
Only a sample of the full collection.
| filename | description | size | date | hits |
| ADMGTOCR.ZIP | Improving the security of your site by b | 0k | 7-19-2025 | 4 |
| A_1.ZIP | Ciac advisory number a-1 | 0k | 7-19-2025 | 3 |
| A_10.ZIP | Ciac advisory number a-10 | 0k | 7-19-2025 | 4 |
| A_11.ZIP | Ciac advisory number a-11 | 0k | 7-19-2025 | 5 |
| A_14.ZIP | Ciac advisory number a-14 | 0k | 7-19-2025 | 6 |
| A_16.ZIP | Ciac advisory number a-16 | 0k | 7-19-2025 | 5 |
| A_17.ZIP | Ciac advisory number a-17 | 0k | 7-19-2025 | 5 |
| A_18.ZIP | Ciac advisory number a-18 | 0k | 7-19-2025 | 4 |
| A_19.ZIP | Ciac advisory number a-19 | 0k | 7-19-2025 | 5 |
| A_2.ZIP | Ciac advisory number a-2 | 0k | 7-19-2025 | 5 |
| A_20.ZIP | Ciac advisory number a-20 | 0k | 7-19-2025 | 5 |
| A_21.ZIP | Ciac advisory number a-21 | 0k | 7-19-2025 | 4 |
| A_22.ZIP | Ciac advisory number a-22 | 0k | 7-19-2025 | 4 |
| A_23.ZIP | Ciac advisory number a-23 | 0k | 7-19-2025 | 5 |
| A_24.ZIP | Ciac advisory number a-24 | 0k | 7-19-2025 | 2 |
| A_25.ZIP | Ciac advisory number a-25 | 0k | 7-19-2025 | 4 |
| A_26.ZIP | Ciac advisory number a-26 | 0k | 7-19-2025 | 5 |
| A_27.ZIP | Ciac advisory number a-27 | 0k | 7-19-2025 | 2 |
| A_28.ZIP | Ciac advisory number a-28 | 0k | 7-19-2025 | 4 |
| A_29.ZIP | Ciac advisory number a-29 | 0k | 7-19-2025 | 4 |
| A_3.ZIP | Ciac advisory number a-3 | 0k | 7-19-2025 | 6 |
| A_30.ZIP | Ciac advisory number a-30 | 0k | 7-19-2025 | 6 |
| A_32.ZIP | Ciac advisory number a-32 | 0k | 7-19-2025 | 5 |
| A_33.ZIP | Ciac advisory number a-33 | 0k | 7-19-2025 | 6 |
| A_34.ZIP | Ciac advisory number a-34 | 0k | 7-19-2025 | 5 |
| A_4.ZIP | Ciac advisory number a-4 | 0k | 7-19-2025 | 5 |
| A_5.ZIP | Ciac advisory number a-5 | 0k | 7-19-2025 | 5 |
| A_6.ZIP | Ciac advisory number a-6 | 0k | 7-19-2025 | 5 |
| A_8.ZIP | Ciac advisory number a-8 | 0k | 7-19-2025 | 4 |
| A_9.ZIP | Ciac advisory number a-9 | 0k | 7-19-2025 | 4 |
| A_CNID.ZIP | Info on battle over caller ID in CA | 0k | 7-19-2025 | 5 |
| A_CRYPT.ZIP | The gov't wants to ban cryptography! | 0k | 7-19-2025 | 5 |
| BEDWELL.ZIP | Computer Security by E.A.Bedwell | 0k | 7-19-2025 | 5 |
| BIBLIOG.ZIP | Bibliography of computer security docume | 0k | 7-19-2025 | 4 |
| BOOKS.ZIP | Bibliography of computer security books | 0k | 7-19-2025 | 6 |
| B_1.ZIP | Ciac bulletin number b-1 | 0k | 7-19-2025 | 4 |
