Some files have a (separate) PGP signature to protect you against trojanized versions.
This is my PGP public key. You can reach me personally as [email protected]
The paper also announces a piece of security software called SATAN (Security Administrator Tool for Analyzing Networks). It took the authors more than a year to fulfill their promise.
A fine collection of word lists can be found on sable.ox.ac.uk:/pub/wordlists/.
All three programs require an ANSI C compiler. Tcplogger and udplogger use the SunOS 4.x Network Interface Tap (nit).
Disks and tapes keep your data even when you overwrite them many times; RAM chips remember their data even after powered off. My favourite presentation of the 1996 Security USENIX.
You can find cool pictures of data between disk tracks etc. in the "NanoTheater" on http://www.di.com.
Why the use of one-time passwords alone is not sufficient anymore. This paper shows how to take over, use, and give back a connection without anyone ever noticeing it.
How easy it is to spoof a connectionless protocol with poor or no authentication (in this case, NIS).