Annexe A. Ressources



Protecting against the unknown
http://packetstorm.acm.miami.edu/papers/contest/Mixter.txt

Classification de plusieurs firewall personnels
http://www.networkintrusion.co.uk/firepers.htm

Article portant sur une étude comparative sur les firewall personnels
http://www.networkcomputing.com/1116/1116f3.html

Checklist de la configuration sécuritaire d'une station de travail Windows NT 4.0
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/wrkstchhk.asp

NSA Windows 2000 Security Recommendation Guides
http://nsa1.www.conxion.com/win2k/index.html

Securing Microsoft Outlook
http://www.sans.org/infosecFAQ/email/sec_outlook.htm

Pedestal Software
http://www.pedestalsoftware.com

Logiciel de création de paquets d'installation personnalisés
http://www.epsilonsquared.com

Configuring ZoneAlarm securely
http://online.securityfocus.com/guest/11486

Autopsy of a successful intrusion (well, two actually)
http://www.geocities.com/floydian_99/autopsy.html

Virus protection in a Microsoft Windows network, or How to stand a chance
http://www.geocities.com/floydian_99/virusprevention.html

Invisible file extensions on Windows
http://www.geocities.com/floydian_99/invisible.html

Software deployment that makes sense
http://www.geocities.com/floydian_99/deployment.html

Log Agent, log file recollection tool
http://www.geocities.com/floydian_99/logagent.html

LogAgent 2.0 beta
http://www.geocities.com/floydian_99/logagnt20beta.txt


11. Conclusion
Table des Matières
Hosted by www.Geocities.ws

1