Appendix A. Resources
Protecting against the unknown
http://packetstorm.acm.miami.edu/papers/contest/Mixter.txt
Classification of several personal firewalls
http://www.networkintrusion.co.uk/firepers.htm
Comparative study on personal firewalls
http://www.networkcomputing.com/1116/1116f3.html
Configuration checklist to secure a Windows NT 4.0 Workstation
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/wrkstchhk.asp
NSA Windows 2000 Security Recommendation Guides
http://nsa1.www.conxion.com/win2k/index.html
Securing Microsoft Outlook
http://www.sans.org/infosecFAQ/email/sec_outlook.htm
Pedestal Software
http://www.pedestalsoftware.com
Installrite
http://www.epsilonsquared.com
Configuring ZoneAlarm securely
http://online.securityfocus.com/guest/11486
Autopsy of a successful intrusion (well, two actually)
http://www.geocities.com/floydian_99/autopsy.html
Virus protection in a Microsoft Windows network, or How to stand a chance
http://www.geocities.com/floydian_99/virusprevention.html
Invisible file extensions on Windows
http://www.geocities.com/floydian_99/invisible.html
Software deployment that makes sense
http://www.geocities.com/floydian_99/deployment.html
Log Agent, log file recollection tool
http://www.geocities.com/floydian_99/logagent.html
LogAgent 2.0 beta
http://www.geocities.com/floydian_99/logagnt20beta.txt
10. Conclusion
Table of Contents