File: references.html

package info (click to toggle)
satan 1.1.1-18
  • links: PTS
  • area: non-free
  • in suites: potato, woody
  • size: 1,440 kB
  • ctags: 1,425
  • sloc: ansic: 6,183; perl: 4,867; makefile: 328; sh: 221
file content (65 lines) | stat: -rw-r--r-- 1,783 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
<HTML>
<HEAD>
<title>SATAN References/Bibliography</title>
<LINK REV="made" HREF="mailto:satan@fish.com">
</HEAD>
<BODY BGCOLOR="#FFFFFF">

<H2>Bibliography</H2>
<HR>
<P> 
Baldwin, Robert W.,
<CITE> Rule Based Analysis of Computer Security</CITE>,
Massachusetts Institute of Technology, June 1987.
<P> 
Bellovin, Steve, 
<CITE> Using the Domain Name System for System Break-ins</CITE>,
1992 (unpublished).
<P> 
Farmer, Dan, and Venema, Wietse,
<A HREF="admin_guide_to_cracking.html">
<CITE> Improving the Security of Your Site by Breaking Into it</CITE></A>,
comp.security.unix, December 1993.
<P>
Massachusetts Institute of Technology, 
<CITE> X Window System Protocol</CITE>,
Version 11, 1990.
<P> 
Shimomura, Tsutomu, 
<CITE> private communication</CITE>.
<P> 
Sun Microsystems, 
<CITE> OpenWindows V3.0.1 User Commands</CITE>,
March 1992.
<P> 
Bellovin, Steve,
<CITE> Security Problems in the TCP/IP Protocol Suite</CITE>,
Computer Communication Review 19 (2), 1989; a comment by Stephen
Kent appears in volume 19 (3), 1989.
<P> 
Garfinkel, Simson and Spafford, Gene, 
<CITE> Practical UNIX Security</CITE>,
O'Reilly and Associates, Inc., 1992.
<P> 
Hess, David, Safford, David, and Pooch, Udo, 
<CITE> A UNIX Network Protocol Study: Network Information Service</CITE>,
Computer Communication Review 22 (5) 1992.
<P> 
Phreak Accident,
<CITE> Playing Hide and Seek, UNIX style</CITE>,
Phrack, Volume Four, Issue Forty-Three, File 14 of 27.
<P> 
Ranum, Marcus, 
<CITE> Firewalls internet electronic mailing list</CITE>,
Sept 1993.
<P> 
Schuba, Christoph, 
<CITE> Addressing Weaknesses in the Domain Name System Protocol</CITE>,
Purdue University, August 1993.
<P> 
Thompson, Ken,
<CITE> Reflections on Trusting Trust</CITE>,
Communications of the ACM
27 (8), 1984.
</BODY>
</HTML>