Just a sample of the full collection
[ BPhiles ] Security:
| ADMGTOCR.ZIP | 09-01-2008 | 21k | Improving the security of your site by breaking in |
| A_1.ZIP | 09-01-2008 | 291k | Ciac advisory number a-1 |
| A_10.ZIP | 09-01-2008 | 2k | Ciac advisory number a-10 |
| A_11.ZIP | 09-01-2008 | 2k | Ciac advisory number a-11 |
| A_14.ZIP | 09-01-2008 | 3k | Ciac advisory number a-14 |
| A_16.ZIP | 09-01-2008 | 2k | Ciac advisory number a-16 |
| A_17.ZIP | 09-01-2008 | 3k | Ciac advisory number a-17 |
| A_18.ZIP | 09-01-2008 | 2k | Ciac advisory number a-18 |
| A_19.ZIP | 09-01-2008 | 2k | Ciac advisory number a-19 |
| A_2.ZIP | 09-01-2008 | 5k | Ciac advisory number a-2 |
| A_20.ZIP | 09-01-2008 | 8k | Ciac advisory number a-20 |
| A_21.ZIP | 09-01-2008 | 4k | Ciac advisory number a-21 |
| A_22.ZIP | 09-01-2008 | 2k | Ciac advisory number a-22 |
| A_23.ZIP | 09-01-2008 | 15k | Ciac advisory number a-23 |
| A_24.ZIP | 09-01-2008 | 3k | Ciac advisory number a-24 |
| A_25.ZIP | 09-01-2008 | 3k | Ciac advisory number a-25 |
| A_26.ZIP | 09-01-2008 | 3k | Ciac advisory number a-26 |
| A_27.ZIP | 09-01-2008 | 3k | Ciac advisory number a-27 |
| A_28.ZIP | 09-01-2008 | 3k | Ciac advisory number a-28 |
| A_29.ZIP | 09-01-2008 | 4k | Ciac advisory number a-29 |
| A_3.ZIP | 09-01-2008 | 6k | Ciac advisory number a-3 |
| A_30.ZIP | 09-01-2008 | 4k | Ciac advisory number a-30 |
| A_32.ZIP | 09-01-2008 | 3k | Ciac advisory number a-32 |
| A_33.ZIP | 09-01-2008 | 3k | Ciac advisory number a-33 |
| A_34.ZIP | 09-01-2008 | 4k | Ciac advisory number a-34 |
| A_4.ZIP | 09-01-2008 | 3k | Ciac advisory number a-4 |
| A_5.ZIP | 09-01-2008 | 3k | Ciac advisory number a-5 |
| A_6.ZIP | 09-01-2008 | 3k | Ciac advisory number a-6 |
| A_8.ZIP | 09-01-2008 | 2k | Ciac advisory number a-8 |
| A_9.ZIP | 09-01-2008 | 3k | Ciac advisory number a-9 |
| A_CNID.ZIP | 09-01-2008 | 3k | Info on battle over caller ID in CA |
| A_CRYPT.ZIP | 09-01-2008 | 9k | The gov't wants to ban cryptography! |
| BEDWELL.ZIP | 09-01-2008 | 26k | Computer Security by E.A.Bedwell |
| BIBLIOG.ZIP | 09-01-2008 | 66k | Bibliography of computer security documents |
| BOOKS.ZIP | 09-01-2008 | 5k | Bibliography of computer security books |
| B_1.ZIP | 09-01-2008 | 4k | Ciac bulletin number b-1 |
| B_2.ZIP | 09-01-2008 | 3k | Ciac bulletin number b-2 |
| CERT03.ZIP | 09-01-2008 | 4k | CERT Advisory 3 |
| CERT04.ZIP | 09-01-2008 | 2k | CERT Advisory 4 |
| CERT05.ZIP | 09-01-2008 | 2k | CERT Advisory 5 |
| CERT06.ZIP | 09-01-2008 | 3k | CERT Advisory 6 |
| CERT07.ZIP | 09-01-2008 | 8k | CERT Advisory 7 |
| CERT08.ZIP | 09-01-2008 | 2k | CERT Advisory 8 |
| CERT09.ZIP | 09-01-2008 | 2k | CERT Advisory 9 |
| CERT10.ZIP | 09-01-2008 | 4k | CERT Advisory 10 |
| CERT11.ZIP | 09-01-2008 | 2k | CERT Advisory 11 |
| CERT12.ZIP | 09-01-2008 | 2k | CERT Advisory 12 |
| CERT1210.ZIP | 09-01-2008 | 3k | CERT Advisory 12/10/90 |
