====== [Hemmerling] Security ======
Related page:
*[[cryptography.html|Cryptography]].
*[[dataprivacy.html|Data Privacy - Encryption, Passwords, Trust]].
*[[goodcoding.html|Good Coding ! - Software Coding, Coding Rules, Static Code Analysis, Code Reviews]].
*[[legalmatters.html|Legal Matters]].
===== Free Trainings =====
*[[http://www.difü.de/digitalfuehrerschein/|DsiN-Digitalführerschein ( DiFü )]] - According to experts, it needs about 1 week of full work, to pass all levels of education.
===== Events, Fairss & Conferences =====
*[[http://hgi.rub.de/|Ruhr-Universität Bochum, Horst-Görtz-Institut für IT-Sicherheit]].
*[[http://www.ruhrsec.de/|RuhrSec – IT Security Conference]] in Bochum, 2019-05-27 - 2019-05-29.
*[[http://www.sechuman.rub.de/veranstaltungen/index.html.de|Ruhr-Universität Bochum, Horst-Görtz-Institut für IT-Sicherheit, NRW-Forschungskolleg SecHuman "Veranstaltungen"]].
*"3rd SecHuman Summer School – Brave New World: Security for Humans in Cyberspace at Ruhr-Universität Bochum", 2019-06-03 - 2019-06-06.
*Conference [[http://sec-it.heise.de/|secIT by heise - meet. learn. protect]], Hannover.
*Dates:
*2018-03-06 - 2018-03-07 secIT @ HCC.
*2019-03-13 - 2019-03-14 secIT @ HCC.
*2020.
*2021-02-23 - 2021-02-25 secIT digital.
*[[http://www.vimeo.com/search/people?q=talque|Vimeo - Search for "talque"]].
*[[http://www.secit-heise.de/hannover-2022/|secIT 2022]] @ HCC, 2022-03-30 - 2022-03-31.
*[[http://www.secit-heise.de/digital-2023/|secIT digital 2022]], 2022-09-13 - 2022-09-14.
*[[http://www.secit-heise.de/hannover-2023/|secIT 2023]] @ HCC, 2023-03-13 - 2023-09-14.
*[[http://www.secit-heise.de/digital-2023/|secIT digital 2023]], 2023-09-13 - 2023-09-14.
*[[http://www.secit-heise.de/|secIT 2024 & secIT 2024 digital]] @ HCC, 2024-03-06 - 2024-03-07.
*The free online event [[http://secit-heise.de/digital-2024/|secIT digital – die Online-Konferenz für Security-Experten]].
*[[http://tickets.heise-events.de/secitdigital24/|heise-events Tickets "secIT digital"]] :-).
*Online conference tool for Smartphone app & web interface is [[http://web.talque.com/|Talque]].
*Barcamp [[http://barcamptools.eu/seccamp/|SecCamp Cologne 2019 - das Barcamp rund um IT Security]] in Köln ( 2019-06-15 - 2019-06-16 ).
*Free online event "[[http://www.symphony.paloaltonetworks.com/|Symphony]] 2021" by [[http://www.paloaltonetworks.com/|Palo Alto Networks]], "The Global Cybersecurity Leader" ( 2021-04-21 - 2021-04-22 ).
*The commercial conference [[http://www.pco-online.de/kongress2022|Deutscher IT-Security Kongress 2022]], 2022-09-29 with free online streaming :-).
*[[http://app.vystem.io/en/event/deutscher-itsecurity-kongress/live/der-kongress|vystem "Deutscher IT-Security Kongress 2022"]] - Login.
*[[http://www.itsa365.de/|it-sa Expo&Congress - Europas führende Fachmesse für IT-Sicherheit]] by [[http://www.nuernbergmesse.de/|NürnbergMesse GmbH]].
*Free online events [[http://www.itsa365.de/de-de/actions-events/programm|it-sa 365 "IT Security Talks]].
*2023-03-07 - 2023-03-08.
*2024-04-16 - 2024-04-17, 2024-06-11 - 2024-06-12.
*[[http://www.itsa365.de/de-de/actions-events/2023/it-security-talks-maerz/stream-i/supply-chain-attacks-sicherheitsrisiken-aus-der-lieferkette-heise|it-sa 365 "IT Security Talks März 2023", Stefan Strobel, CEO cirosec GmbH "Supply Chain Attacks – Sicherheitsrisiken aus der Lieferkette. Im Rahmen der Event-Partnerschaft zeigen wir Ihnen eine Aufzeichnung von der secIT Digital 2022"]].
*The commercial event [[http://www.sicherheitstag-nrw.de/|NRW Sicherheitstag]] by [[http://www.aswwest.de/|ASW West - Allianz für Sicherheit in der Wirtschaft West e.V. ]].
*The [[http://www.sicherheitstag-nrw.de/nrw-sicherheitstag/|NRW Sicherheitstag 2024]], 2024-06-25 @ Deloitte GmbH, Erna-Scheffler-Straße 2, D-40467 Düsseldorf - "Die Teilnahme am NRW Sicherheitstag 2024 ist kostenpflichtig".
*[[http://www.sicherheitstag-nrw.de/nrw-sicherheitstag-2023/|NRW Sicherheitstag 2023]], 2023-08-07 @ Post Tower, Platz der deutschen Post, D-53113 Bonn.
*[[http://www.sicherheitstag-nrw.de/programm-2022/|NRW Sicherheitstag 2022]], 2022-08-24 @ BayArena Leverkusen.
*[[http://www.sicherheitstag-nrw.de/programm-2021/|NRW Sicherheitstag 2021]], 2021-10-27 @ Zeche Zollverein in Essen.
*[[http://www.sicherheitstag-nrw.de/programm-2020/|NRW Sicherheitstag 2020]].
*[[http://www.sicherheitstag-nrw.de/programm-2019/|NRW Sicherheitstag 2019]], 2019-09-05 @ G DATA Software AG in Bochum.
*[[http://www.sicherheitstag-nrw.de/nrw-sicherheitstag-2018/|NRW Sicherheitstag 2018]], 2018-07-04 @ Umspannwerk Recklinghausen.
*[[http://www.sicherheitstag-nrw.de/nrw-sicherheitstag-2017/|NRW Sicherheitstag 2017]].
*The free event [[http://www.it-sicherheitstag-nrw.de/|IT-Sicherheitstag NRW]].
*2024-12-11 @ World Conference Center, Bonn.
*2023-11-30 @ HALLE TOR 2, Köln.
*2022 ( hybrid event ).
*2021 ( online event ).
*2020 ( online event ).
*2019 @ Stadthalle Hagen.
*2018 @ Historische Stadthalle Wuppertal.
*2017 @ Colosseum Theater Essen.
*2016 @ World Conference Center Bonn (WCCB).
*2015 @ Hugo Junkers Hangar Mönchengladbach.
*2014 @ Stadthalle Hagen.
*2013 @ KOMED, Köln.
*The commercial conference [[http://www.cybersecuritysumm.it/|Cybersecurity Summit]], 2024-06-19 in Hamburg.
*"The leading annual expo, trade show and conference for procurement innovation in the German market".
