Appendix A. Resources



Protecting against the unknown
http://packetstorm.acm.miami.edu/papers/contest/Mixter.txt

Classification of several personal firewalls
http://www.networkintrusion.co.uk/firepers.htm

Comparative study on personal firewalls
http://www.networkcomputing.com/1116/1116f3.html

Configuration checklist to secure a Windows NT 4.0 Workstation
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/wrkstchhk.asp

NSA Windows 2000 Security Recommendation Guides
http://nsa1.www.conxion.com/win2k/index.html

Securing Microsoft Outlook
http://www.sans.org/infosecFAQ/email/sec_outlook.htm

Pedestal Software
http://www.pedestalsoftware.com

Installrite
http://www.epsilonsquared.com

Configuring ZoneAlarm securely
http://online.securityfocus.com/guest/11486

Autopsy of a successful intrusion (well, two actually)
http://www.geocities.com/floydian_99/autopsy.html

Virus protection in a Microsoft Windows network, or How to stand a chance
http://www.geocities.com/floydian_99/virusprevention.html

Invisible file extensions on Windows
http://www.geocities.com/floydian_99/invisible.html

Software deployment that makes sense
http://www.geocities.com/floydian_99/deployment.html

Log Agent, log file recollection tool
http://www.geocities.com/floydian_99/logagent.html

LogAgent 2.0 beta
http://www.geocities.com/floydian_99/logagnt20beta.txt


10. Conclusion
Table of Contents
Hosted by www.Geocities.ws

1