- http://www.sabsa.org/whitepapers
- UK - http://amzn.to/2E1cYKJ
- USA - http://amzn.to/2BXdvrb
- https://www.iso.org/standard/56742.html
- https://www.securityforum.org/
- https://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA
- https://en.wikipedia.org/wiki/Authorization
- https://en.wikipedia.org/wiki/Authentication
- https://en.wikipedia.org/wiki/Non-repudiation
- https://en.wikipedia.org/wiki/Parkerian_Hexad
- https://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc-revisited/
- https://krebsonsecurity.com/2013/06/the-value-of-a-hacked-email-account/
- https://www.cvedetails.com/
- http://executemalware.com/?page_id=320
- https://www.exploit-db.com/search/
- https://www.mitre.org/
- https://nvd.nist.gov/
- https://technet.microsoft.com/en-us/security/bulletins
- https://www.computerworld.com/article/2920181/microsoft-windows/patch-tuesday-may-be-dead-but-microsofts-not-confessing-to-the-crime.html
Malware, viruses, rootkits, RATs, Spyware, Adware, Scareware, PUPs, Browser hijacking, Phishing, Vishing and SMShing
- https://www.av-test.org/en/statistics/malware/
- https://www.darkreading.com/perimeter/the-7-most-common-rats-in-use-today-/a/d-id/1321965
- http://www.trendmicro.co.uk/media/misc/spotlight-perils-of-malvertisements-en.pdf
- https://www.sophos.com/en-us/en-us/medialibrary/PDFs/technical-papers/malware-forecast-2018.pdf?la=en
- http://www.slate.com/articles/technology/bitwise/2015/02/lenovo_superfish_scandal_why_it_s_one_of_the_worst_consumer_computing_screw.html
- https://www.openphish.com/
- https://hethical.io/homograph-attack-using-internationalized-domain-name/
- https://www.av-test.org/en/statistics/spam/
- http://www.consumerfraudreporting.org/spamexamples/OnlinePharmacy-spamexample.php
- http://www.consumerfraudreporting.org/current_top_10_scam_list.php
- http://www.consumerfraudreporting.org/
- https://www.actionfraud.police.uk/types_of_fraud
- https://torrentfreak.com/pirate-bay-is-mining-cryptocurrency-again-no-opt-out-171011/
- https://www.engadget.com/2018/02/13/attackers-telegram-deliver-cryptocurrency-mining-malware/
- https://thehackernews.com/2018/02/cryptojacking-malware.html
- http://bgr.com/2018/02/13/android-malware-mining-cryptocurrency-monero-xmr/
- https://arstechnica.com/information-technology/2018/01/now-even-youtube-serves-ads-with-cpu-draining-cryptocurrency-miners/
- https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/
- https://github.com/hoshsadiq/adblock-nocoin-list/
- https://addons.mozilla.org/en-GB/firefox/addon/no-coin/
- https://coinhive.com/
- http://www.nsaplayset.org/
- https://nsa.gov1.info/dni/nsa-ant-catalog/
- https://cryptome.org/2014/01/nsa-codenames.htm
- https://www.youtube.com/watch?v=_P1NA29X7Mw
- https://wikileaks.org/-Leaks-.html
- https://en.wikipedia.org/wiki/Draft_Communications_Data_Bill
- https://www.pcmag.com/article2/0,2817,2496766,00.asp
- https://cis-india.org/internet-governance/blog/how-india-regulates-encryption
- https://www.theatlantic.com/technology/archive/2015/12/kazakhstans-new-encryption-law-could-be-a-preview-of-us-policy/419250/
- https://arstechnica.com/information-technology/2015/12/what-the-government-shouldve-learned-about-backdoors-from-the-clipper-chip/
- https://www.youtube.com/watch?v=zk78_zmH4QI
- https://dspace.mit.edu/bitstream/handle/1721.1/97690/MIT-CSAIL-TR-2015-026.pdf?sequence=8
- https://people.csail.mit.edu/rivest/pubs/Riv98e.pdf
- https://www.schneier.com/academic/paperfiles/worldwide-survey-of-encryption-products.pdf
- http://www.mattblaze.org/papers/governmentreform-blaze2015.pdf
- https://en.wikipedia.org/wiki/Formal_methods
- https://www.gnu.org/proprietary/proprietary-back-doors.en.html
- https://blog.torproject.org/deterministic-builds-part-one-cyberwar-and-global-compromise
- https://variety.com/2015/digital/news/apple-removes-malware-infected-apps-from-the-app-store-1201598650/
- http://fortune.com/2016/02/17/apple-backdoor-order/
- https://blog.cryptographyengineering.com/2015/12/22/on-juniper-backdoor/