===== EU General Data Protection Regulation ( GDPR ) =====
==== Tools ====
*The commercial service [[http://www.iubenda.com/en/|iubenda s.r.l "Compliance Solutions for Websites, Apps and Organizations"]].
*For websites/apps - Privacy and Cookie Policy Generator.
*For websites/apps - Cookie Solution. Manage consent preferences for the ePrivacy, GDPR, and CCPA. Integrated with the IAB TCF and US Privacy Framework.
*For websites/apps - Terms and Conditions Generator. Create your terms and conditions in minutes.
==== Resources ====
*[[http://www.lda.bayern.de/|Bayerisches Landesamt für Datenschutzaufsicht]].
*[[http://www.lda.bayern.de/de/datenschutz_eu.html|Bayerisches Landesamt für Datenschutzaufsicht "EU-Datenschutz-Grundverordnung"]].
*[[http://ec.europa.eu/justice/data-protection/reform/index_en.htm|European Commission "Justice / Data protection" - "Reform of EU data protection rules"]] - "While the Regulation will enter into force on 24 May 2016, it shall apply from 25 May 2018. The Directive enters into force on 5 May 2016 and EU Member States have to transpose it into their national law by 6 May 2018".
*[[http://europa.eu/rapid/press-release_IP-12-46_en.htm|European Commission - Press release database "Commission proposes a comprehensive reform of data protection rules to increase users' control of their data and to cut costs for businesses"]].
*[[http://www.gdd.de/|Gesellschaft für Datenschutz und Datensicherheit e.V.]].
*[[http://www.gdd.de/gdd-arbeitshilfen/praxishilfen-ds-gvo/praxishilfen-ds-gvo|Gesellschaft für Datenschutz und Datensicherheit e.V. "Praxishilfen DS-GVO"]].
*[[http://www.s-con.de/|S-CON DATENSCHUTZ]].
*[[http://www.s-con.de/unternehmen/mandantenbereich/|S-CON DATENSCHUTZ - Mandantenbereich]] - Password-protected download offers.
*[[http://www.s-con.de/gdd06|S-CON DATENSCHUTZ "GDD-Praxishilfe DS-GVO VI. Textausgabe DS-GVO mit Zuordnung des BDSG"]], [[http://www.gdd.de/downloads/praxishilfen/GDD-Praxishilfe_DS-GVO_6.pdf| "GDD-Praxishilfe DS-GVO VI. Textausgabe DS-GVO mit Zuordnung des BDSG"]] ( PDF ).
*[[http://en.wikipedia.org/wiki/General_Data_Protection_Regulation|EN.Wikipedia "General Data Protection Regulation"]], [[http://de.wikipedia.org/wiki/Datenschutz-Grundverordnung|DE.Wikipedia "Datenschutz-Grundverordnung"]].
===== Security Iniatives and Societies, Official State Offices ====
*[[http://www.allianz-fuer-cybersicherheit.de/ACS/DE/Home/startseite.html|Allianz für Cyber-Sicherheit]] ( ACS ).
*[[http://www.cisecurity.org/|CIS Center for Internet Security]].
*[[http://en.wikipedia.org/wiki/Center_for_Internet_Security|EN.Wikipedia "Center for Internet Security"]], [[http://de.wikipedia.org/wiki/Center_for_Internet_Security|DE.Wikipedia "Center for Internet Security"]].
*[[http://www.vswn.de/|Verband für Sicherheit in der Wirtschaft Norddeutschland e.V.]] ( VSWN e.V. ).
*[[http://www.verfassungsschutz.niedersachsen.de/wirtschafts_geheimschutz/wirtschaftsschutz/wirtschaftsschutz---aufgaben-und-ansprechpartner-54330.html|Verfassungsschutz Niedersachsen "Wirtschaftsschutz - Aufgaben und Ansprechpartner"]].
*[[http://www.zac-niedersachsen.de/|Zentrale Ansprechstelle Cybercrime für die niedersächsische Wirtschaft]] ( ZAC, Police ).
===== Security News =====
*[[http://www.symantec.com/business/theme.jsp?themeid=threatreport|Symantec Internet Security Threat Report]].
*[[http://www.us-cert.gov/|US-CERT - United States Computer Emergency Readiness Team]].
*[[http://secunia.com/vulnerability-review/|Secunia Vulnerability Review]].
===== Information Security Management System ( ISMF )=====
*[[http://www.vds.de/cyber/|VDE "Cyber-Security. Der Brandschutz des 21. Jahrhunderts"]].
*[[http://en.wikipedia.org/wiki/Information_security_management_system|EN.Wikipedia "Information security management system"]], [[http://de.wikipedia.org/wiki/Information_Security_Management_System|DE.Wikipedia "Information Security Management System"]] ( ISMF ).
*[[http://de.wikipedia.org/wiki/IT-Grundschutz-Kataloge|DE.Wikipedia "IT-Grundschutz-Kataloge"]].
===== Security Tools =====
==== Security Online Services ====
=== Free Security Online Services ===
*[[http://www.exploit-db.com/|Exploits Database by Offensive Security]].
*IBM.
*[[http://exchange.xforce.ibmcloud.com/|IBM "IBM X-Force Exchange"]] - "Research, Collaborate and Act on threat intelligence".
*[[http://www-03.ibm.com/security/de/de/xforce/|IBM Security "IBM X-Force"]] - "Forschung in der IT-Sicherheit, Erfassung globaler aktueller Bedrohungsdaten und Erstellung von Bedrohungsanalysen für intelligente Sicherheitslösungen".
*[[http://www.shodanhq.com/|SHODAN - Computer Search Engine]].
*[[http://docs.shodanhq.com/|SHODAN - Computer Search Engine "Shodan API’s documentation"]].
*[[http://en.wikipedia.org/wiki/Shodan_%28website%29|EN.Wikipedia "Shodan (website)"]].
*[[http://www.stopforumspam.com/|Stop Forum Spam]] - "We provide lists of spammers that persist in abusing forums and blogs with their scams, ripoffs, exploits and other annoyances".
=== E-Mail & Password Leaks Database ===
*[[http://sec.hpi.de/ilc/search|Hasso-Plattner-Institut "Identity Leak Checker"]].
=== Just-Commercial Security Online Services ===
*[[http://www.exploithub.com/|ExploitHub]] - "The First Legitimate Marketplace For Validated, Non-Zero-Day Exploits For Security Professionals".
==== Free Security Tools ====
*Free "Active Directory" security tools & Windows security baselines:
*[[http://www.semperis.com/purple-knight/|Semperis "Purple Knight"]].
*[[http://www.pingcastle.com/|Ping Castle]].
*"Microsoft Security Baselines".
*[[http://learn.microsoft.com/en-us/windows/security/operating-system-security/device-management/windows-security-configuration-framework/windows-security-baselines|Microsoft Ignite "Security baselines"]].
*The free [[http://www.openvas.org/|Greenbone OpenVAS]] - "Open Vulnerability Assessment Scanner".
*[[http://www.greenbone.net/|Greenbone]].
*[[http://www.greenbone.net/en/testnow/|Greenbone "Testnow"]] - "Greenbone Free".
