Print Page      Email Page      info@relevanttechnologies.com
 
Tools and References

Online Security Tools
ARIN Who is?
CIDR Calculator
Default Passwords
DNS Name Server Status Summary
DNS Root Servers
DNS Root Servers on Google Maps
Dotless IP Calculator
GeekTools Whois?
Hash Generator
Hex Security Password Generator
HTML, XHTML, WML, XML Validator
IP Address Guide
IP Subnet Calculator
MAC/OUI Address Lookup
NsLookup
OCSP Checker
Real-Time Security Threats
Reverse a Hash
RFC Index
Shodan (Search and Index Computer)
Test Your Internet Connection Speed
Traceroute Sites
Verify Email (MX Record Check)
WEP Key Generator
What’s my IP address?
500 Most Common Passwords

Security Organizations
American Society for Professional Security
American Society of Access Professionals
ASIS International
CERT/CC - CERT Coordination Center
CNSS - The Committee on National Security Systems
COAST - Computer Operations, Audit, and Security Technology
CSE - Communications Security Establishment, Canada
Department of Homeland Security
ENISA ?European Network and Information Security Agency
ESRA - Electronic Signature and Records Association
FIRST - Forum of Incident Response and Security Teams
The FISMA Center
IEEE IA - IEEE Information Assurance
IETF - Security Area for IETF
Information Assurance Collaboration Forum
Institute for Security and Open Methodologies
International Association of Privacy Professionals
Internet Security Alliance
ISACA - Information Systems Audit and Control Association
ISSA - Information Systems Security Association
ITSCC
Multi State Information Security Sharing
NAIA ?National Alliance for Information Assurance
NIAP - National Information Assurance Partnership
NIST - National Institute of Standards and Technology
NSA - National Security Agency
OCEG - Open Compliance & Ethics Group
OpenSSL Project
OWASP - Open Web Application Security Project
Security Industry Association
The Institute of Internal Auditors
Trusted Inducer
US-CERT - United States Computer Emergency Readiness Team
USENIX - Advanced Computing Systems Association
WASC - Web Application Security Consortium

Girls Youth Cleveland Browns Brown 2-Piece Cheerleader Set,Men's Arizona Cardinals Antigua Cardinal Deluxe Desert Dry Polo.Women's Baltimore Ravens Majestic Purple Game Day V-Neck T-Shirt,Men's Seattle Seahawks Richard Sherman Nike Gray Game Jersey Cheap Oakland Raiders Jerseys Sale.Mens Arizona Cardinals Patrick Peterson Nike Black Alternate Game Jersey,Chicago Bears iPhone 5 Credit Card Case.Men's Atlanta Falcons New Era Black/Red 2-Tone Cuffed Knit Hat,Detroit Lions Stadium Panoramic Photomint,New England Patriots 4-Time Super Bowl Champions Commemorative On The Fifty Desk Logo Oakland Raiders Jerseys Cheap.Men's Philadelphia Eagles Green Polyester Thematic Polo,Arizona Cardinals John Brown OYO Sports Player Minifigure,Dallas Cowboys Franchise Banner.Youth San Francisco 49ers Anquan Boldin Nike Scarlet Team Color Game Jersey,strongnfl jerseys wholesale,cheap nfl shot glasses,cheap nfl hoodies volcom.Girls Youth Oakland Raiders Pink Neon Logo T-Shirt,Men's Carolina Panthers Nike Black Facility T-Shirt,New England Patriots Tervis Tumbler 24oz. Gridiron Wrap Tumbler Oakland Raider Jerseys Sale.Detroit Lions Preschool Team Logo Long Sleeve T-Shirt - Light Blue,Youth Cleveland Browns Joe Haden Nike Brown Game Jersey Future Of The Oakland Raiders
Cryptography Links and Resources
Crypto Officer Guide
Cryptography FAQ
DES Validation Lists
Encryption Software to Avoid
Godzilla Crypto Tutorial
NIST Guideline for Implementing Cryptography in the Federal Government
IEEE P1363 Standard Specifications
John the Ripper Password Encryption Cracker
NIST Cryptographic Module Validation
Revised U.S. Encryption Export Regulations
RSA Cryptography FAQ
The ABCs of PKI
Why Cryptosystems Fail

Encryption Protocols, Algorithms, & Specifications
AES (FIPS 197)
Block Cipher Modes of Operations (NIST SP 800-38A)
CAST-128
CCM Mode (NIST SP 800-38C)
Diffie-Hellman
Digital Signature Algorithm
ECDSA (FIPS 186-2)
Handbook of Applied Cryptography
HMAC (FIPS 198)
IPSec
MD5
Rijndael
Secure Hash Standard (FIPS 180-1)
SESAME
SHS (FIPS 180-2)
S/MIME and OpenPGP
Triple-DES

Vulnerability Databases
Bugtraq
Cooperative Vulnerability Database
Common Vulnerabilities and Exposures
National Vulnerability Database
Open Source Vulnerability Database
US CERT Vulnerability Database
XForce Vulnerability Database

Glossaries
Computer Forensics Glossary
ENISA Glossary
European Data Protection Glossary
Information Security Terms Glossary
Information Warfare Glossary
Internet Security Glossary (RFC 2828)
IT Security Dictionary
Microsoft Malware Protection Glossary
National Security Telecommunications Glossary
NIST Glossary
SANS Glossary of Terms Used in Security and Intrusion Detection





 
DHTML Menu By Milonic JavaScript