglekar_S_P.pdf"><b>ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion ...</b></a><br />
ProtoMon: Embedded Monitors for Cryptographic Protocol. Intrusion Detection and Prevention. Sachin P. Joglekar. (University of North Texas, Denton, TX, USA ...<br />
<span class="a">www.jucs.org/jucs_11_1/protomon_<wbr></wbr>embedded_monitors_for/Joglekar_S_P.pdf</span><br />
<br />
<a href="http://www.datacom.cz/files_datacom/IDP_Juniper_Networks.pdf"><b>Security Solutions Portfolio Juniper Networks Intrusion Detection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:ROKHljGUK70J:www.datacom.cz/files_datacom/IDP_Juniper_Networks.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=746&lr=lang_en">View as HTML</a><br />
The Juniper Networks Intrusion and Prevention (IDP) solutions. provide in-line attack prevention against worms, viruses, and. Trojans. ...<br />
<span class="a">www.datacom.cz/files_datacom/IDP_Juniper_Networks.pdf</span><br />
<br />
<a href="http://secuve.com/eng/product/IDS_FAQs.pdf"><b>Secuve IDS (Intrusion Detection System) Frequently Asked Questions</b></a> -<a href="http://72.14.205.104/search?q=cache:GeqsjUqjLeAJ:secuve.com/eng/product/IDS_FAQs.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=747&lr=lang_en">View as HTML</a><br />
ILDONG BUILDING 3F, 60 YANGJAE-DONG,. SEOCHO-GU, SEOUL, KOREA 137733. www.secuve.com. Copyright© 2001-2002 by Secuve Co., Ltd. All rights reserved. ...<br />
<span class="a">secuve.com/eng/product/IDS_FAQs.pdf</span><br />
<br />
<a href="http://www.fft.com.au/download/FFT%20CAMS%20Brochure%20US%20Lttr.pdf"><b>Why Choose FFT As Your Intrusion Detection Supplier</b></a><br />
t. s. s. y. y. s. s. t. t. e. e. m. m . . FFT CAMS™ (Central Alarm Monitoring. System) provides security staff with a. simple to understand alarm monitoring ...<br />
<span class="a">www.fft.com.au/download/<wbr></wbr>FFT%20CAMS%20Brochure%20US%20Lttr.pdf</span><br />
<br />
<a href="http://support.sas.com/documentation/onlinedoc/itsv/intrusion.pdf"><b>1 OFFLINE NETWORK INTRUSION DETECTION: MINING TCPDUMP DATA TO ...</b></a> -<a href="http://72.14.205.104/search?q=cache:Lj-t8gZmbu8J:support.sas.com/documentation/onlinedoc/itsv/intrusion.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=749&lr=lang_en">View as HTML</a><br />
Offline Network Intrusion Detection: MINING TCPDUMP Data to Identify Suspicious Activity. Presented at the AFCEA Federal Database Colloquium ...<br />
<span class="a">support.sas.com/documentation/<wbr></wbr>onlinedoc/itsv/intrusion.pdf</span><br />
<br />
<a href="http://www.setcce.org/natows/slides/ids.pdf"><b>Intrusion Detection Systems September 16th, 2003</b></a> -<a href="http://72.14.205.104/search?q=cache:EjfCq2lwrJsJ:www.setcce.org/natows/slides/ids.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=750&lr=lang_en">View as HTML</a><br />
D1 - 04/09/2003. Present document contains informations proprietary to France Telecom. Accepting this document means for. its recipient he or she recognizes ...<br />
<span class="a">www.setcce.org/natows/slides/ids.pdf</span><br />
<br />
<a href="http://www.lri.fr/%7Ecolette/PPF/Den87.pdf"><b>An Intrusion-Detection Model</b></a> - <a href="http://72.14.205.104/search?q=cache:JGlZRy3-mHcJ:www.lri.fr/%7Ecolette/PPF/Den87.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=751&lr=lang_en">View as HTML</a><br />
An Intrusion−Detection Model. DOROTHY E. DENNING. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. SE−13, NO. 2, FEBRUARY 1987,. 222−232. ...<br />
<span class="a">www.lri.fr/~colette/PPF/Den87.pdf</span><br />
<br />
<a href="http://www.iltanet.org/PDF/NID.pdf"><b>Network Intrusion Detection Implementing Snort</b></a> -<a href="http://72.14.205.104/search?q=cache:E3mVysizLW0J:www.iltanet.org/PDF/NID.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=752&lr=lang_en">View as HTML</a><br />
Network Intrusion Detection. Best of Breed Protection with SNORT. Implementing Snort. Snort can be readily implemented with the help of a special Linux ...<br />
<span class="a">www.iltanet.org/PDF/NID.pdf</span><br />
<br />
<a href="http://www.cs.albany.edu/%7Eerbacher/publications/NodeLayoutsAlgs-SPIE2003.pdf"><b>Analysis and Application of Node Layout Algorithms for Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:8MC95iabUuUJ:www.cs.albany.edu/%7Eerbacher/publications/NodeLayoutsAlgs-SPIE2003.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=753&lr=lang_en">View as HTML</a><br />
Analysis and Application of Node. Layout Algorithms for Intrusion Detection. Robert F. Erbacher and Zhouxuan Teng. Department of Computer Science, LI 67A ...<br />
<span class="a">www.cs.albany.edu/~erbacher/<wbr></wbr>publications/NodeLayoutsAlgs-SPIE2003.pdf</span><br />
<br />
<a href="http://www.carnahan2005.ulpgc.es/programme/presentaciones_pdf/12_Miercoles/3b/carnahan_3b_takeda.pdf"><b>The Application of Bioinformatics to Network Intrusion Detection</b></a><br />
The Application of Bioinformatics to. Network Intrusion Detection. Keiji Takeda. tkeiji@cmu.edu. Carnegie Mellon CyLab Japan. 39th Annual IEEE International ...<br />
<span class="a">www.carnahan2005.ulpgc.es/programme/<wbr></wbr>presentaciones_pdf/12_Miercoles/3b/carnahan_3b_takeda.pdf</span><br />
<br />
<a href="http://www.wam.umd.edu/%7Erabi/svmID.pdf"><b>Intrusion Detection with Support Vector Machines and Generative Models</b></a> -<a href="http://72.14.205.104/search?q=cache:I-FAU-S08zoJ:www.wam.umd.edu/%7Erabi/svmID.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=755&lr=lang_en">View as HTML</a><br />
Intrusion Detection with Support Vector. Machines and Generative Models. John S. Baras and Maben Rabi. Institute for Systems Research and ...<br />
<span class="a">www.wam.umd.edu/~rabi/svmID.pdf</span><br />
<br />
<a href="http://www.net-security.org/dl/articles/Monitored_Int.pdf"><b>Technology Brief: Monitored Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:7qysCKxnbqcJ:www.net-security.org/dl/articles/Monitored_Int.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=756&lr=lang_en">View as HTML</a><br />
Technology Brief:. Monitored Intrusion Detection Systems. by Aurobindo Sundaram. Cyber-Crime. Statistics. ➤ 90% of large organizations ...<br />
<span class="a">www.net-security.org/dl/articles/Monitored_Int.pdf</span><br />
<br />
<a href="http://www.ece.vt.edu/parkjm/Research/paper464.pdf"><b>A Game Theoretic Approach to Modeling Intrusion Detection in ...</b></a> -<a href="http://72.14.205.104/search?q=cache:4ACkpcDfgt8J:www.ece.vt.edu/parkjm/Research/paper464.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=757&lr=lang_en">View as HTML</a><br />
Proceedings of the 2004 IEEE. Workshop on Information Assurance and Security. T1B2. 1555. United States Military Academy, West Point, NY, 10–11 June 2004 ...<br />
<span class="a">www.ece.vt.edu/parkjm/Research/paper464.pdf</span><br />
<br />
<a href="http://students.ou.edu/D/Pedro.A.Diaz-Gomez-1/Art_SCISS.pdf"><b>Further Analysis of an Off-Line Intrusion Detection System: An ...</b></a> -<a href="http://72.14.205.104/search?q=cache:7xxhPgFlijAJ:students.ou.edu/D/Pedro.A.Diaz-Gomez-1/Art_SCISS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=758&lr=lang_en">View as HTML</a><br />
Further Analysis of an Off-Line Intrusion Detection System:. An Expanded Case Study in Multi-Objective Genetic Algorithms ...<br />
<span class="a">students.ou.edu/D/Pedro.A.Diaz-Gomez-1/Art_SCISS.pdf</span><br />
<br />
<a href="http://students.ou.edu/D/Pedro.A.Diaz-Gomez-1/Art_OUFirst.pdf"><b>A Case Study in Genetic Algorithms applied to Off-Line Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:r90pEP0RvBEJ:students.ou.edu/D/Pedro.A.Diaz-Gomez-1/Art_OUFirst.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=759&lr=lang_en">View as HTML</a><br />
A Case Study in Genetic Algorithms. applied to Off-Line Intrusion Detection Systems. Pedro A. Diaz-Gomez. Robotics, Evolution,. Adaptation, and Learning ...<br />
<span class="a"> students.ou.edu/D/Pedro.A.Diaz-Gomez-1/Art_OUFirst.pdf</span><br />
<br />
<a href="http://www.cs.chalmers.se/%7Esax/thesisdraft/titelblad.pdf"><b>Understanding Intrusion Detection Through Visualisation</b></a> -<a href="http://72.14.205.104/search?q=cache:n8S0W4f4hOkJ:www.cs.chalmers.se/%7Esax/thesisdraft/titelblad.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=760&lr=lang_en">View as HTML</a><br />
Understanding Intrusion Detection. Through Visualisation. Stefan Axelsson. Akademisk avhandling som for avlaggande av teknologie ...<br />
<span class="a">www.cs.chalmers.se/~sax/thesisdraft/titelblad.pdf</span><br />
<br />
<a href="http://www.tmrfindia.org/ijcsa/V2I12.pdf"><b>Intrusion Detection Effectiveness Improvement by a Multiagent System</b></a> -<a href="http://72.14.205.104/search?q=cache:a0Box5DVLmgJ:www.tmrfindia.org/ijcsa/V2I12.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=761&lr=lang_en">View as HTML</a><br />
Intrusion Detection Effectiveness Improvement by a. Multiagent System. Agustın Orfila , Javier Carbo and Arturo Ribagorda ...<br />
<span class="a">www.tmrfindia.org/ijcsa/V2I12.pdf</span><br />
<br />
<a href="http://www.appsecinc.com/techdocs/IDS_Auditing_Oracle_AppRadar.pdf"><b>Intrusion Detection and Security Auditing In Oracle</b></a> -<a href="http://72.14.205.104/search?q=cache:QTzxjwAKwzMJ:www.appsecinc.com/techdocs/IDS_Auditing_Oracle_AppRadar.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=762&lr=lang_en">View as HTML</a><br />
Intrusion Detection and. Security Auditing In. Oracle. White Paper. By Aaron C. Newman, CTO & Founder. www.appsecinc.com. Tel: 1-866-9APPSEC ...<br />
<span class="a">www.appsecinc.com/techdocs/<wbr></wbr>IDS_Auditing_Oracle_AppRadar.pdf</span><br />
<br />
<a href="http://www.ece.stevens-tech.edu/%7Ehli/mypapers/LiLiuLi05a.pdf"><b>LNCS 3810 - A New Model for Dynamic Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:UzVA2xZwquoJ:www.ece.stevens-tech.edu/%7Ehli/mypapers/LiLiuLi05a.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=763&lr=lang_en">View as HTML</a><br />
A New Model for Dynamic Intrusion Detection. Tao Li. 1. , Xiaojie Liu. 1. , and Hongbin Li. 2. 1. Department of Computer Science, ...<br />
<span class="a">www.ece.stevens-tech.edu/~hli/mypapers/LiLiuLi05a.pdf</span><br />
<br />
<a href="http://www.asut.ch/de/..%5Cupload_files%5Cdownloads%5CSecurity%20in%20und%20mit%20WLAN_Cisco.pdf"><b>Intrusion Detection for Wireless Networks</b></a> -<a href="http://72.14.205.104/search?q=cache:bE2-NupQ6x0J:www.asut.ch/de/..%255Cupload_files%255Cdownloads%255CSecurity%2520in%2520und%2520mit%2520WLAN_Cisco.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=764&lr=lang_en">View as HTML</a><br />
1. © 2005 Cisco Systems, Inc. All rights reserved. Security in und mit WLAN. Marco Fahrni – Systems Engineer. mfahrni@cisco.com. 13. September 2005 ...<br />
<span class="a"> www.asut.ch/<wbr></wbr>de/..%5Cupload_files%5Cdownloads%5CSecurity%20in%20und%20mit%20WLAN_Cisco.pdf</span><br />
<br />
<a href="http://www.slac.stanford.edu/cgi-wrap/getdoc/slac-pub-8060.pdf"><b>Intrusion Detection and Physics</b></a> -<a href="http://72.14.205.104/search?q=cache:zelmnZ276JUJ:www.slac.stanford.edu/cgi-wrap/getdoc/slac-pub-8060.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=765&lr=lang_en">View as HTML</a><br />
SLAC-PUB-8060. February, 1999. Intrusion Detection and Physics. Robert Cowles, Computer Security Officer. Stanford Linear Accelerator Center ...<br />
<span class="a">www.slac.stanford.edu/cgi-wrap/getdoc/slac-pub-8060.pdf</span><br />
<br />
<a href="http://www.unixworks.net/papers/wp-003.pdf"><b>Whitepaper: Hiding an Intrusion Detection System (IDS)</b></a> -<a href="http://72.14.205.104/search?q=cache:kTm6sRYmAtwJ:www.unixworks.net/papers/wp-003.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=766&lr=lang_en">View as HTML</a><br />
Whitepaper [WP-003]: Hiding an Intruson Detection Systems(IDS): Hide ‘N Go Peek. Page 1. Copyright © 2004 Bob Radvanovsky. All rights reserved. ...<br />
<span class="a">www.unixworks.net/papers/wp-003.pdf</span><br />
<br />
<a href="http://www-dii.ing.unisi.it/aiia2002/paper/APAUT/Abstract/didaci-aiia02.pdf"><b>Ensemble Learning for Intrusion Detection in Computer Networks</b></a> -<a href="http://72.14.205.104/search?q=cache:VVfPMoX61j4J:www-dii.ing.unisi.it/aiia2002/paper/APAUT/Abstract/didaci-aiia02.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=767&lr=lang_en">View as HTML</a><br />
Ensemble Learning for Intrusion Detection. in Computer Networks. Luca Didaci, Giorgio Giacinto and Fabio Roli. Department of Electrical and Electronic ...<br />
<span class="a">www-dii.ing.unisi.it/aiia2002/<wbr></wbr>paper/APAUT/Abstract/didaci-aiia02.pdf</span><br />
<br />
<a href="http://cilab.ujn.edu.cn/paper/Isnn2005.pdf"><b>Feature Selection and Intrusion Detection Using Hybrid Flexible ...</b></a> -<a href="http://72.14.205.104/search?q=cache:WoLy9nn_xccJ:cilab.ujn.edu.cn/paper/Isnn2005.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=768&lr=lang_en">View as HTML</a><br />
439. Feature Selection and Intrusion Detection. Using Hybrid Flexible Neural Tree. Yuehui Chen. 1. , Ajith Abraham. 2. , and Ju Yang ...<br />
<span class="a">cilab.ujn.edu.cn/paper/Isnn2005.pdf</span><br />
<br />
<a href="http://www.stillhq.com/pdfdb/000186/data.pdf"><b>Social Engineering: Techniques that can bypass Intrusion Detection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:n_fGKgsDMzEJ:www.stillhq.com/pdfdb/000186/data.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=769&lr=lang_en">View as HTML</a><br />
FOCUS on Intrusion Detection: How to defeat any IDS using Social Engineering. Page 1 of 5. http://www.securityfocus.com/focus/ids/articles/socengg.html ...<br />
<span class="a">www.stillhq.com/pdfdb/000186/data.pdf</span><br />
<br />
<a href="http://www.stillhq.com/pdfdb/000194/data.pdf"><b>Network Intrusion Detection for the E-Commerce Environment ...</b></a> -<a href="http://72.14.205.104/search?q=cache:Lrmknx9koKwJ:www.stillhq.com/pdfdb/000194/data.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=770&lr=lang_en">View as HTML</a><br />
http://www.securityfocus.com/focus/ids/articles/idsforecomm.html. 17/10/2000. Network Intrusion Detection for the E-Commerce Environment. by Eddie Powell ...<br />
<span class="a">www.stillhq.com/pdfdb/000194/data.pdf</span><br />
<br />
<a href="http://www.cms.livjm.ac.uk/pgnet2003/submissions/Paper-25.pdf"><b>Using Intrusion Detection to Detect Malicious Peer-to-Peer Network ...</b></a> -<a href="http://72.14.205.104/search?q=cache:ZlLlRxFR-QoJ:www.cms.livjm.ac.uk/pgnet2003/submissions/Paper-25.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=771&lr=lang_en">View as HTML</a><br />
Using Intrusion Detection to Detect Malicious Peer-to-Peer Network Traffic. Abiola Abimbola, Qi Shi and Madjid Merabti. Liverpool John Moores University, ...<br />
<span class="a"> www.cms.livjm.ac.uk/pgnet2003/submissions/Paper-25.pdf</span><br />
<br />
<a href="http://www.iis.sinica.edu.tw/JISE/2006/200611_09.pdf"><b>Effective Intrusion Detection Model through the Combination of a ...</b></a> -<a href="http://72.14.205.104/search?q=cache:fXLg5trDf_AJ:www.iis.sinica.edu.tw/JISE/2006/200611_09.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=772&lr=lang_en">View as HTML</a><br />
J. OURNAL OF. I. NFORMATION. S. CIENCE AND. E. NGINEERING. 22, 1447-1464 (2006). 1447. Effective Intrusion Detection Model through the Combination ...<br />
<span class="a">www.iis.sinica.edu.tw/JISE/2006/200611_09.pdf</span><br />
<br />
<a href="http://fie.engrng.pitt.edu/fie99/papers/1138.pdf"><b>Session 13a9 An Intrusion-Detection Environment for Information ...</b></a> -<a href="http://72.14.205.104/search?q=cache:W9P5nziFA_kJ:fie.engrng.pitt.edu/fie99/papers/1138.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=773&lr=lang_en">View as HTML</a><br />
Session 13a9. 0-7803-5643-8/99/$10.00 © 1999 IEEE. November 10 - 13, 1999 San Juan, Puerto Rico. 29. th. ASEE/IEEE Frontiers in Education Conference ...<br />
<span class="a">fie.engrng.pitt.edu/fie99/papers/1138.pdf</span><br />
<br />
<a href="http://www.lib.ncsu.edu/theses/available/etd-11292005-200153/unrestricted/etd.pdf"><b>Abstract WILLIAMS, LLOYD CARTER. Augmentation of Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:429aZRH5O5YJ:www.lib.ncsu.edu/theses/available/etd-11292005-200153/unrestricted/etd.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=774&lr=lang_en">View as HTML</a><br />
Abstract. WILLIAMS, LLOYD CARTER. Augmentation of Intrusion Detection Systems Through the. Use of Bayesian Network Analysis. (Under the direction of Robert ...<br />
<span class="a"> www.lib.ncsu.edu/theses/available/<wbr></wbr>etd-11292005-200153/unrestricted/etd.pdf</span><br />
<br />
<a href="http://people.brandeis.edu/%7Edkrisman/intrusion_detection_notes.pdf"><b>Deals with developing a model for intrusion detection Hypothesizes ...</b></a> -<a href="http://72.14.205.104/search?q=cache:5n2fsXlub-QJ:people.brandeis.edu/%7Edkrisman/intrusion_detection_notes.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=775&lr=lang_en">View as HTML</a><br />
Deals with developing a model for intrusion detection. Hypothesizes that intrusions can be characterized by abnormal behavior ...<br />
<span class="a">people.brandeis.edu/~dkrisman/<wbr></wbr>intrusion_detection_notes.pdf</span><br />
<br />
<a href="http://www.cs.wpi.edu/%7Efcco/bap-2c.pdf"><b>Applying Byzantine Agreement Protocol into intrusion detection in ...</b></a> -<a href="http://72.14.205.104/search?q=cache:lghwBPdAemYJ:www.cs.wpi.edu/%7Efcco/bap-2c.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=776&lr=lang_en">View as HTML</a><br />
1. Applying Byzantine Agreement Protocols to. the. Intrusion. Detection Problem. in. distributed systems. By. Fernando C. Colon Osorio. and Xiaoning Wang ...<br />
<span class="a">www.cs.wpi.edu/~fcco/bap-2c.pdf</span><br />
<br />
<a href="http://www.voyantinc.com/c/chilton_case_study.pdf"><b>vSecure Network Intrusion Detection HIPAA Compliance</b></a> -<a href="http://72.14.205.104/search?q=cache:ZDUR935yWUIJ:www.voyantinc.com/c/chilton_case_study.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=777&lr=lang_en">View as HTML</a><br />
Chilton Memorial Hospital makes Voyant Strategies'. vSecure Network Intrusion Detection. a "Critical". Component in its. HIPAA Compliance ...<br />
<span class="a">www.voyantinc.com/c/chilton_case_study.pdf</span><br />
<br />
<a href="http://eprints.utas.edu.au/196/01/IntelligentAnalysis.pdf"><b>Intrusion Detection by Intelligent analysis of data across ...</b></a> -<a href="http://72.14.205.104/search?q=cache:C8fvKR8cLJwJ:eprints.utas.edu.au/196/01/IntelligentAnalysis.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=778&lr=lang_en">View as HTML</a><br />
Intrusion Detection by Intelligent analysis of data across multiple gateways in. real-time. Joel Scanlan, Samuel Lorimer, Jacky Hartnett and Kevin Manderson ...<br />
<span class="a"> eprints.utas.edu.au/196/01/IntelligentAnalysis.pdf</span><br />
<br />
<a href="http://www.cdacmumbai.in/%7Enesys/slides/IDS.pdf"><b>Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:2xxstGmNyi4J:www.cdacmumbai.in/%7Enesys/slides/IDS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=779&lr=lang_en">View as HTML</a><br />
Session Outline. •. What is Intrusion ? •. How is it possible to detect Intrusions ? •. Techniques. •. Limitations. •. Current Trends ...<br />
<span class="a">www.cdacmumbai.in/~nesys/slides/IDS.pdf</span><br />
<br />
<a href="http://www.whitehats.ca/main/publications/external_pubs/acid_linux/acid_linux.pdf"><b>Installation instructions for ACID on Linux (Analysis Console for ...</b></a> -<a href="http://72.14.205.104/search?q=cache:ayQnxTYLpVEJ:www.whitehats.ca/main/publications/external_pubs/acid_linux/acid_linux.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=780&lr=lang_en">View as HTML</a><br />
Installation instructions for ACID. (Analysis Console for Intrusion Databases). Updated. 29 Apr 2002. Chris Payne. chris@whitehats.ca ...<br />
<span class="a">www.whitehats.ca/main/publications/<wbr></wbr>external_pubs/acid_linux/acid_linux.pdf</span><br />
<br />
<a href="http://homestead.unl.edu/netgroup/alumnidocs/vaidehi.MS.pdf"><b>Distributed Hybrid Agent Based Intrusion Detection and Real-Time ...</b></a> -<a href="http://72.14.205.104/search?q=cache:BToQiLll3P0J:homestead.unl.edu/netgroup/alumnidocs/vaidehi.MS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=781&lr=lang_en">View as HTML</a><br />
Distributed Hybrid Agent Based Intrusion. Detection and Real-Time Response System for. Wireless LANs. By. Vaidehi Kasarekar. A master‘s project presented to ...<br />
<span class="a"> homestead.unl.edu/netgroup/alumnidocs/vaidehi.MS.pdf</span><br />
<br />
<a href="http://www.techsearch.co.kr/down/vanguard/white%20paper/WP_ezSignOn.pdf"><b>Vanguard ezSIGNON™: Identity Management, Password Synchronization ...</b></a> -<a href="http://72.14.205.104/search?q=cache:ykRbwGCrstUJ:www.techsearch.co.kr/down/vanguard/white%2520paper/WP_ezSignOn.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=782&lr=lang_en">View as HTML</a><br />
Vanguard ezSIGNON™:. Identity Management,. Password Synchronization,. and intrusion detection for. multi-platform. environments. A Vanguard Integrity ...<br />
<span class="a">www.techsearch.co.kr/down/<wbr></wbr>vanguard/white%20paper/WP_ezSignOn.pdf</span><br />
<br />
<a href="http://projects.ascharlott.com/files/536_paper.pdf"><b>INTRUSION DETECTION AND PREVENTION SYSTEMS</b></a> -<a href="http://72.14.205.104/search?q=cache:eguha1_oW50J:projects.ascharlott.com/files/536_paper.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=783&lr=lang_en">View as HTML</a><br />
INTRUSION DETECTION AND. PREVENTION SYSTEMS. Matt Carlson. Andrew Scharlott. mrcarlso@cs.purdue.edu. ascharlo@cs.purdue.edu. CS536 Final Paper. May 05, 2006 ...<br />
<span class="a">projects.ascharlott.com/files/536_paper.pdf</span><br />
<br />
<a href="http://islab.oregonstate.edu/koc/ece478/02Report/AT.pdf"><b>Microsoft PowerPoint - Intrusion Detection.ppt</b></a> -<a href="http://72.14.205.104/search?q=cache:Ht9SKZR9YygJ:islab.oregonstate.edu/koc/ece478/02Report/AT.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=784&lr=lang_en">View as HTML</a><br />
Intrusion Detection. Adam Ashenfelter. Nicholas J. Tyrrell. This document is created using PDFmail (Copyright RTE Software) · http://www.pdfmail.com ...<br />
<span class="a">islab.oregonstate.edu/koc/ece478/02Report/AT.pdf</span><br />
<br />
<a href="http://www.barbedwiretech.com/solutions/BW_CaseStudy-Berkleylab.pdf"><b>World Renowned Research Center Deploys Barbedwire Technologies ...</b></a> -<a href="http://72.14.205.104/search?q=cache:Tlcpwa6X9uMJ:www.barbedwiretech.com/solutions/BW_CaseStudy-Berkleylab.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=785&lr=lang_en">View as HTML</a><br />
Copyright © 2001-2005, Barbedwire Technologies. All rights reserved. All products, logos, brand names or companies are trademarks or registered trademarks ...<br />
<span class="a">www.barbedwiretech.com/solutions/<wbr></wbr>BW_CaseStudy-Berkleylab.pdf</span><br />
<br />
<a href="http://www.compasstec.com/pdf/K12.pdf"><b>Electronic Access Control and Intrusion Detection in K-12 Schools</b></a> -<a href="http://72.14.205.104/search?q=cache:0A2YvCxGeaIJ:www.compasstec.com/pdf/K12.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=786&lr=lang_en">View as HTML</a><br />
Electronic Access Control and. Intrusion Detection in K-12 Schools. A Critical Element in Security Planning. Electronic Access Control (EAC) is an important ...<br />
<span class="a">www.compasstec.com/pdf/K12.pdf</span><br />
<br />
<a href="http://www.cs.gsu.edu/rbeyah/HotspotWorm_cr.pdf"><b>The Case for Collaborative Distributed Wireless Intrusion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:7mC8-zoXGcoJ:www.cs.gsu.edu/rbeyah/HotspotWorm_cr.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=787&lr=lang_en">View as HTML</a><br />
The Case for Collaborative Distributed Wireless. Intrusion Detection Systems. Raheem A. Beyah, Member, IEEE, Cherita L. Corbett, Member, IEEE, ...<br />
<span class="a">www.cs.gsu.edu/rbeyah/HotspotWorm_cr.pdf</span><br />
<br />
<a href="http://www.os3.nl/2003-2004/ANP/reports/JvB+TN-distributed-intrusion-detection-platform.pdf"><b>Distributed Intrusion Detection Platform</b></a> -<a href="http://72.14.205.104/search?q=cache:O3ZeVpL_oR8J:www.os3.nl/2003-2004/ANP/reports/JvB%2BTN-distributed-intrusion-detection-platform.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=788&lr=lang_en">View as HTML</a><br />
1. Distributed Intrusion Detection Platform. Flexible, scalable and secure. Analytical Network Project. Masters programme on System and Network ...<br />
<span class="a"> www.os3.nl/2003-2004/ANP/reports/<wbr></wbr>JvB+TN-distributed-intrusion-detection-platform.pdf</span><br />
<br />
<a href="http://www.incits.org/tc_home/CS1/2006docs/cs1060177.pdf"><b>Guidelines for the implementation, operation and management of ...</b></a> -<a href="http://72.14.205.104/search?q=cache:Fo3zsyCx8K0J:www.incits.org/tc_home/CS1/2006docs/cs1060177.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=789&lr=lang_en">View as HTML</a><br />
Secretariat ISO/IEC JTC 1/SC 27 -. DIN Deutsches Institut für Normung e. V., Burggrafenstr. 6, 10772 Berlin, Germany. Telephone: + 49 30 2601-2652; ...<br />
<span class="a">www.incits.org/tc_home/CS1/2006docs/cs1060177.pdf</span><br />
<br />
<a href="http://www.cs.uaf.edu/2006/spring/cs493/syllabus.pdf"><b>CS 493/693 - Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:qE_d9Xn6IFUJ:www.cs.uaf.edu/2006/spring/cs493/syllabus.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=790&lr=lang_en">View as HTML</a><br />
CS 493/693 - Intrusion Detection. Meeting time: 1-2pm. Room 104 Chapman Building. University of Alaska Fairbanks. CS F493-F01 #36664. CS F693-F01 #36665 ...<br />
<span class="a">www.cs.uaf.edu/2006/spring/cs493/syllabus.pdf</span><br />
<br />
<a href="http://www.ijcsns.org/04_journal/200602/200602C11.pdf"><b>Data Mining for Network Intrusion Detection System in Real Time</b></a> -<a href="http://72.14.205.104/search?q=cache:-xi0iYbISNwJ:www.ijcsns.org/04_journal/200602/200602C11.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=791&lr=lang_en">View as HTML</a><br />
IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.2B, February 2006. 173. Manuscript revised August 22, 2005. ...<br />
<span class="a">www.ijcsns.org/04_journal/200602/200602C11.pdf</span><br />
<br />
<a href="http://www.cse.nd.edu/courses/cse458/handouts/snort.pdf"><b>Snort - Lightweight Intrusion Detection for Networks Introducing Snort</b></a> -<a href="http://72.14.205.104/search?q=cache:5GanBWIh5gwJ:www.cse.nd.edu/courses/cse458/handouts/snort.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=792&lr=lang_en">View as HTML</a><br />
1. © Copyright 1999, Martin Roesch. USENIX LISA ‘99 Conference. Snort - Lightweight Intrusion. Detection for Networks. Martin Roesch ...<br />
<span class="a">www.cse.nd.edu/courses/cse458/handouts/snort.pdf</span><br />
<br />
<a href="http://www.cs.unb.ca/itc/ResearchExpo/posters/2006/abs2a.pdf"><b>Adaptive Network Intrusion Detection Systems in Hardware</b></a> -<a href="http://72.14.205.104/search?q=cache:LjHcvbGGfn8J:www.cs.unb.ca/itc/ResearchExpo/posters/2006/abs2a.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=793&lr=lang_en">View as HTML</a><br />
Adaptive Network Intrusion Detection Systems in Hardware. Farnaz Gharibian, Junaid A. Khan, and Ali Ghorbani. (W99bg, junaidk, ghorbani@unb.ca) ...<br />
<span class="a">www.cs.unb.ca/itc/ResearchExpo/posters/2006/abs2a.pdf</span><br />
<br />
<a href="http://www.ece.rutgers.edu/%7Eparashar/Classes/03-04/ece572/project-reps/r-strong.pdf"><b>Intrusion Detection Systems: Fixed vs Learning Thresholds</b></a> -<a href="http://72.14.205.104/search?q=cache:lUXK_EBBdFsJ:www.ece.rutgers.edu/%7Eparashar/Classes/03-04/ece572/project-reps/r-strong.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=794&lr=lang_en">View as HTML</a><br />
Intrusion Detection Systems:. Fixed vs Learning Thresholds. By Richard Strong. Abstract:. This paper introduces intrusion detection systems that use anomaly ...<br />
<span class="a"> www.ece.rutgers.edu/~parashar/<wbr></wbr>Classes/03-04/ece572/project-reps/r-strong.pdf</span><br />
<br />
<a href="http://www.liacs.nl/%7Ervelden/docs/Bypassing.IDS.pdf"><b>Bypassing Intrusion Detection Systems (IDS)</b></a> -<a href="http://72.14.205.104/search?q=cache:yJLbgmmtuNsJ:www.liacs.nl/%7Ervelden/docs/Bypassing.IDS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=795&lr=lang_en">View as HTML</a><br />
Bypassing Intrusion Detection Systems (IDS). Richard Velden, #0103330, Student, LIACS, Derk Geene, #0110841, Student, LIACS ...<br />
<span class="a">www.liacs.nl/~rvelden/docs/Bypassing.IDS.pdf</span><br />
<br />
<a href="http://www.exroads.com/Reference_Tools/Computer_Networking/Security/pass.asp?passvar=ncsc.94.pdf"><b>1 Problems in Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:zbyWL3xsug8J:www.exroads.com/Reference_Tools/Computer_Networking/Security/pass.asp%3Fpassvar%3Dncsc.94.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=796&lr=lang_en">View as HTML</a><br />
Articial Intelligence and Intrusion Detection: Current and Future. Directions. JeremyFrank. frank@cs.ucdavis.edu. Division of Computer Science ...<br />
<span class="a"> www.exroads.com/Reference_Tools/Computer_Networking/<wbr></wbr>Security/pass.asp?passvar=ncsc.94.pdf</span><br />
<br />
<a href="http://ise.gmu.edu/%7Exwangc/teaching/ISA774/IDS-Reading/CCS04-HighVolumeNID.pdf"><b>Operational Experiences with High-Volume Network Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:SkguRkUPQSYJ:ise.gmu.edu/%7Exwangc/teaching/ISA774/IDS-Reading/CCS04-HighVolumeNID.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=797&lr=lang_en">View as HTML</a><br />
Operational Experiences with High-Volume Network Intrusion Detection. Holger Dreger. Anja Feldmann. Vern Paxson. Robin Sommer. TU Munchen. TU Munchen ...<br />
<span class="a">ise.gmu.edu/~xwangc/teaching/<wbr></wbr>ISA774/IDS-Reading/CCS04-HighVolumeNID.pdf</span><br />
<br />
<a href="http://www.borderware.com/pdfs/press/press_117.pdf"><b>Sun And Partners Introduce Security Appliances For Spam Filtering ...</b></a> -<a href="http://72.14.205.104/search?q=cache:nCE-DPkFjGoJ:www.borderware.com/pdfs/press/press_117.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=798&lr=lang_en">View as HTML</a><br />
Sun And Partners Introduce Security Appliances For Spam Filtering And Intrusion. Detection. By InternetWeek.com , InternetWeek. Apr 30, 2003 (12:56 AM) ...<br />
<span class="a">www.borderware.com/pdfs/press/press_117.pdf</span><br />
<br />
<a href="http://www.thc.segfault.net/root/docs/intrusion_detection/nids/Audit-Data-Reduction-for-Intrusion-Detection.pdf"><b>Audit Data Reduction for Intrusion Detection Abstract:</b></a> -<a href="http://72.14.205.104/search?q=cache:bGn-VCh5wW4J:www.thc.segfault.net/root/docs/intrusion_detection/nids/Audit-Data-Reduction-for-Intrusion-Detection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=799&lr=lang_en">View as HTML</a><br />
Audit Data Reduction for Intrusion Detection. S. Mukkamala, G. R. Tadiparthi, N. Tummala, G. Janoski. {srinivas, gopal, ntummala, silfalco}@cs.nmt.edu ...<br />
<span class="a">www.thc.segfault.net/root/docs/intrusion_detection/<wbr></wbr>nids/Audit-Data-Reduction-for-Intrusion-Detection.pdf</span><br />
<br />
<a href="http://scholar.lib.vt.edu/theses/available/etd-05252005-140924/unrestricted/DCN_ETD.pdf"><b>An Intrusion Detection System for Power Attacks</b></a> -<a href="http://72.14.205.104/search?q=cache:5OUCYWPasw0J:scholar.lib.vt.edu/theses/available/etd-05252005-140924/unrestricted/DCN_ETD.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=800&lr=lang_en">View as HTML</a><br />
An Intrusion Detection System for Battery Exhaustion Attacks on. Mobile Computers. Daniel C. Nash. Thesis submitted to the Faculty of the ...<br />
<span class="a">scholar.lib.vt.edu/theses/available/<wbr></wbr>etd-05252005-140924/unrestricted/DCN_ETD.pdf</span><br />
<br />
<a href="http://www.ijcsns.org/04_journal/200607/200607C03.pdf"><b>A Swarm-Intelligence-Based Intrusion Detection Technique</b></a> -<a href="http://72.14.205.104/search?q=cache:ojSJiQLGVbIJ:www.ijcsns.org/04_journal/200607/200607C03.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=801&lr=lang_en">View as HTML</a><br />
IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.7B, July 2006. 146. Manuscript received July 5, 2006. ...<br />
<span class="a">www.ijcsns.org/04_journal/200607/200607C03.pdf</span><br />
<br />
<a href="http://etd.gatech.edu/theses/available/etd-01132005-125446/unrestricted/park_yongro_200505_phd.pdf"><b>A STATISTICAL PROCESS CONTROL APPROACH FOR NETWORK INTRUSION DETECTION</b></a> -<a href="http://72.14.205.104/search?q=cache:YJpFYUjRuN0J:etd.gatech.edu/theses/available/etd-01132005-125446/unrestricted/park_yongro_200505_phd.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=802&lr=lang_en">View as HTML</a><br />
A STATISTICAL PROCESS CONTROL APPROACH. FOR NETWORK INTRUSION DETECTION. A Dissertation. Presented to. The Academic Faculty ...<br />
<span class="a"> etd.gatech.edu/theses/available/etd-01132005-125446/<wbr></wbr>unrestricted/park_yongro_200505_phd.pdf</span><br />
<br />
<a href="http://www.commlogicdesign.com/pubs/Snort_Network_Intrusion_Detection_System.pdf"><b>The Snort Network Intrusion Detection System on the Intel IXP2400 ...</b></a> -<a href="http://72.14.205.104/search?q=cache:PGCtBAL_N_sJ:www.commlogicdesign.com/pubs/Snort_Network_Intrusion_Detection_System.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=803&lr=lang_en">View as HTML</a><br />
This paper describes an implementation of the Snort Network Intrusion Detection Sys-. tem (Snort NIDS) on the Intel IXP2400 processor. ...<br />
<span class="a">www.commlogicdesign.com/pubs/<wbr></wbr>Snort_Network_Intrusion_Detection_System.pdf</span><br />
<br />
<a href="http://www.cs.um.edu.mt/%7Ecsaw/CSAW03/Proceedings/LogAnalysisIDS.pdf"><b>A Log Analysis based Intrusion Detection System for the creation ...</b></a> -<a href="http://72.14.205.104/search?q=cache:WjhMoZvonxkJ:www.cs.um.edu.mt/%7Ecsaw/CSAW03/Proceedings/LogAnalysisIDS.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=804&lr=lang_en">View as HTML</a><br />
A Log Analysis based Intrusion Detection System for the. creation of a Specification Based Intrusion Prevention. System. Andre’ Muscat ...<br />
<span class="a">www.cs.um.edu.mt/~csaw/CSAW03/<wbr></wbr>Proceedings/LogAnalysisIDS.pdf</span><br />
<br />
<a href="http://www.sis.uncc.edu/%7Eyzheng/publications/iwia03-tza-p73.pdf"><b>Intrusion detection force: an infrastructure for internet-scale ...</b></a> -<a href="http://72.14.205.104/search?q=cache:0r4OYsJaHgsJ:www.sis.uncc.edu/%7Eyzheng/publications/iwia03-tza-p73.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=805&lr=lang_en">View as HTML</a><br />
Intrusion Detection Force:. An Infrastructure for Internet-Scale Intrusion Detection. Lawrence Teo. 1,2. Yuliang Zheng. 1,2. Gail-Joon Ahn ...<br />
<span class="a">www.sis.uncc.edu/~yzheng/<wbr></wbr>publications/iwia03-tza-p73.pdf</span><br />
<br />
<a href="http://www.vigorpro.com/uploads/EoID200611171006101.pdf"><b>Evolutionism of Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:SFsJ1LYPGugJ:www.vigorpro.com/uploads/EoID200611171006101.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=806&lr=lang_en">View as HTML</a><br />
1. Evolutionism of Intrusion Detection. Jackie Lai. The network technology changes with each passing day; and the attack technique of ...<br />
<span class="a">www.vigorpro.com/uploads/EoID200611171006101.pdf</span><br />
<br />
<a href="http://faculty.uml.edu/yluo/Teaching/AdvCompArch/reports/HayesSinghalFinalProject.pdf"><b>Rules-based Network Intrusion Detection using a Field Programmable ...</b></a> -<a href="http://72.14.205.104/search?q=cache:TSCoemMQ2JcJ:faculty.uml.edu/yluo/Teaching/AdvCompArch/reports/HayesSinghalFinalProject.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=807&lr=lang_en">View as HTML</a><br />
Rules-based Network Intrusion Detection. using a Field Programmable Gate Array. Christopher Hayes and Yatin Singhal. 16.671 Advanced Computer Architecture, ...<br />
<span class="a"> faculty.uml.edu/yluo/Teaching/AdvCompArch/<wbr></wbr>reports/HayesSinghalFinalProject.pdf</span><br />
<br />
<a href="http://certconf.org/presentations/2003/Tues/TG4.pdf"><b>Multi-Source / Multi-Level Intrusion Detection Systems</b></a> -<a href="http://72.14.205.104/search?q=cache:t4eq852n04UJ:certconf.org/presentations/2003/Tues/TG4.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=808&lr=lang_en">View as HTML</a><br />
2003 Solutionary, Inc. Multi-Source / Multi-Level. Intrusion Detection Systems. Michael J. Hrabik. Solutionary, Inc. ...<br />
<span class="a">certconf.org/presentations/2003/Tues/TG4.pdf</span><br />
<br />
<a href="http://intranet.cps.k12.il.us/Technology/12/16720_Intrusion_Detection.pdf"><b>Intrusion Detection System 16720-1 Copyright © 2002, Chicago ...</b></a> -<a href="http://72.14.205.104/search?q=cache:MKNV7wRfqE0J:intranet.cps.k12.il.us/Technology/12/16720_Intrusion_Detection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=809&lr=lang_en">View as HTML</a><br />
Intrusion Detection System. 16720-1 Copyright © 2002, Chicago Public Schools. Office of Technology Services. All Rights Reserved. Revision 5 – May 10, 2002 ...<br />
<span class="a"> intranet.cps.k12.il.us/Technology/<wbr></wbr>12/16720_Intrusion_Detection.pdf</span><br />
<br />
<a href="http://www-personal.engin.umd.umich.edu/%7Exylum/WorkingPapers/Ye&Li_al_IEEE%20SMCA%20Probabilistic%20intrusion%20detection.pdf"><b>Probabilistic techniques for intrusion detection based on computer ...</b></a> -<a href="http://72.14.205.104/search?q=cache:4cxVe2_BHEsJ:www-personal.engin.umd.umich.edu/%7Exylum/WorkingPapers/Ye%26Li_al_IEEE%2520SMCA%2520Probabilistic%2520intrusion%2520detection.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=810&lr=lang_en">View as HTML</a><br />
266. IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART A: SYSTEMS AND HUMANS, VOL. 31, NO. 4, JULY 2001. Probabilistic Techniques for Intrusion ...<br />
<span class="a">www-personal.engin.umd.umich.edu/.../Ye&<wbr></wbr>Li_al_IEEE%20SMCA%20Probabilistic%20intrusion%20detection.pdf</span><br />
<br />
<a href="http://www.becor.org/content/downloads/2005-12-07-registration.pdf"><b>Water Intrusion Detection Using Infrared Cameras - December 7, 2005</b></a> -<a href="http://72.14.205.104/search?q=cache:V4yUvhDjoW4J:www.becor.org/content/downloads/2005-12-07-registration.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=811&lr=lang_en">View as HTML</a><br />
_______________________________________________________________________. B U I L D I N G E N V E L O P E. C O U N C I L O T T A W A R E G I O N ...<br />
<span class="a">www.becor.org/content/downloads/<wbr></wbr>2005-12-07-registration.pdf</span><br />
<br />
<a href="http://www.soon.free.fr/publi/ID.pdf"><b>Selecting Appropriate Counter-Measures in an Intrusion Detection ...</b></a> -<a href="http://72.14.205.104/search?q=cache:hG1a1xH1_ZUJ:www.soon.free.fr/publi/ID.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=812&lr=lang_en">View as HTML</a><br />
Selecting Appropriate Counter-Measures. in an Intrusion Detection Framework. Frederic Cuppens. Sylvain Gombault. Thierry Sans ...<br />
<span class="a">www.soon.free.fr/publi/ID.pdf</span><br />
<br />
<a href="http://m-ice.sourceforge.net/docs/developer-guide.pdf"><b>M-ICE Modular Intrusion Detection and Countermeasure Environment</b></a> -<a href="http://72.14.205.104/search?q=cache:LrN_C8pDRroJ:m-ice.sourceforge.net/docs/developer-guide.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=813&lr=lang_en">View as HTML</a><br />
Copyright and Licence Notes. This document was written and will be maintained by Thomas Biege. The dis-. tribution and modification of this document is ...<br />
<span class="a">m-ice.sourceforge.net/docs/developer-guide.pdf</span><br />
<br />
<a href="http://www.ece.vt.edu/tlmartin/power-secure/nashd_martint_battery_exhaustion.pdf"><b>Towards an Intrusion Detection System for Battery Exhaustion ...</b></a> -<a href="http://72.14.205.104/search?q=cache:JBINnfYuzscJ:www.ece.vt.edu/tlmartin/power-secure/nashd_martint_battery_exhaustion.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=814&lr=lang_en">View as HTML</a><br />
Towards an Intrusion Detection System for Battery Exhaustion Attacks on. Mobile Computing Devices. Daniel C. Nash, Thomas L. Martin, Dong S. Ha, ...<br />
<span class="a"> www.ece.vt.edu/tlmartin/power-secure/<wbr></wbr>nashd_martint_battery_exhaustion.pdf</span><br />
<br />
<a href="http://isedj.org/isecon/2006/3722/ISECON.2006.Harvey.pdf"><b>Virtual Laboratory Intrusion Detection Experience for Information ...</b></a> -<a href="http://72.14.205.104/search?q=cache:I1xsQhLUrL0J:isedj.org/isecon/2006/3722/ISECON.2006.Harvey.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=815&lr=lang_en">View as HTML</a><br />
Harvey, Johnson, and Turchek. Sat, Nov 4, 4:30 - 4:55, Bordeaux. Virtual Laboratory Intrusion Detection Experience for. Information Systems Professionals ...<br />
<span class="a">isedj.org/isecon/2006/3722/ISECON.2006.Harvey.pdf</span><br />
<br />
<a href="http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/040.pdf"><b>UTILIZING NEURAL NETWORKS FOR EFFECTIVE INTRUSION DETECTION</b></a> -<a href="http://72.14.205.104/search?q=cache:n6tCDKN80OAJ:icsa.cs.up.ac.za/issa/2004/Proceedings/Full/040.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=816&lr=lang_en">View as HTML</a><br />
UTILIZING NEURAL NETWORKS FOR EFFECTIVE. INTRUSION DETECTION. Martin Botha. a. & Rossouw von Solms. b. a. Port Elizabeth Technikon, South Africa ...<br />
<span class="a">icsa.cs.up.ac.za/issa/2004/Proceedings/Full/040.pdf</span><br />
<br />
<a href="http://icsa.cs.up.ac.za/issa/2002/proceedings/A025.pdf"><b>Comparing Intrusion Detection Tools Using Generic Vulnerability ...</b></a> -<a href="http://72.14.205.104/search?q=cache:EzzUXvR3NacJ:icsa.cs.up.ac.za/issa/2002/proceedings/A025.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=817&lr=lang_en">View as HTML</a><br />
1. Comparing Intrusion Detection Tools Using Generic. Vulnerability Categories. H.S. VENTER (heins@adam.rau.ac.za). J.H.P. ELOFF (eloff@rkw.rau.ac.za) ...<br />
<span class="a">icsa.cs.up.ac.za/issa/2002/proceedings/A025.pdf</span><br />
<br />
<a href="http://www.linuxdays.lu/downloads/linuxdays-2005/plonelocalfolderng.2006-01-05.4598423600/Security-Tutorial/Security%20Part%201.pdf"><b>1. Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:u-_yrwO3L2kJ:www.linuxdays.lu/downloads/linuxdays-2005/plonelocalfolderng.2006-01-05.4598423600/Security-Tutorial/Security%2520Part%25201.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=818&lr=lang_en">View as HTML</a><br />
2. 005:. S. e. c. u. rit. y. T. u. t. o. rial. 1. Intrusion Detection. 1.1 Introduction. 1.2 Snort Introduction. 1.3 Snort in the network ...<br />
<span class="a">www.linuxdays.lu/.../plonelocalfolderng.2006-01-05.4598423600/<wbr></wbr>Security-Tutorial/Security%20Part%201.pdf</span><br />
<br />
<a href="http://www.securitygauntlet.com/docs/IDSExplain.pdf"><b>Intrusion Detection Systems (IDS)</b></a><br />
Page 1. 6/12/2003. Intrusion Detection Systems. (IDS). What are They and How do They Work? By. Wayne T Work. Security Gauntlet Consulting. 56 Applewood Lane ...<br />
<span class="a"> www.securitygauntlet.com/docs/IDSExplain.pdf</span><br />
<br />
<a href="http://snsl.engr.uconn.edu/pubs/fccm04.pdf"><b>FPGA Based Network Intrusion Detection using Content Addressable ...</b></a> -<a href="http://72.14.205.104/search?q=cache:ffpWNgASY1IJ:snsl.engr.uconn.edu/pubs/fccm04.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=820&lr=lang_en">View as HTML</a><br />
FPGA Based Network Intrusion Detection using Content Addressable Memories. Long Bu and John A. Chandy. University of Connecticut. Storrs, CT 06269-2157 ...<br />
<span class="a">snsl.engr.uconn.edu/pubs/fccm04.pdf</span><br />
<br />
<a href="http://hpovua.fe.up.pt/%7Emania/hpovua2005%20papers/Poster1-7.pdf"><b>AMASIR : A Multi Agents System for IntRusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:j3oatXngitgJ:hpovua.fe.up.pt/%7Emania/hpovua2005%2520papers/Poster1-7.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=821&lr=lang_en">View as HTML</a><br />
V. iew Univ. e. rs. it. y. A. s. sociation, 12th. W. orks. h. op. AMASIR : A Multi Agents System. for IntRusion Detection. C. Kotchap, R. Rentsch ...<br />
<span class="a">hpovua.fe.up.pt/~mania/<wbr></wbr>hpovua2005%20papers/Poster1-7.pdf</span><br />
<br />
<a href="http://www.netbankaudit.com/images/IPSvsIDS_White_Paper.pdf"><b>Intrusion Prevention versus Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:RC61nbAZ4tUJ:www.netbankaudit.com/images/IPSvsIDS_White_Paper.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=822&lr=lang_en">View as HTML</a><br />
Intrusion Prevention versus. Intrusion Detection. 1. Introduction. Intrusions are a problem endemic to today's networks. If a computer is on the ...<br />
<span class="a">www.netbankaudit.com/images/IPSvsIDS_White_Paper.pdf</span><br />
<br />
<a href="http://deposit.ddb.de/cgi-bin/dokserv?idn=969432127&dok_var=d1&dok_ext=pdf&filename=969432127.pdf"><b>Using Root Cause Analysis to Handle Intrusion Detection Alarms</b></a><br />
Using Root Cause Analysis. to Handle. Intrusion Detection Alarms. Dissertation. zur Erlangung des Grades eines. Doktors der Naturwissenschaften ...<br />
<span class="a">deposit.ddb.de/cgi-bin/dokserv?idn=969432127&<wbr></wbr>dok_var=d1&dok_ext=pdf&filename=969432127.pdf</span><br />
<br />
<a href="http://www.dotslinker.com/workspace/itbutler/pdf/fca.pdf"><b>INTRUSION DETECTION IN DEPTH Five Common Attacks Of The Year 2002 ...</b></a><br />
INTRUSION DETECTION IN DEPTH. Five Common Attacks. Of. The Year 2002 at our Network. Introduction. Realizing that customer goodwill is paramount to the ...<br />
<span class="a">www.dotslinker.com/workspace/itbutler/pdf/fca.pdf</span><br />
<br />
<a href="http://www.cas.mcmaster.ca/%7Ewmfarmer/SE-4C03-03/projects/papers/Oattes.pdf"><b>Preemptive Intrusion Detection</b></a> -<a href="http://72.14.205.104/search?q=cache:Sn5rvgC6k9gJ:www.cas.mcmaster.ca/%7Ewmfarmer/SE-4C03-03/projects/papers/Oattes.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=825&lr=lang_en">View as HTML</a><br />
Preemptive Intrusion Detection. 4C03 Technical Paper. Ryan A Oattes. 9913479. April 4, 2003. Academic Section. Intrusion detection is the science of ...<br />
<span class="a">www.cas.mcmaster.ca/~wmfarmer/<wbr></wbr>SE-4C03-03/projects/papers/Oattes.pdf</span><br />
<br />
<a href="http://www-scf.usc.edu/%7Emflaniga/CSCI_558/Border_Patrol.pdf"><b>Border Patrol: Implementing a network intrusion detection system ...</b></a> -<a href="http://72.14.205.104/search?q=cache:SpsY2NSK-X8J:www-scf.usc.edu/%7Emflaniga/CSCI_558/Border_Patrol.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=826&lr=lang_en">View as HTML</a><br />
Border Patrol: Implementing a. network intrusion detection system on the. IXP network processor. By,. Michael G. Flanigan. Abstract ...<br />
<span class="a">www-scf.usc.edu/~mflaniga/CSCI_558/Border_Patrol.pdf</span><br />
<br />
<a href="http://www.kernelhacking.com/rodrigo/defcon/Defcon.pdf"><b>Kernel Intrusion Detection System</b></a> -<a href="http://72.14.205.104/search?q=cache:5rKTXcBe2n0J:www.kernelhacking.com/rodrigo/defcon/Defcon.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=827&lr=lang_en">View as HTML</a><br />
http://www.risesecurity.org. Rodrigo Rubira Branco. rodrigo@kernelhacking.com · rodrigo@risesecurity.org. Kernel Intrusion Detection System ...<br />
<span class="a">www.kernelhacking.com/rodrigo/defcon/Defcon.pdf</span><br />
<br />
<a href="http://www.silvero.net/listing/poul/07apr2005/ids_zanero.pdf"><b>Detecting 0-day attacks with Learning Intrusion Detection System ...</b></a> -<a href="http://72.14.205.104/search?q=cache:fBxcPKJH71YJ:www.silvero.net/listing/poul/07apr2005/ids_zanero.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=828&lr=lang_en">View as HTML</a><br />
Politecnico di Milano. Dip. Elettronica e Informazione. Milano, Italy. Detecting 0-day attacks with. Learning Intrusion Detection System. Stefano Zanero ...<br />
<span class="a"> www.silvero.net/listing/poul/07apr2005/ids_zanero.pdf</span><br />
<br />
<a href="http://www.softcomputing.net/jnca2.pdf"><b>Intrusion detection using an ensemble of intelligent paradigms</b></a> -<a href="http://72.14.205.104/search?q=cache:YC8PgPxSJugJ:www.softcomputing.net/jnca2.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=829&lr=lang_en">View as HTML</a><br />
a,. *. , Andrew H. Sung. a. , Ajith Abraham. b. a. Department of Computer Science, New Mexico Tech, Socorro, NM 87801, USA ...<br />
<span class="a">www.softcomputing.net/jnca2.pdf</span><br />
<br />
<a href="http://www.softcomputing.net/dscids.pdf"><b>D-SCIDS: Distributed soft computing intrusion detection system</b></a> -<a href="http://72.14.205.104/search?q=cache:AK-vtCRHCOAJ:www.softcomputing.net/dscids.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=830&lr=lang_en">View as HTML</a><br />
Journal of Network and. Computer Applications ] (]]]]) ]]]–]]]. D-SCIDS: Distributed soft computing intrusion. detection system. Ajith Abraham ...<br />
<span class="a">www.softcomputing.net/dscids.pdf</span><br />
<br />
<a href="http://www.aei.tuke.sk/pdf/2006-01/Vokorokos.pdf"><b>INTRUSION DETECTION SYSTEM USING SELF ORGANIZING MAP</b></a> -<a href="http://72.14.205.104/search?q=cache:ep8hjnEWmQAJ:www.aei.tuke.sk/pdf/2006-01/Vokorokos.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=831&lr=lang_en">View as HTML</a><br />
Acta Electrotechnica et Informatica No. 1, Vol. 6, 2006. 1. ISSN 1335-8243 © 2006 Faculty of Electrical Engineering and Informatics, Technical University of ...<br />
<span class="a">www.aei.tuke.sk/pdf/2006-01/Vokorokos.pdf</span><br />
<br />
<a href="http://austinissa.org/public_files/presentations/200001%20Intrusion%20Detection%20Panel%20Discussion.pdf"><b>Intrusion Detection Today (01/20/2000)</b></a> -<a href="http://72.14.205.104/search?q=cache:VlBzQocclScJ:austinissa.org/public_files/presentations/200001%2520Intrusion%2520Detection%2520Panel%2520Discussion.pdf+%22intrusion+detection%22+-mental+filetype:pdf&hl=en&ct=clnk&cd=832&lr=lang_en">View as HTML</a><br />
Intrusion Detection - A. definition. • Tools, methods and resources to identify. and assess unauthorized or unapproved. activity. ...<br />
<span class="a"> austinissa.org/public_files/presentations/<wbr></wbr>200001%20Intrusion%20Detection%20Panel%20Discussion.pdf</span> <br />
<a href="http://isp-planet.com/perspectives/ids.html">ISP-Planet - Executive Perspectives - White Paper: Intrusion ...</a> <br />
isp, opinion, network, security, intrusion detection system, ids, nids, ... Finding public information about their target on the Internet is usually the ...<br />
<br />
<a href="http://www.amazon.com/exec/obidos/tg/detail/-/0735710082?v=glance">Amazon.com: Books: Network Intrusion Detection: An Analyst's Handbook ...</a> <br />
... one up for you. Network Intrusion Detection: An Analyst's ... Implementing Intrusion Detection Systems : A Hands-On Guide for Securing the Network by Tim Crothers ... with Internet protocols. Northcutt ...<br />
<br />
<a href="http://secinf.net/ipolicye.html">Policy & Standard</a>s<br />
... Information about network security, (in)security: Intrusion Detection, ... The Shortcut Guide to Network Compliance – Chapter 1 – Understanding IT ...<br />
<br />
<a href="http://www.amazon.com/exec/obidos/tg/detail/-/0735708681?v=glance">Amazon.com: Books: Network Intrusion Detection: An Analysts' Handboo</a>k<br />
... Implementing Intrusion Detection Systems : A Hands-On Guide for Securing the Network by ... Subjects > Computers & Internet > Networking > Networks, Protocols & API's > Network Security ...<br />
<br />
<a href="http://www.bitpipe.com/tlist/Intrusion-Detection.html">Intrusion Detection ( Host Intrusion Detection, Network Intrusion Detection, Host IDS, Network IDS</a>,<br />
(Jun. 07, 2005)Read a description of Intrusion Detection. This is also known as Host Intrusion Detection, Network Intrusion Detection, Host IDS, Network IDS, and ID. Free detailed reports on Intrusion Detection are also available. BITPIPE<br />
<br />
<a href="http://searchnetworking.techtarget.com/qna/0,289202,sid7_gci834569,00.html">Intrusion detection systems grow up</a> <br />
Security is a key consideration for network design. Here network security engineer Michael Martin talks about what intrusion detection systems (IDS) will and won't do for networks....<br />
<br />
<a href="http://www.sans.org/resources/popular.php">SANS Institute - Internet Guide to Computer Security Resource</a>s<br />
The Internet Guide to popular resources on computer security, snort, dsniff, ... in network security such as Network Intrusion Detection Systems (NIDS). ...<br />
<br />
<a href="http://www.ticm.com/kb/faq/idsfaq.html">Technical Incursion Countermeasures - Security Management Consulting, Interim Management</a> <br />
... The firewall? 8. Implementation Guide. - What questions should ... mirrors/ids/network-intrusion-detection.html. Russian translation: <br />
<br />
<a href="http://www.itprc.com/security.htm">ITPRC - Network Security</a> <br />
... Internet Firewalls FAQ - Guide to firewall and network security basics. ... Intrusion Detection. Bro - A system for detection network intruders in ...<br />
<br />
<a href="http://www.sans.org/resources/idfaq">Intrusion Detection FAQ - The Internet's most trusted site for ...</a> <br />
The Internet's most trusted site for vendor neutral intrusion detection information. ... How do you deploy network based Intrusion Detection Systems in a ...<br />
<br />
<a href="http://www.infosyssec.net/infosyssec/intdet1.htm">Intrusion Detection and Network Auditing on the Internet</a> <br />
... Information Intrusion Detection and Network Auditing on the Internet - Articles ... head. Network- vs. Host-based Intrusion Detection (paper) A Guide to Intrusion Detection Technology. An ...<br />
<br />
<a href="http://isp-planet.com/perspectives/ids_p3.html">ISP-Planet - Executive Perspectives - White Paper: Intrusion ...</a> <br />
isp, opinion, network, security, intrusion detection system, ids, nids, hids, ... If your main concern is attack from the Internet, you should concentrate ...<br />
<br />
<a href="http://secinf.net/">Network Security Librar</a>y<br />
Firewalls. Intrusion Detection. Misc. Network Security Tools. Network Auditing. Patch Management ... The Shortcut Guide to Network Compliance...<br />
<br />
<a href="http://www.securityfocus.com/infocus/1630"> SecurityFocus HOME Infocus: Evaluating Network Intrusion Detection Signature</a>s<br />
... from the Internet, and by ... Senior Intrusion Detection Analyst for EDS ... the authors of "Intrusion Signatures and ... and "Inside Network Perimeter ... The Definitive Guide to Firewalls ...<br />
<br />
<a href="http://www.business2.com/b2/webguide/0,17811,4678,00.html">Business 2.0 - Web Guide - Intrusion Detection -e</a>1<br />
... all over the Internet by parsing ... examples. 7. Network Intrusion ... Intrusion Detection: Knowing When ... by detecting intrusion attempts and ... A step-by-step guide for system ...<br />
<br />
<a href="http://csrc.nist.gov/nissc/2000/proceedings/papers/045.pdf">[PDF] Multiple Self-Organizing Maps for Intrusion Detectio</a>n<br />
...Prior Neural Network Approaches Effective intrusion detection is a difficult...of neural networks to intrusion detection. If properly...in extant intrusion detection systems...roles in the network protocol...rules to guide it. Not only...<br />
<br />
<a href="http://www.amazon.com/exec/obidos/tg/detail/-/0471290009?v=glance">Amazon.com: Books: Intrusion Detection: Network Security Beyond ...</a> <br />
Amazon.com: Books: Intrusion Detection: Network Security Beyond the Firewall ... Explains how intrusion detection systems (IDS) fit in with other computer ...<br />
<br />
<a href="http://www.mynetwatchman.com/scanguide.asp">myNetWatchman - Network Intrusion Detection and Reportin</a>g<br />
... sourced from your own PRIVATE network IRC open proxy test probes ... most likely associated with Internet gaming (e.g. Doom, Half-life ... on these issues see: mNW Guide to Common Firewall False ...<br />
<br />
<a href="http://msdn.microsoft.com/library/en-us/dnnetsec/html/THCMCh15.asp">Securing Your Network (.NET Framework Security)</a> <br />
his chapter presents an overview of the top network level threats and provides associated countermeasures.<br />
<br />
<a href="http://www.informit.com/guides/content.asp?g=security&seqNum=79">Security Reference Guid</a>e<br />
... to include an Intrusion Detection System and more enhanced firewall protection. ... Test your network/Internet connection at this point to be sure you ...<br />
<br />
<a href="http://www3.ca.com/Solutions/SubSolution.asp?ID=4349">Threat Management, Security Managemen</a>t<br />
Proactively Managing Threats<br />
<br />
<a href="http://searchstorage.techtarget.com/tip/1,289483,sid5_gci941973,00.html">Throwing eggs at spammers</a> <br />
(Dec. 17, 2003) - Novant Health started fighting spam almost by accident. The company, which manages health care facilities in North Carolina, needed encryption tools to comply with new federal reg...<br />
<br />
<a href="http://secinf.net/iidse.html">Error 404: Page Not Foun</a>d<br />
Covering topics such as intrusion detection, Windows security, ... The Shortcut Guide to Network Compliance – Chapter 1 – Understanding IT Compliance ...<br />
<br />
<a href="http://www.networkcomputing.com/1023/1023f1.html">Intrusion Detection, Take Two | Page 1 | November 15, 199</a>9<br />
Systems' RealSecure 3.2, Network Flight Recorder's NFR Intrusion Detection Appliance 4.0, Network Ice's ... s Guide • Cheap Network Monitors<br />
<br />
<a href="http://www.kaleton.com/research/idspaper.html">Kaleton Internet - Intrusion Detection System</a>s<br />
... of Intrusion Detection 2.1 Host based, Network based and ... Intrusion Detection System that can be used to monitor TCP network traffic to an Internet host and ... Guide Version 2.0, Network Associates ...<br />
<br />
<a href="http://www.informit.com/guides/content.asp?g=security&seqNum=80">Security Reference Guid</a>e<br />
... ExpandSecure Sockets Layer (SSL); ExpandIntrusion-Detection System (IDS); ExpandPractical ... ZoneCD: The Secure Way to Share Your Internet Connection ...<br />
<br />
<a href="http://www.csrc.nist.gov/mobilesecurity/Publications/IDwMA.pdf">[PDF] Microsoft Word - PP-IDwMA-finalversion.do</a>c<br />
...5148 WJansen@NIST.Gov Abstract...effective intrusion detection capability...platform, language and code...across the Internet [15]. Fortunately, intrusion detection is quite...for other network management...Artificial Network Termite colony...problem of<br />
<br />
<a href="http://www.ca.com/it/local/catalogo2001.pdf">00_12111_CA Italy (290x195</a>)<br />
Computer Associates Intl. Ges. m. b. H. Wienerbergstrasse 3 A- 1100 Vienna Tel: (43) (1) 605800 Computer Associates S. A. ñ N. V. 34 Boulevard de la Woluwe Woluwedal B-1200 Brussels Tel: (32) (2) 7732811 Computer ...<br />
<br />
<a href="http://www.amazon.com/exec/obidos/tg/detail/-/0735712328?v=glance">Amazon.com: Books: Inside Network Perimeter Security: The Definitive ..</a>.<br />
... Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection ... the Internet) in order to be useful. How network engineers ...<br />
<br />
<a href="http://searchstorage.techtarget.com/tip/1,289483,sid5_gci872809,00.html">Choosing a certification: Deciding between generalized, specific courses</a> <br />
(Jan. 08, 2003) - You might be one of the many people considering obtaining a certification, whether your goal is to make more money in your existing job, to further your career in other ways or ju...<br />
<br />
<a href="http://www.net-security.org/review.php?id=26">HNS Review - Network Intrusion Detection 3/</a>e<br />
... Detect, Defend, A Guide to Wireless ... Intrusion Detection" is divided ... Monitoring, Intrusion Infrastructures ... perform on the network. If you're new ... are: the TCP/IP Internet model ...<br />
<br />
<a href="http://e-comm.webopedia.com/TERM/I/intrusion_detection_system.html">intrusion detection system - Ecommerce Guide - Terms You Need to ..</a>.<br />
An intrusion detection system (IDS) inspects all inbound and outbound network ... Though they both relate to network security, an IDS differs from a ...<br />
<br />
<a href="http://www.cert.org/security-improvement/modules/m09.html">Pag</a>e with no title... but applies to Intrusion Detection<br />
Detecting Signs of Intrusion1. Intruders are always looking for new ways to break into networked computer systems. ... Proceedings of the 1st Workshop on Intrusion Detection and Network Monitoring. Santa Clara, CA ... Maximum Security: A Hacker's Guide to<br />
<br />
<a href="http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci799696,00.html">Scaling intrusion detection</a> <br />
Suppose you have an intrusion-detection system in place. Does it scale as your Web site grows? This tip, excerpted from InformIT, discusses scaling over time. This material appea...<br />
<br />
<a href="http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci941977,00.html">Throwing eggs at spammers - (Dec. 17, 2003)</a> <br />
Novant Health started fighting spam almost by accident. The company, which manages health care facilities in North Carolina, needed encryption tools to comply with new federal reg...<br />
<br />
<a href="http://msdn.microsoft.com/library/en-us/wcedsn40/html/cgconusingreferencegatewayuserinterface.asp">Using the Template Gateway User Interface</a> <br />
Microsoft Windows CE .NET 4.2 Using the Template Gateway User Interface The Gateway base configuration includes a template<br />
<br />
<a href="http://csrc.nist.gov/publications/nistir/ir6416.pdf">[PDF] maresponse.PD</a>F<br />
...Communication Languages (ACL) designed for network security testing and intrusion detection domains...Dorothy E., "An Intrusion Detection Model," IEEE...URL: http://csrc.nist.gov/nissc/1996...Communication Language," Proceedings...Cooperative Intrusion<br />
<br />
<a href="http://www.amazon.de/exec/obidos/ASIN/0735712654">Amazon.de: English Books: Network Intrusion Detection, Engl. ed</a>.<br />
Network Intrusion Detection, Engl. ed., Stephen Northcutt, Judy Novak ... Books Computers & Internet Cooking, Food & Wine ... Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection .<br />
<br />
<a href="http://msdn.microsoft.com/library/en-us/dnbiz2k2/html/bts_eai_pattern.asp">Applying Microsoft Patterns to Solve EAI Problems (Microsoft BizTalk Server 2002 Technical Articles)</a> <br />
Discover a solution pattern for enterprise application integration (EAI) using Microsoft technology.<br />
<br />
<a href="http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci509576,00.html">Intrusion detection rules of thumb</a> <br />
There are a couple simple rules you should keep in mind as you go about planning for your intrusion-detection system. This tip, excerpted from Intrusion Detection, by Rebecca Gur...<br />
<br />
<a href="http://www.bitpipe.com/rlist/term/Intrusion-Detection-Systems.html">Intrusion Detection Systems White Papers, Webcasts and Product Information from Top IT Vendor</a>s<br />
(Apr. 26, 2005)Research the latest Intrusion Detection Systems technologies, tools and techniques. Read white papers, case studies, webcasts and product information from multiple vendors . BITPIPE<br />
<br />
<a href="http://www.linuxplanet.com/linuxplanet/email/5605/?ReturnURL=/linuxplanet/reports/5605/1">LinuxPlanet - Email Article - Network Intrusion Detection, Neighborhood Watc..</a>.<br />
... Internet Marketing Hotel Guide internet.com Developer ... Internet xSP Resources Search internet. com Advertise Corporate Info ... Email Article Network Intrusion Detection, Neighborhood Watch ...<br />
<br />
<a href="http://searchwin2000.techtarget.com/originalContent/0,289142,sid1_gci942148,00.html">Throwing eggs at spammers - (Dec. 22, 2003)</a> <br />
Novant Health started fighting spam almost by accident. In the process of complying with HIPAA, the company came across a bonus.<br />
<br />
<a href="http://csrc.nist.gov/mobilesecurity/Publications/maresponse.pdf">[PDF] maresponse.PD</a>F<br />
...Communication Languages (ACL) designed for network security testing and intrusion detection domains...Dorothy E., "An Intrusion Detection Model," IEEE...URL: http://csrc.nist.gov/nissc/1996...Communication Language," Proceedings...Cooperative Intrusion<br />
<br />
<a href="http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci872806,00.html">Choosing a certification: Deciding between generalized, specific courses - (Jan. 08, 2003)</a> <br />
You might be one of the many people considering obtaining a certification, whether your goal is to make more money in your existing job, to further your career in other ways or ju...<br />
<br />
<a href="http://netsecurity.about.com/od/intrusiondetectionid1">Free Intrusion Detection System (IDS) Softwar</a>e<br />
Free intrusion detection (IDS) and prevention (IPS) software to help you identify ... Forums: Monitoring Kids' PC Activity A user in the Internet / Network ...<br />
<br />
<a href="http://www.bitpipe.com/tlist/Intrusion-Detection-Systems.html">Intrusion Detection Systems ( ID Systems and IDS) Definitio</a>n<br />
(Jun. 07, 2005)Read a description of Intrusion Detection Systems. This is also known as ID Systems and IDS. Free detailed reports on Intrusion Detection Systems are also available. BITPIPE<br />
<br />
<a href="http://www.privacyware.com/">Intrusion Detection/Prevention,Security Data Analytics,Personal ..</a>.<br />
... intrusion prevention, intrusion detection, intrusion detection software for IIS ... for Microsoft IIS, Internet Information Services ... Session: Let us guide you through installation and ...<br />
<br />
<a href="http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci918750,00.html">Perimeter security explored: Intrusion-detection systems</a> <br />
Security expert, Mark Edmead These days almost every company has e-mail and connections to the Internet. They're essential business tools, but they can also open the ...<br />
<br />
<a href="http://msdn.microsoft.com/library/en-us/dncomsrv/html/planavailability.asp">Planning for Reliability and High Availability (Commerce Server Technical Articles)</a> <br />
Learn how to reduce or eliminate downtime in a Microsoft Commerce Server 2000 environment. Article focuses primarily on the hardware and software needed to create a Commerce Server site with no single point of failure. (40 printed pages)<br />
<br />
<a href="http://www.webopedia.com/TERM/I/intrusion_detection_system.html">Page with no title... but applies to Intrusion Detection</a> <br />
This page describes the term intrusion detection system and lists other pages on the Web where you can find additional information. ... Ziff Davis TIPS: Network Intrusion Product Comparison Guide - Our vendor-neutral guide to Intrusion Prevention Systems .<br />
<br />
<a href="http://www.network-communication.info/network/detection-intrusion-network-software.html">Pag</a>e with no title... but applies to Intrusion Detection<br />
Don't stop just for another website for detection intrusion network software. ... Guide and information: "detection intrusion network software" ... Software for Internet monitoring, network monitoring, remote monitoring, intrusion detection, stock tracking<br />
<br />
<a href="http://www.networkintrusion.co.uk/N_ids.htm">Talisker Network Intrusion Detection Systems</a> <br />
... A-H IDS Terms I-Z Deploying IDS Guide Security Info Managers ... eTrust Intrusion Detection delivers state-of-the-art network ... and unauthorized use of internet facilities and other network ...<br />
<br />
<a href="http://is-it-true.org/nt/books/btips29.shtml">Book Tip : Hacking, Intrusion Detection and Penetration Testing ..</a>.<br />
Network Intrusion Detection : An Analysis Handbook Second Edition ... A Hacker's Guide to Protecting Your Internet Site and Network Excellent! ...<br />
<br />
<a href="http://www.all-internet-security.com/intrusion_detection">Free Intrusion Detection Log Monitor IDS Intrusion Software Free IDS ..</a>.<br />
... network infrastructures. Detection-Intrusion Guide Intrusion detection ... Intrusion detection prevention, network intrusion detection. Intrusion Alert. Firewall intrusion detection, detection intrusion resume. Intrusion prevention system. Network intr<br />
<br />
<a href="http://csrc.nist.gov/publications/nistbul/03-00.pdf">[PDF] 03-00.f</a>m<br />
...March 1999 Ë Guide for Developing...Acquiring and Deploying Intrusion Detection Systems, November...message to listproc@nist.gov with the message...subjects. http://csrc.nist.gov s The Federal Computer...Administration, Network- ing, and Security...<br />
<br />
<a href="http://msdn.microsoft.com/library/en-us/dnucmg/html/UCMGch13.asp">Chapter 13: Creating the Live Environment (UNIX Code Migration Guide)</a> <br />
Chapter 15: Roadmap for Future Migrations examines the future for application development using Microsoft technologies. (12 printed pages)<br />
<br />
<a href="http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci501409,00.html">Constructing an intrusion analyzer</a> <br />
How do you know if your network is under attack? You have to have some sort of intrusion-detection system operating. And once it's operating, the detection system must be able to d...<br />
<br />
<a href="http://www.snort.org/docs/iss-placement.pdf">Internet Security System</a>s<br />
HOW TO GUIDE. Internet Security Systems. Intrusion Detection. Systems ... Network-Based Intrusion Detection Systems (IDS) use raw network packets as the ...<br />
<br />
<a href="http://www.bitpipe.com/plist/term/Intrusion-Detection-Systems.html">Intrusion Detection Systems Product Details and Product Informatio</a>n<br />
(Jun. 04, 2005)In depth product literature on Intrusion Detection Systems including data sheets, test results, spec sheets, brochures and white papers. Research the latest Intrusion Detection Systems tools, technologies and techniques and compare products<br />
<br />
<a href="http://www.dmst.aueb.gr/dds/pubs/Breview/1999-CR-IntrDet/html/review.html">Intrusion detection: network security beyond the firewal</a>l<br />
... all levels of the Internet protocol stack and ... technologies of our network infrastructure ... methods, and intrusion detection tools provide ... a useful procurement guide. Those whose system ...<br />
<br />
<a href="http://www.flgnetworking.com/security.html">Our network security services include firewall installation and network intr..</a>.<br />
... to the Internet FLG Networking Services can guide you through the many security issues associated ... for your Internet mail server Intrusion detection Virtual Private Network (VPN) connections ...<br />
<br />
<a href="http://www.icsa.net/html/communities/ids/buyers_guide/guide/index.shtml">Pag</a>e with no title... but applies to Intrusion Detection<br />
TruSecure is the only integrated Internet security program to apply current cross-industry research to the protection of Internet communications. ... Intrusion Detection. Network Intrusion Prevention. SSL-TLS. Wireless. PC Firewalls. Cryptography. Secure I<br />
<br />
<a href="http://searchwin2000.techtarget.com/originalContent/0,289142,sid1_gci783585,00.html">Selecting a VPN solution? Think security first - (Apr. 18, 2001)</a> <br />
More and companies are extending their extranets to capitalize on business-to-business opportunities. While the advantages of using the Internet to connect to remote workers, bra...<br />
<br />
<a href="http://www.icsa.net/html/communities/ids/buyers_guide/index.shtml">TruSecure Corporation is the worldwide leader in Internet Security ..</a>.<br />
... Firewalls IPSec Intrusion Detection Network Intrusion Prevention SSL-TLS Wireless ... Cryptography Secure Internet Filtering Premier ... trust Guidelines Intrusion Detection Buyer's Guide The IDS Buyers Guide was ...<br />
<br />
<a href="http://www.amazon.co.uk/exec/obidos/ASIN/0735712654">Amazon.co.uk: Books: Network Intrusion Detectio</a>n<br />
... The Definitive Guide to Firewalls, Virtual ... Building Open Source Network Security Tools ... Schiffman Snort Intrusion Detection; Paperback ... ies): Computers & Internet Average Customer ...<br />
<br />
<a href="http://products.ecommerce-guide.com/security/id/recent1.html">ECommerce Product Guid</a>e<br />
ECommerce-Guide provides ecommerce business owners with e-commerce news, hardware and ... Network Associates Technology, Inc. Line of Intrusion Detection ...<br />
<br />
<a href="http://netsecurity.about.com/b/a/2003_09_24.htm">Internet/Network Security on About.co</a>m<br />
Search. Internet / Network Security. From Tony Bradley, CISSP-ISSAP, Your Guide to Internet / Network Security. FREE GIFT with Newsletter! Act...<br />
<br />
<a href="http://www.bitpipe.com/rlist/term/Intrusion-Detection.html">Intrusion Detection White Papers, Webcasts and Product Information from Top IT Vendor</a>s<br />
(Apr. 26, 2005)Research the latest Intrusion Detection technologies, tools and techniques. Read white papers, case studies, webcasts and product information from multiple vendors . BITPIPE<br />
<br />
<a href="http://msdn.microsoft.com/academic/solutions/secadmin/default.aspx">MSDN AA Home: Security Administration</a> <br />
MSDN AA Home: Here you find knowledge about securing Windows Server though tools and technologies. This is a collection of white papers, Knowledge Base Articles, and other sources aimed at helping to provide solutions for the campus environment.<br />
<br />
<a href="http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci948422,00.html">Q&A: Advanced intrusion defens</a>e<br />
In recent months, intrusion-detection and -prevention systems have made significant strides in helping organizations defend against cyberthreats, exploits and malware. Joel Snyder,...<br />
<br />
<a href="http://www.infoworld.com/cgi-bin/displayArchive.pl?/98/18/intrusa.dat.htm">Pag</a>e with no title... but applies to Intrusion Detection<br />
TEST CENTER COMPARISON. Network intrusion-detection solutions. Digital sentries. We pitted four intrusion-detection solutions against. our formidable suite of network attacks. COMPARED. Abirnet solution. SessionWall-3 2.1. Abirnet Inc. ... from Internet Se<br />
<br />
<a href="http://csrc.nist.gov/organizations/fissea/conference/2004/presentations/Tuesday/UlfMattsson-Practical-%20IPS-Enterprise-Databases.pdf">[PDF] Ulf Mattsson - A Practical IPS for Enterprise Database</a>s<br />
...for mobile networks. IEEE Journal...model for intrusion detection. IEEE Transactions...Formal query languages for secure...Mounji. Languages and Tools...Distributed Intrusion Detection. PhD thesis...Detection and Network Monitoring...report, Secure Netw<br />
csrc.nist.gov/organizations/fissea/conference/2004/presentations/Tuesday/UlfMattsson-Practical- IPS-Enterprise-Databases.pdf - 77%<br />
Result found by: CSRC Home<br />
<a href="http://www.bitpipe.com/data/search?qg=VENDOR&Search.y=0&rq=1&Search.x=0&src=bp_srslt&cr=bpres&cp=bpres&nh=25&st=1&site=bp&qp=site_abbrev:bp&src=bp_srslt&qt=Host-based+Intrusion+Detection">Host-based Intrusion Detection - White Papers, Webcasts, Product Information and Research Report</a>s<br />
(Jun. 07, 2005)Bitpipe provides free white papers, product information and research on Host-based Intrusion Detection and related tools and technologies. Find the research information you need to help you make smarter IT buying decisions at Bitpipe. BITPIP<br />
<br />
<a href="http://www.programming123.com/detail/internet_security/internet_security_0735712654.html">internet security: network 3rd detection intrusion editio</a>n<br />
...internet security Network Intrusion Detection (3rd Edition) Back to internet security ... a book that can be used daily as a reference and a...<br />
<br />
<a href="http://www.sans.org/top20">SANS Top 20 Vulnerabilities - The Experts Consensu</a>s<br />
U6 Simple Network Management Protocol (SNMP) U7 Open Secure Sockets Layer (SSL) ... Install host-based anti-virus and Intrusion Detection software.<br />
<br />
<a href="http://msdn.microsoft.com/library/en-us/dnnetsec/html/THCMCh02.asp">Threats and Countermeasures (.NET Framework Security)</a> <br />
This chapter identifies and explains the set of top network, host and application layer threats and describes the countermeasures that are appropriate to address each threat.<br />
<br />
<a href="http://compserv-books.theshoppe.com/New_to_Computing_Bestsellers/Hacking_Exposed.htm">Hacking Exposed: Network Security Secrets and Solution</a>s<br />
... Network Intrusion Detection: An Analysts' Handbook, Hack Proofing Your Network: Internet Tradecraft, Maximum Linux Security : A Hacker's Guide ... Network Intrusion Detection: An ...<br />
<br />
<a href="http://downloads.securityfocus.com/library/switched.pdf">Internet Security System</a>s<br />
HOW TO GUIDE. Internet Security Systems. Intrusion Detection. Systems. I N T E R N E T S E C U R I T Y S Y S T E M S. How To Guide-Implementing a Network. Based Intrusion Detection System. Written by Brian Laing, Contributors. Jimmy Alderson (<br />
<br />
<a href="http://www.windowsecurity.com/">Microsoft Windows security site: intrusion detection, anti-virus ...</a> <br />
Intrusion Detection; Misc Network Security; Viruses, trojans and other malware ... zonealarm - Wed 01:59 - Firewalls // Intrusion Detection - External ...<br />
<br />
<a href="http://www.weberdev.com/Manuals/rhl-sg-en-80/ch-detection.html">WeberDev.com -> Red Hat Linux 8 -> Security Guide -> Intrusion Dete..</a>.<br />
... Red Hat Linux Security Guide Prev Next Chapter 10 ... systems and data. The Internet has facilitated the ... Systems An intrusion detection system (IDS) is ... analyzes system and network activity for ...<br />
<br />
<a href="http://www.csrc.nist.gov/publications/nistir/NISTIR7219-CSD-2004-Annual-Report.pdf">[PDF] Untitled Documen</a>t<br />
...800-53A, Guide for Assessing...2006. http://csrc.nist.gov/sec-cert...Today's Federal networks and systems...Maryland and NIST. MANETs present...problems for Intrusion Detection Systems...malicious network activity...by which Internet addresses...as http<br />
<br />
<a href="http://msdn.microsoft.com/library/en-us/dnnetsec/html/THCMCh22.asp">Deployment Review (.NET Framework Security)</a> <br />
This chapter shows you how to perform a deployment review to identify potential security vulnerabilities in your ASP.NET Web applications.<br />
<br />
<a href="https://www.securehq.com/shqbuyersguide.wml&sessionid=200552317195023630&storeid=1&superdeptid=10">Intrusion Detection Buyer's Guide and FA</a>Q<br />
What is intrusion detection and how does it protect my network? ... If you place the network IDS between the Internet and the switch, you can monitor ...<br />
<br />
<a href="http://www.bitpipe.com/data/search?qg=VENDOR&Search.y=0&rq=1&Search.x=0&src=bp_srslt&cr=bpres&cp=bpres&nh=25&st=1&site=bp&qp=site_abbrev:bp&src=bp_srslt&qt=network+intrusion+prevention+systems">network intrusion prevention systems - White Papers, Webcasts, Product Information and Researc</a>h<br />
(Jun. 07, 2005)Bitpipe provides free white papers, product information and research on network intrusion prevention systems and related tools and technologies. Find the research information you need to help you make smarter IT buying decisions at Bitpipe.<br />
<br />
<a href="http://www.informit.com/guides/content.asp?g=security">Security Reference Guid</a>e<br />
... to include an Intrusion Detection System and more enhanced firewall protection. ... Test your network/Internet connection at this point to be sure you ...<br />
<br />
<a href="http://www.owasp.org/">The Open Web Application Security Projec</a>t<br />
Documentation. Guide. Guide. Getting Involved ... Web Intrusion Detection with ModSecurity – Ivan Ristic, Author ... publication, Hack Notes...<br />
<br />
<a href="http://www.amazon.com/exec/obidos/ASIN/0735710082/ref=nosim/ricksphotograpag">Amazon.com: Books: Network Intrusion Detection: An Analyst's Handbook (2nd E..</a>.<br />
... s classic _Firewalls and Internet Security_. Was this review ... review helpful: Network Intrusion Detection 3rd Edition ... used daily as a reference and a guide. Was this review helpful to ...<br />
<br />
<a href="http://www.networkworld.com/topics/firewalls.html">Firewalls, VPNs, Intrusion Prevention, SSL and IPSe</a>c<br />
Your source for firewall, VPN and intrusion prevention and detection news and ... Hewlett Packard; Network World Executive Guide: The New Data Center. ...<br />
<br />
<a href="http://www.firewallsdirect.com/store/white_papers">Internet security, network security, anti-virus, intrusion..</a>.<br />
...fortinet, fortigate, internet security, network security, internet content filter, anti-virus, virtual private network, intrusion detection,<br />
<br />
<a href="http://www.infoworld.com/article/04/08/20/34FEids_1.html">Network detectives sniff for snoops | InfoWorld | Review | 2004-08-20 ..</a>.<br />
... Center evaluates network intrusion detection systems from ISS ... special report Intrusion detection systems SPONSORED STRATEGY GUIDE COMPLIANCE Avoid the ... Calif., pitting Internet ...<br />
<br />
<a href="http://msdn.microsoft.com/msdnmag/issues/01/03/stuff/default.aspx">New Stuff: Resources for Your Developer Toolbox -- MSDN Magazine, March 2001</a> <br />
New Stuff: Resources for Your Developer Toolbox -- MSDN Magazine, March 2001<br />
<br />
<a href="http://infosecuritymag.techtarget.com/2002/oct/sidebar.shtml">October 2002 - Guide to Intrusion Prevention - Diverse security technologies deliver the sam</a>e<br />
(Feb. 10, 2005)In addition to the host application tools discussed in this article, the broad term "intrusion prevention" encompasses several other classes of tools that protect hosts, Web applications and networks by actively blocking malicious actions: 1<br />
<br />
<a href="http://secinf.net/info/policy/isptg.en/ISPTG-Contents.html">Pag</a>e with no title... but applies to Intrusion Detection<br />
Network Security Library - Information about network security, (in)security: Intrusion Detection, Windows, NetWare, WWW, Firewalls, Security Policy, etc. Hundreds of books, articles and FAQs online! ... Standards :: Internet Security Policy Last updated: O<br />
<br />
<a href="http://www.cs.purdue.edu/coast/projects/autonomous-agents.html">CERIAS - Autonomous Agents for Intrusion Detectio</a>n<br />
...development. AAFID2 Users Guide Diego ... Mark Crosbie and Eugene Spafford. Network Intrusion Detection. B Mukherjee, L Todd Heberline, Karl...<br />
<br />
<a href="http://www.techsupportalert.com/intrusion-detection.htm">Intrusion Detection Software: a Market Surve</a>y<br />
... of Products A guide to intrusion detection (IDS) and prevention software (IPS ... propagate across the internet in hours. That's where IDS ... emphasis on monitoring network traffic. This is rare in ...<br />
<br />
<a href="http://uk.builder.com/whitepapers/0,39026692,60001453p-39000786q,00.htm">Network- vs. Host-based Intrusion Detection: A Guide to Intrusio</a>n<br />
Network- vs. Host-based Intrusion Detection: A Guide to Intrusion Detection Technology. Download Now Free download 61.9KB ... Date: 02 October 1998...<br />
<br />
<a href="http://msdn.microsoft.com/msdnmag/issues/02/09/NewStuff/default.aspx">New Stuff: Resources for Your Developer Toolbox -- MSDN Magazine, September 2002</a> <br />
New Stuff: Resources for Your Developer Toolbox -- MSDN Magazine, September 2002<br />
<br />
<a href="http://csrc.nist.gov/publications/nistpubs">NIST Computer Security Special Publication</a>s<br />
...SP 800-31 Intrusion Detection Systems...Management Guide for Information...SP 800-5 A Guide to the Selection...Database Language SQL, August...Introduction to Internet Firewalls...FCC's Open Network Architecture...webmaster-csrc@nist.gov NIST is an...ht<br />
<br />
<a href="http://csrc.nist.gov/checklists/SP800-70-DRAFT.pdf">[PDF] NIST SP 800-870, The NIST Security Checklist Progra</a>m<br />
...external networks. Because...servers, intrusion detection systems...systems. 8 NIST's computer...at http://csrc.nist.gov. 3-4 DRAFT...Act; http://csrc.nist.gov/sec-cert...PRODUCTS IDS Intrusion Detection System IETF Internet Engineering...Guides; http:/<br />
<br />
<a href="http://msdn.microsoft.com/library/en-us/dnhipaa/html/mso_btshipaaarchguide.asp">Architecture Guide (BizTalk Accelerator for HIPAA)</a> <br />
Learn how to plan, deploy, and maintain a robust, highly functional, and cost-effective business solution for the electronic transfer of information in accordance with the Health Insurance Portability and Accountability Act of 1996 (HIPAA) 1.0.<br />
<br />
<a href="http://www.linuxsecurity.com.br/info/IDS/network-intrusion-detection.FAQ.htm">FAQ: Network Intrusion Detection System</a>s<br />
... its information? The firewall? 8. Implementation Guide - What questions should I ask my IDS vendor ... ids/network-intrusion-detection.html Russian translation: http://www.citforum.ru/internet ...<br />
<br />
<a href="http://www.auditmypc.com/">Firewall Test, Port Scan and Internet Security made easy - Spy..</a>.<br />
Network Security. Honeypots. Electronic Mail Security. IIS Masking. Intrusion Detection System. E-Mail Relay Test ... PC SECURITY GUIDE. FREE...<br />
<br />
<a href="http://www.webnews.com/">Intelligence Technologies Journal: Volume 3, Issue 18 -- Intrusion ..</a>.<br />
... Canada has provided an " Info-Guide " on strategic and ... An Introduction & Review of Intrusion Detection Tools Whenever a company connects its network to the Internet, it opens up a whole can of ...<br />
<br />
<a href="http://buyersguide.eweek.com/product/SearchResults.asp_Q_sitename_E_eweek_security_A_cboCategory_E_252">Intrusion Detection - eWEEK Web Buyer's Guid</a>e<br />
Use intrusion detection tools to recognize unauthorized and malicious entry into your ... APD is a network monitoring and control device designed to detect ...<br />
<br />
<a href="http://searchnetworking.techtarget.com/topic/0,295492,sid7_tax299271,00.html">Intrusion Detection and Prevention: Network Security: Topics ...</a> <br />
News and advice for network managers and administrators. ... EXPERT ANSWER - How do intrusion detection systems work? Intrusion detection/prevention ...<br />
<br />
<a href="http://www.bitpipe.com/olist/Intrusion-Detection.html">Intrusion Detection Vendor Director</a>y<br />
(Jun. 05, 2005)Find vendors and analyst groups in the Intrusion Detection sector. Compare product offerings and explore your options to help with your IT buying decisions. BITPIPE<br />
<br />
<a href="http://www.1-brs.com/us-reviewed/0764549499.html">Pag</a>e with no title... but applies to Intrusion Detection<br />
BRS website design and internet programming ... provider, and the author of Internet Lockdown. He developed the curriculum ...<br />
<br />
<a href="http://products.enterpriseitplanet.com/security/id/download1.html">Pag</a>e with no title... but applies to Intrusion Detection<br />
Enterprise IT Planet Product Guide: Latest downloadable entries for Category Security; SubCategory Intrusion Detection. Page: 1. ... of firewalls and intrusion detection/prevention systems ... Provides network and/or host intrusion detection, service monit<br />
<br />
<a href="http://www.csrc.nist.gov/publications/nistpubs/800-36/NIST-SP800-36.pdf">[PDF] IT Security Product Guid</a>e<br />
...See http://csrc.nist.gov/cryptval...firewall, intrusion detection system, and...Hypertext Markup Language HTTP Hypertext...Identification IDS Intrusion Detection System IP Internet Protocol...Local Area Network LCC Life...Partnership NIST National...Wid<br />
<br />
<a href="http://staff.washington.edu/dittrich/misc/ddos">Distributed Denial of Service (DDoS) Attacks/tool</a>s<br />
...points on establishing Network Intrusion Detection Rules for DDOS, by Mixter ... Protecting Against the Unknown -- A guide to improving network...<br />
<br />
<a href="http://www.bookworkz.com/construction/networks/0619130393.html">Guide to Firewalls and Network Security: Intrusion Detection and VPN</a>s<br />
... SCIENCENETWORKING Guide to Firewalls and Network Security: Intrusion Detection and VPNs 1st ... and Public Key Infrastructure on the Internet Paperback - $50.00 Item #0619212942 Security ...<br />
<br />
<a href="http://www.zakon.org/robert/internet/timeline">Hobbes' Internet Timeline - the definitive ARPAnet & Internet histor</a>y<br />
... For Comments reference guide" Number of hosts ... Trade, XML, Intrusion Detection 1999 Internet access becomes available to the ... the Defense Data Network, and Internet". Encyclopedia of ...<br />
<br />
<a href="http://www.bitpipe.com/olist/Intrusion-Detection-Systems.html">Intrusion Detection Systems Vendor Director</a>y<br />
(Jun. 05, 2005)Find vendors and analyst groups in the Intrusion Detection Systems sector. Compare product offerings and explore your options to help with your IT buying decisions. BITPIPE<br />
<br />
<a href="http://msdn.microsoft.com/msdnmag/issues/03/08/NewStuff/default.aspx">New Stuff: Resources for Your Developer Toolbox -- MSDN Magazine, August 2003</a> <br />
New Stuff: Resources for Your Developer Toolbox -- MSDN Magazine, August 2003<br />
<br />
<a href="http://www.cryptosavvy.com/network_intrusion_detection.htm">Pag</a>e with no title... but applies to Intrusion Detection<br />
... Links. network intrusion detection information, pricing, and reviews ... a FREE Internet Security Guide Today. Click Here. www.verisign.com. Network Intrusion Detection - Best Total ...<br />
<br />
<a href="http://www.icsa.net/html/communities/ids/index.shtml">TruSecure Corporation is the worldwide leader in Internet Security ..</a>.<br />
... Cryptography Secure Internet Filtering Premier Services Home ... objective of ICSA Labs' Network Intrusion Detection System (NIDS) Certification ... False Positives: a User's Guide to Making Sense of IDS ...<br />
<br />
<a href="http://www.islandwebsecurity.com/1000/link.htm">Island Web Security - Isle of Wight Internet Security Service U</a>K<br />
... hacker tools computer vulnerabilities networking IT Security Secure your network Internet Security Guide Intrusion Detection Broadband Mobile & Wireless Articles Island web security for firewall ...<br />
<br />
<a href="http://www.isp-planet.com/">ISP-Planet - Resources and Information for ISPs and Internet Access ..</a>.<br />
... Find an ISP Term internet.com Developer Downloads International ... of ISP-Planet ISP-Planet Guide to Building an ISP Principal ... Backbone Providers • Intrusion Detection Systems • ISP Billing Services ...<br />
<br />
<a href="http://msdn.microsoft.com/library/en-us/dnpag/html/eappint-ch03.asp">Security and Operational Considerations (PAG Documentation)</a> <br />
This chapter discusses the security and operations considerations you need to examine to ensure that your application integration environment continues to operate in a reliable and secure fashion.<br />
<br />
<a href="http://www.sans.org/resources/glossary.php">SANS Institute - Terms Used in Computer Security and Intrusion..</a>.<br />
SANS Glossary of Terms Used in Security and Intrusion Detection Updated May 2003 ... Computer Network A collection of host computers together...<br />
<br />
<a href="http://www.amazon.com/exec/obidos/tg/detail/-/0764549499?v=glance">Pag</a>e with no title... but applies to Intrusion Detection<br />
... Implementing Intrusion Detection Systems : A Hands-On Guide for Securing the Network. by Tim Crothers "WELCOME TO ... 456-7 of "Building Internet Firewalls, 2nd Ed, for a chart to ...<br />
<br />
<a href="http://labmice.techtarget.com/security/intrusion.htm">Windows Security: Intrusion Detection Resource</a>s<br />
LabMice.net Guide to Intrusion Detection, features links to whitepapers, articles, etc., ... Intrusion Detection: Network Security Beyond the Firewall ...<br />
<br />
<a href="http://www.business.com/directory/computers_and_software/security/hardware/intrusion_detection">Intrusion Detection Products Information at Business.co</a>m<br />
Providers of network protection and intrusion detection products and services. ... Listing of Internet resources associated with intrusion detection. ...<br />
<br />
<a href="http://www.cryptosavvy.com/network_intrusion_detection_software.htm">Pag</a>e with no title... but applies to Intrusion Detection<br />
... network intrusion detection software information, pricing, and reviews ... a FREE Internet Security Guide Today. Click Here. www.verisign.com. Network Intrusion Detection Software - Best ...<br />
<br />
<a href="http://csrc.nist.gov/nissc/1998/proceedings/paperD9.pdf">[PDF] Management of Network Security Application</a>s<br />
...Security Network security...commerce, intrusion detection, and access...alarms to a network management...analysis. Intrusion detection, multicast...IP-based Internets, Pren- tice...Practical Guide to Network Management...Peer- Based Intrusion Detection<br />
<br />
<a href="http://www.cisco.com/en/US/products/sw/secursw/ps2113/products_user_guide_chapter09186a00800d9248.html">Cisco Secure Intrusion Detection System Version 2.2.1 User Guide ..</a>.<br />
Cisco Secure Intrusion Detection System Version 2.2.1 User Guide ... Connections between your network and other networks (and the Internet) ...<br />
<br />
<a href="http://www.unixreview.com/documents/s=1234/urm0106j/0106j.htm">Introduction to Network-Based Intrusion Detection Systems Using Snor</a>t<br />
... Unfortunately, as the Internet grows exponentially, so does ... intrusion detection (ID) systems as an additional part of a network ... server with our step-by step guide. Best practices for setup are ...<br />
<br />
<a href="http://www.bitpipe.com/plist/term/Intrusion-Prevention.html">Intrusion Prevention Product Details and Product Informatio</a>n<br />
(Jun. 04, 2005)In depth product literature on Intrusion Prevention including data sheets, test results, spec sheets, brochures and white papers. Research the latest Intrusion Prevention tools, technologies and techniques and compare products from many vend<br />
<br />
<a href="http://www.ultraseeker.com/details.php?asin=0735712328">Pag</a>e with no title... but applies to Intrusion Detection<br />
... Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection ... products really sell on the Internet? Click Here ...<br />
<br />
<a href="http://www.tmcnet.com/usubmit/2004/Aug/1062940.htm">Ubizen OnlineGuardian Services to Monitor Intrusion Detectio</a>n<br />
TMC Regulatory Guide. Free Industry Info. Order Reprints ... Ubizen OnlineGuardian Services to Monitor Intrusion Detection Network for Credit...<br />
<br />
<a href="http://csrc.nist.gov/nissc/2000/NCSC.pdf">[PDF] Untitled Documen</a>t<br />
...3 http://csrc.nist.gov/nissc/ Note...Preparing for Intrusion Detection (p. 553...Systems and networks are subject...attacks on Internet-visible systems...associated with network security...review how intrusion detection and vulnerability...3 http://csrc<br />
<br />
<a href="http://www.infosyssec.org/infosyssec/index.html">Hacking and Hackers - Computer Security Programs Downloading..</a>.<br />
...hacker crackzilla hacking guide ... Online Network Tools Click here for ... CheckPoint Firewall 1 Firewalls Firewall Wizards Intrusion...<br />
<br />
<a href="http://csrc.nist.gov/publications/nistpubs/800-31/sp800-31.pdf">Intrusion Detection System</a>s<br />
... seminars exist to guide the public on IDS ... Edward G., Intrusion Detection: An Introduction to Internet Surveillance ... Stephen, Network Intrusion Detection: An Analyst’s Handbook ...<br />
<br />
<a href="http://www.bitpipe.com/rlist/term/Intrusion-Prevention.html">Intrusion Prevention White Papers, Webcasts and Product Information from Top IT Vendor</a>s<br />
(Apr. 26, 2005)Research the latest Intrusion Prevention technologies, tools and techniques. Read white papers, case studies, webcasts and product information from multiple vendors . BITPIPE<br />
<br />
<a href="http://www.networkmagazine.com/article/NMG20001130S0007">Network Magazine | Intrusion Detection | December 5, 200</a>0<br />
... a LAN, WAN and the Internet with this PC remote ... business drivers and network architectural ... Networking Field Guide Opinions White Papers ... RSS | advanced Intrusion Detection The idea behind ...<br />
<br />
<a href="http://xmlwriter.net/books/viewbook/Implementing_Intrusion_Detection_Systems_:_A_Hands_On_Guide_for_Securing_the_Network_-0764549499.html">Implementing Intrusion Detection Systems : A Hands-On Guide for Securing the Networ</a>k<br />
... Implementing Intrusion Detection Systems : A Hands-On Guide for Securing the Network ... > Subjects > Computers & Internet > Networking > Networks, Protocols & API's > Network Security. ...<br />
<br />
<a href="http://cnscenter.future.co.kr/security/ids.html">Intrusion Detectio</a>n<br />
Network- vs. Host-based Intrusion Detection: A Guide to Intrusion Detection ... Intrusion Detection Systems: Nokia Internet Communications, Jeff Goldman, ...<br />
<br />
<a href="http://www.bitpipe.com/tlist/Network-Security.html">Network Security ( Network Perimeter Security, Threat Mitigation, and Perimeter Security) Definitio</a>n<br />
(Apr. 26, 2005)Read a description of Network Security. This is also known as Network Perimeter Security, Threat Mitigation, and Perimeter Security. Free detailed reports on Network Security are also available. BITPIPE<br />
<br />
<a href="http://www.securitywizardry.com/N_ids.htm">Talisker Network Intrusion Detection System</a>s<br />
... IDS Guide Security Info ... Network Intrusion Detection Systems Monitors all ... use of internet facilities and other network misuse events. e Trust Intrusion Detection includes an ...<br />
<br />
<a href="http://whitepapers.comdex.com/rlist/976054964_421/Intrusion-Detection.html">Webcasts, Case Studies, Product Information and White Papers on Intrusion De..</a>.<br />
... Detection published by Internet Security Systems, Inc.. The ... Related Topics MORE GENERAL: Network Security There are currently ... Intrusion Detection E-mail Address Library Home| Advertise with Us| Product Guide ...<br />
<br />
<a href="http://home.comcast.net/%7Ejay.deboer/airsnare/guide.html">AirSnare - Intrusion Detection Software for Window</a>s<br />
All personal computers on your network, MacÂ’s, PCÂ’s, Etc. All internet ... Send E-mail on alert - Sends an e-mail when an intrusion alarm is activated. ...<br />
<br />
<a href="http://www.cisco.com/en/US/products/sw/secursw/ps2113/products_documentation_roadmap09186a008019e22a.html">Cisco Intrusion Detection System (IDS) Hardware and Software Version 4.1 Doc..</a>.<br />
... for the Intrusion Detection System ... Software Configuration Guide for Cisco 2600 Series ... 1 ( P1) An existing network is "down," or there ... caseopen If you have Internet access, we recommend ...<br />
<br />
<a href="http://www.firewallsdirect.com/store/white_papers?Args=">Internet security, network security, anti-virus, intrusion detection, symant..</a>.<br />
... Firewalls • VPN • Intrusion Prevention ... of the Trusted Network (424KB) HTML The ... of the Broadband Internet (377KB)HTML Solving ... White Paper (556KB) A Guide to Secure VLANs for ...<br />
<br />
<a href="http://www.networkmagazine.com/article/NMG20000508S0022">Network Magazine | Can Intrusion Detection Keep an Eye on Your..</a>.<br />
Catching network and host attacks as they happen isn’t always possible with firewalls and other security tools. Intrusion detection can be your eyes...<br />
<br />
<a href="http://www.sans.org/rr/whitepapers/detection">SANS InfoSec Reading Room - Intrusion Detectio</a>n<br />
... Burglar Alarms: A How-To Guide Mark Embrich March 2, 2004 - ( ... An Experiment in Home Network Intrusion Detection Gary Wallin May 8, 2003 - ( ... Sending Data to the Internet Storm Center Sydney Jensen July 1 ...<br />
<br />
<a href="http://www.amazon.co.uk/exec/obidos/ASIN/0735708681">Pag</a>e with no title... but applies to Intrusion Detection<br />
... Graphic Novels -Computers & Internet -Crime, Thrillers & Mystery ... Definitive Guide to Firewalls, Virtual Private Networks, Routers and Network Intrusion Detection; Paperback ...<br />
<br />
<a href="http://csrc.nist.gov/pcig/STIGs/secureremotecomputing-stig-v1r1-021403.doc">[DOC] DRAF</a>T<br />
...Policy and Guide http://iase...concerns of Internet users http://csrc.nist.gov/publications...With ICMP Internet Control Message...Integrated Digital Network Exchange IDS Intrusion Detection System IECA...Detector/Joint Intrusion Detector...Sensitive) I<br />
<br />
<a href="http://www.bookpool.com/sm/1931836019">Bookpool: Security Sage's Guide to Hardening the Network ..</a>.<br />
Find and Implement the Right Intrusion Detection System for Your Network ... Cisco Security Specialist's Guide to Secure Intrusion Detection Systems ...<br />
<br />
<a href="http://www.psycom.net/iwar.1.html">Information Warfare, I-War, IW, C4I, Cyberwa</a>r<br />
The CERT Guide to System and Network ... (Barnett) Network intrusion. (Shipley) Network Intrusion Detection: An Analyst's Handbook [An important...<br />
<br />
<a href="http://www.nwc.com/1023/1023f19.html">Intrusion Detection, Take Two | Page 9 | November 15, 199</a>9<br />
Our second look at intrusion-detection systems shows that a combination of network-based and host ... see Packet Storm Internet Security Solutions ... Buyer's Guide Network Design Manual Compare IT ...<br />
<br />
<a href="http://guides.computerworld.com/cwguides/search/tabbrowse/summary/1618/1/index.jsp">Intrusion Detection/Forensics Software, Hardware and Services ..</a>.<br />
The following are results within the Intrusion Detection/Forensics category. ... Computerworld Buyers' Guide is a part of the KnowledgeStorm Network. ...<br />
<br />
<a href="http://www.bitpipe.com/tlist/Managed-Security-Services.html">Managed Security Services ( Network Security Services, MSS, Security Management Services, Interne</a>t<br />
(Jun. 07, 2005)Read a description of Managed Security Services. This is also known as Network Security Services, MSS, Security Management Services, Internet Security Services, Security Services, Intelligence Services, Security Consulting, and IT Security S<br />
<br />
<a href="http://all-computer-services.com/Computer_Security/13/network-intrusion-detection-using-snort.html">Pag</a>e with no title... but applies to Intrusion Detection<br />
... .com/feature_stories/snort-guide-3.html ... to Network-Based Intrusion Detection Systems Using Snort. by Roberto Nibali. The explosive growth of the Internet, and ...<br />
<br />
<a href="http://www.icsalabs.com/html/communities/ids/buyers_guide/index.shtml">TruSecure Corporation is the worldwide leader in Internet Security ..</a>.<br />
Intrusion Detection Buyer's Guide. The IDS Buyers Guide was released in December 1999. A free resource, it is designed to educate end users on the basics of ...<br />
<br />
<a href="http://www.bitpipe.com/data/search?qg=VENDOR&Search.y=0&rq=1&Search.x=0&src=bp_srslt&cr=bpres&cp=bpres&nh=25&st=1&site=bp&qp=site_abbrev:bp&src=bp_srslt&qt=E-Commerce++intrusion">E-Commerce intrusion - White Papers, Webcasts, Product Information and Research Reports o</a>n<br />
(Jun. 07, 2005)Bitpipe provides free white papers, product information and research on E-Commerce intrusion and related tools and technologies. Find the research information you need to help you make smarter IT buying decisions at Bitpipe. BITPIPE<br />
<br />
<a href="http://www.ebizq.net/topics/security/features/1786.html">Integration Security - Intrusion Detection: Reducing Network..</a>.<br />
Intrusion Detection: Reducing Network Security Risk. By Recourse Technologies ... Hubspan. View Hubspan Buyer's Guide Entry ... ebizQ Promotions...<br />
<br />
<a href="http://all-computer-services.com/Computer_Security/13/intrusion-detection-windows.html">Pag</a>e with no title... but applies to Intrusion Detection<br />
... LabMice.net Guide to Intrusion Detection, features links to whitepapers, articles, etc., ... Network Intrusion Detection ... Intrusion Detection and Network Auditing on the Internet. ...<br />
<br />
<a href="http://librenix.com/">Sysadmin: Introduction to Intrusion Detection System</a>s<br />
... detection systems. An intrusion detection system (IDS) monitors network traffic and monitors for ... Filesystems for Linux Guide to the Linux Inet Daemon ... Build a Linux-based Internet gateway Tutorial: GRUB ...<br />
<br />
<a href="http://www.bitpipe.com/data/search?qg=VENDOR&Search.y=0&rq=1&Search.x=0&src=bp_srslt&cr=bpres&cp=bpres&nh=25&st=1&site=bp&qp=site_abbrev:bp&src=bp_srslt&qt=bank+fraud+detection">bank fraud detection - White Papers, Webcasts, Product Information and Research Reports on ban</a>k<br />
(Jun. 07, 2005)Bitpipe provides free white papers, product information and research on bank fraud detection and related tools and technologies. Find the research information you need to help you make smarter IT buying decisions at Bitpipe. BITPIPE<br />
<br />
<a href="http://www.websecurityiq.com/bguide/product/searchproduct.asp_Q_sitename_E_WebSecurityIQ">Buyer's Guide – Web Security I</a>Q<br />
... Enhance your listings Buyer's Guide Categories Internet security Network security Enterprise security ... PKI Cryptography Wireless security Intrusion detection Web filtering E-mail security Security ...<br />
<br />
<a href="http://searchnetworking.techtarget.com/generic/0,295582,sid7_gci1089705,00.html">Snort Technical Guid</a>e<br />
Answers to frequently asked questions related to Snort operation.<br />
<br />
<a href="http://www.books2.com/2/item/0735712654"> Books 2 - BOOK - NETWORK INTRUSION DETECTION (3RD EDITION</a>)<br />
... Network Intrusion Detection (3rd ... Guide to Firewalls, Virtual Pr.. Network Intrusion Detection (3rd ... Internet Security, 3rd Edition Intrusion Signatures and Analysis Snort 2.1 Intrusion Detection, Second ...<br />
<br />
<a href="http://www.alw.nih.gov/Security/first-papers.html">FIRST Security Paper</a>s<br />
Executive Guide to the Protection of ... [80467 bytes] A Network Firewall ... Next-Generation Intrusion Detection Expert System (NIDES)<br />
<br />
<a href="http://book.lowpriced.org/0735712328.html">Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtua..</a>.<br />
... The Definitive Guide to Firewalls, Virtual ... Routers, and Intrusion Detection Systems Average ... book ["Inside Network Perimeter Security ... of the modern Internet-enabled business is ...<br />
<br />
<a href="http://all.net/journal/ntb/ids.html">Intrusion Detection and Respons</a>e<br />
...which will be used to guide further ... network activities, and (3) deviation from normal user signatures, to detect network intrusion detection...<br />
<br />
<a href="http://www.bitpipe.com/data/search?qg=VENDOR&Search.y=0&rq=1&Search.x=0&src=bp_srslt&cr=bpres&cp=bpres&nh=25&st=1&site=bp&qp=site_abbrev:bp&src=bp_srslt&qt=intrusion+prevention+systems">intrusion prevention systems - White Papers, Webcasts, Product Information and Research Reports o</a>n<br />
(Jun. 07, 2005)Bitpipe provides free white papers, product information and research on intrusion prevention systems and related tools and technologies. Find the research information you need to help you make smarter IT buying decisions at Bitpipe. BITPIPE<br />
<br />
<a href="http://itpapers.zdnet.com/abstract.aspx?promo=50002&docid=1453">Network- vs. Host-based Intrusion Detection: A Guide to Intrusion ..</a>.<br />
Network- vs. Host-based Intrusion Detection: A Guide to Intrusion Detection Technology. Source: Internet Security Systems. Date: October 1998. Pages: 10 ...<br />
<br />
<a href="http://topshop.au.com/shopview__0735712328__123305__50__0____0__inside-network-perimeter-security-the-definitive-guide-to-firewalls-virtual-private-networks-vpns-routers-and-intrusion-detection-systems.html">Pag</a>e with no title... but applies to Intrusion Detection<br />
Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems - Computer & Internet Books. Online Shop for Mobile Products. Offer shopping, shops, shop, cheap, ...<br />
<a href="http://www.labmice.net/">LabMice.net: The Windows 2000\2003\XP Resource Center for I</a>T<br />
...into TechTarget's Windows network of ... Group Policy Learning Guide ... tasty tips for using Snort and other free intrusion detection tools ...<br />
<br />
<a href="http://www.centrasoft.com/c1/catC_145.htm">Pag</a>e with no title... but applies to Intrusion Detection<br />
... · The Complete Idiot's Guide to Internet Privacy and Security ... Systems Design. · Internet Security Dictionary. · Computer Intrusion Detection and Network Monitoring: A Statistical ...<br />
<br />
<a href="http://www.ugamedia.com/links/security.html">computer security guide, computer security director</a>y<br />
computer security internet guide by UGAmedia, european publisher of business ... InterSect Alliance - Specialists in intrusion detection and auditing, ...<br />
<br />
<a href="http://www.freeos.com/articles/3404">Intrusion Detection Systems for your network: Part I</a> <br />
NT Domain Controller * Mandrake 7.2 install guide * GRUB ... Contact Us Project: Linux Howtos Intrusion Detection Systems for your network: Part I...<br />
<br />
<a href="http://www.bitpipe.com/detail/RES/1090433720_603.html">Intrusion Prevention: A White Paper : White Pape</a>r<br />
(Jun. 05, 2005)This white paper will examine the positioning of intrusion prevention as part of an overall layered security strategy and a review of evaluation criteria for identifying and selecting an IPS. BITPIPE<br />
<br />
<a href="http://search.looksmart.com/p/browse/us1/us317831/us317876/us282841">LookSmart - Directory - Computer and Network Security and Privac</a>y<br />
... Internet Intrusion Detection Kerberos Network Software ... with viruses and other major Internet security threats. Cipher ... Center for IT Provides a guide for protecting against ...<br />
<br />
<a href="http://www.oraclehome.co.uk/book-0735712328.htm">OracleHome.co.uk - Inside Network Perimeter Security: The Definitive..</a>.<br />
Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks, Routers and Network Intrusion Detection...<br />
<br />
<a href="http://csrc.nist.gov/publications/nistir/ir5495.txt">Untitled Documen</a>t<br />
...Systems, or MLS Network components...specification language for the SOW...the NSA and NIST Acquisition...Programming Languages) or equivalent...security. Intrusion detection in expert...familiarity with network security tools including intrusion detecti<br />
<br />
<a href="http://www.bitpipe.com/data/search?qg=PROD&Search.y=0&rq=1&Search.x=0&src=bp_srslt&nh=25&qt=business+case+for+local+area+network&st=1&site=bp&qp=site_abbrev:bp">business case for local area network - White Papers, Webcasts, Product Information and Researc</a>h<br />
(Jun. 09, 2005)Bitpipe provides free white papers, product information and research on business case for local area network and related tools and technologies. Find the research information you need to help you make smarter IT buying decisions at Bitpipe.<br />
<br />
<a href="http://www.criticalsecurity.com/elements.php?elementID=17&elementSubID=0">CriticalSecurity.com - Free security planning template, links, and ..</a>.<br />
INTRUSION DETECTION SYSTEMS AND VULNERABILITY ANALYSIS ... It allows you to look at the network/Internet connections of your computer in a highly effective ...<br />
<br />
<a href="http://www.reviewscout.co.uk/0735712328">Inside Network Perimeter Security: The Definitive Guide to..</a>.<br />
Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks, Routers and Network Intrusion Detection -<br />
<br />
<a href="https://www.securehq.com/shqbuyersguide.wml">Intrusion Detection Buyer's Guide and FA</a>Q<br />
What is intrusion detection and how does it protect my network? ... If you place the network IDS between the Internet and the switch, you can monitor ...<br />
<br />
<a href="http://www.infoworld.com/cgi-bin/displayTC.pl?/980504comp.htm">Network intrusion-detection solutions (InfoWorld</a>)<br />
Internet Security Systems Inc. Network Flight Recorder/Anzen solution ... The effectiveness of a network intrusion-detection system is based largely on the ...<br />
<br />
<a href="http://www.securitybooks.org/intrusion-detection">Page with no title... but applies to Intrusion Detection</a> <br />
Internet Security Books - over 25 categories of specialized security books. ... in-depth guide to implementing and optimizing an effective intrusion detection system for your network ... most popular intrusion detection tools including Internet Security Sy<br />
<br />
<a href="http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci1033304,00.html">The 10 traits of effective securit</a>y<br />
Mark Egan Just as no two businesses are exactly alike, information security programs also differ from company to company. A small firm that conducts business only in ...<br />
<br />
<a href="http://secinf.net/info/misc/network-intrusion-detection.html">Pag</a>e with no title... but applies to Intrusion Detection<br />
Not so many info as in previous, but somethig interesting here too. ... The firewall? 8. Implementation Guide. - What questions should ... mirrors/ids/network-intrusion-detection.html. Russian translation: http://www.citforum.ru/internet/securities/faq_ids<br />
<br />
<a href="http://csrc.nist.gov/ispab/2002-03/Minutes-03-2002.pdf">[PDF] CSSPAB Meeting  March 5-7, 200</a>2<br />
...commented that Gov-Net had completed...the Simple Network Management...threat to the Internet. Freedom of...on in the intrusion detection area. Dr...Institute Internet Storm Center...of advanced intrusion detection analysts...<br />
<br />
<a href="http://www.bitpipe.com/data/search?qg=PROD&Search.y=0&rq=1&Search.x=0&src=bp_srslt&nh=25&qt=ccri-nursing+1010+nursing+home+data+collecton+guide&st=1&site=bp&qp=site_abbrev:bp">ccri-nursing 1010 nursing home data collecton guide - White Papers, Webcasts, Product Informatio</a>n<br />
(Jun. 09, 2005)Bitpipe provides free white papers, product information and research on ccri-nursing 1010 nursing home data collecton guide and related tools and technologies. Find the research information you need to help you make smarter IT buying decisio<br />
<br />
<a href="http://www.nwfusion.com/reviews/1004trends.html">Getting the drop on network intruder</a>s<br />
Hacker alert Intrusion-detection software is hot, but can it really stop hackers cold? Network World, 9/27/99. Intrusion detection buyer's guide Use...<br />
<br />
<a href="http://www.jobtrapping.com/help/10806-home-wireless-network.html">Home Wireless Networ</a>k<br />
... wireless intrusion detection, home ... a home, network detection, california ... home, wireless internet connection ... home intercom, network troubleshooter ... home improvement guide, wireless ...<br />
<br />
<a href="http://www.spinellis.gr/pubs/Breview/1999-CR-IntrDet/html/review.html">Intrusion detection: network security beyond the firewal</a>l<br />
Intrusion detection: network security beyond the firewall ... Diomidis Spinellis University of the Aegean ... Escamilla a useful procurement guide.<br />
<br />
<a href="http://www.security-forums.com/forum/viewforum.php?f=19">Security Forums Dot Com :: View Forum - Firewalls // Intrusion ..</a>.<br />
... all aspects of Computer & Internet Security via a worldwide ... Firewalls // Intrusion Detection - External Security Moderator: Security ... 10 am mel Hardware Firewall Network Setup [ Goto page: 1 , 2 ] 8 ...<br />
<br />
<a href="http://searchnetworking.techtarget.com/generic/0,295582,sid7_gci1050204,00.html">The 10 traits of effective securit</a>y<br />
No Summary Found<br />
<br />
<a href="http://www.csrc.nist.gov/publications/nistpubs/800-63/SP800-63v6_3_3.pdf">[PDF] Electronic Authentication Guidelin</a>e<br />
...RFC 3280, Internet X.509 Public...txt 10.2. NIST ITL Bulletins...at: http://csrc.nist.gov/publications...at: http://csrc.nist.gov/publications...800-31, Intrusion Detection Systems...Security Guide for Interconnecting...800- 52] NIST Special Publication<br />
<br />
<a href="http://www.amazon.fr/exec/obidos/ASIN/0764549499">Amazon.fr : Livres en anglais: Implementing Intrusion Detection Systems: A Hands-On Guide for Securing the Networ</a>k<br />
... Computers. and Internet. Business. and Investing ... Implementing Intrusion Detection Systems: A Hands-On Guide for Securing the Network. de Tim Crothers ...<br />
<br />
<a href="http://www.bitpipe.com/data/search?qg=VENDOR&rq=1&Search.y=0&Search.x=0&src=bp_srslt&cr=bpres&cp=bpres&qt=being+prepared+for+intrusion&nh=25&st=26&site=bp&rf=0&qp=site_abbrev:bp">being prepared for intrusion - White Papers, Webcasts, Product Information and Research Reports o</a>n<br />
(Jun. 09, 2005)Bitpipe provides free white papers, product information and research on being prepared for intrusion and related tools and technologies. Find the research information you need to help you make smarter IT buying decisions at Bitpipe. BITPIPE<br />
<br />
<a href="http://www.linuxsecurity.com/content/blogcategory/75/88/20/200">Intrusion Detection - Authoritative Source for Network Security Analysis New</a>s<br />
... Stoll's . . . Buyer's Guide: Network-based ... is hybrids of network- and server-based ... Warfare: When Intrusion Detection Isn't Enough ... One week later, the Internet came under attack by ...<br />
<br />
<a href="http://librenix.com/?inode=2487">Sysadmin: Security: TriSentry: Linux/Unix Intrusion Detection Syste</a>m<br />
... TriSentry: Linux/Unix Intrusion Detection System a d m i n If you can't secure ... files with one command: find Internet applications log file ... UNIX: Visual QuickStart Guide 2/e Linux Security Basics Backup ...<br />
<br />
<a href="http://csrc.nist.gov/pcig/STIGs/Web-STIG-V5R1.pdf">[PDF] Web Application STI</a>G<br />
...Procedures Guide. There are...areas of Internet and Intranet...following: - Network access...is http://csrc.nist.gov/pcig/cig...requires a network connection...users. From a network perspective...Filtering - Intrusion Detection - Firewall...<br />
<br />
<a href="http://www.bitpipe.com/data/search?ct=trm&Search.y=0&rq=1&Search.x=0&src=bp_srslt&nh=25&qt=business+network+security&st=1&site=bp&qp=site_abbrev:bp">business network security - White Papers, Webcasts, Product Information and Research Reports o</a>n<br />
(Jun. 09, 2005)Bitpipe provides free white papers, product information and research on business network security and related tools and technologies. Find the research information you need to help you make smarter IT buying decisions at Bitpipe. BITPIPE<br />
<br />
<a href="http://www.computertrainingschools.com/">Computer Training Schools - Your Guide to Computer School</a>s<br />
... is a comprehensive guide to computer schools in the ... Learning Internet/Web Internet/Web Certification Intrusion Detection (IDS) Java JavaScript JSP ... OS/Security CompTIA Network+ ® , Linux ... Microsoft ...<br />
<br />
<a href="http://www.dackom.com/intrusion_detection.html">intrusion detectio</a>n<br />
... detection, reviews, xml, network, perl, shell, tcp/ip, sec ... need, guide, security, firewall, ids, intrusion, detection ... finance. Description: Internet and Technology not just for ...<br />
<br />
<a href="http://www.amazon.ca/exec/obidos/ASIN/0764549499">Pag</a>e with no title... but applies to Intrusion Detection<br />
... Intrusion Detection Systems: A Hands-On Guide ... Intrusion Detection Systems: A Hands-On Guide for Securing the Network by subject: Browse for Books in: Subjects > Computers & Internet ...<br />
<br />
<a href="http://www.virtualbookcase.com/book/detail/45001930">The Virtual Bookcase, Details of 'Intrusion Detection: Network..</a>.<br />
...review for Intrusion Detection: Network Security Beyond the Firewall Book description: A complete nuts-and-bolts guide to improving network...<br />
<br />
<a href="http://www.networkcomputing.com/1021/1021ws1.html">Anatomy of a Network Intrusion | Page 1 | October 18, 199</a>9<br />
... of a Network Intrusion October 18 ... on IRC (Internet Relay Chat ... admin- guide-to-cracking.html). Network Computing published a similar article a few years ago (see "Intrusion Detection Provides a ...<br />
<br />
<a href="http://www.uni-mannheim.de/studorg/gahg/PGP/cryptolog1.html">Crypto-Log: Internet Guide to Cryptograph</a>y<br />
TM The Internet Guide to ... links Network & Internet Security. SSL ... California, Davis) - intrusion detection research sponsored by NSA, ARPA...<br />
<br />
<a href="http://products.enterpriseitplanet.com/security/id/recent1.html">Enterprise IT Planet Product Guide - Category Security, Sub Category ..</a>.<br />
... Product Guide: Latest entries and updates for Category Security; SubCategory Intrusion Detection. Page: 1. ... Downloads internet.commerce ... Provides network and/or host intrusion detection, service ...<br />
<br />
<a href="http://www.idiotworlds.com/">Idiotworlds.com</a>.<br />
... security,firewalls,network security,security ... computer,intrusion detection,internet ... Free or Trial internet programs don't give ... 43E5-AF05-719F45C382A4 Guide for Installing and ...<br />
<br />
<a href="http://www.networkcomputing.com/815/815ws1.html">Network Computing</a> <br />
Here we discuss our attack and intrusion-detection procedures and offer an ... We start with whois queries to the Internet Network Information Center ...<br />
<br />
<a href="http://www.amazon.co.uk/exec/obidos/ASIN/0764549499">Pag</a>e with no title... but applies to Intrusion Detection<br />
Implementing Intrusion Detection Systems: A Hands-On Guide for Securing the Network, Tim Crothers, Hungry Minds Inc,U.S. ... Graphic Novels -Computers & Internet -Crime, Thrillers & Mystery ... in-depth guide to implementing and optimizing an effective int<br />
<br />
<a href="http://www.all-nettools.com/library,privacy,11">All Net Tools - Library - Privacy Guid</a>e<br />
Practical Privacy Guide:Firewalls and Intrusion detection. From the moment a computer is connected to the Internet or local network it becomes an object for ...<br />
<br />
<a href="http://www.bitpipe.com/data/search?qg=VENDOR&Search.y=0&rq=1&Search.x=0&src=bp_srslt&cr=bpres&cp=bpres&nh=25&qt=Black+Ice+Defender+firewall&st=1&site=bp&rf=1&qp=site_abbrev:bp">Black Ice Defender firewall - White Papers, Webcasts, Product Information and Research Reports o</a>n<br />
(Jun. 09, 2005)Bitpipe provides free white papers, product information and research on Black Ice Defender firewall and related tools and technologies. Find the research information you need to help you make smarter IT buying decisions at Bitpipe. BITPIPE<br />
<br />
<a href="http://uk.builder.com/whitepapers/0,39026692,60032698p-39000787q,00.htm">Generic Intrusion Detection Evaluation Guide from Internet Security..</a>.<br />
Login to Builder UK. Builder UK > White Papers > Network Security. Generic Intrusion Detection Evaluation Guide. Download Now Free download<br />
<br />
<a href="http://www.computerworld.com/networkingtopics/networking/lanwan/story/0,10801,59611,00.html">Intrusion Detection - Computerworl</a>d<br />
... authorization. An intrusion-detection system (IDS) monitors system and network resources and ... Atlanta-based Internet Security System Inc.'s ... free white paper SSL Guide Want to Let ...<br />
<br />
<a href="http://www-106.ibm.com/developerworks/rational/library/2064.html">Book review -- Cisco Internet Architecture Essentials Self-Study ..</a>.<br />
Although this book does educate readers about Cisco Internet solutions ... content routers, content caching, intrusion detection systems and so on. ...<br />
<br />
<a href="http://www.islandwebsecurity.com/1000/Internet-Security-Guide.htm">Internet Security Guid</a>e<br />
...vulnerabilities networking IT Security Secure your network Internet Security Guide Intrusion Detection Broadband Mobile & Wireless...<br />
<br />
<a href="http://www.techguide.com/">ITpaper</a>s<br />
... Hacking , Anti-Virus , Firewalls , Intrusion Detection Systems , Network Security , Spam and E-mail Marketing , ... the gateway with Panda's GateDefender Internet appliance (Panda Software) Handle Unknown ...<br />
<br />
<a href="http://computerworldhk.bitpipe.com/rlist/term/Intrusion-Detection-Systems.html">Pag</a>e with no title... but applies to Intrusion Detection<br />
... Press Release Training Guide Trial Software ... of computers connected to the Internet ... network protection and infrastructure systems such as Firewalls, Intrusion Detection Systems ...<br />
<br />
<a href="http://www.informit.com/articles/index.asp?st=41404">Security Article</a>s<br />
... Database E-commerce Internet Intrusion Detection Linux Network ... Dec 17, 2004 14. What Is Network Security Monitoring? By ... Articles Google Hacking Mini-Guide By Johnny Long May 7, 2004 ...<br />
<br />
<a href="http://www.iss.net/wireless/WLAN_FAQ.php">Wireless LAN 802.11b Security FA</a>Q<br />
Here is a good guide to building Pringles and waveguide antennas: ... "RoamAbout Default Network Name" - Lucent/Cabletron ... "Default SSID"<br />
<br />
<a href="http://www.firewall-net.com/link/index.php?LANG=english&categories_parents_id=26&PHPSESSID=17291b52307d8c3fbf6801d937d3e0fa">Firewall Net : Annuaire des site</a>s<br />
... D.B. Editor : O'REILLY INFORMATIQUE BUILDING INTERNET FIREWALLS CHAPMAN 311 Checkpoint Firewall-1 ... Firewall-1 Administration Guide 311 Intrusion Detection: Network Security Beyond the Firewall ...<br />
<br />
<a href="http://www.knowledgestorm.com/search/keyword/Internet%20Monitoring%20Software%20Detection%20Software/iickwd/Internet%20Monitoring%20Software%20Detection%20Software">Pag</a>e with no title... but applies to Intrusion Detection<br />
KnowledgeStorm provides free research of Internet Monitoring Software Detection Software related enterprise software and services. KnowledgeStorm allows you to find the solutions that meet your specific needs and timeline. ... Monitoring | Network Security<br />
<br />
<a href="http://security.ittoolbox.com/nav/t.asp?t=384&p=384&h1=384">Security Intrusion Detection Prevention Network Auditing Monitorin</a>g<br />
ActiveSentry (Intranode)- This product is a proactive Internet security ... It integrates Network Intrusion Detection using the Snort IDS engine with ...<br />
<br />
<a href="http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci906410,00.html">Choose the right firewall topolog</a>y<br />
When developing a perimeter protection strategy for an organization, one of the most common questions is "Where should I place firewalls for maximum effectiveness?" In this tip, w...<br />
<br />
<a href="http://www.securityforum.org/html/reports.htm">Information Security Foru</a>m<br />
... Guide Internet and Security: Guide for Business Managers Internet and Security: Executive Guide Network Security Intrusion Detection: CD Intrusion Detection: Quick Reference Guide Intrusion ...<br />
<br />
<a href="http://www.bookhead.co.uk/0735712328.aspx">Inside Network Perimeter Security: The Definitive Guide t</a>o<br />
Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks, Routers and Network Intrusion Detection Stephen...<br />
<br />
<a href="http://www.securitywriters.org/">Network Securit</a>y<br />
Network security services, Check Point firewalls, ISS network scanners and intrusion detection, penetration ... Get a FREE Internet Security Guide...<br />
<br />
<a href="http://www.pcprotection.ca/books-plain/0619130393.html">Pag</a>e with no title... but applies to Intrusion Detection<br />
... Guide to Firewalls and Network Security: Intrusion Detection and VPNs ... take a while to fully load, depending on. your internet connection speed and the total number of reviews. ...<br />
<br />
<a href="http://www.centrasoft.com/c2/catS_313.htm">Pag</a>e with no title... but applies to Intrusion Detection<br />
... Guide. · Principles of Secure Network Systems Design. · Internet Security Dictionary. · Computer Intrusion Detection and ... Security. · Intrusion Detection: Network Security Beyond the ...<br />
<br />
<a href="http://berger.ticmundi.com/0-619-13039-3.html">[20040901] GUIDE TO FIREWALL NETWORK SECURITY AND INTRUSION DETECTIO</a>N<br />
... GUIDE TO FIREWALL NETWORK SECURITY AND INTRUSION DETECTION ... 13039-3 : GUIDE TO FIREWALL NETWORK SECURITY AND INTRUSION DETECTION ... for the student and network administrator who need to ...<br />
<br />
<a href="http://csrc.nist.gov/publications/nistpubs/800-28/sp800-28.pdf">[PDF] Microsoft Word - PP-ACMCguidance-finalversion.do</a>c<br />
...2 http://csrc.nist.gov/publications...complete, with NIST's selection...combating intrusions. Commercial...filtering network protocols...make up the Internet, precluding...Format of Internet Message Bodies, IETF Network Working Group...2000, http://csrc<br />
<br />
<a href="http://www.apnic.net/info/faq/abuse/hacking.html">APNIC Reporting network abus</a>e<br />
... requests ASN requests Whois guide Reverse DNS guide Routing Registry ... helpful: Security of the Internet FAQ: Network Intrusion Detection Systems Top More information ...<br />
<br />
<a href="http://www.iss.net/products_services/managed_services">Guaranteed Protection with Managed Security Services from Internet ..</a>.<br />
Internet Security Systems Managed Security Services offer guaranteed firewall protection, intrusion detection, security intelligence and vulnerability ... worry about my network security and who's ...<br />
<br />
<a href="http://www.critiquesdelivres.com/0735712328">Inside Network Perimeter Security: The Definitive Guide t</a>o<br />
Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks, Routers and Network Intrusion Detection -...<br />
<br />
<a href="http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci957950,00.html">Switch upgrade</a>s<br />
I suspect that a significant percentage, if not a majority, of network administrators are sitting on switches that are a couple of years old; likely purchased during the dotcom cra...<br />
<br />
<a href="http://products.ecommerce-guide.com/security/id/recent2.html">ECommerce Product Guid</a>e<br />
ECommerce-Guide provides ecommerce business owners with e-commerce news, ... Symantec Network Security 7100 Series Symantec Corp. Intrusion detection ...<br />
<br />
<a href="http://www.ca.com/schoolprotection/ata_glance.pdf">eTrust Intrusion Detection At-A-Glance Guid</a>e<br />
... Internet, who want to control. network bandwidth usage, or control web usage. Why is eTrust Intrusion Detection better ... At-A-Glance Guide ...<br />
<br />
<a href="http://www.linuxdevcenter.com/pub/a/linux/2001/06/29/tools_two.html?page=last">LinuxDevCenter.com: Tools of the Trade: Part </a>2<br />
... Network Intrusion Detection, 2nd Ed. (New Riders ... ISBN: 0-7357-1008-2 Intrusion Signatures & ... 6 Linux Network Administrator's Guide, 2nd ... 2 Practical Unix and Internet Security (O'Reilly ...<br />
<br />
<a href="http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci941970,00.html">Throwing eggs at spammer</a>s<br />
Novant Health started fighting spam almost by accident. The company, which manages health care facilities in North Carolina, needed encryption tools to comply with new federal reg...<br />
<br />
<a href="http://www.bookpool.com/SSSSSS_C523/sm/1587201321">Bookpool: CCSP CSI Exam Certification Guide, 2nd Ed (642-541</a>)<br />
Alternative Medium-Sized Network Corporate Internet Module Designs. ... Network Intrusion Detection System Overview. Host-Based IPS Overview. ...<br />
<br />
<a href="http://home.jwu.edu/jwright/papers/l2-wlan-ids.pdf">Layer 2 Analysis of WLAN Discovery Applications for Intrusion ..</a>.<br />
... Applications for Intrusion Detection Joshua Wright, GCIH ... some wireless network discovery tools, intrusion detection monitoring on wireless ... The Definitive Guide. ” Sebastopol, CA: O ...<br />
<br />
<a href="http://www.operationsecurity.com/resource_db.php?viewCat=33">Operation: Security - News and Editorial</a>s<br />
... CMP's TechWeb, the IT network. Internet/Network Security - A great guide to internet/network security. Intrusion Detection - An informative Editorial on Intrusion Detection. Mountain Wave, Inc ...<br />
<br />
<a href="http://www.cert.org/security-improvement/modules/m06.html">Responding to Intrusion</a>s<br />
...that includes preparation, detection ... Examples of such events include intrusion via the network, the ... Security Incident Handling Step By...<br />
<br />
<a href="http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci773653,00.html">Think before you encryp</a>t<br />
Think before you encrypt Tom Lancaster Got a VPN tip of your own? You can send it in, and we'll grant you instant fame by posting your tip on our Web site, and we'll enter you in ...<br />
<br />
<a href="http://csrc.nist.gov/publications/nistir/ir5472.txt">Untitled Documen</a>t<br />
...distributed systems, local area networks, the worldwide Internet, policy- enforcing applications...distributed systems, local area networks, the worldwide Internet, policy-enforcing applications...975-5140 toth@csmes.ncsl.nist.gov Caralyn Wichers* BBN 9<br />
<br />
<a href="http://www.internetvalley.com/archives/98companynews/nai.html">Web Influence: Internet Valley Services</a> <br />
Furthermore, because network-based intrusion detection systems have limited ... Network Associates can be reached at 408-988-3832 or on the Internet at ...<br />
<br />
<a href="http://www.honeypots.net/ids/links">Page with no title... but applies to Intrusion Detection</a> <br />
Independent overview of whitepapers, articles and howto's related to Honeypots, Intrusion Detection Systems and Incident Handling ... Guide to Making Sense of IDS Alarms. Marcus J. Ranum for ICSA Labs IDSC, Feb 2003. FAQ: Network Intrusion Detection ... In<br />
<br />
<a href="http://www.icsalabs.com/html/communities/ids/index.shtml">TruSecure Corporation is the worldwide leader in Internet Security ..</a>.<br />
The objective of ICSA Labs' Network Intrusion Detection System (NIDS) Certification Program is to ... The IDS Buyers Guide was released in December 1999. ...<br />
<br />
<a href="http://www.antivirus.about.com/od/antivirussoftwarereviews/fr/tpis2005.htm">Antivirus software review: PC-cillin Internet Security 200</a>5<br />
... Sign Up Now! Best of Breed Guide Rating - Vendor's Site Trend Micro's PC-cillin Internet Security 2005 continues to ... controls, Wi-Fi intrusion detection and home network controls. All ...<br />
<br />
<a href="http://www.csrc.nist.gov/organizations/fissea/newsletters/2000/news09-00.html">FISSEA Newsletter - May 200</a>0<br />
...Security and Intrusion Detection 5-days, hands...Course Two - Network Security for...will be the E-GOV Information...url: http://csrc.nist.gov/nissc/ Unfortunately...scheduled their Network Security 2000...to webmaster-csrc@nist.gov. Last Modified...htt<br />
<br />
<a href="http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci914944,00.html">Recommended reading lis</a>t<br />
Our experts recommend that you take these books along with you on vacation or during a coffee break at work.<br />
<br />
<a href="http://www.guide.vang.net/Guide/Computers/Security/Products_and_Tools">Pag</a>e with no title... but applies to Intrusion Detection<br />
Internet Guide: Computers - Security - Products and Tools ... Search: Internet guide. Current Directory: ... Internet@ (164) Intrusion Detection Systems@ (87) ... Offers network security software including intrusion detection, security scanner, anti ...<br />
<br />
<a href="http://www.infosyssec.net/">Pag</a>e with no title... but applies to Intrusion Detection<br />
... and network security resource on the Internet for ... Internet Telephony-Protocols. Intrusion Detection Library ... HackingInternetInternet - CrimeInternet - DatingInternet - DealsInternet ...<br />
<br />
<a href="http://www.oasis-open.org/cover/xml.html">Cover Pages: Extensible Markup Language (XML</a>)<br />
This note is a brief guide to web resources that explain XML..." XML Reference Guide - From ... Web Review. InformationWeek XML Toolbox...<br />
<br />
<a href="http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci920784,00.html">Free network security toolki</a>t<br />
Practitioners of every profession on Earth use specialized tools in the performance of their duties. Doctors use diagnostic tests, stock brokers use technical analysis tools and ca...<br />
<br />
<a href="http://www.wi-fitechnology.com/Wi-Fi-Products-0619130393.html">Guide to Firewalls and Network Security: Intrusion Detection and..</a>.<br />
Wi-Fi Products: Guide to Firewalls and Network Security: Intrusion Detection and VPNs with Reviews - Wi-Fi hardware and Software Reviews Wi-Fi...<br />
<br />
<a href="http://www.networkcomputing.com/showitem.jhtml?docid=1513ws1">Setting Up an Intrusion Detection System | Detective Work | July 8, 2004 | N..</a>.<br />
... An intrusion-detection system (IDS ... servers handle intrusion prevention ... LAN, WAN and the Internet with this PC ... Services | Network Magazine | IT ... Buyer's Guide | InternetWeek ...<br />
<br />
<a href="http://www.sans.org/Amsterdam/track3.php">Track 3: Intrusion Detection In-Dept</a>h<br />
... most advanced program in network intrusion detection that has ever been ... This web page is your guide to installing the ... SA) The Role of Internet Key Exchange (IKE) The Authentication ...<br />
<br />
<a href="http://www.cisco.com/en/US/products/sw/secursw/ps2113/products_user_guide_chapter09186a00800d9249.html">Cisco Secure Intrusion Detection System Version 2.2.1 User Guide ..</a>.<br />
Cisco Secure Intrusion Detection System Version 2.2.1 User Guide. About this Guide ... Want to learn more about intrusion detection and network security ...<br />
<br />
<a href="http://www.mcafeesecurity.com/us/about/press/network/2003/20030501_152511.htm">IntruShield 4000 Intrusion Detection System Named a 2003 Winner by Network C..</a>.<br />
... for the Interactive Buyer's Guide and ranked Rob Preston 11th on ... newspapers, magazines, Internet products, research, direct ... offering a real-time network intrusion detection and prevention ...<br />
<br />
<a href="http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci966711,00.html">Perimeter network</a>s<br />
A perimeter network is the network closest to a router that is not under your control. Usually a perimeter network is the final step a packet takes traversing one of your networks ...<br />
<br />
<a href="http://www.tisc2002.com/insight.html">TISC Insight Newslette</a>r<br />
IT Security Forum Network-1 Network ... 3, 2003 The Diet Peon's Guide To ... 23, 2001 Host Detection: Generating ... Jan 12, 2001 Intrusion...<br />
<br />
<a href="http://www.verisign.com/support/payflow/fraud/bestpractices.html">http://www.verisign.com/support/payflow/fraud/bestpractices.htm</a>l<br />
... System Security Insecure Internet Security Systems ... The Open Source Network Intrusion Detection System Shopping Carts ... Cisco Network Security Cisco's Security Guide s for Small ...<br />
<br />
<a href="http://www.rtek2000.com/Tech/InternetSecureLinks.html">Information Security Resources and Links. Security Certifications</a>,<br />
Performance Tuning Guide for FW-1. Network Computing Article ... Intrusion Detection using ACID on Linux. Netprowler- A Look at Symantec's Network...<br />
<br />
<a href="http://www.amazon.ca/exec/obidos/ASIN/0735712328">Pag</a>e with no title... but applies to Intrusion Detection<br />
... Definitive Guide to ... Network Perimeter Security: The Definitive Guide to Firewalls, VPNs, Routers, and Intrusion Detection Systems by subject: Browse for Books in: Subjects > Computers & Internet ...<br />
<br />
<a href="http://www.cerias.purdue.edu/coast/projects/autonomous-agents.html">CERIAS - Autonomous Agents for Intrusion Detectio</a>n<br />
... to any browser or Internet device. ( Why? ) About CERIAS ... development. AAFID2 Users Guide Diego Zamboni and E. H ... and Eugene Spafford Network Intrusion Detection. B Mukherjee, L Todd Heberline ...<br />
<br />
<a href="http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci872810,00.html">Choosing a certification: Deciding between generalized, specific course</a>s<br />
You might be one of the many people considering obtaining a certification, whether your goal is to make more money in your existing job, to further your career in other ways or ju...<br />
<br />
<a href="http://www.criticalsecurity.com/elements.php?elementID=17">CriticalSecurity.com - Free security planning template, links, and ..</a>.<br />
INTRUSION DETECTION SYSTEMS AND VULNERABILITY ANALYSIS ... It allows you to look at the network/Internet connections of your computer in a highly effective ...<br />
<br />
<a href="http://www.infosyssec.net/infosyssec/netintrufaq.htm">FAQ: Network Intrusion Detection System</a>s<br />
FAQ: Network Intrusion Detection Systems. Version 0.4, April 15, 1999 ... 8. Implementation Guide[New] - What questions should I ask my IDS...<br />
<br />
<a href="http://www.plannet21.ie/sec_servs.asp">PlanNet21 Communications - Information Security Services Guide ..</a>.<br />
We will evaluate the risk to your network and propose the best policy to ... This may involve an intrusion detection solution or other similar measures. ...<br />
<br />
<a href="http://www.securisa.com/doc/ids_1.pdf">Internet Security System</a>s<br />
... HOW TO GUIDE. Internet Security Systems. Intrusion Detection ... How To Guide-Implementing a Network. Based Intrusion Detection System ...<br />
<br />
<a href="http://www.pcvelocity.com/patch">patc</a>h<br />
... year 2000, app. The no-nonsense step-by-step guide to Y2K for desktop users. This anything but ... ru/ Policy & Standards internet, network, security, intrusion detection, hack, hacking, password ...<br />
<br />
<a href="http://www.infosyssec.net/infosyssec/secvpn1.htm">VPN - Virtual Private Network - Downloadable Info</a> <br />
...network security privacy encryption computer crime firewallsinformation warfare intrusion detection ... A Technical Guide to Ipsec Virtual...<br />
<br />
<a href="http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci804682,00.html">Watch out for hotel broadband vulnerabilitie</a>s<br />
I remember the first time I walked into a hotel room and found an Ethernet drop. It was at TISC (tisc.corecom.com) Fall 1999 in Boston, at the Seaport Hotel. Now, it's almost com...<br />
<br />
<a href="http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci526843,00.html">ASPs and security concern</a>s<br />
You may be contemplating using the services of an application service provider as a way to Page with no title... but applies to Intrusion Detection internal IT resources. If so, you have to be wondering about security. And you're ...<br />
<br />
<a href="http://www.1-brs.com/us-reviewed/0735712328.html">Pag</a>e with no title... but applies to Intrusion Detection<br />
BRS website design and internet programming ... of the. modern Internet-enabled business is not just ...<br />
<br />
<a href="http://online.securityfocus.com/infocus/1630">SecurityFocus HOME Infocus: Evaluating Network Intrusion Detection..</a>.<br />
...and "Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks, Routers, and Intrusion Detection Systems".<br />
<br />
<a href="http://www.rothstein.com/drjbooks/drj514.htm">Complete Guide to Internet Securit</a>y<br />
“This comprehensive book is your one-stop guide to Internet security. ... technologies including routers, firewalls, and intrusion detection systems. ...<br />
<br />
<a href="http://www.all-nettools.com/privacy/detect.htm">Firewalls and Intrusion Detection</a> <br />
Privacy Guide: Firewalls and Intrusion Detection. From the moment a computer is connected to the Internet or local network it becomes an object for various ...<br />
<br />
<a href="http://www.isp-uk.com/perspectives/ids_p3.html">ISP-Planet - Executive Perspectives - White Paper: Intrusion..</a>.<br />
Intrusion Detection: Reducing Network Security Risk —continued ... Guide Chapter 7: Managing Your Tech Team ... Managed Security Services Index...<br />
<br />
<a href="http://www.my-ip-address.com/NetWare">NetWar</a>e<br />
... in)security: Intrusion Detection, Windows ... and Hosting, and Internet Solutions based in ... of critical network data. LANshadow runs ... kbcs, chicago computer guide, novell, NetWare ...<br />
<br />
<a href="http://www.onlamp.com/pub/a/onlamp/2002/11/14/trisentry.html">ONLamp.com: TriSentry, a Unix Intrusion Detection Syste</a>m<br />
... in a Windows World Linux Network Administrator's Guide Linux Server Security ... TriSentry, a Unix Intrusion Detection System by Glenn Graham 11/14 ... common on the Internet. Though intended to help ...<br />
<br />
<a href="http://security.ittoolbox.com/nav/t.asp?t=385&p=385&h1=385">Security Intrusion Detection Prevention VPNs</a> <br />
... firewalls, VPN, intrusion detection and virtual private network security systems ... is a streamlined guide to help you securely extend your private network across the public Internet. With speedy ...<br />
<br />
<a href="http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci542380,00.html">Selecting a VPN solution? Think security firs</a>t<br />
More and companies are extending their extranets to capitalize on business-to-business opportunities. While the advantages of using the Internet to connect to remote workers, bra...<br />
<br />
<a href="http://www.ciwcertified.com/exams/1d0470.asp">Certified Internet Web Professional | CIWcertified.co</a>m<br />
Amoroso, Edward G. Intrusion Detection: An Introduction to Internet Surveillance, Correlation ... Intrusion Detection: Network Security Beyond the Firewall. ...<br />
<br />
<a href="http://www.cleo-and-nacho.com/xpweb">Cleo And Nacho Desig</a>n<br />
... Intrusion Detection Incident Response Essentials Guide to Network Lockdown Counter Attack Linksys Networks Secure Your Network ... revenue take-off, with our personalized Internet Marketing. Quick Company Information Phone ...<br />
<br />
<a href="http://netsecurity.about.com/cs/hackertools/a/aa030504.htm">Introduction to Intrusion Detection Systems (IDS)</a> <br />
Internet / Network Security> Tools & Utilities> Security Tools> Introduction to Intrusion Detection ... Our Story | Be a Guide | Advertising Info...<br />
<br />
<a href="http://www.isp-uk.com/perspectives/ids_p2.html">ISP-Planet - Executive Perspectives - White Paper: Intrusion..</a>.<br />
Intrusion Detection: Reducing Network Security Risk —continued ... Guide Chapter 7: Managing Your Tech Team ... Managed Security Services Index...<br />
<br />
<a href="http://www.networkmagazine.com/article/NMG20010823S0007">Network Magazine | Intrusion Detection Systems: Back To Front? |..</a>.<br />
...and mounting security threats are forcing network professionals to reconsider Intrusion Detection Systems. ... Tutorials Networking Field Guide...<br />
<br />
<a href="http://www.onlamp.com/pub/a/onlamp/2003/09/18/prelude.html">ONLamp.com: Inside Prelude, an Open Source ID</a>S<br />
Linux Network Administrator's Guide, 3rd Edition ... Snort focuses on just one of the areas of intrusion detection: the network part.<br />
<br />
<a href="http://security.ittoolbox.com/nav/t.asp?t=372&p=372&h1=372">Security Intrusion Detection Preventio</a>n<br />
... Survivor's Guide to 2002 (Network Computing) ... such as network intrusion detection and network intrusion prevention. ... Amazon.com Intrusion Detection: An Introduction to Internet Surveillance ...<br />
<br />
<a href="http://products.enterpriseitplanet.com/security/id/1087224125.html">Pag</a>e with no title... but applies to Intrusion Detection<br />
IntruShield from Network Associates Technology, Inc - Intrusion Detection / Prevention Appliances for Networks. From Enterprise IT Planet Product Guide Category Security; SubCategory Intrusion Detection. ... Gateway S Symantec Network S ThreatSentry Tomaha<br />
<br />
<a href="http://www.tisc2001.com/bookstore.html">TISC Bookstor</a>e<br />
... System Security Intrusion Detection, Auditing, Anti ... Applied Internet Security by Jalal ... Kerberos by Brian Tung Network Security: Private ... for PKI: Best Practices Guide for Deploying Public ...<br />
<br />
<a href="http://www.allonesearch.com/intrusion-network.htm">Intrusion Network - UK Offer</a>s<br />
... NexTag UK comparison shopping guide has prices, including shipping ... Selm. It performs intrusion detection through network-wide ... The Computer Network Defence Internet Operational Picture ...<br />
<br />
<a href="http://www.linuxfocus.org/English/July2003/article294.shtml">lf294, SystemAdministration: IDS - Intrusion Detection System, Part I</a>I<br />
... flaw exists in Microsoft Internet Information Server (IIS ... find in Advanced User's Guide Guide at:http://www.cs.columbia ... Packet Logger and Network Intrusion Detection System. In Sniffer mode ...<br />
<br />
<a href="http://itpapers.zdnet.com/abstract.aspx?promo=50002">Network- vs. Host-based Intrusion Detection: A Guide to Intrusion ..</a>.<br />
Network- vs. Host-based Intrusion Detection: A Guide to Intrusion Detection Technology. Source: Internet Security Systems. Date: October 1998. Pages: 10 ...<br />
<br />
<a href="http://www3.interscience.wiley.com:8100/WileyCDA/WileyTitle/productCd-0764549499,descCd-authorInfo.html?print=true">Pag</a>e with no title... but applies to Intrusion Detection<br />
... Implementing Intrusion Detection Systems: A Hands-On Guide for Securing the Network. Tim Crothers ... provider, and the author of Internet Lockdown. He developed the curriculum ...<br />
<br />
<a href="http://www.sciencedaily.com/cgi-bin/apf4/amazon_products_feed.cgi?Operation=ItemLookup&ItemId=0735712328">ScienceDaily Books : Inside Network Perimeter Security: The ..</a>.<br />
Network Intrusion Detection (3rd Edition); Hacking Exposed: Network Security ... Inside Network Perimeter Security is a practical guide to designing, ...<br />
<br />
<a href="http://www.cert.org/other_sources/books.html">Other Sources of Security Books and Article</a>s<br />
... in-notes/rfc1281.txt (1991) Internet Engineering Task Force, Site ... 1997) Kabay, Michel E. The NCSA Guide to Enterprise Security ... Northcutt, Stephen. Network Intrusion Detection: An Analyst's ...<br />
<br />
<a href="http://www.datacomsystems.com/datacom/info/ids.asp">Pag</a>e with no title... but applies to Intrusion Detection<br />
Datacom Systems Inc. is the leader in resource-sharing matrix switch technology and network taps. Our products leverage your investment in analyzers, probes, and intrusion detection devices. ... The firewall? 8. Implementation Guide. - What questions shoul<br />
<br />
<a href="http://www.sun.com/blueprints/1200/network-updt1.pdf">Solaris“ Operating Environment Network Settings for Securit</a>y<br />
... not as a step-by-step guide for attackers, but to ... systems on the local network. ICMP The Internet Control Message Protocol ... try to avoid a known network intrusion detection system by routing ...<br />
<br />
<a href="http://www.infosysinc.com/MRC/content/IT%20Security/Cisco/CiscoIOSOV.pdf">Cisco IOS Firewall Intrusion Detection Syste</a>m<br />
firewall functions and intrusion detection. for every network segment. ... such that Internet users connect to servers on the DMZ network to access public ...<br />
<br />
<a href="http://dir.yahoo.com/Computers_and_Internet/security_and_encryption">Computers and Internet > Security and Encryption in the Yahoo ..</a>.<br />
... downloads, and more. Home Network Security - overview of the ... gathers millions of intrusion detection log entries every day from ... League: Consumer Guide to Internet Safety, Privacy, and Security ...<br />
<br />
<a href="http://www.triviasecurity.net/library.php?C=7">Trivia Security - Librar</a>y<br />
... Three Worm Families and Their Propagation in a Network Trinoo analysis distributed denial of service ... Intrusion Detection Systems -Ebook Hacking guide 3.1 Breaking into computer networks from the Internet ...<br />
<br />
<a href="http://www.nwc.com/1021/1021ws1.html">Anatomy of a Network Intrusion | Page 1 | October 18, 199</a>9<br />
