References:
Encryption References
Blaze, Matt Welcome to Matt Blazes web site. www.crypto.com 20 November 1999
In Matt Blazes web site you are given a personal background and
many links to sources, research papers, images, his personal home
page, and other resources.
Electronic Privacy Information Center "The Clipper Chip site." 20 November 1999
Here you will find many pertinent links to information about
and uses for the Clipper Chip.
Electronic Privacy Information Center (EPIC) www.epic.org/alert/EPIC_Alert_6.01.html "
20 November 1999
Here is the table of contents for the publication by the
Electronic Privacy Information Center (EPIC)
Freeh, Louis J. Director of Federal Bureau of Investigation "Statement to US Senate"
www.fbi.gov/pressrm/congress/95-96archives/encrypt.htm 20 November 1999
Statements by Freeh to the Committee on Commerce, Science, and
Transportation United States Senate
Freeh, Louis J. Director of Federal Bureau of Investigation " Statement to House"
www.fbi.gov/pressrm/congres/97archives/encrypt4.htm 20 November 1999
Statements by Freeh to the Permanent Select Committee on Intelligence
United States House of Representatives
Froomkin, Michael, A. "The Metaphor is the Key --IAB" 20 November 1999
http://www-swiss.ai.mit.edu/6095/articles/froomkin-metaphor/partIAB.html
Link to most of the pertinent information gleaned for this web
document.
Gibbs. W. Wayt. "Watch the Watchers." Scientific America April 1999, 20 November
www.sciam.com/1999/0499issue/0499cyber.htm.
This is the link to many of the other sites including the World
Wide Web Consortium.
"Metaphor is the key." The Metaphor is the Key --IAB 20 November 1999
http://www-swiss.ai.mit.edu/6095/articles/froomkin-metaphor/text.htm.#contents
Table of Contents for all pertinent information pertaining to
this subject matter.
"Rivest, Ron, L. web page" 1999, 20 November 1999
http://theory.lcs.mit.edu/~rivest/
In Professor Rivests web site you are given a personal background and
links to sites within MIT that are related either to computer science or
encryption and his mailing address and e-mail address along with
telephone contact number.
"Zack the Hack, alias Personal interview, 20 November 1999.
Hacking References
"Denver, John"(alias). Personal interview. 28 November 1999.
"Nerd World War" Economist 30 October 1999, Vol. 353 Issue 8143, p46, 3/4p, 1bw
Discusses the use of cyber war, in various Asian countries. The use of the Internet to spread propaganda; Efforts of political activists to sabotage each others computers; The spread of computer viruses; Relationship between computer hackers in China and Taiwan; Development of defenses for computer networks by various governments worldwide.
Radcliff, Deborah. "The Hacker in All of Us" Computerworld 11 November 1999, Vol. 33 Issue 41, p78, 2p, 1c
Presents information on how computer hackers attack networks; Steps in hacking a network; Common network troubleshooting tools deployed by hackers; Information gained by hackers if they enter the network of the target.
Taylor, Chris. "Hackers Delight" Time 01 November 1999, Vol. 154 Issue 18, p112, 1p, 3c, 1bw
Discusses why cable modems are vulnerable to hacker attacks. Why dial-up users of the Internet are harder for hackers to find than cable modem users; The ease at which hackers can get into the Microsoft operating system; How cable modem users can prevent hacker attacks.
Home | Admin hacking | Encryption | Hacking | Created by: