Demorgan Company

Purpose

This webpage was reconstructed from an archived website to give a retro but contemporary birdseye view into the several years [1998 - 1999] of an IT Security professional. What I personally find interesting out of the entire website is this one page, tucked back in the navigation path just far enough it did not share in the updated more corporate look of the overall website. I have connected it to archived links, this makes the page work very much as it did in those years. By visiting or examining the links you will notice areas of interest this man had in those years.

 

Draw your own conclusions as to whether the page of links has any weight in the argument that this IT Security professional had any interest in E-Cash or the eventual product known as Bitcoin which came along ten years later.

The links from this reconstructed page will get you to the actual original page, but the outbound links on the original page were not archived in that system, making it difficult to comfortably research. This webpage serves as an overlay.

 

Disclaimer

This project has nothing to do with any of the parties or companies mentioned and is for educational purposes only. Images and text are intended for reference only.


Miscellaneous Security Sites

Home | Company Profile | Services | Related Sites | Free Security Newsletter |

Event Calender | Carrer Opportunities | Special Offer | IT security Training


For Network Issues check here...

Cryptography Number Theory
Digital Signatures Publications
E-cash Security Companies
E-commerce Security Web Directories
Internet Banking Single Sign On
Java Standards
Mag/Smart Cards Trust Management
Misc Security Unix Security Issues
NT Security Issues X.509

 

cryptography  Cryptography

  1. SPEKE - A Strong Password Method
  2. http://www.und.nodak.edu/org/crypto/crypto/lanaki.crypt.class/reports/IDEAFAST.TXT
  3. Differential Cryptanalysis
  4. Counterpane Systems: CMEA Cryptanalysis
  5. List of publications by D. Chaum
  6. The Crypto Drop Box
  7. Elliptic Curve Cryptography Central (ECC)
  8. http://www.uni-siegen.de/security/krypto/rsa-tr-cs87-7.txt
  9. Network Security: Practical Cryptosystems
  10. THE RC5-56 PROJECT MAINPAGE
  11. Shortcut to Cryptography
Back to Top

digital signatures Digital Signatures

  1. ABA CyberNotary Committee
  2. Digital Signature Guidelines
  3. What are Digital Signatures
  4. Advanced Digital Signatures Techniques
Back to Top

e-cash E-cash

  1. Cryptography and Number Theory for Digital Cash

Back to Top


e-commerce E-commerce

  1. Dismantling the Barriers to Global Electronic Commerce
  2. X/Open Security & Electronic Commerce
  3. Interactive Knowledge Online

Back to Top


internet banking Internet Banking

  1. The De Armas Internet Banking and Financial Index
  2. Apollo Trust Company WWW Banking
  3. Citizens Bank Home Banking Log In
  4. Commonwealth Bank - Netbank What's New
  5. EuroFed - Sign On
  6. Security First Network Bank - SFNB Lobby
  7. Star One federal Credit Union
  8. Yahoo! - Business and Economy:Companies:Financial Services:Banking:Internet Banking

Back to Top


java Java

  1. A Formal Specification of Java(tm) Virtual Machine Instructions
  2. Cryptix 1.1 - Cryptographic extensions for Java
  3. Java Commerce
  4. Java Security

Back to Top


smart cards Mag/Smart Cards

  1. Smart cards and the OpenCard Framework - JavaWorld - January 1998
  2. Mondex's Pilot System Broken

Back to Top


misc security Misc Security

  1. IT Baseline Protection Manual 1997
  2. ISS X-Force Vulnerability Database
  3. COAST Hotlist Main
  4. Pseudorandom Number Sequence Test Program
  5. ETH Zürich / Computer Science / Publications
  6. $10,000.00 DES Challenge
  7. PC WEEK: Hear all evil, see all evil
  8. SPECTRE PRESS
  9. Netscape Security Solutions
  10. REX - Computer_Security
  11. DES Challenge Coordinated Effort
  12. sec2