... of a Network Intrusion October 18 ... on IRC (Internet Relay Chat ... admin- guide-to-cracking.html). Network Computing published a similar article a few years ago (see "Intrusion Detection Provides a ...<br />
<br />
<a href="http://whitepapers.americasnetwork.com/plist/Intrusion-Detection-Systems.html">Intrusion Detection Systems Product and Vendor Guid</a>e<br />
Intrusion Detection Systems are a critical component of any network. ... Internet Defense and Detection System: Security Protection Beyond the Firewall ...<br />
<br />
<a href="http://www.icsalabs.com/html/communities/firewalls/index.shtml">TruSecure Corporation is the worldwide leader in Internet Security..</a>.<br />
Home Antivirus Firewalls IPSec Intrusion Detection Network Intrusion Prevention SSL-TLS Wireless PC Firewalls ... BUYER'S GUIDE. In order to...<br />
<br />
<a href="http://www.freeos.com/articles/3540">Intrusion Detection Systems, Part IV: Logchec</a>k<br />
... Mandrake 7.2 install guide * GRUB: Multi-boot ... Intrusion Detection Systems, Part IV: Logcheck By Trevor Warren ... midst of arms - Cicero Intrusion Detection Systems for your network: Part I Intrusion ...<br />
<br />
<a href="http://www.mynetwatchman.com/kb/security/ports/6/445.htm">myNetWatchman - Network Intrusion Detection and Reportin</a>g<br />
See: mNW Guide: Detecting Pubstro Activity...<br />
<br />
<a href="http://www.sss.co.nz/pdfs/iss/nvh_id.pdf">Network- vs. Host-based Intrusion Detectio</a>n<br />
Network- vs. Host-based Intrusion Detection. A Guide to Intrusion ... Network-based intrusion detection systems use raw network packets as the data source. ...<br />
<br />
<a href="http://btobsearch.barnesandnoble.com/booksearch/isbninquiry.asp?btob=Y&pwb=1&ean=9780735712324">Barnes & Noble.com - Inside Network Perimeter Security: The ..</a>.<br />
Network Intrusion Detection Stephen Northcutt, Judy Novak. •, Practical Unix & Internet Security Simon Garfinkel, Alan Schwartz, Gene Spafford ...<br />
<br />
<a href="http://www.computerworld.com/services/buyersguide/catlist/1,4892,,00.html">Computerworld Buyers' Guide — Get Liste</a>d<br />
... Firewall Vendors Internet Security Software Vendors Intrusion Detection Network Security Vendors ... Wireless Security Vendors Storage Buyers' Guide Cold Data Management Disk Storage Vendors ...<br />
<br />
<a href="http://www.owldigitalsecurity.com/return-on-investment-roi-check-appliance-program.htm">South Florida Internet Managed Security - Intrusion Detection / Link</a>s<br />
South Florida Internet managed security vision, intrusion detection and firewall installation ... VIRTUAL PRIVATE NETWORK) TRAINING ... South Florida Comedy - Guide to comedy in South ...<br />
<br />
<a href="https://www.securehq.com/shqbuyersguide.wml&sessionid=200132811363510950&storeid=1&id=8">Firewall Buyer's Guide and FA</a>Q<br />
For this reason, intrusion detection software and content filtering ... So for instance, say that your network is connected to the Internet via a DSL router ...<br />
<br />
<a href="http://www.networkmagazine.com/article/NMG20000830S0003">Network Magazine | Emerging Technology: Deploying an Effective ...</a> <br />
In this brave new Internet world, intrusion detection has become as ... While network-based intrusion detection is straightforward to implement and deploy, <br />
<br />
<hr color="#ff0000" /><span style="color: red; font-size: medium;">Advanced Reading Material about Intrusion Detection Systems ( mostly pdf and ps text files )</span><br />
<hr color="#ff0000" /><br />
<br />
<li><b>EMERALD: Event Monitoring Enabling Responses to Anomalous..</b> - Porras, Neumann (1997)<br />
...methodologies with over a decade of intrusion detection research and engineering experience. The<br />
tool suites. Keywords Network security, intrusion detection, coordinated attacks, anomaly detection,<br />
<a href="http://www2.csl.sri.com/emerald/Emerald-NISS97.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>A Sense of Self for Unix Processes</b> - Forrest, Hofmeyr, Somayaji.. (1996)<br />
...because most prior published work on intrusion detection has relied on either a much more complex<br />
Work There are two basic approaches to intrusion detection [16, 15]misuse intrusion detection and<br />
<a href="http://ftp.cs.unm.edu/pub/forrest/ieee-sp-96-unix.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>State Transition Analysis: A Rule-Based intrusion detection Approach</b> - Ilgun (1995)<br />
...1 State Transition Analysis: A Rule-Based intrusion detection Approach Koral Ilgun, Richard A.<br />
the overall design and functionality of this intrusion detection approach. Lastly, STAT is compared to the<br />
(MIDAS) 30] and the Network Anomaly detection and intrusion Reporter (NADIR) 11]MIDAS is a<br />
<a href="http://www.cs.ucsb.edu/%7Evigna/STAT/docs/stat-TSE.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>Bro: A System for Detecting Network Intruders in Real-Time</b> - Paxson (1998)<br />
...of detecting such attacks is termed network intrusion detection, a relatively new area of security<br />
though it is now increasingly used for intrusion detection [Ne99]1 However, the link is an FDDI<br />
<a href="http://ftp.ee.lbl.gov/papers/bro-CN99.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>Defending Against Denial of Service Attacks in Scout</b> - Spatscheck, Peterson (1999)<br />
...IP addresses could be rated by an intrusion detection system, with resources allocated according<br />
<a href="http://www2.cs.utah.edu/%7Ecs6935/osdi99/osdi99-spatscheck.ps">Click here to read this document</a><br />
</li><br />
<li><b>Computer Immunology</b> - Forrest, Hofmeyr, Somayaji (1996)<br />
...computer security systems. Many virus and intrusion detection methods scan only for known patterns<br />
novel means. Some exceptions include anomaly intrusion detection systems [2] and cryptographic checksums.<br />
<a href="http://www.cs.unm.edu/%7Eimmsec/publications/cacm96.ps">Click here to read this document</a><br />
</li><br />
<li><b>PNrule: A New Framework for Learning Classifier Models in..</b> - Agarwal, Joshi (2000)<br />
...in Data Mining (A Case-Study in Network intrusion detection) Ramesh Agarwal Mahesh V. Joshi y<br />
We applied the technique to the Network intrusion detection Problem (KDD-CUP'99)Our framework is<br />
<a href="http://www-users.cs.umn.edu/%7Emjoshi/papers/pnrule-tr.ps">Click here to read this document</a><br />
</li><br />
<li><b>Mobile Agents In intrusion detection And Response</b> - Jansen, Mell, Karygiannis.. (2000)<br />
...Mobile Agents In intrusion detection And Response 1 W. Jansen, P. Mell, T.<br />
Gaithersburg, MD 20815 Abstract Effective intrusion detection capability is an elusive goal, not solved<br />
<a href="http://www.itl.nist.gov/div893/staff/mell/maidr.pdf">Click here to read this document</a><br />
</li><br />
<li><b>intrusion detection using Sequences of System Calls</b> - Hofmeyr, Forrest, Somayaji (1998)<br />
...intrusion detection using Sequences of System Calls Steven A.<br />
security through the use of tools such as intrusion detection Systems (IDS)The IDS approach to<br />
<a href="http://www.cs.unm.edu/%7Esteveah/jcs-accepted.ps">Click here to read this document</a><br />
</li><br />
<li><b>An Immunological Model of Distributed detection and Its..</b> - Hofmeyr (1999)<br />
...and studies its performance in the domain of intrusion detection on computer networks. The goal of the<br />
Thirdly, the model is applied to network intrusion detection. The system monitors TCP traffic in a<br />
<a href="http://www.cs.unm.edu/%7Esteveah/steve_diss.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>intrusion detection in Wireless Ad-Hoc Networks</b> - Zhang, Lee (2000)<br />
... intrusion detection in Wireless Ad-Hoc Networks Yongguang<br />
lack of a clear line of defense. Many of the intrusion detection techniques developed on a xed wired<br />
<a href="http://www.wins.hrl.com/people/ygz/papers/mobicom00.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>A Preliminary Attempt to Apply detection and Estimation Theory..</b> - Axelsson (2000)<br />
...to Apply detection and Estimation Theory to intrusion detection Stefan Axelsson Department of Computer<br />
such a comparison, studying the problem of intrusion detection by the use of the introductory models of<br />
to compare computer security intrusion detection- intrusion detection for short-and the field of<br />
<a href="http://www.ce.chalmers.se/staff/sax/%20detection-model.ps">Click here to read this document</a><br />
</li><br />
<li><b>Radar-Based Intruder detection for a Robotic Security System</b> - Phil Cory Everett (1998)<br />
...platforms equipped with intrusion detection, barrier assessment, and inventory<br />
an integrated control station. The MDARS-E intrusion detection System consists of a motion sensor suite<br />
<a href="http://www.nosc.mil/robots/pubs/spie3525b.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Insertion, Evasion, and Denial of Service: Eluding Network..</b> - Ptacek, Newsham (1998)<br />
...and Denial of Service: Eluding Network intrusion detection Thomas H. Ptacek<br />
Abstract All currently available network intrusion detection (ID) systems rely upon a mechanism of data<br />
<a href="http://www.securityfocus.com/data/library/ids.ps">Click here to read this document</a><br />
</li><br />
<li><b>Research in intrusion- detection Systems: A Survey</b> - Axelsson (1998)<br />
...Research in intrusion- detection Systems: A Survey Stefan Axelsson<br />
research in the eld of computer and network intrusion detection. This paper presents such a survey, with a<br />
<a href="http://www.ce.chalmers.se/staff/sax/survey.ps">Click here to read this document</a><br />
</li><br />
<li><b>An Artificial Immune System for Network intrusion detection</b> - Kim<br />
...An Artificial Immune System for Network intrusion detection Jungwon Kim Department of Computer<br />
J.Kim@cs.ucl.ac.uk 1. Introduction An intrusion detection system (IDS) is an automated system for<br />
<a href="http://www.cs.ucl.ac.uk/staff/J.Kim/GECCO_WS99.ps">Click here to read this document</a><br />
</li><br />
<li><b>On a Difficulty of intrusion detection</b> - Axelsson (1999) <br />
...On a Difficulty of intrusion detection Stefan Axelsson Department of Computer<br />
Research in automated computer security intrusion detection, intrusion detection for short, is<br />
in automated computer security intrusion detection, intrusion detection for short, is maturing. Several<br />
<a href="http://www.ce.chalmers.se/staff/sax/raid99.ps">Click here to read this document</a><br />
</li><br />
<li><b>Building intrusion Tolerant Applications</b> - Wu, Malkin, Boneh (1999)<br />
...into a networked system one often installs intrusion detection software to monitor system behavior.<br />
<a href="http://crypto.stanford.edu/%7Edabo/papers/ittc.ps">Click here to read this document</a><br />
</li><br />
<li><b>intrusion detection</b> - Hawthorn <br />
...1 intrusion detection Emily K. Hawthorn, CISSP ekh@mitre.org<br />
l Background -Threats and Attacks l intrusion detection: Methods and Sample products l State of<br />
<a href="http://www.isse.gmu.edu/%7Ecsis/infs762/handouts/handout11.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Mining Audit Data to Build intrusion detection Models</b> - Lee, Stolfo, Mok (1998)<br />
...Mining Audit Data to Build intrusion detection Models #Wenke Lee and Salvatore J.<br />
a data mining framework for constructing intrusion detection models. The key ideas are to mine system<br />
<a href="http://www.csc.ncsu.edu/faculty/lee/papers/kdd98.ps">Click here to read this document</a><br />
</li><br />
<li><b>intrusion detection Systems: A Survey and Taxonomy</b> - Axelsson (2000)<br />
...intrusion detection Systems: A Survey and Taxonomy Stefan<br />
Abstract This paper presents a taxonomy of intrusion detection systems that is then used to survey and<br />
<a href="http://www.ce.chalmers.se/staff/sax/taxonomy.ps">Click here to read this document</a><br />
</li><br />
<li><b>CEDMOS: Complex Event detection and Monitoring System</b> - Baker, Cassandra, Rashid (1999)<br />
.... 36 4.4.1 Network intrusion detection .36 4.4.2<br />
stock price patterns) or security (e.g. intrusion detection) are two of the many alternative domains<br />
<a href="http://www.mcc.com/cmi/publications/unclas-techreports/CEDMOS/MCC-CEDMOS-002-99.ps">Click here to read this document</a><br />
</li><br />
<li><b>intrusion detection Product Evaluation Criteria</b> - Lodin (1998)<br />
...Lodin Steven.Lodin@ey.com October 1998 intrusion detection Product Evaluation Criteria Abstract<br />
Product Evaluation Criteria Abstract intrusion detection systems (also known as ID systems or IDS<br />
<a href="http://members.iquest.net/%7Eswlodin/IDS_Prod_Eval_Criteria.ps">Click here to read this document</a><br />
</li><br />
<li><b>intrusion detection Systems and A View To Its Forensic..</b> - The University Of <br />
...intrusion detection Systems and A View To Its Forensic<br />
forensic application within the framework of intrusion detection and details work accomplished on a<br />
<a href="http://www.securityfocus.com/data/library/idsforensics.ps">Click here to read this document</a><br />
</li><br />
<li><b>An Artificial Immune Model for Network intrusion detection</b> - Kim, Bentley<br />
...An Artificial Immune Model for Network intrusion detection Jungwon Kim and Peter Bentley Department<br />
This paper investigates the subject of intrusion detection over networks. Existing network-based<br />
<a href="http://www.cs.ucl.ac.uk/staff/J.Kim/EUFITaimmune.ps">Click here to read this document</a><br />
</li><br />
<li><b>Why Enterprises Need More than Firewalls and..</b> - Vandenwauver.. (1999)<br />
...Why Enterprises Need More than Firewalls and intrusion detection Systems Mark Vandenwauver Calin Vaduva<br />
Active Content, Firewall, Intranet, intrusion detection Systems, Java, JavaScript. 1.<br />
<a href="http://www.esat.kuleuven.ac.be/%7Ejoclaess/pub/wetice99.ps.gz">Click here to read this document</a><br />
<br />
</li><br />
<li><b>An Analysis of the 1999 DARPA/Lincoln Laboratory</b> - Evaluation Data For <br />
...1999 DARPA/MIT Lincoln Laboratory off-line intrusion detection evaluation data set. A statistical<br />
future attacks (if we can, we do not need intrusion detection)Hence, anomaly detection is usually<br />
<a href="http://www.cs.fit.edu/%7Emmahoney/paper7.pdf">Click here to read this document</a><br />
</li><br />
<li><b>A Tamper-Resistant Framework for Unambiguous detection of..</b> - Space Using Process <br />
...More complicated services are provided by intrusion detection systems, network management systems, etc.<br />
rather than across nodes on a network. 2.2. intrusion detection Techniques The various facets central to<br />
<a href="http://www.cse.buffalo.edu/%7Eshambhu/resume/iwia03shambhu031.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Towards the Scalable Implementation of a</b> - User Level Anomaly <br />
...and Kevin Kwiat Abstract-Traditional intrusion detection systems can be broadly classified as<br />
I. U) INTRODUCTION large number of intrusion detection systems have been deployed with varying<br />
<a href="http://www.cse.buffalo.edu/%7Eshambhu/resume/milcom02.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Adapting Query Optimization Techniques for Efficient intrusion..</b> - Ning, Xu (2002) <br />
...dxu@unity.ncsu.edu Abstract Traditional intrusion detection systems (IDS) focus on low-level attacks<br />
constraint 1 Introduction Traditional intrusion detection systems (IDS) focus on low-level attacks<br />
<a href="http://ftp.csc.ncsu.edu/pub/tech/2002/TR-2002-13.ps.Z">Click here to read this document</a><br />
</li><br />
<li><b>Activity Profiles for intrusion detection</b> - Kohout Yasinsac Mcdue <br />
...1 Activity Profiles for intrusion detection L.J. Kohout, A. Yasinsac, E. McDu#e<br />
here a methodology to perform behavior-based intrusion detection on security protocols using fuzzy<br />
<a href="http://www.cs.fsu.edu/%7Eyasinsac/Papers/KYM02.pdf">Click here to read this document</a><br />
</li><br />
<li><b>A Geometric Framework for Unsupervised Anomaly</b> - detection Detecting intrusions <br />
...Abstract Most current intrusion detection systems employ signature-based methods or<br />
Labs DARPA evaluation. 1 Introduction intrusion detection systems (IDSs) are an integral part of any<br />
<a href="http://www1.cs.columbia.edu/ids/publications/uad-dmsa02.ps">Click here to read this document</a><br />
</li><br />
<li><b>An Overview of Issues in Testing intrusion detection</b> - Systems Authors National <br />
...1 An Overview of Issues in Testing intrusion detection Systems 1 Authors :National Institute of<br />
Josh Haines, Marc Zissman Abstract While intrusion detection systems are becoming ubiquitous defenses<br />
<a href="http://csrc.nist.gov/publications/nistir/nistir-7007.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Analyzing Intensive intrusion Alerts Via Correlation</b> - Peng Ning Yun (2002) <br />
...reeves@csc.ncsu.edu Abstract. Traditional intrusion detection systems (IDSs) focus on low-level attacks<br />
Used In The Def Con 8 Ctf Event. Key Words: intrusion detection, Alert Correlation, Attack Scenario<br />
<a href="http://ftp.csc.ncsu.edu/pub/tech/2002/TR-2002-04.ps.Z">Click here to read this document</a><br />
</li><br />
<li><b>Constructing Attack Scenarios through Correlation of..</b> - Ning, Cui, Reeves (2002)<br />
...reeves@csc.ncsu.edu ABSTRACT Traditional intrusion detection systems (IDSs) focus on lowlevel attacks<br />
evaluation of our method with the 2000 DARPA intrusion detection scenario specific datasets. Our experience<br />
<a href="http://discovery.csc.ncsu.edu/%7Epning/pubs/ccs02.pdf">Click here to read this document</a><br />
</li><br />
<li><b>intrusion detection with Unlabeled Data Using Clustering</b> - Leonid Portnoy Eleazar (2001)<br />
...intrusion detection with Unlabeled Data Using Clustering<br />
Eskin (eeskin@cs.columbia.edu) Keywords: intrusion detection, anomaly detection, clustering, unlabeled<br />
<a href="http://www1.cs.columbia.edu/ids/publications/cluster-ccsdmsa01.ps">Click here to read this document</a><br />
</li><br />
<li><b>Network Traffic Anomaly detection Based on Packet Bytes..</b> - Florida Institute Of <br />
...traffic. 1. INTRODUCTION Network intrusion detection systems are classified as signature based<br />
to hide an attack from an improperly coded intrusion detection system (IDS) monitoring the application<br />
<a href="http://www.cs.fit.edu/%7Emmahoney/paper6.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Analysis of Distributed intrusion detection Systems</b> - Using Bayesian Methods <br />
...Analysis of Distributed intrusion detection Systems Using Bayesian Methods Daniel J.<br />
and network security, standard approaches to intrusion detection and response attempt to detect and prevent<br />
</li><br />
<li><a 608327.="" citeseer.ist.psu.edu="" href="http://thayer.dartmouth.edu/%7Elwilson/ipccc.final.pdf%3C/font%3E%3Cbr%3E%3Cbr%3E%3Ca%20href=" http:=""><b>A Domain-Specific String Matching Algorithm for..</b> - Anagnostakis.. (2003)</a> <br />
...String Matching Algorithm for intrusion detection K. G. Anagnostakis S. Antonatos<br />
the problem of string matching in Network intrusion detection Systems (NIDSes)String matching<br />
<a href="http://www.cis.upenn.edu/%7Eanagnost/papers/e2xb-2col.pdf">Click here to read this document</a><br />
</li><br />
<li><b>An intrusion Response Scheme:</b> - Alert (2002) <br />
...nature of the detected attack. That is why intrusion detection Systems (ID Systems) and intrusion<br />
to demonstrate its efficiency. Keywords intrusion detection and Response Systems, Mobile Agents,<br />
Pooch. Adaptation techniques for intrusion detection and intrusion response system. Proceedings of the IEEE<br />
<a href="http://cui.unige.ch/pub/tios/papers/SEMAS2002.pdf"> Click here to read this document</a><br />
</li><br />
<li><b>Reliable detection of Episodes in Event Sequences</b> - Gwadera, Atallah, Szpankowski (2003) <br />
...to many applications, that include intrusion detection, monitoring for suspicious activities, and<br />
[8] applied subsequence pattern matching to intrusion detection. Atallah and Apostolico [2] designed a<br />
<a href="http://www.cs.purdue.edu/homes/spa/papers/gwadera.ps">Click here to read this document</a><br />
<br />
</li><br />
<li><b>Learning Rules for Anomaly detection of Hostile Network Traffic</b> - Matthew Mahoney And <br />
...in the 1999 DARPA/Lincoln Laboratory intrusion detection evaluation, and detected most attacks that<br />
important component of computer security is intrusion detection-knowing whether a system has been<br />
<a href="http://www.cs.fit.edu/%7Emmahoney/paper9.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Adaptive Model Generation: An Architecture for Deployment of</b> - Data Mining-Based intrusion <br />
...for Deployment of Data Mining-based intrusion detection Systems Andrew Honig, Andrew Howard,<br />
Abstract Data mining-based intrusion detection systems (IDSs) have signi cant advantages<br />
<a href="http://www1.cs.columbia.edu/ids/publications/amg-dmsa02.ps">Click here to read this document</a><br />
</li><br />
<li><b>Survey of intrusion detection Research</b> - Lundin, Jonsson (2002) <br />
...Survey of intrusion detection Research Emilie Lundin and Eftand<br />
holds a great deal of research in the intrusion detection area. Much of this describes the design<br />
<a href="http://www.ce.chalmers.se/staff/emilie/papers/Lundin_survey02.pdf">Click here to read this document</a><br />
</li><br />
<li><b>A Database of Computer Attacks for the Evaluation of..</b> - detection Systems.. <br />
...of Computer Attacks for the Evaluation of intrusion detection Systems by Kristopher Kendall Submitted<br />
<a href="http://www.kkendall.org/files/thesis/krkthesis.pdf">Click here to read this document</a><br />
</li><br />
<li><b>An intrusion Alert Correlator Based on Prerequisites of intrusions</b> - Ning, Cui (2002)<br />
...ycui4@eos.ncsu.edu Abstract Current intrusion detection systems (IDSs) usually focus on detecting<br />
Our experiments with the DARPA 2000 intrusion detection evaluation datasets have demonstrated the<br />
<a href="http://ftp.csc.ncsu.edu/pub/tech/2002/TR-2002-01.ps.Z">Click here to read this document</a><br />
</li><br />
<li><b>Constructing Attack Scenarios through Correlation of</b> - intrusion Alerts Peng (2002) <br />
...reeves@csc.ncsu.edu Abstract Traditional intrusion detection systems (IDSs) focus on low-level attacks<br />
evaluation of our method with the 2000 DARPA intrusion detection scenario specific datasets. Our experience<br />
<a href="http://ftp.csc.ncsu.edu/pub/tech/2002/TR-2002-12.ps.Z">Click here to read this document</a><br />
</li><br />
<li><b>Storage-based intrusion detection: Watching..</b> - Pennington.. (2003)<br />
...Wasington, DC. August 2003. Storage-based intrusion detection: Watching storage activity for suspicious<br />
Mellon University Abstract Storage-based intrusion detection allows storage systems to watch for data<br />
<a href="http://www.pdl.cmu.edu/PDL-FTP/Secure/usenix03.ps">Click here to read this document</a><br />
</li><br />
<li><b>PHAD: Packet Header Anomaly detection for Identifying..</b> - Matthew Mahoney And (2001)<br />
...ICMP protocols. On the 1999 DARPA off-line intrusion detection evaluation data set (Lippmann et al.<br />
of events. 1. Introduction Most network intrusion detection systems (IDS) that use anomaly detection<br />
<a href="http://www.cs.fit.edu/%7Emmahoney/paper3.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Multiscale Stepping-Stone detection: Detecting..</b> - Donoho, Flesia.. (2002)<br />
...connections. Key Words and Phrases. Network intrusion detection. Evasion. Stepping Stone. Interactive<br />
<a href="http://www.cs.berkeley.edu/%7Eushankar/research/stepping/raid-multiscale.pdf">Click here to read this document</a><br />
</li><br />
<li><b>A Comparison Of Input Representations In Neural Networks..</b> - Liu, Florez, Bridges (2002)<br />
...In Neural Networks: A Case Study In intrusion detection Zhen Liu, German Florez and Susan M.<br />
bridges@cs.msstate.edu Abstract- Recently intrusion detection techniques have shifted from user-based<br />
<a href="http://www.cs.msstate.edu/%7Ebridges/papers/IJCNN2002.pdf">Click here to read this document</a><br />
</li><br />
<li><b>An Improved Algorithm for Fuzzy Data Mining</b> - For intrusion detection (2002) <br />
...Improved Algorithm for Fuzzy Data Mining for intrusion detection German Florez, Susan M. Bridges, and<br />
patterns that represent normal behavior for intrusion detection. In this paper we describe a variety of<br />
<a href="http://www.cs.msstate.edu/%7Ebridges/papers/nafips2002a.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Fuzzy Data Mining And Genetic Algorithms Applied To intrusion..</b> - Bridges (2000) <br />
...Mining And Genetic Algorithms Applied To intrusion detection Susan M. Bridges, Associate Professor<br />
We are developing a prototype intelligent intrusion detection system (IIDS) to demonstrate the<br />
<a href="http://www.cs.msstate.edu/%7Ebridges/papers/nissc2000.pdf">Click here to read this document</a><br />
</li><br />
<li><b>detection and Handling of MAC Layer Misbehavior in Wireless..</b> - Kyasanur, Vaidya (2002)<br />
...that help detect or discourage misbehavior. intrusion detection and tolerance techniques are used as a<br />
and tolerating misbehavior [19, 3, 16, 7] intrusion detection approaches are based on developing a<br />
<a href="http://www.crhc.uiuc.edu/%7Enhv/papers/misbehave.pdf">Click here to read this document</a><br />
</li><br />
<li><b>A Target-Centric Ontology for intrusion detection</b> - Pinkston, Undercoffer.. <br />
...A Target-Centric Ontology for intrusion detection John Pinkston, Jeffrey Undercoffer,<br />
a use case scenario of a distributed intrusion detection system. 1 Introduction Based upon<br />
<a href="http://umbc.edu/%7Efinin/papers/ijcai03ontologyWorkshop.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Fast and Scalable Conflict detection for Packet Classifiers</b> - Baboescu, Varghese (2002)<br />
...of these applications, some service (e.g. intrusion detection, stateful filtering, or CRM) may<br />
<a href="http://www.cs.ucsd.edu/%7Ebaboescu/research/icnp2002.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Feature Ranking and Selection for intrusion detection Systems ..</b> - Mukkamala, Sung (2002) <br />
...Feature Ranking and Selection for intrusion detection Systems Using Support Vector Machines<br />
Socorro, New Mexico 87801 ABSTRACT intrusion detection is a critical component of secure<br />
</li><br />
<li><a 582512.="" citeseer.ist.psu.edu="" href="http://www.dfrws.org/dfrws2002/papers/Papers/Srinivas_Mukkamala.pdf%3C/font%3E%3Cbr%3E%3Cbr%3E%3Ca%20href=" http:=""><b>Indra: A Peer-to-Peer Approach to Network intrusion..</b> - Janakiraman.. (2003)</a><br />
...Indra: A peer-to-peer approach to network intrusion detection and prevention Ramaprabhu Janakiraman<br />
in a scalable manner. I. INTRODUCTION A. intrusion detection Systems intrusion is the act or attempted<br />
<a href="http://www.arl.wustl.edu/%7Erama/papers/janakiraman03indra.PDF">Click here to read this document</a><br />
</li><br />
<li><b>An Architecture for an Adaptive intrusion-Tolerant Server</b> - Valdes, Almgren.. (2002)<br />
...management components based on the EMERALD intrusion detection framework. Integrity and availability are<br />
service. 1 Introduction The deployment of intrusion- detection technology on mission-critical and<br />
<a href="http://www.ce.chalmers.se/%7Ealmgren/Publications/cambridge.pdf">Click here to read this document</a><br />
</li><br />
<li><b>A Framework For An Adaptive intrusion detection System With..</b> - Hossain, Bridges (2001) <br />
...A Framework For An Adaptive intrusion detection System With Data Mining Mahmood Hossain<br />
ABSTRACT The goal of a network-based intrusion detection system (IDS) is to identify patterns of<br />
<a href="http://www.cs.msstate.edu/%7Ebridges/papers/citss-2001.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Characterizing the Performance of Network intrusion ..</b> - Schaelicke.. (2003)<br />
...Characterizing the Performance of Network intrusion detection Sensors Lambert Schaelicke, Thomas<br />
of Notre Dame 1 Abstract. Network intrusion detection systems (NIDS) are becoming an important<br />
<a href="http://www.cse.nd.edu/%7Elambert/pdf/nids_raid03.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Next Generation intrusion detection Expert System..</b> - Anderson, Frivold.. (1994)<br />
...Manual December 1, 1994 Next Generation intrusion detection Expert System (NIDES) Software Users<br />
Chapter 1 Introduction The Next Generation intrusion detection Expert System (NIDES) is powerful<br />
<a href="http://www.sdl.sri.com/nides/reports/7sri.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Hardening COTS Software with Generic Software Wrappers</b> - Fraser, Badger, Feldman (1999)<br />
...that is known to cause harm (access control, intrusion detection)In some cases, the application source<br />
systems and server applications to support intrusion detection [17, 23, 20, 21, 11, 12, 22]maintain<br />
<a href="http://ftp.tislabs.com/pub/wrappers/papers/wrap-oak99.ps">Click here to read this document</a><br />
</li><br />
<li><b>Data Mining Approaches for intrusion detection</b> - Lee, Stolfo (1998)<br />
...Data Mining Approaches for intrusion detection Wenke Lee Salvatore J. Stolfo Computer<br />
general and systematic methods for intrusion detection. The key ideas are to use data mining<br />
<a href="http://www.cs.columbia.edu/%7Ewenke/papers/usenix.ps">Click here to read this document</a><br />
</li><br />
<li><b>Ustat : A Real-time intrusion detection System for Unix</b> - Ilgun (1992)<br />
...CALIFORNIA Santa Barbara USTAT A Real-time intrusion detection System for UNIX A Thesis submitted in<br />
left blank vi ABSTRACT Ustat A Real-time intrusion detection System for UNIX by Koral Ilgun This thesis<br />
<a href="http://www.ce.chalmers.se/%7Estefanp/Security/ustat_int_det.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>An Architecture for intrusion detection using..</b> - Balasubramaniyan.. (1998)<br />
...An Architecture for intrusion detection using Autonomous Agents Jai Sundar<br />
Abstract The intrusion detection System architectures commonly used in<br />
those limitations. 1.1. intrusion detection intrusion detection (ID) is defined [15] as "the<br />
<a href="http://www.cerias.purdue.edu/homes/zamboni/pubs/aafid-acsac98.ps">Click here to read this document</a><br />
</li><br />
<li><b>Detecting intrusions Using System Calls: Alternative..</b> - Warrender, Forrest.. (1998)<br />
...October 25, 1998 Abstract intrusion detection systems rely on a wide variety of<br />
1996, Forrest and others introduced a simple intrusion detection method based on monitoring the system<br />
same approach cannot be used for intrusion detection. intrusion traces generally resemble normal traces in<br />
<a href="http://www.cs.unm.edu/%7Eimmsec/publications/oakland-with-submit-info.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>JAM: Java Agents for Meta-Learning over Distributed Databases</b> - Stolfo, Tselepis, Lee, Fan (1997)<br />
...of JAM's target applications is fraud and intrusion detection in financial information systems. A brief<br />
agents, machine learning, fraud and intrusion detection, financial information systems. This<br />
<a href="http://cs.fit.edu/%7Epkc/papers/kdd97-jam.ps">Click here to read this document</a><br />
</li><br />
<li><b>Automated detection of Vulnerabilities in Privileged..</b> - Ko, Fink, Levitt (1994)<br />
...the programs. Our work is motivated by the intrusion detection paradigm, but is an attempt to avoid ad<br />
by our method. Our approach is a variant of intrusion detection [6]wherein audit trails are analyzed in<br />
<a href="http://seclab.cs.ucdavis.edu/papers/kfl94.ps">Click here to read this document</a><br />
</li><br />
<li><b>A Pattern Matching Model for Misuse intrusion detection</b> - Kumar, Spafford (1994)<br />
...A Pattern Matching Model For Misuse intrusion detection Sandeep Kumar Eugene H. Spafford The<br />
fkumar,spafg@cs.purdue.edu Keywords: intrusion detection, misuse, anomaly. Abstract This paper<br />
<a href="http://irdu.nus.sg/security/papers/ncsc.ps%3C/font%3E%3C/span%3E%3C/p%3E%3Cp%3E%3Cspan%20class=" m=""><br />
</a></li><br />
<li><b>Using Program Behavior Profiles for intrusion detection</b> - Ghosh, Schwartzbard, Schatz (1999)<br />
...Schatz. Using program behavior profiles for intrusion detection. In Proceedings of the SANS Third<br />
of the SANS Third Conference and Workshop on intrusion detection and Respons, San Diego, CA, February 1999.<br />
<a href="http://www.rstcorp.com/%7Eanup/sans_id99.pdf">Click here to read this document</a><br />
</li><br />
<li><b>State of the Practice of intrusion detection Technologies</b> - Allen, al. (2000)<br />
...State of the Practice of intrusion detection Technologies Julia Allen Alan Christie<br />
PA 15213-3890 State of the Practice of intrusion detection Technologies CMU/SEI-99-TR-028<br />
<a href="http://www.sei.cmu.edu/pub/documents/99.reports/pdf/99tr028.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Software Fault Tree and Colored Petri Net Based..</b> - Helmer, Wong.. (2001) <br />
...Design and Implementation of Agent-Based intrusion detection Systems Guy Helmer Johnny Wong<br />
for use as a design specication for an intrusion detection System (IDS)Hierarchical CPNs are<br />
1994. 2] Edward Amoroso. intrusion detection. intrusion.Net Books, Sparta, NJ, USA, 1999. 3] J.<br />
<a href="http://latte.cs.iastate.edu/%7Eghelmer/CPN-IDS.ps">Click here to read this document</a><br />
</li><br />
<li><b>A Software Fault Tree Approach to Requirements..</b> - Helmer, Wong.. (2000)<br />
...Tree Approach to Requirements Analysis of an intrusion detection System Guy Helmer, Johnny Wong, Mark<br />
identication and analysis in an intrusion detection System (IDS) is described. intrusions are<br />
<a href="http://latte.cs.iastate.edu/%7Eghelmer/SFTA-ID.ps">Click here to read this document</a><br />
</li><br />
<li><b>Learning Cost-Sensitve Classification Rules for Network intrusion ..</b> - Miller (1999) <br />
...Classification Rules for Network intrusion detection using RIPPER Technical Report<br />
system for automating the process of network intrusion detection is currently underway as part of the JAM<br />
<a href="http://www.cs.columbia.edu/ids/publications/cucs-035-1999.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Toward Cost-Sensitive Modeling for intrusion detection ..</b> - Lee, Fan, Miller.. (2000)<br />
...Toward Cost-Sensitive Modeling for intrusion detection and Response Wenke Lee Computer Science<br />
Abstract intrusion detection systems (IDSs) must maximize the<br />
<a href="http://www.cs.columbia.edu/ids/publications/wenke-acmccs2k-cost.pdf">Click here to read this document</a><br />
</li><br />
<li><b>An Application of Pattern Matching in intrusion detection</b> - Kumar, Spafford (1994)<br />
...An Application of Pattern Matching in intrusion detection Technical Report CSD#TR#94#013 Sandeep<br />
characteristics of signatures used in misuse intrusion detection. E#cient algorithms to match patterns in<br />
<a href="http://www.cs.umbc.edu/cadip/docs/Network%20intrusion/pattern.pdf">Click here to read this document</a><br />
</li><br />
<li><b>An Architecture for intrusion detection using..</b> - Balasubramaniyan.. (1998)<br />
...An Architecture for intrusion detection using Autonomous Agents Jai Sundar<br />
Report 98/05 June 11, 1998 Abstract The intrusion detection System architectures commonly used in<br />
those limitations. 1.1 intrusion detection intrusion detection (ID) is de ned [16] as \the<br />
<a href="http://www.cs.umbc.edu/cadip/docs/Network%20intrusion/tr9805.ps">Click here to read this document</a><br />
</li><br />
<li><b>A Methodology for Using Intelligent Agents to provide..</b> - Jr, Hill, Surdu (2000)<br />
...computer attacks is growing. Unfortunately, intrusion detection and response systems have not kept up with<br />
kept up with the increasing threat. Current intrusion detection systems (IDSs) have limited response<br />
focused on better techniques for intrusion detection, intrusion response remains principally a manual<br />
<a href="http://www.itoc.usma.edu/marin/Wshop/Papers2000/TP1_1.pdf">Click here to read this document</a><br />
</li><br />
<li><b>intrusion detection Applying Machine Learning to Solaris Audit Data</b> - Endler (1998)<br />
...intrusion detection Applying Machine Learning to Solaris Audit<br />
LA 70118 endler@eecs.tulane.edu Abstract An intrusion detection System (IDS) seeks to identify<br />
research. 2 Machine Learning and intrusion detection intrusion detection systems that are trained on<br />
<a href="http://www.cs.umbc.edu/cadip/docs/Network%20intrusion/endler98.ps">Click here to read this document</a><br />
</li><br />
<li><b>Adaptation Techniques for intrusion detection and..</b> - Ragsdale, Carver.. (2000)<br />
...Adaptation Techniques for intrusion detection and intrusion Response Systems Daniel J.<br />
techniques for providing adaptation in intrusion detection and intrusion response systems. As<br />
Adaptation Techniques for intrusion detection and intrusion Response Systems Daniel J. Ragsdale<br />
<a href="http://www.itoc.usma.edu/ragsdale/pubs/adapt.pdf">Click here to read this document</a><br />
</li><br />
<li><b>A Large-scale Distributed intrusion detection Framework Based..</b> - Huang, Wicks (1998)<br />
...Page 1 A Large-scale Distributed intrusion detection Framework Based on Attack Strategy<br />
division and coordination amongst various intrusion detection Systems (IDS) must be addressed. An<br />
<a href="http://www.cs.umbc.edu/cadip/docs/Network%20intrusion/huang_text.pdf">Click here to read this document</a><br />
</li><br />
<li><b>A Data Mining Framework for Building intrusion detection Models</b> - Lee, Stolfo, Mok (1999)<br />
...A Data Mining Framework for Building intrusion detection Models #Wenke Lee Salvatore J. Stolfo Kui<br />
is often the need to update an installed intrusion detection System (IDS) due to new attack methods or<br />
<a href="http://www.cs.umbc.edu/cadip/docs/Network%20intrusion/ieee_sp99_lee.ps">Click here to read this document</a><br />
</li><br />
<li><b>Probabilistic Approaches to Fraud detection</b> - Hollmén (1999) <br />
.... 6 1.3.2 intrusion detection on Computer Systems .7 1.3.3<br />
such as credit card fraud detection and intrusion detection in computer systems are reviewed. In<br />
related fields such as credit card fraud detection and intrusion detection in computer systems are<br />
<a href="http://www.cis.hut.fi/jhollmen/Publications/Hollmen99b.ps">Click here to read this document</a><br />
</li><br />
<li><b>JiNao: Design and Implementation of a Scalable..</b> - Wu, Chang, Jou..<br />
...Design and Implementation of a Scalable intrusion detection System for the OSPF Routing Protocol S.<br />
developed by SRI's NIDES (Next-generation intrusion detection Expert System) project. Some modifications<br />
<a href="http://www.anr.mcnc.org/projects/JiNao/JiNaoJournal.ps">Click here to read this document</a><br />
</li><br />
<li><b>DEMIDS: Misuse detection System Database Systems</b> - Chung, Gertz, Levitt (1999)<br />
...both insider abuse and intrusion. 2 intrusion detection System IDS is often used instead of MDS.<br />
J. Stolfo. Data mining approaches for intrusion detection. In Proceedings of the 7th USENIX Security<br />
<a href="http://www.cs.umbc.edu/cadip/docs/Network%20intrusion/IFIP99.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Adaptive Model Generation for intrusion detection Systems</b> - Eskin, Miller, Zhong.. (2000)<br />
...Adaptive Model Generation for intrusion detection Systems Eleazar Eskin, Matthew Miller,<br />
detection models for data-mining based intrusion detection systems. Using the same data collected by<br />
<a href="http://www.cs.columbia.edu/ids/publications/adaptive-ccsids00.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Mining in a Data-flow Environment: Experience in Network..</b> - Lee, Stolfo, Mok (1999)<br />
...Data-flow Environment: Experience in Network intrusion detection Wenke Lee Salvatore J. Stolfo Kui W. Mok<br />
forms for analysis tasks. Using network intrusion detection as a concrete application example, we<br />
execution. 2 Data Mining and intrusion detection intrusions are actions that aim to compromise the<br />
<a href="http://www.cs.umbc.edu/cadip/docs/Network%20intrusion/kdd99.ps">Click here to read this document</a><br />
</li><br />
<li><b>Anomaly detection over Noisy Data using Learned Probability..</b> - Eskin (2000)<br />
...anomaly detection technique is applied to intrusion detection by examining intrusions manifested as<br />
Anomaly detection is an important problem in intrusion detection (Denning, 1987) intrusion detection is<br />
<a href="http://www.cs.columbia.edu/ids/publications/anomaly-icml00.ps">Click here to read this document</a><br />
</li><br />
<li><b>Design and Implementation of a Scalable intrusion detection..</b> - Jou Gong Sargor (2000)<br />
...Design and Implementation of a Scalable intrusion detection System for the Protection of Network<br />
and experimentation of the JiNao intrusion detection system (IDS) which focuses on the<br />
<a href="http://www.anr.mcnc.org/projects/JiNao/jouy_reviewed.ps">Click here to read this document</a><br />
</li><br />
<li><b>Toward Cost-Sensitive Modeling for intrusion detection ..</b> - Lee, Fan, Miller.. (2000)<br />
...Toward Cost-Sensitive Modeling for intrusion detection and Response Wenke Lee Computer Science<br />
Abstract intrusion detection systems (IDSs) must maximize the<br />
<a href="http://www.csc.ncsu.edu/faculty/lee/papers/cost_modeling.ps">Click here to read this document</a><br />
</li><br />
<li><b>A Framework for Constructing Features and Models for intrusion..</b> - Lee, Stolfo (2000)<br />
...for Constructing Features and Models for intrusion detection Systems Wenke Lee North Carolina State<br />
and Salvatore J. Stolfo Columbia University intrusion detection (ID) is an important component of<br />
<a href="http://www.csc.ncsu.edu/faculty/lee/papers/ids_framework.ps">Click here to read this document</a><br />
</li><br />
<li><b>intrusion detection for an On-Going Attack</b> - Yuill, Wu, Gong, al. (1999)<br />
...intrusion detection for an On-Going Attack Jim Yuill<br />
and Tech. The Boeing Company Abstract An intrusion- detection system (IDS) for an on-going attack is<br />
<a href="http://www.cerias.purdue.edu/raid/proceedings/1999/more/yuill.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Handling Generic intrusion Signatures is not Trivial</b> - Pouzol, Ducassé (2000)<br />
...copy will give the privileges of x 1 An intrusion detection system (IDS) based on a misuse detection<br />
report" at RAID 2000 (Recent Advances in intrusion detection)Toulouse, 2-4 october 2000. 1 This<br />
<a href="http://www.irisa.fr/lande/ducasse/pouzol-ducasse-raid2000.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>STATL: An Attack Language for State-based intrusion detection</b> - Eckmann, Vigna, Kemmerer (2000)<br />
...STATL: An Attack Language for State-based intrusion detection Steven T. Eckmann Giovanni Vigna Reliable<br />
description language designed to support intrusion detection. The language allows one to describe<br />
<a href="http://www.cs.ucsb.edu/%7Evigna/pub/eckmann_vigna_kemmerer_statl.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>A Comprehensive Simulation Platform For intrusion detection In ..</b> - Mantha, Kwiat <br />
...A Comprehensive Simulation Platform For intrusion detection In Distributed Systems K. Mantha, R.<br />
Computer security, distributed systems, intrusion detection, simulation ABSTRACT This paper 1<br />
<a href="http://www.cse.buffalo.edu/%7Eshambhu/resume/simconcr.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>On the Fundamentals of Analysis and detection of Computer Misuse</b> - Lindqvist (1999)<br />
...a network server and data produced for an intrusion detection evaluation project. Throughout this work,<br />
taxonomy, intrusion, vulnerability, risk, intrusion detection. iv This page is intentionally left<br />
<a href="http://www.ce.chalmers.se/staff/ulfl/pubs/ul-phd.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Dealing with False Positives in intrusion detection</b> - Julisch (2000)<br />
...Dealing with False Positives in intrusion detection Type of submission Extended Abstract<br />
system and network security (in particular intrusion detection)Klaus holds an M.Sc. from the<br />
<a href="http://www.raid-symposium.org/raid2000/Materials/Abstracts/50/50.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Benchmarking a distributed intrusion detection system..</b> - Abily, Ducassé (2000) <br />
...Benchmarking a distributed intrusion detection system based on ASAX: Preliminary results<br />
feasibility of a sophisticated distributed intrusion detection system #DIDS#Indeed, informal<br />
<a href="http://www.raid-symposium.org/raid2000/Materials/Abstracts/59/59.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Attack Languages</b> - Vigna, Eckmann, Kemmerer<br />
...of California Santa Barbara, CA 93106 intrusion detection systems (IDSs) play an important role in<br />
of information systems. The goal of intrusion detection systems is to identify malicious behavior<br />
<a href="http://www.cs.ucsb.edu/%7Evigna/pub/vigna_eckmann_kemmerer_attacklanguages.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>IDS/A: An Interface between intrusion detection System and..</b> - Hutchison, Welz (2000) <br />
...IDS/A: An Interface between intrusion detection System and Application Andrew Hutchison<br />
the effectiveness of a conventional network intrusion detection system. These problems are the result of<br />
<a href="http://www.raid-symposium.org/raid2000/Materials/Abstracts/21/21.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Supporting intrusion detection by Graph Clustering and Graph..</b> - Tolle, Niggemann (2000) <br />
...Supporting intrusion detection by Graph Clustering and Graph Drawing<br />
acts as an anomaly detection component of an intrusion detection System. Events are generated in the case<br />
<a href="http://www.raid-symposium.org/raid2000/Materials/Abstracts/22/22.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Ntop: a Lightweight Open-Source Network IDS</b> - Deri <br />
...network security by adding a network-based intrusion detection system (NIDS) able to detect potentially<br />
and security network architecture. Keywords: intrusion detection, Network Monitoring and Security, Internet<br />
<a href="http://jake.unipi.it/%7Ederi/LightweightIDS.pdf">Click here to read this document</a><br />
</li><br />
<li><b>intrusion detection with Neural Networks</b> - Ryan, Lin, Miikkulainen (1998)<br />
...intrusion detection with Neural Networks Jake Ryan<br />
monitoring unusual user activity. Methods of intrusion detection based on hand-coded rule sets or<br />
<a href="http://ftp.cs.utexas.edu/pub/neural-nets/papers/ryan.%20intrusion.ps.Z">Click here to read this document</a><br />
</li><br />
<li><b>A Layered Framework For Placement Of Distributed intrusion..</b> - Medina (1998)<br />
...Framework For Placement Of Distributed intrusion detection Devices Marcelo Medina George Washington<br />
ABSTRACT -Network based distributed intrusion detection is a common trend in several commercial<br />
coverage of system. Types of intrusion detection intrusion detection consists of several techniques<br />
<a href="http://csrc.nist.gov/nissc/1998/proceedings/paperD2.pdf">Click here to read this document</a><br />
</li><br />
<li><b>The Base-Rate Fallacy and its Implications for the Difficulty of ..</b> - Axelsson (1999)<br />
...and its Implications for the Diculty of intrusion detection Stefan Axelsson Department of Computer<br />
Many dierent demands can be made of intrusion detection systems. An important requirement is that<br />
The eld of automated computer intrusion detection| intrusion detection for short|is currently some<br />
<a href="http://www.ce.chalmers.se/staff/sax/difficulty.ps">Click here to read this document</a><br />
</li><br />
<li><b>Negative Selection and Niching by an Artificial Immune System..</b> - Kim, Bentley (1999)<br />
...by an Artificial Immune System for Network intrusion detection Jungwon Kim and Peter Bentley Department<br />
by an artificial immune system, for network intrusion detection. The paper starts by introducing the<br />
computer security such as computer virus detection and intrusion detection especially requires robustness<br />
<a href="http://www.cs.ucl.ac.uk/staff/J.Kim/GECCOLateBreak99.ps">Click here to read this document</a><br />
</li><br />
<li><b>Learning Program Behavior Profiles for intrusion detection</b> - Ghosh, Schwartzbart, Schatz (1999)<br />
...in the Proceedings of the Workshop on intrusion detection and Network Monitoring Santa Clara,<br />
1999 Learning Program Behavior Profiles for intrusion detection Anup K. Ghosh, Aaron Schwartzbard, and<br />
<a href="http://www.usenix.org/events/%20detection99/full_papers/ghosh/ghosh.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Network-Based intrusion detection Using Neural</b> - Networks Alan Bivens (2002)<br />
...Network-Based intrusion detection Using Neural Networks Alan Bivens<br />
that an entire area of research, called intrusion detection, is devoted to detecting this activity. We<br />
<a href="http://www.cs.rpi.edu/%7Eszymansk/papers/annie02.pdf">Click here to read this document</a><br />
</li><br />
<li><b>The Genesis Project: Network Decomposition Monitoring and..</b> - Szymanski, al. (2002) <br />
...and Simulation for Network Management and intrusion detection Boleslaw K. Szymanski, Alan Bivens, Yu<br />
and simulation for network management and intrusion detection. The basis of our approach is network<br />
<a href="http://www.cs.rpi.edu/%7Eszymansk/genesis/vw.pdf">Click here to read this document</a><br />
</li><br />
<li><b>A Pattern Matching Based Filter for Audit Reduction..</b> - Kuri, Navarro..<br />
...may be detected. Introduction Research in intrusion detection has emerged in recent years as a major<br />
of detection. In the short term, effective intrusion detection systems will incorporate a number of<br />
<a href="http://www.dcc.uchile.cl/%7Egnavarro/ps/raid00.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b> intrusion detection, Diagnosis, and Recovery with..</b> - Strunk, Goodson.. (2002) <br />
... intrusion detection, Diagnosis, and Recovery with<br />
system intrusions. First, storage-based intrusion detection offers a new obsen,ation point for<br />
</li><br />
<li><a 551149.="" citeseer.ist.psu.edu="" href="http://www.pdl.cmu.edu/PDL-FTP/Secure/CMU-CS-02-140.ps%3C/font%3E%3Cbr%3E%3Cbr%3E%3Ca%20href=" http:=""><b>Host-Based intrusion detection Using User Signatures</b> - Freeman, Branch</a> <br />
...Host-Based intrusion detection Using User Signatures Seth Freeman<br />
which attackers attempt to exploit. An intrusion detection system (IDS) is designed to monitor a<br />
<a href="http://www.cs.rpi.edu/%7Eszymansk/papers/signature.pdf">Click here to read this document</a><br />
</li><br />
<li><b>intrusion detection in Computer Networks by Multiple..</b> - Giacinto, Roli <br />
...intrusion detection in Computer Networks by Multiple<br />
of software tools are currently developed. intrusion detection Systems aim at detecting intruder who<br />
<a href="http://ce.diee.unica.it/en/publications/papers-PattRecApps/IDS-Conference-01.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Decentralized Event Correlation for intrusion detection</b> - Krügel, Toth, Kerer (2001) <br />
...Decentralized Event Correlation for intrusion detection Christopher Krugel, Thomas Toth, and<br />
is often scattered over several hosts. intrusion detection systems (IDS) which attempt to detect such<br />
<a href="http://www.infosys.tuwien.ac.at/Staff/chris/doc/2001_05.ps">Click here to read this document</a><br />
</li><br />
<li><b>A Framework for Cooperative intrusion detection</b> - Polla (1998)<br />
...A Framework for Cooperative intrusion detection Deborah Frincke Don Tobin Jesse<br />
that need to be addressed if cooperative intrusion detection using data sharing between distinct sites<br />
<a href="http://www.csds.uidaho.edu/director/framework.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Connection-History Based Anomaly detection</b> - Toth, Krügel (2002)<br />
...as intrusive behavior is justi ed. intrusion detection Systems (IDS) are security tools that are<br />
the use of the IDS is voided. A well-known intrusion detection system that explicitly deals with the<br />
<a href="http://www.infosys.tuwien.ac.at/Staff/chris/doc/2002_06.ps">Click here to read this document</a><br />
</li><br />
<li><b>Service Specific Anomaly detection for Network intrusion..</b> - Krügel, Toth, Kirda (2002) <br />
...Specific Anomaly detection for Network intrusion detection Christopher Kr ugel Distributed Systems<br />
repel intrusion attempts in the rst place. intrusion detection systems (IDS)which try to detect<br />
<a href="http://www.infosys.tuwien.ac.at/Staff/chris/doc/2002_03.ps">Click here to read this document</a><br />
</li><br />
<li><b>Flexible, Mobile Agent based intrusion detection for Dynamic..</b> - Krügel, Toth (2002) <br />
...Flexible, Mobile Agent based intrusion detection for Dynamic Networks Christopher Krugel<br />
ttothg@infosys.tuwien.ac.at Abstract intrusion detection systems (IDS) are security tools that<br />
<a href="http://www.infosys.tuwien.ac.at/Staff/chris/doc/2002_02.ps">Click here to read this document</a><br />
</li><br />
<li><b>Cost-Benefit Analysis for Network intrusion detection..</b> - Wei, Frinke, Carter, Ritter (2001) <br />
...D.C. Cost-Benefit Analysis for Network intrusion detection Systems Huaqiang Wei, Deb Frinke, Olivia<br />
the cost-benefit tradeoff of a network intrusion detection system requires an understanding of the<br />
1996. 11] T. Dunigan etal, intrusion detection and intrusion Prevention on a Large Network, A Case<br />
<a href="http://www.csds.uidaho.edu/director/costbenefit.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Balancing Cooperation and Risk in intrusion detection</b> - Frincke <br />
...Balancing Cooperation And Risk In intrusion detection Deborah Frincke University Of Idaho Early<br />
of Idaho Early systems for networked intrusion detection (or, more generally, intrusion or misuse<br />
<a href="http://www.csds.uidaho.edu/director/balcooprisk.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Planning, Petri Nets, and intrusion detection</b> - Frincke, Ho (1998) <br />
...1 Planning, Petri Nets, and intrusion detection Yuan Ho Deborah Frincke Donald Tobin, Jr<br />
is a di#cult task. We propose a new intrusion detection architecture combining partial order<br />
<a href="http://www.csds.uidaho.edu/director/petrinets.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Profiling UNIX Users And Processes Based on Rarity of Occurrence ..</b> - Ju, Vardi (2001) <br />
...Statistics with Applications to Computer intrusion detection Wen-Hua Ju Avaya Labs Research Yehuda<br />
resources and can be easily implemented. For intrusion detection, the method compares a sequence of audit<br />
<a href="http://www.research.avayalabs.com/techreport/ALR-2001-002-paper.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Identifying Key Variables for intrusion detection Using Soft..</b> - Mukkamala <br />
...Identifying Key Variables for intrusion detection Using Soft Computing Paradigms Srinivas<br />
paper concerns using learning machines for intrusion detection. Two classes of learning machines are<br />
important input features for intrusion detection. intrusion detection is a problem of great<br />
<a href="http://www.cs.okstate.edu/%7Eaa/fuzz2.pdf"> Click here to read this document</a><br />
</li><br />
<li><b>Mimicry Attacks on Host-Based intrusion detection Systems</b> - Wagner, Soto (2002)<br />
...Mimicry Attacks on Host-Based intrusion detection Systems David Wagner University of<br />
conclude with a call for further research on intrusion detection from both attacker's and defender's<br />
<a href="http://www.cs.berkeley.edu/%7Edaw/papers/mimicry.ps">Click here to read this document</a><br />
</li><br />
<li><b>Sensor-Based intrusion detection for Intra-Domain..</b> - Mittal, Vigna (2002)<br />
...Sensor-Based intrusion detection for Intra-Domain Distance-Vector Routing<br />
the configuration of the signatures used by intrusion detection sensors is a timeconsuming and error-prone<br />
<a href="http://www.cs.ucsb.edu/%7Evigna/pub/2002_mittal_vigna_ccs02.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>An intrusion detection System for Aglets</b> - Vigna, Cassell, Fayram (2002) <br />
...An intrusion detection System for Aglets Giovanni Vigna, Bryan<br />
for the Aglets mobile agent system and an intrusion detection system that takes advantage of this<br />
<a href="http://www.cs.ucsb.edu/%7Evigna/pub/2002_vigna_cassell_fayram_ma02.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>Detecting Errors within a Corpus using Anomaly detection</b> - Eskin (2000)<br />
...field of computer security specifically in intrusion detection (Denning, 1987)Typically anomaly<br />
pages 722-727. D.E. Denning. 1987. An intrusion detection model. IEEE Transactions on Software<br />
<a href="http://acl.ldc.upenn.edu/A/A00/A00-2020.pdf%3C/font%3E%3Cbr%3E%C2%A0%3C/span%3E%3C/p%3E%3Cp%3E%3Cspan%20class=" m=""><br />
</a></li><br />
<li><b>intrusion detection in Wireless Ad-Hoc Networks</b> - Zhang, Lee (2000)<br />
...intrusion detection in Wireless Ad-Hoc Networks Yongguang<br />
lack of a clear line of defense. Many of the intrusion detection techniques developed on a xed wired<br />
<a href="http://www.wins.hrl.com/people/ygz/papers/mobicom00.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>A Preliminary Attempt to Apply detection and Estimation Theory..</b> - Axelsson (2000)<br />
...to Apply detection and Estimation Theory to intrusion detection Stefan Axelsson Department of Computer<br />
such a comparison, studying the problem of intrusion detection by the use of the introductory models of<br />
to compare computer security intrusion detection- intrusion detection for short-and the field of<br />
<a href="http://www.ce.chalmers.se/staff/sax/%20detection-model.ps">Click here to read this document</a><br />
</li><br />
<li><b>Radar-Based Intruder detection for a Robotic Security System</b> - Phil Cory Everett (1998)<br />
...platforms equipped with intrusion detection, barrier assessment, and inventory<br />
an integrated control station. The MDARS-E intrusion detection System consists of a motion sensor suite<br />
<a href="http://www.nosc.mil/robots/pubs/spie3525b.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Insertion, Evasion, and Denial of Service: Eluding Network..</b> - Ptacek, Newsham (1998)<br />
...and Denial of Service: Eluding Network intrusion detection Thomas H. Ptacek<br />
Abstract All currently available network intrusion detection (ID) systems rely upon a mechanism of data<br />
<a href="http://www.securityfocus.com/data/library/ids.ps">Click here to read this document</a><br />
</li><br />
<li><b>Research in intrusion- detection Systems: A Survey</b> - Axelsson (1998)<br />
...Research in intrusion- detection Systems: A Survey Stefan Axelsson<br />
research in the eld of computer and network intrusion detection. This paper presents such a survey, with a<br />
<a href="http://www.ce.chalmers.se/staff/sax/survey.ps">Click here to read this document</a><br />
</li><br />
<li><b>An Artificial Immune System for Network intrusion detection</b> - Kim<br />
...An Artificial Immune System for Network intrusion detection Jungwon Kim Department of Computer<br />
J.Kim@cs.ucl.ac.uk 1. Introduction An intrusion detection system (IDS) is an automated system for<br />
<a href="http://www.cs.ucl.ac.uk/staff/J.Kim/GECCO_WS99.ps">Click here to read this document</a><br />
</li><br />
<li><b>On a Difficulty of intrusion detection</b> - Axelsson (1999) <br />
...On a Difficulty of intrusion detection Stefan Axelsson Department of Computer<br />
Research in automated computer security intrusion detection, intrusion detection for short, is<br />
in automated computer security intrusion detection, intrusion detection for short, is maturing. Several<br />
<a href="http://www.ce.chalmers.se/staff/sax/raid99.ps">Click here to read this document</a><br />
</li><br />
<li><b>Building intrusion Tolerant Applications</b> - Wu, Malkin, Boneh (1999)<br />
...into a networked system one often installs intrusion detection software to monitor system behavior.<br />
<a href="http://crypto.stanford.edu/%7Edabo/papers/ittc.ps">Click here to read this document</a><br />
</li><br />
<li><b>intrusion detection</b> - Hawthorn <br />
...1 intrusion detection Emily K. Hawthorn, CISSP ekh@mitre.org<br />
l Background -Threats and Attacks l intrusion detection: Methods and Sample products l State of<br />
<a href="http://www.isse.gmu.edu/%7Ecsis/infs762/handouts/handout11.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Mining Audit Data to Build intrusion detection Models</b> - Lee, Stolfo, Mok (1998)<br />
...Mining Audit Data to Build intrusion detection Models #Wenke Lee and Salvatore J.<br />
a data mining framework for constructing intrusion detection models. The key ideas are to mine system<br />
<a href="http://www.csc.ncsu.edu/faculty/lee/papers/kdd98.ps">Click here to read this document</a><br />
</li><br />
<li><b>intrusion detection Systems: A Survey and Taxonomy</b> - Axelsson (2000)<br />
...intrusion detection Systems: A Survey and Taxonomy Stefan<br />
Abstract This paper presents a taxonomy of intrusion detection systems that is then used to survey and<br />
<a href="http://www.ce.chalmers.se/staff/sax/taxonomy.ps">Click here to read this document</a><br />
</li><br />
<li><b>CEDMOS: Complex Event detection and Monitoring System</b> - Baker, Cassandra, Rashid (1999)<br />
.... 36 4.4.1 Network intrusion detection .36 4.4.2<br />
stock price patterns) or security (e.g. intrusion detection) are two of the many alternative domains<br />
<a href="http://www.mcc.com/cmi/publications/unclas-techreports/CEDMOS/MCC-CEDMOS-002-99.ps">Click here to read this document</a><br />
</li><br />
<li><b>intrusion detection Product Evaluation Criteria</b> - Lodin (1998)<br />
...Lodin Steven.Lodin@ey.com October 1998 intrusion detection Product Evaluation Criteria Abstract<br />
Product Evaluation Criteria Abstract intrusion detection systems (also known as ID systems or IDS<br />
<a href="http://members.iquest.net/%7Eswlodin/IDS_Prod_Eval_Criteria.ps">Click here to read this document</a><br />
</li><br />
<li><b>intrusion detection Systems and A View To Its Forensic..</b> - The University Of <br />
...intrusion detection Systems and A View To Its Forensic<br />
forensic application within the framework of intrusion detection and details work accomplished on a<br />
<a href="http://www.securityfocus.com/data/library/idsforensics.ps">Click here to read this document</a><br />
</li><br />
<li><b>An Artificial Immune Model for Network intrusion detection</b> - Kim, Bentley<br />
...An Artificial Immune Model for Network intrusion detection Jungwon Kim and Peter Bentley Department<br />
This paper investigates the subject of intrusion detection over networks. Existing network-based<br />
<a href="http://www.cs.ucl.ac.uk/staff/J.Kim/EUFITaimmune.ps">Click here to read this document</a><br />
</li><br />
<li><b>Why Enterprises Need More than Firewalls and..</b> - Vandenwauver.. (1999)<br />
...Why Enterprises Need More than Firewalls and intrusion detection Systems Mark Vandenwauver Calin Vaduva<br />
Active Content, Firewall, Intranet, intrusion detection Systems, Java, JavaScript. 1.<br />
<a href="http://www.esat.kuleuven.ac.be/%7Ejoclaess/pub/wetice99.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>The Human Immune System and Network intrusion detection</b> - Kim, Bentley (1999)<br />
...The Human Immune System and Network intrusion detection Jungwon Kim and Peter Bentley Department<br />
between the human immune system and network intrusion detection systems. The promising results from a<br />
<a href="http://www.cs.ucl.ac.uk/staff/J.Kim/EUFIThimmune.ps">Click here to read this document</a><br />
</li><br />
<li><b>Applying Mobile Agents to intrusion detection and Response</b> - Jansen, Mell.. (1999)<br />
...Applying Mobile Agents to intrusion detection and Response Wayne Jansen, Peter Mell,<br />
3 1.3.1. Autonomous Agents for intrusion detection<br />
research topics in both the intrusion detection and intrusion response areas. 1.1. Background<br />
<a href="http://www.itl.nist.gov/div893/staff/mell/maresponse.pdf">Click here to read this document</a><br />
</li><br />
<li><b>IT Security Research and Education in Synergy</b> - Lindskog, Lindqvist, Jonsson (1998) <br />
...intrusion Analysis, Remediation, intrusion detection. Abstract: This paper presents experience<br />
intrusion analysis and remediation, and intrusion detection. Furthermore, we discuss the outcome and<br />
<a href="http://www.ce.chalmers.se/staff/ulfl/pubs/wise99l.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Artificial Neural Networks for Misuse detection</b> - Cannady (1998)<br />
...analysis of this approach. Keywords: intrusion detection, misuse detection, neural networks,<br />
conducted in this area are discussed. 1.1 intrusion detection Systems 1.1.1 Background The timely and<br />
<a href="http://csrc.nist.gov/nissc/1998/proceedings/paperF13.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Distributed Publish/Subscribe SIENA</b> - University Of Colorado <br />
....system management: network management, intrusion detection, software deployment e-commerce:<br />
<a href="http://www.cs.colorado.edu/users/carzanig/siena/siena_flyer.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>EMERALD: Event Monitoring Enabling Responses to Anomalous..</b> - Porras, Neumann (1997)<br />
...methodologies with over a decade of intrusion detection research and engineering experience. The<br />
tool suites. Keywords Network security, intrusion detection, coordinated attacks, anomaly detection,<br />
<a href="http://www2.csl.sri.com/emerald/Emerald-NISS97.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>Visual Behavior Characterization For intrusion detection In..</b> - Erbacher (2001) <br />
...Visual Behavior Characterization For intrusion detection In Large Scale Systems Robert F.<br />
Key Words: Information Visualization, intrusion detection, Computer Security 1. TRODUCTION Our<br />
<a href="http://www.cs.albany.edu/%7Eerbacher/publications/SecurityVisPaper2-VIIP01color.pdf">Click here to read this document</a><br />
</li><br />
<li><b>intrusion Management Using Configurable Architecture Models</b> - Heimbigner, Wolf <br />
...of intrusion defenses: phases including intrusion detection, response, and analysis. We will show how<br />
<a href="http://ftp.cs.colorado.edu/users/alw/doc/papers/CU-CS-929-02.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Using Internal Sensors For Computer intrusion detection</b> - Zamboni (2001) <br />
...Using Internal Sensors For Computer intrusion detection A Thesis Submitted To The Faculty Of<br />
2001 Using Internal Sensors For Computer intrusion detection A Thesis Submitted To The Faculty Of<br />
<a href="http://www.cerias.purdue.edu/homes/zamboni/docs/pubs/thesis-techreport.pdf">Click here to read this document</a><br />
</li><br />
<li><b>A Group Membership Protocol For An intrusion-Tolerant Group..</b> - Ramasamy (2002) <br />
...by using dependable middleware, large-scale intrusion detection systems, dependable trusted third parties,<br />
<a href="http://www.crhc.uiuc.edu/PERFORM/Papers/USAN_papers/02RAM01.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Remote Attack detection Method in IDA: MLSI-Based..</b> - Asaka, Onabura, Inoue <br />
...Attack detection Method in IDA: MLSI-Based intrusion detection using Discriminant Analysis Midori Asaka,<br />
In order to detect intrusions, IDA ( intrusion detection Agent system) initially monitors system<br />
S. Okazawa, and S. Goto, Local Attack detection and intrusion Route Tracing,IEICE Trans. Commun.<br />
<a href="http://www.ipa.go.jp/STC/IDA/paper/saint_ieee.ps">Click here to read this document</a><br />
</li><br />
<li><b>Parzen-Window Network intrusion Detectors</b> - Yeung, Chow (2002)<br />
...Bay, Kowloon, Hong Kong Abstract Network intrusion detection is the problem of detecting anomalous<br />
caused by intrusive activities. Many intrusion detection systems proposed before use both normal<br />
<a href="http://www.cs.ust.hk/%7Edyyeung/paper/pdf/yeung.icpr2002.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Identify the Characteristics of an Attack Given Data..</b> - Aslam, Cremonini.. <br />
...down their origin. Commercially available intrusion detection systems can signal the occurrence of<br />
their query. We plan to use Serval for intrusion detection by using the same infrastructure to store<br />
<a href="http://ftp.cs.dartmouth.edu/pub/kotz/papers/aslam:position.ps.Z">Click here to read this document</a><br />
</li><br />
<li><b>A Framework for Distributed intrusion detection using..</b> - Gopalakrishna, Spafford (2001)<br />
...A Framework for Distributed intrusion detection using Interest Driven Cooperating Agents<br />
Abstract Current distributed intrusion detection systems are not completely distributed<br />
<a href="http://www.raid-symposium.org/Raid2001/papers/gopalakrishna_spafford_raid2001.pdf">Click here to read this document</a><br />
</li><br />
<li><b>A Building Block Approach to intrusion detection</b> - Crosbie, Kuperman (2001) <br />
...A Building Block Approach to intrusion detection Mark J. Crosbie Hewlett-Packard Company<br />
design and implementation of a host-based intrusion detection system (Hewlett-Packard's Praesidium<br />
<a href="http://www.raid-symposium.org/Raid2001/papers/crosbie_kuperman_raid2001.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Public Information Server fo Tracing Intruders in the Internet</b> - Asaka, Onabuta, Goto (2001) <br />
...uses stepping stones. We have developed IDA ( intrusion detection AgentsystemFE8Rfl h has an intrusion<br />
amount of data. We have developed IDA ( intrusion detection Manuscript received April 16, 2001.<br />
Okazawa,and S. Goto,Local attack detection and intrusion route tracing,IEICE Trans.Com<br />
<a href="http://search.ieice.org/2001/pdf/e84-b_12_3104.pdf">Click here to read this document</a><br />
</li><br />
<li><b>A New intrusion detection Method Based on Discriminant Analysis</b> - Midori Asaka Regular (2001)<br />
...Technology and its Applications A New intrusion detection Method Based on Discriminant Analysis<br />
t identen an unknown behavior. key words: intrusion detection, discriminant analysis, multivariate<br />
<a href="http://search.ieice.org/2001/pdf/e84-d_5_570.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Argus</b> - A distributed network- intrusion detection system - Singh, Kandula (2001) <br />
...Argus -A distributed network- intrusion detection system A Report Submitted in Partial Ful<br />
entitled \Argus -A distributed network- intrusion detection system"by Sankalp Singh and Srikanth<br />
<a href="http://www.cse.iitk.ac.in/research/btp2001/Argus.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>Security in Sensor Networks</b> - Wood <br />
.... Message freshness .Non-repudiation . intrusion detection . intrusion tolerance or containment .<br />
grant neighborhood trust .Heavy emphasis on intrusion detection 25 Important Parameter Selection of<br />
freshness .Non-repudiation . intrusion detection . intrusion tolerance or containment .Audit trails<br />
<a href="http://www.cs.ucla.edu/%7Ejkong/publications/anthony-wood-sensor-security.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Closed Reflective Networks: a Conceptual Framework for..</b> - Kennedy, Sloman <br />
...involve the insertion of hostile code in an intrusion- detection system, causing it to \lie"for example<br />
To address this problem we consider an intrusion detection system as a re ective layer in an<br />
<a href="http://www.cs.bham.ac.uk/research/cogaff/kennedy.sloman.CSR-02-03.ps">Click here to read this document</a><br />
</li><br />
<li><b>BlueBoX: A Policy--driven, Host--Based intrusion detection..</b> - Suresh Chari Pau--Chen <br />
...BlueBoX: A Policy-driven, Host-Based intrusion detection system Suresh N. Chari Pau-Chen Cheng IBM<br />
with building BlueBox, a host based intrusion detection system. Our approach can be viewed as<br />
<a href="http://www.isoc.org/isoc/conferences/ndss/02/proceedings/papers/chari.ps">Click here to read this document</a><br />
</li><br />
<li><b>Distributed Pattern detection for intrusion detection</b> - Krügel, Toth (2002)<br />
... Distributed Pattern detection for intrusion detection Christopher Krugel Distributed Systems<br />
is often scattered over several hosts. intrusion detection systems therefore have to collect and<br />
<a href="http://www.isoc.org/isoc/conferences/ndss/02/proceedings/papers/kruege.ps">Click here to read this document</a><br />
</li><br />
<li><b>Modeling Requests among Cooperating intrusion detection Systems</b> - Ning, Wang, Jajodia (2000)<br />
...2000 Modeling Requests among Cooperating intrusion detection Systems Peng Ning, X. Sean Wang, Sushil<br />
USA Abstract It is important for intrusion detection systems (IDSs) to share information in<br />
<a href="http://www.csc.ncsu.edu/faculty/ning/pubs/query.ps">Click here to read this document</a><br />
</li><br />
<li><b>A Hybrid Approach to Profile Creation and intrusion detection</b> - Marin, Ragsdale, Surdu (2001)<br />
...A Hybrid Approach to Profile Creation and intrusion detection John A. Marin, Daniel Ragsdale, and John<br />
in the training set. 1. Introduction intrusion detection may be defined as "the problem of<br />
<a href="http://www.itoc.usma.edu/Documents/marin_rags_surdu.pdf">Click here to read this document</a><br />
</li><br />
<li><b>A Software Fault Tree Approach to Requirements..</b> - Helmer, Wong.. (2001)<br />
...Tree Approach to Requirements Analysis of an intrusion detection System Guy Helmer, Johnny Wong, Mark<br />
identification and analysis in an intrusion detection System (IDS) is described. intrusions are<br />
<a href="http://www.cs.iastate.edu/%7Erlutz/publications/sreis01.ps">Click here to read this document</a><br />
</li><br />
<li><b>Improving intrusion detection Performance Using Keyword..</b> - Lippmann, Cunningham (1999)<br />
...Improving intrusion detection Performance Using Keyword Selection and<br />
Abstract The most common computer intrusion detection systems detect signatures of known attacks<br />
<a href="http://www.raid-symposium.org/raid99/PAPERS/Lippmann1.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Peer Group Analysis -- Local Anomaly detection in..</b> - Richard Bolton And <br />
...fraud detection. In computer intrusion detection we find a profile or `sense of self' for a<br />
Kosoresow, A.P. and Hofmeyr, S.A. 1997) intrusion detection via System Call Traces. IEEE Software<br />
<a href="http://stats.ma.ic.ac.uk/%7Erjbolton/pga.pdf">Click here to read this document</a><br />
</li><br />
<li><b>A Diversified Dynamic Redundancy Method Exploiting the..</b> - Zunguo, Xicheng, Huaimin (2000) <br />
...type of attack modes. Among the models the intrusion detection system (IDS)directory based access and<br />
<a href="http://www.cert.org/research/isw/isw2000/papers/8.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Experiences with Specification-based intrusion detection</b> - Uppuluri, Sekar (2001)<br />
...Experiences with Specification-based intrusion detection P. Uppuluri and R. Sekar Department of<br />
Abstract. Specification-based intrusion detection, where manually specified program<br />
<a href="http://seclab.cs.sunysb.edu/sekar/papers/raid01.ps">Click here to read this document</a><br />
</li><br />
<li><b>Characterizing intrusion Tolerant Systems Using a..</b> - Katerina.. <br />
...Vitesse Corp.Camarillo, CA 93012 Abstract intrusion detection and response research has so far mostly<br />
the successes and limitation of commercial intrusion detection systems (IDS) intrusion tolerance, on the<br />
<a href="http://www.ee.duke.edu/%7Ekaterina/Papers/DISCEX-II.ps">Click here to read this document</a><br />
</li><br />
<li><b>Use Of Passive Network Mapping To Enhance Signature Quality..</b> - Dayioglu, Ozgit (2001)<br />
...Enhance Signature Quality Of Misuse Network intrusion detection Systems Burak Dayo#lu, Attila Zgit Dept.<br />
as a way of self-learning for network intrusion detection systems. The collected information may be<br />
<a href="http://www.dayioglu.net/publications/iscis2001.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Computer System intrusion detection: A Survey</b> - Bechard (1999)<br />
...intrusion detection 1 02/09/00 Computer System intrusion<br />
detection 1 02/09/00 Computer System intrusion detection: A Survey 1 Anita K. Jones and Robert S.<br />
<a href="http://www.cs.virginia.edu/%7Ejones/IDS-research/Documents/jones-sielken-survey-v11.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Applying Mobile Agent Technology to intrusion detection</b> - Krügel, Toth (2001) <br />
...Applying Mobile Agent Technology to intrusion detection Christopher Kr ugel<br />
sensitive data with the installation of intrusion detection systems (IDS)Autonomous software agents,<br />
<a href="http://www.elet.polimi.it/Users/DEI/Sections/Compeng/GianPietro.Picco/ICSE01mobility/papers/krugel.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Building Survivable Systems: An Integrated..</b> - Bowen, Chee.. (2000)<br />
...Systems: An Integrated Approach based on intrusion detection and Damage Containment T. Bowen D. Chee<br />
the current state of the art in event based intrusion detection by developing a domain-specific language<br />
<a href="http://seclab.cs.sunysb.edu/sekar/papers/discex00.ps">Click here to read this document</a><br />
</li><br />
<li><b>A High-Performance Network intrusion detection System</b> - Sekar, Guang, Verma, Shanbhag (1999)<br />
...A High-Performance Network intrusion detection System R. Sekar Y. Guang S. Verma T.<br />
paper we present a new approach for network intrusion detection based on concise specifications that<br />
<a href="http://seclab.cs.sunysb.edu/sekar/papers/ccs99.ps">Click here to read this document</a><br />
</li><br />
<li><b>Applying Local Search and Genetic Evolution in Concept..</b> - Mirko Mischiatti And <br />
...neri@mfn.unipmn.it Keywords: intrusion detection, symbolic concept learning, genetic<br />
the site assets. A variety of approaches to intrusion detection do exist [Denning, 1987]Some of them<br />
<a href="http://www.ics.forth.gr/%7Epotamias/mlnia/paper_7.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Towards Survivable intrusion detection</b> - Wang, Knight (2000) <br />
...Page 1 Towards Survivable intrusion detection Chenxi Wang, John C. Knight Department of<br />
1. Introduction Successful intrusion detection (ID) is important to ensuring the<br />
<a href="http://www.cert.org/research/isw/isw2000/papers/38.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Synthesizing Fast intrusion Prevention/ detection Systems from ..</b> - Sekar, Uppuluri (1999)<br />
...make our algorithm useful for many other intrusion detection methods that employ pattern-matching. We<br />
to describe program behavior as needed for intrusion detection or prevention. ffl In Section 4 we<br />
research on (post-attack) intrusion detection. intrusion detection techniques can be broadly<br />
<a href="http://seclab.cs.sunysb.edu/sekar/papers/usenix99.ps">Click here to read this document</a><br />
</li><br />
<li><b>Using Finite Automata to Mine Execution Data for intrusion..</b> - Michael, Ghosh (2000)<br />
...Finite Automata to Mine Execution Data for intrusion detection: a Preliminary Report C. C. Michael, Anup<br />
The idea of using execution traces for intrusion detection was pioneered by [2]where the execution<br />
<a href="http://www.cigitallabs.com/research/its/malpaper.ps">Click here to read this document</a><br />
</li><br />
<li><b>"Why 6?" Defining the Operational Limits of stide, an..</b> - Tan, Maxion (2001) <br />
...two of the more difficult problems facing intrusion detection systems. While anomaly-based intrusion<br />
detection systems. While anomaly-based intrusion detection approaches appear to be among the most<br />
<a href="http://reports-archive.adm.cs.cmu.edu/anon/2001/CMU-CS-01-158.ps">Click here to read this document</a><br />
</li><br />
<li><b>intrusion detection: A Bibliography</b> - Mé, Michel (2001) <br />
...intrusion detection: A Bibliography Ludovic M and Cdric<br />
we have collected references relating to intrusion detection. intrusion detection is now a major<br />
<a href="http://www.supelec-rennes.fr/ren/perso/cmichel/bibid_raid2001.ps">Click here to read this document</a><br />
</li><br />
<li><b>User-Level Infrastructure for System Call Interposition: A..</b> - Jain, Sekar (1999)<br />
...System Call Interposition: A Platform for intrusion detection and Connement K. Jain Iowa State<br />
the interception mechanisms as well as the intrusion detection/connement systems are implemented within<br />
<a href="http://seclab.cs.sunysb.edu/sekar/papers/ndss00.ps">Click here to read this document</a><br />
</li><br />
<li><b>Indra: A Distributed Approach to Network intrusion..</b> - Zhang, Janakiraman (2001)<br />
...1 Indra: A Distributed Approach to Network intrusion detection and Prevention Qi Zhang Ramaprabhu<br />
causing willful or incidental damage. intrusion detection involves identifying individuals or<br />
<a href="http://www.cs.wustl.edu/cs/techreports/2001/wucs-01-30.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Outlier detection for High Dimensional Data</b> - Aggarwal, Yu (2001)<br />
...detection, network robustness analysis, and intrusion detection. Most such applications are high<br />
applications in credit card fraud, network intrusion detection, financial applications and marketing.<br />
<a href="http://web.mit.edu/charu/www/outl.ps%3C/font%3E%3Cbr%3E%C2%A0%3C/span%3E%3C/p%3E%3Cp%3E%3Cspan%20class=" m=""><br />
</a></li><br />
<li><b>An Application of Pattern Matching in intrusion detection</b> - Kumar, Spafford (1994)<br />
...An Application of Pattern Matching in intrusion detection Technical Report CSD-TR-94-013<br />
characteristics of signatures used in misuse intrusion detection. Efficient algorithms to match patterns in<br />
<a href="http://www.iti.informatik.tu-darmstadt.de/%7Ekehr/bib/events/PatMatIntrDet.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>State Transition Analysis: A Rule-Based intrusion detection Approach</b> - Ilgun (1995)<br />
...1 State Transition Analysis: A Rule-Based intrusion detection Approach Koral Ilgun, Richard A.<br />
the overall design and functionality of this intrusion detection approach. Lastly, STAT is compared to the<br />
(MIDAS) 30] and the Network Anomaly detection and intrusion Reporter (NADIR) 11]MIDAS is a<br />
<a href="http://www.cs.ucsb.edu/%7Evigna/STAT/docs/stat-TSE.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>The Design of GrIDS: A Graph-Based intrusion detection ..</b> - Cheung, Crawford.. (1999)<br />
...The Design of GrIDS: A Graph-Based intrusion detection System Steven Cheung, Rick Crawford, Mark<br />
documents the design of the Graph-based intrusion detection System (GrIDS) in reasonable detail. It<br />
<a href="http://seclab.cs.ucdavis.edu/arpa/grids/grids.ps">Click here to read this document</a><br />
</li><br />
<li><b>Minimal Cost Complexity Pruning of Meta-Classifiers</b> - Andreas Prodromidis (1999) <br />
...real-time systems, such as in e-commerce or intrusion detection. This extended abstract describes a<br />
<a href="http://www.cs.columbia.edu/%7Eandreas/publications/AAAI99.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>Artificial Intelligence and intrusion detection: Current and..</b> - Frank (1994)<br />
...Artificial Intelligence and intrusion detection: Current and Future Directions Jeremy<br />
DOD/DABT63-93-C-0045 June 9, 1994 Abstract intrusion detection systems (IDSs) have previously been built<br />
Feature Selection. 1 Problems in intrusion detection intrusion detection (ID) is the identification of<br />
<a href="http://ic.arc.nasa.gov/people/frank/ncsc.94.ps">Click here to read this document</a><br />
</li><br />
<li><b>Architecture Design of a Scalable intrusion..</b> - Jou, Wu, Gong.. (1997)<br />
...A005) Architecture Design of a Scalable intrusion detection System for the Emerging Network<br />
:2 2 intrusion detection System Architecture 3 2.1 Architecture<br />
global detection results-type of detection / intrusion/fault etc*scope of impact decision<br />
<a href="http://shang.csc.ncsu.edu/papers/jinaoArch.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>GrIDS</b> - A Graph-Based intrusion detection System.. - Staniford-Chen.. (1996)<br />
...GrIDS-A Graph-Based intrusion detection System for Large Networks March 4, 1996<br />
We present the design of GrIDS (Graph-Based intrusion detection System)GrIDS will collect data about<br />
<a href="http://ic.arc.nasa.gov/people/frank/nisc.96.ps">Click here to read this document</a><br />
</li><br />
<li><b>NetSTAT: A Network-based intrusion detection Approach</b> - Vigna (1998)<br />
...NetSTAT: A Network-based intrusion detection Approach Giovanni Vigna and Richard A.<br />
common and sophisticated. For this reason, intrusion detection systems are now shifting their focus from<br />
<a href="http://www.cs.ucsb.edu/%7Evigna/pub/vigna_kemmerer_acsac98.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>A Pattern Matching Model for Misuse intrusion detection</b> - Kumar, Spafford (1994)<br />
...A Pattern Matching Model For Misuse intrusion detection Sandeep Kumar Eugene H. Spafford The<br />
fkumar,spafg@cs.purdue.edu Keywords: intrusion detection, misuse, anomaly. Abstract This paper<br />
<a href="http://irdu.nus.sg/security/papers/ncsc.ps">Click here to read this document</a><br />
</li><br />
<li><b>Experiences with Tripwire: Using Integrity Checkers for..</b> - Kim, Spafford (1994)<br />
...with Tripwire: Using Integrity Checkers for intrusion detection Purdue Technical Report CSD-TR-94-012<br />
deleted, and modified files. Intended to aid intrusion detection, Tripwire was officially released on<br />
<a href="http://www.cs.purdue.edu/homes/spaf/tech-reps/9412.ps">Click here to read this document</a><br />
</li><br />
<li><b>Unreliable intrusion detection in Distributed Computations</b> - Malkhi, Reiter (1997)<br />
...Unreliable intrusion detection in Distributed Computations Dahlia Malkhi<br />
[10] D. Malkhi and M. Reiter, Unreliable intrusion detection in distributed computations, Proceedings<br />
<a href="http://www.bell-labs.com/user/reiter/papers/csfw10.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>A Partial Memory Incremental Learning Methodology and its..</b> - Marcus Maloof<br />
...Methodology And Its Application To Computer intrusion detection Marcus A. Maloof and Ryszard S. Michalski<br />
Methodology and its Application to Computer intrusion detection Marcus A. Maloof and Ryszard S. Michalski<br />
<a href="http://www.cs.georgetown.edu/%7Emaloof/mli-95-2.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>Building intrusion Tolerant Applications</b> - Wu, Malkin, Boneh (1999)<br />
...into a networked system one often installs intrusion detection software to monitor system behavior.<br />
<a href="http://theory.stanford.edu/%7Edabo/papers/ittc.ps">Click here to read this document</a><br />
</li><br />
<li><b>Real-Time intrusion detection and Suppression in ATM Networks</b> - Bettati Zhao (1999)<br />
...Proceedings of the 1st USENIX Workshop on intrusion detection and Network Monitoring, Santa Clara, CA,<br />
Santa Clara, CA, April 1999 Real-Time intrusion detection and Suppression in ATM Networks R.<br />
<a href="http://www.cs.tamu.edu/faculty/bettati/Papers/usenix99/paper.ps">Click here to read this document</a><br />
</li><br />
<li><b>Learning Patterns from Unix Process Execution Traces for..</b> - Lee, Stolfo (1997)<br />
...from Unix Process Execution Traces for intrusion detection 1 Wenke Lee and Salvatore J. Stolfo<br />
information to perhaps provide broader intrusion detection services. The experiments also reveal some<br />
<a href="http://www.cs.columbia.edu/%7Esal/hpapers/aaai97-os.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>An Application of Machine Learning to Anomaly detection</b> - Lane, Brodley (1997)<br />
...in the field of computer security is that of intrusion detection. The goal is to automatically detect<br />
outsider. Of the many possible approaches to intrusion detection, one that has recieved considerable<br />
<a href="http://mow.ecn.purdue.edu/%7Eterran/facts/research/pubs/nissc97_paper.ps">Click here to read this document</a><br />
</li><br />
<li><b>A Methodology for Testing intrusion detection Systems</b> - Puketza, Zhang, Chung.. (1996)<br />
...A Methodology for Testing intrusion detection Systems 1 Nicholas J. Puketza, Kui Zhang,<br />
revision date: September 27, 1996 Abstract intrusion detection Systems (IDSs) attempt to identify<br />
Laboratory's (LANL's) Network Anomaly detection and intrusion Reporter (NADIR) 14]and UC Davis'<br />
<a href="http://seclab.cs.ucdavis.edu/papers/tse96.ps">Click here to read this document</a><br />
</li><br />
<li><b>intrusion detection for Link-State Routing Protocols</b> - Wu, Wang, Vetter, II, Jou, .. (1997)<br />
...intrusion detection for Link-State Routing Protocols<br />
and Computing under grant FAS #5-30183. 1 intrusion detection for Link-State Routing Protocols Abstract<br />
<a href="http://shang.csc.ncsu.edu/papers/ospf.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>A Method for Partial-Memory Incremental Learning and its..</b> - Maloof, Michalski (1995)<br />
...Learning and its Application to Computer intrusion detection Marcus A. Maloof Ryszard S. Michalski<br />
method is applied to the problem of computer intrusion detection in which symbolic profiles are learned for<br />
<a href="http://www.cs.georgetown.edu/%7Emaloof/tai95.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>MTR 97B0000035 intrusion detection for Air Force Networks</b> - Operational Performance And <br />
...Mtr 97b0000035 Mitre Technical Report intrusion detection For Air Force Networks Operational,<br />
ii iii Abstract Will developing intrusion detection capabilities meet the operational,<br />
<a href="http://www.mitre.org/support/papers/tech_papers_01/laPadula_info_vendors/1_operational.pdf">Click here to read this document</a><br />
</li><br />
<li><b>MTR 97B0000084R1 intrusion detection for Air Force Networks</b> - Environment Forecast October <br />
...Mtr 97b0000084r1 Mitre Technical Report intrusion detection For Air Force Networks Environment<br />
ii iii Abstract Will future intrusion detection tools meet the goals of the US Air Force?<br />
<a href="http://www.mitre.org/support/papers/tech_papers_01/laPadula_info_vendors/2_environment.pdf">Click here to read this document</a><br />
</li><br />
<li><b>CyberSecurity Monitoring Tools and Projects</b> - Compendium Of Commercial <br />
...ago, I started collecting information about intrusion detection tools and projects. After a while, I<br />
was including tools that were not inherently intrusion detection tools because they were closely related to<br />
<a href="http://www.mitre.org/support/papers/tech_papers_01/laPadula_info_vendors/3_cyber_security.pdf">Click here to read this document</a><br />
</li><br />
<li><b>A Distributed Security Management System Based on Mobile Agents</b> - Kulin <br />
...berwacht, und die Eindringlingserkennung ( intrusion detection) in einem heterogenem Computernetz<br />
of security policies, and performs intrusion detection in a heterogeneous computing network.<br />
<a href="http://www.infosys.tuwien.ac.at/Teaching/Finished/MastersTheses/Kulin/kulin.pdf">Click here to read this document</a><br />
</li><br />
<li><b>intrusion detection System Requirements</b> - Capabilities Description In <br />
...Mp 00b0000046 Mitre Paper intrusion detection System Requirements A Capabilities<br />
iii iii Abstract This paper presents the intrusion detection and vulnerability scanning capabilities<br />
<a href="http://www.mitre.org/support/papers/tech_papers_01/laPadula_info_vendors/6_capabilities.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Fast Multipattern Search Algorithms for intrusion detection</b> - Kuri, Navarro (2000) <br />
...Fast Multipattern Search Algorithms for intrusion detection Josu'e Kuri Ecole Sup'erieure<br />
the pattern. This is a common requirement in intrusion detection applications. Our algorithms exploit the<br />
<a href="http://www.dcc.uchile.cl/%7Egnavarro/ps/spire00.1.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>Distributed Data Mining in Credit Card Fraud detection</b> - Chan, Fan, Andreas (1999)<br />
...this work has had in the related domain of intrusion detection in networked information systems. 2 Credit<br />
our attention to the growing problem of intrusion detection in (network- and host-based computer<br />
<a href="http://www.cs.columbia.edu/%7Eandreas/publications/ISDM99.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>Real Time Data Mining-based intrusion detection</b> - Lee, Stolfo, Chan, Eskin.. (2001)<br />
...Real Time Data Mining-based intrusion detection Wenke Lee 1 Salvatore J. Stolfo 2<br />
our research in real time data mining-based intrusion detection systems (IDSs)We focus on issues related<br />
<a href="http://www.cs.columbia.edu/ids/publications/dmids-discex01.ps">Click here to read this document</a><br />
</li><br />
<li><b>STATL: An Attack Language for State-based intrusion detection</b> - Eckmann, Vigna, Kemmerer (2000)<br />
...STATL: An Attack Language for State-based intrusion detection Steven T. Eckmann Giovanni Vigna Reliable<br />
description language designed to support intrusion detection. The language allows one to describe<br />
<a href="http://www.cs.ucsb.edu/%7Ersg/pub/2001_eckmann_vigna_kemmerer_jcs01.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>Toward Cost-Sensitive Modeling for intrusion detection and..</b> - Wenke Lee College (2000)<br />
...Toward Cost-Sensitive Modeling for intrusion detection and Response Wenke Lee College of<br />
NY 11794-4400 ezk@cs.sunysb.edu Abstract intrusion detection systems (IDSs) must maximize the<br />
<a href="http://www.csc.ncsu.edu/faculty/lee/papers/jcs_lee.ps">Click here to read this document</a><br />
</li><br />
<li><b>Protecting Routing Infrastructures from Denial of Service..</b> - Cheung, Levitt (1997)<br />
...#i.e.an expansive view of intrusion detection# approach to protect networks from denial<br />
routing protocols and routers, and on intrusion detection. Section 4 describes our system model and<br />
<a href="http://seclab.cs.ucdavis.edu/papers/nsp.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Designing a Web of Highly-Configurable intrusion detection..</b> - Vigna, Kemmerer, Blix (2001)<br />
...Designing a Web of Highly-Con gurable intrusion detection Sensors Giovanni Vigna, Richard A.<br />
[vigna,kemm,perbli]cs.ucsb.edu Abstract. intrusion detection relies on the information provided by a<br />
<a href="http://www.cs.ucsb.edu/%7Ersg/pub/2001_vigna_kemmerer_blix_raid01.ps.gz">Click here to read this document</a><br />
</li><br />
<li><b>Letters, Volume 35, Issue 13, 1999, Pages 1072-1073</b> - Ssg Shieh Shiuh-Pyng <br />
...and Gligor, On a pattern-oriented model for intrusion detection, Natl. Chiao Tung Univ.IEEE Transactions<br />
and Kemmerer, NetSTAT: A Network-based intrusion detection System "Journal of Computer Security"<br />
<a href="http://www.cs.fsu.edu/%7Eyasinsac/Biblio.pdf">Click here to read this document</a><br />
</li><br />
<li><b>An Evaluation of Negative Selection in an Artificial Immune..</b> - Kim, Bentley (2001)<br />
...in an Artificial Immune System for Network intrusion detection Jungwon Kim and Peter J. Bentley<br />
artificial immune system (AIS) for network intrusion detection. The work focuses on the use of negative<br />
<a href="http://www.dcs.kcl.ac.uk/staff/jungwon/pub/RW254.ps">Click here to read this document</a><br />
</li><br />
<li><b>intrusion detection With Unlabeled Data Using Clustering</b> - Portnoy (2001)<br />
...intrusion detection with unlabeled data using clustering<br />
can not stop all such attacks. The goal of intrusion detection is to build a system which would<br />
<a href="http://www.cs.columbia.edu/ids/publications/cluster-thesis00.ps">Click here to read this document</a><br />
</li><br />
<li><b>On-line Unsupervised Outlier detection Using Finite..</b> - Yamanishi, Takeuchi (2000)<br />
...speci cally in fraud detection, network intrusion detection, network monitoring, etc. SmartSifter,<br />
An experimental application to network intrusion detection shows that SS was able to identify data<br />
<a href="http://research.cmis.csiro.au/gjw/papers/kdd01.ps">Click here to read this document</a><br />
</li><br />
<li><b>An Environment for Security Protocol intrusion detection</b> - Yasinsac (2001)<br />
...1 An Environment for Security Protocol intrusion detection Alec Yasinsac yasinsac@cs.fsu.edu Phone:<br />
Our method is based on classic intrusion detection techniques of knowledge-based and<br />
<a href="http://www.cs.fsu.edu/%7Eyasinsac/Papers/CY01.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Modeling System Calls for intrusion detection with Dynamic..</b> - Eskin, Lee (2001) <br />
...Modeling System Calls for intrusion detection with Dynamic Window Sizes Eleazar Eskin<br />
call anomaly detection modeling methods for intrusion detection by incorporating dynamic window sizes. The<br />
<a href="http://www.cs.columbia.edu/ids/publications/smt-syscall-discex01.ps">Click here to read this document</a><br />
</li><br />
<li><b>intrusion detection Inter-component Adaptive Negotiation</b> - Feiertag, Benzinger.. (1999)<br />
...intrusion detection Inter-component Adaptive Negotiation 1<br />
F30602 -97 -C -0187 Abstract The intrusion detection System (IDS) community is developing<br />
<a href="http://seclab.cs.ucdavis.edu/papers/tis99.ps">Click here to read this document</a><br />
</li><br />
<li><b>A Pattern Matching Based Filter for Audit</b> - Reduction And Fast (2000) <br />
...may be detected. Introduction Research in intrusion detection has emerged in recent years as a major<br />
of detection. In the short term, effective intrusion detection systems will incorporate a number of<br />
<a href="http://www.infres.enst.fr/%7Ekuri/docs/raid2000.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Using Text Categorization Techniques for intrusion detection</b> - Liao, Vemuri (2002)<br />
...Using Text Categorization Techniques for intrusion detection Yihua Liao, V. Rao Vemuri Department of<br />
a low false positive rate. 1 Introduction intrusion detection has played an important role in computer<br />
the kNN classifier algorithm for anomaly detection. intrusion detection accuracy against the false<br />
<a href="http://seclab.cs.ucdavis.edu/papers/Liao-Vemuri.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Using CSP to detect Insertion and Evasion Possibilities..</b> - Rohrmair, Lowe (2002) <br />
...and Evasion Possibilities within the intrusion detection Area Gordon Thomas Rohrmair and Gavin<br />
demonstrate how one can model and analyse intrusion detection Systems (IDSs) and their environment using<br />
<a href="http://web.comlab.ox.ac.uk/oucl/work/gavin.lowe/Security/Papers/IDS.ps">Click here to read this document</a><br />
</li><br />
<li><b>Architectural Analysis of MAFTIA's intrusion Tolerance..</b> - Welch, Wame, Ryan, Stroud (1999) <br />
...related concepts of intrusion tolerance and intrusion detection are defined as follows: intrusion<br />
detection are defined as follows: intrusion detection: the set of practices and mechanisms used<br />
<a href="http://www.newcastle.research.ec.org/maftia/deliverables/D99.pdf">Click here to read this document</a><br />
</li><br />
<li><b>intrusion-Tolerant Architectures: Concepts and Design</b> - Veríssimo, Neves.. <br />
...few exceptions, intrusion prevention, or intrusion detection without systematic forms of processing the<br />
these errors can for example be unveiled by intrusion detection, and they can be recovered or masked.<br />
<a href="http://www.di.fc.ul.pt/%7Enuno/PAPERS/archit-depend-sys-03.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Fast Multipattern Search Algorithms for intrusion detection</b> - Kuri, Navarro (1999) <br />
...Fast Multipattern Search Algorithms for intrusion detection Josu Kuri* Gonzalo Navarro t Abstract<br />
the pattern. This is a common requirement in intrusion detection applications. Our algorithms exploit the<br />
<a href="http://www.infres.enst.fr/%7Ekuri/docs/spire2000.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Network-based intrusion detection Model for Detecting..</b> - Urupoj Kanlayasiri.. (2000) <br />
...Network-Based intrusion detection Model For Detecting Tcp Syn Flooding<br />
BENEF model to implement the network-based intrusion detection system. Current implementation is<br />
of a large IDS. The Network Anomaly detection and intrusion Reporter or NADIR [5] is an example of<br />
<a href="http://pindex.ku.ac.th/file_research/Urupoj_ncsec2000urupoj.pdf">Click here to read this document</a><br />
</li><br />
<li><b>IPSec/VPN Security Policy: Correctness, Conflict..</b> - Fu, Wu, Huang.. (2001)<br />
...examine traffic content for the purpose of intrusion detection and a policy is set up at FW1 to deny all<br />
traffic, for example, a firewall with an intrusion detection system (IDS) may need to examine content<br />
<a href="http://arqos.csc.ncsu.edu/papers/2001-02-policy01.pdf">Click here to read this document</a><br />
</li><br />
<li><b>On-the-fly intrusion detection for Web Portals</b> - Sion, Atallah, Prabhakar (2002)<br />
...On-the-fly intrusion detection for Web Portals (draft) Radu Sion<br />
authentication step we propose a runtime intrusion detection mechanism, required to maintain a<br />
<a href="http://www.cs.purdue.edu/homes/sion/ok/data/sion2002idss-itcc.ps">Click here to read this document</a><br />
</li><br />
<li><b>An Efficient Algorithm for Malicious Update detection..</b> - Chakrabarti, Manimaran <br />
...are unable to detect router attacks. intrusion detection Techniques: These techniques [8] are used<br />
behavior in the routers, assuming that intrusion detection devices are available in the network.<br />
<a href="http://www.public.iastate.edu/%7Eanirban/icc03.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Multiagent Network Security System using FIPA-OS</b> - Peddireddy, Vidal (2002) <br />
...Distributed Systems Security, Distributed intrusion detection Systems ABSTRACT This paper describes a<br />
thereby aiding in effective handling of intrusion detection is emphasized. Our design aims at<br />
<a href="http://jmvidal.cse.sc.edu/papers/peddireddy02a.pdf">Click here to read this document</a><br />
</li><br />
<li><b>detection of Denial-of-QoS Attacks Based On X2 Statistic..</b> - Mahadik, Wu, Reeves (2002) <br />
...the method is a strong candidate for QoS intrusion detection for a low-cost commercial deployment.<br />
introduced in[7]9] compares it with other intrusion detection approaches. The statistical anomaly<br />
<a href="http://arqos.csc.ncsu.edu/papers/2002-02-usenixsec-diffservattack.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Sleepy Watermark Tracing: An Active NetworkBased</b> - intrusion Response Framework (2001) <br />
...has been left largely untouched in existing intrusion detection mechanisms. The fact that intruders can<br />
Deviation-Based Idip Swt Distributed intrusion detection System (dids) 7] Developed At Uc Davis<br />
<a href="http://arqos.csc.ncsu.edu/papers/2001-03-watermark-ifipsec.pdf">Click here to read this document</a><br />
</li><br />
<li><b>A Virtual Machine Introspection Based Architecture for..</b> - Garfinkel, Rosenblum (2003)<br />
...Machine Introspection Based Architecture for intrusion detection Tal Garfinkel Mendel Rosenblum<br />
Abstract Today's architectures for intrusion detection force the IDS designer to make a difficult<br />
<a href="http://www.stanford.edu/%7Etalg/papers/VMI/vmi-ndss03.ps">Click here to read this document</a><br />
</li><br />
<li><b>Tracing Based Active intrusion Response</b> - Wang, Reeves, Felix (2001) <br />
...can be categorized as intrusion prevention, intrusion detection, intrusion tolerance and intrusion<br />
system break-ins involve insiders [0,91 intrusion detection Systems (IDS) attempts to detect intrusion<br />
as intrusion prevention, intrusion detection, intrusion tolerance and intrusion response. In<br />
<a href="http://arqos.csc.ncsu.edu/papers/2001-09-sleepytracing-jiw.pdf">Click here to read this document</a><br />
</li><br />
<li><b>A Rule-based Approach for Port Scanning detection</b> - Kanlayasiri, Sanguanpong.. <br />
...5796245, E-mail: g4265106@ku.ac.th Abstract intrusion detection has been performed at network and host<br />
port scanning, rule-based state diagram, intrusion detection, host-based intrusion detection system,<br />
intrusion detection Host intrusion detection intrusion detection Host Threshold detection is a<br />
<a href="http://pindex.ku.ac.th/file_research/scanning-eecon23.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Denial of Service intrusion detection Using Time Dependent..</b> - Branch, Bivens (2002)<br />
...Denial of Service intrusion detection Using Time Dependent Deterministic Finite<br />
finite automata. Current networkbased intrusion detection systems employ state-transition based<br />
<a href="http://www.cs.rpi.edu/%7Eszymansk/papers/TDFApaper.pdf">Click here to read this document</a><br />
</li><br />
<li><b>Network-Based intrusion detection Using Neural</b> - Networks Alan Bivens (2002)<br />
...Network-Based intrusion detection Using Neural Networks Alan Bivens<br />
that an entire area of research, called intrusion detection, is devoted to detecting this activity. We<br />
<a href="http://www.cs.rpi.edu/%7Eszymansk/papers/annie02.pdf">Click here to read this document</a><br />
<br />
<hr color="#ff0000" /><br />
<span style="color: red; font-size: medium;">Softwares and Related Intrusion Detection Products...</span><br />
<hr color="#ff0000" /><br />
</li><br />
<li><a href="http://www.securityfocus.com/infocus/1200">Abnormal IP Packets</a>: This article, a discussion of the characteristics of abnormal Internet Protocol (IP) packets, is the first in a series of tutorials that are intended to educate intrusion detection system <br />
</li><br />
<li><a href="http://www.snort.org/">About Snort</a>: This tool is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content <br />
</li><br />
<li><a href="http://www.abtrusion.com/">Abtrusion Security</a>: stops viruses and hacker tools on your computer. Only software that you have safely installed is allowed to start. Contrary to normal antivirus <br />
</li><br />
<li><a href="http://www.ids.org.au/main/support/using_appleshare.php">Accessing your files from Macintosh</a>: IDS is fully accessible to all Macintoshes within the University network using appleshare. To access your home directory, follow the instructions below. Your IDS home directory should appear... <br />
</li><br />
<li><a href="http://www.eipdistribution.com/">Active Protection Device</a>: Detailed performance management that displays graphical system counters including processor performance, disk performance and throughput. Dashboard view of current alert status. Alert processing <br />
</li><br />
<li><a href="http://www.forescout.com/">ActiveScout's</a>: patented Active Response technology provides intelligence to dynamically protect the perimeter against threats. This adaptive capability enables the accurate assessment of attackers <br />
</li><br />
<li><a href="http://www.brighttools.com/">Activeworx </a>: provides high-quality security information management software that works with leading security products, such as Snort, Checkpoint, and other intrusion detection system products, such as firewalls, vulnerability... <br />
</li><br />
<li><a href="http://www.activeworx.com/">Activeworx Security Center</a>: is a security event manager and a high powered security analyzer that is used to solve your information security needs. ASC works in both a centralized and distributed framework to perform event management, <br />
</li><br />
<li><a href="http://www.cs.tut.fi/%7Erammer/aide.html">Aide</a>: is a free replacement for Tripwire. It creates a database from the regular expression rules that it finds from the config file. Once this database is initialized it can be used to verify the integrity of the files... <br />
</li><br />
<li><a href="http://www.airdefense.net/products/airdefense_ids.shtm">AirDefense Guard </a>: is an 802.11a/b/g wireless LAN intrusion detection and security solution that identifies security risks and attacks, provides real-time nework audits and monitors the health of... <br />
</li><br />
<li><a href="http://www.airmagnet.com/">AirMagnet</a>: Our flagship product, AirMagnet Enterprise, actively secures and manages your WLANs around the clock and worldwide. The AirMagnet Mobile Suite provides a complementary set of professional tools that can <br />
</li><br />
<li><a href="http://airmagnet.com/">AirMagnet Enterprise</a>: actively protects and manages your WLANs around the clock and worldwide. The AirMagnet Mobile Suite provides a complementary set of professional tools that can go with you <br />
</li><br />
<li><a href="http://home.comcast.net/%7Ejay.deboer/airsnare/">AirSnare</a>: is another tool to add to your Wireless Intrusion Detection Toolbox. AirSnare will alert you to unfriendly MAC addresses on your network and will also alert you to DHCP requests taking place <br />
</li><br />
<li><a href="http://www.andrew.cmu.edu/user/rdanyliw/snort/snortacid.html">Analysis Console for Intrusion Databases</a>: is a PHP-based analysis engine to search and process a database of security events generated by various IDSes, firewalls, and network monitoring tools. <br />
</li><br />
<li><a href="http://www.romanlab.com/apw/index.html">Any Password</a>: is an easy-to-use tool that lets you store and arrange all your passwords, user IDs, and related information in a tree form. The program saves this information in encrypted files which <br />
</li><br />
<li><a href="http://www.arbornetworks.com/products_sp.php">Arbor’s Peakflow SP</a>: is a scalable platform that expands with a service provider's network, offering new levels of growth and customer care. The Arbor Peakflow SP platform provides network and security engineers with the tools... <br />
</li><br />
<li><a href="http://www.toplayer.com/content/products/intrusion_detection/attack_mitigator.jsp">Attack Mitigator IPS</a>: Providing a strong defense against intruders and attackers that attempt to cripple your business operations is imperative for today's IT organizations. Between the increasing... <br />
</li><br />
<li><a href="http://www.cxlsecure.com/">AZScan</a>: is a Windows based software tool which lets you quickly review the security of mid-range systems including: Unix systems including Linux, Solaris, AIX. Protect your systems from both external and internal security threats <br />
</li><br />
<li><a href="http://www.barbedwiretech.com/">Barbedwire Technologies </a>: is the market leader in Network Security Management Products. Our Flag ship Product “DP Security Management Console” provides a Unified Platform for managing multiple <br />
</li><br />
<li><a href="http://freshmeat.net/projects/benids/?topic_id=152">Benids</a>: is a pcap-based Network Intrusion Detection System for Linux. It uses its own XML rule file format which allows arbitrary, complex boolean matching conditions. It generates IDMEFv0.3 alert <br />
</li><br />
<li><a href="http://www.bindview.com/Products/DecSupCenter/">BindView Decision Support</a>: Automatically identify vulnerabilities that need your attention through integrated alerting and customizable thresholds. Identifying vulnerabilities and vulnerable systems... <br />
</li><br />
<li><a href="http://www.eeye.com/html/products/blink/index.html">Blink</a>: is eEye’s award-winning endpoint vulnerability prevention solution. No longer will an intrusion detection system (IDS) suffice; assets must be protected from the vulnerability, becoming resilient <br />
</li><br />
<li><a href="http://www.bluelance.com/">Blue Lance</a>: The key to a good defense is having the base for a solid response. And the only way to do that is to have a powerful tool like LT Auditor+ protecting you from the inside out. <br />
</li><br />
<li><a href="http://www.bluesocket.com/products/intrusionprotection.html">BlueSecure Intrusion Protection System</a>: Enterprise wireless LANs are rapidly finding their way from pilot projects to mainstream network deployments—from universities to hospitals, from ... <br />
</li><br />
<li><a href="http://www.stillsecure.org/">Border Guard Free</a>: is a feature-rich intrusion detection/prevention system (IDS/IPS) based on the award-winning Snort IDS engine. Beyond Snort functionality, Border Guard Free offer: true intrusion <br />
</li><br />
<li><a href="http://www.boxingorange.com/">Boxing Orange</a>: The challenges of keeping your network infrastructure secure have never been greater or more important to your business. To help ensure your business is protected, security must be... <br />
</li><br />
<li><a href="http://www.bro-ids.org/">Bro Intrusion Detection System </a>: is a Unix-based Network Intrusion Detection System (IDS). Bro monitors network traffic and detects intrusion attempts based on the traffic... <br />
</li><br />
<li><a href="http://www.broadcom.com/">Business Networks</a>: Broadcom's business networking solutions enable manufacturers to cost effectively develop equipment to support the increased demand for delivering digital content to and from the desktop... <br />
</li><br />
<li><a href="http://www.captusnetworks.com/products/ips_4000.html">Captus IPS 4000 series </a>: prevents network attacks including DDoS attacks, port scans, and exploits from unknown worms as well as unsanctioned traffic, such as file-swapping. At the same time, <br />
</li><br />
<li><a href="http://www.ccny.com/">Ccny</a>: works to provide a database to support decision making storing information on analysis of sales... Full range of information technology security services protecting your computer systems <br />
</li><br />
<li><a href="http://www.chkrootkit.org/">Chkrootkit is </a>: is a tool to locally check for signs of a rootkit. It contains: chkrootkit: shell script that checks system binaries for rootkit modification. ifpromisc.c: checks if the interface is in promiscuous mode. <br />
</li><br />
<li><a href="http://www.cisco.com/en/US/products/sw/secursw/ps976/index.html">Cisco IDS Host Sensor solution</a>: meets the enterprise server security needs of today, as well as tomorrow by giving organizations protection against future attacks, as well as today's known attacks. <br />
</li><br />
<li><a href="http://www.countersnipe.com/">CounterSnipe </a>: provides maximum visibility and control over traffic entering and leaving your environment. It is a powerful and flexible appliance that can function either as an Intrusion Detection System (IDS) passively sniffing <br />
</li><br />
<li><a href="http://www.covetrix.com/">Covetrix Security Audit</a>: Our Security Team uses proprietary and commercially distributed vulnerability analysis tools that focus on standards set by and published by your particular software. Covetrix uses a three software analysis... <br />
</li><br />
<li><a href="http://www.dmares.com/maresware/ac.htm#CRCKIT">Crckit</a>: It provides a 32 bit CRC and a 16 bit checksum of a file or files. The 32 bit value is identical to one created by the PKZIP program for its internal file integrity checks. This allows for a cross <br />
</li><br />
<li><a href="http://www.criticaltap.com/">CriticalTAP solution </a>: provides non-intrusive network access points for critical security and monitoring solutions such as intrusion detection and prevention and network performance analysis. By implementing these solutions... <br />
</li><br />
<li><a href="http://www.cybersafe.ltd.uk/">CyberSafe TrustBroker</a>: are fully commercially supported to meet your security needs for business critical applications and infrastructure. They support multi-platform, common authentication to secure your applications... <br />
</li><br />
<li><a href="http://www.cybertrace.com/ctids.html">CyberTrace </a>: Any systems administrator knows that it is difficult, if not impossible, to tell what is going on on the network. When they use tcpdump, or the Lanalyzer they have to be an expert to wade through the data. <br />
</li><br />
<li><a href="http://www.cybertrust.com/index.html">Cybertrust</a>: is a critical and trusted provider of information security technologies and services to Global 2000 companies and governments. 100% focused on information security... <br />
</li><br />
<li><a href="http://www.cygwin.com/">Cygwin</a>: is a Linux-like environment for Windows. It consists of two parts: A DLL (cygwin1.dll) which acts as a Linux API emulation layer providing substantial Linux API functionality... <br />
</li><br />
<li><a href="http://www.cymtec.com/">Cymtec Systems</a>: The growing number of viruses, worms, and other malicious traffic poses serious threats to your network. Have you done everything you know of to protect your company's assets from harm? Anti-virus <br />
</li><br />
<li><a href="http://www.daliansecurity.com/">Dalian</a>: Working closely with the product manufacturers, Dalian is continually training and upgrading the skills and capabilities of our customer engineers, to ensure that the ... <br />
</li><br />
<li><a href="http://www.ionx.co.uk/html/products/data_sentinel/index.php">Data Sentinel </a>: is a tool to locally check for signs of a rootkit. It contains: chkrootkit: a shell script that checks system binaries for rootkit modification. ifpromisc.c: checks if the network interface <br />
</li><br />
<li><a href="http://all.net/dtk/index.html">Deception ToolKit (DTK</a>: is a toolkit designed to give defenders a couple of orders of magnitude advantage over attackers. The basic idea is not new. We use deception to counter attacks. In the case of DTK <br />
</li><br />
<li><a href="http://www.thirdbrigade.com/">Deep HIP</a>: This company has assembled a powerful set of Deep Host Intrusion Prevention (HIP) products that are architected for today’s demanding multi-platform, multi-server environments. <br />
</li><br />
<li><a href="http://www.investni.com/">Defence Strategy</a>: The Intrusion Detection System (IDS) 'sniffs' the network to watch traffic, stop or 'snipe' intruders, and report on suspicious and unusual activity. IDS can be deployed in a number of ways... <br />
</li><br />
<li><a href="http://www.xdefenders.com/">DefenderWall</a>: delivers network and application-layer, Intrusion Prevention (IPS) and Intrusion Detection (IPS) services on a hardened Linux-HP server. It is an Internet security appliance that integrates essential functions into a <br />
</li><br />
<li><a href="http://demarc.com/products/sentarus/enterprise/">Demarc</a>: Sentarus Enterprise Edition solves your need for comprehensive security by integrating all major pieces of the network security puzzle into a single scalable solution, exceeding all ROI goals... <br />
</li><br />
<li><a href="http://www.learningtree.co.uk/ilt/courses/uk588.htm">Deploying Intrusion Detection Systems</a>: In this course, you gain knowledge of how attackers break into networks, and how an IDS can play a key role in detecting and responding to these events. <br />
</li><br />
<li><a href="http://www.ngssoftware.com/index.htm">Domino Scan II </a>: presents an attacker's eye view of the security of Lotus Domino web servers and bespoke Notes applications. Although Domino Scan II software runs on Microsoft Windows it can audit Lotus Domino web servers that are running... <br />
</li><br />
<li><a href="http://dominodig.sourceforge.net/">DominoDig</a>: This tool could be used as part of an Open Source pen-test to help automate much of the auditing that might be involved in digging through these anonymously accessible default databases <br />
</li><br />
<li><a href="http://www.dshield.org/">DShield </a>: provides a platform for users of firewalls to share intrusion information. DShield is a free and open service. It is the goal of DShield to allow access to its correlated information to the public at <br />
</li><br />
<li><a href="http://www.engagesecurity.com/products/eaglex/">Eagle X</a>: Preconfigured Intrusion detection system. Eagle X is an IDS environment using free software. Snort IDS (www.snort.org) and IDScenter are the core of this distribution. <br />
</li><br />
<li><a href="http://www.easy-guard.com/en/Easy_Guard_Intrusion_Alert_Content/">Easy Guard Intrusion Alert</a>: can monitor all the major TCP/IP protocols including, but not limited to, IP, Internet Control Message Protocol (ICMP), TCP, and User Datagram Protocol (UDP). It can also statefully decode application-layer protocols <br />
</li><br />
<li><a href="http://www.info.fundp.ac.be/%7Ecri/DOCS/asax.html">Efficient Universal Audit Trail Analysis</a>: At the heart of this project is the objective of designing and implementing a universal system for efficient distributed analysis of streams of data. Universality is achieved by means of format adaptors... <br />
</li><br />
<li><a href="http://www.tntsoftware.com/">ELM enterprise Manager</a>: is a comprehensive solution that gives IT administrators the power-to-see the health and status of distributed systems with a single glance. EEM collects critical data from hundreds of systems <br />
</li><br />
<li><a href="http://www.sdl.sri.com/projects/emerald/">Emerald</a>: represents state-of-the art in research and development of systems and components for anomaly and misuse detection in computer systems and networks: scalable Network Surveillance, <br />
</li><br />
<li><a href="http://www.securitywizards.com/solutions/secure-networks/">Enterasys</a>: Security remains the number-one concern for global enterprises, and yet many organizations adopt a patchwork approach to network security. <br />
</li><br />
<li><a href="http://www.enterasys.com/products/ids/">Enterasys Intrusion Defense </a>: Designed specifically to meet the unique security requirements of the enterprise environment, Enterasys Dragon Intrusion Defense System offers comprehensive features... <br />
</li><br />
<li><a href="http://www.networkassociates.com/us/products/mcafee/host_ips/desktop_server_agents.htm">Entercept Server</a>: McAfee Entercept agents protects desktops and servers against zero-day and known attacks. As the only host intrusion prevention system (IPS) combining behavioral rules, <br />
</li><br />
<li><a href="http://www.e-com.ca/eSCAN/">eSCAN</a>: evaluates your network from a remote location and regularly provides you with detailed network security audit reports that map your entire network security infrastructure. It eSCAN will show you vulnerabilities in <br />
</li><br />
<li><a href="http://www3.ca.com/solutions/Product.aspx?ID=163">eTrust Intrusion Detection</a>: Detection is a complete session security solution that incorporates three key security capabilities into one package — a comprehensive network intrusion management and prevention system, real-time session monitoring and Internet web filtering <br />
</li><br />
<li><a href="http://www.eventlogmanager.com/">EventTracker</a>: is a software-only, agent optional framework that can monitor critical back-office equipment including Windows, Unix/Linux and SNMP capable devices such as routers. The EventTracker™ Console component is <br />
</li><br />
<li><a href="http://ffpf.sourceforge.net/general/overview.php">Fairly Fast Packet Filter</a>: is an approach to network packet processing that adds many new features to existing filtering solutions like BPF. FFPF is designed for high speed by pushing computationally intensive tasks <br />
</li><br />
<li><a href="http://www.digitalpoint.com/tools/fmdigger/">FileMaker XML</a>: This utility can be used to test the security of your own FileMaker web server. All activity is logged -malicious activity will be reported to database owner. <br />
</li><br />
<li><a href="http://www.hsc.fr/ressources/outils/filterrules/index.html.en">Filterrules</a>: is a program which allows you to determine the rules of a firewall in a very reliable way. It is made up of two parts: a master, in charge of forging several IP packets, and a "slave", which listens on the other side <br />
</li><br />
<li><a href="http://www.scaramanga.co.uk/firestorm/index.html">Firestorm NIDS</a>: is an extremely high performance network intrusion detection system (NIDS). At the moment it just a sensor but plans are to include real support for analysis, reporting, remote console <br />
</li><br />
<li><a href="http://www.packetfactory.net/firewalk/">Firewalk</a>: is an active reconnaissance network security tool. If the gateway allows the traffic, it will forward the packets to the next hop where they will expire and elicit an <br />
</li><br />
<li><a href="http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent=/resources/proddesc/fport.htm">Fport</a>: reports all open TCP/IP and UDP ports and maps them to the owning application. This is the same information you would see using the 'netstat -an' command, but it also maps those ports <br />
</li><br />
<li><a href="http://ftimes.sourceforge.net/FTimes/index.shtml">FTimes</a>: a system baselining and evidence collection tool. The primary purpose of FTimes is to gather and/or develop information about specified directories and files in a manner conducive to intrusion... <br />
</li><br />
<li><a href="http://www.criticalwatch.com/">FusionVM</a>: It is an enterprise class vulnerability management system that goes beyond just scanning and tracking vulnerabilities to provide a powerful, enterprise business process platform that integrates and automates... <br />
</li><br />
<li><a href="http://www.honeynet.org.es/papers/honeywall/#d0e39">GenII Honeynet Gateway</a>: is the most critical element in a GenII Honeynet. Basically, it is the gateway of the Honeynet, but it is also a firewall, an IPS (Intrusion Prevention System), and a network traffic/system logger. <br />
</li><br />
<li><a href="http://www.getech.co.uk/">Getech</a>: Getech can now offer a portfolio of best of breed Intrusion Detection and Intrusion Prevention Systems products that represent sector leading companies and have... <br />
</li><br />
<li><a href="http://www.getronics.com/global/en-gb/home.asp">Getronics</a>: provides Network and Desktop Outsourcing services, assuming full responsibility for service availability and quality. Helpdesk services can be provided to the client’s workforce via telephone, <br />
</li><br />
<li><a href="http://www.gfi.com/lanselm/">GFI LANguard</a>: ships with a security event analysis engine which takes into account the type of security event, security level of each computer, when event occurred (outside or during operating <br />
</li><br />
<li><a href="http://www.globaldataguard.com/">Global DataGuard</a>: Information security now requires more than basic intrusion detection systems (IDS). Detecting and preventing previously unknown attacks must incorporate deep threat analysis <br />
</li><br />
<li><a href="http://hogwash.sourceforge.net/oldindex.html">Hogwash</a>: is an intrusion detection system(IDS)/packet scrubber. What does that mean? Hogwash can detect attacks on your network, and if you want, filter them out. <br />
</li><br />
<li><a href="http://honeyweb.sourceforge.net/">Honey Web </a>: is an advanced web server honey pot , Active Server Pages ( ASP ) compliant that detects common attacks against web servers and logs the requests in a real-time viewer. It can recognize buffer overflows... <br />
</li><br />
<li><a href="http://www.thomas-apel.de/honeybee/">Honeybee</a>: is a tool for semi-automatically creating emulators of network server applications. The resulting emulators can be used together with the honeypot application Honeyd. The emulators should be able to withstand <br />
</li><br />
<li><a href="http://www.cl.cam.ac.uk/%7Ecpk25/honeycomb/">Honeycomb </a>: is a system for automated generation of signatures for network intrusion detection systems (NIDSs). The system applies protocol analysis and pattern-detection techniques to traffic captured on honeypots. Using traffic on honeypots has the major advantage <br />
</li><br />
<li><a href="http://www.zope.org/Members/Ioan/HoneydCenter">Honeyd Control Center</a>: This product is a complete IDS solution based on honeyd. Honeyd does not intercept any network traffic. It is your responsibility to direct network traffic towards the Honeyd machine. Add a route on your... <br />
</li><br />
<li><a href="http://sourceforge.net/projects/honeyview">HoneyVIew</a>: is a tool to analyze honeyd-logfiles of the honeyd-daemon implemented by Niels Provos in an convenient way. HoneyView generates graphical and textual results from queries against the logfile data. <br />
</li><br />
<li><a href="http://enterprisesecurity.symantec.com/products/products.cfm?ProductID=48">Host IDS</a>: Monitors systems in real time to detect and respond to security breaches and other unauthorized activities. Process Reporter provides access to granular process data so administrators <br />
</li><br />
<li><a href="http://www.networkintrusion.co.uk/hips.htm">Host Intrusion Prevention Systems </a>: the latest IDS buzzword which not only detect attacks but prevent them as well. Just as some NIDS went INLINE to block attacks, or just send TCP resets to close <br />
</li><br />
<li><a href="http://www.rapid7.com/">http://www.rapid7.com/</a>: reduces the time, risk and cost associated with fixing security vulnerabilities in your network by combining vulnerability assessment, risk management, policy and compliance reporting, remediation guidance, and automated ticketing into one integrated package. <br />
</li><br />
<li><a href="http://idabench.ists.dartmouth.edu/">IDABench </a>: is a pluggable framework for intrusion analysis. It is not intended to be an intrusion detection system, although it can be used as such. One of the primary design goals was to provide intrusion analysts easy access <br />
</li><br />
<li><a href="http://www.dolfin.com/products/index.htm">Identiprise</a>: A comprehensive solution for Digital Identity Lifecycle management, to meet operational, security, and compliance challenges. Thanks to a distinctive architecture, Identiprise takes radically... <br />
</li><br />
<li><a href="http://idsdialup1.ids.net/ids/">IDS</a>: is proud to be Rhode Island's largest Internet services provider For information on signing up with IDS to access the Internet from home, please send... <br />
</li><br />
<li><a href="http://www.spitzner.net/intrusion.html">IDS for Checkpoint Firewall</a>: To detect and monitor these scans, we will build a script that first logs whenever someone connects to a predetermined port, and then emails us an alert. To do this, we will be using the User Defined Alert. <br />
</li><br />
<li><a href="http://www.breach.com/">IDS Enhancements</a>: Nearly 50 percent of all network traffic is now encrypted through SSL. As that percentage continues to grow, the expanded use of SSL presents a real challenge. <br />
</li><br />
<li><a href="http://www.activeworx.org/programs/idspm/index.htm">IDS Policy Manager </a>: was written to manage Snort IDS sensors in a distributed environment. This is done by having the ability to take the text configuration files and allow you to modify them with an easy to use Graphical interface. <br />
</li><br />
<li><a href="http://www.intrusion.com/products/securenet/sensor/">IDS Product</a>: Beyond firewalls, making your network secure requires a level of visibility into the nature and characteristics of network traffic to identify and control threats from unauthorized users, back-door <br />
</li><br />
<li><a href="http://www.idssoftware.com/idsserver.html">IDS Server</a>: is an Internet database access server that enables both Java and .NET applications to connect to databases. It offers three client components. Used with custom data source, allows <br />
</li><br />
<li><a href="http://www.wingate.com/product-wingate.php">IDS Software</a>: WinGate is a sophisticated integrated Internet gateway and communications server designed to meet the control, security and communications needs of today’s Internet-connected <br />
</li><br />
<li><a href="http://www.nfr.com/solutions/sentivist-ids.php">IDS Solution</a>: Because of Smart Sensor™ technology, Sentivist can run in either intrusion prevention or intrusion detection mode, or a combination of intrusion prevention and intrusion detection modes. <br />
</li><br />
<li><a href="http://www.nss.co.uk/ips/edition2/index.htm">IDS Test</a>: Following the huge success the first comprehensive Intrusion Prevention System (IPS) test of its kind, The NSS Group is pleased to present the results of its second IPS Group Test which <br />
</li><br />
<li><a href="http://docs.mandragor.org/files/RFCs/fyi/11">IDS Working Group</a>: To compile this catalog, the IDS Working Group solicited input from the X.500 community by surveying several Internet mailing lists, including... <br />
</li><br />
<li><a href="http://jade.cs.uct.ac.za/idsa/">Idsa</a>: is a research project to equip trusted applications with some form of security awareness. Conventional applications have little ability to detect probes or attacks... <br />
</li><br />
<li><a href="http://www.sun.com/">iForce Intrusion Detection</a>: is a comprehensive, pre-configured security solution that offers "out-of-the-box" experience, ease of use, and simplified daily operations to help lower TCO <br />
</li><br />
<li><a href="http://www.immunitysec.com/products-canvas.shtml">Immunity CANVAS Professional </a>: allows your security compliance testing team to take advantage of over fifty assessment modules. <br />
</li><br />
<li><a href="http://impost.sourceforge.net/">Impost</a>: is a network security auditing tool designed to analyze the forensics behind compromised and/or vulnerable daemons. There's two different kinds of operating modes used <br />
</li><br />
<li><a href="http://www.seccuris.com/Services-ManagedOfferings.htm">Integrated Security Management</a>: is a co-managed security solution that effectively identify and allocates resources to all areas of information security management. Allows clients of any size... <br />
</li><br />
<li><a href="http://integrit.sourceforge.net/">Integrit</a>: is a more simple alternative to file integrity verification programs like tripwire and aide. It helps you determine whether an intruder has modified a computer system. <br />
</li><br />
<li><a href="http://www.securityfocus.com/infocus/1532">Introduction To Distributed Intrusion De</a>: A distributed IDS (dIDS) consists of multiple Intrusion Detection Systems (IDS) over a large network, all of which communicate with each other, or with <br />
</li><br />
<li><a href="http://www.uac.com/Products/intrusion_alert.html">Intrusion Alert</a>: protects your organization by intelligently monitoring and responding to electronic fraud, espionage, theft and snooping by people within your network and hackers outside of your LAN. <br />
</li><br />
<li><a href="http://www.sans.org/rr/whitepapers/detection/">Intrusion Detection</a>: Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and ... <br />
</li><br />
<li><a href="http://www.honeypots.net/">Intrusion Detection</a>: An Intrusion Detection System provides much the same purpose as a burglar alarm system installed in a house. In case of a intrusion, the IDS system will issue some type of warning or alert. <br />
</li><br />
<li><a href="http://all.net/journal/ntb/ids.html">Intrusion Detection and Response</a>: The state of the art in logical intrusion detection of national information infrastructure (NII) systems is such that a human expert working with a well-developed set <br />
</li><br />
<li><a href="http://www.cerias.purdue.edu/about/history/coast/projects/index.php#idiot">Intrusion Detection In Our Time</a>: is a project to develop a new approach to efficient misuse detection methods. This work was started by Sandeep Kumar, who recently completed his Ph.D. He designed a new method of employing complex <br />
</li><br />
<li><a href="http://www.cerias.purdue.edu/about/history/coast_resources/intrusion_detection/">Intrusion Detection Systems</a>: This site is a listing of many of the internet resources associated with Intrusion Detection. The list is divided into sections to make finding information easier. <br />
</li><br />
<li><a href="http://www.ttinet.com/products.html">Intrusion Detector</a>: Polycenter Security Intrusion Detector - Background software that constantly monitors OpenVMS and Digital/Tru64 UNIX systems, and sends realtime alerts about possible security <br />
</li><br />
<li><a href="http://www.lucidsecurity.com/">IpAngel</a>: The ipANGEL Adaptive Vulnerability Shield is a powerful intrusion prevention appliance on the market today. Vulnerabity mitigation is a reality and it's the easiest to own and operate. <br />
</li><br />
<li><a href="http://www.itlab.co.uk/">It Intrusion Detection</a>: Our experienced consultants will help you to determine the critical points on your network that will benefit from the implementation of a network sensor. We will carry out a product evaluation... <br />
</li><br />
<li><a href="http://www.joretsoftware.co.uk/">Joret Software</a>: Audit the security settings of your corporate UNIX, Windows NT, OS/400 and VMS systems from your local PC. There is no software to load on the host system. Automate daily, weekly... <br />
</li><br />
<li><a href="http://www.juniper.net/products/intrusion/">Juniper Networks Intrusion</a>: provides comprehensive and easy to use protection against current and emerging threats at both the application and network layer. Can be quickly and confidently deployed... <br />
</li><br />
<li><a href="http://www.keyfocus.net/kfsensor/">KFSensor</a>: is a honeypot based Intrusion Detection System (IDS). It acts as a honeypot to attract and detect hackers and worms by simulating vulnerable system services and trojans. <br />
</li><br />
<li><a href="http://labrea.sourceforge.net/labrea-info.html">LaBrea - Sticky Honeypot and IDS</a>: takes over unused IP addresses, and creates virtual servers that are attractive to worms, hackers, and other denizens of the Internet. The program answers connection attempts in such a way that the machine at <br />
</li><br />
<li><a href="http://lak-ips.sourceforge.net/">LAk - Intrusion Prevention System</a>: A single compilation of source, binaries, scripts and whitepapers on Intrusion Prevention System. The aim; to get an intrusion prevention system started in minutes... <br />
</li><br />
<li><a href="http://www.lancope.com/products/">Lancope </a>: Traditional firewalls, antivirus and intrusion detection systems (IDS) require new software code to be written and activated before they can protect against a threat. StealthWatch protects hosts <br />
</li><br />
<li><a href="http://www.lever.co.uk/">Lever</a>: The course is intended for security staff wishing to gain a deeper understanding of Intrusion Detection Systems with a view to designing, implementing and maintaining such environments. <br />
</li><br />
<li><a href="http://www.lids.org/">Lids</a>: Linux Intrusion Detection System is a kernel patch and admin tools which enhances the kernel's security by implementing Mandatory Access Control (MAC). When it is in effect, chosen file access, <br />
</li><br />
<li><a href="http://macinmind.com/Help/Passenger/Help//pgs/6.htm">Mac OS X Server</a>: If you don't already have users in Mac OS X Server, you can import tab-delimited text and set the parameters for Export. For moving Macintosh Manager account Preferences to <br />
</li><br />
<li><a href="http://macscan.securemac.com/">MacScan</a>: is designed to detect, isolate and remove spyware, keystroke loggers, Trojans, and bring awareness to remote administration type applications which could have been maliciously... <br />
</li><br />
<li><a href="http://www.trusecure.com/solutions/programs/managed_ids.shtml">Managed IDS</a>: TruSecure's Managed IDS monitors network and server traffic using host- and/or network-based intrusion detection, unobtrusively watching for suspicious activity against your critical online information resources such as networks, <br />
</li><br />
<li><a href="http://www.ambiron.net/mssIntrusionDetection.php4">Managed Security Services</a>: Ambiron's Managed IDS is the cost-effective way to continuously monitor the security of your Internet and network infrastructure. Because the Internet never sleeps, <br />
</li><br />
<li><a href="http://www.crossteccorp.com/netopfirewall/index.html">Managed Security Solutions</a>: Savvis knows that security-conscious enterprises are looking for solutions that can be easily integrated into their networking and hosting solutions. <br />
</li><br />
<li><a href="http://www.oreilly.com/catalog/snortids/index.html">Managing Security with Snort & IDS Tools</a>: This practical guide to managing network security covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDSapplications... <br />
</li><br />
<li><a href="http://tmml.sourceforge.net/doc/tcl/resource.html">Manipulate Macintosh resources</a>: The resource command provides some generic operations for dealing with Macintosh resources. This command is only supported on the Macintosh platform. <br />
</li><br />
<li><a href="http://www.mazunetworks.com/solutions/">Mazu Enforcer</a>: is a dedicated system that protects networks from distributed denial of service (DDoS) attacks and other bandwidth-based threats. <br />
</li><br />
<li><a href="http://rudolf.sytes.net/en/">Mhwa</a>: is a visualisation of attack attempts which are usually performed by script-kiddies. MHWA can indirectly provide information about newest exploits, also, it can show how often and in which hours self-taught <br />
</li><br />
<li><a href="http://www.mimestar.com/">MimeStar</a>: Our SecureNet PRO product suite is an enterprise-scalable security solution combining centralized network monitoring, fully customizable attack scripting... <br />
</li><br />
<li><a href="http://www.mynetwatchman.com/">myNetWatchman </a>: is a service that automatically aggregates the firewall logs from a very large number of computers, analyzes these logs for evidence of hacker or worm attacks, and notifies the ISPs where attacks are coming from. <br />
</li><br />
<li><a href="http://www.netpenguin.net/">NetPenguin</a>: consists of 12 network utilities that offer a large viriety of network administration and monitoring services. It includes the following functions: sysInfo, Tracert, Ping Scanner, IP Scanner, IP query... <br />
</li><br />
<li><a href="http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/netstat.mspx">Netstat</a>: displays active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols). <br />
</li><br />
<li><a href="http://www.analogx.com/contents/download/network/nsl.htm">Netstat Live (NSL)</a>: is a small, easy to use TCP/IP protocol monitor which can be used to see your exact throughput on both incoming and outgoing data <br />
</li><br />
<li><a href="http://www.sun.com/training/catalog/courses/SC-345.xml">Network Intrusion Detection</a>: The Solaris Operating System Network Intrusion Detection course provides students with the knowledge and skills necessary to perform the advanced administration <br />
</li><br />
<li><a href="http://www.networkchemistry.com/index.php">NetworkChemistry</a>: Many of the challenges are administrative, like deciding what capabilities to offer and establishing the wireless security policy. Other challenges are more technical in nature and involve activities like... <br />
</li><br />
<li><a href="http://www.sdl.sri.com/projects/nides/">Next-Generation Intrusion Detection Expe</a>: is a comprehensive intrusion-detection system that performs real-time monitoring of user activity on multiple target systems connected via Ethernet. <br />
</li><br />
<li><a href="http://www.nfr.com/solutions/">Nfr</a>: Intrusions to your network may come in the form of a targeted attack by a hacker or a random attack via a self-propagating worm. <br />
</li><br />
<li><a href="http://www.nfr.com/">NFR Security</a>: redefines the intrusion defense and management market by offering both trusted intrusion prevention and accurate intrusion detection technologies. <br />
</li><br />
<li><a href="http://www.nitrosecurity.com/products/index.asp">NitroSecurity IPS</a>: utilizes a sophisticated, high-performance aggregation and correlation engine that draws from the industry's largest signature library and powerful anomaly detection and protection... <br />
</li><br />
<li><a href="http://www.nsecure.net/">nPatrol Web Agents</a>: are application level agents designed to protect intrusions through the Web Servers. The nPatrol Web Agents offer real-time Intrusion Detection and Prevention capabilities. <br />
</li><br />
<li><a href="http://www.ids.belbone.be/">Open Source IDS</a>: A fully functional Intrusion Detection System created with open-source tools is available as an ISO image here. It is built upon a custom RedHat 7.2 distribution <br />
</li><br />
<li><a href="http://www.hostintegrity.com/osiris/">Osiris</a>: is a Host Integrity Monitoring System that periodically monitors one or more hosts for change. It maintains detailed logs of changes to the file system, user and group lists, resident kernel modules <br />
</li><br />
<li><a href="http://www.outlookexpressbackup.net/">Outlook Express Backup Factory</a>: Outlook Express Backup Factory, an email backup and restoration utility, backs up your email data from an Email Client and easily restores them whenever necessary. <br />
</li><br />
<li><a href="http://lcamtuf.coredump.cx/p0f.shtml">P0f v2</a>: is a versatile passive OS fingerprinting tool. P0f can identify the operating system on: machines that connect to your box (SYN mode). It can detect or measure the following: firewall presence, NAT use <br />
</li><br />
<li><a href="http://www.packetalarm.com/index.php3">PacketAlarm UTM</a>: is generally employed at the gateway to the Internet, where it controls incoming and outgoing data traffic in real time. Its coordinated components allow it to identify and block viruses, network-based worms <br />
</li><br />
<li><a href="http://panoptis.sourceforge.net/">Panoptis</a>: is a project started some time ago, with the aim to stop the Denial of Service and Distributed Denial of Service attacks that have been torturing the Internet for the last few years. It is based on real-time <br />
</li><br />
<li><a href="http://e-securion.com/">Parador</a>: Do network scanners, anti-viral software and firewalls give the same protection? There is no silver bullet solution available to make your data entirely secure. Parador best effectiveness stems from... <br />
</li><br />
<li><a href="http://www.honeypot-ids.com/">PatriotBox HoneyPot Server</a>: The use of a decoy-based Intrusion Detection System (IDS) in corporate network environments provide effective early detection of intrusion threats. By alerting network management of intrusion... <br />
</li><br />
<li><a href="http://www.prelude-ids.org/">Prelude</a>: is an Hybrid IDS framework, that is, it is a product that enable all available security application, be it opensource or proprietary, to report to a centralized system. In order to achieve this <br />
</li><br />
<li><a href="http://www.elcomsoft.com/ppa.html">Proactive Password Auditor</a>: is a password security test tool that's designed to allow Windows XP and Windows Server 2003-based systems administrators to identify and close security holes in their networks. Password hacking is one of the <br />
</li><br />
<li><a href="http://www.promisec.com/">Promisec</a>: enables organizations to confidently place trust in their most important assets - their people. Our always-on, comprehensive and rapidly-implemented internal network security solutions detect and eliminate.. <br />
</li><br />
<li><a href="http://www.prosumis.com/">Prosumis</a>: is a Reykjavik based Internet security company with the mission of providing high quality online network and security test solutions and security consulting. Our online solutions are build with <br />
</li><br />
<li><a href="http://www.proxypot.org/">Proxypot project </a>: aims to intercept spam messages as they are being sent, record the sender's identity, and provide evidence that can be used to get the spammers kicked off the Internet ... <br />
</li><br />
<li><a href="http://www.psynapsetech.com/">Psynapse Technologies</a>: Checkmate detects intent rather than waiting for evidence of an attack to occur. Current signature and anomaly detection devices are forced to react to the attacker, <br />
</li><br />
<li><a href="http://www.q1labs.com/">QRadar</a>: the most powerful Network Security Management Platform available today, combines flow-based network knowledge, security event correlation and asset-based vulnerability assessment. <br />
</li><br />
<li><a href="http://wm.quest.com/">Quest Infrastructure Management</a>: delivers software products in the following four areas: Active Directory, Exchange, Windows, and Unix/Linux. We offer a total solution to your software needs. We simplify, automate, and secure your infrastructure <br />
</li><br />
<li><a href="http://quidscor.sourceforge.net/">QuIDScor</a>: is an open source project demonstrating the value in correlating information between Intrusion Detection Systems and vulnerability assessment and management platforms.... <br />
</li><br />
<li><a href="http://www.iss.net/isaserver/">RealSecure Server Sensor</a>: While the ISA Server acts as the security guard for your network deciding what traffic is allowed to pass, ISS' RealSecure Server Sensor 6.5 for ISA Server takes on the role... <br />
</li><br />
<li><a href="http://www.redhat.com/docs/manuals/linux/RHL-8.0-Manual/security-guide/s1-ids-net.html">Red Hat Linux</a>: Network-based intrusion detection systems operate differently from host-based IDSes. The design philosophy of a network-based IDS is to scan network packets at the router or host-level, <br />
</li><br />
<li><a href="http://www.red-m.com/products-and-services/">Red-M</a>: Developed to provide clients with enhanced levels of security for their wireless networks, this service monitors all WiFi and Bluetooth-based services and identifies security lapses or weaknesses in systems <br />
</li><br />
<li><a href="http://www.networkchemistry.com/products/">RFprotect</a>: Network Chemistry’s innovative Wireless Intrusion Protection System, RFprotect™, closes the gap in enterprise wireless LAN (WLAN) security, while dramatically improving performance. <br />
</li><br />
<li><a href="http://www.guardiandigital.com/products/ids.html">Robust Host Intrusion Detection Solution</a>: The Linux Intrusion Detection System (LIDS) implements an additional level of access control above and beyond what is normally included with the Linux kernel. <br />
</li><br />