| B_2.ZIP | Ciac bulletin number b-2 | 0k | 7-19-2025 | 5 |
| CERT03.ZIP | CERT Advisory #3 | 0k | 7-19-2025 | 5 |
| CERT04.ZIP | CERT Advisory #4 | 0k | 7-19-2025 | 4 |
| CERT05.ZIP | CERT Advisory #5 | 0k | 7-19-2025 | 3 |
| CERT06.ZIP | CERT Advisory #6 | 0k | 7-19-2025 | 5 |
| CERT07.ZIP | CERT Advisory #7 | 0k | 7-19-2025 | 5 |
| CERT08.ZIP | CERT Advisory #8 | 0k | 7-19-2025 | 6 |
| CERT09.ZIP | CERT Advisory #9 | 0k | 7-19-2025 | 5 |
| CERT10.ZIP | CERT Advisory #10 | 0k | 7-19-2025 | 6 |
| CERT11.ZIP | CERT Advisory #11 | 0k | 7-19-2025 | 4 |
| CERT12.ZIP | CERT Advisory #12 | 0k | 7-19-2025 | 5 |
| CERT1210.ZIP | CERT Advisory 12/10/90 | 0k | 7-19-2025 | 6 |
| CERT13.ZIP | CERT Advisory #13 | 0k | 7-19-2025 | 6 |
| CERT8901.ZIP | CERT Advisory 89-01 | 0k | 7-19-2025 | 4 |
| CERT9001.ZIP | CERT Advisory 90-01 | 0k | 7-19-2025 | 5 |
| CERT9002.ZIP | CERT Advisory 90-02 | 0k | 7-19-2025 | 4 |
| CERT9003.ZIP | CERT Advisory 90-03 | 0k | 7-19-2025 | 4 |
| CERT9004.ZIP | CERT Advisory 90-04 | 0k | 7-19-2025 | 4 |
| CERT9005.ZIP | CERT Advisory 90-05 | 0k | 7-19-2025 | 5 |
| CERT9006.ZIP | CERT Advisory 90-06 | 0k | 7-19-2025 | 4 |
| CERT9007.ZIP | CERT Advisory 90-07 | 0k | 7-19-2025 | 4 |
| CERT9008.ZIP | CERT Advisory 90-08 | 0k | 7-19-2025 | 4 |
| CERT9009.ZIP | CERT Advisory 90-09 | 0k | 7-19-2025 | 6 |
| CERT9010.ZIP | CERT Advisory 90-10 | 0k | 7-19-2025 | 4 |
| CERT9312.ZIP | CERT Advisory 93-12 | 0k | 7-19-2025 | 5 |
| CERT9313.ZIP | CERT Advisory 93-13 | 0k | 7-19-2025 | 5 |
| CLIPPER.ZIP | White House Press Release on Clipper | 0k | 7-19-2025 | 6 |
| CLIPPER1.ZIP | The Fight for Privacy | 0k | 7-19-2025 | 5 |
| COMSEC1.ZIP | Comsec bulletin #1 | 0k | 7-19-2025 | 5 |
| COPS_104.ZIP | Unix security package | 0k | 7-19-2025 | 3 |
| CRACKDWN.ZIP | For your protection, from 2600 magazine | 0k | 7-19-2025 | 4 |
| CRYPTPRI.ZIP | Cryptology Primer by Dave Ferret | 0k | 7-19-2025 | 6 |
| CS1984.ZIP | The Comsec letter 1984 | 0k | 7-19-2025 | 3 |
| CS1985.ZIP | The Comsec letter 1985 | 0k | 7-19-2025 | 5 |
| CS1986.ZIP | The Comsec letter 1986 | 0k | 7-19-2025 | 4 |
| CS1987.ZIP | The Comsec letter 1987 | 0k | 7-19-2025 | 4 |
| CS1988.ZIP | The Comsec letter 1988 | 0k | 7-19-2025 | 4 |
| CS1989.ZIP | The Comsec letter 1989 | 0k | 7-19-2025 | 5 |
| CSBYLAWS.ZIP | Bylaws of The Communications Security As | 0k | 7-19-2025 | 3 |
