info@relevanttechnologies.com
 
  Print Page      Email Page Bookmark and Share
 
Tools and References

Online Security Tools
ARIN Who is?
CIDR Calculator
Default Passwords
DNS Name Server Status Summary
DNS Root Servers
DNS Root Servers on Google Maps
Dotless IP Calculator
GeekTools Whois?
Hash Generator
Hex Security Password Generator
HTML, XHTML, WML, XML Validator
IP Address Guide
IP Subnet Calculator
MAC/OUI Addresses
NsLookup
OCSP Checker
Real-Time Security Threats
Reverse a Hash
RFC Index
Shodan (Search and Index Computer)
Test Your Internet Connection Speed
Traceroute Sites
Verify Email
WEP Key Generator
What’s my IP address?
500 Most Common Passwords

Security Organizations
American Society for Professional Security
American Society of Access Professionals
ASIS International
CERT/CC - CERT Coordination Center
CNSS - The Committee on National Security Systems
COAST - Computer Operations, Audit, and Security Technology
CSE - Communications Security Establishment, Canada
CSI - Computer Security Institute
Department of Homeland Security
ENISA – European Network and Information Security Agency
ESRA - Electronic Signature and Records Association
FIRST - Forum of Incident Response and Security Teams
The FISMA Center
IEEE IA - IEEE Information Assurance
IETF - Security Area for IETF
Information Assurance Collaboration Forum
Institute for Security and Open Methodologies
International Association of Privacy Professionals
Internet Security Alliance
ISACA - Information Systems Audit and Control Association
ISSA - Information Systems Security Association
ITSCC
Multi State Information Security Sharing
NAIA – National Alliance for Information Assurance
NIAP - National Information Assurance Partnership
NIST - National Institute of Standards and Technology
NSA - National Security Agency
OCEG - Open Compliance & Ethics Group
OpenSSL Project
OWASP - Open Web Application Security Project
Security Industry Association
The Institute of Internal Auditors
Trusted Inducer
US-CERT - United States Computer Emergency Readiness Team
USENIX - Advanced Computing Systems Association
WASC - Web Application Security Consortium

Cryptography Links and Resources
Crypto Officer Guide
Cryptography FAQ
DES Validation Lists
Encryption Software to Avoid
Godzilla Crypto Tutorial
NIST Guideline for Implementing Cryptography in the Federal Government
IEEE P1363 Standard Specifications
John the Ripper Password Encryption Cracker
NIST Cryptographic Module Validation
Revised U.S. Encryption Export Regulations
RSA Cryptography FAQ
The ABCs of PKI
Why Cryptosystems Fail

Encryption Protocols, Algorithms, & Specifications
AES (FIPS 197)
Block Cipher Modes of Operations (NIST SP 800-38A)
CAST-128
CCM Mode (NIST SP 800-38C)
Diffie-Hellman
Digital Signature Algorithm
ECDSA (FIPS 186-2)
Handbook of Applied Cryptography
HMAC (FIPS 198)
IPSec
MD5
Rijndael
Secure Hash Standard (FIPS 180-1)
SESAME
SHS (FIPS 180-2)
S/MIME and OpenPGP
Triple-DES

Vulnerability Databases
Bugtraq
Cooperative Vulnerability Database
Common Vulnerabilities and Exposures
National Vulnerability Database
Open Source Vulnerability Database
US CERT Vulnerability Database
XForce Vulnerability Database

Glossaries
Computer Forensics Glossary
ENISA Glossary
European Data Protection Glossary
Information Security Terms Glossary
Information Warfare Glossary
Internet Security Glossary (RFC 2828)
IT Security Dictionary
Microsoft Malware Protection Glossary
National Security Telecommunications Glossary
NIST Glossary
SANS Glossary of Terms Used in Security and Intrusion Detection





 
DHTML Menu By Milonic JavaScript