The netizens should always ensure the legitimacy of any programs/utilities/software(s)
before downloading them from the Internet – in particular, he/she should be vigilant while downloading any software(s) that is available “free of cost.” Netizens should always refer to software reviews available
on the blogs/websites before downloading any such software(s). Some review websites are as follows:
1. http://reviews.cnet.com/software/
2. http://www.top-software-reviews.com/
3. http://www.toptenreviews.com/
4. http://www.softsea.com/
5. http://www.softwaremango.com/
6. http://www.lifehacker.com/
before downloading them from the Internet – in particular, he/she should be vigilant while downloading any software(s) that is available “free of cost.” Netizens should always refer to software reviews available
on the blogs/websites before downloading any such software(s). Some review websites are as follows:
1. http://reviews.cnet.com/software/
2. http://www.top-software-reviews.com/
3. http://www.toptenreviews.com/
4. http://www.softsea.com/
5. http://www.softwaremango.com/
6. http://www.lifehacker.com/
I
|
Browsers
| |
1
|
Fire Fox
|
http://www.mozilla.com/en-US/firefox/ie.html
|
2
|
Chrome
|
http://www.google.com/chrome
|
3
|
IE (Internet Explorer)
|
http://www.microsoft.com/windows/internet-explorer/default.aspx
|
4
|
Opera
|
http://www.opera.com/
|
5
|
Safari
|
http://www.apple.com/safari
|
6
|
Maxthon
|
http://www.maxthon.com
|
7
|
Flock
|
http://www.flock.com
|
8
|
Avant
|
http://www.avantbrowser.com
|
9
|
Deepnet
|
http://www.deepnetexplorer.com
|
10
|
Phaseout
|
http://www.phaseout.net
|
II
|
Search Engines
| |
1
|
Google
|
www.google.com
|
2
|
Cuil
|
www.cuil.com
|
3
|
Yahoo
|
www.yahoo.com
|
4
|
Microsoft
|
www.bing.com
|
5
|
Alta vista
|
www.altavista.com
|
6
|
Ask Jeeves
|
www.ask.com
|
7
|
All the Web
|
www.alltheweb.com
|
8
|
Excite
|
www.excite.com
|
9
|
Lycos
|
www.lycos.com
|
10
|
Welluma
|
www.welluma.com
|
III
|
Search Engines Popular in India
| |
1
|
Rediff
|
www.rediff.com
|
2
|
Guruji
|
www.guruji.com
|
3
|
Khoj
|
www.khoj.com
|
4
|
Search India
|
www.searchindia.com
|
5
|
Jadoo
|
www.jadoo.com
|
6
|
123India
|
www.123india.com
|
7
|
India Search Engine
|
www.indiansearchengine.com
|
IV
|
Antivirus Software(s)
| |
1
|
Bit Defender
|
www.bitdefender.com
|
2
|
Kaspersky
|
www.kaspersky.com
|
3
|
Webroot
|
www.webroot.com
|
4
|
Eset
|
www.eset.com
|
5
|
F-secure
|
www.f-secure.com
|
6
|
AVG
|
www.avg.com
|
7
|
McAfee
|
www.mcafee.com
|
8
|
GData
|
www.gdata.de
|
9
|
Norton
|
www.symantec.com
|
10
|
Trendmicro
|
www.trendmicro.com
|
V
|
Antivirus Software(s) Popular in India
| |||||||
1
|
Quick Heal
|
www.quickheal.com
| ||||||
2
|
Net Protector
|
www.indiaantivirus.com
| ||||||
3
|
Avast
|
www.avastindia.com
| ||||||
4
|
eScan
|
www.msspl.co.in
| ||||||
VI
|
Anti-Spyware Software(s)
| |||||||
1
|
Spy Sweeper
|
http://www.webroot.com
| ||||||
2
|
Counterspy
|
http://www.sunbeltsoftware.com
| ||||||