| CSINCORP.ZIP | Comsec's articles of incorporation | 0k | 7-19-2025 | 4 |
| CSLAW.ZIP | Computer security and the law by Gary s. | 0k | 7-19-2025 | 5 |
| C_2.ZIP | Ciac note c-2 | 0k | 7-19-2025 | 5 |
| DDN01.ZIP | Bulletin #1 | 0k | 7-19-2025 | 5 |
| DDN03.ZIP | Bulletin #3 | 0k | 7-19-2025 | 5 |
| DDN04.ZIP | Bulletin #4 | 0k | 7-19-2025 | 4 |
| DDN05.ZIP | Bulletin #5 | 0k | 7-19-2025 | 5 |
| DDN06.ZIP | Bulletin #6 | 0k | 7-19-2025 | 4 |
| DDN90_01.ZIP | Bulletin 90-01 | 0k | 7-19-2025 | 5 |
| DEV_MEM.ZIP | Ciac advisory notice | 0k | 7-19-2025 | 6 |
| DIGITELE.ZIP | Digital telephone and the government you | 0k | 7-19-2025 | 5 |
| EDITSEC.ZIP | Electronic Deception, Interception and T | 0k | 7-19-2025 | 4 |
| EPA_LAW.ZIP | The Electronic Privacy Act This is the a | 0k | 7-19-2025 | 3 |
| EXEGUIDE.ZIP | Executive Guide to the Protection of Inf | 0k | 7-19-2025 | 5 |
| FBIALERT.ZIP | Your civil liberties are under threat! | 0k | 7-19-2025 | 6 |
| FBI_CRED.ZIP | The FBI can get your credit record in a | 0k | 7-19-2025 | 4 |
| FBI_TAP.ZIP | EFF article on the FBI and wiretapping | 0k | 7-19-2025 | 5 |
| FEDREGS.ZIP | Federal regulations on wiretapping/ecpa | 0k | 7-19-2025 | 4 |
| FEDTIMES.ZIP | Federal Times Newsletter Article on Taxe | 0k | 7-19-2025 | 4 |
| FOIAKIT.ZIP | Using the freedom of information act | 0k | 7-19-2025 | 5 |
| GLOSBLT.ZIP | Bibliography of Computer Security Glossa | 0k | 7-19-2025 | 4 |
| GLOSSARY.ZIP | Draft Glossary of Communications Securit | 0k | 7-19-2025 | 6 |
| GUIDELIN.ZIP | Bibliography of Guidelines | 0k | 7-19-2025 | 3 |
| HANDLES.ZIP | Anonymity and privacy on the network | 0k | 7-19-2025 | 4 |
| HOUSEACT.ZIP | Electronic communications privacy act of | 0k | 7-19-2025 | 6 |
| KIDHACKS.ZIP | Report on destructiveness of childish ha | 0k | 7-19-2025 | 6 |
| KIRTLND1.ZIP | Freedom of Information Act Document File | 0k | 7-19-2025 | 5 |
| KIRTLND2.ZIP | More FOIA info | 0k | 7-19-2025 | 4 |
| LONGPASS.ZIP | On password security longer passwords | 0k | 7-19-2025 | 5 |
| MANUALS.ZIP | Bibliography of Computer Security Manual | 0k | 7-19-2025 | 4 |
| MGTGUIDE.ZIP | Management Guide to the Protection of In | 0k | 7-19-2025 | 6 |
| MISC_ENC.ZIP | Miscellaneous Encryption Info | 0k | 7-19-2025 | 6 |
| NCSAREV.ZIP | NCSA policy concerning security product | 0k | 7-19-2025 | 6 |
| NCSLNEW1.ZIP | A letter from the national computer syst | 0k | 7-19-2025 | 5 |
| NDC5.ZIP | Crypto program | 0k | 7-19-2025 | 7 |
| NVIR.ZIP | Ciac advisory notice | 0k | 7-19-2025 | 6 |
| ORGS.ZIP | Computer Security Organizations | 0k | 7-19-2025 | 5 |
| PERIODIC.ZIP | Bibliography of Computer Security Period | 0k | 7-19-2025 | 3 |
| PL100235.ZIP | Computer Security Act of 1987 | 0k | 7-19-2025 | 5 |
| PORTMAP.ZIP | Replacement portmapper | 0k | 7-19-2025 | 4 |
| PRIV0227.ZIP | Privacy Forum 2.27 (01-Aug-93) | 0k | 7-19-2025 | 6 |
| PRIV0228.ZIP | Privacy Forum 2.28 (15-Aug-93) | 0k | 7-19-2025 | 3 |
| PRIV0229.ZIP | Privacy Forum 2.29 (22-Aug-93) | 0k | 7-19-2025 | 6 |
| PRIV0230.ZIP | Privacy Forum 2.30 (30-Aug-93) | 0k | 7-19-2025 | 4 |
| RCP_RDIS.ZIP | Ciac advisory notice | 0k | 7-19-2025 | 5 |
| REPORTS.ZIP | Bibliography Computer Security Reports | 0k | 7-19-2025 | 5 |
| RESTORE.ZIP | Ciac advisory notice | 0k | 7-19-2025 | 5 |
| REVBLT.ZIP | Review of federal agency computer securi | 0k | 7-19-2025 | 5 |
| RISK1011.ZIP | Risks Digest 10.11 | 0k | 7-19-2025 | 5 |
| RISK1015.ZIP | Risks Digest 10.15 | 0k | 7-19-2025 | 5 |
| RISK1016.ZIP | Risks Digest 10.16 | 0k | 7-19-2025 | 3 |
| RISK1017.ZIP | Risks Digest 10.17 | 0k | 7-19-2025 | 5 |
| RISK1018.ZIP | Risks Digest 10.18 | 0k | 7-19-2025 | 6 |
| RISK1019.ZIP | Risks Digest 10.19 | 0k | 7-19-2025 | 5 |
| RISK1020.ZIP | Risks Digest 10.20 | 0k | 7-19-2025 | 6 |
| RISK1021.ZIP | Risks Digest 10.21 | 0k | 7-19-2025 | 5 |
| RISK1022.ZIP | Risks Digest 10.22 | 0k | 7-19-2025 | 4 |
| RISK1023.ZIP | Risks Digest 10.23 | 0k | 7-19-2025 | 6 |
| RISK1024.ZIP | Risks Digest 10.24 | 0k | 7-19-2025 | 3 |
| RISK1025.ZIP | Risks Digest 10.25 | 0k | 7-19-2025 | 4 |
| RISK1026.ZIP | Risks Digest 10.26 | 0k | 7-19-2025 | 5 |
| RISK1027.ZIP | Risks Digest 10.27 | 0k | 7-19-2025 | 4 |
| RISK1028.ZIP | Risks Digest 10.28 | 0k | 7-19-2025 | 4 |
| RISK1029.ZIP | Risks Digest 10.29 | 0k | 7-19-2025 | 5 |
| RISK1031.ZIP | Risks Digest 10.31 | 0k | 7-19-2025 | 4 |
| RISK1047.ZIP | Risks Digest 10.47 | 0k | 7-19-2025 | 6 |
| RISK1048.ZIP | Risks Digest 10.48 | 0k | 7-19-2025 | 5 |
| RISK1049.ZIP | Risks Digest 10.49 | 0k | 7-19-2025 | 5 |
| RISK1050.ZIP | Risks Digest 10.50 | 0k | 7-19-2025 | 4 |
| RISK1051.ZIP | Risks Digest 10.51 | 0k | 7-19-2025 | 6 |
| RISK1052.ZIP | Risks Digest 10.52 | 0k | 7-19-2025 | 5 |
| RISK1053.ZIP | Risks Digest 10.53 | 0k | 7-19-2025 | 6 |
