Make your own free website on
Blog Tools
Edit your Blog
Build a Blog
RSS Feed
View Profile
Open Community
Post to this Blog
« May 2019 »
1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31
You are not logged in. Log in
Entries by Topic
All topics  «
Directives for Research on Internet Crime and Security
            Are you a Victim of Internet Crime? Identity Theft?
                       Look here to find directives for 
                  Research on Internet Crime and Security, 
                for those harrassed, terrorized, threatened. 

                            This Site is for 
      victims of Identity Theft 
                      and types of Internet Crime, 
             victims of crimes extending to the internet, 
                Internet Offensive Ads, website theft, 
                 spy theft, robbery, invasion, crime interactivity, 
                   offensive interactive media, selling and 
 buying information,
            names, credit card numbers, and locations on the internet, 
                 pornography, offensive internet marketing, 

                     Offensiveanthropomorphic ads,  internet voodoo, 
                     voodoo banner ads on ebay, and tripod, 

                offensive e-commerce, offensive internet advertising, 
         offensive television advertising, internet advertising research.
                          Were you hit by any of these?

The SANS Institute
Offer computer security research, training and information.

Washington Department of Defense
Official directives repository. Technology security specific directives are in the ranges 5200-5299 and 8000-8999.

National Information Assurance Partnership
U.S. Government initiative originated to develop common IT security criteria for evaluating products.

Dartmouth College Institute for Security Technology Studies (ISTS)
Research group focusing on United States national cyber-security and technological counterterrorism. Administers the I3P consortium.

Centre for Applied Cryptographic Research
Cryptographic research organisation at the University of Waterloo. Downloads of technical reports, upcoming conferences list and details of graduate courses available.

Cryptography Research, Inc
Research and system design in areas including tamper resistance, content protection, network security, and financial services. Service descriptions and white papers.

Security research team. Security papers, presentations and tools.

Penn State S2 Group
General cyber security lab at the United States university. Includes current and past projects, software, publications, and events.

Milos Project
Wiki site containing research on securing the Mozart-Oz distributed computing development platform.

Fst Research & Development
Research division of an IT company, working primarily on security issues in IT and software development. Project information and software downloads. [English and Italian]
A selection of white papers from the Rochester Institute of Technology. Also offers an ISO image of a CD containing commonly used investigative tools.

SUNY Stony Brook Secure Systems Lab
Group aimed at research and education in computer and network security. Projects, academic programs, and publications. Located in New York, United States.

CSO (Chief Security Officer) Magazine
Provides information security executives with high-level information, best practices and strategic insight.

CERT Coordination Center Vulnerability Database
Vulnerability Notes published by the CERT Coordination Center.

NIST Computer Security Resource Clearinghouse
The Computer Security Resource Clearinghouse (CSRC) is designed to collect and disseminate computer security information and resources to help users, systems administrators, managers, and security professionals better protect their data and systems.

Monthly e-mail newsletter written by Bruce Schneier. Back issues available on site.

Infosecurity Today Magazine
Infosecurity Today focuses on the practical experiences of IT security professionals, provides analysis of current tends, independent reporting, and more.

SC Magazine - Online
Online counterpart to Secure Computing monthly magazine. Provides product reviews, solutions and articles for the systems security professional.

the Electronic Newsletter of the IEEE Computer Society Technical Committee on Security and Privacy.

Information Systems Security Journal
Monthly print magazine for information security managers and others responsible for the daily, efficient operation of security policies, procedures, standards, and practices.

Computers at Risk: Safe Computing in the Information Age
Complete text of the book by the System Security Study Committee, National Research Council, U.S, that presents a comprehensive agenda for developing nationwide policies and practices for computer security.

Network Security Library
Windows, unix, netware, WWW, firewalls, intrusion detection systems, security policy, books, papers, and articles.

Anton Chuvakin, Ph.D. Infosecurity Publications
This page contains links to all the information security articles the author has written on Linux security, vulnerabilities, people issues of infosec and others topics.

