Vulnerability Information and Resources

The Internet is probably the best place to turn to for vulnerability information. A hacker will find an open port on your computer and research all the possible vulnerabilities that are associated with that open port. Hundreds of Web sites, mailing lists, and other forums discuss computer vulnerabilities. Table 10.2 highlights some of these resources. Regardless of your existing security experience, you should consult these resources on a regular basis to stay abreast of the latest security developments.

Table 10.2. Security Web Sites and Mailing Lists
Web SiteLocationDescription
Security Focushttp://www.securityfocus.comSecurity site containing news tools, mailing lists, and a wide variety of security-related ...

Get Privacy Defended: Protecting Yourself Online now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.