- https://reproducible-builds.org/
- https://searchenginewatch.com/sew/news/2351154/google-censorship-ruling-in-canada-has-worldwide-implications
- https://transparencyreport.google.com/eu-privacy/overview
- https://transparencyreport.google.com/government-removals/overview
- https://defuse.ca/truecrypt-7.1a-hashes.htm
- https://en.wikipedia.org/wiki/Transport_Layer_Security
- https://wiki.mozilla.org/Security/Server_Side_TLS
- https://weakdh.org/sysadmin.html
- https://moxie.org/software/sslstrip/
- http://www.irongeek.com/i.php?page=security/AQuickIntrotoSniffers
- http://www.oxid.it/cain.html
- https://www.wifipineapple.com/
- https://www.tecmint.com/monitor-ethernet-activity-in-linux/
- http://sniffdet.sourceforge.net/
- https://en.wikipedia.org/wiki/Server_Name_Indication
- https://www.digitaltrends.com/computing/google-tells-symantec-to-tighten-up-how-it-issues-security-certificates-or-else/
- https://notary.icsi.berkeley.edu/trust-tree/
- https://www.grc.com/fingerprints.htm
- https://www.schneier.com/essays/archives/1998/01/security_pitfalls_in.html
- https://www.digitaltrends.com/computing/google-tells-symantec-to-tighten-up-how-it-issues-security-certificates-or-else/
- http://embeddedsw.net/doc/OpenPuff_Help_EN.pdf
- https://www.spammimic.com/
- http://www.jjtc.com/Steganography/tools.html
- https://www.osboxes.org/vmware-images/
- https://marketplace.vmware.com/vsx/
- https://www.osboxes.org/guide/#!
- https://virtual-machine.org/download-list
- https://virtualboxes.org/images/
- https://pubs.vmware.com/workstation-9/index.jsp?topic=%2Fcom.vmware.ws.using.doc%2FGUID-D9B0A52D-38A2-45D7-A9EB-987ACE77F93C.html
- https://www.virtualbox.org/manual/ch06.html
- https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/
- https://www.cvedetails.com/top-50-products.php?year=0
- https://media.blackhat.com/us-13/US-13-Martin-Buying-Into-The-Bias-Why-Vulnerability-Statistics-Suck-WP.pdf
- https://en.m.wikipedia.org/wiki/Usage_share_of_operating_systems
- https://www.flexera.com/products/software-vulnerability-management/personal-software-inspector.html
- https://privacy.microsoft.com/ru-RU/windows-10-cortana-and-privacy
- https://privacy.microsoft.com/en-us/privacystatement/
- https://www.microsoft.com/en-gb/servicesagreement/default.aspx
- https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive
- https://github.com/10se1ucgo/DisableWinTracking/releases
- https://privacy.microsoft.com/ru-RU/windows-10-cortana-and-privacy
- https://www.howtogeek.com/265027/how-to-disable-cortana-in-windows-10/
- https://support.microsoft.com/ru-ru/help/17443/windows-internet-explorer-smartscreen-filter-faq#ie=ie-11
- https://support.microsoft.com/en-us/help/3080351/how-to-manage-windows-10-notification-and-upgrade-options
- https://www.zdnet.com/article/how-to-block-windows-10-upgrades-on-your-business-network-and-at-home-too/
- http://ultimateoutsider.com/downloads/
- https://www.grc.com/never10.htm
- https://fix-macosx.com/
- https://www.washingtonpost.com/posttv/business/technology/how-apples-os-x-yosemite-tracks-you/2014/10/22/66df4386-59f1-11e4-9d6c-756a229d8b18_video.html?utm_term=.70e0b36020a6
- https://distrowatch.com/
- https://www.debian.org/derivatives/
- https://www.debian.org/security/
- https://help.ubuntu.com/community/AutomaticSecurityUpdates
- https://support.apple.com/en-us/HT201222
- http://www.igeeksblog.com/how-to-enable-or-disable-mac-os-x-auto-updates/
- https://www.macupdate.com/
- https://brew.sh/
- https://www.debian.org/
- https://www.debian.org/CD/live/
- https://www.debian.org/distrib/
- https://www.debian.org/doc/books
- http://www.openbsd.org/
- https://www.archlinux.org/
- https://fixubuntu.com/
- https://tosdr.org/
- https://www.eff.org/who-has-your-back-government-data-requests-2015
- https://www.techlicious.com/tip/complete-guide-to-facebook-privacy-settings/
- https://diasporafoundation.org/
- https://friendi.ca/
- https://gnu.io/social/try/
- https://www.stationx.net/list-of-personally-identifiable-information-pii/
- http://bugmenot.com/
- https://www.mailinator.com/
- https://www.guerrillamail.com/
- https://www.fightcyberstalking.org/privacy-settings-twitter/
- http://www.mytrashmail.com/
- http://www.mailexpire.com/
- http://www.tempinbox.com/
- https://www.trash-mail.com/en/
- http://www.dispostable.com/
- https://anonbox.net/
- https://10minutemail.com/10MinuteMail/index.html?dswid=9429
- https://en.getairmail.com/
- https://int.pl/#/login-clear
- https://www.receive-sms-online.info/
- https://www.raymond.cc/blog/top-10-sites-receive-sms-online-without-phone/
- https://www.parsemail.org/
- https://mxtoolbox.com/Public/Content/EmailHeaders/
- https://www.scambusters.org/
- https://www.actionfraud.police.uk/types_of_fraud
- https://technitium.com/tmac/
- https://linuxconfig.org/change-mac-address-with-macchanger-linux-command
- https://www.howtogeek.com/220462/how-to-find-and-change-your-mac-address-on-os-x/
- https://www.macupdate.com/app/mac/25729/macdaddyx
- https://wifispoof.com/
- https://www.cpuid.com/softwares/cpu-z.html
- https://launchpad.net/i-nex
- https://software.intel.com/en-us/articles/download-maccpuid
- https://www.chromium.org/developers/design-documents/sandbox
- https://wiki.mozilla.org/Security/Sandbox
- http://bufferzonesecurity.com/product/how-it-works/
- http://www.shadowdefender.com/
- http://www.faronics.com/en-uk/deep-freeze-cloud-endpoint-customization?act=enable-restrict-access
- https://www.avast.com/f-sandbox
- https://www.sandboxie.com/HowItWorks
- https://www.techsupportalert.com/content/introduction-and-quick-guide-sandboxie.htm
- http://www.jimopi.net/PDFs/Word%20Pro%20-%20Sandboxie.pdf
- https://forums.sandboxie.com/phpBB3/
- https://gitlab.com/apparmor/apparmor
- https://igurublog.wordpress.com/downloads/script-sandfox/
- https://linux.die.net/man/8/sandbox
- https://firejail.wordpress.com/
- https://developer.apple.com/library/content/documentation/Security/Conceptual/AppSandboxDesignGuide/AboutAppSandbox/AboutAppSandbox.htm
- https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man1/sandbox-exec.1.html
- https://github.com/s7ephen/OSX-Sandbox--Seatbelt--Profiles
- https://github.com/pansen/macos-sandbox-profiles/blob/master/firefox.sb
- https://github.com/hellais/Buckle-Up
- https://paolozaino.wordpress.com/2015/08/04/how-to-run-your-applications-in-a-mac-os-x-sandbox-to-enhance-security/
https://www.turnkeylinux.org/openvpn
- http://venom.crowdstrike.com/
- https://www.vmware.com/security/advisories/VMSA-2016-0001.html
- https://blog.malwarebytes.com/threat-analysis/2014/02/a-look-at-malware-with-virtual-machine-detection/
- https://en.wikipedia.org/wiki/Covert_channel#Timing_Channels
- https://en.wikipedia.org/wiki/Covert_channel
- http://www.cs.unc.edu/~reiter/papers/2012/CCS.pdf
- https://en.wikipedia.org/wiki/X86_virtualization
- https://googleprojectzero.blogspot.co.uk/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- https://www.turnkeylinux.org/blog/convert-vm-iso
- https://www.whonix.org/
- https://www.whonix.org/wiki/VirtualBox
- https://www.whonix.org/wiki/Whonixcheck
- https://www.whonix.org/wiki/Stream_Isolation
- https://www.whonix.org/wiki/Dev/Build_Documentation/Physical_Isolation
- https://www.whonix.org/wiki/Features
- https://www.whonix.org/wiki/Security_Guide#VM_Snapshots
- https://www.whonix.org/wiki/Other_Operating_Systems
- https://www.whonix.org/wiki/Warning
- https://www.whonix.org/wiki/FAQ#Is_there_a_substitute_for_Whonix.27s_lack_of_an_Amnesic_feature_.2F_Live_CD.2FDVD.3F_Forensics.3F
- https://www.qubes-os.org/downloads/
- https://www.qubes-os.org/doc/dispvm/
- https://www.qubes-os.org/doc/
- https://www.qubes-os.org/doc/templates/debian/
- https://www.qubes-os.org/doc/whonix/
- https://www.qubes-os.org/doc/split-gpg/
- https://www.qubes-os.org/hcl/
- https://www.crowdsupply.com/purism/librem-13
- https://www.qubes-os.org/intro/
- http://theinvisiblethings.blogspot.be/2011/03/partitioning-my-digital-life-into.html