This section contains links to references and additional resources related to this document.
The following documents were used in compiling portions of this
document:
CERT Advisories
CERT Incident Notes
CERT Vulnerability Notes
CERT Tech Tips
Other CERT documents
CA-1999-02: Trojan Horses
http://www.cert.org/advisories/CA-1999-02.html
CA-1999-04: Melissa Macro Virus
http://www.cert.org/advisories/CA-1999-04.html
CA-2000-01: Denial-of-Service Developments
http://www.cert.org/advisories/CA-2000-01.html
CA-2000-02: Malicious HTML Tags Embedded in Client Web Requests
http://www.cert.org/advisories/CA-2000-02.html
CA-2001-22: W32/Sircam Malicious Code
http://www.cert.org/advisories/CA-2001-22.html
Additional information is available from the following sources.
TCP/IP Frequently Asked QuestionsThis document is available from: http://www.cert.org/tech_tips/home_networks.html
comes close - we can eliminate your usage charges.