protecting.html | Award-winning paper describing an Internet security strategy for the future (HTML) |
protecting.txt | Award-winning paper describing an Internet security strategy for the future (ASCII) |
autosec.html | Automation potentials in the realm of IT Security |
vulns.html | Guidelines for C source code auditing |
transparency.txt | Paranoia vs. Transparency -- Arguments for full disclosure security -- View HTML version |
trojans.txt | A whitepaper about finding and dealing with trojans |
logs.txt | Logging facilities and uncommon ways of finding audit trails -- View HTML version |
auditing.txt | A paper about testing your own network security -- View HTML version |
exploit.txt | Whitepaper about understanding buffer overflows and exploits -- View HTML version |
rawip.txt | A programming tutorial for raw sockets in C -- View HTML version |
clientexp.tgz | Paper about security issues in client programs |
firstaid.txt | Emergency and short time measures that can be applied to protect and act against Distributed Denial Of Service attacks -- View HTML version |
tfn3k.txt | Explains what distributed DOS actually is, upcoming new features of DDOS, and reveals NIDS detection methods |
coding.txt | Coding in C - a summary of some popular mistakes |
p2p.tgz | My 2001 CanSecWest presentation describes current and future applications of distributed and decentralized technology, and introduces the Hacktivismo project. |