Computer Security Tips

  1. Computer security
  2. Technology
  3. Computer security risks to home users
  4. Actions home users can take to protect their computer systems
  5. Appendix

5. Appendix

References and additional information

This section contains links to references and additional resources related to this document.

References

The following documents were used in compiling portions of this document:
CERT Advisories CERT Incident Notes CERT Vulnerability Notes CERT Tech Tips Other CERT documents

CERT Advisories

CA-1999-02: Trojan Horses
http://www.cert.org/advisories/CA-1999-02.html

CA-1999-04: Melissa Macro Virus
http://www.cert.org/advisories/CA-1999-04.html

CA-2000-01: Denial-of-Service Developments
http://www.cert.org/advisories/CA-2000-01.html

CA-2000-02: Malicious HTML Tags Embedded in Client Web Requests
http://www.cert.org/advisories/CA-2000-02.html

CA-2001-22: W32/Sircam Malicious Code
http://www.cert.org/advisories/CA-2001-22.html

CERT Incident Notes
IN-2000-01: Windows Based DDOS Agents
http://www.cert.org/incident_notes/IN-2000-01.html
 
IN-2000-02: Exploitation of Unprotected Windows Networking Shares
http://www.cert.org/incident_notes/IN-2000-02.html
 
IN-2000-03: 911 Worm
http://www.cert.org/incident_notes/IN-2000-03.html
 
IN-2000-07: Exploitation of Hidden File Extensions
http://www.cert.org/incident_notes/IN-2000-07.html
 
IN-2000-08: Chat Clients and Network Security
http://www.cert.org/incident_notes/IN-2000-08.html
 
IN-2001-15: W32/Goner Worm
http://www.cert.org/incident_notes/IN-2001-15.html
CERT Vulnerability Notes
VN-98.07: Back Orifice
http://www.cert.org/vul_notes/VN-98.07.backorifice.html
CERT Tech Tips
Frequently Asked Questions About Malicious Web Scripts Redirected by Web Sites
http://www.cert.org/tech_tips/malicious_code_FAQ.html
 
Protecting Yourself from Email-borne Viruses and Other Malicious Code During Y2K and Beyond
http://www.cert.org/tech_tips/virusprotection.html
 
Spoofed/Forged Email
http://www.cert.org/tech_tips/email_spoofing.html
 
Windows 95/98 Computer Security Information
http://www.cert.org/tech_tips/win-95-info.html
Other CERT documents
Other Computer Virus Resources
http://www.cert.org/other_sources/viruses.html
 
Securing Desktop Workstations
http://www.cert.org/security-improvement/modules/m04.html
 
Results of the Security in ActiveX Workshop
http://www.cert.org/archive/pdf/activeX_report.pdf
 
Security of the Internet
http://www.cert.org/encyc_article/tocencyc.html#PackSnif
 
Trends in Denial of Service Attack Technology
http://www.cert.org/archive/pdf/DoS_trends.pdf

Additional resources

Additional information is available from the following sources.

TCP/IP Frequently Asked Questions
http://www.faqs.org/faqs/internet/tcp-ip/tcp-ip-faq/part1/
http://www.faqs.org/faqs/internet/tcp-ip/tcp-ip-faq/part2/
Computer Virus Frequently Asked Questions for New Users
http://www.faqs.org/faqs/computer-virus/new-users/
 
alt.comp.virus Frequently Asked Questions
http://www.faqs.org/faqs/computer-virus/alt-faq/part1/
http://www.faqs.org/faqs/computer-virus/alt-faq/part2/
http://www.faqs.org/faqs/computer-virus/alt-faq/part3/
http://www.faqs.org/faqs/computer-virus/alt-faq/part4/
 
VIRUS-L/comp.virus Frequently Asked Questions
http://www.faqs.org/faqs/computer-virus/faq/
 
Firewalls Frequently Asked Questions
http://www.faqs.org/faqs/firewalls-faq/

This document is available from: http://www.cert.org/tech_tips/home_networks.html


comes close - we can eliminate your usage charges.