home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
The X-Philes (2nd Revision)
/
The X-Philes Number 1 (1995).iso
/
xphiles
/
securit
/
descript.ion
< prev
next >
Wrap
Text File
|
1995-11-10
|
7KB
|
195 lines
a_cnid.zip Info on battle over caller ID in CA
a_crypt.zip The gov't wants to ban cryptography!
clipper.zip White House Press Release on Clipper
clipper1.zip The Fight for Privacy
crackdwn.zip For your protection, from 2600 magazine
cryptpri.zip Cryptology Primer by Dave Ferret
digitele.zip Digital telephone and the government - your privacy
editsec.zip Electronic Deception, Interception and Terrorism
epa_law.zip The Electronic Privacy Act - This is the actual law
fbialert.zip Your civil liberties are under threat!
fbi_cred.zip The FBI can get your credit record in a snap!
fbi_tap.zip EFF article on the FBI and wiretapping
fedregs.zip Federal regulations on wiretapping/ecpa
fedtimes.zip Federal Times Newsletter Article on Taxes
foiakit.zip Using the freedom of information act
handles.zip Anonymity and privacy on the network
kirtlnd1.zip Freedom of Information Act Document Files
kirtlnd2.zip More FOIA info
misc_enc.zip Miscellaneous Encryption Info
ndc5.zip Crypto program
priv0227.zip Privacy Forum 2.27 (01-Aug-93)
priv0228.zip Privacy Forum 2.28 (15-Aug-93)
priv0229.zip Privacy Forum 2.29 (22-Aug-93)
priv0230.zip Privacy Forum 2.30 (30-Aug-93)
rotenber.zip Telephone Privacy in the 1990's
tcompre.zip Telecom Privacy Messages
tcompri1.zip Telecom Privacy Digest - Volume 1
tcompri2.zip Telecom Privacy Digest - Volume 2
tcompri3.zip Telecom Privacy Digest - Volume 3
tcompri4.zip Telecom Privacy Digest - Volume 4
tcomref.zip Telecom Privacy Reference
tempest.zip Information about Tempest
wiretap.zip Can Wiretaps Remain Cost Effective
admgtocr.zip Improving the security of your site by breaking into it
bedwell.zip Computer Security by E.A.Bedwell
bibliog.zip Bibliography of computer security documents
books.zip Bibliography of computer security books
cops_104.zip Unix security package
csbylaws.zip Bylaws of The Communications Security Association
cslaw.zip Computer security and the law by Gary s. Morris
exeguide.zip Executive Guide to the Protection of Information resources
glosblt.zip Bibliography of Computer Security Glossaries
glossary.zip Draft Glossary of Communications Security Terms
guidelin.zip Bibliography of Guidelines
houseact.zip Electronic communications privacy act of 1986 h.r.
kidhacks.zip Report on destructiveness of childish hackers
longpass.zip On password security - longer passwords
manuals.zip Bibliography of Computer Security Manuals
mgtguide.zip Management Guide to the Protection of Information
ncsarev.zip NCSA policy concerning security product reviews
ncslnew1.zip A letter from the national computer systems laboratory
orgs.zip Computer Security Organizations
periodic.zip Bibliography of Computer Security Periodicals
pl100235.zip Computer Security Act of 1987
portmap.zip Replacement portmapper
reports.zip Bibliography Computer Security Reports
revblt.zip Review of federal agency computer security and privacy plans
risktool.zip Risk management research laboratory overview
secartcl.zip Bibliography of computer security articles
secpol.zip NCSA draft security policy
socks.zip Internet secure socket server
sp4rpt.zip A report on a secure data network system transport
span01.zip SPAN memorandum #1
span02.zip SPAN memorandum #2
span03.zip SPAN memorandum #3
span04.zip SPAN memorandum #4
sprint.zip Computer system ID and password security alert
sun.zip A list of SUN security bugs
tcpr_1_1.zip Run ftp and telnet across a firewall
techpap.zip Bibliography of Technical Papers on Computer Security