*[[http://www.github.com/greenbone/|GitHub "Greenbone"]].
*[[http://www.sadsloth.net/post/install-gvm11-src_part1/|Evrytng is BROEKN "Install Greenbone Vulnerability Manager 11 on Ubuntu 19.04 from source... Part 1"]].
*Microsoft.
*[[http://technet.microsoft.com/en-gb/security/cc184924.aspx|Microsoft Security TechCenter "Microsoft Baseline Security Analyzer"]] for W2k, WinXP.
*[[http://www.microsoft.com/downloads/details.aspx?FamilyID=5534bee1-3cad-4bf0-b92b-a8e545573a3e|Microsoft Security Compliance Manager]] for Win7, Vista.
*[[http://technet.microsoft.com/en-us/library/cc677002.aspx|Microsoft TechNet "Microsoft Security Compliance Manager"]].
*[[http://microsoft.com/emet/|Microsoft Security TechCenter "Enhanced Mitigation Experience Toolkit"]].
*[[http://www.microsoft.com/en-us/download/details.aspx?id=50766|Microsoft Download Center "Enhanced Mitigation Experience Toolkit (EMET) 5.5"]], .NET 3.5 application for Windows 10 , Windows 7, Windows 8.1, Windows Server 2008, Windows Server 2012, Windows Server 2012 R2, Windows Vista.
*[[http://en.wikipedia.org/wiki/Enhanced_Mitigation_Experience_Toolkit|EN.Wikipedia "Enhanced Mitigation Experience Toolkit"]].
*The free [[http://www.shavlik.com/products/netchk-limited.aspx|Shavlik NetChk Limited]] for legacy Windows systems :-).
*[[http://www.bsi.de/|Bundesamt für Sicherheit in der Informationstechnik]] ( BSI ).
*[[http://www.bsi.bund.de/cln_183/ContentBSI/Themen/ProdukteTools/BOSS/BSIOSS.html|BSI "BOSS (BSI OSS Security Suite)"]].
*[[http://www.heise.de/security/artikel/BOSS-BSI-OSS-Security-Suite-270704.html|heise-online "BOSS (BSI OSS Security Suite)"]] ( 2005-06-16 ).
*[[http://www.heise.de/newsticker/meldung/81916|heise online "BSI veröffentlicht Prüfsoftware für Netzwerksicherheit"]] ( 2006-12-02 ).
*[[http://www.lavasoft.de/software/adaware/|Lavasoft "Ad-Aware Free"]], a free privacy software - "Echtzeitschutz vor Spyware, Trojanern, Rootkits, Hijackern, Keyloggern und mehr!".
*[[http://www.grc.com/optout.htm|Steve Gibson, Gibson Research Corporation "OptOut"]] - discontinued.
*[[http://www.safer-networking.org/|Spybot - Search & Destroy]], a free privacy software.
*[[http://www.xp-antispy.org/|xp-AntiSpy]], free privacy protection against Microsoft for Windows.
==== Commercial Security Tools ====
*[[http://www.neuber.com/|Neuber Software]] - the commercial "Network Security Taskmanager" / "Security Task Manager" - "Shows detailed information about all running processes: file path, description, security risk rating, start time, icon".
*[[http://www.lostpassword.com/|Passware - Password Recovery]].
==== Resources ====
*[[http://www.cisa.gov/resources-tools/resources/free-cybersecurity-services-and-tools|Cybersecurity & Infrastructure Security Agency ( CISA ) "Free Cybersecurity Services and Tools"]].
===== AntiVirus and Firewall Software =====
==== Free and comercial AntiVirus software ====
*[[http://www.free-av.de/|Avira AntiVir]] - free antivirus software for Windows. The free edition does not work with Windows server editions like W2k-Server #.
*[[http://www.avira.com/en/support-download-free-antivirus|Download Avira AntiVir Personal - Free Antivirus]].
*The commercial "Avira AntiVir Professional" is for W2k-Server, but not for Win2003, Win2008.
*The commercial "Avira AntiVir Server" is for W2k-Server, Win2003, Win2008.
*The free "AntiVir Free 10.2.0.703" is the latest release for W2k -> Download [[http://www.avira.com/en/support-download-free-antivirus|Download Avira AntiVir Personal - Free Antivirus]].
*The legacy "classical" [[http://www.oldversion.com/download-Avira-AntiVir-9.0.0.418.html|Avira AntiVir 9.0.0.418]] of 2009-12-08.
*On Win7, "Avira AntiVir" asks to deinstall "Microsoft Security Essentials" :-(.
*"Avira Free 14.07.306" of 2014-10-14 was still installable and runnable on Windows7 computers PIII CPUs.
*"Avira Free 15.10.434" of 2015-05--26 just work on Windows computers with PentiumIV CPU. It crashes on my Windows7 computer with Athlon2400 CPU ( PentiumIII alike ) .
*[[http://www.avast.com/free-antivirus-download|avast! free]] - free antivirus software for Windows. The free edition does not work with Windows server editions like W2k-Server.
*[[http://www.avg.com/de-de/product-avg-anti-virus-free-edition|AVG Anti-Virus Free Edition]] - free antivirus software for Windows. The free edition does not work with Windows server editions like W2k-Server.
*[[http://www.bitdefender.de/PRODUCT-14-de--bitdefender-10-free-edition.html|BitDefender Free Edition]] - free antivirus software for Windows. No resident monitoring sentinel. The free edition does not work with Windows 7 (?) and Windows server editions like W2k-Server.
*ClamAV / Immunet.
*The free [[http://www.clamav.net/|ClamAV]] for Linux and [[http://www.sosdg.org/clamav-win32|ClamAV/SOSDG]] for Windows. It does not provide a real-time guard :-(.
*Blog [[http://blog.clamav.net/|ClamAV Blog]].
*Blog article [[http://blog.clamav.net/2011/02/immunet-30-powered-by-clamav.htm|ClamAV Blog "Immunet 3.0 - Powered by ClamAV "]], 2011-02-08.
*The free [[http://www.immunet.com/|Immunet by Sourcefire]] for Windows.
*[[http://support.immunet.com/|Immunet by Sourcefire - Support]].
*Blog [[http://blog.immunet.com/|Immunet Blog]].
*Microsoft.
*[[http://www.microsoft.com/Security_Essentials/|Microsoft Security Essentials]].
*[[http://en.wikipedia.org/wiki/Morro_%28software%29|EN.Wikipedia "Microsoft Security Essentials"]].
*[[http://www.microsoft.com/windows/products/winfamily/defender|Microsoft Windows Defender]].
*[[http://en.wikipedia.org/wiki/Windows_Defender|EN.Wikipedia "Windows Defender"]].
*[[http://support.microsoft.com/Default.aspx?kbid=915052|Microsoft Help and Support "Error message when you try to install Windows Defender on a Windows 2000-based computer: 'This software requires GDI+ Please load the Windows 2000 Security Software Prerequisite Pack'"]].
==== Free Firewall Software ====
*[[http://www.ashampoo.com/en/eur/pin/0050/Security_Software/Ashampoo-FireWall-FREE|Ashampoo FireWall FREE]] for Windows.
