WSM Reference Guide - WatchGuard Technologies
WSM Reference Guide - WatchGuard Technologies
WSM Reference Guide - WatchGuard Technologies
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Other Web Sites<br />
maintains a list of these unresolved flaws. Many of his descriptions include workarounds that<br />
minimize the vulnerability while we all wait for Microsoft's patch.<br />
Packetstormsecurity.org<br />
This site offers a repository of the Top 20 security tools, advisories, and exploits, updated<br />
throughout the week.<br />
K-otik.com<br />
This French site is usually the first place you’ll find significant exploit code. They also archive<br />
notable white papers in various languages, so multilingual administrators can get a world of<br />
security instruction here.<br />
2600.com<br />
This Web site supplements the printed journal 2600 , the seminal, well-known "hacker's<br />
quarterly," where programmers inform one another of new flaws, exploits, and attacks on<br />
everything from networks to phone systems. Worth a read so you can realistically assess the<br />
strength of your countermeasures.<br />
Other Web Sites<br />
www.howstuffworks.com<br />
Simple explanations of how all kinds of things, including system and network components,<br />
work.<br />
www.zebra.org/zebra/index.html<br />
Online gnu zebra configuration document for Firebox users using dynamic routing protocols.<br />
www.watchguard.com/support/advancedfaqs/log_sniffing.asp<br />
Check here for information on a useful Network Packet Analyzer.<br />
www.iana.org<br />
Look here for lists of protocol number assignments and TCP and UDP port numbers.<br />
www.telusplanet.com/public/sparkman/netcalc.htm<br />
A network calculator.<br />
www.winguides.com/registry/<br />
A good site for information about the Windows registry.<br />
www.watchguard.com/glossary/?nav=ic<br />
Online glossary of security terms.<br />
vmyths.com<br />
Some viruses you hear about are not real. Though each of virus vendor has a “virux hoax” page,<br />
when we have to prove to a hysterical user that a problem doesn’t really exist, we like the writeups<br />
here.<br />
slashdot.org<br />
For fun, no self-respecting geek should miss viewing science, pop culture, and the world of<br />
computers through the perspective of the IT-minded community (millions strong!) who<br />
contribut to Slashdot.<br />
<strong>Reference</strong> <strong>Guide</strong> 87