Geometry.Net - the online learning center
Home  - Basic_C - Crime Investigation Articles & Pub

e99.com Bookstore
  
Images 
Newsgroups
Page 2     21-40 of 86    Back | 1  | 2  | 3  | 4  | 5  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Crime Investigation Articles & Pub:     more detail

21. Harvard Business Online
documents matching your search for term 1 = crime. HBR OnPoint articles includethe fulltext HBR In 1992, a corruption investigation and two assassinations
http://harvardbusinessonline.hbsp.harvard.edu/b02/en/includes/browse/topic_brows

22. CRIMINAL JUSTICE
(Quarterly) STATE W7 7 S99. Uniform crime Reports for the United States. Washington,DC Bureau of investigation, US Dept. INDEXES TO JOURNAL articles.
http://www.wcu.edu/library/research/social/criminaljustice_bib.htm
Research Tools Unique to Hunter Library About Hunter Library Home CRIMINAL JUSTICE
Selected Library Sources and Web Sites
Bibliographies Directories Indexes to Journal Articles Statistics ... WCU Department of Criminal Justice
Criminal Justice Information: How to Find it, How to Use it. Phoenix, AZ : Oryx Press, 1998.
REF HV 7419.5 .C75 1998 Directory of Criminal Justice Information Sources. Washington : National Institute of Justice, U.S. Dept. of Justice.
GOVT REF J 28.20: Nelson, Bonnie R. Criminal Justice Research in Libraries and on the Internet. Westport, CT : Greenwood Press, 1998.
REF HV 7419 .Z9 N45 1997 O'Block, Robert L. Criminal Justice Research Sources. Cincinnati, OH : Anderson Pub. Co., 1992.
REF HV 7419 .Z9 O24 1992
Axelrod, Alan. Cops, Crooks, and Criminologists: An International Biographical Dictionary of Law Enforcement.
REF HV 7911 .A1 A94 1996

23. ATF Online
Youth crime Gun Interdiction Initiative for 17 Communities on Fire Research for FireInvestigation November 1997. Part 26, Liquors and articles from Puerto
http://www.atf.gov/pub/
x
Explosives, Bomb Threat and Detection Resources
Distribution Center Order Form Convert PDF to text Send Feedback ...
Click here
if you are having problems viewing PDF files.
General ATF Publications

Treasury Publications
Firearms and Explosives Publications Arson and Fire Publications ... Procedures
General ATF Publications
Back to top 2001 Accountability Report 2000 Accountability Report 1999 Accountability Report ... 1995 Highlights of the Bureau of Alcohol, Tobacco and Firearms
Treasury Publications
Back to top Gun Crime in the Age Group 18-20 (6/99) Gun Shows: Brady Checks and Crime Gun Traces (1/99) Department of the Treasury Study on the Sporting Suitability of Modified Semiautomatic Assault Rifles (4/98) ... Progress Report - Study of Marking, Rendering Inert, and Licensing of Explosive Materials (Taggant Study) (97)

Firearms and Explosives Publications
Back to top YCGII Reports Youth Crime Gun Interdiction Initiative - Crime Gun Trace Reports (2000) - National Report Youth Crime Gun Interdiction Initiative - Crime Gun Trace Reports (1999) - National Report Youth Crime Gun Interdiction Initiative for 27 Communities 1998 Youth Crime Gun Interdiction Initiative for 17 Communities 1997 Publications ATF P 9000.4 - Firearms Commerce in the United States, 2001/2002

24. Security Archive - Category: /pub/doc/law+ethics
Attorney's Office Hi Tech / Computer crime Team has material How to conduct your investigationand gather the import and export of defense articles and services
http://www.cs.purdue.edu/coast/archive/data/categ26.html
Category Index: /pub/doc/law+ethics
No Pointing!
This WWW page was generated automatically. Link makers should not point their links to this page. If you must, please make a link to the search entry point William J. Cook, Network Law Update: February 1995
Abstract: This paper details recent events in computer crime: theft, copywrite infringement, loss of privacy, pronorgaphy, and fraud. Cases and ongoing investigations are cited throughout. Also cited are the legality of several types of computer monitoring.
EFF, EFF Files on Cryptography
Abstract: Cryptography issues and files from the EFF.
Simson Garfinkel, Security Article Extracts Legalities
Abstract: This article attempts to broadly cover questions of computer security in the small business or law firm. Because of its objectives, this article is not a step-by-step guide on how to make a law firm computer more secure: Instead, this article hopes to acquaint the reader with the issues involved so that the reader may then be able to analyze systems on a case-by-case basis and recognize when outside assistance is required.
Eugene H. Spafford

