DataMuseum.dk

Presents historical artifacts from the history of:

DKUUG/EUUG Conference tapes

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about DKUUG/EUUG Conference tapes

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download
Index: T r

⟦22c095b88⟧ TextFile

    Length: 4640 (0x1220)
    Types: TextFile
    Names: »refs.t«

Derivation

└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen
    └─⟦eed360c96⟧ »./papers/SRI-report/sri-report.troff.tar.Z« 
└─⟦9ae75bfbd⟧ Bits:30007242 EUUGD3: Starter Kit
    └─⟦eed360c96⟧ »EurOpenD3/security-doc.tar.Z« 
        └─⟦53b1903f6⟧ 
            └─⟦this⟧ »security-doc/refs.t« 

TextFile

.bp
.if e \{\
	\&
.	bp
.\}
.SH
REFERENCES
.IP [Eich89] 1.0i
Eichin, Mark W., and Jon A. Rochlis.
.I "With Microscope and Tweezers:"
.I "An Analysis of the Internet Virus of November 1988" .
Massachusetts Institute of Technology.
February 1989.
.IP [Elme88] 1.0i
Elmer-DeWitt, Philip.
`` `The Kid Put Us Out of Action.' ''
.I Time ,
132 (20): 76,
November 14, 1988.
.IP [Gram84] 1.0i
Grammp, F. T., and R. H. Morris.
``\s-1UNIX\s0 Operating System Security.''
.I "\s-1AT&T\s0 Bell Laboratories Technical Journal" ,
63 (8): 1649-1672, October 1984.
.IP [Hind83] 1.0i
Hinden, R., J. Haverty, and A. Sheltzer.
``The
.SM DARPA
Internet: Interconnecting Heterogeneous Computer Networks with Gateways.''
.I "\s-1IEEE\s0 Computer Magazine" ,
16 (9): 33-48,
September 1983.
.IP [McLe87] 1.0i
McLellan, Vin.
.SM NASA "" ``
Hackers: There's More to the Story.''
.I "Digital Review" ,
November 23, 1987, p. 80.
.IP [Morr78] 1.0i
Morris, Robert, and Ken Thompson.
``Password Security: A Case History.''
.I "Communications of the \s-1ACM\s0" ,
22 (11): 594-597, November 1979.
Reprinted in
.I "\s-1UNIX\s0 System Manager's Manual" ,
4.3 Berkeley Software Distribution.
University of California, Berkeley.
April 1986.
.IP [NCSC85] 1.0i
National Computer Security Center.
.I "Department of Defense Trusted Computer System Evaluation Criteria" ,
Department of Defense Standard \s-1DOD\s0 5200.28-\s-1STD\s0,
December, 1985.
.IP [Quar86] 1.0i
Quarterman, J. S., and J. C. Hoskins.
``Notable Computer Networks.''
.I "Communications of the \s-1ACM\s0" ,
29 (10): 932-971,
October 1986.
.IP [Reed84] 1.0i
Reeds, J. A., and P. J. Weinberger.
``File Security and the \s-1UNIX\s0 System Crypt Command.''
.I "\s-1AT&T\s0 Bell Laboratories Technical Journal" ,
63 (8): 1673-1683,
October 1984.
.IP [Risk87] 1.0i
.I "Forum on Risks to the Public in Computers and Related Systems" .
.SM ACM
Committee on Computers and Public Policy,
Peter G. Neumann, Moderator.
Internet mailing list.
Issue 5.73, December 13, 1987.
.IP [Risk88] 1.0i
.I "Forum on Risks to the Public in Computers and Related Systems" .
.SM ACM
Committee on Computers and Public Policy,
Peter G. Neumann, Moderator.
Internet mailing list.
Issue 7.85, December 1, 1988.
.IP [Risk89a] 1.0i
.I "Forum on Risks to the Public in Computers and Related Systems" .
.SM ACM
Committee on Computers and Public Policy,
Peter G. Neumann, Moderator.
Internet mailing list.
Issue 8.2, January 4, 1989.
.IP [Risk89b] 1.0i
.I "Forum on Risks to the Public in Computers and Related Systems" .
.SM ACM
Committee on Computers and Public Policy,
Peter G. Neumann, Moderator.
Internet mailing list.
Issue 8.9, January 17, 1989.
.IP [Risk90] 1.0i
.I "Forum on Risks to the Public in Computers and Related Systems" .
.SM ACM
Committee on Computers and Public Policy,
Peter G. Neumann, Moderator.
Internet mailing list.
Issue 9.69, February 20, 1990.
.IP [Ritc75] 1.0i
Ritchie, Dennis M.
``On the Security of \s-1UNIX\s0.''
May 1975.
Reprinted in
.I "\s-1UNIX\s0 System Manager's Manual" ,
4.3 Berkeley Software Distribution.
University of California, Berkeley.
April 1986.
.IP [Schu90] 1.0i
Schuman, Evan.
``Bid to Unhook Worm.''
.I "\s-1UNIX\s0 Today!" ,
February 5, 1990, p. 1.
.IP [Seel88] 1.0i
Seeley, Donn.
.I "A Tour of the Worm" .
Department of Computer Science,
University of Utah.
December 1988.
.IP [Spaf88] 1.0i
Spafford, Eugene H.
.I "The Internet Worm Program: An Analysis" .
Technical Report
.SM CSD-TR -823.
Department of Computer Science,
Purdue University.
November 1988.
.IP [Stee88] 1.0i
Steele, Guy L. Jr., Donald R. Woods, Raphael A. Finkel, Mark R. Crispin,
Richard M. Stallman, and Geoffrey S. Goodfellow.
.I "The Hacker's Dictionary" .
New York: Harper and Row, 1988.
.IP [Stei88] 1.0i
Stein, Jennifer G., Clifford Neuman, and Jeffrey L. Schiller.
``Kerberos: An Authentication Service for Open Network Systems.''
.I "USENIX Conference Proceedings" ,
Dallas, Texas,
Winter 1988,
pp. 203-211.
.IP [Stol88] 1.0i
Stoll, Clifford.
``Stalking the Wily Hacker.''
.I "Communications of the \s-1ACM\s0" ,
31 (5): 484-497, May 1988.
.IP [Stol89] 1.0i
Stoll, Clifford.
.I "The Cuckoo's Egg" .
New York: Doubleday, 1989.
.IP [Sun88a] 1.0i
Sun Microsystems.
.I "Sun\s-1OS\s0 Reference Manual" ,
Part Number 800-1751-10,
May 1988.
.IP [Sun88b] 1.0i
Sun Microsystems.
.I "System and Network Administration" ,
Part Number 800-1733-10,
May 1988.
.IP [Sun88c] 1.0i
Sun Microsystems.
.I "Security Features Guide" ,
Part Number 800-1735-10,
May 1988.
.IP [Sun88d] 1.0i
Sun Microsystems.
``Network File System: Version 2 Protocol Specification.''
.I "Network Programming" ,
Part Number 800-1779-10,
May 1988,
pp. 165-185.