| CERT13.ZIP | 09-01-2008 | 2k | CERT Advisory 13 |
| CERT8901.ZIP | 09-01-2008 | 2k | CERT Advisory 89-01 |
| CERT9001.ZIP | 09-01-2008 | 2k | CERT Advisory 90-01 |
| CERT9002.ZIP | 09-01-2008 | 5k | CERT Advisory 90-02 |
| CERT9003.ZIP | 09-01-2008 | 3k | CERT Advisory 90-03 |
| CERT9004.ZIP | 09-01-2008 | 3k | CERT Advisory 90-04 |
| CERT9005.ZIP | 09-01-2008 | 3k | CERT Advisory 90-05 |
| CERT9006.ZIP | 09-01-2008 | 4k | CERT Advisory 90-06 |
| CERT9007.ZIP | 09-01-2008 | 3k | CERT Advisory 90-07 |
| CERT9008.ZIP | 09-01-2008 | 2k | CERT Advisory 90-08 |
| CERT9009.ZIP | 09-01-2008 | 3k | CERT Advisory 90-09 |
| CERT9010.ZIP | 09-01-2008 | 2k | CERT Advisory 90-10 |
| CERT9312.ZIP | 09-01-2008 | 3k | CERT Advisory 93-12 |
| CERT9313.ZIP | 09-01-2008 | 3k | CERT Advisory 93-13 |
| CLIPPER.ZIP | 09-01-2008 | 7k | White House Press Release on Clipper |
| CLIPPER1.ZIP | 09-01-2008 | 7k | The Fight for Privacy |
| COMSEC1.ZIP | 09-01-2008 | 6k | Comsec bulletin 1 |
| COPS_104.ZIP | 09-01-2008 | 318k | Unix security package |
| CRACKDWN.ZIP | 09-01-2008 | 11k | For your protection, from 2600 magazine |
| CRYPTPRI.ZIP | 09-01-2008 | 7k | Cryptology Primer by Dave Ferret |
| CS1984.ZIP | 09-01-2008 | 57k | The Comsec letter 1984 |
| CS1985.ZIP | 09-01-2008 | 71k | The Comsec letter 1985 |
| CS1986.ZIP | 09-01-2008 | 38k | The Comsec letter 1986 |
| CS1987.ZIP | 09-01-2008 | 43k | The Comsec letter 1987 |
| CS1988.ZIP | 09-01-2008 | 41k | The Comsec letter 1988 |
| CS1989.ZIP | 09-01-2008 | 49k | The Comsec letter 1989 |
| CSBYLAWS.ZIP | 09-01-2008 | 9k | Bylaws of The Communications Security Association |
| CSINCORP.ZIP | 09-01-2008 | 3k | Comsec's articles of incorporation |
| CSLAW.ZIP | 09-01-2008 | 7k | Computer security and the law by Gary s. Morris |
| C_2.ZIP | 09-01-2008 | 437k | Ciac note c-2 |
| DDN01.ZIP | 09-01-2008 | 2k | Bulletin 1 |
| DDN03.ZIP | 09-01-2008 | 5k | Bulletin 3 |
| DDN04.ZIP | 09-01-2008 | 2k | Bulletin 4 |
| DDN05.ZIP | 09-01-2008 | 3k | Bulletin 5 |
| DDN06.ZIP | 09-01-2008 | 2k | Bulletin 6 |
| DDN90_01.ZIP | 09-01-2008 | 3k | Bulletin 90-01 |
| DEV_MEM.ZIP | 09-01-2008 | 1k | Ciac advisory notice |
| DIGITELE.ZIP | 09-01-2008 | 11k | Digital telephone and the government - your privac |
| EDITSEC.ZIP | 09-01-2008 | 7k | Electronic Deception, Interception and Terrorism |
| EPA_LAW.ZIP | 09-01-2008 | 36k | The Electronic Privacy Act - This is the actual la |
| EXEGUIDE.ZIP | 09-01-2008 | 9k | Executive Guide to the Protection of Information r |
| FBIALERT.ZIP | 09-01-2008 | 3k | Your civil liberties are under threat! |
| FBI_CRED.ZIP | 09-01-2008 | 4k | The FBI can get your credit record in a snap! |
| FBI_TAP.ZIP | 09-01-2008 | 3k | EFF article on the FBI and wiretapping |
| FEDREGS.ZIP | 09-01-2008 | 5k | Federal regulations on wiretapping/ecpa |
| FEDTIMES.ZIP | 09-01-2008 | 4k | Federal Times Newsletter Article on Taxes |