25. Easyspace-your Perfect Partner For The Web
published by Breedon Books, as well as numerous magazine and newspaper articles.His interest in true crime was kindled by his investigation of the
http://www.tangled-web.co.uk/crimedigests/digests02/breedenbau02.html
File Updated: 28/09/02 Breeden Books Pub JULY-SEPT 2002
Diane Canwell Women Who Shocked the Nation Published September 2002 by Breeden Books Pub at £14.99 ISBN: 1859832873
Diane Canwell
has written more than 30 books in the last 12 years. Women Who Shocked The Nation was inspired by a research trip to the Metropolitan Police Museum in London, where Diane encountered the case history of Styllou Christofi. Diane was born and raised in Norfolk and is a former college lecturer. She now works as a full-time writer, living in Suffolk with another Breedon Books author, Jon Sutherland. She is currently working on a number of educational projects, books for children and some newspaper and magazine articles.
New Books by Diane Canwell at Amazon.co.uk
Used Books at ABE
Author Title Keyword Publisher
Jonathon Sutherland Unsolved Victorian Murders Published September 2002 by Breeden Books Pub at £14.99 ISBN: 1859832865
In Unsolved Victorian Murders Jack the Ripper appears alongside less well-known but equally fascinating characters. Did Madeleine Smith poison her lover with arsenic in a cup of cocoa? How did a blind man in Bristol throw his younger, fitter rival through a narrow window? What really happened in the woods of the Ardlamont estate in Scotland the morning Cecil Hambrough was shot? Read the stories, examine the evidence and decide for yourself.
Jon Sutherland is the author of over 80 books, including '

26. National Crime Information Center (NCIC) - FBI Information
a delinquent act that would be a crime if committed assigned by the Federal Bureauof investigation to an E. Article File Unrecovered stolen articles will be
http://www.fas.org/irp/agency/doj/fbi/is/ncic.htm
FAS Intelligence Agencies Justice ... Join FAS
Federal
Bureau of
Investigation
National Crime Information Center (NCIC)
    National Crime Information Center
    Criminal Justice Information Services (CJIS) Division
    1000 Custer Hollow Road
    Clarksburg, West Virginia 26306
    Hours of Service: 9:00 a.m. - 5:00 p.m.
    Telephone: (304) 625-2000
NCIC is a computerized index of criminal justice information (i.e.- criminal record history information, fugitives, stolen properties, missing persons). It is available to Federal, state, and local law enforcement and other criminal justice agencies and is operational 24 hours a day, 365 days a year. PURPOSE: The purpose for maintaining the NCIC system is to provide a computerized database for ready access by a criminal justice agency making an inquiry and for prompt disclosure of information in the system from other criminal justice agencies about crimes and criminals. This information assists authorized agencies in criminal justice and related law enforcement objectives, such as apprehending fugitives, locating missing persons, locating and returning stolen property, as well as in the protection of the law enforcement officers encountering the individuals described in the system. ACCESS CONSTRAINTS: All records in NCIC are protected from unauthorized access through appropriate administrative, physical, and technical safeguards. These safeguards include restricting access to those with a need to know to perform their official duties, and using locks, alarm devices, passwords, and/or encrypting data communications.

27. Criminal Justice Resources Resources: Hate Crime
articles or Publications. ways for police to offer effective support to hate crimevictims and the community throughout the investigation and prosecution
http://www.lib.msu.edu/harris23/crimjust/hate.htm
CRIMINAL JUSTICE RESOURCES
Hate Crime and Cult, Hate, Fringe, or Militia Groups Web Sites Articles and Publications Web Sites ADL Online
http://www.adl.org/

The web page of the Anti-Defamation League. Since part of ADL's mission if fighting anti-Semitism, they often collect information about various hate or fringe groups.
(Last checked 11/13/02) American Psychological Association
Public Policy Office
Hate Crimes Page

http://www.apa.org/ppo/issues/phatecrime.html

APA positions, congressional briefings and testimony, etc.
(Last checked 11/13/02) Charles Manson
http://www.crimelibrary.com/manson/mansonmain.htm
Contains biographical information on the cult leader, an overview of the 1969 California "Helter Skelter" murders and profiles of the victims, information on the subsequent investigation and trial, updates on members of "the family" (including Lynette "Squeaky" Fromme, "convicted of attempting to assassinate President Gerald L. Ford in 1975"), and bibliography. From The Crime Library. (Last checked 01/07/03) Civilrights.org Hate Crime Page