Introduction to Network Security
A gentle introduction to the complex topic of network security. Geared especially toward those new to security, including end users and management.

Information Security Statistics
Provides a central repository for computer crime and Internet security statistics, reports, trends, and news. Also has numerous security awareness tools, including an online industry best practice password strength meter.

Secure Business Quarterly
Quarterly publication focused on digital security business issues, metrics, and investments. Published by @stake.

ACM Crossroads Security feature articles
ACM Crossroads is the student magazine of the Association for Computing Machinery. Crossroads has published several articles about computer security, as listed in this index.

The Security Journal
Free, quarterly e-magazine offers a variety of articles for both information security managers and technical staff.

Monthly newsletter targeted at people who need a strategic, multi-year view of the information security industry.
The ISO 17799 Security Standard
Publication of ISO 17799 provided a milestone in the evolution of information security. This site provides background, information and resources on this important standard.
Designing Secure Software l
A methodology for avoiding the security holes that drive you mad, an article from SunWorld.
Lenny Zeltser
Article examining the evolution of malicious agents by analyzing features and limitations of popular viruses, worms, and trojans, detailing the possibility of a new breed of malicious agents currently being developed on the Internet.

BaDc0deD - Computer Security Documents
White papers, tutorials and source code about secure programming, bugs, buffer overflows, user-supplied format string, exploit coding, shellcode programming and assembly. (English and Espaņol)

2002 UK Information Security Breaches Survey
UK Government Department of Trade & Industry Information Security Breaches Survey web-site.

Anonymous and Pseudonymous Communications and Systems Bibliography
A compilation of bibliographic references and links to influential papers relating to anonymity.

The Orange Book Site
Contains a summary of the DoD's "Trusted Computer System Evaluation Criteria" (Orange Book) - if you've ever wondered what a C2 security rating is, this is the place to find out.

The theory of conduct is "the study of right and wrong, of obligation and permissions, of duty, and of what is so wrong as to be evil." But matters can be simplified considerably. Each of these concepts, "right," "wrong," "obligation," "permission," "virtue," "vice," and so forth can be defined in relation to their opposing concepts. For example, by defining "right action," "wrong action" may then be defined as an "action that is not right." Examples: If an action is right, then am I obliged to do it? If I ought to do something, then would I be practicing a virtue if I did it?

The question here is whether morality might have anything to do with leading your personal life in a virtuous or a corrupt way, so long as it does not directly affect other people. It seems to me pretty obvious that it does. In fact, I would submit to you that this is one of the most important things that a theory of conduct can do for us -- it can provide us with wisdom about how we should live all aspects of our lives, personal and social.

Sanity considered as a legal term denotes that an individual is of sound mind and therefore can bear legal responsibility for his or her actions. It is generally defined in terms of the absence of insanity. It is not a medical term, although the opinions of medical experts are often important in making a legal decision as to whether someone is sane or insane. It is also not the same concept as mental illness. One can be acting under profound mental illness and yet be sane, and one can also be ruled insane without an underlying mental illness.

Sanity outside of legal definitions has been little explored by science and medicine, as the concentration has been on illness. Dr. P.S. Graven suggested the term "un-sane" to describe a condition that is not exactly insane, but not quite sane either.

A theory of sanity was proposed by Alfred Korzybski in his general semantics. Basically he believed that sanity was tied to the structural fit or lack of it between our reactions to the world and what is actually going on in the world. He expressed this notion in a map-territory analogy: "A map is not the territory it represents, but, if correct, it has a similar structure to the territory, which accounts for its usefulness."

Then suppose you decide, after all that careful work, that as it turns out, rule consequentialism -- perhaps a rule version of hybrid consequentialism -- is the correct theory of conduct.

So now you're convinced you know what, in general, you ought to do, and you think you've given a philosophical justification for this.