tripwire.zip Tripwire v1.0 - Unix security package
trustblt.zip Guidance to Federal Agencies on the use of Truste
unixwrap.zip Information about a TCP wrapper
usrguide.zip Computer User's Guide to the Protection of Information
vendors.zip Security Vendors
videos.zip Computer Security Video Presentations
risk1011.zip Risks Digest 10.11
risk1015.zip Risks Digest 10.15
risk1016.zip Risks Digest 10.16
risk1017.zip Risks Digest 10.17
risk1018.zip Risks Digest 10.18
risk1019.zip Risks Digest 10.19
risk1020.zip Risks Digest 10.20
risk1021.zip Risks Digest 10.21
risk1022.zip Risks Digest 10.22
risk1023.zip Risks Digest 10.23
risk1024.zip Risks Digest 10.24
risk1025.zip Risks Digest 10.25
risk1026.zip Risks Digest 10.26
risk1027.zip Risks Digest 10.27
risk1028.zip Risks Digest 10.28
risk1029.zip Risks Digest 10.29
risk1031.zip Risks Digest 10.31
risk1047.zip Risks Digest 10.47
risk1048.zip Risks Digest 10.48
risk1049.zip Risks Digest 10.49
risk1050.zip Risks Digest 10.50
risk1051.zip Risks Digest 10.51
risk1052.zip Risks Digest 10.52
risk1053.zip Risks Digest 10.53
risk1054.zip Risks Digest 10.54
risk1055.zip Risks Digest 10.55
ddn01.zip Bulletin #1
ddn03.zip Bulletin #3
ddn04.zip Bulletin #4
ddn05.zip Bulletin #5
ddn06.zip Bulletin #6
ddn90_01.zip Bulletin 90-01
comsec1.zip Comsec bulletin #1
cs1984.zip The Comsec letter 1984
cs1985.zip The Comsec letter 1985
cs1986.zip The Comsec letter 1986
cs1987.zip The Comsec letter 1987
cs1988.zip The Comsec letter 1988
cs1989.zip The Comsec letter 1989
csincorp.zip Comsec's articles of incorporation
startup.zip How to start a local Comsec chapter
a_1.zip Ciac advisory number a-1
a_10.zip Ciac advisory number a-10
a_11.zip Ciac advisory number a-11
a_14.zip Ciac advisory number a-14
a_16.zip Ciac advisory number a-16
a_17.zip Ciac advisory number a-17
a_18.zip Ciac advisory number a-18
a_19.zip Ciac advisory number a-19
a_2.zip Ciac advisory number a-2
a_20.zip Ciac advisory number a-20
a_21.zip Ciac advisory number a-21
a_22.zip Ciac advisory number a-22
a_23.zip Ciac advisory number a-23
a_24.zip Ciac advisory number a-24
a_25.zip Ciac advisory number a-25
a_26.zip Ciac advisory number a-26
a_27.zip Ciac advisory number a-27
a_28.zip Ciac advisory number a-28
a_29.zip Ciac advisory number a-29
a_3.zip Ciac advisory number a-3
a_30.zip Ciac advisory number a-30
a_32.zip Ciac advisory number a-32
a_33.zip Ciac advisory number a-33
a_34.zip Ciac advisory number a-34
a_4.zip Ciac advisory number a-4
a_5.zip Ciac advisory number a-5
a_6.zip Ciac advisory number a-6
a_8.zip Ciac advisory number a-8
a_9.zip Ciac advisory number a-9
b_1.zip Ciac bulletin number b-1
b_2.zip Ciac bulletin number b-2
c_2.zip Ciac note c-2
dev_mem.zip Ciac advisory notice
nvir.zip Ciac advisory notice
rcp_rdis.zip Ciac advisory notice
restore.zip Ciac advisory notice
telnet.zip Ciac advisory notice
telnet_t.zip Ciac advisory notice
tftp.zip Ciac advisory notice
cert03.zip CERT Advisory #3
cert04.zip CERT Advisory #4
cert05.zip CERT Advisory #5
cert06.zip CERT Advisory #6
cert07.zip CERT Advisory #7
cert08.zip CERT Advisory #8
cert09.zip CERT Advisory #9
cert10.zip CERT Advisory #10
cert11.zip CERT Advisory #11
cert12.zip CERT Advisory #12
cert1210.zip CERT Advisory 12/10/90
cert13.zip CERT Advisory #13
cert8901.zip CERT Advisory 89-01
cert9001.zip CERT Advisory 90-01
cert9002.zip CERT Advisory 90-02
cert9003.zip CERT Advisory 90-03
cert9004.zip CERT Advisory 90-04
cert9005.zip CERT Advisory 90-05
cert9006.zip CERT Advisory 90-06
cert9007.zip CERT Advisory 90-07
cert9008.zip CERT Advisory 90-08
cert9009.zip CERT Advisory 90-09
cert9010.zip CERT Advisory 90-10
cert9312.zip CERT Advisory 93-12
cert9313.zip CERT Advisory 93-13