<li><a href="http://www.rootkit.nl/">Rootkit Hunter</a>: is scanning tool to ensure you for about 99.9%* you're clean of nasty tools. This tool scans for rootkits, backdoors and local exploits by running tests like: MD5 hash compare; look for default files used by <br />
</li><br />
<li><a href="http://safeit.ca/intrusiondetection.htm">SafeIT </a>: A host based intrusion detection system does not monitor the network traffic, rather it monitors what's happening on the actual target machines. It does this by monitoring security event <br />
</li><br />
<li><a href="http://la-samhna.de/samhain/">SamHain file integrity - intrusion detec</a>: is a multiplatform, open source solution for centralized file integrity checking / host-based intrusion detection on POSIX systems (Unix, Linux, Cygwin/Windows). <br />
</li><br />
<li><a href="http://www.sans.org/resources/idfaq/">SANS : Intrusion Detection FAQ</a>: The Internet's most trusted site for vendor neutral intrusion detection information. IDS vendors have made tremendous gains in defeating IDS evasion techniques <br />
</li><br />
<li><a href="http://scadahoneynet.sourceforge.net/">Scada HoneyNet Project</a>: The short-term goal of the project is to determine the feasibility of building a software-based framework to simulate a variety of industrial networks such as SCADA, DCS, and PLC architectures <br />
</li><br />
<li><a href="http://www.sec-1.com/intrusion_detection_systems.html">Sec-1</a>: Intrusion Detection Systems allow organisations to keep pace with the current threats, potential threats and vulnerabilities within the network. <br />
</li><br />
<li><a href="http://www.inzen.com/eng/products/HIDS/EP_HIDS_01.asp">Secuplat HIDS</a>: is a server-based intrusion detection system. It adopts misuse detection to detect illegal access attempts that firewall or network-based intrusion detection systems cannot. <br />
</li><br />
<li><a href="http://www.securedwire.com.au/">SecureDrive</a>: sells and supports a comprehensive range of security solutions that are affordable, scalable, easy to implement and automatic. We provide enterprise-level, high performance solutions that automatically stop fast spreading, self propagating network worms... <br />
</li><br />
<li><a href="http://www.radware.com/">SecureFlow</a>: enables transparent, selective integration of content inspection, anti-virus, VPN, IDS and firewall best-of-breed security tools into a unified switched architecture to eliminate the security/performance tradeoff and <br />
</li><br />
<li><a href="http://www.securepoint.cc/en/products-ids.html">Securepoint IDS nuzzler</a>: allows for analysing networks with high datatraffic. Around 2.400 rules for the recognition of viruses, trojans, exploits...are available. The integrated Monitoring/Surveillance <br />
</li><br />
<li><a href="http://www.vigilantminds.com/prod_secx.php">SecureXone</a>: provides you with our most comprehensive best-fit integrated package of managed information security services, delivered in real time and on a 24x7 basis, plus real-time access to security information <br />
</li><br />
<li><a href="http://www.securicore.ca/IPS/">Securicore </a>: DefensePro, is an in-line network based intrusion prevention system (IPS) that instantly terminates attacks, ensuring harmful traffic never reaches your network and networked devices. <br />
</li><br />
<li><a href="http://www.inplexus.com/hostids.html">Security for Host IDS</a>: Inplexus offers deployment, configuration and training assistance for Host IDS. Our staff will perform the software deployment on one or more HP-UX machines at your client site. <br />
</li><br />
<li><a href="http://www.easy-guard.com/">Security IDS Management</a>: An issue too often overlooked when considering intrusion detection is management - securely managing the system itself. Embraced within this aspect is reporting... <br />
</li><br />
<li><a href="http://www.securitymanagement.com/library/000763.html">Selecting a Site for the Software Sentry</a>: Network security is a dynamic process in which system administrators must be equipped to constantly monitor and respond to suspicious activity. <br />
</li><br />
<li><a href="http://www.nfr.net/">Sentivist - intrusion detection system</a>: Because of Smart Senso technology, Sentivist can run in either intrusion prevention or intrusion detection mode, or a combination of intrusion prevention and intrusion detection modes. Cyber assaults... <br />
</li><br />
<li><a href="http://www.nswc.navy.mil/ISSEC/CID/">Shadow IDS</a>: is the result of a project that was originally called the Cooperative Intrusion Detection Evaluation and Response (CIDER) project. It was an effort of NSWC Dahlgren, <br />
</li><br />
<li><a href="http://www.deerfield.com/products/hfnetchkpro/">Shavlik HFNetChkPro</a>: is an industry-leading patch management solution designed to automatically scan and deploy Windows security patches to multiple computers from a central console. <br />
</li><br />
<li><a href="http://sid.sourceforge.net/">SID-IDS</a>: Shellcode/PTY Intrusion Detection: Aims at detecting unwanted PTY action on UNIX systems. SID-IDS is a kernel-based Host Intrusion Detection System. <br />
</li><br />
<li><a href="http://www.insecure.org/stf/secnet_ids/secnet_ids.html">Signature Analysis</a>: The question of what information is relevant to an IDS depends upon what it is trying to detect. For a system that is monitoring DNS traffic, the names of the hosts being queried... <br />
</li><br />
<li><a href="http://www.trigeo.com/">SIM-Based Intrusion Detection</a>: has a complete view of network activity including perimeter, server, workstation and user behavior. If it's your responsibility to monitor the network, analyze suspicious... <br />
</li><br />
<li><a href="http://sourceforge.net/projects/single-honeypot/">Single-honeypot</a>: is a powerfull tool, for security interest about the estudies of techniques of breaking systems. This is, a singular or little honeypot for test your networks for hostiles visitors. <br />
</li><br />
<li><a href="http://www.datacomsystems.com/">SingleStream</a>: While traditional Gigabit Ethernet taps might enable full-duplex monitoring of all traffic on a network link, they transmit the data to the monitoring device (e.g. analyzer, IDS, probe) ... <br />
</li><br />
<li><a href="http://www.pentasecurity.com/english/productmain_1.html">Siren</a>: is a technologically proven intrusion detection system, first to receive the Korean government¡¯s K4 Certification - Siren boasts a large pool of satisfied IDS customers, equipped with both the host <br />
</li><br />
<li><a href="http://slink.sourceforge.net/">sLink</a>: consists of a daemon slinkd and a suite of cgi programs which provide a web interface to an EDM/BOSCH Solution16 Alarm Panel. Some of the immediate advantages this offers are self-monitoring your alarm system <br />
</li><br />
<li><a href="http://www.slymail.com/">SlyMai</a>: records every 'keystroke' entered on the PC so you can track almost anything done, websites visited, emails sent, what's been typed into a document, what's said in chat rooms... <br />
</li><br />
<li><a href="http://www.klcconsulting.net/smac/">SMAC</a>: is a MAC Address Modifying Utility (spoofer) for Windows 2000, XP, and Server 2003 systems. Test Intrusion Detection Systems (IDS), whether they are Host and Network Based IDS. <br />
</li><br />
<li><a href="http://www.beldurnik.com/paper/NIDS.html">Small Environment Network Intrusion Dete</a>: Intrusion detection in short refers to the processes that are used in discovering unauthorized use of our network or computer devices. This is done through <br />
</li><br />
<li><a href="http://www.palisadesys.com/products/smokedetector/index.shtml">SmokeDetector</a>: will capture important information from someone trying to hack into it and send it to the administrator. Included in this information is the date and time of the attempt, the IP address... <br />
</li><br />
<li><a href="http://www.intersectalliance.com/projects/Snare/">Snare</a>: is currently used by hundreds of thousands of individuals, and organisations worldwide. Snare for Linux is used by many large Financial, Insurance, Healthcare, Defence, AeroSpace, and <br />
</li><br />
<li><a href="http://www.securemac.com/macosxsnort.php">Snort Mac OS X</a>: is a lightweight network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content ... <br />
</li><br />
<li><a href="http://snort-wireless.org/">Snort-Wireless</a>: is an attempt to make a scalable (and free!) 802.11 intrusion detection system that is easily integratable into an IDS infrastructure. <br />
</li><br />
<li><a href="http://www.solutionary.com/">Solutionary </a>: is a provider of Managed Security Services. Our services detect and prevent IT security threats. We partner with organizations to help them reduce risk, safeguard information and protect IT <br />
</li><br />
<li><a href="http://www.lac.co.jp/business/sns/intelligence/sombria_e.html">Sombria</a>: is a honeypot system comprised of a web server, a firewall and an intrusion detection system that is intended for the sole purpose of network surveillance and research <br />
</li><br />
<li><a href="http://www.sourcefire.com/products/is.html">Sourcefire Intrusion Sensors </a>: offer an industry leading intrusion detection and prevention (IDP) solution that provides defense in depth by analyzing network traffic and either blocking, replacing <br />
</li><br />
<li><a href="http://www.specter.com/default50.htm">Specter</a>: is a smart honeypot-based intrusion detection system. It simulates a vulnerable computer, providing an interesting target to lure hackers away from the production machines. SPECTER offers <br />
</li><br />
<li><a href="http://www.filesland.com/companies/Network-Spy/Network-Spy.html">Spy Network</a>: An Ethernet packet capture program. It allows to you decode and analyze IP packets on your LAN. It also lets you measure network load, resolve IP conflicts, check bandwidth utilization <br />
</li><br />
<li><a href="http://www.network-protection.com/">SSI</a>: eTrust offers the comprehensive network protection capabilities that you need to proactively secure your environment, including Virtual Private Network (VPN), access control, encryption, <br />
</li><br />
<li><a href="http://www.statonline.harris.com/solutions/sec_policy/analyzer_index.asp">STAT Analyzer</a>: automates and streamlines the network security assessment process. STAT Analyzer automatically consolidates multiple network scanning and modeling results and provides a single, <br />
</li><br />
<li><a href="http://www.lancope.com/XFRM.asp?RTN=Data/Home&XML=products.xml&XSL=products.xsl">StealthWatch</a>: identifies network misuse and abuse, service usage and IP behavior and allows security teams to track suspicious behavior and network misuse before it's too late. <br />
</li><br />
<li><a href="http://research.microsoft.com/HoneyMonkey/">Strider HoneyMonkey Exploit Detection</a>: is a Microsoft Research project to detect and analyze Web sites hosting malicious code. The intent is to help stop attacks that use Web servers to exploit unpatched browser vulnerabilities and install malware on the <br />
</li><br />
<li><a href="http://www.sussen.org/">Sussen </a>: is a tool for testing the security of computers and other network devices. It is in an early stage of development and should be considered experimental. Sussen is improving rapidly on many fronts.. <br />
</li><br />
<li><a href="http://enterprisesecurity.symantec.com/products/products.cfm?productid=48">Symantec Host IDS </a>: provides real-time monitoring, detection, and prevention of security breaches, delivering automated policy enforcement and incident response for servers, applications, and data. As a complement to firewalls and other access controls, it enables administrators <br />
</li><br />
<li><a href="http://www.dataquest.com/DisplayDocument?doc_cd=93502">Symantec Host Intrusion Detection System</a>: Symantec offers an enhanced Host IDS product and the advanced ManHunt network IDS, but this may not be enough to establish Symantec as a leader... <br />
</li><br />
<li><a href="http://www.sdl.sri.com/programs/intrusion/history.html">System Design Laboratory</a>: With the maturity of the analysis methodologies developed under IDES, SRI began a comprehensive effort to enhance, optimize, and re-engineer the earlier IDES prototype <br />
</li><br />
<li><a href="http://www.osti.gov/energycitations/product.biblio.jsp?osti_id=6274833">System for distributed intrusion detecti</a>: The study of providing security in computer networks is a rapidly growing area of interest because the network is the medium over which most attacks... <br />
</li><br />
<li><a href="http://www.systemexperts.com/">SystemExperts</a>: Our accelerated security assessment methodology is structured to minimize the burden it places on our clients - this is true both prior to the engagement and during it. We do not require our clients to prepare <br />
</li><br />
<li><a href="http://www.citi.umich.edu/u/provos/systrace/">Systrace </a>: it is possible to monitor daemons on remote machines and generate warnings at a central location. As these warnings indicate operations not covered by existing policy, it is possible to detect <br />
</li><br />
<li><a href="http://www.tamos.com/">TamoSoft</a>: develops cutting-edge security and network monitoring software for the Internet and Local Area Networks, providing clients with the ability and confidence to meet the challenges of tomorrow's <br />
</li><br />
<li><a href="http://www.gslis.utexas.edu/%7Enetsec/ids.html#plac">TCP Stream Reassembly/IP</a>: Attacks involving TCP and IP packets are the cause for special concern. In order to monitor a TCP/IP connection, the target network must keep track of all of the individual <br />
</li><br />
<li><a href="http://tcpcom.com/public/Firewall-IDS.htm">TcpCom</a>: offer a complete firewall solution that protect networks, route traffic. Optional, a caching server and an IDS module are also available. Coming from a long Linux research and development <br />
</li><br />
<li><a href="http://www.bigmagic.com/intrusion/Intrusion%20Detection%20Systems%20%28IDSs%29%20Perspective.htm">Technologies Analysis</a>: E-business has driven organizations to open their networks to wider audiences over the Internet—home and mobile workers, business partners, suppliers, and customers <br />
</li><br />
<li><a href="http://www.testmyfirewall.com/">Test My Firewall</a>: looks for services running on running on your system using ports 1-1500; we also perform a Trojan scan by looking for open ports known to be used by Trojans. <br />
</li><br />
<li><a href="http://all.net/dtk/download.html">The Deception Toolkit </a>: If you are running the "Generic.pl" script, Install TCP wrappers with all the options for extended languages, and so on turned on. Test TCP wrappers to make sure it works right before you <br />
</li><br />
<li><a href="http://www.kaleton.com/research/idspaper.html#_Toc3619036">The Future of Intrusion Detection </a>: is currently impossible to detect misuse in encrypted network traffic. Increasingly, secure protocols such as secure shell (ssh) and secure HTTP (https) are being <br />
</li><br />
<li><a href="http://www.rar-enterprises.com/IntrusionDetectionStandards.htm">The Importance of Intrusion Protection</a>: When we talk about Intrusion Detection Systems (IDS), management automatically assumed it is the solution to all network, organization and social ... <br />
</li><br />
<li><a href="http://pciids.sourceforge.net/">The Linux PCI ID Repository</a>: This is a public repository of all known ID's used in PCI devices, that is ID's of vendors, devices, subsystems and device classes. These ID lists... <br />
</li><br />
<li><a href="http://www.netiq.com/products/sm/intrusion.asp">The NetIQ Solution</a>: Intrusion Manager offers out-of-the-box intelligence that includes automated response actions that instantaneously react to events to stop attacks in progress or policy violations <br />
</li><br />
<li><a href="http://www.doxpara.com/read.php/code/paketto.html">The Paketto Keiretsu</a>: is a collection of tools that use new and unusual strategies for manipulating TCP/IP networks. They tap functionality within existing infrastructure and stretch protocols beyond <br />
</li><br />
<li><a href="http://sourceforge.net/projects/stjude">The Saint Jude Project </a>: is a Project to develop Kernel-Level IDS mechinisms to protect the integrity of host systems. Development status... <br />
</li><br />
<li><a href="http://prevx.com/prevxISP.asp">Threats to Internet Service Providers</a>: Prevx ISP protects windows PCs from all forms of cyber-threats attempting to modify Windows executables, batch and script files, DLLs, system drivers, registry <br />
</li><br />
<li><a href="http://www.privacyware.com/intrusion_prevention.html">ThreatSentry</a>: Don’t sweat unaddressed vulnerabilities, insider misuse, or new types of attacks. ThreatSentry compares each server request to a knowledgebase and an evolving system baseline <br />
</li><br />
<li><a href="http://www.ticm.com/kb/faq/idsfaq.html">Ticm</a>: This FAQ answers simple questions related to detecting intruders who attack systems through the network, especially how such intrusions can be detected. Network Intrusion Detection Systems... <br />
</li><br />
<li><a href="http://www.nongnu.org/tiger/">Tiger</a>: is a security tool that can be use both as a security audit and intrusion detection system. It supports multiple UNIX platforms and it is free and provided under a GPL license. Unlike other tools, <br />
</li><br />
<li><a href="http://www.tippingpoint.com/products.html">TippingPoint Intrusion Prevention</a>: delivers the most powerful network protection in the world. The TippingPoint IPS is an in-line device that is inserted seamlessly and transparently into the network. <br />
</li><br />
<li><a href="http://www-306.ibm.com/software/tivoli/products/access-mgr-operating-sys/">Tivoli Access</a>: audits application and platform activity. This capability provides the assurance your customers, employees and partners expect <br />
</li><br />
<li><a href="http://adm.npepper.linuxfocus.org/English/May2003/article292.shtml#292lfindex9">Types of attack : IDS</a>: Before you develop or use an IDS you should specify the potential dangers, also which attacks you expect. Despite the different possibilities attacks and their target can be <br />
</li><br />
<li><a href="http://www.uac.com/Products/Intrusion_Detection/intrusion_detection.html">UAC</a>: Electronic theft and intrusions within you network can cause damage to your revenues and image in the marketplace. Detecting such unwanted activity and notifying the appropriate authorities... <br />
</li><br />
<li><a href="http://www.securityfocus.com/infocus/1540">Understanding IDS Active Response</a>: Debates still rage in the developer community over which methods of detecting attackers are best, but IDS customers as a whole are satisfied with the current <br />
</li><br />
<li><a href="http://user-mode-linux.sourceforge.net/">User-mode Linux Kernel</a>: gives you a virtual machine that may have more hardware and software virtual resources than your actual, physical computer. Disk storage for the virtual machine is entirely <br />
</li><br />
<li><a href="http://www.rocksoft.com/rocksoft/veracity/veracity-info.php">Veracity</a>: More and more, network security vendors recognize the efficiency of system lockdown as a configuration management concept and as the basis of effective network security management policy. <br />
</li><br />
<li><a href="http://www.verano.com/">Verano</a>: is a provider of security and SCADA solutions for mission-critical industries. Verano offers a comprehensive suite of services to complement both its Industrial Security... <br />
</li><br />
<li><a href="http://www.vintec.com/products2.html">Vindicator Network</a>: prioritizes encrypted data that is sent from field routing devices. Field devices collect information from readers, sensors, etc. IT-based network. Encrypted/redundant system, <br />
</li><br />
<li><a href="http://www.honeynet.org.pk/honeywall/">Virtual Honeynet</a>: is a solution that allows you to run a complete Honeynet with multiple operating systems on the same physical computer. The intent is to make Honeynets easier to deploy... <br />
</li><br />
<li><a href="http://www.seifried.org/security/ids/20020107-honeypot-vmware-basics.html">VMware</a>: is essentially a set of software products, the workstation version installs onto Windows or Linux and allows you to run numerous Intel based operating systems on top <br />
</li><br />
<li><a href="http://www.vpnetltd.com/">VPNet</a>: We are a rare commodity in the WAN market place - we are independent in all areas of the solutions we provide. VPNet are able to design solutions that fit your... <br />
</li><br />
<li><a href="http://vxe.quercitron.com/">Vxe</a>: is an Intrusion Prevention System (IPS). It protects UNIX servers from intruders, hacker attacks from network and so on. It protects software subsystems, such as: SMTP, POP, HTTP and any other subsystem... <br />
</li><br />
<li><a href="http://www.webfargo.com/">Webfargo's</a>: Host Intrusion Detection Service supplements a successful product line of Managed Solutions: Managed Firewall Service, Managed Network Intrusion Detection, Recurring Security Scans, <br />
</li><br />
<li><a href="http://www.mavensecurity.com/webmaven">WebMaven</a>: is an interactive learning environment for web application security. It emulates various security flaws for the user to find. This will enable users to safely & legally practice web application <br />
</li><br />
<li><a href="http://docs.hp.com/en/J5083-90011/ch01s02.html">What Is Intrusion Detection?</a>: An intrusion detection system (IDS) monitors user and system activity to detect patterns of misuse that may correspond to security violations. The monitoring is automatic <br />
</li><br />
<li><a href="http://www.kismetwireless.net/">What is Kismet? </a>: Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting (and given time, decloaking) hidden networks, and infering the presence <br />
</li><br />
<li><a href="http://www.networkjocks.com/wc/">Who's Connecting </a>: provides detailed information to you when someone attaches to your network in a up-to-date user interface. A corporation's computer data networks are often one of their most <br />
</li><br />
<li><a href="http://www.whitehelm.com/intru-det.html">Why use Intrusion Detection?</a>: The underlying reasons why you might use intrusion detection systems are relatively straightforward: You want to protect your data and systems integrity. The fact that you <br />
</li><br />
<li><a href="http://www.tiffco.com/news/article.php?id=2">Windows XP Service Pack 2</a>: Computers are becoming remarkably capable and advanced. Trouble is, so are the hackers, viruses, and worms that threaten them. That's why Microsoft has made security ... <br />
</li><br />
<li><a href="http://www.wimetrics.com/">WiSentry Software</a>: Detect Wireless Access Points and uniquely identify Rogue Devices. Detect and block attempts at unauthorized access. Protect against rogue or unauthorized wireless access points . <br />
</li><br />
<li><a href="http://www.xintegrity.com/">Xintegrity</a>: The ability to detect system wide changes is fundamental to enterprise network security. Xintegrity Professional enables immediate detection of all changes to Windows systems, whether malicious, accidental or during new software installation. Subtle changes to the registry which normally <br />
</li><br />
<li><a href="http://www.sys-security.com/">Xprobe</a>: is a remote active operating system fingerprinting tool which uses advanced techniques, some which where first to be introduced with Xprobe2, such as the usage of statistical analysis <br />
</li><br />
<li><a href="http://www.xsguard.nl/">XSGuard</a>: is a fully automated intrusion prevention service that instantly protects your IT infrastructure from known and unknown attacks by hackers, worms and other Internet risks. It replaces... <br />
<br />
<br />
<hr color="#ff0000" /><b><span style="color: red; font-size: medium;">Auditing (Code, Host, Network & Password Audit Tools)<br />
Utilities for checking and verifying security measures</span></b><br />
<hr color="#ff0000" /><b><span style="color: red; font-size: medium;"><br />
</span></b><br />
<ul><li><a href="http://www.cerberus-infosec.co.uk/cis.shtml">Cerberus Internet Scanner</a> (WinNT/Win2K scanner)</li>
<li><a href="http://www.dachb0den.com/projects/bsd-airtools.html">BSD Airtools</a> (Wireless Network Auditing)</li>
<li><a href="http://www.chkrootkit.org/">Check for Rootkit</a> (chkrootkit.org)</li>
<li><a href="http://www.core-sdi.com/download/download2.html">Core-SDI Remote Auditing Utility</a></li>
<li><a href="http://www.users.dircon.co.uk/%7Ecrypto/">Crack</a> (Password auditor)</li>
<li><a href="http://www.phenoelit.de/dpl/">Default Logins for Networked Devices</a></li>
<li><a href="http://razor.bindview.com/tools/fenris/">Fenris</a> (Simplifies auditing & forensic work)</li>
<li><a href="http://ftester.sourceforge.net/">FTester: Firewall & IDS Tester</a></li>
<li><a href="http://www.monkey.org/%7Edugsong/fragroute/">Fragroute</a> (by Dug Song)</li>
<li><a href="http://www.incident-response.org/">Incident-Response.Org</a> (Static binaries for auditing)</li>
<li><a href="http://www.openwall.com/john/">John The Ripper</a> (Password auditing)</li>
<li><a href="http://www.cigital.com/its4/">ITS4 Software Auditing Tool</a></li>
<li><a href="http://www.securemac.com/macanalysis.cfm">MacAnalysis Site</a> (Macintosh Auditing)</li>
<li><a href="http://www.nessus.org/">Nessus</a> (Robust network scanner)</li>
<li><a href="http://www.atstake.com/research/tools/#network_utilities">Netcat</a> (Feature-rich network debugging & exploration tool)</li>
<li><a href="http://www.treachery.net/tools/calculator/">Network Configuration Calculator</a></li>
<li><a href="http://sourceforge.net/projects/plac/">Portable Linux Auditing CD Project</a></li>
<li><a href="http://www.securesw.com/rats/">Rough Auditing Tool for Security (RATS) Code Auditor</a></li>
<li><a href="http://www.wwdsi.com/saint/">SAINT</a> (Enhanced version of SATAN)</li>
<li><a href="http://www.fish.com/%7Ezen/satan/satan.html">Security Administrator's Tool for Analyzing Networks</a> (SATAN)</li>
<li><a href="http://www-arc.com/sara/">Security Auditor's Research Assistant</a> (SARA)</li>
<li><a href="http://www.bsdconsulting.no/tools/">Simplemon</a> (Monitors processes and free disk space)</li>
<li><a href="http://www-arc.com/tara/">Tiger Analytical Research Assistant</a> (TARA)</li>
<li><a href="ftp://ftp.porcupine.org/pub/security/index.html">TCP Wrappers</a> (TCP service access control)</li>
<li><a href="http://sourceforge.net/projects/whisker/">Whisker Utility</a> (Web/CGI auditing)</li>
<li><a href="ftp://vic.cc.purdue.edu/pub/tools/unix/lsof/">LSOF</a> (Lists open files & processes)</li>
</ul><br />
<hr color="#ff0000" /><b><span style="color: red; font-size: medium;">Intrusion Detection & Forensics<br />
Host- and network-based systems for monitoring attacks and unauthorized system modifications</span></b><br />
<hr color="#ff0000" /><b><span style="color: red; font-size: medium;"><br />
</span></b><br />
<ul><li><a href="http://www.cs.tut.fi/%7Erammer/aide.html">Advanced Intrusion Detection Environment</a> (AIDE)</li>
<li><a href="http://www.whitehats.com/ids/index.html">Advanced Reference Archive of Current Heuristics for Network IDS</a> (ArachNIDS)</li>
<li><a href="http://www.unixgeeks.org/fss/">File System Saint</a> (FSS)</li>
<li><a href="http://ftimes.sourceforge.net/FTimes/index.shtml">FTimes</a> (Baselining & evidence collection)</li>
<li><a href="http://project.honeynet.org/">HoneyNet Project</a> (IDS/Forensics data)</li>
<li><a href="http://www.lids.org/">Linux Intrusion Detection System</a> (LIDS)</li>
<li><a href="http://www.nagios.org/">Nagios</a> (Network/system monitoring app; formerly <a href="http://www.netsaint.org/">NetSaint</a>.)</li>
<li><a href="http://www.anzen.com/research/nidsbench/">NIDSbench</a> (TCPrelay and Fragrouter)</li>
<li><a href="http://www.psionic.com/products/portsentry.html">PortSentry</a> (Portscan detector)</li>
<li><a href="http://samhain.sourceforge.net/">Samhain File System Integrity Checker</a></li>
<li><a href="http://www.openwall.com/scanlogd/">Scanlogd</a> (Portscan detection)</li>
<li><a href="http://www.snort.org/">Snort</a> (Realtime traffic analysis & logging)</li>
<li><a href="http://www.eclipse.fr.fm/snort.htm">Snort IDScenter</a> (Win32 Interface)</li>
<li><a href="http://www.porcupine.org/forensics/tct.html">The Coroner's Toolkit</a> (TCT)</li>
<li><a href="http://www.cerias.purdue.edu/homes/carrier/forensics/">TCTUTILs</a> (Forensics toolkit suite for TCT)</li>
<li><a href="http://www.tripwire.org/">Tripwire</a> (MD5sum-based file modification monitor)</li>
<li><a href="http://webjob.sourceforge.net/WebJob/index.shtml">WebJob</a> (Remote diagnostics, incident response & evidence collection)</li>
</ul><br />
<hr color="#ff0000" /><b><span style="color: red; font-size: medium;">Logging Utilities for enhancing and verifying system logs</span></b><br />
<hr color="#ff0000" /><br />
<br />
<ul><li><a href="http://tud.at/programm/fwanalog/">FWanalog</a> (Summarizes IPF & IPtables firewall logs)</li>
<li><a href="http://fwlogsum.sourceforge.net/">FWlogsum</a> (Summarizes Checkpoint FW1 logs)</li>
<li><a href="http://www.kyb.uni-stuttgart.de/boris/software.shtml">FWlogwatch</a> (Summarizes firewall & IDS logs)</li>
<li><a href="http://ntsecurity.nu/toolbox/klogger/">KLogger</a> (WinNT/Win2K keystroke logger)</li>
<li><a href="http://evlog.sourceforge.net/">Linux Event Logger</a> (For Enterprise-Class Systems)</li>
<li><a href="http://www.bsdconsulting.no/tools/">Lmon</a> (PERL-based real time log monitoring solution)</li>
<li><a href="http://www.psionic.com/products/logsentry.html">LogSentry</a> (Monitors logs for security violations)</li>
<li><a href="http://www.cert.dfn.de/eng/logsurf/">Logsurfer</a> (Monitors logs in realtime)</li>
<li><a href="ftp://ftp.lysator.liu.se/pub/ident/servers/">PIdentd</a> (Provides UserID with TCP connects)</li>
<li><a href="http://swatch.sourceforge.net/">Swatch</a> (Monitors syslog messages)</li>
<li><a href="http://www.w00w00.org/files/sectools/SRS/">Secure Remote Syslogger</a> (Encrypted streaming syslog)</li>
<li><a href="http://www.silicondefense.com/software/snortsnarf/">SnortSnarf</a> (HTMLized Snort Log Reviewer)</li>
<li><a href="http://www.balabit.hu/en/products/syslog-ng/">Syslog-NG</a> (Replacement for standard syslog facility)</li>
<li><a href="http://www.syslog.org/">Syslog.Org</a> (Vast info on syslogging)</li>
<li><a href="http://home.uninet.ee/%7Eragnar/throughput_monitor/">Throughput Monitor</a> (An event counter per timeframe log analyzer)</li>
<li><a href="http://www.ntsecurity.nu/toolbox/winzapper/">WinZapper</a> (WinNT/Win2K log modifier)</li>
</ul></li><br />
</div></div></socma(at)gmx.net></jsgr(at)tec.com.mx></div></div>Surenhttp://www.blogger.com/profile/09789784724534128579noreply@blogger.com8tag:blogger.com,1999:blog-5123376846625329520.post-89978498007612220622010-11-07T03:56:00.002+05:302010-11-07T03:56:56.353+05:30<span style="color: red; font-family: Arial; font-size: small;"><b>Computer Crime, Justice, Law and Society</b></span><br />
<hr color="#ff0000" /> <table bordercolor="#111111" cellpadding="5" cellspacing="0" style="border-collapse: collapse;"><tbody>
<tr><td align="left" class="b9" valign="top" width="75%"><br />
<li><a href="http://www.parliament.uk/documents/upload/postpn271.pdf">COMPUTER CRIME</a><br />
October 2006 Number 271. COMPUTER CRIME. An increasing number of domestic and international. criminal activities are using the Internet. Computers and .<br />
</li><br />
<li><a href="http://www.aic.gov.au/conferences/outlook4/Etter.pdf">Computer crime</a><br />
AUSTRALIAN INSTITUTE OF CRIMINOLOGY. COMPUTER CRIME. Commander Barbara Etter. Director, Australasian Centre for Policing Research. Paper presented at the .<br />
</li><br />
<li><a href="http://www.aic.gov.au/conferences/other/grabosky_peter/2000-04-vienna.pdf">Computer Crime: A Criminological Overview</a><br />
AUSTRALIAN INSTITUTE OF CRIMINOLOGY. Computer Crime: A Criminological Overview. Peter Grabosky, B.A. (Colby), M.A., Ph.D. (Northwestern) .<br />
</li><br />
<li><a href="http://www.digitalriver.com/v2.0-img/operations/naievigi/site/media/pdf/FBIccs2005.pdf">2005 FBI Computer Crime Survey</a><br />
“The 2005 FBI Computer Crime Survey should serve as a wake up call to every company in America.” Frank Abagnale • Author and subject of ‘Catch Me if You .<br />
</li><br />
<li><a href="http://www.infosecuritynetbase.com/books/612/cr8158_fm.pdf">Investigating Computer Crime</a><br />
Trademarks: All brand names and product names used in this book are trademarks, registered trademarks,. or trade names of their respective holders. .<br />
</li><br />
<li><a href="http://www.infosecuritynetbase.com/books/612/cr8158_01.pdf">Investigating Computer Crime</a><br />
©1996 CRC Press LLC. Computer Search. Warrant Team. Even when just one stand-alone computer is seized, there is too much for. just one person to handle. .<br />
</li><br />
<li><a href="http://csrc.nist.gov/publications/secpubs/computer.pdf">COMPUTER CRIME</a><br />
COMPUTER CRIME. A JOINT REPORT. State of New Jersey. Commission of Investigation. Attorney General. of New Jersey. JUNE 2000 .<br />
</li><br />
<li><a href="http://csrc.nist.gov/nissc/2000/proceedings/papers/319.pdf">Information Security Year in Review-Computer Crime</a><br />
23. rd. National. Information Systems Security Conference. 16-20 October 2000. Baltimore, MD. Information Security Year in Review—Computer Crime. Abstract .<br />
</li><br />
<li><a href="http://www.aph.gov.au/library/pubs/RN/2003-04/04rn06.pdf">Computer Crime and Compromised Commerce</a><br />
2003–04. No. 6, 11 August 2003. Computer Crime and Compromised Commerce. Computer Security. Computer security has become a. growing problem, with crime and .<br />
</li><br />
<li><a href="http://www.reddshell.com/docs/csi_fbi_2004.pdf">COMPUTER CRIME AND SECURITY SURVEY</a><br />
The Computer Crime and Security Survey is con-. ducted by CSI with the participation of the San. Francisco Federal Bureau of Investigation’s .<br />
</li><br />
<li><a href="http://www.harcourt-international.com/e-books/pdf/168.pdf">Computer Crime Prelims 1st</a><br />
HANDBOOK OF COMPUTER. CRIME INVESTIGATION. FORENSIC TOOLS AND. TECHNOLOGY. Computer Crime Prelims 1st 19/9/01 12:38 Page i .<br />
</li><br />
<li><a href="http://www.cse.msu.edu/%7Ecse429/readings/FBI2006.pdf">COMPUTER CRIME AND SECURITY SURVEY</a><br />
The Computer Crime and Security Survey is con-. ducted by the Computer Security Institute with the. participation of the San Francisco Federal Bureau of .<br />
</li><br />
<li><a href="http://www.securitymanagement.com/library/cybercrime_australiatech0802.pdf">2002 Australian Computer Crime and Security Survey</a><br />
4. Financial Impact Trends . . . . . . . . . . . . . . . . . . . . . . . . .14. 5. Web Incident Trends . . . . . . . . . . . . . . . . . . . . . . . . . . . .<br />
</li><br />
<li><a href="http://www.cse.sc.edu/syllabus/CSCE517.pdf">CSCE 517: COMPUTER CRIME AND FORENSICS Catalog Description: 517 .</a><br />
CSCE 517: COMPUTER CRIME AND FORENSICS. Catalog Description:. 517 -- Computer Crime and Forensics. (3) (Prereq: CSCE 311) Methodical approaches for .<br />
</li><br />
<li><a href="http://www.aracnet.com/%7Ekea/Papers/Politically%20Motivated%20Computer%20Crime.pdf">N R M , LLC Hacktivism and Politically Motivated Computer Crime</a><br />
N. ETWORK. R. ISK. M. ANAGEMENT. , LLC. Informed Risk Management Strategies™. Hacktivism and Politically Motivated. Computer Crime .<br />
</li><br />
<li><a href="http://www.bileta.ac.uk/Document%20Library/1/Basic%20Considerations%20in%20Investigating%20Computer%20Crime,%20Executing%20Computer%20Search%20Warrants%20and%20Seizing%20Equipment.pdf">Basic Considerations in Investigating Computer Crime, Executing .</a><br />
Basic Considerations in Investigating Computer Crime,. Executing Computer Search Warrants and Seizing High. Technology Equipment. By Sergeant John J. McLean .<br />
</li><br />
<li><a href="http://www.cap-press.com/pdf/1207.pdf">COMPUTER CRIME, INFORMATION WARFARE, AND ECONOMIC ESPIONAGE</a><br />
Carolina Academic Press. Law Casebook Series. Advisory Board. k. Gary J. Simson, Chairman. Cornell Law School. Raj K. Bhala .<br />
</li><br />
<li><a href="http://www.is-journal.org/V02I02/2ISJLP207-Granick.pdf">Faking It: Calculating Loss in Computer Crime Sentencing</a><br />
Faking It: Calculating Loss in Computer Crime. Sentencing. J. ENNIFER. S. G. RANICK. *. A. BSTRACT. This paper argues that the sentences courts have been .<br />
</li><br />
<li><a href="http://www.springerlink.com/index/L32Q411383J04541.pdf">A forensic methodology for countering computer crime</a><br />
Artificial Intelligence Review. 6, 203--215, 1992. 1992. Kluwer Academic Publishers. Printed in the Netherlands. A forensic methodology for .<br />
</li><br />
<li><a href="http://www.springerlink.com/index/L1624NT73M8J1615.pdf">Computer crime: Assessing the lawyer's perspective</a><br />
Computer Crime:. Assessing the Lawyer's Perspective. Karen A. Forcht. Daphyne Thomas. Karen Wigginton. ABSTRACT. The past decade has seen a rapid develop- .<br />
</li><br />
<li><a href="http://www.iee.org/Policy/Areas/it/security/NHTCU_version.pdf">The Risk of Computer Crime to Small & Medium-sized Enterprises</a><br />
What Your Business Really Needs to Know. The Risk of Computer Crime to Small &. Medium-sized Enterprises. Introduction. More businesses and customers are .<br />
</li><br />
<li><a href="http://www.usdoj.gov/criminal/employment/CCIP_trialAtty0106.pdf">TRIAL ATTORNEY DEPARTMENT OF JUSTICE COMPUTER CRIME AND .</a><br />
TRIAL ATTORNEY. DEPARTMENT OF JUSTICE. COMPUTER CRIME AND INTELLECTUAL PROPERTY SECTION. WASHINGTON, D.C.. 06-CRM-CCIPS-001 .<br />
</li><br />
<li><a href="http://www.state.nj.us/sci/pdf/CCrime.pdf">Draft Press Release: Computer Crime</a><br />
NEWS RELEASE. July 5, 2000. Contact:. Immediate release. Lee Seglem, SCI: 292-6767. Roger Shatzkin, OAG 292-8580. SCI, ATTORNEY GENERAL. ISSUE REPORT ON .<br />
</li><br />
<li><a href="http://www.ccs.msu.edu/workshop/carter.pdf">A Forecast of Trends for Computer Crime and Cyberterrorism</a><br />
Forecast 1: The number of offenses reported to the. police involving computers and electronic storage media. will increase substantially requiring changing .<br />
</li><br />
<li><a href="http://www2.norwich.edu/mkabay/methodology/crime_stats_methods.pdf">Understanding Studies and Surveys of Computer Crime</a><br />
_____________________________________________________________________________________________<wbr></wbr>. Copyright © 2006 M. E. Kabay. All rights reserved. .<br />
</li><br />
<li><a href="http://www2.norwich.edu/mkabay/overviews/glossary.pdf">Glossary of Computer Crime Terms</a><br />
Glossary. of. Computer. Crime. Terms. M. E. Kabay, PhD, CISSP-ISSMP. Program Director, MSIA. School of Graduate Studies. Norwich University. Northfield, VT .<br />
</li><br />
<li><a href="http://infosecon.net/workshop/pdf/FakingIt.granick.pdf">Faking It: Calculating Loss in Computer Crime Sentencing By .</a><br />
Faking It: Calculating Loss in Computer Crime Sentencing. By Jennifer S. Granick. *. DRAFT. NOT FOR CITATION. INTRODUCTION .<br />
</li><br />
<li><a href="http://www.justiceministry.gov.lk/NEW%20LEGISLATION/COMCRIME.pdf">LD O 72/2000 AN ACT TO PROVIDE FOR THE COMBATTING OF COMPUTER .</a><br />
LD O 72/2000. AN ACT TO PROVIDE FOR THE COMBATTING OF COMPUTER. CRIME; AND TO PROVIDE FOR MATTERS CONNECTED. THEREWITH AND INCIDENTAL THERETO. .<br />
</li><br />
<li><a href="http://www.montgomerycountymd.gov/content/CJCC/pdf/computer_crime_study.pdf">Computer Crime and Computer Fraud</a><br />
Computer Crime and Computer Fraud. University of Maryland. Department of Criminology and Criminal Justice. Fall, 2004. Report to the .<br />
</li><br />
<li><a href="http://www.montgomerycountymd.gov/content/CJCC/pdf/computer_crime_summary_presentation.pdf">Computer Crime and Computer Fraud A Study for the Montgomery .</a><br />
Computer Crime and. Computer Crime and. Computer Fraud. Computer Fraud. A Study for the Montgomery County. A Study for the Montgomery County .<br />
</li><br />
<li><a href="http://www.maxtor.com/_files/maxtor/en_us/documentation/case_studies/nemlec.pdf">When Computer Crime Strikes, Maxtor is on the Case</a><br />
Computers are powerful tools, and criminals. are making increasing use of this power for. illicit acts. Online credit card fraud, identity .<br />
</li><br />
<li><a href="http://campus.leeds.ac.uk/isms/guidelines/Computer_Crime_Overview.pdf">Computer Crime & Misuse Investigations</a><br />
Computer Crime & Misuse Investigations. Introduction. ISS has recently established a computer forensics laboratory and some members of .<br />
</li><br />
<li><a href="http://ieeexplore.ieee.org/iel1/2188/8060/00350107.pdf?arnumber=350107">The cost of computer crime - IEE Review</a><br />
The. cost of. Computer-related crime cost UK businesses an estimated. €473 million in 1993-94. How do these losses occur, and how. can. they be prevented? .<br />
</li><br />
<li><a href="http://ieeexplore.ieee.org/iel3/4372/12487/00576554.pdf?arnumber=576554">Computer Crime - Information Security - Is It Safe?., IEE .</a><br />
New. Scotland. Yard. was. formed in. 1984. It. is. the. only. dedicated Unit. in. the United Kittgdom and. has. certain National responsibilities including .<br />
</li><br />
<li><a href="http://www.ncgccd.org/PDFs/Pubs/NCCJAC/cybercrime.pdf">Prosecuting Computer Crime in North Carolina: Assessing the Needs .</a><br />
Prosecuting Computer Crime in North Carolina: Assessing the Needs of. the State’s District Attorneys. North Carolina Governor’s Crime Commission .<br />
</li><br />
<li><a href="http://www.cse.msstate.edu/COURSES/abet_syllabi/abet2005/CSE4273SyllabusCAC.pdf">CSE 4273 Introduction to Computer Crime and Forensics REQUIRED .</a><br />
CSE 4273. Introduction to Computer Crime and Forensics. REQUIRED/ELECTIVE:. Computer Science – Elective. Software Engineering – Elective .<br />
</li><br />
<li><a href="http://secollege.hccs.edu/documents/default/workforceComputerCrimeDigEvidence.pdf">WORKFORCE ONE-PAGE FLIER - COMPUTER CRIME & DIGITAL EVIDENCE.indd</a><br />
Computer Crime. & Digital Evidence. Starting salaries. Income will vary depending on many factors. However, starting salaries for computer .<br />
</li><br />
<li><a href="http://www.snpo.org/samples/V190230.pdf">COMPUTER CRIME</a><br />
Nonpr. ofit W. orld, V. ol. 19, No. 2. 30. Nonprofits Aren’t Immune to. COMPUTER CRIME. Computers are making crime easier at nonprofit organizations. .<br />
</li><br />
<li><a href="http://www.isaca.be/Documents/ISACA_IT%20Forum%20Invitation%20%28June%202005%29.pdf">“Computer Crime in Belgium anno 2005 : how bad is it really?”</a><br />
INVITATION TO THE ISACA IT SECURITY OPEN FORUM. Wednesday 1. st. of June 2005. The hot topic for this forum will be:. “Computer Crime in Belgium anno 2005 : .<br />
</li><br />
<li><a href="http://www.itoc.usma.edu/Workshop/2001/Authors/Submitted_Abstracts/paperW2B1%2812%29.pdf">Using Derived Preferences to Predict the Targets of Computer Crime</a><br />
W2B1. 10:15. Proceedings of the 2001 IEEE. Workshop on Information Assurance and Security. United States Military Academy, West Point, NY, 5-6 June, 2001 .<br />
</li><br />
<li><a href="http://www.securitystats.com/reports/Studies_and_Surveys_of_Computer_Crime.pdf">Studies and Surveys of Computer Crime</a><br />
Studies and Surveys of Computer Crime. 1. by M. E. Kabay, PhD, CISSP. Associate Professor, Department of Computer Information Systems .<br />
</li><br />
<li><a href="http://www.icompass.ucla.edu/seminars/fbi_slides.pdf">Federal Bureau of Investigation Los Angeles Field Office Computer .</a><br />
Infrastructure Protection:. Traditional Threat Paradigm. Classic Military Threat. United. States. Armed. Forces. Foreign. Military. Antagonist .<br />
</li><br />
<li><a href="http://www.justice.gov/criminal/employment/2006/12-22-06paralegal%28CCIPS%29.pdf">The Computer Crime and Intellectual Property Section (CCIPS .</a><br />
TITLE, SERIES, GRADE: Paralegal Specialist, GS-950-07/09/11. SALARY RANGE: GS-07: $36671 - $47669 per annum. GS-09: $44856 - $58318 per annum .<br />
</li><br />
<li><a href="http://www.itkommissionen.se/dynamaster/file_archive/030121/30f65d74b537e8c04bd72e28a42e8baa/5.2%20%20Security%20and%20Vulnerability%20-%20Per%20Furberg.pdf">Per Furberg Dealing with Computer Crime. A Critical Review of .</a><br />
Per Furberg. *. Dealing with Computer Crime. A Critical Review of. Legislative Reactions to Computer Crime. 1 Computer crime. The development of information .<br />
</li><br />
<li><a href="http://silverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf">Computer Crime and Security</a><br />
Page: 12. DN-040217-CConnors-REV3. Computer Crime Metrics Unauthorized Use of Computer Systems Within the Last 12 Months .<br />
</li><br />
<li><a href="http://www.dataprotection2003.info/speakers/Marijan_Risteski/presentation.pdf">1. COMPUTER CRIME – NOTION AND DEFINITION The computer is one of .</a><br />
2. 1. COMPUTER CRIME – NOTION AND DEFINITION. The computer is one of the most important revolutionary discoveries in the .<br />
</li><br />
<li><a href="http://www.svcs.net/Infragard_Cybercrime_Overview.pdf">FBI Role in Computer Crime</a><br />
Over 80% of infrastructure is. privately. owned and controlled. – Utilities, internet services, communications. – Basic framework of US economy .<br />
</li><br />
<li><a href="http://users.tpg.com.au/adslkd67/TrendOnComputerCrimeAustMalaysia.pdf">Trends on computer crime – comparing Australia and Malaysia</a><br />
Trends on computer crime – comparing Australia and Malaysia. i. Trends on computer crime – comparing. Australia and Malaysia. Author: Wojciech Misiara .<br />
</li><br />
<li><a href="http://www.eurim.org.uk/activities/ecrime/prevention.pdf">The Risk of Computer Crime to Small & Medium-sized Enterprises</a><br />
The Risk of Computer Crime to Small & Medium-sized Enterprises. What Your Business Really Needs to Know. Introduction. More businesses and customers are .<br />
</li><br />
<li><a href="http://www.greatwriting.com/ABOUT_DOWNLOADS/forensics.pdf">Time: the Currency of Computer Crime</a><br />
Definitions of what is computer crime. matter less now that computers perme-. ate everything. What does matter is how. criminals and investigators use .<br />
</li><br />
<li><a href="http://www.iacis.org/iis/2004_iis/PDFfiles/ThomasForcht.pdf">LEGAL METHODS OF USING COMPUTER FORENSICS TECHNIQUES FOR COMPUTER .</a><br />
Volume V, No 2, 2004. 692. Issues in Information Systems. LEGAL METHODS OF USING COMPUTER FORENSICS TECHNIQUES. FOR COMPUTER CRIME ANALYSIS AND .<br />
</li><br />
<li><a href="http://securityrenaissance.com/wordpress//wordpress/wp-content/uploads/2007/01/hiltonhack.pdf">Analyzing a Computer Crime</a><br />
Analyzing a Computer Crime. Perry Carpenter, CISSP, CIPP. Page. 1/16/20071. Analyzing a Computer Crime. Norwich University MSIA Program. Week 2 Essay .<br />
</li><br />
<li><a href="http://www.internetrights.org.uk/briefings/irtb08-rev1-draft.pdf">Computer Crime</a><br />
GreenNet IR Toolkit Briefing 8. Computer Crime. © Paul Mobbs and GreenNet, 2002/2003. page 1. GreenNet IR Toolkit Briefing. Computer Crime .<br />
</li><br />
<li><a href="http://www.unodc.org/palermo/pdf/tan-slides.pdf">Prosecuting Foreign-Based Computer Crime: International Law and .</a><br />
1. Prosecuting Foreign-Based. Computer Crime:. International Law and. Technology Collide. TAN Ken Hwee. Attorney-General’s Chambers, Singapore .<br />
</li><br />
<li><a href="http://www.asianlaws.org/report0102.pdf">Computer Crime & Abuse Report (India) 2001-02</a><br />
2003 Asian School of Cyber Laws. All rights reserved. 1. Computer Crime & Abuse. Report (India) 2001-02. HIGHLIGHTS OF THE REPORT. This report. analyzes .<br />
</li><br />
<li><a href="http://www.tjmcintyre.com/resources/computer_crime.pdf">DRAFT ONLY / Computer Crime in Ireland: a Critical Assessment of .</a><br />
DRAFT ONLY / Computer Crime in Ireland: a Critical Assessment of the. Substantive Law. T.J. McIntyre. 1. Introduction. Irish law on computer crime is an .<br />
</li><br />
<li><a href="http://www.tjmcintyre.com/www.tjmcintyre.com/resources/computer_crime.pdf">computer crime</a><br />
Irish Criminal Law Journal - Volume 15, No.1, 2005. 1. Computer Crime in Ireland: A critical assessment of the substantive law. T.J. McIntyre B.C.L., LL. .<br />
</li><br />
<li><a href="http://www.census.gov/srd/papers/pdf/ssm2003-02.pdf">Final Report of Cognitive Research on the New Computer Crime .</a><br />
STUDY SERIES. (Survey. Methodology. #2003-02). Final Report of Cognitive Research on the New Computer. Crime Questions for the 2001 .<br />
</li><br />
<li><a href="http://www.itu.int/osg/spu/ni/security/docs/compcrime.hungary.pdf">Computer crime in Hungary</a><br />
1. COMPUTER CRIME IN HUNGARY. Mrs. Ilona Pergel. 1. Introduction. A characteristic feature of the information society is the penetration of modern .<br />
</li><br />
<li><a href="http://www.nrps.com/download/justthefacts/comprev.pdf">Computer Crime Prevention Computer crime is becoming ever .</a><br />
Computer Crime Prevention. Computer crime is becoming ever prevalent in our society. More and. more, companies and individuals rely on the services and .<br />
</li><br />
<li><a href="http://www.rfidvirus.org/media/ComputerCrime.pdf">RFID can carry a virus Computer Crime Research Center</a><br />
RFID can carry a virus. Date: March 20, 2006. Source: Daily Times. Cheap radio chips that are replacing the. ubiquitous barcode are a threat to privacy and .<br />
</li><br />
<li><a href="http://www.mirrors.wiretapped.net/security/info/papers/law-enforcement/australian-federal-police/afp-2001-sep-the-challenge-of-the-forensic-investigation-of-computer-crime.pdf">The challenge of the forensic investigation of computer crime</a><br />
No. 72— September 2001. 23. E - C R I M E. E-crime. 1. presents as one of the major. challenges of the future to Australasian law. enforcement. .<br />
</li><br />
<li><a href="http://www.acpr.gov.au/pdf/ACPR96.pdf">Computer Crime: The improvement of investigative skills .inal .</a><br />
Computer Crime:. The improvement of investigative skills .inal Report - Part One. Report Series No.96. This publication was obtained from www.acpr.gov.au .<br />
</li><br />
<li><a href="http://www.acpr.gov.au/pdf/ACPR101.pdf">Computer Crime: The improvement of investigative skills Final .</a><br />
Computer Crime:. The improvement of investigative skills. Final Report - PartTwo. Report Series No.101. This publication was obtained from www.acpr.gov.au .<br />
</li><br />
<li><a href="http://www.ilj.org/publications/COMPRPT2.pdf">Research Needs for Computer Crime</a><br />
Computer Crime • 1. Research Needs. for. Computer Crime. Introduction. Between July and October 1995, the National Institute of Justice (NIJ) conducted an .<br />
</li><br />
<li><a href="http://www.pbs.org/wgbh/pages/frontline//shows/hackers/risks/csi-fbi2000.pdf">CSI/FBI 2000 COMPUTER CRIME AND SECURITY SURVEY</a><br />
Statement of intent. • This survey was conducted by the Computer Security Institute (CSI). in association with the San Francisco Computer Crime Squad of the .<br />
</li><br />
<li><a href="http://www.icjia.state.il.us/public/pdf/compsum99.pdf">Computer crime</a><br />
Illinois Criminal Justice Information Authority. Inside. Features. TheCompiler. Summer 1999. Departments. In Brief. 2. Technology. 18. Motor Vehicle Theft .<br />
</li><br />
<li><a href="http://security.iia.net.au/downloads/crime%20and%20security%20survey.pdf">2002 Australian Computer Crime & Security Survey</a><br />
e-Security Conference. Brisbane, November 2002. Dean Kingsley. Partner, Enterprise Risk Services. Deloitte Touche Tohmatsu. 2002 Australian Computer .<br />
</li><br />
<li><a href="http://www.malesurvivor.org/Prevention%20&%20Education/Articles/Search%20&%20Seizure.pdf">Computer Crime and Intellectual Property Section (CCIPS)</a><br />
Computer Crime and. Intellectual Property Section. (CCIPS). Searching. and Seizing Computers. and Obtaining Electronic Evidence. in Criminal Investigations .<br />
</li><br />
<li><a href="http://www.cs.fsu.edu/%7Edesmedt/course/intro/ethics4.pdf">Ethics: Computer Crime</a><br />
C. OMPUTER. C. RIME. C. HAPTER. 7: C. OMPUTER. C. RIME. 1. Introduction. 2. Hacking. (a) What is it? • Phase 1. • Phase 2. • Phase 3. • Future .<br />
</li><br />
<li><a href="http://www.homeoffice.gov.uk/rds/pdfs04/dpr40.pdf">The police recording of computer crime</a><br />
The police recording. of computer crime. Home Office Development and Practice Report. 40. P a t t e rnsofCrime. Crime Reduction. Policingand OrganisedCrime .<br />
</li><br />
<li><a href="http://www.ccip.govt.nz/ccip-publications/ccip-e-bulletin/CCIP%20e-Bulletin%2023.pdf">New Zealand Computer Crime & Security Survey 2006 NetSafe .</a><br />
New Zealand Computer Crime & Security Survey. University of Otago. The New Zealand Computer Crime and Security Survey is conducted by the Security .<br />
</li><br />
<li><a href="http://www.ccip.govt.nz/ccip-publications/ccip-e-bulletin/CCIP%20e-Bulletin%2020.pdf">.nz Newsletter - June 2006 2006 CSI/FBI Computer Crime & Security .</a><br />
.nz Newsletter - June 2006. The Office of the Domain Name Commissioner. In May the number of active .nz domain names increased from 225475 to 230531, a .<br />
</li><br />
<li><a href="http://www.brownwelsh.com/HPLowry_archive/ComputerCrime.pdf">Civil Aspects of Computer Crime in Connecticut</a><br />
\\BWSERVER\DATA\WORK\HPL\XARTICLE\CIVIL ASPECTS OF COMP LAW.ART.DOC. -1-. THE CIVIL ASPECTS OF CONNECTICUT’S. COMPUTER CRIME LAW. By: Houston Putnam Lowry .<br />
</li><br />
<li><a href="http://www.student.cs.uwaterloo.ca/%7Ecs492/papers/ccips.pdf">Guidance on New Authorities that Relate to Computer Crime and .</a><br />
Computer Crime and. Intellectual Property Section. (CCIPS). Email this Document! Field Guidance on New Authorities. That Relate to Computer Crime and .<br />
</li><br />
<li><a href="http://www.items.fr/IMG/doc/GF2003/Presentations%20GF03/Day%201/Session%204/SFORZA_GF2003.pdf">• Threats for corporate information assets • Information security .</a><br />
1. © Finmatica S.p.A.. Safeguarding. Corporate Information. Assets and Legacy. Mario Sforza. Global Forum 2003. Rome, 6-7 November 2003. © Finmatica S.p.A. .<br />
</li><br />
<li><a href="https://www.isc2.org/download/PressReleases/Release%20Interpol.pdf">(ISC)2 PROVIDING CISSP SECURITY ACCREDITATION TO INTERPOL COMPUTER .</a><br />
NEWS. FOR IMMEDIATE RELEASE. Contact:. Mike Kilroy or Nancy Koprowski. Maples Communications, Inc. (949) 477-0710, Ext. 303. mkilroy@maples.com .<br />
</li><br />
<li><a href="http://www.secure-it.se/kalla_fakta/dokument/http%20%20%20news.com.com%202102-7349_3-6028946.html%20tag=st.util.pdf">Computer crime costs $67 billion, FBI says</a><br />
http://news.com.com/Computer+crime+costs+67+billion%2C+FBI+says/2100-7349_3-. 6028946.html. Story last modified Thu Jan 19 14:20:00 PST 2006 .<br />
</li><br />
<li><a href="http://www.mvpcug.com/oldbiz/biz104.pdf">DiLorenzo on Computer Crime</a><br />
The Inside Track. Thayer: Main Meeting Minutes . . . . . . . . . page 3. NEW: Tips—XP, Word, WordPerfect . . . . page 4 .<br />
</li><br />
<li><a href="http://www.gmu.edu/departments/law/academics/syllabus/Fall00/CompCrime_Fall2000.pdf">Computer Crime Seminar</a><br />
Computer Crime Seminar. Adjunct Professors Christian Genetski and Richard Salgado. George Mason University School of Law. Fall 2000 .<br />
</li><br />
<li><a href="http://www.zurichna.com/zus/zsource.nsf/0/4b082f77028af3f085256da2003d5109/$FILE/computer%20crime%20policy.pdf">Computer Crime Policy</a><br />
Zurich North America Financial Enterprises. computercrimepolicy. Optional coverages. • Data processing service operations. • Voice-initiated transfer fraud .<br />
</li><br />
<li><a href="http://www.ncsl.org/programs/lis/legislation/ITlaws01.pdf">Computer crime includes enactments that establish or expand .</a><br />
2001. Information Technology and Internet. Laws. Information Policy and Technology Series. by. Jo Anne Bourquard. Janna Goodwin. Pam Greenberg .<br />
</li><br />
<li><a href="http://www.virtual-corp.net/CCRC_SecurityGetsUnderSkin_Krull.pdf">Computer Crime Research Center</a><br />
Computer Crime Research Center. Security Gets Under Your Skin. Date: March 04, 2005. Source: Computer Crime Research Center. By: CCRC staff .<br />
</li><br />
<li><a href="http://www.uchidak.com/chuo/2006_CSI_Japan.pdf">3 Japan & US Japan & US Computer Crime & Security Survey</a><br />
3. rd. Japan & US. Japan & US. Computer Crime & Security Survey. Katsuya Uchida. Associate Professor. Institute of Information Security. uchidak@gol.com .<br />
</li><br />
<li><a href="http://www.jrsa.org/pubs/forum/forum_issues/for20_4.pdf">Computer Crime: How Big Is It and What Can You Do? The .</a><br />
DECEMBER 2002. Vol. 20, No. 4. ty to just talk with you for a few minutes. about the kinds of problems that we. wrestle with all the time in our office .<br />
</li><br />
<li><a href="http://jolt.law.harvard.edu/articles/pdf/v10/10HarvJLTech465.pdf">Harvard Journal of Law & Technology WHY THE POLICE DON'T CARE .</a><br />
Harvard Journal of Law & Technology. Volume 10, Number 3 Summer 1997. WHY THE POLICE DON'T CARE ABOUT COMPUTER CRIME. Marc D. Goodman". TABLE OF CONTENTS .<br />
</li><br />
<li><a href="http://www.infragard.net/chapters/minnesota/nist_bismark_brochure.pdf">What You Need to Know to Protect Against Computer Crime</a><br />
What You Need to Know. to Protect Against. Computer Crime. Computer Security. Workshop. Bismarck, June 5th. 8:00am – 12:00pm. Bismarck Public Library .<br />
</li><br />
<li><a href="http://eprints.otago.ac.nz/342/01/2005_NZ_Computer_Crime__Security_Survey_Results_%282%29.pdf">2005 Computer Crime and Security Report</a><br />
Published by the:. Alpha-Omega Group, S.A.. P.O. Box 6079. Dunedin 9059. New Zealand. Copyright 2006. ISSN 1177-4207. Acrobat .<br />
</li><br />
<li><a href="http://www.rcceeg.com/RCCEEG_Brochure.pdf">REGIONAL COMPUTER CRIME EDUCATION & ENFORCEMENT GROUP</a><br />
INSIDE THE. PRIMARY FORENSIC COMPUTER LAB. SOLUTIA WORLD HEADQUARTERS. INFORMATION. &. REQUESTS FOR CALLOUT. 314-838-5000. REGIONAL. COMPUTER CRIME .<br />
</li><br />
<li><a href="http://wendy.seltzer.org/brooklaw/week13-ppt.pdf">Cybercrime and other pests “Computer Crime” The Morris Worm The .</a><br />
1. Cybercrime and other pests. “Computer Crime”. • Computer as targetof crime. – Denial of service on eBay auction site .<br />
</li><br />
<li><a href="http://www.forwardedge2.com/pdf/natl-code.pdf">U.S. Code Computer Crime Statutes</a><br />
Distributed in Forward Edge II. U.S. Code Computer Crime Statutes. http://uscode.house.gov/. 15 U.S.C. 1644 Fraudulent use of credit cards; penalties .<br />
</li><br />
<li><a href="https://www.iacptechnology.org/LEIM/2005Presentations/Computer%20Crime,%20Internet%20Investigations%20&%20Digital%20Evidence052505.pdf">Computer Crime, Internet Investigations & Digital Evidence Solutions</a><br />
Computer Crime, Internet Investigations &. Digital Evidence Solutions. IACP Law Enforcement Information. Management Conference. Greensboro, NC. May 25, 2005 .<br />
</li><br />
<li><a href="http://www.cs.siue.edu/sblythe/is376/is376_crimes_4.pdf">Information Technology Crimes Types of “Computer Crime” Hacking .</a><br />
Information Technology. Crimes. Dr. Stephen Blythe. SIUE. Types of “Computer Crime”. Comes in many forms:. •. hacking - programming for joy, often to breach .<br />
</li><br />
<li><a href="http://www.fraw.org.uk/mobbsey/pdfs/irtb08.pdf">Computer Crime</a><br />
GreenNet CSIR Toolkit Briefing 8. Computer Crime. © Paul Mobbs and GreenNet, 2002. page 1. GreenNet CSIR Toolkit Briefing no. 8. Computer Crime .<br />
</li><br />
<li><a href="http://www.nlectc.org/nlectcse/download/brown_prediction_twg102006.pdf">Models for Criminal Incident Prediction with a View to Computer Crime</a><br />
Systems & Information Engineering. UVA – 1 / 47. Models for Criminal Incident Prediction with a View to Computer Crime. Donald E. Brown .<br />
</li><br />
<li><a href="http://isedj.org/isecon/2006/2354/ISECON.2006.Omar.pdf">Forecasting Computer Crime Complaints</a><br />
Omar, Kwanbunbumpen, and Alijani. Fri, Nov 3, 11:30 - 11:55, Champagne. Forecasting Computer Crime Complaints. Adnan Omar. aomar@suno.edu. Ada Kwanbunbumpen .<br />
</li><br />
<li><a href="http://www.chubb.com/international/australia/csi/chubb4314.pdf">Financial Institution Electronic and Computer Crime Policy</a><br />
ECC.DOC (Ed. 1/98) dfi\policies\eccp pol wording.doc. Page 1. SCHEDULE. CHUBB INSURANCE COMPANY OF. AUSTRALIA LIMITED. (A.B.N. 69 003 710 647) .<br />
</li><br />
<li><a href="http://scissec.scis.ecu.edu.au/wordpress/conference_proceedings/2006/forensics/Imtiaz%20-%20Enterprise%20Computer%20Forensics%20-%20A%20defensive%20and%20offensive%20strategy%20to%20fight%20computer%20crime.pdf">Enterprise Computer Forensics: A defensive and offensive strategy .</a><br />
Enterprise Computer Forensics: A defensive and offensive strategy to fight computer crime. Fahmid Imtiaz. School of Computer and Information Science .<br />
</li><br />
<li><a href="http://ait.gmu.edu/syllabi/fall2005/IT222001.pdf">Digital Evidence and Computer Crime (required) Writing Information .</a><br />
IT-222-01-F05-Nguyen. 1 of 3. Introduction to Information Security Policy and Management. Course Syllabus. Fall 2005. Course:. IT 222 001 F05. Instructor: .<br />
</li><br />
<li><a href="http://www.cs.bris.ac.uk/Teaching/Resources/COMSM2005/Lect13.pdf">Microsoft PowerPoint - Lecture 12a - International approaches to .</a><br />
1. International Approaches to. Computer Crime. Andrew Charlesworth. Senior Research Fellow in IT & Law. Law School/Department of Computer Science .<br />
</li><br />
<li><a href="http://www.wacci.org/images/WACCI%20Membership%20Application.pdf">Wisconsin Association of Computer Crime Investigators (WACCI) P.O. .</a><br />
Wisconsin Association of Computer Crime Investigators. (WACCI). P.O. BOX 580711. PLEASANT PRAIRIE WI 53158. Application for Membership .<br />
</li><br />
<li><a href="http://www.cs.bris.ac.uk/Teaching/Resources/COMSM2005/Lect11.pdf">Microsoft PowerPoint - Lecture 11 - Introduction to UK Computer .</a><br />
1. Introduction to UK Computer. Crime & Computer Misuse law. Andrew Charlesworth. Senior Research Fellow in IT & Law. Law School/Department of Computer .<br />
</li><br />
<li><a href="http://www.giustizia.it/cassazione/convegni/dic2000/morales.pdf">ABSTRACT The Computer Crime in Spain FERMIN MORAL PRATS PROF .</a><br />
ABSTRACT. The Computer Crime in Spain. FERMIN MORAL PRATS. PROF. ORDINARIO DIRITTO PENALE. UNIVERSITÀ AUTONOMA BARCELLONA. 1. THE PREVIOUS SITUATION AT THE .<br />
</li><br />
<li><a href="http://justice.gov/criminal/employment/CCIP_trialAtty0106.pdf">TRIAL ATTORNEY DEPARTMENT OF JUSTICE COMPUTER CRIME AND .</a><br />
TRIAL ATTORNEY. DEPARTMENT OF JUSTICE. COMPUTER CRIME AND INTELLECTUAL PROPERTY SECTION. WASHINGTON, DC. 06-CRM-CCIPS-001 .<br />
</li><br />
<li><a href="http://www.apjii.or.id/apec/CCIPS%20Publications/ipmanual2000.pdf">i PROSECUTING INTELLECTUAL PROPERTY CRIMES November 2000 Computer .</a><br />
i. PROSECUTING INTELLECTUAL PROPERTY CRIMES. November 2000. Computer Crime & Intellectual Property Section, Criminal Division. U.S. Department of Justice .<br />
</li><br />
<li><a href="http://www.frg.eur.nl/personal/kleve/docs/KleveDeMulder_1993_CompCrime.pdf">Computer Crime: developments in the Netherlands</a><br />
A. SSET. P. ROTECTION. A. ND. F. INANCIAL. C. RIME. , S. PRING. 1993, V. OLUME. 1, N. UMBER. 1. Computer Crime: developments in the Netherlands .<br />
</li><br />
<li><a href="http://www.secure-it.se/artiklar/dokument/artiklar/New%20breed%20of%20cyber%20criminals.pdf">21.07.2004 10:01:51 Date: July 20, 2004 Source: Computer Crime .</a><br />
21.07.2004 10:01:51. Date: July 20, 2004. Source: Computer Crime Research Center. By: Ludmila Goroshko. WWW became a field of rapidly growing e-business, .<br />
</li><br />
<li><a href="http://www.diogenesllc.com/computercrimein2002.pdf">Computer Crime in 2002, an Insider's Opinion By Robert Lyttle .</a><br />
Computer Crime in 2002, an Insider's Opinion. By Robert Lyttle A.K.A. Pimpshiz – www.sub-seven.com | robert@sub-seven.com. Thanks: RevDisk, Matthew Fox, .<br />
</li><br />
<li><a href="http://www.txcomputerlaw.com/uh/Computer_Crimes_for_Students.pdf">Computer Crime</a><br />
November 14, 2006. (c) Ronald L. Chichester. 1. Computer Crime. University of Houston Law Center. Digital Transactions. Week #13. Prof. Chichester .<br />
</li><br />
<li><a href="http://appl003.lsu.edu/ocsweb/louishome.nsf/$Content/IT+Meeting+2004/$file/Computer%20Crime%20Investigation.pdf">Computer Crime Investigation</a><br />
Computer Crime Investigation. Presented By:. Lt. J. Robert Marsh, LSU Police. Jmarsh1@lsu.edu. 225-578-3231. Hunter Ely, Office of Telecommunications, LSU .<br />
</li><br />
<li><a href="http://www.apectelwg.org/e-securityTG/Downloads/Commonwealth%20Model%20Law%20on%20Computer.pdf">Computer Crime.doc</a><br />
LMM(02)17. MODEL LAW ON COMPUTER AND COMPUTER RELATED CRIME. BACKGROUND. 1. In Port of Spain, Law Ministers considered the impact of technology on various .<br />
</li><br />
<li><a href="http://www.apectelwg.org/e-securityTG/clecb/ipmanual2000.pdf">i PROSECUTING INTELLECTUAL PROPERTY CRIMES November 2000 Computer .</a><br />
i. PROSECUTING INTELLECTUAL PROPERTY CRIMES. November 2000. Computer Crime & Intellectual Property Section, Criminal Division. US Department of Justice .<br />
</li><br />
<li><a href="http://orpg.saddleback.edu/faculty/msquires/spring04/Week_6_Reading_2.pdf">California Penal Code As it pertains to hacking and other computer .</a><br />
California Penal Code. As it pertains to hacking and other computer crime! 502. (a) It is the intent of the Legislature in enacting this section .<br />
</li><br />
<li><a href="http://www.law.uh.edu/faculty/rnimmer/network/ch6.pdf">CHAPTER 6 COMPUTER CRIME DISCUSSION POINT: As you read the .</a><br />
1. CHAPTER 6. COMPUTER CRIME. DISCUSSION POINT:. As you read the following, consider and give your answer in writing at or before .<br />
</li><br />
<li><a href="http://www.hightechcrimecops.org/CCBiblio.pdf">US Library of Congress Computer Crime Bibliography - Page 1 10/04 .</a><br />
US Library of Congress Computer Crime Bibliography - Page 1. 10/04/98. LCCN. 96041787. ISBN. 0566078104 (cloth). LC Call No. HV6768 .C65 1998 .<br />
</li><br />
<li><a href="http://ctrc.go.kr/attache/2004110208.pdf">Computer Crime Investigative Process</a><br />
E y e s o f t h e E a g l e. Air Force Office of Special Investigations. Computer Crime. Investigative Process. Steven A. George .<br />
</li><br />
<li><a href="http://www.sheshunoff.com/store/media/pdf/G53_mtoc.pdf">Contents Part I: Risk Assessment Chapter 1 Computer Crime .</a><br />
About the Authors......................<wbr></wbr>.......................... v .<br />
</li><br />
<li><a href="http://www.sheshunoff.com/store/media/pdf/L28_mtoc.pdf">Contents Part I Risk Assessment Phase Chapter 1 Computer Crime .</a><br />
About the Author ......................<wbr></wbr>......................... v .<br />
</li><br />
<li><a href="http://ir.lib.cbs.dk/download/ISBN/x656517364.pdf">Understanding the Perpetration of Employee Computer Crime in the .</a><br />
Understanding the Perpetration of. Employee Computer Crime in the. Organisational Context. by. Robert Willison. Department of Informatics. Howitzvej 60 .<br />
</li><br />
<li><a href="http://ir.lib.cbs.dk/download/ISBN/x656537344.pdf">Overcoming the insider: reducing employee computer crime through .</a><br />
Department of Informatics. Howitzvej 60. DK - 2000 Frederiksberg. Overcoming the insider: reducing employee computer crime .<br />
</li><br />
<li><a href="http://www.usdoj.gov/criminal/employment/trialAttorney13-15ccips.pdf">TRIAL ATTORNEY VACANCY DEPARTMENT OF JUSTICE COMPUTER CRIME AND .</a><br />
TRIAL ATTORNEYS. DEPARTMENT OF JUSTICE. COMPUTER CRIME AND INTELLECTUAL PROPERTY SECTION. WASHINGTON, D.C.. About the Office: .<br />
</li><br />
<li><a href="http://www.nileslibrary.org/Pathfinders/Science%20and%20Technology/computer%20crime%20categories%20Science%20and%20Technology%20Social%20Issues.pdf">Computer crime categories Science and Technology Social Issues</a><br />
PATHFINDER: COMPUTER CRIME. ENCYCLOPEDIAS. Encyclopedia Americana (R/031/E56) UNDER: Computers and Society-- Computer. Crime and Sabotage; Computers and .<br />
</li><br />
<li><a href="http://www.protexintl.com/docs/computer_crime_in_2002.pdf">Computer Crime in 2002, an Insider's Opinion By Robert Lyttle AKA .</a><br />
Computer Crime in 2002, an Insider's Opinion. By Robert Lyttle AKA Pimpshiz – www.sub-seven.com | robert@sub-seven.com. Thanks: RevDisk, Matthew Fox, .<br />
</li><br />
<li><a href="http://www.legis.state.la.us/leg_docs/99RS/CVT7/OUT/0000E7IS.PDF">HB2228 By WESTON CRIME:Expands existing provisions on computer .</a><br />
HB2228 By WESTON. CRIME:Expands existing provisions on computer crime to include certain acts. involving unsolicited bulk mail. Date Chamber Page Action .<br />
</li><br />
<li><a href="http://www.sfbay-infragard.org/SEAGATE/Creative_Explosions.pdf">FBI Role in Computer Crime</a><br />
http://www.usdoj.gov/usao/can/press/html/2005_11_30_MeydbraySentence.htm. http://www.usdoj.gov/usao/can/press/html/2005_11_30_MeydbraySentence.htm .<br />
</li><br />
<li><a href="http://www.drisk.com/images/WebNet_Crime_Endorsement.pdf">COMPUTER CRIME ENDORSEMENT</a><br />
Crime Endorsement. Page 1. WebNet Protection® Policy. ® A Registered Trademark of Digital Risk Managers. COMPUTER CRIME ENDORSEMENT .<br />
</li><br />
<li><a href="http://www.trusted-management.com/whitep/White-Paper-Crime.pdf">What Do We Really Understand When We Talk About Computer Crime?</a><br />
Copyright © 2002 Trusted-Management Ltd. Page 1 of. 4. What Do We Really Understand. When We Talk About Computer. Crime? Howard Thompson MA I Eng FBCS .<br />
</li><br />
<li><a href="http://158.75.15.5/KOMP-LEX/Computer_crime_in_Poland.pdf">Computer crime in Poland: law and practice</a><br />
Andrzej Adamski. Computer crime in Poland: three years’ experience in. enforcing the law. Computer crime is a by-product of rapid and continuous development .<br />
</li><br />
<li><a href="http://shsd.k12.ar.us/SHHS/departs/Busdept/Computer%20Tech/Assignments/CTI/wordperfect/WP2.pdf">Griffin 1 Your Name Mr. Griffin Computer Technology: Introduction .</a><br />
Griffin 1. Your Name. Mr. Griffin. Computer Technology: Introduction. April 26, 2004. Types of Computer Crime. What is a computer crime? .<br />
</li><br />
<li><a href="https://www.stealth-iss.com/security/PDF/COMPSECSURVEY1.pdf">CSI/FBI 2001 COMPUTER CRIME AND SECURITY SURVEY</a><br />
CSI/FBI 2001 COMPUTER CRIME AND SECURITY. SURVEY. Statement of Intent. This survey was conducted by the Computer Security Institute (CSI) in association .<br />
</li><br />
<li><a href="http://www.amc.army.mil/amc/ci/matrix/documents/white_papers/computer%20crime%20stats.pdf">ICSA White Paper on Computer Crime Statistics</a><br />
ICSA White Paper on Computer Crime Statistics. by ME Kabay, PhD, CISSP. Director of Education, ICSA. Copyright (c) 1998 ICSA. All rights reserved. .<br />
</li><br />
<li><a href="http://149.101.1.32/criminal/employment/07-27-06CCIPS-DEPUTYCHIEF.pdf">DEPUTY CHIEF FOR COMPUTER CRIME COMPUTER CRIME AND INTELLECTUAL .</a><br />
DEPUTY CHIEF FOR COMPUTER CRIME. COMPUTER CRIME AND INTELLECTUAL PROPERTY SECTION. CRIMINAL DIVISION. US DEPARTMENT OF JUSTICE. WASHINGTON, DC .<br />
</li><br />
<li><a href="http://www.towson.edu/%7Eswartout/cosc311/ComputerCrime.pdf">Computer Crime Computer Crime</a><br />
Who are Computer. Who are Computer. Criminals? Criminals? x. Organized Crime Figures. x. Drug Cartels. x. International Money Launderers .<br />
</li><br />
<li><a href="http://www.aigpr.com/applications/PDF/Computer_Crime.pdf">AP-21 APPLICATION FOR A COMPUTER CRIME POLICY FOR FINANCIAL .</a><br />
AP-21. APPLICATION FOR A. COMPUTER CRIME POLICY FOR FINANCIAL INSTITUTION. Application is hereby made by. (List all insured’s). Principal Address .<br />
</li><br />
<li><a href="http://www.lauw.com.au/PB/FI/Comprehensive%20&%20Computer%20Crime%20Policy.pdf">LAU Financial Institutions Comprehensive & Computer Crime Policy</a><br />
Why Buy Crime / Computer Crime Coverage? A company’s balance sheet is at significant risk to loss of corporate assets as a direct result of criminal .<br />
</li><br />
<li><a href="http://www.profhelp.com/crime/computercrime.pdf">Computer Crime, Ethics, and Privacy Issues in Information Systems</a><br />
Computer Crime, Vulnerabilities of Information Systems, and. Managing Risks of Technology Vulnerabilities. With the popularization of the Internet, .<br />
</li><br />
<li><a href="http://www.information-retrieval.info/papers/CrimeControl.pdf">Internet and Computer Crime: System Architecture as Crime Control</a><br />
K. A. Taipale. February 2003. http://www.taipale.com/papers/CrimeControl.pdf. Internet and Computer Crime: System Architecture as Crime Control .<br />
</li><br />
<li><a href="http://www.3ibrand.com/pdfs/insights.pdf">TACKLING COMPUTER CRIME TACKLING COMPUTER CRIME</a><br />
iSIGHT. EMERGING TECHNOLOGIES FOR BUSINESS. insights. www.3i.com. JUL. Y 2005. ISSUE 1. TACKLING. COMPUTER. CRIME. TACKLING. COMPUTER .<br />
</li><br />
<li><a href="http://www.twlk.com/law/tests/LETN1520001.pdf">The Organizational Response to Computer Crime</a><br />
The Organizational Response. to Computer Crime. LETN-152-0001. presents. LETN-153-0001CT. Copyright ©2003. Law Enforcement Training Network. a division of .<br />
</li><br />
<li><a href="http://ondix.com/pdf/docs/school_addmisssion_search_1071113481.pdf">In the world of computers, computer fraud and computer crime</a><br />
In the world of computers, computer fraud and computercrime are very prevalent issues facing every. computer user.This ranges from system administrators to .<br />
</li><br />
<li><a href="http://ssl.csg.org/dockets/24cycle/2004A/24Abills/1724a06nj.pdf">CHAPTER 334 AA concerning computer crime and amending PL1998, c .</a><br />
B. E. I. T. E. NACTED. by the Senate and General Assembly of the State of New Jersey:. 1. Section 3 of PL1998, c.134 (C.52:17B-193) is amended to read as .<br />
</li><br />
<li><a href="http://education.otago.ac.nz/nzlnet/lesson-plans/Rowlands/MCD%20Answer%20Booklet.pdf">Computer Crime</a><br />
1. Manage Computer Data. @ greyhigh.school.nz. Unit 2781. Level 2. Credits 3. Brian_Rowlands @ greyhigh.school.nz. Client's name: _______________________ .<br />
</li><br />
<li><a href="http://abenoja0.tripod.com/images/l.pdf">Almario Bugarin Abenoja MIS 2003-81545 1 IS 201 SAQ 12-1 1. What .</a><br />
Almario Bugarin Abenoja. MIS 2003-81545. 1. IS 201 SAQ 12-1. 1. What constitutes a computer crime? In most cases presented a computer crime is said to be .<br />
</li><br />
<li><a href="http://www.southwest.cc.nc.us/acadprog/courseoutline/CCT121.pdf">COURSE OUTLINE Date Revised: June 16, 2005 Course Number and .</a><br />
CAREER TECHNOLOGIES DIVISION. COURSE OUTLINE. Date Revised:. June 16, 2005. Course Number and Prefix:. CCT 121. Course Title:. Computer Crime Investigation .<br />
</li><br />
<li><a href="http://mediaserver.prweb.com/pdfdownload/149239/pr.pdf">Gone Phishing? Yes, that is the correct spelling for another form .</a><br />
Gone Phishing? Yes, that is the correct spelling for another form of computer. crime. Don't be a victim of the latest computer crimes that can rob your bank .<br />
</li><br />
<li><a href="http://mediaserver.prweb.com/pdfdownload/149239/6/pr.pdf">Gone Phishing? Yes, that is the correct spelling for another form .</a><br />
Gone Phishing? Yes, that is the correct. spelling for another form of computer. crime. Don't be a victim of the latest computer crimes .<br />
</li><br />
<li><a href="http://www.the-word-is-not-enough.com/clippings/InformationAge/Forensics.pdf">Tracking insider computer crime is hard enough. But proving guilt .</a><br />
COVER. STORY. S. E. C. U. R. I. T. Y. 18. INFORMATION AGE. FEBRUARY 2 0 0 2. www . infoconomy . com. Tracking insider computer. crime is hard enough. .<br />
</li><br />
<li><a href="http://paulohm.com/classes/cc06/Syllabus.pdf">Law 8311-001: Computer Crime Seminar</a><br />
Page 1. Law 8311-001: Computer Crime Seminar. Course Description and Syllabus. Fall 2006. Associate Professor Paul Ohm. University of Colorado Law School .<br />
</li><br />
<li><a href="http://www.richardnaylor.org/Computing/AS%20Module%202/AS216.pdf">Computer Crime and the Law AS216</a><br />
AS216 – Computer Crime and the Law. RA Naylor 2002. 1. Computer Crime and the Law. AS216. Module 2. Specification. AS Module 2 .<br />
</li><br />
<li><a href="http://thinairlabs.com/ifsm498x/ifsm498x-01_p9.pdf">Digital Evidence and Computer Crime</a><br />
Digital. Evidence. and. Computer. Crime. IFSM 498x. BJ Gleason. Term 2006.1. Topics. Introduction. Introduction to Digital Evidence. History and Terminology .<br />
</li><br />
<li><a href="http://thinairlabs.com/ifsm430/ifsm430-13_p9.pdf">Computer Crime Investigation Security Demo Stupid Windows Trick</a><br />
Information and. Security. "Crime does not pay . as. well as politics." - Alfred E. Newman. Topics. Computer Crime Investigations. Security and Personnel .<br />
</li><br />
<li><a href="http://www.derkeiler.com/pdf/Newsgroups/comp.security.misc/2002-04/0247.pdf">comp.security.misc: REVIEW: "Handbook of Computer Crime .</a><br />
REVIEW: "Handbook of Computer Crime. Investigation", Eoghan Casey. Source: http://www.derkeiler.com/Newsgroups/comp.security.misc/2002−04/0247.html .<br />
</li><br />
<li><a href="http://jpcp.asp.radford.edu/Volume%2018%20-%202003/2003%2018-1-Cheurprakobkit-24-37.pdf">Computer Crime Enforcement in Texas: Funding, Training, and .</a><br />
Journal of Police and Criminal Psychology, 2003, Volume 18, Number 1. 24. Computer Crime Enforcement in Texas: Funding, .<br />
</li><br />
<li><a href="http://www.exceedsecurity.com/pdf/2006-FBI-ComputerCrimeSurveySummary.pdf">2006 FBI Computer Crime Survey Summary</a><br />
FBI.gov is an official site of the US Federal Government, US Department of Justice. 2006 FBI Computer Crime Survey Summary. 01/18/06 .<br />
</li><br />
<li><a href="http://archive.legislature.mi.gov/documents/1999-2000/billanalysis/house/pdf/1999-HLA-5396-S.pdf">Hous eB ill 5396 ( 8 - 14- 00) Page 1 of 1 Page INTERNET COMPUTER .</a><br />
Hous. eB. ill 5396 (. 8. -. 14-. 00). Analysis available @ http://www.michiganlegislature.org. Page 1 of 1 Page. INTERNET COMPUTER CRIME UNIT .<br />
</li><br />
<li><a href="http://bobbaddeley.com/lib/exe/fetch.php/projects/writing/ethics8.pdf">Bob Baddeley CS 391H 5/27/03 Essay #8 Media perspectives on .</a><br />
Bob Baddeley. CS 391H. 5/27/03. Essay #8. Media perspectives on computer crime. People fear what they do not know, and many people do not know about .<br />
</li><br />
<li><a href="http://www.aiseducators.com/2004%20Conference/Papers/413.pdf">A Call for Accounting Education on Computer Crime and Ethics</a><br />
A Call for Accounting Education on. Computer Crime and Ethics. Eddie Metrejean. Texas State University-San Marcos. Howard G. Smith .<br />
</li><br />
<li><a href="http://ralph.cx/books/pdf/Computer%20Crime%20searchmanual.pdf">Computer Crime and Intellectual Property Section (CCIPS)</a><br />
Email this Document! Searching. and Seizing Computers. and Obtaining Electronic Evidence. in Criminal Investigations. Computer Crime and Intellectual .<br />
</li><br />
<li><a href="http://homepage.ntlworld.com/woofy/ethics/ethics.pdf">Computer Crime And Ethics</a><br />
1. Computer Crime And. Ethics. by David Waugh. INTRODUCTION. Computer Crime is a fact of life. A survey by Gartner in June 2000 (InternetWorks, April .<br />
</li><br />
<li><a href="http://cabrillo.edu/%7Eshodges/cs1/notes/cis1.chapter15.pdf">Cis1 Chapter 15 Computer Crime and Ethics</a><br />
3. Software Piracy. • The Industry group Business. Software Alliance* (BSA). estimates piracy losses at $11.8. billion worldwide in 2000. .<br />
</li><br />
<li><a href="http://www.ulb.tu-darmstadt.de/tocs/119808994.pdf">DIGITAL EVIDENCE AND COMPUTER CRIME</a><br />
DIGITAL EVIDENCE AND. COMPUTER CRIME. FORENSIC SCIENCE, COMPUTERS AND THE INTERNET. Second Edition. by Eoghan Casey. with contributions from. Robert Dunne .<br />
</li><br />
<li><a href="http://www.comp.mq.edu.au/units/itec855/lectures/16-forensics-ovs.pdf">Computer Forensics Computer Forensics Computer Crime Context</a><br />
Computer Forensics. ITEC855. Security Technologies. ITEC 855. Forensics. 2. Computer Forensics. The collection and preparation of .<br />
</li><br />
<li><a href="http://cseserv.engr.scu.edu/NQuinn/COEN288/GiftOfFire_notes07.pdf">7 Computer Crime 7.1 Introduction</a><br />
7 Computer Crime. 7.1 Introduction. Computers and the Internet also make many illegal activities easier for criminals: the distribution of child .<br />
</li><br />
<li><a href="http://www.informationsecurityintel.com/docs/Fig.%203.1.pdf">Computer Crime Fighter Wheel</a><br />
Page 1. Figure 3.1. Computer Crime Fighter Wheel. C. o. l. l. e. c. t. &. H. a. ndle. F. o. r. e. n. s. i. c. s. A. u. d. i. t. &. E. v. id. e. n. c. e. L .<br />
</li><br />
<li><a href="http://books.basandra.com/mis/mis-chap-05-ethics.pdf">Computer Crime, Ethics and Social Issues</a><br />
Computer Crime, Ethics and Social Issues 1. CHAPTER 5. Computer Crime, Ethics and Social Issues. Outline. Introduction. Morals, Ethics, and the Law .<br />
</li><br />
<li><a href="http://info.sen.ca.gov/pub/99-00/bill/asm/ab_2701-2750/ab_2727_bill_20000926_chaptered.pdf">Assembly Bill No. 2727 CHAPTER 635 An act to amend Section 502 of .</a><br />
91. Assembly Bill No. 2727. CHAPTER 635. An act to amend Section 502 of the Penal Code, relating to. computer crime. [Approved by Governor September 24, .<br />
</li><br />
<li><a href="http://www.aceinsurance.com.au/Products_and_Services/ACEBondECCprop.pdf">PROPOSAL FORM FOR FINANCIAL INSTITUTIONS BOND & ELECTRONIC .</a><br />
ACEBondECCproposal(Ed. 4/2001). Page 1. Ace Insurance Limited. 28-34 O’Connell Street. SYDNEY NSW 2000. PROPOSAL FORM FOR. FINANCIAL INSTITUTIONS .<br />
</li><br />
<li><a href="http://www.arnoldhillschool.co.uk/website/documents/MicrosoftWord-ComputerCrimeandtheLaw.pdf">Computer Crime and the Law Heathcote Chapter 10 THE LEGAL FRAMEWORK</a><br />
Computer Crime and the Law. Heathcote Chapter 10. THE LEGAL FRAMEWORK. This section applies to current British legislation and its relationship to the .<br />
</li><br />
<li><a href="http://loft.quintathetic.com/written/Paper183Secure.pdf">COMPUTER CRIME</a><br />
R. ELATED TO. I. NTELLECTUAL. P. ROPERTY. , S. ECURITY. ,. AND. T. RADITIONAL. C. RIMES. Victor Chen. Stratos Karimbakas. Anthony Lam. Elyse Lluncor .<br />
</li><br />
<li><a href="http://www.gcna.com/guarantee/brokers/apps/fidelity/bdpapp.pdf">COMPUTER CRIME QUESTIONNAIRE</a><br />
05/95. BDP/APP. COMPUTER CRIME QUESTIONNAIRE. ALL QUESTIONS MUST BE ANSWERED, DO NOT LEAVE ANY BLANK OR UNANSWERED. WHERE A QUESTION DOES NOT APPLY, .<br />
</li><br />
<li><a href="http://www.steptoe.com/publications/192e.pdf">TITLE I—COMPUTER CRIME</a><br />
N. ATURE OF A. S. UBSTITUTE. TO. HR 3482. O. FFERED BY. M. R . S. MITH OF. T. EXAS. Strike all after the enacting clause and insert the. following: .<br />
</li><br />
<li><a href="http://pdfserver.emediawire.com/pdfdownload/241258/pr.pdf">Domestic and International Law Enforcement Have New Technology to .</a><br />
Domestic and International Law Enforcement Have New Technology to Fight. Computer Crime. Intelligent Computer Solutions Inc. launches the latest technology .<br />
</li><br />
<li><a href="http://itlaw.law.strath.ac.uk/fulltime/resourcesqxq/essays/infosecb.pdf">Most national computer crime statutes were enacted in the period .</a><br />
Most national computer crime statutes were enacted in the. period 1985-1995. To what extent are the approaches. adopted relevant in the era of the Internet? .<br />
</li><br />
<li><a href="http://www.simson.net/ref/2005/csci_e-170/slides/L09.pdf">CSCI E-170 Lecture 09: Attacker Motivations, Computer Crime and .</a><br />
CSCI E-170 Lecture 09:. Attacker Motivations, Computer Crime and Secure Coding. Simson L. Garfinkel. Center for Research on Computation and Society .<br />
</li><br />
<li><a href="http://oak.cats.ohiou.edu/%7Eakirz/documents/Space_Security.pdf">Computer Crimes Act 1997: A Study Malaysian Computer Crime Act 1997:</a><br />
Space Security:. Possible Issues & Potential Solutions. By: Ziad Akir. School of Telecommunications. Ohio University, Athens, OH 45701. Introduction .<br />
</li><br />
<li><a href="http://oak.cats.ohiou.edu/%7Eakirz/documents/Dissertation_Proposal.pdf">Computer Crimes Act 1997: A Study Malaysian Computer Crime Act 1997:</a><br />
The Impact of Information and Communication. Technology on Education and Training. Doctoral Research Proposal. By. Ziad I. Akir. Doctoral Committee .<br />
</li><br />
<li><a href="http://www.itgovernance.co.uk/files/Contents%20Fighting%20Computer%20Crime.pdf">FIGHTING COMPUTER CRIME: A NEW FRAMEWORK FOR PROTECTING INFORMATION</a><br />
FIGHTING COMPUTER CRIME: A NEW FRAMEWORK FOR PROTECTING. INFORMATION. Chapter 1: The Myth of Information Security. Chapter 2: What Are We Protecting? .<br />
</li><br />
<li><a href="http://techdmg.com/violation/crime-report-3.pdf">Computer crime is prohibited by US Federal Law</a><br />
Computer crime is prohibited by US Federal Law. Please take note. interbusiness.it domain name. mail.techdmg.com login failures: .<br />
</li><br />
<li><a href="http://www.dea.unipi.it/db/UtentiEA/fdangiolo/Il%20computer%20crime.pdf">Microsoft PowerPoint - Il computer crime.ppt</a><br />
Il computer crime e la. sicurezza informatica. Corso di “Analisi e revisione dei sistemi. informativi”. Dott.ssa D’Angiolo Francesca .<br />
</li><br />
<li><a href="http://omero.humnet.unipi.it/matdid/647/Computer%20crime%20e%20sicurezza%20informatica.pdf">Microsoft PowerPoint - computer crime e sicurezza informatica</a><br />
2. Il sistema di comunicazione aziendale. Esigenze informative. -Interne. - Esterne. Dati. Mezzi tecnici. Risorse Umane. Informazioni. Raccolta dati .<br />
</li><br />
<li><a href="http://www.cepic-psicologia.it/tesine-corsisti/tesine/Computer%20crime.pdf">Il Computer crime:</a><br />
Puglia Alessandra & Pulcrano Luigi. Il Computer Crime: L’evoluzione del Crimine attraverso le nuove Tecnologie. 1. Il Computer crime: .<br />
</li><br />
<li><a href="http://its.isti.cnr.it/CarloDoc/SICC.pdf">Sicurezza Informatica & “Computer Crime”</a><br />
Sicurezza Informatica & “Computer Crime”. Carlo Carlesi. Istituto di Scienza e Tecnologie dell’Informazione. “Alessandro Faedo”. Introduzione .<br />
</li><br />
<li><a href="http://ai.kaist.ac.kr/%7Ejkim/cs489-2005/FoxtrotComCrime.pdf">Computer crime Computer crime Computer crime Computer crime</a><br />
CS489. Final project. Computer crime. Computer crime. Computer crime. Computer crime. : Hackers’ technology and security products. Foxtrot team .<br />
</li><br />
<li><a href="http://jitas.im.cpu.edu.tw/2001/9.pdf">電腦犯罪特性分析之研究Analysis of Computer Crime Characteristics</a><br />
電腦犯罪特性分析之研究119. 電腦犯罪特性分析之研究. Analysis of Computer Crime Characteristics. 廖有祿. 中央警察大學資訊管理學系 .<br />
</li><br />
<li><a href="http://www.associazioneandromeda.org/Giornali/Anno_4_05/giornale_4_05_12.pdf">Computer crime e sicurezza informatica</a><br />
Maggio 2003. 12. ANDROMEDAATTUALIT À. ANDROMEDA. ATTUALIT À. ANDROMEDA NEWS. ridico.Nel nostro Paese,a seguito del-. l’introduzione della Legge 547/93 .<br />
</li><br />
<li><a href="http://www.angelfire.com/linux/awmt/docs/jon_nelson_pres.pdf">Computer Crime Laws, Trends and Security Basics</a><br />
Computer Crime Laws, Trends. and Security Basics. Trooper Jon S. Nelson. Pennsylvania State Police. Bureau of Criminal Investigation. Computer Crime Unit .<br />
</li><br />
<li><a href="http://www.tesionline.it/__PDF/12503/12503i.pdf">INDICE Introduzione Pag. 1 Capitolo 1 1. Aziende nel mirino del .</a><br />
INDICE. Introduzione. Pag. 1. Capitolo 1. 1. Aziende nel mirino del computer crime. Pag. 6. 1.1 Crimini intraziendali. Pag. 6. 1.2 Crimini interaziendali .<br />
</li><br />
<li><a href="http://www.emeraldinsight.com/Insight/html/Output/Published/EmeraldFullTextArticle/Pdf/0460020204.pdf">Executive Liability for Computer Crime and How To Prevent It</a><br />
The CEO as Top Cop. The Federal Sentencing Organizational Guidelines define. executive responsibility for fraud, theft and anti-trust .<br />
</li><br />
<li><a href="http://www.emeraldinsight.com/Insight/html/Output/Published/EmeraldFullTextArticle/Pdf/0460030104.pdf">Simplifying the state and federal computer crime law maze in the USA</a><br />
18. INFORMATION MANAGEMENT & COMPUTER SECURITY 3,1. Simplifying the state and federal. computer crime law maze in the. USA. Jay Bloombecker .<br />
</li><br />
<li><a href="http://ijlit.oxfordjournals.org/cgi/reprint/2/1/64.pdf">Criminal Law aspectsof Computer Crime: General Theory of Computer .</a><br />
InternationalJournal of Law and Information Technology, Vol. 2 No I. Criminal Law aspectsof. Computer Crime: General. Theory of Computer .<br />
</li><br />
<li><a href="http://ijlit.oxfordjournals.org/cgi/reprint/13/1/98.pdf">The law and computer crime: Reading the Script of Reform</a><br />
International Journal of Law and Information Technology Vol. 13 No. 1 © Oxford University Press 2005; all rights reserved. doi:10.1093/ijlit/eai004, .<br />
</li><br />
<li><a href="http://www.accusa.com/CC_Sample/ACC_Sample.pdf">THE INVESTIGATION OF COMPUTER CRIME</a><br />
THE INVESTIGATION OF COMPUTER CRIME. AND CRIME SCENE COMPUTERS. LESSON SAMPLE. This is an example of the format used for this course. .<a href="http://www.eff.org/">EFFweb - The Electronic Frontier Foundation</a> Extensive materials particularly in the:<a href="http://www.eff.org/pub/Legal/">EFF Legal Issues and Policy: Cyberspace and the Law Archive</a><br />
<br />
<a href="http://www.sgrm.com/art1.htm">The Constitution in Cyberspace</a><br />
Lawrence H. Tribe 1991.<br />
<br />
<a href="http://www.sgrm.com/art-2.htm">Civil Liberties in Cyberspace</a><br />
Mitchell Kapor Scientific American September 1991.<br />
<br />
<a href="http://www.sgrm.com/art-3.htm">The Feds and the Net: Closing the Culture Gap</a><br />
Mike Godwin Internet World May 1994.<br />
<br />
<a href="http://www.sgrm.com/art-4.htm">Investigating and Prosecuting Network Intrusions</a><br />
John C. Smith Santa Clara D.A.'s office 1995.<br />
<br />
<a href="http://www.sgrm.com/art-5.htm">Civil Liberties Implications of Computer Searches and Seizures</a><br />
Mitchell Kapor & Mike Godwin.<br />
<br />
<a href="http://www.eff.org/pub/Legislation/">EFF Legislation and Regulation Issues Archive</a><br />
<br />
<a href="http://www.findlaw.com/01topics/10cyberspace/index.html">FindLaw guides for Cyberspace Law</a>and<a href="http://www.cybersquirrel.com/clc/crimes.html">Cybercrime Resources</a>Very thorough.<br />
<br />
<a href="http://www.virtuallibrarian.com/legal/ccsearch.html">Computer Crime Database</a><br />
search engine by Virtual Librarian.<br />
<br />
<a href="http://law.house.gov/95.htm">U.S. House of Representatives - Internet Law Library</a><br />
Extensive index and search functions.<br />
<br />
<a href="http://www.aclu.org/issues/cyber/hmcl.html">A.C.L.U. Cyberliberties</a>the kind of stuff you'd expect from the A.C.L.U.<br />
<br />
<a href="http://insight.mcmaster.ca/org/efc/efc.html">Electronic Frontier Canada</a><br />
<a href="http://insight.mcmaster.ca/org/efc/pages/legal.html">Legal Resources</a><br />
including text of several Canadian computer crime cases.<br />
<br />
<a href="http://www.cpsr.org/cpsr/privacy/crime/crime.html">Computer Crime and Legal Resource Directory</a>in the<br />
<a href="http://www.cpsr.org/program/privacy/privacy.html">Privacy and Civil Liberties</a>section by the<br />
<a href="http://www.cpsr.org/">Computer Professionals for Social Responsibility </a> including:<br />
<a href="http://www.sgrm.com/art-6.htm">Recombinant Culture: Crime in the Digital Network</a><br />
Curtis Karnow 1994.<br />
<br />
<a href="http://www.sgrm.com/art-7.htm">Concerning Hackers Who Break into Computer Systems</a><br />
Dorothy E. Denning 1990.<br />
<br />
<a href="http://www.gse.ucla.edu/iclp/hp.html">The UCLA Online Institute for Cyberspace Law and Policy</a><br />
including these<br />
<br />
<a href="http://www.gse.ucla.edu/iclp/nd.html">Perspectives</a><br />
<br />
<a href="http://www.sgrm.com/art-8.htm">Cyberstalking</a><br />
Barbara Jensen Spring 1996.<br />
<br />
<a href="http://www.sgrm.com/art-9.htm">Hackers and the U.S. Secret Service</a><br />
Benjamin Fox 1997.<br />
<br />
<a href="http://www.mossbyrett.of.no/info/legal.html">Computer Crime Laws of 37 Countries</a><br />
Moss Byrett.<br />
<br />
<a href="http://www.epic.org/">Electronic Privacy Information Center</a>(EPIC).<br />
<a href="http://www.terrorism.com/infowar/index.html">Infowar</a>and<a href="http://www.info-sec.com/index.html-ssi">Info-sec</a>have lots of material on electronic mayhem including:<br />
<a href="http://www.sgrm.com/art10.htm">Forensic Computing</a><br />
John McCrone.<br />
<br />
<a href="http://www.sgrm.com/art11.htm">Computer Crime: An Emerging Challenge for Law Enforcement</a><br />
David Carter February 1997.<br />
<br />
<a href="http://www.sgrm.com/art12.htm">Will "Hate Speech" Become Fifth Horseman of the Apocalypse?</a><br />
Paul Kneisel 1997.<br />
<br />
<a href="http://www.terrorism.com/infowar/index.html">The Information Warfare Research Center</a><br />
<br />
<a href="http://www.terrorism.com/documents/devostthesis.html">National Security in the Information Age</a><br />
Matthew Devost M.A. Thesis May 1995.<br />
<br />
<a href="http://cla.org/">The Computer Law Association</a><br />
<br />
<a href="http://www.sgrm.com/art14.htm">Criminal Law and the Internet</a><br />
Mark Rasch 1996.<br />
<br />
<a href="http://www.sgrm.com/art15.htm">Infojacking: Crimes on the Information Superhighway</a><br />
Marc S. Friedman and Kristin Bissinger 1997.<br />
<br />
<a href="http://www.sgrm.com/art16.htm">The INSLAW Octopus</a><br />
Richard Fricker Wired 1.01 March/April 1993.<br />
<br />
<a href="http://www.sgrm.com/art17.htm">Satellite Pirates</a><br />
Charles Platt Wired 2.08 August 1994.<br />
<br />
<a href="http://www.sgrm.com/art18.htm">Gangwar in Cyberspace</a><br />
Michelle Slatalla and Joshua Quittner Wired 2.12 December 1994.<br />
<br />
<a href="http://www.sgrm.com/art19.htm">Good Cop Bad Hacker</a><br />
Bruce Sterling Wired 3.05 May 1995.<br />
<br />
<a href="http://web.mit.edu/afs/athena/org/t/techreview/www/tr.html">MIT's Technology Review</a><br />
<br />
<a href="http://www.sgrm.com/art20.htm">Desktop Counterfeiting</a><br />
Doug McClellan February 1995.<br />
<br />
<a href="http://www.sgrm.com/art21.htm">Law and Order Comes to Cyberspace</a><br />
Edwin Diamond and Stephen Bates October 1995.<br />
<br />
<a href="http://www.sgrm.com/art22.htm">Hackers: Taking a Byte Out of Computer Crime</a><br />
Wade Roush April 1995.<br />
<br />
<a href="http://csrc.lse.ac.uk/">Computer Security Research Centre</a><br />
at The London School of Economics and Political Science<br />
<br />
<a href="http://www.sgrm.com/art23.htm">The Financial Crime Conference 1995</a><br />
Jimmy Tseng<br />
<br />
<a href="http://www.sgrm.com/art24.htm">Forensic Computing</a><br />
Peter Sommer 1995.<br />
<br />
<a href="http://www.sgrm.com/art25.htm">Economic Crime: Beyond Good and Evil</a> Ian Angell 1996.<br />
<br />
<a href="http://www.fsu.edu/%7Ecrimdo/killers.html#computer">Computer Crime and Network Security</a><br />
Cecil Greek Florida State University School of Criminology and Criminal Justice.<br />
<br />
<a href="http://www.cdt.org/">The Center for Democracy and Technology</a><br />
materials and commentary on U.S. legislative policy<br />
<br />
<a href="http://www.epic.org/">Electronic Privacy Information Centre</a><br />
<br />
<a href="http://ciac.llnl.gov/ciac/">Computer Incident Advisory Capability</a><br />
U.S. D of Energy<br />
<br />
<a href="http://fedcirc.llnl.gov/">Federal Computer Incident Response Capability (FedCIRC)</a><br />
<br />
<a href="http://www.cert.org/">CERT Coordination Centre</a><br />
<br />
<a href="http://www.cert.org/research/JHThesis/index.html">An Analysis Of Security Incidents On The Internet 1989 - 1995</a>John Howard April 1997.<br />
<br />
<a href="http://www.anu.edu.au/people/Roger.Clarke/DV/">Roger Clarke's Dataveillance</a><br />
<br />
<a href="http://mailer.fsu.edu/%7Ebtf1553/ccrr/welcome.htm#contents">Computer Crime Research Resources</a><br />
by Bruce Fraser J.D.<br />
<br />
<a href="http://www.cfp.org/">Computers Freedom and Privacy</a><br />
<br />
<a href="http://www.usdoj.gov/criminal/cybercrime/index.html">Computer Crime and Intellectual Property Section</a><br />
of the<a href="http://www.usdoj.gov/">U.S. Department of Justice</a><br />
<br />
<a href="http://www.pccip.gov/info.html">President's Commission on Critical Infrastructure Protection</a><br />
<a href="http://www.sgrm.com/art26.htm">International review of criminal policy - United Nations Manual</a>on the prevention and control of computer-related crime<br />
<br />
<a href="http://www2.echo.lu/legal/en/crime/crime.html">European Commission Legal Advisory Board on Computer Crime</a><br />
<br />
<a href="http://www.cfp.org/">The Computers Freedom & Privacy Conference</a><br />
<br />
<a href="http://jolt.law.harvard.edu/">Harvard Journal of Law & Technology</a><br />
<br />
<a href="http://www.smu.edu/%7Ecsr/smuscr.htm">Computer Law Review and Technology Journal</a><br />
State Bar of Texas - Computer Section<br />
<br />
<a href="http://stlr.stanford.edu/STLR/Core_Page/index.htm">Stanford Technology Law Review</a><br />
<br />
<a href="http://www.law.berkeley.edu/journals/btlj/">Berkeley Technology Law Journal</a><br />
<br />
<a href="http://www.law.indiana.edu/fclj/fclj.html">Federal Communications Law Journal</a><br />
Indiana University School of law<br />
<br />
<a href="http://www.wvjolt.wvu.edu/">West Virginia Journal of Law and Technology</a><br />
<br />
<a href="http://www.wm.edu/law/publications/jol/">The Journal of Online Law</a><br />
William & Mary<br />
<br />
<a href="http://scs.student.virginia.edu/%7Evjolt/">Journal of Law and Technology</a><br />
University of Virginia<br />
<br />
<a href="http://sun.soci.niu.edu/%7Ecrypt/">The Crypt Newsletter</a><br />
<br />
<hr color="#ff0000" /><div align="left"><span style="color: red;"><a href="" name="Law Enforcement"></a></span><span style="color: white; font-size: large;"><span style="background-color: red; font-weight: 700;">Law Enforcement Canadian</span></span></div><hr color="#ff0000" /><a href="http://www.rcmp-grc.gc.ca/html/rcmp2.htm">R.C.M.P</a>and its<a href="http://www.rcmp-grc.gc.ca/html/itsec.htm">Information Technology Security Publications</a>and<a href="http://www.rcmp-grc.gc.ca/html/te-crime.htm">Technological Crime Bulletin</a><br />
<br />
<a href="http://www.cisc.gc.ca/">Criminal Intelligence Service Canada (CISC)</a><br />
<br />
<a href="http://www.csis-scrs.gc.ca/eng/menu/menue.html">Canadian Security Intelligence Service (CSIS)</a><br />
<br />
<a href="http://www.sgc.gc.ca/ehome.htm">Solicitor General Canada</a><br />
<br />
<a href="http://canada.justice.gc.ca/index_en.html">Department of Justice Canada</a><br />
<br />
<a href="http://www.officer.com/">www.Officer.com</a><br />
extensive resources.<br />
<br />
<a href="http://canada.justice.gc.ca/cgi-bin/folioisa.dll/crimlite.nfo/query=*/doc/%7Bt1937%7D?">Crown Counsel Policy Manual</a><br />
Department of Justice Canada prosecution policy respecting Proceeds of Crime<br />
<hr color="#ff0000" /> <span style="color: white; font-size: large;"><span style="background-color: red; font-weight: 700;">Law Enforcement United States</span></span><br />
<hr color="#ff0000" /><a href="http://www.usdoj.gov/">U.S. Department of Justice</a> and its<a href="http://www.usdoj.gov/criminal/cybercrime/index.html">Computer Crime and Intellectual Property Section</a><br />
<br />
<a href="http://www.sec.gov/enforce.htm">U.S. Securities and Exchange Commission Enforcement Division</a><br />
<a href="http://www.ustreas.gov/fincen/">FinCEN: Financial Crimes Enforcement Network U.S. Treasury Department</a><br />
<br />
<a href="http://www.fbi.gov/">F.B.I.</a><br />
<br />
<a href="http://www.odci.gov/cia/index.html">C.I.A.</a><br />
<br />
<a href="http://www.ncjrs.org/homepage.htm">U.S. National Criminal Justice Reference Service (NCJRS)</a><br />
<hr color="#ff0000" /> <b><span style="color: white; font-size: large;"><span style="background-color: red;">Law Enforcement International</span></span></b><br />
<hr color="#ff0000" /><a href="http://193.123.144.14/interpol.com/">INTERPOL</a><br />
<hr color="#ff0000" /><span style="color: white; font-size: large;"><span style="background-color: red; font-weight: 700;">Organized Crime </span></span><br />
<hr color="#ff0000" /><a href="http://www.cisc.gc.ca//ENGLISH/98/cisc98.htm">Annual Report on Organized Crime in Canada 1998</a><br />
Criminal Intelligence Service Canada and the<a href="http://www.cisc.gc.ca/ENGLISH/97/REPORT/TOC.htm">1997 Annual Report</a><br />
<br />
<a href="http://www.sgrm.com/art70.htm">Organized Crime Impact Study 1998</a><br />
Solicitor General Canada.<br />
<br />
<a href="http://www.sgrm.com/art29.htm">The Threat From Transnational Crime: An Intelligence Perspective</a><br />
Canadian Security Intelligence Service Commentary No. 70 Winter 1996.<br />
<br />
<a href="http://www.sgrm.com/art33.htm">Office of International Criminal Justice U.S. Department of State Winter 1996 Statement</a><br />
(from the U.S. National Criminal Justice Reference Service).<br />
<br />
<a href="http://www.ncjrs.org/intloicj.htm">Criminal Organizations</a><br />
a quarterly publication<br />
<br />
<a href="http://www.acsp.uic.edu/oicj/pubs/cjintl/">Crime & Justice International</a><br />
a monthly publication both from the<br />
<br />
<a href="http://www.acsp.uic.edu/index.htm">Office of International Criminal Justice (OICJ)</a><br />
<br />
<a href="http://www.sgrm.com/art30.htm">The New Stage of the Fight Against Organized Crime in Russia</a><br />
Victor Shabalin J.L. Albini & R.E. Rogers C.O. Vol. 10 No. 1 Winter 1995.<br />
<br />
<a href="http://www.sgrm.com/art31.htm">Russian Organized Crime: Rosner vs. Albini and Rogers</a><br />
C.O. Vol. 10 No. 3 Summer 1996.<br />
<br />
<a href="http://www.sgrm.com/art32.htm">The Sexy Russian Mafia</a><br />
Lydia Rosner C.O. Vol. 10 No. 1 Winter 1995.<br />
<br />
<a href="http://www.sgrm.com/art34.htm">New Russians Old Cons and the Transition to a Market Economy: Reflection from Abroad</a><br />
Frederick T. Martens C.O. Vol. 10 No. 2 Spring 1996.<br />
<br />
<a href="http://www.sgrm.com/art35.htm">Rogues Rascals and Outlaws: Politics and The Organizing of Crime in Rural Areas</a><br />
Gary Potter C.O. Vol. 10 No. 1 Winter 1995.<br />
<br />
<a href="http://www.acsp.uic.edu/iasoc/crim_org/vol10_4/art_0a.htm">Organized Crime: The International Report</a><br />
C.O. Vol. 10 No. 4 Summer 1997.<br />
<br />
<a href="http://www.sgrm.com/art36.htm">Wild Riders: Blurring the Line Between Cops and Bikers</a><br />
Kerry Ramsay C.&J.O. Vol. 14 No. 12 January 1998.<br />
<br />
<a href="http://www.sgrm.com/art37.htm">Senate Hearing on International Crime Statement of FBI Director Louis Freeh</a><br />
at the Senate Appropriations Committee Hearing on International Crime March 12 1996.<br />
<br />
<a href="http://www.sgrm.com/art38.htm">Organized Transnational Crime</a><br />
UN Report May 31 1996.<br />
<br />
<a href="http://www.sgrm.com/art39.htm">The South American Cocaine Trade: An "Industry" in Transition</a>U.S. Drug Enforcement Administration Report June 1996.<br />
<br />
<a href="http://www.sgrm.com/art40.htm">National Narcotics Intelligence Consumers Committee 1995</a><br />
U.S. D.E.A. Report August 1995.<br />
<br />
<a href="http://www.sgrm.com/russian.htm">Russian Organized Crime</a><br />
Office of the Attorney General of California.<br />
<br />
<a href="http://www.sgrm.com/strategic.htm">Transnational Criminal Organizations: Strategic Alliances</a><br />
The Washington Quarterly Winter 1995.<br />
<br />
<a href="http://www.fsu.edu/%7Ecrimdo/killers.html#property">Property and White Collar Crimes</a><br />
Cecil Greek Florida State University School of Criminology and Criminal Justice.<br />
<br />
<a href="http://www.ex.ac.uk/%7ERDavies/arian/scandals/">Financial Scandals</a><br />
an extensive set of resources by Roy Davies.<br />
<br />
<a href="http://www.usinternet.com/users/mcknutson/index.html-ssi">The Remarkable Criminal Financial Career of Charles K. Ponzi</a><br />
Mark C. Knutson.<br />
<br />
<a href="http://deloitte.bre-x.axia.com/disclaimer.html">FIA Interim Report of Investigation into Tampering with Bre-X Minerals Ltd. Busang Core Samples</a><br />
Forensic Investigative Associates October 3 1997.<br />
<br />
<a href="http://www.sgrm.com/art45.htm">Jungle Fever: The Bre-X Saga</a><br />
Fortune June 9 1997.<br />
<br />
<a href="http://www.fas.org/irp/congress/1992_rpt/bcci/index.html">The BCCI Affair Report to the Committee on Foreign Relations</a>United States Senate December 1992.<br />
<br />
<a href="http://www.annenberg.nwu.edu/pubs/news/">The Media and the Savings and Loan and BCCI Crises</a><br />
David McKean 1992.<br />
<br />
<a href="http://www.numa.com/derivs/ref/barings/bar00.htm">Conclusion of the Bank of England Report on the Collapse of Barings</a><br />
July 18 1995.<br />
<br />
<a href="http://www.sgrm.com/art41.htm">Executive Summary of the Report of the Inspectors of Barings Futures</a><br />
Singapore Ministry of Finance October 19 1995.<br />
<br />
<a href="http://www.futuresmag.com/library/august96/intrends.html">The Copper Trader who Fell From Grace</a><br />
Futures Magazine August 1996.<br />
<br />
<a href="http://www.sgrm.com/mobbw1.htm">The Mob on Wall Street</a><br />
Business Week December 16 1996 and March 24 1997.<br />
<br />
<a href="http://www.sgrm.com/art42.htm">Investors Beware: Chop Stocks are on the Rise</a><br />
Business Week December 15 1997.<br />
<br />
<a href="http://www.sgrm.com/art43.htm">The Predator: How an Italian Thug looted MGM</a><br />
Fortune July 8 1996.<br />
<br />
<a href="http://www.sgrm.com/art44.htm">The Bank Scandal That Keeps Growing</a><br />
Fortune July 7 1997.<br />
<br />
<a href="http://www.sgrm.com/art46.htm">How Safe Are Your Secrets</a><br />
Fortune September 8 1997 respecting the U.S. Economic Espionage Act.<br />
<br />
<a href="http://www.stockdetective.com/">The Stock Detective</a><br />
<br />
<a href="http://www.mojones.com/mother_jones/MJ95/viviano.html">The New Mafia Order</a><br />
Frank Viviano 1995.<br />
<br />
<a href="http://members.aol.com/whizkid01/index.html">The Unofficial Home Page of the New York Mafia</a><br />
<br />
<a href="http://www.ganglandnews.com/">Gang Land</a>by Jerry Capeci<br />
<hr color="#ff0000" /><div align="left"> <b><span style="color: white; font-size: large;"><a href="" name="problems"><span style="background-color: red;">What Problems Can Arise</span></a></span></b></div><hr color="#ff0000" /><div align="left"><a href="http://www.netsurf.com/nsf/">Netsurfer Focus</a><br />
<br />
<a href="http://www.netsurf.com/nsf/v01/03/nsf.01.03.html">Cryptography and Privacy</a><br />
<br />
<a href="http://www.netsurf.com/nsf/v01/01/nsf.01.01.html">Computer and Network Security</a><br />
First Issue</div><a href="http://www.netsurf.com/nsf/v02/02/index.html">Computer and Network Security</a><br />
Second Issue<br />
<a href="http://www.research.ibm.com/xw-D953-bump">Things That Go Bump in the Net</a><br />
From IBM<br />
<a href="http://www.geocities.com/CollegePark/Center/8086/documents/cyberlaunder.htm">Cyberlaundering: Anonymous Digital Cash and Money Laundering</a><br />
<hr color="#ff0000" /> <b><span style="color: white; font-size: large;"><span style="background-color: red;">Passwords</span></span></b><br />
<hr color="#ff0000" /><a href="http://www.geocities.com/CollegePark/Center/8086/documents/greenbook.htm">Department of Defense Password Management Guidelines</a><br />
the "Green Book."<br />
<a href="http://www.alw.nih.gov/Security/Docs/passwd.html">Selecting Good Passwords</a><br />
<hr color="#ff0000" /><span style="color: white; font-size: large;"><span style="background-color: red; font-weight: 700;">Internal Controls</span></span><br />
<hr color="#ff0000" /><a href="http://www-borden.fin.vill.edu/controls.htm">Internal Controls</a><br />
<br />
<a href="http://www.geocities.com/CollegePark/Center/8086/documents/darkgreen.htm">A Guide to Understanding Data Remanence in Automated Information Systems</a><br />
The "Dark Green" Book. Hackers need not necessarily invade your system. There are ways to obtain information from disposed files.<br />
<a href="http://www.geocities.com/CollegePark/Center/8086/documents/brownbook.htm">Guide to Understanding Trusted Facility Management</a><br />
The "Brown" Book. Mandates certain types of system and security administration such as separation of duties.<br />
<a href="http://www.geocities.com/CollegePark/Center/8086/documents/orangebook.htm">The "Orange" Book</a><br />
DoD's Trusted Computer System Evaluation Criteria. Criteria for a secure OS. Emphasizes data confidentiality which may or may not be your priority.<br />
<a href="http://www.geocities.com/CollegePark/Center/8086/documents/redbook.htm">The "Red" Book</a><br />
The DoD's Trusted Network Interpretation. For networks. Next to the Orange Book it is cited most often.<br />
<a href="http://web.mit.edu/security/www/iso2.htm#Sensitive">MIT Information Security Program</a><br />
Conduct a security self-assessment of your system.<br />
<a href="http://www.geocities.com/CollegePark/Center/8086/documents/sitesecurity.htm">Site Security Handbook</a><br />
This handbook is a guide to setting computer security policies and procedures for sites that have systems on the Internet. This guide lists issues and factors that a site must consider when setting their own policies. It makes some recommendations and gives discussions of relevant areas.<br />
<hr color="#ff0000" /> <b><span style="color: white; font-size: large;"><span style="background-color: red;">Firewalls</span></span></b><br />
<hr color="#ff0000" /><a href="http://www.cs.purdue.edu/coast/firewalls/">Internet Firewalls</a><br />
Comprehensive list of resources associated with Internet firewalls.<br />
<a href="http://www.ncsa.com/fwpg_p1.html">NCSA Firewall Policy Guide</a><br />
This document is intended to serve as not only a starting place for people who need to learn about firewall technology but also as a high-level guide to its deployment<br />
<hr color="#ff0000" /><span style="color: white; font-size: large;"> <span style="background-color: red; font-weight: 700;">FTP</span></span><br />
<hr color="#ff0000" /><a href="http://www.geocities.com/CollegePark/Center/8086/documents/anonymous-ftp-faq.htm">Anonymous FTP FAQ</a><br />
How to set up FTP site security<br />
<hr color="#ff0000" /><span style="color: white; font-size: large;"><span style="background-color: red; font-weight: 700;">Risk Assessment</span></span><br />
<hr color="#ff0000" /><a href="http://www.geocities.com/CollegePark/Center/8086/documents/risktools.htm">Guide for Selecting Automated Risk Analysis Tools</a><br />
<hr color="#ff0000" /><b> <span style="color: white; font-size: large;"><a href="" name="how"><span style="background-color: red;">How it is done</span></a></span></b><br />
<hr color="#ff0000" /><a href="http://www.alw.nih.gov/Security/Docs/admin-guide-to-cracking.101.html">Improving the Security of Your Site By Breaking Into It</a><br />
This link was provided by the NIH part of the Federal Government. UNIX systems<br />
<a href="http://www.geocities.com/CollegePark/Center/8086/documents/hackfaq/webhack.htm">The Unofficial Web Hack FAQ</a><br />
Another "how to hack"<br />
<a href="http://www.fc.net/phrack/">PHRACK Magazine</a><br />
<a href="http://www.2600.com/">2600: The Hacker Quarterly</a><br />
<hr color="#ff0000" /> <span style="color: white; font-size: large;"><a href="" name="detecting"><span style="background-color: red; font-weight: 700;">Detecting whether you have a problem</span></a></span><br />
<hr color="#ff0000" />FBI studies have revealed that 80% of intrusions and attacks come from within organizations - not from "hackers" from afar.<br />
<ul><li><a href="http://users.aol.com/auditnet/karl.htm">AuditNet Resource List</a><br />
From an accountant's viewpoint. Links to many accounting auditing and security sites.</li>
<li><a href="http://bilbo.isu.edu/security/green/bib8.html">Bibliography Auditing Computer Systems</a></li>
<li><a href="http://www.cs.purdue.edu/coast/intrusion-detection/">The COAST Intrusion Detection Pages</a></li>
<li><a href="http://www.geocities.com/CollegePark/Center/8086/documents/compromise-faq.htm">Compromise FAQ</a><br />
How to respond to a compromise of a UNIX system.</li>
<li><a href="http://www.geocities.com/CollegePark/Center/8086/documents/tanbook.htm">A Guide to Understanding Audit in Trusted Systems</a><br />
The "Tan" Book. Keep track of sensitive activities such as failed login attempts.</li>
<li><a href="http://www.cl.cam.ac.uk/users/rja14/#Med">Security of Medical Information Systems</a><br />
Massively documented British perspective</li>
<li><a href="http://www.cl.cam.ac.uk/ftp/users/rja14/guidelines.txt">Clinical System Security Interim Guidelines</a></li>
<li><a href="http://www.cl.cam.ac.uk/users/rja14/policy11/policy11.html">Security in Clinical Information Systems</a></li>
<li><a href="ftp://info.cert.org/pub/tech_tips/security_info">Intruder Detection Checklist</a><br />
From CERT the center of Internet Security. This document is useful for UNIX systems.</li>
<li>Los Alamos Vulnerability Assessment Team:<a href="http://mwanal.lanl.gov/seals/">The Entry Sentry</a></li>
<li><a href="http://www.bart.nl/%7Egeradts/forensic.html#general">Zeno's Forensics Page</a><br />
Comprehensive forensics links including links to computer crime and forensics accounting pages.</li>
</ul><hr color="#ff0000" /> <b><span style="color: white; font-size: large;"><a href="" name="search"><span style="background-color: red;">Search and Seizure of Computer Equipment</span></a><span style="background-color: red;"><br />
Suspected to Have Been Involved in Criminal Activity</span></span></b><br />
<hr color="#ff0000" /><ul><li><a href="http://www.geocities.com/CollegePark/Center/8086/documents/darkgreen.htm">A Guide to Understanding Data Remanence in Automated Information Systems</a><br />
The "Dark Green" Book. This DoD publication is intended to facilitate the secure disposal of highly classified information which had been stored electronically. However it also is germane to retrieving electronically stored evidence which has been erased.</li>
<li><a href="http://csrc.lse.ac.uk/csrc/forncomp.htm">Forensic Computing CSRC Research Project</a></li>
<li><a href="http://www.geocities.com/CollegePark/Center/8086/documents/search.htm">Federal Guidelines for Searching and Seizing Computers</a><br />
Note: while this document contains an extensive legal discussion it is a Department of Justice analysis not the law - and may not necessarily even reflect the DOJ's official position.</li>
<li><a href="http://www.jya.com/ffi.htm">Financial Fraud Institute</a><br />
Describes federal courses on investigation of computer-related crimes.</li>
<li><a href="http://nsi.org/Library/Compsec/comserch.txt">Civil Liberties Implications of Computer Searches and Seizures</a><br />
: Some Proposed Guidelines for Magistrates Who Issue Search Warrants</li>
<li><a href="http://www.secure-data.com/">New Technologies Inc.</a><br />
Computer Evidence Training Tools and Consulting.. Includes numerous<a href="http://www.secure-data.com/info.html">articles</a><br />
about computer security.</li>
<li><a href="http://www.sydex.com/">Sydex Inc.</a><br />
Its products allow a user to create mirror-image files of any hard disk accessible by a PC's controller and to examine diskettes without regard to format.</li>
</ul><hr color="#ff0000" /> <span style="color: white; font-size: large;"><span style="background-color: red; font-weight: 700;">NNTP and the Web: Preventing the Authorities From Choking the Publication of Information at Is Source.</span></span><br />
<hr color="#ff0000" />"However now that publishing has come to mean placing a copies of an electronic document on a few servers worldwide the owners of these servers can be coerced into removing it. It is irrelevant whether the coercion comes from wealthy litigants exploiting the legal process or from political rulers conspiring to control the flow of ideas. The net effect is the erosion of our inheritance from Gutenberg: printing is `disinvented' and electronics document can be `de-published'. This should concern everyone who values the benefits that have flowed from half a millenium of printing publication and progress. "<a href="http://www.cl.cam.ac.uk/users/rja14/eternity/node1.html">Ross J. Anderson</a><br />
"...if the physical location of the worldwide web site cannot be located then the rich man's lawyers will have nowhere to execute their seizure order"<a href="http://www.cl.cam.ac.uk/users/rja14/eternity/node3.html">Anderson</a><br />
supra.<br />
<ul><li><a href="http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html">The Eternity Service</a><br />
"The basic idea is to use redundancy and scattering techniques to replicate data across a large set of machines (such as the Internet) and add anonymity mechanisms to drive up the cost of selective service denial attacks."</li>
<li><a href="http://www.dcs.ex.ac.uk/%7Eaba/eternity/">Eternity Service: Cypherpunks Distributed Data Haven</a><br />
<ul><li><a href="http://www.dcs.ex.ac.uk/%7Eaba/eternity/announce.txt">[ANNOUNCE] Eternity server 1.01 alpha release</a><br />
Description of Eternity Server</li>
</ul></li>
<li><a href="http://moloko.insync.net/eternity/">Eternity Servers.</a><br />
"Eternity servers are specialized search engines for reading web documents from USENET news."</li>
</ul><hr color="#ff0000" /> <span style="color: white; font-size: large;"><a href="" name="bigbrother"><span style="background-color: red; font-weight: 700;">Is Big Brother Watching You?</span></a></span><br />
<hr color="#ff0000" /><ul><li><a href="http://www.cdt.org/">Center for Democracy and Technology</a><br />
CDT's mission is to develop and advocate public policies that advance constitutional civil liberties and democratic values in new computer and communications technologies.</li>
<li><a href="http://www.eff.org/">The Electronic Frontier Foundation</a><br />
is a non-profit civil liberties organization working in the public interest to protect privacy free expression and access to public resources and information online as well as to promote responsibility in new media.</li>
<li><a href="http://epic.org/">EPIC</a><br />
The Electronic Privacy Information Center. EPIC is a public interest research center in Washington D.C. It was established in 1994 to focus public attention on emerging civil liberties issues and to protect privacy the First Amendment and constitutional values.</li>
<li><a href="http://www.cdt.org/digi_tele/">FBI Issues Scaled Back Surveillance Capacity Notice -- Cost and Capability Issues Remain</a></li>
<li><a href="http://bilbo.isu.edu/security/green/contents.html">The Green Book Integrating Information Security</a><br />
On-line Information Security Course</li>
<li><a href="http://www.anonymizer.com/cgi-bin/snoop.pl">I CAN SEE YOU</a><br />
Think you are surfing anonymously? Click here to find out what information can be and often is collected about you as you surf.</li>
<li><a href="http://www.cen.uiuc.edu/%7Eejk/WWW-privacy.html">A Note About Web Browsers & Privacy</a><br />
Technical information describing what information your browser discloses about you as you surf.</li>
<li><a href="http://www.isleuth.com/">The Internet Sleuth</a><br />
Choose from over 1000 searchable databases.</li>
<li><a href="http://www.privacyrights.org/index.html">Privacy Rights Clearinghouse</a><br />
Consumer-oriented.</li>
<li><a href="http://www.intermediacy.com/sherlock/">Sherlock@ - The Internet Consulting Detective</a><br />
"Let Sherlock Holmes teach you how to be an Internet detective." Baker Street motif with Internet research tips.</li>
<li><a href="http://pages.ripco.com:8080/%7Eglr/stalk.html">Stalker's Home Page</a><br />
Tips and links to find and protect private information</li>
<li><a href="http://www.dreamscape.com/frankvad/covert.html">The Virtual World of Spies and Intelligence</a><br />
James Bond on the Net.</li>
<li><a href="http://www.teleport.com/%7Ejstar/govt.html">Who's Watching Who & Who's Watching YOU page</a><br />
What sort of surveillance is actually going on?</li>
<li><a href="http://rs.internic.net/cgi-bin/whois">Whois</a><br />
Find e-mail addresses postal addresses and telephone numbers of those who have registered "objects" with the InterNIC. Also determine whether the domain name you desire is already in use; learn who administers a particular site; and view a list of a site's name servers.</li>
</ul><hr color="#ff0000" /> <span style="color: white; font-size: large;"><a href="" name="enigma"><span style="background-color: red; font-weight: 700;">The Enigma of Encryption</span></a></span><br />
<hr color="#ff0000" />National Security and Political Issues<br />
<ul><li><a href="http://www.cs.georgetown.edu/%7Edenning/crypto/index.html">The Cryptography Project</a><br />
The purpose of the Cryptography Project is to promote the development and use of encryption products that meet the security and privacy needs of users and the public safety law enforcement and national security needs of nations.</li>
<li><a href="http://www2.nas.edu/cstbweb/2646.html">Cryptography's Role in Securing the Information Society</a><br />
Advocates expanded use of cryptography to protect information interests.</li>
<li><a href="http://www.crypto.com/">Encryption Policy Resource Page</a><br />
Encryption technology is the key to the future of the information revolution. It allows businesses and individuals to communicate securely over any inexpensive communication platform without fear of eavesdropping.</li>
<li><a href="http://www.epic.org/crypto/ban/">Efforts to Ban Encryption</a><br />
Over the past few years the Federal Bureau of Investigation has advocated prohibiting encryption techniques unless law enforcement can have - through a backdoor key - access to encrypted communications. The FBI asserts otherwise encrypted communications could be used to further criminal activities.</li>
<li>Masson Doug<a href="http://journal.law.ufl.edu/%7Etechlaw/2/masson.html">The Genie Let Loose: Ineffectual Encryption Export Restrictions and Their Deleterious Effect On Business</a><br />
2 J. TECH. L. & POL'Y 1 <http: 2="" journal.law.ufl.edu="" masson.html="" ~techlaw=""> (1996).</http:></li>
<li>Greg S. Sergienko<a href="http://www.urich.edu/%7Ejolt/v2i1/sergienko.html">Self Incrimination and Cryptographic Keys</a><br />
2 RICH. J.L. & TECH. 1 (1996) http://www.urich.edu/~jolt/v2i1/sergienko.html. Issue: Can prosecutors use grand jury proceedings to compel individuals to produce keys to potentially incriminating computerized information which those individuals have encrypted?</li>
<li><a href="http://www.cpsr.org/dox/program/clipper/clipper.html">Clipper Chip</a><br />
The Clipper Chip is being promoted by the U.S. government. It provides a standard for securing private voice communication. With Clipper however the government could obtain decryption keys that are held in escrow by two government agencies. Critic's state this "back door" means for the government to decrypt messages could be abused.</li>
<li><a href="http://www.eff.org/pub/Legal/Cases/Bernstein_v_DoS/HTML/bernstein_961218_pressrel.html">Court Declares Crypto Restrictions Unconstitutional: Free Speech Trumps Clinton Wiretap Plan</a></li>
<li><a href="http://www.uga.edu/%7Ecits/activity.html">Center for International Trade and Security</a></li>
<li><a href="http://www.epic.org/crypto/key_escrow/clipper4_statement.html">Vice President Gore's Statement on Cryptography and Export Policy</a></li>
</ul><hr color="#ff0000" /> <span style="color: white; font-size: large;"><span style="background-color: red; font-weight: 700;">General Encryption Information</span></span><br />
<hr color="#ff0000" /><ul><li><a href="http://itrc.on.ca/CryptoWeb/">CryptoWeb</a><br />
An Information Resource for Cryptography</li>
<li>Newsgroup:<a href="news:alt.security.pgp"> alt.security.pgp</a></li>
<li><a href="http://web.mit.edu/network/pgp.html">MIT distribution site for PGP (Pretty Good Privacy)</a><br />
A military-grade encryption program which MIT distributes free for non-commercial use.</li>
<li><a href="http://www.pgp.com/">Pretty Good Privacy Inc.</a><br />
The commercial version.</li>
<li><a href="http://www.geocities.com/CollegePark/Center/8086/documents/pgpFAQ.html">Where to Get the Pretty Good Privacy FAQ</a><br />
PGP information plus links to numerous PGP sources.</li>
<li><a href="http://www.rsa.com/">RSA Data Security Inc.</a><br />
Another commercial vendor.</li>
<li><a href="http://world.std.com/%7Efranl/crypto/cryptography.html">Cryptography: The Study of Encryption</a><br />
Short course on encryption principles.</li>
<li><a href="http://www.catalog.com/sft/encrypt.html">Data Encryption Techniques</a><br />
The nitty-gritty details on how encryption algorithms work.</li>
<li><a href="http://www.counterpane.com/whycrypto.html">Why Cryptography Is Harder Than It Looks</a><br />
"Billions of dollars are spent on computer security and most of it is wasted on insecure products." Find out why your "secure" site may have problems.</li>
</ul><hr color="#ff0000" /> <b><span style="color: white; font-size: large;"><span style="background-color: red;">Steganography: "Steganography is the process of hiding a message within another message or hiding it altogether."</span></span></b><br />
<hr color="#ff0000" /><ul><li><a href="http://www.jjtc.com/Steganography">Steganography - Information Hiding</a></li>
<li><a href="http://www.rof.net/yp/alphaone/stego.htm">PGPn123 Steganography Information</a></li>
<li><a href="http://www.stack.nl/%7Egalactus/remailers/index-stego.html">Privacy: Steganography</a></li>
<li><a href="http://www.rit.edu/%7Epdw5973/crypto/stego.html">Steganography: Hiding Data in Plain Sight</a></li>
<li><a href="http://members.iquest.net/%7Emrmil/stego.html">Steganography Info and Archive</a></li>
</ul><hr color="#ff0000" /> <b><span style="color: white; font-size: large;"><a href="" name="viruses"><span style="background-color: red;">Viruses</span></a><span style="background-color: red;">- Information</span></span></b><br />
<hr color="#ff0000" /><ul><li><a href="http://webworlds.co.uk/dharley/">David Harley's webpage</a><br />
A general anti-virus/security resource from the fellow who maintains the<a href="news:alt.comp.virus">alt.comp.virus</a><br />
FAQ.</li>
<li><a href="http://kumite.com/myths/">Computer Virus Myths</a></li>
<li>Newsgroup:<a href="news:comp.virus">comp.virus</a></li>
<li><a href="http://www.psnw.com/%7Ejoe/">The HAVS Homepage -Anti-Virus Site</a></li>
<li>IBM<a href="http://www.av.ibm.com/current/FrontPage/">antivirus online</a><br />
News and views about virus topics.</li>
<li><a href="http://server.snni.com/%7Erobertc/virus.html">Robert Chu's Anti-Virus Page</a><br />
Anti-virus primer</li>
<li>Symantec's<a href="http://www.symantec.com/avcenter/index.html">Antivirus Research Center</a></li>
<li><a href="ftp://ftp.nordu.net/networking/security/virus-l/docs/finkel.presentation">Those ubiquitous viruses</a><br />
Paper on how viruses work.</li>
<li><a href="http://bilbo.isu.edu/security/isl/threat.html">Threat Assessment of Malicious Code and Human Computer Threats</a></li>
<li><a href="http://csrc.ncsl.nist.gov/virus/">Virus Information</a><br />
from NIST.</li>
</ul><hr color="#ff0000" /> <span style="color: white; font-size: large;"><span style="background-color: red; font-weight: 700;">Anti-Virus Vendors</span></span><br />
<hr color="#ff0000" /><ul><li><a href="http://www.datafellows.com/">Data Fellows</a><br />
(F-Prot)</li>
<li><a href="http://www.mcafee.com/">McAfee Associates Inc.</a></li>
<li><a href="http://www.drsolomon.com/">Dr. Solomon's On-Line</a><br />
a computer virus and IT security issues information center with support and resources for users of the Dr. Solomon's anti-virus and security product range. Major updates on the 1st of every month.</li>
<li><a href="http://www.symantec.com/">Symantec Corp.</a></li>
<li><a href="http://www.stiller.com/">Stiller Research</a></li>
<li><a href="http://www.thunderbyte.com/">ThunderBYTE</a></li>
</ul><hr color="#ff0000" /> <b><span style="color: white; font-size: large;"><a href="" name="UNIX"><span style="background-color: red;">UNIX Security Resources</span></a></span></b><br />
<hr color="#ff0000" /><ul><li><a href="ftp://ftp.cert.org/pub/tools/cops">COPS</a></li>
<li><a href="ftp://ftp.cert.org/pub/tools/crack">Crack</a></li>
<li><a href="ftp://ciac.llnl.gov/pub/ciac/sectools/unix/merlin">Merlin</a></li>
<li><a href="ftp://ftp.win.tue.nl/pub/security/">SATAN</a></li>
<li><a href="ftp://ftp.win.tue.nl/pub/security/">TCP Wrappers</a></li>
<li><a href="ftp://ftp.win.tue.nl/pub/security/">Tiger</a></li>
<li><a href="ftp://coast.cs.purdue.edu/pub/COAST/Tripwire/">Tripwire</a></li>
</ul><hr color="#ff0000" /> <span style="color: white; font-size: large;"><a href="" name="nt"><span style="background-color: red; font-weight: 700;">NT Security</span></a></span><br />
<hr color="#ff0000" /><ul><li><a href="http://www.ntshop.net/security/">The NT Shop</a><br />
This site offers both security information and security tools.</li>
<li><a href="http://www.somarsoft.com/security.htm">Windows NT Security Issues</a></li>
</ul><hr color="#ff0000" /><b><span style="color: white; font-size: medium;"><a href="" name="web"><span style="background-color: red;">What issues are specific to the World Wide Web?</span></a></span></b><br />
<hr color="#ff0000" /><ul><li><a href="http://www.rstcorp.com/javasecurity/links.html">The Java Security Hotlist</a></li>
<li><a href="http://www.microsoft.com/security/">Microsoft Security Advisor</a></li>
<li><a href="http://www.microsoft.com/frontpage/documents/bugQA.htm">Microsoft FrontPage Security Fix</a></li>
<li><a href="http://www.microsoft.com/intdev/security/authcode/">Proposal for Authenticating Code Via the Internet</a><br />
from Microsoft</li>
<li><a href="http://www.webcomics.com/shockwave/">Shockwave Security Alert</a></li>
<li><a href="http://www-genome.wi.mit.edu/WWW/faqs/www-security-faq.html">The World Wide Web Security FAQ</a></li>
</ul><hr color="#ff0000" /> <span style="color: white; font-size: large;"><a href="" name="articles"><span style="background-color: red; font-weight: 700;">Articles and Law Reviews</span></a></span><br />
<hr color="#ff0000" /><a href="http://www.urich.edu/%7Ejolt/">University of Richmond Journal of Law and Technology</a><br />
Greg S. Sergienko<a href="http://www.urich.edu/%7Ejolt/v2i1/sergienko.html">Self Incrimination and Cryptographic Keys</a><br />
C. Maureen Stinger Casenote<a href="http://www.urich.edu/%7Ejolt/v2i1/stinger.html#V">Arizona v. Evans: Adapting the Exclusionary Rule to Advancing Computer Technology</a><br />
2 RICH. J.L. & TECH. 4 (1996) <http: stinger.html="" v2i1="" www.urich.edu="" ~jolt="">. Issue: Can faulty data in computerized police records constitute sufficient basis to justify a search?</http:><br />
<ul><li><a href="http://journal.law.ufl.edu/%7Etechlaw/">Journal of Technology Law and Policy</a><br />
University of Florida College of Law</li>
<li>Jones Robert L.<a href="http://www.computerbar.org/netethics/bjones.htm">Client Confidentiality: A Lawyer's Duties with Regard to Internet E-Mail</a></li>
<li>Morris Gary<a href="http://csrc.ncsl.nist.gov/secpubs/cslaw.txt">Computer Security and the Law</a></li>
<li>Smith Arthur L.<a href="http://www.abelaw.com/bamsl/lpm/email.htm">E-Mail and the Attorney-Client Privilege</a></li>
<li>Hansen Stephen E.<a href="http://csrc.ncsl.nist.gov/secpubs/hansen.txt">Legal Issues A Site Manager's Nightmare</a></li>
<li>Dam Kenneth W.<a href="http://www.law.uchicago.edu/Publications/Occasional/">The Role of Private Groups in Public Policy: Cryptography and the National Research Council</a></li>
</ul><hr color="#ff0000" /> <b><span style="color: white; font-size: large;"><a href="" name="news"><span style="background-color: red;">Newsgroups and Discussion</span></a></span></b><br />
<hr color="#ff0000" /><ul><li><a href="news:alt.security">alt.security</a></li>
<li><a href="news:comp.security.announce">comp.security.announce</a></li>
<li><a href="news:comp.security.misc">comp.security.misc</a></li>
<li><a href="news:comp.security.unix">comp.security.unix</a></li>
<li><a href="http://catless.ncl.ac.uk/Risks">Risks Forum</a><br />
Web equivalent of<a href="news:comp.risks">comp.risks</a></li>
<li><a href="news:sci.crypt">sci.crypt</a></li>
</ul><hr color="#ff0000" /> <span style="color: white; font-size: large;"><a href="" name="general"><span style="background-color: red; font-weight: 700;">General Sites</span></a></span><br />
<hr color="#ff0000" /><ul><li><a href="http://www.cert.org/">CERT(sm) Coordination Center</a><br />
Based at Carnegie Mellon University CERT is a central point to report to in the event of a security breach. Particularly useful for UNIX security issues. Issues the<a href="ftp://info.cert.org/pub/cert_advisories/">CERT Advisory</a><br />
notifying you of reported security issues.</li>
<li><a href="http://www.cs.purdue.edu/coast/">COAST</a><br />
"Computer Operations Audit and Security Technology" at Purdue is the foremost center for computer security on the Internet.</li>
<li><a href="http://mailer.fsu.edu/%7Ebtf1553/ccrr/welcome.htm">Computer Crime Research Resources</a><br />
Federal and state statutes bibliographies and Internet links.</li>
<li><a href="http://sun.soci.niu.edu/%7Ecrypt/">Crypt NewsLetter's Homepage</a><br />
Offbeat view of the subject.</li>
<li><a href="http://www.first.org/about/">FIRST</a><br />
The Forum of Incident Response and Security Teams (FIRST) brings together a variety of computer security incident response teams from government commercial and academic organizations. It is a a coalition to exchange information and coordinate response activities about computer security incidents..</li>
<li><a href="http://www.aracnet.com/%7Egtr/archive/">Information Security Archive</a><br />
An archive of online information security documents.</li>
<li><a href="http://www.criminaljustice.org/">National Association of Criminal Defense Lawyers</a></li>
<li><a href="http://www.ncsa.com/">National Computer Security Association</a><br />
NCSA is an independent organization offering objective views and opinions on computer security issues. It strives to improve computer security through the sharing of knowledge dissemination of information and certification of security products.</li>
<li><a href="http://www.ncjrs.org/nijhome.htm">The National Institute of Justice</a><br />
The research and development agency of the U.S. Department of Justice.<a href="http://www.ncjrs.org/other.htm">Other Criminal Justice Resources</a></li>
<li><a href="http://csrc.ncsl.nist.gov/">NIST Computer Security Resource Clearinghouse</a></li>
<li><a href="http://www.fas.org/irp/nsa/rainbow.htm">The NSA "Rainbow Series"</a><br />
The "Orange" and "Red" Books are but two of many DoD standards for trusted computer systems. Each standard is known by its cover the "Aqua Book" the "Neon Orange Book" the "Lavender Book" etc. Many are available here.</li>
<li><a href="http://www.raptor.com/lib/index.html">Raptor Systems Online Library</a><br />
Texts of many security-related documents.</li>
<li><a href="http://csrc.ncsl.nist.gov/secpubs/rainbow/">Rainbow Series</a><br />
Another source of Rainbow Documents.</li>
<li><a href="http://www.sgrm.com/Resources.htm">S. G. R. MacMillan Barrister: Selected Internet Resources</a><br />
A collection of computer crime and security references that is particularly strong regarding white-collar computer-related crime.</li>
<li><a href="http://www.cs.auckland.ac.nz/%7Epgut001/links.html">Security and Encryption-related Resources and Links</a></li>
<li><a href="http://csrc.ncsl.nist.gov/secpubs/">Security Publications</a></li>
<li><a href="http://www.yahoo.com/Computers_and_Internet/Security_and_Encryption/">Yahoo!: Security and Encryption</a></li>
</ul><hr color="#ff0000" /><div align="left"> <strong style="background-color: red; font-weight: 400;"><span style="color: white; font-size: large;">More Choice Cyber Crime Reading and Web Sites</span></strong></div><hr color="#ff0000" /><a href="http://www.htcn.org/newsarticle2.htm">Online Activity Leaves Solid Trail for Investigators</a><br />
<a href="http://www.msnbc.com/news/287184.asp">Computer Techs Face Ethical Questions</a><br />
<a href="http://www.wired.com/news/news/politics/story/20609.html">Only You Can Prevent Cybercrime</a><br />
<a href="http://swissnet.ai.mit.edu/6.805/articles/godwin-cops-iway.html">COPS ON THE I-WAY</a><br />
<a href="http://www.farcaster.com/sterling/contents.htm">THE HACKER CRACKDOWN: Law and Disorder on the Electronic Frontier</a><br />
<ul><li><a href="http://www.csmonitor.com/durable/1999/07/08/p16s1.htm">Logging On To Cyber-Crime</a></li>
<li><a href="http://www.azcentral.com/business/0708HACKER08.shtml">Home PCs Next Target For Hackers</a></li>
<li><a href="http://www.edmontonjournal.com/technology/stories/990710/2592159.html">'Ethical' Hackers Take On Cyber-Villains</a></li>
<li><a href="http://www.pcworld.com/pcwtoday/article/0,1510,11636,00.html">Government Sites Guard Against Intruders</a></li>
<li><a href="http://www.wired.com/news/news/politics/story/20624.html">Inside the Virus Writer's Mind</a></li>
<li><a href="http://www.aracnet.com/%7Ekea/Papers/White_Paper.shtml">Criminal Threats to Business on the Internet</a></li>
<li><a href="http://www.gocsi.com/prelea11.htm">Annual cost of computer crime rise alarmingly: Organizations report $136 million in losses</a></li>
<li><a href="http://www.eff.org/pub/Legal/cyberliberties_kapor.article">Civil Liberties in Cyberspace: When does hacking turn from an exercise of civil liberties into crime?</a></li>
<li><a href="http://www.rand.org/publications/MR/MR965/MR965.pdf/">Cyberpayments and Money Laundering</a></li>
<li><a href="http://www.kcl.ac.uk/orgs/icsa/crime.htm">Computer crime - an historical survey</a></li>
<li><a href="http://www.news.com/News/Item/0,4,1465,00.html">Banks appease online terrorists</a></li>
<li><a href="http://www.usdoj.gov/criminal/cybercrime/reporting.htm">How to Report Internet-Related Crime</a></li>
<li><a href="http://iitf.doc.gov/">Information Infrastructure Task Force</a></li>
<li><a href="http://www.icsa.net/">ISCA</a></li>
<li><a href="http://www.icsa.net/icsalaws/">US Computer Crime Laws</a></li>
<li><a href="http://www.icsa.net/library/research/comp_crime.shtml">Computer Crime Statistics</a></li>
<li><a href="http://www.icsa.net/library/research/criminal.shtml">Why Kids Shouldn't be Criminal Hackers</a></li>
<li><a href="http://www.icsa.net/library/research/tecnoc.shtml">Techno-crime and terror against tomorrow's organization:</a></li>
<li><a href="http://www.ifs.univie.ac.at/%7Epr2gq1/rev4344.html">United Nations Computer Crime Manual</a></li>
<li><a href="http://www.rcmp-grc.gc.ca/html/cpu-cri.htm">RCMP Computer Crime Page</a></li>
<li><a href="http://www.usdoj.gov/criminal/cybercrime/crimes.html">Prosecuting Crimes Facilitated by Computers and the Internet</a></li>
<li><a href="http://www.usdoj.gov/criminal/cybercrime/intl.html">International Aspects of Computer Crime</a></li>
<li><a href="http://nsi.org/Library/Compsec/crimecom.html">Computer Crime Categories: How Techno-criminals Operate</a></li>
<li><a href="http://www.infosecuritymag.com/mar99/hackers.htm">Tools of the Trade</a></li>
<li><a href="http://www.infosecuritymag.com/apr99/cover.htm">Who’s Stealing Your Information?</a></li>
<li><a href="http://www.gocsi.com/prelea990301.htm">1999 Computer Crime & Security Survey</a></li>
<li><a href="http://www.news.com/News/Item/0,4,6844,00.html">Hacker admits AOL Piracy</a></li>
<li><a href="http://www.news.com/News/Item/0,4,3710,00.html">To catch a hacker</a></li>
<li><a href="http://www.news.com/News/Item/0,4,1497,00.html">Hacking cost businesses $800 million</a></li>
<li><a href="http://www.cnet.com/Content/Features/Dlife/Crime/index.html??news">Net Crime: Don't be a victim</a></li>
<li><a href="http://www.thenews.org/04047/byte.htm">A byte outta crime: Computer crimes rising with technology</a></li>
<li><a href="http://www.cpsr.org/cpsr/privacy/crime/karnow.html">Crime In The Digital Network</a></li>
<li><a href="http://www.cpsr.org/cpsr/privacy/crime/denning.hackers.html">Concerning Hackers Who Break into Computer Systems</a></li>
<li><a href="http://www.law.emory.edu/pub-cgi/print_hit_bold.pl/ELJ/volumes/sum96/alex.html">Computer Crime</a></li>
<li><a href="http://www.info-sec.com/access/infoseczh.html-ssi">Computer Crime: An Emerging Challenge for Law Enforcement</a></li>
<li><a href="http://www.emergency.com/u4ea1.htm">Information Terrorist' Threatens Boston Herald Investigation Ensues</a></li>
<li><a href="http://oicj.acsp.uic.edu/spearmint/public/pubs/cjfarrago/terror02.cfm">The Future of CyberTerrorism: Where the Physical and Virtual Worlds Converge</a></li>
<li><a href="http://www.nando.net/newsroom/ntn/info/012496/info40_13296.html">Computer Crime Costs Britain $1.5 Billion a Year</a></li>
<li><a href="http://www.news.com/News/Item/0,4,7754,4000.html?latest">CNET Special Report: Crime on the Net</a></li>
<li><a href="http://www.acsp.uic.edu/OICJ/PUBS/CJE/060411_2.htm">Internet Globalization and the Proliferation of Computer Crime</a></li>
<li><a href="http://www.emergency.com/cybrterr.htm">The Cyber Terrorists...</a></li>
<li><a href="http://www.govtech.net/1995/gt/mar/compcrim.htm">Computer Crime Requires Virtual Patrol</a></li>
<li><a href="http://www.zdnet.com/intweek/print/960617/politics/doc1.html">Cybercops Face Net Crime Wave</a></li>
<li><a href="http://www.rcmp-grc.gc.ca/html/cpu-cri.htm">What is Computer and Telecommunication Crime</a></li>
<li><a href="http://www.emergency.com/net-warn.htm">Warning: Internet Used by Foreign Intelligence Operatives</a></li>
<li><a href="http://www.takedown.com/coverage/crime-heart.html">Shimomura interview</a></li>
<li><a href="http://www.mossbyrett.of.no/info/legal.html">Unauthorized Access to Computer Systems: Penal Legislation in 37 Countires</a></li>
<li><a href="http://www.usdoj.gov/criminal/cybercrime/search_docs/search.htm#PREFACE">Federal Guidelines for Searching & Seizing Computers</a></li>
<li><a href="http://www.usdoj.gov/criminal/cybercrime/supplement/ssgsup.htm">Supplement to Federal Guidelines for Searching & Seizing Computers</a></li>
<li><a href="http://www.sptimes.com/Business/61698/Hackers__third_in_a_s.html">"Hidden Dangers"</a></li>
</ul></li><br />
</td></tr>
</tbody></table>Surenhttp://www.blogger.com/profile/09789784724534128579noreply@blogger.com0tag:blogger.com,1999:blog-5123376846625329520.post-45301524802780413882010-11-07T03:52:00.005+05:302010-11-07T03:52:55.011+05:30Intrusion Detection Systems FAQ<table border="0" cellpadding="1" cellspacing="0" style="margin-left: 30px;"><tbody>
<tr><td><br />
</td><td><br />
</td><td nowrap="nowrap" valign="top"> </td></tr>
<tr><td align="right" colspan="3" valign="top">-</td><td>What is an "intrusion detection system (IDS)"?</td></tr>
<tr><td align="right" colspan="3" valign="top">-</td><td> What are hackers and crackers?</td></tr>
<tr><td align="right" colspan="3" valign="top">-</td><td> What are whitehats and blackhats?</td></tr>
<tr><td align="right" colspan="3" valign="top">-</td><td> How do intruders get passwords?</td></tr>
<tr><td align="right" colspan="3" valign="top">-</td><td> What is a typical intrusion scenario?</td></tr>
<tr><td align="right" colspan="3" valign="top">-</td><td> What are some common "intrusion signatures"?</td></tr>
<tr><td align="right" colspan="3" valign="top">-</td><td> What are some common exploits?</td><td> </td><td> </td></tr>
<tr><td colspan="2"> </td><td colspan="2"><b>FAQ: Part Two</b></td></tr>
<tr><td align="right" colspan="3" valign="top">-</td><td> What honeypot products are available?</td></tr>
<tr><td align="right" colspan="3" valign="top">-</td><td> What are the disadvantages of a honeypot?</td></tr>
<tr><td align="right" colspan="3" valign="top">-</td><td> What are the advantages of a honeypot?</td></tr>
<tr><td align="right" colspan="3" valign="top">-</td><td> What is a honeypot?</td></tr>
<tr><td align="right" colspan="3" valign="top">-</td><td> What are the limitations of a network based IDS?</td></tr>
<tr><td align="right" colspan="3" valign="top">-</td><td> Why do I need IDS if I already have a firewall?</td></tr>
<tr><td align="right" colspan="3" valign="top">-</td><td> What intrusion detection systems are available?</td></tr>
<tr><td align="right" colspan="3" valign="top">-</td><td> What is Snort?</td></tr>
<tr><td align="right" colspan="3" valign="top">-</td><td> How do I collect enough evidence about the hacker?</td></tr>
<tr><td align="right" colspan="3" valign="top">-</td><td> What are the main things to do to secure a Win NT/200/XP system?</td></tr>
<tr><td align="right" colspan="3" valign="top">-</td><td> How are intrusions detected?</td></tr>
<tr><td align="right" colspan="3" valign="top">-</td><td> Where can I find some Statistics on intrusions?</td></tr>
<tr><td align="right" colspan="3" valign="top">-</td><td> What is a DDoS (Distributed Denial of Service) attack?</td></tr>
<tr><td align="right" colspan="3" valign="top">-</td><td> What are the types of DoS (Denial of Service) attacks?</td></tr>
<tr><td align="right" colspan="3" valign="top">-</td><td> What is a Denial of Service attack?</td></tr>
<tr><td align="right" colspan="3" valign="top">-</td><td> What are some host/service discovery methods?</td></tr>
<tr><td align="right" colspan="3" valign="top">-</td><td> How do systems get hacked?</td></tr>
<tr><td align="right" colspan="3" valign="top">-</td><td> What are the legal implications of honeypots?</td></tr>
<tr><td>[</td><td align="right"><b>23</b></td><td>]</td><td>Trojans FAQ </td></tr>
</tbody></table><br />
<dl><dt><a href="" name="faq1219">What is an "intrusion detection system (IDS)"?</a><br />
</dt>
<dd>An <strong>intrusion</strong> is somebody attempting to break into or misuse your computer system. This can be something as severe as stealing confidential data or misusing your email system for spam.
An "Intrusion Detection System (IDS)" is a system for detecting such intrusions. Broadly speaking there are 2 types of Intrusion Detection Systems: </dd><dd>
<strong>Network intrusion detection systems (NIDS)</strong> - Monitors packets on the network wire and attempts to discover an intruder by matching the attack pattern to a database of known attack patterns. A typical example is looking for a large number of TCP connection requests (SYN) to many different ports on a target machine, thus discovering if someone is attempting a TCP port scan. A network intrusion detection system sniffs network traffic, by promiscuously watching all network traffic. </dd><dd>
<strong>Host based intrusion detection system (HIDS)</strong> - A host based intrusion detection system does not monitor the network traffic, rather it monitors what's happening on the actual target machines. It does this by monitoring security event logs or checking for changes to the system, for example changes to critical system files or to the systems registry. Host based intrusion detection systems can be split up into: </dd><dd>
<strong>System integrity checkers</strong> - Monitors system files & system registry for changes made by intruders (thereby leaving behind a backdoor). There are a number of File/System integrity checkers, such as "Tripwire" or " LANguard File Integrity Checker'. </dd><dd>
<strong>Log file monitors</strong> - Monitor log files generated by computer systems. Windows NT/2000 & XP systems generate security events about critical security issues happening on the machine. (for example a user acquires root/administrator level privileges) By retrieving & analyzing these security events one can detect intruders. </dd><dd>
For more info about Intrusion Detection systems, see <a href="http://www.icsa.net/idswhite/">http://www.icsa.net/idswhite/</a>.
</dd>
<dt><br />
</dt>
<dt><a href="" name="faq1160">What are hackers and crackers?</a><br />
</dt>
<dd>An intruder is also referred to as a <strong>hacker</strong> or a <strong>cracker</strong>. A hacker is basically someone who hacks a system - he could do this because he finds it interesting or because he wants to access your system. In the latter case he would be a cracker.
In any case, hackers and crackers are both intruders and can be classified as external or internal intruders (outsiders or insiders). </dd><dd>
<strong>External/Outsiders</strong>
Intruders from outside your network. They attack your web servers, email servers and may also attempt to go bypass the firewall to attack machines on the internal network. Outside intruders may come from the <strong>Internet</strong>, <strong>dial-up</strong> lines, <strong>physical break-ins</strong>, or from a <strong>partner</strong> (vendor, customer, reseller, etc.) network that is linked to your corporate network. </dd><dd>
<strong>Internal/Insiders</strong>
Intruders that are using your internal network legitimately. These include users who <strong>misuse privileges</strong> or who attempt to get higher rights or use another users privileges. Internal intruders are often overlooked - most security breaches (80%) are done by insiders. </dd><dd> </dd><dd>
</dd>
<dt style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><br />
</dt>
<dt><a href="" name="faq1161"><span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;">What are whitehats and blackhats</span>?</a></dt>
<dt> <br />
</dt>
<dd>Hackers are often categorized as either Whitehat or Blackhat. Both Whitehats and Blackhats have the know-how to penetrate a system but their motives are different. A whitehat's aim is to know a system's loopholes to secure the system. On the other hand, blackhats make use of this knowledge for personal gain and other selfish and un-ethical purposes.
Some Computer Security consultants are described as Whitehat, while "script kiddies" are also sometimes described as Blackhat. Script kiddies are known to be less sophisticated hackers who launch attacks against computer systems such as port scanning, defacing a website or launching a Denial of Service attack. </dd><dd>
</dd>
<dt><a href="" name="faq1163">How do intruders get passwords?</a><br />
</dt>
<dd>Intruders get passwords in various ways. These are some of the most popular methods being used by the hackers nowadays: </dd><dd>
<strong>Sniffing:</strong> Data passing on Ethernet or Wireless networks can usually be intercepted. This is done by making use of a protocol analyzer, which sets the network card to promiscuous mode - meaning that it is able to pass all data on the network to the operating system without filtering. Passwords are typically "sniffed" off clear text protocols. Such protocols include Pop3, FTP and Telnet. In these cases passwords flow through the network without making use of any encryption. Many new protocols now make use of encryption. Although encryption makes the task of sniffing passwords more difficult, it is still possible to get the passwords from the encrypted data by making use of Dictionary and Brute force attacks.