| FOIAKIT.ZIP | 09-01-2008 | 11k | Using the freedom of information act |
| GLOSBLT.ZIP | 09-01-2008 | 3k | Bibliography of Computer Security Glossaries |
| GLOSSARY.ZIP | 09-01-2008 | 2k | Draft Glossary of Communications Security Terms |
| GUIDELIN.ZIP | 09-01-2008 | 15k | Bibliography of Guidelines |
| HANDLES.ZIP | 09-01-2008 | 14k | Anonymity and privacy on the network |
| HOUSEACT.ZIP | 09-01-2008 | 4k | Electronic communications privacy act of 1986 h.r. |
| KIDHACKS.ZIP | 09-01-2008 | 3k | Report on destructiveness of childish hackers |
| KIRTLND1.ZIP | 09-01-2008 | 3k | Freedom of Information Act Document Files |
| KIRTLND2.ZIP | 09-01-2008 | 2k | More FOIA info |
| LONGPASS.ZIP | 09-01-2008 | 6k | On password security - longer passwords |
| MANUALS.ZIP | 09-01-2008 | 3k | Bibliography of Computer Security Manuals |
| MGTGUIDE.ZIP | 09-01-2008 | 10k | Management Guide to the Protection of Information |
| MISC_ENC.ZIP | 09-01-2008 | 911k | Miscellaneous Encryption Info |
| NCSAREV.ZIP | 09-01-2008 | 3k | NCSA policy concerning security product reviews |
| NCSLNEW1.ZIP | 09-01-2008 | 8k | A letter from the national computer systems labora |
| NDC5.ZIP | 09-01-2008 | 4k | Crypto program |
| NVIR.ZIP | 09-01-2008 | 2k | Ciac advisory notice |
| ORGS.ZIP | 09-01-2008 | 4k | Computer Security Organizations |
| PERIODIC.ZIP | 09-01-2008 | 20k | Bibliography of Computer Security Periodicals |
| PL100235.ZIP | 09-01-2008 | 8k | Computer Security Act of 1987 |
| PORTMAP.ZIP | 09-01-2008 | 21k | Replacement portmapper |
| PRIV0227.ZIP | 09-01-2008 | 8k | Privacy Forum 2.27 (01-Aug-93) |
| PRIV0228.ZIP | 09-01-2008 | 8k | Privacy Forum 2.28 (15-Aug-93) |
| PRIV0229.ZIP | 09-01-2008 | 8k | Privacy Forum 2.29 (22-Aug-93) |
| PRIV0230.ZIP | 09-01-2008 | 10k | Privacy Forum 2.30 (30-Aug-93) |
| RCP_RDIS.ZIP | 09-01-2008 | 8k | Ciac advisory notice |
| REPORTS.ZIP | 09-01-2008 | 12k | Bibliography Computer Security Reports |
| RESTORE.ZIP | 09-01-2008 | 2k | Ciac advisory notice |
| REVBLT.ZIP | 09-01-2008 | 6k | Review of federal agency computer security and pri |
| RISK1011.ZIP | 09-01-2008 | 8k | Risks Digest 10.11 |
| RISK1015.ZIP | 09-01-2008 | 15k | Risks Digest 10.15 |
| RISK1016.ZIP | 09-01-2008 | 11k | Risks Digest 10.16 |
| RISK1017.ZIP | 09-01-2008 | 12k | Risks Digest 10.17 |
| RISK1018.ZIP | 09-01-2008 | 7k | Risks Digest 10.18 |
| RISK1019.ZIP | 09-01-2008 | 8k | Risks Digest 10.19 |
| RISK1020.ZIP | 09-01-2008 | 9k | Risks Digest 10.20 |
| RISK1021.ZIP | 09-01-2008 | 11k | Risks Digest 10.21 |
| RISK1022.ZIP | 09-01-2008 | 11k | Risks Digest 10.22 |
| RISK1023.ZIP | 09-01-2008 | 9k | Risks Digest 10.23 |
| RISK1024.ZIP | 09-01-2008 | 9k | Risks Digest 10.24 |
| RISK1025.ZIP | 09-01-2008 | 14k | Risks Digest 10.25 |
| RISK1026.ZIP | 09-01-2008 | 7k | Risks Digest 10.26 |
| RISK1027.ZIP | 09-01-2008 | 10k | Risks Digest 10.27 |