*[[http://www.privacyware.com/personal_firewall.html|PWI, Inc. / Privacyware "Privatefirewall"]] for Windows.
==== Just-Commercial, Affordable AntiVirus software ====
*The commercial "F-PROT Antivirus" by [[http://www.f-prot.com/|F-PROTF]] works with W2k-Server, Win2003, Win2008, too.
*[[http://www.rising-global.com/|Rising Antivirus]] - commercial antivirus software.
*"longneckoftheoffer".
*[[http://www.loaris.com/|Loaris]].
*[[http://www.loaris.com/de/remove-longneckoftheoffer-stream/|Loaris "Remove longneckoftheoffer.stream pop-ups — Loaris Trojan Remover"]].
*Example virus-loaded URL [[https://longneckoftheoffer.stream/?isp=Vodafone Germany&td=track.caretakerbard.com|https://longneckoftheoffer.stream/?isp=Vodafone Germany&td=track.caretakerbard.com]].
*"Trenced".
*[[http://malwaretips.com/|Malwaretips]].
*[[http://malwaretips.com/blogs/remove-trenced-com/|Malwaretips "How to remove Trenced.com pop-up ads (Virus Removal Guide)"]].
*[[http://www.revouninstaller.com/revo_uninstaller_free_download.html|VSRevo Group "Revo Uninstaller Freeware"]].
*[[http://www.myantispyware.com/2018/07/23/how-to-remove-trenced-com-pop-up-ads-chrome-firefox-ie-edge/|My Anti Spyware "How to remove Trenced.com pop-up ads [Chrome, Firefox, IE, Edge]"]].
*"Get rid of Trenced.com from Firefox by resetting web browser settings" (helpful?).
==== Resources ====
*[[http://www.av-comparatives.org/|AV-Comparatives - Independent Tests of Anti-Virus Software]].
*[[http://www.virustotal.com/|VirusTotal]] - "Analyze suspicious files and URLs to detect types of malware, automatically share them with the security community".
===== Microsoft Security Technologies =====
==== General Security ====
*[[http://www.microsoft.com/windowsserver2003/technologies/directory/activedirectory/|Microsoft "Windows Server 2003 Active Directory"]] ( ADS ).
*[[http://en.wikipedia.org/wiki/Active_Directory|EN.Wikipedia "Active Directory"]], [[http://de.wikipedia.org/wiki/Active_Directory|DE.Wikipedia "Active Directory"]].
*[[http://www.microsoft.com/forefront/edgesecurity/isaserver/en/us/|Microsoft "Internet Security and Acceleration Server"]] ( ISA ), [[http://www.microsoft.com/forefront/threat-management-gateway/en/us/|Microsoft "Forefront Threat Management Gateway"]] ( TMG ).
*[[http://en.wikipedia.org/wiki/Microsoft_Forefront_Threat_Management_Gateway|EN.Wikipedia "Microsoft Forefront Threat Management Gateway"]], [[http://de.wikipedia.org/wiki/Microsoft_Internet_Security_and_Acceleration_Server|DE.Wikipedia "Microsoft Internet Security and Acceleration Server"]].
*[[http://www.microsoft.com/germany/technet/sicherheit/newsletter/nap.mspx|Microsoft TechNet "Network Access Protection (NAP)"]].
*[[http://en.wikipedia.org/wiki/Network_Access_Protection|EN.Wikipedia "Network Access Protection"]], [[http://de.wikipedia.org/wiki/Microsoft_Windows_Server_2008|DE.Wikipedia "Microsoft Windows Server 2008"]] ( "Sicherheit / Network Access Protection" ).
==== Telemetry, Privacy ====
*Windows 10, version 1703.
*[[http://docs.microsoft.com/en-us/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services|Microsoft Docs "Manage connections from Windows operating system components to Microsoft services"]], 2017-07-28.
*[[http://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization|Microsoft Docs "Configure Windows telemetry in your organization"]].
*[[http://docs.microsoft.com/en-us/windows/configuration/windows-diagnostic-data|Microsoft Docs "Windows 10, version 1703 Diagnostic Dat"]], 2017-04-05.
*Solutions & suggestions:
*Implement a proxy server or a firewall in your enterprise network, with mandatory user authorisation.
*Set these telemetry sites in the "hosts" file to 127.0.0.1, e.g. localhost :-).
*[[http://v10.vortex-win.data.microsoft.com/|v10.vortex-win.data.microsoft.com]].
*[[http://settings-win.data.microsoft.com/|settings-win.data.microsoft.com]].
*[[http://watson.telemetry.microsoft.com/|watson.telemetry.microsoft.com]].
*[[http://oca.telemetry.microsoft.com/|oca.telemetry.microsoft.com]].
*[[http://vortex.data.microsoft.com/collect/v1/|vortex.data.microsoft.com/collect/v1]].
==== Telemetry, Privacy Resources ====
*[[http://www.gruppenrichtlinien.de/|Gruppenrichtlinien, Mark Heitbrink]].
*[[http://www.gruppenrichtlinien.de/artikel/gp-pack-pat-privacy-and-telemetry|Gruppenrichtlinien, Mark Heitbrink "Datenschutz: gp-pack PaT - Privacy and Telemetry"]], 2017-08-11.
===== Internet and Software Application Security =====
==== Password Recovery Tools ====
=== Free Password Recovery Tools ===
*[[http://www.oxid.it/cain.html|oxid.it "Cain & Abel"]] for Win98, W2k, WinXP - "A password recovery tool for Microsoft Operating Systems".
*[[http://blog.gentilkiwi.com/mimikatz|Benjamin Delpy, Blog de Gentil Kiwi "mimikatz"]], [[http://www.github.com/gentilkiwi/mimikatz|GitHub "gentilkiwi/mimikatz"]] - Reading passwords of Windows users.
*[[http://fr.slideshare.net/gentilkiwi/|SlideShare "Benjamin Delpy"]].
*[[http://www.offensive-security.com/metasploit-unleashed/mimikatz/|Offensive Security "Mimikatz"]].
*[[http://pentestmonkey.net/blog/mimikatz-tool-to-recover-cleartext-passwords-from-lsass|pentestmonkey. Taking the monkey work out of pentesting "mimikatz: Tool To Recover Cleartext Passwords From Lsass"]].
*[[http://www.crackstation.net/|CrackStation]] - "Free Password Hash Cracker".
*[[http://www.securityxploded.com/|SecurityXploded]] - "An Infosec Research Organization offering more than 200 FREE Security/Password Recovery Tools...".
==== Free General Tools ====
*[[http://www.metasploit.com/|Metasploit]] - "World's most used penetration testing software".
*[[http://www.fastandeasyhacking.com/|Armitage]] for Windows and Linux - "A scriptable red team collaboration tool for Metasploit".
*[[http://en.wikipedia.org/wiki/Metasploit_Project|EN.Wikipedia "Metasploit Project"]], [[http://de.wikipedia.org/wiki/Metasploit|DE.Wikipedia "Metasploit"]].
*[[http://www.github.com/PowerShellMafia/PowerSploit|GitHub "PowerShellMafia/PowerSploit"]] - "PowerSploit - A PowerShell Post-Exploitation Framework".