Sniffing is a very effective method for hackers and attackers since it is usually a passive attack and therefore more stealthy and more difficult to detect. </dd><dd>
<strong>Replay attack:</strong> In some cases, intruders do not need to decrypt the password. They can use the encrypted form instead in order to login to systems. Tools are also available to make this kind of attack easier. This kind of attack is very popular against web applications. </dd><dd>
<strong>Password file stealing:</strong> System passwords are usually stored in files or in the Windows registry. On Windows NT 2000 and XP, the passwords are stored in encrypted form on the SAM file. On UNIX systems the password is usually stored in the /etc/passwd or /etc/shadow. Once an attacker gets his hand on the password file he can launch a dictionary or brute force attack against the encrypted passwords. </dd><dd>
<strong>Observation:</strong> A very well known and traditional password stealing attack is dubbed "shoulder surfing" - which is basically when an intruder watches someone type in a password. Observation can also be done by going through a victim's personal objects. Typically passwords are written on small pieces of paper - and can also be written on sticky notes attached to the monitor itself! </dd><dd>
<strong>Social Engineering:</strong> Many successful hackers and attackers make use of human weaknesses - one such well-known hacker is Kevin Mitnick. A common (successful) technique is to simply call the user and say, "Hi, this is Bob from Some-Company. We have problems within the network and they appear to be coming from your machine. Can you give me your password?" Many users will happily supply this sensitive information without thinking twice. </dd><dd>
<strong>Default Passwords:</strong> Sometimes it is not even required to guess the passwords, since the system would have default passwords put in by the system vendor. A lot of network devices such as switches and hardware routers will have default passwords allowing an attacker to easily gain access. </dd><dd>
</dd>
<dt><br />
</dt>
<dt><a href="" name="faq1164">What is a typical intrusion scenario?</a><br />
</dt>
<dd>A typical scenario might be: </dd><dd>
1. <strong>Information Gathering</strong>
An attacker will normally start by finding out as much information as possible on his target. At this point the attacker will want to be as stealthy as possible and will usually make use of less direct methods. Some of these methods include doing a whois lookup and DNS Zone transfers as well as normal browsing of websites gathering e-mail addresses and similar important information belonging to the target. </dd><dd>
2. <strong>Further Information Gathering </strong>
In an attempt to gather more information an attacker will usually perform ping sweeps, port scanning and check Web servers for vulnerable CGI scripts. The intruder will also check the versions of running applications and services on your host - normally done using Banner Grabbing techniques. Typically banner grabbing consists of connecting to a service (for example SMTP on port 25) and parsing the response. In the response one would usually get the version of the application or a typical pattern of that application. A good IDS will catch some of this activity. </dd><dd>
3. <strong>Attack!!</strong>
Having a list of possible loopholes, the intruder will start trying out different attacks on the system. He will for example try to launch the UNICODE attack if he previously found out that the target has IIS installed. Apart from launching exploits for well known vulnerable software, a typical attacker will also try to find out misconfigured running services. For example he will try to guess passwords for known users on the system. </dd><dd>
4. <strong>Successful intrusion</strong>
After a successful intrusion, attackers will usually install their own backdoors in the system and delete log files in order to hide their tracks. They may install 'toolkits' such as rootkits that give them access, replace existing services with their own Trojan horses that have backdoor passwords, or create their own user accounts. System Integrity Checkers such as Tripwire have the task of detecting this kind of activity and alerting the administrator. From here an attacker will usually launch further attacks to other hosts especially those that are trusted by the compromised machine. </dd><dd>
5. <strong>Fun and profit</strong>
Different classes of system intruders have different goals. Some steal confidential information such as Credit cards, passwords etc: while others just use the compromised host to launch further attacks on sites (such as DDoS attacks). A few others will just deface a website.
A growing trend is to make use of a different pattern of attack. Intruders are increasingly randomly scanning internet addresses looking for a specific hole or number of holes. For example an intruder may scan for hosts having port 80 open and running a misconfigured / unpatched IIS server. Attackers will make a list of the vulnerable hosts and then launch attacks against each one of the hosts. </dd><dd>
</dd>
<dt><br />
</dt>
<dt><a href="" name="faq1165">What are some common "intrusion signatures"?</a><br />
</dt>
<dd>There are three types of attacks:
<strong>Information gathering:</strong>
<ul><li><div> Network mapping - ping sweeps </div></li>
<li><div> DNS zone transfers </div></li>
<li><div> E-mail recons </div></li>
<li><div> TCP or UDP port scans - Enumeration of services </div></li>
<li><div> Indexing of public web servers to find web server and CGI holes. </div></li>
<li><div> OS fingerprinting </div></li>
</ul><strong>Exploits:</strong> Attackers make use of vulnerabilities in target servers or misconfiguration on the system/network.
<strong>Denial-of-service (DoS) attacks:</strong> An attempt to break the system and make it inaccessible to other users. Intruders will attempt to crash a service or machine, overload network or hardware resources, such as overload the links, the CPU, or fill up the disk.
</dd>
<dt><br />
</dt>
<dt><a href="" name="faq1166">What are some common exploits?</a><br />
</dt>
<dd><strong>CGI scripts</strong>
CGI scripts consist of server-side programs which generate Dynamic web sites. A typical CGI is be formmail.cgi, which allows users to send e-mails to the website administrator without making use of an e-mail client. Other attacks that make use of CGI scripts include Cross Site scripting, SQL command injection, and Path traversal.
<strong>Web server attacks</strong>Many times the web server itself could have security holes. Both Apache on UNIX and IIS on Windows NT have their share of root or SYSTEM vulnerabilities. An unpatched IIS 5 is vulnerable to the UNICODE directory traversal attack where attackers are able to execute files such as CMD.exe to gain a remote shell. Another common bug is buffer overflow in the request field or in one of the other HTTP fields.
<strong>Web browser attacks</strong>Most modern web browsers have a series of security loopholes. Typical software vulnerabilities like format string and buffer overflow attacks are also found in http clients (such as Internet Explorer and Netscape). Active Content such as JavaScript, Java, ActiveX and HTML itself can also pose a security risk.
<ul><li><div><strong>HTTP headers</strong> can be used to exploit bugs because some fields are passed to functions that expect only certain information. A well-known exploit for IE consists of encapsulating HTTP headers within an EML file and launching an executable embedded within the EML file. </div></li>
<li><div><strong>HTML</strong> can be often exploited through buffer overflows. Internet Explorer 6 as well as previous versions of IE and Netscape were found to be vulnerable to these kind of attacks using different HTML tags with long strings as attributes. </div></li>
<li><div><strong>JavaScript</strong> is well known to be the prime cause of security loopholes within web browsers. Likewise with VBScript and any other type of active scripting. These functions are generally run in a sandbox environment, however from time to time hackers find out new ways to escape the sandbox environment and execute code, read sensitive files etc. </div></li>
<li><div><strong>Frames and iframes</strong> are many times used in conjunction with Active Scripting (JavaScript, ActiveX, Vbscript) exploits. However they are sometimes also used as a social engineering exploit to fake legitimate sites. </div></li>
<li><div><strong>Java</strong> was built with a strong security model by making use of the sandbox technology. However third parties have implemented their own versions which can introduce bugs and flaws. Normal Java applets have no access to the local system, but sometimes they would be more useful if they did have local access. Thus, the implementations of "trust" models that can more easily be hacked. </div></li>
<li><div><strong>ActiveX</strong> is even more dangerous than Java as it works purely from a trust model and runs native code. The trust model consists of either allowing the ActiveX application to run on the client machine, or not. Unlike Java, the ActiveX model has no way to limit the application certain functions only. As a security precaution ActiveX components generally have to be digitally signed. The sign assures the customer that the producer of the ActiveX component is legitimate but not that the ActiveX component is safe to install. </div></li>
</ul><strong>Access Auditing</strong>Operating Systems usually support logging of failed login attempts, failed file access and attempts to perform administrative tasks especially by non-administrative user accounts.
<strong>POP3 and IMAP</strong>
POP3 and IMAP servers are known to contain exploits just like any other software. Apart from that an attacker can launch at attack in order to guess the password of a specific email address.
<strong>IP spoofing</strong>A good number of attacks make use of changing the source IP address. TCP/IP protocol has no way to check if the source IP address in the packet header actually belongs to the machine sending it. Some of the attacks which take advantage of ip spoofing are:
<ul><li><div><strong>SMURF Attack</strong>A broadcast ping is sent and the source IP of the ping is set the same as the victim's IP address. In this case a huge number of computers will respond back and send a Ping reply to the victim. When this is repeated, the victim's machine or link will get overloaded causing a Denial of Service. </div></li>
<li><div><strong>TCP sequence number prediction</strong> <br />
A TCP connection is assigned a sequence number for the client and for the server. If the sequence number is predictable, intruders can create packets with forged IP address and guess the sequence number to hijack TCP connections. </div></li>
<li><div><strong>DNS poisoning through sequence prediction</strong> <br />
DNS servers usually query other DNS servers to resolve names for other hosts. An attacker will send a request to the victim DNS server as well as a response to the same server. This way the attacker can make clients trying to access <a href="http://www.hotmail.com/">www.hotmail.com</a> point to his servers. </div></li>
</ul><strong>Buffer Overflows</strong>
Some common buffer overflow attacks are:
<ul><li><div><strong>Buffer overruns in major web servers</strong>Both Apache and IIS have well known vulnerabilities. Worms such as Code Red (for IIS) and Linux.Slapper (for Apache) make use of such vulnerabilities to spread. </div></li>
<li><div><strong>DNS overflow </strong>Some of the older DNS servers (BIND) are vulnerable to overflows. A typical attack would be to supply an overly long DNS name to the server. DNS names are limited to 64-bytes per subcomponent and 256-bytes overall. </div></li>
<li><div><strong>DNS attacks</strong>DNS servers are usually trusted by services and users - meaning that compromising a DNS server can lead to further attacks on end users and other services. This makes DNS servers a prime target for hacker attacks. </div></li>
<li><div><strong>DNS cache poisoning</strong> <br />
This is a very typical attack on DNS servers. In simple terms it works by sending a Question to resolve a given domain ("Who is <a href="http://www.test.com/">www.test.com</a>?") and providing the answer with false information ("www.test.com is 127.0.0.1"). </div></li>
</ul>
</dd></dl><h2><img align="absMiddle" src="http://www.windowsecurity.com/img/li_subtitle.gif" />FAQ: Part Two<a href="" name="faq1220"> </a></h2>This is "path two" for FAQ "Intrusion Detection Systems FAQ"<br />
<dl><dt><a href="" name="faq1182">What honeypot products are available?</a><br />
</dt>
<dd>Fred Cohen's Deception Toolkit
<a href="http://www.all.net/dtk/">http://www.all.net/dtk/</a>
Specter
<a href="http://www.specter.ch/">http://www.specter.ch/</a>
<a href="http://www.infosyssec.com/infosyssec/intdet1.htmtop">[back top]</a></dd>
<dt><a href="" name="faq1181">What are the disadvantages of a honeypot?</a><br />
</dt>
<dd><ul><li>If the system does indeed get hacked, it can be used as a stepping-stone to further compromise the network.</li>
<li>Some people believe that since honeypots lure hackers in, that legal rights to prosecute hackers are reduced. This is a misconception, because honeypots are not active lures -- they do not advertise themselves. A hacker can only find a honeypot in the first place by running search programs on a network.</li>
<li>Honeypots add complexity. In security, complexity is bad: it leads to increased exposure to exploits.</li>
<li>Honeypots must be maintained just like any other networking equipment/services. This leads many people to turn them off after a while. You think that a 468 running RedHat Linux 4.2 that you setup 2 years ago doesn't require maintenance, but in reality it does. How do you know the logging is working right? What do you do when a new network management platform or vulnerability assessment system starts being used and alarms start going off? What do you do when alarms stop coming in because a hacker has compromised the system and is using it launch other attacks against you (or worse, back out to the Internet)?</li>
</ul>
<a href="http://www.infosyssec.com/infosyssec/intdet1.htmtop">[back top]</a> </dd>
<dt><a href="" name="faq1180">What are the advantages of a honeypot?</a><br />
</dt>
<dd><ul><li>An early-alarm that will trip only upon hostile activity. Network intrusion detection systems have a problem distinguishing hostile traffic from benign traffic. Isolated honeypots have a much easier time because they are systems that should not normally be accessed. This means that all traffic to a honeypot system is already suspect. Network management discovery tools and vulnerability assessment tools still cause false positives, but they otherwise give a better detection rate.</li>
<li>A hostile-intent assessment system. Honeypots often present themselves as easily hacked systems. One of the most common things hackers do is scan the Internet doing "banner checks". The honeypot can be setup to provide a banner that looks like a system that can easily be hacked, then to trigger if somebody actually does the hack. For example, the POP3 service reports the version of the software. Several versions of well-known packages have buffer-overflow holes. A hacker connects to port 110, grabs the version info from the banner, then looks up the version in a table that points to which exploit script can be used to break into the system.</li>
</ul>
</dd>
<dt><a href="" name="faq1179">What is a honeypot?</a><br />
</dt>
<dd>While not strictly sniffer-based intrusion detection systems, honeypots still process network protocols in much the same ways. Therefore, I've decided to add this section to my FAQ.
Deception systems (A.K.A. decoys, lures, fly-traps, honeypots) which contain pseudo-services whose goal is to emulate well-known holes in order to trap hackers. See The Deception ToolKit <a href="http://www.all.net/dtk/">http://www.all.net/dtk/</a> for an example. Also, simple tricks by renaming "administrator" account on NT, then setting up a dummy account with no rights by extensive auditing can be used. There is more on "deception" later in this document. Also see <a href="http://www.enteract.com/%7Elspitz/honeypot.html">http://www.enteract.com/~lspitz/honeypot.html</a>
A honeypot is a system designed to look like something that an intruder can hack. Examples can be:
<ul><li>Installing a machine on the network with no particular purpose other than to log all attempted access.</li>
<li>Installing an older unpatched operating system on a machine. For example, the default installation of WinNT 4 with IIS 4 can be hacked using several different techniques. A standard intrusion detection system can then be used to log hacks directed against the machine, and further track what the intruder attempts to do with the system once it is compromised.</li>
<li>Install special software designed for this purpose. It has the advantage of making it look like the intruder is successful without really allowing them access.</li>
<li>Any existing system can be "honeypot-ized". For example, on WinNT, it is possible to rename the default "administrator" account, then create a dummy account called "administrator" with no password. WinNT allows extensive logging of a person's activities, so this honeypot will track users attempting to gain administrator access and exploit that access.</li>
</ul>
</dd>
<dt><a href="" name="faq1178">What are the limitations of a network based IDS?</a><br />
</dt>
<dd>A network based Intrusion Detection system has 2 big limitations:
<strong>Switched networks</strong> - A network based IDS must be able to see all network traffic of the network that it is protecting. If a network uses a switch (most do nowadays) a sniffer will not be able to see all the network traffic. This usually means that you would deploy a network based IDS at the gateway only, i.e. on your Internet connection. However this does not protect you from internal attacks.
<strong>High Speed</strong> - Modern networks are so fast, that an Intrusion Detection system has a hard time keeping up.
</dd>
<dt><a href="" name="faq1177">Why do I need IDS if I already have a firewall?</a><br />
</dt>
<dd>A common misunderstanding is that firewalls recognize attacks and block them. This is not true.
Firewalls are simply a device that shuts off everything, and then turns back on only a few well-chosen items. In a perfect world, systems would already be "locked down" and secure, and firewalls would be unneeded. The reason we have firewalls is precisely because security holes are left open accidentally.
Thus, when installing a firewall, the first thing it does is it stops ALL communication. The firewall administrator then carefully adds "rules" that allow specific types of traffic to go through the firewall. For example, a typical corporate firewall allowing access to the Internet would stop all UDP and ICMP datagram traffic, stops incoming TCP connections, but allows outgoing TCP connections. This stops all incoming connections from Internet hackers, but still allows internal users to connect in the outgoing direction.
A firewall is simply a fence around you network, with a couple of well-chosen gates. A fence has no capability of detecting somebody trying to break in (such as digging a hole underneath it), nor does a fence know if somebody coming through the gate is allowed in. It simply restricts access to the designated points.
In summary, a firewall is not the dynamic defensive system that users imagine it to be. In contrast, an IDS is much more of that dynamic system. An IDS does recognize attacks against the network that firewalls are unable to see.
For example, in April of 1999, many sites were hacked via a bug in ColdFusion. These sites all had firewalls that restricted access only to the web server at port 80. However, it was the web server that was hacked. Thus, the firewall provided no defense. On the other hand, an intrusion detection system would have discovered the attack, because it matched the signature configured in the system.
Another problem with firewalls is that they are only at the boundary to your network. Roughly 80% of all financial losses due to hacking come from inside the network. A firewall at the perimeter of the network sees nothing going on inside; it only sees that traffic which passes between the internal network and the Internet.
Some reasons for adding IDS to your firewall are:
<ul><li><div> Double-checks misconfigured firewalls. </div></li>
<li><div> Catches attacks that firewalls legitimate allow through (such as attacks against web servers). </div></li>
<li><div> Catches attempts that fail. </div></li>
<li><div> Catches insider hacking. </div></li>
</ul>"Defense in depth, and overkill paranoia, are your friends." (quote by Bennett Todd). Hackers are much more capable than you think; the more defenses you have, the better. And they still won't protect you from the determined hacker. They will, however, raise the bar on determination needed by the hackers.
</dd>
<dt><a href="" name="faq1176">What intrusion detection systems are available?</a><br />
</dt>
<dd>Click <a href="http://www.windowsecurity.com/software/Intrusion_Detection/">here</a> for a list of Intrusion Detection Systems.
</dd>
<dt><a href="" name="faq1175">What is Snort?</a><br />
</dt>
<dd>Snort is a freeware network intrusion detection system. It runs on Linux and has become one of the most effective network based intrusion detection systems around. However, snort requires a fair amount of both Linux and networking knowledge. <a href="http://www.snort.org/">www.snort.org</a> </dd><dd>
</dd>
<dt><a href="" name="faq1174">How do I collect enough evidence about the hacker?</a><br />
</dt>
<dd>An interesting field of IDS is collecting enough information about the incident to identify the hacker. This can be very hard because truly elite hackers will be bouncing their attacks from another compromised system. Hackers will also often employ IP address spoofing, which may appear as if attacks are coming from machines that aren't even turned on.
As far as I can tell, the best technique is to collect as much information as you can. For example, I've put a packet sniffer capturing to trace files on our T-1 line saving to files on a 16-gigabyte disk (most any sniffing program on most platforms can do this). You may not think it fun, but I enjoy perusing these files. It's amazing how many TCP/UDP scans and other probes I see on a regular basis.
Likewise, you should make sure you have full auditing and logging enabled on any/all systems exposed to the Internet. These will help you figure out what happened when you were hacked.
</dd>
<dt><a href="" name="faq1173">What are the main things to do to secure a Win NT/200/XP system?</a><br />
</dt>
<dd>The following lists items that make WinNT more secure, including detection as well as prevention. These are roughly listed in order of importance.
<ol><li><div> Install the latest service packs and "hot fixes". </div></li>
<li><div> Use NTFS instead of FAT. NTFS allows permissions to be set on a per-file/per-directory basis and allows auditing on a per-file/per-directory basis. </div></li>
<li><div> Rename the "administrator" account. A common attack is to use a Dictionary or brute force attack on the "administrator" account. </div></li>
<li><div> Create a new account named "administrator" for detecting intrusion attempts. </div></li>
<li><div> Disable the "guest" account. You may also want to rename this account as (much like "administrator"). Once you've renamed the "guest" account, you may want to create a new account named "guest" for detecting hacking attempts. </div></li>
<li><div> Turn on auditing for "HKEY_LOCAL_MACHINE\Security" in order to detect remote registry browsing. </div></li>
<li><div> Enable "Password Protected" on the screensaver. </div></li>
<li><div> Turn off automatic sharing of ADMIN$, C$, D$, etc. via the "AutoShare" parameter in the registry. This parameter is under "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanServer\Parameters", and is "AutoShareServer" for WinNT Server or "AutoShareWks" for WinNT Workstation. This is a DWORD, with a value of '1' for enabled (default), or a value of '0' for disabled. You will have to add the value yourself because it doesn't already exist in the registry. </div></li>
</ol>
</dd>
<dt><a href="" name="faq1172">How are intrusions detected?</a><br />
</dt>
<dd><strong>Anomaly detection</strong>
The most common way people approach network intrusion detection is to detect statistical anomalies. The idea behind this approach is to measure a "baseline" of such stats as CPU utilization, disk activity, user logins, file activity, and so forth. Then, the system can trigger when there is a deviation from this baseline.
The benefit of this approach is that it can detect the anomalies without having to understand the underlying cause behind the anomalies.
For example, let's say that you monitor the traffic from individual workstations. Then, the system notes that at 2am, a lot of these workstations start logging into the servers and carrying out tasks. This is something interesting to note and possibly take action on.
<strong>Signature recognition </strong>The majority of commercial products are based upon examining the traffic looking for well-known patterns of attack. This means that for every hacker technique, the engineers code something into the system for that technique.
This can be as simple as a pattern match. The classic example is to example every packet on the wire for the pattern "/cgi-bin/phf?", which might indicate somebody attempting to access this vulnerable CGI script on a web-server. Some IDS systems are built from large databases that contain hundreds (or thousands) of such strings. They just plug into the wire and trigger on every packet they see that contains one of these strings.
</dd>
<dt><a href="" name="faq1171">Where can I find some Statistics on intrusions?</a><br />
</dt>
<dd><strong>Internet Storm Center</strong> - <a href="http://ww.incidents.org/">http://ww.incidents.org/</a>
Reports on trends on ports and services being scanned by collecting intrusion detection log entries to detect new malicious activity.
<strong>CERT Reports, Articles, and Presentations</strong> (<a href="http://www.cert.org/nav/reports.html">http://www.cert.org/nav/reports.html</a>)
CERT has a number of historical statistics on intrusions, but they aren't nearly as up-to-date as the NIPC.
</dd>
<dt><a href="" name="faq1170">What is a DDoS (Distributed Denial of Service) attack?</a><br />
</dt>
<dd>A Distributed Denial of Service consists of launching a Denial of Service attack from a good number of sites against a single host. Such an attack is generally more effective to bring down huge corporate sites than DoS attacks. A typical DDoS attack consists of master, slave and victim - master being the attacker, slave being the compromised systems and victim of course being the attacker's target. Once the attacker sends out a specific command to the slave or zombie systems, the attack is launched.
</dd>
<dt><a href="" name="faq1169">What are the types of DoS (Denial of Service) attacks?</a><br />
</dt>
<dd>Three generic DoS methods stand out as particularly dangerous: Smurf or Fraggle, SYN Flood, and DNS attacks.
<strong>Smurf / Fraggle</strong>
The Smurf / Fraggle attack is one of the most devastating DoS attacks. It uses bandwidth consumption to disable a system's network resources. It accomplishes this using amplification of the attackers bandwidth. Three actors participate in the DoS attack: the attacker, the victim, and the amplifying network. The attacker sends a ping request to the amplifying network with the victim's address as the return address. If the amplifying network has 100 systems, the signal can be amplified 100 times. It is easy to see how a Smurf attack can be launched by an attacker with relatively low bandwidth to disable a system with much higher bandwidth.
<strong>SYN Flood</strong>The SYN flood attack was considered to be the most devastating DoS method before the Smurf was discovered. This method uses resource starvation to achieve the DoS. During a normal TCP handshake, (1) a client sends a SYN request to the server, (2) the server responds with a SYN / ACK to the client, and the client sends a final ACK back to the server. In a SYN flood attack, the attacker sends multiple SYN requests to the victim with spoofed source addresses for the return address. The spoofed addresses are for nonexistent networks. The victim's server then responds with a SYN / ACK back to the nonexistent network. Because no network receives this SYN / ACK, the victim's system just waits for the ACK from the client. The ACK never arrives, and the victim's server eventually times out. If the attacker sends SYN requests often enough, the victim's available resources for setting up a connection will be consumed waiting for these bogus ACKs. These resources are usually low in number, so relatively few bogus SYN requests (as few as a dozen) can create a DoS event.
<strong>DNS Attacks</strong>On earlier versions of BIND, attackers could effectively poison the cache on a DNS server that was using recursion to look up a zone not served by the nameserver. Once the cache was poisoned, a potential legitimate user would be directed to the attacker's network or a nonexistent network. This problem has been corrected with later versions of BIND.
</dd>
<dt><a href="" name="faq1168">What is a Denial of Service attack?</a><br />
</dt>
<dd>A Denial of Service (DoS) attack is an attempt to prevent legitimate users of a service from accessing that service. DoS attacks usually make use of software bugs to crash or freeze a service, or bandwidth limits by making use of a flood attack to saturate all bandwidth.
</dd>
<dt><a href="" name="faq1167">What are some host/service discovery methods?</a><br />
</dt>
<dd><strong>Ping sweeps</strong>Attackers will usually check which IP addresses are active by sending an ICMP ping packet and expecting a reply. Similarly some tools make use of SNMP, TCP/IP and other protocols to "ping" a host to see it its up.
<strong>TCP scans</strong>Enumerating open TCP ports on a target machine is very important in an attack since this allows hackers to find exploitable services. Attackers will most of the times make use of stealth scans to try avoid being discovered at this early stage of the attack. Scans can be either sequential, randomized, or configured lists of ports.
<strong>UDP scans</strong>
Due to the design of the UDP, scanning this protocol is considerably slower and produces a lot of false positives. This is due to the fact that UDP is a connectionless protocol - which means that when a port is open it does not have to send a confirmation that the UDP packet was received. Most UDP implementations send an ICMP destination packet unreachable message when the port is closed. Firewalls should be configured not to respond with ICMP destination port unreachable - this would give a hard time to hackers using traditional UDP scanning. Apart from this many machines throttle ICMP messages, which means that scanning such machines is a very slow process.
<strong>OS Fingerprinting</strong>One method to identify the target Operating System is to send illegal or ambiguous packets. Although protocol definitions (RFCs) usually define how a machine should reply to data that it's expecting, these same standards do not always take in consideration illegal packets. The result of this is that each Operating System responds uniquely to invalid inputs and therefore hackers can guess the remote Operating System without being caught using normal System logging.
Another method to discover the Operating system of a target include Banner Grabbing - which consists of analyzing responses by services running on the victim server.
<strong>Account scans</strong>Tries to log on with accounts
<ul><li><div> Accounts with no password set </div></li>
<li><div> Accounts with password same as username, or "password". </div></li>
<li><div> Default accounts that were shipped with the product </div></li>
<li><div> Accounts installed with software products </div></li>
</ul>
</dd>
<dt><a href="" name="faq1162">How do systems get hacked?</a><br />
</dt>
<dd>Systems can get hacked when either of the following get compromised:<ol><li><div> Physical Security - An attacker will in this case obtain physical access to the machine. This can be done easily once the intruder gets past any physical security systems in place - for example by removing the disk drive and accessing it from home. </div></li>
<li><div> System Security - An attacker will gain access to the system by gaining privileges on the system such as by obtaining access to a user account. </div></li>
</ol>This FAQ will focus Physical Security. System Security tries to prevent against the following issues:
<strong><u>Software security issues</u></strong>
<blockquote>There are a large number of generic security vulnerabilities produced by "bad coding practices". While some of these loopholes are already well known and might be fixed, others are waiting to be discovered. These software bugs can be found and exploited in server software, client applications and the operating system itself. Sometimes protocols are inheritely flawed and therefore any applications making use of that specific protocol will be vulnerable.
Software bugs can be classified in the following manner:
<strong>Buffer overflows:</strong> The most traditional and probably best-known security vulnerability tends to be the Buffer Overrun or Buffer overflow.
Example of how buffer overflow holes are produced:
A programmer assumes that users of his software will never supply input longer than 256 characters as a username.
A hacker will instead try input more than 256 characters as the username and see what happens. What happens in this case is a buffer overflow - which means that the extra characters will be executed as instructions on the remote server.
Buffer overflows are normally found in C and C++ programs, and are very rare on programs written using higher-level computer languages such as Java.
<strong>Unexpected input:</strong> At design stage sometimes programmers do not think about all possible input combinations. This can result in creating major security holes. A Path Traversal attack is usually carried out via unchecked URL input parameters, cookies and HTTP request headers - this is one example of unexpected input.
<strong>Unhandled input:</strong> Sometimes programmers overlook the possibility that someone may enter input that doesn't match what the program is expecting. This can result in denial of service where some programs/services may crash as well as user privileges escalation.
<strong>Race conditions:</strong> When two or more processes/threads access a shared data item, the result depends on the order of execution. In the security world, if a privileged process is forced to write custom code to a certain file which is then executed by another privileged process, code execution may take place resulting in a security vulnerability.
System configuration
System configuration bugs can be classified in the following manner:
<strong>Default configurations:</strong> On installation a system will have the most common settings. Most of the times this means easy to use and abuse. In fact most Windows NT/2000 and XP systems shipped have to be patched and configured or else it is very easy to break into. In fact "script kiddies" - the less sophisticated hackers - tend to search for default installations of Windows 2000 and Linux systems to break into.
<strong>Empty or common passwords:</strong> A huge number of servers on come corporate networks do not have a password set. This can be very convenient for quick installation of a huge number of systems but will create a very obvious hole. Sometimes administrators will also get obvious passwords for all machines on the network. This means that once an attacker guesses the password for one machine, this password will grant him access on the other machines on the network.
<strong>Mis-configuration:</strong> Most applications and server software can be configured to allow easier access - i.e. run with no security. This can include enabling a feature - or just enabling all features within a program.
<strong>Trust relationships:</strong> Security is only as strong as your weakest link. Computers on a corporate network make use of trust relationships, so that a server allows another specific system to make use of a service on the server. If the specific system is compromised, the attacker also gets to enjoy access to the server.
</blockquote><strong><u>Password cracking</u></strong>
<blockquote>Most security systems are based around a username/password system. This systems has various attack points:
<strong>Weak passwords:</strong> It is very common for people to make use of their name as password. Other common choices for passwords include birthdays, relative's names, car model, nicknames and other familiar things. It is also common for people to choose "password" or something such as "letmein" as password - as well as simply set a blank password. Of course if an attacker knows the person just a little he can easily guess the password.
<strong>Dictionary attacks:</strong> A very common attack is to make use of a list of well-known passwords and run it against the login system or a stolen password file. This means trying out every password in the dictionary - a task that can take just a few seconds on an NT SAM file depending on the size of the dictionary file as well as the number of users in the database.
<strong>Brute force attacks:</strong> This kind of attack is very similar to the Dictionary attack, but it tries all possible combinations of characters. The advantage is that any password can be guessed using this attack. However this attack is of course very time consuming. Hackers chose to try certain characters only, such as lower case characters and limit the length of the password so that this attack is more feasible.
</blockquote><strong><u>Sniffing unsecured traffic</u></strong>
<blockquote><strong>Shared network:</strong> Traditional Ethernets allow attackers to simply set the network card to promiscuous mode and obtain all data passing through the network. The attacker would usually make use of a protocol analyzer (better known as a sniffer) to launch this attack. While this attack is very difficult to detect, most corporate networks have now turned to switched Ethernet, which do not allow passive attacks such as this one.
<strong>Sniffing on a switched network:</strong> Although switched networks prevent passive snooping, there are still a few attacks that can be launched:
<ol><li><div> Server sniffing: If a router is compromised, an attacker can usually still sniff network data since a lot of packets flow through routers. </div></li>
<li><div> Active attacks against Switched networks: ARP Spoofing, MAC flooding, MAC duplicating. These attacks allow hackers to capture unencrypted passwords and data over the network. </div></li>
<li><div> Rogue DHCP servers. If an attacker launches a rogue DHCP server he can effectively set up his machine as a router and force computers on the network to think it is a legitimate router. </div></li>
</ol><strong>Remote sniffing:</strong> SNMP has a service called RMON that allows for remote monitoring of data. Various SNMP implementations contain security issues and make use of default public community strings.
</blockquote><strong><u>Design flaws</u></strong>
<blockquote>Many times software is not designed with security in mind from the start. This means that sometimes security issues will emerge even when software implementation is flawless. Such a problem will often require a full software redesign. However many programmers and designers choose to patch existing software to hide design flaws.
<strong>Underlying protocol flaws:</strong> Most network programs are built to make use of TCP/IP to communicate with other services across the Internet. Athough TCP/IP is robust, it was not designed with security in mind and it inherits many possible problems. Examples include IP spoofing, DNS hijacking and SYN floods. Ipsec on the other hand has been designed to fix flaws within TCP/IP - however it is not widely implemented yet. </blockquote>
</dd>
<dt><a href="" name="faq1184">What are the legal implications of honeypots?</a><br />
</dt>
<dd><strong><u>Do honeypots constitute entrapment?</u></strong>
No. This is the most commonly asked question about honeypots, and the answer is a clear no. Entrapment has a clear legal definition whereby law enforcement officers encourage somebody to a commit a crime that they were not otherwise disposed to do. This means:
<ul><li>If you are not a law enforcement officer, you cannot entrap.</li>
<li>Affording the means for somebody to commit a crime is not the same as encouraging the crime. The FBI can setup a honeypot without risk of entrapment.</li>
<li>If the FBI contacts somebody in alt.2600 and posts a bounty for cracking into a system, then it would be entrapment.</li>
</ul><strong><u>Am I aiding and abetting a crime?</u></strong>
Possibly. You are certainly not abetting the person breaking into your system. However, if he/she uses your system to launch attacks against other systems, you might be partially liable for the actions. Click <a href="http://www.nylj.com/stories/00/03/030200a5.htm">here</a> for an interesting story.
<u><strong>Am liable for attacks launched from the compromised honeypot?</strong></u>
Very probably. This hasn't been tested in court, but if you have a lot of money and the hacker causes lots of damage, guess who the victim is going to sue? It doesn't matter what the law says, there is a good chance you will have to defend yourself in court. Note that this also applies when the hacker breaks into any of your systems. </dd></dl>Surenhttp://www.blogger.com/profile/09789784724534128579noreply@blogger.com1tag:blogger.com,1999:blog-5123376846625329520.post-80963740617284512252010-11-05T18:16:00.001+05:302010-11-05T18:17:45.424+05:30<h2 class="articleTitle" style="color: blue; font-family: Verdana,sans-serif;">How DHCP Works </h2><div style="color: black; font-family: Verdana,sans-serif;">For a detailed description of DHCP, we suggest that you download RFC 1541 from any of the Internet draft repository sites. A good place to start is ds.internic.net, available via FTP, Gopher and HTTP. For a less detailed description, read on.</div><div style="color: black; font-family: Verdana,sans-serif;">DHCP is an extension of BOOTP, the previous IP allocation specification. So, existing BOOTP devices can communicate with DHCP servers and allow DHCP requests to cross routers running BOOTP forwarders. This level of backward compatibility makes it easy for administrators to upgrade their network devices from BOOTP to DHCP as needed, without having to replace all of the clients at once or having to upgrade all of the routers.</div><div style="color: black; font-family: Verdana,sans-serif;">Several major advancements beyond the BOOTP specifications provide significant advantages. For example, DHCP supports the concept of a "lease" whereby a server can allocate an address to a client for a specific amount of time. If you have more devices than IP addresses, using shorter leases can help to keep you from running out of addresses. If you have more addresses than devices, you can utilize permanent leases or you can assign fixed addresses to specific devices similar to BOOTP's mechanism.</div><div style="color: black; font-family: Verdana,sans-serif;">Also, DHCP incorporates a much more robust dialogue during lease negotiation. Since the addresses can be assigned to the devices on an ad-hoc basis, mechanisms need to be incorporated into the assignment procedure that allow for a broader range of options, as well as for a broader range of error handling conditions. BOOTP protocol only allowed for two types of messages (request and reply), while DHCP has seven possible message types that can be used during the address assignment sequence.</div><div style="color: black; font-family: Verdana,sans-serif;">When a DHCP device attaches itself to the network for the first time, it broadcasts a DHCPDISCOVER packet. A DHCP servers on the local segment will see the broadcast and return a DHCPOFFER packet that contains an IP address and other information. The servers may or may not conduct some sort of preliminary testing prior to offering the address, such as generating an ARP or an ICMP echo to see if the address is already in use by another node somewhere. If your network does not have a DHCP server on every segment, you will need to configure your routers to provide BOOTP relay agents that forward the broadcasts to a predefined server on a remote segment.</div><div style="color: black; font-family: Verdana,sans-serif;">The client may receive multiple DHCPOFFER packets from any number of servers, so it must choose between them, and broadcast a DHCPREQUEST packet that identifies the explicit server and lease offer that it likes the best. This decision may be based on which offer has the longest lease or which offer provides the most information that the specific client needs for optimal operation (more on this later). The non-chosen servers would notice the explicit DHCPREQUEST packet and go on about their business.</div><div style="color: black; font-family: Verdana,sans-serif;">Assuming that the offer is still valid, the chosen server would return a DHCPACK that tells the client the lease is finalized. If the offer is no longer valid for some reason-perhaps due to a time-out or another client allocating the lease-then the selected server must respond with a DHCPNAK message. This would cause the client to send another DHCPDISCOVER packet, starting the process over again.</div><div style="color: black; font-family: Verdana,sans-serif;">Once the client receives a DHCPACK, then all ownership and maintenance of the lease is the responsibility of the client. For example, a client may refuse an offer that is detailed in the DHCPACK message, and it is the client's responsibility to do so. Clients are supposed to test the addresses that have been offered to them by conducting ARP broadcasts. So if another node responds to the ARP, the client would assume that the offered address is in use. At this point, the client would reject the offer by sending a DHCPDECLINE message to the offering server, and would also send another DHCPDISCOVER packet, thereby starting the process yet again.</div><div style="color: black; font-family: Verdana,sans-serif;">Once the client has the lease, it must be renewed prior to the lease expiration through another DHCPREQUEST message. If a client finishes using a lease prior to its expiration date, the client is supposed to send a DHCPRELEASE message to the server so that the lease can be made available to other nodes. If the server doesn't hear from the client by the end of the lease, it marks the lease as non-renewed, and makes it available for other clients to use.</div><div style="color: black; font-family: Verdana,sans-serif;">This sequence of events is pretty straightforward and leaves a lot of room to correct any miscommunication between the clients and the servers. This is a good thing, because most of the implementations that we studied at in our labs didn't follow the letter of the law very well. Only because of the negotiation model's failure-centric approach does the technology work at all.</div>Surenhttp://www.blogger.com/profile/09789784724534128579noreply@blogger.com0tag:blogger.com,1999:blog-5123376846625329520.post-21063173692753207792010-11-05T17:50:00.000+05:302010-11-05T17:50:26.406+05:30Top Security Websites Listed By Yahoo Directory<div class="st" style="font-family: Verdana,sans-serif;"><ul><li><a href="http://www.securityfocus.com/">Security Focus</a> <br />
Computer security information clearinghouse. Includes a calendar, free tools, forums, industry news, and a library.<br />
<span style="color: green;">www.securityfocus.com</span> </li>
<li><a href="http://www.microsoft.com/security/">Microsoft Security Advisor</a> <br />
Offers tools, documentation, tips, and other information regarding personal privacy and security for home users, developers, and businesses.<br />
<span style="color: green;">www.microsoft.com/security</span> </li>
<li><a href="http://www.staysafeonline.info/">Stay Safe Online</a> <br />
Tips on how to safeguard your system, a self-guided cyber security test, educational materials, and other resources from the National Cyber Security Alliance.<br />
<span style="color: green;">www.staysafeonline.info</span> </li>
<li><a href="http://www.secunia.com/">Secunia, Ltd.</a> <br />
Provides Internet security services. Specializing in alerts and advisories against vulnerabilities to companies worldwide.<br />
<span style="color: green;">www.secunia.com</span> </li>
<li><a href="http://www.attrition.org/">Attrition</a> <br />
Computer security site dedicated to the collection, disemination, and distribution of information about the industry for anyone interested in the subject.<br />
<span style="color: green;">www.attrition.org</span> </li>
<li><a href="http://www.cert.org/tech_tips/home_networks.html">Home Network Security</a> <br />
Overview of the security risks and countermeasures associated with Internet connectivity, especially in the context of "always-on" or broadband access services, such as cable modems and DSL. From the CERT Coordination Center.<br />
<span style="color: green;">www.cert.org/tech_tips/home_networks.html</span> </li>
<li><a href="http://catless.ncl.ac.uk/Risks">Risks Digest</a> <br />
Forum on risks to the public in computers and related systems.<br />
<span style="color: green;">catless.ncl.ac.uk/Risks</span> </li>
<li><a href="http://isc.incidents.org/">Internet Storm Center</a> <br />
Features a system that automatically gathers millions of intrusion detection log entries every day from around the world to find new virus and worm attacks, isolate the sites that are used for attacks, and provide authoritative data about them.<br />
<span style="color: green;">isc.incidents.org</span> </li>
<li><a href="http://www.cve.mitre.org/">Common Vulnerabilities and Exposures (CVE)</a> <br />
Aims to standardize the names for all publicly known vulnerabilities and security exposures.<br />
<span style="color: green;">www.cve.mitre.org</span> </li>
<li><a href="http://csrc.ncsl.nist.gov/">NIST Computer Security Resource Clearinghouse</a> <br />
<span style="color: green;">csrc.ncsl.nist.gov</span> </li>
<li><a href="http://security.yahoo.com/">Yahoo! Security Center</a> <br />
Guide to computer and online security, covering privacy issues, passwords, viruses, and spyware.<br />
<span style="color: green;">security.yahoo.com</span> </li>
<li><a href="http://www.cccure.org/">CISSP and SSCP Open Study Guide</a> <br />
Includes study guides, tips, links, and more.<br />
<span style="color: green;">www.cccure.org</span> </li>
<li><a href="http://www.whitehats.com/">Whitehats</a> <br />
Network security resource.<br />
<span style="color: green;">www.whitehats.com</span> </li>
<li><a href="http://www.ftc.gov/infosecurity/">FTC: Consumer Information Security</a> <br />
Source for consumers and businesses for tips on computer security and safeguarding personal information.<br />
<span style="color: green;">www.ftc.gov/infosecurity</span> </li>
<li><a href="http://www.17799.com/">ISO 27001 and ISO 27002 Community Forum, The</a> <br />
Offers an interactive user community portal dedicated to the ISO 27000 computer security standard.<br />
<span style="color: green;">www.17799.com</span> </li>
<li><a href="http://www.avertlabs.com/research/blog">McAfee Avert Labs Blog</a> <br />
Computer security research, news, and analysis.<br />
<span style="color: green;">www.avertlabs.com/research/blog</span> </li>
<li><a href="http://www.pentics.net/denial-of-service/white-papers/smurf.cgi">Smurfing</a> <br />
A recent DoS attack, which relies on spoofing source address and sending to directed broadcast address.<br />
<span style="color: green;">www.pentics.net/denial-of-service/white-papers/smurf.cgi</span> </li>
<li><a href="http://securitygeeks.shmoo.com/">SecurityGeeks</a> <br />
Security, cryptography, and privacy news.<br />
<span style="color: green;">securitygeeks.shmoo.com</span> </li>
<li><a href="http://www.raid-symposium.org/">International Symposium on Recent Advances in Intrusion Detection</a> <br />
Conference series is intended to advance the field of intrusion detection by promoting the exchange of ideas, bring together leading experts, and discuss state-of-the-art intrusion detection technologies and issues from research and commercial perspectives.<br />
<span style="color: green;">www.raid-symposium.org</span> </li>
<li><a href="http://dir.yahoo.com/Computers_and_Internet/Security_and_Encryption/COAST_Project/"><b>COAST Project</b> (3)</a> <br />
<span style="color: green;">dir.yahoo.com/.../Security_and_Encryption/COAST_Project</span></li>
<li><span style="color: green;"> </span></li>
<li><table border="0" cellpadding="0" cellspacing="0"><tbody>
<tr valign="top"><td colspan="2"><br />
</td></tr>
<tr><td height="1"><spacer height="1" type="block" width="1"></spacer></td></tr>
<tr><td><div class="st"><ul><li><a href="http://www.cert.org/homeusers/HomeComputerSecurity/">CERT Coordination Center: Home Computer Security</a> <br />
Guide to securing home computers from intruders looking for credit card numbers, bank account information, and other personal data.<br />
<span style="color: green;">www.cert.org/homeusers/HomeComputerSecurity</span> </li>
<li><a href="http://www.cpusecurity.com/">Computer and Internet Security</a> <br />
Addresses computer security topics for the beginning to intermediate computer user, such as spam, computer viruses, spyware, and firewalls.<br />
<span style="color: green;">www.cpusecurity.com</span> </li>
<li><a href="http://www.viacorp.com/crypto.html">How Electronic Encryption Works & How It Will Change Your Business</a> <br />
Discusses the business use of encryption, with the possible failure modes highlighted.<br />
<span style="color: green;">www.viacorp.com/crypto.html</span> </li>
<li><a href="http://nces.ed.gov/pubsearch/pubsinfo.asp?pubid=98297">Safeguarding Your Technology</a> <br />
Better understand why and how to effectively secure your organization's sensitive information, critical systems, computer equipment, and network access.<br />
<span style="color: green;">nces.ed.gov/pubsearch/pubsinfo.asp?pubid=98297</span> </li>
<li><a href="http://www.ruskwig.com/">Ruskwig</a> <br />
Offers free random byte encryption software as well as Internet and email security policies for download.<br />
<span style="color: green;">www.ruskwig.com</span> </li>
<li><a href="http://www.guard-privacy-and-online-security.com/">Guard Privacy & Online Security</a> <br />
Explains the online risks and how to assess which threats to protect against. Advice and solutions for securing computers against each threat.<br />
<span style="color: green;">www.guard-privacy-and-online-security.com</span> </li>
<li><a href="http://www.optimabit.com/">OPTIMAbit</a> <br />
Offers penetration tests, code reviews, app sec policies, and additional application security services.<br />
<span style="color: green;">www.optimabit.com</span> </li>
<li><a href="http://www.commodon.com/">Commodon Communications: Threats to your Security on the Internet</a> <br />
Contains articles discussing various Remote Control Trojans (RCTs) or Remote Access Trojans (RATs), and how to remove them.<br />
<span style="color: green;">www.commodon.com</span> </li>
<li><a href="http://www.encryptoo.com/">Encryptoo</a> <br />
Offers tutorials and articles on computer securities, gateways, and encryption standards.<br />
<span style="color: green;">www.encryptoo.com</span> </li>
<li><a href="http://www.dataencryption.ca/">Data Security</a> <br />
Offers products to encrypt and decrypt data on the fly between a host system and tape drive.<br />
<span style="color: green;">www.dataencryption.ca</span> </li>
<li><a href="http://www.clean-info.info/">Clean Embassy AB</a> <br />
Offers information and services to deal with spammers, pop-ups, spyware, pornography, and viruses.<br />
<span style="color: green;">www.clean-info.info</span> </li>
<li><a href="http://reviews.cnet.com/4520-3513_7-5020904.html">CNET Security Watch</a> <br />
Articles and tips about how not to get burned by viruses and hackers.<br />
<span style="color: green;">reviews.cnet.com/4520-3513_7-5020904.html</span> </li>
<li><a href="http://www.emailman.com/security">Emailman: Security</a> <br />
Addresses encryption and digital signing of e-mail messages and attachments to be sent to others.<br />
<span style="color: green;">www.emailman.com/security</span> </li>
<li><a href="http://www.cs.auckland.ac.nz/%7Epgut001/sfs/index.html">Secure FileSystem (SFS)</a> <br />
A set of programs which create and manage a number of encrypted disk volumes, and runs under both DOS and Windows<br />
<span style="color: green;">www.cs.auckland.ac.nz/~pgut001/sfs/index.html</span> </li>
<li><a href="http://h20239.www2.hp.com/techcenter/security">HP Personal Computing Security Center</a> <br />
Offers steps for stopping spam, spyware, adware, and virus invasions to PCs.<br />
<span style="color: green;">h20239.www2.hp.com/techcenter/security</span> </li>
<li><a href="http://techupdate.cnet.com/enterprise/0-7481-724-20707172.html">ZDNet Tech Update: Security</a> <br />
Features toolkits, white papers, webcasts, case studies, and directories.<br />
<span style="color: green;">techupdate.cnet.com/enterprise/0-7481-724-20707172.html</span> </li>
<li><a href="https://www.cosic.esat.kuleuven.ac.be/sesame/">SESAME project</a> <br />
(Secure European System for Applications in a Multi-vendor Environment.) Advanced distributed access control for the age of the open system.<br />
<span style="color: green;">/www.cosic.esat.kuleuven.ac.be/sesame</span> </li>
<li><a href="http://www.consumerreports.org/cro/magazine-archive/2010/june/electronics-computers/social-insecurity/overview/index.htm">Online Security: Consumer Reports</a> <br />
Read about online security and what you need to do online to protect yourself. From Consumer Reports.<br />
<span style="color: green;">www.consumerreports.org/cro/magazine-archive/2010/june/electronics-computer...</span> </li>
<li><a href="http://www.freenix.fr/netizen/">le bulletin lambda</a> <br />
Bilingual articles, primarily about encryption issues.<br />
<span style="color: green;">www.freenix.fr/netizen</span> </li>
</ul></div></td></tr>
</tbody></table><span style="color: green;"> </span> </li>
</ul></div>Surenhttp://www.blogger.com/profile/09789784724534128579noreply@blogger.com0tag:blogger.com,1999:blog-5123376846625329520.post-30339934068763636462010-11-05T17:42:00.000+05:302010-11-05T17:42:36.756+05:301Password, the acclaimed password manager for Mac, recently introduced an <a href="http://switchersblog.com/2008/01/30/safari-autofill-for-iphone-and-ipod-touch-1.html" onclick="javascript:pageTracker._trackPageview('/outbound/article/switchersblog.com');">iPhone export</a> function that provides on-the-go access to sensitive data. This is accomplished by creating an encrypted bookmarklet in Safari, which is in turn synchronized to your iPhone. Excellent.<br />
Firefox recognizes this bookmarklet as well — meaning that Windows-by-day users no longer have to suffer without their critical logins. (Note that this trick does <span style="text-decoration: underline;">not</span> work with Internet Explorer.)<br />
To accomplish this:<br />
In 1Password, click on the “Sync to iPhone” icon in the toolbar and choose an access code for encryption. (This will create the bookmarklet in Safari.)<br />
<ol><li></li>
<li><a href="http://farm3.static.flickr.com/2341/2261026262_84bfbbac07_o.png" onclick="javascript:pageTracker._trackPageview('/outbound/article/farm3.static.flickr.com');" rel="lightbox[1Password]" title="Setup"><img alt="Setup Sync" border="0" src="http://farm3.static.flickr.com/2341/2261026262_84bfbbac07_o.png" width="400" /></a> </li>
<li> Switch to your Safari bookmarks, where you will find two new categories, each with a bookmarklet. The <strong>1Password</strong> bookmarklet enables a browsable list of all your 1Password data; the <strong>1Password Logins</strong> bookmarklet provides a one-click login to the current page.<br />
<a href="http://bylr.net/3/images/Safari1-20080728-124220.jpg" rel="lightbox[1Password]" title="Bookmarklets in Safari"><img alt="Bookmarklets in Safari" border="0" src="http://bylr.net/3/images/Safari1-20080728-124220.jpg" width="400" /></a><br />
The data in the Address column is what you need to copy to your PC; however, Safari only lets you copy the first 32,000 characters of a bookmark’s address field, so copying from here is likely to fail. To work around this, drag the bookmark to Firefox on your Mac (either directly or via the Finder) to copy the data there. Then, in Firefox, select the bookmarklet properties. This is what you’ll see:<br />
<a href="http://bylr.net/3/images/Firefox-20080728-125117.jpg" rel="lightbox[1Password]" title="Bookmarklets in Safari"><img alt="Bookmarklets in Safari" border="0" src="http://bylr.net/3/images/Firefox-20080728-125117.jpg" width="400" /></a> Hit Tab once to select the Location field. Copy the text into a plain-text file, and email it to yourself.<br />
</li>
<li> Get it onto your Windows machine. (Easiest method: email it to yourself using the aforementioned plain text file.)<br />
</li>
<li> Finally, create your bookmarklet in Firefox. To do this, first bookmark any page to your Firefox bookmarks bar. Then, right-click on the bookmark and choose “Properties”. Rename it as desired (”1P” suffices for my needs), and replace the Location field with the long string you emailed to yourself. For the <strong>1Password</strong> bookmarklet, you’ll want to select “Load this bookmark in the sidebar”. For the <strong>1Password Logins</strong> bookmarklet, leave it deselected.<br />
<a href="http://farm3.static.flickr.com/2176/2261016412_77521ff5aa_o.png" onclick="javascript:pageTracker._trackPageview('/outbound/article/farm3.static.flickr.com');" rel="lightbox[1Password]" title="CreateBookmarklet"><img alt="Create Bookmarklet" border="0" src="http://farm3.static.flickr.com/2176/2261016412_77521ff5aa_o.png" width="400" /></a> </li>
</ol>Firefox now has a secure, functional bookmarklet with your passwords and other data available.<br />
<strong>1Password Logins</strong> bookmarklet in action: <a href="http://bylr.net/3/images/Gmail__Email_from_Google-20080728-131410.jpg" rel="lightbox[1Password]" title="1Password Logins"><img alt="1Password Logins bookmarklet" border="0" src="http://bylr.net/3/images/Gmail__Email_from_Google-20080728-131410.jpg" width="400" /></a><br />
<strong>1Password</strong> bookmarklet in action:<br />
<a href="http://farm3.static.flickr.com/2251/2261043466_cddeb8a42a_o.png" onclick="javascript:pageTracker._trackPageview('/outbound/article/farm3.static.flickr.com');" rel="lightbox[1Password]"><img alt="Secure Entry" border="0" src="http://farm3.static.flickr.com/2251/2261043466_cddeb8a42a_o.png" width="400" /></a> <a href="http://farm3.static.flickr.com/2337/2261045660_029f61f685_o.png" onclick="javascript:pageTracker._trackPageview('/outbound/article/farm3.static.flickr.com');" rel="lightbox[1Password]"><img alt="Interface" border="0" src="http://farm3.static.flickr.com/2337/2261045660_029f61f685_o.png" width="400" /></a><br />
(Use of the search function is recommended here as the tool sorts web forms by name)<br />
1Password also provides a full-fledged html export, which you can keep on a thumb drive or upload to a server. (I wouldn’t recommend uploading the file — out of 6 billion people in the world, surely someone is bound to find the file and start playing.)<br />
Bonus: For even easier synchronization, install <a href="http://www.foxmarks.com/" onclick="javascript:pageTracker._trackPageview('/outbound/article/www.foxmarks.com');">Foxmarks</a> to synchronize your Firefox bookmarks between your Mac and PC. Now you can copy straight from Safari to Firefox on your Mac and let Foxmarks do the synching. <strong>Update: Foxmarks didn’t work with the 1Password bookmarklets the last time I tried it; your mileage may vary.</strong><br />
<div class="clearboth"><!-- --></div>Surenhttp://www.blogger.com/profile/09789784724534128579noreply@blogger.com0tag:blogger.com,1999:blog-5123376846625329520.post-70461300951566240612010-11-05T17:32:00.002+05:302010-11-05T17:32:36.426+05:30Linux Security Applications and Information<div style="font-family: Verdana,sans-serif;">This is a text only mirror version of Linux Apps. If you would like to visit theoriginal site with graphics using a nice table layout go here <ahref="http: linapps.shtml="" www.xnet.com="" ~blatura="">The original Page Youwill also find links on the original page that I do not have on this page, such as faq's ,whats new , a list of mirror sites and a few other things.</ahref="http:></div><div style="font-family: Verdana,sans-serif;">The <i>Linux Applications and Utilities Page</i> is a collection of commercial,shareware and freeware application and utility programs and servers for Linux with theirown WWW home pages. All of the programs listed here either have a Linux native binaryavailable, or have source code available which has been successfully compiled to run underLinux. These programs are all currently available for use, though some may still be beta,or even alpha, releases.</div><div style="font-family: Verdana,sans-serif;"><br />
</div><hr style="font-family: Verdana,sans-serif;" /><a href="" name="top" style="font-family: Verdana,sans-serif;"></a><h3 style="font-family: Verdana,sans-serif;"><a href="" name="top">Quick Finder Index</a></h3><ul style="font-family: Verdana,sans-serif;"><li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#general">General Information</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#sysad">System Administration Tools</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#net">Networking Tools</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#fs">File Systems and Tools</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#system">Daemons and System Servers</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#drive">Device Drivers</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#x">X Servers</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#shell">Shell and System Utilities</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#desk">Desktop and Window Managers</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#file">File and Disk Managers</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#back">Backup and Rescue Utilities</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#prn">Printer Utilities</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#os">Emulators and Simulators</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#spread">Spreadsheets</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#data">Database Managers</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#word">Word Processors and Document Preparation</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#prod">Groupware and Office Suites</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#science">Engineering, Science and Math Apps</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#pers">Personal Productivity Applications</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#web">Web Browsers and Plug-In's</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#html">WWW Tools and HTML Editors</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#mail">Mail Programs and Agents</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#inet">News Readers and Internet Apps</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#comm">Fax and Telcommunications Apps</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#http">Web and Internet servers and Firewalls</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#games">Games and Amusements</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#graphics">Graphics and Image Processing Apps</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#mm">Multimedia Applications</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#music">Music and Audio Apps and CD Players</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#conf">Mbone and Conferencing Tools</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#text">Text Editors</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#java">Java and Java Tools</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#lang">Languages</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#tools">Development Tools</a></li>
<li><a href="http://www.infosyssec.org/infosyssec/security/apps.html#lib">Development Libraries</a></li>
</ul><hr style="font-family: Verdana,sans-serif;" /><div style="font-family: Verdana,sans-serif;"><b>Submissions are encouraged</b>. If you maintain a program-oriented web page, orsimply know of one not listed here, please <a href="mailto:blatura@xnet.com">drop me aline</a> with the URL.</div><hr style="font-family: Verdana,sans-serif;" /><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="general"><b>General</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://sunsite.unc.edu/LDP/HOWTO/Commercial-HOWTO.html">Linux CommercialHOW-TO</a> marketing, ELF, Linux vs. the rest<br />
[0] <a href="http://sunsite.unc.edu/LDP/products.html">Linux Commercial Software Products</a>commercially available packages<br />
[0] <a href="http://www.ssc.com/linux/resources/man.html">Linux Manual Pages</a> commandreferences<br />
[0] <a href="http://www.execpc.com/lsm">The Linux Software Map (LSM)</a> Home Page<br />
[0] <a href="http://www.boutell.com/lsm/">Linux Software Map</a> searchable database ofavailable Linux packages<br />
[0] <a href="http://www.cs.helsinki.fi/%7Ewirzeniu/linux/cola.html">comp.os.linux.announcehome page</a> announcements of new programs<br />
[0] <a href="http://www.ee.ryerson.ca:8080/%7Eelf/xapps/faq.html">comp.windows.x.apps FAQ</a>apps for the X Window System</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="sysad"><b>System Administration Tools</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://acua.gist.net.au/">ACUA</a> Access Control and User Administrationtool<br />
[0] <a href="http://www.dyer.vanderbilt.edu/server/apcupsd/">apc_ups</a> daemon thatsupports APC UPS's under Linux<br />
[0] <a href="http://www.iaehv.nl/users/grimaldo/chklogs.html">Chklogs</a> PERL script tohelp maintain system logs<br />
[$] <a href="http://www.activetools.com/">Clustor</a> a task crunching utility<br />
[0] <a href="http://www.xarius.demon.co.uk/software/devalloc/">DevAlloc</a> emulatesdevice allocation mechanism Sun provides in Solaris 2.x<br />
[0] <a href="http://www.iit.edu/%7Elinjinl/esep.html">Evolution Scheduler</a> schedulerbased on genetic algorithms and evolutionary programming<br />
[0] <a href="http://www.foxnet.net/%7Eapenwarr/figurine/">Figurine</a> configuration systemfor UNIX<br />
[0] <a href="http://www.shef.ac.uk/uni/projects/nqs/">Generic NQS</a> batch processingsystem<br />
[0] <a href="http://www.actrix.gen.nz/users/michael/giveaways.html">Gr_monitor</a> draws3D color bar graphs of all processes on a Linux system<br />
[0] <a href="http://www.best.com/%7Ecae/irqtune/">IRQTUNE</a> a Linux x86 IRQ priorityoptimizer<br />
[0] <a href="http://www.scripps.edu/%7Ejsmith/jazip/">jaZip</a> program for maintaining Zipand/or Jaz drive(s) and disks<br />
[$] <a href="http://www.deltecpower.com/soft.html">LanSafe III UPS Power ManagementSoftware</a> UPS app provides automatic shutdown<br />
[0] <a href="http://www.solucorp.qc.ca/linuxconf/">Linuxconf</a> sophisticated systemadministration tool<br />
[0] <a href="http://www.zip.com.au/%7Ebb/linux">Loadmeter</a> an enhanced X11 systemresource meter<br />
[0] <a href="http://www.ensta.fr/internet/unix/sys_admin/mfsm.html">Mfsm</a> a Motifutility that monitors free space and user filesystem quotas<br />
[0] <a href="http://www.kalika.demon.co.uk/sdk-software/">morepkgtools</a> supplementalscripts for Slackware's package tools<br />
[0] <a href="http://www.icce.rug.nl/docs/programs/nist/nist.html">NIST</a> used tosynchronize the system's time with a known timeserver<br />
[0] <a href="http://parc.power.net/morgan/Linux-PAM/">pam</a> Pluggable AuthenticationModules for Linux<br />
[0] <a href="http://www.gedanken.demon.co.uk/procmeter/index.html">ProcMeter</a> simple XWindows based performance meter, reading the info from /proc<br />
[0] <a href="http://www.hsdi.com/qddb/applications/qtime-docs">qtime</a> time trackingsoftware written in Tcl using Qddb and its Fx library<br />
[$] <a href="http://www.v-com.com/syscomm.html">System Commander</a> manage multipleoperating systems on one PC<br />
[0] <a href="http://www.xarius.demon.co.uk/software/xloadtime/">XLoadTime</a> /proc basedload meter that also shows current time<br />
[0] <a href="http://www.icce.rug.nl/docs/programs/xuserdoc/xuser.html">XUser</a> create,modify and delete user-info from an interactive X shell</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="net"><b>Networking Tools</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://www.iti.qc.ca/iti/users/sean/bb-dnld/">Big Brother</a> monitormultiple Unix systems, network connectivity, disk space, processes, etc<br />
[0] <a href="http://www.damtp.cam.ac.uk/linux/bootpc">bootpc</a> boot protocol client usedto grab ip number and set up DNS nameservers<br />
[0] <a href="http://www.iu.hioslo.no/%7Emark/cftop.html">CFEngine</a> script based systemfor managing a heterogeneous network of UNIX systems<br />
[0] <a href="http://dayworld.net.au/%7Ejsno/">Clobberd</a> allows ISP's or Linux/Unixoperator to regulate their users<br />
[0] <a href="http://www.cyclic.com/">CVS</a> client/server configuration management system<br />
[0] <a href="ftp://ftp.stack.nl/pub/linux/hifs/">Hifs</a> handy information for sysadmins,a tool for system monitoring<br />
[0] <a href="http://mip.ee.nus.sg/">IETF Mobile IPv4</a> a mobil IP implementation forLinux<br />
[0] <a href="http://www.geocities.com/SiliconValley/Lakes/2628/ipacct.html">IPAcct</a>program/kernel extension to do per user ip accounting<br />
[$] <a href="http://www.mpas.com/">MPAS</a> interface allows Win/DOS users access to filesstored on network<br />
[0] <a href="http://www.ee.ethz.ch/%7Eoetiker/webtools/mrtg">Multi Router Traffic Grapher</a>tool to monitor traffic load on network-links creates HTML pages<br />
[0] <a href="http://artoo.hitchcock.org/%7Eflowerpt/projects/linux-netatalk/">Netatalk forLinux</a> let your Unix box look like an Appletalk server on a LAN<br />
[0] <a href="http://www.inka.de/sites/lina/linux/NetTools/index_en.html">net-tools</a>collections of programs to control Linux' networking.<br />
[$] <a href="http://www.regulus.safe.ca/">REGULUS</a> management system for InternetService Providers (ISPs)<br />
[0] <a href="http://128.113.163.180/linux/index.html">Remote Reboot</a> use a networkconnection to reboot a machine remotely<br />
[0] <a href="http://cal006033.student.utwente.nl/linux/ruplist.html">Ruplist</a> shows allsites on that LAN with their uptimes and their ranking<br />
[0] <a href="http://samba.canberra.edu.au/pub/samba">Samba</a> a suite of programs toallow clients access to a server via the SMB<br />
[0] <a href="http://www.fish.com/satan/">SATAN</a> Security Administrator's Tool forAnalyzing Networks<br />
[0] <a href="http://wwwsnmp.cs.utwente.nl/%7Eschoenw/scotty">Scotty</a> Tcl extensions fornetwork management applications<br />
[$] <a href="http://www.mimestar.com/secmain.htm">SecureNet PRO</a> a full featurednetwork administration and diagnostic tool<br />
[0] <a href="http://reptile.rug.ac.be/%7Ecoder/sniffit/sniffit.html">Sniffit</a> a Linuxpacket sniffer<br />
[0] <a href="http://www.roestock.demon.co.uk/serialmon/">serialmon</a> serial line monitorprogram with statistics<br />
[0] <a href="http://strobe.weeg.uiowa.edu/%7Eedhill/">SPONG</a> a simple network/host systemmonitoring package<br />
[0] <a href="http://wwwsnmp.cs.utwente.nl/%7Eschoenw/scotty/#TKINED">Tkined</a> a networkdrawing editor running on top of the Tcl/Tk toolkit<br />
[0] <a href="http://www.ee.up.ac.za/%7Eherman/htmls/publicationsandreleases.html">traf</a> anetwork traffic monitor program suitable for ethernets</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="fs"><b>File Systems and Tools</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://www.coda.cs.cmu.edu/">Coda</a> an advanced networked filesystemdescended from AFS 2<br />
[0] <a href="http://web.mit.edu/tytso/www/linux/e2fsprogs.html">E2fsprogs</a> ext2filesystem utilities<br />
[0] <a href="http://www.globalxs.nl/home/p/pvs">FSDEXT2</a> mount linux partitions underwindows 95 (read only) on a dos drive letter<br />
[0] <a href="http://www-sccm.stanford.edu/%7Ehargrove/HFS/">HFS for Linux</a> AppleMacintosh Hierarchical File System<br />
[0] <a href="http://www.mars.org/%7Erob/proj/hfs/">HFS Utilities for UNIX</a> manipulate MacHFS volumes from UNIX systems<br />
[0] <a href="http://linux.wauug.org/pub/knaff/mtools">mtools</a> utilities to accessMS-DOS disks from Unix without mounting them<br />
[0] <a href="http://www.informatik.hu-berlin.de/%7Eloewis/ntfs/">NTFS for Linux</a> MSWindows-NT file system for Linux<br />
[0] <a href="http://www.sernet.de/vl/linux-lan/">smbfs</a> mount drives exported by WforW,Lan Manager, NT running tcp/ip<br />
[0] <a href="http://mikonos.dia.unisa.it/tcfs">TCFS</a> Transparent Cryptographic FileSystem that operates like NFS<br />
[0] <a href="http://bmrc.berkeley.edu/people/chaffee/vfat.html">VFAT for Linux</a> a Linuxfilesystem compatible with Win 95 and NT long filenames</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="system"><b>Daemons and System Servers</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://freenet.msp.mn.us/%7Eolearydr/agentd/agentd.html">AgentD</a> amodular scheduling daemon<br />
[$] <a href="http://www.psocd.com/e_cdfile.htm">CDFILE</a> a commercial product to manageCD-ROM jukeboxes under LINUX<br />
[$] <a href="http://chat.magmacom.com/">Chat Server</a> continuous stream, real-time,mm-capable, comm server from Magma<br />
[0] <a href="http://www.fugue.com/dhcp/dhcp-beta-4.html">DHCP Server</a> Dynamic HostConfiguration Protocol Server from ISC<br />
[0] <a href="http://www.loonie.net/%7Eeschenk/diald.html">Diald</a> daemon that does demanddialing for PPP and SLIP<br />
[0] <a href="http://www.anders.com/%7Ejeremyw/software.html">dlq</a> simple queueing,anonymous download service that runs as modem lines are idle<br />
[0] <a href="http://www.fido.de/fidogate/">FIDOGATE</a> Fido-Internet Gateway, FTN-FTNGateway, Mail Processor, File Processor<br />
[0] <a href="http://www.troll.no/freebies/ftpd.html">FTP Daemon</a> from Troll Tech<br />
[$] <a href="http://www.infomagic.com/infomagic/wgs.html">InfoMagic Workgroup Server</a>file and printing services to PC and Mac<br />
[0] <a href="http://www.troll.no/freebies/leafnode.html">Leafnode</a> a USENET system forsmall sites<br />
[0] <a href="http://www.leo.org/%7Edoering/mgetty/">mgetty+sendfax</a> highly optimized"getty" program for handling modem dial-in<br />
[$] <a href="http://www.probe.net/%7Emgleason/ncftpd/index.html">NcFTPd</a> File TransferProtocol server designed for high-traffic sites.<br />
[0] <a href="http://www.cistron.nl/%7Emiquels/radius/">portslave</a> a getty replacementthat acts as a portmaster and talks radius.<br />
[0] <a href="http://luz.cs.nmt.edu/%7Ertlinux/">Real-Time Linux</a> a Linux kernel with hardreal-time tasks<br />
[0] <a href="http://www.gaertner.de/snmp/">SNMP</a> Simple Network Management Protocol forLinux from CMU<br />
[0] <a href="http://www.tycho.com/packages/speak/index.html">speak</a> TCP based text tospeech server designed for SPO256-AL2 text-to-speech board<br />
[$] <a href="http://www.xingtech.com/products/sw_server.html">Streamworks Server</a>Xing's live and on-demand Audio/Video server<br />
[$] <a href="http://linux.sri.com/">Sybernet</a> cgi damon which holds a http connectionto the Sybase SQL server<br />
[$] <a href="http://www.mmb.com/">TEAMate Folders</a> software to set up and run acomplete on-line service<br />
[0] <a href="http://www.eecis.udel.edu/%7Entp/">Time Server (xntp)</a> NetworkTime Protocoland related clock synchronization products<br />
[0] <a href="http://www-vt.uni-paderborn.de/%7Ekukuk/linux/nis.html">ypserv</a> an YP (NISversion 2) Server for Linux</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="drive"><b>Device Drivers</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://cesdis.gsfc.nasa.gov/linux/drivers/vortex.html">3Com 3c59* VortexEthercards</a> drivers for various kernel revs<br />
[0] <a href="http://www.advansys.com/linux.html">AdvanSys Linux Driver</a> Linux driverfor AdvanSys SCSI adapters<br />
[0] <a href="http://dec50.vm.stuba.sk/%7Ehruz/soft.html">Advantech Card Driver</a> driverfor Advantech laboratory measurement card PCL-812PG.<br />
[0] <ahref="http: announce.html="" bubbletools="" pub="" www.student.informatik.th-darmstadt.de="" ~wosch="">BubbleToolsPrinter Drivers set of printer drivers which make graphic files printable<br />
[0] <a href="http://www.dandelion.com/Linux/">BusLogic adapter drivers</a> drivers forMylex SCSI adapters<br />
[0] <a href="http://www.crystal.com/drivers/crysoft.htm">Crystal LAN(tm) Ethernet Driver</a>a CS8900/20 network interface driver for Linux<br />
[0] <a href="http://www.powerup.com.au/%7Esobeyp">Frame grabbers</a> code for MatroxPIP-1024 and MuTech MV-200 frame grabber device drivers<br />
[0] <a href="http://swt-www.informatik.uni-hamburg.de/%7E1willamo/linux.html">GS4500 scannerdriver</a> driver (module) for Genius handheld scanners GS4500 and GS4500A<br />
[0] <a href="http://www.nyx.net/%7Earobinso/esp.html">Hayes ESP</a> enhanced mode driversfor the Hayes ESP card<br />
[0] <a href="http://www.torque.net/zip.html">Iomega Zip Driver</a> Linux driver forparallel port Iomega Zip Drive<br />
[0] <a href="http://www.cnct.com/%7Ebwillmot/jaztool/">Iomega JazTool</a> driver supportssoftware ejection and hardware read/write protection<br />
[0] <a href="http://bmrc.berkeley.edu/people/chaffee/joliet.html">Joliet</a> patch for MSspec to allow Unicode names to be written to a CD<br />
[0] <a href="http://www-control.uni-paderborn.de/linux.html">K575 driver</a> driver forthe K575 data acquisition box from Keithley<br />
[0] <a href="http://bahamut.mm.t.u-tokyo.ac.jp/%7Eiwai/midi.html">Linux/AWE32!</a> driverfor Soundblaster AWE32<br />
[0] <a href="http://www.llp.fu-berlin.de/pool/software/dutil/">Linux Driver DevelopmentKit (LDDK)</a> write character device drivers with minimal fuss<br />
[0] <a href="http://www.pf.jcu.cz/%7Eperex/ultra/">Linux Ultra Sound Project</a> low leveldrivers for the Gravis Ultrasound card<br />
[0] <a href="ftp://ftp.rwii.com/pub/linux/system/Meteor/">Matrox Meteor FrameGrabberDriver v1.4</a> driver the the Matrox Meteor PCI frame grabber<br />
[0] <a href="http://wpfd25.physik.uni-wuerzburg.de/%7Ekarrer/mv1000/mv1000.html">MuTechMV-1000</a> Linux Devicedriver for the MuTech MV1000 frame-grabber<br />
[0] <a href="http://www.nsm.de/nsm_it/e/products/software.htm">NSM TrueSound Decoder carddriver</a> card is an mpeg1-audio layer 3 decoder card<br />
[0] <a href="http://www.torque.net/linux-pp.html">Parallel Port Drivers</a> drivers forvarious parallel port devices<br />
[0] <a href="http://www.tarki.hu/Linux/pcd.html">pcd</a> Panasonic/Creative/MatsushitaCR-56x driver for Linux<br />
[0] <a href="http://www.cs.umd.edu/users/akinlar/driver.html">pentium perf driver</a>device driver (loadable module) to read pentium performace counters<br />
[0] <a href="http://www.dvsystems.com/changer">Plextor MegaPleX 200 Disc CD-ROM changer</a>driver from Digital Video Systems<br />
[0] <a href="http://www.crynwr.com/qcpc/">QuickCam Drivers</a> third-party Linux driversfor the Connectix QuickCam<br />
[0] <a href="http://www.4front-tech.com/ossfree/index.html">OSS/Free</a> free version ofthe universal audio and sound programming API<br />
[$] <a href="http://www.4front-tech.com/linux.html">OSS/Linux</a> a kernel module whichplays MIDI using any inexpensive 16 bit soundcard<br />
[0] <a href="http://www.torque.net/ez135.html">SyQuest EZ drives</a> driver for theparallel SyQuest EZ135 and EZFlyer 230 drives<br />
[0] <a href="http://www.servtech.com/public/edudley/html/index.html">XidarML</a> XidarTechnics' MicroLan Interface for Linux<br />
[0] <a href="http://www4.informatik.uni-erlangen.de/%7Eaoaugust/mustek/mustek.html">xscan/pnmscan</a>software for MUSTEK Paragon 600/1200 SCSI flatbed scanners</ahref="http:></div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="x"><b>X Servers and Window Systems</b></a></div><div style="font-family: Verdana,sans-serif;">[$] <a href="http://www.xig.com/">Accelerated-X</a> a commercial X server from XiGraphics<br />
[$] <a href="http://www.metrolink.com/products/metrox/index.html">Metro-X</a> Metro Link'scommercial X servers<br />
[0] <a href="http://www.nijenrode.nl/%7Esteven/ldp/HOWTO/MGR-HOWTO.html">MGR Window System</a>Manager graphical window system, an X alternative<br />
[0] <a href="http://www.modeemi.cs.tut.fi/%7Epuujalka/w1r2.html">W96</a> a simple, socketbased, two-color window system as opposed to X<br />
[0] <a href="http://www.xfree86.org/">XFree86</a> the freely available X Window server forPC based UNIX's</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="shell"><b>Shell and System Utilities</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://kite.ml.org/programs/alien/">Alien</a> program converts rpm, dpkg,or Slackware tgz packages into rpm or dpkg<br />
[0] <a href="http://theory.uwinnipeg.ca/unixfiles/Unixhelp/shell_oview2.5.html">bash</a>features of csh and ksh with programming compatible with sh<br />
[0] <a href="http://math.vanderbilt.edu/%7Emayer/linux/bmark.html">BYTE Benchmark</a> testsCPU/cache/RAM performance<br />
[0] <a href="http://www.imada.ou.dk/%7Eblackie/dotfile/">Dotfile Generator</a> tool to helpthe end user configure programs like fvwm<br />
[0] <a href="http://netspace.net.au/%7Ereiter/e2compr.html">E2compr</a> patches andutilities provide transparent compression and decompression in ext2<br />
[0] <a href="http://linux.wauug.org/pub/knaff/fdutils">fdutils</a> config and debug thefloppy driver and send commands to the floppy controller<br />
[0] <a href="http://heyu.tanj.com/%7Edbs/">HEYU</a> command line home automation utilitycommunicates with X10 modules<br />
[0] <a href="http://quest.jpl.nasa.gov/Info-ZIP/">Info-ZIP</a> free multiplatform unzipcompatible with PKWare's zip products<br />
[0] <a href="http://www.roestock.demon.co.uk/isapnptools/">isapnptools</a> collection ofPlug and Play ISA configuration tools<br />
[0] <a href="http://www-scf.usc.edu/%7Elerdsuwa/util">kcd-Kriang's Change Directory</a>allows user to change directory by using various methods<br />
[0] <a href="http://www.interlog.com/%7Eacli/mfcf/lc/">Lc</a> functions like ls, but listsfiles according to their type<br />
[0] <a href="http://www.pi.se/blox/">Loadable Modules</a> module support utilities anddocs<br />
[0] <a href="http://www.cs.uct.ac.za/%7Emwelz/lsh.html">lsh</a> a small DOS-like shell forUNIX<br />
[0] <a href="http://www.oneimage.com/%7Estempel/utils">magnum</a> .plan watcher will notifyyou via email if someone fingered you<br />
[0] <a href="http://www.people.cornell.edu/pages/rc42/program/martian.html">Martian</a> aDebian to RedHat (rpm) package converter<br />
[0] <a href="http://slug.ctv.es/%7Eemelero/momond">momond</a> a C++ program that logs theactivity of your modem line<br />
[0] <a href="http://privat.swol.de/ReinholdSchoeb/Newton/newtonlink-doc-en.html">Newtonlink</a>transfer data between an Apple Newton PDA and Unix apps<br />
[0] <a href="http://kite.ml.org/programs/pdmenu/">Pdmenu</a> simple character based fullscreen menu program<br />
[0] <a href="http://www.metrotron.com/pub/packages/pkg">PKG</a> software packagerdeveloped to be compatible with RPM<br />
[$] <a href="http://www.usregsite.com/">RAR</a> integrated archiver and archive manager<br />
[0] <a href="http://www.msc.cornell.edu/%7Esadd/rexec.html">rexec</a> command calls therexec(3) subroutine to act as remote execution client<br />
[0] <a href="http://www.rpm.org/">RPM</a> package management tool from Red Hat Software<br />
[0] <a href="http://www.cse.unsw.edu.au/%7Es2154962/linux_rxvt.html">Rxvt-XPM</a> rxvt withbackground and border graphics<br />
[0] <a href="http://www.niweb.com/pgregg/siged/">SigEd</a> a shell script written in zshallows appending sig file, PGP and more<br />
[0] <a href="http://www.csh.rit.edu/%7Eshaggy/software.html">solo</a> standalone shell andloader for 32-bit microkernels and OS's<br />
[0] <a href="http://www.cs.hut.fi/ssh/">ssh (Secure Shell)</a> remote shell with strongauthentification<br />
[0] <a href="http://www.ccc.nottingham.ac.uk/%7Eetzpc/stm.html">SVGATextMode</a> an SVGAtextmode manipulation/enhancement tool<br />
[0] <a href="http://pantheon.cis.yale.edu/%7Edcs/tcsh.html/">tcsh</a> enhanced C shell withhistory and filename completion<br />
[0] <a href="http://www.kalika.demon.co.uk/sdk-software/">tidylinks</a> search for andtidy dangling and messy symbolic links<br />
[0] <a href="http://domen.uninett.no/%7Ehta/titrax/TimeTracker.html">TimeTracker</a> anX-windows timekeeper<br />
[0] <a href="http://www.phys.ksu.edu/%7Ebailey/tkWorld.html">tkWorld</a> provides GraphicalUser Interfaces to popular Unix commands, eritten in Tcl/Tk<br />
[0] <a href="http://www.pcnet.com/%7Eproteus/TkZip/TkZip.html">TkZip</a> a gui front end tothe standard archiving/compression programs<br />
[0] <a href="http://goblet.anu.edu.au/%7Em9305357/type1inst.html">type1inst</a> a perlprogram for installing Type1 fonts for GS or X<br />
[0] <a href="http://www.isjm.com/tst/untgz.htm">UNTGZ</a> un-tar and zip for those whostill have DOS/Windows installed<br />
[0] <a href="http://www.uni-frankfurt.de/%7Efp/uudeview/">UUdeview</a> uuencoder and decoderfor MIME, Base64 and xxencode<br />
[0] <a href="http://www.cs.uoregon.edu/research/tcl/script/tkcon/">vertcl (TkCon)</a>enhancement of the standard console that comes with Tk<br />
[0] <a href="http://cspar.uah.edu/%7Emallozzir/html/widtools.html">widtools</a> widget toolsfor shell scripts<br />
[0] <a href="http://chaos.fullerton.edu/XBanner/">XBanner</a> draw text with graphics ontothe X root-window before XDM<br />
[0] <a href="http://www.aviso.demon.co.uk/xfmod.html">XfModule</a> Xform based prog tolist, install and remove kernel modules<br />
[0] <a href="http://www.xs4all.nl/%7Eripley/RSD/linux.html">Xmcpustate</a> version ofxcpustate tool that has a Motif interface added to it<br />
[0] <a href="http://www.ee.ryerson.ca:8080/%7Eelf/xmotd.html">xmotd</a> a message-of-the-daybrowser for X and dumb terminals<br />
[0] <a href="http://www.hacom.nl/%7Erichard/software/xtoolwait-1.0.README">xtoolwait</a>utility notably decreases the startup time of your X sessions<br />
[0] <a href="http://www.thinkage.on.ca/shareware/yay/">YACC (Thinkage YAY)</a> Yet AnotherYACC, software to parse text input<br />
[0] <a href="http://www.peak.org/zsh/">Z Shell</a> the ultimate Bourne-type shell</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="desk"><b>Desktop & Window Managers andAdd-Ons</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://afterstep.edoc.com/">AfterStep</a> continuation of the Bowman windowmanager<br />
[0] <a href="http://www.lysator.liu.se/%7Emarcus/amiwm.html">amiwm</a> an X window managerthat looks and feels like an Amiga Workbench<br />
[$] <a href="http://www.xinside.com/pd/cdline.html">CDE for Linux</a> X-Inside's CommonDesktop Environment for Linux<br />
[0] <a href="http://www.rasterman.com/">Enlightenment</a> window-manager designed formaximum visual appeal<br />
[0] <a href="http://www.simplicity.net/exode/">eXode</a> an enhanced X Open desktop forLinux<br />
[$] <a href="http://fsw.com/desktop.html">Freedom Desktop</a> commercial GUI desktopmanager using Motif<br />
[0] <a href="http://fsw.com/fdlite/index.html">Freedom Desktop Lite</a> free version ofthe GUI desktop manager<br />
[0] <a href="http://www.hpc.uh.edu/fvwm/">FVWM Homepage</a> the <i>official</i> homepageof fvwm<br />
[0] <a href="http://www.cobaltgroup.com/%7Eroland/fvwm/fvwm.html">Fvwm Configuration Options</a>have fvwm your way<br />
[0] <a href="http://www.dilnet.upd.edu.ph/%7Eorly/unixcentral/FvwmCDE.html">FvwmCDE</a> fastCDE panel emulator implemented in Xlib and XForms<br />
[0] <a href="http://www.terraware.net/ftp/pub/Mirrors/FVWM95/fvwm95.html">FVWM-95</a> aWindows95-like variation on fvwm2<br />
[0] <a href="http://bat710.univ-lyon1.fr/%7Ef-cord96/fvwmscrp.htm">FvwmScript for Fvwm</a> amodule that allows one to build desk accessories<br />
[0] <a href="http://zenon.inria.fr/koala/gwm/">GWM</a> the X11 Generic Window Manager<br />
[0] <a href="http://www.kde.org/">KDE Desktop Environment</a> a collection of small toolsused to build a coherent desktop<br />
[0] <a href="http://www.bioele.nuee.nagoya-u.ac.jp/member/tak/mlvwm.html">mlvwm</a> awindow manager available that behaves like the MAC-OS<br />
[0] <a href="http://www.d.umn.edu/%7Embaron/panel/index.html">Panel</a> button bar thatemulates the CDE front panel<br />
[0] <a href="http://leb.net/OffiX">OffiX</a> desktop tools that communicate using drag anddrop<br />
[0] <a href="http://people.mainz.netsurf.de/%7Ebolik/tkdesk/">TkDesk</a> highly configurabledesktop and filemanager for X11<br />
[0] <a href="http://www-personal.umich.edu/%7Emarkcrim/tkgoodstuff">tkgoodstuff</a> an Xprogram and resource manager written in Tcl/tk<br />
[0] <a href="http://www.inf.ufrgs.br/%7Ekojima/wmaker/index.html">WindowMaker</a> aNextStep-like window manager for X11<br />
[0] <a href="http://www.netcomuk.co.uk/%7Ecannam/wm2.html">wm2</a> a window manager for Xwith limited configurability for the minimalist<br />
[0] <a href="http://croco.atnet.at/club/spiff/xmtoolbar.html">Xmtoolbar</a> a button barutility for X Window managers</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="file"><b>File and Disk Utilities</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://www-c.informatik.uni-hannover.de/%7Ekaiser/dfm/dfm.html">DFM-TheDesktop-File-Manager</a> files shown as icons and every folder has its own window<br />
[0] <a href="http://www.byted.com/disam96a.html">DISAM96</a> multi-key B+TREE indexed filemanager, conforms to the C-ISAM standard<br />
[0] <a href="http://www.bongo.demon.co.uk/fileman">FileMan</a> X-windows based filemanager for Linux <a href="http://sunsite.unc.edu/pub/Linux/X11/desktop/">(FTP site)</a><br />
[0] <a href="http://www.cd.chalmers.se/%7Ehch/filerunner.html">FileRunner</a> file managerfor Unix/X11 created for simplicity, speed and elegance<br />
[0] <a href="http://glimpse.cs.arizona.edu:1994/">Glimpse</a> indexing and query systemfor searches across entire file systems<br />
[0] <a href="http://www.cs.unh.edu/%7Etudor/git/">GNU Interactive Tools</a> file systembrowser, ascii/hex file viewer, and more<br />
[0] <a href="http://jungfrau.ptf.hro.nl/explorer">Linux Explorer</a> a Windows95-like filemanager for Linux/X<br />
[0] <a href="http://www.llnl.gov/ia/xdir.html">LLNL XDir</a> X-based network file managerwith FTP<br />
[0] <a href="http://mc.blackdown.org/mc/">Midnight Commander</a> a Linux Norton Commanderwith tar and ftp file manipulation<br />
[0] <a href="http://sugra.desy.de/user/mai/moxfm">Moxfm</a> a Motif based graphical fileand app manager<br />
[$] <a href="http://www.softwarebuilders.com/SBI_Mall/NetZIP_Server.html">NetZIP Server</a>look in ZIP file across network by Software Builders<br />
[0] <a href="http://home.inreach.com/xpierre/pash">Pash</a> freeware Commander for Linux<br />
[0] <a href="http://www.math.ucsb.edu/%7Eboldt/tkinfo/">tkinfo</a> a browser for info files,the GNU documentation format of choice<br />
[0] <a href="http://www.unix11.com/">UNIX Cockpit</a> X-based Xtree Gold/Norton Commanderfile manager<br />
[0] <a href="http://www.hut.fi/u/mkivinie/X-Files/">X-Files</a> a graphical filemanagement program written in Tcl/Tk <a href="http://www.hut.fi/%7Emkivinie/xfindex.html">(alternatesite)</a><br />
[0] <a href="http://www.info.polymtl.ca/ada2/coyote/www/xvfilemgr_main.html">XVFilemanager</a>graphical file manager supports the Openlook standard</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="back"><b>Backup and Rescue Utilities</b></a></div><div style="font-family: Verdana,sans-serif;">[$] <a href="http://www.knox-software.com/">ARKEIA</a> centralizedbackup/restore/archiving solution for heterogeneous networks<br />
[$] <a href="http://www.estinc.com/">Bru</a> Backup and Restore Utility<br />
[$] <a href="http://www.unitrends.com/">Ctar</a> powerful commercial backup program<br />
[0] <a href="http://samuel.math.rwth-aachen.de/%7ELBFM/claus/ftape/ftape-page.html">ftape</a>program that controls tape drives that connect to a floppy controller<br />
[0] <a href="http://www.phy.hw.ac.uk/%7Ekarsten/KBackup.html">KBACKUP</a> backup UNIXsystems to tape, floppy or file<br />
[$] <a href="http://www.cactus.com/">Lone-Tar</a> tape backup software from Lone Star<br />
[$] <a href="http://www.unisrc.com/">PerfectBACKUP+</a> UNIX/LINUX backup software<br />
[0] <a href="http://www.multiline.com.au/%7Eyusuf">Taper</a> tape backup and restore programwith a friendly user interface</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="prn"><b>Printer Utilities</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://www-stud.enst.fr/%7Edemaille/a2ps.html">a2ps</a> an ASCII toPostScript filter<br />
[0] <a href="http://www.ci.tuwien.ac.at/%7Eleisch/docs/flpr/flpr.html">Flpr</a> Perl scriptautomates `dvips', `up', `psselect', `a2ps', etc.<br />
[0] <a href="http://www.glue.umd.edu/%7Eweave/vmwprod/vmwsoft.html">Fontprint</a> prints atext file to the printer using standard Linux console and vga fonts<br />
[0] <a href="http://www2.awinc.com/users/bvdpoel/#lsoft">laserprt</a> a utility to print 2pages on one sheet<br />
[0] <a href="http://ppr-dist.trincoll.edu/printing/pprfaq.html">ppr</a> a print spoolerfor PostScript printers</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="os"><b>Emulators and Simulators</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://www.signus.demon.co.uk/david/atari/atari.html">Atari</a> Atari 800,800XL, 130XE and 5200 Emulator<br />
[$] <a href="http://world.std.com/%7Ebochs">Bochs</a> a portable shareware X86 emulator forX Windows systems<br />
[0] <a href="http://www2.ncsu.edu/eos/service/ece/project/bsvc/www/">BSVC</a> amicroprocessor simulation framework (Motorola 68000 & HECTOR 1600)<br />
[0] <a href="http://www.suse.com/%7Edosemu/">DOSEMU</a> the Linux DOS emulator<br />
[0] <a href="http://www.ensica.fr/%7Efrances/oric/emulate_english.html">Euphoric</a> an Oricemulator/simulator for Linux<br />
[$] <a href="http://www.ardi.com/">Executor</a> a commercial Macintosh emulator by ARDI<br />
[0] <a href="http://utgard.bga.com/handbook/handbook269.html#594">FreeBSD Linux Emulator</a>run Linux apps on FreeBSD<br />
[0] <a href="http://www.uni-mainz.de/%7Ebauec002/FRMain.html">Frodo</a> The free portableC64 emulator for BeOS/Unix/MacOS/AmigaOS<br />
[0] <a href="http://freeflight.com/fms/iNES/">iNES</a> Nintendo Entertainment Systememulator<br />
[0] <a href="http://galeb.etf.bg.ac.yu/%7Edav0r/limes/index.html">LIMES</a>"execution-driven" multiprocessor simulator for Intel cpu's<br />
[0] <a href="http://freeflight.com/fms/MG/">mastergear</a> source code for SEGA GameGearand Master System emulator<br />
[0] <a href="http://www.euronet.nl/users/jkoot/index.htm">Snes96</a> a Super NintendoEntertainment System emulator<br />
[0] <a href="http://www4.ncsu.edu/%7Ebwmott/www/2600/">Stella 96</a> an Atari 2600 emulator<br />
[0] <a href="http://www.complang.tuwien.ac.at/nino/stonx.html">STonX</a> an Atari STemulator for X11<br />
[0] <a href="http://cestar.technion.ac.il/%7Ereuven/hetz/">U.A.E.</a> a UNIX Amiga emulator<br />
[0] <a href="http://softworksltd.com/vbvm.html">VBVM</a> allows MS Visual Basic 5executables to run on Linux<br />
[0] <a href="http://fripp.hrz.tu-chemnitz.de/%7Efachat/vice/">VICE</a> The VersatileCommodore 8-bit Emulator (emulates the C64, C128, Vic20, and PET)<br />
[0] <a href="http://www.users.zetnet.co.uk/ahornby/v2600.html">Virtual 2600</a> an Atari2600 (!) emulator<br />
[0] <a href="http://www.freeflight.com/fms/VGB/">Virtual Gameboy Emulator</a> Linuxemulator of Nintendo game machine<br />
[$] <a href="http://www.caldera.com/products/updates/wabi.html">WABI 2.2 for Linux</a> runWindows 3.1 Applications on Linux-based workstations<br />
[0] <a href="http://www.linpro.no/wine/">WINE</a> an alpha level Windows emulator<br />
[0] <a href="http://www.dit.upm.es/%7Ejantonio/mame/">X-mame emulater</a> X11/Unix port ofthe MultiArcade Machine Emulator<br />
[0] <a href="http://www.philosys.de/%7Ekunze/xzx/">XZX</a> a Sinclair ZX Spectrum 48/128/+3emulator for UNIX/X11<br />
[0] <a href="http://www.comlab.ox.ac.uk/oucl/users/ian.collier/Spectrum/">xz80</a> aSinclair ZX Spectrum emulator</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="spread"><b>Spreadsheets</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://home.t-online.de/home/Axel_Reinhold/#mc">macroCALC</a> a Lotus1-2-3 compatible character based spreadsheet<br />
[$] <a href="http://www.xess.com/prodinfo.html">NExS</a> Network Extensible Spreadsheetfor UNIX and Linux<br />
[0] <a href="http://www.edu.stockholm.se/siag/">Scheme in a Grid (SIAG)</a> spreadsheetbased on Scheme and X<br />
[0] <a href="http://cantor.informatik.rwth-aachen.de/%7Emichael/projects/teapot-en.html">Teapot</a>spreadsheet with functional addressing and 3D tables<br />
[$] <a href="http://www.wingz.com/">Wingz Spreadsheet</a> a Linux port of the NEXT and Macspreadsheet<br />
[$] <a href="http://www.ais.com/linux_corner.html">Xess</a> a powerful, full-featured Xbased spreadsheet<br />
[$] <a href="http://www.axene.com/english/xquad.html">XQuad</a> spreadsheet with allfeatures required for scientific and financial calcs</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="data"><b>Database Managers</b></a></div><div style="font-family: Verdana,sans-serif;">[$] <a href="http://www.softwareag.com/corporat/solutions/datamanage/default.htm">ADABASD</a> high-performance relational database management system<br />
[0] <a href="http://tiny.iapnet.com/rob/beagle.html">Beagle SQL</a> free client serverdatabase management system for Unix<br />
[0] <a href="http://www.conetic.com/css_freekit.html">C/BASE 4GL</a> applicationdevelopment suite and database engine<br />
[0] <a href="http://www.cql.com/">CQL++ SQL Database Management System</a> an ANSI andODBC compliant dbms<br />
[$] <a href="http://www.uno.com/dbix.html">DBIX</a> multi-user SQL database server<br />
[$] <a href="http://www.empress.com/store/p_emp_l/linux1.htm">Empress for Linux PersonalEdition</a> single-user Data Management software<br />
[0] <a href="http://www.inter-soft.com/html/products/essentia.html">Essentia Data BaseEngine</a> database server with Reduced Instruction Set Engine<br />
[0] <a href="http://www.inter-soft.com/html/products/essentia-jdbc.html">Essentia JDBCDriver</a> net-protocol Java driver connects to Essentia via InterSoft SQL Server<br />
[$] <a href="http://www.wgs.com/fsad.html">FlagShip</a> a superset of Clipper 5.x andDbase III for Unix<br />
[0] <a href="http://www.ispras.ru/%7Ekml/gss/">GNU Sql Server</a> a free portable multiuserrelatational database system<br />
[$] <a href="http://www.justlogic.com/descr.html">JustLogic/SQL Database Manager</a>database manager with client/server<br />
[$] <a href="http://www.kesoftware.com/kesoft/tex.html">KE Texpress</a> commercial highspeed client/server database engine<br />
[$] <a href="http://www.kubl.com/kubl/kubl.htm">Kubl RDBMS</a> state of the art clientserver RDBMS for Unix<br />
[0] <a href="http://www.dogbert.demon.co.uk/leap.html">LEAP</a> a relational databasemanagement system<br />
[0] <a href="http://www.hughes.com.au/">mSQL (Mini SQL)</a> light weight database enginethat supports a subset of the ANSI SQL spec<br />
[0] <a href="http://www.tcx.se/">MySQL</a> a very fast, multi-threaded SQL database server<br />
[0] <a href="http://www.sybase.com/products/samples/linux/">Open Client/C</a> a LINUX portof Sybase's Client-Library with System 10 interface<br />
[0] <a href="http://www.pauck.de/marco/misc/oracle_on_linux.html">Oracle on Linux</a>using the SCO Oracle on Linux<br />
[$] <a href="http://www.polyhedra.com/realtime.htm">Polyhedra</a> object-relational,event-driven, real-time, memory-resident, persistent DBMS<br />
[0] <a href="http://www.postgresql.org/">PostgreSQL</a> object-relational next-generationdatabase management system<br />
[$] <a href="http://www.hsdi.com/qddb">QDDB</a> database suite that allows you to createrelations and manipulate tuples<br />
[$] <a href="http://www.raima.com/rdmplus.htm">Raima Database Manager++</a>high-performance relational high-performance database<br />
[$] <a href="http://www.gnacademy.org:8001/uu-gna/schools/vslis/rdb/">/rdb</a> arelational database toolkit for Unix and Linux from Revolutionary Software<br />
[$] <a href="http://www.recital.com/cmr.html">Recital</a> a multi-user database systembased on the PC Xbase language<br />
[0] <a href="ftp://ftp.cs.wisc.edu/shore/html/index.html">SHORE Project</a> a hybridobject-oriented database system<br />
[0] <a href="http://www.voicenet.com/%7Egray/sqsh.html">Sqsh</a> replacement for Sybase's'isql' program<br />
[$] <a href="http://www.solidtech.com/">Solid Server</a> a relational client/server DBMSfrom Solid Tech.<br />
[0] <a href="http://www.wgs.com/sqlkit/sqlkit.html">SQLkit</a> allows FlagShip compilerprograms to communicate with a JustLogic SQL db<br />
[$] <a href="http://www.primenet.com/%7Ekeithr/ssfile/">SS-File Database Manager</a> aflat-file database manager program for Linux<br />
[0] <a href="http://www.on-the-net.com/x2c/">X2c</a> portable Xbase compiler<br />
[0] <a href="http://www.in-berlin.de/User/bitrot/grok.html">xmbase-grok</a> a simpleX/Motif database manager and user interface builder<br />
[$] <a href="http://www.yard.de/">YARD</a> a SQL database server implemented according toANSI X3.135 of 1989/1992</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="word"><b>Word Processors and DocumentPreparation</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://www.adobe.com/prodindex/acrobat/lindnld.html">Adobe Acrobat Reader</a>viewer for pdf documents<br />
[0] <a href="http://zeus.informatik.uni-frankfurt.de/%7Eweis/cicero.html">Cicero</a> WYSIWYGword processor based on Motif libraries<br />
[0] <a href="http://www.art.com/cost/">Cost</a> general-purpose SGML post-processing tool,based on Tcl and sgmls<br />
[0] <a href="http://www.cs.wisc.edu/%7Eghost/index.html">Ghostview / Ghostscript</a>postscript interpreter and viewer<br />
[0] <a href="http://www.hut.fi/%7Emtr/genscript/">GNU Enscript</a> replacement for enscriptconverts ASCII files to PostScript<br />
[0] <a href="http://wwwthep.physik.uni-mainz.de/%7Eplass/gv/">gv</a> view and navigatethrough PostScript and PDF documents on an X display<br />
[0] <a href="http://pi0959.kub.nl:2080/Paai/Publiek/">Information Retrieval and CorpusLinguistics</a> programs and scripts for text-files<br />
[0] <a href="http://www.tex.ac.uk/CTAN/latex/">LaTeX</a> a portable typesetting anddocument preparation system<br />
[0] <a href="http://www.lehigh.edu/%7Edlj0/LyriX.html">LyX</a> a WYSIWYG word-processorfront-end for LaTeX<br />
[0] <a href="http://public.logica.com/%7Ekempsonc/mh_index.htm">MiniHelp Help Editor</a>integrated environment for creating hyperlinked help text<br />
[0] <a href="http://web.mathematik.uni-stuttgart.de/ntex/">NTeX</a> a TeX distribution forLinux<br />
[0] <a href="http://or.mime.univ-paris8.fr/%7Eloscar/Papyrus/papyrus_eng.html">PAPyRUS</a> aword processor for X11/Motif<br />
[0] <a href="http://www.cs.berkeley.edu/%7Eamc/Par/">Par</a> a paragraph reformatter,vaguely similar to fmt, but better<br />
[0] <a href="http://www.uni-paderborn.de/%7ESciTeXt/">SciTeXt</a> wordprocessor for UNIXusing type 1 fonts and wysiwyg<br />
[0] <a href="http://pobox.com/%7Ecg/sgmltools">SGML Tools</a> text-formatting package basedon SGML<br />
[0] <a href="http://www.tcltk.com/tclets/">Tclet</a> part of a multi-function WYSIWYGlayout tool<br />
[0] <a href="http://www.tug.org/teTeX/">teTeX</a> complete TeX distribution for UNIXcompatibles<br />
[0] <a href="http://opera.inrialpes.fr/thot/">Thot</a> structured document editor, with aWYSIWYG interface under X-Window<br />
[0] <a href="http://venus.pfc.mit.edu/tth/tth.html">tth</a> a Tex to HTML translator<br />
[0] <a href="http://members.aol.com/DirkHage/gt/udo6.html">UDO</a> hypertext formatconversion program<br />
[0] <a href="http://www.research.digital.com/SRC/virtualpaper/">Virtual Paper</a>online-document viewing system for PS and scanned "legacy" docs.<br />
[0] <a href="http://www2.awinc.com/users/bvdpoel/#lsoft">Vprint</a> a text formattersimilar to troff-like formatters<br />
[$] <a href="http://www.caldera.com/products/updates/wmb.html">Wordperfect 6.0 for Linux</a>X-based port of the word processor<br />
[$] <a href="http://www.sdcorp.com/">Word Perfect 7</a> Word Perfect 7 running under X<br />
[0] <a href="http://www.w3.org/pub/WWW/Tools/Word_proc_filters.html">Word ProcessorFilters</a> get your word processor to read their files<br />
[$] <a href="http://www.axene.com/english/xclamation.html">Xclamation</a> wysiwyg documentpublishing application<br />
[0] <a href="http://math.berkeley.edu/%7Evojta/xdvi.html">xdvi</a> a previewer for TeX forthe X Window System<br />
[0] <a href="http://www.aimnet.com/%7Ederekn/xpdf/">xpdf</a> an X viewer for PortableDocument Format (PDF or Acrobat) files<br />
[0] <a href="http://ftp.lrw.uni-bremen.de/xtem/xtem_texmenu.html">xtem_TeXMenu</a>graphical user interface for Tex/LaTeX<br />
[0] <a href="http://www.hungry.com/products/">Xword</a> word processor with multi-formatcompatability<br />
[0] <a href="http://www.icce.rug.nl/docs/programs/yodl/yodl.html">YODL (Yet OneotherDocument Language)</a> convert YODL docs to a variety of other formats</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="prod"><b>Groupware and Office Suites</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://www.cs.cmu.edu/%7EAUIS/">Andrew</a> applications suite and messagingsystem<br />
[$] <a href="http://www.angoss.com/sw/home.htm">Angoss SmartWare PLUS</a> integratedX-based office suite and development tool<br />
[$] <a href="http://www.redhat.com/products/product-details.phtml?id=apx">Applixware forRed Hat</a> Applix word processor, spreadsheet, graphics and mail<br />
[$] <a href="http://www.quad.com/linux.htm">Cliq</a> office suite w/text proc,spreadsheet, personal database and scheduler<br />
[$] <a href="http://www.hks.net/">CCVS</a> Credit Card Verification System from HKS<br />
[$] <a href="http://www.compuwork.com/linux.html">Independent Insurance Agency software</a>Compuwork vertical market software<br />
[$] <a href="http://www.goldmedal.com/gm/index.html">Goldmedal</a> UNIX Office, Groupware& E-Mail<br />
[$] <a href="http://rendezvous.visualtek.com/">Rendezvous</a> real-time whiteboard andtext-based communications over a network<br />
[0] <a href="http://www.stardivision.com/staroffice/linux.html">Star Office</a> wordprocessor, spreadsheet, graphics, more<br />
[$] <a href="http://www.crosswind.com/oview.htm">Synchronize</a> a real-time calendaringand scheduling application<br />
[$] <a href="http://www.teamwave.com/">TeamWave Workplace</a> multi-platform whiteboards,chat, groupware tools<br />
[$] <a href="http://www.tclock.com/tclock2.htm">TimeClock</a> time and attendance softwarefrom Quality Software Solutions, Inc.</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="science"><b>Engineering, Science and MathApplications</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://www.informatik.uni-stuttgart.de/ipvr/bv/aero/">AERO-AnimationEditor for Realistic Object movements</a> sim based on rigid body systems<br />
[0] <a href="http://bima.astro.umd.edu/nemo/linuxastro/">Astronomical Software on Linux</a>applications for astronomers<br />
[$] <a href="http://www.earthlink.net/%7Erfactory/lfa.html">Astronomy (Linux for Astronomy)</a>CD-ROM full of astronomical applications<br />
[0] <a href="http://www.mcs.net/%7Edrt/svbp.html">Backprop</a> Backpropagation and RelatedAlgorithms, requires Tcl/Tk<br />
[0] <a href="http://tech-www.informatik.uni-hamburg.de/vhdl/">blif2vhdl</a> a graphicalentry FSM to VHDL converter distributed under GNU<br />
[$] <a href="http://gttserv.lth.rwth-aachen.de/%7Esp/tt/chemapp/chemapp.htm">ChemApp</a> aprogrammable thermodynamic calculation interface<br />
[0] <a href="http://www.informatik.uni-bremen.de/%7Edavinci/">daVinci</a> a user interfacefor high-quality visualizations of directed graphs<br />
[0] <a href="http://wwwi.wu-wien.ac.at/home/ckarl/ckarl/diag/index.html">diag</a> convertnumeric data in an ASCII file into a file in EPS-format<br />
[0] <a href="http://www.aps.anl.gov/asd/controls/epics/">EPICS</a> Experimental PhysicsIndustrial Control System<br />
[0] <a href="http://pcae.hep.phy.cam.ac.uk/ben/foam/foam.html">foam</a> a computer algebraprogram for high energy physics<br />
[0] <a href="http://www.fmi.uni-passau.de/Graphlet">Graphlet</a> toolkit for implementinggraph editors and drawing algorithms<br />
[0] <a href="http://www.cecer.army.mil/grass/">GRASS</a> Geographic Resources AnalysisSupport System<br />
[0] <a href="http://www.cs.dartmouth.edu/gnuplot_info.html">Gnuplot</a> scientificplotting utility<br />
[$] <a href="http://www.rsinc.com/">IDL</a> 4GL application development package for dataanalysis and visualization<br />
[$] <a href="http://www.khoral.com/khoros/whatis.html">Khoros</a> system for image andsignal processing and data exploration<br />
[0] <a href="http://linkwinds.jpl.nasa.gov/">LinkWinds</a> a visual data explorationsystem for large multivariate data sets<br />
[$] <a href="http://www.maplesoft.com/Products/MapleV/MapleV.html">Maple V</a> interactivesoftware for doing symbolic and numeric calculations<br />
[$] <a href="http://www.marc.com/">MARC Designer</a> a linear finite element analysisprogram<br />
[$] <a href="http://www.wri.com/mathematica/">Mathematica for LINUX</a> mathematicalanalysis and equation solver<br />
[0] <a href="http://www.win.tue.nl/win/cs/wp/mathspad/">MathSpad</a> editing tool forwriting mathematically oriented documents<br />
[$] <a href="http://www.mathtools.com/matcom.html">MATCOM</a> Matlab to C++ translator anda matrix class library<br />
[$] <a href="http://www.mathworks.com/ml5.shtml">MATLAB</a> technical environment fornumeric computation and visualization<br />
[$] <a href="http://www.bentley.com/academic">MicroStation</a> powerful CAD program fromBentley Systems<br />
[0] <a href="http://www.mupad.de/factsheet.html">MuPAD</a> system for symbolic and numericcomputing, parallel programming and visualization<br />
[0] <a href="http://www.erols.com/rgerharz/Linux/">nanotimer</a> a 64 bit time-keepingmodule for timestamping high-speed DAQ<br />
[0] <a href="http://www.bgif.no/neureka/">nn/xnn</a> neural network development/simulationtool<br />
[0] <a href="http://www.che.wisc.edu/octave">Octave</a> a high-level language fornumerical computations<br />
[0] <a href="http://aixpdslib.seas.ucla.edu/plot-tools/plotmtv4.html">plotmtv</a> easyprogram to plot data set, contour plots, 3D curves, etc.,<br />
[$] <a href="http://www.powerroar.com/%7Egraph">P+owerGraph</a> Scientific DataVisualization and Graphical Editing<br />
[$] <a href="http://www.comco.com/main/phlex/ProPhlex.html">ProPHLEX</a> a finite elementbased toolkit for engineering simulation<br />
[0] <a href="http://ptolemy.eecs.berkeley.edu/">Ptolemy</a> signal processing,communications, and controls systems<br />
[0] <a href="http://www.stat.auckland.ac.nz/rproj.html">R</a> a LISP-like high-endstatistical language<br />
[0] <a href="http://www.eskimo.com/%7Eians/rlab.html">RLab</a> high level matrix mathlanguage similar to matlab<br />
[0] <a href="http://heasarc.gsfc.nasa.gov/docs/xte/SOF/robot.html">Robot</a> freescientific graph plotting and data analysis program<br />
[0] <a href="http://root.cern.ch/">ROOT</a> Object Oriented Framework for Large Scale DataAnalysis<br />
[$] <a href="http://www.primenet.com/%7Ebester/sattrack.html">SatTrack</a> real-timesatellite tracking and orbit prediction software<br />
[0] <a href="http://sal.kachinatech.com/">Scientific Software Under Linux</a> software forscientists and engineers<br />
[0] <a href="http://www-rocq.inria.fr/scilab/">Scilab</a> high level science and mathcomputation tool<br />
[$] <a href="http://shazam.econ.ubc.ca/">Shazam</a> a comprehensive program for users ofstatistical techniques<br />
[0] <a href="http://emmy.math.uni-sb.de/%7Esimath/">SIMATH</a> computer algebra systemdesigned for computations in number theory<br />
[0] <a href="http://www.informatik.uni-stuttgart.de/ipvr/bv/projekte/snns/snns.html">StuttgartNeural Network Simulator</a> a software simulator for neural networks<br />
[0] <a href="http://www.santafe.edu/projects/swarm/">Swarm</a> tool for modeling complexsystems and doing agent based simulation<br />
[0] <a href="http://hornet.bio.uci.edu/%7Ehjm/projects/tacg/tacg.main.html">tacg/WWWtacg</a>Restriction Enzyme and Transcription Factor analysis and mapping<br />
[0] <a href="http://hwr.nici.kun.nl/unipen/uptools3">UPTOOLS3</a> software intended forresearchers in on-line handwriting recognition<br />
[0] <a href="http://www.microform.se/">VARKON-3D</a> a high level development tool forEngineering and CAD apps<br />
[0] <a href="http://www.ssec.wisc.edu/%7Ebillh/vis5d.html">Vis5D</a> system for interactivevisualization of large 5-D gridded data sets<br />
[0] <a href="http://www.ks.uiuc.edu/Research/vmd/">VMD</a> a package for the vizualizationand analysis of biomolecular systems<br />
[0] <a href="http://a42.com/%7Ethor/xldlas/">xldlas</a> statistical package based on Xformslib<br />
[0] <a href="http://penguin.phy.bnl.gov/www/xtoys/xtoys.html">Xtoys</a> a set of cellularautomata simulators written for Xwindows<br />
[0] <a href="http://world.std.com/%7Ewware/xyz2rgb.html">xyz2rgb</a> makes pictures andmovies of moleculer models</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="pers"><b>Personal Productivity Applications</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://wwwmayr.informatik.tu-muenchen.de/%7Edurka/addressbook/">Addressbook</a>manage your addresses, phone numbers and e-mail addresses<br />
[$] <a href="http://www.dux.com/ahdictux.html">American Heritage Dictionary and Roget'sThesaurus</a> Linux word power<br />
[$] <a href="http://www.falkor.com/">BB Stock Pro</a> stock charting, technical analysis,portfolio management<br />
[0] <a href="http://www.menet.umn.edu/%7Eclolson/cbb/">Check Book Balancer (CBB)</a> acheckbook balancing program written in Perl/TclX/Tk<br />
[0] <a href="http://www.research.digital.com/SRC/personal/Sanjay_Ghemawat/ical/home.html">Ical</a>an X based calendar and appointment book<br />
[0] <a href="http://www.in-berlin.de/User/bitrot/plan.html">Plan</a> a calendar andschedule planner based on X/Motif<br />
[0] <a href="http://www.cs.auc.dk/%7Elupus/xfinans.html">Xfinans</a> a financial managementprogram<br />
[0] <a href="http://sunsite.auc.dk/xinvest/xinvest.html">Xinvest</a> a personal financetracking and performance tool for X<br />
[0] <a href="http://sunsite.auc.dk/xinvest/xquote.html">Xquote</a> quote retrieval toolfor the X Window System</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="web"><b>Web Browsers and Plug-In's</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://www.w3.org/pub/WWW/Amaya/">Amaya</a> Web client that acts both as abrowser and as an authoring tool<br />
[0] <a href="http://www.yggdrasil.com/Products/Arena">Arena Web Browser</a> a freegraphical browser now sponsored by Yggdrasil<br />
[0] <a href="http://www.candleweb.no/">Candle-Web</a> a browser that extends HTML withinteractive animations<br />
[0] <a href="http://www.unlv.edu/chimera/">Chimera</a> one of the earliest browsers,starting to show its age<br />
[0] <a href="http://www.cs.indiana.edu/elisp/w3/docs.html">Emacs World Wide Web Browser</a>a browser written entirely in Emacs lisp<br />
[0] <a href="http://monty.cnri.reston.va.us/grail-0.3/">Grail</a> a python and Tk basedbrowser from CNRI<br />
[0] <a href="http://www.junkbusters.com/ht/en/ijb.html">Junkbuster</a> an ad and cookiefilter for WWW browsers<br />
[0] <a href="http://lynx.browser.org/">Lynx</a> text-based web browser<br />
[0] <a href="http://www.tcltk.com/tclets/impress/">Mini-Impress Tclet</a> publishingplug-in for Netscape<br />
[0] <a href="http://pauillac.inria.fr/%7Erouaix/mmm/">MMM</a> WWW browser written in CamlSpecial Light, using Tcl/Tk<br />
[0] <a href="http://www.ncsa.uiuc.edu/SDG/Software/XMosaic/">NCSA Mosaic for X</a> theclassic gui browser<br />
[0] <a href="http://mbpc07.cl.ba-karlsruhe.de/netscape-plugins.html">Netscape Plug-ins forLinux</a> sound, video, viewers, etc.<br />
[0] <a href="http://www.cdm.com.mx/newswire">NewsWire</a> mini WWW browser that presentsinformation in a ticker-tape manner<br />
[$] <a href="http://www.caldera.com/products/netscape/netscape.html">Netscape NavigatorVersion 3 from Caldera</a> the leading web browser<br />
[0] <a href="http://home.netscape.com/download/client_download.html?communicator4.04">NetscapeCommunicator Version 4 for Linux</a> the leading web browser<br />
[0] <a href="http://www.rci.rutgers.edu/%7Ephonynet/">PhonyNet Commuter</a> browser thatdoubles as an httpd server over the phone<br />
[0] <a href="http://www.infovav.se/%7Ehubbe/plugger.html">Plugger</a> a multimedia pluginfor Unix Netscape that handles many file formats<br />
[0] <a href="http://home.pages.de/%7Erasca/pngplugin/">PNG Magick Plug-in</a> netscapeplug-in for unix/linux supports many multimedia file formats<br />
[0] <a href="http://sunsite.auc.dk/qweb/">QWeb</a> a WWW Browser that displays SGMLdocuments according to style sheets<br />
[0] <a href="http://www.sunlabs.com/tcl/plugin">Tcl Plugin</a> allows delivery of ricxstructured graphics and UIs in web pages.<br />
[0] <a href="http://tk-www.mit.edu:8001/tk-www/help/overview.html">tkWWW</a> a web browserwritten in the Tcl/tk language<br />
[0] <a href="http://hyperg.iicm.tu-graz.ac.at/vrweb">VRweb</a> VRML browser for Linux<br />
[0] <a href="http://www.eolas.com/eolas/webrouse/">WebRouser</a> browser with MEAPIsupport allows Web pages to be interactive<br />
[0] <a href="http://www.gedanken.demon.co.uk/wwwoffle/index.html">WWWOFFLE</a> World WideWeb Offline Explorer for offline browsing<br />
[0] <a href="http://www.fokus.gmd.de/linux/announce.html">Woven Goods for LINUX</a> acollection of apps for viewing Linux info via WWW</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="html"><b>WWW Tools and HTML Editors</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://www.man.ac.uk/%7Ewhaley/ag/appgen.html">AppGEN</a> high level 4GL andapplication generator for producing WWW based apps<br />
[0] <a href="http://www.cs.rpi.edu/%7Epuninj/TALK/head.html">ASHE (xhtml)</a> a simple HTMLeditor written in C and using Motif<br />
[0] <a href="http://www.advasoft.com/asWedit.html">asWedit</a> HTML and text editor for XWindow System and Motif<br />
[$] <a href="http://www.advasoft.com/ASWedit.html">ASWedit</a> commercial version ofasWedit for X Window System and Motif<br />
[$] <a href="http://www.lilikoi.com/">Ceilidh</a> a WWW BBS written in C and CGI-compliant<br />
[$] <a href="http://www.empress.com/store/dataweb/dataweb1.htm">Empress DataWEB</a> buildWeb-based apps that utilize features of Empress RDBMS<br />
[0] <a href="http://www.cyberramp.net/%7Ebfriesen/gifmap/">Gifmap Image Navigator</a>package which supports making image collections available on the Web<br />
[0] <a href="http://www.h-e-i.de/heitml">heitml</a> server side extension of HTML todevelop interactive Web Pages, Database Apps<br />
[0] <ahref="http: hm--html-menus="" overview.html="" own="" software="" www.tnt.uni-hannover.de="" ~muenkel="">hm--html-menusedit html code with xemacs<br />
[0] <a href="http://cbl.leeds.ac.uk/nikos/tex2html/doc/latex2html/latex2html.html">LaTeX2HTML</a>convert LaTeX documents to HTML<br />
[$] <a href="http://www.lilypad.net/">Lilypad</a> tool for internet marketers to measureresponse to their online efforts<br />
[$] <a href="http://www.elsop.com/linkscan/index.html">LinkScan</a> checks for brokenlinks and creates Site Maps<br />
[$] <a href="http://www.boutell.com/mapedit/">Mapedit</a> graphical editor for World WideWeb image maps<br />
[0] <a href="http://www-c.informatik.uni-hannover.de/%7Edh/mulaw">MuLaW</a> non-WYSIWYGauthoring system for web sites and HTML page hierarchies<br />
[$] <a href="http://www.nombas.com/sewse/index.htm">ScriptEase:Webserver Edition</a> toolfor developing CGI applications<br />
[0] <a href="http://marion.uio.no/%7Esverrehu/pub-unix/">suidcgi</a> a set UID wrapper forCGI scripts<br />
[0] <a href="http://www.cobaltgroup.com/%7Eroland/tkHTML/tkHTML.html">tkHTML</a> a tcl/tkHTML editor<br />
[$] <a href="http://www.virtuflex.com/">VirtuFlex</a> WWW application builder integratesdatabases, email, fax, telephony<br />
[$] <a href="http://vancouver-webpages.com/VWbot/">VWbot</a> Web-traversing robot nowavailable as shareware written in Perl4<br />
[0] <a href="http://www.infomedque.ca/%7Ewebadmin">WebAdmin</a> allow users to edit theirHTML files on-line, without using FTP or TELNET<br />
[$] <a href="http://www.talentsoft.com/">Web+</a> multi-platform web to databaseintegration tool from TalentSoft<br />
[0] <a href="http://www.esiea.fr/public_html/Emmanuel.PIERRE/WebLx.en.html">WebLinux</a>list user home page directories using apache and Perl<br />
[$] <a href="http://www.lgcy.com/users/u/unit/pages/software.html">Weblist</a>mass-surfing and mass-mailing over the internet<br />
[0] <a href="http://www.cyberramp.net/%7Ebfriesen/webmagick/">WebMagick</a> package to helpmake image collections available on the Web<br />
[0] <a href="http://www.win.co.nz/web-passwd/">Web Password</a> change user passwords viathe World Wide Web<br />
[0] <a href="http://www.sunlabs.com/research/tcl/webtk/">WebTk</a> html graphical editor<br />
[0] <a href="http://www.webthreads.com/">webthreads</a> set of CGI scripts that enhancesreporting accuracy of WWW servers</ahref="http:></div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="mail"><b>Mail Programs and Agents</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://www.bitgate.com/spam/">BlackMail</a> mailer proxy that providesprotection against spammers, mail forwarding, etc.<br />
[$] <a href="http://www.sos.com/cyberpage/">cyberPAGE</a> e-mail paging engine for Linux<br />
[0] <a href="http://www.myxa.com/elm.html">Elm</a> ELectronic Mail for Linux and UNIX<br />
[0] <a href="http://www.sunlabs.com/%7Ebwelch/exmh/">Exmh</a> X based e-mail program<br />
[0] <a href="http://www.ccil.org/%7Eesr/esr-freeware.html">fetchmail</a> a POP2, POP3, APOP,and IMAP batch mail retrieval/forwarding utility<br />
[0] <a href="http://www.concentric.net/%7Emrsam/getpop3/index.html">getpop3</a> pop3 clientdesigned to be used with temporary dialup Internet connections<br />
[0] <a href="http://www.average.org/ifmail/">Ifmail</a> allows a Unix machine to integratean FTN network and act as a gateway<br />
[$] <a href="http://www.ishmail.com/">Ishmail</a> a commercial X based mail program<br />
[0] <a href="http://www.iki.fi/jvuokko/jmr">jmr</a> a QWK offline mailreader for Linux andUnix<br />
[0] <a href="http://www.greatcircle.com/majordomo/">Majordomo</a> mailing list managementpackage<br />
[0] <a href="http://www.ics.uci.edu/%7Emh/">MH Message Handler</a> UNIX mail handling agent,foundation of exmh<br />
[0] <a href="http://camis.stanford.edu/projects/imap/ml/">ML</a> a mail program for Xand IMAP<br />
[0] <a href="http://www.panglot.com/">Multilingual Email Editor for Linux</a> use up to 7languages/alphabets simultaneously<br />
[0] <a href="http://goliat.eik.bme.hu/%7Ejohnzero/multimail">Multimail</a> a BlueWave/QWKoffline packet reader for Linux<br />
[0] <a href="http://www.cs.hmc.edu/%7Eme/mutt">mutt</a> small but very powerful curses-basedmail client for Unix<br />
[0] <a href="http://www.ajsoft.demon.co.uk/mxMail.html">mxMail</a> an X/Motif mail clientfor Linux<br />
[0] <a href="http://www.ed.umuc.edu/%7Ershecter/software/pandora.html">Pandora</a> a Webinterface for Majordomo for managers of mailing lists<br />
[0] <a href="http://www.gmd.de/People/Peter.Simons/private/software/petidomo.html">Petidomo</a>a commercial/free mailing list package alternative to majordomo<br />
[0] <a href="http://www.cac.washington.edu/pine/">Pine</a> Information Center - Linux andUNIX mail program (featuring PICO)<br />
[0] <a href="http://www.c2.org/%7Eraph/premail.html">premail</a> transparently encrypts& decrypts email on the fly using PGP<br />
[0] <a href="http://caristudenti.cs.unibo.it/%7Eborgia/homepage/Software/Software.html">pop3gwd</a>a POP3 proxy designed to allow mail retrieval from POP3 servers<br />
[0] <a href="http://www.unicorn.com/privtool/privtool.html">Privtool</a> a PGP-awarereplacement for the standard Sun Workstation mailtool program<br />
[0] <a href="http://netspace.net.au/%7Eggt">privtool/Motif</a> privtool with Motif &XView user interfaces<br />
[0] <a href="http://www.ii.com/internet/robots/procmail/">Procmail</a> automaticallyprocess mail as received or from a folder<br />
[0] <a href="http://www.qmail.org/">qmail</a> a secure, reliable, efficient, simple messagetransfer agent<br />
[0] <a href="http://www.ed.umuc.edu/%7Ershecter/software/ri.html">Read-Index</a> a plug-inextension to Majordomo<br />
[0] <a href="http://www.sendmail.org/">Sendmail</a> primary UNIX email agent<br />
[0] <a href="http://www.stud.uni-hannover.de/%7Ekuehnel/">SOMA Mailreader</a> mailreader forLinux under X11 based on the XView library<br />
[0] <a href="http://www.slac.stanford.edu/%7Eraines/tkmail.html">TkMail v2.0</a> an X WindowMail Reader using Tcl/tk<br />
[0] <a href="http://www.dtek.chalmers.se/%7Emaf/ratatosk/">TkRat (Ratatosk)</a> a mail useragent for X built with Tcl/Tk<br />
[0] <a href="http://www.crocodile.org/UMT/UMT.html">Ultimate Mail Tool</a> e-mail readerdeveloped in Topaz-Inform<br />
[0] <a href="http://www.lugs.ch/LUGS_Members/norbert.kuemin/wmf-0.8.html">wmf-Web MailFolder</a> convert mail to html and create index files<br />
[0] <a href="http://burka.netvision.net.il/xfmail/xfmail.html">XF-Mail</a> another X basedmail program<br />
[$] <a href="http://www.netmanage.com/products/zmail/index.html">Zmail</a> powerfulcommercial email reader uses Motif</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="inet"><b>News Readers and Internet Apps</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://www.sasknet.com/%7Epionh/index.htm">BitchX ircII Client</a> anextended version of ircII 2.8<br />
[0] <a href="http://www.nijenrode.nl/%7Eivo/circus/">cIRCus</a> a new IRC client for Linux/X<br />
[0] <a href="http://www.wpi.edu/%7Emurti/work.html">Ethernet Phone</a> real time voicecommunication over the Internet<br />
[0] <a href="http://www.serv.net/%7Ecameron/ezppp/index.html">EzPPP</a> X-Windows GUI PPPconfiguration utility which handles multiple accounts<br />
[0] <a href="http://www.infomatch.com/%7Etbradley/go-ppp.txt">go-ppp</a> calls multiplenumbers until connection made and establishes ppp link<br />
[0] <a href="http://www.ifi.uio.no/%7Elarsi/ding.html">Gnus 5</a> a newsreader that livesinside Emacs<br />
[0] <a href="http://union.ncsa.uiuc.edu/HyperNews/get/hypernews.html">HyperNews</a>web-based news reader and poster<br />
[0] <a href="http://www.virtualbase.com/inet1.htm">I-NET Ticker Tape</a> client/serversystem which provides info to remote clients<br />
[0] <a href="http://www.isg.de/visualweb/invisible_e.html">InvisibleWeb</a> automate thedownloading of documents from a WWW site<br />
[0] <a href="http://www.nada.kth.se/%7Esu95-kjo/knews.html">Knews</a> threaded x-based newsreader<br />
[0] <a href="http://gramercy.ios.com/%7Etmtr01/mmucl/">Mmucl</a> Mark's MUd CLient writtenin Tcl/Tk<br />
[0] <a href="http://www.jeton.or.jp/users/toru/www/orgsoft/index.html">Modemu</a> use yourfavorite comm program over TELNET connection<br />
[0] <a href="http://mordor.nazgul.com/">Mordor</a> MUD server package that includes alarge database and source code<br />
[0] <a href="http://www.imaginary.com/LPC/MudOS">MudOS</a> an LpMud driver implementation<br />
[0] <a href="http://www.ajsoft.demon.co.uk/mxFtp.html">mxFtp</a> an X/Motif FTP client forLinux<br />
[0] <a href="http://www.general.uwa.edu.au/u/toivo/nn-tk">nn-tk</a> a newsreader for Xbased on nn and Tcl/tk<br />
[0] <a href="http://privat.swol.de/ReinholdSchoeb/Online/OnlineCC-doc-en.html">OnlineCommand Center</a> program to control a SLIP/CSLIP or PPP connection to German ISP's<br />
[0] <a href="http://www.iquest.net/%7Ejbuchana/computer.html">pnews</a> simple system usessuck to pull news from a remote NNTP server<br />
[0] <a href="http://www.isjm.com/tst/pppcosts.htm">pppcosts</a> calculates, displays,saves online time and phone costs for ppp connects<br />
[0] <a href="http://www.shore.net/%7Epip/qnews.htm">Qnews</a> X news reader optimized foruse over a slip connection<br />
[0] <a href="http://www.bitgate.com/qtirc/">QtIRC</a> IRC client from Bitgate using Qtlibs<br />
[0] <a href="http://www.eleves.ens.fr:8080/home/espel/sirc.html">Sirc</a> a programmableIRC client for UNIX written in PERL<br />
[0] <a href="http://www.concentric.net/%7Emrsam/sftp/index.html">sFTP</a> a screen-orientedFTP client, based on the curses library<br />
[0] <a href="http://web.inter.nl.net/users/R.W.Pijlman/skim/Skim.html">Skim</a> agraphical offline newsreader for Linux<br />
[0] <a href="http://blitzen.canberra.edu.au/slirp">SLiRP</a> TCP/IP emulator allowsdial-ups to act like SLIP/PPP<br />
[0] <a href="http://space.mit.edu/%7Edavis/slrn.html">SLRN</a> a threaded, colorized NNTPbased newsreader for Unix<br />
[0] <a href="http://jungfrau.ptf.hro.nl/%7Esprocket/">sprocket</a> a graphical telnet/ftpclient for Linux using Qt<br />
[0] <a href="http://www.pixi.com/%7Eboby/index.html">suck</a> feed a local INN or CNEWSserver, without the remote NNTP feeding you articles<br />
[0] <a href="http://marketplace.com/tia/tiahome.html">The Internet Adapter (TIA)</a> useTCP/IP software with any regular UNIX shell accoun<br />
[0] <a href="http://home.pages.de/%7Etkirc/">tkirc</a> a graphical frontend for ircII<br />
[0] <a href="http://www.aquanet.co.il/shay/usepkt/">Usepkt</a> import usenet news to localfido packets<br />
[0] <a href="http://www.cyberatl.net/%7Ejohnpaul/uterm.faq">Uterm</a> terminal emulatorsupporting Unicode, text editor, print utility<br />
[0] <a href="http://users.hol.gr/%7Edbouras">X-ISP</a> a visual, X11 and XForms basedinterface to pppd/chat<br />
[0] <a href="http://www.magg.net/%7Ekaos/html/xmftp.html">xmftp</a> simple X/Motif FTPclient with transfer info and autoresume<br />
[0] <a href="http://cspar.uah.edu/%7Emallozzir/">xppp</a> graphical interface to IPconnection, written with the Motif library<br />
[0] <a href="http://catless.ncl.ac.uk/Programs/Zircon/README.html">Zircon</a> an X11 basedIRC client<br />
[0] <a href="http://www.ssc.com/%7Eroland/work/ztalk.html">Ztalk</a> TCP/IP voicecommunication, and <a href="http://www.ssc.com/%7Eroland/work/xztalk.html">XZtalk</a>, the Xfront end</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="comm"><b>Fax and Telecommunications Apps</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://www.icce.rug.nl/docs/programs/callback/callback.html">Callback</a>programs to setup a callback-system, where a modem-connect is requested<br />
[0] <a href="http://www.vaala.fi/%7Ehydra">DayDream</a> a BBS program with fidonetcapabilites<br />
[0] <a href="http://www.muc.de/%7Ehm/linux/dcf77.html">DCF77 for Linux</a> use a radioreceiver with these Linux resources<br />
[0] <a href="http://www.sas.com/otherprods/emulus/Home.html">Emulus</a> IBM 3270 vectorgraphics terminal emulation under X Window<br />
[0] <a href="http://www.acsys.com/radio/radio.html">EZ Clone</a> software for programminghandheld and mobile amateur radios<br />
[0] <a href="http://www.cpsc.ucalgary.ca/projects/grouplab/projects/groupkit/">GroupKit</a>free groupware toolkit for developing real-time conferencing apps<br />
[$] <a href="http://www.unisrc.com/">HotWire EasyFAX</a> most functional fax programavailable today for any platform<br />
[0] <a href="http://www.vix.com/hylafax/">HylaFAX</a> send and receive faxes under UNIXand Linux, also pages<br />
[0] <a href="http://www.columbia.edu/kermit/">Kermit</a> comm software for file transfer,terminal emulation, script programming<br />
[0] <a href="http://anchor.cs.binghamton.edu/%7Emobileip/">Linux Mobile-IP</a> supportstransparent host mobility across TCP/IP networks<br />
[0] <a href="http://www.clinet.fi/%7Evph/lore/index.html">Lore</a> Linux Omen Reader<br />
[0] <a href="http://adam.wins.uva.nl/%7Emdejonge/projects/modem/">modem</a> a distributedcommunication package for modems<br />
[0] <a href="http://www.tcel.com/%7Eaehall/newtl/">Newtl</a> allows UNIX system tocommunicate with Newton using Slurpee<br />
[$] <a href="http://www.trader.com/users/5013/3977/smparts.htm">Silent Messenger</a>multiuser client/server paging gateway from MessageNet Systems<br />
[$] <a href="http://www.spatch.com/">Spatch</a> alphanumeric paging software for UNIX<br />
[0] <a href="http://www.lantz.com/index.html">TNOS</a> TCP/IP for use in an RFenvironment, primarily Amateur Packet Radio<br />
[0] <a href="http://tycho.com/">WorldVU BBS</a> publically available BBS system, in bothELF and AOUT binaries</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="http"><b>Web and Internet Servers andFirewalls</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://www.aolserver.com/server/index.html">AOLserver</a> a full-featuredweb server from AOL<br />
[0] <a href="http://www.apache.org/">Apache HTTP Server</a> a public domain HTTP serverfor UNIX and Linux<br />
[0] <a href="http://www.boa.org/">Boa</a> a fast, lightweight web server for unix-alikecomputers<br />
[0] <a href="http://www.tis.com/docs/products/fwtk/index.html">Firewall Toolkit</a> a setof programs designed to facilitate the building of firewalls<br />
[0] <a href="http://www.rtr.com/fpsupport/index.html">Frontpage Server Extensions</a> MSFrontpage Server Extensions for Linux from Ready-to-Run<br />
[0] <a href="http://www.isg.de/visualweb/invisible_e.html">InvisibleWeb & OfflineProxy Server</a> switch proxy server between "online" and "offline mode<br />
[0] <a href="http://www.xos.nl/linux/ipfwadm/">ipfwadm</a> utility to administer IPaccounting and firewall services<br />
[0] <a href="http://www.els.url.es/%7Esi03786/masq.html">Masqd</a> a management utility fora Linux Firewall<br />
[0] <a href="http://hoohoo.ncsa.uiuc.edu/">NCSA httpd Server</a> web server from thedevelopers of Mosaic<br />
[0] <a href="http://www.roxen.com/">Roxen</a> a modularised, object oriented World Wide Webserver<br />
[0] <a href="http://squid.nlanr.net/Squid/">SQUID</a> a linux based WWW proxy application<br />
[$] <a href="http://stronghold.ukweb.com/">Stronghold</a> commercial version of Apacheweb-server which uses SSL<br />
[$] <a href="http://www.vosaic.com/products/servers/MediaServer.html">Vosaic MediaServer</a>serve video and audio to multiple users simultaneously<br />
[0] <a href="http://www.sealabs.com/products.html">Watchguard</a> internet firewallsecurity system from SSL<br />
[0] <a href="http://www.math.ucsb.edu/%7Eboldt/noshit/">WebFilter</a> patch to Cern httpdwhich allows httpd to act as filtering proxy<br />
[0] <a href="http://www.rocksoft.com/webtune/">WebTune</a> a webserver logfile analysisproduct for Linux<br />
[0] <a href="http://hopf.math.nwu.edu/docs/manual.html">WN Server</a> http server designedfor security and flexibility<br />
[0] <a href="http://www.w3.org/pub/WWW/Daemon/">W3C (CERN) httpd</a> web server from theWorld Wide Web Consortium (CERN)<br />
[0] <a href="http://www.stack.nl/%7Esven/xs-httpd/">XS-HTTPD 2.3</a> very small and fastUNIX WWW server<br />
[$] <a href="http://www.zeus.co.uk/products/server/">Zeus Server</a> full-featuredcommercial grade http server</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="games"><b>Games and Amusements</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://www.litsoft.com/across/preview.htm">Across Lite</a> a program forsolving crossword puzzles online<br />
[0] <a href="http://evlweb.eecs.uic.edu/aej/AndyBattalion.html">battalion</a>"Monsters, explosions, senseless destruction." What more need be said?<br />
[0] <a href="http://ciips.ee.uwa.edu.au/%7Ewilliams/bd/">Boulderdash (Online)</a> game,networked, X, boulderdash, java<br />
[0] <a href="http://www.hevanet.com/wms/comp/cgoban/">CGoban</a> an X-based go playableacross a network<br />
[0] <a href="http://www.u-aizu.ac.jp/%7Es1021127/cosmo/cosmo.html">Cosmo</a> X-based puzzlegame (page in Japanese)<br />
[0] <a href="http://www.ifi.uio.no/%7Efrankj/crossfire/index.html">Crossfire</a> multiplayergraphical arcade and adventure game for X<br />
[0] <a href="http://jcomm.uoregon.edu/%7Estevev/Linux-DOOM-FAQ.html">DOOM for Linux</a>Frequently Asked Questions<br />
[0] <a href="http://www.atomic.com/%7Eogre/firepower.html">Firepower</a> X based tank gameplayable over the net<br />
[0] <a href="http://www.daimi.aau.dk/%7Eallan/freeciv.html">Freeciv</a> a strategy game forX11, similar to Microprose's Civilization/Civnet<br />
[0] <a href="http://nether.tky.hut.fi/glchess/">GL Chess</a> a graphical frontend toGNUchess<br />
[0] <a href="http://www.kuai.se/%7Esniemi/gwars.htm">Gravity Wars</a> SVGA game based onGravity Force, one of the greatest games for the Amiga<br />
[0] <a href="http://www.pharaoh0.demon.co.uk/hatman/index.html">Hatman</a> a Pacman clonefor linux SVGAlib<br />
[0] <a href="http://www.tu-clausthal.de/student/iMaze/">iMaze</a> a multi player, realtime, 3D, labyrinth, run & shoot game<br />
[0] <a href="http://www.cl.cam.ac.uk/users/gdr11/inform/">Inform</a> a free compiler foradventure games, outputs Infocom Z-code<br />
[0] <a href="http://www.bolthole.com/kdrill/">KDrill</a> program to help people learnkanji and kana<br />
[0] <a href="http://www.paru.cas.cz/%7Ehubicka/koules/English/koules.html">KOULES</a>multi-player shoot-em-up type game<br />
[0] <a href="http://www.alp.cistron.nl/%7Ewouters/linuxarc.html">Last Defender</a> a fullyconfigurable defender type game for SVGAlib<br />
[0] <a href="http://www.floot.demon.co.uk/lincity.html">LinCity</a> an X/SVGALIBcity/country simulation game for Linux<br />
[0] <a href="http://www.informatik.uni-trier.de/CIP/toepfer/">Lingvisto</a> X based appthat will help you to learn foreign languages<br />
[0] <a href="http://www.devolution.com/%7Eslouken/Maelstrom/">Maelstrom</a> pilot your shipthrough the dreaded "Maelstrom" asteroid belt<br />
[0] <a href="http://www.pact.srf.ac.uk/%7Enathan/xmris/">Mr. Is</a> a version of the Mr. Dogame for X<br />
[0] <a href="http://www.babbage.demon.co.uk/pileup.html">pileup</a> simulates the pileuptapes heard at Amateur Radio conventions<br />
[0] <a href="http://www.win.tue.nl/games/roguelike/nethack/">NetHack</a> single playerdungeon sim, and <a href="http://www.uq.edu.au/%7Ecswallis/nhqt/index.html">Qt NetHack</a>NetHack with a Qt interface<br />
[0] <a href="http://www4.ncsu.edu/eos/users/b/bwmott/www/oonsoo/">Oonsoo</a> a solitarecard game<br />
[0] <a href="http://www.aie.nl/%7Esreiz/openciv">OpenCiv</a> a net-aware, X-based clone ofMicroprose's Civilization<br />
[0] <a href="http://www.hevanet.com/wms/pente.html">Pente</a> a five-in-a-row strategyboard game<br />
[0] <a href="http://www.hungry.com/products/">Phaserchess</a> a Lesstif version ofCompute!'s Laserchess<br />
[0] <a href="http://threewave.planetquake.com/linux/">Quake for Linux</a> blood and gore,and lots of it<br />
[0] <a href="http://www.glue.umd.edu/%7Eweave/vmwprod/seabattle.html">Sea-Battle</a> abattleship type game with a lot of fancy effects<br />
[0] <a href="http://www.cs.uit.no/%7Esveinarr/smartbee/">SmartBee</a> a fortune cookieprogram<br />
[0] <a href="http://www.ifi.uio.no/%7Esverrehu/pub-unix/">snake</a> steer the snake and eatthe fruit<br />
[0] <a href="http://marion.uio.no/%7Esverrehu/pub-unix/html/sol.shtml">sol</a> X11 Solitairecard game.<br />
[0] <a href="http://huizen.dds.nl/%7Ehosxe/spaceboom.html">SpaceBoom</a> a Linux shoot-em up<br />
[0] <a href="http://www.cplab.ph.ed.ac.uk/%7Ep95137">Terroid</a> a scrolling "shoot 'emup" style game by Digital Nightmares<br />
[0] <a href="http://www.lysator.liu.se/%7Epeda/thrust/">Thrust</a> graphical spaceship andcargo game<br />
[0] <a href="http://www.cybertheque.fr/nwwwt/english_wwwt.html">TREMINGO</a> a java-basedword game playable over the net<br />
[0] <a href="http://cns-web.bu.edu/pub/xpip/html/xbattle.html">XBattle</a> an two-playerX-based wargame played over a network<br />
[0] <a href="http://hamlet.ikp.uni-koeln.de/%7Evogel/xblast/xblast.html">XBlast</a> anarcade-style multiuser netgame<br />
[0] <a href="http://www710.univ-lyon1.fr/ftp/xbl/xbl.html">XBlockOut</a> an interesting,3-D twist on tetris for X<br />
[0] <a href="http://www.catt.citri.edu.au/xboing/">XBoing</a> a version of Breakout for X<br />
[0] <a href="http://www.gedanken.demon.co.uk/xbomb/index.html">XBomb</a> version of theminesweeper game for X Windows<br />
[0] <a href="http://turing.wins.uva.nl/%7Emdekker/xcogitate.html">Xcogitate</a> strategypuzzle game for X<br />
[0] <a href="http://www.cygnus.com/%7Eshebs/xconq.html">Xconq</a> an Empire-type strategygame for X<br />
[0] <a href="http://cag-www.lcs.mit.edu/%7Etuna/xearth/">Xearth</a> X window backgroundprogram<br />
[0] <a href="http://www.atomic.com/%7Eogre/xgal.html">XGalaga</a> Galaxian comes to Linux/X<br />
[0] <a href="http://www.paru.cas.cz/%7Ehubicka/xonix/english.html">XONIX</a> a QIX-like gamefor X<br />
[0] <a href="http://www.cs.uit.no/XPilot/">XPilot</a> the X11 based multiplayer spacecombat game<br />
[0] <a href="http://www.sara.nl/cgi-bin/rick_acc_xsnow">Xsnow</a> X app that lets it snowon the root, in between and on windows<br />
[0] <a href="http://xsokoban.lcs.mit.edu/xsokoban.html">XSokoban</a> that busy littlejanitor goes X<br />
[0] <a href="http://www.educ.info.kanagawa-u.ac.jp/%7Es945750/xsoldier.html">xsoldier</a>X-based shooting game (page in Japanese)<br />
[0] <a href="http://www.io.com/%7Eacroyear/XTartan.html">XTartan</a> an X-window program todraw Scottish tartans</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="graphics"><b>Graphics and Image Processing</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://www.comp.lancs.ac.uk/computing/users/andy/ac3dlinux.html">AC3D</a>a 3D object/scene modeller that can output DIVE<br />
[$] <a href="http://www.yonowat.com/Products/Amapi/Amapi.html">amapi</a> 3d modeler forcreation of complex shapes<br />
[0] <a href="http://bsdi.com/icons/AIcons/">Anthony's Icon Library</a> xpm's and xbm's forLinux and X<br />
[0] <a href="http://www.ikm.com/9XXWZace/download.html">axis</a> a 3D rendering engine forLinux et al. from IKM Interactive<br />
[0] <a href="http://www.seas.gwu.edu/student/gritz/bmrt.html">BMRT Rendering Tools</a>Blue Moon graphics rendering tools<br />
[0] <a href="http://www.cs.cmu.edu/%7Espot/bomb.html">bomb</a> an interactive graphicsprogram that uses cellular automata and fractals<br />
[$] <a href="http://www.caldera.com/solutionsCD/Products/Corel/Info/draw35.htm">Corel Drawfor Linux</a> the ubiquitous graphics app comes to Linux<br />
[0] <a href="http://www.sics.se/dce/dive/dive.html">Dive</a> Distributed InteractiveVirtual Environment, net-based multi-user VR system<br />
[0] <a href="http://www.iis.ee.ethz.ch/%7Ekiwi/GIFMerge/">Gifmerge</a> tool for buildinganimated gifs<br />
[$] <a href="http://www.gig.nl/products/prodinfo.html">GIG3DGO</a> raytracing, animationand modeling software from ElectroGIG<br />
[0] <a href="http://www.gimp.org/">GIMP</a> graphics image manipulation program<br />
[0] <a href="http://www.oih.rwth-aachen.de/%7Epauly/icao.html">ICAO Map</a> X-based mapgeneration program utilizing "world files"<br />
[0] <a href="http://www.wizards.dupont.com/cristy/ImageMagick.html">ImageMagick</a> an X11image processing and display package<br />
[$] <a href="http://www.demon.co.uk/titan">IPAD</a> multiplatform front end to aninteractive GUI vector drawing package<br />
[0] <a href="http://www.threedee.com/mhedron/mhedron.htm">Megahedron</a> MultifacetedRendering, Animation, Simulation, and Virtual Reality Software<br />
[0] <a href="http://www.ptf.hro.nl/free-d/">Mind's Eye</a> 3d modelling and animationpackage<br />
[0] <a href="http://www.povray.org/">Persistence of Vision Ray Tracer (POV)</a> ray-tracedgraphics construction<br />
[0] <a href="http://www.radix.net/%7Edunbar/index.html">Pixcon & Anitroll</a> a 3Danimation and rendering package<br />
[0] <a href="http://www.comp.lancs.ac.uk/computing/users/aspinr/ra-vec.html">Ra-vec</a>converts 2D drawings into a vector format readable by AC3D<br />
[$] <a href="http://www.telegrafix.com/asr">RIPmaster</a> RIPscrip(tm)3.0 based systemcreates graphics and multimedia systems<br />
[0] <a href="http://www.cyberus.ca/%7Edenism/sceda/sceda.html">Sceda Scene Editor/Animator</a>X-based 3-D modeller<br />
[0] <a href="http://bourbon.cs.ucla.edu:8001/tgif/">Tgif</a> an Xlib based interactive 2-Ddrawing tool for X11<br />
[0] <a href="http://www.atd.ucar.edu/homes/cook/xact/xact.html">xacte</a> an interactive Xwindow colortable editor<br />
[0] <a href="http://www.paru.cas.cz/%7Ehubicka/XaoS/">XaoS</a> a real-time interactivefractal zoomer for X or SVGAlib<br />
[0] <a href="http://cspara.uah.edu/%7Emallozzir/html/xfont3d.html">xfont3d</a> a graphicalinterface to Font3D used as a tool mainly for POV-Ray<br />
[0] <a href="http://cspar.uah.edu/%7Emallozzir/html/xfpovray.html">xfpovray</a> graphicalinterface to the ray tracing program POV-Ray<br />
[0] <a href="http://www.danbbs.dk/%7Etorsten/xpaint/index.html">XPaint96</a> a drawingprogram for X windows<br />
[0] <a href="http://www.gweep.net/%7Ejer/xtacy.html">Xtacy</a> displays bouncing shapes,rotating palettes, fractals and more<br />
[0] <a href="http://www.sun.com/sunsoft/catlink/xv/xv.html">XV</a> ubiquitous graphicsutil by John Bradley, and the <a href="http://is.rice.edu/%7Eshel/xv-3.10a/">XV Manual</a><br />
[0] <a href="http://www.tummy.com/xvscan/">XVScan</a> Image Aquisition for Linux</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="mm"><b>Multimedia Apps</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://www.msc.cornell.edu/%7Ehoule/vr/freedom/">Freedom VR</a> photographicVR applet uses internet standards like .gif and .jpeg<br />
[0] <a href="http://cse.ogi.edu/DISC/projects/synthetix/Player/">Internet-Based MPEG A/VPlayer</a> distributed real-time MPEG video audio player<br />
[0] <a href="http://www.metacard.com/">MetaCard</a> multimedia authoring tool and GUIdevelopment environment for Unix/X11<br />
[0] <a href="http://adam.kaist.ac.kr/%7Ejwj95/">MPEG file player</a> supports Mpeg layer 1 23 and Wave files<br />
[0] <a href="http://www.mpegtv.com/">MpegTV Player</a> real-time software MPEG Player withaudio support for Linux<br />
[$] <a href="http://www.digigami.com/moviescreamer/about-unix.html">MovieScreamer</a>Digigami streaming QuickTime(tm) Conversion Tool for web and MM<br />
[0] <a href="http://smurfland.cit.buffalo.edu/xanim/home.html">XAnim</a> multi-formatanimation player</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="music"><b>Music and Audio Apps and CD Players</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://xfactor.wpi.edu/private/witek/awe/">ALMP</a> AWE32 Linux ModulePlayer<br />
[0] <a href="http://jpj.net/%7Etrevor/aumix.html">aumix</a> an audio mixing program for usefrom the Linux console, command line or scripts<br />
[0] <a href="http://synergy.caltech.edu/%7Ejohn/programs.html">CaXmix</a> X based mixer thatuses the Xforms libraries and widget sets<br />
[0] <a href="http://www.ceressoft.com/sstudio/index.html">Ceres Soundstudio</a> amulti-track recorder, mixer and effect module<br />
[0] <a href="http://www.panix.com/%7Etopper/Cmix/Cmix.html">Cmix</a> an enviroment for bothmusic composition and instrument design<br />
[0] <a href="http://www.afn.org/%7Ecthugha/">Cthugha</a> an oscilloscope "on acid"program for PC sound cards<br />
[0] <a href="http://home.pages.de/%7Eears/">ears</a> free code for speech recognition inobject-oriented modules<br />
[0] <a href="http://www.cs.cornell.edu/Info/People/raman/emacspeak/emacspeak.html">Emacspeak</a>a speech output subsystem for emacs<br />
[0] <a href="http://www.cstr.ed.ac.uk/projects/festival/festival.html">Festival</a> amulti-lingual speech synthesis system<br />
[0] <a href="http://www-miaif.ibp.fr/%7Etarreau/audio-comp/">fftcomp</a> utility whichcompresses audio files at a user-choosable ratio<br />
[$] <a href="http://www.iis.fhg.de/departs/amm/layer3/index.html">Fraunhofer IIS encoder</a>MPEG 1/2 Layer 3 audio encoder<br />
[0] <a href="http://www.ee.mu.oz.au/staff/pbd/linux/fxvolume/">Fxvolume</a> a simple, nofrills volume control using Xforms<br />
[0] <a href="http://www.nosuch.com/keykit">KeyKit</a> a system for MIDI experimentation,both algorithmic and realtime<br />
[0] <a href="http://www.cse.unsw.edu.au/%7Econradp/maube/">maube</a> the first mod trackerfor X11 Loads XM, MOD, S3M, raw samples<br />
[0] <a href="http://tcts.fpms.ac.be/synthesis">MBROLA</a> diphone-based speech synthesizer<br />
[0] <a href="http://kalahari.ton.tut.fi/s2/midas.html">Midas</a> a multichannel digitalsound and music system<br />
[0] <a href="http://www.stack.nl/%7Emikmak/mikmod.htm">MikMod For Linux</a> a cross-platformmod player for Linux<br />
[0] <a href="http://www.ccmrc.ucsb.edu/%7Edoug/htmls/MiXViews.html">MiXViews</a> X baseddigital sound editor and processor<br />
[0] <a href="http://www.powerweb.de/mpeg/unix.html">MMaudio</a> X based audio playersupporting .au, .wav, .mpeg and more<br />
[0] <a href="http://www.sfs.nphil.uni-tuebingen.de/%7Ehipp/mpg123.html">mpg123</a> an MPEG1.0/2.0 Audio Player<br />
[0] <a href="http://rulhmpc38.leidenuniv.nl/private/multitrack/multitrack.html">Multitrack</a>a four-track sound recorder for Linux<br />
[0] <a href="http://www.jeton.or.jp/users/toru/www/orgsoft/index.html">NSPmod</a> playsMOD, MTM and S3M music files without DSP<br />
[0] <a href="http://web.mit.edu/afs/sipb/user/xiphmont/OggSquish/html-pages/">OggSquish</a>general purpose audio compression utility<br />
[0] <a href="http://www.coli.uni-sb.de/%7Eclanget/ossmixer.html">Ossmixer</a> an audio mixerfor Linux using the Qt-GUI-toolkit<br />
[0] <a href="http://student.uq.edu.au/%7Es002434/qt/QAudio/">QAudio </a>provides for simplebut useful sound in the Qt GUI Toolkit<br />
[0] <a href="http://www.real.com/products/player/download_player.html">RealAudio 5.0</a>listen to audio over the net in real time<br />
[0] <a href="http://www.bath.ac.uk/%7Emasjpf/rose.html">Rosegarden</a> a music notationalediting program for Linux<br />
[0] <a href="http://livewire.ee.latrobe.edu.au/%7Esjm/morse/linux.html">SCCW 1.0</a> thefirst CW (Morse Code) program for Linux which uses a soundcard<br />
[0] <a href="http://www.geocities.com/SiliconValley/Lakes/5147/sidplay.html">SIDPLAY/Linux</a>music player emulates the sound interface device of the Commodore 64<br />
[0] <a href="http://www.elec-eng.leeds.ac.uk/staff/een6njb/Software/Studio/screens.html">SoundStudio</a>enables recording, playback and cut & paste editing of sound files<br />
[0] <a href="http://www.spies.com/Sox/">Sox</a> a sound file format converter for Unix<br />
[0] <a href="http://www.clinet.fi/%7Etoivonen/timidity/">TiMidity</a> a MIDI to WAVEconverter that uses GUS-compatible patches<br />
[0] <a href="http://www.msc.cornell.edu/%7Ebef2/">tk3play</a> X based tcl/tk MPEG audioplayer uses mpeg123 decoder<br />
[0] <a href="http://www.iki.fi/i/tplay.html">tplay</a> a POSIX-threaded audio player foruse with MPEG-decoders<br />
[0] <a href="http://www.ica.net/pages/wwg">WavPlay</a> shell-based .wav audio player (Xversion requires Motif or Lesstif)<br />
[0] <a href="http://www.mpeg.org/xaudio">Xaudio</a> MPEG Audio player with GUI front-ends<br />
[0] <a href="http://www.geocities.com/SiliconValley/Pines/1029/">Xcd</a> a compact discplayer that runs under X11<br />
[0] <a href="http://www.fh-muenchen.de/rz/xcdroast">X-CD-Roast</a> cd writer X-frontend toprograms like "cdwrite" and "mkisofs"<br />
[0] <a href="http://www.nyx.net/%7Earobinso/xgmod.html">Xgmod</a> module player with an Xinterface, requires GUS card and USS/Lite drivers<br />
[0] <a href="http://sunsite.unc.edu/%7Ecddb/xmcd/">XMCD</a> CD Player for the X windowsystem using Motif<br />
[0] <a href="http://sunsite.unc.edu/%7Ecddb/xmmix/">Xmmix</a> an audio mixer utility for theX window system using the Motif GUI<br />
[0] <a href="http://www.merdre.net/%7Eclaudio/xmp/">xmp</a> a module player for Linux withGUS or AWE cards<br />
[0] <a href="http://cray.tuug.utu.fi/%7Ephoenix/xmp3player/">xmp3play</a> Qt frontend formpeg123 mpeg audio player<br />
[0] <a href="http://www.powerweb.de/mpeg/xmplay.html">Xmplay</a> X-based MPEG-player anddirectory browser<br />
[0] <a href="http://kitten.ndscs.nodak.edu/%7Etinnes/">Xtuner</a> windows front end for theRadio Reveal card</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="conf"><b>Mbone and Conferencing Tools</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://www.rvs.uni-hannover.de/products/confman/index_en.html">Confman</a>mbone tool to initiate and administer conferences over the internet<br />
[0] <a href="http://www.inria.fr/rodeo/fphone/">FreePhone</a> audioconferencing tool forthe Internet<br />
[0] <a href="http://www.merit.edu/research.and.development/mbone/index/linux.html">MboneConferencing Tools</a> conferencing tools for use over a network<br />
[0] <a href="http://www.pangea.org/%7Emavilar/qseeme/qseeme.html">Q-SeeMe</a>videoconferencing client speaks protocol used by Win and Mac CU-SeeMe clients<br />
[0] <a href="http://www.fourmilab.ch/speakfree/unix">Speakfree</a> send voice over anetwork</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="text"><b>Text Editors</b></a></div><div style="font-family: Verdana,sans-serif;">[$] <a href="http://www.crisp.com/">CRiSP</a> a very Brief-like text editor<br />
[$] <a href="http://www.zfc.nl/">Edith Professional</a> powerful and user-friendly desktoptext editing system from ZFC<br />
[0] <a href="ftp://ftp.cs.pdx.edu/pub/elvis/README.html">Elvis</a> an enhanced clone ofvi/ex, the standard Unix editor<br />
[0] <a href="http://cantor.informatik.rwth-aachen.de/%7Emichael/projects/fe.html">fe(Folding Editor)</a> small, light on resources outline editor<br />
[0] <a href="http://ixtas.fer.uni-lj.si/%7Emarkom/fte">FTE</a> a programmers text editorwith color synatx highlighting<br />
[0] <a href="http://space.mit.edu/%7Edavis/jed.html">JED Programmer's Editor</a> freelyavailable text editor for Unix,<br />
[0] <a href="http://www.volftp.vol.it/IT/IT/ITALIANI/MORELLO/medit_e.htm">MEdit</a> texteditor compiled with MGUI for Linux X11.<br />
[0] <a href="http://www-pat.fnal.gov/nirvana/nedit.html">NEdit</a> a GUI style plain-texteditor for X/Motif systems<br />
[0] <a href="http://www.cs.su.oz.au/%7Emik/red-manual/red-main-page.html">Red</a> easy touse GUI text editor<br />
[0] <a href="http://www.inter-soft.com/html/products/scriptum.html">Scriptum</a>platform-independent GUI programmers editor<br />
[$] <a href="http://www.sedit.com/">SEDIT</a> a Linux port of the SEDIT editor<br />
[0] <a href="http://www.cs.helsinki.fi/%7Ewirzeniu/SeX/">Simple editor for X (SeX)</a> abasic X text editor<br />
[$] <a href="http://www.slickedit.com/seindex.htm">SlickEdit</a> configurable programmerseditor from MicroEdge<br />
[0] <a href="http://www.gu.edu.au/gwis/the/markh.html">THE</a> a full-screen charactermode text editor based on XEDIT<br />
[0] <a href="http://www.math.fu-berlin.de/%7Eguckes/vim/">VIM</a> the "viimproved" editor<br />
[0] <a href="http://www.cs.su.oz.au/%7Egary/wily/">Wily</a> editor which provides much ofthe feel of Acme in the Unix/X environment<br />
[0] <a href="http://pux.hec.fr/xcoral/">Xcoral</a> an advanced text editor for X-window<br />
[0] <a href="http://www.xemacs.org/">XEmacs</a> Extended Emacs. It's not an editor, it's a<em>lifestyle</em><br />
[0] <a href="http://www.proximity.com.au/%7Eben/xenon.html">Xenon</a> a simple, small andfast X-based text editor</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="java"><b>Java and Java Tools</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://www.biss-net.com/biss-awt.html">BISS-Awt</a> group of classes forimplimenting nice GUI's for Java apps<br />
[0] <a href="http://www.blackdown.org/java-linux/Products.html">Castanet for JAVA</a>libraries and altered scripts to enable Castanet to be used with JDK<br />
[0] <a href="http://www.cerc.wvu.edu/chicory/index.html">Chicory</a> a state of the artJava RAD tool with JTAPI/CORBA/DCOM compliance<br />
[0] <a href="http://www.techno-link.com/clients/ivo/FreeBuilder">Free Builder</a> a free,high quality Java IDE<br />
[0] <a href="http://ring.etl.go.jp/openlab/horb/">HORB</a> Object Oriented Request Brokerfor Java<br />
[0] <a href="http://www.blackdown.org/java-linux.html">Java Development Kit</a> version1.0.2 for Linux<br />
[0] <a href="http://www.kaffe.org/">Kaffe</a> a JIT virtual machine to run Java(tm) code<br />
[0] <a href="http://www.thoughtinc.com/%7Enutmeg/">Nutmeg</a> portable list managementlibrary for Java from Thought<br />
[$] <a href="http://www.poet.com/java_sdk_data.htm">Poet JAVA SDK</a> an Object DatabaseManagement System (ODBMS)<br />
[0] <a href="http://www.cs.arizona.edu/sumatra/toba/">Toba</a> a complete Java-to-Ctranslation system<br />
[$] <a href="http://www.visix.com/">Vibe</a> a fully integrated development and deploymentenvironment for building Java apps</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="lang"><b>Programming Languages</b></a></div><div style="font-family: Verdana,sans-serif;">[$] <a href="http://www.absoft.com/f77_linux.html">Absoft FORTRAN 77</a> a globallyoptimizing, ANSI X3.9-1978/ISO 1539-1980 compiler<br />
[$] <a href="http://www.acucobol.com/Products/ACUCOBOL-85/">ACUCOBOL-85</a> ANSI-85 COBOLcompiler from ACUCOBOL<br />
[0] <a href="http://www.ece.orst.edu/%7Epaul/8051-goodies/index.html#as31_assembler">AS31Assembler</a> cross assembler for the MCS-51(tm) family<br />
[0] <a href="http://csugrad.cs.vt.edu/manuals/gawk/gawk_toc.html">awk</a> aspecial-purpose programming language for data reformatting<br />
[0] <a href="http://www.uni-mainz.de/%7Eihm/basic.html">BASIC</a> a unix implementation ofbasic<br />
[0] <a href="http://www.mjolner.dk/">BETA System</a> o-o language for procedural andfunctional programming by Mjolner<br />
[0] <a href="http://cuiwww.unige.ch/%7Eserrano/bigloo.html">Bigloo</a> practical Schemecompiler provides a DSSSL support and Unicode encoding<br />
[0] <a href="http://www.mv.com/users/pw/lisp">CMU-Lisp for Linux</a> fully featured lisp,with a very good compiler<br />
[0] <a href="http://www.deskware.com/cobol/cobol.htm">COBOL Interpreter</a> compact andeasy to use COBOL interpreter for Linux<br />
[0] <a href="http://arachnid.cs.cf.ac.uk/CLE/">Eiffel</a> an advanced object-orientedprogramming language<br />
[0] <a href="http://www.engelschall.com/sw/eperl/">ePerl</a> embedded perl interprets anASCII file bristled with Perl 5 statements<br />
[$] <a href="http://www.nag.co.uk/nagware/Fortran90.html">Fortran 90</a> ISO and ANSIstandard Fortran 90 compiler and libraries by NAG<br />
[0] <a href="http://www.brain.uni-freiburg.de/%7Eklaus/pascal/fpk-pas/">FPK-PASCAL</a> free32-bit Pascal compiler mostly compatible with TP7<br />
[0] <a href="http://www.cis.ohio-state.edu/htbin/info/info/g++.info">g++</a> the GNU c++compiler<br />
[0] <a href="http://www.cis.ohio-state.edu/htbin/info/info/gcc.info">gcc</a> the GNU Ccompiler<br />
[0] <a href="http://www-ala.doc.ic.ac.uk/%7Ephjk/BoundsChecking.html">GCC 2.7.1 with BoundsChecking</a> full fine-grained bounds checking using GCC<br />
[0] <a href="http://www.zurich.ibm.com/%7Ebba/gomscript.html">GOMscript</a> an interpreterfor an object-oriented, C++-like, language<br />
[0] <a href="http://www.knotwork.com/%28nobg%29/info/comp/freeware/linux/gorby/">Gorby</a> asmall, powerful scripting language for linux<br />
[$] <a href="http://www.munich.net/inlab/scheme">Inlab-Scheme</a> independentimplementation of Scheme as defined by R4RS and IEEE<br />
[0] <a href="http://www.cs.tu-berlin.de/%7Esepp/jacob.html">Jacob-Oberon-2</a> Just ACompiler for OBeron for Linux<br />
[$] <a href="http://www.kai.com/C_plus_plus/">KAI C++</a> includes draft-standard C++class libraries, support for member templates<br />
[0] <a href="http://spock.ece.drexel.edu/marx/">Marx</a> a quasi-C interpreter withspecial extensions to write GUI in X windows<br />
[0] <a href="http://www.fit.qut.edu.au/CompSci/PLAS/GPM/guide/">Modula-2</a> Gardens PointModula Users Guide and <a href="http://www.fit.qut.edu.au/CompSci/PLAS/GPM/gpmrelease/">Linux</a>release notes<br />
