Results 1 to 7 of 7

Thread: For Everyone.... newbie to expert

  1. #1
    Banned
    Join Date
    Apr 2003
    Posts
    3,839

    For Everyone.... newbie to expert

    Kind of an Tutorial .... help for everyone ..... basic knowledge to experts......

    Ip addresses....

    The key to understanding IP, and all of the issues related to IP, is knowing what a routing table looks like and the effects each IP topic has on the entries in a routing table. To begin with, let's review the basics. IP addresses are 32 bit numbers, most commonly represented in dotted decimal notation (xxx.xxx.xxx.xxx). Each decimal number represents eight bits of binary data, and therefore can have a decimal value between 0 and 255. IP addresses most commonly come as class A, B, or C. It's the value of the first number of the IP address that determines the class to which a given IP address belongs. Class D addresses are used for multi-cast applications.

    http://www.networkcomputing.com/netdesign/ip101.html ( IP addresses )

    http://www.cisco.com/univercd/cc/td/...ng/appndxa.htm ( what are IP addresses)

    http://www.howstuffworks.com/question549.htm ( what are IP addresses)

    http://www.howstuffworks.com/router.htm ( how routers work )

    http://www.3com.com/corpinfo/en_US/t...sp?DOC_ID=5364 ( Understanding IP addresses)

    Networking

    http://www.howstuffworks.com/home-network.htm (how homenetworks work)

    http://computer.howstuffworks.com/home-network6.htm ( routers and firewalls)

    http://computer.howstuffworks.com/home-network2.htm (network basics)

    Cryptography

    There are two kinds of cryptosystems: symmetric and asymmetric. Symmetric cryptosystems use the same key (the secret key) to encrypt and decrypt a message, and asymmetric cryptosystems use one key (the public key) to encrypt a message and a different key (the private key) to decrypt it. Assymetric cryptosystems are also called public key cryptosystems.

    Symmetric cryptosystems have a problem: how do you transport the secret key from the sender to the recipient securely and in a tamperproof fashion? If you could send the secret key securely, then, in theory, you wouldn't need the symmetric cryptosystem in the first place -- because you would simply use that secure channel to send your message. Frequently, trusted couriers are used as a solution to this problem. Another, more efficient and reliable solution is a public key cryptosystem, such as RSA, which is used in the popular security tool PGP.

    http://www.faqs.org/faqs/cryptography-faq/ ( crypto... FAQ)

    http://www-swiss.ai.mit.edu/6805/art...manifesto.html (crypto manifesto)

    http://www.fish.com/~zen/satan/satan.html ( unix security tool cryptography)

    http://www.openbsd.org/crypto.html (cryptography in OpenBSD)

    http://www.cryptography.com/ (cryptography research)

    E-Mail

    Email is e-mail, which stands for 'electronic mail'.
    This means that you don't have to hand-write or print out a 'hard copy' of your message or letter on paper.
    You don't have to write an address on a paper envelope.
    You don't have to stick a stamp on, drive or walk to the nearest mailbox and post your letter.
    And you don't (really - this is the best bit) have to wait days for your letter to get there, or pay more to send a letter overseas.

    http://www.learnthenet.com/english/html/20how.htm ( how the e-mail works)

    http://www.ics.uci.edu/~mh/book/overall/howwor.htm (how UNIX e-mail works)

    http://www.emailaddresses.com/guide_faq.htm (e-mail FAQ)

    http://www.riverland.net.au/text/loo.../emailwht.html ( what is e-mail)

    E-Mail Security Tools

    http://www.softheap.com/emlsec.html
    http://www.windowsecurity.com/emailsecuritytest/ (test your e-mail system)
    http://www.mnsi.net/~jhlavac/security/encryption.htm ( encrypton and e-mail security)
    http://www.linux-firewall-tools.com/linux/ (linux firewall and security site)


    Network Security

    http://www-1.ibm.com/services/contin...les/Downloads/$file/DOS.pdf ( white papers on DoS attacks)

    http://www.seifried.org/lasg/ (linux security)

    Security Links

    http://www.securitypointer.com/
    http://www.securityfocus.com/
    http://www.infosyssec.org/
    http://www.infosyssec.org/infosyssec/index.html
    http://www.windowsecurity.com/ ( network security search engine)
    http://www.windowsecurity.com/
    http://www.firewall.cx/
    http://www.firewall.cx/ (web security FAQ)

    IRC ( internet realy chat)

    http://www.mirc.com/ircintro.html (FAQ)

    IRC Tools

    http://groups.msn.com/IRCToolsCracks...pgmarket=en-au
    http://www.netsw.org/net/ip/chat/irc/tools/
    http://damg-inc.hypermart.net/irctools.html
    http://www.geocities.com/mihai_1981/protection.html ( IRC protection)
    http://twiki.org/cgi-bin/view/Codev/TWikiIRC

    BIOS security

    http://www.11a.nu/ibios.htm (bios maintains toolkit)
    http://www.xs4all.nl/~matrix/bios_security.html
    http://www.nic.com/~dave/SecurityAdm...inGuide-6.html (LINUX bios security)

    FREE A-Z BOOKS

    http://www.infosyssec.com/infosyssec/onlinebooks1.htm

    ...this post actually may help someone ... you never know

  2. #2
    Doc d00dz Attackin's Avatar
    Join Date
    Mar 2003
    Location
    Florida
    Posts
    661
    Wowwwww look at all this it's a gold mine lol. GREAT post Memory A LOT of information/links you got here (you even took time to write out what the site had in it Saves us the work). Thankyou of all the web site, about to look at them all (going to have a fun tonight). Keep up the awesome work!!!!
    Bye ~d00dz~
    First you listen, then you do, finally you teach.
    Duck Hunting Chat
    VirtualConvenience
    RROD

  3. #3
    Junior Member
    Join Date
    Sep 2002
    Posts
    11

    Thumbs up Cool

    WOW!!! nice job man!!! thanks Im sure it'll help alot!!

  4. #4
    Old Fart
    Join Date
    Jun 2002
    Posts
    1,658
    Your first paragraph can be found here word for word . In the future remember these 2 things...Tutorials are to be ORIGINAL compositions, not a collection of links, and all sources MUST be cited or you open up the possibility of a copyright infringement suit.

    Not gonna green you, not gonna neg you...just trying to educate you.

    Peace out!
    Al
    It isn't paranoia when you KNOW they're out to get you...

  5. #5
    Senior Member
    Join Date
    Feb 2003
    Posts
    211
    Personally, i do like your thread Memory, thats interest for reading all of it ... but allen correct , no doubt for that. Nice job memory and thank to allen to remind me and all of us about what tutorial is.

    -Shad
    When I lay me down to sleep, Pray the LORD my soul to keep.
    If I die before i wake, Pray the LORD my soul to take.

    http://www.AntiOnline.com/sig.php?imageid=389

  6. #6
    Banned
    Join Date
    Apr 2003
    Posts
    3,839
    allen i will remember that for future threads....and yes the paragrahs i copied from website just to get an description about what i'm writing...

  7. #7
    Just a Virtualized Geek MrLinus's Avatar
    Join Date
    Sep 2001
    Location
    Redondo Beach, CA
    Posts
    7,323
    **Not quite a tutorial but good information nonetheless. Moved thread from Tutorials to Misc Security**

    Goodbye, Mittens (1992-2008). My pillow will be cold without your purring beside my head
    Extra! Extra! Get your FREE copy of Insight Newsletter||MsMittens' HomePage

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •