Root : Windows : Security


* AntiAd/Spyware ) Ad-Aware
* AntiAd/Spyware ) Microsoft's Malicious Software Removal Tool
* AntiAd/Spyware ) Microsoft Windows AntiSpyware (Beta) aka Windows Defender
* AntiAd/Spyware ) Spybot
* AntiAd/Spyware ) Spy Sweeper
* AntiRootkit ) F-Secure's BlackLight
* AntiRootkit ) RootkitRevealer "is an advanced root kit detection utility"
* AntiTrojan ) a-squared (a²) personal "protection against Trojan Horses (Trojans), Worms (Worm-Viruses), Dialers and Spyware. Anti-Malware"
* AntiTrojan ) BOClean - anti-trojan software
* AntiTrojan ) Cleaner Professional, The "is a system of programs designed to keep your computer and data safe from Trojans / Worms / Keyloggers / Spyware and all manner of malware."
* AntiVirus ) AntiVir Personal Edition @ free-av.com
* AntiVirus ) Avast! Antivirus
* AntiVirus ) avast! WEBforum
* AntiVirus ) AVG Anti-virus FREE version - free.grisoft.com
* AntiVirus ) AVG Anti-Virus - grisoft.com
* AntiVirus ) AVG Anti-Virus Remote Administration with AVGADMIN
* AntiVirus ) BitDefender Anti-Virus
* AntiVirus ) ClamWin Anti-Virus
* AntiVirus ) F-Prot Antivirus Free trial available for Windows® - MS-DOS® version is free.
* AntiVirus ) F-Secure : Security Information Center (computer virus information center)
* AntiVirus ) Kaspersky Anti-Virus
* AntiVirus ) McAfee Stinger "a stand-alone utility used to detect and remove specific viruses."
* AntiVirus ) SecurityFocus Infocus Archive - Virus Information
* Article: "Glossary of Communications, Computer, Data, and Information Security Terms" Internet/Network Security
* Article: "Guidance for Securing Microsoft Windows XP Systems
* Article: "What's So Bad About Microsoft?"
* Article: "Why Software Should Not Have Owners" @ GNU.org
* Belarc Advisor Free Personal PC Audit
* BlackViper.com ) Site Archives via the Wayback Machine includes "Windows Services ~ Includes complete explanations of each service and advice on which services you can safely disable", Guides, and more.
* cert.org ) "Ports Associated with Known Vulnerabilities and Exploits"
* Computer insecurity @ Wikipedia "describes the current battlefield of computer security exploits and defenses. Please see the secure computing article for an alternative approach, based on security engineering principles."
* Crypto-Gram
* Defenses @ Wikipedia
* Disk Investigator
* Eraser "is an advanced security tool" "which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns"
* Ethereal "network protocol analyzer"
* EtherSnoop Light "is a free network sniffer, designed for capturing and analysis of the packets going through the network.It captures the data passing through your dial-up connection or network Ethernet card, analyzes the data and represents it in a readable form."
* Exploit - Computer Science @ Wikipedia
* Firewalls ) Zone Alarm
* Foremost
* Foundstone "offers several unique utilities that you can add to your network security arsenal. As the premier provider of security risk management, vulnerability assessments and protection, Foundstone has created a series of tools that are used in the field by its consultants. The company offers this software free of charge to the public. Download them today to defend your organization against attacks."
* Giant Port List TCP + UDP
* grc.com ) SHIELDS UP!
* grc.com ) Shoot The Messenger "This 22 kbyte "Shoot The Messenger" utility gives users immediate control over the Windows Messenger
* Hosts file @ Wikipedia
* Labrea - Honeypot software
* MD5 ) md5deep "md5deep is a cross-platform set of programs to compute MD5, SHA-1, SHA-256 Tiger, or Whirlpool message digests on an arbitrary number of files. The programs run on Windows, Linux, *BSD, OS X, Solaris, and should run on most other platforms."
* MD5 ) Md5summer
* MD5 ) MD5summer Project Page @ sourceforge.net Win MD5 file hash utility
* MD5 ) "Md5Sums are used to establish the code integrity of software you download." "Using the md5sums grants you more security." This article on OpenOffice's website will show you, the Windows® user, how to use MD5 sums on your Windows® Operating System."
* MD5 ) @ Wikipedia
* Microsoft Baseline Security Analyzer (MBSA)
* Microsoft Shared Computer Toolkit for Windows XP
* mvps hosts file add this list to your /etc/hosts file to block unwanted sites from your web browsing experience, including well known adbanner hosting sites, tracking sites, and much more. Updates are frequently posted
* nist.gov
* nist.gov ) "Assessment of Access Control Systems" @ NIST.gov .PDF
* nist.gov ) CSRC
* nist.gov ) "Guidance for Securing Microsoft Windows XP Home Edition: A NIST Security Configuration Checklist" @ NIST.gov
* nist.gov ) "Guide to Computer Security Log Management" @ NIST.gov .PDF
* nist.gov ) "Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities" @ NIST.gov .PDF
* nist.gov ) NIST Computer Security Special Publications
* NTBugtraq - NTBugtraq Home
* Password Safe "an Open Source (free) tool that allows you to have a different password for all the different programs and websites that you deal with, without actually having to remember all those usernames and passwords. Password Safe runs on PCs under Windows (95/98/NT/2000/XP)"
* RISKS-LIST: RISKS-FORUM Digest
* sans.org ) SANS
* Secure computing @ Wikipedia
* Security engineering @ Wikipedia
* securityfocus.com
* securityfocus.com ) SecurityFocus Infocus Archive / Microsoft / Windows
* Sleuth Kit & Autopsy, The : Forensics Tools for Linux and other Unixes
* Special Application Port List
* SSH @ WindowsSecurity.com
* Stripe Snoop "is a suite of research tools that captures, modifies, validates, generates, analyzes, and shares data from magstripe cards. The data is captured through different hardware interfaces (or stdin), the contents decoded into the correct character set, and then a CDDB-like database attempts to figure out what the contents mean"
* Stripe Snoop ) project page @ Sourceforge.net
* Sygate's Security Scans
* Sysinternals @ Microsoft.com
* Tor ) anonymity network @ Wikipedia
* Tor ) Home (tor.eff.org)
* Tor ) Onion Routing or-talk mailing list archives "The or-talk mailing list is for all discussion about theory, design, and development of Onion Routing"
* Tor ) Test Results (see if you're running Tor) @ harvard.edu
* Ultr@VNC "is a client/server software that allows you to remotely control a computer over any TCP/IP connection as if you were in front of it."
* Zone Labs Security Scanner


Page generated on Mon May 7 07:37:18 2007