[0] <a href="http://www.cl.cam.ac.uk/m3doc/linux/m3.html">Modula-3 for Linux</a> veryportable implementation of Modula-3<br />
[$] <a href="http://softwork-3.isdn.mcs.net/nbasic.html">Network BASIC</a> Visual Basiclike clone for use over the net<br />
[0] <a href="http://www.fit.qut.edu.au/CompSci/PLAS/GPM/gpomanual/">Oberon</a> GardensPoint Oberon Users Guide and <ahref="http: compsci="" gpm="" gporelease="" plas="" www.fit.qut.edu.au="">Linux release notes<br />
[0] <a href="http://www.cis.ufl.edu/perl/">PERL</a> the Practical Extraction and Reportinglanguage<br />
[$] <a href="http://www.pgroup.com/ppro_cc_desc.html">PGcc Workstation</a>optimizing/parallelizing ANSI C compiler from The Portland Group<br />
[$] <a href="http://www.pgroup.com/ppro_cplus.desc.html">PGCC Workstation</a>optimizing/parallelizing native C++ compiler from The Portland Group<br />
[$] <a href="http://www.pgroup.com/ppro_f77_desc.html">PGF77 Workstation</a>optimizing/parallelizing FORTRAN 77 compiler from The Portland Group<br />
[$] <a href="http://www.pgroup.com/ppro_hpf_desc.html">PGHPF Workstation</a> highperformance Fortran compiler from The Portland Group<br />
[0] <a href="http://www.python.org/">Python</a> an object-oriented scripting language<br />
[0] <a href="http://www.icsi.berkeley.edu/%7Esather/">Sather</a> an oo language designed tobe simple, efficient, safe, flexible and open<br />
[0] <a href="http://www.llnl.gov/sisal/SisalHomePage.html">Sisal</a> a high performancefunctional language<br />
[0] <a href="http://www.informatik.uni-stuttgart.de/stx/linux.html">Smalltalk/X</a> forLinux<br />
[0] <a href="http://www.create.ucsb.edu/squeak/">Squeak</a> Smalltalk-80 which runs underLinux<br />
[$] <a href="http://www.sedit.com/">S/REXX</a> a port of IBM's REXX language to Linux<br />
[0] <a href="http://www.nai.net/%7Elerman">Stepstone Objective C</a> compiler from SystemEssentials Limited for Linux<br />
[0] <a href="http://www.sni.net/tachyon/">Tachyon 390 Cross Assembler</a> develop andmaintain 370/390 Assembler programs<br />
[0] <a href="http://sunscript.sun.com/">Tcl/tk</a> a scripting language and graphical userinterface toolkit<br />
[$] <a href="http://www.basmark.com/">XBasic</a> 32-bit BASIC compiler and programdevelopment environment<br />
[0] <a href="http://zaphod.uni-muenster.de/xi/">Xi</a> interactive C-like language withvector extensions</ahref="http:></div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="tools"><b>Development Tools</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://www.cs.cmu.edu/afs/cs.cmu.edu/project/amulet/www/">Amulet</a> aportable user interface development environment for C++<br />
[0] <a href="http://www.angoss.com/sw/home.htm">ANGOSS Smartware PLUS</a> cross-platformapplication development suite<br />
[0] <a href="http://www.ccc.nottingham.ac.uk/%7Eetzpc/binstats.html">Binstats</a> a utilityfor tracking binary types and dynamic library dependencies<br />
[0] <a href="http://www.iitb.fhg.de/%7Ekir/Bras/brasHome.html">Bras</a> a replacement of`make' written in Tcl<br />
[0] <a href="http://www.bsp-worldwide.org/implmnts/tool06b.htm">BSPlib</a> parallelprogramming library based on the Bulk Synchronous Parallel (BSP) model<br />
[0] <a href="http://www.fste.ac.cowan.edu.au/%7Etlittlef">CCCC</a> a freeware tool formeasuring software product metrics on C/C++ source code<br />
[0] <a href="http://iel.ucdavis.edu/CH/">CH</a> a language environment designed to be asuperset of C<br />
[0] <a href="http://www.cco.caltech.edu/%7Ejafl/jx/progs.html">Code Crusader</a> a C/C++code development environment<br />
[0] <a href="http://www.parasoft.com/wizard/index.html">CodeWizard</a> a comprehensivetool for Code Analysis in C/C++ programs<br />
[0] <a href="http://www.ras.ru/moshkow/html-KOI/SOFTWARE/">Converter</a> Pascal to C/C++converter outputs code compatible with ISO Pascal standard<br />
[0] <a href="http://fly.hiwaay.net/%7Edarren/ctags.html">Ctags (Exuberant)</a> generates anindex file of C objects in C source and headers<br />
[0] <a href="http://eivind.imm.dtu.dk/cvs2html">cvs2html</a> Perl 5 program transforms the'cvs log'output to HTML with tables and links<br />
[0] <a href="http://eivind.imm.dtu.dk/cvs2html">cvsstat</a> Perl 5 program shows whichfiles are not up to date with the CVS database<br />
[0] <a href="http://www.gedanken.demon.co.uk/cxref/index.html">Cxref</a> produces docs (inLaTeX or HTML) including xref from C source code<br />
[0] <a href="http://www.cs.tu-bs.de/softech/ddd/">Data Display Debugger (DDD)</a>graphical user interface to GDB and DBX<br />
[0] <a href="http://www.in-tech.com/">DIOSS</a> X/Motif app development without X/Motif<br />
[0] <a href="http://wallybox.cei.net/dipc">DIPC (Distributed IPC)</a> used to buildprograms that run on multiple computers<br />
[0] <a href="http://www.cis.ohio-state.edu/%7Ejharris/dlgedit">Dlgedit</a> GUI dialog editorfor the Qt widget library<br />
[0] <a href="http://www.zib.de/Visual/software/doc++/index.html">DOC++</a> system forgenerating HTML and LaTeX documentation for C++ programs<br />
[0] <a href="http://www.edge.net/algorithms/">Dynace</a> object oriented extension to Cfrom Algorithms Corporation<br />
[0] <a href="http://www.unicon-ka.de/ifelics.htm">FELICS</a> licence server for softwaredevelopers<br />
[0] <a href="http://www.cs.utah.edu/projects/flux/flick/">Flick</a> interface definitionlanguage (IDL) compiler supporting RPC and RMI<br />
[0] <a href="http://www.xs4all.nl/%7Eripley/RSD/ForUtil.html">ForUtil</a> a collection offortran 77 utilities<br />
[0] <a href="http://www.agetek.com/genx.htm">GenX</a> X-based application developmentsystem<br />
[0] <a href="http://www.inter-soft.com/products/ideafix">IDEAFIX</a> set of integratedprogram development tools and utilities<br />
[0] <a href="http://inferno.lucent.com/">Inferno</a> dev kit for a new network operatingsystem and programming environment<br />
[0] <a href="http://www.parasoft.com/insure++/index.html">Insure++</a> comprehensive toolfor error detection in C/C++ programs<br />
[0] <a href="http://www.vectaport.com/ivtools/">ivtools/ivmaps</a> a C++ framework forconstructing custom drawing editors<br />
[0] <a href="http://larch-www.lcs.mit.edu:8001/larch/lclint.html">LCLint</a> a lint-liketool for ANSI C<br />
[0] <a href="http://www.imatix.com/html/lrindex.htm">Libero</a> a programmer's tool andcode generator<br />
[0] <a href="http://www.thinkage.on.ca/shareware/lint/">Lint (Thinkage)</a> examines Csource code and reports on questionable constructs<br />
[0] <a href="http://www.umn.edu/nlhome/g257/parki005/lxb/lxb.html">LXB</a> an X/Motifinteractive graphical user interface builder<br />
[0] <a href="http://www.iquest.net/%7Ejbuchana/computer.html">mem_test</a> find C programmemory leaks<br />
[0] <a href="http://www.informatik.tu-muenchen.de/%7Epaysan/bigforth.html">MINOS</a> a rapidGUI designer written in bigFORTH for Linux<br />
[0] <a href="http://www.cs.rice.edu/%7Emflatt/mred.html">MrEd</a> GUI developmentenvironment using wxWindows within a Scheme implementation<br />
[0] <a href="http://www.cs.ntu.edu.au/homepages/pjm/nana-home">Nana</a> improved assertionchecking and logging for GNU C and C++<br />
[0] <a href="http://www.obsoft.com/Product/ObjMan.html">ObjectManual</a> tool to automategeneration of HTML documentation from C++ programs<br />
[0] <a href="http://www.metrolink.com/products/opengl/index.html">OpenGL</a> 2D and 3Dgraphics apps development environment from MetroLink<br />
[0] <a href="http://www.es.com/products/PC/linux_faq.html">OpenGL for Linux</a> from Evansand Sutherland<br />
[0] <a href="http://home.earthlink.net/%7Eowenomalley/plumber.html">Plumber</a> tool usedduring development to identify memory leaks<br />
[$] <a href="http://www.netbula.com/products/powerrpc/">PowerRPC</a> tool formultiplatform RPC development<br />
[0] <a href="http://www.xcf.berkeley.edu/%7Ejmacd/prcs.html">PRCS</a> Project RevisionControl System<br />
[0] <a href="http://starship.skyport.net/crew/zack/ptui/">ptui</a> Pythoneditor/interpreter programmed entirely in Python<br />
[0] <a href="http://ultra7.unl.edu.ar/pyxforms/">PyXForms</a> a marriage between pythonand Xforms for GUI app building<br />
[$] <a href="http://www.cmass.com/reactor">Reactor</a> development environment forclient-server and distributed applications<br />
[$] <a href="http://207.92.81.101/rsm.htm">RSM</a> portable tool for C and C++ codeanalysis, metrics and complexity<br />
[0] <a href="http://www.rgl.polymtl.ca/schema/tool.html">Schemacode</a> Schema basedknowledge editor for program implementation<br />
[$] <a href="http://www.takefive.com/">SNiFF+</a> an ide for C, C++, Java, Fortran, CORBAIDL by TakeFive Software<br />
[0] <a href="http://swt-www.informatik.uni-hamburg.de/%7E1willamo/dl.html">SNiFF+ for EIFFEL</a>a compiler independent Eiffel programming environment<br />
[0] <a href="http://www.sunlabs.com/research/tcl/spectcl/">SpecTcl</a> a Tcl/tkprogramming IDE for building graphical interfaces<br />
[0] <a href="http://kaolin.unice.fr/html/STk.html">STk</a> R4RS Scheme interpreter whichcan access the Tk graphical package<br />
[0] <a href="http://www.cs.utah.edu/%7Ebeazley/SWIG/">swig</a> development tool makes iteasy to build script interfaces to C/C++ programs<br />
[0] <a href="http://perso.club-internet.fr/queutey/TkfPW/index.html">TkfPW</a> a GUI"Fortran Programmer's Workshop" for Unix/X11<br />
[0] <a href="http://www.doitnow.com/%7Equillan/john/tkxcd">tkxcd</a> a free diff front endwiths a look and feel similar to xcleardiff<br />
[0] <a href="http://arachnid.cs.cf.ac.uk/Tower/twrweb/LinuxProducts.html">TowerEIFFEL</a>oo software development system<br />
[$] <a href="http://www.willows.com/">TWIN (Willows Tookit)</a> develop and/or deployWindows API apps cross platforms<br />
[0] <a href="http://www.neuron.com/stewart/vtcl">Visual Tcl</a> Tcl/tk based applicationdevelopment environment for UNIX<br />
[0] <a href="http://www.cs.unm.edu/%7Ewampler/vgui/vgui.html">V</a> a freeware portable C++GUI framework for Windows and X<br />
[$] <a href="http://www.vbix.com/">VBIX</a> run Visual Basic(tm) programs on Unix withMotif look<br />
[0] <a href="http://www.cs.uni-sb.de/RW/users/sander/html/gsvcg1.html">VCG</a>Visualization of Compiler Graphs reads specification and visualizes graph<br />
[$] <a href="http://www.bredex.de/EN/vdx/">VDX</a> a Motif Interface Builder made forLinux generates C and C++ source code<br />
[0] <a href="http://www.bredex.de/EN/vdx">View Designer/X</a> a Motif Interface Builderfor Linux from BREDEX GmbH<br />
[0] <a href="http://www.cs.rpi.edu/%7Emartink/">Visualization Toolkit (vtk)</a> softwaresystem for 3D Computer graphics and visualization<br />
[0] <a href="http://www.eit.com/software/winterp/winterp.html">WINTERP 2.0</a> a rapidprototyping environment for GUI-based apps<br />
[0] <a href="http://www.softwarebuero.de/wipeout-eng.html">WipeOut</a> an integrateddevelopment environment for C++ and Java<br />
[0] <a href="http://bigbear.pc.helsinki.fi/harri/wxpython/">wxPython</a> write portablePython programs with a GUI, good for rapid prototyping<br />
[0] <a href="http://web.ukonline.co.uk/julian.smart/wxwin">wxWindows</a> toolkit fordeveloping multi-platform, graphical applications<br />
[0] <a href="http://bragg.phys.uwm.edu/xforms">XForms </a>a GUI toolkit based on Xlib forX Window Systems<br />
[0] <a href="http://www.iis.nsk.su/xtech/xds/">xTech Development System (XDS)</a>portable,featuring Modula-2 and Oberon-2<br />
[0] <a href="http://www.interbit.ro/%7Edragos/Xterminal.html">Xterminal</a> OO UI withclient-server architecture for building text-based apps<br />
[0] <a href="http://www.fh-karlsruhe.de/%7Esomi0011/s_soft_html/s_soft.html">xwb (X WindowWorkbench)</a> edit source files of any languages or text processors<br />
[0] <a href="http://www.rpi.edu/%7Epayned/xwpe">xwpe</a> X-based windowed programmingenvironment<br />
[0] <a href="http://www.iki.fi/%7Eterop/yade.html">YADE</a> extensible and configurableprogram for editing diagrams</div><div style="font-family: Verdana,sans-serif;"><a href="http://www.infosyssec.org/infosyssec/security/apps.html#top"><b>[Top]</b></a> <a href="" name="lib"><b>Libraries</b></a></div><div style="font-family: Verdana,sans-serif;">[0] <a href="http://siesta.cs.wustl.edu/%7Eschmidt/ACE.html">Adaptive CommunicationEnvironment (ACE)</a> o-o network programming toolkit in C++<br />
[0] <a href="http://www.cs.man.ac.uk/arch/people/j-seward/index.html">Bzip</a> a losslessstatistical data compressor, uses Burrows-Wheeler<br />
[0] <a href="http://www.eekim.com/software/cgihtml/">cgihtml</a> C library for writingCommon Gateway Interface (CGI) programs<br />
[0] <a href="http://www.int.com/linux.html">Charting and Table Widgets</a> INT's table andcharting tools, EditTable and ChartObject<br />
[0] <a href="http://www.felinia.com/cpt">Counterpoint</a> mechanism for comm/synch amongelements of a parallel program<br />
[0] <a href="http://www-swiss.ai.mit.edu/%7Ejaffer/DLD.html">DLD</a> a library package of Cfunctions that performs "dynamic link editing"<br />
[0] <a href="http://www.mpae.gwdg.de/dislin/dislin.html">DISLIN</a> graphics library fordisplaying data as curves, bar graphs, pie charts, etc.<br />
[0] <a href="http://www.ma.utexas.edu/%7Emzou/EZWGL/">EZWGL</a> Motif-like widgets andOpenGL-like graphics library for X window system<br />
[0] <a href="http://synergy.caltech.edu/%7Eggi/">GGI</a> the Linux General GraphicsInterface drivers and libraries<br />
[0] <a href="http://linas.org/gle/index.html">GLE Tubing and Extrusion Library</a> OpenGLbased graphics API library<br />
[0] <a href="http://www.gnustep.org/">GNUstep Database Library</a> Objective-C classes fordeveloping database applications.<br />
[0] <a href="http://www.spektracom.de/%7Earndt/joerg.html#hfloat">hfloat</a> library packagefor calcs with fp numbers of extreme precision<br />
[0] <a href="http://www.cco.caltech.edu/%7Ejafl/jx/">JX</a> a C++ application framework andGUI class library for X Windows<br />
[0] <a href="http://wwwatnf.atnf.csiro.au/karma/">Karma</a> a general purpose programmerstoolkit library<br />
[0] <a href="http://jade.cs.uct.ac.za/kunf/">Kunf Library</a> a library to store andaccess configuration data<br />
[0] <a href="http://nils.wustl.edu/schiotz/lapack-linux.html">LAPACK and BLAS for Linux(ELF, g77)</a> FORTRAN library that does linear algebra operations<br />
[0] <a href="http://www.lesstif.org/">LessTif</a> Hungry Programmers' version of OSF/Motif<br />
[0] <a href="http://www.ozemail.com.au/%7Ekeithw/">Lib3d</a> high performance 3d library forX windows<br />
[0] <a href="http://www.imaxx.net/%7Ethrytis/glibc/">Libc 2 (GNU)</a> the GNU C library andLinux<br />
[0] <a href="http://www.interchg.ubc.ca/janke/linteger.html">LInteger</a> C++ libraryperforms arithmetic on objects representing integers<br />
[0] <a href="http://pauillac.inria.fr/%7Exleroy/linuxthreads/">LinuxThreads Library</a> animplementation of the Posix 1003.1c thread package for Linux<br />
[0] <a href="http://www.infosys.tuwien.ac.at/Staff/lux/marco/lzo.html">LZO</a> datacompression library suitable for data de-/compression in real-time<br />
[0] <a href="http://www.mathtools.com/">MAT<lib></lib></a> Matlab Compatible C++ Matrix Class Libraryfor scientific C++ code<br />
[0] <a href="http://www.ssec.wisc.edu/%7Ebrianp/Mesa.html">Mesa 3-D Graphics Library</a> 3-Dgraphics library with an API very similar to OpenGL<br />
[0] <a href="http://www.ifi.unizh.ch/groups/mml/projects/met++/met++.html">MET++Multimedia Application Framework</a> a reusable multimedia framework library<br />
[0] <a href="http://www.neurondata.com/Download/mwl_dl.html">Microline Widget Library</a>widget library used to build UNIX Netscape free for Linux<br />
[0] <a href="http://www.fwb.gulf.net/%7Edwsauder/mimepp.html">MIME++</a> C++ class libraryfor parsing, creating, or modifying MIME messages<br />
[0] <a href="http://www.volftp.vol.it/IT/IT/ITALIANI/MORELLO/index_e.htm">MGUI</a>cross-platform GUI library with a designing tool<br />
[$] <a href="http://www.metrolink.com/products/motif/index.html">Motif 2.0.0 for Linux</a>commercial Motif libraries from MetroLink<br />
[0] <a href="http://www.mcs.anl.gov/mpi/index.html">MPI</a> a message passing interfacefor parallel programming<br />
[0] <a href="http://www.inf.ufrgs.br/%7Ekojima/nextaw/index.html">neXtaw</a> a N*XTSTEP lookreplacement library for Xaw (the Athena widget set)<br />
[0] <a href="http://www.iah.com/oa/">Object Access</a> re-usable library routines<br />
[0] <a href="http://www.orl.co.uk/omniORB">omniORB2</a> free CORBA 2 implementation byOlivetti and Oracle research labs<br />
[0] <a href="http://www.sybase.com/products/samples/linux/">OpenClient CT-Library</a> OpenClient/C for LINUX from Sybase<br />
[0] <a href="http://www.aa.net/%7Emtp/PCthreads.html">POSIX and DCE Threads</a>multithreading libraries based on POSIX.1c<br />
[0] <a href="http://www.shore.net/%7Epip/qplot.htm">Qplot</a> C graphics library for drawingcolor plots, displays the window in X<br />
[0] <a href="http://www.eecg.toronto.edu/%7Ecolohan/quarks.html">Quarks</a> library can takea network of computers and turn them into a single computer<br />
[0] <a href="http://www.troll.no/">Qt</a> high-performance C++ class library provides GUIAPI across Win95, NT, UNIX/X<br />
[$] <a href="http://www.redhat.com/products/rhm.html">Red Hat Motif 2.0</a> full 0SF/Motif2.0 development system from Red Hat<br />
[0] <a href="http://www.egerter.com/seal">Seal</a> a mod/s3m/mtm/xm sound library API<br />
[0] <a href="http://www.cs.uwyo.edu/%7Ehaines/research/smart">SmartFiles</a> library forbuilding object-oriented data files<br />
[0] <a href="http://student.uq.edu.au/%7Es002434/qt/SpriteField/doc/html/">SpriteField ClassSet</a> library for moving graphics with Qt (C++, X11)<br />
[0] <a href="http://www.schwaben.de/home/uz/spunk.eng.html">SPUNK</a> a cross-platform C++class library for writing textmode applications<br />
[0] <a href="http://wild.ch/SpunkCross/">SpunkCross API (SCAPI)</a> C++ cross-platformframework for GUI development<br />
[0] <a href="http://www.cs.rpi.edu/%7Emusser/stl.html">Standard Template Library</a> HP'sversion of the C++ STL for use with g++<br />
[0] <a href="http://www.lasermoon.co.uk/catalog/guis/swim.htm">SWiM</a> OSF/Motif 2.0 fromGUI Corporation<br />
[0] <a href="http://www.neuroinformatik.ruhr-uni-bochum.de/ini/PEOPLE/rmz/t1lib.html">t1lib</a>a library for generating Bitmaps from Adobe Type 1 Fonts<br />
[0] <a href="http://www.xpi.com/tix">Tix</a> a set of widget extensions for Tcl/Tk<br />
[0] <a href="http://www.cs.princeton.edu/%7Ejlk/tksh/">tksh</a> version of Tcl C librarywritten on top of the library for KornShell<br />
[0] <a href="http://www.interads.co.uk/%7Ecrh/ubiqx/">Ubiqx Trees</a> binary, AVL heightbalanced and splay trees, lists and more<br />
[0] <a href="http://www.uno.com/faq.html">WM_MOTIF Lite</a> MS Windows API user interfacefunctions on Motif<br />
[0] <a href="http://soback.kornet.nm.kr/%7Eglgay/">Xarm</a> a C++ Wrapper library for Motifand Xmext library<br />
[0] <a href="http://logic.csc.cuhk.edu.hk/%7Es947547/Xaw95/Xaw95.html">Xaw95 Widgets</a>widget library to give a MS-Win95 like interface<br />
[0] <a href="http://www.zip.com.au/%7Ebb/XawXpm/">Xaw-Xpm</a> an improved version ofXaw(3d), the standard Athena Widget set.<br />
[0] <a href="http://sal.kachinatech.com/F/5/XFORMS4PERL.html">Xforms4Perl</a> an extensionto Perl that provides access to the xforms library<br />
[0] <a href="http://zenon.inria.fr:8003/koala/lehors/xpm.html">XPM Format and Library</a>C library and ASCII image format for X Pixmaps<br />
[$] <a href="http://www.klg.com/products/index.html">XRT Widgets</a> family of widgets forMotif developers<br />
[0] <a href="http://www.cs.sc.edu/%7Esridhar/yacl.html">YACL</a> Yet Another (C++) ClassLibrary<br />
[0] <a href="http://www.thp.uni-duisburg.de/Ygl/ReadMe.html">Ygl</a> emulates SGI's GLroutines under X11<br />
[0] <a href="http://linux.wauug.org/pub/knaff/zlibc">Zlibc</a> allows executables touncompress their datafiles on the fly</div>Surenhttp://www.blogger.com/profile/09789784724534128579noreply@blogger.com0tag:blogger.com,1999:blog-5123376846625329520.post-88577428201238106712010-11-05T17:19:00.000+05:302010-11-05T17:19:30.723+05:30PORT LOOK UP<table cellspacing="1" class="main" id="tbl1" style="font-family: Verdana,sans-serif;"><tbody>
<tr><th><b>Port</b></th><th><b>Type</b></th><th><b>Keyword</b></th><th><b>Description</b></th><th><b>Trojan info</b></th></tr>
<tr><td class="r"><b>0</b></td><td><b>TCP</b></td><td><b><br />
</b></td><td><b>Reserved</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>0</b></td><td><b>UDP</b></td><td><b><br />
</b></td><td><b>Reserved</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>1</b></td><td><b>TCP</b></td><td><b>tcpmux</b></td><td><b>TCP Port Service Multiplexer</b></td><td><b>Breach, SocketsDeTroie</b></td></tr>
<tr><td class="r"><b>1</b></td><td><b>UDP</b></td><td><b>tcpmux</b></td><td><b>TCP Port Service Multiplexerhttp://www.blogger.com/post-create.g?blogID=5123376846625329520</b></td><td><b>Sockets des Troie, SocketsDeTroie</b></td></tr>
<tr><td class="r"><b>2</b></td><td><b>TCP</b></td><td><b>compressnet</b></td><td><b>Management Utility</b></td><td><b>Death</b></td></tr>
<tr><td class="r"><b>2</b></td><td><b>UDP</b></td><td><b>compressnet</b></td><td><b>Management Utility</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>3</b></td><td><b>TCP</b></td><td><b>compressnet</b></td><td><b>Compression Process</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>3</b></td><td><b>UDP</b></td><td><b>compressnet</b></td><td><b>Compression Process</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>5</b></td><td><b>TCP</b></td><td><b>rje</b></td><td><b>Remote Job Entry</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>5</b></td><td><b>UDP</b></td><td><b>rje</b></td><td><b>Remote Job Entry</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>7</b></td><td><b>TCP</b></td><td><b>echo</b></td><td><b>Echo</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>7</b></td><td><b>UDP</b></td><td><b>echo</b></td><td><b>Echo</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>9</b></td><td><b>TCP</b></td><td><b>discard</b></td><td><b>Discard</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>9</b></td><td><b>UDP</b></td><td><b>discard</b></td><td><b>Discard</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>11</b></td><td><b>TCP</b></td><td><b>systat</b></td><td><b>Active Users</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>11</b></td><td><b>UDP</b></td><td><b>systat</b></td><td><b>Active Users</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>13</b></td><td><b>TCP</b></td><td><b>daytime</b></td><td><b>Daytime (RFC 867)</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>13</b></td><td><b>UDP</b></td><td><b>daytime</b></td><td><b>Daytime (RFC 867)</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>15</b></td><td><b>TCP</b></td><td><b><br />
</b></td><td><b><br />
</b></td><td><b>B2</b></td></tr>
<tr><td class="r"><b>17</b></td><td><b>TCP</b></td><td><b>qotd</b></td><td><b>Quote of the Day</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>17</b></td><td><b>UDP</b></td><td><b>qotd</b></td><td><b>Quote of the Day</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>18</b></td><td><b>TCP</b></td><td><b>msp</b></td><td><b>Message Send Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>18</b></td><td><b>UDP</b></td><td><b>msp</b></td><td><b>Message Send Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>19</b></td><td><b>TCP</b></td><td><b>chargen</b></td><td><b>Character Generator</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>19</b></td><td><b>UDP</b></td><td><b>chargen</b></td><td><b>Character Generator</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>20</b></td><td><b>TCP</b></td><td><b>ftp-data</b></td><td><b>File Transfer [Default Data]</b></td><td><b>Senna Spy FTP server</b></td></tr>
<tr><td class="r"><b>20</b></td><td><b>UDP</b></td><td><b>ftp-data</b></td><td><b>File Transfer [Default Data]</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>21</b></td><td><b>TCP</b></td><td><b>ftp</b></td><td><b>File Transfer [Control]</b></td><td><b>Back Construction, Blade Runner, Cattivik FTP Server, CC Invader, Dark FTP, Doly Trojan, Fore, FreddyK, Invisible FTP, Juggernaut 42, Larva, MotIv FTP, Net Administrator, Ramen, RTB 666, Senna Spy FTP server, The Flu, Traitor 21, WebEx, WinCrash</b></td></tr>
<tr><td class="r"><b>21</b></td><td><b>UDP</b></td><td><b>ftp</b></td><td><b>File Transfer [Control]</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>22</b></td><td><b>TCP</b></td><td><b>ssh</b></td><td><b>SSH Remote Login Protocol</b></td><td><b>Adore sshd, Shaft</b></td></tr>
<tr><td class="r"><b>22</b></td><td><b>UDP</b></td><td><b>ssh</b></td><td><b>SSH Remote Login Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>23</b></td><td><b>TCP</b></td><td><b>telnet</b></td><td><b>Telnet</b></td><td><b>ADM worm, Fire HacKer, My Very Own trojan, RTB 666, Telnet Pro, Tiny Telnet Server - TTS, Truva Atl</b></td></tr>
<tr><td class="r"><b>23</b></td><td><b>UDP</b></td><td><b>telnet</b></td><td><b>Telnet</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>24</b></td><td><b>TCP</b></td><td><b><br />
</b></td><td><b>any private mail system</b></td><td><b>Back Orifice 2000 (BO2K) Control Port</b></td></tr>
<tr><td class="r"><b>24</b></td><td><b>UDP</b></td><td><b><br />
</b></td><td><b>any private mail system</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>25</b></td><td><b>TCP</b></td><td><b>smtp</b></td><td><b>Simple Mail Transfer</b></td><td><b>Ajan, Antigen, Barok, BSE, Email Password Sender - EPS, EPS II, Gip, Gris, Happy99, Hpteam mail, Hybris, I love you, Kuang2, Magic Horse, MBT (Mail Bombing Trojan), Moscow Email trojan, Naebi, NewApt worm, ProMail trojan, Shtirlitz, Stealth, Stukach, Tapiras, Terminator, WinPC, WinSpy</b></td></tr>
<tr><td class="r"><b>25</b></td><td><b>UDP</b></td><td><b>smtp</b></td><td><b>Simple Mail Transfer</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>27</b></td><td><b>TCP</b></td><td><b>nsw-fe</b></td><td><b>NSW User System FE</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>27</b></td><td><b>UDP</b></td><td><b>nsw-fe</b></td><td><b>NSW User System FE</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>28</b></td><td><b>TCP</b></td><td><b><br />
</b></td><td><b><br />
</b></td><td><b>Amanda</b></td></tr>
<tr><td class="r"><b>29</b></td><td><b>TCP</b></td><td><b>msg-icp</b></td><td><b>MSG ICP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>29</b></td><td><b>UDP</b></td><td><b>msg-icp</b></td><td><b>MSG ICP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>30</b></td><td><b>TCP</b></td><td><b><br />
</b></td><td><b><br />
</b></td><td><b>Agent 40421</b></td></tr>
<tr><td class="r"><b>31</b></td><td><b>TCP</b></td><td><b>msg-auth</b></td><td><b>MSG Authentication</b></td><td><b>Agent 31, Hackers Paradise, Masters Paradise, MastersParadise</b></td></tr>
<tr><td class="r"><b>31</b></td><td><b>UDP</b></td><td><b>msg-auth</b></td><td><b>MSG Authentication</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>33</b></td><td><b>TCP</b></td><td><b>dsp</b></td><td><b>Display Support Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>33</b></td><td><b>UDP</b></td><td><b>dsp</b></td><td><b>Display Support Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>35</b></td><td><b>TCP</b></td><td><b><br />
</b></td><td><b>any private printer server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>35</b></td><td><b>UDP</b></td><td><b><br />
</b></td><td><b>any private printer server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>37</b></td><td><b>TCP</b></td><td><b>time</b></td><td><b>Time</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>37</b></td><td><b>UDP</b></td><td><b>time</b></td><td><b>Time</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>38</b></td><td><b>TCP</b></td><td><b>rap</b></td><td><b>Route Access Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>38</b></td><td><b>UDP</b></td><td><b>rap</b></td><td><b>Route Access Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>39</b></td><td><b>TCP</b></td><td><b>rlp</b></td><td><b>Resource Location Protocol</b></td><td><b>SubSARI</b></td></tr>
<tr><td class="r"><b>39</b></td><td><b>UDP</b></td><td><b>rlp</b></td><td><b>Resource Location Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>41</b></td><td><b>TCP</b></td><td><b>graphics</b></td><td><b>Graphics</b></td><td><b>Deep Throat, Foreplay or Reduced Foreplay</b></td></tr>
<tr><td class="r"><b>41</b></td><td><b>UDP</b></td><td><b>graphics</b></td><td><b>Graphics</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>42</b></td><td><b>TCP</b></td><td><b>nameserver</b></td><td><b>Host Name Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>42</b></td><td><b>UDP</b></td><td><b>nameserver</b></td><td><b>Host Name Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>43</b></td><td><b>TCP</b></td><td><b>nicname</b></td><td><b>Who Is</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>43</b></td><td><b>UDP</b></td><td><b>nicname</b></td><td><b>Who Is</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>44</b></td><td><b>TCP</b></td><td><b>mpm-flags</b></td><td><b>MPM FLAGS Protocol</b></td><td><b>Arctic</b></td></tr>
<tr><td class="r"><b>44</b></td><td><b>UDP</b></td><td><b>mpm-flags</b></td><td><b>MPM FLAGS Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>45</b></td><td><b>TCP</b></td><td><b>mpm</b></td><td><b>Message Processing Module [recv]</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>45</b></td><td><b>UDP</b></td><td><b>mpm</b></td><td><b>Message Processing Module [recv]</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>46</b></td><td><b>TCP</b></td><td><b>mpm-snd</b></td><td><b>MPM [default send]</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>46</b></td><td><b>UDP</b></td><td><b>mpm-snd</b></td><td><b>MPM [default send]</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>47</b></td><td><b>TCP</b></td><td><b>ni-ftp</b></td><td><b>NI FTP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>47</b></td><td><b>UDP</b></td><td><b>ni-ftp</b></td><td><b>NI FTP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>48</b></td><td><b>TCP</b></td><td><b>auditd</b></td><td><b>Digital Audit Daemon</b></td><td><b>DRAT</b></td></tr>
<tr><td class="r"><b>48</b></td><td><b>UDP</b></td><td><b>auditd</b></td><td><b>Digital Audit Daemon</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>49</b></td><td><b>TCP</b></td><td><b>tacacs</b></td><td><b>Login Host Protocol (TACACS)</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>49</b></td><td><b>UDP</b></td><td><b>tacacs</b></td><td><b>Login Host Protocol (TACACS)</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>50</b></td><td><b>TCP</b></td><td><b>re-mail-ck</b></td><td><b>Remote Mail Checking Protocol</b></td><td><b>DRAT</b></td></tr>
<tr><td class="r"><b>50</b></td><td><b>UDP</b></td><td><b>re-mail-ck</b></td><td><b>Remote Mail Checking Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>51</b></td><td><b>TCP</b></td><td><b>la-maint</b></td><td><b>IMP Logical Address Maintenance</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>51</b></td><td><b>UDP</b></td><td><b>la-maint</b></td><td><b>IMP Logical Address Maintenance</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>52</b></td><td><b>TCP</b></td><td><b>xns-time</b></td><td><b>XNS Time Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>52</b></td><td><b>UDP</b></td><td><b>xns-time</b></td><td><b>XNS Time Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>53</b></td><td><b>TCP</b></td><td><b>domain</b></td><td><b>Domain Name Server</b></td><td><b>ADM worm, Lion</b></td></tr>
<tr><td class="r"><b>53</b></td><td><b>UDP</b></td><td><b>domain</b></td><td><b>Domain Name Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>54</b></td><td><b>TCP</b></td><td><b>xns-ch</b></td><td><b>XNS Clearinghouse</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>54</b></td><td><b>UDP</b></td><td><b>xns-ch</b></td><td><b>XNS Clearinghouse</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>55</b></td><td><b>TCP</b></td><td><b>isi-gl</b></td><td><b>ISI Graphics Language</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>55</b></td><td><b>UDP</b></td><td><b>isi-gl</b></td><td><b>ISI Graphics Language</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>56</b></td><td><b>TCP</b></td><td><b>xns-auth</b></td><td><b>XNS Authentication</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>56</b></td><td><b>UDP</b></td><td><b>xns-auth</b></td><td><b>XNS Authentication</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>57</b></td><td><b>TCP</b></td><td><b><br />
</b></td><td><b>any private terminal access</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>57</b></td><td><b>UDP</b></td><td><b><br />
</b></td><td><b>any private terminal access</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>58</b></td><td><b>TCP</b></td><td><b>xns-mail</b></td><td><b>XNS Mail</b></td><td><b>DMSetup</b></td></tr>
<tr><td class="r"><b>58</b></td><td><b>UDP</b></td><td><b>xns-mail</b></td><td><b>XNS Mail</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>59</b></td><td><b>TCP</b></td><td><b><br />
</b></td><td><b>any private file service</b></td><td><b>DMSetup</b></td></tr>
<tr><td class="r"><b>59</b></td><td><b>UDP</b></td><td><b><br />
</b></td><td><b>any private file service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>60</b></td><td><b>TCP</b></td><td><b><br />
</b></td><td><b>Unassigned</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>60</b></td><td><b>UDP</b></td><td><b><br />
</b></td><td><b>Unassigned</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>61</b></td><td><b>TCP</b></td><td><b>ni-mail</b></td><td><b>NI MAIL</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>61</b></td><td><b>UDP</b></td><td><b>ni-mail</b></td><td><b>NI MAIL</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>62</b></td><td><b>TCP</b></td><td><b>acas</b></td><td><b>ACA Services</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>62</b></td><td><b>UDP</b></td><td><b>acas</b></td><td><b>ACA Services</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>63</b></td><td><b>TCP</b></td><td><b>whois++</b></td><td><b>whois++</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>63</b></td><td><b>UDP</b></td><td><b>whois++</b></td><td><b>whois++</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>64</b></td><td><b>TCP</b></td><td><b>covia</b></td><td><b>Communications Integrator (CI)</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>64</b></td><td><b>UDP</b></td><td><b>covia</b></td><td><b>Communications Integrator (CI)</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>65</b></td><td><b>TCP</b></td><td><b>tacacs-ds</b></td><td><b>TACACS-Database Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>65</b></td><td><b>UDP</b></td><td><b>tacacs-ds</b></td><td><b>TACACS-Database Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>66</b></td><td><b>TCP</b></td><td><b>sql*net</b></td><td><b>Oracle SQL*NET</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>66</b></td><td><b>UDP</b></td><td><b>sql*net</b></td><td><b>Oracle SQL*NET</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>67</b></td><td><b>TCP</b></td><td><b>bootps</b></td><td><b>Bootstrap Protocol Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>67</b></td><td><b>UDP</b></td><td><b>bootps</b></td><td><b>Bootstrap Protocol Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>68</b></td><td><b>TCP</b></td><td><b>bootpc</b></td><td><b>Bootstrap Protocol Client</b></td><td><b>Subseven</b></td></tr>
<tr><td class="r"><b>68</b></td><td><b>UDP</b></td><td><b>bootpc</b></td><td><b>Bootstrap Protocol Client</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>69</b></td><td><b>TCP</b></td><td><b>tftp</b></td><td><b>Trivial File Transfer</b></td><td><b>BackGate</b></td></tr>
<tr><td class="r"><b>69</b></td><td><b>UDP</b></td><td><b>tftp</b></td><td><b>Trivial File Transfer</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>70</b></td><td><b>TCP</b></td><td><b>gopher</b></td><td><b>Gopher</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>70</b></td><td><b>UDP</b></td><td><b>gopher</b></td><td><b>Gopher</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>71</b></td><td><b>TCP</b></td><td><b>netrjs-1</b></td><td><b>Remote Job Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>71</b></td><td><b>UDP</b></td><td><b>netrjs-1</b></td><td><b>Remote Job Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>72</b></td><td><b>TCP</b></td><td><b>netrjs-2</b></td><td><b>Remote Job Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>72</b></td><td><b>UDP</b></td><td><b>netrjs-2</b></td><td><b>Remote Job Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>73</b></td><td><b>TCP</b></td><td><b>netrjs-3</b></td><td><b>Remote Job Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>73</b></td><td><b>UDP</b></td><td><b>netrjs-3</b></td><td><b>Remote Job Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>74</b></td><td><b>TCP</b></td><td><b>netrjs-4</b></td><td><b>Remote Job Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>74</b></td><td><b>UDP</b></td><td><b>netrjs-4</b></td><td><b>Remote Job Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>75</b></td><td><b>TCP</b></td><td><b><br />
</b></td><td><b>any private dial out service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>75</b></td><td><b>UDP</b></td><td><b><br />
</b></td><td><b>any private dial out service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>76</b></td><td><b>TCP</b></td><td><b>deos</b></td><td><b>Distributed External Object Store</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>76</b></td><td><b>UDP</b></td><td><b>deos</b></td><td><b>Distributed External Object Store</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>77</b></td><td><b>TCP</b></td><td><b><br />
</b></td><td><b>any private RJE service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>77</b></td><td><b>UDP</b></td><td><b><br />
</b></td><td><b>any private RJE service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>78</b></td><td><b>TCP</b></td><td><b>vettcp</b></td><td><b>vettcp</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>78</b></td><td><b>UDP</b></td><td><b>vettcp</b></td><td><b>vettcp</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>79</b></td><td><b>TCP</b></td><td><b>finger</b></td><td><b>Finger</b></td><td><b>CDK, Firehotcker</b></td></tr>
<tr><td class="r"><b>79</b></td><td><b>UDP</b></td><td><b>finger</b></td><td><b>Finger</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>80</b></td><td><b>TCP</b></td><td><b>www-http</b></td><td><b>World Wide Web HTTP</b></td><td><b>711 trojan (Seven Eleven), AckCmd, Back End, Back Orifice 2000 Plug-Ins, Cafeini, CGI Backdoor, Code Red, Executor, God Message, God Message 4 Creator, Hooker, IISworm, MTX, NCX, Nimda, Noob, Ramen, Reverse WWW Tunnel Backdoor, RingZero, RTB 666, Seeker, WAN Remote, Web Server CT, WebDownloader</b></td></tr>
<tr><td class="r"><b>80</b></td><td><b>UDP</b></td><td><b>www-http</b></td><td><b>World Wide Web HTTP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>81</b></td><td><b>TCP</b></td><td><b>hosts2-ns</b></td><td><b>HOSTS2 Name Server</b></td><td><b>RemoConChubo</b></td></tr>
<tr><td class="r"><b>81</b></td><td><b>UDP</b></td><td><b>hosts2-ns</b></td><td><b>HOSTS2 Name Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>82</b></td><td><b>TCP</b></td><td><b>xfer</b></td><td><b>XFER Utility</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>82</b></td><td><b>UDP</b></td><td><b>xfer</b></td><td><b>XFER Utility</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>83</b></td><td><b>TCP</b></td><td><b>mit-ml-dev</b></td><td><b>MIT ML Device</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>83</b></td><td><b>UDP</b></td><td><b>mit-ml-dev</b></td><td><b>MIT ML Device</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>84</b></td><td><b>TCP</b></td><td><b>ctf</b></td><td><b>Common Trace Facility</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>84</b></td><td><b>UDP</b></td><td><b>ctf</b></td><td><b>Common Trace Facility</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>85</b></td><td><b>TCP</b></td><td><b>mit-ml-dev</b></td><td><b>MIT ML Device</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>85</b></td><td><b>UDP</b></td><td><b>mit-ml-dev</b></td><td><b>MIT ML Device</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>86</b></td><td><b>TCP</b></td><td><b>mfcobol</b></td><td><b>Micro Focus Cobol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>86</b></td><td><b>UDP</b></td><td><b>mfcobol</b></td><td><b>Micro Focus Cobol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>87</b></td><td><b>TCP</b></td><td><b><br />
</b></td><td><b>any private terminal link</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>87</b></td><td><b>UDP</b></td><td><b><br />
</b></td><td><b>any private terminal link</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>88</b></td><td><b>TCP</b></td><td><b>kerberos</b></td><td><b>Kerberos</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>88</b></td><td><b>UDP</b></td><td><b>kerberos</b></td><td><b>Kerberos</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>89</b></td><td><b>TCP</b></td><td><b>su-mit-tg</b></td><td><b>SU/MIT Telnet Gateway</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>89</b></td><td><b>UDP</b></td><td><b>su-mit-tg</b></td><td><b>SU/MIT Telnet Gateway</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>90</b></td><td><b>TCP</b></td><td><b>dnsix</b></td><td><b>DNSIX Securit Attribute Token Map</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>90</b></td><td><b>UDP</b></td><td><b>dnsix</b></td><td><b>DNSIX Securit Attribute Token Map</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>91</b></td><td><b>TCP</b></td><td><b>mit-dov</b></td><td><b>MIT Dover Spooler</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>91</b></td><td><b>UDP</b></td><td><b>mit-dov</b></td><td><b>MIT Dover Spooler</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>92</b></td><td><b>TCP</b></td><td><b>npp</b></td><td><b>Network Printing Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>92</b></td><td><b>UDP</b></td><td><b>npp</b></td><td><b>Network Printing Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>93</b></td><td><b>TCP</b></td><td><b>dcp</b></td><td><b>Device Control Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>93</b></td><td><b>UDP</b></td><td><b>dcp</b></td><td><b>Device Control Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>94</b></td><td><b>TCP</b></td><td><b>objcall</b></td><td><b>Tivoli Object Dispatcher</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>94</b></td><td><b>UDP</b></td><td><b>objcall</b></td><td><b>Tivoli Object Dispatcher</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>95</b></td><td><b>TCP</b></td><td><b>supdup</b></td><td><b>SUPDUP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>95</b></td><td><b>UDP</b></td><td><b>supdup</b></td><td><b>SUPDUP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>96</b></td><td><b>TCP</b></td><td><b>dixie</b></td><td><b>DIXIE Protocol Specification</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>96</b></td><td><b>UDP</b></td><td><b>dixie</b></td><td><b>DIXIE Protocol Specification</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>97</b></td><td><b>TCP</b></td><td><b>swift-rvf</b></td><td><b>Swift Remote Virtural File Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>97</b></td><td><b>UDP</b></td><td><b>swift-rvf</b></td><td><b>Swift Remote Virtural File Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>98</b></td><td><b>TCP</b></td><td><b>tacnews</b></td><td><b>TAC News</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>98</b></td><td><b>UDP</b></td><td><b>tacnews</b></td><td><b>TAC News</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>99</b></td><td><b>TCP</b></td><td><b>metagram</b></td><td><b>Metagram Relay</b></td><td><b>Hidden Port, Mandragore, NCX</b></td></tr>
<tr><td class="r"><b>99</b></td><td><b>UDP</b></td><td><b>metagram</b></td><td><b>Metagram Relay</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>100</b></td><td><b>TCP</b></td><td><b>newacct</b></td><td><b>[unauthorized use]</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>101</b></td><td><b>TCP</b></td><td><b>hostname</b></td><td><b>NIC Host Name Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>101</b></td><td><b>UDP</b></td><td><b>hostname</b></td><td><b>NIC Host Name Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>102</b></td><td><b>TCP</b></td><td><b>iso-tsap</b></td><td><b>ISO-TSAP Class 0</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>102</b></td><td><b>UDP</b></td><td><b>iso-tsap</b></td><td><b>ISO-TSAP Class 0</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>103</b></td><td><b>TCP</b></td><td><b>gppitnp</b></td><td><b>Genesis Point-to-Point Trans Net</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>103</b></td><td><b>UDP</b></td><td><b>gppitnp</b></td><td><b>Genesis Point-to-Point Trans Net</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>104</b></td><td><b>TCP</b></td><td><b>acr-nema</b></td><td><b>ACR-NEMA Digital Imag. &</b></td><td><b> Comm. 300</b></td></tr>
<tr><td class="r"><b>104</b></td><td><b>UDP</b></td><td><b>acr-nema</b></td><td><b>ACR-NEMA Digital Imag. &</b></td><td><b> Comm. 300</b></td></tr>
<tr><td class="r"><b>105</b></td><td><b>TCP</b></td><td><b>csnet-ns</b></td><td><b>Mailbox Name Nameserver</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>105</b></td><td><b>UDP</b></td><td><b>csnet-ns</b></td><td><b>Mailbox Name Nameserver</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>106</b></td><td><b>TCP</b></td><td><b>3com-tsmux</b></td><td><b>3COM-TSMUX</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>106</b></td><td><b>UDP</b></td><td><b>3com-tsmux</b></td><td><b>3COM-TSMUX</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>107</b></td><td><b>TCP</b></td><td><b>rtelnet</b></td><td><b>Remote Telnet Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>107</b></td><td><b>UDP</b></td><td><b>rtelnet</b></td><td><b>Remote Telnet Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>108</b></td><td><b>TCP</b></td><td><b>snagas</b></td><td><b>SNA Gateway Access Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>108</b></td><td><b>UDP</b></td><td><b>snagas</b></td><td><b>SNA Gateway Access Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>109</b></td><td><b>TCP</b></td><td><b>pop2</b></td><td><b>Post Office Protocol - Version 2</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>109</b></td><td><b>UDP</b></td><td><b>pop2</b></td><td><b>Post Office Protocol - Version 2</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>110</b></td><td><b>TCP</b></td><td><b>pop3</b></td><td><b>Post Office Protocol - Version 3</b></td><td><b>ProMail trojan</b></td></tr>
<tr><td class="r"><b>110</b></td><td><b>UDP</b></td><td><b>pop3</b></td><td><b>Post Office Protocol - Version 3</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>111</b></td><td><b>TCP</b></td><td><b>sunrpc</b></td><td><b>SUN Remote Procedure Call</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>111</b></td><td><b>UDP</b></td><td><b>sunrpc</b></td><td><b>SUN Remote Procedure Call</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>112</b></td><td><b>TCP</b></td><td><b>mcidas</b></td><td><b>McIDAS Data Transmission Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>112</b></td><td><b>UDP</b></td><td><b>mcidas</b></td><td><b>McIDAS Data Transmission Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>113</b></td><td><b>TCP</b></td><td><b>auth</b></td><td><b>Authentication Service</b></td><td><b>Invisible Identd Deamon, Kazimas</b></td></tr>
<tr><td class="r"><b>113</b></td><td><b>UDP</b></td><td><b>auth</b></td><td><b>Authentication Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>115</b></td><td><b>TCP</b></td><td><b>sftp</b></td><td><b>Simple File Transfer Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>115</b></td><td><b>UDP</b></td><td><b>sftp</b></td><td><b>Simple File Transfer Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>116</b></td><td><b>TCP</b></td><td><b>ansanotify</b></td><td><b>ANSA REX Notify</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>116</b></td><td><b>UDP</b></td><td><b>ansanotify</b></td><td><b>ANSA REX Notify</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>117</b></td><td><b>TCP</b></td><td><b>uucp-path</b></td><td><b>UUCP Path Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>117</b></td><td><b>UDP</b></td><td><b>uucp-path</b></td><td><b>UUCP Path Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>118</b></td><td><b>TCP</b></td><td><b>sqlserv</b></td><td><b>SQL Services</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>118</b></td><td><b>UDP</b></td><td><b>sqlserv</b></td><td><b>SQL Services</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>119</b></td><td><b>TCP</b></td><td><b>nntp</b></td><td><b>Network News Transfer Protocol</b></td><td><b>Happy99</b></td></tr>
<tr><td class="r"><b>119</b></td><td><b>UDP</b></td><td><b>nntp</b></td><td><b>Network News Transfer Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>120</b></td><td><b>TCP</b></td><td><b>cfdptkt</b></td><td><b>CFDPTKT</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>120</b></td><td><b>UDP</b></td><td><b>cfdptkt</b></td><td><b>CFDPTKT</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>121</b></td><td><b>TCP</b></td><td><b>erpc</b></td><td><b>Encore Expedited Remote Pro.Call</b></td><td><b>Attack Bot, God Message, JammerKillah</b></td></tr>
<tr><td class="r"><b>121</b></td><td><b>UDP</b></td><td><b>erpc</b></td><td><b>Encore Expedited Remote Pro.Call</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>122</b></td><td><b>TCP</b></td><td><b>smakynet</b></td><td><b>SMAKYNET</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>122</b></td><td><b>UDP</b></td><td><b>smakynet</b></td><td><b>SMAKYNET</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>123</b></td><td><b>TCP</b></td><td><b>ntp</b></td><td><b>Network Time Protocol</b></td><td><b>Net Controller</b></td></tr>
<tr><td class="r"><b>123</b></td><td><b>UDP</b></td><td><b>ntp</b></td><td><b>Network Time Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>124</b></td><td><b>TCP</b></td><td><b>ansatrader</b></td><td><b>ANSA REX Trader</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>124</b></td><td><b>UDP</b></td><td><b>ansatrader</b></td><td><b>ANSA REX Trader</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>125</b></td><td><b>TCP</b></td><td><b>locus-map</b></td><td><b>Locus PC-Interface Net Map Ser</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>125</b></td><td><b>UDP</b></td><td><b>locus-map</b></td><td><b>Locus PC-Interface Net Map Ser</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>126</b></td><td><b>TCP</b></td><td><b>nxedit</b></td><td><b>NXEdit</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>126</b></td><td><b>UDP</b></td><td><b>nxedit</b></td><td><b>NXEdit</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>127</b></td><td><b>TCP</b></td><td><b>locus-con</b></td><td><b>Locus PC-Interface Conn Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>127</b></td><td><b>UDP</b></td><td><b>locus-con</b></td><td><b>Locus PC-Interface Conn Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>128</b></td><td><b>TCP</b></td><td><b>gss-xlicen</b></td><td><b>GSS X License Verification</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>128</b></td><td><b>UDP</b></td><td><b>gss-xlicen</b></td><td><b>GSS X License Verification</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>129</b></td><td><b>TCP</b></td><td><b>pwdgen</b></td><td><b>Password Generator Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>129</b></td><td><b>UDP</b></td><td><b>pwdgen</b></td><td><b>Password Generator Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>130</b></td><td><b>TCP</b></td><td><b>cisco-fna</b></td><td><b>cisco FNATIVE</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>130</b></td><td><b>UDP</b></td><td><b>cisco-fna</b></td><td><b>cisco FNATIVE</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>131</b></td><td><b>TCP</b></td><td><b>cisco-tna</b></td><td><b>cisco TNATIVE</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>131</b></td><td><b>UDP</b></td><td><b>cisco-tna</b></td><td><b>cisco TNATIVE</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>132</b></td><td><b>TCP</b></td><td><b>cisco-sys</b></td><td><b>cisco SYSMAINT</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>132</b></td><td><b>UDP</b></td><td><b>cisco-sys</b></td><td><b>cisco SYSMAINT</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>133</b></td><td><b>TCP</b></td><td><b>statsrv</b></td><td><b>Statistics Service</b></td><td><b>Faranz, port 146 - Infector, Farnaz</b></td></tr>
<tr><td class="r"><b>133</b></td><td><b>UDP</b></td><td><b>statsrv</b></td><td><b>Statistics Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>134</b></td><td><b>TCP</b></td><td><b>ingres-net</b></td><td><b>INGRES-NET Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>134</b></td><td><b>UDP</b></td><td><b>ingres-net</b></td><td><b>INGRES-NET Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>135</b></td><td><b>TCP</b></td><td><b>epmap</b></td><td><b>DCE endpoint resolution</b></td><td><b>W32.Blaster.Worm, W32/Lovsan.worm</b></td></tr>
<tr><td class="r"><b>135</b></td><td><b>UDP</b></td><td><b>epmap</b></td><td><b>DCE endpoint resolution</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>136</b></td><td><b>TCP</b></td><td><b>profile</b></td><td><b>PROFILE Naming System</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>136</b></td><td><b>UDP</b></td><td><b>profile</b></td><td><b>PROFILE Naming System</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>137</b></td><td><b>TCP</b></td><td><b>netbios-ns</b></td><td><b>NETBIOS Name Service</b></td><td><b>Chode</b></td></tr>
<tr><td class="r"><b>137</b></td><td><b>UDP</b></td><td><b>netbios-ns</b></td><td><b>NETBIOS Name Service</b></td><td><b>Msinit, Qaz, OpaSoft</b></td></tr>
<tr><td class="r"><b>138</b></td><td><b>TCP</b></td><td><b>netbios-dgm</b></td><td><b>NETBIOS Datagram Service</b></td><td><b>Chode</b></td></tr>
<tr><td class="r"><b>138</b></td><td><b>UDP</b></td><td><b>netbios-dgm</b></td><td><b>NETBIOS Datagram Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>139</b></td><td><b>TCP</b></td><td><b>netbios-ssn</b></td><td><b>NETBIOS Session Service</b></td><td><b>Chode, God Message worm, Msinit, Netlog, Network, Qaz, Sadmind, SMB Relay</b></td></tr>
<tr><td class="r"><b>139</b></td><td><b>UDP</b></td><td><b>netbios-ssn</b></td><td><b>NETBIOS Session Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>140</b></td><td><b>TCP</b></td><td><b>emfis-data</b></td><td><b>EMFIS Data Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>140</b></td><td><b>UDP</b></td><td><b>emfis-data</b></td><td><b>EMFIS Data Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>141</b></td><td><b>TCP</b></td><td><b>emfis-cntl</b></td><td><b>EMFIS Control Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>141</b></td><td><b>UDP</b></td><td><b>emfis-cntl</b></td><td><b>EMFIS Control Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>142</b></td><td><b>TCP</b></td><td><b>bl-idm</b></td><td><b>Britton-Lee IDM</b></td><td><b>NetTaxi</b></td></tr>
<tr><td class="r"><b>142</b></td><td><b>UDP</b></td><td><b>bl-idm</b></td><td><b>Britton-Lee IDM</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>143</b></td><td><b>TCP</b></td><td><b>imap</b></td><td><b>Internet Message Access Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>143</b></td><td><b>UDP</b></td><td><b>imap</b></td><td><b>Internet Message Access Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>144</b></td><td><b>TCP</b></td><td><b>uma</b></td><td><b>Universal Management Architecture</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>144</b></td><td><b>UDP</b></td><td><b>uma</b></td><td><b>Universal Management Architecture</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>145</b></td><td><b>TCP</b></td><td><b>uaac</b></td><td><b>UAAC Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>145</b></td><td><b>UDP</b></td><td><b>uaac</b></td><td><b>UAAC Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>146</b></td><td><b>TCP</b></td><td><b>iso-tp0</b></td><td><b>ISO-IP0</b></td><td><b>Infector</b></td></tr>
<tr><td class="r"><b>146</b></td><td><b>UDP</b></td><td><b>iso-tp0</b></td><td><b>ISO-IP0</b></td><td><b>Infector</b></td></tr>
<tr><td class="r"><b>147</b></td><td><b>TCP</b></td><td><b>iso-ip</b></td><td><b>ISO-IP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>147</b></td><td><b>UDP</b></td><td><b>iso-ip</b></td><td><b>ISO-IP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>148</b></td><td><b>TCP</b></td><td><b>jargon</b></td><td><b>Jargon</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>148</b></td><td><b>UDP</b></td><td><b>jargon</b></td><td><b>Jargon</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>149</b></td><td><b>TCP</b></td><td><b>aed-512</b></td><td><b>AED 512 Emulation Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>149</b></td><td><b>UDP</b></td><td><b>aed-512</b></td><td><b>AED 512 Emulation Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>150</b></td><td><b>TCP</b></td><td><b>sql-net</b></td><td><b>SQL-NET</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>150</b></td><td><b>UDP</b></td><td><b>sql-net</b></td><td><b>SQL-NET</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>151</b></td><td><b>TCP</b></td><td><b>hems</b></td><td><b>HEMS</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>151</b></td><td><b>UDP</b></td><td><b>hems</b></td><td><b>HEMS</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>152</b></td><td><b>TCP</b></td><td><b>bftp</b></td><td><b>Background File Transfer Program</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>152</b></td><td><b>UDP</b></td><td><b>bftp</b></td><td><b>Background File Transfer Program</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>153</b></td><td><b>TCP</b></td><td><b>sgmp</b></td><td><b>SGMP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>153</b></td><td><b>UDP</b></td><td><b>sgmp</b></td><td><b>SGMP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>154</b></td><td><b>TCP</b></td><td><b>netsc-prod</b></td><td><b>NETSC</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>154</b></td><td><b>UDP</b></td><td><b>netsc-prod</b></td><td><b>NETSC</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>155</b></td><td><b>TCP</b></td><td><b>netsc-dev</b></td><td><b>NETSC</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>155</b></td><td><b>UDP</b></td><td><b>netsc-dev</b></td><td><b>NETSC</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>156</b></td><td><b>TCP</b></td><td><b>sqlsrv</b></td><td><b>SQL Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>156</b></td><td><b>UDP</b></td><td><b>sqlsrv</b></td><td><b>SQL Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>157</b></td><td><b>TCP</b></td><td><b>knet-cmp</b></td><td><b>KNET/VM Command/Message Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>157</b></td><td><b>UDP</b></td><td><b>knet-cmp</b></td><td><b>KNET/VM Command/Message Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>158</b></td><td><b>TCP</b></td><td><b>pcmail-srv</b></td><td><b>PCMail Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>158</b></td><td><b>UDP</b></td><td><b>pcmail-srv</b></td><td><b>PCMail Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>159</b></td><td><b>TCP</b></td><td><b>nss-routing</b></td><td><b>NSS-Routing</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>159</b></td><td><b>UDP</b></td><td><b>nss-routing</b></td><td><b>NSS-Routing</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>160</b></td><td><b>TCP</b></td><td><b>sgmp-traps</b></td><td><b>SGMP-TRAPS</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>160</b></td><td><b>UDP</b></td><td><b>sgmp-traps</b></td><td><b>SGMP-TRAPS</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>161</b></td><td><b>TCP</b></td><td><b>snmp</b></td><td><b>SNMP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>161</b></td><td><b>UDP</b></td><td><b>snmp</b></td><td><b>SNMP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>162</b></td><td><b>TCP</b></td><td><b>snmptrap</b></td><td><b>SNMPTRAP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>162</b></td><td><b>UDP</b></td><td><b>snmptrap</b></td><td><b>SNMPTRAP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>163</b></td><td><b>TCP</b></td><td><b>cmip-man</b></td><td><b>CMIP/TCP Manager</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>163</b></td><td><b>UDP</b></td><td><b>cmip-man</b></td><td><b>CMIP/TCP Manager</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>164</b></td><td><b>TCP</b></td><td><b>cmip-agent</b></td><td><b>CMIP/TCP Agent</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>164</b></td><td><b>UDP</b></td><td><b>cmip-agent</b></td><td><b>CMIP/TCP Agent</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>165</b></td><td><b>TCP</b></td><td><b>xns-courier</b></td><td><b>Xerox</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>165</b></td><td><b>UDP</b></td><td><b>xns-courier</b></td><td><b>Xerox</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>166</b></td><td><b>TCP</b></td><td><b>s-net</b></td><td><b>Sirius Systems</b></td><td><b>NokNok</b></td></tr>
<tr><td class="r"><b>166</b></td><td><b>UDP</b></td><td><b>s-net</b></td><td><b>Sirius Systems</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>167</b></td><td><b>TCP</b></td><td><b>namp</b></td><td><b>NAMP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>167</b></td><td><b>UDP</b></td><td><b>namp</b></td><td><b>NAMP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>168</b></td><td><b>TCP</b></td><td><b>rsvd</b></td><td><b>RSVD</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>168</b></td><td><b>UDP</b></td><td><b>rsvd</b></td><td><b>RSVD</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>169</b></td><td><b>TCP</b></td><td><b>send</b></td><td><b>SEND</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>169</b></td><td><b>UDP</b></td><td><b>send</b></td><td><b>SEND</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>170</b></td><td><b>TCP</b></td><td><b>print-srv</b></td><td><b>Network PostScript</b></td><td><b>A-trojan</b></td></tr>
<tr><td class="r"><b>170</b></td><td><b>UDP</b></td><td><b>print-srv</b></td><td><b>Network PostScript</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>171</b></td><td><b>TCP</b></td><td><b>multiplex</b></td><td><b>Network Innovations Multiplex</b></td><td><b>ATrojan</b></td></tr>
<tr><td class="r"><b>171</b></td><td><b>UDP</b></td><td><b>multiplex</b></td><td><b>Network Innovations Multiplex</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>172</b></td><td><b>TCP</b></td><td><b>cl/1</b></td><td><b>Network Innovations CL/1</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>172</b></td><td><b>UDP</b></td><td><b>cl/1</b></td><td><b>Network Innovations CL/1</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>173</b></td><td><b>TCP</b></td><td><b>xyplex-mux</b></td><td><b>Xyplex</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>173</b></td><td><b>UDP</b></td><td><b>xyplex-mux</b></td><td><b>Xyplex</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>174</b></td><td><b>TCP</b></td><td><b>mailq</b></td><td><b>MAILQ</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>174</b></td><td><b>UDP</b></td><td><b>mailq</b></td><td><b>MAILQ</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>175</b></td><td><b>TCP</b></td><td><b>vmnet</b></td><td><b>VMNET</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>175</b></td><td><b>UDP</b></td><td><b>vmnet</b></td><td><b>VMNET</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>176</b></td><td><b>TCP</b></td><td><b>genrad-mux</b></td><td><b>GENRAD-MUX</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>176</b></td><td><b>UDP</b></td><td><b>genrad-mux</b></td><td><b>GENRAD-MUX</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>177</b></td><td><b>TCP</b></td><td><b>xdmcp</b></td><td><b>X Display Manager Control Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>177</b></td><td><b>UDP</b></td><td><b>xdmcp</b></td><td><b>X Display Manager Control Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>178</b></td><td><b>TCP</b></td><td><b>nextstep</b></td><td><b>NextStep Window Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>178</b></td><td><b>UDP</b></td><td><b>nextstep</b></td><td><b>NextStep Window Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>179</b></td><td><b>TCP</b></td><td><b>bgp</b></td><td><b>Border Gateway Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>179</b></td><td><b>UDP</b></td><td><b>bgp</b></td><td><b>Border Gateway Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>180</b></td><td><b>TCP</b></td><td><b>ris</b></td><td><b>Intergraph</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>180</b></td><td><b>UDP</b></td><td><b>ris</b></td><td><b>Intergraph</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>181</b></td><td><b>TCP</b></td><td><b>unify</b></td><td><b>Unify</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>181</b></td><td><b>UDP</b></td><td><b>unify</b></td><td><b>Unify</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>182</b></td><td><b>TCP</b></td><td><b>audit</b></td><td><b>Unisys Audit SITP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>182</b></td><td><b>UDP</b></td><td><b>audit</b></td><td><b>Unisys Audit SITP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>183</b></td><td><b>TCP</b></td><td><b>ocbinder</b></td><td><b>OCBinder</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>183</b></td><td><b>UDP</b></td><td><b>ocbinder</b></td><td><b>OCBinder</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>184</b></td><td><b>TCP</b></td><td><b>ocserver</b></td><td><b>OCServer</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>184</b></td><td><b>UDP</b></td><td><b>ocserver</b></td><td><b>OCServer</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>185</b></td><td><b>TCP</b></td><td><b>remote-kis</b></td><td><b>Remote-KIS</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>185</b></td><td><b>UDP</b></td><td><b>remote-kis</b></td><td><b>Remote-KIS</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>186</b></td><td><b>TCP</b></td><td><b>kis</b></td><td><b>KIS Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>186</b></td><td><b>UDP</b></td><td><b>kis</b></td><td><b>KIS Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>187</b></td><td><b>TCP</b></td><td><b>aci</b></td><td><b>Application Communication Interface</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>187</b></td><td><b>UDP</b></td><td><b>aci</b></td><td><b>Application Communication Interface</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>188</b></td><td><b>TCP</b></td><td><b>mumps</b></td><td><b>Plus Five's MUMPS</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>188</b></td><td><b>UDP</b></td><td><b>mumps</b></td><td><b>Plus Five's MUMPS</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>189</b></td><td><b>TCP</b></td><td><b>qft</b></td><td><b>Queued File Transport</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>189</b></td><td><b>UDP</b></td><td><b>qft</b></td><td><b>Queued File Transport</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>190</b></td><td><b>TCP</b></td><td><b>gacp</b></td><td><b>Gateway Access Control Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>190</b></td><td><b>UDP</b></td><td><b>gacp</b></td><td><b>Gateway Access Control Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>191</b></td><td><b>TCP</b></td><td><b>prospero</b></td><td><b>Prospero Directory Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>191</b></td><td><b>UDP</b></td><td><b>prospero</b></td><td><b>Prospero Directory Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>192</b></td><td><b>TCP</b></td><td><b>osu-nms</b></td><td><b>OSU Network Monitoring System</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>192</b></td><td><b>UDP</b></td><td><b>osu-nms</b></td><td><b>OSU Network Monitoring System</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>193</b></td><td><b>TCP</b></td><td><b>srmp</b></td><td><b>Spider Remote Monitoring Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>193</b></td><td><b>UDP</b></td><td><b>srmp</b></td><td><b>Spider Remote Monitoring Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>194</b></td><td><b>TCP</b></td><td><b>irc</b></td><td><b>Internet Relay Chat Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>194</b></td><td><b>UDP</b></td><td><b>irc</b></td><td><b>Internet Relay Chat Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>195</b></td><td><b>TCP</b></td><td><b>dn6-nlm-aud</b></td><td><b>DNSIX Network Level Module Audit</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>195</b></td><td><b>UDP</b></td><td><b>dn6-nlm-aud</b></td><td><b>DNSIX Network Level Module Audit</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>196</b></td><td><b>TCP</b></td><td><b>dn6-smm-red</b></td><td><b>DNSIX Session Mgt Module Audit Redir</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>196</b></td><td><b>UDP</b></td><td><b>dn6-smm-red</b></td><td><b>DNSIX Session Mgt Module Audit Redir</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>197</b></td><td><b>TCP</b></td><td><b>dls</b></td><td><b>Directory Location Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>197</b></td><td><b>UDP</b></td><td><b>dls</b></td><td><b>Directory Location Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>198</b></td><td><b>TCP</b></td><td><b>dls-mon</b></td><td><b>Directory Location Service Monitor</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>198</b></td><td><b>UDP</b></td><td><b>dls-mon</b></td><td><b>Directory Location Service Monitor</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>199</b></td><td><b>TCP</b></td><td><b>smux</b></td><td><b>SMUX</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>199</b></td><td><b>UDP</b></td><td><b>smux</b></td><td><b>SMUX</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>200</b></td><td><b>TCP</b></td><td><b>src</b></td><td><b>IBM System Resource Controller</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>200</b></td><td><b>UDP</b></td><td><b>src</b></td><td><b>IBM System Resource Controller</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>201</b></td><td><b>TCP</b></td><td><b>at-rtmp</b></td><td><b>AppleTalk Routing Maintenance</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>201</b></td><td><b>UDP</b></td><td><b>at-rtmp</b></td><td><b>AppleTalk Routing Maintenance</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>202</b></td><td><b>TCP</b></td><td><b>at-nbp</b></td><td><b>AppleTalk Name Binding</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>202</b></td><td><b>UDP</b></td><td><b>at-nbp</b></td><td><b>AppleTalk Name Binding</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>203</b></td><td><b>TCP</b></td><td><b>at-3</b></td><td><b>AppleTalk Unused</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>203</b></td><td><b>UDP</b></td><td><b>at-3</b></td><td><b>AppleTalk Unused</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>204</b></td><td><b>TCP</b></td><td><b>at-echo</b></td><td><b>AppleTalk Echo</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>204</b></td><td><b>UDP</b></td><td><b>at-echo</b></td><td><b>AppleTalk Echo</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>205</b></td><td><b>TCP</b></td><td><b>at-5</b></td><td><b>AppleTalk Unused</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>205</b></td><td><b>UDP</b></td><td><b>at-5</b></td><td><b>AppleTalk Unused</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>206</b></td><td><b>TCP</b></td><td><b>at-zis</b></td><td><b>AppleTalk Zone Information</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>206</b></td><td><b>UDP</b></td><td><b>at-zis</b></td><td><b>AppleTalk Zone Information</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>207</b></td><td><b>TCP</b></td><td><b>at-7</b></td><td><b>AppleTalk Unused</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>207</b></td><td><b>UDP</b></td><td><b>at-7</b></td><td><b>AppleTalk Unused</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>208</b></td><td><b>TCP</b></td><td><b>at-8</b></td><td><b>AppleTalk Unused</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>208</b></td><td><b>UDP</b></td><td><b>at-8</b></td><td><b>AppleTalk Unused</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>209</b></td><td><b>TCP</b></td><td><b>qmtp</b></td><td><b>The Quick Mail Transfer Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>209</b></td><td><b>UDP</b></td><td><b>qmtp</b></td><td><b>The Quick Mail Transfer Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>210</b></td><td><b>TCP</b></td><td><b>z39.50</b></td><td><b>ANSI Z39.50</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>210</b></td><td><b>UDP</b></td><td><b>z39.50</b></td><td><b>ANSI Z39.50</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>211</b></td><td><b>TCP</b></td><td><b>914c/g</b></td><td><b>Texas Instruments 914C/G Terminal</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>211</b></td><td><b>UDP</b></td><td><b>914c/g</b></td><td><b>Texas Instruments 914C/G Terminal</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>212</b></td><td><b>TCP</b></td><td><b>anet</b></td><td><b>ATEXSSTR</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>212</b></td><td><b>UDP</b></td><td><b>anet</b></td><td><b>ATEXSSTR</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>213</b></td><td><b>TCP</b></td><td><b>ipx</b></td><td><b>IPX</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>213</b></td><td><b>UDP</b></td><td><b>ipx</b></td><td><b>IPX</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>214</b></td><td><b>TCP</b></td><td><b>vmpwscs</b></td><td><b>VM PWSCS</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>214</b></td><td><b>UDP</b></td><td><b>vmpwscs</b></td><td><b>VM PWSCS</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>215</b></td><td><b>TCP</b></td><td><b>softpc</b></td><td><b>Insignia Solutions</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>215</b></td><td><b>UDP</b></td><td><b>softpc</b></td><td><b>Insignia Solutions</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>216</b></td><td><b>TCP</b></td><td><b>CAIlic</b></td><td><b>Computer Associates Int'l License Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>216</b></td><td><b>UDP</b></td><td><b>CAIlic</b></td><td><b>Computer Associates Int'l License Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>217</b></td><td><b>TCP</b></td><td><b>dbase</b></td><td><b>dBASE Unix</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>217</b></td><td><b>UDP</b></td><td><b>dbase</b></td><td><b>dBASE Unix</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>218</b></td><td><b>TCP</b></td><td><b>mpp</b></td><td><b>Netix Message Posting Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>218</b></td><td><b>UDP</b></td><td><b>mpp</b></td><td><b>Netix Message Posting Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>219</b></td><td><b>TCP</b></td><td><b>uarps</b></td><td><b>Unisys ARPs</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>219</b></td><td><b>UDP</b></td><td><b>uarps</b></td><td><b>Unisys ARPs</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>220</b></td><td><b>TCP</b></td><td><b>imap3</b></td><td><b>Interactive Mail Access Protocol v3</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>220</b></td><td><b>UDP</b></td><td><b>imap3</b></td><td><b>Interactive Mail Access Protocol v3</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>221</b></td><td><b>TCP</b></td><td><b>fln-spx</b></td><td><b>Berkeley rlogind with SPX auth</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>221</b></td><td><b>UDP</b></td><td><b>fln-spx</b></td><td><b>Berkeley rlogind with SPX auth</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>222</b></td><td><b>TCP</b></td><td><b>rsh-spx</b></td><td><b>Berkeley rshd with SPX auth</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>222</b></td><td><b>UDP</b></td><td><b>rsh-spx</b></td><td><b>Berkeley rshd with SPX auth</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>223</b></td><td><b>TCP</b></td><td><b>cdc</b></td><td><b>Certificate Distribution Center</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>223</b></td><td><b>UDP</b></td><td><b>cdc</b></td><td><b>Certificate Distribution Center</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>224</b></td><td><b>TCP</b></td><td><b>masqdialer</b></td><td><b>masqdialer</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>224</b></td><td><b>UDP</b></td><td><b>masqdialer</b></td><td><b>masqdialer</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>242</b></td><td><b>TCP</b></td><td><b>direct</b></td><td><b>Direct</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>242</b></td><td><b>UDP</b></td><td><b>direct</b></td><td><b>Direct</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>243</b></td><td><b>TCP</b></td><td><b>sur-meas</b></td><td><b>Survey Measurement</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>243</b></td><td><b>UDP</b></td><td><b>sur-meas</b></td><td><b>Survey Measurement</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>244</b></td><td><b>TCP</b></td><td><b>inbusiness</b></td><td><b>inbusiness</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>244</b></td><td><b>UDP</b></td><td><b>inbusiness</b></td><td><b>inbusiness</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>245</b></td><td><b>TCP</b></td><td><b>link</b></td><td><b>LINK</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>245</b></td><td><b>UDP</b></td><td><b>link</b></td><td><b>LINK</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>246</b></td><td><b>TCP</b></td><td><b>dsp3270</b></td><td><b>Display Systems Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>246</b></td><td><b>UDP</b></td><td><b>dsp3270</b></td><td><b>Display Systems Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>247</b></td><td><b>TCP</b></td><td><b>subntbcst_tftp</b></td><td><b>SUBNTBCST_TFTP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>247</b></td><td><b>UDP</b></td><td><b>subntbcst_tftp</b></td><td><b>SUBNTBCST_TFTP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>248</b></td><td><b>TCP</b></td><td><b>bhfhs</b></td><td><b>bhfhs</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>248</b></td><td><b>UDP</b></td><td><b>bhfhs</b></td><td><b>bhfhs</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>256</b></td><td><b>TCP</b></td><td><b>rap</b></td><td><b>RAP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>256</b></td><td><b>UDP</b></td><td><b>rap</b></td><td><b>RAP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>257</b></td><td><b>TCP</b></td><td><b>set</b></td><td><b>Secure Electronic Transaction</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>257</b></td><td><b>UDP</b></td><td><b>set</b></td><td><b>Secure Electronic Transaction</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>258</b></td><td><b>TCP</b></td><td><b>yak-chat</b></td><td><b>Yak Winsock Personal Chat</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>258</b></td><td><b>UDP</b></td><td><b>yak-chat</b></td><td><b>Yak Winsock Personal Chat</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>259</b></td><td><b>TCP</b></td><td><b>esro-gen</b></td><td><b>Efficient Short Remote Operations</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>259</b></td><td><b>UDP</b></td><td><b>esro-gen</b></td><td><b>Efficient Short Remote Operations</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>260</b></td><td><b>TCP</b></td><td><b>openport</b></td><td><b>Openport</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>260</b></td><td><b>UDP</b></td><td><b>openport</b></td><td><b>Openport</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>261</b></td><td><b>TCP</b></td><td><b>nsiiops</b></td><td><b>IIOP Name Service over TLS/SSL</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>261</b></td><td><b>UDP</b></td><td><b>nsiiops</b></td><td><b>IIOP Name Service over TLS/SSL</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>262</b></td><td><b>TCP</b></td><td><b>arcisdms</b></td><td><b>Arcisdms</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>262</b></td><td><b>UDP</b></td><td><b>arcisdms</b></td><td><b>Arcisdms</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>263</b></td><td><b>TCP</b></td><td><b>hdap</b></td><td><b>HDAP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>263</b></td><td><b>UDP</b></td><td><b>hdap</b></td><td><b>HDAP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>264</b></td><td><b>TCP</b></td><td><b>bgmp</b></td><td><b>BGMP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>264</b></td><td><b>UDP</b></td><td><b>bgmp</b></td><td><b>BGMP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>265</b></td><td><b>TCP</b></td><td><b>x-bone-ctl</b></td><td><b>X-Bone CTL</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>265</b></td><td><b>UDP</b></td><td><b>x-bone-ctl</b></td><td><b>X-Bone CTL</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>266</b></td><td><b>TCP</b></td><td><b>sst</b></td><td><b>SCSI on ST</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>266</b></td><td><b>UDP</b></td><td><b>sst</b></td><td><b>SCSI on ST</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>267</b></td><td><b>TCP</b></td><td><b>td-service</b></td><td><b>Tobit David Service Layer</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>267</b></td><td><b>UDP</b></td><td><b>td-service</b></td><td><b>Tobit David Service Layer</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>268</b></td><td><b>TCP</b></td><td><b>td-replica</b></td><td><b>Tobit David Replica</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>268</b></td><td><b>UDP</b></td><td><b>td-replica</b></td><td><b>Tobit David Replica</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>280</b></td><td><b>TCP</b></td><td><b>http-mgmt</b></td><td><b>http-mgmt</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>280</b></td><td><b>UDP</b></td><td><b>http-mgmt</b></td><td><b>http-mgmt</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>281</b></td><td><b>TCP</b></td><td><b>personal-link</b></td><td><b>Personal Link</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>281</b></td><td><b>UDP</b></td><td><b>personal-link</b></td><td><b>Personal Link</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>282</b></td><td><b>TCP</b></td><td><b>cableport-ax</b></td><td><b>Cable Port A/X</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>282</b></td><td><b>UDP</b></td><td><b>cableport-ax</b></td><td><b>Cable Port A/X</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>283</b></td><td><b>TCP</b></td><td><b>rescap</b></td><td><b>rescap</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>283</b></td><td><b>UDP</b></td><td><b>rescap</b></td><td><b>rescap</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>284</b></td><td><b>TCP</b></td><td><b>corerjd</b></td><td><b>corerjd</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>284</b></td><td><b>UDP</b></td><td><b>corerjd</b></td><td><b>corerjd</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>285</b></td><td><b>TCP</b></td><td><b><br />
</b></td><td><b><br />
</b></td><td><b>WCTrojan</b></td></tr>
<tr><td class="r"><b>286</b></td><td><b>TCP</b></td><td><b>fxp</b></td><td><b>FXP Communication</b></td><td><b>WCTrojan</b></td></tr>
<tr><td class="r"><b>286</b></td><td><b>UDP</b></td><td><b>fxp</b></td><td><b>FXP Communication</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>287</b></td><td><b>TCP</b></td><td><b>k-block</b></td><td><b>K-BLOCK</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>287</b></td><td><b>UDP</b></td><td><b>k-block</b></td><td><b>K-BLOCK</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>308</b></td><td><b>TCP</b></td><td><b>novastorbakcup</b></td><td><b>Novastor Backup</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>308</b></td><td><b>UDP</b></td><td><b>novastorbakcup</b></td><td><b>Novastor Backup</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>309</b></td><td><b>TCP</b></td><td><b>entrusttime</b></td><td><b>EntrustTime</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>309</b></td><td><b>UDP</b></td><td><b>entrusttime</b></td><td><b>EntrustTime</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>310</b></td><td><b>TCP</b></td><td><b>bhmds</b></td><td><b>bhmds</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>310</b></td><td><b>UDP</b></td><td><b>bhmds</b></td><td><b>bhmds</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>311</b></td><td><b>TCP</b></td><td><b>asip-webadmin</b></td><td><b>AppleShare IP WebAdmin</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>311</b></td><td><b>UDP</b></td><td><b>asip-webadmin</b></td><td><b>AppleShare IP WebAdmin</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>312</b></td><td><b>TCP</b></td><td><b>vslmp</b></td><td><b>VSLMP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>312</b></td><td><b>UDP</b></td><td><b>vslmp</b></td><td><b>VSLMP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>313</b></td><td><b>TCP</b></td><td><b>magenta-logic</b></td><td><b>Magenta Logic</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>313</b></td><td><b>UDP</b></td><td><b>magenta-logic</b></td><td><b>Magenta Logic</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>314</b></td><td><b>TCP</b></td><td><b>opalis-robot</b></td><td><b>Opalis Robot</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>314</b></td><td><b>UDP</b></td><td><b>opalis-robot</b></td><td><b>Opalis Robot</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>315</b></td><td><b>TCP</b></td><td><b>dpsi</b></td><td><b>DPSI</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>315</b></td><td><b>UDP</b></td><td><b>dpsi</b></td><td><b>DPSI</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>316</b></td><td><b>TCP</b></td><td><b>decauth</b></td><td><b>decAuth</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>316</b></td><td><b>UDP</b></td><td><b>decauth</b></td><td><b>decAuth</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>317</b></td><td><b>TCP</b></td><td><b>zannet</b></td><td><b>Zannet</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>317</b></td><td><b>UDP</b></td><td><b>zannet</b></td><td><b>Zannet</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>318</b></td><td><b>TCP</b></td><td><b>pkix-timestamp</b></td><td><b>PKIX TimeStamp</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>318</b></td><td><b>UDP</b></td><td><b>pkix-timestamp</b></td><td><b>PKIX TimeStamp</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>319</b></td><td><b>TCP</b></td><td><b>ptp-event</b></td><td><b>PTP Event</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>319</b></td><td><b>UDP</b></td><td><b>ptp-event</b></td><td><b>PTP Event</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>320</b></td><td><b>TCP</b></td><td><b>ptp-general</b></td><td><b>PTP General</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>320</b></td><td><b>UDP</b></td><td><b>ptp-general</b></td><td><b>PTP General</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>321</b></td><td><b>TCP</b></td><td><b>pip</b></td><td><b>PIP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>321</b></td><td><b>UDP</b></td><td><b>pip</b></td><td><b>PIP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>322</b></td><td><b>TCP</b></td><td><b>rtsps</b></td><td><b>RTSPS</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>322</b></td><td><b>UDP</b></td><td><b>rtsps</b></td><td><b>RTSPS</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>333</b></td><td><b>TCP</b></td><td><b>texar</b></td><td><b>Texar Security Port</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>333</b></td><td><b>UDP</b></td><td><b>texar</b></td><td><b>Texar Security Port</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>334</b></td><td><b>TCP</b></td><td><b><br />
</b></td><td><b><br />
</b></td><td><b>Backage</b></td></tr>
<tr><td class="r"><b>344</b></td><td><b>TCP</b></td><td><b>pdap</b></td><td><b>Prospero Data Access Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>344</b></td><td><b>UDP</b></td><td><b>pdap</b></td><td><b>Prospero Data Access Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>345</b></td><td><b>TCP</b></td><td><b>pawserv</b></td><td><b>Perf Analysis Workbench</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>345</b></td><td><b>UDP</b></td><td><b>pawserv</b></td><td><b>Perf Analysis Workbench</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>346</b></td><td><b>TCP</b></td><td><b>zserv</b></td><td><b>Zebra server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>346</b></td><td><b>UDP</b></td><td><b>zserv</b></td><td><b>Zebra server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>347</b></td><td><b>TCP</b></td><td><b>fatserv</b></td><td><b>Fatmen Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>347</b></td><td><b>UDP</b></td><td><b>fatserv</b></td><td><b>Fatmen Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>348</b></td><td><b>TCP</b></td><td><b>csi-sgwp</b></td><td><b>Cabletron Management Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>348</b></td><td><b>UDP</b></td><td><b>csi-sgwp</b></td><td><b>Cabletron Management Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>349</b></td><td><b>TCP</b></td><td><b>mftp</b></td><td><b>mftp</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>349</b></td><td><b>UDP</b></td><td><b>mftp</b></td><td><b>mftp</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>350</b></td><td><b>TCP</b></td><td><b>matip-type-a</b></td><td><b>MATIP Type A</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>350</b></td><td><b>UDP</b></td><td><b>matip-type-a</b></td><td><b>MATIP Type A</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>351</b></td><td><b>TCP</b></td><td><b>bhoetty</b></td><td><b>bhoetty (added 5/21/97)</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>351</b></td><td><b>UDP</b></td><td><b>bhoetty</b></td><td><b>bhoetty</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>352</b></td><td><b>TCP</b></td><td><b>bhoedap4</b></td><td><b>bhoedap4 (added 5/21/97)</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>352</b></td><td><b>UDP</b></td><td><b>bhoedap4</b></td><td><b>bhoedap4</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>353</b></td><td><b>TCP</b></td><td><b>ndsauth</b></td><td><b>NDSAUTH</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>353</b></td><td><b>UDP</b></td><td><b>ndsauth</b></td><td><b>NDSAUTH</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>354</b></td><td><b>TCP</b></td><td><b>bh611</b></td><td><b>bh611</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>354</b></td><td><b>UDP</b></td><td><b>bh611</b></td><td><b>bh611</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>355</b></td><td><b>TCP</b></td><td><b>datex-asn</b></td><td><b>DATEX-ASN</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>355</b></td><td><b>UDP</b></td><td><b>datex-asn</b></td><td><b>DATEX-ASN</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>356</b></td><td><b>TCP</b></td><td><b>cloanto-net-1</b></td><td><b>Cloanto Net 1</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>356</b></td><td><b>UDP</b></td><td><b>cloanto-net-1</b></td><td><b>Cloanto Net 1</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>357</b></td><td><b>TCP</b></td><td><b>bhevent</b></td><td><b>bhevent</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>357</b></td><td><b>UDP</b></td><td><b>bhevent</b></td><td><b>bhevent</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>358</b></td><td><b>TCP</b></td><td><b>shrinkwrap</b></td><td><b>Shrinkwrap</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>358</b></td><td><b>UDP</b></td><td><b>shrinkwrap</b></td><td><b>Shrinkwrap</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>359</b></td><td><b>TCP</b></td><td><b>nsrmp</b></td><td><b>Network Security Risk Management Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>359</b></td><td><b>UDP</b></td><td><b>nsrmp</b></td><td><b>Network Security Risk Management Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>360</b></td><td><b>TCP</b></td><td><b>scoi2odialog</b></td><td><b>scoi2odialog</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>360</b></td><td><b>UDP</b></td><td><b>scoi2odialog</b></td><td><b>scoi2odialog</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>361</b></td><td><b>TCP</b></td><td><b>semantix</b></td><td><b>Semantix</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>361</b></td><td><b>UDP</b></td><td><b>semantix</b></td><td><b>Semantix</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>362</b></td><td><b>TCP</b></td><td><b>srssend</b></td><td><b>SRS Send</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>362</b></td><td><b>UDP</b></td><td><b>srssend</b></td><td><b>SRS Send</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>363</b></td><td><b>TCP</b></td><td><b>rsvp_tunnel</b></td><td><b>RSVP Tunnel</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>363</b></td><td><b>UDP</b></td><td><b>rsvp_tunnel</b></td><td><b>RSVP Tunnel</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>364</b></td><td><b>TCP</b></td><td><b>aurora-cmgr</b></td><td><b>Aurora CMGR</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>364</b></td><td><b>UDP</b></td><td><b>aurora-cmgr</b></td><td><b>Aurora CMGR</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>365</b></td><td><b>TCP</b></td><td><b>dtk</b></td><td><b>DTK</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>365</b></td><td><b>UDP</b></td><td><b>dtk</b></td><td><b>DTK</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>366</b></td><td><b>TCP</b></td><td><b>odmr</b></td><td><b>ODMR</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>366</b></td><td><b>UDP</b></td><td><b>odmr</b></td><td><b>ODMR</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>367</b></td><td><b>TCP</b></td><td><b>mortgageware</b></td><td><b>MortgageWare</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>367</b></td><td><b>UDP</b></td><td><b>mortgageware</b></td><td><b>MortgageWare</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>368</b></td><td><b>TCP</b></td><td><b>qbikgdp</b></td><td><b>QbikGDP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>368</b></td><td><b>UDP</b></td><td><b>qbikgdp</b></td><td><b>QbikGDP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>369</b></td><td><b>TCP</b></td><td><b>rpc2portmap</b></td><td><b>rpc2portmap</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>369</b></td><td><b>UDP</b></td><td><b>rpc2portmap</b></td><td><b>rpc2portmap</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>370</b></td><td><b>TCP</b></td><td><b>codaauth2</b></td><td><b>codaauth2</b></td><td><b>NeuroticKat</b></td></tr>
<tr><td class="r"><b>370</b></td><td><b>UDP</b></td><td><b>codaauth2</b></td><td><b>codaauth2</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>371</b></td><td><b>TCP</b></td><td><b>clearcase</b></td><td><b>Clearcase</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>371</b></td><td><b>UDP</b></td><td><b>clearcase</b></td><td><b>Clearcase</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>372</b></td><td><b>TCP</b></td><td><b>ulistproc</b></td><td><b>ListProcessor</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>372</b></td><td><b>UDP</b></td><td><b>ulistproc</b></td><td><b>ListProcessor</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>373</b></td><td><b>TCP</b></td><td><b>legent-1</b></td><td><b>Legent Corporation</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>373</b></td><td><b>UDP</b></td><td><b>legent-1</b></td><td><b>Legent Corporation</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>374</b></td><td><b>TCP</b></td><td><b>legent-2</b></td><td><b>Legent Corporation</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>374</b></td><td><b>UDP</b></td><td><b>legent-2</b></td><td><b>Legent Corporation</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>375</b></td><td><b>TCP</b></td><td><b>hassle</b></td><td><b>Hassle</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>375</b></td><td><b>UDP</b></td><td><b>hassle</b></td><td><b>Hassle</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>376</b></td><td><b>TCP</b></td><td><b>nip</b></td><td><b>Amiga Envoy Network Inquiry Proto</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>376</b></td><td><b>UDP</b></td><td><b>nip</b></td><td><b>Amiga Envoy Network Inquiry Proto</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>377</b></td><td><b>TCP</b></td><td><b>tnETOS</b></td><td><b>NEC Corporation</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>377</b></td><td><b>UDP</b></td><td><b>tnETOS</b></td><td><b>NEC Corporation</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>378</b></td><td><b>TCP</b></td><td><b>dsETOS</b></td><td><b>NEC Corporation</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>378</b></td><td><b>UDP</b></td><td><b>dsETOS</b></td><td><b>NEC Corporation</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>379</b></td><td><b>TCP</b></td><td><b>is99c</b></td><td><b>TIA/EIA/IS-99 modem client</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>379</b></td><td><b>UDP</b></td><td><b>is99c</b></td><td><b>TIA/EIA/IS-99 modem client</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>380</b></td><td><b>TCP</b></td><td><b>is99s</b></td><td><b>TIA/EIA/IS-99 modem server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>380</b></td><td><b>UDP</b></td><td><b>is99s</b></td><td><b>TIA/EIA/IS-99 modem server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>381</b></td><td><b>TCP</b></td><td><b>hp-collector</b></td><td><b>hp performance data collector</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>381</b></td><td><b>UDP</b></td><td><b>hp-collector</b></td><td><b>hp performance data collector</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>382</b></td><td><b>TCP</b></td><td><b>hp-managed-node</b></td><td><b>hp performance data managed node</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>382</b></td><td><b>UDP</b></td><td><b>hp-managed-node</b></td><td><b>hp performance data managed node</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>383</b></td><td><b>TCP</b></td><td><b>hp-alarm-mgr</b></td><td><b>hp performance data alarm manager</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>383</b></td><td><b>UDP</b></td><td><b>hp-alarm-mgr</b></td><td><b>hp performance data alarm manager</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>384</b></td><td><b>TCP</b></td><td><b>arns</b></td><td><b>A Remote Network Server System</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>384</b></td><td><b>UDP</b></td><td><b>arns</b></td><td><b>A Remote Network Server System</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>385</b></td><td><b>TCP</b></td><td><b>ibm-app</b></td><td><b>IBM Application</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>385</b></td><td><b>UDP</b></td><td><b>ibm-app</b></td><td><b>IBM Application</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>386</b></td><td><b>TCP</b></td><td><b>asa</b></td><td><b>ASA Message Router Object Def.</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>386</b></td><td><b>UDP</b></td><td><b>asa</b></td><td><b>ASA Message Router Object Def.</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>387</b></td><td><b>TCP</b></td><td><b>aurp</b></td><td><b>Appletalk Update-Based Routing Pro.</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>387</b></td><td><b>UDP</b></td><td><b>aurp</b></td><td><b>Appletalk Update-Based Routing Pro.</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>388</b></td><td><b>TCP</b></td><td><b>unidata-ldm</b></td><td><b>Unidata LDM</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>388</b></td><td><b>UDP</b></td><td><b>unidata-ldm</b></td><td><b>Unidata LDM</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>389</b></td><td><b>TCP</b></td><td><b>ldap</b></td><td><b>Lightweight Directory Access Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>389</b></td><td><b>UDP</b></td><td><b>ldap</b></td><td><b>Lightweight Directory Access Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>390</b></td><td><b>TCP</b></td><td><b>uis</b></td><td><b>UIS</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>390</b></td><td><b>UDP</b></td><td><b>uis</b></td><td><b>UIS</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>391</b></td><td><b>TCP</b></td><td><b>synotics-relay</b></td><td><b>SynOptics SNMP Relay Port</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>391</b></td><td><b>UDP</b></td><td><b>synotics-relay</b></td><td><b>SynOptics SNMP Relay Port</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>392</b></td><td><b>TCP</b></td><td><b>synotics-broker</b></td><td><b>SynOptics Port Broker Port</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>392</b></td><td><b>UDP</b></td><td><b>synotics-broker</b></td><td><b>SynOptics Port Broker Port</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>393</b></td><td><b>TCP</b></td><td><b>meta5</b></td><td><b>Meta5</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>393</b></td><td><b>UDP</b></td><td><b>meta5</b></td><td><b>Meta5</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>394</b></td><td><b>TCP</b></td><td><b>embl-ndt</b></td><td><b>EMBL Nucleic Data Transfer</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>394</b></td><td><b>UDP</b></td><td><b>embl-ndt</b></td><td><b>EMBL Nucleic Data Transfer</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>395</b></td><td><b>TCP</b></td><td><b>netcp</b></td><td><b>NETscout Control Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>395</b></td><td><b>UDP</b></td><td><b>netcp</b></td><td><b>NETscout Control Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>396</b></td><td><b>TCP</b></td><td><b>netware-ip</b></td><td><b>Novell Netware over IP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>396</b></td><td><b>UDP</b></td><td><b>netware-ip</b></td><td><b>Novell Netware over IP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>397</b></td><td><b>TCP</b></td><td><b>mptn</b></td><td><b>Multi Protocol Trans. Net.</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>397</b></td><td><b>UDP</b></td><td><b>mptn</b></td><td><b>Multi Protocol Trans. Net.</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>398</b></td><td><b>TCP</b></td><td><b>kryptolan</b></td><td><b>Kryptolan</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>398</b></td><td><b>UDP</b></td><td><b>kryptolan</b></td><td><b>Kryptolan</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>399</b></td><td><b>TCP</b></td><td><b>iso-tsap-c2</b></td><td><b>ISO Transport Class 2 Non-Control over TCP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>399</b></td><td><b>UDP</b></td><td><b>iso-tsap-c2</b></td><td><b>ISO Transport Class 2 Non-Control over UDP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>400</b></td><td><b>TCP</b></td><td><b>work-sol</b></td><td><b>Workstation Solutions</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>400</b></td><td><b>UDP</b></td><td><b>work-sol</b></td><td><b>Workstation Solutions</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>401</b></td><td><b>TCP</b></td><td><b>ups</b></td><td><b>Uninterruptible Power Supply</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>401</b></td><td><b>UDP</b></td><td><b>ups</b></td><td><b>Uninterruptible Power Supply</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>402</b></td><td><b>TCP</b></td><td><b>genie</b></td><td><b>Genie Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>402</b></td><td><b>UDP</b></td><td><b>genie</b></td><td><b>Genie Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>403</b></td><td><b>TCP</b></td><td><b>decap</b></td><td><b>decap</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>403</b></td><td><b>UDP</b></td><td><b>decap</b></td><td><b>decap</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>404</b></td><td><b>TCP</b></td><td><b>nced</b></td><td><b>nced</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>404</b></td><td><b>UDP</b></td><td><b>nced</b></td><td><b>nced</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>405</b></td><td><b>TCP</b></td><td><b>ncld</b></td><td><b>ncld</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>405</b></td><td><b>UDP</b></td><td><b>ncld</b></td><td><b>ncld</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>406</b></td><td><b>TCP</b></td><td><b>imsp</b></td><td><b>Interactive Mail Support Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>406</b></td><td><b>UDP</b></td><td><b>imsp</b></td><td><b>Interactive Mail Support Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>407</b></td><td><b>TCP</b></td><td><b>timbuktu</b></td><td><b>Timbuktu</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>407</b></td><td><b>UDP</b></td><td><b>timbuktu</b></td><td><b>Timbuktu</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>408</b></td><td><b>TCP</b></td><td><b>prm-sm</b></td><td><b>Prospero Resource Manager Sys. Man.</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>408</b></td><td><b>UDP</b></td><td><b>prm-sm</b></td><td><b>Prospero Resource Manager Sys. Man.</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>409</b></td><td><b>TCP</b></td><td><b>prm-nm</b></td><td><b>Prospero Resource Manager Node Man.</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>409</b></td><td><b>UDP</b></td><td><b>prm-nm</b></td><td><b>Prospero Resource Manager Node Man.</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>410</b></td><td><b>TCP</b></td><td><b>decladebug</b></td><td><b>DECLadebug Remote Debug Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>410</b></td><td><b>UDP</b></td><td><b>decladebug</b></td><td><b>DECLadebug Remote Debug Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>411</b></td><td><b>TCP</b></td><td><b>rmt</b></td><td><b>Remote MT Protocol</b></td><td><b>Backage</b></td></tr>
<tr><td class="r"><b>411</b></td><td><b>UDP</b></td><td><b>rmt</b></td><td><b>Remote MT Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>412</b></td><td><b>TCP</b></td><td><b>synoptics-trap</b></td><td><b>Trap Convention Port</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>412</b></td><td><b>UDP</b></td><td><b>synoptics-trap</b></td><td><b>Trap Convention Port</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>413</b></td><td><b>TCP</b></td><td><b>smsp</b></td><td><b>Storage Management Services Protocol</b></td><td><b>Coma</b></td></tr>
<tr><td class="r"><b>413</b></td><td><b>UDP</b></td><td><b>smsp</b></td><td><b>Storage Management Services Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>414</b></td><td><b>TCP</b></td><td><b>infoseek</b></td><td><b>InfoSeek</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>414</b></td><td><b>UDP</b></td><td><b>infoseek</b></td><td><b>InfoSeek</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>415</b></td><td><b>TCP</b></td><td><b>bnet</b></td><td><b>BNet</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>415</b></td><td><b>UDP</b></td><td><b>bnet</b></td><td><b>BNet</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>416</b></td><td><b>TCP</b></td><td><b>silverplatter</b></td><td><b>Silverplatter</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>416</b></td><td><b>UDP</b></td><td><b>silverplatter</b></td><td><b>Silverplatter</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>417</b></td><td><b>TCP</b></td><td><b>onmux</b></td><td><b>Onmux</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>417</b></td><td><b>UDP</b></td><td><b>onmux</b></td><td><b>Onmux</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>418</b></td><td><b>TCP</b></td><td><b>hyper-g</b></td><td><b>Hyper-G</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>418</b></td><td><b>UDP</b></td><td><b>hyper-g</b></td><td><b>Hyper-G</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>419</b></td><td><b>TCP</b></td><td><b>ariel1</b></td><td><b>Ariel 1</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>419</b></td><td><b>UDP</b></td><td><b>ariel1</b></td><td><b>Ariel 1</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>420</b></td><td><b>TCP</b></td><td><b>smpte</b></td><td><b>SMPTE</b></td><td><b>Breach, Incognito</b></td></tr>
<tr><td class="r"><b>420</b></td><td><b>UDP</b></td><td><b>smpte</b></td><td><b>SMPTE</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>421</b></td><td><b>TCP</b></td><td><b>ariel2</b></td><td><b>Ariel 2</b></td><td><b>TCP Wrappers trojan</b></td></tr>
<tr><td class="r"><b>421</b></td><td><b>UDP</b></td><td><b>ariel2</b></td><td><b>Ariel 2</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>422</b></td><td><b>TCP</b></td><td><b>ariel3</b></td><td><b>Ariel 3</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>422</b></td><td><b>UDP</b></td><td><b>ariel3</b></td><td><b>Ariel 3</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>423</b></td><td><b>TCP</b></td><td><b>opc-job-start</b></td><td><b>IBM Operations Planning and Control Start</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>423</b></td><td><b>UDP</b></td><td><b>opc-job-start</b></td><td><b>IBM Operations Planning and Control Start</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>424</b></td><td><b>TCP</b></td><td><b>opc-job-track</b></td><td><b>IBM Operations Planning and Control Track</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>424</b></td><td><b>UDP</b></td><td><b>opc-job-track</b></td><td><b>IBM Operations Planning and Control Track</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>425</b></td><td><b>TCP</b></td><td><b>icad-el</b></td><td><b>ICAD</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>425</b></td><td><b>UDP</b></td><td><b>icad-el</b></td><td><b>ICAD</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>426</b></td><td><b>TCP</b></td><td><b>smartsdp</b></td><td><b>smartsdp</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>426</b></td><td><b>UDP</b></td><td><b>smartsdp</b></td><td><b>smartsdp</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>427</b></td><td><b>TCP</b></td><td><b>svrloc</b></td><td><b>Server Location</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>427</b></td><td><b>UDP</b></td><td><b>svrloc</b></td><td><b>Server Location</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>428</b></td><td><b>TCP</b></td><td><b>ocs_cmu</b></td><td><b>OCS_CMU</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>428</b></td><td><b>UDP</b></td><td><b>ocs_cmu</b></td><td><b>OCS_CMU</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>429</b></td><td><b>TCP</b></td><td><b>ocs_amu</b></td><td><b>OCS_AMU</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>429</b></td><td><b>UDP</b></td><td><b>ocs_amu</b></td><td><b>OCS_AMU</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>430</b></td><td><b>TCP</b></td><td><b>utmpsd</b></td><td><b>UTMPSD</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>430</b></td><td><b>UDP</b></td><td><b>utmpsd</b></td><td><b>UTMPSD</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>431</b></td><td><b>TCP</b></td><td><b>utmpcd</b></td><td><b>UTMPCD</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>431</b></td><td><b>UDP</b></td><td><b>utmpcd</b></td><td><b>UTMPCD</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>432</b></td><td><b>TCP</b></td><td><b>iasd</b></td><td><b>IASD</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>432</b></td><td><b>UDP</b></td><td><b>iasd</b></td><td><b>IASD</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>433</b></td><td><b>TCP</b></td><td><b>nnsp</b></td><td><b>NNSP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>433</b></td><td><b>UDP</b></td><td><b>nnsp</b></td><td><b>NNSP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>434</b></td><td><b>TCP</b></td><td><b>mobileip-agent</b></td><td><b>MobileIP-Agent</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>434</b></td><td><b>UDP</b></td><td><b>mobileip-agent</b></td><td><b>MobileIP-Agent</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>435</b></td><td><b>TCP</b></td><td><b>mobilip-mn</b></td><td><b>MobilIP-MN</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>435</b></td><td><b>UDP</b></td><td><b>mobilip-mn</b></td><td><b>MobilIP-MN</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>436</b></td><td><b>TCP</b></td><td><b>dna-cml</b></td><td><b>DNA-CML</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>436</b></td><td><b>UDP</b></td><td><b>dna-cml</b></td><td><b>DNA-CML</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>437</b></td><td><b>TCP</b></td><td><b>comscm</b></td><td><b>comscm</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>437</b></td><td><b>UDP</b></td><td><b>comscm</b></td><td><b>comscm</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>438</b></td><td><b>TCP</b></td><td><b>dsfgw</b></td><td><b>dsfgw</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>438</b></td><td><b>UDP</b></td><td><b>dsfgw</b></td><td><b>dsfgw</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>439</b></td><td><b>TCP</b></td><td><b>dasp</b></td><td><b>dasp Thomas Obermair</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>439</b></td><td><b>UDP</b></td><td><b>dasp</b></td><td><b>dasp tommy@inlab.m.eunet.de</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>440</b></td><td><b>TCP</b></td><td><b>sgcp</b></td><td><b>sgcp</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>440</b></td><td><b>UDP</b></td><td><b>sgcp</b></td><td><b>sgcp</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>441</b></td><td><b>TCP</b></td><td><b>decvms-sysmgt</b></td><td><b>decvms-sysmgt</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>441</b></td><td><b>UDP</b></td><td><b>decvms-sysmgt</b></td><td><b>decvms-sysmgt</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>442</b></td><td><b>TCP</b></td><td><b>cvc_hostd</b></td><td><b>cvc_hostd</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>442</b></td><td><b>UDP</b></td><td><b>cvc_hostd</b></td><td><b>cvc_hostd</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>443</b></td><td><b>TCP</b></td><td><b>https</b></td><td><b>http protocol over TLS/SSL</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>443</b></td><td><b>UDP</b></td><td><b>https</b></td><td><b>http protocol over TLS/SSL</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>444</b></td><td><b>TCP</b></td><td><b>snpp</b></td><td><b>Simple Network Paging Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>444</b></td><td><b>UDP</b></td><td><b>snpp</b></td><td><b>Simple Network Paging Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>445</b></td><td><b>TCP</b></td><td><b>microsoft-ds</b></td><td><b>Microsoft-DS</b></td><td><b>Lioten, Randon, WORM_DELODER.A, W32/Deloder.A, W32.HLLW.Deloder, Sasser</b></td></tr>
<tr><td class="r"><b>445</b></td><td><b>UDP</b></td><td><b>microsoft-ds</b></td><td><b>Microsoft-DS</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>446</b></td><td><b>TCP</b></td><td><b>ddm-rdb</b></td><td><b>DDM-Remote Relational Database Access</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>446</b></td><td><b>UDP</b></td><td><b>ddm-rdb</b></td><td><b>DDM-Remote Relational Database Access</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>447</b></td><td><b>TCP</b></td><td><b>ddm-dfm</b></td><td><b>DDM-Distributed File Management</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>447</b></td><td><b>UDP</b></td><td><b>ddm-dfm</b></td><td><b>DDM-Distributed File Management</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>448</b></td><td><b>TCP</b></td><td><b>ddm-ssl</b></td><td><b>DDM-Remote DB Access Using Secure Sockets</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>448</b></td><td><b>UDP</b></td><td><b>ddm-ssl</b></td><td><b>DDM-Remote DB Access Using Secure Sockets</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>449</b></td><td><b>TCP</b></td><td><b>as-servermap</b></td><td><b>AS Server Mapper</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>449</b></td><td><b>UDP</b></td><td><b>as-servermap</b></td><td><b>AS Server Mapper</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>450</b></td><td><b>TCP</b></td><td><b>tserver</b></td><td><b>Computer Supported Telecomunication Applications</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>450</b></td><td><b>UDP</b></td><td><b>tserver</b></td><td><b>Computer Supported Telecomunication Applications</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>451</b></td><td><b>TCP</b></td><td><b>sfs-smp-net</b></td><td><b>Cray Network Semaphore server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>451</b></td><td><b>UDP</b></td><td><b>sfs-smp-net</b></td><td><b>Cray Network Semaphore server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>452</b></td><td><b>TCP</b></td><td><b>sfs-config</b></td><td><b>Cray SFS config server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>452</b></td><td><b>UDP</b></td><td><b>sfs-config</b></td><td><b>Cray SFS config server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>453</b></td><td><b>TCP</b></td><td><b>creativeserver</b></td><td><b>CreativeServer</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>453</b></td><td><b>UDP</b></td><td><b>creativeserver</b></td><td><b>CreativeServer</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>454</b></td><td><b>TCP</b></td><td><b>contentserver</b></td><td><b>ContentServer</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>454</b></td><td><b>UDP</b></td><td><b>contentserver</b></td><td><b>ContentServer</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>455</b></td><td><b>TCP</b></td><td><b>creativepartnr</b></td><td><b>CreativePartnr</b></td><td><b>Fatal Connections</b></td></tr>
<tr><td class="r"><b>455</b></td><td><b>UDP</b></td><td><b>creativepartnr</b></td><td><b>CreativePartnr</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>456</b></td><td><b>TCP</b></td><td><b>macon-tcp</b></td><td><b>macon-tcp</b></td><td><b>Hackers Paradise</b></td></tr>
<tr><td class="r"><b>456</b></td><td><b>UDP</b></td><td><b>macon-udp</b></td><td><b>macon-udp</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>457</b></td><td><b>TCP</b></td><td><b>scohelp</b></td><td><b>scohelp</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>457</b></td><td><b>UDP</b></td><td><b>scohelp</b></td><td><b>scohelp</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>458</b></td><td><b>TCP</b></td><td><b>appleqtc</b></td><td><b>apple quick time</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>458</b></td><td><b>UDP</b></td><td><b>appleqtc</b></td><td><b>apple quick time</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>459</b></td><td><b>TCP</b></td><td><b>ampr-rcmd</b></td><td><b>ampr-rcmd</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>459</b></td><td><b>UDP</b></td><td><b>ampr-rcmd</b></td><td><b>ampr-rcmd</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>460</b></td><td><b>TCP</b></td><td><b>skronk</b></td><td><b>skronk</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>460</b></td><td><b>UDP</b></td><td><b>skronk</b></td><td><b>skronk</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>461</b></td><td><b>TCP</b></td><td><b>datasurfsrv</b></td><td><b>DataRampSrv</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>461</b></td><td><b>UDP</b></td><td><b>datasurfsrv</b></td><td><b>DataRampSrv</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>462</b></td><td><b>TCP</b></td><td><b>datasurfsrvsec</b></td><td><b>DataRampSrvSec</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>462</b></td><td><b>UDP</b></td><td><b>datasurfsrvsec</b></td><td><b>DataRampSrvSec</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>463</b></td><td><b>TCP</b></td><td><b>alpes</b></td><td><b>alpes</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>463</b></td><td><b>UDP</b></td><td><b>alpes</b></td><td><b>alpes</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>464</b></td><td><b>TCP</b></td><td><b>kpasswd</b></td><td><b>kpasswd</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>464</b></td><td><b>UDP</b></td><td><b>kpasswd</b></td><td><b>kpasswd</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>465</b></td><td><b>TCP</b></td><td><b>urd</b></td><td><b>URL Rendesvous Directory for SSM</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>465</b></td><td><b>UDP</b></td><td><b>igmpv3lite</b></td><td><b>IGMP over UDP for SSM</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>466</b></td><td><b>TCP</b></td><td><b>digital-vrc</b></td><td><b>digital-vrc</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>466</b></td><td><b>UDP</b></td><td><b>digital-vrc</b></td><td><b>digital-vrc</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>467</b></td><td><b>TCP</b></td><td><b>mylex-mapd</b></td><td><b>mylex-mapd</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>467</b></td><td><b>UDP</b></td><td><b>mylex-mapd</b></td><td><b>mylex-mapd</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>468</b></td><td><b>TCP</b></td><td><b>photuris</b></td><td><b>proturis</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>468</b></td><td><b>UDP</b></td><td><b>photuris</b></td><td><b>proturis</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>469</b></td><td><b>TCP</b></td><td><b>rcp</b></td><td><b>Radio Control Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>469</b></td><td><b>UDP</b></td><td><b>rcp</b></td><td><b>Radio Control Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>470</b></td><td><b>TCP</b></td><td><b>scx-proxy</b></td><td><b>scx-proxy</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>470</b></td><td><b>UDP</b></td><td><b>scx-proxy</b></td><td><b>scx-proxy</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>471</b></td><td><b>TCP</b></td><td><b>mondex</b></td><td><b>Mondex</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>471</b></td><td><b>UDP</b></td><td><b>mondex</b></td><td><b>Mondex</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>472</b></td><td><b>TCP</b></td><td><b>ljk-login</b></td><td><b>ljk-login</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>472</b></td><td><b>UDP</b></td><td><b>ljk-login</b></td><td><b>ljk-login</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>473</b></td><td><b>TCP</b></td><td><b>hybrid-pop</b></td><td><b>hybrid-pop</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>473</b></td><td><b>UDP</b></td><td><b>hybrid-pop</b></td><td><b>hybrid-pop</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>474</b></td><td><b>TCP</b></td><td><b>tn-tl-w1</b></td><td><b>tn-tl-w1</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>474</b></td><td><b>UDP</b></td><td><b>tn-tl-w2</b></td><td><b>tn-tl-w2</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>475</b></td><td><b>TCP</b></td><td><b>tcpnethaspsrv</b></td><td><b>tcpnethaspsrv</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>475</b></td><td><b>UDP</b></td><td><b>tcpnethaspsrv</b></td><td><b>tcpnethaspsrv</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>476</b></td><td><b>TCP</b></td><td><b>tn-tl-fd1</b></td><td><b>tn-tl-fd1</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>476</b></td><td><b>UDP</b></td><td><b>tn-tl-fd1</b></td><td><b>tn-tl-fd1</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>477</b></td><td><b>TCP</b></td><td><b>ss7ns</b></td><td><b>ss7ns</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>477</b></td><td><b>UDP</b></td><td><b>ss7ns</b></td><td><b>ss7ns</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>478</b></td><td><b>TCP</b></td><td><b>spsc</b></td><td><b>spsc</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>478</b></td><td><b>UDP</b></td><td><b>spsc</b></td><td><b>spsc</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>479</b></td><td><b>TCP</b></td><td><b>iafserver</b></td><td><b>iafserver</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>479</b></td><td><b>UDP</b></td><td><b>iafserver</b></td><td><b>iafserver</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>480</b></td><td><b>TCP</b></td><td><b>iafdbase</b></td><td><b>iafdbase</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>480</b></td><td><b>UDP</b></td><td><b>iafdbase</b></td><td><b>iafdbase</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>481</b></td><td><b>TCP</b></td><td><b>ph</b></td><td><b>Ph service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>481</b></td><td><b>UDP</b></td><td><b>ph</b></td><td><b>Ph service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>482</b></td><td><b>TCP</b></td><td><b>bgs-nsi</b></td><td><b>bgs-nsi</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>482</b></td><td><b>UDP</b></td><td><b>bgs-nsi</b></td><td><b>bgs-nsi</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>483</b></td><td><b>TCP</b></td><td><b>ulpnet</b></td><td><b>ulpnet</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>483</b></td><td><b>UDP</b></td><td><b>ulpnet</b></td><td><b>ulpnet</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>484</b></td><td><b>TCP</b></td><td><b>integra-sme</b></td><td><b>Integra Software Management Environment</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>484</b></td><td><b>UDP</b></td><td><b>integra-sme</b></td><td><b>Integra Software Management Environment</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>485</b></td><td><b>TCP</b></td><td><b>powerburst</b></td><td><b>Air Soft Power Burst</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>485</b></td><td><b>UDP</b></td><td><b>powerburst</b></td><td><b>Air Soft Power Burst</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>486</b></td><td><b>TCP</b></td><td><b>avian</b></td><td><b>avian</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>486</b></td><td><b>UDP</b></td><td><b>avian</b></td><td><b>avian</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>487</b></td><td><b>TCP</b></td><td><b>saft</b></td><td><b>saft Simple Asynchronous File Transfer</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>487</b></td><td><b>UDP</b></td><td><b>saft</b></td><td><b>saft Simple Asynchronous File Transfer</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>488</b></td><td><b>TCP</b></td><td><b>gss-http</b></td><td><b>gss-http</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>488</b></td><td><b>UDP</b></td><td><b>gss-http</b></td><td><b>gss-http</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>489</b></td><td><b>TCP</b></td><td><b>nest-protocol</b></td><td><b>nest-protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>489</b></td><td><b>UDP</b></td><td><b>nest-protocol</b></td><td><b>nest-protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>490</b></td><td><b>TCP</b></td><td><b>micom-pfs</b></td><td><b>micom-pfs</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>490</b></td><td><b>UDP</b></td><td><b>micom-pfs</b></td><td><b>micom-pfs</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>491</b></td><td><b>TCP</b></td><td><b>go-login</b></td><td><b>go-login</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>491</b></td><td><b>UDP</b></td><td><b>go-login</b></td><td><b>go-login</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>492</b></td><td><b>TCP</b></td><td><b>ticf-1</b></td><td><b>Transport Independent Convergence for FNA</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>492</b></td><td><b>UDP</b></td><td><b>ticf-1</b></td><td><b>Transport Independent Convergence for FNA</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>493</b></td><td><b>TCP</b></td><td><b>ticf-2</b></td><td><b>Transport Independent Convergence for FNA</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>493</b></td><td><b>UDP</b></td><td><b>ticf-2</b></td><td><b>Transport Independent Convergence for FNA</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>494</b></td><td><b>TCP</b></td><td><b>pov-ray</b></td><td><b>POV-Ray</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>494</b></td><td><b>UDP</b></td><td><b>pov-ray</b></td><td><b>POV-Ray</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>495</b></td><td><b>TCP</b></td><td><b>intecourier</b></td><td><b>intecourier</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>495</b></td><td><b>UDP</b></td><td><b>intecourier</b></td><td><b>intecourier</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>496</b></td><td><b>TCP</b></td><td><b>pim-rp-disc</b></td><td><b>PIM-RP-DISC</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>496</b></td><td><b>UDP</b></td><td><b>pim-rp-disc</b></td><td><b>PIM-RP-DISC</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>497</b></td><td><b>TCP</b></td><td><b>dantz</b></td><td><b>dantz</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>497</b></td><td><b>UDP</b></td><td><b>dantz</b></td><td><b>dantz</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>498</b></td><td><b>TCP</b></td><td><b>siam</b></td><td><b>siam</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>498</b></td><td><b>UDP</b></td><td><b>siam</b></td><td><b>siam</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>499</b></td><td><b>TCP</b></td><td><b>iso-ill</b></td><td><b>ISO ILL Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>499</b></td><td><b>UDP</b></td><td><b>iso-ill</b></td><td><b>ISO ILL Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>500</b></td><td><b>TCP</b></td><td><b>isakmp</b></td><td><b>isakmp</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>500</b></td><td><b>UDP</b></td><td><b>isakmp</b></td><td><b>isakmp</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>501</b></td><td><b>TCP</b></td><td><b>stmf</b></td><td><b>STMF</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>501</b></td><td><b>UDP</b></td><td><b>stmf</b></td><td><b>STMF</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>502</b></td><td><b>TCP</b></td><td><b>asa-appl-proto</b></td><td><b>asa-appl-proto</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>502</b></td><td><b>UDP</b></td><td><b>asa-appl-proto</b></td><td><b>asa-appl-proto</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>503</b></td><td><b>TCP</b></td><td><b>intrinsa</b></td><td><b>Intrinsa</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>503</b></td><td><b>UDP</b></td><td><b>intrinsa</b></td><td><b>Intrinsa</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>504</b></td><td><b>TCP</b></td><td><b>citadel</b></td><td><b>citadel</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>504</b></td><td><b>UDP</b></td><td><b>citadel</b></td><td><b>citadel</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>505</b></td><td><b>TCP</b></td><td><b>mailbox-lm</b></td><td><b>mailbox-lm</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>505</b></td><td><b>UDP</b></td><td><b>mailbox-lm</b></td><td><b>mailbox-lm</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>506</b></td><td><b>TCP</b></td><td><b>ohimsrv</b></td><td><b>ohimsrv</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>506</b></td><td><b>UDP</b></td><td><b>ohimsrv</b></td><td><b>ohimsrv</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>507</b></td><td><b>TCP</b></td><td><b>crs</b></td><td><b>crs</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>507</b></td><td><b>UDP</b></td><td><b>crs</b></td><td><b>crs</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>508</b></td><td><b>TCP</b></td><td><b>xvttp</b></td><td><b>xvttp</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>508</b></td><td><b>UDP</b></td><td><b>xvttp</b></td><td><b>xvttp</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>509</b></td><td><b>TCP</b></td><td><b>snare</b></td><td><b>snare</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>509</b></td><td><b>UDP</b></td><td><b>snare</b></td><td><b>snare</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>510</b></td><td><b>TCP</b></td><td><b>fcp</b></td><td><b>FirstClass Protocol</b></td><td><b>t0rnkit sshd backdoor</b></td></tr>
<tr><td class="r"><b>510</b></td><td><b>UDP</b></td><td><b>fcp</b></td><td><b>FirstClass Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>511</b></td><td><b>TCP</b></td><td><b>passgo</b></td><td><b>PassGo</b></td><td><b>T0rn Rootkit</b></td></tr>
<tr><td class="r"><b>511</b></td><td><b>UDP</b></td><td><b>passgo</b></td><td><b>PassGo</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>512</b></td><td><b>TCP</b></td><td><b>exec</b></td><td><b>remote process execution</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>512</b></td><td><b>UDP</b></td><td><b>biff</b></td><td><b>used by mail system to notify users</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>513</b></td><td><b>TCP</b></td><td><b>login</b></td><td><b>remote login a la telnet</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>513</b></td><td><b>UDP</b></td><td><b>who</b></td><td><b>maintains data bases showing who's</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>514</b></td><td><b>TCP</b></td><td><b>shell</b></td><td><b>cmd</b></td><td><b>RPC Backdoor</b></td></tr>
<tr><td class="r"><b>514</b></td><td><b>UDP</b></td><td><b>syslog</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>515</b></td><td><b>TCP</b></td><td><b>printer</b></td><td><b>spooler</b></td><td><b>lpdw0rm, Ramen</b></td></tr>
<tr><td class="r"><b>515</b></td><td><b>UDP</b></td><td><b>printer</b></td><td><b>spooler</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>516</b></td><td><b>TCP</b></td><td><b>videotex</b></td><td><b>videotex</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>516</b></td><td><b>UDP</b></td><td><b>videotex</b></td><td><b>videotex</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>517</b></td><td><b>TCP</b></td><td><b>talk</b></td><td><b>like tenex link, but across</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>517</b></td><td><b>UDP</b></td><td><b>talk</b></td><td><b>like tenex link, but across</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>518</b></td><td><b>TCP</b></td><td><b>ntalk</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>518</b></td><td><b>UDP</b></td><td><b>ntalk</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>519</b></td><td><b>TCP</b></td><td><b>utime</b></td><td><b>unixtime</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>519</b></td><td><b>UDP</b></td><td><b>utime</b></td><td><b>unixtime</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>520</b></td><td><b>TCP</b></td><td><b>efs</b></td><td><b>extended file name server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>520</b></td><td><b>UDP</b></td><td><b>router</b></td><td><b>local routing process (on site)</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>521</b></td><td><b>TCP</b></td><td><b>ripng</b></td><td><b>ripng</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>521</b></td><td><b>UDP</b></td><td><b>ripng</b></td><td><b>ripng</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>522</b></td><td><b>TCP</b></td><td><b>ulp</b></td><td><b>ULP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>522</b></td><td><b>UDP</b></td><td><b>ulp</b></td><td><b>ULP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>523</b></td><td><b>TCP</b></td><td><b>ibm-db2</b></td><td><b>IBM-DB2</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>523</b></td><td><b>UDP</b></td><td><b>ibm-db2</b></td><td><b>IBM-DB2</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>524</b></td><td><b>TCP</b></td><td><b>ncp</b></td><td><b>NCP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>524</b></td><td><b>UDP</b></td><td><b>ncp</b></td><td><b>NCP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>525</b></td><td><b>TCP</b></td><td><b>timed</b></td><td><b>timeserver</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>525</b></td><td><b>UDP</b></td><td><b>timed</b></td><td><b>timeserver</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>526</b></td><td><b>TCP</b></td><td><b>tempo</b></td><td><b>newdate</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>526</b></td><td><b>UDP</b></td><td><b>tempo</b></td><td><b>newdate</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>527</b></td><td><b>TCP</b></td><td><b>stx</b></td><td><b>Stock IXChange</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>527</b></td><td><b>UDP</b></td><td><b>stx</b></td><td><b>Stock IXChange</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>528</b></td><td><b>TCP</b></td><td><b>custix</b></td><td><b>Customer IXChange</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>528</b></td><td><b>UDP</b></td><td><b>custix</b></td><td><b>Customer IXChange</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>529</b></td><td><b>TCP</b></td><td><b>irc-serv</b></td><td><b>IRC-SERV</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>529</b></td><td><b>UDP</b></td><td><b>irc-serv</b></td><td><b>IRC-SERV</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>530</b></td><td><b>TCP</b></td><td><b>courier</b></td><td><b>rpc</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>530</b></td><td><b>UDP</b></td><td><b>courier</b></td><td><b>rpc</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>531</b></td><td><b>TCP</b></td><td><b>conference</b></td><td><b>chat</b></td><td><b>Net666, Rasmin</b></td></tr>
<tr><td class="r"><b>531</b></td><td><b>UDP</b></td><td><b>conference</b></td><td><b>chat</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>532</b></td><td><b>TCP</b></td><td><b>netnews</b></td><td><b>readnews</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>532</b></td><td><b>UDP</b></td><td><b>netnews</b></td><td><b>readnews</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>533</b></td><td><b>TCP</b></td><td><b>netwall</b></td><td><b>for emergency broadcasts</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>533</b></td><td><b>UDP</b></td><td><b>netwall</b></td><td><b>for emergency broadcasts</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>534</b></td><td><b>TCP</b></td><td><b>mm-admin</b></td><td><b>MegaMedia Admin</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>534</b></td><td><b>UDP</b></td><td><b>mm-admin</b></td><td><b>MegaMedia Admin</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>535</b></td><td><b>TCP</b></td><td><b>iiop</b></td><td><b>iiop</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>535</b></td><td><b>UDP</b></td><td><b>iiop</b></td><td><b>iiop</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>536</b></td><td><b>TCP</b></td><td><b>opalis-rdv</b></td><td><b>opalis-rdv</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>536</b></td><td><b>UDP</b></td><td><b>opalis-rdv</b></td><td><b>opalis-rdv</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>537</b></td><td><b>TCP</b></td><td><b>nmsp</b></td><td><b>Networked Media Streaming Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>537</b></td><td><b>UDP</b></td><td><b>nmsp</b></td><td><b>Networked Media Streaming Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>538</b></td><td><b>TCP</b></td><td><b>gdomap</b></td><td><b>gdomap</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>538</b></td><td><b>UDP</b></td><td><b>gdomap</b></td><td><b>gdomap</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>539</b></td><td><b>TCP</b></td><td><b>apertus-ldp</b></td><td><b>Apertus Technologies Load Determination</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>539</b></td><td><b>UDP</b></td><td><b>apertus-ldp</b></td><td><b>Apertus Technologies Load Determination</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>540</b></td><td><b>TCP</b></td><td><b>uucp</b></td><td><b>uucpd</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>540</b></td><td><b>UDP</b></td><td><b>uucp</b></td><td><b>uucpd</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>541</b></td><td><b>TCP</b></td><td><b>uucp-rlogin</b></td><td><b>uucp-rlogin</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>541</b></td><td><b>UDP</b></td><td><b>uucp-rlogin</b></td><td><b>uucp-rlogin</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>542</b></td><td><b>TCP</b></td><td><b>commerce</b></td><td><b>commerce</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>542</b></td><td><b>UDP</b></td><td><b>commerce</b></td><td><b>commerce</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>543</b></td><td><b>TCP</b></td><td><b>klogin</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>543</b></td><td><b>UDP</b></td><td><b>klogin</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>544</b></td><td><b>TCP</b></td><td><b>kshell</b></td><td><b>krcmd</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>544</b></td><td><b>UDP</b></td><td><b>kshell</b></td><td><b>krcmd</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>545</b></td><td><b>TCP</b></td><td><b>appleqtcsrvr</b></td><td><b>appleqtcsrvr</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>545</b></td><td><b>UDP</b></td><td><b>appleqtcsrvr</b></td><td><b>appleqtcsrvr</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>546</b></td><td><b>TCP</b></td><td><b>dhcpv6-client</b></td><td><b>DHCPv6 Client</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>546</b></td><td><b>UDP</b></td><td><b>dhcpv6-client</b></td><td><b>DHCPv6 Client</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>547</b></td><td><b>TCP</b></td><td><b>dhcpv6-server</b></td><td><b>DHCPv6 Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>547</b></td><td><b>UDP</b></td><td><b>dhcpv6-server</b></td><td><b>DHCPv6 Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>548</b></td><td><b>TCP</b></td><td><b>afpovertcp</b></td><td><b>AFP over TCP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>548</b></td><td><b>UDP</b></td><td><b>afpovertcp</b></td><td><b>AFP over TCP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>549</b></td><td><b>TCP</b></td><td><b>idfp</b></td><td><b>IDFP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>549</b></td><td><b>UDP</b></td><td><b>idfp</b></td><td><b>IDFP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>550</b></td><td><b>TCP</b></td><td><b>new-rwho</b></td><td><b>new-who</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>550</b></td><td><b>UDP</b></td><td><b>new-rwho</b></td><td><b>new-who</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>551</b></td><td><b>TCP</b></td><td><b>cybercash</b></td><td><b>cybercash</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>551</b></td><td><b>UDP</b></td><td><b>cybercash</b></td><td><b>cybercash</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>552</b></td><td><b>TCP</b></td><td><b>devshr-nts</b></td><td><b>DeviceShare</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>552</b></td><td><b>UDP</b></td><td><b>devshr-nts</b></td><td><b>DeviceShare</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>553</b></td><td><b>TCP</b></td><td><b>pirp</b></td><td><b>pirp</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>553</b></td><td><b>UDP</b></td><td><b>pirp</b></td><td><b>pirp</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>554</b></td><td><b>TCP</b></td><td><b>rtsp</b></td><td><b>Real Time Stream Control Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>554</b></td><td><b>UDP</b></td><td><b>rtsp</b></td><td><b>Real Time Stream Control Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>555</b></td><td><b>TCP</b></td><td><b>dsf</b></td><td><b><br />
</b></td><td><b>711 trojan (Seven Eleven), Phase-0, Phase Zero, Net Administrator, Ini-Killer, Stealth Spy, Id2001, PhaseZero, StealthSpy</b></td></tr>
<tr><td class="r"><b>555</b></td><td><b>UDP</b></td><td><b>dsf</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>556</b></td><td><b>TCP</b></td><td><b>remotefs</b></td><td><b>rfs server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>556</b></td><td><b>UDP</b></td><td><b>remotefs</b></td><td><b>rfs server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>557</b></td><td><b>TCP</b></td><td><b>openvms-sysipc</b></td><td><b>openvms-sysipc</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>557</b></td><td><b>UDP</b></td><td><b>openvms-sysipc</b></td><td><b>openvms-sysipc</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>558</b></td><td><b>TCP</b></td><td><b>sdnskmp</b></td><td><b>SDNSKMP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>558</b></td><td><b>UDP</b></td><td><b>sdnskmp</b></td><td><b>SDNSKMP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>559</b></td><td><b>TCP</b></td><td><b>teedtap</b></td><td><b>TEEDTAP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>559</b></td><td><b>UDP</b></td><td><b>teedtap</b></td><td><b>TEEDTAP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>560</b></td><td><b>TCP</b></td><td><b>rmonitor</b></td><td><b>rmonitord</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>560</b></td><td><b>UDP</b></td><td><b>rmonitor</b></td><td><b>rmonitord</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>561</b></td><td><b>TCP</b></td><td><b>monitor</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>561</b></td><td><b>UDP</b></td><td><b>monitor</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>562</b></td><td><b>TCP</b></td><td><b>chshell</b></td><td><b>chcmd</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>562</b></td><td><b>UDP</b></td><td><b>chshell</b></td><td><b>chcmd</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>563</b></td><td><b>TCP</b></td><td><b>nntps</b></td><td><b>nntp protocol over TLS/SSL (was snntp)</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>563</b></td><td><b>UDP</b></td><td><b>nntps</b></td><td><b>nntp protocol over TLS/SSL (was snntp)</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>564</b></td><td><b>TCP</b></td><td><b>9pfs</b></td><td><b>plan 9 file service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>564</b></td><td><b>UDP</b></td><td><b>9pfs</b></td><td><b>plan 9 file service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>565</b></td><td><b>TCP</b></td><td><b>whoami</b></td><td><b>whoami</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>565</b></td><td><b>UDP</b></td><td><b>whoami</b></td><td><b>whoami</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>566</b></td><td><b>TCP</b></td><td><b>streettalk</b></td><td><b>streettalk</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>566</b></td><td><b>UDP</b></td><td><b>streettalk</b></td><td><b>streettalk</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>567</b></td><td><b>TCP</b></td><td><b>banyan-rpc</b></td><td><b>banyan-rpc</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>567</b></td><td><b>UDP</b></td><td><b>banyan-rpc</b></td><td><b>banyan-rpc</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>568</b></td><td><b>TCP</b></td><td><b>ms-shuttle</b></td><td><b>microsoft shuttle</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>568</b></td><td><b>UDP</b></td><td><b>ms-shuttle</b></td><td><b>microsoft shuttle</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>569</b></td><td><b>TCP</b></td><td><b>ms-rome</b></td><td><b>microsoft rome</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>569</b></td><td><b>UDP</b></td><td><b>ms-rome</b></td><td><b>microsoft rome</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>570</b></td><td><b>TCP</b></td><td><b>meter</b></td><td><b>demon</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>570</b></td><td><b>UDP</b></td><td><b>meter</b></td><td><b>demon</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>571</b></td><td><b>TCP</b></td><td><b>meter</b></td><td><b>udemon</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>571</b></td><td><b>UDP</b></td><td><b>meter</b></td><td><b>udemon</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>572</b></td><td><b>TCP</b></td><td><b>sonar</b></td><td><b>sonar</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>572</b></td><td><b>UDP</b></td><td><b>sonar</b></td><td><b>sonar</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>573</b></td><td><b>TCP</b></td><td><b>banyan-vip</b></td><td><b>banyan-vip</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>573</b></td><td><b>UDP</b></td><td><b>banyan-vip</b></td><td><b>banyan-vip</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>574</b></td><td><b>TCP</b></td><td><b>ftp-agent</b></td><td><b>FTP Software Agent System</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>574</b></td><td><b>UDP</b></td><td><b>ftp-agent</b></td><td><b>FTP Software Agent System</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>575</b></td><td><b>TCP</b></td><td><b>vemmi</b></td><td><b>VEMMI</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>575</b></td><td><b>UDP</b></td><td><b>vemmi</b></td><td><b>VEMMI</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>576</b></td><td><b>TCP</b></td><td><b>ipcd</b></td><td><b>ipcd</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>576</b></td><td><b>UDP</b></td><td><b>ipcd</b></td><td><b>ipcd</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>577</b></td><td><b>TCP</b></td><td><b>vnas</b></td><td><b>vnas</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>577</b></td><td><b>UDP</b></td><td><b>vnas</b></td><td><b>vnas</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>578</b></td><td><b>TCP</b></td><td><b>ipdd</b></td><td><b>ipdd</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>578</b></td><td><b>UDP</b></td><td><b>ipdd</b></td><td><b>ipdd</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>579</b></td><td><b>TCP</b></td><td><b>decbsrv</b></td><td><b>decbsrv</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>579</b></td><td><b>UDP</b></td><td><b>decbsrv</b></td><td><b>decbsrv</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>580</b></td><td><b>TCP</b></td><td><b>sntp-heartbeat</b></td><td><b>SNTP HEARTBEAT</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>580</b></td><td><b>UDP</b></td><td><b>sntp-heartbeat</b></td><td><b>SNTP HEARTBEAT</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>581</b></td><td><b>TCP</b></td><td><b>bdp</b></td><td><b>Bundle Discovery Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>581</b></td><td><b>UDP</b></td><td><b>bdp</b></td><td><b>Bundle Discovery Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>582</b></td><td><b>TCP</b></td><td><b>scc-security</b></td><td><b>SCC Security</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>582</b></td><td><b>UDP</b></td><td><b>scc-security</b></td><td><b>SCC Security</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>583</b></td><td><b>TCP</b></td><td><b>philips-vc</b></td><td><b>Philips Video-Conferencing</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>583</b></td><td><b>UDP</b></td><td><b>philips-vc</b></td><td><b>Philips Video-Conferencing</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>584</b></td><td><b>TCP</b></td><td><b>keyserver</b></td><td><b>Key Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>584</b></td><td><b>UDP</b></td><td><b>keyserver</b></td><td><b>Key Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>585</b></td><td><b>TCP</b></td><td><b>imap4-ssl</b></td><td><b>IMAP4+SSL (use 993 instead)</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>585</b></td><td><b>UDP</b></td><td><b>imap4-ssl</b></td><td><b>IMAP4+SSL (use 993 instead)</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>586</b></td><td><b>TCP</b></td><td><b>password-chg</b></td><td><b>Password Change</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>586</b></td><td><b>UDP</b></td><td><b>password-chg</b></td><td><b>Password Change</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>587</b></td><td><b>TCP</b></td><td><b>submission</b></td><td><b>Submission</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>587</b></td><td><b>UDP</b></td><td><b>submission</b></td><td><b>Submission</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>588</b></td><td><b>TCP</b></td><td><b>cal</b></td><td><b>CAL</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>588</b></td><td><b>UDP</b></td><td><b>cal</b></td><td><b>CAL</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>589</b></td><td><b>TCP</b></td><td><b>eyelink</b></td><td><b>EyeLink</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>589</b></td><td><b>UDP</b></td><td><b>eyelink</b></td><td><b>EyeLink</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>590</b></td><td><b>TCP</b></td><td><b>tns-cml</b></td><td><b>TNS CML</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>590</b></td><td><b>UDP</b></td><td><b>tns-cml</b></td><td><b>TNS CML</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>591</b></td><td><b>TCP</b></td><td><b>http-alt</b></td><td><b>FileMaker, Inc. - HTTP Alternate (see Port 80)</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>591</b></td><td><b>UDP</b></td><td><b>http-alt</b></td><td><b>FileMaker, Inc. - HTTP Alternate (see Port 80)</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>592</b></td><td><b>TCP</b></td><td><b>eudora-set</b></td><td><b>Eudora Set</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>592</b></td><td><b>UDP</b></td><td><b>eudora-set</b></td><td><b>Eudora Set</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>593</b></td><td><b>TCP</b></td><td><b>http-rpc-epmap</b></td><td><b>HTTP RPC Ep Map</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>593</b></td><td><b>UDP</b></td><td><b>http-rpc-epmap</b></td><td><b>HTTP RPC Ep Map</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>594</b></td><td><b>TCP</b></td><td><b>tpip</b></td><td><b>TPIP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>594</b></td><td><b>UDP</b></td><td><b>tpip</b></td><td><b>TPIP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>595</b></td><td><b>TCP</b></td><td><b>cab-protocol</b></td><td><b>CAB Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>595</b></td><td><b>UDP</b></td><td><b>cab-protocol</b></td><td><b>CAB Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>596</b></td><td><b>TCP</b></td><td><b>smsd</b></td><td><b>SMSD</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>596</b></td><td><b>UDP</b></td><td><b>smsd</b></td><td><b>SMSD</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>597</b></td><td><b>TCP</b></td><td><b>ptcnameservice</b></td><td><b>PTC Name Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>597</b></td><td><b>UDP</b></td><td><b>ptcnameservice</b></td><td><b>PTC Name Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>598</b></td><td><b>TCP</b></td><td><b>sco-websrvrmg3</b></td><td><b>SCO Web Server Manager 3</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>598</b></td><td><b>UDP</b></td><td><b>sco-websrvrmg3</b></td><td><b>SCO Web Server Manager 3</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>599</b></td><td><b>TCP</b></td><td><b>acp</b></td><td><b>Aeolon Core Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>599</b></td><td><b>UDP</b></td><td><b>acp</b></td><td><b>Aeolon Core Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>600</b></td><td><b>TCP</b></td><td><b>ipcserver</b></td><td><b>Sun IPC server</b></td><td><b>Sadmind</b></td></tr>
<tr><td class="r"><b>600</b></td><td><b>UDP</b></td><td><b>ipcserver</b></td><td><b>Sun IPC server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>601</b></td><td><b>TCP</b></td><td><b>syslog-conn</b></td><td><b>Reliable Syslog Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>601</b></td><td><b>UDP</b></td><td><b>syslog-conn</b></td><td><b>Reliable Syslog Service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>602</b></td><td><b>TCP</b></td><td><b>xmlrpc-beep</b></td><td><b>XML-RPC over BEEP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>602</b></td><td><b>UDP</b></td><td><b>xmlrpc-beep</b></td><td><b>XML-RPC over BEEP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>603</b></td><td><b>TCP</b></td><td><b>idxp</b></td><td><b>IDXP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>603</b></td><td><b>UDP</b></td><td><b>idxp</b></td><td><b>IDXP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>604</b></td><td><b>TCP</b></td><td><b>tunnel</b></td><td><b>TUNNEL</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>604</b></td><td><b>UDP</b></td><td><b>tunnel</b></td><td><b>TUNNEL</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>605</b></td><td><b>TCP</b></td><td><b>soap-beep</b></td><td><b>SOAP over BEEP</b></td><td><b>Secret Service</b></td></tr>
<tr><td class="r"><b>605</b></td><td><b>UDP</b></td><td><b>soap-beep</b></td><td><b>SOAP over BEEP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>606</b></td><td><b>TCP</b></td><td><b>urm</b></td><td><b>Cray Unified Resource Manager</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>606</b></td><td><b>UDP</b></td><td><b>urm</b></td><td><b>Cray Unified Resource Manager</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>607</b></td><td><b>TCP</b></td><td><b>nqs</b></td><td><b>nqs</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>607</b></td><td><b>UDP</b></td><td><b>nqs</b></td><td><b>nqs</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>608</b></td><td><b>TCP</b></td><td><b>sift-uft</b></td><td><b>Sender-Initiated/Unsolicited File Transfer</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>608</b></td><td><b>UDP</b></td><td><b>sift-uft</b></td><td><b>Sender-Initiated/Unsolicited File Transfer</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>609</b></td><td><b>TCP</b></td><td><b>npmp-trap</b></td><td><b>npmp-trap</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>609</b></td><td><b>UDP</b></td><td><b>npmp-trap</b></td><td><b>npmp-trap</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>610</b></td><td><b>TCP</b></td><td><b>npmp-local</b></td><td><b>npmp-local</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>610</b></td><td><b>UDP</b></td><td><b>npmp-local</b></td><td><b>npmp-local</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>611</b></td><td><b>TCP</b></td><td><b>npmp-gui</b></td><td><b>npmp-gui</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>611</b></td><td><b>UDP</b></td><td><b>npmp-gui</b></td><td><b>npmp-gui</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>612</b></td><td><b>TCP</b></td><td><b>hmmp-ind</b></td><td><b>HMMP Indication</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>612</b></td><td><b>UDP</b></td><td><b>hmmp-ind</b></td><td><b>HMMP Indication</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>613</b></td><td><b>TCP</b></td><td><b>hmmp-op</b></td><td><b>HMMP Operation</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>613</b></td><td><b>UDP</b></td><td><b>hmmp-op</b></td><td><b>HMMP Operation</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>614</b></td><td><b>TCP</b></td><td><b>sshell</b></td><td><b>SSLshell</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>614</b></td><td><b>UDP</b></td><td><b>sshell</b></td><td><b>SSLshell</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>615</b></td><td><b>TCP</b></td><td><b>sco-inetmgr</b></td><td><b>Internet Configuration Manager</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>615</b></td><td><b>UDP</b></td><td><b>sco-inetmgr</b></td><td><b>Internet Configuration Manager</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>616</b></td><td><b>TCP</b></td><td><b>sco-sysmgr</b></td><td><b>SCO System Administration Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>616</b></td><td><b>UDP</b></td><td><b>sco-sysmgr</b></td><td><b>SCO System Administration Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>617</b></td><td><b>TCP</b></td><td><b>sco-dtmgr</b></td><td><b>SCO Desktop Administration Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>617</b></td><td><b>UDP</b></td><td><b>sco-dtmgr</b></td><td><b>SCO Desktop Administration Server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>618</b></td><td><b>TCP</b></td><td><b>dei-icda</b></td><td><b>DEI-ICDA</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>618</b></td><td><b>UDP</b></td><td><b>dei-icda</b></td><td><b>DEI-ICDA</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>619</b></td><td><b>TCP</b></td><td><b>compaq-evm</b></td><td><b>Compaq EVM</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>619</b></td><td><b>UDP</b></td><td><b>compaq-evm</b></td><td><b>Compaq EVM</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>620</b></td><td><b>TCP</b></td><td><b>sco-websrvrmgr</b></td><td><b>SCO WebServer Manager</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>620</b></td><td><b>UDP</b></td><td><b>sco-websrvrmgr</b></td><td><b>SCO WebServer Manager</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>621</b></td><td><b>TCP</b></td><td><b>escp-ip</b></td><td><b>ESCP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>621</b></td><td><b>UDP</b></td><td><b>escp-ip</b></td><td><b>ESCP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>622</b></td><td><b>TCP</b></td><td><b>collaborator</b></td><td><b>Collaborator</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>622</b></td><td><b>UDP</b></td><td><b>collaborator</b></td><td><b>Collaborator</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>623</b></td><td><b>TCP</b></td><td><b>asf-rmcp</b></td><td><b>ASF Remote Management and Control Protocol</b></td><td><b>Rtb666</b></td></tr>
