# Thread: For Everyone.... newbie to expert

1. ## For Everyone.... newbie to expert

Kind of an Tutorial .... help for everyone ..... basic knowledge to experts......

The key to understanding IP, and all of the issues related to IP, is knowing what a routing table looks like and the effects each IP topic has on the entries in a routing table. To begin with, let's review the basics. IP addresses are 32 bit numbers, most commonly represented in dotted decimal notation (xxx.xxx.xxx.xxx). Each decimal number represents eight bits of binary data, and therefore can have a decimal value between 0 and 255. IP addresses most commonly come as class A, B, or C. It's the value of the first number of the IP address that determines the class to which a given IP address belongs. Class D addresses are used for multi-cast applications.

http://www.cisco.com/univercd/cc/td/...ng/appndxa.htm ( what are IP addresses)

http://www.howstuffworks.com/question549.htm ( what are IP addresses)

http://www.howstuffworks.com/router.htm ( how routers work )

Networking

http://www.howstuffworks.com/home-network.htm (how homenetworks work)

http://computer.howstuffworks.com/home-network6.htm ( routers and firewalls)

http://computer.howstuffworks.com/home-network2.htm (network basics)

Cryptography

There are two kinds of cryptosystems: symmetric and asymmetric. Symmetric cryptosystems use the same key (the secret key) to encrypt and decrypt a message, and asymmetric cryptosystems use one key (the public key) to encrypt a message and a different key (the private key) to decrypt it. Assymetric cryptosystems are also called public key cryptosystems.

Symmetric cryptosystems have a problem: how do you transport the secret key from the sender to the recipient securely and in a tamperproof fashion? If you could send the secret key securely, then, in theory, you wouldn't need the symmetric cryptosystem in the first place -- because you would simply use that secure channel to send your message. Frequently, trusted couriers are used as a solution to this problem. Another, more efficient and reliable solution is a public key cryptosystem, such as RSA, which is used in the popular security tool PGP.

http://www.faqs.org/faqs/cryptography-faq/ ( crypto... FAQ)

http://www-swiss.ai.mit.edu/6805/art...manifesto.html (crypto manifesto)

http://www.fish.com/~zen/satan/satan.html ( unix security tool cryptography)

http://www.openbsd.org/crypto.html (cryptography in OpenBSD)

http://www.cryptography.com/ (cryptography research)

E-Mail

Email is e-mail, which stands for 'electronic mail'.
This means that you don't have to hand-write or print out a 'hard copy' of your message or letter on paper.
You don't have to write an address on a paper envelope.
You don't have to stick a stamp on, drive or walk to the nearest mailbox and post your letter.
And you don't (really - this is the best bit) have to wait days for your letter to get there, or pay more to send a letter overseas.

http://www.learnthenet.com/english/html/20how.htm ( how the e-mail works)

http://www.ics.uci.edu/~mh/book/overall/howwor.htm (how UNIX e-mail works)

http://www.riverland.net.au/text/loo.../emailwht.html ( what is e-mail)

E-Mail Security Tools

http://www.softheap.com/emlsec.html
http://www.mnsi.net/~jhlavac/security/encryption.htm ( encrypton and e-mail security)
http://www.linux-firewall-tools.com/linux/ (linux firewall and security site)

Network Security

http://www.seifried.org/lasg/ (linux security)

http://www.securitypointer.com/
http://www.securityfocus.com/
http://www.infosyssec.org/
http://www.infosyssec.org/infosyssec/index.html
http://www.windowsecurity.com/ ( network security search engine)
http://www.windowsecurity.com/
http://www.firewall.cx/
http://www.firewall.cx/ (web security FAQ)

IRC ( internet realy chat)

http://www.mirc.com/ircintro.html (FAQ)

IRC Tools

http://groups.msn.com/IRCToolsCracks...pgmarket=en-au
http://www.netsw.org/net/ip/chat/irc/tools/
http://damg-inc.hypermart.net/irctools.html
http://www.geocities.com/mihai_1981/protection.html ( IRC protection)
http://twiki.org/cgi-bin/view/Codev/TWikiIRC

BIOS security

http://www.11a.nu/ibios.htm (bios maintains toolkit)
http://www.xs4all.nl/~matrix/bios_security.html

FREE A-Z BOOKS

http://www.infosyssec.com/infosyssec/onlinebooks1.htm

...this post actually may help someone ... you never know

2. Wowwwww look at all this it's a gold mine lol. GREAT post Memory A LOT of information/links you got here (you even took time to write out what the site had in it Saves us the work). Thankyou of all the web site, about to look at them all (going to have a fun tonight). Keep up the awesome work!!!!
Bye ~d00dz~

3. ## Cool

WOW!!! nice job man!!! thanks Im sure it'll help alot!!

4. Your first paragraph can be found here word for word . In the future remember these 2 things...Tutorials are to be ORIGINAL compositions, not a collection of links, and all sources MUST be cited or you open up the possibility of a copyright infringement suit.

Not gonna green you, not gonna neg you...just trying to educate you.

Peace out!

5. Personally, i do like your thread Memory, thats interest for reading all of it ... but allen correct , no doubt for that. Nice job memory and thank to allen to remind me and all of us about what tutorial is.