Ethical and legal keylogging software designed for parents who want to monitor their child's online Facebook activities. Employers can also use the software to discreetly monitor employees for any corrupt or illegal activities.
www.howtohackafacebook.net
Exploits for many operating systems including Linux, Solaris, Microsoft, Macintosh.
insecure.org/sploits.html
Text Only Version Attorney General Ashcroft Speaks Out on Computer Crime Watch the Video Read the Text Search for: Hints ... Want to receive news of updates to the cybercrime.gov website Send a blank message to: cybercrime-subscribe@topica.com and we will add you to our email list! (Mailing list privacy information) Personalized information if you are a... Parent or Student Police Officer or ...
Warning: This site may contain explicit descriptions of or advocate one or more of the following: adultery, murder, morbid violence, bad grammar, deviant sexual conduct in violent contexts, or the consumption of alcohol and illegal drugs. Then again, it may not. Who knows enter graphical site enter text-only site 1984 - 2002 cDc communications ...
Between 1939 and 1945, the most advanced and creative forms of mathematical and technological knowledge were combined to master German communications.
www.codesandciphers.org.uk
Comprehensive list of links organized by topic.
theory.lcs.mit.edu/~rivest/crypto-security.html
Protest In Support of Labor and Indigenous Right's In Mexico by EDT On May 31st at 9am to 12pm on June 1, 2002, EST. More Info about the Action This Electronic Disturbance Theater Performance Is Sponsored By The Berkman Center For Internet & Society At Harvard Law School. THE PROTEST IS NOW OVER FOR THE MOMENT THANKS TO ALL THE 37, 000 PLUS WHO PARTICIPATED. Electronic Disturbance on 28th May, ...
www.thing.net/~rdom/ecd/ecd.html
The Famous Hacker Crackdown by Bruce Sterling is a book about cops, and wild teenage whiz-kids, and lawyers, and hairy-eyed anarchists, and industrial technicians, and hippies, and high-tech millionaires, and game hobbyists, and computer security experts, and Secret Service agents, and grifters, and thieves. This book is about the electronic frontier of the 1990s. It concerns activities that ...
www.lysator.liu.se/etexts/hacker
Full text of the book, The Hacker Crackdown, by Bruce Sterling published in 1992. This is a book about cops, and wild teenage whiz-kids, and lawyers, and hairy-eyed anarchists, and industrial technicians, and hippies, and high-tech millionaires, and game hobbyists, and computer security experts, and Secret Service agents, and grifters, and thieves. This book is about the electronic frontier of the 1990s. It concerns activities that take place inside computers and over telephone lines.
www.mit.edu/hacker/hacker.html
www.cert.org/advisories/CA-1998-01.html
The technical report is written for a general audience. (Well, for a general Web-literate audience anyway.) We tried to explain the basics carefully and keep the report short enough that people would be willing to read it. This means we left out some discussion of deeper issues. We will address these in a longer, more technical version of the paper which we are currently working on.
www.cs.princeton.edu/sip/pub/spoofing.html
Article by Niall McKay for Wired News dated Sep. 22, 1998 inlcudes links to related news.
www.wired.com/news/politics/0,1283,15129,00.html
belgian group specialized in computer and network (in)security, hacking, coding and phreaking
Article by Mark M. Pollitt, FBI Laboratory. This paper discusses the definition of cyberterrorism, its potential, and suggests an approach to the minimization of its dangers. The definition of cyberterrorism used in this paper is combines the United States Department of States definition of terrorism as politically motivated acts of violence against non-combatants with a definition of cyberspace as the computers, networks, programs and data which make up the information infrastructure. The conclusion is tha
cs.georgetown.edu/~denning/infosec/pollitt.html
Webopedia definition of IP spoofing including links to terms used in the definition.
webopedia.internet.com/TERM/I/IP_spoofing.html
Book reviews with links to online sale sites.
www.youdzone.com/cryptobooks.html
Article by Gary Robson, December 1998.
www.robson.org/gary/writing/becomeahacker.html
Everything for the belgian phreaker - phone system info, etc
Article covers computer criminals and crimes.
www.theta.com/goodman/crime.htm
Testimony of James X. Dempsey Senior Staff Counsel, Center for Democracy and Technology, before the Subcommittee on Crime of the House Judiciary Committee and the Subcommittee on Criminal Justice Oversight of the Senate Judiciary Committee, February 29, 2000
www.cdt.org/security/000229judiciary.shtml
Text of Speech by Raisuke Miyawaki of Ochanomizu Associates to the Center for Strategic & International Studies, June 29, 1999.
www.csis.org/html/sp990629Miyawaki.html
www.happyhacker.org/indexb.shtml
Article by Arik Hesseldahl for Wired News dated September 14, 1998 includes links to related articles.
www.wired.com/news/politics/0,1283,14990,00.html