-
May 20th, 2003, 04:03 AM
#1
For Everyone.... newbie to expert
Kind of an Tutorial .... help for everyone ..... basic knowledge to experts......
Ip addresses....
The key to understanding IP, and all of the issues related to IP, is knowing what a routing table looks like and the effects each IP topic has on the entries in a routing table. To begin with, let's review the basics. IP addresses are 32 bit numbers, most commonly represented in dotted decimal notation (xxx.xxx.xxx.xxx). Each decimal number represents eight bits of binary data, and therefore can have a decimal value between 0 and 255. IP addresses most commonly come as class A, B, or C. It's the value of the first number of the IP address that determines the class to which a given IP address belongs. Class D addresses are used for multi-cast applications.
http://www.networkcomputing.com/netdesign/ip101.html ( IP addresses )
http://www.cisco.com/univercd/cc/td/...ng/appndxa.htm ( what are IP addresses)
http://www.howstuffworks.com/question549.htm ( what are IP addresses)
http://www.howstuffworks.com/router.htm ( how routers work )
http://www.3com.com/corpinfo/en_US/t...sp?DOC_ID=5364 ( Understanding IP addresses)
Networking
http://www.howstuffworks.com/home-network.htm (how homenetworks work)
http://computer.howstuffworks.com/home-network6.htm ( routers and firewalls)
http://computer.howstuffworks.com/home-network2.htm (network basics)
Cryptography
There are two kinds of cryptosystems: symmetric and asymmetric. Symmetric cryptosystems use the same key (the secret key) to encrypt and decrypt a message, and asymmetric cryptosystems use one key (the public key) to encrypt a message and a different key (the private key) to decrypt it. Assymetric cryptosystems are also called public key cryptosystems.
Symmetric cryptosystems have a problem: how do you transport the secret key from the sender to the recipient securely and in a tamperproof fashion? If you could send the secret key securely, then, in theory, you wouldn't need the symmetric cryptosystem in the first place -- because you would simply use that secure channel to send your message. Frequently, trusted couriers are used as a solution to this problem. Another, more efficient and reliable solution is a public key cryptosystem, such as RSA, which is used in the popular security tool PGP.
http://www.faqs.org/faqs/cryptography-faq/ ( crypto... FAQ)
http://www-swiss.ai.mit.edu/6805/art...manifesto.html (crypto manifesto)
http://www.fish.com/~zen/satan/satan.html ( unix security tool cryptography)
http://www.openbsd.org/crypto.html (cryptography in OpenBSD)
http://www.cryptography.com/ (cryptography research)
E-Mail
Email is e-mail, which stands for 'electronic mail'.
This means that you don't have to hand-write or print out a 'hard copy' of your message or letter on paper.
You don't have to write an address on a paper envelope.
You don't have to stick a stamp on, drive or walk to the nearest mailbox and post your letter.
And you don't (really - this is the best bit) have to wait days for your letter to get there, or pay more to send a letter overseas.
http://www.learnthenet.com/english/html/20how.htm ( how the e-mail works)
http://www.ics.uci.edu/~mh/book/overall/howwor.htm (how UNIX e-mail works)
http://www.emailaddresses.com/guide_faq.htm (e-mail FAQ)
http://www.riverland.net.au/text/loo.../emailwht.html ( what is e-mail)
E-Mail Security Tools
http://www.softheap.com/emlsec.html
http://www.windowsecurity.com/emailsecuritytest/ (test your e-mail system)
http://www.mnsi.net/~jhlavac/security/encryption.htm ( encrypton and e-mail security)
http://www.linux-firewall-tools.com/linux/ (linux firewall and security site)
Network Security
http://www-1.ibm.com/services/contin...les/Downloads/$file/DOS.pdf ( white papers on DoS attacks)
http://www.seifried.org/lasg/ (linux security)
Security Links
http://www.securitypointer.com/
http://www.securityfocus.com/
http://www.infosyssec.org/
http://www.infosyssec.org/infosyssec/index.html
http://www.windowsecurity.com/ ( network security search engine)
http://www.windowsecurity.com/
http://www.firewall.cx/
http://www.firewall.cx/ (web security FAQ)
IRC ( internet realy chat)
http://www.mirc.com/ircintro.html (FAQ)
IRC Tools
http://groups.msn.com/IRCToolsCracks...pgmarket=en-au
http://www.netsw.org/net/ip/chat/irc/tools/
http://damg-inc.hypermart.net/irctools.html
http://www.geocities.com/mihai_1981/protection.html ( IRC protection)
http://twiki.org/cgi-bin/view/Codev/TWikiIRC
BIOS security
http://www.11a.nu/ibios.htm (bios maintains toolkit)
http://www.xs4all.nl/~matrix/bios_security.html
http://www.nic.com/~dave/SecurityAdm...inGuide-6.html (LINUX bios security)
FREE A-Z BOOKS
http://www.infosyssec.com/infosyssec/onlinebooks1.htm
...this post actually may help someone ... you never know
-
May 20th, 2003, 04:41 AM
#2
Wowwwww look at all this it's a gold mine lol. GREAT post Memory A LOT of information/links you got here (you even took time to write out what the site had in it Saves us the work). Thankyou of all the web site, about to look at them all (going to have a fun tonight). Keep up the awesome work!!!!
Bye ~d00dz~
-
May 20th, 2003, 04:49 AM
#3
Junior Member
Cool
WOW!!! nice job man!!! thanks Im sure it'll help alot!!
-
May 20th, 2003, 07:47 AM
#4
Your first paragraph can be found here word for word . In the future remember these 2 things...Tutorials are to be ORIGINAL compositions, not a collection of links, and all sources MUST be cited or you open up the possibility of a copyright infringement suit.
Not gonna green you, not gonna neg you...just trying to educate you.
Peace out!
Al
It isn't paranoia when you KNOW they're out to get you...
-
May 20th, 2003, 09:31 AM
#5
Senior Member
Personally, i do like your thread Memory, thats interest for reading all of it ... but allen correct , no doubt for that. Nice job memory and thank to allen to remind me and all of us about what tutorial is.
-Shad
-
May 20th, 2003, 11:13 AM
#6
allen i will remember that for future threads....and yes the paragrahs i copied from website just to get an description about what i'm writing...
-
May 20th, 2003, 12:23 PM
#7
**Not quite a tutorial but good information nonetheless. Moved thread from Tutorials to Misc Security**
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|