interesting links:
xml and databases | forensic acquisition utilities | devlounge | qa forums | (in)secure magazine | foremost project | the LibUsb project | Win32API based C Runtime Library | pelles c compiler | dinkum reference | accu | comp.lang.c FAQ | txaKy network | iczelion's Win32ASM | mad wizard | RE Team | ASM Community | port 25 | for(ensic){blog;} | bindshell.net | Palisade Magazine | Checkmate Ezine | reverse engineering network | NirSoft | Tech Writing | Online Books | harvard classics | synacklabs | krellor's site | the bbs scene | c64 bbsing | hackaholic | invisiblethings | Win32 GNU utils | data's site | EliCZ's page | hutch's home page | md5lookup | truthout | nmap online | w32 samples | NullAck's site | kelly's korner | home of zshzn | crosswire bible society | slashdot.org | rootkit mag | VX Heavens | project gutenberg | ccel.org | wikipedia | eff.org | maher surname | ancient irish history | bolt comics | ancient texts | chamorro cookbook | guam recipes | sam choy's recipesblogs and stuff i read:
windows security logging and other esoterica | kernel mustard | the SDL Blog | David LeBlanc's Web Log | msmvps blogs | emergent chaos | steve rowe's blog | michael howard's web log | Determina Security Blog | byte69's blog | smallcode blog | ririan project | robert hensing's blog | windows ir | skudd's blog | izik's blog | twiddlersblog | the daily wtf | msrc blog | m4tt's journal | the f-secure blog | Rob's Blog | the old new thing | the Handler's Diary | mark's blog | improbable researchcommunities and networks i frequent:
sdf public access unix | 9rules | AS400.holgerscherer.de | Deathrow OpenVMS Cluster | neworder security and networking portal | sourceforge | open web design | .aware | code.box.sk | forensic focus | diamond mine bbspowershell resources:
community extensions | powershell team blog | time is an illusion | /\/\o\/\/ | programmer's guide | utility scripts | extend powershell with custom commandsother resources:
MS Office Security Guide | A Guide to Basic Computer Forensics | Fundamental Computer Investigation Guide for Windows | Malware Removal Starter Kit | w2k registry reference | security considerations: windows user interfaceand here comes the propaganda:




