[home] Discourse Mentabolism

General Information Guides:

Key Sites and Portals:

Stealth and Security Tests:

a pub from the FTC with screwed-up, reversed, priorities: http://www.ftc.gov/bcp/conline/edcams/infosecurity/

w2k Installation and Update:

w2k Configuration [Security Guides]: (I recommend that you get them all, including templates for secedit.exe)

Free downloads for Microsoft users: from one of several locations

9x: winipcfg.exe 2k: ipconfig.exe

This util can help associate some open ports with running processes: http://www.sysinternals.com/files/tcpview.zip

Detecting and Removing Trojans and Malicious Code from w2k Systems: http://online.securityfocus.com/infocus/1627

It's October 1992 and there is still email software in widespread general use which will run infected attachments automatically. God save us from GWB and MS.
The W32/Bugbear worm attempts to exploit a MIME and an IFRAME vulnerability in some versions of Microsoft Outlook, Microsoft Outlook Express, and Internet Explorer. These vulnerabilities allow an executable attachment to run automatically, even if you do not double-click on the attachment.

Hosting Solutions:
use nms Scripts from http://nms-cgi.sourceforge.net/scripts.shtml

Windows autostarting culprits: http://www.tlsecurity.net/auto.html

Before you invest in Windows/XP, read this: http://www.hevanet.com/peace/microsoft.htm

I wonder if this is solved yet ... http://archives.neohapsis.com/archives/bugtraq/2000-03/0092.html

http://www.cymru.com/Bogons/index.html is "The Bogon Reference Page", describing and maintaining lists of IPs which should never cross a router.
Valid HTML 4.01!