| RISK1028.ZIP | 09-01-2008 | 12k | Risks Digest 10.28 |
| RISK1029.ZIP | 09-01-2008 | 7k | Risks Digest 10.29 |
| RISK1031.ZIP | 09-01-2008 | 13k | Risks Digest 10.31 |
| RISK1047.ZIP | 09-01-2008 | 26k | Risks Digest 10.47 |
| RISK1048.ZIP | 09-01-2008 | 11k | Risks Digest 10.48 |
| RISK1049.ZIP | 09-01-2008 | 10k | Risks Digest 10.49 |
| RISK1050.ZIP | 09-01-2008 | 10k | Risks Digest 10.50 |
| RISK1051.ZIP | 09-01-2008 | 8k | Risks Digest 10.51 |
| RISK1052.ZIP | 09-01-2008 | 6k | Risks Digest 10.52 |
| RISK1053.ZIP | 09-01-2008 | 9k | Risks Digest 10.53 |
| RISK1054.ZIP | 09-01-2008 | 10k | Risks Digest 10.54 |
| RISK1055.ZIP | 09-01-2008 | 11k | Risks Digest 10.55 |
| RISKTOOL.ZIP | 09-01-2008 | 12k | Risk management research laboratory overview |
| ROTENBER.ZIP | 09-01-2008 | 8k | Telephone Privacy in the 1990's |
| SECARTCL.ZIP | 09-01-2008 | 22k | Bibliography of computer security articles |
| SECPOL.ZIP | 09-01-2008 | 85k | NCSA draft security policy |
| SOCKS.ZIP | 09-01-2008 | 2k | Internet secure socket server |
| SP4RPT.ZIP | 09-01-2008 | 16k | A report on a secure data network system transport |
| SPAN01.ZIP | 09-01-2008 | 8k | SPAN memorandum 1 |
| SPAN02.ZIP | 09-01-2008 | 2k | SPAN memorandum 2 |
| SPAN03.ZIP | 09-01-2008 | 4k | SPAN memorandum 3 |
| SPAN04.ZIP | 09-01-2008 | 3k | SPAN memorandum 4 |
| SPRINT.ZIP | 09-01-2008 | 2k | Computer system ID and password security alert |
| STARTUP.ZIP | 09-01-2008 | 4k | How to start a local Comsec chapter |
| SUN.ZIP | 09-01-2008 | 23k | A list of SUN security bugs |
| TCOMPRE.ZIP | 09-01-2008 | 27k | Telecom Privacy Messages |
| TCOMPRI1.ZIP | 09-01-2008 | 143k | Telecom Privacy Digest - Volume 1 |
| TCOMPRI2.ZIP | 09-01-2008 | 590k | Telecom Privacy Digest - Volume 2 |
| TCOMPRI3.ZIP | 09-01-2008 | 188k | Telecom Privacy Digest - Volume 3 |
| TCOMPRI4.ZIP | 09-01-2008 | 262k | Telecom Privacy Digest - Volume 4 |
| TCOMREF.ZIP | 09-01-2008 | 64k | Telecom Privacy Reference |
| TCPR_1_1.ZIP | 09-01-2008 | 17k | Run ftp and telnet across a firewall |
| TECHPAP.ZIP | 09-01-2008 | 11k | Bibliography of Technical Papers on Computer Secur |
| TELNET.ZIP | 09-01-2008 | 2k | Ciac advisory notice |
| TELNET_T.ZIP | 09-01-2008 | 2k | Ciac advisory notice |
| TEMPEST.ZIP | 09-01-2008 | 18k | Information about Tempest |
| TFTP.ZIP | 09-01-2008 | 1k | Ciac advisory notice |
| TRIPWIRE.ZIP | 09-01-2008 | 195k | Tripwire v1.0 - Unix security package |
| TRUSTBLT.ZIP | 09-01-2008 | 6k | Guidance to Federal Agencies on the use of Truste |
| UNIXWRAP.ZIP | 09-01-2008 | 10k | Information about a TCP wrapper |
| USRGUIDE.ZIP | 09-01-2008 | 7k | Computer User's Guide to the Protection of Informa |
| VENDORS.ZIP | 09-01-2008 | 44k | Security Vendors |
| VIDEOS.ZIP | 09-01-2008 | 7k | Computer Security Video Presentations |
| WIRETAP.ZIP | 09-01-2008 | 10k | Can Wiretaps Remain Cost Effective |
(c) 1994, bbs@darkrealms.ca