Kind of an Tutorial .... help for everyone ..... basic knowledge to experts......

Ip addresses....

The key to understanding IP, and all of the issues related to IP, is knowing what a routing table looks like and the effects each IP topic has on the entries in a routing table. To begin with, let's review the basics. IP addresses are 32 bit numbers, most commonly represented in dotted decimal notation (xxx.xxx.xxx.xxx). Each decimal number represents eight bits of binary data, and therefore can have a decimal value between 0 and 255. IP addresses most commonly come as class A, B, or C. It's the value of the first number of the IP address that determines the class to which a given IP address belongs. Class D addresses are used for multi-cast applications.

http://www.networkcomputing.com/netdesign/ip101.html ( IP addresses )

http://www.cisco.com/univercd/cc/td/...ng/appndxa.htm ( what are IP addresses)

http://www.howstuffworks.com/question549.htm ( what are IP addresses)

http://www.howstuffworks.com/router.htm ( how routers work )

http://www.3com.com/corpinfo/en_US/t...sp?DOC_ID=5364 ( Understanding IP addresses)

Networking

http://www.howstuffworks.com/home-network.htm (how homenetworks work)

http://computer.howstuffworks.com/home-network6.htm ( routers and firewalls)

http://computer.howstuffworks.com/home-network2.htm (network basics)

Cryptography

There are two kinds of cryptosystems: symmetric and asymmetric. Symmetric cryptosystems use the same key (the secret key) to encrypt and decrypt a message, and asymmetric cryptosystems use one key (the public key) to encrypt a message and a different key (the private key) to decrypt it. Assymetric cryptosystems are also called public key cryptosystems.

Symmetric cryptosystems have a problem: how do you transport the secret key from the sender to the recipient securely and in a tamperproof fashion? If you could send the secret key securely, then, in theory, you wouldn't need the symmetric cryptosystem in the first place -- because you would simply use that secure channel to send your message. Frequently, trusted couriers are used as a solution to this problem. Another, more efficient and reliable solution is a public key cryptosystem, such as RSA, which is used in the popular security tool PGP.

http://www.faqs.org/faqs/cryptography-faq/ ( crypto... FAQ)

http://www-swiss.ai.mit.edu/6805/art...manifesto.html (crypto manifesto)

http://www.fish.com/~zen/satan/satan.html ( unix security tool cryptography)

http://www.openbsd.org/crypto.html (cryptography in OpenBSD)

http://www.cryptography.com/ (cryptography research)

E-Mail

Email is e-mail, which stands for 'electronic mail'.
This means that you don't have to hand-write or print out a 'hard copy' of your message or letter on paper.
You don't have to write an address on a paper envelope.
You don't have to stick a stamp on, drive or walk to the nearest mailbox and post your letter.
And you don't (really - this is the best bit) have to wait days for your letter to get there, or pay more to send a letter overseas.

http://www.learnthenet.com/english/html/20how.htm ( how the e-mail works)

http://www.ics.uci.edu/~mh/book/overall/howwor.htm (how UNIX e-mail works)

http://www.emailaddresses.com/guide_faq.htm (e-mail FAQ)

http://www.riverland.net.au/text/loo.../emailwht.html ( what is e-mail)

E-Mail Security Tools

http://www.softheap.com/emlsec.html
http://www.windowsecurity.com/emailsecuritytest/ (test your e-mail system)
http://www.mnsi.net/~jhlavac/security/encryption.htm ( encrypton and e-mail security)
http://www.linux-firewall-tools.com/linux/ (linux firewall and security site)


Network Security

http://www-1.ibm.com/services/contin...les/Downloads/$file/DOS.pdf ( white papers on DoS attacks)

http://www.seifried.org/lasg/ (linux security)

Security Links

http://www.securitypointer.com/
http://www.securityfocus.com/
http://www.infosyssec.org/
http://www.infosyssec.org/infosyssec/index.html
http://www.windowsecurity.com/ ( network security search engine)
http://www.windowsecurity.com/
http://www.firewall.cx/
http://www.firewall.cx/ (web security FAQ)

IRC ( internet realy chat)

http://www.mirc.com/ircintro.html (FAQ)

IRC Tools

http://groups.msn.com/IRCToolsCracks...pgmarket=en-au
http://www.netsw.org/net/ip/chat/irc/tools/
http://damg-inc.hypermart.net/irctools.html
http://www.geocities.com/mihai_1981/protection.html ( IRC protection)
http://twiki.org/cgi-bin/view/Codev/TWikiIRC

BIOS security

http://www.11a.nu/ibios.htm (bios maintains toolkit)
http://www.xs4all.nl/~matrix/bios_security.html
http://www.nic.com/~dave/SecurityAdm...inGuide-6.html (LINUX bios security)

FREE A-Z BOOKS

http://www.infosyssec.com/infosyssec/onlinebooks1.htm

...this post actually may help someone ... you never know