*[[http://www.pentestgeek.com/penetration-testing/invoke-shellcode/|Penetest Geek "PowerSploit: The Easiest Shell You’ll Ever Get"]] - "PowerSploit is a collection of security-related modules and functions written in PowerShell. PowerSploit is already in both BackTrack and Kali".
==== Secure Connections ====
=== Internet Protocol Security ( IPsec ) ===
*[[http://en.wikipedia.org/wiki/IPsec|EN.Wikipedia "IPsec"]], [[http://de.wikipedia.org/wiki/IPsec|DE.Wikipedia "IPsec"]].
=== Certificates & Certificate Generation ===
*[[http://xca.sourceforge.net/|SourceForge "XCA - X Certificate and key management"]], [[http://www.sourceforge.net/projects/xca|SourceForge "xca"]].
=== Transport Layer Security ( TLS ) / Secure Sockets Layer ( SSL ) ===
*I was told by experts, that the [[http://www.phoenixcontact.com/online/portal/pc?urile=wcm:path:/pcen/web/offcontext/insite_landing_pages/e7863ba5-449d-4f45-98b3-c9f5cc700145/e7863ba5-449d-4f45-98b3-c9f5cc700145|PHOENIX CONTACT "PROFICLOUD Technology"]] uses TLS for securing the data transfer to the cloud.
*[[http://en.wikipedia.org/wiki/Transport_Layer_Security|EN.Wikipedia "Transport Layer Security"]], [[http://de.wikipedia.org/wiki/Transport_Layer_Security|DE.Wikipedia "Transport Layer Security"]] ( TLS ) - "Seit Version 3.0 wird das SSL-Protokoll unter dem neuen Namen TLS weiterentwickelt und standardisiert, wobei Version 1.0 von TLS der Version 3.1 von SSL entspricht. Bekannte Implementierungen des Protokolls sind OpenSSL und GnuTLS".
=== VPN ===
== OpenVPN ==
*[[http://www.openvpn.net/|OpenVPN Technologies, Inc. "OpenVPN"]].
*[[http://en.wikipedia.org/wiki/OpenVPN|EN.Wikipedia "OpenVPN"]], [[http://de.wikipedia.org/wiki/OpenVPN|DE.Wikipedia "OpenVPN"]].
*The OpenSource software [[http://www.openvpn.se/|OpenVPN GUI for Windows]],
== Resources ==
*[[http://en.wikipedia.org/wiki/Virtual_Private_Network|EN.Wikipedia "Virtual Private Network"]], [[http://de.wikipedia.org/wiki/Virtual_Private_Network|DE.Wikipedia "Virtual Private Network"]]
=== Zero Trust Security ( the Successor of VPN ) ===
*[[http://en.wikipedia.org/wiki/Zero_trust_security_model|EN.Wikipedia "Zero trust security model"]], [[http://de.wikipedia.org/wiki/Zero_Trust_Security|DE.Wikipedia "Zero Trust Security"]].
==== Top Critical Errors / Vulnerabilities ====
=== CWE - Common Weakness Enumeration ===
*[[http://cwe.mitre.org/|CWE - Common Weakness Enumeration]] - "A Community-Developed Dictionary of Software Weakness Types".
*[[http://cwe.mitre.org/top25/|CWE - Common Weakness Enumeration "2011 CWE/SANS Top 25 Most Dangerous Software Errors"]].
*"Common Weakness Scoring System (CWSS)".
*"Common Weakness Risk Analysis Framework (CWRAF)".
=== CVE - Common Vulnerabilities and Exposures ===
*[[http://www.mitre.org/|MITRE Corporation]].
*[[http://cve.mitre.org/|Common Vulnerabilities and Exposures ( CVE )]].
=== OWASP ===
*[[http://www.owasp.org/|OWASP - The free and open software security community]].
*[[http://www.owasp.org/index.php/Category:OWASP_Top_Ten_2013_Project|OWASP "Category:OWASP Top Ten 2013 Project"]].
*[[http://www.owasp.org/index.php/Germany/Projekte/Top_10_fuer_Entwickler-2013/Inhaltsverzeichnis|OWASP "Germany/Projekte/Top 10 fuer Entwickler-2013/Inhaltsverzeichnis"]]
*[[http://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks|OWASP Mobile Security Project "Top 10 Mobile Risks"]].
*[[http://www.owasp.org/www-project-api-security/|OWASP "OWASP API Security Project"]] - "API Security Top 10 2023".
*[[http://www.owasp.org/images/8/89/OWASP_Top_10_2007_for_JEE.pdf|OWASP "OWASP TOP 10 FOR JAVA EE. THE TEN MOST CRITICAL WEB APPLICATION SECURITY VULNERABILITIES FOR JAVA ENTERPRISE APPLICATIONS. OWASP SPRING OF CODE PROJECT 2007"]] ( PDF ).
=== SANS Institute ===
*[[http://www.sans.org/|SANS Institute]].
*[[http://www.sans.org/critical-security-controls/|SANS Institute "Critical Security Controls"]] - "Top 20 Critical Controls".
*[[http://www.sans.org/top25-software-errors/|SANS Institute "CWE/SANS TOP 25 Most Dangerous Software Errors"]].
*Troy Hunt.
*[[http://www.troyhunt.com/2011/12/free-ebook-owasp-top-10-for-net.html|Troy Hunt "Free eBook: OWASP Top 10 for .NET developers"]] ( 2011-12 ) - Free PDF book.
*[[http://www.troyhunt.com/2010/05/owasp-top-10-for-net-developers-part-1.html|Troy Hunt "OWASP Top 10 for .NET developers part 1: Injection"]] ( 2010-05 ) -> Part 1 - part 10.
*[[http://www.slideshare.net/johnkary/scared-straight-mitigating-owasp-top-10-with-php|SlideShare "John Kary: Scared Straight: Mitigating OWASP Top 10 with PHP"]].
==== Resources ====
*I was told by experts, that "OpenVPN" and "IPsec" are alternatives :-).
*[[http://en.wikipedia.org/wiki/OWASP|EN.Wikipedia "OWASP"]], [[http://de.wikipedia.org/wiki/OWASP|DE.Wikipedia "OWASP"]].
===== Security For Automation =====
*[[http://www.bsi.bund.de/|Bundesamt für Sicherheit in der Informationstechnik]].
*[[http://www.bsi.bund.de/ContentBSI/Themen/Cyber-Sicherheit/Analysen/Statistiken/BSIa004.html|Bundesamt für Sicherheit in der Informationstechnik "Industrial Control System Security - Top 10 Bedrohungen"]].
*[[http://www.bsi.bund.de/ICS-Security-Kompendium|Bundesamt für Sicherheit in der Informationstechnik "Industrial Control System (ICS) Security"]].
*[[http://www.bsi.bund.de/DE/Themen/weitereThemen/ICS-Security/Empfehlungen/Empfehlungen_node.html|Bundesamt für Sicherheit in der Informationstechnik "Industrial Control System Security / Empfehlungen / Allgemeine Empfehlungen"]].
