The Trusted Purchasing Alliance serves state, local, territorial and tribal governments and related not-for-profit entities in achieving a greater cyber security posture through trusted expert guidance and cost-effective procurement. Current Buys Available Upcoming Events & Important Dates More
CERT Tools Reflect Our Research We offer a range of tools and methods to help you conduct forensic examinations, analyze vulnerabilities, monitor large-scale networks using flow data, and more. Explore our tools repositories We use the insights gained through our research and analysis to develop practical solutions to relevant problems. Read more about our work CERT Trusted Commitment
Frequently Asked Questions
Computer Security The web is like a large city, exciting, wonderful, but with a few dangers. Most teachers do not have the time to research and find the best security products to safeguard their computers from attack by vandals, including students. I have attempted to give a few basic recommendations that can help you safeguard your personal computer. Most of these recommendations are for PCs with windows. Computer Security
Learn to Manage Default Shares Recently, I received a phone call from a former coworker who left a small Independent Software Vendor (ISV) to take a job in a large corporate IT department. He had some questions about Microsoft Systems Management Server (SMS) that he hoped I could answer. We chatted about the product and his computing environment, then he signed off to install SMS on his test network. Twenty-four hours later, I received a somewhat panicky phone call: SMS wouldn't install on some of the computers on his test network, and my friend couldn't figure out why.
Please note that this document is quite dated (last updated in 2008). Some of the infomation is still of interest so I'm keeping the document up for posterity only. Some of the old links have been removed. Safe Hex - A collection of suggestions intended to help you defend against viruses, worms, trojans (oh my!)
Summary A firewall between the attacker and the victim that blocks incoming traffic will usually stop a trojan client on the outside from contacting a trojan server on the inside. ICMP tunneling has existed for quite some time now, but if you block ICMP in the firewall you will be safe from that. This paper describes another concept that I call ACK Tunneling. ACK Tunneling works through firewalls that don't apply their rule sets on TCP ACK segments. ACK Tunneling Trojans
NSA Security Recommendation Guides
IMPORTANT: This article contains information about modifying the registry. Before you modify the registry, make sure to back it up and make sure that you understand how to restore the registry if a problem occurs. For information about how to back up, restore, and edit the registry, click the following article number to view the article in the Microsoft Knowledge Base: (http://support.microsoft.com/kb/256986/EN-US/ ) Description of the Microsoft Windows Registry Shortcut and WinHelp Commands in HTML Help
Security Notification Service Help protect your computing environment by keeping up to date on Microsoft technical security notifications. Notifications are available in RSS, mobile device, or e-mail format, and are also available online at the TechNet Security Bulletin Search page. Basic Alerts Microsoft's free monthly Security Notification Service provides links to security-related software updates and notification of re-released Microsoft Security Bulletins.
We're getting reports of client applications that are vulnerable to the heartbleed issue. Just as with server applications, these client applications are dependant on vulnerable versions of OpenSSL. Another "patch soon" problem, you say? The patch will be installed when the vendor ... oh, wait a minute. Internet Storm Center