3
|
STOPzilla
|
http://www.stopzilla.com
| ||||||
4
|
Malwarebytes Anti-
|
http://www.malwarebytes.org
| ||||||
Malware
| ||||||||
5
|
Spyware Doctor
|
http://www.pctools.com/spyware-doctor
| ||||||
6
|
SUPER Anti-
|
http://www.superantispyware.com
| ||||||
Spyware
| ||||||||
Professional
| ||||||||
7
|
Ad-Aware Pro
|
http://www.lavasoft.com
| ||||||
8
|
AntiSpy
|
http://www.omniquad.com
| ||||||
9
|
Spyware BeGone
|
http://www.spywarebegone.com
| ||||||
10
|
CA Anti-Spyware
|
http://www.ca.com/us
| ||||||
VII |
Antispam Software(s)
| |||||||
1
|
SpamEater Pro
|
http://spameater.com
| ||||||
2
|
CA Anti-Spam Plus
|
http://shop.ca.com/spam/spam_blocker.aspx
| ||||||
CA Website
| ||||||||
Inspector
| ||||||||
3
|
SPAM fighter
|
http://www.spamfighter.com
| ||||||
4
|
ChoiceMail One
|
http://www.digiportal.com
| ||||||
5
|
Spam Killer
|
http://www.spamkiller.com
| ||||||
6
|
Spam Buster
|
http://www.contactplus.com/Spam-Buster.html
| ||||||
7
|
SpamNet
|
http://www.cloudmark.com/en/home.html
| ||||||
8
|
Spam Agent
|
http://www.anti-spam-software.com
| ||||||
9
|
iHateSpam
|
http://www.sunbeltsoftware.com/home-home-office/ihatespam
| ||||||
10
|
MailWasher Pro
|
http://www.mailwasher.net
| ||||||
VIII
|
Anti-Trojans Software(s)
| |||||||
1
|
Anti-Trojan Shield
|
http://www.atshield.com
| ||||||
(ATS)
| ||||||||
2
|
Anti-Trojan Elite
|
http://www.remove-trojan.com
| ||||||
(ATE)
| ||||||||
3
|
Emsisoft Anti-
|
http://www.anti-trojan.net/en
| ||||||
Malware
| ||||||||
4
|
Emsisoft Mamutu
|
http://www.emsisoft.com/en
| ||||||
IX
|
Personal Firewall
| |||||||
1
|
ZoneAlarm Pro
|
http://www.zonealarm.com
| ||||||
2
|
Outpost Firewall
|
http://www.agnitum.com
| ||||||
Pro
| ||||||||
3
|
Norman Personal
|
http://www.norman.com
| ||||||
Firewall
| ||||||||
4
|
eConceal Pro
|
http://www.mwti.net
| ||||||
5
|
Webroot Desktop
|
http://www.webroot.com
| ||||||
Firewall
| ||||||||
6
|
Injoy Firewall
|
http://www.fx.dk
| ||||||
7
|
F-Secure Firewall
|
http://www.f-secure.com
| ||||||
8
|
Net Firewall
|
http://www.ntkernel.com
| ||||||
9
|
ESET Smart
|
http://www.eset.com/smartsecurity
| ||||||
Security 4
| ||||||||
3
|
X
|
Intrusion Detection System (IDS)
| ||
1
|
Snort
|
http://www.snort.org
| |
2
|
Untangle
|
http://www.untangle.com
| |
3
|
Bro NIDS
|
http://www.bro-ids.org
| |
4
|
Prelude Hybrid IDS
|
http://www.prelude-ids.com
| |
5
|
OSSEC HIDS
|
http://www.ossec.net
| |
6
|
Flowmatrix
|
http://www.akmalabs.com
| |
7
|
Fragroute /
| ||
Fragrouter
| |||
8
|
BASE (Basic
|
http://sourceforge.net/projects/secureideas
| |
Analysis and
| |||
Security Engine)
| |||
9
|
Sguil
|
http://sguil.sourceforge.net
| |
10
|
Packet fence
|
http://www.packetfence.org
| |
XI
|
Intrusion Prevention System (IPS)
| ||
1
|
Snort
|
http://www.snort.org
| |
2
|
Untangle
|
http://www.untangle.com
| |
3
|
Lokkit (GNOME)
|
http://www.redhat.com
| |
4
|
Winpooch
|
http://winpooch.en.softonic.com
| |
XII
|
Parental Time Control Software(s)
| ||
1