*"ICS Security Kompendium" ( PDF ) #.
*"Umgang mit dem Ende des Supports für Windows XP" ( PDF ).
*[[http://www.bsi.bund.de/DE/Themen/weitereThemen/ICS-Security/Empfehlungen/Hersteller/Hersteller_node.html|Bundesamt für Sicherheit in der Informationstechnik "Industrial Control System Security / Empfehlungen / Hersteller und Integratoren / Empfehlungen für Betreiber"]].
*"Handhabung von Schwachstellen" ( PDF ).
*"Vulnerability Handling" ( PDF ).
*"Anforderungen an netzwerkfähige Industriekomponenten" ( PDF ) #.
*Event "Industrial Security" by [[http://www.siemens.de/|Siemens AG]] with speech of Holger Junker, [[http://www.bsi.bund.de/|Bundesamt für Sicherheit in der Informationstechnik]] in Bispingen, Germany ( 2014-01-16 ).
*[[http://www.xing.com/profile/Holger_Junker|XING "Holger Junker"]].
*[[http://de.linkedin.com/pub/holger-junker/4b/b56/5b8|LinkedIn "Holger Junker"]].
*[[http://www.twitter.com/HolgerJunker|Twitter "Holger Junker"]].
*[[http://www.hpi.uni-potsdam.de/meinel/lehrstuhl/symposia/2nd_soa_security_2010/vortragende/holger_junker.html|Hasso Plattner Institut "Holger Junker. SOA Security heute und morgen]].
*ISA-99.
*[[http://www.isa.org/MSTemplate.cfm?MicrositeID=988&CommitteeID=6821|ISA - The International Society of Automation "ISA99, Industrial Automation and Control Systems Security"]].
*Wiki [[http://isa99.isa.org/|ISA99 Committee on Industrial Automation and Control Systems Security "ISA99 Wiki"]].
*[[http://en.wikipedia.org/wiki/Cyber_security_standards|EN.Wikipedia "Cyber security standards"]] -> "ISA-99".
*Siemens.
*[[http://support.industry.siemens.com/cs/document/109475014/recommended-security-settings-for-ipcs-in-the-industrial-environment|SIEMENS AG "Recommended Security Settings for IPCs in the Industrial Environment"]],[[http://support.industry.siemens.com/cs/document/109475014/empfohlene-sicherheitseinstellungen-f%C3%BCr-ipcs-im-industrieumfeld|SIEMENS AG "Empfohlene Sicherheitseinstellungen für IPCs im Industrieumfeld"]], 2015.
*[[http://support.industry.siemens.com/cs/document/55390879/security-guideline-for-pc-based-automation-systems-with-windows-embedded-operating-systems.|SIEMENS AG "Security guideline for PC-based automation systems with Windows embedded operating systems"]], [[http://support.industry.siemens.com/cs/document/55390879/security-leitfaden-f%C3%BCr-pc-basierte-automatisierungssysteme-mit-windows-embedded-betriebssystemen?dti=0&lc=de-DE|SIEMENS AG "Security Leitfaden für PC-basierte Automatisierungssysteme mit Windows Embedded Betriebssystemen"]], 2014.
*[[http://support.automation.siemens.com/WW/view/de/26462131|Whitepaper "Sicherheitskonzept PCS 7 und WinCC - Basisdokument"]].
*[[http://support.automation.siemens.com/WW/view/de/43876783|SIEMENS "SIMATIC WinCC / SIMATIC PCS 7: Information bezüglich Malware / Virus / Trojaner"]].
*[[http://en.wikipedia.org/wiki/Stuxnet|EN.Wikipedia "Stuxnet"]], [[http://de.wikipedia.org/wiki/Stuxnet|DE.Wikipedia "Stuxnet"]].
*[[http://www.siemens.com/industrialsecurity|SEIMENS AG "Industrial Security"]].
*[[http://www.scadasl.org/|SCADA Strange Love]], [[http://scadastrangelove.org/|SCADA Strange Love]].
*Blog [[http://scadastrangelove.blogspot.de/|Blogspot "SCADA Strange Love"]].
*[[http://www.slideshare.net/qqlan/internet-connected-icsscadaplc|SlideShare "Internet connected ICS/SCADA/PLC Cheat Sheet 2013"]].
*[[http://www.youtube.com/watch?v=2-kFllWpCGg|YouTube "repdet, sgordey: SCADA Strangelove 2. We already know"]].
*[[http://events.ccc.de/congress/2013/Fahrplan/events/5582.html|Schedule 30C3 "lecture: SCADA StrangeLove 2. We already know"]].
*[[http://events.ccc.de/congress/2013/wiki/Session:Hacking_SCADA:_ICS_Penetration_testing_workshop|30C3 - Self-organized Sessions "Hacking SCADA: ICS Penetration testing workshop"]].
*Tools:
*[[http://www.tcpdump.org/|TCPDUMP & LIBPCAP]].
*[[http://www.wireshark.org/|Wireshark]] and "tshark", a terminal oriented version of Wireshark.
*[[http://en.wikipedia.org/wiki/Kali_Linux|EN.Wikipedia "Kali Linux"]], [[http://de.wikipedia.org/wiki/Kali_Linux|DE.Wikipedia "Kali Linux"]].
*Scapy - "powerful interactive packet manipulation program".
*[[http://www.secdev.org/|Ne dites rien, les mots sont superflus... ( SecDev.org by Phil )]].
*[[http://www.secdev.org/projects/scapy/|SecDev.org "Scapy"]].
*[[http://www.secdev.org/projects/scapy/doc/installation.html|SecDev.org "Scapy v2.1.1-dev documentation. Download and Installation"]].
*[[http://www.ptsecurity.com/|Positive Technologies]] - Provider of some other tools.
===== Security Protocols and Security Frameworks ( for Software Development ) =====
*Pascal Alich.
*[[http://www.github.com/pascalalich/eclipse-oauth-demo|GitHub "pascalalich/eclipse-oauth-demo"]].
*Speech " Oh Oh OAuth - Eclipse OAuth Integration" at [[http://wiki.eclipse.org/Eclipse_DemoCamps_December_2014/Hannover|Eclipse DemoCamps December 2014/Hannover]].
*[[http://en.wikipedia.org/wiki/OAuth|EN.Wikipedia "OAuth"]], [[http://de.wikipedia.org/wiki/OAuth|DE.Wikipedia "OAuth"]].
===== Software Development =====
*[[http://en.wikipedia.org/wiki/Return-oriented_programming|EN.Wikipedia "Return-oriented programming"]], [[http://de.wikipedia.org/wiki/Return-oriented_programming|DE.Wikipedia "Return Oriented Programming"]] ( ROP ).
===== Trusted Computing =====
*[[http://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa|ZEIT Online "Bundesbehörden sehen Risiken beim Einsatz von Windows 8"]], 2013-08-29.
*[[http://en.wikipedia.org/wiki/Trusted_Computing|EN.Wikipedia "Trusted Computing"]], [[http://de.wikipedia.org/wiki/Trusted_Computing|DE.Wikipedia "Trusted Computing"]].
