Books

  • Stealing the Network: How to Own the Box, by Ryan Russell, Ido Dubrawsky, FX, Joe Grand, and Tim Mullen, Syngress 2003
  • Web Security, Privacy, and Commerce, by Simson Garfinkel and Gene Spafford, O'Reilly and Associates, 2nd edition 2002

Articles

Software

  • Keyring, open source encrypted password storage for Palm OS
  • Jpilot, open source PIM software for Linux
  • Oubliette, open source encrypted password storage for Windows
  • Tripwire, open source file monitoring program for Linux (commercial for Windows)
  • Chkrootkit, software for detecting rootkits in Unix-based systems,
  • Spybot Search and Destroy, free proprietary software for detecting spyware in Windows
  • Ad-Aware, commercial software for detecting spyware in Windows
  • X-Cleaner, commercial software for detecting spyware in Windows
  • GPG, open source encryption for files and email
  • kgpg, open source graphical interface for GPG in KDE
  • Windows Privacy Tools, open source GPG interface for Windows
  • Ccrypt, open source symmetrical encryption

Web Sites

Add new comment

The content of this field is kept private and will not be shown publicly.

Filtered HTML

  • Web page addresses and email addresses turn into links automatically.
  • Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> <cite> <code> <ul type> <ol start type> <li> <dl> <dt> <dd> <h1> <h2 id> <h3 id> <h4 id> <h5 id> <p> <br> <img src alt height width>
  • Lines and paragraphs break automatically.
CAPTCHA
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.