But even after all of that, someone might still not care, choosing instead their own personal gain. You can't reason those people into being personable; they're not personable, they'll take advantage of you, and there isn't a whole lot that you can do about it except to protect yourself.

A mental illness is a disorder of the brain that results in a disruption in a person's thinking, feeling, moods, and ability to relate to others. Mental health, mental hygiene, behavioral health, and mental wellness are all terms used to describe the state or absence of mental illness.

Most psychologists attribute mental illness to organic/neurochemical causes that can be treated with psychiatric medication, psychotherapy, lifestyle adjustments and other supportive measures; however, many of the causes of mental illness are still unknown. The battle between "nature" and "nurture" goes on as it has for years. Neuroscience and genetics are still unable to fully explain the effects of genetic inheritance and developmental environment.

According to the 2003 report of the U.S. President's New Freedom Commission on Mental Health, major mental illness, including clinical depression, bipolar disorder, schizophrenia, and obsessive-compulsive disorder,

when compared with all other diseases (such as cancer and heart disease), is the most common cause of disability in the United States.


A curse is a prayer asking that a god or similar spirit bring misfortune to someone; an imprecation or execration, the opposite of a blessing or charm.

A curse can be said to be the effective implementation of the god's wrath against the victim of the curse. Other sorts of curses are imposed by magic or witchcraft, such as the evil eye or the use of voodoo dolls.

Cursing rests on the belief in the possibility of some power bringing down calamity upon persons or things; and that this curse can be made effective by the mere power of the spoken word, without any regard to its moral justification.

In a broader sense, 'curse' is a loose synonym for blasphemy or profanity (i.e. a 'curse word'). The curse is also another term for the original sin of Adam and Eve.

Belief in curses is a part of the vague sort of animism, similar to belief in luck, that is a part of folk religion and popular superstition. The deliberate levying of these sorts of curses is a part of the practice of magic, or perhaps lies on the boundaries between magic and religion. Some people claiming to be clairvoyants or practitioners of divination attempt to get money from the gullible by telling them they are under curses that only their apotropaic powers can remove. This is an ancient type of confidence trick familiar to the Egyptians, and a species of fraud, unlawful under the laws of many jurisdictions.

Disaster Planning and Recovery : A Guide for Facility Professionals
by Alan M. Levitt

Public health is an aspect of health services concerned with threats to the overall health of a community based on population health analysis. It generally includes surveillance and control of disease and promotion of healthy behaviors among members of the community. Prevention is another important principle.

Public health promotes not simply the absence of disease but mental, physical, and emotional well-being.

The WHO sets standards and provides global surveillance, but national bodies such as the Centers for Disease Control and Prevention in Atlanta, Georgia in the USA and their local affiliated Medical Officer of Health are usually the lead in responding to public health threats. The frontline on public health initiatives are state and local health departments. The Surgeon General is in charge of the United States Public Health Service (U.S.P.H.S..) This agency provides the nation with public health services and activites.

Internet Law: A Practical Guide for Legal and Business Professionals by Alan M. Gahtan, 

et al (Paperback  - September 1998)

Internet for the legal professional by John N Brewer

Conduct of judges and lawyers
A study of professional ethics, 
discipline, and disbarment, 
by Orie L Phillips

Professional ethics among judges, lawyers, bankers, administrators, mortgage and title company workers, teachers, public service agents. police, and public officals.

How to use the Internet
for legal, business & investigative research:
A guide for legal professionals by Carole A Levitt

How to Use the Internet for Legal,
Business & Investigative Research:
A Guide for Tennessee Legal Professionals

(Hardcover - August 2001)

Incident Response and Computer Forensics, Second Edition
by Chris Prosise, et al (Paperback)

Principles of Information Security by Michael Whitman, Herbert Mattord (Paperback)

MOST victims of Identity Theft are not around to tell you what ID Theft is about!
Murder by Death


tourist Everyone who knew what to do is dead, Can you Stop the Syndrome?

Mad Fun Facts | Left-Right Brain Lessons | learning styles indicator |