Get Started. It's Free
or sign up with your email address
Resources by Mind Map: Resources

1. Common Tools

1.1. Portable

1.2. Installer

1.3. Online

1.3.1. Mind Mapping 3 Web-based Mind Mapping Tools Review

2. E61i

2.1. NokSync

2.1.1. NokSync is a Thunderbird extension. NokSync synchronizes contacts between Thunderbird and a NOKIA phone. NokSync will * read one or more Thunderbird address books * read the phonebook in a NOKIA phone (using cable, infrared or bluetooth connection) * compare the two, and suggest updates to bring them into synchronization * let the user change the suggestions to synchronize exactly as he wishes * update contact information in Thunderbird address books and the NOKIA Phone accordingly NokSync is free, open-source software.

2.2. Goosync

2.2.1. Synchronize your Google Calendar with your mobile phone or PDA. Goosync will seamlessly synchronize almost any mobile device with your Google Calendar. It's quick and simple, sign-up and start syncing.

2.3. Themes

3. Security

3.1. Blog & News

3.1.1. Schneier's Blog

3.1.2. Security Warrior

3.1.3. SecURLs

3.2. Domain

3.2.1. Access Control RFID Viruses leap to smart radio tags Extended EAP (Extensible Authentication Protocol) SolutionBase: RADIUS deployment scenarios There are many different ways that RADIUS servers can be deployed, both in ISP and in corporate environments. Here are some of the less common types of RADIUS deployments.

3.2.2. Architecture Virtualization What are the security risks associated with virtual PCs? If a virtual machine is hacked, what are the consequences?

3.2.3. Application & Database Jess Gracia's Malware Analysis Knowledge Base Web Application PHP / SQL Injection XSS Web Application Security Consortium Open Web Application Security Project (OWASP) Web Hacking Incident Database HTTP attacks: Strategies for prevention Developer's active content delivery checklist Buffer overflows and memory leaks in a Web application? Blind SQL Injection Tool an automatic blind SQL injection tool, developed in python, capable to perform an active database management system fingerprint, enumerate entire remote databases and much more. The aim of this project is to implement a fully functional database management system tool which takes advantages of web application programming security flaws which lead to SQL injection vulnerabilities.

3.2.4. BCP & DRP Disaster Recovery e-book

3.2.5. Crypto

3.2.6. Incident Handling Management CERT Coordinated Response - guidance to establish computer security incident response teams (CSIRTs) Creating a Computer Security Incident Response Team: A Process for Getting Started Action List for Developing a Computer Security Incident Response Team (CSIRT) Steps for Recovering from a UNIX or NT System Compromise Forensic Jess Garcia's Forensic Knowledge Base ! First Responders Guide to Computer Forensics - Advanced Topics Tools Various Notes Spyware removal checklist

3.2.7. Law

3.2.8. Management Policy Reduce the risks of uncontrolled email and web usage IT Security Policy Checklist Policy & Procedure Manual Build Your Own: E-mail Usage Policy E-Policy Best Practices Guide Total Enterprise Assurance Management (TEAM) model Top tools for testing your online security Master the principles of computer security Computer security may seem complicated, but in truth the theory behind computer security is relatively simple. Hacking methods fall into just a few categories, and solutions to computer security problems are actually rather straightforward. In this sample chapter from Network Security Foundations: Technology Fundamentals for IT Success, explore the history of computer security, investigate the reasons that computers aren't secure, and master the theoretical underpinnings of network security. Standard / Certification CC Validated Product List

3.2.9. Operation The 15-Minute Backup Solution Using Open Source Animated RAID Tutorial RAID Space Calculator RAID storage explained

3.2.10. Physical ASIS Security Toolkit ASIS Executive Documents CIA's The World Factbook Security Management Online Protection of Assets (POA) Manual Lock Picking Definitive Guide Physical Security in Mission Critical Facilities Monitoring Physical Threats in the Data Center

3.2.11. Telecom Sniffing Tools - Free URL Filtering Google translator as proxy to by-pass restricted sites Immunity Resource - Papers MIDCOM (MiddleBox Communication) Network Role Based Security Combining NetFlow with Security Information Management systems DDoS Can service providers prevent DDoS attacks? Block and reroute denial-of-service attacks Wireless WPA The Opportunities and Challenges Associated With Wi-Fi Deployment Eleven Myths about 802.11 Wi-Fi Networks Ultimate guide to enterprise Wireless LAN security The six dumbest ways to secure a wireless LAN Hack most wireless LANs in minutes! ASLEAP - Cisco LEAP Cracking Tool WEP: Dead Again VoIP IP Telephony Pocket Guide Investigate and implement Session Initiation Protocol (SIP) gateways SIP Server: Technical Overview Successfully Deploy and Maintain VoIP with these Best Practices The OSI Model: Understanding the Seven Layers of Computer Networks TCP/IP Fundamentals for Microsoft Windows DNS Step-by-Step Guide Microsoft Windows Server 2003 TCP/IP Implementation Details This white paper describes the implementation of the TCP/IP protocol stack in the Microsoft® Windows Server™ 2003 family and is a supplement to the Windows Server 2003 Help and Support Center and Technical Reference documentation. This white paper contains an overview of TCP/IP in Windows Server 2003 features and capabilities, a discussion of protocol architecture, and detailed discussions of the core components, network application interfaces, and critical client components and services. The intended audience for this paper is network engineers and support professionals who are already familiar with TCP/IP. Except where noted, the TCP/IP implementation for Windows® XP is the same as that for Windows Server 2003. Firewall 10 things you should look for in a desktop firewall Application Firewall Overview A firewall checklist Firewall Performance Testing Methodology Firewall failure plan checklist IDS/IPS IPS - Types of Signature IPS Topics on Evading NIDS, revisited How Does Ping Really Work?

3.3. Specific

3.3.1. Career CISSP CISA Exam Self Assesment dari ISACA

3.3.2. Assurance Audit & Assessment PenTest Tools - Open Source Wi-Fi hacking, with a handheld PDA NIST 4-Stage Pen-Testing Guideline FoundStone's Pen-Testing Methodology OSSTMM Log Analysis Tools - Open Source Tools - Commercial No-Tech Hacking

3.3.3. Awareness Ethics Social Engineering Tips Security Awareness Content for Managers

3.3.4. SCADA LOGIIC Correlation Project The LOGIIC Correlation Project was a 12-month technology integration and demonstration project jointly supported by industry partners and the U.S. Department of Homeland Security (DHS). The project demonstrates an opportunity to reduce vulnerabilities of oil and gas process control environments by sensing, correlating and analyzing abnormal events to identify and prevent cyber security threats. The project partners will: * Identify new types of security sensors for process control networks * Adapt a best-of-breed correlation engine to this environment * Integrate in test bed and demonstrate * Transfer technology to field operations

3.3.5. Security Guide Security Technical Implementation Guides (STIGS) NSA Security Guides All Current Security Guides Archived Security Guides Center for Information Security (CISecurity) NIST Checklists Program for IT Products

3.3.6. Various Stories Slashdot Security Stories Aircraft Remote Control 45 millions Credit-Card Data Went Out Wireless Door - TJX case

3.3.7. Various Tools List of Mgmt tools for Enterprise SysAdmin Online Process Library Keymail the KeyLogger An E-mailing Key Logger for Windows with C Source. MadMACs MAC address spoofer Brutus Pentest Download Oracle & Bluetooth

3.3.8. Vulnerability Database National Vulnerability Database (NVD) Fuzzer (L)ibrary (E)xploit API - lxapi Mangle SPIKE PROTOS WAP PROTOS HTTP-reply PROTOS LDAP PROTOS SNMP PROTOS SIP PROTOS ISAKMP RIOT & faultmon SPIKE Proxy Tag Brute Forcer FileFuzz SPIKEFile notSPIKFile Screaming Cobra WebFuzzer eFuzz Peach Fuzzer Fuzz

3.3.9. Video Tutorial The dangers of Ad-Hoc networks in Windows XP SP2 Hacking Mac OS X - A Case Study Hacking SQL in Linux using the SecureState Swiss Army Knife

3.3.10. Threats Monitor The security risks of Google Notebook 10 emerging malware trends for 2007 Google Desktop gets scarier How to tame Google Desktop

3.3.11. Cyberwar DoD's Report on China Military Power News

3.4. Mix-Resources

3.4.1. Projects & Links complete index

4. New node

5. New node

6. New node

6.1. Products

6.1.1. Universal Command Guide for Operating Systems

6.1.2. Microsoft Tools Sysinternals

6.1.3. VMware Untitled Lots of Vmware Links.... VMguru ESX Server Supported Hardware Lifecycle Management Agents Virtual Tricks VMworld 2006 Conference Sessions Create VM using VMware Player Success Stories Forum: VMware Infrastructure: Virtual Machine and Guest OS Problems Windows Vista Enterprise (official release) install issues on ESX 3.0.1 Cross LUN file operation performance

6.1.4. Asterisks Reference > References