Back to Top


NT Security NT Security Issues

Miscrosoft Security Advisory Page

  1. NT Hack FAQ v2
  2. http://www.compusmart.ab.ca/theclub/winnt/winntpwd.htm
  3. C2 Evaluation and Certification for Windows NT
  4. NT Internals
  5. Nomad Mobile Research Centre - FAQs
  6. ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/nt40/hotfixes-postSP2/iis-fix/Q163485.txt
  7. MS Internet Explorer security holes
  8. NT SECURITY
  9. OSP Infobase: The NT password hack
  10. RedButton Bug

Microsoft Training

  1. Internet Cryptography and Certificate Security
  2. Top Internet Information Server Security Questions Answered
  3. Microsoft Internet Information Server Security
  4. Microsoft Windows NT Security Architecture and Directions

Back to Top


number theory Number Theory

  1. Algebraic Number Theory Archives
  2. Jon Grantham's Home Page
  3. Cryptography and Numbertheory
  4. THINGS OF INTEREST TO NUMBER THEORISTS
  5. Mathematics Archives - Topics in Mathematics - Number Theory

Back to Top


pki PKI

  1. OIDs Used with S/MIME
  2. The Electronic Commerce Expert Group (ECEG)
  3. UNCITRAL Model Law (subject to revision)
  4. A Survey of Public-Key Infrastructures
  5. Comprehensive list of Public Key Infrastructure (PKI) links
  6. Public Key Infrastructure
  7. SSLEAY 0.8.1 and MSIE 4.0 X509 certificates
  8. FTP Directory: ftp://ftp.pca.dfn.de/pub/pca/docs/Policy/
  9. Public-Key Infrastructure (X.509) (pkix) Charter
  10. Netscape Security Documents
  11. Installing certificates and root keys in Internet Explorer 3.0 & IIS 3.0
  12. Public Key Infrastructure References
  13. Comprehensive list of Public Key Infrastructure (PKI) links
  14. CME: Generalized Certificates
  15. Paul Resnick's Home Page
  16. SPKI Certificate Documentation [Carl Ellison]
  17. SDSI - A Simple Distributed Security Infrastructure
  18. GMD Security Technology - SECUDE-5.0
  19. PKI resources
  20. Public Key Infrastructure
  21. Resource Library: White Papers
  22. Public Key Authentication Framework (PKAF) in Australia
  23. Certificates Australia
  24. Australia Post - Keypost

Back to Top


publications Publications

  1. Strong Password Authentication Publications
  2. Publications (Eli Biham - Cryptanalysis)

Back to Top


security companies Security Companies

  1. DeMorgan Home Page
  2. Telstra SureLinkTM: Welcome
  3. LUC ENcryption Technology (LUCENT) Limited
  4. eSafe Technologies
  5. Certicom Corp. Cryptographic Technologies
  6. ISCA

Back to Top


directories Security Web Directories

  1. Security and Encryption Links
  2. Telstra Corporation: Computer and Network Security Reference Index
  3. Paul Ashley - Information Security Database
  4. Defence Signals Directorate - Information Security Branch
  5. TNO-FEL's URLography on Information Security

Back to Top


single sign on Single Sign On

  1. SunWorld - Security made simple -- is single sign-on the answer? - April 1997
  2. SunWorld - Sun to include new single sign-on standard in Solaris 2.6 - April 1997
  3. Single Sign-On

Back to Top


standards Standards

  1. Index of IETF drafts and RFCs
  2. CDSA Fast Track
  3. ULB/STC: Index of X.400 documents
  4. Index of /reader/text/standards/X.400
  5. The FIPS Home Page
  6. FIPS 180-1 - Secure Hash Standard
  7. http://www.cs.auckland.ac.nz/~pgut001/pfx.txt
  8. ietf-smime

Back to Top


trust Trust Management

  1. Weaving a Web of Trust
  2. http://www.mcg.org.br/trustprop.txt
  3. Meta Certificate Group Home Page
  4. http://mcg.org.br/trustdef.txt
  5. DIMACS Workshop on Trust Management in Networks: Program
  6.  
  7. Back to Top

unix Unix

  1. Introduction to Unix
  2. Sun Microsystems Security Page
  3. BSDI

 

Back to Top

x 509 X.509

  1. http://www.cs.auckland.ac.nz/~pgut001/x509guide.txt
  2. Series X Recommendations : X.500 and up
Back to Top

 

Powered by POW Press