May 20th, 2003, 05:03 AM
For Everyone.... newbie to expert
Kind of an Tutorial .... help for everyone ..... basic knowledge to experts......
The key to understanding IP, and all of the issues related to IP, is knowing what a routing table looks like and the effects each IP topic has on the entries in a routing table. To begin with, let's review the basics. IP addresses are 32 bit numbers, most commonly represented in dotted decimal notation (xxx.xxx.xxx.xxx). Each decimal number represents eight bits of binary data, and therefore can have a decimal value between 0 and 255. IP addresses most commonly come as class A, B, or C. It's the value of the first number of the IP address that determines the class to which a given IP address belongs. Class D addresses are used for multi-cast applications.
http://www.networkcomputing.com/netdesign/ip101.html ( IP addresses )
http://www.cisco.com/univercd/cc/td/...ng/appndxa.htm ( what are IP addresses)
http://www.howstuffworks.com/question549.htm ( what are IP addresses)
http://www.howstuffworks.com/router.htm ( how routers work )
http://www.3com.com/corpinfo/en_US/t...sp?DOC_ID=5364 ( Understanding IP addresses)
http://www.howstuffworks.com/home-network.htm (how homenetworks work)
http://computer.howstuffworks.com/home-network6.htm ( routers and firewalls)
http://computer.howstuffworks.com/home-network2.htm (network basics)
There are two kinds of cryptosystems: symmetric and asymmetric. Symmetric cryptosystems use the same key (the secret key) to encrypt and decrypt a message, and asymmetric cryptosystems use one key (the public key) to encrypt a message and a different key (the private key) to decrypt it. Assymetric cryptosystems are also called public key cryptosystems.
Symmetric cryptosystems have a problem: how do you transport the secret key from the sender to the recipient securely and in a tamperproof fashion? If you could send the secret key securely, then, in theory, you wouldn't need the symmetric cryptosystem in the first place -- because you would simply use that secure channel to send your message. Frequently, trusted couriers are used as a solution to this problem. Another, more efficient and reliable solution is a public key cryptosystem, such as RSA, which is used in the popular security tool PGP.
http://www.faqs.org/faqs/cryptography-faq/ ( crypto... FAQ)
http://www-swiss.ai.mit.edu/6805/art...manifesto.html (crypto manifesto)
http://www.fish.com/~zen/satan/satan.html ( unix security tool cryptography)
http://www.openbsd.org/crypto.html (cryptography in OpenBSD)
http://www.cryptography.com/ (cryptography research)
Email is e-mail, which stands for 'electronic mail'.
This means that you don't have to hand-write or print out a 'hard copy' of your message or letter on paper.
You don't have to write an address on a paper envelope.
You don't have to stick a stamp on, drive or walk to the nearest mailbox and post your letter.
And you don't (really - this is the best bit) have to wait days for your letter to get there, or pay more to send a letter overseas.
http://www.learnthenet.com/english/html/20how.htm ( how the e-mail works)
http://www.ics.uci.edu/~mh/book/overall/howwor.htm (how UNIX e-mail works)
http://www.emailaddresses.com/guide_faq.htm (e-mail FAQ)
http://www.riverland.net.au/text/loo.../emailwht.html ( what is e-mail)
E-Mail Security Tools
http://www.windowsecurity.com/emailsecuritytest/ (test your e-mail system)
http://www.mnsi.net/~jhlavac/security/encryption.htm ( encrypton and e-mail security)
http://www.linux-firewall-tools.com/linux/ (linux firewall and security site)
http://www-1.ibm.com/services/contin...les/Downloads/$file/DOS.pdf ( white papers on DoS attacks)
http://www.seifried.org/lasg/ (linux security)
http://www.windowsecurity.com/ ( network security search engine)
http://www.firewall.cx/ (web security FAQ)
IRC ( internet realy chat)
http://www.geocities.com/mihai_1981/protection.html ( IRC protection)
http://www.11a.nu/ibios.htm (bios maintains toolkit)
http://www.nic.com/~dave/SecurityAdm...inGuide-6.html (LINUX bios security)
FREE A-Z BOOKS
...this post actually may help someone ... you never know
May 20th, 2003, 05:41 AM
Wowwwww look at all this it's a gold mine lol. GREAT post Memory A LOT of information/links you got here (you even took time to write out what the site had in it Saves us the work). Thankyou of all the web site, about to look at them all (going to have a fun tonight). Keep up the awesome work!!!!
May 20th, 2003, 05:49 AM
WOW!!! nice job man!!! thanks Im sure it'll help alot!!
May 20th, 2003, 08:47 AM
Your first paragraph can be found here word for word . In the future remember these 2 things...Tutorials are to be ORIGINAL compositions, not a collection of links, and all sources MUST be cited or you open up the possibility of a copyright infringement suit.
Not gonna green you, not gonna neg you...just trying to educate you.
It isn't paranoia when you KNOW they're out to get you...
May 20th, 2003, 10:31 AM
Personally, i do like your thread Memory, thats interest for reading all of it ... but allen correct , no doubt for that. Nice job memory and thank to allen to remind me and all of us about what tutorial is.
May 20th, 2003, 12:13 PM
allen i will remember that for future threads....and yes the paragrahs i copied from website just to get an description about what i'm writing...
May 20th, 2003, 01:23 PM
**Not quite a tutorial but good information nonetheless. Moved thread from Tutorials to Misc Security**