|
KidsWatch Time
|
http://www.kidswatch.com
| |
Control
| |||
2
|
WatchDog
|
http://www.watchdogpc.com
| |
3
|
iNet Protector
|
http://www.blumentals.net/inetprot
| |
4
|
ENUFF PC
|
http://www.enuffpc.com
| |
5
|
ComputerTime
|
http://www.softwaretime.com
| |
6
|
iProtectYou
|
http://www.softforyou.com
| |
7
|
EyeTimer
|
http://www.eyetimer.com
| |
8
|
PC-Time Manager
|
http://www.virtualsoftwareltd.com/products/pctimemanager
| |
9
|
Aye Parental
|
http://www.fileguru.com/Aye-Parental-Control/info
| |
Control
| |||
10
|
Win Nanny
|
http://www.blue-lizard.net
| |
XIII
|
Mobile Security Software(s)
| ||
1
|
Kaspersky Mobile
|
http://www.kaspersky.com/mobile_downloads
| |
Security
| |||
2
|
SMobile Security
|
http://www.smobilesystems.com
| |
Shield Parental
| |||
Control Edition
| |||
3
|
BullGuard Mobile
|
http://www.bullguard.com/why/bullguard-mobile-antivirus.aspx
| |
Antivirus
| |||
4
|
Norton Smartphone
|
http://www.symantec.com/norton/smartphone-security
| |
Security
| |||
5
|
F-Secure Mobile
|
http://www.symantec.com/norton/smartphone-security
| |
Security
| |||
6
|
Trend Micro
|
http://us.trendmicro.com/us/products/mobile-security
| |
Mobile Security
| |||
7
|
Airscanner Mobile
|
http://www.airscanner.com/products/av
| |
Security Combo
| |||
8
|
McAfee VirusScan
|
http://us.mcafee.com/root/product.asp?productid=mobile_info
| |
Mobile
| |||
9
|
SimWorks Anti-
|
http://www.simworks.biz/sav/AntiVirus.php?id=home
| |
Virus
| |||
10
|
avast! PDA
|
http://www.avast.com/pda-edition
|
Resourceful Websites, Magazines and Books
At the end of each chapter, there are URLs in “References” and “Further Reading.” In addition to those URLs, this section presents a consolidated list of resourceful websites, magazines and books, which provides “wealth of knowledge” about cybersecurity, IT security and Information Risk Management to the readers. This part has been developed in consideration with the discussions on the numerous topics covered in Chapters 6–10 in the book. As you read, you will find that a list of such websites, magazines and books are mentioned in the following tables:
2. Table B.3 is about useful websites.
3. Table B.4 is about a list of well-known information security magazines.
4. Table B.5 is about a list of well-known computer magazines.
5. Table B.6 is about known Indian hackers.
6. Table B.7 is about well-known books on the topic of hacking.
Table B.2 Encyclopedias/wikis
Sr. No.
|
URL
|
About the Website
| ||||
1
|
http://en.wikipedia.org/wiki/Main_
|
Wikipedia is a multilingual, web-based, free-content
| ||||
Page
|
encyclopedia, founded as an offshoot of Nupedia, a
| |||||
now-abandoned project.
| ||||||
2
|
http://www.webopedia.com
|
Webopedia is a free online dictionary for words,
| ||||
phrases and abbreviations that are related to computer
| ||||||
and Internet technology. Webopedia is a part of
| ||||||
“internet.com” network of websites owned and
| ||||||
managed by “WebMediaBrands Inc.”
| ||||||
3
|
http://www.softpedia.com
|
Softpedia is the encyclopedia of free software
| ||||
downloads.
| ||||||
4
|
http://www.theriskipedia.com
|
Riskipedia is not only a website, but also a platform
| ||||
where anyone in the world can access information on
| ||||||
risk and risk management.
| ||||||
5
|
http://www.forensicswiki.org/wiki/
|
Forensics Wiki is devoted to information about digital
| ||||
Main_Page
|
forensics. (Refer to Chapters 7 and 8.)
| |||||
6
|
http://cybercrime.wikia.com
|
The wiki is about cybercrime that anyone can edit.
| ||||
7
|
http://www.computerlanguage.com
|
Computer Desktop Encyclopedia (CDE) offers
| ||||
straightforward definitions of all major hardware and
| ||||||
software technologies.
| ||||||
8
|
http://www.wikihow.com
|
WikiHow is a collaborative writing project aimed at
| ||||
building (world’s) largest and highest-quality “how-
| ||||||
to” manual.
| ||||||
Table B.3 Useful websites
| ||||||
Sr. No.
|
URL
|
About the Website
| ||||
1
|
http://www.howstuffworks.com
|
HowStuffWorks is a wholly owned subsidiary of
| ||||
“Discovery Communications” – award-winning
| ||||||
source
|
of
|
credible
|
and
|
easy-to-understand
| ||
explanations of how the world actually works.
| ||||||
2
|
http://www.ehow.com
|
“eHow.com”
|
is an online
|
community dedicated to
|
5
http://www.cylab.cmu.edu
|
“CyLab” is one of the largest university-based
| ||
cybersecurity education and research centers in the
| |||
US. It is multidisciplinary, university-wide, research
| |||
center and has involved six colleges from Carnegie
| |||
Mellon University.
| |||
21
|
http://www.cybersecurityinstitute.b
|
“CyberSecurity Institute” is a full-service digital
| |
iz
|
forensics organization.
| ||
22
|
http://www.esecurityplanet.com
|
“esecurityplanet” is hosted by “The Internet.com”.
| |
The internet.com network is a comprehensive source
| |||
for the latest global news and information about IT
| |||
(Information Technology) and the Internet. It allows
| |||
users to evaluate, compare and purchase IT and
| |||
Internet-related products and services.
| |||
23
|
http://www.cybersafe.my/home.ht
|
“CyberSAFE” (Cyber Security Awareness For
| |
ml
|
Everyone) is Malaysia’s initiative to educate and
| ||
enhance the awareness of the general public on the
| |||
technological and social issues facing Internet users,
| |||
particularly on the dangers of getting online.
| |||
24
|
http://www.data64.cc
|
This is a search engine, which explores through a
| |
compiled database of websites and provides most
| |||
relevant information to the users in the fields of:
| |||
1.
|
Cybercrime.
| ||
2.
|
Cybercrime investigation.
| ||
3.
|
Cyberforensics.
| ||
4.
|
Computer security.
| ||
(Refer to Chapters 7 and 8.)
| |||
25
|
http://www.bugs.ms
|
This is a search engine, which explores through a
| |
compiled database of websites and provides most
| |||
relevant information to the users about bugs, hacks,
| |||
exploits and security for Microsoft Products.
| |||
26
|
http://www.wisegeek.com
|
“wisegeek” is a team of researchers, writers and
| |
editors dedicated to providing short, clear and concise
| |||
answers to common questions. In the “wiseGEEK
| |||
features’’ menu available on every article page, there
| |||
is an option to “comment on this article.” Every
| |||
comment is researched and implemented where
| |||
appropriate.
| |||
27
|
http://www.crime-research.org/
|
“crime-research” – Computer Crime Research Center
| |
(CCRC) is a non-profit, non-governmental and
| |||
scientific research organization. CCRC was created in
| |||
2001 to conduct research in legal criminal and
| |||
criminological problems of cybercrime with the
| |||
purpose to render scientific and methodical
| |||
consulting.
| |||
28
|
http://www.ibls.com/
|
“IBLS” is one of the leaders on global laws and
| |
regulations that affect online experience. It empowers
| |||
business and legal professionals to design successful
| |||
Internet strategies by bringing them the global
| |||
knowledge of Internet business rules and regulations
| |||
written by legal experts around the world. (Refer to
| |||
Chapter 6.)
| |||
29
|
http://www.hacking-news.com/
|
“hacking-news” provides daily news and editorials on
| |
security-related topics, along with a comprehensive
| |||
database of security knowledge. (Refer to Chapter
| |||
10.)
|
8
http://www.sciencedaily.com/news
|
“ScienceDaily” is one of the Internet’s most popular
| |||||||
/computers_math/hacking/
|
and
|
award-winning
|
science
|
news
|
website.
| |||
ScienceDaily generates nearly approximately 15
| ||||||||
million page views a month and receive
| ||||||||
approximately more than 3 million hits each month.
| ||||||||
(Refer to Chapter 10.)
| ||||||||
31
|
http://www.computerworld.com/
|
“Computerworld” has been one of the leading source
| ||||||
of technology news and information for IT influencers
| ||||||||
worldwide. It is an award-winning website, focused
| ||||||||
on conference series and custom research from the
| ||||||||
hub of the world’s largest global IT media network.
| ||||||||
32
|
http://www.ccmostwanted.com/
|
“ccmostwanted” (Cyber Criminals Most Wanted) is a
| ||||||
website dedicated to cybercrime awareness –
| ||||||||
Prevention and safety. (Refer to Appendix D –
| ||||||||
Protection Checklist for Individuals.)
| ||||||||
33
|
http://www.ciol.com/about
|
“CIOL”
|
(CYBERMEDIA
|
INDIA
|
ONLINE
| |||
LIMITED) is the website that focuses on Information
| ||||||||
Technology with a vision to provide quality and
| ||||||||
relevant IT information to the growing Internet
| ||||||||
community. The enduring vision of leading the IT
| ||||||||
revolution can be seen and felt through the vast
| ||||||||
sections of the CIOL network.
| ||||||||
34
|
http://www.itsecurity.com/
|
“IT Security” is a news and information
| ||||||
publication covering all aspects of the IT Security
| ||||||||
and has been re-launched as the premier source
| ||||||||
worldwide for IT Security information after
| ||||||||
acquired by “Tippit Inc.” recently.
| ||||||||
35
|
http://www.securitypronews.com/
|
“SecurityProNews” is most popular newsletter and an
| ||||||
article portal for technology professionals.
| ||||||||
Table B.4 List of well-known information security magazines
| ||||||||
Sr. No.
|
URL
|
About the Website
| ||||||
1
|
http://www.scmagazineus.com
|
SC Magazine is aimed at providing IT
| ||||||
security professionals with in-depth and
| ||||||||
unbiased information.
| ||||||||
2
|
http://www.csoonline.com
|
CSO provides news, analysis and research
| ||||||
on a broad range of security and risk
| ||||||||
management topics. Areas of focus include
| ||||||||
information
|
security,
|
physical
|
security,
| |||||
business continuity, identity and access
| ||||||||
management, loss prevention and more.
| ||||||||
3
|
http://www.infosecurity-magazine.com
|
It is a magazine examining security threats,
| ||||||
solutions and developments for security
| ||||||||
professionals.
| ||||||||
4
|
http://www.infosecuritymagz.com
|
InfoSecurity is a comprehensive magazine
| ||||||
on IT security. Its mission is to bring the
| ||||||||
various aspects of IT security under one
| ||||||||
source, covering the various applications of
| ||||||||
security technology used by an individual
| ||||||||
at enterprise level.
| ||||||||
5
|
http://hakin9.org
|
hakin9 is a bi-monthly magazine about
| ||||||
hacking and IT security, covering
| ||||||||
techniques
|
of breaking into
|
computer
|
9
No comments:
Post a Comment