Text
ÀÌÁ¤¿øÀÇ
ÇØÅ·¿¡ ´ëÇÑ ¹ý·ü (¹é¾÷)
ÀÌÁ¤¿øÀÇ ÇØÄ¿/Å©·¡Ä¿/À¯·¡/¿ª»ç,Æò°¡/À¯Çü/ÀýÂ÷/ºÐ·ù/¿ø¸®/¼ö¹ý/ÃÖ±Ù±â¼ú
(¹é¾÷)
Á¤¿øÀÇ NetbusÀÇ ¼Ò°³ (¹é¾÷¾øÀ½)
ÀÌÁ¤¿øÀÇ
¹é ¿À¸®Çǽº (¹é¾÷)
±èÈÖ°ÀÇ
Practically Useful UNIX Secure Administration °ÁÂ
ÇØÅ·ÀÇ ÃÖ½ÅÇüÅ¿Í
¹æÁöÅ×Å©´Ð(¿ù°£ ÀÎÅͳ×Æ®)
X-Windows Security
UNIX-Security
WWW-Security
Advisory
°¢Á¾ ´Üü¿¡¼ Á¦°øÇÏ´Â º¸¾È
±Ç°í¾ÈÀ¸·Î ¾Æ·¡ÀÇ ±Ç°í¾È¸¸ ÁöÄÑÁشٸé ÀÚ½ÅÀÇ ½Ã½ºÅÛÀ» º¸¾È·¹º§À» »ó´çÈ÷
³ôÇôÁØ´Ù.
CertCC-KR
Korea Advisory
CERT
Coordination Center
AUSCert
CIAC
8lgm
Mailing
List Article
Bugtraq
mailing list archives
Magazine
Phrack
login
¹Ì¼Ò Å×Å©¿¡¼ ¿î¿µÇÏ´Â º¸¾ÈÀü¹® À¥ ÀâÁö¿´À¸³ª, ÇöÀç´Â ¹®À» ´Ý¾Ò´Ù.
Security
Magazine
FAQ
(Frequently Asked Questions)
Network
Intrusion Detection Systems(³×Æ®¿÷ ħÀÔŽÁö)
alt.2600
Xwindows
Security
CERT*
Coordination Center
Cryptography
Internet
Firewalls
Hacking
Novell Netware
Sniffer
PGP
sci.crypt
Ssh
(Secure Shell)
Usenet
Cancel Message
computer
viruses
VMS
HACK
Hacker
MIT Å×Å© ¸ðµ¨
öµµ Ŭ·´
±×¸²ÀÚ ¸Å
ÃÖÈÄÀÇ
ÇØÄ¿ - ¸®Â÷µå ½ºÅç¸Ç
Dh
wrote
R Command
(.rhosts ÆÄÀÏ)
Back Door
(¹éµµ¾î)
password º¸¾È
TFTP Security
LOGIN Spoofing
Sniffing (½º´ÏÇÎ)
Buffer Overflow
(¹öÆÛ ¿À¹öÇ÷οì)
SETUID
Note: This page is the copy of the link page in 'Kim Dae Hyun's homepage
(
Kim Dae Hyun, Artificial Intelligence Lab. Dept of Computer Engineering.
Chungnam Univ.
35-13 Duksu-dong Puk-gu, Pohang, 791-130, South Korea ).
-Kunu Lee-