| RISK1054.ZIP | Risks Digest 10.54 | 0k | 7-19-2025 | 3 |
| RISK1055.ZIP | Risks Digest 10.55 | 0k | 7-19-2025 | 4 |
| RISKTOOL.ZIP | Risk management research laboratory over | 0k | 7-19-2025 | 6 |
| ROTENBER.ZIP | Telephone Privacy in the 1990's | 0k | 7-19-2025 | 5 |
| SECARTCL.ZIP | Bibliography of computer security articl | 0k | 7-19-2025 | 5 |
| SECPOL.ZIP | NCSA draft security policy | 0k | 7-19-2025 | 5 |
| SOCKS.ZIP | Internet secure socket server | 0k | 7-19-2025 | 4 |
| SP4RPT.ZIP | A report on a secure data network system | 0k | 7-19-2025 | 4 |
| SPAN01.ZIP | SPAN memorandum #1 | 0k | 7-19-2025 | 5 |
| SPAN02.ZIP | SPAN memorandum #2 | 0k | 7-19-2025 | 4 |
| SPAN03.ZIP | SPAN memorandum #3 | 0k | 7-19-2025 | 4 |
| SPAN04.ZIP | SPAN memorandum #4 | 0k | 7-19-2025 | 4 |
| SPRINT.ZIP | Computer system ID and password security | 0k | 7-19-2025 | 4 |
| STARTUP.ZIP | How to start a local Comsec chapter | 0k | 7-19-2025 | 4 |
| SUN.ZIP | A list of SUN security bugs | 0k | 7-19-2025 | 4 |
| TCOMPRE.ZIP | Telecom Privacy Messages | 0k | 7-19-2025 | 5 |
| TCOMPRI1.ZIP | Telecom Privacy Digest Volume 1 | 0k | 7-19-2025 | 3 |
| TCOMPRI2.ZIP | Telecom Privacy Digest Volume 2 | 0k | 7-19-2025 | 6 |
| TCOMPRI3.ZIP | Telecom Privacy Digest Volume 3 | 0k | 7-19-2025 | 5 |
| TCOMPRI4.ZIP | Telecom Privacy Digest Volume 4 | 0k | 7-19-2025 | 4 |
| TCOMREF.ZIP | Telecom Privacy Reference | 0k | 7-19-2025 | 6 |
| TCPR_1_1.ZIP | Run ftp and telnet across a firewall | 0k | 7-19-2025 | 4 |
| TECHPAP.ZIP | Bibliography of Technical Papers on Comp | 0k | 7-19-2025 | 5 |
| TELNET.ZIP | Ciac advisory notice | 0k | 7-19-2025 | 5 |
| TELNET_T.ZIP | Ciac advisory notice | 0k | 7-19-2025 | 5 |
| TEMPEST.ZIP | Information about Tempest | 0k | 7-19-2025 | 5 |
| TFTP.ZIP | Ciac advisory notice | 0k | 7-19-2025 | 3 |
| TRIPWIRE.ZIP | Tripwire v1.0 Unix security package | 0k | 7-19-2025 | 5 |
| TRUSTBLT.ZIP | Guidance to Federal Agencies on the use | 0k | 7-19-2025 | 5 |
| UNIXWRAP.ZIP | Information about a TCP wrapper | 0k | 7-19-2025 | 6 |
| USRGUIDE.ZIP | Computer User's Guide to the Protection | 0k | 7-19-2025 | 6 |
| VENDORS.ZIP | Security Vendors | 0k | 7-19-2025 | 3 |
| VIDEOS.ZIP | Computer Security Video Presentations | 0k | 7-19-2025 | 5 |
| WIRETAP.ZIP | Can Wiretaps Remain Cost Effective | 0k | 7-19-2025 | 4 |
328,006 visits
(c) 1994, bbs@darkrealms.ca