*[[http://en.wikipedia.org/wiki/Next-Generation_Secure_Computing_Base|EN.Wikipedia "Next-Generation Secure Computing Base"]], [[http://de.wikipedia.org/wiki/Next-Generation_Secure_Computing_Base|DE.Wikipedia "Next-Generation Secure Computing Base"]] ( formerly: "Palladium" :-( ).
*[[http://en.wikipedia.org/wiki/Trusted_computing_base|EN.Wikipedia "Trusted computing base"]].
*[[http://en.wikipedia.org/wiki/Trustworthy_Computing|EN.Wikipedia "Trustworthy computing"]].
*[[http://en.wikipedia.org/wiki/Trusted_execution_environment|EN.Wikipedia "Trusted execution environment"]], [[http://de.wikipedia.org/wiki/Trusted_Execution_Environment|DE.Wikipedia "Trusted Execution Environment"]] ( TEE ) for ARM, x86,...
===== Online Magazines =====
*[[http://www.compliancemagazin.de/markt/|Compliance-Magazin.de - Governance, Risk & Compliance. Das GRC Portal]].
*[[http://www.compliancemagazin.de/markt/unternehmen/tuev-rheinland301009.html|Complianc-Magazin.de - Governance, Risk & Compliance. Das GRC Portal "Zentrale Aspekte des Datenschutzes"]] - up to 50.000 EUR or 300.000 EUR monetary fine in case of accountability.
===== Literature =====
==== Books & Publications ====
=== General ===
*Saltzer and Schroeder.
*[[http://web.mit.edu/Saltzer/www/publications/pubs.html|MIT "Publications of Jerome H. Saltzer"]].
*[[http://web.mit.edu/Saltzer/www/publications/protection/index.html|MIT, Jerome H. Saltzer and Michael D. Schroeder "The Protection of Information in Computer Systems"]], 1975 - "8 examples of design principles that apply particularly to protection mechanisms":
*[[http://www.cs.virginia.edu/~evans/cs551/saltzer/|University of Virginia, Department of Computer Science CS551: Security and Privacy on the Internet, Fall 2000 - Jerome H. Saltzer and Michael D. Schroeder "The Protection of Information in Computer Systems"]].
*Design rules:
-Economy of mechanism: Keep the design as simple and small as possible.
-Fail-safe defaults: Base access decisions on permission rather than exclusion.
-Complete mediation: Every access to every object must be checked for authority.
-Open design: The design should not be secret.
-Separation of privilege: Where feasible, a protection mechanism that requires two keys to unlock it is more robust and flexible than one that allows access to the presenter of only a single key.
-Least privilege: Every program and every user of the system should operate using the least set of privileges necessary to complete the job.
-Least common mechanism: Minimize the amount of mechanism common to more than one user and depended on by all users.
-Psychological acceptability: It is essential that the human interface be designed for ease of use, so that users routinely and automatically apply the protection mechanisms correctly-
-Work factor: Compare the cost of circumventing the mechanism with the resources of a potential attacker. The cost of circumventing, commonly known as the "work factor," in some cases can be easily calculated.
-Compromise recording: It is sometimes suggested that mechanisms that reliably record that a compromise of information has occurred can be used in place of more elaborate mechanisms that completely prevent loss.
*John Viega, Gary McGraw.
*Book [[http://www.amazon.de/exec/obidos/ASIN/0321425235/hemmerling-21|John Viega, Gary McGraw "Building Secure Software: How to Avoid Security Problems the Right Way"]], 2006.
*[[http://searchsecurity.techtarget.com/opinion/Thirteen-principles-to-ensure-enterprise-system-security|Gary McGraw "Thirteen principles to ensure enterprise system security"]].
-Secure the weakest link.
-Defend in depth.
-Fail securely.
-Grant least privilege.
-Separate privileges.
-Economize mechanism.
-Do not share mechanisms.
-Be reluctant to trust.
-Assume your secrets are not safe.
-Mediate completely.
-Make security usable.
-Promote privacy.
-Use your resources.
=== Automation & Process Industry ===
*[[http://www.hima.com/Solutions/Security/|HIMA Paul Hildebrandt GmbH "Safety and Security"]] - Download of the free PDF document "HIMA Cyber Security Manual".
==== Paper Magazines ====
*[[http://www.automation-security.de/|a+s - zeitschrift für automation und security]].
*[[http://www.kes.info/| - Die Zeitschrift für Informations-Sicherheit]].
===== Experts =====
*[[http://www.datenschutzberater.de/|VON ZUR MÜHLEN'SCHE GmbH, BdSI (VZM) - datenschutzberater.de]] -> Externe Datenschutzbeauftragter ( IHK ).
===== Services =====
*[[http://www.stopbadware.org/|StopBadware - This isn't an attack site... or is it?]].
*[[http://www.bynamite.com/|Bynamite, Inc]] for Firefox 3.
*[[http://www.facebook.com/bynamiteinc|Facebook "Bynamite, Inc"]] - "Find out what advertisers know about you, and change it, with Bynamite".
*[[http://www.facebook.com/note.php?note_id=10150111336797049|Facebook "Bynamite, Inc", Note "bynamite is in hobby mode"]], 2010-12-05.
*[[http://www.stopforumspam.com/|Stop Forum Spam]].
*[[http://www.stopforumspam.com/add|Stop Forum Spam - Add a Spammer]].
*[[http://www.stopforumspam.com/removal|Stop Forum Spam - Removal]].
===== Accountability in IT Business =====
* "Cloud Computing" = "Auftragsdatenverarbeitung", according to $11 of "Bundesdatenschutzgesetz" ( BDSG ).
===== Scam =====
*[[http://www.anti-scam.de/|Anti-Scam-Forum]], Germany - "TEILE KEINEM SCAMMER MIT, DASS SIE HIER GELISTET SIND. Die, die es tun erhalten sofort Verbannung" :-).
*[[http://www.anti-scam-forum.net/|Anti-Scam-Forum-NL]], Germany.
*[[http://www.dragonladies.org/|DragonLadies.org BBS]] - "A forum for the collection, and publication of information on female internet romance scammers from Asia".
*Blog [[http://scumalert.blogspot.de/|ScumAlert]].
===== Resources =====
*[[https://www.botfrei.de/|eco - Verband der deutschen Internetwirtschaft e.V. "Anti-Botnet-Beratungszentrum"]].
*[[http://www.a-i3.org/|Arbeitsgruppe Identitätsschutz im Internet (a-i3)]].
*[[http://www.bsi.de/|Bundesamt für Sicherheit in der Informationstechnik]] ( BSI ).
*[[http://www.bsi.de/gshb/|Bundesamt für Sicherheit in der Informationstechnik "IT-Grundschutzhandbuch"]] ( IT-Baseline Protection Manual ).
*[[http://www.bsi-fuer-buerger.de/|BSI für Bürger]].
*[[http://bsi.bund.de/kmu/|Bundesamt für Sicherheit in der Informationstechnik "Kleine- und Mittlere Unternehmen"]].
*[[http://www.bsi.bund.de/DE/Themen/Unternehmen-und-Organisationen/Informationen-und-Empfehlungen/KMU/CyberRisikoCheck/CyberRisikoCheck_node.html|Bundesamt für Sicherheit in der Informationstechnik "CyberRisikoCheck. Wirkungsvoller Schutz für kleine und Kleinstunternehmen nach DIN SPEC 27076"]].
*[[http://www.beuth.de/de/technische-regel/din-spec-27076/365252629|Beuth Verlag "DIN SPEC 27076:2023-05"]] - Free PDF download :-).
*I was told in 2023-11 by experts: There will be "soon" ( i.e. in 2024 ) a free web-based software service for registered companies and registered consultants, which interactively asks the questions of the norm.
*[[http://www.computerbetrug.de/|computerbetrug.de und dialerschutz.de]].
*Datenschutz.
*[[http://www.datenschutz.de/|Datenschutz.de - Virtuelles Datenschutzbüro]].
*[[http://www.baden-wuerttemberg.datenschutz.de/|Landesbeauftragte für den Datenschutz Baden-Württemberg]].
*[[http://www.datenschutz-bayern.de/|Bayerische Landesbeauftragte für den Datenschutz]].
*[[http://www.datenschutz-berlin.de/|Berliner Beauftragter für Datenschutz und Informationsfreiheit]].
*[[http://www.www.lda.brandenburg.de/|Landesbeauftragte für den Datenschutz und für das Recht auf Akteneinsicht Brandenburg]].
*[[http://www.datenschutz-hamburg.de/|Hamburgischer Beauftragten für Datenschutz und Informationsfreiheit (HmbBfDI)]].
*[[http://www.datenschutz.hessen.de/|Hessischen Datenschutzbeauftragter]].
*[[http://www.lfd.m-v.de/|Der Landesbeauftragte für Datenschutz und Informationsfreiheit Mecklenburg-Vorpommern]].
*[[http://www.lfd.niedersachsen.de|Landesbeauftragter für den Datenschutz Niedersachsen]].
*[[http://www.hannover.de/Leben-in-der-Region-Hannover/Verwaltungen-Kommunen/Die-Verwaltung-der-Landeshauptstadt-Hannover/Datenschutzbeauftragter-der-Landeshauptstadt-Hannover|Datenschutzbeauftragter der Landeshauptstadt Hannover]].
*[[http://www.ldi.nrw.de/|Landesbeauftragte für Datenschutz und Informationsfreiheit Nordrhein-Westfalen]].
*[[http://www.datenschutz.rlp.de/|Der Landesbeauftragte für den Datenschutz und die Informationsfreiheit Rheinland-Pfalz]].
*[[http://www.lfdi.saarland.de/|Unabhängiges Datenschutzzentrum Saarland]].
*[[http://www.saechsdsb.de/|Sächsischen Datenschutzbeauftragter]].
*[[http://www.datenschutzzentrum.de/|Unabhängiges Landeszentrum für Datenschutz Schleswig-Holstein (ULD)]].
*[[http://www.tlfdi.de|Thüringer Landesbeauftragter für den Datenschutz und die Informationsfreiheit]].
*[[http://www.sicher-im-netz.de/|Deutschland sicher im Netz e.V.]].
*[[http://www.foebud.org/|FoeBuD e.V.]].
*[[http://www.gnupt.de/|GnuPT - Gnu Privacy Tools]] - "Ihr Portal zur Verschluesselung mit GnuPG".
*heise.
*[[http://www.heise.de/newsticker/meldung/Microsoft-Schreibt-eure-Passwoerter-auf-163534.html|heise online "Microsoft: Schreibt eure Passwörter auf"]].
*[[http://www.heise.de/ct/antivirus/|heise Security - AntiVirus]].
*Lower Saxony.
*[[http://www.verfassungsschutz.niedersachsen.de/|Niedersächsisches Ministerium für Inneres und Sport - Verfassungsschutz -]], "Wirtschafts- und Geheimschutz / Wirtschaftschutz" -> "MI-Abt-6-Wirtschaftsschutz".
*[[http://www.mi.niedersachsen.de/|Niedersächsisches Ministerium für Inneres und Sport]], "Themen > Innere Sicherheit > Verfassungs- & Geheimschutz > Geheim- & Wirtschaftsschutz > Wirtschaftsschutz".
*[[http://www.rfc-ignorant.org/|rfc-ignorant.org]] - "The clearinghouse for sites who think that the rules of the internet don't apply to them".
*[[http://www.secupedia.info/|SecuPedia]] #.
*[[http://www.trojaner.info/|Trojaner.Info - Die Informationsseite über Trojanische Pferde]].
*[[http://www.trojan-horse.info/|trojan-horse.info]] - "Trojan Horses (Trojans), Viruses, Worms, Spyware, Malware – a guide for the perplexed".
*[[http://hoax-info.tubit.tu-berlin.de/hoax/|TU-Berlin Hoax-Info Service]].
*[[http://www.mintywhite.com/|Windows Guides]].
*Free "PC Security Handbook".
*Free "PC Maintenance Handbook".
*Wikipedia.
*[[http://en.wikipedia.org/wiki/Common_Criteria|EN.Wikipedia "Common Criteria"]], [[http://de.wikipedia.org/wiki/Common_Criteria_for_Information_Technology_Security_Evaluation|DE.Wikipedia "Common Criteria for Information Technology Security Evaluation"]].
*[[http://en.wikipedia.org/wiki/Cyber_security_standards|EN.Wikipedia "Cyber security standards"]].
*[[http://en.wikipedia.org/wiki/Control_system_security|EN.Wikipedia "Control system security"]].
*[[http://www.youtube.com/watch?v=xNskW4RVbQY|YouTube, GData "Abzocker sagen 'Bitten rufen Sie uns an' - Da sagen wir nicht nein"]] - "Microsoft Sicherheitsalarm Fehler Nummer DW 6VD36", Telephone number "032-221-098-119" browser message :-(.
*[[http://www.zone-h.org/|Zone-H - Unrestricted information]].
===== Forums, Newsgroups, Communities =====
*[[http://forum.avira.com/|Avira Support Forum]].
*[[http://forum.avira.com/wbb/index.php?page=Thread&threadID=157458|Avira Support Forum "How can I stop "Luke Skywalker. Scanning the registry" prevent or schedule operation ?"]].
*[[http://forum.emsisoft.com/|Emsi Software - e-squared Support]] ( read-only ) forum, [[http://support.emsisoft.com/|Emsi Software Support]] forum.
*[[http://secunia.com/community/forum/|Secunia Forum]].
*[[http://www.stopforumspam.com/|Stop Forum Spam - Forum]].
===== Appropriate OpenDirectory Directory Pages =====
*[[http://www.dmoz.org/Computers/Security/|OpenDirectory "Top: Computers: Security"]].
*[[http://www.dmoz.org/World/Deutsch/Computer/Sicherheit/|OpenDirectory "Top: World: Deutsch: Computer: Sicherheit"]].
*[[http://www.dmoz.org/World/Deutsch/Computer/Internet/Missbrauch/|OpenDirectory "Top: World: Deutsch: Computer: Internet: Missbrauch"]].
{{tag>security anti-virus "anti virus" virus}}