<tr><td class="r"><b>623</b></td><td><b>UDP</b></td><td><b>asf-rmcp</b></td><td><b>ASF Remote Management and Control Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>624</b></td><td><b>TCP</b></td><td><b>cryptoadmin</b></td><td><b>Crypto Admin</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>624</b></td><td><b>UDP</b></td><td><b>cryptoadmin</b></td><td><b>Crypto Admin</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>625</b></td><td><b>TCP</b></td><td><b>dec_dlm</b></td><td><b>DEC DLM</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>625</b></td><td><b>UDP</b></td><td><b>dec_dlm</b></td><td><b>DEC DLM</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>626</b></td><td><b>TCP</b></td><td><b>asia</b></td><td><b>ASIA</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>626</b></td><td><b>UDP</b></td><td><b>asia</b></td><td><b>ASIA</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>627</b></td><td><b>TCP</b></td><td><b>passgo-tivoli</b></td><td><b>PassGo Tivoli</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>627</b></td><td><b>UDP</b></td><td><b>passgo-tivoli</b></td><td><b>PassGo Tivoli</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>628</b></td><td><b>TCP</b></td><td><b>qmqp</b></td><td><b>QMQP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>628</b></td><td><b>UDP</b></td><td><b>qmqp</b></td><td><b>QMQP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>629</b></td><td><b>TCP</b></td><td><b>3com-amp3</b></td><td><b>3Com AMP3</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>629</b></td><td><b>UDP</b></td><td><b>3com-amp3</b></td><td><b>3Com AMP3</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>630</b></td><td><b>TCP</b></td><td><b>rda</b></td><td><b>RDA</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>630</b></td><td><b>UDP</b></td><td><b>rda</b></td><td><b>RDA</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>631</b></td><td><b>TCP</b></td><td><b>ipp</b></td><td><b>IPP (Internet Printing Protocol)</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>631</b></td><td><b>UDP</b></td><td><b>ipp</b></td><td><b>IPP (Internet Printing Protocol)</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>632</b></td><td><b>TCP</b></td><td><b>bmpp</b></td><td><b>bmpp</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>632</b></td><td><b>UDP</b></td><td><b>bmpp</b></td><td><b>bmpp</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>633</b></td><td><b>TCP</b></td><td><b>servstat</b></td><td><b>Service Status update (Sterling Software)</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>633</b></td><td><b>UDP</b></td><td><b>servstat</b></td><td><b>Service Status update (Sterling Software)</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>634</b></td><td><b>TCP</b></td><td><b>ginad</b></td><td><b>ginad</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>634</b></td><td><b>UDP</b></td><td><b>ginad</b></td><td><b>ginad</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>635</b></td><td><b>TCP</b></td><td><b>rlzdbase</b></td><td><b>RLZ DBase</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>635</b></td><td><b>UDP</b></td><td><b>rlzdbase</b></td><td><b>RLZ DBase</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>636</b></td><td><b>TCP</b></td><td><b>ldaps</b></td><td><b>ldap protocol over TLS/SSL (was sldap)</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>636</b></td><td><b>UDP</b></td><td><b>ldaps</b></td><td><b>ldap protocol over TLS/SSL (was sldap)</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>637</b></td><td><b>TCP</b></td><td><b>lanserver</b></td><td><b>lanserver</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>637</b></td><td><b>UDP</b></td><td><b>lanserver</b></td><td><b>lanserver</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>638</b></td><td><b>TCP</b></td><td><b>mcns-sec</b></td><td><b>mcns-sec</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>638</b></td><td><b>UDP</b></td><td><b>mcns-sec</b></td><td><b>mcns-sec</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>639</b></td><td><b>TCP</b></td><td><b>msdp</b></td><td><b>MSDP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>639</b></td><td><b>UDP</b></td><td><b>msdp</b></td><td><b>MSDP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>640</b></td><td><b>TCP</b></td><td><b>entrust-sps</b></td><td><b>entrust-sps</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>640</b></td><td><b>UDP</b></td><td><b>entrust-sps</b></td><td><b>entrust-sps</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>641</b></td><td><b>TCP</b></td><td><b>repcmd</b></td><td><b>repcmd</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>641</b></td><td><b>UDP</b></td><td><b>repcmd</b></td><td><b>repcmd</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>642</b></td><td><b>TCP</b></td><td><b>esro-emsdp</b></td><td><b>ESRO-EMSDP V1.3</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>642</b></td><td><b>UDP</b></td><td><b>esro-emsdp</b></td><td><b>ESRO-EMSDP V1.3</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>643</b></td><td><b>TCP</b></td><td><b>sanity</b></td><td><b>SANity</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>643</b></td><td><b>UDP</b></td><td><b>sanity</b></td><td><b>SANity</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>644</b></td><td><b>TCP</b></td><td><b>dwr</b></td><td><b>dwr</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>644</b></td><td><b>UDP</b></td><td><b>dwr</b></td><td><b>dwr</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>645</b></td><td><b>TCP</b></td><td><b>pssc</b></td><td><b>PSSC</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>645</b></td><td><b>UDP</b></td><td><b>pssc</b></td><td><b>PSSC</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>646</b></td><td><b>TCP</b></td><td><b>ldp</b></td><td><b>LDP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>646</b></td><td><b>UDP</b></td><td><b>ldp</b></td><td><b>LDP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>647</b></td><td><b>TCP</b></td><td><b>dhcp-failover</b></td><td><b>DHCP Failover</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>647</b></td><td><b>UDP</b></td><td><b>dhcp-failover</b></td><td><b>DHCP Failover</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>648</b></td><td><b>TCP</b></td><td><b>rrp</b></td><td><b>Registry Registrar Protocol (RRP)</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>648</b></td><td><b>UDP</b></td><td><b>rrp</b></td><td><b>Registry Registrar Protocol (RRP)</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>649</b></td><td><b>TCP</b></td><td><b>cadview-3d</b></td><td><b>Cadview-3d - streaming 3d models over the internet</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>649</b></td><td><b>UDP</b></td><td><b>cadview-3d</b></td><td><b>Cadview-3d - streaming 3d models over the internet</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>650</b></td><td><b>TCP</b></td><td><b>obex</b></td><td><b>OBEX</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>650</b></td><td><b>UDP</b></td><td><b>obex</b></td><td><b>OBEX</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>651</b></td><td><b>TCP</b></td><td><b>ieee-mms</b></td><td><b>IEEE MMS</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>651</b></td><td><b>UDP</b></td><td><b>ieee-mms</b></td><td><b>IEEE MMS</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>652</b></td><td><b>TCP</b></td><td><b>hello-port</b></td><td><b>HELLO_PORT</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>652</b></td><td><b>UDP</b></td><td><b>hello-port</b></td><td><b>HELLO_PORT</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>653</b></td><td><b>TCP</b></td><td><b>repscmd</b></td><td><b>RepCmd</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>653</b></td><td><b>UDP</b></td><td><b>repscmd</b></td><td><b>RepCmd</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>654</b></td><td><b>TCP</b></td><td><b>aodv</b></td><td><b>AODV</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>654</b></td><td><b>UDP</b></td><td><b>aodv</b></td><td><b>AODV</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>655</b></td><td><b>TCP</b></td><td><b>tinc</b></td><td><b>TINC</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>655</b></td><td><b>UDP</b></td><td><b>tinc</b></td><td><b>TINC</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>656</b></td><td><b>TCP</b></td><td><b>spmp</b></td><td><b>SPMP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>656</b></td><td><b>UDP</b></td><td><b>spmp</b></td><td><b>SPMP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>657</b></td><td><b>TCP</b></td><td><b>rmc</b></td><td><b>RMC</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>657</b></td><td><b>UDP</b></td><td><b>rmc</b></td><td><b>RMC</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>658</b></td><td><b>TCP</b></td><td><b>tenfold</b></td><td><b>TenFold</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>658</b></td><td><b>UDP</b></td><td><b>tenfold</b></td><td><b>TenFold</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>660</b></td><td><b>TCP</b></td><td><b>mac-srvr-admin</b></td><td><b>MacOS Server Admin</b></td><td><b>Zaratustra</b></td></tr>
<tr><td class="r"><b>660</b></td><td><b>UDP</b></td><td><b>mac-srvr-admin</b></td><td><b>MacOS Server Admin</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>661</b></td><td><b>TCP</b></td><td><b>hap</b></td><td><b>HAP</b></td><td><b>NokNok</b></td></tr>
<tr><td class="r"><b>661</b></td><td><b>UDP</b></td><td><b>hap</b></td><td><b>HAP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>662</b></td><td><b>TCP</b></td><td><b>pftp</b></td><td><b>PFTP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>662</b></td><td><b>UDP</b></td><td><b>pftp</b></td><td><b>PFTP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>663</b></td><td><b>TCP</b></td><td><b>purenoise</b></td><td><b>PureNoise</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>663</b></td><td><b>UDP</b></td><td><b>purenoise</b></td><td><b>PureNoise</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>664</b></td><td><b>TCP</b></td><td><b>asf-secure-rmcp</b></td><td><b>ASF Secure Remote Management and Control Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>664</b></td><td><b>UDP</b></td><td><b>asf-secure-rmcp</b></td><td><b>ASF Secure Remote Management and Control Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>665</b></td><td><b>TCP</b></td><td><b>sun-dr</b></td><td><b>Sun DR</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>665</b></td><td><b>UDP</b></td><td><b>sun-dr</b></td><td><b>Sun DR</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>666</b></td><td><b>TCP</b></td><td><b>doom</b></td><td><b>doom Id Software</b></td><td><b>Attack FTP, lpdw0rm, Shadow Phyre, ServU, Satans Back Door - SBD, NokNok, Cain & Abel, Back Construction, BLA trojan, th3r1pp3rz (= Therippers), BackConstruction</b></td></tr>
<tr><td class="r"><b>666</b></td><td><b>UDP</b></td><td><b>doom</b></td><td><b>doom Id Software</b></td><td><b>Bla, Noknok</b></td></tr>
<tr><td class="r"><b>667</b></td><td><b>TCP</b></td><td><b>disclose</b></td><td><b>campaign contribution disclosures - SDR Technologies</b></td><td><b>SniperNet</b></td></tr>
<tr><td class="r"><b>667</b></td><td><b>UDP</b></td><td><b>disclose</b></td><td><b>campaign contribution disclosures - SDR Technologies</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>668</b></td><td><b>TCP</b></td><td><b>mecomm</b></td><td><b>MeComm</b></td><td><b>th3r1pp3rz (= Therippers), Unicorn</b></td></tr>
<tr><td class="r"><b>668</b></td><td><b>UDP</b></td><td><b>mecomm</b></td><td><b>MeComm</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>669</b></td><td><b>TCP</b></td><td><b>meregister</b></td><td><b>MeRegister</b></td><td><b>DP trojan</b></td></tr>
<tr><td class="r"><b>669</b></td><td><b>UDP</b></td><td><b>meregister</b></td><td><b>MeRegister</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>670</b></td><td><b>TCP</b></td><td><b>vacdsm-sws</b></td><td><b>VACDSM-SWS</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>670</b></td><td><b>UDP</b></td><td><b>vacdsm-sws</b></td><td><b>VACDSM-SWS</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>671</b></td><td><b>TCP</b></td><td><b>vacdsm-app</b></td><td><b>VACDSM-APP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>671</b></td><td><b>UDP</b></td><td><b>vacdsm-app</b></td><td><b>VACDSM-APP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>672</b></td><td><b>TCP</b></td><td><b>vpps-qua</b></td><td><b>VPPS-QUA</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>672</b></td><td><b>UDP</b></td><td><b>vpps-qua</b></td><td><b>VPPS-QUA</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>673</b></td><td><b>TCP</b></td><td><b>cimplex</b></td><td><b>CIMPLEX</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>673</b></td><td><b>UDP</b></td><td><b>cimplex</b></td><td><b>CIMPLEX</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>674</b></td><td><b>TCP</b></td><td><b>acap</b></td><td><b>ACAP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>674</b></td><td><b>UDP</b></td><td><b>acap</b></td><td><b>ACAP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>675</b></td><td><b>TCP</b></td><td><b>dctp</b></td><td><b>DCTP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>675</b></td><td><b>UDP</b></td><td><b>dctp</b></td><td><b>DCTP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>676</b></td><td><b>TCP</b></td><td><b>vpps-via</b></td><td><b>VPPS Via</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>676</b></td><td><b>UDP</b></td><td><b>vpps-via</b></td><td><b>VPPS Via</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>677</b></td><td><b>TCP</b></td><td><b>vpp</b></td><td><b>Virtual Presence Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>677</b></td><td><b>UDP</b></td><td><b>vpp</b></td><td><b>Virtual Presence Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>678</b></td><td><b>TCP</b></td><td><b>ggf-ncp</b></td><td><b>GNU Generation Foundation NCP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>678</b></td><td><b>UDP</b></td><td><b>ggf-ncp</b></td><td><b>GNU Generation Foundation NCP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>679</b></td><td><b>TCP</b></td><td><b>mrm</b></td><td><b>MRM</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>679</b></td><td><b>UDP</b></td><td><b>mrm</b></td><td><b>MRM</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>680</b></td><td><b>TCP</b></td><td><b>entrust-aaas</b></td><td><b>entrust-aaas</b></td><td><b>Rtb666</b></td></tr>
<tr><td class="r"><b>680</b></td><td><b>UDP</b></td><td><b>entrust-aaas</b></td><td><b>entrust-aaas</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>681</b></td><td><b>TCP</b></td><td><b>entrust-aams</b></td><td><b>entrust-aams</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>681</b></td><td><b>UDP</b></td><td><b>entrust-aams</b></td><td><b>entrust-aams</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>682</b></td><td><b>TCP</b></td><td><b>xfr</b></td><td><b>XFR</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>682</b></td><td><b>UDP</b></td><td><b>xfr</b></td><td><b>XFR</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>683</b></td><td><b>TCP</b></td><td><b>corba-iiop</b></td><td><b>CORBA IIOP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>683</b></td><td><b>UDP</b></td><td><b>corba-iiop</b></td><td><b>CORBA IIOP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>684</b></td><td><b>TCP</b></td><td><b>corba-iiop-ssl</b></td><td><b>CORBA IIOP SSL</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>684</b></td><td><b>UDP</b></td><td><b>corba-iiop-ssl</b></td><td><b>CORBA IIOP SSL</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>685</b></td><td><b>TCP</b></td><td><b>mdc-portmapper</b></td><td><b>MDC Port Mapper</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>685</b></td><td><b>UDP</b></td><td><b>mdc-portmapper</b></td><td><b>MDC Port Mapper</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>686</b></td><td><b>TCP</b></td><td><b>hcp-wismar</b></td><td><b>Hardware Control Protocol Wismar</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>686</b></td><td><b>UDP</b></td><td><b>hcp-wismar</b></td><td><b>Hardware Control Protocol Wismar</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>687</b></td><td><b>TCP</b></td><td><b>asipregistry</b></td><td><b>asipregistry</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>687</b></td><td><b>UDP</b></td><td><b>asipregistry</b></td><td><b>asipregistry</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>688</b></td><td><b>TCP</b></td><td><b>realm-rusd</b></td><td><b>REALM-RUSD</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>688</b></td><td><b>UDP</b></td><td><b>realm-rusd</b></td><td><b>REALM-RUSD</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>689</b></td><td><b>TCP</b></td><td><b>nmap</b></td><td><b>NMAP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>689</b></td><td><b>UDP</b></td><td><b>nmap</b></td><td><b>NMAP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>690</b></td><td><b>TCP</b></td><td><b>vatp</b></td><td><b>VATP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>690</b></td><td><b>UDP</b></td><td><b>vatp</b></td><td><b>VATP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>691</b></td><td><b>TCP</b></td><td><b>msexch-routing</b></td><td><b>MS Exchange Routing</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>691</b></td><td><b>UDP</b></td><td><b>msexch-routing</b></td><td><b>MS Exchange Routing</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>692</b></td><td><b>TCP</b></td><td><b>hyperwave-isp</b></td><td><b>Hyperwave-ISP</b></td><td><b>GayOL</b></td></tr>
<tr><td class="r"><b>692</b></td><td><b>UDP</b></td><td><b>hyperwave-isp</b></td><td><b>Hyperwave-ISP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>693</b></td><td><b>TCP</b></td><td><b>connendp</b></td><td><b>connendp</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>693</b></td><td><b>UDP</b></td><td><b>connendp</b></td><td><b>connendp</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>694</b></td><td><b>TCP</b></td><td><b>ha-cluster</b></td><td><b>ha-cluster</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>694</b></td><td><b>UDP</b></td><td><b>ha-cluster</b></td><td><b>ha-cluster</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>695</b></td><td><b>TCP</b></td><td><b>ieee-mms-ssl</b></td><td><b>IEEE-MMS-SSL</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>695</b></td><td><b>UDP</b></td><td><b>ieee-mms-ssl</b></td><td><b>IEEE-MMS-SSL</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>696</b></td><td><b>TCP</b></td><td><b>rushd</b></td><td><b>RUSHD</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>696</b></td><td><b>UDP</b></td><td><b>rushd</b></td><td><b>RUSHD</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>697</b></td><td><b>TCP</b></td><td><b>uuidgen</b></td><td><b>UUIDGEN</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>697</b></td><td><b>UDP</b></td><td><b>uuidgen</b></td><td><b>UUIDGEN</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>698</b></td><td><b>TCP</b></td><td><b>olsr</b></td><td><b>OLSR</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>698</b></td><td><b>UDP</b></td><td><b>olsr</b></td><td><b>OLSR</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>699</b></td><td><b>TCP</b></td><td><b>accessnetwork</b></td><td><b>Access Network</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>699</b></td><td><b>UDP</b></td><td><b>accessnetwork</b></td><td><b>Access Network</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>700</b></td><td><b>TCP</b></td><td><b>epp</b></td><td><b>Extensible Provisioning Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>700</b></td><td><b>UDP</b></td><td><b>epp</b></td><td><b>Extensible Provisioning Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>701</b></td><td><b>TCP</b></td><td><b>lmp</b></td><td><b>Link Management Protocol (LMP)</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>701</b></td><td><b>UDP</b></td><td><b>lmp</b></td><td><b>Link Management Protocol (LMP)</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>702</b></td><td><b>TCP</b></td><td><b>iris-beep</b></td><td><b>IRIS over BEEP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>702</b></td><td><b>UDP</b></td><td><b>iris-beep</b></td><td><b>IRIS over BEEP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>704</b></td><td><b>TCP</b></td><td><b>elcsd</b></td><td><b>errlog copy/server daemon</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>704</b></td><td><b>UDP</b></td><td><b>elcsd</b></td><td><b>errlog copy/server daemon</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>705</b></td><td><b>TCP</b></td><td><b>agentx</b></td><td><b>AgentX</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>705</b></td><td><b>UDP</b></td><td><b>agentx</b></td><td><b>AgentX</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>706</b></td><td><b>TCP</b></td><td><b>silc</b></td><td><b>SILC</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>706</b></td><td><b>UDP</b></td><td><b>silc</b></td><td><b>SILC</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>707</b></td><td><b>TCP</b></td><td><b>borland-dsj</b></td><td><b>Borland DSJ</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>707</b></td><td><b>UDP</b></td><td><b>borland-dsj</b></td><td><b>Borland DSJ</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>709</b></td><td><b>TCP</b></td><td><b>entrust-kmsh</b></td><td><b>Entrust Key Management Service Handler</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>709</b></td><td><b>UDP</b></td><td><b>entrust-kmsh</b></td><td><b>Entrust Key Management Service Handler</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>710</b></td><td><b>TCP</b></td><td><b>entrust-ash</b></td><td><b>Entrust Administration Service Handler</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>710</b></td><td><b>UDP</b></td><td><b>entrust-ash</b></td><td><b>Entrust Administration Service Handler</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>711</b></td><td><b>TCP</b></td><td><b>cisco-tdp</b></td><td><b>Cisco TDP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>711</b></td><td><b>UDP</b></td><td><b>cisco-tdp</b></td><td><b>Cisco TDP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>712</b></td><td><b>TCP</b></td><td><b>tbrpf</b></td><td><b>TBRPF</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>712</b></td><td><b>UDP</b></td><td><b>tbrpf</b></td><td><b>TBRPF</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>729</b></td><td><b>TCP</b></td><td><b>netviewdm1</b></td><td><b>IBM NetView DM/6000 Server/Client</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>729</b></td><td><b>UDP</b></td><td><b>netviewdm1</b></td><td><b>IBM NetView DM/6000 Server/Client</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>730</b></td><td><b>TCP</b></td><td><b>netviewdm2</b></td><td><b>IBM NetView DM/6000 send/tcp</b></td><td><b>TCP</b></td></tr>
<tr><td class="r"><b>730</b></td><td><b>UDP</b></td><td><b>netviewdm2</b></td><td><b>IBM NetView DM/6000 send/tcp</b></td><td><b>TCP</b></td></tr>
<tr><td class="r"><b>731</b></td><td><b>TCP</b></td><td><b>netviewdm3</b></td><td><b>IBM NetView DM/6000 receive/tcp</b></td><td><b>TCP</b></td></tr>
<tr><td class="r"><b>731</b></td><td><b>UDP</b></td><td><b>netviewdm3</b></td><td><b>IBM NetView DM/6000 receive/tcp</b></td><td><b>TCP</b></td></tr>
<tr><td class="r"><b>741</b></td><td><b>TCP</b></td><td><b>netgw</b></td><td><b>netGW</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>741</b></td><td><b>UDP</b></td><td><b>netgw</b></td><td><b>netGW</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>742</b></td><td><b>TCP</b></td><td><b>netrcs</b></td><td><b>Network based Rev. Cont. Sys.</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>742</b></td><td><b>UDP</b></td><td><b>netrcs</b></td><td><b>Network based Rev. Cont. Sys.</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>744</b></td><td><b>TCP</b></td><td><b>flexlm</b></td><td><b>Flexible License Manager</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>744</b></td><td><b>UDP</b></td><td><b>flexlm</b></td><td><b>Flexible License Manager</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>747</b></td><td><b>TCP</b></td><td><b>fujitsu-dev</b></td><td><b>Fujitsu Device Control</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>747</b></td><td><b>UDP</b></td><td><b>fujitsu-dev</b></td><td><b>Fujitsu Device Control</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>748</b></td><td><b>TCP</b></td><td><b>ris-cm</b></td><td><b>Russell Info Sci Calendar Manager</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>748</b></td><td><b>UDP</b></td><td><b>ris-cm</b></td><td><b>Russell Info Sci Calendar Manager</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>749</b></td><td><b>TCP</b></td><td><b>kerberos-adm</b></td><td><b>kerberos administration</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>749</b></td><td><b>UDP</b></td><td><b>kerberos-adm</b></td><td><b>kerberos administration</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>750</b></td><td><b>TCP</b></td><td><b>rfile</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>750</b></td><td><b>UDP</b></td><td><b>kerberos-iv</b></td><td><b>kerberos version iv</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>751</b></td><td><b>TCP</b></td><td><b>pump</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>751</b></td><td><b>UDP</b></td><td><b>pump</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>752</b></td><td><b>TCP</b></td><td><b>qrh</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>752</b></td><td><b>UDP</b></td><td><b>qrh</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>753</b></td><td><b>TCP</b></td><td><b>rrh</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>753</b></td><td><b>UDP</b></td><td><b>rrh</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>754</b></td><td><b>TCP</b></td><td><b>tell</b></td><td><b>send</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>754</b></td><td><b>UDP</b></td><td><b>tell</b></td><td><b>send</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>758</b></td><td><b>TCP</b></td><td><b>nlogin</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>758</b></td><td><b>UDP</b></td><td><b>nlogin</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>759</b></td><td><b>TCP</b></td><td><b>con</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>759</b></td><td><b>UDP</b></td><td><b>con</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>760</b></td><td><b>TCP</b></td><td><b>ns</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>760</b></td><td><b>UDP</b></td><td><b>ns</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>761</b></td><td><b>TCP</b></td><td><b>rxe</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>761</b></td><td><b>UDP</b></td><td><b>rxe</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>762</b></td><td><b>TCP</b></td><td><b>quotad</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>762</b></td><td><b>UDP</b></td><td><b>quotad</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>763</b></td><td><b>TCP</b></td><td><b>cycleserv</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>763</b></td><td><b>UDP</b></td><td><b>cycleserv</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>764</b></td><td><b>TCP</b></td><td><b>omserv</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>764</b></td><td><b>UDP</b></td><td><b>omserv</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>765</b></td><td><b>TCP</b></td><td><b>webster</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>765</b></td><td><b>UDP</b></td><td><b>webster</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>767</b></td><td><b>TCP</b></td><td><b>phonebook</b></td><td><b>phone</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>767</b></td><td><b>UDP</b></td><td><b>phonebook</b></td><td><b>phone</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>769</b></td><td><b>TCP</b></td><td><b>vid</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>769</b></td><td><b>UDP</b></td><td><b>vid</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>770</b></td><td><b>TCP</b></td><td><b>cadlock</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>770</b></td><td><b>UDP</b></td><td><b>cadlock</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>771</b></td><td><b>TCP</b></td><td><b>rtip</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>771</b></td><td><b>UDP</b></td><td><b>rtip</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>772</b></td><td><b>TCP</b></td><td><b>cycleserv2</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>772</b></td><td><b>UDP</b></td><td><b>cycleserv2</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>773</b></td><td><b>TCP</b></td><td><b>submit</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>773</b></td><td><b>UDP</b></td><td><b>notify</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>774</b></td><td><b>TCP</b></td><td><b>rpasswd</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>774</b></td><td><b>UDP</b></td><td><b>acmaint_dbd</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>775</b></td><td><b>TCP</b></td><td><b>entomb</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>775</b></td><td><b>UDP</b></td><td><b>acmaint_transd</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>776</b></td><td><b>TCP</b></td><td><b>wpages</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>776</b></td><td><b>UDP</b></td><td><b>wpages</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>777</b></td><td><b>TCP</b></td><td><b>multiling-http</b></td><td><b>Multiling HTTP</b></td><td><b>AimSpy, Undetected, Tiny</b></td></tr>
<tr><td class="r"><b>777</b></td><td><b>UDP</b></td><td><b>multiling-http</b></td><td><b>Multiling HTTP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>780</b></td><td><b>TCP</b></td><td><b>wpgs</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>780</b></td><td><b>UDP</b></td><td><b>wpgs</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>785</b></td><td><b>TCP</b></td><td><b><br />
</b></td><td><b><br />
</b></td><td><b>NetworkTerrorist</b></td></tr>
<tr><td class="r"><b>800</b></td><td><b>TCP</b></td><td><b>mdbs_daemon</b></td><td><b><br />
</b></td><td><b>NeuroticKitten</b></td></tr>
<tr><td class="r"><b>800</b></td><td><b>UDP</b></td><td><b>mdbs_daemon</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>801</b></td><td><b>TCP</b></td><td><b>device</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>801</b></td><td><b>UDP</b></td><td><b>device</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>808</b></td><td><b>TCP</b></td><td><b><br />
</b></td><td><b><br />
</b></td><td><b>WinHole</b></td></tr>
<tr><td class="r"><b>810</b></td><td><b>TCP</b></td><td><b>fcp-udp</b></td><td><b>FCP</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>810</b></td><td><b>UDP</b></td><td><b>fcp-udp</b></td><td><b>FCP Datagram</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>828</b></td><td><b>TCP</b></td><td><b>itm-mcell-s</b></td><td><b>itm-mcell-s</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>828</b></td><td><b>UDP</b></td><td><b>itm-mcell-s</b></td><td><b>itm-mcell-s</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>829</b></td><td><b>TCP</b></td><td><b>pkix-3-ca-ra</b></td><td><b>PKIX-3 CA/RA</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>829</b></td><td><b>UDP</b></td><td><b>pkix-3-ca-ra</b></td><td><b>PKIX-3 CA/RA</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>831</b></td><td><b>TCP</b></td><td><b><br />
</b></td><td><b><br />
</b></td><td><b>NeuroticKat</b></td></tr>
<tr><td class="r"><b>847</b></td><td><b>TCP</b></td><td><b>dhcp-failover2</b></td><td><b>dhcp-failover 2</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>847</b></td><td><b>UDP</b></td><td><b>dhcp-failover2</b></td><td><b>dhcp-failover 2</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>848</b></td><td><b>TCP</b></td><td><b>gdoi</b></td><td><b>GDOI</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>848</b></td><td><b>UDP</b></td><td><b>gdoi</b></td><td><b>GDOI</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>860</b></td><td><b>TCP</b></td><td><b>iscsi</b></td><td><b>iSCSI</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>860</b></td><td><b>UDP</b></td><td><b>iscsi</b></td><td><b>iSCSI</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>873</b></td><td><b>TCP</b></td><td><b>rsync</b></td><td><b>rsync</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>873</b></td><td><b>UDP</b></td><td><b>rsync</b></td><td><b>rsync</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>886</b></td><td><b>TCP</b></td><td><b>iclcnet-locate</b></td><td><b>ICL coNETion locate server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>886</b></td><td><b>UDP</b></td><td><b>iclcnet-locate</b></td><td><b>ICL coNETion locate server</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>887</b></td><td><b>TCP</b></td><td><b>iclcnet_svinfo</b></td><td><b>ICL coNETion server info</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>887</b></td><td><b>UDP</b></td><td><b>iclcnet_svinfo</b></td><td><b>ICL coNETion server info</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>888</b></td><td><b>TCP</b></td><td><b>cddbp</b></td><td><b>CD Database Protocol</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>888</b></td><td><b>UDP</b></td><td><b>accessbuilder</b></td><td><b>AccessBuilder</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>900</b></td><td><b>TCP</b></td><td><b>omginitialrefs</b></td><td><b>OMG Initial Refs</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>900</b></td><td><b>UDP</b></td><td><b>omginitialrefs</b></td><td><b>OMG Initial Refs</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>901</b></td><td><b>TCP</b></td><td><b>smpnameres</b></td><td><b>SMPNAMERES</b></td><td><b>NetDevil</b></td></tr>
<tr><td class="r"><b>901</b></td><td><b>UDP</b></td><td><b>smpnameres</b></td><td><b>SMPNAMERES</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>902</b></td><td><b>TCP</b></td><td><b>ideafarm-chat</b></td><td><b>IDEAFARM-CHAT</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>902</b></td><td><b>UDP</b></td><td><b>ideafarm-chat</b></td><td><b>IDEAFARM-CHAT</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>903</b></td><td><b>TCP</b></td><td><b>ideafarm-catch</b></td><td><b>IDEAFARM-CATCH</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>903</b></td><td><b>UDP</b></td><td><b>ideafarm-catch</b></td><td><b>IDEAFARM-CATCH</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>911</b></td><td><b>TCP</b></td><td><b>xact-backup</b></td><td><b>xact-backup</b></td><td><b>Dark Shadow, Dark Shadow</b></td></tr>
<tr><td class="r"><b>911</b></td><td><b>UDP</b></td><td><b>xact-backup</b></td><td><b>xact-backup</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>912</b></td><td><b>TCP</b></td><td><b>apex-mesh</b></td><td><b>APEX relay-relay service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>912</b></td><td><b>UDP</b></td><td><b>apex-mesh</b></td><td><b>APEX relay-relay service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>913</b></td><td><b>TCP</b></td><td><b>apex-edge</b></td><td><b>APEX endpoint-relay service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>913</b></td><td><b>UDP</b></td><td><b>apex-edge</b></td><td><b>APEX endpoint-relay service</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>989</b></td><td><b>TCP</b></td><td><b>ftps-data</b></td><td><b>ftp protocol, data, over TLS/SSL</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>989</b></td><td><b>UDP</b></td><td><b>ftps-data</b></td><td><b>ftp protocol, data, over TLS/SSL</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>990</b></td><td><b>TCP</b></td><td><b>ftps</b></td><td><b>ftp protocol, control, over TLS/SSL</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>990</b></td><td><b>UDP</b></td><td><b>ftps</b></td><td><b>ftp protocol, control, over TLS/SSL</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>991</b></td><td><b>TCP</b></td><td><b>nas</b></td><td><b>Netnews Administration System</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>991</b></td><td><b>UDP</b></td><td><b>nas</b></td><td><b>Netnews Administration System</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>992</b></td><td><b>TCP</b></td><td><b>telnets</b></td><td><b>telnet protocol over TLS/SSL</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>992</b></td><td><b>UDP</b></td><td><b>telnets</b></td><td><b>telnet protocol over TLS/SSL</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>993</b></td><td><b>TCP</b></td><td><b>imaps</b></td><td><b>imap4 protocol over TLS/SSL</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>993</b></td><td><b>UDP</b></td><td><b>imaps</b></td><td><b>imap4 protocol over TLS/SSL</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>994</b></td><td><b>TCP</b></td><td><b>ircs</b></td><td><b>irc protocol over TLS/SSL</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>994</b></td><td><b>UDP</b></td><td><b>ircs</b></td><td><b>irc protocol over TLS/SSL</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>995</b></td><td><b>TCP</b></td><td><b>pop3s</b></td><td><b>pop3 protocol over TLS/SSL (was spop3)</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>995</b></td><td><b>UDP</b></td><td><b>pop3s</b></td><td><b>pop3 protocol over TLS/SSL (was spop3)</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>996</b></td><td><b>TCP</b></td><td><b>vsinet</b></td><td><b>vsinet</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>996</b></td><td><b>UDP</b></td><td><b>vsinet</b></td><td><b>vsinet</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>997</b></td><td><b>TCP</b></td><td><b>maitrd</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>997</b></td><td><b>UDP</b></td><td><b>maitrd</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>998</b></td><td><b>TCP</b></td><td><b>busboy</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>998</b></td><td><b>UDP</b></td><td><b>puparp</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>999</b></td><td><b>TCP</b></td><td><b>puprouter</b></td><td><b><br />
</b></td><td><b>Deep Throat, Foreplay or Reduced Foreplay, WinSatan, Chat power</b></td></tr>
<tr><td class="r"><b>999</b></td><td><b>UDP</b></td><td><b>puprouter</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>1000</b></td><td><b>TCP</b></td><td><b>cadlock2</b></td><td><b><br />
</b></td><td><b>Connecter, Der Späher / Der Spaeher, Direct Connection, DerSpaeher</b></td></tr>
<tr><td class="r"><b>1000</b></td><td><b>UDP</b></td><td><b>cadlock2</b></td><td><b><br />
</b></td><td><b><br />
</b></td></tr>
<tr><td class="r"><b>1001</b></td><td><b>TCP</b></td><td><b><br />
</b></td><td><b><br />
</b></td><td><b>Der Späher / Der Spaeher, Theef, Silencer, Le Guardien, WebEx</b></td></tr>
<tr><td class="r"><b>1005</b></td><td><b>TCP</b></td><td><b><br />
</b></td><td><b><br />
</b></td><td><b>Theef</b></td></tr>
</tbody></table>Surenhttp://www.blogger.com/profile/09789784724534128579noreply@blogger.com0tag:blogger.com,1999:blog-5123376846625329520.post-52846154618355798222010-09-09T13:40:00.000+05:302010-09-09T13:40:26.782+05:30<h1>India Toll Free Numbers / Customer Care Numbers List</h1><div class="postedby"> <br />
<a href="http://teck.in/topic/toll-free" rel="tag" title="Toll Free"></a> <br />
</div><!-- google_ad_section_end --> <div class="googleads"> <script type="text/javascript">
<!--
google_ad_client = "pub-8709410846673588";
/* TECK.IN_Post_Top_336x280 */
google_ad_slot = "5858026516";
google_ad_width = 336;
google_ad_height = 280;
//-->
</script> <script src="http://pagead2.googlesyndication.com/pagead/show_ads.js" type="text/javascript">
</script><script>
google_protectAndRun("ads_core.google_render_ad", google_handleError, google_render_ad);
</script>I received this as an email forward, did not verify the numbers. <em>I am not responsible for any errors in the list!</em></div><!-- google_ad_section_start --> <strong>Airways</strong><br />
Indian Airlines – 1800 180 1407 <br />
Jet Airways – 1800 22 5522 <br />
SpiceJet – 1800 180 3333 <br />
<strong>Automobiles </strong><br />
Mahindra Scorpio – 1800 22 6006 <br />
Maruti – 1800 111 515 <br />
Tata Motors – 1800 22 5552 <br />
Windshield Experts – 1800 11 3636 <br />
<strong>Banks</strong><br />
ABN AMRO – 1800 11 2224 <br />
Canara Bank – 1800 44 6000 <br />
Citibank – 1800 44 2265 <br />
Corporatin Bank – 1800 443 555 <br />
Development Credit Bank – 1800 22 5769 <br />
HDFC Bank – 1800 227 227 <br />
ICICI Bank – 1800 333 499 <br />
ICICI Bank NRI – 1800 22 4848 <br />
IDBI Bank – 1800 11 6999 <br />
Indian Bank – 1800 425 1400 <br />
ING Vysya – 1800 44 9900 <br />
Kotak Mahindra Bank – 1800 22 6022 <br />
Lord Krishna Bank – 1800 11 2300 <br />
Punjab National Bank – 1800 122 222 <br />
State Bank of India – 1800 44 1955 <br />
Syndicate Bank – 1800 44 6655 <br />
<strong>Cell Phones</strong><br />
BenQ – 1800 22 08 08 <br />
Bird CellPhones – 1800 11 7700 <br />
Motorola MotoAssist – 1800 11 1211 <br />
Nokia – 3030 3838 <br />
Sony Ericsson – 3901 1111 <br />
<strong>Computers/IT</strong><br />
Adrenalin – 1800 444 445 <br />
AMD – 1800 425 6664 <br />
Apple Computers – 1800 444 683 <br />
Canon – 1800 333 366 <br />
Cisco Systems – 1800 221 777 <br />
Compaq – HP – 1800 444 999 <br />
Data One Broadband – 1800 424 1800 <br />
Dell – 1800 444 026 <br />
Epson – 1800 44 0011 <br />
eSys – 3970 0011 <br />
Genesis Tally Academy – 1800 444 888 <br />
HCL – 1800 180 8080 <br />
IBM – 1800 443 333 <br />
Lexmark – 1800 22 4477 <br />
Marshal’s Point – 1800 33 4488 <br />
Microsoft – 1800 111 100 <br />
Microsoft Virus Update – 1901 333 334<br />
<br />
Seagate – 1800 180 1104 <br />
Symantec – 1800 44 5533 <br />
TVS Electronics – 1800 444 566 <br />
WeP Peripherals – 1800 44 6446 <br />
Wipro – 1800 333 312 <br />
xerox – 1800 180 1225 <br />
Zenith – 1800 222 004 <br />
<strong>Couriers/Packers & Movers </strong><br />
ABT Courier – 1800 44 8585 <br />
AFL Wizz – 1800 22 9696 <br />
Agarwal Packers & Movers – 1800 11 4321 <br />
Associated Packers P Ltd – 1800 21 4560 <br />
DHL – 1800 111 345 <br />
FedEx – 1800 22 6161 <br />
Goel Packers & Movers – 1800 11 3456 <br />
UPS – 1800 22 7171 <br />
<strong>Education</strong><br />
Edu Plus – 1800 444 000 <br />
Hindustan College – 1800 33 4438 <br />
NCERT – 1800 11 1265 <br />
Vellore Institute of Technology – 1800 441 555 <br />
<strong>Healthcare</strong><br />
Best on Health – 1800 11 8899 <br />
Dr Batras – 1800 11 6767 <br />
GlaxoSmithKline – 1800 22 8797 <br />
Johnson & Johnson – 1800 22 8111 <br />
Kaya Skin Clinic – 1800 22 5292 <br />
LifeCell – 1800 44 5323 <br />
Manmar Technologies – 1800 33 4420 <br />
Pfizer – 1800 442 442 <br />
Roche Accu-Chek – 1800 11 45 46 <br />
Rudraksha – 1800 21 4708 <br />
Varilux Lenses – 1800 44 8383 <br />
VLCC – 1800 33 1262 <br />
<strong>Home Appliances </strong><br />
Aiwa/Sony – 1800 11 1188 <br />
Anchor Switches – 1800 22 7979 <br />
Blue Star – 1800 22 2200 <br />
Bose Audio – 1800 11 2673 <br />
Bru Coffee Vending Machines – 1800 44 7171 <br />
Daikin Air Conditioners – 1800 444 222 <br />
DishTV – 1800 12 3474 <br />
Faber Chimneys – 1800 21 4595 <br />
Godrej – 1800 22 5511 <br />
Grundfos Pumps – 1800 33 4555 <br />
LG – 1901 180 9999 <br />
Philips – 1800 22 4422 <br />
Samsung – 1800 113 444 <br />
Sanyo – 1800 11 0101 <br />
Voltas – 1800 33 4546 <br />
WorldSpace Satellite Radio – 1800 44 5432 <br />
<strong>Hotel Reservations </strong><br />
GRT Grand – 1800 44 5500 <br />
InterContinental Hotels Group – 1800 111 000 <br />
Marriott – 1800 22 0044 <br />
Sarovar Park Plaza – 1800 111 222 <br />
Taj Holidays – 1800 111 825 <br />
<strong>Insurance</strong><br />
AMP Sanmar – 1800 44 2200 <br />
Aviva – 1800 33 2244 <br />
Bajaj Allianz – 1800 22 5858 <br />
Chola MS General Insurance – 1800 44 5544 <br />
HDFC Standard Life – 1800 227 227 <br />
LIC – 1800 33 4433 <br />
Max New York Life – 1800 33 5577 <br />
Royal Sundaram – 1800 33 8899 <br />
SBI Life Insurance – 1800 22 9090 <br />
<strong>Mattresses </strong><br />
Kurl-on – 1800 44 0404 <br />
Sleepwell – 1800 11 2266 <br />
<strong>Investments/Finance </strong><br />
CAMS – 1800 44 2267 <br />
Chola Mutual Fund – 1800 22 2300 <br />
Easy IPO’s – 3030 5757 <br />
Fidelity Investments – 1800 180 8000 <br />
Franklin Templeton Fund – 1800 425 4255 <br />
J M Morgan Stanley – 1800 22 0004 <br />
Kotak Mutual Fund – 1800 222 626 <br />
LIC Housing Finance – 1800 44 0005 <br />
SBI Mutual Fund – 1800 22 3040 <br />
Sharekhan – 1800 22 7500 <br />
Tata Mutual Fund – 1800 22 0101 <br />
<strong>Paints</strong><br />
Asian Paints Home Solutions – 1800 22 5678 <br />
Berger Paints Home Decor – 1800 33 8800 <br />
<strong>Teleshopping </strong><br />
Asian Sky Shop – 1800 22 1800 <br />
Jaipan Teleshoppe – 1800 11 5225 <br />
Tele Brands – 1800 11 8000 <br />
VMI Teleshopping – 1800 447 777 <br />
WWS Teleshopping – 1800 220 777 <br />
<strong>Travel </strong><br />
Club Mahindra Holidays – 1800 33 4539 <br />
Cox & Kings – 1800 22 1235 <br />
God TV Tours – 1800 442 777 <br />
Kerala Tourism – 1800 444 747 <br />
Kumarakom Lake Resort – 1800 44 5030 <br />
Raj Travels & Tours – 1800 22 9900 <br />
Sita Tours – 1800 111 911 <br />
SOTC Tours – 1800 22 3344 <br />
<strong>UPS </strong><br />
APC – 1800 44 4272 <br />
Numeric – 1800 44 3266 <br />
<strong>Others </strong><br />
Consumer Helpline – 1800 11 4000 <br />
L’Or?al, GARNIeR – 1800 223 000 <br />
KONE Elevator – 1800 444 666 <br />
Indane – 1800 44 51 15 <br />
Aavin – 1800 44 3300 <br />
Pedigree – 1800 11 2121 <br />
Kodak India – 1800 22 8877 <br />
Domino’s Pizza – 1800 111 123 <br />
World Vision India – 1800 444 550 <br />
Telecom Monitoring Cell – 1800 110 420 <br />
Did these numbers work for you? Let me know in comments page. BTW, updated the numbers from 1600* to 1800*Surenhttp://www.blogger.com/profile/09789784724534128579noreply@blogger.com0tag:blogger.com,1999:blog-5123376846625329520.post-49824435285789166772010-09-08T17:36:00.000+05:302010-09-08T17:36:27.433+05:30<div><div style="background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;"><h3 class="post-title entry-title">15 tips on How to survive as a hacker </h3><span class="Apple-style-span" style="color: white;">..................................................</span> <div style="float: right; padding: 4px;"> <a href="http://www.facebook.com/sharer.php?u=http%3A%2F%2Frafayhackingarticles.blogspot.com%2F2010%2F02%2F15-tips-on-how-to-survive-as-hacker.html&t=15%20tips%20on%20How%20to%20survive%20as%20a%20hacker%20%7C%20Learn%20How%20To%20Hack%20-%20Ethical%20Hacking%20and%20security%20tips&src=sp" name="fb_share" rel="nofollow" share_url="http://rafayhackingarticles.blogspot.com/2010/02/15-tips-on-how-to-survive-as-hacker.html" style="text-decoration: none;" type="box_count"><span class="fb_share_size_Small
fb_share_count_wrapper"><span></span><span class="fb_share_count_nub_top
"></span><span class="fb_share_count fb_share_count_top"><span class="fb_share_count_inner"></span></span><span class="FBConnectButton
FBConnectButton_Small" style="cursor: pointer;"><span class="FBConnectButton_Text"></span></span></span></a><span 12px;="" ;="" class="Apple-style-span" font-size:="" style="color: #111111;" }\=""></span> </div><table align="center" style="background-color: white; border: 5px dashed red; margin: 0px auto; padding: 10px; text-align: center;"><tbody style="margin: 0px; padding: 0px;">
<tr style="margin: 0px; padding: 0px;"><td style="margin: 0px; padding: 0px;"><b style="margin: 0px; padding: 0px;"> </b></td></tr>
</tbody></table><div> </div><div class="post-body entry-content"> This article will show you some of the top ways the best hackers use to keep themselves <span class="IL_AD" id="IL_AD5">hidden and</span> out of jail and survive as a hacker,First of all i want to make one thing clear to all that this is not a site which <span class="IL_AD" id="IL_AD3">exite</span> hackers but this is developed to help innocent people not getting trapped by hackers,Most of hackers do not take care of the following things and get caught and result in troubling their selves and also their families so below are 15 tips to <b>survive as a hacker,</b>Educational purposes only,written for begineers<br />
<a href="" name="more"></a><br />
<br />
<br />
<br />
<h1 style="display: inline ! important;"><b><span class="Apple-style-span" style="font-size: x-large;"><span class="Apple-style-span" style="color: #990000;">How to survive as a hacker - Tips</span></span></b></h1><br />
<br />
<br />
<b>Never Disclose your Identity:</b><br />
Never tell any body that you are a hacker even your friends or your relatives,you must keep it a secret<br />
<br />
<b>Use Proxy:</b><br />
Never hack without a proxy<br />
<br />
<b>Be Careful:</b><br />
Never let FBI enter your house without a search warrant.<br />
<br />
<b>Never Hack from your home:</b><br />
Never hack from your home always use net cafe for these purposes<br />
<br />
<b>Always:</b><br />
Wave to cops<br />
<br />
<b>Use Fake information:</b><br />
Never use your real name in any sort of conversation or in any signup<br />
<br />
<b>Never keep weak passwords:</b><br />
Do not keep a password which is already present in the dictionary or a password which is very common<br />
etc your <span class="IL_AD" id="IL_AD4">pet name</span>,Your country name etc<br />
<br />
<b>Password tip:</b><br />
Dont use same password twice for maximum security<br />
<br />
<b>Of course:</b><br />
Never hack from the same computer twice if possible<br />
<br />
<b>Hide your Ip:</b><br />
Hide your Ip address to avoid your chances of being traced,i have made a post on <b><span class="Apple-style-span" style="color: #3d85c6;">Hide your IP address</span></b><br />
<br />
<b>Use Firewall:</b><br />
Always use a Good <span class="IL_AD" id="IL_AD1">firewall</span> such as zonealram<br />
<br />
<b>Change your Ip:</b><br />
Change your Ip address daily if possible,I have wrote an article on <b><span class="Apple-style-span" style="color: #3d85c6;"><a href="http://rafayhackingarticles.blogspot.com/2009/09/change-my-ipaddress.html">How to change your Ip address</a></span></b><br />
<br />
<b>Use fake information while signing up:</b><br />
Dont enter your personal information eg your address,your number etc while<br />
Using social <span class="IL_AD" id="IL_AD2">networking</span> sites like orkut,Facebook etc<br />
<br />
<b>Most importantly:</b><br />
Always have a panic button that mass deletes your questionable content<br />
<br />
<b>OF course:</b><br />
Never let the FBI in period.<br />
<br />
<b>Yet again:</b><br />
Always use a Proxy when doing anything remotely illegal<br />
<br />
</div><span><br />
<br />
<br />
<a href="http://rafayhackingarticles.blogspot.com/2010/02/15-tips-on-how-to-survive-as-hacker.html#ixzz0ywGcb9kk" style="color: #003399;"></a></span></div></div>Surenhttp://www.blogger.com/profile/09789784724534128579noreply@blogger.com0tag:blogger.com,1999:blog-5123376846625329520.post-44544293937842026692010-09-07T23:27:00.003+05:302010-09-07T23:27:42.493+05:30<h1 class="title">Explanation of IP Address</h1><br />
<span class="print-link"><span class="print_html"><a class="print-page" href="http://www.techsupportalert.com/print/explanation-of-ip-address.htm" rel="nofollow" title="Display a printer-friendly version of this page."></a></span></span> <br />
<strong> A brief explanation of IPs and how they are affected by Broadband, Routers and Contention Ratios, plus a comparison of IPv4 and IPv6 </strong><br />
<br />
<strong>What is an IP ?</strong><br />
An IP is a slang term for the numerical address of a computer or resource on a network. The initials stand for Internet Protocol, and the correct term in full is 'IP address'. <br />
Any network has IPs, and that includes the largest - the Internet - and the smallest: your PC and router. In fact even your own PC has a local network within itself, with a local IP for the PC itself, so that it can route traffic correctly if you have a server application of some sort installed and then query it from within the same PC (it's 127.0.0.1). This IP is also used on a server for its own local traffic, for example to/from MySQL databases. <br />
A server is just an ordinary PC, usually running Linux instead of Windows, usually 64-bit, with more RAM than usual (8GB is a common figure though some go to 32GB), fast disks, and not much in the way of graphics capability.<br />
<strong>Broadband IPs</strong><br />
Most people want to know about their broadband IP. On DSL (DSL equals ADSL equals broadband), all IPs are dynamic. The word dynamic means changing / moving / unconstant. DSL IPs are never static (stable /unmoving / the same).<br />
The broadband provider, the ISP, changes your IP as needed. Some change customers' IPs daily at 5am for example, others change them after a variable period of time. The only constant is that they will change. There are two main reasons: contention ratio and hosting restrictions.<br />
ADSL by the way stands for asymmetric digital subscriber line, indicating that the up and down speed are different. On the lowest speed of DSL, which is 512kB or 'half-megabyte' broadband, the download speed is 512kB and the upload speed is often 60kB. On 1,024kB or one-megabyte DSL, down / up speeds are normally 1MB and 120kB. Up to 24MB DSL is available in many cities, with even faster speeds in some areas.<br />
<strong>SDSL </strong><br />
SDSL stands for symmetric DSL, which is 'business broadband'. IPs are static, since a business may need to host services, and so they pay more for the facility. Contention ratios are much better (but still in effect).<br />
The reason that a static IP is needed for the hosting of services is because the numerical IP is your address on the Internet, and that address needs to stay contant or people cannot find you. There are two common exceptions to this, but nevertheless a static IP is preferable for some hosted services. <br />
<strong>Domain names </strong><br />
One exception to the need for a constant, static IP is the DNS or domain name service. People prefer human-readable names, not numbers, and therefore locate their resources at example.com and not 274.37.39.827, because humans have analog-based memory systems, not digital, and cannot remember a series of numbers reliably. But a network cannot function with 100 million-plus addresses with human-style names, so numbers are used in order to create an efficient digital address system. The problem then becomes how to equate one with the other, especially as the equivalents are constantly changing. You want to go to example.com, but its actual global address is 173.46.38.184 or similar. The answer is the DNS system, which tells you (in practice your browser) where example.com is actually located digitally. The central servers know what real address the human-readable name is at, and where exactly that digital address is physically located, and the route you need to go to get there. Your browser gets this information in a fraction of a second every time you go to a new website that you haven't visited recently - and the speed and efficiency of DNS is one of the wonders of the web.<br />
<strong>DynamicDNS </strong><br />
The other common exception to a static IP always being needed for hosting on the web is that you can now sign up to a DynamicDNS service, which automatically finds the current IP for your site my-example.com and tells the web where you are. Good domain registrars provide this for free.<br />
This means that even when your ISP changes your IP, as they will sooner or later, others can still find your hosted services. ISPs don't like you hosting services, though, on what is essentially cheap broadband, because it means you will be uploading much more than the average customer - and upload capacity costs them far more than download bandwidth. This is one of the main reasons they try and restrict your ability to host services such as websites and data storage on their consumer DSL service - they prefer you to pay extra for their business plan.<br />
<strong>Contention ratio </strong><br />
This is the ratio of actual network equipment capacity at the ISP to the number of customers. There is never enough equipment to physically supply network services at full speed to all the subscribers, as it is not economic to have such a capability since most customers will not be using the service fully at any given time. Therefore equipment is switched around as necessary to support subscribers as they utilise more of the service. The ratio of customers to equipment is commonly 50:1 (spoken as 'fifty to one') although on a premium service it may be as low as 20:1, perhaps even 10:1 if you pay enough.<br />
On dial-up Internet, which is still used by rural and coastal customers as there is no plant (cabled supply) for many such customers yet even in the smallest and most highly-industrialised countries, the contention ratio is worse and can be as high as 100:1, which is another reason dial-up Internet is so poor.<br />
With dial-up it may be the case that modems are switched in or out for customers so that in some cases they will not be able to receive any service at all, but on a broadband service the effect of the contention ratio is simply that at peak times there is less bandwidth, so speeds are lower. In other words you may pay for 2MB broadband (which is the full theoretical download speed of that deal) but at peak times you might only get 1MB download speed.<br />
<strong>Cable TV IPs</strong><br />
With cable TV / telephone / Internet service, the connection is still DSL although there are some differences to phone line DSL. Firstly, the IPs are still dynamic, but called sticky IPs. This is because they change far less often than phone DSL IPs, as the contention ratio is better (although still in effect). It means that an IP can last for months before it is changed. The bandwidth is potentially better for all customers as well, since the service comes into the building on a coaxial cable, which has much higher bandwidth than the small phone line twisted-pair cable.<br />
This is also why modems and routers are different for cable or phone DSL. A phone line DSL service needs just one box for the router (the part that supplies the service to different PCs around the building) and the modem (the part that communicates with the outside world), as the connection is a phone jack. The two distinct functions of modem and router are combined in one box.<br />
A cable TV-based service however needs two boxes, a modem that connects to the street cable, which is 'coax' (the same class of cable that goes to your satellite or TV aerial), and is owned by the cable company since they specify it and set it up; and a separate router that supplies the service around the building, and that you own. You can't swap a phone and cable 'router' for this reason.<br />
<strong>How to get a new IP </strong><br />
An Internet IP is assigned to you by your ISP (Internet service provider). As we have seen, this number can change. You can find your IP by many different methods but the easiest is probably just to go to a website that tells you - search 'find your ip' to locate these websites.<br />
On phone broadband you can get a new IP by rebooting your router. This can be done by accessing the router management and choosing disconnect, then reconnect; or by a software reboot. If you don't know how to access your router on the network, just switch it off, wait ten seconds, then switch it on again.<br />
A cable router is a different prospect because you may not be able to get a new IP even by rebooting, since IPs are sticky - they change when they expire. You can try switching off both router and modem for two hours and then reconnecting, although occasionally a shorter power down may work. When reconnecting, first switch on the modem and leave for two minutes. Then switch on the router, and you should be back up.<br />
With a dial-up modem, every time you connect, you get a new IP.<br />
On ISDN, which was an intermediate technology used between the eras of dial-up and broadband, you cannot disconnect the terminal box for more than 15 minutes or the service shuts off. ISDN can still be used where the only option is dial-up, as it works at extended distance from the telephone exchange, unlike DSL. The max speed is 125kB and although this is just a fraction of the slowest broadband speed, it's still a lot faster than dial-up, which although theoretically is 7kB, is more likely to be 5 or 6kB in practice. And where the phone company digitally splits the service to two subscribers, as they often do when there is a plant shortage (not enough street cable) - and usually without telling the subscribers - then speed is halved. This is called a DACS splitter.<br />
<strong>ISPs with one IP for all customers</strong>If you want to get a new web IP for some reason, you can normally just reboot your router to achieve this. But in some cases this won't be possible, and you are stuck: there are some ISPs who issue the same IP to all customers, since this prevents them from hosting any kind of service. AOL and Hughes.net are examples - all their customers have the same IP on the web. Obviously, their IPs are different all the way into the ISP's equipment, otherwise they could not be differentiated on the network - but to the outside world, all customers are at one address.<br />
It's fair to say that this arrangement sucks, if you are anything other than a very basic home user. On the other hand, this is what you have paid for, and is therefore the deal you signed up to. To get a new web IP you would need to use a proxy server, though this is only of use for browsing, and cannot help if you need to transfer files directly to another PC using on-PC FTP servers at each end such as the Core Micro-FTP server, or via a mini HTTP server such as HFS. In these cases you are obviously not a basic home user, and should sign up for a real broadband service. Hughes.net customers though might be restricted by the fact this is a radio service and therefore specifically for remote dwellers.<br />
<strong>Your PC's IP </strong><br />
Every PC has a 'local IP' - an address used within the machine itself, which is normally 127.0.0.1 - but this is only used for traffic within the PC. For example if you have a server application like XAMPP installed on it, because you only have one PC and want to use that as both server and client, perhaps to build websites with. This works but is not optimal, server software work ideally needs two PCs.<br />
<strong>Your network IPs </strong><br />
On your home or office network, the IPs are set by your own router. Even if connected to the Internet, that would have no effect on your network IPs - the ISP for example cannot influence your own network IPs. <br />
Common IP ranges that are employed by routers, in order of likelihood, include:<br />
<ul><li>192.168.0.1 through to 192.168.0.10 (or higher)</li>
<li>192.168.0.101 through to 192.168.0.110 (or higher)</li>
<li>192.168.2.1 through to 192.168.2.10 (or higher)</li>
</ul>Your router docs will tell you which apply to you. Alternatively, access the router control panel via your browser, and look it up in there. Routers (ie the modem router that connects you to the Internet and supplies the service to the other PCs in your home or office) all have a remote-accessible management panel; switches and hubs (simple jack boxes with more sockets to extend a network) don't. If you are connected via a hub to your router, the hub will be transparent and you'll just see the router control panel when you access it via the correct IP.<br />
<strong>How to connect to your router control panel </strong><br />
To connect to your router, or indeed to any other device on the network -like the other PCs - you need to know their IP on the network. PCs can interconnect without your intervention because they have software to do this, but to get into your router control panel you'll need to know its IP.<br />
Even when you have no idea what it is, it's easy to find: <br />
1. Using the IPs given above, run through the most likely candidates. <br />
2. Search the web for 'belkin router ip' or whatever your router model is.<br />
So first you can try the likely IPs. Start with 192.168.0.1, then 192.168.0.101, then 192.168.2.1 -- these cover more than 95% of routers. Enter those numbers directly into your browser address bar and hit Enter. A browser is an application that travels a network and retrieves information for you, so that's what's needed to get into your router.<br />
If no luck, then search the web for your router IP. It would be rare not to be able to get it this way, but there are exceptions of course. For example if you have a USB LAN cable to link two PCs, perhaps where no router was available, then the IP range is likely to be unusual. Here is the starting IP number for a GeneLink USB PC-to-PC cable: 169.254.222.68 -- a little hard to guess that one!<br />
<strong>Access the router control panel </strong><br />
OK, you've found your router on the network and you are looking at its login page. How to get in?<br />
It looks as if you've never been here before, so the user and password will be still on the default values. Try these two first: <br />
1. User: leave blank. Pass: admin. <br />
2. User: admin. Pass: admin.<br />
This covers many routers - perhaps 75% or more. If you can't get in, you have two options: <br />
1. Search the web for 'belkin router password' or similar. <br />
2. Do a hard reset, to return the router to default values, maybe if you bought the router secondhand or otherwise lost the password.<br />
Routers can be rebooted at three levels, in general. These can be used progressively, to reset the minimum amount of data to accomplish whatever job you are doing. The sequence is: <br />
1. A reboot: this scrubs the web IP and little else. Power down - wait 10 seconds - power up.<br />
2. A soft reset: this will scrub the net parameters and possibly the router password; you will need to re-enter all your ISP's connection details including the ISP password. Power down - disconnect from the power source - hold in the reset button for 10 seconds - power up. The reset button is similar to that found on many laptops, a 'secret' button to disconnect power and internal battery: there will be a tiny hole in the case, you insert a small probe such as a pencil tip and hold down the microswitch inside.<br />
3. A hard reset: scrubs everything and you start from scratch. All settings are returned to default, including passwords. Power down - disconnect from the power source - hold in the reset button for 10 seconds - release the reset button - hold in the reset button again, and keep held in -reconnect the power lead - power up - release reset button after 30 seconds.<br />
Now you are back on the default user and password, and should be able to login. Go through the different pages in the control panel and reset all your user data.<br />
<strong>Use your own DNS IPs</strong> <br />
While in here you can set up your own IPs for the DNS service, which is a better way of doing it than using your ISP's DNS IPs. These are the addresses that your browser goes to in order to find web resources. <br />
The problem is that your ISP's information is typically between 12 hours and 3 days out of date, which affects your browsing speed; plus the route they set you on will use their own and their partner's networks instead of the fastest possible route; plus whenever the address is faulty in some way, they will serve you adverts; plus they build up a personal profile on you based on your DNS queries, which allows them and their partners to serve you personalised adverts. Essentially, this is a bad deal for you, and you can use an alternative DNS service to advantage.<br />
Find the DNS IPs in the router control panel. There will be three entries, of which two will probably be filled with an IP. Replace the two entries and fill the third as well, like this:<br />
208.67.222.222 <br />
208.67.220.220 <br />
208.67.220.220<br />
These IPs use the OpenDNS service, which is one of the many free DNS services out there. They don't serve you ads, but instead give you helpful hints when you enter the wrong URL. The global network routes they put you on are usually faster than your ISP's version. Most important of all, for some users, will be the fact that their DNS data is updated in real time, and correct to less than 15 minutes in most cases and less than a minute sometimes - this is very important for webmasters moving sites between hosts.<br />
There are many alternative DNS services now, so you can search for alternatives should you wish to. All have some negatives since there is no free lunch, but OpenDNS is a good starting point.<br />
<strong>IPv4 and IPv6</strong><br />
In the beginning, nobody had any idea that the Internet would become the world's most important international resource, or that there would be billions of users. That there would be more than 100 million websites by 2010 was inconceivable. Because of this, the numerical address system was too simple and therefore too limited in capacity - there just weren't enough numbers available. The current system, called IPv4, is fast running out of numbers, and a new system needs implementing. This has already been implemented in fact, but as yet its impact is low since there are few users who have consumer-level visibility. <br />
There are about 4 billion addresses available on the current system, but although it sounds a lot, there are two problems here and one pertinent fact:<br />
<ul><li>1. All the unused addresses are not available to be freely allocated, due to the block allocation system, which means that numbers of addresses in blocks are allocated to large-scale users and cannot be retrieved.</li>
<li>2. In any case, the total capacity would be exceeded at some stage even if 100% allocation efficiency was possible. That point is variously estimated as being anywhere from 2011 to 2020.</li>
<li>3. In the final analysis, the system fails when individual consumers cannot freely obtain an IP. That is already the case and therefore practical system capacity has already been reached.</li>
</ul>Here is an example of an IPv4 address (the current / old system), and an IPv6 address - the new system:<br />
<ul><li>an IPv4 address: 192.0.2.235</li>
<li>an IPv6 address: 1009:0db8:85a3:08d3:1319:8a2e:0370:8459</li>
</ul><strong>How many IPs are there in IPv6 ? </strong><br />
The number of potential IPv6 addresses is so large that it cannot even be expressed sensibly in words, only in mathematical terms. However, because people keep asking this question, here it is:<br />
(1) In figures: 340,282,366,920,938,463,463,374,607,431,768,211,456<br />
(2) In words: Three hundred and forty undecillion, two hundred and eighty-two decillion, three hundred and sixty-six nonillion, nine hundred and twenty octillion, nine hundred and thirty-eight septillion, four hundred and sixty-three sextillion, four hundred and sixty-three quintillion, three hundred and seventy-four quadrillion, six hundred and seven trillion, four hundred and thirty-one billion, seven hundred and sixty-eight million, two hundred and eleven thousand, four hundred and fifty-six.<br />
(Rob Elamb)<br />
(3) Or alternatively, a quote: "So we could assign an IPv6 address to every atom on the surface of the earth, and still have enough addresses left to do another 100+ earths. It isn’t remotely likely that we’ll run out of IPv6 addresses at any time in the future." <br />
(Steve Leibson)<br />
(4) Or as a realist would say of course, "Give it another 30 years and we'll be scratching our heads again, pal - the one thing humans are proven unable to remotely comprehend is the future".Surenhttp://www.blogger.com/profile/09789784724534128579noreply@blogger.com0tag:blogger.com,1999:blog-5123376846625329520.post-15286226555653523672010-09-07T23:00:00.002+05:302010-09-07T23:00:41.436+05:30<h1 class="title">The Top 5 Video Streaming Websites</h1><div class="meta"> <span class="submitted"><br />
<a href="http://www.techsupportalert.com/users/emmabest" title="View user
profile."></a></span> </div><span class="print-link"></span> <em> </em><br />
Online web streaming is one of the most popular Internet activities. Whether you want to watch video from across the world, news recaps, TV shows, tutorials, or funny videos, you're guaranteed to find something you like at one of the top five video streaming websites. <br />
<a href="http://www.youtube.com/"><strong>1. Youtube.com</strong></a><br />
<a href="http://www.techsupportalert.com/files/images/youtube-500.gif" target="_blank"><img align="left" alt="Youtube" height="149" src="http://www.techsupportalert.com/files/images/youtube-200.gif" width="200" /></a>The most popular video streaming website, YouTube has thousands of videos on nearly every topic imaginable, all user submitted and free to watch. The videos are currently offered in widescreen format, though most videos upload retain the original 4:3 aspect ratio. In addition to widescreen, videos can now be uploaded and viewed in high quality. <br />
Videos on Youtube are often short homemade movies, but many record labels are now releasing low-quality versions of their most popular music videos on the website. If you're looking for a recap of the latest sports game, news cast, or speech, Youtube is your best option.<br />
<strong>Pros:</strong> Youtube offers 16:9 aspect ratio, high quality video playback, support for nearly every video format, a large audience for your videos, the ability to embed videos on a blog or website, video reply feature, customizable personal video page, the ability to limit video access. <br />
<strong>Cons</strong>: While the website is wildly popular, it does have a few problems. There is an excess of spam comments, a video limit of 100MB, and only standard-quality videos can be embedded on blogs or websites. <br />
<a href="http://www.vimeo.com/"><strong>2. Vimeo.com</strong></a><br />
<a href="http://www.techsupportalert.com/files/images/vimeo-500.gif" target="_blank"><img align="left" alt="Vimeo" height="186" src="http://www.techsupportalert.com/files/images/vimeo-200.gif" width="200" /></a>Vimeo is a sophisticated, free video sharing website. Basic users are allowed to upload up to 500MB of video content per week, or pay for an account to upload more. Vimeo attracts a wide array of video artists, and is often used to upload short movies, skits, and portfolios. The website supports full HD streaming and widescreen format, as well as a wide array of video codec support, making it the ideal location to watch and share high-quality and HD personal videos. <br />
<strong>Pros</strong>: Vimeo has an easy-to-navigate interface, the ability to create and moderate video groups, high definition video support, up to 1GB video uploads for premium accounts, community forums, and an artistic user base.<br />
<strong>Cons:</strong> Because Vimeo is so frequently used to upload large movie files, it can take over an hour to convert a single video. <br />
<a href="http://www.metacafe.com/"><strong>3. Metacafe.com </strong></a><br />
<a href="http://www.techsupportalert.com/files/images/metacafe-500.gif" target="_blank"><img align="left" alt="Metacafe" height="133" src="http://www.techsupportalert.com/files/images/metacafe-200.gif" width="200" /></a>Metacafe rocketed to popularity with their page view money earning system. Many videos on the website are duplicates from YouTube, but in addition to that content, there is a wide array of video tutorials on many subjects, including DIY hacks, magic, and science experiments. If you're interested in making money off your video's page views, Metacafe is the ideal website to use. <br />
<strong>Pros:</strong> Metacafe has a popular pageview payment system, which allows users to be compensated for their videos. In addition, videos can be downloaded with a link under the video or embedded on blogs or websites. The website has many high-quality tutorials.<br />
<strong>Cons</strong>: Metacafe increased it's video resolution, and many of the videos are now pixelated due to up-sampling. Many videos are clones from Youtube. <br />
<a href="http://www.hulu.com/"><strong>4. Hulu.com </strong></a><br />
<a href="http://www.techsupportalert.com/files/images/hulu-500.gif" target="_blank"><img align="left" alt="Hulu" height="107" src="http://www.techsupportalert.com/files/images/hulu-200.gif" width="200" /></a>The first website to legally offer a wide array of free TV shows, Hulu was founded by NBC and offers dozens of free TV series, both current and off-air broadcasts. Some of the TV shows offered includes: The Simpsons, Family Guy, It's Always Sunny in Philadelphia, Bones, Buffy the Vampire Slayer, and The Office. <br />
In addition to offering TV shows, Hulu also has a catalog of movies available to watch, including such popular shows as: Spy Game, Liar Liar, Ghostbusters, Men in Black, and The Karate Kid. <br />
<strong>Pros</strong>: Hulu videos can be viewed in 360p for slower Internet connections. Popular clips are available for recent and popular TV shows and movies. New series are available, with new episodes appearing up to a week after aired on cable. The website is completely free. Videos can be purchased and downloaded. A personal queue can be created for favorite content.<br />
<strong>Cons:</strong> Videos can no longer be embedded in blogs and on websites, high definition video streaming is not available for most videos, and ads are displayed three or more times per video. Website is available to US residents only.<br />
<a href="http://www.veoh.com/"><strong>5. Veoh.com</strong></a><br />
<a href="http://www.techsupportalert.com/files/images/veoh-500.gif"><img align="left" alt="Veoh" height="147" src="http://www.techsupportalert.com/files/images/veoh-200.gif" width="200" /></a>Veoh is a video content website, but has made a name for itself by partnering with different companies to offer TV shows for free. Offering TV shows not available from Hulu, you can watch popular shows such as: The Big Bang Theory, Friends, According to Jim, CSI, and Everwood. <br />
In addition to a large supply of free TV shows, Veoh also offers user submitted content, including animations, home videos, and funny clips. <br />
<strong>Pros</strong>: Videos stream in higher quality resolution. The original video files can be downloaded and saved to a hard drive for later viewing. User submitted content can be embedded in blogs and websites, shared directly with friends, and saved to a personal favorites list.<br />
<strong>Cons:</strong> Commercial videos are only available for users located within the US.<br />
<h3>More Streaming Site Options</h3>For completeness here's a list I put together of over 40 additional streaming sites. If you can't find something you like here, you are not really trying :>)<br />
<ul><li><a href="http://www.dailymotion.com/" title="">www.Dailymotion.com:</a> Dailymotion is similar to Current TV, and offers a wide range of random video content.</li>
<li><a href="http://www.ifilm.com/" title="">www.Ifilm.com:</a> A standard video streaming website.</li>
<li><a href="http://www.megavideo.com/" title="">www.Megavideo.com:</a> Mega Video is the video streaming service for Megaupload.</li>
<li><a href="http://www.tudou.com/" title="">www.Tudou.com:</a> Tudou is a China-based video streaming website. If you can't find a video on YouTube, there's a good chance you'll find it on Tudou.</li>
<li><a href="http://www.youku.com/" title="">www.Youku.com:</a> Nearly a clone of Tudou.</li>
<li><a href="http://www.56.com/" title="">www.56.com:</a> Nearly a clone of both Tudou and Youku.</li>
<li><a href="http://www.crackle.com/" title="">www.Crackle.com:</a> More of an Indy/off beat TV shows and movie website, you can watch webshows and other shows you can't find on TV.</li>
<li><a href="http://www.devilducky.com/" title="">www.DevilDucky.com:</a> This website features favorite videos grabbed from many different sources and aggregated together. The website contains small videos, TV shows, movie trailers, news recaps, fan videos, and more.</li>
<li><a href="http://www.break.com/" title="">www.Break.com:</a> This video website is marketed towards men, and has a list of daily video picks on their homepage. The videos are outrageous, funny, and short.</li>
<li><a href="http://www.current.com/" title="">www.Current.com:</a> Currently in Beta, this website has a wide array of modern video content, and is very similar to YouTube.</li>
<li><a href="http://www.newgrounds.com/" title="">www.Newgrounds.com:</a> An awesome and high quality website featuring user submitted satire, animation, and humor videos.</li>
<li><a href="http://www.revver.com/" title="">www.Revver.com:</a> You'll find a wide array of content on Revver, most of it high quality and serious. There video base includes interviews, skits, product reviews, movie reviews, animations, and tutorials.</li>
<li><a href="http://www.zippyvideos.com/" title="">www.ZippyVideos.com:</a> Another standard video content sharing website.</li>
<li><a href="http://www.thatvideosite.com/">www.ThatVideoSite.com</a>: This website pulls the most popular videos from a wide range of websites and lists them all on the homepage for your viewing pleasure.</li>
<li><a href="http://www.streetfire.net/" title="">www.StreetFire.net:</a> This website has thousands of videos, most of them dealing with cars in some way.</li>
<li><a href="http://www.vidilife/" title="">www.VidiLife:</a> This website looks like a cross between MetaCafe and YouTube, and has thousands of random videos to search.</li>
<li><a href="http://www.nbc.com/" title="">www.NBC.com:</a> NBC now streams dozens of episodes for free, including Heroes, According to Jim, and the Biggest Loser.</li>
<li><a href="http://www.clipshack.com/" title="">www.Clipshack.com:</a> This website features sort clips, recaps, and small videos of random content.</li>
<li><a href="http://www.freevlog.com/" title="">www.Freevlog.com:</a> This website is aimed at video bloggers, and offers a place for you to upload, view, and share with other video bloggers.</li>
<li><a href="http://www.broadbandsports.com/" title="">www.BroadbandSports.com:</a> Sports videos on all types can be found on Broadband Sports, including recaps, highlights, athlete videos, and personal sports videos.</li>
<li><a href="http://www.flukiest.com/" title="">www.Flukiest.com:</a> Flukiest is a social networking website, and has an impression video collection.</li>
<li><a href="http://www.myvideokaraoke.com/" title="">www.MyVideoKaraoke.com:</a> Do you enjoy karaoke? If so, this website is for you. There are hundreds of karaoke videos available.</li>
<li><a href="http://www.phanfare.com/" title="">www.Phanfare.com:</a> Phanfare is a unique video sharing website, as it is meant to be used with an iPhone, and makes uploading, sharing, and viewing mobile videos easier than ever.</li>
<li><a href="http://www.sevenload.com/" title="">www.Sevenload.com:</a> Sevenload is a sleek, professional-looking video streaming website with categories such as Music, DIY, Arts, and Politics.</li>
<li><a href="http://www.videobomb.com/" title="">www.VideoBomb.com:</a> The website is a basic, bland video streaming site with random videos.</li>
<li><a href="http://www.blinkx.com/" title="">www.Blinkx.com:</a> Boasting over 32 million hours of video footage.</li>
<li><a href="http://www.bigcontact.com/" title="">www.BigContact.com:</a> Big Contact allows users to create their own channels, and offers several professional streaming channels for anyone to watch.</li>
<li><a href="http://www.ourmedia.org/" title="">www.Ourmedia.org:</a> Our Media lacks a professional site, but has dozens of channels to search.</li>
<li><a href="http://www.stickam.com/" title="www.Stickam.com">www.Stickam.com</a>. Stickam is a twist on the modern video streaming site - you can browse hundreds of live streaming video feeds and interact with the other viewers via a chat box.</li>
<li><a href="http://www.trueveo.com/" title="">www.Trueveo.com:</a> Trueveo streams content from dozens of different sites, including Hulu, Lifetime, and GQ.</li>
<li><a href="http://www.videosift.com/" title="">www.Videosift.com:</a> Video Sift works very similar to the popular website Digg. Users add videos, and other users 'sift' through them, pushing the good ones to the top, while the poor ones fall to the bottom.</li>
<li><a href="http://www.abc.com/" title="">www.ABC.com:</a> ABC, like NBC, now offers a wide array of streaming videos, including full episodes of their most popular TV shows.</li>
<li><a href="http://www.starz.com/channels/starzplay">www.Starz Play</a>: Starz Play is offered from Verizon, and allows users to stream hundreds of blockbuster movies and the Starz TV channel for $10 per month.</li>
<li><a href="http://www.archaeologychannel.com/">www.Archaeologychannel.com</a>: The Archeology Channel offers hours of free streaming video based on culture, humans, and archeology.</li>
<li><a href="http://www.open-video.org/" title="">www.Open-Video.org:</a> This website is a 'shared digital video collection', and has lecture, documentary, educational, and historical videos, as well as others, for free streaming.</li>
<li><a href="http://www.videoart.net/" title="">www.Videoart.net:</a> This website only has about 2000 videos, but they are all artist in merit - animations, documentaries, galleries, narrative, etc.</li>
<li><a href="http://www.archives.org/" title="">www.Archives.org:</a> The National Archives streams footage of past events and old documentaries, including space documentaries from the 70's.</li>
<li><a href="http://www.the/" title="www.The">www.The</a> News Hour - <a href="http://www.pbs.org/newshour/video/" title="http://www.pbs.org/newshour/video/">http://www.pbs.org/newshour/video/</a> - Miss an important news speak, coverage, or documentary? The News Hour has regular updates of free, streaming news coverage.</li>
<li><a href="http://www.museum.tv/" title="">www.Museum.tv:</a> Docufest is an online video archive website with access to theater reenactments, historic video and radio streams, and interviews.</li>
<li><a href="http://vids.myspace.com/">vids.Myspace.com</a>: Myspace TV offers a wide array of video content, including personal videos, vlogs, and TV recaps.</li>
<li><a href="http://www.ustream.tv/" title="">www.UStream.tv:</a> UStream TV is another live streaming website, allowing users to chat with each other while watching and participating in live video streams.</li>
<li><a href="http://www.netflix.com/" title="">www.Netflix.com:</a> Netflix has free, unlimited video streaming for all their members, with a low membership cost of $5.99 per month.</li>
<li><a href="http://www.stupidvideos.com/" title="www.StupidVideos.com">www.StupidVideos.com</a> - As the name of the website suggests, don't expect to find enlightening videos here. However, if you're looking for some good laughs, there's nowhere better than Stupid Videos.</li>
</ul><span id="1232137715291S"> </span><br />
<em>This article was contributed by Emma Best, from <a href="http://www.laptopical.com/" title="www.laptopical.com">www.laptopical.com</a>, a laptop news and review site</em>Surenhttp://www.blogger.com/profile/09789784724534128579noreply@blogger.com2tag:blogger.com,1999:blog-5123376846625329520.post-58108590444040594892010-09-07T22:56:00.002+05:302010-09-07T22:56:50.232+05:30<h1 class="title">Best Free Audio / Video Format Conversion Program</h1><div class="meta"> <span class="submitted"><br />
<a href="http://www.techsupportalert.com/users/arithmomaniac" title="View
user profile."></a></span> </div><span class="print-link"></span> <table class="review"><tbody>
<tr> <td class="review-title"><br />
</td> </tr>
<tr> <td><br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title">Introduction</div></td> </tr>
<tr> <td> There are many different audio and video formats out there, and most devices (such as the iPod) and programs (such as Windows Media Player) will only take a few specific formats. A DVD or WMV movie will not play on an iPod, for example, without being converted into an MP4 file.<br />
Many commercial programs will do this conversion for you, but there are a few good ones that will do it for free. None of these programs are quite perfect, and they tend to fall into a few general categories:<br />
<ul><li><a href="http://www.techsupportalert.com/best-free-audio-video-format-conversion-program.htm#devicep"><u>Device-oriented programs</u></a> users have very easy-to-use settings and many device presets, but few (if any) user-editable settings. They are meant for converting audio and video so it can play on a portable device, such as an iPod.</li>
<li><a href="http://www.techsupportalert.com/best-free-audio-video-format-conversion-program.htm#customp"><u>Custom-oriented programs</u></a> have lots of settings and the ability to save custom formats, but fewer device presets and more complicated interface. They are meant for odd devices or compressing audio and video.</li>
<li><a href="http://www.techsupportalert.com/best-free-audio-video-format-conversion-program.htm#hybridp"><u>Hybrid programs</u></a> make compromises to handle both types of jobs well.</li>
<li><a href="http://www.techsupportalert.com/best-free-audio-video-format-conversion-program.htm#audiop"><u>Audio-only programs</u></a> use their narrow focus to make the interface simpler.</li>
</ul>While some are better than others overall, which one is best for you will depend on what sort of program you need.<br />
<em>Note: I don't own DVDs, so I'm not qualified to review DVD rippers. If you want to review them, or have software suggestions, leave them <a href="http://www.techsupportalert.com/best-free-dvd-ripper.htm">here</a>.</em><br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title">Discussion</div></td> </tr>
<tr> <td> <div> </div><h2><a href="" name="devicep"></a>Device-oriented Programs</h2><a href="http://www.techsupportalert.com/best-free-audio-video-format-conversion-program.htm#pazera"><strong>Pazera Video Converters Suite</strong></a> <img align="left" alt="Pazera Converter
Screenshot" hspace="8" src="http://www.techsupportalert.com/files/images/conversion_pazera_t.jpg" /> is really a package of several separate device converters with a common launcher. Each converter is powerful, with several presets for device, custom tweaking/profiles, multiple-file support, all in a simple text-based interface. If you don't mind the launcher, you could effectively use it as a hybrid converter.<br />
<div> </div><img align="right" alt="Miro Image" height="150" src="http://www.techsupportalert.com/files/images/Miro.jpg" width="127" />For even easier device conversion, there is <a href="http://www.techsupportalert.com/best-free-audio-video-format-conversion-program.htm#miro"><strong>Miro Video Converter</strong></a>. With just a dozen device presets and support for only one file at a time, it's a bad choice for power users. However, its brutally simple interface is newbie-proof, and conversion quality is on par with other programs.<br />
<div> </div><em>Also recommended:</em><br />
<ul><li><a href="http://www.videohelp.com/tools/XMedia_Recode">XMedia Recode</a>: Like an ugly Miro, but supports multiple simultaneous files and more devices.</li>
<li><a href="http://www.dvdvideosoft.com/free-dvd-video-software.htm">DVDVideoSoft Free</a>: Pazera without custom tweaks; has neat tricks like Youtube downloading and video tweaking.</li>
</ul><div> </div><h2><a href="" name="hybridp"></a>Hybrid Programs</h2><img align="right" alt="" height="127" src="http://www.techsupportalert.com/files/images/iwisoft.jpg" width="200" />When <a href="http://www.techsupportalert.com/best-free-audio-video-format-conversion-program.htm#iwisoft"><strong>iWisoft Free Video Converter</strong></a> starts, it launches your browser for an upgrade check. Fortunately, that's the only thing bad about it. Its interface is a little slow, but extremely clean, well organized, and easy to use. It has a complete and well-organized collection of presets, and supports making and saving basic tweaks, too. It even has a few pleasant surprises, such as a basic editing suite built in. In short, this program is an outstanding choice for most device conversion.<br />
<div> </div><a href="http://www.techsupportalert.com/files/images/conversion_formatfactory.jpg"><img align="left" alt="FormatFactory ScreenShot " hspace="8" src="http://www.techsupportalert.com/files/images/conversion_formatfactory_t.jpg" /></a>For the few exceptions (such as old phones and DVDs), <a href="http://www.techsupportalert.com/best-free-audio-video-format-conversion-program.htm#formatfactory"><strong>FormatFactory</strong></a> is an excellent choice. It has presets for over 100 devices, converts to and from dozens of formats, and allows for advanced tweaking and custom profiles. On the downside, the sidebar-and-popup interface is garish and clumsy (though responsive and stable). Overall, this program is a good choice for power or device users who find iwiSoft lacking.<br />
<div> </div><em>Also recommended:</em><br />
<ul><li><a href="http://uvideoconverter.sourceforge.net/">Ultimate Video Converter</a>: Only handles single files, but simplest converter with both iPod and custom settings.</li>
</ul><div> </div><h2><a href="" name="customp"></a>Custom-oriented Programs</h2>If you need to make complex, custom jobs, <a href="http://www.techsupportalert.com/best-free-audio-video-format-conversion-program.htm#FFCoder"><strong>FFCoder</strong></a> is the standout choice for its coherence. Like most programs in this review, it has an excellent device preset list, the ability to convert multiple files at once, and a simple, sleek interface. Unlike them, it supports highly advanced configuration for each of the dozens of video formats and codecs, down to lighting and rendering settings. Despite a few dependencies (listed below) and a learning curve for any tweaks past the presets, this is the best converter for almost any power user, device owner or not.<br />
<div> </div><em>Also recommended:</em><br />
<ul><li><a href="http://mediacoderhq.com/">MediaCoder</a>: Has a solid, if fragmented, GUI. Wide format support. Not quite stable.</li>
<li><a href="http://www.winnydows.com/#Projects">XVID4PSP</a>: Supports myriad tweaks. Impossibly fragmented interface. Solid AviSynth support.</li>
<li><a href="http://www.afterdawn.com/software/video_software/video_encoders/super.cfm">SUPER</a>: Stabler than Mediacoder. Great for small, obscure tweaks. Has an annoying interface.</li>
</ul><div> </div><h2><a href="" name="audiop"></a>Audio-only Programs</h2><a href="http://www.techsupportalert.com/best-free-audio-video-format-conversion-program.htm#pazera_audio"><strong>Pazera Free Audio Extractor</strong></a> is the audio-only program in the above-mentioned Pazera Video Converters Suite. It supports both video and audio input and output to many formats, and is slightly simpler than some of its sibling programs. Otherwise, it is perfectly identical.<br />
<div> </div><em>Also recommended:</em><br />
<ul><li><a href="http://www.koyotesoft.com/indexEn.html">Koyote Soft Free mp3 wma Converter</a>: Slightly simpler interface, but clunkier.</li>
</ul><h2> </h2><em>Tested and not recommended:</em><br />
<ul><li><a href="http://www.koyotesoft.com/indexEn.html">Koyote Soft Free Video Converter</a>: iWisoft, but clunkier. Also minor sneakware.</li>
<li><a href="http://www.actusoft.com/free-video-converter.html">Actusoft Free Video Converter</a>: iWisoft with bad presets and other minor bugs.</li>
<li><a href="http://www.extensoft.com/?p=free_video_converter">Extensoft Free Video Converter</a>: iWisoft style, but single-file only and with few presets</li>
<li><a href="http://www.autogk.me.uk/">Auto Gordian Knot</a>: Limited valid inputs and advanced options, DivX/AVI output only.</li>
<li><a href="http://oxelon.com/">Oxelon Media Converter</a>: Too few possible tweaks for a program with no device support.</li>
<li><a href="http://www.any-video-converter.com/products/for_video_free/#">Any/Aura Video Converter</a>: FormatFactory with less options.</li>
<li><a href="http://www.cocoonsoftware.com/">Quick Media Converter</a>: XMedia Recode with garish interface.</li>
<li><a href="http://www.videora.com/en-us/Converter/">Videora/Audioro</a>: Slow, limited batch support, seperate programs for audio and video.</li>
<li><a href="http://winff.org/html/">WinFF</a>: Pazera without the tweaking, Quick Media Converter without the eye candy.</li>
<li><a href="http://handbrake.fr/">HandBrake</a>: Convert to H.264 files only, Windows stability problems.</li>
<li><a href="http://sourceforge.net/projects/megui/">MeGUI</a>: May have AviSynth, but has indecipherable settings and no presets</li>
</ul></td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title">Related Products and Links</div></td> </tr>
<tr> <td> You might want to check out these articles too:<br />
<ul><li><a href="http://www.techsupportalert.com/best-free-audio-editing-software.htm" target="_blank">Best Free Audio Editing Software</a></li>
<li><a href="http://www.techsupportalert.com/best-free-cut-split-merge-audio-files.htm" target="_blank">Best Free Software to Cut, Split or Merge Audio Files</a></li>
<li><a href="http://www.techsupportalert.com/best-free-cd-ripper.htm" target="_blank">Best Free CD Ripper</a></li>
<li><a href="http://www.techsupportalert.com/best-free-mp3-tag-editor.htm" target="_blank">Best Free MP3 Tag Editor</a></li>
</ul></td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title"><a href="" name="Quick_Selection_Guide"></a>Quick Selection Guide</div></td> </tr>
<tr> <td> <table class="review-details"><tbody>
<tr> <td class="review-details-title" colspan="3"> <h2><a href="" name="pazera"></a><a href="http://www.pazera-software.com/" target="_blank" title="Go to Pazera Video
Converters Suite home page...">Pazera Video Converters Suite</a> <img alt="Rating 8 of 10" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_8_votes.png" title="Rating 8
of 10" /></h2></td> </tr>
<tr> <td class="review-details-icon"><img alt="Pros" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-smile.png" title="Pros" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">Excellent presets, easy to use, custom profiles</td> </tr>
<tr> <td class="review-details-icon"><img alt="Cons" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-sad.png" title="Cons" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">Looks intimidating, separate programs for each output type, no advanced tweaks</td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.pazera-software.com/" target="_blank"><img alt="Developer Home Page" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_homepage.png" title="Developer Home Page" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.pazera-software.com/products/vcsuite/">http://www.pazera-software.com/products/vcsuite/</a></td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.download.com/Pazera-Free-Video-to-iPod-Converter/3000-2194_4-10813481.html?part=dl-10813481&subj=dl&tag=button" target="_blank"><img alt="Download link" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_download.png" title="Download link" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.pazera-software.com/products/vcsuite/">http://www.pazera-software.com/products/vcsuite/</a></td> </tr>
<tr> <td class="review-details-icon"><img alt="File Size" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_disk.png" title="File Size" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">29.7 MB <img alt="Version" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_version.png" title="Version" /> 1.2 <img alt="License Type" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_license.png" title="License Type" /> Unrestricted Freeware <img alt="Installation
Requirements" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_installation.png" title="Installation Requirements" /> NT/98/Me/2000/XP/2003/Vista/7</td> </tr>
<tr> <td class="review-details-icon"><img alt="Portable version available" src="http://www.techsupportalert.com/files/images/icons/review/icon_portable.png" title="Portable version available" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">Portable</td> </tr>
</tbody> </table></td> </tr>
<tr> <td> <table class="review-details"><tbody>
<tr> <td class="review-details-title" colspan="3"> <h2><a href="" name="miro"></a><a href="http://www.pazera-software.com/" target="_blank" title="Go to Pazera Video
Converters Suite home page...">Miro Video Converter</a> <img alt="Rating 7 of 10" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_7_votes.png" title="Rating 7 of 10" /></h2></td> </tr>
<tr> <td class="review-details-icon"><img alt="Pros" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-smile.png" title="Pros" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">Brutally easy-to-use device conversion</td> </tr>
<tr> <td class="review-details-icon"><img alt="Cons" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-sad.png" title="Cons" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">only one file at a time, no profile or generic tweaking, only MP4</td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.pazera-software.com/" target="_blank"><img alt="Developer Home Page" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_homepage.png" title="Developer Home Page" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.mirovideoconverter.com/">http://www.mirovideoconverter.com/</a></td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.mirovideoconverter.com/" target="_blank"><img alt="Download link" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_download.png" title="Download link" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.mirovideoconverter.com/">http://www.mirovideoconverter.com/</a></td> </tr>
<tr> <td class="review-details-icon"><img alt="File Size" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_disk.png" title="File Size" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">6.9 MB <img alt="License Type" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_license.png" title="License Type" /> Open Source <img alt="Installation Requirements" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_installation.png" title="Installation Requirements" /> 2000/XP/2003/Vista/7, .NET Framework</td> </tr>
</tbody> </table></td> </tr>
<tr> <td> <table class="review-details"><tbody>
<tr> <td class="review-details-title" colspan="3"> <h2><a href="" name="iwisoft"></a><a href="http://www.easy-video-converter.com/" target="_blank" title="Go to iWisoft Free
Video Converter home page...">iWisoft Free Video Converter</a> <img alt="Rating 10 of 10" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_10_votes.png" title="Rating 10 of 10" /> <img alt="Gizmo's Top Pick" src="http://www.techsupportalert.com/files/images/gizmos-best-small.png" title="Gizmo's Top Pick" /></h2></td> </tr>
<tr> <td class="review-details-icon"><img alt="Pros" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-smile.png" title="Pros" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">Simple polished interface, file and preset editing allowed, good device presets</td> </tr>
<tr> <td class="review-details-icon"><img alt="Cons" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-sad.png" title="Cons" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">Checks for updates on startup, requires WMP</td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.easy-video-converter.com/" target="_blank"><img alt="Developer Home
Page" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_homepage.png" title="Developer Home Page" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.iwisoft.com/videoconverter/" target="_blank">http://www.iwisoft.com/videoconverter/</a></td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.easy-video-converter.com/download.html" target="_blank"><img alt="Download link" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_download.png" title="Download link" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.iwisoft.com/videoconverter/download-video-converter.php" target="_blank">http://www.iwisoft.com/videoconverter/download-video-converter.php</a></td> </tr>
<tr> <td class="review-details-icon"><img alt="File Size" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_disk.png" title="File Size" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">8.7 MB <img alt="Version" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_version.png" title="Version" /> 1.2.0 <img alt="License Type" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_license.png" title="License Type" /> Unrestricted Freeware <img alt="Installation
Requirements" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_installation.png" title="Installation Requirements" /> NT/2000/XP/Vista/7</td> </tr>
<tr> <td class="review-details-icon"><img alt="Portable version available" src="http://www.techsupportalert.com/files/images/icons/review/icon_portable.png" title="Portable version available" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">Portable version available <a href="http://www.pendriveapps.com/free-video-converter-iwisoft/">[1]</a></td> </tr>
</tbody> </table></td> </tr>
<tr> <td> <table class="review-details"><tbody>
<tr> <td class="review-details-title" colspan="3"> <h2><a href="" name="formatfactory"></a><a href="http://www.formatoz.com/index.html" target="_blank" title="Go to
FormatFactory home page...">FormatFactory</a> <img alt="Rating 8 of 10" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_8_votes.png" title="Rating 8 of 10" /> </h2></td> </tr>
<tr> <td class="review-details-icon"><img alt="Pros" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-smile.png" title="Pros" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">Stable, many device presets</td> </tr>
<tr> <td class="review-details-icon"><img alt="Cons" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-sad.png" title="Cons" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">eBay ads and toolbar nag, too many presets, interface annoying</td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.formatoz.com/index.html" target="_blank"><img alt="Developer Home Page" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_homepage.png" title="Developer Home Page" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.formatoz.com/index.html" target="_blank">http://www.formatoz.com/index.html</a></td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.formatoz.com/download.html" target="_blank"><img alt="Download link" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_download.png" title="Download link" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.formatoz.com/download.html" target="_blank">http://www.formatoz.com/download.html</a></td> </tr>
<tr> <td class="review-details-icon"><img alt="File Size" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_disk.png" title="File Size" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">21.5 MB <img alt="Version" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_version.png" title="Version" /> 2.30 <img alt="License Type" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_license.png" title="License Type" /> Unrestricted Freeware <img alt="Installation
Requirements" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_installation.png" title="Installation Requirements" /> NT/2000/XP/Vista/7, .NET Framework</td> </tr>
</tbody> </table></td> </tr>
<tr> <td> <table class="review-details"><tbody>
<tr> <td class="review-details-title" colspan="3"> <h2><a href="" name="FFCoder"></a><a href="http://mediacoder.sourceforge.net/" target="_blank" title="Go to FFCoder home
page...">FFCoder</a> <img alt="Rating 8 of 10" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_8_votes.png" title="Rating 8 of 10" /></h2></td> </tr>
<tr> <td class="review-details-icon"><img alt="Pros" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-smile.png" title="Pros" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">Solid preset list, highly advanced tweaks, sleek interface</td> </tr>
<tr> <td class="review-details-icon"><img alt="Cons" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-sad.png" title="Cons" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">Dependencies, no installer</td> </tr>
<tr> <td class="review-details-icon"><a href="http://teejee2008.wordpress.com/ffcoder/" target="_blank"><img alt="Developer Home
Page" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_homepage.png" title="Developer Home Page" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://teejee2008.wordpress.com/ffcoder/" target="_blank">http://teejee2008.wordpress.com/ffcoder/</a></td> </tr>
<tr> <td class="review-details-icon"><a href="http://teejee2008.wordpress.com/ffcoder/" target="_blank"><img alt="Download link" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_download.png" title="Download link" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://teejee2008.wordpress.com/ffcoder/">http://teejee2008.wordpress.com/ffcoder/</a></td> </tr>
<tr> <td class="review-details-icon"><img alt="File Size" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_disk.png" title="File Size" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">24.4 MB <img alt="Version" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_version.png" title="Version" /> 0.99.0.0 <img alt="License Type" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_license.png" title="License Type" /> Non-Commercial Freeware <img alt="Installation
Requirements" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_installation.png" title="Installation Requirements" /> 2000/XP/2003 Server/Vista/7</td> </tr>
<tr> <td class="review-details-icon"><img alt="Portable version available" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_portable.png" title="Portable version available" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">Portable</td> </tr>
<tr> <td class="review-details-icon"><img alt="" src="http://www.techsupportalert.com/files/images/icons/review/icon_info.png" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">Requires .NET and <a href="http://avisynth.org/">AviSynth</a></td> </tr>
</tbody> </table></td> </tr>
<tr> <td> <table class="review-details"><tbody>
<tr> <td class="review-details-title" colspan="3"> <h2><a href="" name="pazera_audio"></a><a href="http://www.pazera-software.com/" target="_blank" title="Go to Pazera
Free Audio Extractor home page...">Pazera Free Audio Extractor</a> <img alt="Rating 8 of 10" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_8_votes.png" title="Rating 8 of 10" /></h2></td> </tr>
<tr> <td class="review-details-icon"><img alt="Pros" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-smile.png" title="Pros" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">Great presets, supports many input and output formats, easy to use, custom profiles</td> </tr>
<tr> <td class="review-details-icon"><img alt="Cons" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-sad.png" title="Cons" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">No advanced tweaks</td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.pazera-software.com/" target="_blank"><img alt="Developer Home Page" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_homepage.png" title="Developer Home Page" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.pazera-software.com/products/audio-extractor/">http://www.pazera-software.com/products/audio-extractor/</a></td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.download.com/Pazera-Free-Video-to-iPod-Converter/3000-2194_4-10813481.html?part=dl-10813481&subj=dl&tag=button" target="_blank"><img alt="Download link" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_download.png" title="Download link" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.pazera-software.com/products/audio-extractor/">http://www.pazera-software.com/products/audio-extractor/</a></td> </tr>
<tr> <td class="review-details-icon"><img alt="File Size" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_disk.png" title="File Size" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">2.5 MB <img alt="Version" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_version.png" title="Version" /> 1.3 <img alt="License Type" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_license.png" title="License Type" /> Unrestricted Freeware <img alt="Installation
Requirements" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_installation.png" title="Installation Requirements" /> NT/98/Me/2000/XP/2003/Vista/7</td> </tr>
<tr> <td class="review-details-icon"><img alt="Portable version available" src="http://www.techsupportalert.com/files/images/icons/review/icon_portable.png" title="Portable version available" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">Portable</td> </tr>
</tbody> </table></td> </tr>
</tbody> </table><em>This category is maintained by volunteer editor Arithmomaniac. Registered site visitors can contact Arithmomaniac by clicking <a href="http://www.techsupportalert.com/users/arithmomaniac">here</a>.</em>Surenhttp://www.blogger.com/profile/09789784724534128579noreply@blogger.com0tag:blogger.com,1999:blog-5123376846625329520.post-61459416406582382962010-09-07T22:54:00.002+05:302010-09-07T22:54:48.258+05:30<h1 class="title">Best Free PDF Writer</h1><div class="meta"> <span class="submitted"><br />
<a href="http://www.techsupportalert.com/users/dave007" title="View user
profile."></a></span> </div><span class="print-link"></span> <div> </div><table class="review"><tbody>
<tr> <td class="review-title"><br />
</td> </tr>
<tr> <td><br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title">Introduction</div></td> </tr>
<tr> <td> All of the PDF writers in this review are programs that function by creating a pseudo printer on your system. When you want to create a PDF document from pretty much any application you just choose to print it to the PDF printer and it creates a PDF document. The thing that distinguishes one product from another is the number of options and flexibility available. The one problem with this approach is that you need to have a program that will open the file on your system. If someone sends you a file created with a program you do not have and you can't open the file then you can't print it and if you can't print it then you can't convert it to a pdf using a pseudo printer technique. The two online products do not suffer from this problem but are limited only by the file formats recognized by the online vendor.<br />
After eliminating those PDF Writers suggested by readers that were not free, were limited time trials, and basically adware (the product was free but forced the user to endure various ads as a punishment for using it), there were only six candidates left. These were (alphabetically) Bullzip PDF Writer, CutePDF, doPDF, PDFCreator, PrimoPDF, and TinyPDF. Which one of these is best? That really depends on the options you need.</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title">Discussion</div></td> </tr>
<tr> <td> While I have recommended PDFCreator in the past, I have now moved to either <a href="http://www.techsupportalert.com/best-free-pdf-writer.htm#PDFill"><strong>PDFill Writer</strong></a> and/or <a href="http://www.techsupportalert.com/best-free-pdf-writer.htm#bullzip"><strong>Bullzip PDF Printer</strong></a> as my personal favorite(s). Both have more of the options I need and has worked flawless for me. A problem with Bullzip is that the pdf file created may not be searchable. While it created a searchable pdf from word processing programs it did not from other programs like Excel. All the other candidates produced a searchable document from Excel and other non-word-processing software. Please note that both of the recommended writers, and especially PDFill Writer, have enough options that they can be confusing to one who only wishes to create a simple PDF file. Both PDF Creator and Cute PDF Writer will easily suffice for most users. Requires both GhostScript and .NET.<br />
Key features of Bullzip PDF Printer include:<br />
The ability to password protect your pdf files (only PrimoPDF and PDFCreator also had this ability) <br />
The ability use either 40 or 128 bit encryption on the file (only PDFCreator also had this ability)<br />
The ability to add a watermark (PDF Creator had a limited ability to add watermarks)<br />
The ability to append or prepend files (PrimoPDF and PDFCreator also had this ability)<br />
The ability to choose different levels of output quality (All but CutePDF and TinyPDF had this ability)<br />
The ability to add/change metadata (PrimoPDF and PDFCreator also had this ability)<br />
<br />
<a href="http://www.techsupportalert.com/best-free-pdf-writer.htm#pdfcreator"><strong>PDFCreator</strong></a> in its latest version is still my second (of three) choices and has all the features of Bullzip with the exception of a 64 bit version and more limited watermark abilities. The help files are available only in English, French and German. However it does have one unique feature among these products. It comes with both a standalone install and a server install. In a company setting this gives you the ability to install the printer driver on a server and make it available to all the workstations on the network without doing an install on each one of them. This may make it a preferred choice in business situations if you don't need the other options that products like Bullzip offer. Version 0.9.8 of PDF Creator did a great job printing a web page to pdf.<br />
<br />
Among the very basic pdf Writers is <a href="http://www.techsupportalert.com/best-free-pdf-writer.htm#cutepdf"><strong>CutePDF</strong></a>. This provides only the most minimal functions and creates the pdf file with no options for password, encryption, metadata, or most other optional functions. On the other hand, it is among the smallest of the downloads. <a href="http://www.techsupportalert.com/best-free-pdf-writer.htm#dopdf"><strong>doPDF</strong></a> is comparable to TinyPDF in terms of features. It provides a minimal set but does have the ability to choose different levels of output quality which the other two do not. I can see no reason not to prefer it over the other two unless you often print graphical documents to pdf. <br />
<br />
The most commonly asked question by readers has been about the size of the output file. Using a large test file without graphics doPDF created the smallest files at 1.4 megs, CutePDF, and PDFCreator came in at 1.8 megs, and Bullzip came in at 1.9 megabytes. While CutePDF, PDFCreator and Bullzip were larger they were also set at 600 dpi while the other two did not have the ability to change output and appeared to be 300dpi. This was not a sufficient difference in output file size to make it an important factor for deciding on one over the other. However, when a substantial amount of graphics were included doPDF produced a much larger file than the others. CutePDF came in at 3.5 megs (at 300dpi), PrimoPDF and Bullzip both came in at 7.8 megs (at 600dpi) and doPDF came in at a whopping 13.3 megs (at 600dpi). PDFCreator failed to correctly render the page and created failure errors each time it was tried. <br />
Primo pdf was removed from the list of best software because after downloading the newest version on June 5 from their website I found it totally unacceptable. The product still does everything it did before but there is a lag of several seconds from the time I selected the printer until the screen with the Primo interface opened. I even wondered if my computer was hung and was starting to look for the application to stop the process when it finally came up. With no features that are not also found in Bullzip, I decided to delete it from the recommended list. I should note that on my fastest computer it worked reasonably well but still much slower than all other products.<br />
Although PrimoPDF was removed from the recommendations of best pdf Writer it does have a free online version at <a href="http://online.primopdf.com/">http://online.primopdf.com/</a> that allows you to upload a file and receive it back as a PDF via email. If you need a pdf conversion only on rare occassion or you are on a computer that does not allow you to install software, or you don't have a program that can read the file, then this is a reasonable option. Of course there is no opportunity to add passwords, encrypt, or add any of the other features you may need. It is just a straight pdf file.<br />
The most requested missing feature in all of these products is the ability to delete or reorder pages. Sorry but you have to go to a paid product to get these features as none of them provide it in the free version. There is, however, within the Tech Support Alert a section dealing with free pdf tools that has tools to accomplish this task: <a href="http://www.techsupportalert.com/content/best-free-pdf-tools.htm">Best Free PDF Tools</a>. There are a couple of freeware products allowing for deleting and reordering of PDF pages.<br />
HP also offers a free online service called CloudPrint. It is designed to give you the ability to print from a cell phone or PDA. If you check your email from a cell phone and need to print an attachment you can just send it to this service, which will convert it to a PDF file and send a SMS message to your cell phone with a reference ID. When you get to a computer with an Internet interface you can login to the CloudPrint service and print the document. It will also convert and print pictures taken with your cell phone. While I don't see a need for this service personally, some swear by it, especially those who are constantly on the road seeing clients or between multiple offices. This was not considered as one of the best PDF Writers only because it does not produce a file that you can save and keep as a PDF on your local drive. It converts to PDF on the web server and allows you to print it from there. On the other hand, it does allow you to print documents without having the original program that produced the file. <br />
If you select a PDF Writer that you like but it does not have some of the features you need you might consider a couple of products that offer the ability to add functions after creating the file. pdfExchange Viewer is a fast viewer for PDF files that also allows the reader to add annotations to the file. It can then be saved and printed either with or without the annotations. PDFTK Builder allows you to add passwords and limit the ability of the reader to print, annotate, copy portions or otherwise use the pdf file other than reading it. However, it does not have the ability to add encryption. And lastly, JPDF Tweak allows the addition of watermarks, passwords, and encryption as well as limiting the ability to print or copy the file. These all work on a pdf file that has already been created and are not used to create one. Since those are beyond the limited scope of this article I have not included their information in this review, but they are easy enough to find with a web search.<br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title"><a href="" name="Quick_Selection_Guide"></a>Quick Selection Guide</div></td> </tr>
<tr> <td> <table class="review-details"><tbody>
<tr> <td class="review-details-title" colspan="3"> <h2><a href="" name="bullzip"></a><a href="http://www.bullzip.com/" target="_blank" title="Go to Bullzip PDF Printer home page...">Bullzip PDF Printer</a> <img alt="Rating 9 of 10" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_9_votes.png" title="Rating 9 of 10" /> <img alt="Gizmo's Top Pick" src="http://www.techsupportalert.com/files/images/gizmos-best-small.png" title="Gizmo's Top Pick" /></h2></td> </tr>
<tr> <td class="review-details-icon"><img alt="Pros" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-smile.png" title="Pros" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">many options, very stable, very complete set of options!</td> </tr>
<tr> <td class="review-details-icon"><img alt="Cons" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-sad.png" title="Cons" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">pdf file created may not be searchable</td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.bullzip.com/" target="_blank"><img alt="Developer Home Page" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_homepage.png" title="Developer Home Page" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.bullzip.com/" target="_blank">http://www.bullzip.com/</a></td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.bullzip.com/products/pdf/info.php" target="_blank"><img alt="Download link" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_download.png" title="Download link" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.bullzip.com/products/pdf/info.php" target="_blank">http://www.bullzip.com/products/pdf/info.php</a></td> </tr>
<tr> <td class="review-details-icon"><img alt="File Size" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_disk.png" title="File Size" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">3.93 MB <img alt="Version" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_version.png" title="Version" /> 7.1.0.1140 <img alt="License Type" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_license.png" title="License Type" /> Unrestricted Freeware <img alt="Installation Requirements" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_installation.png" title="Installation Requirements" /> Windows 2000/XP/Vista/7</td> </tr>
</tbody> </table></td> </tr>
<tr> <td> <table class="review-details"><tbody>
<tr> <td class="review-details-title" colspan="3"> <h2><a href="" name="PDFill"></a> <a href="http://www.pdfill.com/freewriter.html" target="_blank" title="Go
to PDFill Printer home page...">PDFill Printer</a> <img alt="Rating 9 of 10" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_9_votes.png" title="Rating 9 of 10" /> <img alt="Gizmo's Top Pick" src="http://www.techsupportalert.com/files/images/gizmos-best-small.png" title="Gizmo's Top Pick" /></h2></td> </tr>
<tr> <td class="review-details-icon"><img alt="Pros" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-smile.png" title="Pros" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">many, many options, very stable</td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.pdfill.com/" target="_blank"><img alt="Developer Home Page" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_homepage.png" title="Developer Home Page" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.pdfill.com/" target="_blank">http://www.pdfill.com/</a></td> </tr>
<tr> <td class="review-details-icon"><a href="http://download.cnet.com/PDFill%20PDF%20and%20Image%20Writer%20Free/3000-10743_4-10432936.html?part=dl-6257556&subj=dl&tag=button" target="_blank"><img alt="Download link" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_download.png" title="Download link" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://download.cnet.com/PDFill-PDF-and-Image-Writer-Free/3000-10743_4-10432936.html?part=dl-6257556&subj=dl&tag=button" target="_blank">http://download.cnet.com/PDFill-PDF-and-Image-Writer-Free/3000-10743_4-10432936.html?part=dl-6257556&subj=dl&tag=button</a></td> </tr>
<tr> <td class="review-details-icon"><img alt="File Size" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_disk.png" title="File Size" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">7.11 MB <img alt="Version" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_version.png" title="Version" /> 6.0 <img alt="License Type" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_license.png" title="License Type" /> Unrestricted Freeware <img alt="Installation Requirements" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_installation.png" title="Installation Requirements" /> Windows 2000/XP/Vista/7</td> </tr>
</tbody> </table></td> </tr>
<tr> <td> <table class="review-details"><tbody>
<tr> <td class="review-details-title" colspan="3"> <h2><a href="" name="pdfcreator"></a><a href="http://sourceforge.net/projects/pdfcreator/" target="_blank" title="Go to PDF Creator home page...">PDF Creator</a> <img alt="Rating 9 of 10" border="0" height="16" src="http://www.techsupportalert.com/files/images/icons/review/icon_9_votes.png" title="Rating 8 of 10" width="80" /></h2></td> </tr>
<tr> <td class="review-details-icon"><img alt="Pros" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-smile.png" title="Pros" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">standalone install and a server install</td> </tr>
<tr> <td class="review-details-icon"><img alt="Cons" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-sad.png" title="Cons" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">limited watermark abilities</td> </tr>
<tr> <td class="review-details-icon"><a href="http://sourceforge.net/projects/pdfcreator/" target="_blank"><img alt="Developer Home Page" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_homepage.png" title="Developer Home Page" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://sourceforge.net/projects/pdfcreator/" target="_blank">http://sourceforge.net/projects/pdfcreator/</a></td> </tr>
<tr> <td class="review-details-icon"><a href="http://sourceforge.net/projects/pdfcreator/" target="_blank"><img alt="Download link" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_download.png" title="Download link" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://sourceforge.net/projects/pdfcreator/" target="_blank">http://sourceforge.net/projects/pdfcreator/</a></td> </tr>
<tr> <td class="review-details-icon"><img alt="File Size" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_disk.png" title="File Size" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">17.8 MB <img alt="Version" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_version.png" title="Version" /> 1.0.0 <img alt="License Type" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_license.png" title="License Type" /> Unrestricted Freeware <img alt="Installation Requirements" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_installation.png" title="Installation Requirements" /> Windows 98/2000/XP/Vista/7(x32&x64)</td> </tr>
</tbody> </table></td> </tr>
<tr> <td> <table class="review-details"><tbody>
<tr> <td class="review-details-title" colspan="3"> <h2><a href="" name="pdfcreator"></a><a href="http://www.primopdf.com/index.aspx" target="_blank" title="Go to
PrimoPDF home page...">PrimoPDF </a> <img alt="Rating 9 of 10" border="0" height="16" src="http://www.techsupportalert.com/files/images/icons/review/icon_9_votes.png" title="Rating 8 of 10" width="80" /></h2></td> </tr>
<tr> <td class="review-details-icon"><img alt="Pros" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-smile.png" title="Pros" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">Can "drop" files on shortcut and PrimoPDF will open the corresponding app, create the PDF then close the app — interesting</td> </tr>
<tr> <td class="review-details-icon"><img alt="Cons" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-sad.png" title="Cons" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment"> </td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.primopdf.com/index.aspx" target="_blank"><img alt="Developer Home Page" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_homepage.png" title="Developer Home Page" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://sourceforge.net/projects/pdfcreator/" target="_blank">http://www.primopdf.com/index.aspx</a></td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.primopdf.com/index.aspx" target="_blank"><img alt="Download link" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_download.png" title="Download link" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://sourceforge.net/projects/pdfcreator/" target="_blank">http://www.primopdf.com/index.aspx</a></td> </tr>
<tr> <td class="review-details-icon"><img alt="File Size" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_disk.png" title="File Size" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">7.11 MB <img alt="Version" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_version.png" title="Version" /> 5.1.0.2 <img alt="License Type" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_license.png" title="License Type" /> Unrestricted Freeware <img alt="Installation Requirements" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_installation.png" title="Installation Requirements" /> Windows 98/2000/XP/Vista/7(x32&x64)</td> </tr>
</tbody> </table></td> </tr>
</tbody> </table><table class="review-details"><tbody>
<tr> <td class="review-details-title" colspan="3"> <h2><a href="" name="cutepdf"></a><a href="http://www.cutepdf.com/" target="_blank" title="Go to Cute PDF Writer home page...">Cute PDF Writer</a> <img alt="Rating 7 of 10" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_7_votes.png" title="Rating 7 of 10" /></h2></td> </tr>
<tr> <td class="review-details-icon"><img alt="Pros" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-smile.png" title="Pros" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">small, simple</td> </tr>
<tr> <td class="review-details-icon"><img alt="Cons" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-sad.png" title="Cons" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">only basic PDF writing</td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.cutepdf.com/" target="_blank"><img alt="Developer Home Page" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_homepage.png" title="Developer Home Page" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.cutepdf.com/" target="_blank">http://www.cutepdf.com/</a></td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.cutepdf.com/products/cutepdf/writer.asp" target="_blank"><img alt="Download link" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_download.png" title="Download link" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.cutepdf.com/products/cutepdf/writer.asp" target="_blank">http://www.cutepdf.com/products/cutepdf/writer.asp</a></td> </tr>
<tr> <td class="review-details-icon"><img alt="File Size" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_disk.png" title="File Size" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">1.54 MB <img alt="Version" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_version.png" title="Version" /> 2.8 <img alt="License Type" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_license.png" title="License Type" /> Unrestricted Freeware <img alt="Installation Requirements" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_installation.png" title="Installation Requirements" /> Windows 98/ME/2000/XP/Vista/7</td> </tr>
</tbody> </table><table class="review-details"><tbody>
<tr> <td class="review-details-title" colspan="3"> <h2><a href="" name="cutepdf"></a><a href="http://www.cutepdf.com/" target="_blank" title="Go to Cute PDF Writer home page...">WinPDF Writer</a> <img alt="Rating 7 of 10" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_7_votes.png" title="Rating 7 of 10" /></h2></td> </tr>
<tr> <td class="review-details-icon"><img alt="Pros" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-smile.png" title="Pros" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">small, simple, includes ghostscript (installs if not available on your computer)</td> </tr>
<tr> <td class="review-details-icon"><img alt="Cons" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-sad.png" title="Cons" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">only basic PDF writing</td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.winpdf.com/" target="_blank"><img alt="Developer Home Page" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_homepage.png" title="Developer Home Page" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.winpdf.com/" target="_blank">http://winpdf.com/</a></td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.winpdf.com/Download-WinPDF.33.0.html" target="_blank"><img alt="Download link" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_download.png" title="Download link" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.winpdf.com/Download-WinPDF.33.0.html" target="_blank">http://winpdf.com/Download-WinPDF.33.0.html</a></td> </tr>
<tr> <td class="review-details-icon"><img alt="File Size" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_disk.png" title="File Size" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">9.7 MB <img alt="Version" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_version.png" title="Version" /> ? <img alt="License Type" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_license.png" title="License Type" /> Unrestricted Freeware <img alt="Installation Requirements" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_installation.png" title="Installation Requirements" /> Windows 98/ME/2000/XP/Vista/7</td> </tr>
</tbody> </table><table class="review-details"><tbody>
<tr> <td class="review-details-title" colspan="3"> <h2><a href="" name="dopdf"></a><a href="http://www.dopdf.com/" target="_blank" title="Go to doPDF home page...">doPDF</a> <img alt="Rating 8 of 10" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_8_votes.png" title="Rating 8 of 10" /></h2></td> </tr>
<tr> <td class="review-details-icon"><img alt="Pros" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-smile.png" title="Pros" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">small, simple, different PDF qualities</td> </tr>
<tr> <td class="review-details-icon"><img alt="Cons" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-sad.png" title="Cons" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">basic PDF writing</td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.dopdf.com/" target="_blank"><img alt="Developer Home Page" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_homepage.png" title="Developer Home Page" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.dopdf.com/download.php" target="_blank">http://www.dopdf.com</a></td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.dopdf.com/download.php" target="_blank"><img alt="Download link" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_download.png" title="Download link" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.dopdf.com/download.php" target="_blank">http://www.dopdf.com/download.php</a></td> </tr>
<tr> <td class="review-details-icon"><img alt="File Size" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_disk.png" title="File Size" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment"> 3.7 MB <img alt="Version" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_version.png" title="Version" /> 7.1.327 <img alt="License Type" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_license.png" title="License Type" /> Unrestricted Freeware <img alt="Installation Requirements" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_installation.png" title="Installation Requirements" /> Windows 2000/XP/Vista/7</td></tr>
</tbody></table>Surenhttp://www.blogger.com/profile/09789784724534128579noreply@blogger.com0tag:blogger.com,1999:blog-5123376846625329520.post-47429923572405308182010-09-07T22:41:00.002+05:302010-09-07T22:41:31.381+05:30<h1 class="title">250+ Places for Free Books Online</h1><div class="meta"> <span class="submitted"><br />
<a href="http://www.techsupportalert.com/users/keroffs" title="View user
profile."></a></span> </div><span class="print-link"></span> <h2>Introduction</h2>This is a listing of 260 sites that legally offer free books (eBooks) for download or for online viewing.<br />
Some time ago I went looking for some free eBooks and was surprised to find that there are many resources for this. I decided to put together this list of sites that offer free eBooks as a reference. Since there are so many, I was not able to check each one out thoroughly. So comments from you on any of these sites would be appreciated and added to the comments in the article. <br />
I have tried to make certain that all of the eBooks at these sites are legally available for viewing/downloading. However, it is possible that I have made a mistake. If you suspect any of these sites of illegally offering copyrighted materials, then please <a href="mailto:k_stephen_r@hotmail.com?subject=Re%3A%20%20Places%20for%20Free%20Books%20Online">let me know</a>.<br />
Putting this together was exhausting, but the list is not exhaustive, so I encourage you to post any sites that you know of that are not listed here.<br />
The listing here is in alphabetical order. Given the size of this list now, it may be easier to search by <strong><a href="http://www.techsupportalert.com/content/50-places-free-books-online.htm#genre_pages">genre</a></strong>. I have set up 14 pages here of different genres. If you do not see one that covers your interests, let me know and I may be able to put one together.<br />
I have also put together a listing of sites that offer free and legal audio books at<br />
<ul><li> <strong><a href="http://www.techsupportalert.com/free-books-audio" target="_blank">Free Audio Books Online</a></strong><br />
</li>
</ul>These listings may be search in the following methods:<br />
<br />
.<br />
<br />
<h2><a href="" name="alphabetical_listing"></a>Alphabetical Listing</h2><strong><a href="http://1romanceebooks.com/free-reads/cat_19.html" target="_blank">1RomanceEBooks</a></strong> offers 27 free books from their romance collection for download in a variety of formats. These are not public domain offerings, but some of their usual offerings made available for free.<br />
<strong><a href="http://2020ok.com/0.htm" target="_blank">2020k</a></strong> Large collection, divided into categories and sub-categories for download in a variety of formats. <strong>Note:</strong> Many of the links to the Internet Archive from this site are not working.<br />
<a href="http://www.classicauthors.net/Dickens/"><strong>About Charles Dickens</strong></a> <img alt="New!" src="http://www.techsupportalert.com/files/images/srk-new.jpg" /> This site is All About Charles Dickens. Suggested by Sea Mac.<br />
<strong><a href="http://www.adaic.org/free/freebook.html" target="_blank">AdaIC.org</a></strong> has several free books on Ada as well as <a href="http://www.adaic.org/learn/textbook.html" target="_blank">textbooks</a> and <a href="http://www.adaic.org/learn/index.html">tutorials</a> on Ada.<br />
<strong><a href="http://www.c3f.com/alivfree.html" target="_blank">Alive and Free</a></strong> - Links to free ebooks of living authors<br />
<strong><a href="http://www.allbooksfree.com/" target="_blank">AllBooksFree</a></strong> A small, but unique, listing of free fiction ebooks, available for download, mostly in pdf.<br />
<strong><a href="https://sites.google.com/site/allpdfbooks/" target="_blank">AllPDFBooks</a></strong> has a good sized collection of books available in biology, chemistry, physics, computer, magic and hindi kahaniyan, for download in pdf. Suggested by an anonymous user.<br />
<strong><a href="http://www.allromanceebooks.com/category180.html" target="_blank">AllRomanceBooks</a></strong> lists 169 free romance ebooks for download. Registration is required. I noticed that there appeared to be the 1RomanceEBooks and eHarlequin listings shown there, as well as quite a few others. Again, these are not public domain, but the free offerings of current publishers.<br />
<strong><a href="http://www.ams.org/online_bks/online_subject.html" target="_blank">American Mathematical Society</a></strong> has a pretty complete listing of books involving mathematics.<br />
<strong><a href="http://arthursclassicnovels.com/" target="_blank">Arthur's Classic Novels</a></strong> - Over 4000 novels covering a great variety of topics, nicely separated into categories and "best" lists. Some very interesting entries here. Available for online viewing.<br />
<strong><a href="http://www.asksam.com/ebooks/" target="_blank">Ask Sam</a></strong> - A small collection of classics, including Shakespeare, and legal, resource and government texts.<br />
<strong><a href="http://www.associatedcontent.com/article/866741/where_to_find_free_cookbooks_online.html?cat=22" target="_blank">AssociatedContent</a></strong> has several cookbooks available for download in pdf. Most are short and specific (muffin recipes etc.), but the Chocolate recipe book is over 600 pages and the Blue Ribbon recipes are over 400 pages.<br />
<strong><a href="http://www.astrologyweekly.com/astrology-books/index.php" target="_blank">AstrologyWeekly</a></strong> 10 books for online reading and about 30 for download. All on astrology.<br />
<strong><a href="http://www.authorama.com/" target="_blank">Authorama </a></strong>offers a few hundred books, searchable by author, for online viewing.<br />
<strong><a href="http://www.sundhagen.com/babbooks/" target="_blank">BABBooks</a></strong> is a children's site that has 25 free illustrated books available for online reading or listening.<br />
<strong><a href="http://www.baen.com/library/" target="_blank">Baen Free Library</a></strong> - A small library of downloadable science fiction novels in a variety of formats.<br />
<strong><a href="http://baencd.thefifthimperium.com/" target="_blank">BaenCD</a></strong> - A small collection of science fiction books from Baen's promotional CDs. They are downloadable in a variety of formats as well as viewable online.<br />
<strong><a href="http://www.mainlesson.com/displaybooksbytitle.php" target="_blank">Baldwin Online Children's Projects</a></strong> 520 classic children's books in a variety of genres for online viewing.<br />
<a href="http://www.bannerbooks.com/index.html" target="_blank"><strong>BannerBooks</strong></a> offers 5 unique books for reading online.<br />
<strong><a href="http://www.bartleby.com/index.html" target="_blank">Bartelby</a></strong> - Harvard classics and encyclopedias. HTML only.<br />
<strong><a href="http://www.bbc.co.uk/doctorwho/classic/ebooks/index.shtml" target="_blank">BBC (Dr. Who)</a></strong> for those who like Dr. Who, this is a collection of 8 books for online reading or download in a choice of 3 formats<br />
<strong><a href="http://www.beenleigss.eq.edu.au/requested_sites/audiostories/index.html" target="_blank">Beenleigh State School</a></strong> of Queensland, Australia has a large collection of children stories to read online with audio built in.<br />
<strong><a href="http://sunsite3.berkeley.edu/Literature/" target="_blank">Berkely SunSite Classics</a></strong> - A small collection of classics. HTML only.<br />
<strong><a href="http://www.bibliomania.com/" target="_blank">Bibliomania</a></strong> - Over 2,000 classic novels, study guides, biographies and more. HTML only.<br />
<strong><a href="http://blackmaskmagazine.com/fiction.html" target="_blank">BlackMaskFiction</a></strong> offers 20 or so free detective stories that were originally published in magazines during 1925 to 1939 for download in pdf.<br />
<strong><a href="http://bookboon.com/us/student" target="_blank">BookBoon</a></strong> offers a number of free textbooks on computer programing and other subjects for download in pdf. These are legal textbooks written for BookBoon which contain some ads within the books.<br />
<strong><a href="http://book-bot.com/bookbot/public/reader" target="_blank">Book-bot </a></strong> 14,571 books available for online viewing in their easy to view reader. Very nice find by fellow editor Rhiannon.<br />
<strong><a href="http://www.bookbox.com/free_stuffcat.php" target="_blank">BookBox</a></strong> is a children's site that has about 20 free books available for download in pdf (as a single page) and MP3. Also free games and coloring books.<br />
<strong><a href="http://www.bookglutton.com/" target="_blank">BookGlutton</a></strong> is a collection of 1200+ books for online reading with the added feature of groups available for discussion of the readings. Nice combination of reading and socializing. Suggested by an anonymous poster.<br />
<strong><a href="http://www.bookpop.com/bookpop.html" target="_blank">BookPop</a></strong> is another children's site that has a number of illustrated books free for online reading. There are also some coloring pages for download. There are supposed to be music and story downloads, but I kept getting an error when trying to reach those.<br />
<strong><a href="http://www.bookrags.com/browse/ebooks/" target="_blank">BookRags</a></strong> - Small collection of free with many paid. Hard to find the free ones. Available in Word or PDF.<br />
<strong><a href="http://www.booksshouldbefree.com/" target="_blank">BooksShouldBeFree</a></strong> While primarily a good sized collection of audio books, each of the books is available for online reading or for download in text.<br />
<strong><a href="http://www.bookstacks.org/" target="_blank">Bookstacks</a></strong> is a small collection (100+) of classic works available for online viewing, with many also available in Adobe PDF and Microsoft Reader versions. Nicely set up.<br />
<strong><a href="http://www.bookyards.com/" target="_blank">BookYards</a></strong> - 16,000+ books, videos, educational material.<br />
<strong><a href="http://www.bored.com/ebooks/" target="_blank">Bored.com</a></strong> has over 15,000 books available for online viewing. Nicely divided into a good variety of categories.<br />
<a href="http://www.bl.uk/onlinegallery/ttp/ttpbooks.html" target="_blank"><strong>BritishLibrary</strong></a> has a virtual books section with a small, but interesting, collection for online viewing.<br />
<strong><a href="http://www.talewins.com/Browzer/novels.htm" target="_blank">BrowzerBooks</a></strong> has an interesting collection of novels in a wide variety of genres (check bottom of page for links to genres) either available for online reading or download in pdf.<br />
<strong><a href="http://bucarotechelp.com/download/business/default.asp" target="_blank">BucaroTecHelp</a></strong> has an interesting collection of free business books available for download in pdf. These deal with internet business for the most part. You do have to view their news feed to be able to download, but registration is not necessary.<br />
<strong><a href="http://www.bygosh.com/" target="_blank">ByGosh</a></strong> offers a small collection of very nicely illustrated classics for younger children and older children. Also some short stories. Suggested by Cathy of <a href="http://www.techsupportalert.com/content/50-places-free-books-online.htm#puzzled">PuzzlEd</a>.<br />
<strong><a href="http://www.candlelightstories.com/storybooks/" target="_blank">CandlelightStories</a></strong> has a good number of stories from the Arabian nights collection as well as other story books available for online reading.<br />
<strong><a href="http://www.bbc.co.uk/cbeebies/stories/" target="_blank">CBeebies</a></strong> is a BBC site that offers a good number of free stories, in flash, for online reading and listening. Also, has games, music and coloring books.<br />
<strong><a href="http://www.chessville.com/downloads/ebooks.htm" target="_blank">Chessville </a></strong>40+ ebooks on Chess available for download (mostly in PDF)<br />
<strong><a href="http://chestofbooks.com/" target="_blank">ChestofBooks</a></strong> Large collection, divided into categories, for online viewing. Nice collection.<br />
<strong><a href="http://www.childrensbooksforever.com/" target="_blank">ChildrensBooksForever</a></strong> has a nice collection of illustrated books available in pdf.<br />
<strong><a href="http://www.childrensbooksonline.org/super-index.htm" target="_blank">Children's Books Online</a></strong> is an excellent collection (600+) of illustrated antique children's books for viewing online. They are also available for download at a fee. This little gem was suggested by an anonymous poster.<br />
<strong><a href="http://www.childrenstory.info/biblestoryforchild/childstory.html" target="_blank">ChildrenStory</a></strong> a children site that offers a nice collection of fairy tales for online viewing as well as Bible stories and coloring books.<br />
<strong><a href="http://classicauthors.net/" target="_blank">Classic Authors.net</a></strong> contains the works of over a hundred authors (and short biography for each), with a varying number of works per author. Online viewing only.<br />
<strong><a href="http://classicbook.info/" target="_blank">Classic Book Library</a></strong> is a small collection (100+) of classic works arranged by genre. Online viewing only.<br />
<strong><a href="http://www.classicbookshelf.com/library/" target="_blank">Classic Book Shelf Electronic Library</a></strong> offers the works of 50+ authors in varying amounts. Online viewing only.<br />
<strong><a href="http://www.classic-literature.co.uk/" target="_blank">Classic Literature Library</a></strong> Decent size collection that has complete works of a small variety of authors and works of others and a nice children's section available for online viewing.<br />
<strong><a href="http://www.classicreader.com/" target="_blank">Classic Reader</a></strong> offers thousands of free classic books for online viewing.<br />
<a href="http://selfknowledge.com/index.shtml"><strong>Classical Authors Index</strong></a> <img alt="New!" src="http://www.techsupportalert.com/files/images/srk-new.jpg" /> Portraits, biographies and pictures of 460 classic authors. 1258 online books of classical literature extensively enhanced with 2,510,227 annotations from the Encyclopedia of the Self. Suggested by Sea Mac.<br />
<strong><a href="http://www.computer-books.us/" target="_blank">ComputerBooks.us</a></strong> larger collection, sub categorized and available for download in pdf<br />
<strong><a href="http://cougarwebworks.com/downloads/" target="_blank">CougarWebWorks</a></strong> has several of the works of Nowick Gray available for free download in pdf.<br />
<strong><a href="http://www.crankylibrarian.com/" target="_blank">CrankyLibrarian</a></strong> 3011 books by 752 authors available for online viewing. Complete works of several authors and some interesting categories.<br />
<strong><a href="http://craphound.com/?cat=5" target="_blank">CrapHound </a></strong>has a few works of Cory Doctrow available for free download.<br />
<strong><a href="http://www.creativehomemaking.com/download.shtml" target="_blank">CreativeHomemaking</a></strong> has a number of free cookbooks available for download in pdf. Some interesting entries here, including "How to Make a Gingerbread House".<br />
<strong><a href="http://www.dailylit.com/" target="_blank">DailyLit</a></strong> - Read books online by daily email or RSS feed. Over 700 titles.<br />
<strong><a href="http://www.developnew.com/books/" target="_blank">Developnew</a></strong> a good collection of free computer software books available for reading online.<br />
<strong><a href="http://www.diesel-ebooks.com/cgi-bin/category/free_download" target="_blank">Diesel eBooks</a></strong> - Offers 750+ ebooks formatted for Microsoft Reader and MobiPocket.<br />
<a href="http://www.new.dli.ernet.in/cmu.htm" target="_blank"><strong>DigitalLibraryofIndia </strong></a>has a large collection of works available in several formats for online viewing or download. Sorted by title.<br />
<strong><a href="http://www.dlshq.org/download/download.htm" target="_blank">DivineLifeSociety</a></strong> over 200 books on Yoga, religion and philosophy available in pdf or HTML<br />
<strong><a href="http://www.dltk-teach.com/minibooks/" target="_blank">DLTK-Teach</a></strong> offers free printable children's books. Most are geared towards pre-schoolers, including a set on the alphabet, but there are some stories for older children also. Suggested by Cathy of <strong><a href="http://www.techsupportalert.com/content/50-places-free-books-online.htm#puzzled">PuzzlEd. </a></strong><br />
<strong><a href="http://homepage.ntlworld.com/lumfylomax/" target="_blank">DominicGreen </a></strong>offers 4 of his science fiction novels for free reading online.<br />
<strong><a href="http://www.dovercentrebooks.com/index.htm" target="_blank">DoverCentreBooks</a></strong> has a very large collection of links to free online cookbooks, horror stories, meditation, spiritualism and fables.. They are sorted alphabetically and since they are to a variety of download sites, the availability of online viewing and download formats vary.<br />
<strong><a href="http://www.dagonbytes.com/thelibrary/index.html" target="_blank">DragonBytes</a></strong> Nice collection of horror novels available for online viewing. Separate section for Vampire novels.<br />
<strong><a href="http://duncanlong.com/DuncanLongPublications/index.html" target="_blank">DuncanLongPublications</a></strong> offers several works for free online viewing. Generally, a pdf download costs money, but some are ad supported and are free.<br />
<strong><a href="http://www.virtualimprint.com/earthbound/download.htm" target="_blank">Earthbound</a></strong><br />
The 5 book science fiction series of Earthbound available for download in <span style="font-family: HELVETICA,ARIAL;"><span style="font-size: x-small;">lit .pdb .pdf .txt .rtf.</span></span><br />
<strong><a href="http://www.easymediabroadcast.com/" target="_blank"><span style="font-family: HELVETICA,ARIAL;"><span style="font-size: x-small;">EasyMediaBroadcast</span></span></a></strong> <span style="font-family: HELVETICA,ARIAL;"><span style="font-size: x-small;">offers a nice size collection of mostly classical works for download in TK3. You must use the TK3 reader, available for free at the site, for these books</span></span>. Books are sorted by author and title.<br />
<strong><a href="http://www.freeebooks.info/" target="_blank">eBookLobby</a></strong> - Small, but interesting and unique, collection divided into 13 categories<br />
<strong><a href="http://www.e-booksdirectory.com/" target="_blank"><span style="font-family: HELVETICA,ARIAL;"><span style="font-size: x-small;">E-Books Directory</span></span></a></strong> <span style="font-family: HELVETICA,ARIAL;"><span style="font-size: x-small;">944 books in 344 categories available for download in varying formats.</span></span><br />
<strong><a href="http://www.saskschools.ca/%7Eebooks/" target="_blank">eBooksforYoungReaders</a></strong> offers a large collection of free books for download nicely categorized into reading levels.<br />
<strong><a href="http://www.ebooksjustpublished.com/" target="_blank"><span style="font-family: HELVETICA,ARIAL;"><span style="font-size: x-small;">eBooksJustPublished</span></span></a></strong> Interesting collection of DRM free eBooks listed daily. Most are free.<br />
<strong><a href="http://www.ebooknook.com/" target="_blank">eBookNook</a></strong> A good number of stories, mostly romance, but some children and vampire stories available for online reading.<br />
<strong><a href="http://ebookplanet.net/" target="_blank">eBookPlanet</a></strong> has an interesting and unique collection of works in 12 categories available for download in pdf. Suggested by an anonymous user.<br />
<strong><a href="http://www.ebooksread.com/" target="_blank">eBooksRead</a></strong> Over 41,000 books available for download in pdf or text. Search by author or title<br />
<strong><a href="http://www.e-cookbooks.net/library/free.htm" target="_blank">e-cookbooks.net</a></strong> has 14 smaller cookbooks available for free download in pdf.<br />
<strong><a href="http://www.eduplace.com/marketing/leveledbooks/sampler/content/index.html" target="_blank">eduplace</a></strong> offers 14 "leveled" books for children for online reading or printing.<br />
<strong><a href="http://www.eharlequin.com/store.html?cid=1317" target="_blank">eHarlequin</a></strong> offers 17 free romance novels for download in several different format options. These are not public domain novels, but some of Harlequin's usual offerings.<br />
<a href="http://www.eldritchpress.org/" target="_blank"><strong>EldritchPress</strong></a> has a good sized collection of public domain works with some unique categorization.<br />
<strong><a href="http://www.ereader.com/servlet/mw?t=freebooks&si=59" target="_blank">eReader.com</a></strong> has a small collection of free ebooks for download, but a couple interesting entries. Registration required.<br />
<strong><a href="http://www.grtbooks.com/exitfram.asp?idx=0&yr=-5000&aa=AA&at=AA&ref=links&URL=http://eserver.org/" target="_blank">eServer</a></strong> - Over 30,000 works covering a variety of interests<br />
<strong><a href="http://tc.eserver.org/" target="_blank">eServer Technical Communications</a></strong> has 875 works in its software section and 161 in its web design section (although a number were no longer available) as well as some articles in its other sections.<br />
<strong><a href="http://etext.lib.virginia.edu/collections/subjects/" target="_blank">eText.lib</a></strong> The University of Virginia online library has a large collection of works available for online viewing (some are available in Microsoft Reader). Even though a good number are limited to UVA students and staff, there is still a good amount of interesting material available to the general public. Suggested by poster mike dutch.<br />
<strong><a href="http://www.everyonesreading.com/#" target="_blank">EveryonesReading</a></strong> is offering 10 free romance novels for download in several formats. These are one book from each of their series and are being offered to celebrate their first anniversary (so they may not be there long).<br />
<strong><a href="http://www.fablevision.com/place/library/index.html" target="_blank">FableLibrary</a></strong> has an interesting and unique collection of childrens works. Most are available for viewing online, including some flash versions. But a few are available for download. Suggested by Cathy of <strong><a href="http://www.techsupportalert.com/content/50-places-free-books-online.htm#puzzled">PuzzlEd. </a></strong><br />
<strong><a href="http://www.pueblo.gsa.gov/" target="_blank">Federal Citizen Information Center</a></strong> offers informational booklets on a great variety of subjects. Many are free and most of the paid ones are available for a free download. Suggested by an anonymous poster<br />
<strong><a href="http://www.feedbooks.com/" target="_blank">FeedBooks</a></strong> - Thousand of eBooks downloadable in a variety of formats<br />
<strong><a href="http://www.fiction.us/" target="_blank">Fiction eBooks</a></strong> is a interesting small collection of works of fiction (including some Beatrix Potter illustrated childrens books) as well as some books for writers and works philosophy and sociology. Online viewing only.<br />
<strong><a href="http://www.fictionpress.com/" target="_blank">FictionPress</a></strong> is a growing network over 1 million writers/readers, and home to over 1,200,000 original works by unsigned authors.<br />
<strong><a href="http://www.fictionwise.com/eBooks/freeBooks.htm?cache" target="_blank">FictionWise</a></strong> has 35 books available for free download in a great variety of formats. Most are the usual classics available elsewhere, but there are a couple of unusual ones and a few reference books that might be interesting. Registration is required.<br />
<strong><a href="http://finding-free-ebooks.blogspot.com/" target="_blank">FindingFreeeBooks</a></strong> has links to free book offerings posted. Also worth checking out the <strong><a href="http://finding-free-ebooks.blogspot.com/search/label/limited%20time%20offers" target="_blank">limited time offers</a></strong> section. This is a nice spot to check as there are unique entries here.<br />
<strong><a href="http://www.floridadisaster.org/kids/teachPlan.htm" target="_blank">FloridaDisaster.org </a></strong> offers three books on hazardous weather for 1st, 2nd and 3rd grade readers in download in pdf.<br />
<strong><a href="http://www.franklin.com/freelibrary/" target="_blank">Franklin</a></strong> - Thousands of free titles available in text and HTML format<br />
<strong><a href="http://www.freebookcentre.net/" target="_blank">FreeBookCentre</a></strong> links to thousands of computer ebooks divided into many sub-categories<br />
<strong><a href="http://www.freebookspot.net/" target="_blank">FreeBookSpot</a></strong> - 5,000 free eBooks downloadable in 96 categories available for download in a number of different formats. Suggested by devinathann.<br />
<strong><a href="http://www.freebooks4doctors.com/" target="_blank">FreeBooks4Doctors</a></strong> Over 650 works (in varying languages) dealing with medical matters. Available in pdf download.<br />
<strong><a href="http://www.free-ebooks-canada.com/" target="_blank">FreeeBooksCanada</a></strong> has a large listing of free books available for download in pdf. Very interesting collection worth checking out.<br />
<strong><a href="http://www.freebooksforall.com/" target="_blank">FreeBooksforAll</a></strong> A fairly large collection of non-fiction books available for download (mostly in pdf)<br />
<strong><a href="http://freecomputerbooks.com/" target="_blank">FreeComputer Books</a></strong> - Free computer, math, technical books and lecture notes<br />
<strong><a href="http://free-ebook-download-links.blogspot.com/search/label/Computer%20Sciences" target="_blank">FreeeBookDownloadLinks</a></strong> has a very nice size collection of links to free computer science books online. Download options vary as these are links to other sites.<br />
<strong><a href="http://www.free-ebooks.net/" target="_blank">Free eBooks Net</a></strong> - Free books and resources for authors. Also magazines<br />
<strong><a href="http://www.freeonlinebooks.org/" target="_blank">FreeOnlineBooks</a></strong> offers over 5,000 free books, mostly classics, for online viewing. Works may be searched by author, title, keyword, reading level and 15 genres. You can adjust the page width and font size and style. Registration is not necessary, but free registration allows some extra features.<br />
<strong><a href="http://www.wendymcelroy.com/freebooks.html" target="_blank">FreeOn-LineBooks</a></strong> Interesting collection on individualist feminism and libertarianism available for online viewing.<br />
<a href="http://freeonlinebookstore.org/" target="_blank"><strong>FreeOnlineBookstore</strong></a> has a good number of links to free books in a wide variety of categories. The most engineering and electrical engineering books I have seen listed at a site. But they also have works in about 15 other categories. Since most link off site, the options for downloading/viewing vary.<br />
<strong><a href="http://www.free-online-novels.com/" target="_blank">Free Online Novels</a></strong> Interesting collection for online viewing. Several hundred novels separated into categories.<br />
<strong><a href="http://www.freequickrecipes.com/free-online-cookbooks.php" target="_blank">FreeQuickRecipes</a></strong> 3 cookbooks available for download in pdf and a large amount of recipes for online viewing as well as other information on kitchen and diet<br />
<strong><a href="http://freeread.com.au/" target="_blank">FreeRead</a></strong> a bibliography of Australian writers who died before 1955, with links to a good number of them for download or viewing.<br />
<strong><a href="http://www.freeromancefiction.com/index2.htm" target="_blank">FreeRomanceFiction</a></strong> offers 5 free works available for download in pdf. These are in their Holiday, Paranormal, Erotic and historical subsections. There may be works added in the future.<br />
<strong><a href="http://freesfonline.de/index.html" target="_blank">Free SF Online</a></strong> over 2,000 links to science fiction books for reading online<br />
<strong><a href="http://freesf.blogspot.com/" target="_blank">FreeSFReader</a></strong> Collection of links for mostly science fiction, fantasy and horror novels and short stories, but also some other genres<br />
<strong><a href="http://www.freetechbooks.com/" target="_blank">FreeTechBooks</a></strong> - Computer science and programming books, textbooks and lecture notes.<br />
<strong><a href="http://www.fullbooks.com/" target="_blank">FullBooks</a></strong> - Thousand of free full text books.<br />
<strong><a href="http://www.auburn.edu/%7Emurrag1/bookindex.html" target="_blank">GenieBooks</a></strong> offers 15 books for younger readers for download in PowerPoint. Has not been updated in a while, but links still work. Sponsored by University of Auburn. PowerPoint can be read with the free <strong><a href="http://www.openoffice.org/" target="_blank">Open Office</a></strong>.<br />
<a href="http://www.readprint.com/author-70/George-Bernard-Shaw-books"><strong>George Bernard Shaw books</strong></a><img alt="New!" src="http://www.techsupportalert.com/files/images/srk-new.jpg" /> We hope you enjoy reading these George Bernard Shaw books on Read Print. Suggested by Sea Mac.<br />
<strong><a href="http://www.getfreeebooks.com/" target="_blank">GetFreeEbooks</a></strong> - Smaller collection of all free ebooks.<br />
<strong><a href="http://giraffian.com/kids/books" target="_blank">Giraffian</a></strong> offers a nice collection of books for pre-schoolers, covering the alphabet, numbers colors and other topics. Suggested by Cathy of <strong><a href="http://www.techsupportalert.com/content/50-places-free-books-online.htm#puzzled">PuzzlEd. </a></strong><br />
<strong><a href="http://www.globusz.com/" target="_blank">Globusz</a></strong> - A place for new authors to post their work and for readers to check them out for free.<br />
<strong><a href="http://goldengems.blogspot.com/" target="_blank">GoldenGems</a></strong> a collection of little golden books and other illustrated books for children for online viewing and saving as jpg.<br />