28. DevASP Computer Forensics : Incident Response Essentials Book - 0201707195
Computer Forensics Incident Response Essentials byAddisonWesley pub Co Release levelUnix functionality in the process of a computer crime investigation.
http://www.devasp.com/store/shop2948/pd0201707195/Books_and_Software/Books/Hardw
Home Search Articles Discussion Forums ... Member Login Active Users: 95 Home Add Your Articles Book Store Software Store ...
More Partners >>

Product Search:
All Products Books Magazines Popular Music Classical Music Video DVD Computer Games Video Games Electronics Software Outdoor Living Kitchen Housewares Wireless Phones Computers Outlet Shopping Store Books Hardware

Enlarge image
...
Computer Forensics : Incident Response Essentials

Rating: List price: Our price: You save: Buy Used From by Addison-Wesley Pub Co
Release Date: 26 September, 2001
Sales rank:
Catalog:
Book
Media: Paperback
Author: Warren G. Kruse II, Jay G. Heiser Good intro to computer forensics For those who are more comfortable in a command-line setting, Computer Forensics does a good job of detailing how to use low-level Unix functionality in the process of a computer crime investigation. Chapter 3, "The Basics of Hard Drives and Storage Media," provides a good overview of what really goes on inside a hard drive. The chapter includes a good section on how criminals use unallocated space on a hard drive for data storage that is often missed by forensic examiners. Chapters 8 through 11 examine the details of Windows and Unix system investigations. The two operating systems are obviously different, so the examiner must know how to perform the specific tasks in each environment.

29. History And Doctrines Of Heretical Nichiren Buddhist Sects
an illegal organization, his crime might be After thorough investigation, HigashiMurayama Police Station None of tabloids apologized their mistaken articles.
http://members.aol.com/nichiheret/masatomo_yamazaki/ldp.htm
Yamazaki, Liberal Democratic Party and Tabloids In Shakyamuni's time. Devadatta flattered King Ajase and using the power of the king, Devadatta tried to kill Shakyamuni to take over the Buddhist order. Shkyamuni's disciples united together and fought back. Finally, Devadatta lost his followers, and subsequently, King Ajase repent his sins and became the follower of Shakyamuni. Thus, Devadatta lost everything and died in a hellish condition. Yamazaki, who identified himself as "Devadatta of the Heisei Era," flattered the Liberal Democratic Party (LDP), which has been in power for the past 5 decades, and attacking Soka Gakkai. We know that he is on the way to hell, but he would take everyone, whom he has associated with, to hell, too. 1. In an Attempt to Escape from his Arrest Yamazaki's Seahorse Co. bankrupted in April with a debts of 4,500,000,000Yen. Then, Yamazaki blackmailed Soka Gakkai again for 500,000,000 Yen. This time, Soka Gakkai accused Yamazaki for his crime (6/5) and fired him from the attorney position. Yamazaki started a smoke-screen campaign. He attempted to create an atmosphere that Soka is an illegal organization. He hoped that such atmosphere would make Yamazaki himself "A man of Justice" and consequently, his crime might be reduced. Yamazaki hid himself and wrote 14 articles anonymously attacking Soka Gakkai in tabloids. Then, using his real name wrote another 19 articles in tabloids. All articles were skillfully fabricated to make him a man of justice. Through these articles, he attempted to escape the arrest.

30. LIAR, CAJOLER AND SCHEMER Masatomo Yamazaki And Soka Gakkai
198081 Yamazaki wrote several articles in tabloid time, his Request for the investigation became a is a unprecedented malicious crime.” Yamazaki appealed
http://members.aol.com/nichiheret/masatomo_yamazaki/shoshin.htm
SHOSHIN-KAI 1. TIMELINE Yamazaki became Soka Gakkai attorney. Yamazaki obtained a land from Taisekiji with an unusually cheep price. He sold it to a paper company which he created, and re-sold it to Soka Gakkai, to gain a profit of 450,000,000 Yen. Yamazaki schemed battles between Nichiren Shoshu and Soka Gakkai, and attempted to control both. Myokan-kai, a young active priest’s group, started criticize Soka Gakkai. Yamazaki started using “Tabloid journals” to criticize Soka Gakkai anonymously. Yamazaki wrote anonymously a letter titled, “a letter from a believer” and submitted to HP Nittatsu. This letter fabricated that Soka Gakkai was going to take over the priesthood, and emphasized that the priesthood has to fight to control Soka Gakkai. Active young priests were raged and attacked Soka Gakkai in every OKO meetings. Yamazaki wrote anonymously in tabloids that Soka Gakkai had inscribed 8 Gohonzon in 1974. The truth of the matter was that it was the transcription of old paper Gohonzon to wood to perpetuate the Gohonzon. The plan was approved by HP Nittatsu. General Administrator of Nichiren Shoshu, Fujimoto, testified that it was the case. But Yamazaki fabricated as if Soka Gakkai made its own Gohonzon so that he could agitate young priests even more. In order to settle the situation and protect HP Nittatsu, Soka Gakkai returned these Gohonzon. Yamazaki forced President Ikeda to apologize HP Nittatsu; President Ikeda did not have to, but for the sake of protecting HP Nittatsu, Presidnt Ikeda formally appologized HP Nittatsu.

31. Pathfinder On Forensic Sciences - The Advocate: March 2001
for the Application of Pathology to crime investigation. crime Scenes and Blood Spatter. By Lawrence Renner of journals and articles, bibliographic assistance
http://dpa.state.ky.us/library/advocate/mar01/library.html
Kentucky Department of Public Advocacy Library PATHFINDER ON: FORENSIC SCIENCES The following is a listing of the library's resources relating to the physical aspects of forensic sciences. The library also has many publications dealing with forensic mental issues. Please contact one of the librarians for help in locating books on mental evaluations. BROWSING AREAS: The DPA uses the Library of Congress classification system. In general, books relating to forensic issues can be found in several areas. These are 1) books relating to general investigation techniques (HV 8073 - HV 8079), 2) books relating to the use of scientific evidence (KF 8961) and 3) books discussing various medical descriptions of forensics (RA 1057 - RA 1121). BOOK LIST: Books owned by DPA may be checked out by individuals in any field office. Persons outside of DPA wishing to borrow DPA owned books may be allowed to do so on a case-by-case basis. DPA employees wishing to borrow a book owned by another field office will need to contact that field office directly.
  • Advanced Forensic Criminal Defense Investigations Located in the Trial Division Director's Office.

32. Virginia Institute Of Forensic Science And Medicine: Forensic Training For Crime
Overview of nonprofit organization, providing education and training programs for professionals dealing with crime or death scene investigation. articles, glossary, bulletin board for alumni, and calendar for courses in Richmond, VA.
http://www.vifsm.org/

the web's foremost forensics site
in the news: forensic science solves mystery
Recently, author Patricia Cornwell (above) starred at a VIFSM benefit reading where more than 400 crime fiction fans gathered to hear about her two-year, multi-million dollar quest for the Ripper detailed in her latest New York Times best-seller, The Search for Jack the Ripper - Case Closed.
2002 In Review :: Forensics in the Headlines
NEW - VIFSM Secure Online Area for Donations, Course Registration and Payment
Convenient and easy to use, the secure area protects privacy and makes a donation to VIFSM, or participation in our Forensic Training, easy to do.
Find for first time visitors and others, including:
Or go directly to VIFSM's secure online area and login.

forensic training news:
2003 forensic training program schedule
The 3-day forensic training seminar at Virginia Beach's Founder's Inn , April 1-3, is one of five forensic training courses in 2003.
Part A, Aug. 6-8, Richmond

33. SJSU Library- Library Research In Administration Of Justice
Uniform crime Reports for the United States. (Washington, DC Federal Bureau of investigation,1930 .) ref For magazine articles you can consult the Reader's
http://www.library.sjsu.edu/subject/administration_of_justice/researchguide.htm
Library Research Guide in Administration of Justice Subject Guides Databases A-Z
INTRODUCTION
RESEARCH GUIDES ... GUIDES FOR PREPARING TERM PAPERS
INTRODUCTION
Books marked "CLK ref" are located on the first floor of the Clark Library. Since they are not checked out, these books are available for consultation at any time. Reference books are usually designed to give answers to specific, basic questions; they include such things as dictionaries, encyclopedias, bibliographies, directories and the like. Listed below you will find selected examples of reference books that may be useful to a student of administration of justice. This is by no means a complete list; a Reference Librarian can show you how to find out what others are available.
RESEARCH GUIDES
Books such as these give detailed explanations on how to find information and do library research in a particular subject field. They also include bibliographic information and descriptions of important books, indexes and other resources in that subject. Several are available for Administration of Justice although they are now a little dated. Nelson, Bonnie R., et al.

34. Detective Columbo As Theologian - Robert Zerhusen
home modRef radio pub conf Catalog. First, there is a murder, leading to a policeinvestigation. The initial explanations of the crime make sense but are
http://www.alliancenet.org/pub/articles/zerhusen.columbo.html
Detective Columbo As Theologian A hypothetical description of the kinds of questions and overlooked details that Columbo might contribute if he investigated the "other tongues" of Acts 2.
Robert Zerhusen
To dig deeper into this subject, you can order Zerhusen's three lecture series, "A New Look At Tongues" (available on cassette in the Alliance on-line resource catalog here on this website). In these three tapes, Zerhusen presents his thesis of the meaning of tongues in the Book of Acts, as well as in 1 Corinthians. The final lecture is a presentation of the history and practice of tongues throughout church history. One of the most popular fictional characters is Television Detective Columbo. Columbo uses the "scientific method" (i.e., asking questions. gathering data, testing theories) to arrive at solutions. Columbo episodes usually follow a set pattern. First, there is a murder, leading to a police investigation. The initial explanations of the crime make sense but are invariably wrong. Columbo begins by making observations and asking questions. His questions are innocuous at first. The questions then become irritating as he brings out problems with the initial explanations. For the person who has committed the crime, Columbo becomes a nuisance. Towards the end of the episode our beloved detective always brings out some "forgotten factor", an overlooked detail which clearly points to the correct explanation of the crime.

35. W&D | Publications | Articles
articles. BACK. Disclosure of the Results of an Internal investigation Source Reprintedwith permission from The White Collar crime Reporter Author(s
http://www.wiggin.com/pubs/articles.asp
Articles
Search Index
Client Alerts Advisories News ... Articles Search by Keyword
Melinda A. Agsten
September 23, 2002 Section 501(c)(3) Organizations, Intermediate Sanctions, and Reasonable Compensation: A Primer
Source
Author(s)
Melinda A. Agsten
January 15, 2002 Suggestions and Checklist for Review of Hospital Contracts
Author(s) Melinda A. Agsten
Erika L. Amarante
November 6, 2002
Source : Matthew Bender Antitrust Report , Fall 2002 Author(s) Erika L. Amarante Robert M. Langer Suzanne E. Wachsstock Bethany L. Appleby October 13, 2002 Interim Relief: Preserving Franchise Goodwill During Termination Proceedings Source : Reprinted with Permission of the Franchise Law Journal (American Bar Association), Volume 22, Number 2, Fall 2002 Author(s) Bethany L. Appleby August 29, 2002 Underwater project struggles for air Source Author(s) Bethany L. Appleby James P. Ball February 12, 2003 Source Author(s) James P. Ball Peter M. Wendzel John W. Barnett November 11, 1999 Property Taxation in Connecticut Author(s) John W. Barnett Kenneth F. Baum February 6, 2002

36. MacPháidín Library - Criminal Justice Guides
articles on legal, political, and historical relationship of to society; includingcrime prevention, crime causation, and G., ed. New York Garland pub., 1995.
http://www.stonehill.edu/library/Reference/subjects/CriminalJusticeGuide.htm

Online Catalog
Staff Electronic Resources Subject Guides ... Library Home
CRIMINAL JUSTICE
Subject Guide
This guide is designed to help you with your research. The Reference Librarians are also available to assist you. You can either come by the Reference Desk on the 1st floor, or call 508-565-1203. REFERENCE SOURCES For background information, definitions, and basic facts, consult the following encyclopedias, dictionaries, and sourcebooks located in the Reference section on the first floor. Reference items are for use only in the library. Research Guides Criminal Justice Research in Libraries, Strategies and Resources . Lutzher, Marilyn. New York: Greenwood, 1986. REF HV 7419 L87.
A research guide that discusses primary and secondary sources, different types of sources, research techniques, and how to use the library. Finding Criminal Justice (in the library) :A Student Manual of Information Retrieval and Utilization Skills . Tucker, Dennis C. Bristol, Ind. : Wyndham Hall Press.

37. Computer Forensics : Incident Response Essentials
Department Book Media Paperback Manufacturer/publisher AddisonWesley pub Co ReleaseDate Not the end all, be all of computer crime investigation, but a damn
http://www.growinglifestyle.com/prod/0201707195.html
GARDENING HOME IMPROVEMENT PESTS PETS ... SHOP
Computer Forensics : Incident Response Essentials
by Warren G. Kruse II Jay G. Heiser
more like this
List Price: Amazon.com Price: Used from $22.95 Availability: Usually ships within 24 hours
Other stores: Canada UK Germany France
Department: Book
Media: Paperback
Manufacturer/Publisher: Addison-Wesley Pub Co
Release Date: 26 September, 2001
Sales rank: 5,873
Related Products:
Incident Response: Investigating Computer Crime
Intrusion Signatures and Analysis
Customer Reviews:
Average customer rating:
Great Computer Forensics and Incident Response guide
This book is an excellent resource for anyone who is responsible for computer incident investigation and response, as well as anyone who performs computer forensic examinations. It describes a sound scientific method of preservation and analysis of computer data evidence, and covers DOS/Windows, Unix-based, and MacIntosh systems. In addition, the experience of the authors is shared in describing the presentation of data evidence in court. The flow charts and sample forms help to clarify the methods and techniques of forensic examinations and incident response. This book is an essential addition to the computer professional's library.
A Much Needed Primer
Good intro to computer forensics
C(4892533) Prices in US Dollars, and are subject to change until ordered.

38. Roma Rights / Nr2 2000 -- Snapshots From Around Europe
Prosecuting discrimination and hate crime in the Czech motivated damage to healthunder articles 221(1 case returned to the police for a fresh investigation.
http://www.errc.org/rr_nr2_2000/snap17.shtml
cover contents editorial snapshots from around Europe ... chronicle
snapshots from around Europe
Prosecuting discrimination and hate crime in the Czech Republic
On May 24, 2000, police in the northern Moravian town of Orlová reconstructed the killing of a local Romani man, in a new attempt to establish responsibility for his death. Mr Milan Lacko was attacked by a group of skinheads outside the local U Málky pub in May 1998, and left unconscious in a road, where he was later run over and killed (see “Snapshots from around Europe”, Roma Rights , Spring 1998 and Roma Rights , Number 2, 1999). A local court originally exonerated the skinheads of responsibility for his death, accepting the state prosecutor’s claim that responsibility for Mr Lacko’s death lay with the driver of a lorry, whom police had failed to locate. In October 1998, four skinheads were found guilty of damage to health and racially motivated damage to health under Articles 221(1) and 221(2b) and disturbing the peace under Article 202(1) and were given suspended sentences. The verdict led to outrage in the Romani community, and was later overruled by a court of appeal and the case returned to the police for a fresh investigation. On the nights of May 24 and May 25, 2000, the police of Karvina enacted a four hour long reconstruction of the death of Mr Lacko at the

39. Crime 2002/11: CRIME FW: [Cyber_threats] Daily News 11/04/02
offer more details on the investigation, nor did cooperate with law enforcement infighting cyber crime. www.washingtonpost.com/wpdyn/articles/A46872-2002Oct31
http://lists.jammed.com/crime/2002/11/0004.html
CRIME FW: [Cyber_threats] Daily News 11/04/02
From: George Heuston ( GeorgeH@private
Date: Mon Nov 04 2002 - 10:17:04 PST
  • Next message: Lyle Leavitt: "CRIME [Fwd: [Information_technology] Daily News 11/04/02]"
    • Previous message: T. Kenji Sugahara: "CRIME OT: Election"
    • Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] ... http://www.washingtonpost.com/wp-dyn/articles/A46872-2002Oct31.html October 31, Cisco Cisco Security Advisory: Cisco ONS15454 and Cisco ONS15327. Cisco announced that multiple vulnerabilities exist in the Cisco ONS15454 optical transport platform and the Cisco ONS15327 edge optical transport platform. All Cisco ONS software releases earlier than 3.4 are vulnerable. The ONS hardware is managed via the TCC, TCC+, TCCi or the XTC control cards which are usually connected to a network isolated from the Internet and local to the customer's environment. This limits the exposure to the exploitation of the vulnerabilities from the Internet. There are workarounds available to mitigate the effects of these vulnerabilities, which are posted on Cisco's website. Cisco is also offering free software upgrades to address these vulnerabilities for all affected customers. Source: http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml
  • 40. EFF Topics: Censorship
    http//www.eff.org/Censorship/apple_cdrom_revisionism.articles. by encrypted filesin a recent child porn investigation. to make it a crime to desecrate the
    http://www.eff.org/issues/censorship/

    A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

    Page 2     21-40 of 86    Back | 1  | 2  | 3  | 4  | 5  | Next 20

    free hit counter