Security

Designing A Secure System

badBIOS Information
http://arstechnica.com/security/2013/10/meet-badbios-the-mysterious-mac-...

Buffer Overflows
http://en.wikipedia.org/wiki/Buffer_overflow
http://www.linuxjournal.com/article/6701

Ultrasonic Communication
http://alumni.media.mit.edu/~wiz/ultracom.html

The Ken Thompson Hack
http://c2.com/cgi/wiki?TheKenThompsonHack
http://cm.bell-labs.com/who/ken/trust.html

Obfuscating Code
http://newsroom.ucla.edu/portal/ucla/ucla-computer-scientists-develop-24...

The Two Generals Problem
http://en.wikipedia.org/wiki/Two_Generals%27_Problem

Rethinking the Computer
http://www.nytimes.com/2012/10/30/science/rethinking-the-computer-at-80....

ACM RISKS-LIST
http://catless.ncl.ac.uk/Risks

Existing Secure System Solutions

Securing Debian
http://www.debian.org/doc/manuals/securing-debian-howto/

Securing Ubuntu
http://www.andrewault.net/2010/05/17/securing-an-ubuntu-server/
http://www.computerworld.com/s/article/9002691/Tips_on_keeping_your_Ubun...

PHP Trojans / Shells
http://www.localroot.net/
http://r57.gen.tr/
http://xavsec.blogspot.com/2006_09_01_archive.html

Wordpress
http://smackdown.blogsblogsblogs.com/2008/06/24/how-to-completely-clean-...
http://codex.wordpress.org/Hardening_WordPress

Malware Analyst's Cookbook
http://www.malwarecookbook.com/

Metasploit
http://en.wikipedia.org/wiki/Metasploit_Project
http://metasploit.com/

Password Security
https://www.grc.com/haystack.htm
http://rumkin.com/tools/password/passchk.php
http://world.std.com/~reinhold/diceware.html
http://www.abs-comptech.com/home/headlines/news/calculating-password-pol...
https://wiki.mozilla.org/WebAppSec/Secure_Coding_Guidelines#Password_Sto...

Web Security Testing
http://en.wikipedia.org/wiki/WebScarab
http://en.wikipedia.org/wiki/Soapui