<strong><a href="http://books.google.com/books?as_q=&num=10&btnG=Google+Search&as_epq=&as_oq=&as_eq=&as_brr=1&lr=&as_vt=&as_auth=&as_pub=&as_sub=&as_drrb=c&as_miny=&as_maxy=&as_isbn" target="_blank">Google Book Search</a></strong> - Good selection of free ebooks available in a variety of categories.<br />
<strong><a href="http://www.grtbooks.com/" target="_blank">GrtBooks</a></strong> - A large collection of great books and classics.<br />
<strong><a href="http://www.gutenberg.org/wiki/Main_Page" target="_blank">Gutenberg</a></strong> - Over 25,000 books for download there and over 100,000 available through their affiliates.<br />
<a href="http://www.handebooks.com/books/index.html" target="_blank"><strong>HANDebooks</strong></a> has 15 public domain classics available for download in Plucker or eReader.<br />
<a href="http://www.hawkstories.com/ebooks/index.html"><strong>HawkStories.com</strong></a> <img alt="NEW!" src="http://www.techsupportalert.com/files/images/srk-new.jpg" /> Free Downloads of Stories, Classic Novels, and Fairy Tales. Suggested by TJ Hawk.<br />
<strong><a href="http://www.healthrecipes.com/free_cookbooks.htm" target="_blank">HealthRecipes</a></strong> 8 cookbooks available for download in pdf<br />
<strong><a href="http://coins.ha.com/tfi/" target="_blank">HeritageAuctionGalleries </a></strong>offers two works of James L. Halperin, The First Immortal and The Truth Machine, for free download in MS Word.<br />
<strong><a href="http://www.heygidday.com/download.htm" target="_blank">Heygidday</a></strong> Thousands of works in a great variety of categories available for download in pdf (zipped).<br />
<a href="http://www.holybooks.com/"><strong>HolyBooks.com</strong></a> <img alt="New!" src="http://www.techsupportalert.com/files/images/srk-new.jpg" /> Download holy books, sacred and spiritual texts in full length for free. Suggested by an anonymous poster.<br />
<strong><a href="http://www.horrormasters.com/Themes/horror_classics.htm" target="_blank">HorrorMasters</a></strong> 2100 classic horror novels available for download in pdf, plus links to horror novels at other sites.<br />
<strong><a href="http://www.howto.co.uk/" target="_blank">HowTo</a></strong> offers around 150 free "how to" ebooks on a wide variety of topics. Suggested by an anonymous poster.<br />
<strong><a href="http://infomotions.com/alex/" target="_blank">Infomotions</a></strong> - 14,000 listings from full classic novels to Western philosophy. HTML only.<br />
<strong><a href="http://www.ink.imagedjinn.com/" target="_blank">Ink.Imagedjinn</a></strong> has a nice collection of short fairy tales, a couple of myth stories and the book Pinocchio available for online viewing. A site for children.<br />
<strong><a href="http://www.inklesstales.com/stories/" target="_blank">InklessTales</a></strong> offers 15 children stories for online viewing as well as games, poems and activities.<br />
<a href="http://intechweb.org/books.php" target="_blank"><strong>In-Tech</strong></a> offers 80 full length books for free download in pdf (zipped). Large selection on the topic of robotics. There are also about 2000 journal articles available here for free.<br />
<strong><a href="http://en.childrenslibrary.org/" target="_blank">InternationalChildrensDigitalLibrary</a></strong> nice collection of children's books from around the world in a variety of languages and nicely categorized, available for online viewing<br />
<strong><a href="http://www.archive.org/details/texts" target="_blank">InternetArchive</a></strong> - Over 500,000 texts available for download<br />
<strong><a href="http://www.sacred-texts.com/" target="_blank">Internet Sacred Text Archive</a></strong> very interesting and large collection of books on religion, mythology, folklore and the esoteric available for online viewing.<br />
<strong><a href="http://www.geocities.com/athens/olympus/9958/books.html">Islaam Pure & Clear</a></strong> around 50 Islamic books for reading or download<br />
<strong><a href="http://members.atlantic.net/%7Ejcd/" target="_blank">JamesDunavant</a></strong> offers his book, The Keepers of Forever, for download in HTML. or online viewing. A download compatible with Palm Pilot is also available.<br />
<strong><a href="http://www.sitelane.com/ebooks/aliencradlejinlo/index.htm" target="_blank">JeffInlo</a></strong> offers his book, Alien Cradle, for download in a large variety of formats and for online reading.<br />
<strong><a href="http://jimdefilippi.com/index.php?p=1_2_Books" target="_blank">JimDeFilippi</a></strong> offers 8 of his crime novels for free download in pdf.<br />
<strong><a href="http://jodykihara.com/download.html" target="_blank">Jody Kihara</a></strong> has made two of her books for children available for free download in PDF and apparently more freebies are forthcoming.<br />
<strong><a href="http://www.julieacarda.com/books.html" target="_blank">JuliaCarda </a></strong> offers her novel, Portal to Peace, for free download in pdf at her website.<br />
<strong><a href="http://www.kellscraft.com/textcontents.html" target="_blank">Kellscraft Studio </a></strong>Around 250 books available for online viewing. Kellscraft lists out of print, public domain novels, most published prior to 1923. Searchable by title, author and topic.<br />
<strong><a href="http://www.kiddotime.com/" target="_blank">KiddoTime</a></strong> is a site for those learning to read. It has phonics, word, music and puzzle games. Suggested by Sefi.<br />
<strong><a href="http://www.kidsaudiobooks.co.uk/read_it.htm" target="_blank">KidsAudioBooks</a></strong> has 12 classic books for children for download in pdf. Most are available elsewhere, but there is one unique entry. Also a good collection of audio books and some coloring books. Suggested by Cathy of PuzzlEd.<br />
<strong><a href="http://www.kidsknowit.com/" target="_blank">KidsKnowIt</a></strong> is not a book site, but it does have a lot of reading for children, along with educational puzzles and games.<br />
<strong><a href="http://www.kidsnurseryrhymes.co.uk/" target="_blank">KidsNurseryRhymes</a></strong> a British site featuring over 1200 nursery rhymes for online viewing. Also has sing along rhymes (must have midi player-available there) and some nursery rhyme disco recordings available for download in MP3.<br />
<strong><a href="http://www.knowledgerush.com/kr/jsp/db/directory.jsp" target="_blank">Knowledgerush</a></strong> has a good sized collection separated into about 30 categories. Nice children and Mystery sections, among others.<br />
<strong><a href="http://www.learningisland.org/" target="_blank">LearningIsland </a></strong>Nice collection of children books available for online viewing.<br />
<strong><a href="http://www.learningpage.com/free_pages/ewe_preview.html" target="_blank">LearningPage</a></strong> has a series (38) of printable "Tommy" story books suitable for about 8-10-year-olds, plus some other printable books, for free. Suggested by Cathy of <strong><a href="http://www.techsupportalert.com/content/50-places-free-books-online.htm#puzzled">PuzzlEd. </a></strong><br />
<a href="http://www.readprint.com/author-82/Leo-Tolstoy-books"><strong>Leo Tolstoy's Books, Biography, Quotes</strong></a> <img alt="New!" src="http://www.techsupportalert.com/files/images/srk-new.jpg" /> Read Leo Tolstoy's Books, Biography, and Quotes over at read print. Suggested by Sea Mac. <strong><br />
</strong><br />
<strong><a href="http://librivox.org/" target="_blank">Librivox</a></strong> Although mostly know for its excellent collection of audio books. A poster named Les has pointed out that they also have links to online viewing sites for all of its large collection of audio books and also download links.<br />
<strong><a href="http://www.lil-fingers.com/storybooks/index.html" target="_blank">LilFingers Storybooks</a></strong> Small collection of books for very young children for reading and being read to.<br />
<strong><a href="http://www.linux.org/docs/online_books.html" target="_blank">Linux Online</a></strong> Around 25 Linux, open source and programing, books for download or reading<br />
<strong><a href="http://listverse.com/2007/10/25/10-free-science-fiction-books-online/" target="_blank">Listverse</a></strong> has a interesting top ten list (though there are 11 entries) of free sci fi books on the web.<br />
<a href="http://gruntose.com/Info/Books/literature.html" target="_blank"><strong>Literarium</strong></a> has a small collection of classic works available for online viewing. A nice collection of Sherlock Holmes, some interesting historical documents and a few unique classic works.<br />
<strong><a href="http://www.literature.org/authors/" target="_blank">Literature.org</a></strong> has a collection of classics, arranged by author, for online viewing.<br />
<a href="http://www.literaturemaster.com/" target="_blank"><strong>LiteratureMaster</strong></a> has thousands of ebooks in a wide variety of categories available for online viewing.<br />
<strong><a href="http://www.online-literature.com/" target="_blank">LiteratureNetwork </a></strong>has over 1900 full books and over 3000 short stories and poems by over 250 authors available for online reading. Searchable by author and they have a few unusual ones.<br />
<strong><a href="http://www.literaturepost.com/" target="_blank">LiteraturePost</a></strong> 825 works from 71 authors available for online viewing.<br />
<strong><a href="http://www.everymanedict.com/e16_ensouled.htm" target="_blank">Luisa Green</a></strong> offers 3 of her romance ebooks for free download in pdf.<br />
<strong><a href="http://www.magickeys.com/books/" target="_blank">Magickeys</a></strong> small, but interesting, and unusual, collection of childrens books for online viewing.<br />
<a href="http://www.magick-spells.net/" target="_blank"><strong>MagickSpells</strong></a> is a collection of books on astrology, magic and mythology for free viewing online.<br />
<strong><a href="http://mark-twain.classic-literature.co.uk/">Mark Twain Books</a> </strong><img alt="New!" src="http://www.techsupportalert.com/files/images/srk-new.jpg" /> The Classic Literature Library presents The Complete Literary Works of Mark Twain. Suggested by Sea Mac.<br />
<strong><a href="http://manybooks.net/" target="_blank">ManyBooks</a></strong> - 22,000 books available for download in a variety of formats.<br />
<strong><a href="http://www.authentic-greek-recipes.com/free-cookbooks.html" target="_blank">Maria'sCouzina</a></strong> has 3 free cookbooks available for download in pdf. Two of the books are Greek recipes an the other is world cuisine. These appear to be shortened versions of the full cookbook, but still have some interesting entries and information.<br />
<strong><a href="http://www.mastertexts.com/" target="_blank">Master Texts</a></strong> is a collection of 30+ authors for online viewing.<br />
<strong><a href="http://meatbook.com/" target="_blank">MeatBook</a></strong> has an online cookbook image of the Ground Meat Cookbook available for online viewing.<br />
<strong><a href="http://medlineplus.gov/" target="_blank">MedLine Plus</a></strong> is a great, trustworthy site for general health information, including tutorials, clinical trial updates and the latest news in medicine. You can also find plenty of <strong><a href="http://vsearch.nlm.nih.gov/vivisimo/cgi-bin/query-meta?v%3Aproject=medlineplus&query=book&x=0&y=0" target="_blank">books</a></strong>, including some intended for children.<br />
<strong><a href="http://memoware.com/" target="_blank">MemoWare</a></strong> - Free books for PDA.<br />
<strong>MicrosoftReader</strong> has links to free works at the <a href="http://www.microsoft.com/reader/find/category.aspx?mnr=FRE000010" target="_blank"><strong>University of Virginia</strong></a> and the <a href="http://www.microsoft.com/reader/find/category.aspx?mnr=FRE000040" target="_blank"><strong>University of Oregon</strong></a>. Between those two sites, there is a large number of works available for download.<br />
<strong><a href="http://mises.org/literature.aspx?action=subject&Id=117" target="_blank">Mises Institute</a></strong> Several hundred books, mostly on economics (and from a libertarian point of view) available for download as pdf. Some unique entries here. Suggested by poster, Bill Starr.<br />
<strong><a href="http://www.grtbooks.com/exitfram.asp?idx=0&yr=-5000&aa=AA&at=AA&ref=links&URL=http://classics.mit.edu/" target="_blank">MIT Internet Classics Archive</a></strong> - Over 400 works of classical literature available for download.<br />
<strong><a href="http://ocw.mit.edu/OcwWeb/web/courses/courses/index.htm#SloanSchoolofManagement" target="_blank">MIT OpenCourseWare</a></strong> offers a large selection of business courses in its Sloan School of Management section.<br />
<strong><a href="http://www.mobileread.com/forums/forumdisplay.php?f=126" target="_blank">MobileRead</a></strong> - Forum listing thousands of free ebooks.<br />
<strong><a href="http://www.mobipocket.com/freebooks/default.aspx" target="_blank">MobiPocket </a></strong>over 10,000 works, in a variety of categories, available for download in MOBI.<br />
<strong><a href="http://www.molwick.com/en/ebooks/index.html" target="_blank">Molwick</a></strong> Small collection of scientific and educational books available for download in pdf<br />
<strong><a href="http://www.munseys.com/site/home" target="_blank">Munsey's</a></strong> - Over 18,000 ebooks available in a variety of formats<br />
<a href="http://www.musicaltales.com/" target="_blank"><strong>MusicalTales</strong></a> offers "Helena and the Orchestra of the World of Mist" as a download in text, video, soundtrack or audiobook.<br />
<strong><a href="http://www.myromancestory.com/fstory/fs_main_login.php" target="_blank">MyRomanceStory</a></strong> offers 2 free romance novellas daily. Registration is required.<br />
<strong><a href="http://www.nancyskitchen.com/free_cookbooks.htm" target="_blank">Nancy'sKitchen</a></strong> has a nice size collection of small cookbooks available for free download in pdf.<br />
<strong><a href="http://netlibrary.net/WorldHome.html" target="_blank">NetLibrary</a></strong> - Small selection of free. But annual membership is only $8.95 for over 500,000 works.<br />
<strong><a href="http://newfreebooks.com/" target="_blank">NewFreeBooks</a></strong> has links to free ebooks covered by copyright, but still available legally (most times direct from the author's site. Excellent source for newer works.<br />
<strong><a href="http://www.nightowlromance.com/nightowlromance/FreeReads/FreeReads.aspx" target="_blank">NightOwlRomance</a></strong> has 6 interesting romance novels available for download in pdf.<br />
<strong><a href="http://www.onlinebooks4free.com/" target="_blank">OnlineBooks4free</a></strong> large collection of links to other sites for online viewing or download. Nicely categorized.<br />
<strong><a href="http://onlinebooks.library.upenn.edu/" target="_blank">Online Books Page</a></strong> from the University of Pennsylvania is a listing of over 30,000 free books on the web. Mostly this references to other sites, but they do have the Gutenberg listings available for download as well as some interesting special exhibits.<br />
<strong><a href="http://www.onlinecomputerbooks.com/" target="_blank">OnlineComputerBooks</a></strong> - Good selection of free computer books.<br />
<strong><a href="http://www.onlinefreeebooks.net/" target="_blank">OnlineFreeeBooks</a></strong> - links to various ebooks (mostly pdf) in 9 categories<br />
<strong><a href="http://oll.libertyfund.org/index.php?option=com_frontpage&Itemid=149" target="_blank">Online Library of Liberty</a></strong> hosts over an interesting collection of over 1,100 books available for online viewing and also for download.<br />
<strong><a href="http://onlinesapiens.com/books.html" target="_blank">OnlineSapiens</a></strong> has a small collection for online viewing, but a few unique entries worth a look.<br />
<strong><a href="http://ota.ahds.ac.uk/" target="_blank">OxfordTextArchive</a></strong> - Over 2,000 classical texts downloadable as ASCII or DOC<br />
<strong><a href="http://www.pagebypagebooks.com/title.html" target="_blank">PagebyPage</a></strong> a few hundred works available for online viewing.<br />
<strong><a href="http://www.palaceofamino.com/free-novels-bounty-hunters.htm" target="_blank">PalaceofAmino</a></strong> has the 9 book "Bounty Hunter" series available for free download in pdf.<br />
<strong><a href="http://www.paytonlee.com/Free.htm" target="_blank">Payton Lee</a></strong> offers 17 of her romance works and several short stories for download in pdf. The downloads are at LuLu, which supposedly requires registration to download, but I was able to download and did not have to register.<br />
<strong><a href="http://pdfbooks.co.za/" target="_blank">PDFBooks</a></strong> - 4,700 pdf ebooks<br />
<strong><a href="http://pdfreebooks.org/" target="_blank">PDFFreeBooks</a></strong> Small collection of children's books and two rare books on Syriac grammar and Arabic-English lexicon. Available for download in PDF or DJVU.<br />
<a href="http://digital.library.upenn.edu/" target="_blank"><strong>PennLibraries</strong></a> has several special collections for online viewing, including a <a href="http://digital.library.upenn.edu/women/" target="_blank"><strong>Celebration of Women Writers</strong></a> and the <a href="http://verity.library.upenn.edu/search97cgi/s97_cgi?action=filtersearch&collection=ebooks&access_type=penn&ResultTemplate=ebooks/results.hts&ResultMaxDocs=-1&filter=ebooks/browse_title_filter.hts&ebooksQueryType=title&SortField=titles2sort&query=a" target="_blank"><strong>verity.library.upenn.edu/search97cgi/s97_cgi</strong></a><br />
<strong><a href="http://www.perseus.tufts.edu/" target="_blank">PerseusDigitalLibrary</a></strong> - A large collection of classical texts broken down to time period written.<br />
<strong><a href="http://www.planetebook.com/" target="_blank">PlaneteBook</a></strong> - Free classical literature<br />
<strong><a href="http://www.planetpdf.com/free_pdf_ebooks.asp?CurrentPage=1" target="_blank">PlanetPDFeBooks</a></strong> - Small collection of classical works.<br />
<strong><a href="http://appsapps.com/ebooks/" target="_blank">ProgrammingeBooks</a></strong> has a very nice collection of downloads and links for a wide variety of programming languages.<br />
<strong><a href="http://gutenberg.net.au/pgaus.html" target="_blank">Project Gutenberg Australia</a></strong> over 1600 novels and an assortment of other works available in varying ways, including test, pdf and online viewing<br />
<a href="http://psychclassics.yorku.ca/" target="_blank"><strong>PsychClassics</strong></a> has 25 books on site for reading, links to 200 other books and about 200 articles all classic works in the field of Psychology.<br />
<strong><a href="http://www.publicbookshelf.com/#browse-cats" target="_blank">PublicBookShelf</a></strong> around 150 books in varying categories for online viewing.<br />
<strong><a href="http://publicliterature.org/" target="_blank">PublicLiterature</a></strong> Has some unique public domain novels among its <strong><a href="http://publicliterature.org/2007/08/11/online_books/" target="_blank">classic collection</a></strong> of around 100 books. Also has a large selection of writings submitted by authors which are free and legal to download, but not to distribute. All are available for online viewing and download in several formats.<br />
<strong><a href="http://www.ncbi.nlm.nih.gov/sites/entrez?db=books" target="_blank">PubMed Bookshelf</a></strong> is an engine which lets you search for books containing keywords of your choice and then browse them.<br />
<strong><a href="http://www.ncbi.nlm.nih.gov/sites/entrez?db=PMC&itool=toolbar" target="_blank">PubMed Central</a></strong> This search engine covers all the open-access articles [rather than books] available on PubMed, the National Library of Medicine's main scientific portal (where you can also find abstracts from many restricted-access articles).<br />
<strong><a href="http://www.epuzzled.net/" name="puzzled" target="_blank">PuzzlEd</a></strong> is not a book site, but has links to sites offering free books (which will be incorporated here when I have time) and a collection of jigsaw and other puzzles and other activities for children.<br />
<strong><a href="http://www.questia.com/publicdomainindex" target="_blank">Questia Online Library</a></strong> offers over 5,000 classic and rare works for free online viewing<br />
<strong><a href="http://food.quickfound.net/" target="_blank">QuickFound</a></strong> has links to many and varied free online cookbooks for viewing and for download in pdf. Definitely worth checking out.<br />
<strong><a href="http://www.qvadis.com/exlibris/ebooks.html#library" target="_blank">Qvadis</a></strong> hosts over 6,000 free titles available in Palm Database (.pdb) format.<br />
<strong><a href="http://www.ralphrobertmoore.com/books.html#fatfig" target="_blank">RalphRobertMoore</a></strong> offers his work, Father Figure, for free download in pdf.<br />
<strong><a href="http://randomstatic.net/newtonssleep.php" target="_blank">RandomStatic</a></strong> offers Newton's Sleep, a novel published in 2008, for free download in pdf or html.<br />
<strong><a href="http://www.readbookonline.net/" target="_blank">ReadBookOnline</a></strong> has a nice collection of classics available for online viewing.<br />
<strong><a href="http://www.readeasily.com/" target="_blank">ReadEasily</a></strong> - Small collection of works that has option for larger print. HTML only.<br />
<strong><a href="http://www.readprint.com/" target="_blank">ReadPrint</a></strong> - Thousands of books, poems and short stories.<br />
<strong><a href="http://www.readtheselips.com/index.html" target="_blank">ReadTheseLips</a></strong> short fiction, poetry and other writings especially for and about lesbians.<br />
<strong><a href="http://www.realtimepublishers.com/" target="_blank">RealTime</a></strong> - Free media for IT professionals<br />
<strong><a href="http://www.rif.org/kids/readingplanet.htm" target="_blank">RIF Reading Planet</a></strong> has an interesting collection of books for online viewing that changes monthly. Also has activities and games as well as Asian/Pacific, Caribbean, Hispanic and native American sections with books and activities.<br />
<a href="http://www.hawaii.edu/powerkills/NH.HTM" target="_blank"><strong>RJRummel</strong></a> offers his six book "Never Again" series for free download in pdf.<br />
<strong>RobertBurtonRobinson</strong> offers a number of free books and short stories for <strong><a href="http://www.robertburtonrobinson.com/" target="_blank">free online viewing</a></strong> and for <strong><a href="http://www.robertburtonrobinson.com/free-ebooks-downloads/" target="_blank">free download in pdf.</a></strong><br />
<strong><a href="http://www.techsupportalert.com/content/free-downloadble-332-page-guide-building-web-sites.htm" target="_blank">RobertSchifreen</a></strong> has made his new book "The Web Book", which covers everything involved in setting up a website available exclusively to visitors here at Gizmo's.<br />
<strong><a href="http://www.rodcockle.com/" target="_blank">RodCockle </a></strong>offers a nice collection of illustrated books for online viewing, as well as games and puzzles for 4-8 year olds. Suggested by Cathy of <strong><a href="http://www.techsupportalert.com/content/50-places-free-books-online.htm#puzzled">PuzzlEd. </a></strong><br />
<a href="http://members.shaw.ca/rolfwitzsche/novels/index.html" target="_blank"><strong>Rolf A.F. Witzsche</strong></a> offers 14 of his novels for online viewing, download in pdf or as audio books in MP3/M4B. 12 of the novels are part of his "The Lodging of the Rose" series.<br />
<strong><a href="http://www.free-ebook-online.com/" target="_blank">RomanceCorner</a></strong> offers quite a few short works for online reading. They look to be adult oriented works.<br />
<strong><a href="http://www.romancenovel.tv/2009/05/20/free-reads/" target="_blank">RomanceNovelTV</a></strong> lists 7 romance novels available for free Kindle download at Amazon.<br />
<strong><a href="http://www.romantic4ever.com/index.html" target="_blank">Romantic4Eve</a></strong>r offers 2 free ebooks by author, Joan Reeves, as well as some short story romance fiction for reading online.<br />
<strong><a href="http://www.romanticmarriagestories.com/" target="_blank">RomanticMarriageStories</a></strong> features romance works about married life. These short stories present a high view of marriage and portray the fun a romantic couple can have in a happy and sexy marriage.<br />
<strong><a href="http://www.rtis.com/reg/roundtop/sunrise1.htm" target="_blank">RoundTopRegister</a></strong> has the romantic novel, Children of the Sunrise, available for online reading.<br />
<a href="http://samizdat.mines.edu/" target="_blank"><strong>SamizdatPress</strong></a> has a small collection of science and math works and links to other works. Their focus is on "material of a pedagogical nature".<br />
<strong><a href="http://www.reinkefreereads.blogspot.com/index.html" target="_blank">Sarah Reinke</a> </strong>has made several of her romance novels, and some non-romance novels, available for download in pdf. These are for mature audiences and you must be over 18 years of age to download.<br />
<strong><a href="http://www.scholastic.com/clifford/read/index.htm" target="_blank">Scholastic</a></strong> Small collection of children's books available for online viewing (or read to you). Featuring Clifford the Big Red Dog.<br />
<strong><a href="http://minibooks.scholastic.com/minibooks/home/" target="_blank">Scholastic Mini-books</a></strong> has a good selection of stories available to read or print, many of which are free. Suggested by Cathy of <strong><a href="http://www.techsupportalert.com/content/50-places-free-books-online.htm#puzzled">PuzzlEd. </a></strong><br />
<a href="http://www.sciencebooksonline.info/computer-science.html" target="_blank"><strong>ScienceBooksOnline</strong></a> has a large listing of links to computer science books available for download in its computer science category. Since these links are off site, download options vary, but most seemed to be in pdf.<br />
<strong><a href="http://www.sciencefictionandfantasy.co.uk/free-books-to-download.htm" target="_blank">ScienceFictionandFantasy</a></strong> has a small listing of public domain works available for download in text or html. Most can be found elsewhere, but there are a few unique entries.<br />
<strong><a href="http://www.scifimatter.com/index.php?action=displaycat&catid=73" target="_blank">Scifimatter</a></strong> has a nice listing of free sci fi books available on the internet. Some are already listed here, but there are quite a few unique entries.<br />
<strong><a href="http://www.sebastianswan.org.uk/index.html" target="_blank">SebastianSwan</a></strong> a collection of Sebastian Swan stories for online viewing.<br />
<strong><a href="http://www.sabrizain.org/malaya/library/index2.html" target="_blank">SejarahMelayuLibrary</a></strong> <span style="font-family: arial;"><span style="font-size: x-small;">is perhaps the largest public on-line collection of books and other documents on the history of the Malay archipelago and its surrounding region. It consists of over 700 books and academic papers in electronic PDF format.</span></span><br />
<a href="http://www.shakespeare-online.com/plays/"><strong><span style="font-family: arial;"><span style="font-size: x-small;">Shakespeare's Plays</span></span></strong></a><span style="font-family: arial;"><span style="font-size: x-small;"> <img alt="New!" src="http://www.techsupportalert.com/files/images/srk-new.jpg" />The complete texts of Shakespeare plays with explanatory notes, from your trusted Shakespeare source. Suggested by Sea Mac. </span></span><br />
<strong><a href="http://www.sillybooks.net/page_two.htm" target="_blank">SillyBooks</a></strong> has a number of free books available for online reading. There are also puzzles, games and contests.<br />
<strong><a href="http://www.sloanstjames.com/Site/Welcome.html" target="_blank">Sloan St.James</a></strong> has made 4 of her romance novels, <span style="font-size: x-small;">including THE DARK PLAIN, an RWA award winning novel,</span> available for download in pdf.<br />
<strong><a href="http://www.snipfiles.com/" target="_blank">SnipFiles</a></strong> - Small collection of free ebooks and software.<br />
<a href="http://www.sparknotes.com/"><strong>SparkNotes</strong></a>: <img alt="New!" src="http://www.techsupportalert.com/files/images/srk-new.jpg" /> Has today's Most Popular Study Guides for High School and Jr High students. Suggested by an anonymous poster.<br />
<strong><a href="http://www.specficworld.com/downloads.aspx" target="_blank">specficworld</a></strong> has a small collection of free sci fi books available for download in pdf. Mostly short story collections.<br />
<strong><a href="http://www.starfall.com/" target="_blank">Starfall</a></strong> nice little collection of works to help children learn to read<br />
<strong><a href="http://www.starry.com/free-online-novels/index.htm" target="_blank">Starry FreeOnlineNovels</a></strong> small collection, but some interesting entries, available for online viewing.<br />
<strong><a href="http://www.stiltjack.co.uk/" target="_blank">Stiljack</a></strong> offers a free complete crime novel of Martin Cooper along with 5 short stories and also has a few other authors short stories. Aspiring writers are encouraged to have their books posted there.<br />
<strong><a href="http://storiesrus.com/ROMANTICVENTURE.html" target="_blank">StoriesRUs</a></strong> has the romantic novel "Romantic Venture" available for online reading.<br />
<strong><a href="http://www.storyplace.org/eel/other.asp" target="_blank">StoryPlace Elementary</a></strong> has six stories and related activities for online viewing geared for elementary school age children.<br />
<strong><a href="http://www.storyplace.org/preschool/other.asp" target="_blank">StoryPlace PreSchool</a></strong> has a nice collection of books and activities designed for pre-schoolers available for online viewing.<br />
<strong><a href="http://www.suvudu.com/freelibrary/" target="_blank">Suvudu</a></strong> offers the first book in some of their acclaimed sci fi series for free download. Interesting entries.<br />
<strong><a href="http://www.tampareads.com/books-ol/index-ol.htm" target="_blank">TampaReads</a></strong> offers 3 first grade books for online reading.<br />
<strong><a href="http://www.techbooksforfree.com/" target="_blank">TechBooksforFree</a></strong> offers a wide range of free programming and computer books divided into nine main categories.<br />
<strong><a href="http://www.techtoolblog.com/archives/195-free-online-programming-books" target="_blank">TechToolBlog</a></strong> Links to 345 online programing books<br />
<a href="http://www.online-literature.com/george_bernard_shaw/"><strong>The Biography and Works of George Bernard Shaw</strong></a> <img alt="New!" src="http://www.techsupportalert.com/files/images/srk-new.jpg" /> Online Literature dot com has The Biography and Works of George Bernard Shaw. Suggested by Sea Mac.<br />
<a href="http://www.online-literature.com/tolstoy/"><strong>The Biography and Works of Leo Tolstoy</strong></a> <img alt="New!" src="http://www.techsupportalert.com/files/images/srk-new.jpg" /> Online Literature dot com has The Biography and Works of Leo Tolstoy. Suggested by Sea Mac.<br />
<a href="http://www.mtwain.com/"><strong>The Complete works of Mark Twain</strong></a> <img alt="New!" src="http://www.techsupportalert.com/files/images/srk-new.jpg" /> The Complete works of Mark Twain, Biography, Quotes over at mtwain.com. This site contains *almost all* of Mark Twain's works. Suggested by Sea Mac.<br />
<strong><a href="http://shakespeare.mit.edu/works.html">The Complete Works of William Shakespeare</a> </strong><img alt="New!" src="http://www.techsupportalert.com/files/images/srk-new.jpg" /> is the Web's first edition of the Complete Works of William Shakespeare. This site has offered Shakespeare's plays and poetry to the Internet community since 1993. Suggested by Sea Mac.<br />
<strong><a href="http://www.thefreelibrary.com/literature.aspx" target="_blank">TheFreeLibrary</a></strong> has a large collection of free classic books sorted by author and searchable by author, title or keyword. There is also a small biography of every author along with the listing of that author's works on the site. The site claims to have over 5 million works. Online viewing only.<br />
<a href="http://www.dickens-online.info/"><strong>The Works and Life of Charles Dickens</strong></a> <img alt="New!" src="http://www.techsupportalert.com/files/images/srk-new.jpg" />Charles Dickens online, a website dedicated to one of the most prolific and esteemed English writers, generally considered the greatest novelist of the Victorian era. Suggested by Sea Mac. <br />
<strong><a href="http://www.tikiri.com/e-kathandara.html" target="_blank">Tikiri</a></strong> has a nice collection of Sri Lankan stories available in English and Sinhalese available as pdf.<br />
<strong><a href="http://www.toddlerschool.net/" target="_blank">ToddlerSchool</a></strong> has a small collection of illustrated books to read and listen to online. Also has educational games for younger children. Suggested by Sefi.<br />
<strong><a href="http://www.topmystery.com/online_books.htm" target="_blank">TopMystery</a></strong> A good amount of each of the few mystery authors listed are available for online viewing or download<br />
<strong><a href="http://www.tor.com/index.php?option=com_content&view=stories" target="_blank">Tor.com</a></strong> has a good number of Science Fiction & Fantasy stories available for download in pdf, mobi pocket, html or ePub. Also available for listening or download as MP3.<br />
<strong><a href="http://www.trinitymoon.com/Articles-Book-Catalog.html" target="_blank">TrinityMoon</a></strong> a small collection of novels and short stories for online reading.<br />
<strong><a href="http://www.vitalita.com/vcg/cookbooks/" target="_blank">Vitalita</a></strong> The Vitalita Culinary Group is offering two free vegan cookbooks for download in text. A Taste of Vitality and Desserts of Vitality include pictures of the finished dishes.<br />
<strong><a href="http://www.webliterature.net/" target="_blank">Web Literature</a></strong> has 6500+ works of over 350 authors available for online viewing. A nice feature is that they try to display the full works of the listed authors<br />
<strong><a href="http://www.witguides.com/" target="_blank">WitGuides</a></strong> - Small collection of free ebooks in a variety of categories.<br />
<strong><a href="http://www.wordiq.com/books/index.php/" target="_blank">WordIQ</a></strong> Nice collection of over 10,000 books available for online viewing. There are some unusual entries here, but hard to find unless looking for specific title or author.<br />
<strong><a href="http://worldoftales.com/" target="_blank">WorldofTales</a></strong> a collection of folktales, fairy tales and fables from around the world available for online viewing.<br />
<strong><a href="http://www.worldwideschool.org/library/catalogs/bysubject-top.html" target="_blank">WorldWideSchool</a></strong> has a fairly large collection of free books spread across 12 categories, with numerous sub-categories. Search by author name and title also available. Available for online viewing.<br />
<strong><a href="http://www.wowio.com/" target="_blank">Wowio</a></strong> - Good size collection of novels and also comic books.<br />
<strong><a href="http://www.zbooc.com/" target="_blank">Zbooc</a></strong> has a large collection of books, tutorials and how to guides for download in pdf. A free site, but registration is required. Suggested by Glenn.<br />
<br />
<h2><a href="" name="libraries"></a>Libraries</h2>On the advice of anonymous poster that most public library systems offer free ebooks, audiobooks, and music downloads to their customers for free, I did some checking and found that there are a large amount of offerings available through online libraries. It appears most, if not all, require a local library card. These are sites that have links to local library sites.<br />
<strong><a href="http://lists.webjunction.org/libweb/" target="_blank">LibWeb</a></strong> is a good search source for local libraries online. A good selection of US and worldwide locations.<br />
<strong><a href="http://www.publiclibraries.com/" target="_blank">Public Libraries</a></strong> very good for US, looked not as thorough as LibWeb on worldwide.<br />
<strong><a href="http://www.ipl.org/div/subject/browse/hum45.70.00/" target="_blank">Internet Public Library</a></strong> also has some links, but I found the above two to be superior set ups.<br />
<h2> </h2><h2><a href="" name="genre_pages"></a>Genre Pages</h2><br />
Because this page is becoming extremely long I have switched the genre sections to their own pages. Please check these separate pages out if you are interested in a particular genre as they have some links that have not been added to this main list as of yet and they also have links to audio books.<br />
<ul><li> <strong><a href="http://www.techsupportalert.com/free-books-children" target="_blank">Free Children's Books Online</a></strong><br />
</li>
<li> <strong><a href="http://www.techsupportalert.com/free-books-science-fiction-fantasy" target="_blank">Free Science Fiction & Fantasy Books Online</a></strong><br />
</li>
<li> <strong><a href="http://www.techsupportalert.com/free-books-horror-ghosts-gothic" target="_blank">Free Horror, Ghost & Gothic Books Online</a></strong><br />
</li>
<li> <strong><a href="http://www.techsupportalert.com/free-books-romance" target="_blank">Free Romance Books Online</a></strong><br />
</li>
<li> <strong><a href="http://www.techsupportalert.com/free-books-computer" target="_blank">Free Computer & Internet Books Online</a></strong><br />
</li>
<li> <strong><a href="http://www.techsupportalert.com/free-books-mystery" target="_blank">Free Mystery, Detective, Thriller & Crime (Fiction) Books Online</a></strong><br />
</li>
<li> <strong><a href="http://www.techsupportalert.com/free-books-westerns" target="_blank">Free "Westerns" Books Online</a></strong><br />
</li>
<li> <strong><a href="http://www.techsupportalert.com/free-books-cooking" target="_blank">Free Cooking, Food & Wine Books Online</a></strong><br />
</li>
<li> <strong><a href="http://www.techsupportalert.com/free-books-religion" target="_blank">Free Religion & Spirituality Books Online</a></strong><br />
</li>
<li> <strong><a href="http://www.techsupportalert.com/free-books-health-fitness" target="_blank">Free Health, Fitness & Medicine Books Online</a></strong><br />
</li>
<li> <strong><a href="http://www.techsupportalert.com/free-books-biography" target="_blank">Free Biography, Autobiography & Memoir Books Online</a></strong><br />
</li>
<li> <strong><a href="http://www.techsupportalert.com/free-books-travel" target="_blank">Free Travel Books Online</a></strong><br />
</li>
<li> <strong><a href="http://www.techsupportalert.com/free-books-history" target="_blank">Free History Books Online</a></strong><br />
</li>
<li> <strong><a href="http://www.techsupportalert.com/free-books-business" target="_blank">Free Business Books Online</a></strong><br />
</li>
</ul>Surenhttp://www.blogger.com/profile/09789784724534128579noreply@blogger.com0tag:blogger.com,1999:blog-5123376846625329520.post-57116508246805542972010-09-07T22:00:00.000+05:302010-09-07T22:00:47.485+05:30<h1 class="title">Tips and Tricks for Ubuntu after Installation</h1><div class="meta"> <span class="submitted"><br />
<a href="http://www.techsupportalert.com/users/jojoyee" title="View user
profile."></a></span> </div><span class="print-link"></span> <a href="" name="article-top"></a><br />
<div class="header1">Introduction</div><img align="right" alt="Ubuntu" height="53" hspace="8" src="http://www.techsupportalert.com/files/images/Ubuntu-Logo-200-53.png" title="Ubuntu" width="200" /><a href="http://www.ubuntu.com/" target="_blank">Ubuntu</a> is a free operating system or a Linux distribution ("distro") which receives the highest hits on <a href="http://distrowatch.com/stats.php?section=popularity" target="_blank">DistroWatch</a> and has been selected by readers of <a href="http://www.desktoplinux.com/cgi-bin/survey/survey.cgi?view=archive" target="_blank">DesktopLinux</a> as the most popular distro. It also gets the highest number of votes in <a href="http://www.techsupportalert.com/freeware-forum/linux/poll-16-a.html" target="_blank">Poll Results</a> on Gizmo's Freeware Forum.<br />
If you have the latest version of Ubuntu 10.04 installed in your PC, you might find these tips and tricks useful for working with the system<br />
<br />
Customize the Panel <br />
Ubuntu includes a top panel and a bottom panel by default. If you prefer to keep only one panel at the bottom just like the Windows Taskbar, then these are the steps to follow:<br />
<ol><li><a href="http://www.techsupportalert.com/files/images/Ubuntu_10_04_full.jpg" target="_blank"><img align="right" alt="Ubuntu Desktop" height="125" hspace="8" src="http://www.techsupportalert.com/files/images/Ubuntu_10_04_200-125.jpg" title="Ubuntu Desktop" width="200" /></a>Delete the bottom panel: right-click over it and click "Delete This Panel".</li>
<li>Move the top panel to bottom: right-click over it, select "Properties" and change Orientation from "Top" to "Bottom".</li>
<li>Add running program buttons: right-click the panel, select "Add to Panel", scroll down and select "Window List", click "Add".</li>
<li>Replace the Menu Bar ("Applications-Places-System") with the "Main Menu" to save space in the panel:<br />
<ol type="a"><li>Right-click the "Menu Bar" and select "Remove From Panel".</li>
<li>Right-click the panel, select "Add to Panel" and choose "Main Menu", click "Add".</li>
<li>Right-click the items (Firefox, etc) and untick "Lock to Panel".</li>
<li>Right-click the added "Main Menu", select "Move" to relocate it to the far left.</li>
</ol></li>
</ol>These are basic changes. The panels are much more flexible than the Windows Taskbar in that many items in the panels can be easily added, removed or configured.<br />
<i>Note: If you need to restore the panels to the original state, enter the following commands into the Terminal and re-start the system:</i><br />
<ol><li><span style="color: blue;">sudo gconftool-2 --shutdown</span></li>
<li><span style="color: blue;">sudo rm -rf .gconf/apps/panel</span></li>
<li><span style="color: blue;">sudo pkill gnome-panel</span></li>
</ol><br />
<div class="header2"><img alt="" height="18" src="http://www.techsupportalert.com/files/images/Ubuntu-18-18.png" width="18" /> <a href="" name="Set-Full-Transparent-Panel"></a>Set Full Transparent Panel</div>When you set the panel to be transparent in the default Ambiance theme in Ubuntu 10.04, you will find that some panel items' backgrounds are not transparent, but you can make them transparent and consistent with others, following these steps:<br />
<ol><li><img align="right" alt="Ubuntu Desktop" height="70" hspace="8" src="http://www.techsupportalert.com/files/images/Panel-200-70-NT.png" title="Ubuntu Desktop" width="200" />Go to Applications (or Main Menu) > Accessories > Terminal.</li>
<li>Enter <span style="color: blue;">cp -R /usr/share/themes/Ambiance ~/.themes/</span></li>
<li>Enter <span style="color: blue;">gedit ~/.themes/Ambiance/gtk-2.0/gtkrc</span> to open Ambiance's ftkrc file with gedit.</li>
<li>Search for this line <span style="color: blue;">bg_pixmap[NORMAL] = "panel_bg.png"</span></li>
<li><img align="right" alt="Ubuntu Desktop" height="70" hspace="8" src="http://www.techsupportalert.com/files/images/Panel-200-70-T.png" title="Ubuntu Desktop" width="200" />Comment out the line by placing a # at the beginning of the line, like this: <span style="color: blue;"># bg_pixmap[NORMAL] = "panel_bg.png"</span></li>
<li>Save the gtkrc file.</li>
<li>Go to System > Preferences > Appearance, switch to the other theme and then back to the Ambiance theme.</li>
</ol>Note: If you'd like to change to the Radiance theme, replace Ambiance with Radiance in the above command lines, but you'd like to change to the New Wave theme, then enter <span style="color: blue;">cp -R /usr/share/themes/"New Wave" ~/.themes/</span> in step 2, enter <span style="color: blue;">gedit ~/.themes/"New Wave"/gtk-2.0/gtkrc</span> in step 3, search for and comment out this line <span style="color: blue;">bg_pixmap[NORMAL] = "Images/Panel/PanelBarLong.png"</span> in steps 4 and 5 respectively.<br />
<br />
<div class="header2"><img alt="" height="18" src="http://www.techsupportalert.com/files/images/Ubuntu-18-18.png" width="18" /> <a href="" name="Customize-Theme"></a>Customize the Theme</div>Themes in Ubuntu can be customized to match the applications or suit your needs. I once tried the "New Wave" theme and the menu (File, Edit, View, etc) was hardly visible on the dark background in OpenOffice. These are easy steps to customize a theme, for example, "New Wave" so that the menu can be more visible in OpenOffice.<br />
<ol><li><a href="http://www.techsupportalert.com/files/images/New-Wave-with-Ambiance-Control.gif" target="_blank"><img align="right" alt="Customize the Theme" height="147" hspace="8" src="http://www.techsupportalert.com/files/images/New-Wave-with-Ambiance-Control-200-147.gif" title="Customize the Theme" width="200" /></a>Go To System > Preferences > Appearance.</li>
<li>Under the "Theme" tab, click the "Customize" button while the "New Wave" theme is selected.</li>
<li>Under the "Controls" tab, click any other control item such as "Ambiance" and click the "Close" button.</li>
<li>Now it becomes your Custom theme and you can save it as a new theme, such as "New Wave with Ambiance Controls".</li>
</ol>The menu should now be clearly visible in OpenOffice in this new theme (See the lower section in the screenshot).<br />
<br />
<div class="header2"><img alt="" height="18" src="http://www.techsupportalert.com/files/images/Ubuntu-18-18.png" width="18" /> <a href="" name="Set-Aero-Glass-Effect"></a>Set Aero Glass Effect</div>In Ubuntu you can set nearly the same aero glass effect to window borders with alpha transparency as available in Windows 7.<br />
<ol><li><img align="right" alt="Aero Glass Effect" height="151" hspace="8" src="http://www.techsupportalert.com/files/images/Aero-Glass-Effect-200-151.png" title="Aero Glass Effect" width="200" />Press Alt-F2 to bring up "Run Application" window.</li>
<li>Type <span style="color: blue;">gconf-editor</span> into the box, click "Run" to bring up Configuration Editor.</li>
<li>Browse to apps > gwd, look for "metacity_theme_active_opacity" on the right panel.</li>
<li>Change the value in "metacity_theme_active_opacity" from <span style="color: blue;">1</span> to <span style="color: blue;">0.75</span> (or smaller such as <span style="color: blue;">0.5</span> for more transparency).</li>
<li>Then go to System > Preferences > <a href="http://www.techsupportalert.com/content/ubuntu-tips-and-tricks.htm#ccsm">CompizConfig Settings Manager</a></li>
<li>Select "Effects" from the left panel.</li>
<li>Tick "Blur Windows" and click the "Close" button. (Note: default values in Blur Windows can be applied.)</li>
</ol><br />
<div class="header2"><img alt="" height="18" src="http://www.techsupportalert.com/files/images/Ubuntu-18-18.png" width="18" /> <a href="" name="Pin-Programs-to-the-Panel"></a>Pin Programs to the Panel</div>Frequently used programs can be easily pinned to the panel.<br />
<ol><li>Browse to the program from "Applications" or "Main Menu".</li>
<li>Drag and drop the program to an empty space in the panel, or right-click the program and select "Add this launcher to panel".</li>
<li>Right click the program icon, select "Move" and drop it to a new place in the panel.</li>
<li>Right click the program icon and select "Lock to Panel".</li>
</ol>See also "<a href="http://www.techsupportalert.com/content/ubuntu-tips-and-tricks.htm#Enable-Windows-7-Superbar">Enable Windows 7 Superbar</a>".<br />
<br />
<div class="header2"><img alt="" height="18" src="http://www.techsupportalert.com/files/images/Ubuntu-18-18.png" width="18" /> <a href="" name="Hide-Drive-Icons-on-the-Desktop"></a>Hide Drive Icons on the Desktop</div>Ubuntu adds an icon to the desktop for every removable drive that you attach to your system. The icons can be hidden by these steps:<br />
<ol><li>Press Alt-F2 to bring up "Run Application" window.</li>
<li>Type <span style="color: blue;">gconf-editor</span> into the box, click "Run" to bring up Configuration Editor.</li>
<li>Browse to apps > nautilus > desktop.</li>
<li>Untick "volumes_visible" and close the window.</li>
</ol>The drive icons would then disappear from the desktop. Remember that you can always access the drives from "Places".<br />
<br />
<div class="header2"><img alt="" height="18" src="http://www.techsupportalert.com/files/images/Ubuntu-18-18.png" width="18" /> <a href="" name="Move-Close-buttons-to-Right"></a>Move Window Control Buttons to the Right</div>Ubuntu 10.04 sets the Minimize, Maximize and Close buttons to the left in a window. If you prefer to change them to the right, follow these simple steps:<br />
<ol><li><img align="right" alt="Move buttons to right" height="145" hspace="8" src="http://www.techsupportalert.com/files/images/Window-Buttons-200-145.gif" title="Move buttons to right" width="200" />Press Alt-F2 to bring up "Run Application" window.</li>
<li>Type <span style="color: blue;">gconf-editor</span> into the box, click "Run" to bring up Configuration Editor.</li>
<li>Browse to apps > metacity > general, look for "button_layout" on the right panel.</li>
<li>Change the value in the "button_layout" from <span style="color: blue;">close,minimize,maximize:</span> to <span style="color: blue;">menu:minimize,maximize,close</span> and press the Enter key.</li>
</ol><br />
<div class="header2"><img alt="" height="18" src="http://www.techsupportalert.com/files/images/Ubuntu-18-18.png" width="18" /> <a href="" name="Set-default-view-File-Browser"></a>Set a Default View in File Browser</div>Windows Explorer allows for users to set a default view to all folders. In almost the same way, Ubuntu's Nautilus File Browser allows for these settings:<br />
<ol><li><a href="http://www.techsupportalert.com/files/images/File-Management-Preferences.jpg" target="_blank"><img align="right" alt="Set File Browser" height="109" hspace="8" src="http://www.techsupportalert.com/files/images/File-Management-Preferences-200-109.jpg" title="Set File Browser" width="200" /></a>Go to "Places" and open a folder.</li>
<li>At the top of the File Browser, click "Edit" and "Preference".</li>
<li>Under Default View, change "Icon View" to "List View", to see more details in columns.</li>
<li>Tick "Show hidden and backup files" if that's your choice.</li>
</ol>Other various settings, such as single or double click to open items, icon captions, list columns, preview files and media handling can be done in the same window as well.<br />
<br />
<div class="header2"><img alt="" height="18" src="http://www.techsupportalert.com/files/images/Ubuntu-18-18.png" width="18" /> <a href="" name="Open-Up-a-Program-Window-in-Center"></a>Open Up a Window in Center</div>When running an application without maximized, Ubuntu always puts it in the left-top corner of the desktop by default, but you are allowed to set a program window to open up in the center of the desktop area.<br />
<ol><li><a href="http://www.techsupportalert.com/files/images/CCSM-Place-Windows.jpg" target="_blank"><img align="right" alt="CompizConfig Settings Manager" height="123" hspace="8" src="http://www.techsupportalert.com/files/images/CCSM-Place-Windows-200-123.jpg" title="CompizConfig Settings
Manager" width="200" /></a>Go to System > Preferences > <a href="http://www.techsupportalert.com/content/ubuntu-tips-and-tricks.htm#ccsm">CompizConfig Settings Manager</a></li>
<li>Select "Windows Management" from the left panel.</li>
<li>Click "Place Windows".</li>
<li>Change Placement Mode from "Smart" to "Centered", click "Back" and "Close".</li>
</ol>Ideally, the window manager in Ubuntu should restore the last known position of an application window, but it does not do that unless an application remembers its own window position. (See <a href="https://bugs.launchpad.net/hundredpapercuts/+bug/391533">reported bugs</a>)<br />
<br />
<div class="header2"><img alt="" height="18" src="http://www.techsupportalert.com/files/images/Ubuntu-18-18.png" width="18" /> <a href="" name="Enable-Rotate-Cube-Effect"></a>Enable "Rotate Cube" Effect</div>Ubuntu enables "Desktop Wall" by default. By holding Ctrl-Alt keys and pressing the left-arrow or right-arrow key each time, it slides through desktop workspaces horizontally for you to choose one to work on. Alternatively, you can change this to a "rotate cube" effect.<br />
<ol><li><a href="http://www.techsupportalert.com/files/images/Rotate-Cube.png" target="_blank"><img align="right" alt="Rotate Cube" height="125" hspace="8" src="http://www.techsupportalert.com/files/images/Rotate-Cube-200-125.png" title="Rotate Cube" width="200" /></a>Go To System > Preferences > <a href="http://www.techsupportalert.com/content/ubuntu-tips-and-tricks.htm#ccsm">CompizConfig Settings Manager</a></li>
<li>Select "Desktop" from the left panel.</li>
<li>Tick "Rotate Cube".</li>
<li>Select "Eable Desktop Cube" as this plugin is required by "Rotate Cube".</li>
<li>Select "Disable Desktop Wall".</li>
</ol>Immediately you can rotate your desktop workspaces in this way— holding down Ctrl-Alt keys, EITHER press the left-arrow or right-arrow key OR left-click the mouse and drag it to left or right.<br />
<br />
<div class="header2"><img alt="" height="18" src="http://www.techsupportalert.com/files/images/Ubuntu-18-18.png" width="18" /> <a href="" name="Enable-Windows-7-Superbar"></a>Enable Windows 7 Superbar</div>In Windows 7, frequently used programs can be pinned to the taskbar (hence called Superbar). Likewise, DockBarX, a Gnome panel plugin, can be added to Ubuntu to achieve almost the same effect to pin and unpin or launch the applications from the panel.<br />
<ol><li><img align="right" alt="DockBarX Applet" height="148" hspace="8" src="http://www.techsupportalert.com/files/images/DockBarX-200-148.gif" title="DockBarX Applet" width="200" />Go to Applications (or Main Menu) > Accessories > Terminal.</li>
<li>Enter <span style="color: blue;">wget https://launchpad.net/~dockbar-main/+archive/ppa/+files/dockbarx_0.30.0-0~ppa0_all.deb</span></li>
<li>Enter <span style="color: blue;">wget https://launchpad.net/~dockbar-main/+archive/ppa/+files/gnome-dockbarx-applet_0.30.0-0~ppa0_all.deb</span></li>
<li>Enter <span style="color: blue;">sudo dpkg -i *dockbarx*.deb</span></li>
<li>Enter <span style="color: blue;">sudo apt-get install -f</span></li>
<li>Log out then log into the system, right click the panel and click “Add to Panel”.</li>
<li>Select the DockBarX Applet and click "Add".</li>
</ol>Note: A thumbnail preview of a running program is a beta feature in DockBarX 0.30. To enable this feature, right-click the DockBarX item on the panel, select Properties, choose Advanced tab and tick "Show Previews".<br />
<br />
<div class="header2"><img alt="" height="18" src="http://www.techsupportalert.com/files/images/Ubuntu-18-18.png" width="18" /> <a href="" name="Enable-Windows-7-Aero-Snap"></a>Enable Windows 7 Aero Snap</div>In Windows 7, you can click and drag a window to the left or right edge of the desktop and it will fill half of the screen, or snap a window to the top edge of the desktop and it will be maximized.<br />
In Ubuntu 10.04, you can click and drag a window to the left, right or top edge of the desktop to achieve the same result.<br />
<ol><li>In addition to CompizConfig Settings Manager, install <span style="color: green;">WmCtrl</span> if not added.<br />
<ol type="a"><li>Go to Applications (or Main Menu) > Accessories > Terminal.</li>
<li>Enter <span style="color: blue;">sudo apt-get install wmctrl</span></li>
<li>Enter password when prompted.</li>
</ol></li>
<li>Go To System > Preferences > CompizConfig Settings Manager.</li>
<li>Select "General" from the left panel and click "Commands".</li>
<li>In Command line 0, 1 and 2, paste the following codes:<br />
<ol type="a"><li>Command line 0, paste <span style="color: blue;">WIDTH=`xdpyinfo | grep 'dimensions:' | cut -f 2 -d ':' | cut -f 1 -d 'x'` && HALF=$(($WIDTH/2)) && wmctrl -r :ACTIVE: -b add,maximized_vert && wmctrl -r :ACTIVE: -e 0,0,0,$HALF,-1</span></li>
<li>Command line 1, paste <span style="color: blue;">WIDTH=`xdpyinfo | grep 'dimensions:' | cut -f 2 -d ':' | cut -f 1 -d 'x'` && HALF=$(($WIDTH/2)) && wmctrl -r :ACTIVE: -b add,maximized_vert && wmctrl -r :ACTIVE: -e 0,$HALF,0,$HALF,-1</span></li>
<li>Command line 2, paste <span style="color: blue;">wmctrl -r :ACTIVE: -b add,maximized_vert,maximized_horz</span></li>
</ol></li>
<li>In the same window, click "Edge Bindings" tab.</li>
<li>Change Run Command 0, 1 and 2 from "None" to "Left", "Right" and "Top" respectively.</li>
<li>Click "Back" button and select "General Options", change "Edge Trigger Delay" to about 500.</li>
</ol><br />
<div class="header2"><img alt="" height="18" src="http://www.techsupportalert.com/files/images/Ubuntu-18-18.png" width="18" /> <a href="" name="Auto-Mount-Drives-at-System-Startup"></a>Auto Mount Drives at System Startup</div>Ubuntu is capable of reading and writing files stored on Windows formatted partitions, but partitions must be 'mounted' before they can be accessed each time you start up the system. With these steps, you can auto mount the drives without the need to manually mount them for access.<br />
<ol><li><a href="http://www.techsupportalert.com/files/images/Storage-Device-Manager.png" target="_blank"><img align="right" alt="Storage Device Manager" height="155" hspace="8" src="http://www.techsupportalert.com/files/images/Storage-Device-Manager-200-155.jpg" title="Storage Device Manager" width="200" /></a>Install <span style="color: green;">Storage Device Manager</span> if it has not been added.<br />
<ol type="a"><li>Go to Applications (or Main Menu) > Ubuntu Software Center.</li>
<li>Enter <span style="color: blue;">pysdm</span> in the Search Box.</li>
<li>Select Storage Device Manager, click the "Install" button.</li>
</ol></li>
<li>Go to System > Administration > Storage Device Manager, enter password.</li>
<li>Extend the list of sda and select the sda you want to auto mount, click 'OK' to configure.</li>
<li>Click the "Assistant" button.</li>
<li>Uncheck "Mount file system in read only mode" and keep "The file system is mounted at boot time" checked.</li>
<li>Click the "Mount", "Apply" then "Close" button, and restart the system.</li>
</ol>If you wish to remove the auto-mount of a certain drive, you can similarly use Storage Device Manager to do the setting.<br />
<br />
<div class="header2"><img alt="" height="18" src="http://www.techsupportalert.com/files/images/Ubuntu-18-18.png" width="18" /> <a href="" name="Manually-Mount-USB-Drive"></a>Manually Mount a USB Drive</div>A USB storage device plugged into the system usually mounts automatically, but if for some reasons it doesn't automount, it's possible to manually mount it with these steps.<br />
<ol><li>Go to Applications (or Main Menu) > Accessories > Terminal.</li>
<li>Enter <span style="color: blue;">sudo mkdir /media/usb</span> to create a mount point called <em>usb</em>.</li>
<li>Enter <span style="color: blue;">sudo fdisk -l</span> to look for the USB drive already plugged in, let's say the drive you want to mount is /dev/<em>sdb1.</em></li>
<li>Enter <span style="color: blue;">sudo mount -t vfat /dev/<em>sdb1</em> /media/<em>usb</em> -o uid=1000,gid=100,utf8,dmask=027,fmask=137</span> to mount a USB drive formatted with FAT16 or FAT32 system. OR:<br />
Enter <span style="color: blue;">sudo mount -t ntfs-3g /dev/<em>sdb1</em> /media/</span><em><span style="color: blue;">usb</span></em> to mount a USB drive formatted with NTFS system.</li>
</ol>To unmount it, just enter <span style="color: blue;">sudo umount /media/</span><em><span style="color: blue;">usb</span></em> in the Terminal.<br />
<br />
<div class="header2"><img alt="" height="18" src="http://www.techsupportalert.com/files/images/Ubuntu-18-18.png" width="18" /> <a href="" name="Enable-Media-Playback"></a>Enable Media Playback</div>Ubuntu only includes completely free software by default and does not configure proprietary media formats such as mp3 and mp4 'out of the box'. The required codecs however can be easily installed for the default player to playback these files following a few simple steps below.<br />
<ol><li>Double click an mp3 file in a folder.</li>
<li>Click "Search" button when the the default player shows up with a "Search for suitable plugin?" window.</li>
<li>Click the "Install" and "Confirm" buttons to download and install the restricted software.</li>
<li>Restart the player after the package files are installed.</li>
</ol>You might need to do the same for other restricted media formats such as mp4 too.<br />
<br />
<div class="header2"><img alt="" height="18" src="http://www.techsupportalert.com/files/images/Ubuntu-18-18.png" width="18" /> <a href="" name="Set-Sound-Output"></a>Set Sound Output</div>When I first installed Ubuntu onto a PC with an integrated audio device and tried to play a media file on a player, it had no sound. I tried these simple steps in setting Sound Preferences and then it had sound. It works for me for the audio device I have.<br />
<ol><li>Go to System > Preferences > Sound to bring up the Sound Preferences window.</li>
<li>Under the <em>Hardware</em> tab, change Profile to <em>Analog Stereo Duplex</em> from the drop-down menu.</li>
<li>Under the <em>Output</em> tab, change Connector to <em>Analog Output (LFE)/Amplifier</em> from the drop-down menu.</li>
</ol>As the items available from the drop-down menus might differ depending on the hardware devices detected by the system, you might want to try other items in the menus to see if they work for your devices. It might also help to check out the steps in <a href="https://help.ubuntu.com/community/SoundTroubleshooting">Sound Troubleshooting</a> from the Ubuntu Documentation.<br />
Playing a media file in a proprietary format on a player might also have no sound if the required codecs are not installed. In this case, see <a href="http://www.techsupportalert.com/content/ubuntu-tips-and-tricks.htm#Enable-Media-Playback">Enable Media Playback</a> in this article.<br />
<br />
<div class="header2"><img alt="" height="18" src="http://www.techsupportalert.com/files/images/Ubuntu-18-18.png" width="18" /> <a href="" name="Terminate-Unresponsive-Program"></a>Terminate Unresponsive Programs</div>Xkill is part of the X11 utilities pre-installed in Ubuntu and a tool for terminating misbehaving X clients or unresponsive programs. You can easily add a shortcut key to launch xkill with the steps below.<br />
<ol><li><img align="right" alt="xkill" height="116" hspace="8" src="http://www.techsupportalert.com/files/images/xkill-200-116.gif" title="xkill" width="200" />Go to System > Preferences > Keyboard Shortcuts.</li>
<li>Click the <i>Add</i> button to create a custom shortcut.</li>
<li>Enter <span style="color: blue;">xkill</span> to both the Name and Command boxes and click the <i>Apply</i> button.</li>
<li>Click on <i>Disabled</i> at the xkill row in the Keyboard Shortcuts window (<i>Disabled</i> is then changed to <i>New shortcut...</i>).</li>
<li>Press a new key combination, e.g. Ctrl+Alt+X (<i>New shortcut...</i> is then changed to <i>Ctrl+Alt+X</i>).</li>
<li>Click the <i>Close</i> button.</li>
</ol>Xkill is ready for use. Press the above key combination to turn the cursor to an X-sign, move the X-sign and drop it into a program interface to terminate the unresponsive program, or cancel the X-sign with a right-click.<br />
<br />
<div class="header2"><img alt="" height="18" src="http://www.techsupportalert.com/files/images/Ubuntu-18-18.png" width="18" /> <a href="" name="Change-Default-Boot-Options"></a>Change Default Boot Options</div>After full installation, Ubuntu is set to be the default operating system to boot up if no key is pressed within a few seconds on a multi-boot system. You might want to set your preferred operating system to boot up by default. This can be done easily with <span style="color: green;">StartUp-Manager</span>.<br />
<ol><li><a href="http://www.techsupportalert.com/files/images/StartUp-Manager.png" target="_blank"><img align="right" alt="StartUp-Manager" height="121" hspace="8" src="http://www.techsupportalert.com/files/images/StartUp-Manager-200-121.jpg" title="StartUp-Manager" width="200" /></a>Go to Applications (or Main Menu) > Accessories > Terminal.</li>
<li>Enter <span style="color: blue;">sudo apt-get install startupmanager</span><em>(or copy the highlighted code and press Ctrl-Shift-V to paste it in the Terminal).</em></li>
<li>Enter password used upon installation of Ubuntu.</li>
<li>Go to System > Administration > StartUp-Manager</li>
<li>Enter the same password to perform pre-configuration tasks, which include searching bootloaders to operating systems.</li>
<li>Select the default operating system from the pull-down menu, click "Close" to perform post-configuration tasks.</li>
</ol>With StartUp-Manager, you can also do others such as manage Usplash themes, adjust bootloader menu resolution or set timeout in seconds. <em>Avoid changing timeout to 0 seconds if you need to select a system to boot up from a multi-boot menu.</em><br />
<br />
<div class="header2"><img alt="" height="18" src="http://www.techsupportalert.com/files/images/Ubuntu-18-18.png" width="18" /> <a href="" name="Clean-Up-Boot-Menu"></a>Remove Old Linux Kernel, Clean Up Boot Menu</div>Each time when Ubuntu updates to a new Linux kernel, the old one is left behind and the boot menu gets longer. If your new Linux kernel works well, it's safe to remove the old one and clean up the boot menu. Do take these steps carefully as <i>incorrect removal of the items can make your system unbootable</i>.<br />
<ol><li>Go to Applications (or Main Menu) > Accessories > Terminal.</li>
<li>Enter <span style="color: blue;">uname -r</span> to print the Linux kernel version you're running (e.g. 2.6.32-22-generic).</li>
<li>Go to System > Administration > Synaptic Package Manager.</li>
<li>Click <i>Status</i> from the left panel and select <i>Installed</i>.</li>
<li>Enter the main version number (e.g. 2.6.32) in the Search box.</li>
<li>Right-click the items with smaller sub version number (e.g. 2.6.32-21) for older Linux kernel and select <i>Mark for Complete Removal</i>. The files for the older version to remove may include linux-headers-2.6.32-21, linux-headers-2.6.32-21-generic and linux-image-2.6.32-21-generic.</li>
<li>Click <i>Apply</i> from the top panel.</li>
<li>Click <i>Apply</i> again from the pop-up window to confirm removal of the marked packages. The boot menu will be cleaned up automatically after the removal is confirmed.</li>
</ol><br />
<div class="header2"><img alt="" height="18" src="http://www.techsupportalert.com/files/images/Ubuntu-18-18.png" width="18" /> <a href="" name="Auto-Shutdown-System"></a>Auto Shutdown the System</div>A simple command can be entered in the Terminal to schedule a time for the system to shut down.<br />
<ol><li>Go to Applications (or Main Menu) > Accessories > Terminal.</li>
<li>Enter <span style="color: blue;">sudo shutdown -h +<em>m</em></span> (replace <em>m</em> with the number of minutes, e.g. +60).<br />
OR: enter <span style="color: blue;">sudo shutdown -h <em>hh:mm</em></span> (replace <em>hh:mm</em> with the time on the 24hr clock, e.g. 23:15).</li>
<li>Enter password and minimize the Terminal window.</li>
</ol>The system will then shut down within the minutes or at the time specified. To cancel a scheduled time, enter <span style="color: blue;">sudo shutdown -c</span> in the Terminal.<br />
<em>GShutdown</em> is a GUI program for scheduling a time to shutdown the system but the current version 0.2 is noted not working well in both Ubuntu 9.10 and 10.04.<br />
<br />
<div class="header2"><img alt="" height="18" src="http://www.techsupportalert.com/files/images/Ubuntu-18-18.png" width="18" /> <a href="" name="Install-Extra-Fonts"></a>Install Extra Fonts</div>Do you prefer Windows TrueType fonts to the default fonts installed by Ubuntu? The Windows fonts can be installed and activated easily in a few steps below:<br />
<ol><li><a href="http://www.techsupportalert.com/files/images/Appearance-Preferences.png" target="_blank"><img align="right" alt="Ubuntu Extra Fonts" height="178" hspace="8" src="http://www.techsupportalert.com/files/images/Appearance-Preferences-200-178.jpg" title="Ubuntu Extra Fonts" width="200" /></a>Go to Applications (or Main Menu) > Accessories > Terminal.</li>
<li>Enter <span style="color: blue;">sudo apt-get install ttf-mscorefonts-installer</span><em>(or copy the highlighted code and press Ctrl-Shift-V to paste it in the Terminal).</em></li>
<li>Enter password used upon installation of Ubuntu.</li>
<li>Go to System > Preferences > Appearance > Fonts.</li>
<li>Click each of them and pick a font and size.</li>
</ol>The screenshot here uses the following settings:<br />
Application font: Verdana 9<br />
Document font: Verdana 11<br />
Desktop font: Verdana 11<br />
Window title font: Sans Bold 10<br />
Fixed width font: Monospace 10<br />
After completing the above steps, if you like the Tahoma font which is not included in the mscorefonts package, you might want to copy the two files <em>tahoma.ttf</em> and <em>tahomabd.ttf</em> from /Windows/Fonts to the Desktop. Next, move them to the restricted folder by entering <span style="color: blue;">sudo mv Desktop</span> in the Terminal. This font will then be available in step 4 above.<br />
<br />
<div class="header2"><img alt="" height="18" src="http://www.techsupportalert.com/files/images/Ubuntu-18-18.png" width="18" /> <a href="" name="Install-Screenlets"></a>Install Screenlets</div>Screenlets are small applications to represent things such as sticky notes, clocks, calendars around on your desktop. You can launch a pre-installed screenlet from Screenlet Manager, or install a new one into the Manager for launching it. Here are the steps for installing and launching a screenlet, for example, WaterMark System Information.<br />
<ol><li><img align="right" alt="WaterMark Screenlet" height="130" hspace="8" src="http://www.techsupportalert.com/files/images/WaterMark-Screenlet-200-130.gif" title="WaterMark Screenlet" width="200" />Install <span style="color: green;">Screenlets Manager</span> if it has not been added.<br />
<ol type="a"><li>Go to Applications (or Main Menu) > Ubuntu Software Center.</li>
<li>Enter <span style="color: blue;">screenlets</span> in the Search Box.</li>
<li>Select Screenlets, click the "Install" button.</li>
</ol></li>
<li><a href="http://gnome-look.org/content/show.php?content=71960">Download</a> the screenlet "WaterMark System Information" to a folder.</li>
<li>Go to Applications (or Main Menu) > Accessories > Screenlets.</li>
<li>Click Install, select <i>Install Screenlet</i> and click OK.</li>
<li>Browse to the folder, select the file downloaded and click "Open" to install the screenlet into the Screenlets Manager.</li>
<li>Select the screenlet "WaterMark" and click "Launch/Add". <i>(Tips: you can add more than one WaterMark screenlet and set it to display other system information.)</i></li>
</ol>More screenlets are available for installation from <a href="http://screenlets.org/index.php/Category:UserScreenlets" target="_blank">screenlets.org</a>.<br />
<br />
<div class="header2"><img alt="" height="18" src="http://www.techsupportalert.com/files/images/Ubuntu-18-18.png" width="18" /> <a href="" name="Install-Sun-Java-Packages"></a>Install Sun Java Packages</div>Ubuntu uses OpenJDK by default, but I note that some web services such as ezyZip.com might need the Sun Java Runtime Environment (JRE) to be installed in the system for running the services properly. If you would like to get the proprietary Sun Java packages for your system, you can download and install them from the Canonical Partner Repository with the steps below:<br />
<ol><li>Go to Applications (or Main Menu) > Accessories > Terminal.</li>
<li>Enter <span style="color: blue;">sudo add-apt-repository "deb <a href="http://archive.canonical.com/" title="http://archive.canonical.com/">http://archive.canonical.com/</a> lucid partner"</span> to add the partner repository.</li>
<li>Enter <span style="color: blue;">sudo apt-get update</span> to update the source list.</li>
<li>Enter <span style="color: blue;">sudo apt-get install sun-java6-jre sun-java6-plugin sun-java6-fonts</span> to download and install the Sun Java packages. (If asked to accept the <i>Distributor License for Java (DLJ)</i> terms, use the left/right key to navigate and select Yes, then press the Enter key for installation).</li>
<li>Enter <span style="color: blue;">sudo java -version</span> to check the version of the Java used in the system.</li>
<li>Enter <span style="color: blue;">sudo update-alternatives --config java</span> to choose the default Java for use in the system when necessary.</li>
</ol><br />
<div class="header2"><img alt="" height="18" src="http://www.techsupportalert.com/files/images/Ubuntu-18-18.png" width="18" /> <a href="" name="Install-More-Useful-Software"></a>Install More Useful Software</div><em>Ubuntu Software Center</em> lets you search and get free software. If an application you need is not included in the Center, you can go to System > Administration > Synaptic Package Manager, type in an application name to search and install a software package from the repositories.<br />
Alternatively, you can get the latest freeware applications by clicking the <em>Install this now</em> button from the <a href="http://www.getdeb.net/updates/ubuntu/10.04/" target="_blank">GetDeb Repository</a> after the getdeb package is installed with the instructions given.<br />
See also our <a href="http://www.techsupportalert.com/content/best-free-software-linux.htm" target="_blank">Best Free Software for Linux</a>.<br />
<br />
<em><strong>Note</strong></em>: <a href="" name="ccsm"></a>CompizConfig Settings Manager (ccsm) can be installed here if not added:<br />
<ol><li>Click "Applications" (or "Main Menu"), select "Ubuntu Software Center".</li>
<li>Type <span style="color: blue;">ccsm</span> into the Search box.</li>
<li>Select "Advanced Desktop Effects Settings (ccsm)" and click the "Install" button.</li>
<li>Enter the password used upon installation of Ubuntu.</li>
</ol>Surenhttp://www.blogger.com/profile/09789784724534128579noreply@blogger.com0tag:blogger.com,1999:blog-5123376846625329520.post-40421599592665241492010-09-07T21:50:00.000+05:302010-09-07T21:50:07.722+05:30<h1 class="title">How to Disable a New Kind of Cookie called Dom Storage</h1><div class="meta"> <span class="submitted"><br />
<a href="http://www.techsupportalert.com/users/maxwell" title="View user
profile."></a></span> </div><span class="print-link"></span> Recently, web browsers have introduced a new form of cookie that uses a method called “DOM storage”. (DOM stands for “Document Object Model”.) This new type of cookie has been possible in Firefox since version 2 and is also enabled in Internet Explorer 8. According to <a href="http://en.wikipedia.org/wiki/Web_Storage" target="_blank">Wikipedia</a>, it is also available in Safari 4, Google Chrome 4, and Opera 10.50. DOM storage items can be substantially larger than conventional cookies and can contain more information. Those who are concerned about privacy can disable DOM storage in the following ways.<br />
<strong>Internet Explorer 8</strong><br />
1. Open the “Tools” menu <br />
2. Select “Internet Options” <br />
3. Click the “Advanced” tab <br />
4. Scroll down until you reach “Security” <br />
5. Remove the check by “Enable DOM Storage” <br />
6. Click “OK”<br />
More details about DOM storage in IE8 are at <a href="http://msdn.microsoft.com/en-us/library/cc197062%28VS.85%29.aspx" target="_blank">this Microsoft reference</a>.<br />
<strong>Firefox 3 and up</strong><br />
DOM storage can be disabled by editing the configuration file in this way:<br />
1. Enter “about:config” in the address bar (without quotes)<br />
2. Agree to the warning "I'll be careful, I promise!" if it appears <br />
3. Scroll down until you reach “dom.storage.enabled” <br />
4. Double-click the entry to change the value from “True” to “False” <br />
5. Close the tab or window<br />
Personally, I use the Firefox extension <em>Better Privacy</em>, which I mentioned in a <a href="http://www.techsupportalert.com/content/how-manage-flash-cookies.htm">previous tip</a> about Flash cookies. In addition to settings for Flash cookies, this extension provides for disabling DOM storage without having to edit the Firefox configuration file.<br />
More information about DOM storage in Firefox can be found at <a href="https://developer.mozilla.org/en/dom/storage" target="_blank">this Mozilla link</a>.Surenhttp://www.blogger.com/profile/09789784724534128579noreply@blogger.com0tag:blogger.com,1999:blog-5123376846625329520.post-68282931122236120002010-09-07T21:38:00.000+05:302010-09-07T21:38:10.745+05:30<h1 class="title">Best Free Intrusion Prevention and Detection Utility for Home Use (HIPS)</h1><div class="meta"> <span class="submitted"><br />
<a href="http://www.techsupportalert.com/users/midnightcowboy" title="View
user profile."></a></span> </div><span class="print-link"></span> <div> </div><!-- #### BEGIN: Quick Link #### --> <table class="review"><tbody>
<tr> <td class="review-title"><br />
</td> </tr>
<tr> <td><br />
</td> </tr>
</tbody> </table><!-- #### END: Quick Link #### --> <!-- #### BEGIN: Introduction #### --> <table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title">Introduction</div></td> </tr>
<tr> <td> Gone are the days when a virus was a virus and everything else was - well – different! Now known collectively as “Malware” these threats are constantly evolving and pose a serious challenge to security software. Signature based scanners give the most reliable detection results but these are limited by the frequency of their database updates. To compliment signature recognition software HIPS programs were developed which look for behavior on your PC which is “characteristic of malware activity”. The user is then presented with an alert to either allow or block the event. Some programs automate this process which can occasionally lead to problems. See my article “<a href="http://www.techsupportalert.com/content/hips-explained.htm" target="_blank">HIPS Explained</a>” which deals with this and other issues in more detail.<br />
Evaluating the performance of HIPS programs is far from easy and any so called “test results” should be viewed with a degree of caution. It is straightforward enough to feed malware files to a selection of signature scanners and then count what they find to arrive at a score. <a href="http://www.av-comparatives.org/" target="_blank">AV Comparatives</a> provides an admirable service here and the results are always consistent and reliable. There is no such definition line possible for testing HIPS software and my feeling is that some of the vendors may possibly use this to their own advantage (“hype”).<br />
<strong>Review Criteria</strong><br />
My objective in reviewing this software is to help users make an informed choice about the suitability of the products for their own requirements. In addition to information obtained from the various producers, I have used two methods to collect the necessary data and tried to present my analysis in a factual and entertaining manner. Part of my review is based on personal usage of the software concerned and I will be updating information about my component set-up on this page. I have also used third party data collected from sources I know to be reliable such as other forums where I have known some of the posters for several years. In reality no one can ever duplicate the system you use and the software reviewed may react quite differently between one PC and another. Ultimately, the best way to judge the suitability of these programs for yourself is to try them.<br />
</td> </tr>
</tbody> </table><!-- #### END: Introduction #### --> <!-- #### BEGIN: Discussion #### --> <table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title">Discussion</div></td> </tr>
<tr> <td> <br />
<a href="http://www.techsupportalert.com/files/images/Hips_ThreatFire_Main_Screen_Large.jpg" target="_blank"><img align="left" alt="PC Tools ThreatFire" hspace="8" src="http://www.techsupportalert.com/files/images/Hips_ThreatFire_Main_Screen.jpg" title="PC Tools ThreatFire" /></a><a href="http://www.techsupportalert.com/best-free-hips.htm#Threatfire"><strong>PC Tools ThreatFire</strong></a>, a bit like Norton has seen it’s ups and downs in recent times but just like Norton has now bounced back to the top of the pile. The latest version has an improved rootkit scanner with options for either an “intelli” scan or full scan. The program also seems far less capable of causing system problems than previous versions which IMO now makes Threatfire far more suitable for average users. No doubt the involvement of Symantec with PC Tools has helped with this development as has the need to integrate component parts from Threatfire into the PC Tools Internet Security suite. The end result has been to make Threatfire not only more capable than it was but also more stable.<br />
With signature based scanners becoming less effective against new threats, programs like Threatfire have an increasing role to play in PC security. This has also been recognized by commercial vendors like F-Secure (DeepGuard) and Emsisoft (Mamutu) who have been using this technology for some time. Like these other programs, Threatfire constantly monitors your system for behavior typical of that exhibited by malware such as capturing your keystrokes etc. When used together with a traditional real-time anti virus and a good firewall, Threatfire provides the often missing link for behavioral based detection. Threatfire also contains a highly effective system activity monitor which will display your autoruns in addition to other useful information. The other tab on the advanced settings though is only for truly experienced users with a high degree of Windows system knowledge. Creating advanced rules with Threatfire can render your system unusable unless you know exactly what you are doing. In the hands of experienced users though this facility is a formidable tool.<br />
Be aware that automatic updates are not provided with the free version if you elect to “opt out” of the ThreatFire Community. The paid version does offer this option plus other flexibility, permissions for commercial use and telephone support.<br />
*Windows 2000 users please note that you need V4.1 of Threatfire. See footnote 3 and other useful information including the download link on <a href="http://www.threatfire.com/updates/">this page</a>.<br />
<br />
<a href="http://www.techsupportalert.com/best-free-hips.htm#Malware_Defender"><strong>Malware Defender</strong></a> was formerly a commercial program, but this excellent HIPS changed ownership a while back and a new version was released as freeware. The sequence of events relating to this event is set out quite nicely <a href="http://www.wilderssecurity.com/showthread.php?s=c293f419dbc895732bfa26866aa8fc06&t=267680&highlight=malware+defender">here</a> if anyone is interested. Just follow the thread through.<br />
<br />
<a href="http://www.techsupportalert.com/files/images/pc_freeware/Malware%20Defender.png"><img align="left" alt="Malware Defender main interface" height="132" src="http://www.techsupportalert.com/files/images/pc_freeware/Malware%20Defender%28small%29.jpg" width="200" /></a>I'd like to state at the outset that this type of program is not for the feint hearted. To use it effectively, and avoid the possibility damaging your system, you will need a reliable knowledge of Windows processes and services. You will also need to pay close attention to the information displayed in the alerts, and the options associated with each one. Luckily, the program installs by default into learning mode which reduces the number of initial alerts to a minimum. That said, it's essential that you only install Malware Defender into a clean system otherwise you'll just be creating "allow" rules for your malware collection to function normally. Everyone has their favorite apps for system cleaning, but my choice would be these. First scan with your resident antivirus and then with <a href="http://www.surfright.nl/en">HitmanPro</a> and <a href="http://www.malwarebytes.org/mbam.php">Malwarebytes</a>. You might also like to look at the <a href="http://www.anti-virus.by/en/vba32arkit.shtml">VBA32 Antirootkit</a> program which will tell you which sections of its scan came up "clean" and which need some further investigation. It will also check the digital signatures of all your files. Anything identified as suspicious can be uploaded to <a href="http://www.virustotal.com/">Virus Total</a> for a final check.<br />
<br />
In addition to the usual file, registry and application modules, Malware Defender also provides network protection should you choose to enable it, including a connections monitor. This makes it the ideal companion for anyone using Windows own firewall, but wanting more detailed control. It also scores very highly in the <a href="http://www.matousec.com/projects/proactive-security-challenge/results.php">Matousec tests</a> for those inclined to value the results. <br />
<br />
It was difficult to know exactly where to place Malware Defender in terms of a review rating. For what it does it's an excellent performer but the complexities of using it make it unsuitable for average users. Mistakes can be rectified by changing rule permissions from the log entries, although if you've already denied a vital system function, your screen might now be empty!<br />
<br />
<img align="left" alt="WinPatrol Startup Window" height="125" hspace="8" src="http://www.techsupportalert.com/files/images/WinPatrol_Small_0.jpg" width="200" /><a href="http://www.techsupportalert.com/best-free-hips.htm#Winpatrol" name="threatfire"><b>WinPatrol</b></a> has been helping to protect computers for more than ten years. With DSA now only available as part of the Privatefirewall package the options for standalone programs of this type have been reduced still further. Maybe then this is the right time to re-visit an old favorite of many users which is still in development and more than capable of providing this extra layer of security.<br />
WinPatrol has many advocates and has recently been upgraded to achieve greater compatibility for Vista and Windows 7 users. It's main objective is to warn you about alterations to your system which may be malware generated. It does this by taking a snapshot of your system settings and alerting you to any changes. WinPatrol operates using a heuristic approach which makes it more likely to find new malware than traditional signature based scanners which are heavily reliant on updates.<br />
WinPatrol will alert you to new program activations as well and is effective across a whole range of malware including worms, trojans, cookies, adware and spyware. Even stuff designed to replicate itself on your system is with WinPatrol's reach. You can also use WinPatrol to filter unwanted cookies and IE add-ons. An added bonus is that WinPatrol will also deal with the problems it finds so you won't need another program to do this for you.<br />
The author, Bill Pytlovany, provides support and has an interesting comments and resource blog here:<br />
<a href="http://billpstudios.blogspot.com/">http://billpstudios.blogspot.com/</a><br />
Softpedia review link (2007)<br />
<a href="http://www.softpedia.com/reviews/windows/WinPatrol-Review-62232.shtml">http://www.softpedia.com/reviews/windows/WinPatrol-Review-62232.shtml</a><br />
<br />
<a href="http://www.techsupportalert.com/files/images/Hips_Spyware_Terminator_Shields_Large.jpg" target="_blank"><img align="left" alt="Spyware Terminator" hspace="8" src="http://www.techsupportalert.com/files/images/Hips_Spyware_Terminator_Shields.jpg" title="Spyware Terminator" /></a> <a href="http://www.techsupportalert.com/best-free-hips.htm#terminator"><strong>Spyware Terminator</strong></a> seems to have been around for almost as long as I have and some might argue it's about as much use too! That said if you witnessed the decline of this software a couple of years ago you might now be surprised by its rejuvenated format. I'm not going to pretend that the spyware detection rates are that good because they're not, but the HIPS component is. Added to that is the option to integrate the ClamAV antivirus shield and Web Security Guard. An adware toolbar (Web Security Guard Toolbar) is included but you can un-check this at installation. There is a choice of two proficiency levels for the default install (basic and advanced) which then sets the rules and notification levels (number of popups) accordingly.<br />
No less than ten real-time shields are provided for system protection and each one can be enabled separately. An install mode is included for use when adding new software and there's a separate cookie scanner. Other features include locked file removal, file analysis, browser restoration and even a system restore function. New as of version 2.6.7 is an anti-phishing component to help keep you safe online. This includes a facility to whitelist your favorite safe sites which Spyware Terminator will then ignore. See the full details <a href="http://www.spywareterminator.com/features/antispyware-details.aspx">here</a>. There are several scan options including customized and context menu scanning. The updates are compressed to minimize bandwidth usage, and there's even free support via email and the forum.<br />
Resource use and system impact will vary according to your component strength and what you ask Spyware Terminator to do. It is always likely to be on the moderate side but unless you have a really old computer it's worth living with.<br />
Be advised that Spyware Terminator only loads a small installer program initially (632kb) and then connects to the Internet to download the other stuff you've ticked as options. There is a separate link for downloading an off-line installer if preferred. As of V 2.8.0.1 the program supports x64 bit Vista and Windows 7 in real time. Previous versions only had x64 support for on demand scanning. Is now also able to detect and remove so-called flash cookies.<br />
<br />
<a href="http://www.techsupportalert.com/files/images/Hips_MJ_Registry_Watcher_Large.jpg" target="_blank"><img align="left" alt="MJ Registry Watcher" hspace="8" src="http://www.techsupportalert.com/files/images/Hips_MJ_Registry_Watcher.jpg" title="MJ Registry Watcher" /></a> <a href="http://www.techsupportalert.com/best-free-hips.htm#mjregwatcher"><strong>MJ Registry Watcher</strong></a> is another application that maybe not too many people are aware of. It is a simple registry, file and directory hooker/poller that safeguards the most important startup files, registry keys, and other more exotic registry locations commonly attacked by Trojans. It has very low resource use, and is set to poll every 30 seconds by default, although you can adjust this if required. A configuration file stores all your settings for future use. MJRW not only polls the system, but it also hooks it, so that most changes to keys, files and directories are reported instantaneously. Key deletions are still caught by the polling loop though, since they cannot be hooked. Exactly which keys and files are protected can be completely configured by the user, although the sets supplied with MJRW will cover most standard PCs. You do need better than average knowledge to get the best from this software but users in this category who prefer to combine small light applications to create a layered security solution should definitely check it out. Installation is not required, simply run the program from whichever directory you un-zip it to.** New features in V1.2.6.7 released 4th April, 2009 : Process Launch Monitoring, Folder and File Hooking, EMailing of Alerts, Quarantining of Files and Directories ** There is an active thread for this software at Wilders forum here: http://www.wilderssecurity.com/showthread.php?t=54666 The author, Mark Jacobs, also maintains a range of other free software on his website and will respond to emails for support if requested.<br />
</td> </tr>
</tbody> </table><!-- #### END: Discussion #### --><!-- #### BEGIN: Related #### --> <table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title">Related Products and Links</div></td> </tr>
<tr> <td> <ul><li class="leaf"><a href="http://www.techsupportalert.com/best-free-anti-virus-software.htm" target="_blank">Best Free Antivirus Software</a></li>
<li class="leaf"><a href="http://www.techsupportalert.com/best-free-firewall.htm" target="_blank">Best Free Firewall</a></li>
<li class="leaf"><a href="http://www.techsupportalert.com/best-free-adware-spyware-scumware-remover.htm" target="_blank">Best Free Adware/Spyware/Scumware Remover</a></li>
<li class="leaf"><a href="http://www.techsupportalert.com/best-free-trojan-scanner-trojan-remover.htm" target="_blank">Best Free Trojan Scanner/Trojan Remover</a></li>
<li class="leaf"><a href="http://www.techsupportalert.com/content/best-internet-safety-check.htm" target="_blank">Internet Safety Raters and Site Scanners</a></li>
<li class="leaf"><a href="http://www.techsupportalert.com/content/safe-computing-under-hour.htm" target="_blank">Safe Computing in Under an Hour</a></li>
<li class="leaf"><a href="http://www.techsupportalert.com/how-to-secure-your-pc.php" target="_blank">Gizmo's Guide to Securing Your PC</a></li>
<li class="leaf"><a href="http://www.techsupportalert.com/safe-surfing.php" target="_blank">How to Surf More Securely</a></li>
<li class="leaf"><a href="http://www.techsupportalert.com/best-free-browser-protection-utility.htm" target="_blank">Best Free Browser Protection Utility</a></li>
<li class="leaf"><a href="http://www.techsupportalert.com/content/spyware-removal-guide.htm" target="_blank">Malware Removal Guide</a></li>
<li class="leaf"><a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm" target="_blank">Probably the Best Free Security List in the World</a></li>
</ul></td> </tr>
</tbody> </table><!-- #### END: Related #### --> <!-- #### BEGIN: Details #### --> <table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title"><a href="" name="Quick_Selection_Guide"></a>Quick Selection Guid<span style="font-weight: bold;">e</span></div></td> </tr>
<!-- #### BEGIN: DriveSentry Details #### -->
<tr> </tr>
<!-- #### END: DriveSentry #### --><!-- #### BEGIN: ThreatFire Details #### -->
<tr> <td> <table class="review-details"><tbody>
<tr> <td class="review-details-title" colspan="3"> <h2><a href="" name="Threatfire"></a><a href="http://www.threatfire.com/" target="_blank" title="Go to ThreatFire home page...">ThreatFire</a> <img alt="Rating 7 of 10" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_9_votes.png" title="Rating 7 of 10" /> <img alt="" src="http://www.techsupportalert.com/files/images/gizmos-best-small.png" /></h2></td> </tr>
<tr> <td class="review-details-icon"><img alt="Pros" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-smile.png" title="Pros" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">Runs from the box without the need for additional configuration</td> </tr>
<tr> <td class="review-details-icon"><img alt="Cons" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-sad.png" title="Cons" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">Ambiguous results may need web research confirmation; doubts about compatibility with other software</td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.threatfire.com/" target="_blank"><img alt="Developer Home Page" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_homepage.png" title="Developer
Home Page" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.threatfire.com/" target="_blank">http://www.threatfire.com/</a></td> </tr>
<tr> <td class="review-details-icon"><a href="http://download.cnet.com/ThreatFire-AntiVirus-Free-Edition/3000-2239_4-10726873.html" target="_blank"><img alt="Download link" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_download.png" title="Download link" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://download.cnet.com/ThreatFire-AntiVirus-Free-Edition/3000-2239_4-10726873.html" target="_blank">http://download.cnet.com/ThreatFire-AntiVirus-Free-Edition/3000-2239_4-10726873.html</a></td> </tr>
<tr> <td class="review-details-icon"><img alt="File
Size" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_disk.png" title="File Size" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">8 MB <img alt="Version" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_version.png" title="Version" /> 4.7.0.11 <img alt="License Type" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_license.png" title="License Type" /> Private Freeware (not free for commercial use) <img alt="Installation Requirements" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_installation.png" title="Installation Requirements" /> MS Windows XP, 2003 Server, Vista *Windows 2000 users please see footnote in the text above</td> </tr>
</tbody> </table></td> </tr>
<!-- #### END: ThreatFire Details #### -->
<tr> <td> <table class="review-details"><tbody>
<tr> <td class="review-details-title" colspan="3"> <h2><a href="" name="Malware_Defender"></a><span style="text-decoration: underline;">Malware Defender</span> <img alt="Rating 8 of 10" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_8_votes.png" title="Rating 8 of 10" /></h2></td> </tr>
<tr> <td class="review-details-icon"><img alt="Pros" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-smile.png" title="Pros" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">Comprehensive protection including network monitoring</td> </tr>
<tr> <td class="review-details-icon"><img alt="Cons" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-sad.png" title="Cons" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">Complicated to understand for average users - home page in Chinese (see Softpedia links below)</td> </tr>
<tr> <td class="review-details-icon"><a href="http://windirstat.sourceforge.net/" target="_blank"><img alt="Developer Home Page" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_homepage.png" title="Developer Home Page" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.softpedia.com/get/Security/Secure-cleaning/Malware-Defender.shtml">http://www.softpedia.com/get/Security/Secure-cleaning/Malware-Defender.shtml <br />
</a></td> </tr>
<tr> <td class="review-details-icon"><a href="http://downloads.sourceforge.net/windirstat" target="_blank"><img alt="Download link" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_download.png" title="Download link" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.softpedia.com/progDownload/Malware-Defender-Download-106665.html">http://www.softpedia.com/progDownload/Malware-Defender-Download-106665.html</a></td> </tr>
<tr> <td class="review-details-icon"><img alt="File Size" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_disk.png" title="File
Size" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment"> 1.9MB <img alt="Version" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_version.png" title="Version" /> 2.7.1 <img alt="License Type" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_license.png" title="License Type" /> Unrestricted Freeware <img alt="Installation Requirements" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_installation.png" title="Installation
Requirements" /> Windows 2K/XP/2003/2008/Vista/7<br />
</td> </tr>
</tbody> </table></td> </tr>
<!-- #### BEGIN: WinPatrol #### -->
<tr> <td> <table class="review-details"><tbody>
<tr> <td class="review-details-title" colspan="3"> <h2><a href="" name="Winpatrol"></a><a href="http://www.winpatrol.com/" target="_blank" title="Go to WinPatrol home page...">WinPatrol</a> <img alt="Rating 7 of 10" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_7_votes.png" title="Rating 7 of 10" /></h2></td> </tr>
<tr> <td class="review-details-icon"><img alt="Pros" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-smile.png" title="Pros" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">Comprehensive protection; deals with the problems it finds; a pioneer of heuristic based detection technology</td> </tr>
<tr> <td class="review-details-icon"><img alt="Cons" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-sad.png" title="Cons" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">“Scotty the Windows Watchdog” projects a somewhat dated image</td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.winpatrol.com/" target="_blank"><img alt="Developer Home Page" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_homepage.png" title="Developer
Home Page" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.winpatrol.com/" target="_blank">http://www.winpatrol.com/</a></td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.softpedia.com/progDownload/WinPatrol-Download-10365.html" target="_blank"><img alt="Download link" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_download.png" title="Download link" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.softpedia.com/progDownload/WinPatrol-Download-10365.html" target="_blank">http://www.softpedia.com/progDownload/WinPatrol-Download-10365.html</a></td> </tr>
<tr> <td class="review-details-icon"><img alt="File
Size" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_disk.png" title="File Size" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">714kb <img alt="Version" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_version.png" title="Version" /> 17.1.2010.0 <img alt="License Type" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_license.png" title="License Type" /> Unrestricted freeware <img alt="Installation
Requirements" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_installation.png" title="Installation Requirements" /> MS Windows all inc. 64 bit</td> </tr>
</tbody> </table></td> </tr>
<!-- #### END: WinPatrol #### --><!-- #### BEGIN: Spyware Terminator Details #### -->
<tr> <td> <table class="review-details"><tbody>
<tr> <td class="review-details-title" colspan="3"> <h2><a href="" name="terminator"></a><a href="http://www.spywareterminator.com/features/antispyware-features.aspx" target="_blank" title="Go to Spyware Terminator home page...">Spyware Terminator</a> <img alt="Rating 6 of 10" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_6_votes.png" title="Rating 6 of 10" /></h2></td> </tr>
<tr> <td class="review-details-icon"><img alt="Pros" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-smile.png" title="Pros" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">Long established and well supported software with an excellent HIPS and many other features</td> </tr>
<tr> <td class="review-details-icon"><img alt="Cons" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-sad.png" title="Cons" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment"> May slow some older PC's; spyware detection rates poor in comparison to SUPERAntiSpyware<br />
No real-time protection for x64 bit systems<br />
</td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.spywareterminator.com/features/antispyware-features.aspx" target="_blank"><img alt="Developer Home Page" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_homepage.png" title="Developer Home Page" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.spywareterminator.com/features/antispyware-features.aspx" target="_blank">http://www.spywareterminator.com/features/antispyware-features.aspx</a></td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.spywareterminator.com/download/download.aspx" target="_blank"><img alt="Download link" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_download.png" title="Download link" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.spywareterminator.com/download/download.aspx" target="_blank">http://www.spywareterminator.com/download/download.aspx</a></td> </tr>
<tr> <td class="review-details-icon"><img alt="File
Size" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_disk.png" title="File Size" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">632 KB <img alt="Version" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_version.png" title="Version" /> 2.8.0.1 <img alt="License Type" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_license.png" title="License Type" /> Unrestricted Freeware <img alt="Installation
Requirements" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_installation.png" title="Installation Requirements" /> All Windows inc. x64 for Vista & Windows 7</td> </tr>
</tbody> </table></td> </tr>
<!-- #### END: Spyware Terminator #### --><!-- #### BEGIN: MJ Registry Watcher Details #### -->
<tr> <td> <table class="review-details"><tbody>
<tr> <td class="review-details-title" colspan="3"> <h2><a href="" name="mjregwatcher"></a><a href="http://www.jacobsm.com/mjsoft.htm#rgwtchr" target="_blank" title="Go to MJ Registry Watcher home page...">MJ Registry Watcher</a> <img alt="Rating 6 of 10" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_6_votes.png" title="Rating 6 of 10" /></h2></td> </tr>
<tr> <td class="review-details-icon"><img alt="Pros" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-smile.png" title="Pros" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">Light resource use; excellent default rules with choice of security levels</td> </tr>
<tr> <td class="review-details-icon"><img alt="Cons" src="http://www.techsupportalert.com/files/images/icons/review/icon_face-sad.png" title="Cons" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">Only really suitable for experienced users</td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.jacobsm.com/mjsoft.htm#rgwtchr" target="_blank"><img alt="Developer Home Page" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_homepage.png" title="Developer Home Page" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.jacobsm.com/mjsoft.htm#rgwtchr" target="_blank">http://www.jacobsm.com/mjsoft.htm#rgwtchr</a></td> </tr>
<tr> <td class="review-details-icon"><a href="http://www.jacobsm.com/RegWatcher.zip" target="_blank"><img alt="Download link" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_download.png" title="Download link" /></a></td> <td class="review-details-comment"> </td> <td class="review-details-comment"><a href="http://www.jacobsm.com/mjsoft.htm#rgwtchr" target="_blank">http://www.jacobsm.com/mjsoft.htm#rgwtchr</a></td> </tr>
<tr> <td class="review-details-icon"><img alt="File
Size" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_disk.png" title="File Size" /></td> <td class="review-details-comment"> </td> <td class="review-details-comment">1.34 MB <img alt="Version" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_version.png" title="Version" /> 1.2.6.9 <img alt="License Type" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_license.png" title="License Type" /> Unrestricted Freeware <img alt="Installation
Requirements" border="0" src="http://www.techsupportalert.com/files/images/icons/review/icon_installation.png" title="Installation Requirements" /> All Windows</td></tr>
</tbody></table></td></tr>
</tbody></table>Surenhttp://www.blogger.com/profile/09789784724534128579noreply@blogger.com0tag:blogger.com,1999:blog-5123376846625329520.post-15800536206285849202010-09-07T21:28:00.000+05:302010-09-07T21:28:14.321+05:30<h1 class="title">Best Free Firewall</h1><div class="meta"> <span class="submitted"><br />
<a href="http://www.techsupportalert.com/users/thebigoaf" title="View user
profile."></a></span> </div><span class="print-link"></span> <div> </div><table class="review"><tbody>
<tr> <td class="review-title"><br />
</td> </tr>
<tr> <td><br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <h3>Introduction</h3></td> </tr>
<tr> <td> A <strong><a href="http://en.wikipedia.org/wiki/Firewall_%28networking%29">firewall</a></strong> protects your system from unwanted intruders. It also protects your system from programs that will send out or broadcast your personal information. You could think of a firewall as being like the entry door on your residence. If you have no door, intruders could freely enter or leave your residence and have full access to everything in it. When you have a firewall on your system, it's like installing and then locking the door to your residence. No one can get in except you and those who are allowed access by you, whether you give them a key, or you open the door for them when asked. Firewalls that are doing their job will often tell you there's someone at the door and ask if you want to let them in. A popup appears telling you someone/something is trying to connect to you, or that a program wants access to the internet. It asks you what you want to do, and it's up to you if you want to open the door or not. There are even some malicious programs that get in and prop the back door open or they make a key to your door for themselves. These are a type of trojan which is a very dangerous type of malware. It is extremely important to have a good firewall installed to control access to your system and protect your personal information. It is also equally important to install <a href="http://www.techsupportalert.com/best-free-anti-virus-software.htm">antivirus software</a> and maybe <a href="http://www.techsupportalert.com/pc/security-tools.html">additional security protection</a> for your system.<br />
If you want to learn more about firewalls, visit these excellent sites: <a href="http://www.howstuffworks.com/firewall.htm" target="_blank">How Firewalls Work</a>, <a href="http://www.comodo.com/resources/home/how-firewalls-work.php">How Firewalls Protect Your PC</a> and <a href="http://www.microsoft.com/security/firewalls/faq.aspx" target="_blank">Microsoft Security Firewalls FAQ</a>. If you decide not to use one of the firewall products in the article, please be sure your Windows Firewall is active. NEVER use more than one software firewall on one system at the same time. You may, however, use a hardware and a software firewall in conjunction to improve protection.<br />
<h4><strong>Before installing your new firewall:</strong></h4>First and foremost, you should back up your system and partitions. While installing new security software, you may encounter unforeseen difficulties which may result in system instability or system failure. Everyone's system is different and very unique. You may have an old, latent driver in your system that is incompatible with whatever you are installing. To avoid frustration, loss of data, and possibly therapy, you should always back up your data to a separate partition on your hard drive (the same size or larger than the partition you are backing up), or you should back up your information to an external hard drive. It is far easier to restore a system from a backup archive or image than it is to resurrect a damaged operating system that no longer boots. Now that I have made my point perfectly clear to readers, the backup software I recommend is <a href="http://www.paragon-software.com/home/db-express/">Paragon Backup & Recovery free edition</a>. Install, backup your system and move on to the next step.<br />
Before installing a new firewall (or other security/suite), you MUST completely uninstall any previous firewall (or security suite). [This recommendation only applies to third party firewall products. If you are using the Windows firewall included with your operating system, you can simply install the new firewall according to the product instructions.] After uninstalling, the system must be rebooted as most uninstallers have a built-in cleaner to finish removing remaining components of the software. This may not be good enough. At this time it's a good idea to run a drive cleaner to remove all remaining temporary files. I recommend <a href="http://www.piriform.com/ccleaner">CCleaner</a>. After using the cleaner, users may want to run the registry cleaner included in this software. I recommend using caution when cleaning your registry. This is only an optional step. If you are in doubt, and you really don't know what you are doing, then perhaps you should leave your registry alone. If you are going to clean your registry, I ONLY recommend CCleaner to novices and those with moderate experience. I have used CCleaner's registry cleaner thousands of times on numerous systems and have never had a problem with it, unlike other registry tools. If you do decide to clean your registry with CCleaner, make sure you backup your registry entries when prompted to do so with CCleaner. Once you have uninstalled the old firewall, cleaned the file system and the registry (if you chose to do so), reboot the computer and you are ready for a fresh installation on your new firewall (or other security/suite).<br />
Today the use of reliable firewalls is IMPARATIVE as we face a new age of cybercrimes like identity and data theft! A good firewall will not only thwart attacks by hackers but is your first line of defense in keeping your personal information in your hands alone. No firewall or any security software can certainly guarantee 100% protection certainty. As technology changes, criminals change and attacks on systems, and even malware becomes more sophisticated everyday. I want to be clear that though I have information posted in this article for very old, unsupported firewalls, I will only recommend current, actively supported firewalls and security solutions.<br />
<br />
The following Free Firewall article is presently divided into two sections: <a href="http://www.techsupportalert.com/fckeditor.html?InstanceName=edit-field-review-text-0-value&Toolbar=DrupalFiltered#Proactive-Firewalls-HIPS">(I)</a> software firewalls for broad protection and greater user involvement; <a href="http://www.techsupportalert.com/fckeditor.html?InstanceName=edit-field-review-text-0-value&Toolbar=DrupalFiltered#basic-protection">(II)</a> software firewalls for basic protection and less user involvement.<br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <h3>Discussion</h3></td> </tr>
<tr> <td> <strong><a href="" name="Proactive-Firewalls-HIPS"></a>I. Best Software Firewalls for Maximum Protection and Greater User Involvement</strong><br />
The following personal firewalls provide excellent network protection. Each firewall comes with default settings and shouldn't require much adjustment except for the needs of advanced users. Some information for configuration is provided whenever possible to help you learn about your firewall and to better suit it to your needs.<br />
Firewall products in this section may require a fair amount of time to learn their features. Some products rely of lists of known safe applications, safe vendors, or valid digital signatures. Some products can optionally give safe or trusted status to all your current files, some have training or installation modes, and some have lesser configurations to reduce monitoring.<br />
Since firewalls are often praised for their level of protection at their maximum security settings, users may not have the degree of protection mentioned in the reviews below if they reduce security levels using the firewall interface, or if users employ methods to increase automation in order to reduce alerts.<br />
<hr /> <h3 class="rteleft"> </h3><span><img align="left" alt="" height="171" hspace="8" src="http://www.techsupportalert.com/files/images/Total%20Comodo.jpg" vspace="8" width="250" /></span><br />
<b><a href="http://www.techsupportalert.com/fckeditor.html?InstanceName=edit-field-review-text-0-value&Toolbar=DrupalFiltered#comodo">Comodo Internet Security</a></b> <span>is the best choice for users seeking</span><b> </b><span>a</span> full featured security suite. It has a robust and a very active HIPS or application monitoring feature called "Defense+", which matches or exceeds the security performance of pay products. Comodo also provides a "memory firewall" which in their words, “Cutting-edge protection against sophisticated buffer overflow attacks.” Comodo allows for much control and customization, with a plethora of additional settings to adjust for the curious or for the paranoid. This latest release of Comodo is suitable for both lightly-skilled users (still must have knowledge of installed programs) and technically advanced users.<br />
Comodo includes a very effective Sandbox component to limit how many applications and new software installations affect your computer. The use of sandbox protection helps to limit the negative effects of malware if some terrible infection manages to enter your system. Comodo Firewall boasts a “Default Deny Protection” for applications. Though they maintain a lengthy list of known safe applications in their database, if an unknown application attempts entry through the Firewall, Comodo will deny the <img align="left" alt="" height="171" hspace="8" src="http://www.techsupportalert.com/files/images/Comodo%20Firewall.jpg" vspace="8" width="250" />application and ask the user what to do. The new release contains many new features while allowing experienced users to maintain absolute control over their system by controlling ports, protocols, and complete configuration command.<br />
During installation, it gives you a choice between two levels of security. The "Firewall Only" mode (discussed in the <a href="http://www.techsupportalert.com/fckeditor.html?InstanceName=edit-field-review-text-0-value&Toolbar=DrupalFiltered#basic-protection">next section</a>) and the Comodo Internet Security (includes antivirus, antimalware, and additional features). After installation Comodo automatically selects "Safe Mode" which maximizes proactive protection to a high level, and is the best mode for most users. It will generate numerous popup alerts for applications not in its trusted vendors list (you can browse this list to see if you trust the vendors: go to the Defense+ tab > "Common Tasks" > "View My Trusted Software Vendors"). When you answer "allow" and "remember your answer" to popup alerts for an application, Comodo creates a custom policy for it. Some of its policies are fairly liberal.<br />
<img align="left" alt="" height="171" hspace="8" src="http://www.techsupportalert.com/files/images/Comodo%20Defense%20Plus.jpg" vspace="8" width="250" />In the more liberal "Clean PC Mode", Defense+ automatically treats all applications on your drive as safe (but if any malware is currently hidden on your drive, it too would be considered safe). Applications still receive some minimal monitoring for Comodo's two protected lists ("my protected registry keys" and "my protected COM interfaces") and for running as an executable, or more/less monitoring depending on their custom policy. And new files get sent to a list of files "waiting for your review" in the "Summary" page. Files listed for review will be considered possibly unsafe and will provoke popup messages, as if in Safe Mode, until their custom policies are made.<br />
Comodo limits the frequency of alerts by automatically treating some programs as safe and allowing some applications to access the Internet. You can additionally automate the behavior of Defense+ by one or more of these methods for treating applications as safe:<br />
<ul><li> Have it "remember your answer" to all popup alerts when an application first runs, which works for some applications (because some custom policies set this way are close to "trusted" status). But if an application still nags you, click "More Options" in the alert and use the drop down box to select "trusted" or "blocked" (etc.), if available, or set an application to trusted manually ("Defense+" > "Advanced" > "Computer Security Policy" > "Edit..." > "Use a Predefined Policy"), which finally ceases popup alerts and most intrusion prevention for that application.<br />
</li>
<li> Add files to the lists of "My Own Safe Files" or "My Trusted Software Vendors" in the interface (see the "Defense+" tab), which is most helpful for "Safe Mode" or "Paranoid Mode".<br />
</li>
<li> Use the "Clean PC Mode" (right-click the tray icon and select it under the "Defense+ Security Level"). But make sure to scan and remove any malware first.<br />
</li>
</ul><h3> Take a look at this guide on <a href="http://www.techsupportalert.com/content/how-install-comodo-firewall.htm">How to Install Comodo</a> (version 4.1)</h3>The following guides are far outdated and being reviewed for update so they are relevant to the current release of Comodo, but you are welcome to look at them anyway for any useful information that might help you: <a href="http://www.techsupportalert.com/content/how-tame-comodo-defense-without-disabling-it.htm" target="_blank">How to Tame Comodo Defense+ Without Disabling It</a> and <a href="http://forums.comodo.com/defense_help/an_approach_for_configuring_defense_for_many_fewer_alerts-t36657.0.html" target="_blank">Comodo Forum Help</a>.<br />
Alternatively, see <a href="http://www.techsupportalert.com/freeware-forum/security/2520-comodo-firewall-mini-tutorial.html" target="_blank">this mini guide</a> (currently reviewing for update relevant to current version of Comodo) for an example of how to maximize some of its basic settings. Comodo nicely allows you to quickly increase or decrease protection with its different modes, configurations, and settings.<br />
<hr /> <br />
This review is currently undergoing revision. <a href="http://www.techsupportalert.com/files/images/firewall_online.jpg" target="_blank"><img align="left" alt="Online Armor Firewall" hspace="8" src="http://www.techsupportalert.com/files/images/firewall_online_t.jpg" vspace="8" /></a>A solid contender is the free version of <a href="http://www.techsupportalert.com/best-free-firewall.htm#online"><b>Online Armor Free</b></a>. It has outstanding leak-test and HIPS performance (the HIPS feature is mostly in its "Program Guard"). It has a unique feature called "<a href="http://www.tallemu.com/webhelp3/KF-RunSafer.html" target="_blank">run safer</a>" that allows you to selectively set risky applications (web browsers, office software, readers/viewers, instant messengers, email or news programs, multimedia software, download managers, etc.) to run as if under a limited user account (go to "Programs" tab > uncheck "Hide Trusted" > highlight a program and click "Run Safer"). It minimizes popup alerts over time with its automatic list of safe programs, your on-demand scans with its safety check wizard, and your responses to popup alerts -- especially in cases where you tell it to remember your decisions and have it treat programs as trustworthy.<br />
Run the wizard and have it search your PC for known programs to allow/block/ask. In this case, Online Armor relies on you to respond to alerts for unknown programs. For the curious or paranoid user, it uses excellent popup messages when it automatically allows a program to connect online and, optionally, when it automatically trusts a program/process to run (these alerts don't require user action and they can be enabled/disabled in the interface with "Options" > "Firewall", and "Programs" > "Options"). For example, I noticed a message when it auto trusted a key logger test (Zemana, which it failed initially), but after I set the tester to untrusted, it gave very informative and detailed security alerts (and then it passed the test and logged the tester in the interface under the "Key Logger" tab, but it only logged the key logger after the test was untrusted). You can even close both its tray tools from its right-click context menu. They are not needed for the firewall and HIPS components to continue running and protecting.<br />
<hr /> <br />
<img align="left" alt="" hspace="8" src="http://www.techsupportalert.com/files/images/Zone%20Alarm%20Free%20UI_0.jpg" vspace="8" /><strong><a href="http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htm">Zone Alarm Free Firewall 2010</a> </strong>is an excellent inbound/outbound OS firewall solution suited for users of every level of experience. Zone Alarm protects systems from intrusions as well as program access to the web. Zone Alarm features an easy-to-understand user interface. Users can adjust security settings for their needs to allow for file/printer sharing, public networks, and even turn off the firewall if ever needed. Simple controls in the form of visual slide bars make setting up this firewall a snap. Zone Alarm offers to help users setup initial program access with a first-run scan of installed software and allows/denies accordingly. This first scan does not always offer accurate access to programs.<br />
Internet Zone controls are divided into the Trusted Zone, used for the local network to share files, printers, etc., and the Internet Zone for communication to/from the web. A simple 3-position format allows users to choose from "No protection" (firewall is off), Medium (Allows file/printer sharing), and High (will allow users to connect to a network but will not allow anyone else to connect to your system). The medium setting is recommended for home networks with more than one system, and for users whose modem requires this setting. The high setting is most recommended for single-system web access (only one computer at home and modem does not require a home network setting), and for public areas such as cafes, restaurants, and hotels (etc.) with wifi.<br />
Users will have to interact with this firewall for a time after installation to make sure programs needing LAN or internet access are granted proper permissions. The popups are very easily understood most of the time, listing the program name or the name of the executable file asking for access. Most often programs executable files contain the name of the program followed by ".exe" so even novice users should be able to easily identify the name of the program asking for web access so they can make the appropriate decision. Popups are very simple in format offering Deny, Accept, and a checkbox a user can check to make Zone Alarm remember the decision.<br />
The Program Control will allow users to set Zone Alarm for Low, which is a learning mode and no OS firewall protection and limited popups. Or users can choose Medium, which will make programs ask for permission to access the trusted and internet zones. The high setting is not offered in the Free version of Zone Alarm. The Smart Defense Advisor will help reduce popups by offering settings for programs asking for access, based on the decisions made by other users worldwide. Users can choose whether or not to participate in Zone Alarm's community defense program. Users can set programs access manually at anytime by going to Zone Alarm's Program Control and selecting Programs.<br />
Zone Alarm Free offers very good HIPS protection, Inbound/Outbound defense, Stealth mode, Anti-phishing protection, identity theft protection, and now even offers 2 GB free online backup. Zone Alarm Free 2010 passed all leak and hack testing with flying colors. The only negatives I can name is lack of program-to-program protection offered by the free version, which includes programs reaching out to the web through a web browser.<br />
<strong>Note to those using or planning to install <a href="http://www.techsupportalert.com/content/immunet-protect-cloud-based-anti-malware.htm">Immunet Protect</a>:</strong> Zone Alarm products are not compatible with Immunet Protect and at this time there is no work-around for this incompatibility. Immunet Protect and Zone Alarm products (any Zone Alarm product - free or commercial) will cancel each other out and neither one will function in your system. Development is continuing and Immunet hopes to release a version someday that will be compatible with Zone Alarm.<br />
<hr /> This review is currently undergoing revision.<br />
<a href="http://www.techsupportalert.com/files/images/Outpost-large2.jpg" target="_blank"><strong><img align="left" alt="Outpost Screenshots" height="158" hspace="8" src="http://www.techsupportalert.com/files/images/Outpost-small.jpg" vspace="8" width="200" /></strong></a> <a href="http://www.techsupportalert.com/best-free-firewall.htm#Outpost"><strong>Outpost Firewall Free</strong></a> is a good choice for users who want highly flexible protection without sacrificing usability. It was obviously made with average users in mind, judging by the care taken to simplify alert messages and make it easy to adjust intrusion prevention (or HIPS) monitoring. For example, it remembers your responses to popup alerts without the need to set "trusted" rules (like in Comodo/Online Armor), and like Online Armor it notifies you when it automatically allows an application to access the Internet (especially helpful during the learning phase).<br />
The free version lacks many extras of the pay version, however, such as automatic updates and the ability to break active connections. The HIPS component is called "Host Protection" in the interface. It provides four default levels of protection, which can be easily set with a slider and additionally customized item by item by advanced users. The default "optimal" setting only monitors the "most dangerous activities" (such as memory injections, driver loads, and a healthy list of system critical features -- auto starts, shell extensions, and internet settings) instead of all program activities. But these "optimal" settings lack protection from keyloggers, direct disk accessing, DNS API request monitoring, etc. You can check the types of reduced monitoring in "Settings..." > "Host Protection" > "Customize...".<br />
The installation asks whether you want to train the firewall for a week (using its Auto-Learn mode and Rules Wizard). In this mode, it sets rules automatically for known safe applications.<br />
</td></tr>
</tbody></table>Surenhttp://www.blogger.com/profile/09789784724534128579noreply@blogger.com0tag:blogger.com,1999:blog-5123376846625329520.post-5317699774786909132010-09-07T21:25:00.000+05:302010-09-07T21:25:30.174+05:30<h1>Using Windows Firewall</h1><div class="date"><br />
</div><a href="" name="E2"></a>Microsoft regularly releases improvements to Windows to help keep you protected from constantly changing Internet threats. Windows Firewall is one such improvement, first released as part of Microsoft Windows XP Service Pack 2. If you have <a href="http://www.microsoft.com/windowsxp/using/setup/maintain/autoupdate.mspx">Automatic Updates enabled</a>, Windows Firewall is already protecting you.<br />
Windows Firewall protects your computer by blocking communications that might actually be dangerous software trying to find a way to connect to your computer, rather than communications from a person or program you want to interact with. Windows Firewall is smart enough to allow connections from computers in your home and to block those connections from computers on the Internet. For example, Windows Firewall will allow you to share files or a printer between two computers in your home, but it will block any attempts from people on the Internet to connect to your computer.<br />
You only need to configure Windows Firewall if you are having a problem with a program connecting to the Internet. If you’re not having a problem, simply <a href="http://www.microsoft.com/windowsxp/using/networking/security/winfirewall.mspx#verify">verify that Windows Firewall is enabled on your computer</a>, and enjoy using the Internet knowing that Windows Firewall is helping to protect you. If you are experiencing a problem, you can add a firewall exception for that program to ensure Windows Firewall isn’t causing the problem. <br />
<div style="margin-bottom: 10px; margin-top: 3px;"><a href="http://www.microsoft.com/windowsxp/using/networking/security/winfirewall.mspx#top"><img alt="Top of page" border="0" height="9" src="http://www.microsoft.com/business/templates/MNP2.Common/images/arrow_px_up.gif" width="7" /></a><a class="topOfPage" href="http://www.microsoft.com/windowsxp/using/networking/security/winfirewall.mspx#top">Top of page</a></div><a href="" name="EIB"></a><h2>What Windows Firewall does—and does not—do</h2>Windows Firewall does offer some protection from network attacks from malicious software known as worms. However, Windows Firewall does not protect you from viruses or spyware. For more information about antivirus and antispyware software, read <a href="http://www.microsoft.com/windowsxp/using/networking/security/protect.mspx">Protect your network from viruses and malicious software</a>.<br />
<div id="verify"><div style="margin-bottom: 10px; margin-top: 3px;"><a href="http://www.microsoft.com/windowsxp/using/networking/security/winfirewall.mspx#top"><img alt="Top of page" border="0" height="9" src="http://www.microsoft.com/business/templates/MNP2.Common/images/arrow_px_up.gif" width="7" /></a><a class="topOfPage" href="http://www.microsoft.com/windowsxp/using/networking/security/winfirewall.mspx#top">Top of page</a></div><a href="" name="EPB"></a><h2>Verify that Windows Firewall is enabled</h2><b>To verify that Windows Firewall is protecting your computer</b><br />
<table border="0" cellpadding="0" cellspacing="0" class="numberedList"><tbody>
<tr valign="top"><td align="right" class="listNumber" nowrap="nowrap">1.</td><td> Click <b>Start</b>, and then click <b>Control Panel</b>. <br />
<br />
<img alt="The Start menu with Control Panel selected" border="0" height="524" src="http://www.microsoft.com/library/media/1033/windowsxp/images/using/networking/security/68593-click-control-panel.gif" width="420" /></td></tr>
<tr valign="top"><td align="right" class="listNumber" nowrap="nowrap">2.</td><td> From the <b>Control Panel</b>, click <b>Security Center</b>. <br />
<br />
<img alt="Control Panel with Security Center selected" border="0" height="347" src="http://www.microsoft.com/library/media/1033/windowsxp/images/using/networking/security/68593-click-security-center.gif" width="508" /><br />
<table border="0" cellpadding="0" cellspacing="0"><tbody>
<tr><td class="listBullet" valign="top">•</td><td class="listItem"> If Windows Firewall shows <b>On</b>, you are protected. <br />
<br />
<img alt="Security Center with Windows Firewall turned ON" border="0" height="358" src="http://www.microsoft.com/library/media/1033/windowsxp/images/using/networking/security/68593-windows-firewall-on.gif" width="530" /></td></tr>
<tr><td class="listBullet" valign="top">•</td><td class="listItem"> If Windows Firewall shows <b>OFF</b>, it has been disabled. If you have another firewall installed, this is probably OK. If you don’t have another firewall installed, you will need to re-enable Windows Firewall from within Security Center. </td></tr>
</tbody></table></td></tr>
</tbody></table><b>To re-enable Windows Firewall</b><br />
<table border="0" cellpadding="0" cellspacing="0" class="numberedList"><tbody>
<tr valign="top"><td align="right" class="listNumber" nowrap="nowrap">1.</td><td> Click <b>Recommendations</b>.<br />
<br />
<img alt="Security Center with Windows Firewall turned OFF" border="0" height="398" src="http://www.microsoft.com/library/media/1033/windowsxp/images/using/networking/security/68593-click-recommendations.gif" width="530" /></td></tr>
<tr valign="top"><td align="right" class="listNumber" nowrap="nowrap">2.</td><td> Click <b>Enable Now</b>.<br />
<br />
<img alt="Windows Firewall Recommendation dialog box with Enable now button
selected" border="0" height="404" src="http://www.microsoft.com/library/media/1033/windowsxp/images/using/networking/security/68593-click-enable-now.gif" width="399" /></td></tr>
<tr valign="top"><td align="right" class="listNumber" nowrap="nowrap">3.</td><td> Click <b>Close</b>.<br />
<br />
<img alt="Confirmation that Windows Firewall is enabled" border="0" height="191" src="http://www.microsoft.com/library/media/1033/windowsxp/images/using/networking/security/68593-click-close.gif" width="387" /></td></tr>
<tr valign="top"><td align="right" class="listNumber" nowrap="nowrap">4.</td><td> Click <b>OK</b>.<br />
<br />
<img alt="Windows Firewall Recommendation dialog box with OK button
selected" border="0" height="410" src="http://www.microsoft.com/library/media/1033/windowsxp/images/using/networking/security/68593-click-ok-close-recommendation.gif" width="399" /><br />
<br />
Now Windows Firewall will protect you from many unwanted communications. </td></tr>
</tbody></table></div><div style="margin-bottom: 10px; margin-top: 3px;"><a href="http://www.microsoft.com/windowsxp/using/networking/security/winfirewall.mspx#top"><img alt="Top of page" border="0" height="9" src="http://www.microsoft.com/business/templates/MNP2.Common/images/arrow_px_up.gif" width="7" /></a><a class="topOfPage" href="http://www.microsoft.com/windowsxp/using/networking/security/winfirewall.mspx#top">Top of page</a></div><a href="" name="E1E"></a><h2>Add a Windows Firewall exception </h2>Sometimes Windows Firewall might block a program that you use from connecting to the Internet. If you are experiencing a problem with a program that can’t connect to the Internet, but you are still able to browse the Web (demonstrating that it’s not a general problem with your Internet connection), you can add a Windows Firewall exception for the program that’s having problems. This will allow you to use that program without Windows Firewall blocking it. <br />
<b>To add a Windows Firewall exception</b><br />
<table border="0" cellpadding="0" cellspacing="0" class="numberedList"><tbody>
<tr valign="top"><td align="right" class="listNumber" nowrap="nowrap">1.</td><td> Click <b>Start</b>. Click <b>All Programs</b> and find the program that you want to add an exception for. Then right-click the program and click <b>Properties</b>.<br />
<br />
<img alt="Start menu with All Programs menu expanded" border="0" height="508" src="http://www.microsoft.com/library/media/1033/windowsxp/images/using/networking/security/68593-right-click-program-click-properties.gif" width="453" /></td></tr>
<tr valign="top"><td align="right" class="listNumber" nowrap="nowrap">2.</td><td> On <b>Shortcut</b> tab in the <b>Properties</b> dialog box, right-click the <b>Target</b> box, and then click <b>Copy</b>. This copies the program’s location to your clipboard.<br />
<br />
<img alt="Shortcut tab in Program Properties dialog box" border="0" height="509" src="http://www.microsoft.com/library/media/1033/windowsxp/images/using/networking/security/68593-right-click-target-click-copy.gif" width="367" /></td></tr>
<tr valign="top"><td align="right" class="listNumber" nowrap="nowrap">3.</td><td> Click <b>Cancel</b> to close the <b>Properties</b> dialog box.<br />
<br />
<img alt="Shortcut tab in Program Properties dialog box with Cancel button
selected" border="0" height="517" src="http://www.microsoft.com/library/media/1033/windowsxp/images/using/networking/security/68593-click-cancel.gif" width="367" /></td></tr>
<tr valign="top"><td align="right" class="listNumber" nowrap="nowrap">4.</td><td> Click <b>Start</b>, and then click <b>Control Panel</b>.<br />
<br />
<img alt="The Start menu with Control Panel selected" border="0" height="508" src="http://www.microsoft.com/library/media/1033/windowsxp/images/using/networking/security/68593-click-control-panel-laura.gif" width="420" /></td></tr>
<tr valign="top"><td align="right" class="listNumber" nowrap="nowrap">5.</td><td> From the <b>Control Panel</b>, click <b>Security Center</b>. <br />
<br />
<img alt="Control Panel with Security Center selected" border="0" height="347" src="http://www.microsoft.com/library/media/1033/windowsxp/images/using/networking/security/68593-click-security-center.gif" width="508" /></td></tr>
<tr valign="top"><td align="right" class="listNumber" nowrap="nowrap">6.</td><td> From the <b>Security Center</b>, click <b>Windows Firewall</b>. <br />
<br />
<img alt="Security Center with Windows Firewall selected" border="0" height="260" src="http://www.microsoft.com/library/media/1033/windowsxp/images/using/networking/security/68593-click-windows-firewall.gif" width="530" /></td></tr>
<tr valign="top"><td align="right" class="listNumber" nowrap="nowrap">7.</td><td> On the <b>Exceptions</b> tab, click <b>Add Program</b>. <br />
<br />
<img alt="Exceptions tab in Windows Firewall dialog box" border="0" height="515" src="http://www.microsoft.com/library/media/1033/windowsxp/images/using/networking/security/68593-click-add-program.gif" width="434" /></td></tr>
<tr valign="top"><td align="right" class="listNumber" nowrap="nowrap">8.</td><td> In the <b>Add a Program</b> dialog box, click <b>Browse</b>.<br />
<br />
<img alt="Add a Program dialog box" border="0" height="399" src="http://www.microsoft.com/library/media/1033/windowsxp/images/using/networking/security/68593-click-browse.jpg" width="393" /></td></tr>
<tr valign="top"><td align="right" class="listNumber" nowrap="nowrap">9.</td><td> In the <b>Browse</b> dialog box, right-click the <b>File</b> name box, and then click <b>Paste</b>. <br />
<br />
<img alt="Browse dialog box" border="0" height="419" src="http://www.microsoft.com/library/media/1033/windowsxp/images/using/networking/security/68593-paste-filename.gif" width="563" /></td></tr>
<tr valign="top"><td align="right" class="listNumber" nowrap="nowrap">10.</td><td> Click <b>Open</b>.<br />
<br />
<img alt="Browse dialog box with Open button selected" border="0" height="419" src="http://www.microsoft.com/library/media/1033/windowsxp/images/using/networking/security/68593-click-open.gif" width="563" /></td></tr>
<tr valign="top"><td align="right" class="listNumber" nowrap="nowrap">11.</td><td> Click <b>OK</b>.<br />
<br />
<img alt="Add a Program dialog box with OK button selected" border="0" height="409" src="http://www.microsoft.com/library/media/1033/windowsxp/images/using/networking/security/68593-click-ok-pick-application.gif" width="393" /></td></tr>
<tr valign="top"><td align="right" class="listNumber" nowrap="nowrap">12.</td><td> Windows Firewall adds an exception for your program. Click <b>OK</b> again.<br />
<br />
<img alt="Exceptions tab in Windows Firewall dialog box with OK button
selected" border="0" height="525" src="http://www.microsoft.com/library/media/1033/windowsxp/images/using/networking/security/68593-click-ok-close-windows-firewall.gif" width="434" /></td></tr>
</tbody></table>Now, Windows Firewall will allow your program to communicate with other computers on the Internet.Surenhttp://www.blogger.com/profile/09789784724534128579noreply@blogger.com0tag:blogger.com,1999:blog-5123376846625329520.post-50132837632415961052010-09-07T21:16:00.000+05:302010-09-07T21:16:29.437+05:30<h1 class="title">Probably the Best Free Security List in the World</h1><div class="meta"> <span class="submitted"><br />
<a href="http://www.techsupportalert.com/users/ako" title="View user
profile."></a></span> </div><span class="print-link"></span> <table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title">Introduction</div></td> </tr>
<tr> <td> <em>Motto: Si vis pacem, para bellum</em>.<br />
</td> </tr>
<tr> <td> <table><tbody>
<tr> <td align="center" width="50%"><a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#end"><img alt="" height="76" src="http://www.techsupportalert.com/files/images/ako_Virus.jpg" width="80" /></a></td> <td width="50%"> </td> </tr>
</tbody> </table></td> </tr>
<tr> <td> The products for each category are listed with the best free products first. The products are almost exclusively free with some exceptions: products where there is no free alternative, good products that offer a lifelong license, and exceptional products.<br />
</td> </tr>
<tr> <td> <strong>Please inform me for dead/false links, and give suggestions for new applications with the form located at the end of this list! </strong><a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#end"><br />
</a><br />
<a href="http://tinyurl.com/free-security" title="http://tinyurl.com/free-security"></a><br />
<a href="" name="index"></a><br />
<div class="ad"> <table><tbody>
<tr> <td align="center" colspan="2"> <h2>Index</h2></td> </tr>
<tr> <td valign="top" width="50%"> <ul><li>Realtime protection</li>
<li>Scanners</li>
<li>Tools for virus removal</li>
<li>Online-scanners</li>
<li>Firewalls</li>
<li>HIPS</li>
<li>System hardening-HIPS</li>
<li>System hardening</li>
<li>Sandboxing/virtualization</li>
<li>Vulnerability scanning and updates</li>
<li>Browser security</li>
<li>IP-blocking/hardening</li>
</ul></td> <td valign="top" width="50%"> <ul><li>Privacy</li>
<li>System monitoring</li>
<li>Network traffic monitoring</li>
<li>System cleaning</li>
<li>Data rescue</li>
<li>Encrypting</li>
<li>Backup</li>
<li>System rescue</li>
<li>Miscellaneous</li>
<li>Tests and malware analysis tools</li>
<li>Vista/Windows 7 spesific security</li>
<li>Prisoners on remand</li>
<li>Doing time in jail</li>
</ul></td> </tr>
</tbody> </table></div></td> </tr>
<tr> <td> <strong>Keys:</strong><br />
# <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#choices">My current choice(s)</a> for real-time protection<br />
⇒ <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#cleanup">Good malware detection/removal tool(s)</a><br />
♦ <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#other">Noteworthy product(s)</a><br />
$ Not free<br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a> Supports 64-bit<br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#removal"><img alt="" height="10" src="http://www.techsupportalert.com/files/images/Red-Stop-Sign-With-A-White-Border.jpg" width="10" /></a> Free version only provides malware detection. Removal included in the paid version.<br />
<img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/images3.jpg" width="12" /> Portable version exists.<br />
<br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title"><a href="" name="Realtime_protection">Realtime protection</a></div></td> </tr>
<tr> <td> <b>Anti-virus:</b><a href="http://www.microsoft.com/security_essentials/" target="_blank"><br />
#Microsoft Security Essentials</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://www.avast.com/" target="_blank">Avast!</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://www.free-av.com/" target="_blank">Avira AntiVir</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a> <br />
<a href="http://blog.cloudantivirus.com/" target="_blank">Panda cloudantivirus</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<span style="color: #0066cc;"><a href="http://free.avg.com/us-en/homepage">AVG Anti-Virus</a></span> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://www.returnilvirtualsystem.com/">Returnil with Fprot</a><br />
<a href="http://www.lavasoft.com/products/ad_aware_free.php?t=overview" target="_blank">Ad-Aware</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://pack.google.com/intl/fi/pack_installer.html" target="_blank">Spyware Doctor with antivirus</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://www.pctools.com/free-antivirus/">PC Tools Free AV</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://www.preventon.com/">Preventon</a> <a href="http://www.freerav.com/"><br />
Rising</a><br />
<a href="http://zillya.com/en/zillya_antivirus.html">Zillya</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://www.nanoav.ru/index.php?lang=en">Nano</a><br />
<a href="http://www.softpedia.com/get/Antivirus/Kingsoft-Free-Antivirus.shtml">Kingsoft</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://sourceforge.net/projects/clamsentinel/">Clam Sentinel</a><br />
<a href="http://www.filseclab.com/eng/products/twister.htm">Twister</a> $<br />
<b>Anti-malware (Can be run alongside with an AV):<br />
</b>⇒<a href="http://www.prevx.com/freescan.asp" target="_blank">#Prevx</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#removal"><img alt="" height="10" src="http://www.techsupportalert.com/files/images/Red-Stop-Sign-With-A-White-Border.jpg" width="10" /></a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm" target="_blank"><br />
</a><a href="http://www.immunet.com/main/index.html" target="_blank">Immunet</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://www.clamav.net/lang/en/about/win32/">Clam Antivirus</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><a href="http://www.lavasoftusa.com/products/ad_aware_free.php" target="_blank"><br />
</a><a href="http://www.rising-global.com/products/rising-pc-doctor.html" target="_blank">Rising PC doctor</a><br />
<a href="http://www.orbitech.org/index.php">Hazard Shield</a> <br />
<a href="http://www.microsoft.com/athome/security/spyware/software/default.mspx" target="_blank">Windows Defender</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<b>Security suite (anti-virus, anti-malware and firewall):<br />
</b><a href="http://www.comodo.com/products/free_products.html" target="_blank">Comodo </a><a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><a href="http://www.comodo.com/products/free_products.html" target="_blank"><br />
</a><a href="http://www.forticlient.com/download.html" target="_blank">Forticlient</a> <br />
<strong>AV/AM trials:</strong><a href="http://www.systweakantispyware.com/" target="_blank"><br />
</a><a href="http://www.emsisoft.com/en/software/antimalware/">Emsisoft</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a> (works as scanner after trial period)<br />
<a href="http://www.kaspersky.com/trials">Kaspersky</a><br />
<a href="http://www.avira.com/en/products/test_license_2.html">Avira</a><br />
<a href="http://www.eset.com/download/free-trial/international">Nod32</a><br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#index"><img alt="Back to Index" height="20" src="http://www.techsupportalert.com/files/images/arrow-blue-rounded-left.jpg" title="Back to Index" width="20" /></a><br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title"><a href="" name="Scanners__on-demand_"></a>Scanners</div></td> </tr>
<tr> <td> <b>AV-Scanners:<br />
</b>⇒<a href="http://www.surfright.nl/en/hitmanpro" target="_blank">Hitman Pro</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://housecall.trendmicro.com/" target="_blank">Trendmicro</a><a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><a href="http://www.softpedia.com/get/Antivirus/Kaspersky-Virus-Removal-Tool.shtml" target="_blank"><br />
Kaspersky<br />
</a><a href="http://security.symantec.com/sscv6/WelcomePage.asp">Norton Security Scan</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#removal"><img alt="" height="10" src="http://www.techsupportalert.com/files/images/Red-Stop-Sign-With-A-White-Border.jpg" width="10" /></a><a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><br />
</a><a href="http://www.bitdefender.com/site/Downloads/" target="_blank">Bitdefender free</a><br />
<a href="http://www.escanav.com/english/content/products/MWAV/escan_mwav.asp" target="_blank">MWAV</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://bugbopper.com/">Wuzzup</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#removal"><img alt="" height="10" src="http://www.techsupportalert.com/files/images/Red-Stop-Sign-With-A-White-Border.jpg" width="10" /><br />
</a><a href="http://www.anti-virus.by/en/vba32check.shtml">VBA32check</a><br />
<a href="http://www.emsisoft.com/en/software/malaware/">MalAware</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#removal"><img alt="" height="10" src="http://www.techsupportalert.com/files/images/Red-Stop-Sign-With-A-White-Border.jpg" width="10" /></a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://www.online-armor.com/cloudscan.php">Online Armor Cloudscanner</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#removal"><img alt="" height="10" src="http://www.techsupportalert.com/files/images/Red-Stop-Sign-With-A-White-Border.jpg" width="10" /></a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://www.sophos.com/products/free-tools/sophos-threat-detection-test.html" target="_blank">Sophos Threat Detection Test</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#removal"><img alt="" height="10" src="http://www.techsupportalert.com/files/images/Red-Stop-Sign-With-A-White-Border.jpg" width="10" /></a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><a href="http://pack.google.com/" target="_blank"><br />
</a><a href="http://www.clamwin.com/" target="_blank">ClamWin</a> <br />
<a href="http://www.comodo.com/home/internet-security/cloud-scanner.php">Comodo cloud scanner</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#removal"><img alt="" height="10" src="http://www.techsupportalert.com/files/images/Red-Stop-Sign-With-A-White-Border.jpg" width="10" /></a><br />
<b>Anti-malware scanners:</b><br />
⇒<a href="http://www.malwarebytes.org/mbam.php" target="_blank">Malwarebytes Anti-Malware</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://www.superantispyware.com/" target="_blank">Superantispyware</a><br />
<a href="http://www.novirusthanks.org/products/novirusthanks-malware-remover/">NoVirusThanks</a><br />
<a href="http://download.cnet.com/Webroot-Spy-Sweeper/3000-8022_4-10192729.html" target="_blank">Spy Sweeper</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#removal"><img alt="" height="10" src="http://www.techsupportalert.com/files/images/Red-Stop-Sign-With-A-White-Border.jpg" width="10" /></a><br />
<a href="http://www.pctools.com/spyware-doctor/" target="_blank">Spyware Doctor</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#removal"><img alt="" height="10" src="http://www.techsupportalert.com/files/images/Red-Stop-Sign-With-A-White-Border.jpg" width="10" /></a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><a href="http://www.systweakantispyware.com/" target="_blank"><br />
</a><a href="http://www.spy-emergency.com/">Spy-Emergency</a><a href="http://www.pestpatrol.com/" target="_blank"><br />
CA antispyware</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#removal"><img alt="" height="10" src="http://www.techsupportalert.com/files/images/Red-Stop-Sign-With-A-White-Border.jpg" width="10" /></a><br />
<a href="http://www.safer-networking.org/" target="_blank">Spybot S&D</a> <strong><br />
</strong><br />
<img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/images3.jpg" width="12" /> <strong><a href="" name="portable"></a></strong><b>Portable antivirus/antimalware:</b> <br />
<a href="http://www.freedrweb.com/cureit/" target="_blank">⇒</a><a href="http://www.freedrweb.com/cureit/" target="_blank">DrWeb cureit</a> <a href="http://www.emsisoft.com/en/software/download/" target="_blank"><br />
</a><a href="http://www.emsisoft.com/en/software/download/" target="_blank">Emsisoft Emergency USB Stick files <img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /><br />
</a><a href="http://www.superantispyware.com/portablescanner.html">Superantispyware</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://live.sunbeltsoftware.com/" target="_blank">VIPRE Rescue</a> <br />
<a href="http://www.z-oleg.com/" target="_blank"><span style="color: #2e719e;">AVZ</span></a> <a href="http://z-oleg[dot]com/secur/avz_up/avzbase.zip" target="_blank">AVZ database</a><a href="http://www.norman.com/Virus/Virus_removal_tools/en" target="_blank"><br />
Norman malware cleaner</a> <br />
<a href="http://downloadcenter.trendmicro.com/index.php?regs=NABU&clk=latest&clkval=353&lang_loc=1" target="_blank">Trendmicro Sysclean</a> <br />
<a href="http://portableapps.com/apps/utilities/clamwin_portable" target="_blank">ClamWin portable</a><b> </b><br />
<b>Multi-AV scanners:</b><br />
<a href="http://www.raymond.cc/blog/archives/2009/05/25/multiple-antivirus-software-on-windows-computer/" target="_blank">Multi-AV scan</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://freeware--software.blogspot.com/p/antivirusmulti.html">Antivirusmulti</a><br />
<b>AV Rescue CD:</b><br />
⇒<a href="http://www.free-av.com/en/tools/12/avira_antivir_rescue_system.html" target="_blank">Avira</a><a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><a href="http://www.free-av.com/en/tools/12/avira_antivir_rescue_system.html" target="_blank"><br />
</a><a href="http://www.raymond.cc/blog/archives/2010/08/09/run-kaspersky-rescue-disk-10-from-usb-flash-drive/">Kaspersky</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><a href="http://www.free-av.com/en/tools/12/avira_antivir_rescue_system.html" target="_blank"><br />
</a><a href="http://www.f-secure.com/linux-weblog/2008/06/19/f-secure-rescue-cd-300-released/" target="_blank">F-Secure</a> <br />
<a href="http://download.cnet.com/Panda-SafeCD/3000-2239_4-10967336.html?tag=mncol">Panda</a><br />
<a href="http://download.bitdefender.com/rescue_cd/" target="_blank">BitDefender</a><br />
<a href="http://www.freedrweb.com/livecd" target="_blank">DrWeb</a><br />
<a href="https://www.gdatasoftware.co.uk/support/main-subjects/upgrade-service/download.html">GData</a> <br />
<a href="http://www.avg.com/us-en/avg-rescue-cd">AVG</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://www.raymond.cc/blog/archives/2008/12/11/13-antivirus-rescue-cds-software-compared-in-search-for-the-best-rescue-disk/" target="_blank">more</a> <br />
<strong>Integrate several rescue disks:</strong><br />
<a href="http://www.raymond.cc/blog/archives/2009/08/31/integrate-multiple-antivirus-rescue-disk-into-one-single-disc-or-usb-flash-drive-with-sardu/" target="_blank">Sardu<br />
</a><br />
<b>Anti-rootkit:</b><br />
<a href="http://www.gmer.net/" target="_blank">Gmer</a> <a href="http://forum.eviloctal.com/attachment.php?aid=12949"><br />
</a><a href="http://www.at4re.com/">Kernel Detective</a><br />
<a href="http://rootrepeal.googlepages.com/" target="_blank">RootRepeal</a><br />
<a href="http://www[dot]rootkit.com/vault/DiabloNova/RkU3.8.386.588.rar">Rootkit Unhooker</a><br />
<a href="http://securityxploded.com/spydllremover.php">SpyDllRemover</a><a href="http://forum.eviloctal.com/attachment.php?aid=12949"><br />
XueTr</a><br />
<a href="http://www.anti-virus.by/en/vba32arkit.shtml">VBA anti-rootkit</a><br />
<a href="http://www.sophos.com/products/free-tools/sophos-anti-rootkit.html">Sophos</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://www.resplendence.com/sanity_features.htm">Sanity check </a><a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><a href="http://www.resplendence.com/sanity_features.htm"><br />
</a><a href="http://www2.gmer.net/mbr/" target="_blank">Gmer: mbr-rootkit</a> <br />
<a href="http://www2.gmer.net/catchme.htm">Gmer: catchme</a> (user-mode)<br />
<a href="http://www.ubcd4win.com/forum/index.php?showtopic=2424" target="_blank">Rootkitty</a> (boot cd)<br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#ss">Other</a><br />
<strong><br />
</strong><a href="http://www.kernelmode.info/forum/index.php" linkindex="325"></a><br />
<b>Memory scanner:</b><br />
<a href="http://www.threatexpert.com/memoryscanner.aspx" target="_blank">Threatexpert memoryscanner</a><br />
<a href="http://www.xdelbox.com/superrkill-com-1-0-release/">SuperRKill</a><br />
<a href="http://www.brighthub.com/computing/smb-security/articles/59807.aspx">Rkill</a><br />
<b>AV/AM definition files:</b><br />
<a href="http://www.softpedia.com/progDownload/Avira-Antivir-Virus-Definition-File-Update-Download-82517.html" target="_blank">Avira<br />
</a><a href="http://www[dot]malwarebytes[dot]org/mbam/database/mbam-rules.exe"><span>Malwarebytes Antimalware</span></a><a href="http://www.softpedia.com/progDownload/Avira-Antivir-Virus-Definition-File-Update-Download-82517.html" target="_blank"><br />
</a><a href="http://www.superantispyware.com/definitions.html">Superantispyware</a><br />
<a href="http://www.avast.com/download-update">Avast</a><br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#index"><img alt="Back to Index" height="20" src="http://www.techsupportalert.com/files/images/arrow-blue-rounded-left.jpg" title="Back to Index" width="20" /></a><br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title"><a href="" name="Tools_for_virus_removal"></a>Tools for virus removal</div></td> </tr>
<tr> <td> <b>Tools for most common viruses:</b><br />
<a href="http://www.f-secure.com/en_EMEA/security/security-center/easy-clean/index.html" target="_blank">F-secure easyclean</a><br />
<a href="http://vil.nai.com/vil/stinger/" target="_blank">McAfee Stinger</a> <br />
<a href="http://www.microsoft.com/security/malwareremove/default.mspx" target="_blank">MS Malicious Software Removal Tool</a> <br />
<a href="http://www.avira.com/en/support/antivir_removal_tool.html" target="_blank">Avira AntiVir Removal Tool</a><br />
<b>Tools for stubborn malware:</b><br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#cleanup"><strong>My procedure</strong></a><br />
<a href="http://security.symantec.com/nbrt/overview.asp?lcid=1033&origin=default">Norton Power Eraser</a><br />
<a href="http://www.bleepingcomputer.com/combofix/how-to-use-combofix" target="_blank">Combofix</a><br />
<a href="http://www.bleepingcomputer.com/files/smitfraudfix.php">Smitfraudfix</a><br />
<a href="http://www.bytehero.com/english.asp">Bytehero</a><br />
<a href="http://www.safereturner.com/index.html">SafeReturner</a><br />
<b>Removal tools for specific viruses:</b><br />
<a href="http://www.bitdefender.com/site/Download/brow...alTool/" target="_blank">BitDefender</a><br />
<a href="http://www.kaspersky.com/removaltools" target="_blank">Kaspersky</a><br />
<a href="http://www.f-secure.com/download-purchase/tools.shtml1" target="_blank">F-Secure</a><br />
<a href="http://www.symantec.com/avcenter/tools.list.html" target="_blank">Symantec</a><br />
<a href="http://www.pandasoftware.com/download/utilities/" target="_blank">Panda Software</a><br />
<b>Collection of anti-malware tools:<br />
</b><a href="http://www.lunarsoft.net/news/lunarsoft/336-anti-malware-toolkit-103125">Anti-malware toolkit</a><a href="http://www.malwareinfo.org/"><br />
</a><br />
<strong>Additional AV-spesific tools</strong><br />
<a href="http://www.avira.com/en/support/support_downloads.html">Avira</a><br />
<b>Guides for malware removal:</b><br />
<a href="http://forums.majorgeeks.com/showthread.php?t=35407" target="_blank">MajorGeeks</a><br />
<a href="http://remove-malware.com/uncategorized/how-to-remove-malware-from-windows-vista-or-windows-7-64-bit-edition/">Clean 64-bit machine</a><br />
<a href="http://www.michaelhorowitz.com/removespyware.html">Michael Horowitz</a><br />
<a href="http://pcophinas.blogspot.com/">Pcophinas</a><br />
<br />
<strong>Malware removal help sites:</strong><br />
<a href="http://www.bleepingcomputer.com/">Bleepingcomputer</a><br />
<a href="http://www.malwareremoval.com/">Malwareremoval</a><br />
<a href="http://www.dslreports.com/">Dslreports</a><br />
<a href="http://www.atribune.org/" target="_blank">Atribune</a><br />
<a href="http://www.malwareremoval.com/" target="_blank">Malware Removal</a><br />
<a href="http://freeofvirus.blogspot.com/">Remove fake antivirus</a><br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#index"><img alt="Back to Index" height="20" src="http://www.techsupportalert.com/files/images/arrow-blue-rounded-left.jpg" title="Back to Index" width="20" /></a><br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title"><a href="" name="Online-scanners"></a>Online-scanners</div></td> </tr>
<tr> <td> <b>File scanning with several scanners:</b><br />
<a href="http://www.virustotal.com/" target="_blank">Virustotal</a> (<a href="http://www.virustotal.com/advanced.html#uploader">♦Uploader</a>)<br />
<a href="http://scanner.novirusthanks.org/" target="_blank">Novirusthanks</a> (<a href="http://www.novirusthanks.org/products/novirusthanks-uploader/">Uploader</a>)<br />
<a href="http://virusscan.jotti.org/" target="_blank">Jotti</a><br />
<a href="http://virscan.org/" target="_blank">Virscan</a><br />
<a href="http://www.filterbit.com/" target="_blank">Filterbit</a><br />
<a href="http://www.viruschief.com/" target="_blank">Viruschief</a><br />
<strong>Scanning of several zipped files:</strong><br />
<a href="http://analysis.avira.com/samples/index.php">Avira</a><br />
<b>Online-scanners:</b><br />
<a href="http://www.kaspersky.com/kos/eng/partner/default/kavwebscan.html">Kaspersky</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#removal"><img alt="" height="10" src="http://www.techsupportalert.com/files/images/Red-Stop-Sign-With-A-White-Border.jpg" width="10" /></a><a href="http://support.f-secure.com/enu/home/ols.shtml" target="_blank"><br />
F-Secure</a> <br />
<a href="http://www.bitdefender.com/scan8/ie.html" target="_blank">BitDefender</a><br />
<a href="http://qscan.bitdefender.com/" target="_blank">BitDefender qscan</a> <br />
<a href="http://www.eset.com/onlinescan/" target="_blank">Eset</a> <br />
<a href="http://www.pandasoftware.com/products/activescan" target="_blank">Panda Software</a> <br />
<a href="http://www.emsisoft.com/en/software/ax/" target="_blank">a-squared</a><br />
<a href="http://safety.live.com/" target="_blank">OneCare<br />
</a><a href="http://www.superantispyware.com/onlinescan.html">Superantispyware</a><br />
<a href="http://home.mcafee.com/Downloads/FreeScan.aspx" target="_blank">Mcafee</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#removal"><img alt="" height="10" src="http://www.techsupportalert.com/files/images/Red-Stop-Sign-With-A-White-Border.jpg" width="10" /></a><br />
<a href="http://www3.ca.com/securityadvisor/virusinfo/scan.aspx" target="_blank">CA</a><br />
<a href="http://www.personalfirewall.comodo.com/scan/avscanner.html" target="_blank">Comodo</a><a href="http://global.ahnlab.com/global/products/myv3.html"><br />
</a><br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#index"><img alt="Back to Index" height="20" src="http://www.techsupportalert.com/files/images/arrow-blue-rounded-left.jpg" title="Back to Index" width="20" /></a><br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title"><a href="" name="Firewalls"></a>Firewalls</div></td> </tr>
<tr> <td> <b>Limited versions of commercial firewalls:</b><br />
<a href="http://free.agnitum.com/" target="_blank">Outpost</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://www.tallemu.com/free-firewall-protection-software.html" target="_blank">Online Armor</a><br />
<a href="http://www.zonealarm.com/store/content/catalog/products/sku_list_za.jsp?dc=34std&ctry=FI&lang=fi" target="_blank">Zonealarm</a> <br />
<a href="http://www.sunbelt-software.com/Home-Home-Office/Sunbelt-Personal-Firewall/" target="_blank">Sunbelt Kerio</a><br />
<b>free Firewalls:</b><br />
<a href="http://personalfirewall.comodo.com/" target="_blank">Comodo</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://www.pctools.com/firewall/download/" target="_blank">PCTools</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://www.privacyware.com/" target="_blank">Privatefirewall</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://www.jetico.com/download.htm" target="_blank">Jetico</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://www.iolo.com/fw/1/purchaseinfo.aspx">Iolo</a><br />
<a href="http://www.download32.com/sygate-personal-firewall-i57133.html">Sygate</a><br />
<a href="http://www.webroot.com/En_US/consumer-products-desktopfirewall.html" target="_blank">Webroot</a> <br />
<a href="http://www.netveda.com/downloads/index.htm" target="_blank">NetVeda Safety.Net</a> <br />
<a href="http://www2.ashampoo.com/webcache/html/1/product_2_0050__.htm" target="_blank">Ashampoo</a> <br />
<a href="http://www.filseclab.com/eng/products/firewall.htm" target="_blank">Filseclab</a><br />
<b>Simple firewall:</b><br />
<a href="http://www.ghostsecurity.com/ghostwall/" target="_blank">Ghostwall</a><br />
<strong>Windows firewall:</strong><a href="http://netsecurity.about.com/od/securingwindowsxp/qt/aaqtwinfirewall.htm"><br />
XP firewall guide</a> <br />
<a href="http://www.wilderssecurity.com/showthread.php?t=218517" target="_blank">Configuring XP firewall</a><br />
<a href="http://www.wilderssecurity.com/showthread.php?t=239750" target="_blank">Vista firewall guide</a><br />
<a href="http://www.sphinx-soft.com/Vista/order.html" target="_blank">Vista firewall control</a><br />
<a href="http://www.sphinx-soft.com/Vista/order.html" target="_blank">Windows 7 firewall control</a><br />
<a href="http://support.microsoft.com/gp/windows_firewall_diagnostic">Diagnose and fix Windows Firewall service problems</a><br />
<a href="http://www.sphinx-soft.com/Vista/order.html" target="_blank"><br />
</a><b>Gateways:<br />
</b><a href="http://www.endian.com/en/community/download/">Endian</a><br />
<a href="http://www.untangle.com/home" target="_blank">Untangle<br />
</a><a href="http://www.smoothwall.org/">Smoothwall</a><br />
<b><strong>Replacement for router firmware:<br />
</strong></b><a href="http://www.polarcloud.com/tomato">Tomato</a><br />
<a href="http://www.dd-wrt.com/site/index">DD-WRT</a><b><a href="http://www.dd-wrt.com/site/index"><br />
</a></b><br />
<b>About NAT routers and hardware firewalls:</b><br />
<a href="http://www.grc.com/lt/hardware.htm" target="_blank">article 1</a><br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#index"><img alt="Back to Index" height="20" src="http://www.techsupportalert.com/files/images/arrow-blue-rounded-left.jpg" title="Back to Index" width="20" /></a><br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title"><a href="" name="HIPS"></a>HIPS</div></td> </tr>
<tr> <td> <b>Behaviour blocker:</b><br />
<a href="http://www.threatfire.com/" target="_blank">ThreatFire</a><br />
<b>Classical strong HIPS:</b><br />
<a href="http://dl[dot]360safe.com/md_setup_en.exe">Malware Defender</a> (<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#direct_link">note</a>)<br />
<a href="http://www.comodo.com/products/free_products.html" target="_blank">Comodo defence+ </a><a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://www.spywareterminator.com/" target="_blank">Spyware Terminator</a><br />
<a href="http://rapidshare.com/files/138669859/RTDPro_Setup.exe" target="_blank">Real time defender</a> <br />
<a href="http://download.pchome.net/system/systemsafety/download-89185.html" target="_blank">EqSecure 3.41</a>, <a href="http://drop.io/eqsecure" target="_blank">(Alcyon ruleset)</a> <br />
<a href="http://download.cnet.com/System-Safety-Monitor-Free-Edition/3000-2098_4-10556556.html" target="_blank">System Safety Monitor</a> <a href="http://www.torchsoft.com/en/md_information.html" target="_blank"><br />
</a><br />
<b>Classical lightweight HIPS:</b><br />
<a href="http://www.winpatrol.com/" target="_blank">#</a><a href="http://www.ubcd4win.com/" target="_blank">⇒</a><a href="http://www.winpatrol.com/" target="_blank">Winpatrol</a> <br />
<a href="http://www.usec.at/ushields.html" target="_blank">System shields</a> <br />
<a href="http://www.arovaxshield.com/" target="_blank">Arovax Shield</a> (XP,V)<br />
<b>Anti-keylogger:</b><br />
<a href="http://spyshelter.com/">SpyShelter</a><br />
<a href="http://www.quaresso.com/">Quaresso</a><br />
<a href="http://www.encassa.com/default.aspx">CoDefender</a><br />
<a href="http://www.snoopfree.com/" target="_blank">Snoopfree</a><br />
<a href="http://www.maxsecuritylab.com/dataguard-anti-keylogger/download-anti-keyloger.php" target="_blank">DataGuard AntiKeylogger</a><br />
<a href="http://dewasoft.com/privacy/kldetector.htm" target="_blank">KL-detector</a><br />
<a href="http://psmantikeyloger.sourceforge.net/prod01.htm" target="_blank">PSMA</a><br />
<a href="http://www.zemana.com/" target="_blank">Zemana</a> $<br />
<b>Registry protection:</b><br />
<a href="http://www.jacobsm.com/mjsoft.htm" target="_blank">MJ Registry Watcher</a><br />
<b>Anti-executable:</b><br />
<a href="http://www.onlinedown.com/detail/19995.htm#download" target="_blank">Process Guard</a> (XP)<br />
<a href="http://www.beyondlogic.org/solutions/trust-no-exe/trust-no-exe.htm" target="_blank">Trust-no-exe</a><br />
<a href="http://digilander.libero.it/zancart/winsonar.html" target="_blank">Winsonar</a><br />
<a href="http://www.faronics.com/en/Products/AntiExecutable/AntiExecutableCorporate.aspx">Faronics</a> $<br />
<b>White/blacklisting anti-executable:</b><br />
<a href="https://www.bluepointsecurity.com/support" target="_blank">Bluepoint security</a> $<br />
<b>Drive firewall:</b><br />
<a href="http://www.drivesentry.com/AntiVirus-download-free-Firewall-products-for-computers.html#" target="_blank">DriveSentry</a><br />
<a href="http://download.cnet.com/SensiveGuard/3000-10435_4-10448989.html" target="_blank">SensiveGuard</a> <br />
<a href="http://force.coresecurity.com/index.php?module=base&page=download" target="_blank">CoreForce</a><a href="http://www.softpedia.com/get/Antivirus/PE-GUARD.shtml"><br />
PE Guard</a> $<br />
<b>File/Folder Monitoring Software:</b><br />
<a href="http://www.donationcoders.com/kubicle/watcher/" target="_blank">Tiny Watcher</a> <br />
<a href="http://www.brothersoft.com/silentnight-inspector-33441.html" target="_blank">SilentNight Inspector</a> <br />
<a href="http://www.javacoolsoftware.com/filechecker.html" target="_blank">FileChecker</a> <br />
<a href="http://www.softpedia.com/get/System/System-Miscellaneous/FileMap-by-BB.shtml" target="_blank">FileMap by BB</a><br />
<a href="http://osiris.shmoo.com/index.html">Osiris</a><br />
<a href="http://venussoftcorporation.blogspot.com/2010/05/thefolderspy.html">TheFolderSpy</a><br />
<b>Anti Dialer:</b><br />
<a href="http://www.emsisoft.com/en/software/antidialer/" target="_blank">A-Squared Anti Dialer</a><br />
<a href="http://www.usec.at/ushields.html" target="_blank">Dialer shields </a><br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#index"><img alt="Back to Index" height="20" src="http://www.techsupportalert.com/files/images/arrow-blue-rounded-left.jpg" title="Back to Index" width="20" /></a><br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title"><a href="" name="System_hardening-HIPS"></a>System hardening-HIPS</div></td> </tr>
<tr> <td> <b>System & Program Files Protection:</b><br />
<a href="http://www.system-protect.com/" target="_blank">System Protect</a><br />
<a href="http://www.thewindowsclub.com/prevent-cut-paste-copy-delete-re-naming-of-files-folders"><br />
</a><strong>Prevent other users deleting files/folders</strong>:<br />
<a href="http://www.thewindowsclub.com/prevent-cut-paste-copy-delete-re-naming-of-files-folders">Prevent</a><br />
<strong>MBR protection:</strong><br />
<a href="http://www.blueridgenetworks.com/support/mbguard/mbguard.php">MBRguard</a><br />
<b>Memory firewall:</b><br />
<a href="http://www.snapfiles.com/get/memoryfirewall.html" target="_blank">Comodo memory firewall</a><br />
<b>Address space randomization:</b><br />
<a href="http://www.codeplex.com/wehntrust" target="_blank">WehnTrust </a><br />
<b>USB-firewall:</b><br />
<a href="http://sourceforge.net/projects/noautorun/">No Autorun</a><br />
<a href="http://www.malwareinfo.org/">USB protect</a><br />
<a href="http://www.net-studio.org/application/usb_firewall.php" target="_blank">Net Studio USB FireWall</a><br />
<a href="http://nunobrito.eu/ninja/">Ninja Pendisk!</a> <br />
<a href="http://oldmcdonald.wordpress.com/">Autorun Eater</a><br />
<a href="http://www.mxone.net/en/">MxOne</a><br />
<a href="http://www.gaijin.at/dlusbwp.php">USB WriteProtector</a><br />
<a href="http://download.cnet.com/USB-Drive-Antivirus/3000-2239_4-10841283.html">USB Drive Antivirus</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#removal"><img alt="" height="10" src="http://www.techsupportalert.com/files/images/Red-Stop-Sign-With-A-White-Border.jpg" width="10" /></a><br />
<a href="http://www.jonnysblog.com/2009/02/27/10-usb-flash-drive-freeware-programs/">more</a><br />
<strong>Shutdown prevention:</strong><br />
<a href="http://code.google.com/p/shutdownguard/">Shutdownguard</a><br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#index"><img alt="Back to Index" height="20" src="http://www.techsupportalert.com/files/images/arrow-blue-rounded-left.jpg" title="Back to Index" width="20" /></a><br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title"><a href="" name="System_hardening"></a>System hardening</div></td> </tr>
<tr> <td> <b>Guides for securing your PC:</b><br />
<a href="http://www.wilderssecurity.com/showthread.php?t=252253">BlueZanetti</a><br />
<a href="http://www.us-cert.gov/cas/tips/">Cyber Security Tips</a><br />
<a href="http://realsecurity.web.officelive.com/default.aspx">Real security</a><br />
<a href="http://www.techsupportalert.com/safe-surfing.php#c">installing and using DropMyRights</a><br />
<a href="http://antivirus.about.com/od/securitytips/ht/autorun.htm" target="_blank">disabling autorun </a>(XP)<br />
<a href="http://antivirus.about.com/od/securitytips/ht/vista_autorun.htm" target="_blank">disabling autorun</a> (V)<br />
<b>Limited user account (LUA)</b>:<br />
<a href="http://www.helpwithwindows.com/WindowsVista/lua.html" target="_blank"># Vista, 7<br />
</a><a href="http://www.pcruneasy.com/tutorials/windows-xp/user-account/account-type.php">XP</a><br />
<strong>More secure browser:</strong><strong><br />
</strong><a href="http://www.srware.net/en/software_srware_iron.php">Iron</a><br />
<a href="http://www.chromeplus.org/">CromePlus</a><a href="http://www.google.com/chrome"><br />
</a><a href="http://www.comodo.com/home/internet-security/browser.php">Comodo Dragon</a><br />
<a href="http://www.google.com/chrome">Google Chrome</a><br />
<a href="http://www.mozilla.org/">Firefox</a><br />
<a href="http://www.epicbrowser.com/">Epic</a><br />
<a href="http://www.opera.com/">Opera</a><br />
<a href="http://code.google.com/intl/fi-FI/chrome/chromeframe/">Google Chrome Frame</a><br />
<strong>More secure pdf-reader:</strong><br />
<a href="http://www.foxitsoftware.com/pdf/reader/">Foxit</a><br />
<a href="http://blog.kowalczyk.info/software/sumatrapdf/index.html">Sumatra</a><br />
<strong>More secure media player:</strong><br />
<a href="http://download.pandora.tv/?mode=kmp&tab=1">KMPlayer</a><br />
<strong>More secure image viewer:</strong><br />
<a href="http://www.irfanview.com/">Irfanview</a><br />
<a href="http://picasaweb.google.com/home">Picasa</a><br />
<b>Hardening tools:</b><br />
<a href="http://vispa.whyeye.org/">Vispa</a><br />
<a href="http://blogs.technet.com/b/srd/archive/2010/09/02/enhanced-mitigation-experience-toolkit-emet-v2-0-0.aspx">Enhanced Mitigation Experience Toolkit </a><br />
<a href="http://invincible-windows.blogspot.com/" target="_blank">Invincible Windows</a><br />
<a href="http://www.sniff-em.com/hardenit.shtml" target="_blank">Harden-It</a> <br />
<a href="http://www.sniff-em.com/secureit.shtml" target="_blank">Secure-It</a> <br />
<a href="http://www.theorica.net/safexp.htm" target="_blank">SafeXP</a> <br />
<a href="http://www.xp-antispy.org/" target="_blank">XPantispy</a> <br />
<a href="http://sourceforge.net/projects/cmia/" target="_blank">Security & Privacy Complete</a><br />
<a href="http://www.softpedia.com/get/Security/Security-Related/Seconfig-XP.shtml" target="_blank">Seconfig XP</a><br />
<a href="http://www.turbotramp.fre3.com/" target="_blank">Samurai</a> <br />
<a href="http://www.softpedia.com/get/Security/Firewall/Windows-Worms-Doors-Cleaner.shtml" target="_blank">Windows Worms Doors Cleaner</a><br />
<b>USB-autorun disabling</b>:<br />
<a href="http://research.pandasecurity.com/archive/Panda-USB-and-AutoRun-Vaccine.aspx" target="_blank">Panda USB and AutoRun Vaccine</a><br />
<a href="http://www.myantispyware.com/2009/01/08/flash-disinfector-free-autoruninf-trojans-removal-tool/" target="_blank">Flash disinfector</a><br />
<a href="http://www.brothersoft.com/thumbscrew-276741.html">Thumbscrew<br />
</a><br />
<b>Script-file protection:</b><br />
<a href="http://www.analogx.com/CONTENTS/download/system/sdefend.htm" target="_blank">Script Defender</a> <br />
<a href="http://keir.net/scriptrap.html" target="_blank">ScripTrap</a><br />
<b>Protection against scripts embedded on web pages:</b><br />
<a href="http://noscript.net/" target="_blank">No Script</a><br />
<b>Protection against flash embedded on web pages:</b><br />
<a href="http://flashblock.mozdev.org/" target="_blank">Flash block</a><br />
<a href="http://blitzableiter.recurity.com/projects/show/blitzableiter">Blitzableiter<br />
</a><br />
<b>SRP (Software Restriction Policy):</b><br />
<a href="http://www.mechbgon.com/srp/" target="_blank">instructions 1</a> <br />
<a href="http://www.wilderssecurity.com/showthread.php?t=196737" target="_blank">instructions 2</a> <br />
<a href="http://mrwoojoo.com/PGS/PGS_index.htm" target="_blank">PGS - Pretty Good Security</a><br />
<b>Adding user rights:</b><br />
<a href="http://sourceforge.net/projects/sudowin/" target="_blank">Sudo for windows</a> <br />
<a href="http://sudown.sourceforge.net/" target="_blank">suDown</a><br />
<b>Limiting user rights:</b><br />
<a href="http://kay-bruns.de/wp/software/surun/" target="_blank">SuRun</a><br />
<strong>Hardening processes:</strong><br />
<a href="http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=4a2346ac-b772-4d40-a750-9046542f343d">Microsoft EMET</a><br />
<strong>Improved Group Policy Editor:<br />
</strong><a href="http://www.dougknox.com/xp/utils/xp_securityconsole.htm">Doug's Windows XP Security Console</a><br />
<b>Running program with dropped rights:</b> <br />
<a href="http://www.mentalis.org/soft/projects/droprights/" target="_blank">DropMyRights.net</a><br />
<a href="http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx" target="_blank">PsExec</a> <br />
<a href="http://www.download.com/StripMyRights/3000-2092_4-10486002.html" target="_blank">StripMyRights</a><br />
<a href="http://download.cnet.com/Amust-1-Defender/3000-12512_4-10479187.html" target="_blank">1-defender</a><br />
<strong>Hardware-based security:</strong><br />
<a href="http://www.grc.com/securable.htm" target="_blank">Determine Processor Security Features</a><br />
<strong>Protection against .LNK vulnerability:</strong><br />
<a href="http://www.greatis.com/security/shortcut_antivirus.html">Shortcut Antivirus</a><br />
<a href="http://blog.bkis.com/en/a-tool-to-detect-all-viruses-taking-advantage-of-lnk-vulnerability/">.LNK checker</a><br />
<a href="http://www.sophos.com/products/free-tools/sophos-windows-shortcut-exploit-protection-tool.html">Sophos</a><br />
<strong><br />
<strong>Protection against </strong>DLL preloading remote attack:</strong><br />
<a href="http://blogs.technet.com/b/srd/">Microsoft</a><br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#index"><img alt="Back to Index" height="20" src="http://www.techsupportalert.com/files/images/arrow-blue-rounded-left.jpg" title="Back to Index" width="20" /></a><br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title"><a href="" name="Sandboxing-virtualization"></a>Sandboxing-virtualization</div></td> </tr>
<tr> <td> <b>Sandboxing (for browsers/IM/etc):</b><br />
<a href="http://www.sandboxie.com/" target="_blank">#Sandboxie</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://www.gentlesecurity.com/" target="_blank">GeSWall</a> <br />
<a href="http://www.trustware.com/">Bufferzone</a><br />
<a href="http://www.blueridgenetworks.com/forms/es_register.php">EdgeGuard Solo</a><br />
<a href="http://www.artificialdynamics.com/content/products/register-personal.aspx" target="_blank">Safespace</a> <br />
<a href="http://www.wilderssecurity.com/showthread.php?t=256660">RTD Smart</a><br />
<a href="http://www.softsphere.com/" target="_blank">#Defensewall</a> $<br />
<a href="http://www.blueridgenetworks.com/products/appguard.php" target="_blank">AppGuard</a> $<br />
<a href="http://www.appranger.com/">AppRanger</a> $<br />
<b>System virtualization:</b><br />
<a href="http://www.returnilvirtualsystem.com/" target="_blank">Returnil</a> <br />
<a href="http://www.tucows.com/preview/400832" target="_blank">Powershadow 2.6</a> (<a href="http://www.wilderssecurity.com/showthread.php?t=161735" target="_blank">Key</a>) <br />
<a href="http://download.cnet.com/VirtualProtect/3000-8022_4-10902410.html" target="_blank">Virtual Protect</a> <br />
<a href="http://www[dot]system-tools-software.com/time-freeze/index.html">Wondershare time freeze</a><br />
<a href="http://www.shadowdefender.com/" target="_blank">Shadow Defender</a> $<br />
<b>Rollback software:</b><br />
<a href="http://www.comodo.com/home/data-storage-encryption/data-recovery.php">Comodo time machine</a><br />
<a href="http://www.rollbacksoftware.com/" target="_blank">Rollback Rx</a> $<br />
<a href="http://www.horizondatasys.com/253715.ihtml" target="_blank">Firstdefence-ISR</a> $<br />
<a href="http://www.eazsolution.com/" target="_blank">Eaz-fix</a> $<br />
<strong>Locked system <strong>:</strong></strong><br />
<a href="http://www.microsoft.com/windows/products/winfamily/sharedaccess/default.mspx" target="_blank">Windows Steadystate</a> (XP,V)<br />
<a href="http://www.faronics.com/en/Products/DeepFreeze/DeepFreezeCorporate.aspx">Faronics Deep Freeze</a> $<br />
<b>Desktop virtualization:</b><br />
<a href="http://www.mojopac.com/" target="_blank">Mojopac</a><br />
<a href="http://icoresoftware.com/" target="_blank">Icore</a><br />
<a href="http://www.ceedo.com/">Ceedo</a> $<br />
<b>Virtual players:</b><br />
<a href="http://www.vmware.com/products/player/" target="_blank">VmWare player, </a><a href="http://www.vmware.com/products/converter/faqs.html" target="_blank">VmWare converter, </a><a href="http://www.easyvmx.com/supersimple.shtml" target="_blank">EasyVMX converter</a><br />
<a href="http://www.moka5.com/" target="_blank">moka5 live PC + Fearless Browser</a><br />
<b>Virtualization software:</b><br />
<a href="http://www.vmware.com/products/server/" target="_blank">VMWare</a><br />
<a href="http://www.virtualbox.org/" target="_blank">VirtualBox</a><br />
<a href="http://www.microsoft.com/windows/downloads/virtualpc/default.mspx" target="_blank">VirtualPC</a><br />
<a href="http://www.vmlite.com/">VMLite</a><br />
<a href="http://vmtoolkit.com/" target="_blank">VMToolkit</a><br />
<b>Virtualized browser:</b><br />
<a href="http://www.pentest.es/inmunos.php" target="_blank">Inmunos</a><br />
<img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/images3.jpg" width="12" /> <b>Portable OS:</b><br />
<a href="http://portableubuntu.demonccc.com.ar/" target="_blank">Ubuntu linux</a><br />
<strong>Linux live CD:</strong><br />
<a href="http://www.linuxmint.com/">LinuxMint</a><br />
<a href="http://www.puppylinux.com/">Puppy</a><br />
<a href="http://www.mepis.org/">Simply Mepis</a><br />
<a href="http://www.slax.org/">Slax</a><br />
<a href="http://www.ubuntu.com/">Ubuntu</a><br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#index"><img alt="Back to Index" height="20" src="http://www.techsupportalert.com/files/images/arrow-blue-rounded-left.jpg" title="Back to Index" width="20" /></a><br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title"><a href="" name="Vulnerability_scanning"></a>Vulnerability scanning and updates</div></td> </tr>
<tr> <td> <b>Windows-system security analyzing:</b><br />
<a href="http://www.rapid7.com/vulnerability-scanner.jsp">NeXpose Community Edition</a><br />
<a href="http://www.microsoft.com/technet/security/tools/mbsahome.mspx" target="_blank">MS Baseline Security Analyzer</a> <br />
<a href="http://www.nessus.org/nessus/" target="_blank">Nessus</a> <br />
<a href="http://www.belarc.com/free_download.html" target="_blank">Belarc Advisor</a><br />
<a href="http://www.pspl.com/download/winvulscan.htm" target="_blank">Protector Plus</a><br />
<a href="http://www.nirsoft.net/utils/wul.html">WinUpdatesList</a><br />
<b>Windows-system security analyzing (OS+installed programs):</b><br />
<a href="http://secunia.com/software_inspector/" target="_blank">♦Secunia</a> <br />
<a href="http://www.f-secure.com/en_US/security/security-center/health-check/" target="_blank">F-secure health check</a><br />
<b>Updates for installed programs:</b><br />
several <a href="http://www.techsupportalert.com/best-free-software-update-monitor.htm" target="_blank">here</a><br />
<b>Updates from Microsoft:</b><br />
<a href="http://www.shavlik.com/downloads.aspx" target="_blank">Shavlik Patch Google® Gadget</a><br />
<a href="http://www.ryanvm.net/msfn/updatepack-sp2.html" target="_blank">Ryan VM's pack</a><br />
<a href="http://ketarin.canneverbe.com/">Keep set-up packages up-to-date</a><br />
<b>Searching for drivers:</b><br />
<a href="http://www.devicedoctor.com/">Device Doctor</a><br />
Several <a href="http://www.raymond.cc/blog/archives/2009/03/10/search-for-working-xp-drivers-after-downgrading-from-vista/" target="_blank">here</a> and <a href="http://www.raymond.cc/blog/archives/2010/05/04/unknown-devices-vs-unknown-device-identifier-finding-devices-and-drivers/">here<br />
</a><br />
<b>CD With All Current Drivers for Windows:</b><br />
<a href="http://www.raymond.cc/blog/archives/2009/08/14/dvd-with-all-hardware-device-drivers-for-windows-xp-vista-and-7/" target="_blank">DriverPack Solution 9</a><br />
<a href="http://www.raymond.cc/blog/archives/2010/05/18/3dp-net-auto-detects-and-installs-network-adapter-driver/"><span>Many here</span></a><br />
<b>Package for most important media addons:</b><br />
<a href="http://www.sereby.org/index.php?cat=downloads&show=7&pwd=" target="_blank">All in One Runtimes</a><br />
<strong>Check website vulnerabilities:</strong><br />
<a href="http://www.zerodayscan.com/">Zerodayscan</a><br />
<strong>Penetration testing:</strong><br />
<a href="http://www.metasploit.com/">Metasploit Framework</a><br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#index"><img alt="Back to Index" height="20" src="http://www.techsupportalert.com/files/images/arrow-blue-rounded-left.jpg" title="Back to Index" width="20" /></a><br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title"><a href="" name="Browser_security"></a>Browser security</div></td> </tr>
<tr> <td> <b>Anti-phishing/malware browser plugins:</b><br />
<a href="http://www.mywot.com/fi/download/ff" target="_blank">♦WOT</a> <br />
<a href="http://www.webutation.org/">Webutation</a><br />
<a href="https://addons.mozilla.org/en-US/firefox/search?q=LinkExtend&cat=all" target="_blank">LinkExtend</a> <br />
<a href="http://www.siteadvisor.com/" target="_blank">McAfee Siteadvisor</a> <br />
<a href="http://www.browserdefender.com/" target="_blank">PcTools Browserdefender</a><br />
<a href="http://www.symantec.com/norton/beta/overview.jsp?pvid=safeweblite">Norton Safeweb</a><br />
<a href="http://www.surfcanyon.com/index.jsp">Surfcanyon</a><br />
<a href="http://toolbar.netcraft.com/" target="_blank">Netcraft toolbar</a> <br />
<a href="http://www.bitdefender.com/PRODUCT-2237-en--BitDefender-Anti-Phishing-Free-Edition.html" target="_blank">Bitdefender anti-phishing</a> <br />
<a href="http://www.firetrust.com/en/products/sitehound" target="_blank">Sitehound</a> <br />
<a href="http://www.websecurityguard.com/" target="_blank">Web Security Guard</a> <br />
<a href="http://www.trendsecure.com/portal/en-US/tools/security_tools/trendprotect" target="_blank">TrendProtect</a><br />
<a href="http://www.comodo.com/products/free_products.html" target="_blank">Comodo Verification Engine</a><br />
<b>Real-time link scanning:</b><br />
<a href="http://www.microsoft.com/security/filters/smartscreen.aspx">SmartScreen Filter</a> (IE)<a href="http://linkscanner.avg.com/" target="_blank"><br />
AVG Linkscanner</a> <br />
<a href="http://securebrowsing.finjan.com/index.html" target="_blank">Finjan SecureBrowsing<br />
</a><a href="http://www.qualys.com/forms/trials/stopmalware/">Qualys</a><br />
<b>Manual link scanning:</b><br />
<a href="http://www.virustotal.com/advanced.html#browser-addons">♦VTzilla</a><br />
<a href="http://www.urlvoid.com/">UrlVoid</a><br />
<a href="http://www.ipvoid.com/">IPVoid</a><br />
<a href="http://www.webutation.org/">Webutation<br />
</a><a href="http://linkscanner.explabs.com/linkscanner/default.asp" target="_blank">LinkScanner</a> <br />
<a href="http://www.freedrweb.com/browser/" target="_blank">Dr.Web plug-in</a><br />
<a href="http://www.unmaskparasites.com/">Unmask Parasites</a><br />
<a href="http://onlinelinkscan.com/">Online link scan</a><br />
<a href="http://vurl.mysteryfcm.co.uk/">vURL</a><br />
<a href="http://safeweb.norton.com/">Norton</a><br />
<a href="http://www.finjan.com/Content.aspx?id=574">Finjan</a><br />
<a href="http://www.avg.com.au/resources/web-page-scanner/">AVG</a><br />
<a href="http://vms.drweb.com/online/?lng=en">DrWeb</a><br />
<a href="http://reclassify.wrs.trendmicro.com/">TrendMicro</a><br />
<strong>Prevent Blackhat Search Engine Optimization:</strong><br />
<a href="http://www.zscaler.com/researchtools.html">Zscaler<br />
</a><a href="http://www.zscaler.com/researchtools.html"><br />
</a> <strong>Check the web trader:</strong><br />
<a href="http://www.theshoppingassistant.com/">Shopping assistant</a><br />
<b>Anti-phishing Firefox plugins:</b><br />
<a href="https://addons.mozilla.org/en-US/firefox/addon/621" target="_blank">IDND</a> <br />
<a href="https://addons.mozilla.org/fi/firefox/addon/590" target="_blank">ShowIP</a><br />
<strong>Check real URL:</strong><br />
<a href="https://addons.mozilla.org/en-US/firefox/addon/10297">bit.ly preview</a> <br />
<a href="http://untiny.com/">Untiny url</a><br />
<a href="http://www.trueurl.net/service/">TrueURL</a><br />
<a href="http://www.expandmyurl.com/">expandmyurl</a><br />
<a href="http://www.longurlplease.com/">longurlplease</a><br />
<b>Ad blocking:</b><br />
<a href="https://addons.mozilla.org/fi/firefox/addon/1865" target="_blank">♦Adblock Plus</a> <a href="http://adblockplus.org/en/subscriptions" target="_blank">(blocklists</a>)<br />
<a href="http://adsweep.org/">Adsweep</a><br />
<a href="http://simple-adblock.com/about/">Simple-adblock</a><br />
<a href="https://addons.mozilla.org/en-US/firefox/addon/11073" target="_blank">TACO</a> <br />
<a href="http://adblockie.codeplex.com/">AdblockIE</a><br />
<a href="https://chrome.google.com/extensions/search?q=adblock">Adblocking for Chrome</a><br />
<a href="http://www.admuncher.com/" target="_blank">Ad Muncher</a> $<br />
<b>Pop-up blockers:</b><br />
<a href="http://www.panicware.com/product_downloads.html" target="_blank">PanicWare Pop-Up Stopper</a> <br />
<a href="http://www.emsproject.com/" target="_blank">EMS Free Surfer</a><br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#index"><img alt="Back to Index" height="20" src="http://www.techsupportalert.com/files/images/arrow-blue-rounded-left.jpg" title="Back to Index" width="20" /></a><br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title"><a href="" name="IP-blocking_hardening"></a>IP-blocking/hardening</div></td> </tr>
<tr> <td> <strong>Blocking connections to malware domains:</strong><br />
<a href="http://free.antivirus.com/web-protection-add-on/">Trend Micro Web Protection Add-On</a><br />
<b>Blacklists for Explorer:</b><br />
<a href="http://www.javacoolsoftware.com/spywareblaster.html" target="_blank">Spyware Blaster</a><br />
<b>Internet proxy+blacklist:</b> <br />
<a href="http://www.squidguard.org/" target="_blank">SquidGuard</a><br />
<b>Host File management:</b><br />
<a href="http://www.abelhadigital.com/" target="_blank">Hostsman</a> <br />
<a href="http://www.funkytoad.com/index.php?option=com_content&id=13" target="_blank">HostsXpert</a> <br />
<a href="http://www.bluetack.co.uk/forums/index.php?autocom=faq&CODE=02&qid=16" target="_blank">B.I.S.S. Host Manager</a><br />
<b>Host files (blocking malware and advertisements):</b><br />
<a href="http://hostsfile.mine.nu/downloads/" target="_blank">Hostfile</a> <br />
<a href="http://www.hosts-file.net/" target="_blank">Hosts</a> <br />
<a href="http://www.mvps.org/winhelp2002/hosts.htm" target="_blank">Mvps</a><br />
<b>Other IP-block lists:</b><br />
<a href="http://www.calendarofupdates.com/updates/index.php?autocom=downloads&showfile=29" target="_blank">CoU IP blocklist updater</a> (Outpost firewall, Online Armor)<br />
<b>Caching/filtering and blocking pseudo-DNS server:</b><br />
<a href="http://accs-net.com/hosts/DNSKong.html" target="_blank">DNSKong</a><br />
<b>Internal proxies:</b><br />
<a href="http://web.archive.org/web/20060107132848/http://www.jd5000.net/proxo/" target="_blank">Proxomitron + JD list</a> <br />
<a href="http://sidki.proxfilter.net/prox-news.html">Sidki's Proxomitron config</a><br />
<a href="http://en.idnwebshield.com/" target="_blank">IdnWebShield</a><br />
<a href="http://bfilter.sourceforge.net/">BFilter</a><br />
<a href="http://www.pps.jussieu.fr/%7Ejch/software/polipo/">Polipo</a><br />
<b>External proxies:</b><br />
<a href="http://www.freecap.ru/eng/" target="_blank">Freecap</a> <br />
<a href="http://soft.softoogle.com/ap/sockscap-download-5157.shtml" target="_blank">Socscap</a><br />
<b>Better DNS:<br />
</b><a href="http://forums.clearclouddns.com/default.aspx">Sunbelt ClearCloud</a><br />
<a href="http://www.opendns.com/" target="_blank">OpenDNS</a><br />
<a href="http://nortondns.com/">NortonDNS</a><br />
<a href="http://www.comodo.com/secure-dns/" target="_blank">Comodo DNS</a><br />
<a href="http://code.google.com/intl/fi/speed/public-dns/">Google DNS</a><br />
<a href="http://www.scrubit.com/">ScrubIT</a><br />
<a href="http://www.dyndns.com/">DynDNS</a><br />
<strong>local DNS proxy:</strong><br />
<a href="http://mayakron.altervista.org/support/browse.php?path=Acrylic&name=Home">Acrylic</a><br />
<b>IP-blocking:</b><br />
<a href="http://www.peerblock.com/">Peerblock</a><br />
<a href="http://phoenixlabs.org/pg2/" target="_blank">PeerGuardian 2</a><br />
<b>Parental control:</b><br />
<a href="http://yknot.terapad.com/index.cfm?fa=contentGeneric.qmqsbnjhpjbleuia&pageId=300570" target="_blank">Kidzui</a><br />
<a href="http://www1.k9webprotection.com/" target="_blank">K9 Web Protection</a><br />
<a href="http://www.parentalcontrolbar.org/" target="_blank">Parentalcontrolbar</a><br />
<a href="http://www.glubble.com/" target="_blank">Glubble</a> <br />
<a href="http://www.gogostat.com/">GoGoStat</a> (Facebook)<br />
<b>Spam filters</b><br />
<a href="http://spamassassin.apache.org/index.html" target="_blank">SpamAssassin</a> <br />
<a href="http://spambayes.sourceforge.net/" target="_blank">SpamBayes</a> <br />
<a href="http://www.spamcop.net/" target="_blank">SpamCop</a> <br />
<a href="http://www.spamihilator.com/" target="_blank">Spamihilator</a> <br />
<a href="http://www.spamfighter.com/" target="_blank">SPAMfighter</a> <br />
<a href="http://www.comodoantispam.com/" target="_blank">Comodo Antispam</a> <br />
<a href="http://www.mailwasher.net/" target="_blank">Mailwasher</a> <br />
<a href="http://eontech.com/spammgr/" target="_blank">Spam Manager</a><br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#index"><img alt="Back to Index" height="20" src="http://www.techsupportalert.com/files/images/arrow-blue-rounded-left.jpg" title="Back to Index" width="20" /></a><br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title"><a href="" name="Privacy"></a>Privacy</div></td> </tr>
<tr> <td> <strong>Facebook privacy:</strong><br />
<a href="http://www.reclaimprivacy.org/facebook">ReclaimPrivacy</a><br />
<a href="http://www.rabidgremlin.com/fbprivacy/">Privacy Check</a><br />
<a href="http://youropenbook.org/">Openbook</a><br />
<a href="http://zesty.ca/facebook/">Zesty</a><br />
<strong>Chat privacy:</strong><br />
<a href="http://www.bitdefender.com/PRODUCT-2236-en--BitDefender-Chat-Encryption.html:doubt:">Bitdefender chat encryption</a><br />
<strong>Search engines with high privacy:</strong><br />
<a href="http://www.ixquick.com/">ixquick</a><br />
<strong>Eliminate ad-data tracking:</strong><br />
<a href="http://www.privacychoice.org/whos_watching">Privacychoice</a><br />
<strong>Fake identity generator:</strong><br />
<a href="http://www.fakenamegenerator.com/">Fakenamegenerator</a><br />
<strong>A</strong><strong>nonymity tests:</strong><br />
<a href="http://deanonymizer.com/" target="_blank">deanonymizer</a><br />
<a href="https://xerobank.com/tools/anonymity-checker/">XeroBank</a><br />
<a href="http://www.decloak.net/" target="_blank">Decloak</a> <br />
<b><br />
Checking your own ip:</b><br />
<a href="http://www.showmyip.com/" target="_blank">Show My IP</a><br />
<a href="http://www.ip-adress.com/" target="_blank">IP Adress</a><br />
<a href="http://www.danasoft.com/">Danasoft</a><br />
<b>Checking your DNS:</b><br />
<a href="http://www.cyberciti.biz/faq/how-to-find-out-what-my-dns-servers-address-is/">Check DNS-settings</a><br />
<a href="http://homeofficeforum.ca.com/homeofficeforum/attachment.php?attachmentid=9&d=1226684292"><span>How malware hijacks DNS</span></a><br />
<b>Collection of tools:</b><br />
<a href="http://anoniem-surfen.eigenstart.nl/" target="_blank">Anoniem-surfen</a><br />
<a href="http://epic.org/privacy/tools.html#other">EPIC</a><br />
<b>Free VPN connection:</b><br />
<a href="https://accounts.comodo.com/trustconnectfree/management/signup">Comodo Trust Connect</a> <a href="https://accounts.comodo.com/account/login">login page</a> <a href="http://forums.comodo.com/comodo-trustconnect-ctc/you-wanted-trustconnect-and-wanted-it-for-freewell-t45831.0.html">info</a> <a href="http://www.comodo.com/trustconnect/">info2</a><br />
<a href="http://www.raymond.cc/blog/archives/2008/02/16/stay-private-and-secure-online-with-hotspot-shield/" target="_blank">Hotspot shield</a> <br />
<a href="http://www.ultravpn.fr/" target="_blank">UltraVPN</a> <br />
<a href="http://www.projectloki.com/" target="_blank">Loki</a><br />
<a href="http://itshidden.com/">It's Hidden</a><br />
<b>Free online proxy:</b><br />
<a href="http://xerosurf.com/">Xerosurf</a><br />
<a href="http://proxify.com/" target="_blank">Proxify</a><br />
<a href="https://www.vtunnel.com/">Vtunnel</a> <br />
<a href="http://anonymouse.org/anonwww.html">Anonymouse</a><br />
<a href="http://www.ninjacloak.com/" target="_blank">Ninjacloak</a> <br />
<a href="http://www.pimpmyip.org/">PimpMyIP</a><br />
<a href="http://www.zend2.com/" target="_blank">Zend2</a> <br />
<a href="http://www.proxybrowsing.com/" target="_blank">Proxybrowsing</a> <br />
more <a href="http://proxy.org/">here</a><br />
<strong>SSH and SFTP client:</strong><br />
<a href="http://www.bitvise.com/tunnelier">Tunnelier</a><br />
<a href="http://winscp.net/eng/index.php">WinSCP<br />
</a><a href="http://filezilla-project.org/index.php">FileZilla</a><br />
<b>Anonymous browsers:</b><br />
<a href="https://anonymous-proxy-servers.net/en/jondofox">Jondofox</a><br />
<a href="http://xerobank.com/tools/anonymity-checker/">XeroBank</a> <a href="http://archetwist.com/opera/operator" target="_blank"><br />
</a><br />
<b>Anonymous browsing tools:</b><br />
<a href="http://www.ultrareach.com/">Ultrasurf</a><br />
<a href="http://foxyproxy.mozdev.org/" target="_blank">Foxyproxy</a> <br />
<a href="http://www.torproject.org/" target="_blank">Tor</a> <br />
<a href="http://anon.inf.tu-dresden.de/index_en.html" target="_blank">JAP</a><br />
<b>Spoofing mac address:</b><br />
<a href="http://www.gorlani.com/publicprj/macmakeup/macmakeup.asp" target="_blank">Macmakeup</a> <br />
<a href="http://devices.natetrue.com/macshift/" target="_blank">Macshift</a><br />
<b>Cookie-control:</b><br />
<a href="https://addons.mozilla.org/en-US/firefox/addon/5207" target="_blank">♦CS lite</a> <br />
<a href="https://addons.mozilla.org/fi/firefox/addon/4703" target="_blank">Cookie monster</a> <br />
<a href="https://addons.mozilla.org/fi/firefox/addon/2497" target="_blank">CookieSafe</a> <br />
<a href="https://addons.mozilla.org/en-US/firefox/addon/82" target="_blank">Cookie culler</a> <br />
<a href="http://www.maxa-tools.com/cookiedown.htm" target="_blank">Maxa</a> <br />
<a href="http://foxyproxy.mozdev.org/" target="_blank"><br />
</a><b>LSO killing:</b><br />
<a href="https://addons.mozilla.org/en-US/firefox/addon/6623" target="_blank">BetterPrivacy</a><br />
<a href="http://objection.mozdev.org/" target="_blank">Objection</a><br />
<b>Key scrambling:</b><br />
<a href="http://download.cnet.com/KeyScrambler-Personal/3000-2144_4-10571274.html" target="_blank">#KeyScrambler Personal</a><br />
<a href="http://www.maxsecuritylab.com/nextgen-anti-keylogger/download-anti-keyloger.php">NextGen Antikeylogger</a><br />
<b>Virtual keyboard:</b><br />
<a href="http://www.trendsecure.com/portal/en-US/tools/security_tools/transaction_guard" target="_blank">Trendmicro Transaction Guard</a><br />
<a href="http://www.aplin.com.au/?page_id=246" target="_blank">Neo's safekeys</a><br />
<strong>Safeguarding banking session:</strong><br />
<strong><span><a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#bank">My banking advice</a></span></strong><br />
<a href="http://www.prevx.com/">#Prevx SafeOnline</a> (<a href="http://www.facebook.com/pages/Prevx-SafeOnline/254680228961?v=info&_fb_noscript=1">free here</a>)<br />
<a href="http://consumers.trusteer.com/learn">Trusteer Rapport</a><br />
<a href="http://www.idvault.com/">ID Vault</a><br />
<b>Password management:</b><br />
<a href="https://lastpass.com/" target="_blank">Lastpass</a> <br />
<a href="http://passwordmaker.org/" target="_blank">Passwordmaker</a> <br />
<a href="http://passwordsafe.sourceforge.net/" target="_blank">Password Safe</a> <br />
<a href="http://www.roboform.com/fi/" target="_blank">RoboForm</a> <br />
<a href="http://keepass.info/" target="_blank">Keepass</a> <br />
<a href="http://www.anypassword.com/" target="_blank">Any password</a><br />
<a href="https://addons.mozilla.org/en-US/firefox/search?q=Secure+Login&cat=all" target="_blank">Secure login</a><br />
<a href="http://www.roboform.com/pass2go.html" target="_blank">RoboForm2Go</a> <img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/images3.jpg" width="12" /><br />
<strong>Generating secure passwords:</strong><br />
<a href="https://www.passwordcard.org/">Password Cards</a><br />
<a href="https://www.grc.com/ppp.htm">GRC</a><br />
<b>E-mail encryption:</b><br />
<a href="http://www.pgpi.org/products/pgp/versions/freeware/" target="_blank">PGPFreeware</a><br />
<a href="http://www.comodo.com/products/free_products.html" target="_blank">Comodo SecureEmail</a><br />
<a href="http://www.gpg4win.org/">Gpg4win</a><br />
<b>VPN sofware:</b><br />
<a href="https://secure.logmein.com/products/hamachi/vpn.asp?lang=fi" target="_blank">Logmein Hamachi</a> <br />
<a href="http://www.comodo.com/products/free_products.html" target="_blank">Comodo EasyVPN</a><br />
<b>Browsing without a trace:</b><br />
<a href="http://portableapps.com/apps/internet/firefox_portable" target="_blank">Portable Firefox</a> <img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/images3.jpg" width="12" /><br />
<a href="http://www.browzar.com/" target="_blank">Browzar</a><br />
<strong>Removal of jpeg metadata: <br />
</strong><a href="http://www.steelbytes.com/?mid=30">JPEG and PNG stripper</a><br />
<a href="http://davidcrowell.com/jstrip/">jScript</a> <br />
<a href="http://www.digitalconfidence.com/downloads.html">BatchPurifier LITE</a> <br />
<strong>Removal of doc metadata: </strong><br />
<a href="http://www.javacoolsoftware.com/docscrubber.html#Overview">Doc Scrubber</a><br />
<b>Automatic analyzing of EULA:</b><br />
<a href="http://www.javacoolsoftware.com/eulalyzer.html" target="_blank">Eulalyzer</a> <br />
<a href="http://www.spywareguide.com/analyze/index.php" target="_blank">Spywareguide</a><b><br />
</b><br />
<strong>Other:</strong><br />
<a href="http://tools.google.com/dlpage/gaoptout">Google Analytics Opt-out Browser Add-on</a> <br />
<a href="https://www.google.com/">SSL-protected Google</a><br />
<a href="http://www.cs.cmu.edu/%7Eperspectives/firefox.html#install" target="_blank">Secure HTTPS server: Perspectives</a> <br />
<a href="https://addons.mozilla.org/en-US/firefox/addon/953" target="_blank">Referrer control</a> <br />
<a href="https://addons.mozilla.org/en-US/firefox/search?q=Ghostery&cat=all" target="_blank">Detection of web bugs:Ghostery</a> <br />
<a href="http://kyps.net/home/" target="_blank">Service for one-time passwords: KYPS</a><br />
<a href="https://addons.mozilla.org/en-US/firefox/addon/3173" target="_blank">Protection against search data profiling: Trackmenot </a><br />
<a href="https://www.eff.org/https-everywhere">HTTPS-everywhere</a><br />
<a href="http://vpnlive.net/">VPNLive - collection of proxy and VPN </a><br />
<a href="https://addons.mozilla.org/de/firefox/addon/177549/">Secure search engine connection</a><br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#index"><img alt="Back to Index" height="20" src="http://www.techsupportalert.com/files/images/arrow-blue-rounded-left.jpg" title="Back to Index" width="20" /></a><br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title"><a href="" name="System_monitoring"></a>System monitoring</div></td> </tr>
<tr> <td> <b>System monitoring and diagnostic:</b><br />
<a href="http://systemexplorer.mistergroup.org/">System Explorer</a><br />
<a href="http://www.gtopala.com/" target="_blank">System info for Windows (SIW)</a> <br />
<a href="http://www.whatsrunning.net/whatsrunning/main.aspx" target="_blank">What's Running</a> <br />
<a href="http://support.microsoft.com/kb/924732" target="_blank">Change Analysis Diagnostic tool</a><br />
<a href="http://www.majorgeeks.com/download4181.html" target="_blank">EVEREST Home Edition</a><br />
<a href="http://www.anvir.com/taskmanagerfree/" target="_blank">Anvir task manager</a><br />
<a href="http://www.freshdevices.com/freshdiag.html">Fresh Diagnose</a><br />
<a href="http://www.resplendence.com/downloads">Multimon</a><br />
<a href="http://www.novirusthanks.org/products/hijack-hunter/">Hijack Hunter</a><br />
<strong>Hardware monitoring and diagnostics:</strong><br />
<a href="http://www.cpuid.com/pcwizard.php" target="_blank">PC Wizard</a> <br />
<a href="http://www.sisoftware.net/">Sisoft Sandra lite</a><br />
<a href="http://crystalmark.info/?lang=en">Crystalmark</a><br />
<a href="http://www.mkn-software.de/en/software/desktop/perfmon/">MKN PerformanceMonitor</a><br />
<strong>Hardware, network and software inventory: <br />
</strong><a href="http://www.lansweeper.com/">Lansweeper</a><br />
<a href="http://crystalmark.info/?lang=en"><br />
</a><b>Process/startup/etc scanners:</b><br />
<a href="http://technet.microsoft.com/en-us/sysinternals/bb896653.aspx" target="_blank">ProcessExplorer</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://dimio.altervista.org/eng/">DTaskManager</a><br />
<a href="http://sites.google.com/site/glintutility/">Glint</a><br />
<a href="http://processhacker.sourceforge.net/" target="_blank">Process Hacker</a><a href="http://www.raymond.cc/blog/archives/2009/03/25/check-for-recently-created-or-modified-files-and-installed-software/" target="_blank"><br />
</a><a href="http://www.nictasoft.com/products/autorun-angel/">Autorun Angel</a><br />
<a href="http://technet.microsoft.com/en-us/sysinternals/bb963902.aspx" target="_blank">Autoruns</a> <br />
<a href="http://www.silentrunners.org/" target="_blank">Silent runners</a> <br />
<a href="http://www.runscanner.net/" target="_blank">Run Scanner</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://www.mlin.net/StartupCPL.shtml">Startup control panel</a><br />
<a href="http://privacyroot.com/software/STGU-info.php">Startup Guard</a><a href="http://www.misec.net/products/autostartexplorer/"><br />
Autostart Explorer<br />
</a><a href="http://www.tizersecure.com/about_Tizer_SysScan_Computer_Scan.php">Tizer</a><br />
<a href="http://ezpcfix.net/">Ez-PC-fix</a><br />
<a href="http://www.antiy.net/freetools/atool.htm">Atool</a><br />
<b>Process/startup/etc scanners with analyzing help:</b><br />
<a href="http://www.eset.com/download/sysinspector.php" target="_blank">Eset SysInspector</a><a href="http://images[dot]malwareremoval[dot]com/random/RSIT.exe"><span> </span></a><a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><a href="http://images[dot]malwareremoval[dot]com/random/RSIT.exe"><br />
<span> RSIT</span></a> (<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#direct_link">note</a>)<br />
<a href="http://www.kztechs.com/eng/index.html" target="_blank">Sreng</a><br />
<a href="http://www.trendsecure.com/portal/en-US/tools/security_tools/hijackthis" target="_blank">HijackThis</a> (<a href="http://hijackthis.de/" target="_blank">help</a>)<br />
<a href="http://www.freefixer.com/">FreeFixer</a> <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#64"><img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/icon_64.png" width="10" /></a><br />
<a href="http://www.novirusthanks.org/products/hijack-hunter/">Hijack Hunter</a><br />
<a href="http://www.hijackfree.com/en/" target="_blank">a2 HiJackFree</a><br />
<a href="http://www.silentrunners.org/http://www.raymond.cc/blog/archives/2009/06/22/detect-incompatible-software-malware-infection-and-program-errors-with-kaspersky-gsi/" target="_blank">Kaspersky GSI</a> <br />
<a href="http://www.neuber.com/taskmanager/" target="_blank">Security Task Manager</a> <br />
<a href="http://www.safer-networking.org/en/runalyzer/index.html" target="_blank">Runalyzer</a> <br />
<a href="http://dart.bit9.com/" target="_blank">Dart Bit</a><br />
<a href="http://www.online-solutions.ru/en/products/osam-autorun-manager.html">OSAM Autorun manager</a><br />
<a href="http://www.nictasoft.com/products/autorun-angel/">Autorun Angel</a><br />
<a href="http://www.processlibrary.com/quicklink/">ProcessQuickLink</a><br />
<b>Realtime process monitoring:</b><br />
<a href="http://download.sysinternals.com/Files/ProcessMonitor.zip" target="_blank">Process monitor</a><br />
<a href="http://www.nirsoft.net/utils/process_activity_view.html">ProcessActivityView</a><br />
<a href="http://www.lcibrossolutions.com/spyme_tools.htm">SpyMeTools</a><br />
<strong>Monitor file system activity:</strong><br />
<a href="http://www.malwareinfo.org/">Malware Activity Watcher</a><br />
<strong>Monitor hard disk activity:<br />
</strong><a href="http://www.itsth.com/en/produkte/Whats-my-computer-doing.php">What's my computer doing?</a><br />
<strong>Monitor hard disk health:<br />
</strong><a href="http://www.acronis.com/homecomputing/download/drive-monitor/">Acronis Drive Monitor</a><br />
<strong>Monitor memory:<br />
</strong><a href="http://www.mkn-software.de/en/software/desktop/memmon/">MKN MemoryMonitor </a><br />
<strong>Monitor USB-activity:</strong><br />
<a href="http://www.nirsoft.net/utils/usb_devices_view.html">USBDeview </a><br />
<a href="http://www.malwareinfo.org/">USB activity monitor</a><br />
<strong>Monitor registry and file changes:</strong><br />
<a href="http://sourceforge.net/projects/regshot/">RegShot</a><br />
<a href="http://www.lcibrossolutions.com/spyme_tools.htm">SpyMeTools</a><br />
<a href="http://www.nirsoft.net/utils/reg_file_from_application.html">RegFromApp</a><br />
<a href="http://www.epsilonsquared.com/installwatch.htm">Installwatch</a><br />
<a href="http://www.2brightsparks.com/freeware/">InstallSpy</a><br />
<a href="http://www.kephyr.com/systemsherlocklite/index.phtml">SystemSherlock</a><br />
<a href="http://www.softpedia.com/get/System/File-Management/NT-Filemonitor.shtml">NT Filemonitor</a><br />
<strong>Detect packed drivers:</strong><br />
<a href="http://www.misec.net/forum/board/PDD/1267402246">Mischel Packed Driver Detector</a><br />
<b>Searching files and processes:</b><br />
<a href="http://www.fileresearchcenter.com/" target="_blank">fileresearchcenter</a><br />
<a href="http://www.processlibrary.com/" target="_blank">processlibrary</a><br />
<a href="http://fileadvisor.bit9.com/services/search.aspx" target="_blank">Bit9 fileadvisor</a><br />
<a href="http://isc.sans.org/tools/hashsearch.html">Sans institute</a><br />
<strong>File Type Inspector:</strong><br />
<a href="http://mark0.net/soft-trid-e.html">TrID</a><br />
<strong>Executable Inspection:</strong><br />
<a href="http://www.peid.info/http://www.peid.info/">PEiD</a><br />
<a href="http://www.mandiant.com/products/free_software/red_curtain/">Mandiant red curtain</a><br />
<b>Checksum calculation:</b><br />
<a href="http://beeblebrox.org/hashtab/" target="_blank">♦Hashtab<br />
</a><a href="http://www.md5summer.org/" target="_blank">Md5summer</a> <br />
<a href="http://www.slavasoft.com/hashcalc/index.htm" target="_blank">Hashcalc</a> <br />
<a href="http://sourceforge.net/projects/fileverifier/" target="_blank">FileVerifier++<br />
</a><br />
<strong>Other:</strong><br />
<a href="http://www.google.fi/url?sa=t&source=web&cd=2&ved=0CB4QFjAB&url=http%3A%2F%2Fsupport.microsoft.com%2Fkb%2F929833&ei=QhBpTJKzK5ugOOqd9bkF&usg=AFQjCNFB9dmIaV4iNgy968vxz0S3TGi8lA&sig2=l7xaDsqsTSv0U-WfW0NLkA">How to verify the Integrity of Windows system files, (sfc /scannow</a>)<br />
<a href="http://www.microsoft.com/windowsxp/using/helpandsupport/learnmore/tips/kelly93.mspx">How To Check System Files For Digital Signatures</a><br />
<a href="http://technet.microsoft.com/en-ca/sysinternals/ff700229.aspx">Memory usage analysis: MEMMAP</a><br />
<a href="http://www.nirsoft.net/utils/injected_dll.html">Check injected DLLs</a><br />
<a href="http://technet.microsoft.com/en-us/sysinternals/bb896647.aspx">Monitor debug output: DebugView</a><br />
<a href="http://en.wikipedia.org/wiki/WinDbg">Debugger for Windows: WinDbg</a><br />
<a href="http://www.resplendence.com/objmon">Monitor kernel object activity: ObjMon</a><br />
<a href="http://www.novirusthanks.org/products/websites-cop/">Monitor files in your website automatically: Websites Cop</a><br />
<a href="http://www.system-protect.com/full-features.aspx">Svchost Process Analyzer</a><br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#index"><img alt="Back to Index" height="20" src="http://www.techsupportalert.com/files/images/arrow-blue-rounded-left.jpg" title="Back to Index" width="20" /></a><br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title"><a href="" name="Network_traffic_monitoring"></a>Network traffic monitoring</div></td> </tr>
<tr> <td> <b>Port checking:</b><br />
<a href="http://download.cnet.com/Active-Ports/3000-2651_4-29653.html?tag=mncol" target="_blank">ActivePorts</a> <br />
<a href="http://technet.microsoft.com/en-us/sysinternals/bb897437.aspx" target="_blank">TcpView</a><br />
<a href="http://www.nirsoft.net/utils" target="_blank">CurrPorts+IPNetInfo</a><br />
<a href="http://www.roadkil.net/program.php?ProgramID=23">Roadkil's Scan Port</a><br />
<a href="http://www.bestsecuritytips.com/content+index.id+18.htm">Plax network suite</a><br />
<b>Botnet diagnosis:</b><br />
<a href="http://www.trendsecure.com/portal/en-US/tools/security_tools/rubotted" target="_blank">Trendmicro RUBotted</a><a href="http://free.antivirus.com/web-protection-add-on/"><br />
</a><br />
<b>Network traffic monitoring:</b><br />
<a href="http://www.softperfect.com/products/networx/">Networx</a><br />
<a href="http://www.softpedia.com/get/Network-Tools/Bandwidth-Tools/NetMeter.shtml" target="_blank">Netmeter</a> <br />
<a href="http://support.f-secure.com/beta/fswt/fswt.shtml" target="_blank">F-secure web trail<br />
</a><a href="http://www.itsamples.com/network-lights.html">Network lights<br />
</a><a href="http://www.donationcoder.com/Software/Mouser/urlsnooper/index.html">Urlsnooper</a><br />
<a href="http://securityxploded.com/procnetmonitor.php">ProcNetMonitor</a><br />
<b>Network traffic analyzing:</b><br />
<a href="http://www.wireshark.org/" target="_blank">Wireshark</a> <br />
<a href="http://networkminer.wiki.sourceforge.net/NetworkMiner" target="_blank">NetworkMiner</a> <br />
<a href="http://nmap.org/" target="_blank">Nmap</a><br />
<a href="http://www.oxid.it/cain.html" target="_blank">Cain & Abel</a><br />
<a href="http://erwan.l.free.fr/" target="_blank">IpSniffer</a><br />
<a href="http://en.wikipedia.org/wiki/Microsoft_Network_Monitor" target="_blank">Microsoft Network Monitor</a><br />
<a href="http://netgroup.polito.it/teaching/tsr/analyzer-setup.exe/view" target="_blank">Analyzer</a><br />
<a href="http://www.nirsoft.net/utils/smsniff.html">Smartsniff</a><br />
<b>NIDS:</b><br />
<a href="http://www.snort.org/" target="_blank">Snort</a><br />
<a href="http://www.bothunter.net/" target="_blank">Bothunter</a><br />
<strong>Control internet traffic priority:</strong><br />
<a href="http://www.seriousbit.com/netbalancer/">NetBalancer</a><br />
<strong>DNS-performance test:</strong><br />
<a href="http://www.grc.com/dns/benchmark.htm">GRC</a><br />
<strong>Internet speed test:</strong><br />
<a href="http://www.speedtest.net/">Speedtest</a><br />
<strong>Ping:</strong><br />
<a href="http://www.emco.is/products/ping-monitor/features.php">Emco Ping Monitor</a><br />
<strong>Other:</strong><br />
<a href="http://www.raymond.cc/blog/archives/2009/08/07/protect-your-computer-against-arp-poison-attack-netcut/" target="_blank">Protection against ARP poisoning</a><br />
<a href="http://www.labnol.org/internet/secure-your-wireless-wifi-network/10549/">Securing wireless network</a><br />
<br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#index"><img alt="Back to Index" height="20" src="http://www.techsupportalert.com/files/images/arrow-blue-rounded-left.jpg" title="Back to Index" width="20" /></a><br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title"><a href="" name="System_cleaning"></a>System cleaning</div></td> </tr>
<tr> <td> <b>Versatile cleanup tool:</b><br />
<a href="http://greatis.com/security/reanimator.html" target="_blank">RegRun Reanimator</a><br />
<a href="http://sourceforge.net/projects/viruseffectremo/">Virus effect remover</a><br />
<b>Process killing:</b><br />
<a href="http://tds.diamondcs.com.au/advancedseries/apt.php" target="_blank">APT</a><br />
<a href="http://orangelampsoftware.com/products_killprocess.php">KillProcess</a><br />
<a href="http://www.ghostsecurity.com/procx/" target="_blank">ProcX</a><br />
<b>File shredders:</b><br />
<a href="http://www.heidi.ie/eraser/" target="_blank">Eraser</a> <br />
<a href="http://www.xtort.net/xtort-software/ultrashredder/" target="_blank">UltraShredder</a> <br />
<a href="http://www.fileshredder.org/" target="_blank">File Shredder</a><br />
<strong>Wipe deleted files:</strong><br />
<a href="http://privacyroot.com/software/WFDS-download.php">Prevent restore</a><br />
<strong>Versatile tool for removing infection traces at bootup:</strong><br />
<a href="http://www.blitzblank.com/en/software/blitzblank/">BlitzBlank</a><br />
<a href="http://www.novirusthanks.org/products/threat-killer/">Threat Killer</a><br />
<strong>Unlocking files:</strong><br />
<a href="http://ccollomb.free.fr/unlocker/" target="_blank">Unlocker</a> <br />
<a href="http://lockhunter.com/">LockHunter</a><br />
<a href="http://www.emco.is/products/unlock-it/features.php">Emco UnLock IT</a><br />
<b>File killing:</b><br />
<a href="http://killbox.net/" target="_blank">KillBox</a><br />
<a href="http://www.majorgeeks.com/Brute_Force_Uninstaller_BFU_d4714.html" target="_blank">Brute force uninstaller</a> (<a href="http://www.spywareinfo.com/%7Emerijn/files/BFU.rtf" target="_blank">guide</a>)<br />
<a href="http://www.malwarebytes.org/fileassassin.php" target="_blank">FileASSASSIN</a><br />
<a href="http://swandog46.geekstogo.com/avenger2/avenger2.html" target="_blank">Avenger</a> <br />
<a href="http://www.emco.is/products/move-on-boot/features.php">Emco MoveOnBoot</a><br />
<a href="http://www.raymond.cc/blog/archives/2010/08/28/how-to-delete-files-or-terminate-process-when-you-cant/">Guide for killing files</a><br />
<span style="color: red;"><br />
</span><b>Killing registry entries:</b><br />
<a href="http://www.malwarebytes.org/regassassin.php" target="_blank">RegASSASSIN</a><br />
<strong>Free locked files:</strong><br />
<a href="http://www.dr-hoiby.com/WhoLockMe/">WhoLockMe<br />
</a><a href="http://www.tizersecure.com/about_tizer_unlocker_hidden_files.php">Tizer</a><br />
<b>Device&driver analyzing:</b><br />
<a href="http://www.nirsoft.net/utils/serviwin.html" target="_blank">ServiWin</a> <br />
<a href="http://www.softpedia.com/get/Tweak/System-Tweak/pservcpl.shtml" target="_blank">Pserv.cpl</a><br />
<b>Registry editing:</b><br />
<a href="http://www.majorgeeks.com/download469.html" target="_blank">Registrar lite</a> <br />
<a href="http://www.safer-networking.org/fi/regalyzer/index.html" target="_blank">Regalyzer</a> <br />
<a href="http://www.xs4all.nl/%7Efstaal01/regsearch-us.html" target="_blank">RegSearch</a><br />
<b>System cleaning:</b><br />
<a href="http://www.ccleaner.com/" target="_blank">⇒ CCleaner</a> <a href="http://thewebatom.net/programs/ccleaner-enhancer/">CCEnhancer</a><br />
<a href="http://www.koshyjohn.com/software/diskmax.html">DiskMax</a><br />
<a href="http://system-cleaner.comodo.com/">Comodo system cleaner</a><br />
<a href="http://personal.inet.fi/business/toniarts/ecleane.htm" target="_blank">Easy Cleaner</a> <br />
<a href="http://www.hoverdesk.net/freeware.htm" target="_blank">RegSeeker</a> <br />
<a href="http://www.tweaknow.com/RegCleaner.html" target="_blank">Tweaknow RegCleaner</a> <br />
<a href="http://www.atribune.org/index.php?option=com_content&task=view&id=25&Itemid=25" target="_blank">ATF-Cleaner</a> <br />
<a href="http://www.stevengould.org/index.php?Itemid=69&id=15&option=com_content&task=view" target="_blank">CleanUP!</a> <br />
<a href="http://raproducts.org/" target="_blank">PureRa</a><br />
<a href="http://www.fcleaner.com/">FCleaner</a><br />
<a href="ftp://ftp2[dot]kcsoftwares.com/kcsoftwa/files/kcleaner_lite.exe">KCleaner lite</a> (<a href="ftp://ftp2[dot]kcsoftwares.com/kcsoftwa/files/kcleaner_lite.exe">note</a>)<br />
<a href="http://privacyroot.com/software/WIPE-download.php">Wipe</a><br />
<a href="http://thewebatom.net/programs/system-ninja/">System Ninja</a><br />
<strong>Maintenance & Optimization:<br />
</strong><a href="http://www.ylcomputing.com/">WinUtilities</a><a href="http://system-cleaner.comodo.com/"><br />
</a><a href="http://download.cnet.com/Ashampoo-WinOptimizer-2010-Advanced/3000-18512_4-75021499.html">Ashampoo WinOptimizer</a><br />
<a href="http://www.glaryutilities.com/">Glary utilities</a><br />
<b>Collection of tools:</b><br />
<a href="http://www.mztweak.com/" target="_blank">Mztweak</a><br />
<b>Alternate data streams:</b><br />
<a href="http://securityxploded.com/streamarmor.php">StreamArmor<br />
</a> <a href="http://www.bleepingcomputer.com/files/adsspy.php" target="_blank">ADSSpy</a> <br />
<a href="http://thinkabdul.com/2006/12/27/assasin-g13-forcefully-kill-access-deniedsystem-owned-processes-in-windows-without-safe-mode/" target="_blank">Assasin G13</a> <br />
<strong>Shell extensions:</strong><br />
<a href="http://www.nirsoft.net/utils/shexview.html">ShellExView</a><br />
<b>Tool for balancing process CPU:</b><br />
<a href="http://www.bitsum.com/prolasso.php" target="_blank">Process lasso</a> <br />
<a href="http://www.donationcoder.com/Software/Mouser/proctamer/" target="_blank">♦Process tamer</a><br />
<strong>Disk defragging</strong><br />
<a href="http://www.auslogics.com/en/software/disk-defrag">Auslogics disk defrag</a><br />
<a href="http://www.piriform.com/defraggler">Defraggler</a><br />
<strong>Registry defragging:<br />
</strong><a href="http://technet.microsoft.com/en-us/sysinternals/bb897426.aspx">PageDefrag</a><b><br />
</b><br />
<b>Uninstallers:</b><br />
<a href="http://www.revouninstaller.com/" target="_blank">Revo uninstaller</a> <br />
<a href="http://www.zsoft.dk/index/software_details/4" target="_blank">Zsoft uninstaller</a> <br />
<a href="http://www.softpedia.com/get/Office-tools/Other-Office-Tools/Add-RemovePro.shtml" target="_blank">Add/Remove Pro</a> <br />
<a href="http://www.epsilonsquared.com/installrite.htm" target="_blank">Install Rite</a> <br />
<a href="http://www.easymalwareblocker.com/index.html" target="_blank">EMB uninstaller</a><br />
<strong>Uninstall Programs Packaged with Windows Installer in Safe Mode</strong><br />
<a href="http://windowsitpro.com/article/articleid/83387/jsi-tip-9233-safemsiexe-freeware-starts-windows-installer-in-safe-mode.html">SafeMSI</a><br />
<a href="http://www.raymond.cc/blog/archives/2009/10/20/uninstall-programs-packaged-with-windows-installer-in-safe-mode/">Raymond cc</a><br />
<strong>Tracking registry and files changes when installing software:</strong><br />
Many <a href="http://www.raymond.cc/blog/archives/2009/02/28/tracking-registry-and-files-changes-when-installing-software-in-windows/">here</a><br />
<strong>MRU-list deleting:</strong><br />
<a href="http://www.javacoolsoftware.com/mrublaster.html" target="_blank">MRU-Blaster</a><br />
<b>Removing unwanted (preinstalled) Windows/software:</b><br />
<a href="http://pcdecrapifier.com/" target="_blank">PC Decrapifier</a><br />
<a href="http://www.raymond.cc/blog/archives/2009/04/10/uninstall-microsoft-office-2007-in-vista-and-xp/" target="_blank">Office 2007 remover</a><br />
<a href="http://www.raymond.cc/blog/archives/2009/05/05/comprehensive-list-of-uninstallers-or-removal-tools-for-antivirus-software/" target="_blank">AV removal (many tools)</a><br />
<a href="http://www.appremover.com/" target="_blank">AppRemover</a><br />
<a href="http://www.wilderssecurity.com/showthread.php?t=233421" target="_blank">AV removal 2 (many tools)</a><br />
<a href="http://raproducts.org/" target="_blank">Old versions of Java</a><br />
<a href="http://kb2.adobe.com/cps/141/tn_14157.html" target="_blank">Old versions of Flash</a><br />
<a href="http://uninstallers.blogspot.com/">List of uninstallers</a><strong><br />
</strong><br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#index"><img alt="Back to Index" height="20" src="http://www.techsupportalert.com/files/images/arrow-blue-rounded-left.jpg" title="Back to Index" width="20" /></a><br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title"><a href="" name="Data_rescue">Data rescue</a></div></td> </tr>
<tr> <td> <b>File rescuing from Usb-drive/hard disk:</b><br />
<a href="http://www.pcinspector.de/Sites/file_recovery/info.htm?language=1" target="_blank">PC Inspector File Recovery</a> <br />
<a href="http://www.cgsecurity.org/wiki/PhotoRec">Photorec</a><br />
<a href="http://www.snapfiles.com/get/diskdigger.html">DiskDigger</a><br />
<a href="http://www.majorgeeks.com/Avira_UnErase_d5284.html" target="_blank">Avira UnErase</a><br />
<a href="http://www.piriform.com/recuva">Recuva</a><br />
<a href="http://www.easeus.com/">Easeus</a><br />
<b>File rescuing from memory cards:</b><br />
<a href="http://www.pcinspector.de/Sites/smart_recovery/info.htm?language=1" target="_blank">PC Inspector smart recovery</a><br />
<b>Rescuing files from corrupted hard disk:</b><br />
<a href="http://www.roadkil.net/program.php?ProgramID=29" target="_blank">Unstoppable Copier</a><br />
<a href="http://www.datarescue.com/photorescue/v3/drdd.htm">DataRescue's DD</a><br />
<b>Unstoppable copying:</b><br />
<a href="http://www.codesector.com/teracopy.php" target="_blank">♦TeraCopy</a><br />
<strong>Versatile tool for coping files:</strong><br />
<a href="http://technet.microsoft.com/en-us/magazine/2009.04.utilityspotlight.aspx?pr=blog">RichCopy</a><br />
<b>Rescuing files from broken CD/DVD:</b><br />
<a href="http://www.isobuster.com/" target="_blank">IsoBuster</a><br />
<a href="http://www.free-codecs.com/download/IsoPuzzle.htm" target="_blank">IsoPuzzle </a><br />
<a href="http://www.kvipu.com/CDCheck/" target="_blank">CDcheck</a><br />
<a href="http://www.recoverytoolbox.com/cd.html">Recovery Toolbox</a><br />
<b>Write error resistant DVD:s:</b><br />
<a href="http://dvdisaster.net/en/" target="_blank">dvdisaster</a><br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#index"><img alt="Back to Index" height="20" src="http://www.techsupportalert.com/files/images/arrow-blue-rounded-left.jpg" title="Back to Index" width="20" /></a><br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title"><a href="" name="Encrypting"></a>Encrypting</div></td> </tr>
<tr> <td> <b>Versatile tool for encrypting:</b><br />
<a href="http://www.ce-infosys.com/english/downloads/free_compusec/" target="_blank">FREE CompuSec</a><br />
<b>Hiding files/folders:</b><br />
<a href="http://www.fspro.net/folder-lock-box/" target="_blank">My Lockbox</a><br />
<a href="http://www.xoslab.com/" target="_blank">Easy file locker</a><br />
<a href="http://www.hidefolders.org/">Hidefolders</a><a href="http://privacyroot.com/software/SEDE-download.php"><br />
</a><a href="http://privacyroot.com/software/SEDE-download.php"><br />
</a><b>Encrypting files:</b><br />
<a href="http://www.axantum.com/AxCrypt/" target="_blank">AxCrypt</a> <br />
<a href="http://members.ozemail.com.au/%7Enulifetv/freezip/freeware/">DsCrypt</a><br />
<a href="http://kgbarchiver.net/?page=home" target="_blank">KGB archiver</a><br />
<a href="http://www.aeppro.com/free/">Crypt4free</a><br />
<a href="http://www.2brightsparks.com/onclick/eoc.html">EncryptOnClick</a><br />
<a href="http://www.pcworld.com/downloads/file/fid,23297-order,1-page,1-c,alldownloads/description.html" target="_blank">Cryptainer LE</a><br />
<a href="http://www.androsasoft.net/features.htm">Androsa FileProtector</a> <img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/images3.jpg" width="12" /><br />
<a href="http://www.ice-graphics.com/ICEEncrypt/IndexE.html" target="_blank">ICE encrypt</a> <img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/images3.jpg" width="12" /><br />
<strong>Password protect executables:</strong><br />
<a href="http://migeel.sk/projects/empathy/">Empathy</a><br />
<strong>Encrypted USB-stick:</strong><br />
<a href="http://www.pcworld.com/downloads/file/fid,155761/description.html">Encrypt Stick</a><br />
<strong>Disk/drive encryption:<br />
</strong><a href="http://www.comodo.com/home/internet-security/disk-encryption.php">Comodo</a> <br />
<b>Encrypting with virtual drives:</b><br />
<a href="http://www.truecrypt.org/" target="_blank">TrueCrypt</a><br />
<a href="http://privacyroot.com/software/SEDE-download.php">Secret disk</a><br />
<a href="http://www.freeotfe.org/">FreeOTFE</a><br />
<a href="http://www.safehousesoftware.com/SafeHouseExplorer.aspx">Safehouse Explorer</a><br />
<b>Encrypting for usb-drive:</b><br />
<a href="http://www.pcworld.com/downloads/file/fid,23297-order,1-page,1-c,alldownloads/description.html" target="_blank">Cryptainer LE</a><br />
<a href="http://kashu-sd.co.jp/en/products/usbenter.html" target="_blank">USB flash security</a><br />
<a href="http://www.rohos.com/products/rohos-mini-drive/">Rohos Mini</a><br />
<a href="http://www.withopf.com/tools/securstick/">SecureStick</a><br />
<strong>Steganography:<br />
</strong><a href="http://sourceforge.net/projects/hide-in-picture/">Hide in picture</a><br />
<a href="http://pmcchp.com/bonkyubon/index.html">Bon Kuy Bon</a><br />
<a href="http://steghide.sourceforge.net/index.php">Steghide</a><br />
<a href="http://diit.sourceforge.net/">DIIT</a><br />
<a href="http://www.invisiblesecrets.com/ver2/index.html">Invisible secrects</a><br />
<a href="http://www.symantec.com/connect/articles/steganography-revealed">Guide1</a><br />
<a href="http://www.online-tech-tips.com/computer-tips/hide-file-in-picture/">Guide2</a><br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#index"><img alt="Back to Index" height="20" src="http://www.techsupportalert.com/files/images/arrow-blue-rounded-left.jpg" title="Back to Index" width="20" /></a><br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title"><b><a href="" name="Backup"></a></b>Backup</div></td> </tr>
<tr> <td> <b>Data Backup:</b><a href="http://www.fbackup.com/" target="_blank"><br />
</a><a href="http://sourceforge.net/projects/freefilesync/">Free File Sync</a><br />
<a href="http://www.fbackup.com/" target="_blank">Fbackup</a> <br />
<a href="http://www.snapfiles.com/get/SyncBack.html" target="_blank">Syncback</a> <br />
<a href="http://www.karenware.com/powertools/ptreplicator.asp" target="_blank">Karen’s Replicator</a> <a href="http://backup.comodo.com/" target="_blank"><br />
Comodo Backup</a> <br />
<a href="http://www.educ.umu.se/%7Ecobian/cobianbackup.htm" target="_blank">Cobian backup</a><br />
<a href="http://www.xxcopy.com/index.htm" target="_blank">XXCopy</a><br />
<a href="http://en.wikipedia.org/wiki/Robocopy">Robocopy</a><br />
<a href="http://www.areca-backup.org/">Areca Backup</a><br />
<a href="http://www.gfi.com/backup-hm">GFI Backup</a><br />
<a href="http://alt.pluralsight.com/wiki/default.aspx/Craig/HoboCopy.html">Hobo Copy</a><br />
<a href="http://portableapps.com/apps/utilities/toucan" target="_blank">Toucan</a> <img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/images3.jpg" width="12" /><br />
<a href="http://www.mogware.com/FileHamster/" target="_blank">FileHamster</a> <img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/images3.jpg" width="12" /><br />
<strong>T</strong><b>imemachine for data:</b><a href="http://www.fbackup.com/" target="_blank"><br />
</a><a href="http://www.genie-soft.com/Free_products/free_timeline.aspx">Genie Timeline</a><br />
<strong>Windows-based backup:</strong><br />
<a href="http://www.raymond.cc/blog/archives/2010/05/10/create-windows-7-system-image-for-full-backup-and-restoration/">Create system Image</a> (7)<br />
<strong>Network backup:</strong><br />
<a href="http://www.bacula.org/en/">Bacula</a><br />
<strong>Syncronization tools:</strong><br />
<a href="http://www.jumpingbytes.com/en/puresync.html">PureSync</a><br />
<a href="http://sourceforge.net/projects/fullsync/">Fullsync</a><br />
<a href="http://sourceforge.net/projects/freefilesync/">FreeFileSync</a><br />
<b>Online-disk:</b><br />
<a href="http://mozy.com/" target="_blank">♦Mozy</a> <br />
<a href="http://www.adrive.com/" target="_blank">Adrive</a><br />
<a href="http://www.driveway.com/">Idrive</a><a href="https://www.getdropbox.com/"><br />
Dropbox</a><a href="http://www.techsupportalert.com/content/best-free-online-backup-sites.htm" target="_blank"><br />
</a><a href="http://www.memopal.com/">Memopal</a><br />
<a href="http://www.softpedia.com/progDownload/GMail-Drive-shell-extension-Download-15944.html">Gmail Drive shell extension</a><br />
<a href="http://skydriveexplorer.com/download.php">Skydrive explorer (Windows Live)</a><a href="http://www.techsupportalert.com/content/best-free-online-backup-sites.htm" target="_blank"><br />
more</a><br />
<strong>Host and share files</strong>:<br />
<a href="http://www.gigasize.com/">Gigasize</a><br />
<a href="http://www.rapidshare.com/">Rapidshare</a><br />
<a href="http://www.4shared.com/signup.jsp">4shared</a><br />
<a href="http://www.sendspace.com/">Sendspace</a><br />
<b>Registry backup:</b><br />
<a href="http://www.majorgeeks.com/download1267.html" target="_blank">Erunt</a><br />
<b>Programs for mbr backupping and restoring:</b><br />
<a href="http://www.misec.net/products/mbr-backup/">MBR Backup</a><br />
Many <a href="http://www.raymond.cc/blog/archives/2008/11/10/5-free-tools-to-backup-and-restore-master-boot-record-mbr/" target="_blank">here</a><br />
<b>Creating images from hard disks on-line:</b><br />
<a href="http://www.paragon-software.com/home/db-express/features.html" target="_blank">Paragon Express</a><br />
<a href="http://www.macrium.com/" target="_blank">Macrium Reflect Free</a> <br />
<a href="http://www.todo-backup.com/products/home/">Easeus</a><br />
<a href="http://www.runtime.org/dixml.htm" target="_blank">DriveImageXML</a> <br />
<a href="http://www.drivesnapshot.de/en/index.htm" target="_blank">Drive Snapshot</a><br />
<a href="https://forums.comodo.com/comodo_backup/comodo_backup_201027456_rc3_released-t42422.0.html" target="_blank">Comodo backup</a><br />
<a href="http://www.roadkil.net/program.php?ProgramID=12">Roadkil's Disk Image</a><br />
<a href="http://www.terabyteunlimited.com/image-for-windows.htm">Terabyte Image For Windows</a> $<br />
<b>Backupping hard disk with Live-Cd:</b><br />
<a href="http://gpartedclonz.tuxfamily.org/index.php" target="_blank">GParted+Clonezilla</a><br />
<a href="http://www.feyrer.de/g4u/" target="_blank">G4U</a> <br />
<a href="http://www.pcinspector.de/Sites/clone_maxx/info.htm?Language=1" target="_blank">PC INSPECTOR™ clone maxx</a><br />
<a href="http://partitionlogic.org.uk/" target="_blank">Partition Logic</a><br />
<b>Hard disk cloning:</b><br />
<a href="http://www.miray.de/products/sat.hdclone.html" target="_blank">HDClone free (CD)</a><br />
<strong>Raw copy of hard disks:</strong><span style="font-family: Arial;"><strong><br />
</strong><a href="http://www.roadkil.net/program.php?ProgramID=22">Roadkil's Raw Copy</a><strong> </strong></span><br />
<b>Hard disk wiping:</b><br />
<a href="http://www.dban.org/" target="_blank">Darik's Boot & Nuke</a> <br />
<a href="http://www.killdisk.com/" target="_blank">Active Kill Disk</a> <br />
<a href="http://www.pcinspector.de/Sites/e_maxx/info.htm?Language=1" target="_blank">PC INSPECTOR™ e-maxx</a><br />
<a href="http://www.diskwipe.org/" target="_blank">Disk wipe</a><br />
<a href="http://www.roadkil.net/program.php?ProgramID=14"><span style="font-family: Arial;">Roadkil's Disk Wipe</span></a><br />
<b>Backup drivers:</b><br />
<a href="http://www.drivermax.com/" target="_blank">Drivermax</a><br />
<a href="http://www.boozet.org/dd.htm">Double Driver</a><br />
<strong>Other:</strong><br />
<a href="http://www.raymond.cc/blog/archives/2008/11/11/the-importance-of-backing-up-eisa-hidden-pqservice-partition-and-mbr-on-a-new-laptop/">Backing Up EISA Hidden PQSERVICE Partition and MBR on a New Laptop</a><br />
<a href="http://www.raymond.cc/blog/archives/2009/08/13/backup-and-restore-vista-oem-activation-license/">Backup and Restore Vista OEM Activation License</a><a href="http://www.maximumpc.com/article/features/blue_screen_survival_guide"><br />
</a><br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#index"><img alt="Back to Index" height="20" src="http://www.techsupportalert.com/files/images/arrow-blue-rounded-left.jpg" title="Back to Index" width="20" /></a><br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title"><a href="" name="System_rescue">System rescue</a></div></td> </tr>
<tr> <td> <strong>Repairing XP:</strong> <br />
<a href="http://www.windowsnetworking.com/articles_tutorials/wxprcons.html">Recovering Windows XP using the Recovery Console</a><br />
<a href="http://www.bleepingcomputer.com/tutorials/tutorial117.html">How to install and use the Windows XP Recovery Console</a><br />
<a href="http://www.webtree.ca/windowsxp/repair_xp.htm">Repair XP</a><br />
<a href="http://www.michaelstevenstech.com/XPrepairinstall.htm">How to Perform a Windows XP Repair Install</a><br />
<strong>Windows Vista resque disks:</strong> <br />
<a href="http://neosmart.net/blog/2008/windows-vista-recovery-disc-download/">Neosmart</a><br />
<strong>Windows 7 resque disks/USBs:</strong> <br />
<a href="http://neosmart.net/blog/2009/windows-7-system-repair-discs/">Neosmart</a> <br />
<a href="http://www.raymond.cc/blog/archives/2010/05/11/installing-windows-7-system-recovery-into-usb-flash-drive/">Raymondcc</a><br />
<strong>Versatile tool for trobleshooting:</strong><br />
<a href="http://fixitcenter.support.microsoft.com/Portal">Microsoft fix it center</a><br />
<a href="http://www.whatsmypass.com/tech-toolkit-10l" target="_blank">Techtoolkit</a><br />
<b>Resque disks:</b><br />
<a href="http://www.ubcd4win.com/" target="_blank">⇒</a><a href="http://www.ubcd4win.com/" target="_blank">UBCD4win</a><br />
<a href="http://trinityhome.org/Home/index.php?wpid=1&front_id=12">Trinity</a><br />
<a href="http://www.nu2.nu/pebuilder/">BartPE</a><br />
<a href="http://bootdisk.com/" target="_blank">BootDisk</a><br />
<a href="http://www.ultimatebootcd.com/" target="_blank">UBCD</a> <br />
<a href="http://blacklistsoft.com/omega.php" target="_blank">Omega</a><br />
<a href="http://security.symantec.com/nbrt/overview.asp?lcid=1033&origin=default">Norton Bootable Recovery Tool</a><br />
<strong>Partition recovery:</strong><br />
<a href="http://www.minitool-partitionrecovery.com/">Minitool<br />
</a><br />
<b>Boot-CD registry editor:</b><br />
<a href="http://www.pcregedit.com/" target="_blank">PC regedit</a><br />
<b>Rescuing and troubleshooting:<br />
</b><a href="http://www.paragon-software.com/home/rk-express/download.html">Paragon Resque Kit</a><br />
<a href="http://www.memtest.org/" target="_blank">Memtest86+</a><br />
<a href="http://www.sisoftware.net/" target="_blank">Sisoft</a><br />
<a href="http://www.sysresccd.org/Main_Page" target="_blank">SystemResqueCD</a><br />
<a href="http://www.shockfamily.net/cedric/knoppix/" target="_blank">Shockfamily Knoppix</a><br />
<a href="http://www.maximumpc.com/article/features/blue_screen_survival_guide">BSOD survival guide</a><br />
<strong>Boot, resque, partitioning etc.</strong><br />
<a href="http://partedmagic.com/">Parted Magic</a><br />
<a href="http://www.partition-tool.com/">Easeus</a><br />
<strong>Fixing MBR</strong>:<a href="http://www.raymond.cc/blog/archives/2010/05/25/restoring-the-master-boot-record-to-your-windows-os/" target="_blank"><br />
Fixing MBR with Boot-CD</a> <a href="http://www.tippscout.de/repair-and-restore-master-boot-record-mbr_tipp_3114.html" target="_blank">another</a><br />
<a href="http://www.sysint.no/nedlasting/mbrfix.htm" target="_blank">Fixing MBR</a><br />
<strong>Disk recovery(data, partition, boot sector)</strong>:<br />
<a href="http://www.cgsecurity.org/wiki/TestDisk">TesktDisk</a><br />
<a href="http://findandmount.com/">Partition Find & Mount</a><br />
<strong>Make bootable linux USB:</strong><br />
<a href="http://unetbootin.sourceforge.net/">UBootNetin </a><br />
<a href="http://www.linuxliveusb.com/">LiLi</a><br />
<strong>Make bootable Windows USB:</strong><br />
<a href="http://www.askvg.com/a-bootable-usb-utility-to-create-bootable-usb-drive-to-install-windows-vista-server-2008-and-7/">A bootable USB</a><br />
<a href="http://wintoflash.com/home/en/">WintoFlash</a><br />
<b>Recover a hanging system:</b><br />
<a href="http://resplendence.com/antifreeze" target="_blank">Antifreeze</a><br />
<b>Solve problem drivers:</b><br />
<a href="http://www.nirsoft.net/utils/blue_screen_view.html"><span>Bluescreenview</span></a><br />
<a href="http://www.resplendence.com/whocrashed">Whocrashed</a><br />
<b>Repairing of broken internet connection:</b><br />
<a href="http://www.majorgeeks.com/WinSock_XP_Fix_d4372.html" target="_blank">Winsockxpfix</a> <br />
<a href="http://www.softpedia.com/get/Tweak/Network-Tweak/WinSockFix.shtml" target="_blank">Winsockfix</a> <br />
<a href="http://www.majorgeeks.com/download4180.html" target="_blank">Lspfix</a><br />
<a href="http://www.autodebug.com/download.php" target="_blank">Autodebug for Winsock</a><br />
<a href="http://www.raymond.cc/blog/archives/2009/04/13/repair-xp-and-vista-internet-connection-problems-with-icr/">Repairing of broken internet connection</a> (V)<br />
<a href="http://www.raymond.cc/blog/archives/2010/06/22/networking-test-tool-using-microsoft-tools-to-help-you/">Network test tool</a><br />
<strong>Restore Corrupted Folder Options and Advanced Settings:</strong><a href="http://www.raymond.cc/blog/archives/2009/05/15/restore-corrupted-folder-options-advanced-settings-caused-by-virus/" target="_blank"><br />
Tool 1</a><br />
<a href="http://www.raymond.cc/blog/archives/2009/09/06/re-enable-brings-back-run-task-manager-regedit-cmd-folder-options-and-system-restore/" target="_blank">Tool 2</a><br />
<a href="http://www.raymond.cc/blog/archives/2009/11/07/fix-this-file-does-not-have-a-program-associated-with-it-for-performing-this-action-in-vista-and-7/">Fix corrupted .exe association</a> <a href="http://remove-malware.com/antimalware/antimalware-tools/youtube-question-i-cant-load-any-exe-after-i-removed-a-rogue-antivirus/">another</a><br />
<a href="http://www.techsupportteam.org/forum/tutorials/3236-fixpolicies-fix-permissions-issues.html">Fixpolicies</a><br />
<a href="http://leelusoft.blogspot.com/2009/10/xp-quick-fix-plus.html">XP Quick Fix Plus</a><br />
<a href="http://www.softpedia.com/progDownload/Dial-a-fix-Download-27328.html" target="_blank">Dial-aFix</a><br />
<a href="http://www.technibble.com/computer-repair-utility-kit/" target="_blank">Computer Repair utility kit</a><br />
<strong>Tools for speeding up (re)install:</strong><br />
<a href="http://ninite.com/">Ninite Multiple App Installer</a><br />
<a href="http://allmyapps.com/windows/install-pc">Allmyapps</a><br />
<strong>Windows reinstall guides:</strong><br />
<a href="http://www.labnol.org/software/rebuild-computer-and-reinstall-windows/6130/">How to Rebuild your Computer </a><br />
<a href="http://www.windowsreinstall.com/">Windows reinstall</a><br />
<a href="http://windows.microsoft.com/en-us/windows/help/install-reinstall-uninstall">Install, reinstall, or uninstall Windows</a><br />
<a href="http://en.kioskea.net/faq/3065-installing-windows-xp-from-a-usb-key">installing windows xp from a usb key</a><br />
<strong>Recover installations keys:</strong><br />
<a href="http://www.magicaljellybean.com/keyfinder/">The Magical Jelly Bean Keyfinder</a><br />
<a href="http://www.raymond.cc/blog/archives/2009/08/10/easiest-way-to-recover-xp-and-vista-product-key-from-dead-or-unbootable-windows/" target="_blank">Recover Windows key for unbootable system</a><br />
<a href="http://sites.google.com/site/cakirbey/softkeyrevealer">Retrieve the Software Installation Keys</a><br />
<strong>Recover/reset Windows passwords:</strong><br />
<a href="http://www.darknet.org.uk/2009/06/kon-boot-reset-windows-linux-passwords/">boot cd for reseting windows passwords</a><br />
<a href="http://www.vistax64.com/tutorials/102005-reset-user-account-password.html">How to reset windows account password<br />
</a><a href="http://www.vistax64.com/tutorials/102005-reset-user-account-password.html">How to recover Windows password</a><br />
<a href="http://www.oxid.it/cain.html">Cain&Able</a><br />
<a href="http://ophcrack.sourceforge.net/">Ophcrack</a><br />
<strong>Other:</strong><br />
<a href="http://www.mydigitallife.info/2008/03/19/how-to-check-if-windows-vista-xp-and-2003-system-is-32-bit-or-64-bit-x86-or-x64-version/">How to check if system Is 32-bit or 64-bit (x86 or x64) </a><br />
<a href="http://www.raymond.cc/blog/archives/2007/07/10/reveal-passwords-hidden-under-asterisks/">Reveal Passwords Hidden Under Asterisks</a><br />
<a href="http://securityxploded.com/firemaster.php">Recover Firefox master password</a><br />
<a href="http://www.st-ware.com/page.php?23">Reset BIOS Password</a><br />
<a href="http://www.nirsoft.net/utils/router_password_recovery.html">Recover router password</a><br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#index"><img alt="Back to Index" height="20" src="http://www.techsupportalert.com/files/images/arrow-blue-rounded-left.jpg" title="Back to Index" width="20" /></a><br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title"><a href="" name="Miscellaneous"></a>Miscellaneous</div></td> </tr>
<tr> <td> <b>Security program lists:</b><br />
<a href="http://www.spywarewarrior.com/uiuc/index.html" target="_blank">Spywarewarrior</a><br />
<a href="http://www.alken.nl/remtools.html" target="_blank">Alken</a><br />
<a href="http://www.firewallguide.com/" target="_blank">firewallguide</a><br />
<b>Best security forums:</b><br />
<a href="http://www.wilderssecurity.com/" target="_blank">Wilders Security</a><br />
<strong>Blogs:</strong><br />
<a href="http://sunbeltblog.blogspot.com/">Sunbelt</a><br />
<a href="http://www.f-secure.com/weblog/">F-secure lab</a> <br />
<a href="http://safeandsavvy.f-secure.com/">Safe and Savvy</a><br />
<img align="bottom" alt="" height="10" src="http://www.techsupportalert.com/files/images/images3.jpg" width="12" /> <b>Portable application launchers:</b><b><br />
</b><a href="http://portableapps.com/">PortableApps</a><br />
<a href="http://app.etizer.org/">App.etizer</a><br />
<a href="http://www.salvadorsoftware.com/">Asuite</a><br />
<strong>Re</strong><strong>mote control:</strong><br />
<a href="http://www.teamviewer.com/fi/index.aspx">Teamviewer</a><br />
<a href="https://secure.logmein.com/US/products/free/">LogMein</a><br />
<a href="http://www.realvnc.com/products/free/4.1/index.html">RealVNC</a><br />
<a href="http://www.crossloop.com/">Crossloop</a><br />
<a href="http://www.supportsmith.com/ThinVNC/HTML5-VNC.aspx">TwinVNC</a><br />
<strong>Other: </strong><br />
<a href="http://www.symantec.com/norton/themes/threatmeter/index.jsp">Symantec threat meter</a><br />
<a href="http://thefreewarechronicle.blogspot.com/">WiFi Shield: KittyLitter</a><br />
<a href="http://www.montpellier-informatique.com/predator/en/index.php?n=Main.HomePage">System Lock: Predator</a><br />
<a href="http://www.lalarm.com/en/index.htm">Laptop Security: LAlarm</a><br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#index"><img alt="Back to Index" height="20" src="http://www.techsupportalert.com/files/images/arrow-blue-rounded-left.jpg" title="Back to Index" width="20" /></a><br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title"><a href="" name="Tests"></a>Tests and malware analysis tools</div></td> </tr>
<tr> <td> <strong>AV/AM testing methodology:</strong><br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#test"><strong>My proposal</strong></a><br />
<b>AV-laboratories:</b><br />
<a href="mailto:support@emsisoft.com">support@emsisoft.com</a><br />
<a href="mailto:newvirus@kaspersky.com">newvirus@kaspersky.com</a><br />
<a href="mailto:virus@avira.com">virus@avira.com</a><br />
<a href="mailto:report@prevxresearch.com">report@prevxresearch.com</a><br />
<a href="https://analysis.f-secure.com/" target="_blank">https://analysis.f-secure.com/</a> <br />
<b><br />
Eicar test virus:</b><br />
<a href="http://www.eicar.org/anti_virus_test_file.htm" target="_blank">Eicar AntiVirus test file</a><br />
<b>Test spyware:</b><br />
<a href="http://www.spycar.org/Welcome%20to%20Spycar.html" target="_blank">Spycar</a> <br />
<a href="http://www.geeksuperhero.com/scoundrelsim.shtml" target="_blank">Scoundrel Simulator</a><br />
<b>System shutdown test:</b><br />
<a href="http://zeroday-software.110mb.com/" target="_blank">ZeroDay test</a><br />
<b>Keylogger/screencapture/webcam etc. tests:</b><br />
<a href="http://www.zemana.com/" target="_blank">Zemana</a><br />
<a href="http://www.softpedia.com/get/Security/Firewall/Anti-KeyLogger-Tester.shtml">AKLT</a><br />
<a href="http://spyshelter.com/">SpyShelter</a><br />
<a href="http://web.archive.org/web/20080521082727/www.syssafety.com/leaktests.html">SKL</a><br />
<b>HIPS/Firewall-tests:</b><br />
<a href="http://personalfirewall.comodo.com/onlinetest.html?currency=USD&region=North%20America&country=US" target="_blank">Comodo</a><br />
<a href="http://www.matousec.com/">Matousec</a><br />
<strong>Buffer overfolw test:</strong><br />
<a href="http://forums.comodo.com/comodo-memory-firewall-beta-corner/buffer-overflow-testing-application-t12541.0.html;msg88339#msg88339">Comodo</a><br />
<b>Firewall/port tester:</b><br />
<a href="https://www.grc.com/x/ne.dll?bh0bkyd2" target="_blank">GRC</a><br />
<a href="http://www.auditmypc.com/" target="_blank">AuditmyPC</a><br />
<a href="http://www.hackerwatch.org/">Hackerwatch</a><br />
<a href="http://www.hackerwhacker.com/">Hackerwhacker</a><br />
<b>Router crash test:</b><br />
<a href="http://www.grc.com/dns/crashtest.htm" target="_blank">GRC</a><a href="http://www.grc.com/dns/dns.htm" target="_blank"><br />
</a><br />
<b>DNS security test:</b><br />
<a href="http://www.grc.com/dns/dns.htm" target="_blank">GRC</a><br />
<strong>Email security test:</strong><br />
<a href="http://www.gfi.com/emailsecuritytest/" target="_blank">GFI</a><br />
<b>Other security tests:</b><br />
<a href="http://www.testmypcsecurity.com/" target="_blank">Test my PC</a> <br />
<a href="http://www.pcflank.com/" target="_blank">PC Flank</a><br />
<b>Anti-rootkit tests:</b><br />
<a href="http://www.iterati.org/Developers/HideProc/Default.aspx" target="_blank">Hideproc</a><br />
<strong>Process termination:</strong><br />
<a href="http://web.archive.org/web/20080521082727/www.syssafety.com/leaktests.html">SPT</a><br />
<b>Browser tests:</b><br />
<a href="http://webtest.scanit.be/bcheck/" target="_blank">Web Check</a> <br />
<a href="http://www.popupcheck.com/" target="_blank">Popup Check</a> <a href="http://www.jasons-toolbox.com/BrowserSecurity/" target="_blank"><br />
</a><br />
<b>Test sites:</b><br />
<a href="http://www.av-comparatives.org/" target="_blank">Av Comparatives</a><br />
<a href="http://www.matousec.com/" target="_blank">Matousec</a><br />
<a href="http://virusinfo.info/index.php?page=testseng" target="_blank">Virus Info</a><br />
<a href="http://www.anti-malware-test.com/" target="_blank">Anti Malware Test</a><br />
<a href="http://www.shadowserver.org/wiki/" target="_blank">Shadow Server</a><br />
<a href="http://kareldjag.over-blog.com/" target="_blank">Kareldjag</a><br />
<a href="http://www.pcsecuritylabs.net/" target="_blank">PCSL - PC Security Labs</a><br />
<a href="http://remove-malware.com/" target="_blank">Remove-malware</a><br />
<a href="http://malwareresearchgroup.com/" target="_blank">MRG</a><br />
<a href="http://www.bluepointsecurity.com/live">Antivirus software challence</a><br />
<a href="http://www.virus.gr/portal/en/">Virus.gr</a><br />
<strong>Info and tools on malware analysis:</strong><br />
<a href="http://www.malwareinfo.org/">Malwareinfo</a><br />
<a href="http://mtc.sri.com/" target="_blank">MTC</a><br />
<strong>Real-time analysis for sandboxed malware:</strong><br />
<a href="http://bsa.isoftware.nl/">Buster Sandbox Analyzer</a><br />
<strong>Online sandbox for malware analysis:</strong><a href="http://www.threatexpert.com/submit.aspx" target="_blank"><br />
Threatexpert</a><br />
<a href="http://sunbeltsandbox.com/" target="_blank">Sunbelt Sandbox</a><br />
<a href="http://camas.comodo.com/cgi-bin/submit" target="_blank">CIMA</a><br />
<a href="http://anubis.iseclab.org/" target="_blank">Anubis</a><br />
<a href="http://sandbox.norman.no/" target="_blank">Norman Sandbox</a><br />
<a href="http://www.joebox.org/index.php" target="_blank">Joebox<br />
</a><a href="http://autovin.pandasecurity.com.my/?page_id=332">Autovin<br />
</a><a href="http://wepawet.iseclab.org/">Wepawet</a><br />
<a href="https://aerie.cs.berkeley.edu/index-d.php">BitBlaze</a><br />
<a href="http://eureka.cyber-ta.org/">Eureka</a><br />
<a href="http://camas.comodo.com/cgi-bin/submit">Comodo</a><br />
<strong>Malware samples and hostile sites:</strong><br />
<a href="http://www.malwaredomainlist.com/">MDL</a> <br />
<a href="http://www.offensivecomputing.net/">Offensive Computing</a><br />
<a href="http://malwaredatabase.net/blog/">Malwaredatabase</a><br />
<a href="http://malware-research.co.uk/index.php">Malware-Research</a><br />
<a href="http://www.malwaredomains.com/">Malwaredomains</a><br />
<a href="http://forums.malwarebytes.org/index.php?showforum=44">Malwarebytes</a><br />
<strong>GSI parser: </strong><a href="http://www.getsysteminfo.com/index.php?hl=en"><br />
Getsysteminfo</a><br />
<strong>View HTTP Request and Response Header:</strong><br />
<a href="http://web-sniffer.net/">Web sniffer</a><br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#index"><img alt="Back to Index" height="20" src="http://www.techsupportalert.com/files/images/arrow-blue-rounded-left.jpg" title="Back to Index" width="20" /></a><br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title"><a href="" name="Vista_security"></a>Vista/Windows 7 specific security</div></td> </tr>
<tr> <td> <b>Better UAC</b>:<br />
<a href="http://www.tweak-uac.com/" target="_blank">#TweakUAC</a><br />
<a href="http://www.nortonlabs.com/inthelab/uac.php" target="_blank">Norton UAC Tool</a><br />
<strong>Better XP mod</strong><strong>e</strong><strong>:</strong><br />
<a href="http://www.vmlite.com/">VMLite</a><br />
<a href="http://www.howtogeek.com/howto/10911/run-xp-mode-on-windows-7-machines-without-hardware-virtualization/">VMware</a><br />
<b>DEP:</b><br />
<a href="http://www.vistax64.com/tutorials/65790-dep-turn-off-programs.html" target="_blank">turning DEP on</a><br />
<strong>SEHOP:<br />
</strong><a href="http://support.microsoft.com/kb/956607">Turning SEHOP on</a><br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#index"><img alt="Back to Index" height="20" src="http://www.techsupportalert.com/files/images/arrow-blue-rounded-left.jpg" title="Back to Index" width="20" /></a><br />
</td> </tr>
</tbody> </table><table class="review"><tbody>
<tr> <td class="review-title"> <div class="review-title"><a href="" name="Notes"></a>Notes</div></td> </tr>
<tr> <td> <em><a href="" name="choices"></a># My current choices for real-time protection<br />
</em><br />
Vista laptop:<br />
<ul><li>LUA</li>
<li>Windows Firewall</li>
<li>Sandboxie Pro</li>
<li>Prevx free with SafeOnline</li>
<li>TweakUAC</li>
</ul>XP desktop:<br />
<ul><li>Defencewall personal firewall</li>
<li>Prevx with SafeOnline</li>
<li>Winpatrol Plus</li>
</ul>This is setup for my friends and relatives:<br />
<ul><li>Microsoft Security Essentials</li>
<li>Windows Firewall</li>
<li>Prevx free with SafeOnline</li>
<li>LUA (Vista, 7)</li>
<li>TweakUAC (Vista, 7)</li>
</ul><hr /> <a href="" name="other"></a><em>♦ Other noteworthy products</em><br />
<ul><li>WoT</li>
<li>Adblock Plus</li>
<li>Virustotal uploader</li>
<li>Secunia software inspector</li>
<li>CS lite</li>
<li>Process tamer</li>
<li>Mozy</li>
<li>Teracopy</li>
<li>VTzilla</li>
</ul><hr /> <em><a href="" name="cleanup"></a></em>⇒ <em>Malware detection/removal tools</em><br />
Below a combat proven cleaning process for removing stubborn malware. (Start with boot cd:s to kill most resistance before going to Windows.)<br />
<ol><li>AV boot cd - Avira/Kaspersky</li>
<li>UBCD4Win + DrWeb Cureit/Emsisoft Emergency*</li>
<li>If system becomes unbootable try repairing Windows with the XP recovery console or Vista/7 system recovery options menu. (These may be found in the boot menu, but if they have not been installed, you can use them with original install cd or with a specially made recovery cd. (Look also <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#System_rescue">here</a>.)</li>
<li>Hitman Pro**</li>
<li>Malwarebytes antimalware</li>
<li>Prevx free + manual cleaning with UBCD4Win if needed</li>
<li>Switch <a href="http://en.wikipedia.org/wiki/Windows_Firewall">Windows firewall</a> on.</li>
<li>Winpatrol (For manual analysis: HOSTS-file, startups etc.)</li>
<li><a href="http://rootkitanalytics.com/userland/streamarmor.php">Clean Alternate Data Streams</a> (ADS)</li>
<li>Uninstall old AV. Install new AV and scan with it.</li>
<li>Remove with CCleaner temp-files and clean registry. (Take registry snapshot before cleaning.)</li>
<li>Verify the Integrity of Windows system files (<a href="http://www.google.fi/url?sa=t&source=web&cd=2&ved=0CB4QFjAB&url=http%3A%2F%2Fsupport.microsoft.com%2Fkb%2F929833&ei=QhBpTJKzK5ugOOqd9bkF&usg=AFQjCNFB9dmIaV4iNgy968vxz0S3TGi8lA&sig2=l7xaDsqsTSv0U-WfW0NLkA">sfc /scannow</a>)</li>
<li>Check for <a href="http://www.google.fi/url?sa=t&source=web&cd=1&ved=0CCEQFjAA&url=http%3A%2F%2Fwindowsupdate.microsoft.com%2F&ei=6aBvTPWVHY2Sswb-5sy5Bg&usg=AFQjCNEug1leQo3NEunhDOU1qyizGL4HYg&sig2=vK4bVFHcvYC97zWgEKaWOQ">Windows/Microsoft</a> updates.</li>
<li>Check updates of other programs with <a href="http://secunia.com/vulnerability_scanning/online/">Secunia sofware inspector</a></li>
<li><a href="http://www.cyberciti.biz/faq/how-to-find-out-what-my-dns-servers-address-is/">Check</a> DNS-settings. <a href="http://homeofficeforum.ca.com/homeofficeforum/attachment.php?attachmentid=9&d=1226684292"><span>Here</span></a> more info. </li>
<li>Empty the system restore and create a new restore point. (<a href="http://www.microsoft.com/windowsxp/using/helpandsupport/getstarted/ballew_03may19.mspx">XP</a>, <a href="http://www.howtogeek.com/howto/windows-vista/using-windows-vista-system-restore/">Vista/7</a>)</li>
<li>run <a href="http://en.wikipedia.org/wiki/CHKDSK">chkdsk /r</a></li>
</ol>*) Notice, that all <a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#portable">these</a> portable antimalware can be used with UBCD4Win boot cd. You can copy them to hard disk, USB stick or CD. Run always "full scan".<br />
**) If you meet a malware that still blocks executables, try a "Force Breach" start of Hitman Pro (hold the left Ctrl-key until the man with the ladder appears while opening Hitman Pro). If you get UAC prompt you need to keep holding ctrl while you acknowledge the message. In case the internet connection is broken or unavailable, start a Early Warning Scoring (EWS) scan by selecting it from the Next button. This will also reveal: 1) The use of a local proxy server (an indication of malware redirecting or sniffing your web activity). 2) Check and fix an invalid Winsock stack. 3) Detect problems with NDIS (Network Driver Interface). 4) Track down rootkits or other malware that are cloaked, perform suspicious activity or have many bad characteristcs (unethical construction and/or behavior).<br />
<hr /> <em><a href="" name="bank"></a></em><em>My banking advice</em><br />
Use one <a href="http://www.helpwithwindows.com/WindowsVista/lua.html">LUA</a> for ALL everyday use and make another LUA which is used ONLY for banking. The point is, that if the everyday LUA is infected, the infection is limited to that account. (99.99% safety guaranteed. This of course requires, that you are not yet infected, and don't install malware with adminstrative rights in the future.)<br />
And get the <a href="http://www.facebook.com/pages/Prevx-SafeOnline/254680228961?v=info">free version</a> of Prevx SafeOnline.<br />
<hr /> <a href="" name="direct_link"></a><em>Direct link forbidden</em><br />
Due to site politics direct links to executable files and non-green WOT-sites are forbidden. In such cases replace [dot] with . and the link will work.<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#index"><br />
</a><br />
<hr /> <a href="" name="ss"></a><em>Other anti-rootkits</em><br />
There are numerous anti-rootkits. I give here some more. They may be very good, but I cannot recommeded them, as I don't know anything about their quality:<br />
<ul><li><a href="http://www.tizersecure.com/rootkit.php">Tizer</a></li>
</ul><hr /> <em><a href="" name="test"></a>My proposal for a simple AV/AM testing methodology<br />
</em><br />
<strong>Cleaning test</strong><br />
1.install AM<br />
2.boot<br />
3.run Tiny watcher<br />
4.real-time protection off<br />
5.take 10 samples, check at Virustotal<br />
6.install samples (monitor with Process explorer to see if really runs)<br />
7.boot<br />
8.realtime protection on<br />
9.Clean, boot, Clean, boot, Clean, boot,.....<br />
10.run TW again (what is left)<br />
11.Check rootkits (+others) with Prevx free + Hitman pro<br />
<strong>Protection test (samples)</strong><br />
1.take 10 samples (checked at Virustotal)<br />
2.install AM<br />
3.boot<br />
4.run Tiny watcher<br />
5.install samples (monitor with Process explorer to see if really runs)<br />
6.Boot<br />
7.Clean, boot, Clean, boot, Clean, boot,.....<br />
8.run TW again (what is left)<br />
9.Check rootkits (+others) with Prevx free + Hitman pro<br />
<strong>Protection test (exploits)</strong><br />
1.take 5 exploits<br />
2.install AM, old adobe, old java, old flash<br />
3.boot<br />
4.run Tiny watcher<br />
5.run exploits (monitor with Process explorer to see if really runs)<br />
6.Boot<br />
7.Clean, boot, Clean, boot, Clean, boot,.....<br />
8.run TW again (what is left)<br />
9.Check rootkits (+others) with Prevx free + Hitman pro<br />
<hr /> <a href="" name="prison"></a><em>Prisoners on remand </em>(might be somewhat useful, but not recommended)<br />
<a href="http://www.incodesolutions.com/removeit.php">RemoveIT Pro</a> (too many dangerous false positives)<br />
<a href="http://www.raymond.cc/blog/archives/2008/01/09/scan-your-computer-with-multiple-anti-virus-for-free/" target="_blank">Multi-AV Scanning Tool</a> (some reports of crippling the system)<br />
<a href="http://www[dot]replaceuac.com/">Replace UAC</a> (This company makes also a rogue called True Sword)<br />
<a href="http://en.wikipedia.org/wiki/Winpooch" target="_blank">Winpooch</a> (not compatible with XP SP3)<br />
<a href="http://sourceforge.net/projects/whips/" target="_blank">WIPS</a> (PoC-software, very demanding)<br />
<a href="http://www.digital-defender.com/#dig...irus-free-pane">Digital defender</a>, <a href="http://www.atom-core.com/index.php?o...=article&id=3&...">Blue Atom</a>, <a href="http://%20http//www.innobate.com/Products/InnobateAntiVirus/">Innobate</a> , <a href="http://www.moonsecure.com/index.php">Moon Secure</a> (low detection rate AV)<b><br />
</b><a href="http://www.corbitek.ro/content/corbi...tware-products">Corbitek</a>, <a href="http://www.emco.is/products/malware-destroyer/features.php">Emco Malware destroyer</a> , <a href="http://www.mysystemexpert.com/page3.html">Mysystemexpert</a> (low detection rate AM)<b><br />
</b><br />
<hr /> <a href="" name="waste"></a><em>Doing time in jail </em>(not recommended)<br />
NoAdware (rogue)<br />
IObit Security 360, IObit Advanced SystemCare Free, IObit Uninstaller, IObit Smart Defrag (probable MBAM database theft)<br />
<hr /> <em>Probably the Best Free Security List in the World (c) 2009-2010 Antti Koponen</em><br />
<em>Disclaimer: Some of these programs may harm your PC (especially when misused). Use at your own risk.</em><br />
<a href="http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm#index"><img alt="Back to Index" height="20" src="http://www.techsupportalert.com/files/images/arrow-blue-rounded-left.jpg" title="Back to Index" width="20" /></a></td></tr>
</tbody></table>Surenhttp://www.blogger.com/profile/09789784724534128579noreply@blogger.com0tag:blogger.com,1999:blog-5123376846625329520.post-77159587577418316662010-09-07T20:58:00.000+05:302010-09-07T20:58:10.193+05:30<h1>Securing Your Web Browser</h1><small> </small><hr noshade="noshade" style="height: 2px; width: 100%;" /><small><br />
<a href="" name="introduction"></a>This paper will help you configure your web browser for safer internet surfing. It is written for home computer users, students, small business workers, and any other person who works with limited Information Technology (IT) support and broadband (cable modem, DSL) or dial-up connectivity. Although the information in this document may be applicable to users with formal IT support as well, organizational IT policies should supersede these recommendations. If you are responsible for IT policies for your organization, please consider implementing these recommendations as part of your policy.<br />
<br />
</small><small><br />
</small><hr noshade="noshade" style="height: 2px; width: 100%;" /> <h2><small><a href="" name="why"></a>I. Why Secure Your Web Browser?</small></h2><small>Today, web browsers such as Internet Explorer, Mozilla Firefox, and Apple Safari (to name a few), are installed on almost all computers. Because web browsers are used so frequently, it is vital to configure them securely. Often, the web browser that comes with an operating system is not set up in a secure default configuration. Not securing your web browser can lead quickly to a variety of computer problems caused by anything from spyware being installed without your knowledge to intruders taking control of your computer.<br />
<br />
Ideally, computer users should evaluate the risks from the software they use. Many computers are sold with software already loaded. Whether installed by a computer manufacturer, operating system maker, Internet Service Provider, or by a retail store, the first step in assessing the vulnerability of your computer is to find out what software is installed and how one program will interact with another. Unfortunately, it is not practical for most people to perform this level of analysis.<br />
<br />
There is an increasing threat from software attacks that take advantage of vulnerable web browsers. We have observed a trend whereby new software vulnerabilities are exploited and directed at web browsers through use of compromised or malicious web sites. This problem is made worse by a number of factors, including the following: </small><ul><li><small>Many users have a tendency to click on links without considering the risks of their actions.</small></li>
<li><small>Web page addresses can be disguised or take you to an unexpected site.</small></li>
<li><small>Many web browsers are configured to provide increased functionality at the cost of decreased security.</small></li>
<li><small>New security vulnerabilities may have been discovered since the software was configured and packaged by the manufacturer.</small></li>
<li><small>Computer systems and software packages may be bundled with additional software, which increases the number of vulnerabilities that may be attacked.</small></li>
<li><small>Third-party software may not have a mechanism for receiving security updates.</small></li>
<li><small>Many web sites require that users enable certain features or install more software, putting the computer at additional risk.</small></li>
<li><small>Many users do not know how to configure their web browsers securely.</small></li>
<li><small>Many users are unwilling to enable or disable functionality as required to secure their web browser.</small></li>
</ul><small>As a result, exploiting vulnerabilities in web browsers has become a popular way for attackers to compromise computer systems. <br />
<br />
In addition to following this paper's recommendations, refer to the documentation in the <a href="http://www.cert.org/tech_tips/securing_browser/#references">References</a> section for other steps you can take to secure your system.<br />
<br />
<br />
</small><h2><small><a href="" name="features"></a>II. Web Browser Features and Risks</small></h2><small>It is important to understand the functionality and features of the web browser you use. Enabling some web browser features may lower security. Often, vendors will enable features by default to improve the computing experience, but these features may end up increasing the risk to the computer.<br />
<br />
<span style="color: red;"></span>Attackers focus on exploiting client-side systems (your computer) through various vulnerabilities. They use these vulnerabilities to take control of your computer, steal your information, destroy your files, and use your computer to attack other computers. A low-cost way attackers do this is by exploiting vulnerabilities in web browsers. An attacker can create a malicious web page that will install <a href="http://www.cert.org/advisories/CA-1999-02.html">Trojan</a> software or spyware that will steal your information. Additional information about spyware is available in the following document: <a href="http://www.cert.org/archive/pdf/spyware2005.pdf">http://www.cert.org/archive/pdf/spyware2005.pdf</a>. Rather than actively targeting and attacking vulnerable systems, a malicious web site can passively compromise systems as the site is visited. A malicious HTML document can also be emailed to victims. In these cases, the act of opening the email or attachment can compromise the system.<br />
<br />
Some specific web browser features and associated risks are briefly described below. Understanding what different features do will help you understand how they affect your web browser's functionality and the security of your computer.<br />
<br />
<span style="font-weight: bold;"><a href="" name="activex"></a>ActiveX</span> is a technology used by Microsoft Internet Explorer on Microsoft Windows systems. ActiveX allows applications or parts of applications to be utilized by the web browser. A web page can use ActiveX components that may already reside on a Windows system, or a site may provide the component as a downloadable object. This gives extra functionality to traditional web browsing, but may also introduce more severe vulnerabilities if not properly implemented.<br />
<br />
ActiveX has been plagued with various vulnerabilities and implementation issues. One problem with using ActiveX in a web browser is that it greatly increases the attack surface, or “attackability,” of a system. Installing any Windows application introduces the possibility of new ActiveX controls being installed. Vulnerabilities in ActiveX objects may be exploited via Internet Explorer, even if the object was never designed to be used in a web browser (<a href="http://www.kb.cert.org/vuls/id/680526">VU#680526</a>). In 2000, the CERT/CC held a workshop to analyze security in ActiveX. The results from that workshop may be viewed at <a href="http://www.cert.org/reports/activeX_report.pdf">http://www.cert.org/reports/activeX_report.pdf</a>. Many vulnerabilities with respect to ActiveX controls lead to severe impacts. Often an attacker can take control of the computer. You can search the Vulnerability Notes Database for ActiveX vulnerabilities at <a href="http://www.kb.cert.org/vuls/byid?searchview&query=activex">http://www.kb.cert.org/vuls/byid?searchview&query=activex</a>.<br />
<br />
<span style="font-weight: bold;"><a href="" name="java"></a>Java</span> is an object-oriented programming language that can be used to develop active content for web sites. A Java Virtual Machine, or JVM, is used to execute the Java code, or “<a href="http://java.sun.com/applets/">applet</a>,” provided by the web site. Some operating systems come with a JVM, while others require a JVM to be installed before Java can be used. Java applets are operating system independent.<br />
<br />
Java applets usually execute within a “<a href="http://java.sun.com/j2se/1.4.2/docs/guide/security/spec/security-spec.doc1.html#18313">sandbox</a>” where the interaction with the rest of the system is limited. However, various implementations of the JVM contain vulnerabilities that allow an applet to bypass these restrictions. Signed Java applets can also bypass sandbox restrictions, but they generally prompt the user before they can execute. You can search the Vulnerability Notes Database for Java vulnerabilities at <a href="http://www.kb.cert.org/vuls/byid?searchview&query=java">http://www.kb.cert.org/vuls/byid?searchview&query=java</a>.<br />
<br />
<span style="font-weight: bold;"><a href="" name="plug-ins"></a>Plug-ins</span> are applications intended for use in the web browser. Netscape has developed the NPAPI standard for developing plug-ins, but this standard is used by multiple web browsers, including Mozilla Firefox and Safari. Plug-ins are similar to ActiveX controls but cannot be executed outside of a web browser. Adobe Flash is an example of an application that is available as a plug-in.<br />
<br />
Plug-ins can contain programming flaws such as <a href="http://www.cert.org/homeusers/buffer_overflow.html">buffer overflows</a>, or they may contain design flaws such as cross-domain violations, which arises when the <a href="http://www.mozilla.org/projects/security/components/same-origin.html">same origin policy</a> is not followed.<br />
<br />
<span style="font-weight: bold;"><a href="" name="cookies"></a>Cookies</span> are files placed on your system to store data for specific web sites. A cookie can contain any information that a web site is designed to place in it. Cookies may contain information about the sites you visited, or may even contain credentials for accessing the site. Cookies are designed to be readable only by the web site that created the cookie. Session cookies are cleared when the browser is closed, and persistent cookies will remain on the computer until the specified expiration date is reached.<br />
<br />
Cookies can be used to uniquely identify visitors of a web site, which some people consider a violation of privacy. If a web site uses cookies for authentication, then an attacker may be able to acquire unauthorized access to that site by obtaining the cookie. Persistent cookies pose a higher risk than session cookies because they remain on the computer longer.<br />
<br />
<span style="font-weight: bold;"><a href="" name="javascript"></a>JavaScript</span>, also known as ECMAScript, is a scripting language that is used to make web sites more interactive. There are specifications in the JavaScript standard that restrict certain features such as accessing local files.<br />
<br />
<span style="font-weight: bold;"><a href="" name="vbscript"></a>VBScript</span> is another scripting language that is unique to Microsoft Windows Internet Explorer. VBScript is similar to JavaScript, but it is not as widely used in web sites because of limited compatibility with other browsers.<br />
<br />
The ability to run a scripting language such as JavaScript or VBScript allows web page authors to add a significant amount of features and interactivity to a web page. However, this same capability can be abused by attackers. The default configuration for most web browsers enables scripting support, which can introduce multiple vulnerabilities, such as the following:<br />
<br />
</small><ul><li><span style="font-weight: bold;"><small><a href="" name="xss"></a>Cross-Site Scripting</small></span><small><br />
<br />
Cross-Site Scripting, often referred to as XSS, is a vulnerability in a web site that permits an attacker to leverage the trust relationship that you have with that site. For a high-level description of XSS attacks, please see the whitepaper published at <a href="http://www.cert.org/archive/pdf/cross_site_scripting.pdf">http://www.cert.org/archive/pdf/cross_site_scripting.pdf</a>. Note that Cross-Site Scripting is not usually caused by a failure in the web browser. You can search the Vulnerability Notes Database for Cross-Site Scripting vulnerabilities at <a href="http://www.kb.cert.org/vuls/byid?searchview&query=cross-site+scripting">http://www.kb.cert.org/vuls/byid?searchview&query=cross-site+scripting</a>.<br />
<br />
</small></li>
<li><span style="font-weight: bold;"><small><a href="" name="cross-domain"></a>Cross-Zone and Cross-Domain Vulnerabilities</small></span><small> <br />
<br />
Most web browsers employ security models to prevent script in a web site from accessing data in a different domain. These security models are primarily based on the Netscape Same Origin Policy: <a href="http://www.mozilla.org/projects/security/components/same-origin.html">http://www.mozilla.org/projects/security/components/same-origin.html</a>. Internet Explorer also has a policy to enforce security zone separation: <a href="http://www.microsoft.com/windows/ie/ie6/using/howto/security/setup.mspx">http://www.microsoft.com/windows/ie/ie6/using/howto/security/setup.mspx</a>. <br />
<br />
Vulnerabilities that violate these security models can be used to perform actions that a site could not normally perform. The impact can be similar to a cross-site scripting vulnerability. However, if a vulnerability allows for an attacker to cross into the local machine zone or other protected areas, the attacker may be able to execute arbitrary commands on the vulnerable system. You can search the Vulnerability Notes Database for cross-zone and cross-domain vulnerabilities at <a href="http://www.kb.cert.org/vuls/byid?searchview&query=cross-domain">http://www.kb.cert.org/vuls/byid?searchview&query=cross-domain</a>.<br />
<br />
</small></li>
<li><span style="font-weight: bold;"><small><a href="" name="evasion"></a>Detection evasion </small></span><small><br />
<br />
Anti-virus, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems (IPS) generally work by looking for specific patterns in content. If a “known bad” pattern is detected, then the appropriate actions can take place to protect the user. But because of the dynamic nature of programming languages, scripting in web pages can be used to evade such protective systems. </small></li>
</ul><small><br />
</small><h2><small><a href="" name="how_to_secure"></a>III. How to Secure Your Web Browser</small></h2><small>Some software features that provide functionality to a web browser, such as ActiveX, Java, Scripting (JavaScript, VBScript, etc), may also introduce vulnerabilities to the computer system. These may stem from poor implementation, poor design, or an insecure configuration. For these reasons, you should understand which browsers support which features and the risks they could introduce. Some web browsers permit you to fully disable the use of these technologies, while others may permit you to enable features on a per-site basis.<br />
<br />
This section shows you how to securely configure a few of the most popular web browsers and how to disable features that can cause vulnerabilities. We encourage you to visit the vendor's web site for the browser you use to learn more. If a vendor does not provide documentation on how to secure the browser, we encourage you to contact them and request more information. <br />
<br />
Multiple web browsers may be installed on your computer. Other software applications on your computer, such as email clients or document viewers, may use a different browser than the one you normally use to access the web. Also, certain file types may be configured to open with a different web browser. Using one web browser for manually interacting with web sites does not mean other applications will automatically use the same browser. For this reason, it is important to securely configure each web browser that may be installed on your computer. One advantage to having multiple web browsers is that one browser can be used for only sensitive activities such as online banking, and the other can be used for general purpose web browsing. This can minimize the chances that a vulnerability in a web browser, web site, or related software can be used to compromise sensitive information.<br />
<br />
Web browsers are frequently updated. Depending on the version of your software, the features and options may move or change.<br />
<br />
<br />
</small><h4><small><a href="" name="Internet_Explorer"></a>A. Microsoft Internet Explorer</small></h4><small><br />
Microsoft Internet Explorer (IE) is a web browser integrated into the Microsoft Windows operating system. Removal of this application is not practical.<br />
<br />
<a href="" name="ieactivex"></a> In addition to supporting Java, scripting and other forms of active content, Internet Explorer implements ActiveX technology. While any application is potentially vulnerable to attack, it is possible to mitigate a number of serious vulnerabilities by using a web browser that does not support ActiveX controls. However, using an alternate browser may affect the functionality of some sites that require the use of ActiveX controls. Note that using a different web browser will not remove IE, or other Windows components from the system. Other software, such as email clients, may use IE, the WebBrowser ActiveX control (WebOC), or the IE HTML rendering engine (MSHTML). Results from the CERT/CC ActiveX workshop in 2000 are available at <a href="http://www.cert.org/reports/activeX_report.pdf">http://www.cert.org/reports/activeX_report.pdf</a>.<br />
<br />
Here are steps to disable various features in Internet Explorer 7. Note that menu options may vary between versions of IE, so you should adapt the steps below as appropriate.<br />
<br />
<br />
In order to change settings for Internet Explorer, select <span style="font-weight: bold;">Tools</span> then <span style="font-weight: bold;">Internet Options…<br />
<br />
</span> <img alt="IE Internet Options Menu" src="http://www.cert.org/tech_tips/securing_browser/images_syb/tools_internet_options_ie7.png" style="height: 384px; width: 302px;" /><br />
<br />
<span style="font-weight: bold;"></span><br />
<br />
<a href="" name="securitytab"></a> Select the <span style="font-weight: bold;">Security</span> tab. On this tab you will find a section at the top that lists the various security zones that Internet Explorer uses. More information about Internet Explorer security zones is available in the Microsoft document <a href="http://www.microsoft.com/windows/ie/using/howto/security/setup.mspx">Setting Up Security Zones</a>. For each of these zones, you can select a Custom Level of protection. By clicking the <span style="font-weight: bold;">Custom Level</span> button, you will see a second window open that permits you to select various security settings for that zone. The <span style="font-weight: bold;">Internet</span> zone is where all sites initially start out. The security settings for this zone apply to all the web sites that are not listed in the other security zones. We recommend the <span style="font-weight: bold;">High</span> security setting be applied for this zone. By selecting the High security setting, several features including ActiveX, Active scripting, and Java will be disabled. With these features disabled, the browser will be more secure. Click the <span style="font-weight: bold;">Default Level</span> button and then drag the slider control up to <span style="font-weight: bold;">High</span>.<br />
<br />
<img alt="IE Internet Options Security" src="http://www.cert.org/tech_tips/securing_browser/images_syb/ie7_internet_zone_high.png" style="height: 519px; width: 413px;" /><br />
<br />
<a href="" name="customlevel"></a> For a more fine-grained control over what features are allowed in the zone, click the <span style="font-weight: bold;">Custom Level</span> button. Here you can control the specific security options that apply to the current zone. For example ActiveX can be disabled by selecting <span style="font-weight: bold;">Disable</span> for <span style="font-weight: bold;">Run ActiveX controls and plug-ins</span>. Default values for the High security setting can be selected by choosing <span style="font-weight: bold;">High</span> and clicking the <span style="font-weight: bold;">Reset</span> button to apply the changes.<br />
<br />
<img alt="IE High Security
Settings" src="http://www.cert.org/tech_tips/securing_browser/images_syb/ie7_high_security.png" style="height: 479px; width: 417px;" /><br />
<br />
<br />
<br />
<a href="" name="trustedsites"></a> The <span style="font-weight: bold;">Trusted sites</span> zone is a <a href="http://www.microsoft.com/windows/ie/ie6/using/howto/security/settings.mspx">security zone</a> for sites that you think are safe to visit. You believe that the site is designed with security in mind and that it can be trusted not to contain malicious content. To add or remove sites from this zone, you can click the <span style="font-weight: bold;">Sites…</span> button. This will open a secondary window listing the sites that you trust and permitting you to add or remove them. You may also require that only verified sites (HTTPS) can be included in this zone. This gives you greater assurance that the site you are visiting is the site that it claims to be. <br />
<br />
<img alt="IE Trusted Sites" src="http://www.cert.org/tech_tips/securing_browser/images_syb/ie7_trusted_sites.png" style="height: 519px; width: 413px;" /><br />
<br />
<img alt="IE Trusted Sites Details" src="http://www.cert.org/tech_tips/securing_browser/images_syb/ie7_trusted_sites_details.png" style="height: 342px; width: 384px;" /><br />
<br />
We recommend setting the security level for the <span style="font-weight: bold;">Trusted sites</span> zone to <span style="font-weight: bold;">Medium-high</span><span style="font-weight: bold;"></span> (or <span style="font-weight: bold;">Medium</span> for Internet Explorer 6 and earlier). When the Internet Zone is set to <span style="font-weight: bold;">High</span>, you may encounter web sites that do not function properly due to one or more of the associated security settings. This is where the <span style="font-weight: bold;">Trusted sites</span> zone can help. If you trust that the site will not contain malicious content, you can add it to the list of sites in the Trusted sites zone. Once a site is added to this zone, features such as ActiveX and Active scripting will be enabled for the site. The benefit of this type of configuration is that IE will be more secure by default, and sites can be “whitelisted” in the Trusted sites zone to gain extra functionality.<br />
<br />
<br />
<a href="" name="privacy"></a> The <span style="font-weight: bold;">Privacy</span> tab contains settings for cookies. Cookies are text files placed on your computer by various sites that you visit either directly (first-party) or indirectly (third-party) through ad banners, for example. A cookie can contain any data that a site wishes to store. It is often used to track your computer as you move through a web site and store information such as preferences or credentials. We recommend that you select the <span style="font-weight: bold;">Advanced</span> button and select <span style="font-weight: bold;">Override automatic cookie handling</span>. Then select <span style="font-weight: bold;">Prompt</span> for both first and third-party cookies. This will prompt you each time a site tries to place a cookie on your machine. If the number of cookie prompts is too excessive, the option to <span style="font-weight: bold;">Always allow session cookies</span> can be enabled. This will allow non-persistent cookies to be accepted without user interaction. Session cookies have less risk than persistent cookies. <br />
<br />
<img alt="IE Privacy Settings" height="459" src="http://www.cert.org/tech_tips/securing_browser/images_syb/privacy.png" width="406" /><br />
<br />
<img alt="IE Advanced Privacy" src="http://www.cert.org/tech_tips/securing_browser/images_syb/advanced_privacy.png" style="height: 302px; width: 378px;" /><br />
<br />
You can then evaluate the originating site, whether you wish to accept or deny the cookie, and what action to take (allow or block, with the option to remember the decision for all future cookies from that web site). For example, if visiting a web site causes a cookie prompt from a web domain that is associated with advertising, you may wish to click <span style="font-weight: bold;">Block Cookie</span> to prevent that domain from being able to set cookies on your computer, for privacy reasons.<br />
<br />
<img alt="Cookie Details" src="http://www.cert.org/tech_tips/securing_browser/images_syb/ie7_cookie_details.png" style="height: 442px; width: 405px;" /><br />
<br />
By selecting the <span style="font-weight: bold;">Sites...</span> button, you can manage the cookie settings for specific sites. You can add or remove sites, and you can change the current settings for existing sites. The bottom section of this window will specify the domain of the site and the action to take when that site wants to place a cookie on your machine. You can use the upper section of this window to change these settings.<br />
<br />
<img alt="IE Per Site Privacy" height="468" src="http://www.cert.org/tech_tips/securing_browser/images_syb/per_site_privacy.png" width="441" /><br />
<br />
Alternatively, if you do not wish to receive warning dialogs when a site attempts to set a cookie, you can use Internet Explorer's pre-set privacy rules. Click the <span style="font-weight: bold;">Default</span> button and then drag the slider up to <span style="font-weight: bold;">High</span>. Note that some web sites may fail to function properly with the <span style="font-weight: bold;">High</span> setting. In such cases, you may add the site to the list of sites for which cookies are allowed, as described above.<br />
<br />
<img alt="IE Privacy" src="http://www.cert.org/tech_tips/securing_browser/images_syb/ie7_cookies_high.png" style="height: 519px; width: 413px;" /><br />
<br />
<a href="" name="ieadvanced"></a> The <span style="font-weight: bold;">Advanced</span> tab contains settings that apply to all of the security zones. We recommend that you <span style="font-weight: bold;">disable</span> the <span style="font-weight: bold;">Enable third-party browser extensions</span> option. This option includes tool bars and Browser Helper Objects (BHOs). While some add-ons can be useful, they also have the ability to violate your privacy. For example, a browser add-on may monitor your web browsing habits, or even change the contents of web pages in an attempt to gather personal information.<br />
<br />
<img alt="IE Advanced Third-party" src="http://www.cert.org/tech_tips/securing_browser/images_syb/ie7_advanced_thirdparty.png" style="height: 519px; width: 413px;" /><br />
<br />
Internationalized Domain Names (IDN) can be abused to allow spoofing of web page addresses. This can allow phishing attacks to be more convincing. More details about IDN spoofing can be found in Vulnerability Note <a href="http://www.kb.cert.org/vuls/id/273262">VU#273262</a>. To protect against IDN spoofing in Internet Explorer, enable the <span style="font-weight: bold;">Always show encoded addresses</span> option. This will cause IDN addresses to be displayed in an encoded form in the Internet Explorer address bar and status bar, which will remove the visual similarity to the spoofing target address. <br />
<br />
We also recommend that you <span style="font-weight: bold;">disable</span> the <span style="font-weight: bold;">Play sounds in webpages</span> option. Sounds in web pages are rarely integral to web page content, and may also introduce security risks by having the browser process additional untrusted data. This option is for Internet Explorer's ability to natively handle sounds. It will not interfere with other software, such as Adobe Flash or Apple QuickTime.<br />
<br />
<img alt="IE Advanced IDN" src="http://www.cert.org/tech_tips/securing_browser/images_syb/ie7_advanced_idn.png" style="height: 519px; width: 413px;" /><br />
<br />
<br />
<br />
<a href="" name="programs"></a> Under the <span style="font-weight: bold;">Programs</span> tab, you can specify your default applications for viewing web sites, email messages and various other network related tasks. You can also disable Internet Explorer from asking you if you would like it to be your default web browser here.<br />
<br />
<img alt="IE Internet Options
Programs" src="http://www.cert.org/tech_tips/securing_browser/images_syb/ie7_internet_options_programs.png" style="height: 519px; width: 413px;" /><br />
<br />
<br />
<br />
</small><h4><small><a href="" name="Mozilla_Firefox"></a>B. Mozilla Firefox</small></h4><small>Mozilla Firefox supports many features of the same features as Internet Explorer, with the exception of ActiveX and the Security Zone model. Mozilla Firefox does have the underlying support for configurable security policies (<a href="http://www.mozilla.org/projects/security/components/ConfigPolicy.html">CAPS</a>), which is similar to Internet Explorer's Security Zone model, however there is no graphical user interface for setting these options. We recommend looking in the <span style="font-weight: bold;">Help</span>, <span style="font-weight: bold;">For Internet Explorer Users</span> menu to help users understand how terminology differs between the two applications.<br />
<br />
The following are some steps to disable various features in Mozilla Firefox. Note that some menu options may change between versions or may appear in different locations depending on the host operating system. You should adapt the steps below as appropriate.<br />
<br />
To edit the settings for Mozilla Firefox, select <span style="font-weight: bold;">Tools</span>, then <span style="font-weight: bold;">Options</span>.<br />
<br />
<img alt="Firefox Options" src="http://www.cert.org/tech_tips/securing_browser/images_syb/f2_tools_options.png" style="height: 245px; width: 464px;" /><br />
<br />
<br />
<a href="" name="ffgeneral"></a> You will then see an Options window that has a Category row at the top and the features for that category below. The first category of interest is the <span style="font-weight: bold;">General</span> category. Under this section, you can set Firefox as your default browser. Also select the option <span style="font-weight: bold;">Always ask me where to save files</span>. This will make it more obvious when a web page attempts to save a file to your computer.<br />
<br />
<img alt="Firefox General Options" src="http://www.cert.org/tech_tips/securing_browser/images_syb/f2_default.png" style="height: 472px; width: 469px;" /><br />
<br />
<br />
<a href="" name="ffprivacy"></a>Under the <span style="font-weight: bold;">Privacy</span> category, you will find options for browser History and Cookies. In the History section, disable the option to <span style="font-weight: bold;">Remember what I enter in forms and the search bar</span>. If the browser remembers these options, it can be a privacy violation, especially if the browser is used in a shared environment. Visited page and download history can be disabled here too.<br />
<br />
In the Cookie section, select <span style="font-weight: bold;">ask me every time</span>. This will help make it clear when a web site is attempting to set a cookie. <span style="font-weight: bold;"></span><br />
<br />
<img alt="Firefox Cookies" src="http://www.cert.org/tech_tips/securing_browser/images_syb/f2_cookies.png" style="height: 472px; width: 469px;" /> <br />
<br />
When the user is prompted, the contents of the cookie can be viewed and the user can select whether to <span style="font-weight: bold;">Deny</span>, <span style="font-weight: bold;">Allow for Session</span>, or <span style="font-weight: bold;">Allow</span> the cookie. This gives the user more information about what sites are using cookies and also gives more granular control of cookies as opposed to globally enabling them. Select <span style="font-weight: bold;">Use my choice for all cookies from this site</span> to have the browser remember your decision so that you will not be prompted each time you return to the site. Clicking the <span style="font-weight: bold;">Allow for Session</span> button will cause the cookie to be cleared when the browser is restarted. If prompting for each cookie is too excessive, the user may wish to select the <span style="font-weight: bold;">Keep until: I close Firefox</span> option. This will prevent web sites from being able to set persistent cookies.<br />
<br />
<img alt="Cookie confirmation" src="http://www.cert.org/tech_tips/securing_browser/images_syb/f2_cookie_details.png" style="height: 222px; width: 404px;" /><br />
<br />
<br />
<a href="" name="ffpassword"></a> Many web browsers will offer the ability to store login information. In general, we recommend against using such features. Should you decide to use the feature, ensure that you use the measures available to protect the password data on your computer. Under the <span style="font-weight: bold;">Security</span> category, the <span style="font-weight: bold;">Passwords</span> section contains various options to manage stored passwords, and a <span style="font-weight: bold;">Master Password </span>feature to encrypt the data on your system. We encourage you to use this option if you decide to let Mozilla Firefox manage your passwords.<br />
<br />
The <span style="font-weight: bold;">Warn me when sites try to install add-ons</span> option will display a warning bar at the top of the browser when a web site attempts to take such an action.<br />
<br />
<img alt="Firefox Passwords" src="http://www.cert.org/tech_tips/securing_browser/images_syb/f2_security.png" style="height: 472px; width: 469px;" /><br />
<br />
<br />
<a href="" name="ffcontent"></a> The <span style="font-weight: bold;">Content</span> category contains an option to <span style="font-weight: bold;">Enable Java</span>. Java is a programming language that permits web site designers to run applications on your computer. We recommend <span style="font-weight: bold;">disabling</span> this feature unless required by the trusted site you wish to visit. Again, you should determine if this site is trustworthy and whether you want to enable Java to view the site’s content. After you are finished visiting the site, we recommend disabling Java until needed again.<br />
<br />
Press the <span style="font-weight: bold;">Advanced</span> button to disable specific JavaScript features. We recommend disabling all of the options displayed in this dialog.<br />
<br />
<img alt="Firefox Web Features" src="http://www.cert.org/tech_tips/securing_browser/images_syb/f2_content.png" style="height: 472px; width: 469px;" /> <br />
<br />
<img alt="Firefox Advanced Javascript" height="205" src="http://www.cert.org/tech_tips/securing_browser/images_syb/f_content_advanced.png" width="263" /><br />
<br />
<br />
<a href="" name="ffdownloads"></a> The <span style="font-weight: bold;">Content</span> section has an option to modify actions taken when files are downloaded. Any time a file type is configured to automatically open with an associated application, this can make the browser more dangerous to use. Vulnerabilities in these associated applications can be exploited more easily when they are configured to automatically open. Click the <span style="font-weight: bold;">Manage</span> button to view the current download settings and modify them if necessary.<br />
<br />
<img alt="Firefox Download Options" src="http://www.cert.org/tech_tips/securing_browser/images_syb/f2_downloads.png" style="height: 472px; width: 469px;" /> <br />
<br />
<a href="" name="ffdownloadactions"></a> The Download Actions dialog will show the file types and the currently configured actions to take when the browser encounters such a file. For <span style="font-weight: bold;">all</span> listed file types, either select <span style="font-weight: bold;">Remove Action</span> or <span style="font-weight: bold;">Change Action...</span> to modify the action to save the file to the computer. This increases the amount of user action required to launch the associated applications, and will therefore help prevent automated exploitation of vulnerabilities that may exist in these applications.<br />
<br />
<img alt="Firefox Download Actions" height="341" src="http://www.cert.org/tech_tips/securing_browser/images_syb/f_download_actions.png" width="403" /> <br />
<br />
<img alt="Firefox Change Action" height="358" src="http://www.cert.org/tech_tips/securing_browser/images_syb/f_change_action.png" width="403" /><br />
<br />
<br />
<a href="" name="ffprivatedata"></a> Firefox 1.5 and later include a feature to <span style="font-weight: bold;">Clear Private Data</span>. This option will remove potentially sensitive information from the web browser. Select <span style="font-weight: bold;">Clear Private Data...</span> from the <span style="font-weight: bold;">Tools</span> menu to use this privacy feature.<br />
<br />
<img alt="Firefox Clear Private
Data" src="http://www.cert.org/tech_tips/securing_browser/images_syb/f2_tools_clear.png" style="height: 245px; width: 464px;" /> <br />
<br />
<img alt="Firefox Clear
Private Data" src="http://www.cert.org/tech_tips/securing_browser/images_syb/f2_clear_private_data.png" style="height: 247px; width: 337px;" /><br />
<br />
<a href="" name="noscript"></a>Because Firefox does not have easily-configured security zones like Internet Explorer, it can be difficult to configure the web browser options on a per-site basis. For example, a user may wish to enable JavaScript for a specific, trusted site, but have it disabled for all other sites. This functionality can be added to Firefox with an <a href="https://addons.mozilla.org/">add-on</a>, such as <a href="https://addons.mozilla.org/firefox/addon/722">NoScript</a>.<br />
<br />
With NoScript installed, JavaScript will be disabled for sites by default. The user can allow scripts for a web site by using the NoScript icon menu. Scripts can be allowed for a site on a temporary or a more permanent basis. If <span style="font-weight: bold;">Temporarily allow</span> is selected, then scripts are enabled for that site until the browser is closed.<br />
<br />
<img alt="NoScript icon" src="http://www.cert.org/tech_tips/securing_browser/images_syb/noscript_allow.png" style="height: 217px; width: 243px;" /><br />
<br />
<br />
Because many web browser vulnerabilities require scripting, configuring the browser to have scripting disabled by default greatly reduces the chances of exploitation. To extend this protection even further, NoScript can be configured to also block Java, Flash, and other plug-ins by default. This can help to mitigate any vulnerabilities in these plug-in technologies. NoScript will replace these elements with a placeholder icon, which can be clicked to enable the element. Click the NoScript icon and then click <span style="font-weight: bold;">Options...</span> to get to the NoScript configuration screen.<br />
<br />
<img alt="NoScript icon options" src="http://www.cert.org/tech_tips/securing_browser/images_syb/noscript_icon_options.png" style="height: 217px; width: 243px;" /><br />
<br />
On the <span style="font-weight: bold;">Plugins</span> tab, select the options as follows:<br />
<br />
<img alt="NoScript Advanced
Options" src="http://www.cert.org/tech_tips/securing_browser/images_syb/noscript_options.png" style="height: 441px; width: 511px;" /><br />
<br />
Aside from visiting web sites that are inherently malicious, users can also be put at risk when a legitimate, trusted site is compromised. For this reason, we recommend enabling the option to <span style="font-weight: bold;">Apply these restrictions to trusted sites too</span>. If this option is too intrusive, it can be turned off at the cost of increased risk.<br />
<br />
</small><h4><small><a href="" name="Safari"></a>C. Apple Safari</small></h4><small>The Safari web browser supports many of the same features as Mozilla Firefox. The following are some steps to disable various features in Safari on Mac OS X. The options for Safari for Microsoft Windows may differ slightly. Also note that some menu options may change over time, and you should adapt the steps below as appropriate.<br />
<br />
In order to change settings for Safari, select <span style="font-weight: bold;">Safari</span> then <span style="font-weight: bold;">Preferences…</span><br />
<br />
Note that on the Safari menu, you can also select the option “Block Pop-up Windows”. This option will prevent sites from opening another window through the use of scripting or active content. Be aware that while Pop-up Windows are often associated with advertisements, some sites may attempt to display relevant content in a new window. Therefore, setting this option may disable the functionality of some sites.<br />
<br />
<img alt="Safari Preferences" height="357" src="http://www.cert.org/tech_tips/securing_browser/images_syb/s_preferences.png" width="532" /><br />
<br />
<a href="" name="sgeneral"></a> Once you select the <span style="font-weight: bold;">Preferences</span> menu, the window below will open. The first tab to look at is the <span style="font-weight: bold;">General</span> tab. On this tab you can set up many options such as <span style="font-weight: bold;">Save downloaded files to:</span> and <span style="font-weight: bold;">Open “safe” files after downloading</span>. We recommend that you download files to a folder that you create for that purpose. We also recommend that you deselect the <span style="font-weight: bold;">Open “safe” files after downloading</span> option.<br />
<br />
<img alt="Safari General Preferences" height="515" src="http://www.cert.org/tech_tips/securing_browser/images_syb/s_general_preferred.png" width="538" /><br />
<br />
<br />
<a href="" name="sautofill"></a> The next section of interest is the <span style="font-weight: bold;">AutoFill</span> tab. On this tab, you can select what types of forms your browser will fill in automatically. In general, we recommend against using AutoFill features. If someone can gain access to your machine, or the AutoFill data files, then the AutoFill feature may allow them to use the stored credentials to access to other sites that they would not otherwise have the ability to access. However, if used with appropriate protective measures, it may be acceptable to enable AutoFill. We recommend using filesystem encryption software such as OS X <a href="http://docs.info.apple.com/article.html?path=Mac/10.4/en/mh1877.html">FileVault</a> along with the <span style="font-weight: bold;">Use secure virtual memory</span> option to provide additional security for files that reside in a user's home directory.<br />
<br />
<img alt="Safari Autofill" height="254" src="http://www.cert.org/tech_tips/securing_browser/images_syb/s_autofill.png" width="538" /><br />
<br />
<br />
<a href="" name="ssecurity"></a> The <span style="font-weight: bold;">Security</span> tab provides several options. The <span style="font-weight: bold;">Web Content</span> section permits you to enable or disable various forms of scripting and active content. We recommend disabling the first three options in this section, and only enabling them based on site-specific cases. We recommend selecting the <span style="font-weight: bold;">Block Pop-up Windows</span> option. Remember that this option will prevent sites from opening another window through the use of scripting, or active content. Again, be aware that while Pop-up Windows are often associated with advertisements, some sites may attempt to display relevant content in a new window. Therefore, setting this option may disable the functionality of some sites. <br />
<br />
It is safer to use Safari without plug-ins and Java, so we recommend <span style="font-weight: bold;">disabling</span> the options <span style="font-weight: bold;">Enable plug-ins</span> and <span style="font-weight: bold;">Enable Java</span>. It is also safer to <span style="font-weight: bold;">disable JavaScript</span>. However, many web sites require JavaScript for proper operation.<br />
<br />
In this dialog you can disable cookies and also view or remove cookies that have been set. In general we recommend disabling cookies, and enabling them only when you visit a site that requires their use. At this point, you should determine if the site is trustworthy and whether you want to enable cookies to view the site’s content. After you are finished visiting the site, we recommend disabling cookies until needed again. You can choose to only accept cookies from the sites that visit by selecting the <span style="font-weight: bold;">Only from sites you navigate to</span> option. This will permit sites that you visit to set cookies, but not third-party sites. Finally, we recommend selecting the <span style="font-weight: bold;">Ask before sending a non-secure form to a secure website</span> option. This will prompt you before sending unencrypted form data when viewing an HTTPS-secured web site.<br />
<br />
<img alt="Safari Security Settings" src="http://www.cert.org/tech_tips/securing_browser/images_syb/s_security_nojs.png" style="height: 430px; width: 538px;" /><br />
<br />
</small><h4><small><a href="" name="Other_Browsers"></a>D. Other Browsers</small></h4><small>Other web browsers may have similar options to those described above. Please refer to the browser documentation to determine which options are available and how to make the necessary changes. For example, the links below show where to find information for four popular web browsers:<br />
<br />
Opera - <a href="http://www.opera.com/support/tutorials/security">http://www.opera.com/support/tutorials/security</a><br />
Mozilla SeaMonkey - <a href="http://www.mozilla.org/projects/seamonkey">http://www.mozilla.org/projects/seamonkey</a><br />
Konqueror - <a href="http://www.konqueror.org/">http://www.konqueror.org</a><br />
Netscape - <a href="http://browser.netscape.com/">http://browser.netscape.com</a><br />
</small><div style="margin-left: 40px;"><small>Note that official support for Netscape has ended on February 1st, 2008. If you are using Netscape, we strongly recommend switching to a browser that is still supported.<br />
</small></div><small><br />
</small><h2><small><a href="" name="Staying_Secure"></a>IV. Keeping Your Computer Secure</small></h2><small>In addition to selecting and securing your web browser, you can take measures to increase protection to your computer in general. The following are steps and links to information resources that will help you secure your computer.<br />
</small><ol style="list-style-type: upper-alpha;"><li> <h4><small>Read the <a href="http://www.cert.org/tech_tips/home_networks.html">Home Network Security</a> and <a href="http://www.cert.org/homeusers/HomeComputerSecurity/">Home Computer Security</a> documents.</small></h4></li>
<li class="desc"> <h4><small>Enable automatic software updates if available</small></h4><small>Vendors will usually release patches for their software when a vulnerability has been discovered. Most product documentation offers a method to get updates and patches. You should be able to obtain updates from the vendor's web site. Read the manuals or browse the vendor's web site for more information.<br />
<br />
Some applications will automatically check for available updates, and many vendors offer automatic notification of updates via a mailing list. Look on your vendor's web site for information about automatic notification. If no mailing list or other automated notification mechanism is offered, you may need to check the vendor's web site periodically for updates. </small></li>
<li class="desc"> <h4><small>Install and use antivirus software</small></h4><small>While an up-to-date antivirus software package cannot protect against all malicious code, for most users it remains the best first-line of defense against malicious code attacks. Many antivirus packages support automatic updates of virus definitions. We recommend using these automatic updates when available. A partial list of antivirus vendors is available is available on the CERT/CC web site. </small></li>
<li class="desc"> <h4><small>Avoid unsafe behavior</small></h4><small>Additional information on this topic can be found in the <a href="http://www.cert.org/tech_tips/home_networks.html">Home Network Security</a> document.<br />
</small></li>
<ul><li class="desc"><small>Use caution when opening email attachments or when using peer-to-peer file sharing, instant messaging, or chat rooms.</small></li>
<li><small>Don't enable file sharing on network interfaces exposed directly to the internet.</small></li>
</ul><li class="desc"> <h4><small>Follow the principle of least privilege — don't enable it if you don't need it</small></h4><small>Consider creating and using an account with limited privileges instead of an 'administrator' or 'root' level account for everyday tasks. Depending on the operating system, you only need to use administrator level access when installing new software, changing system configurations, etc. Many vulnerability exploits (e.g., viruses, Trojan horses) are executed with the privileges of the user that runs them — making it far more risky to be logged in as an administrator all the time</small></li>
</ol>Surenhttp://www.blogger.com/profile/09789784724534128579noreply@blogger.com0tag:blogger.com,1999:blog-5123376846625329520.post-83334336716525628222010-09-07T20:55:00.000+05:302010-09-07T20:55:35.219+05:30Check Your Browser Defenses<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJmsGCT6UZAje9YllpK3LVxzBdVwRCaDEzt5HbIV6Q0DrTIZOlpBg226qRZtp2RETVA3lHXcthiD_KZuOhvMgl0cV7xO2R3J3ICv0Kphm81bSGRYYwTCCxLa00Yal21GiUJMSQuO6akuw/s1600/Vectored+Logo.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJmsGCT6UZAje9YllpK3LVxzBdVwRCaDEzt5HbIV6Q0DrTIZOlpBg226qRZtp2RETVA3lHXcthiD_KZuOhvMgl0cV7xO2R3J3ICv0Kphm81bSGRYYwTCCxLa00Yal21GiUJMSQuO6akuw/s320/Vectored+Logo.jpg" /></a></div><br />
I just discovered this site operated by security company Scanit and its set of tests is quite comprehensive. Given the current scumware plague, I strongly recommend you go to this site and test out your browser. It's free and only takes a couple of minutes.<br />
<a href="http://bcheck.scanit.be/bcheck/">http://bcheck.scanit.be/bcheck/</a>Surenhttp://www.blogger.com/profile/09789784724534128579noreply@blogger.com0tag:blogger.com,1999:blog-5123376846625329520.post-75731907943822194762010-09-07T17:35:00.000+05:302010-09-07T17:35:41.681+05:30<div class="post-header"> </div><b></b><span id="3180530340968500749"><div style="text-align: center;"><b>How to Hack Websites & Servers from Scratch : Step by Step Tutorial for Beginners</b></div><div style="text-align: center;"><b><br />
</b></div><br />
<div><br />
</div><div><b>NOTE:</b> I'm going to provide the common methodology that is followed when hacking a machine/network/server. This tutorial will give you a good understanding & an overview about professional penetration testing in a black box (attacker) point of view. It is designed to give you an idea on how an attacker can break into your system, what I am gonna say will increase your awareness & will open the door for you to go out & educate yourself easily. I gathered this information from various sources and tutorials, i have changed many things, clarified many parts, given some references, and put a lot of information together. I'm still a learner & on the way to my goal. However, this won't prevent me from teaching others what i have learned so far & don't worry, i'm not going to provide you with any info that i'm not sure about yet. It is not the best tutorial out there, but at least it is a good starter. I will speak in a hacker (attacker or blackbox) point of view. I write this tutorial for educational purposes only.</div><div><br />
</div><div><b><br />
</b><a href="http://www.freehacking.net/2010/02/best-penetration-testing-and.html"><b></b></a></div><br />
<div><b><br />
</b></div><div><b>NOTE: </b>No scans will be initiated against any systems/server until the outline of the system/server owner assessment plan is confirmed as acceptable to owner.</div><div><b><br />
</b></div><div><b>Tools Used during penetration testing are freely available on internet:</b></div><div><ol><li><a href="http://www.nessus.org/download/">NESSUS</a></li>
<li><a href="http://www.openvas.org/openvas-server.html">OpenVAS Server</a></li>
<li><a href="http://www.openvas.org/openvas-client.html">OpenVAS Client</a></li>
<li><a href="http://nmap.org/download.html">Nmap</a></li>
<li><a href="http://www.net-security.org/software.php?id=223">Nikto</a></li>
<li>SQLix download <a href="http://cedri.cc/tools/SQLiX_v1.0.tar.gz">here</a> or <a href="http://www.mediafire.com/?5lbt0tb1jee">here</a></li>
<li><a href="http://sqlmap.sourceforge.net/">SQLMap</a></li>
<li><a href="http://www.metasploit.com/framework/download/">Metasploit</a></li>
</ol><div><b><div><span class="Apple-style-span" style="font-weight: normal;">Before you hack a system, you must decide what your goal is. Are you hacking to put the system down, gaining sensitive data, breaking into the system and taking the 'root' access, screwing up the system by formatting everything in it, discovering vulnerabilities & see how you can exploit them, etc ... ? The point is that you have to decide what the goal is first.</span></div><div><span class="Apple-style-span" style="font-weight: normal;"><br />
</span></div><div>The most common goals are: </div><div><ol><li><span class="Apple-style-span" style="font-weight: normal;"><b><div style="display: inline ! important;"><span class="Apple-style-span" style="font-weight: normal;">Breaking into the system & taking the admin privileges.</span></div></b></span></li>
<li><span class="Apple-style-span" style="font-weight: normal;"><b><div style="display: inline ! important;"><span class="Apple-style-span" style="font-weight: normal;">Gaining sensitive data, such as credit cards, identification theft, etc.</span></div></b></span></li>
</ol></div><div><span class="Apple-style-span" style="font-weight: normal;"><b><div style="display: inline ! important;"><span class="Apple-style-span" style="font-weight: normal;">You should have all of your tools ready before you start taking the steps of hacking. There is a Unix version called backtrack. It is an Operating System that comes with various sets of security tools that will help you hack systems (penetration tests).</span></div></b></span></div><div><span class="Apple-style-span" style="font-weight: normal;"><br />
</span></div><div><span class="Apple-style-span" style="font-weight: normal;">You should set the steps (methodology) that you plan to take in your journey before you do anything else. There is a common methodology followed </span><span class="Apple-style-span" style="font-weight: normal;"><b><div style="display: inline ! important;"><span class="Apple-style-span" style="font-weight: normal;">by hackers, i will mention it below. However, you can create your own methodology if you know what you are doing.</span></div></b></span></div><div><br />
</div></b></div><div><b>Steps need to be followed to hack a server is as cited below:</b></div><div><ol><li>Do a manual review of the target system or server to get an overview of the target. This is phase-1 and known as <a href="http://www.freehacking.net/2009/03/hacking-phase-1-reconnaissance.html"><b>Reconnaissance</b></a><b>.</b></li>
<li>Second step is Service enumeration. Here you have to use Nmap to determine what services are open and available for manual testing. This is phase-2 and known as <a href="http://www.freehacking.net/2009/03/hacking-phase-2-scanning.html"><b>Scanning</b></a><b>.</b> To know how to perform Enumeration and footprinting attack, <a href="http://www.freehacking.net/2010/03/what-is-footprinting-fingerprinting.html"><b>visit this link</b></a><b>.</b></li>
<li>The third step is Scanning target to find the vulnerabilities. This is also part of phase-2 Scanning. For this you have to use NESSUS or OPEN VAS. These tools will scan all open ports, regardless of common and defaulted settings. This will confirm listening services and check those against a database of exploitable services. To see if you are running any services that are mis-configured or vulnerable to exploits. To know how NESSUS works <a href="http://www.cs.cmu.edu/%7Edwendlan/personal/nessus.html"><b>visit this link.</b></a><b> </b>If you want to working of NESSUS...OR How to use NESSUS <a href="http://www.symantec.com/connect/articles/introduction-nessus"><b>visit this link.</b></a> To visit NESSUS video tutorials available on internet <a href="http://www.google.co.in/search?hl=en&safe=off&tbo=p&tbs=vid:1&ei=NhTHS6jHIcu8rAfx5pG6CQ&sa=X&oi=spell&resnum=0&ct=result&cd=1&ved=0CFAQBSgA&q=how+to+use+nessus+video&spell=1"><b>visit this link.</b></a></li>
<li>You can also use Nikto. It will used to check the web server(s) for mis-configurations and exploitable web applications. To know how Nikto works <a href="http://informationgift.com/macnikto/"><b>visit this link.</b></a></li>
<li>After all these scanning, play with SQL. Use SQLiX and Sqlmap for this. You can also use few more SQL tools, softwares and techniques. To know these underground SQL tips n tricks <a href="http://www.freehacking.net/search/label/SQL%20injection"><b>visit this link.</b></a></li>
<li>The next step is to get access on system using the vulnerabilities found. This is phase-3 known as <a href="http://www.freehacking.net/2009/03/hacking-phase-3-gaining-access-hacker.html"><b>Gaining Access on remote system.</b></a> This you can achieve using Metasploit software. To know how to use metasploit,<b><a href="http://vimeo.com/videos/search:metasploit/a0b050ed"> </a></b><b><a href="http://vimeo.com/videos/search:metasploit/a0b050ed">visit this link.</a></b> Here you will all the available video tutorial for metasploit. A very good to start.<b> </b><a href="http://vimeo.com/videos/search:metasploit/page:1/sort:newest/format:thumbnail"><b>Using these videos</b></a> you can easily learn how to use metasploit. The most up to date video for Metasploit 3 can be found here: <a href="http://www.ethicalhacker.net/content/view/137/24/"><b>Exploring Metasploit 3 and the New and Improved Web Interface – Part 1</b></a><b> & </b><a href="http://www.ethicalhacker.net/content/view/136/24/"><b>Exploring Metasploit 3 and the New and Improved Web Interface – Part 2</b></a><b>.</b> A good flash tutorial that shows you step by step how to use it: <a href="http://www.irongeek.com/i.php?page=videos/metasploit1"><b>Metasploit at Iron Geek</b></a><b>.</b> There’s a presentation by HD Moore himself at Cansecwest 2006: <a href="http://www.cansecwest.com/slides06/csw06-moore.pdf"><b>csw06-moore.pdf</b></a><b> </b>And a couple of videos spawned from that here: <a href="http://www.computerdefense.org/?p=53"><b>Computer defense – TASK Presentation</b></a></li>
<li>The next step is to maintain you access on the compromised system. This is phase-4 and known as <a href="http://www.freehacking.net/2009/03/hacking-phase-4-maintaining-access.html"><b>Maintaining Access.</b></a></li>
<li>THIS IS THE MOST IMPORTANT STEP AND THE LAST PHASE. This is phase-5 known as <a href="http://www.freehacking.net/2009/03/hacking-phase-5-covering-tracks.html"><b>Covering Tracks</b></a><b>.</b> After you activities, you must remove all your track records....;) othet wise you know...IT act is very strong.</li>
</ol><div>This tutorial is designed to provide you with recommendations for securing your server against the majority of attackers. Below are some sample reports showing Nessus and OpenVas. It is recommended that always run multiple scanning tools. Never rely on a single automated scanning. Automated scanners miss a lot and are prone to false positives.</div><div><br />
</div><div><div><a href="http://hackertarget.com/sample/scanresults-3.html">Nessus Scan Multiple Hosts</a></div><div>Sample Report</div><div><a href="http://hackertarget.com/sample/scanresults-3-openvas.html">OpenVas Scan Multiple Hosts</a></div><div>Sample Report</div><div><br />
</div><div><a href="http://hackertarget.com/sample/scanresults-centos5.html">Nessus Scan (CentOS5)</a></div><div>Sample Report</div><div><a href="http://hackertarget.com/sample/scanresults-centos5-openvas.html">OpenVas Scan (Centos5)</a></div><div>Sample Report</div><div><br />
</div><div><a href="http://hackertarget.com/sample/scanresults-rhel4u4.html">Nessus Scan Report (RHEL4U4)</a></div><div>Sample Report</div><div><a href="http://hackertarget.com/sample/scanresults-rhel4u4-openvas.html">OpenVas Scan Report (RHEL4U4)</a></div><div>Sample Report</div><div><br />
</div><div><a href="http://hackertarget.com/sample/scanresults-ubuntuserver810.html">Nessus Scan (Ubuntu 810)</a></div><div>Sample Report</div><div><a href="http://hackertarget.com/sample/scanresults-ubuntuserver810-openvas.html">OpenVas Scan (Ubuntu 810)</a></div><div>Sample Report</div><div><br />
</div><div><a href="http://hackertarget.com/sample/scanresults-win2k3.html">Nessus Scan (Win2k3)</a></div><div>Sample Report</div><div><a href="http://hackertarget.com/sample/scanresults-win2k3-openvas.html">OpenVas Scan (Win2k3)</a></div><div>Sample Report</div><div><br />
</div><div><b><i>Please report any problem OR broken link to us on amarjit@freehacking.net. </i></b></div></div></div></div><div><b><i><br />
</i></b></div><div><b><i><br />
<div style="font-style: normal; font-weight: normal;"><b><br />
</b></div></i></b></div></span>Surenhttp://www.blogger.com/profile/09789784724534128579noreply@blogger.com0