Services Winn Schwartau InfosecGate Home Site Map Contact
Interpact Security Awareness For Today's Business
Corporate Overview
Interpact's Services and Solutions
Security Awareness Training
Security Awareness Artwork
Interpact's Associates
Press Room
Contact Us
Winn Schwartau
Winn Schwartau: Speaker and Writer
Schwartau's Publications
Schwartau's  Schedule
Infosec Gateway

Security Awareness Promotional Art



Privacy Resources


The Vault is a Perl driven search engine designed to traverse a large information security database. Government Sites Federal Bureau of Investigation The mission of the NIPC is both a national security and law enforcement effort to detect, deter, assess, warn of, respond to, and investigate computer intrusions and unlawful acts, both physical and "cyber," that threaten or target our critical infrastructures. The NIPC's job is not simply to investigate and respond to attacks after they occur, but to learn about preventing them.



Commercial Version of PGP This is the commercial version of the Pretty Good Privacy package. PGP can be used to encrypt email documents and normal files using strong cryptography.

Privacy Software Corporation - Makers of NSClean, IEClean, BOClean and other privacy and security solutions since 1996.

Technotronic Features new and useful security tools and freeware products.

Zero Knowledge dedicated to providing our customers with the tools to protect their privacy and freedom while on the Internet. Our goal is to redefine identity on the Internet. Our customers will control their identities and the amount of information that is created, collected, and profiled about those identities. Our solution is to create authenticated digital pseudonyms that bear no necessary relation to the actual person behind them. This allows our users total freedom to express ideas, communicate and live in cyberspace.


Computer Security and Industrial Cryptography The goal of COSIC's research activities is to create an electronic equivalent for primitives in the physical world such as confidentiality, signatures, identification, anonymity, notarization, and payments. To achieve this goal, the research concentrates on the design, evaluation, and implementation of cryptographic algorithms and protocols, and on the development of security architectures for computer systems and telecommunications networks.

Crypto Law Survey This is a survey of existing and proposed laws and regulations on cryptography - systems used for protecting information against unauthorized access. Governments have long restricted export of cryptography for fear that their intelligence activities are hampered by the crypto use of foreign states and scoundrels. Since the rise of crypto use over the past decades, governments increasingly worry about criminals using cryptography to thwart law enforcement.

Erehwon's Crypto Links This is compilation of cryptography related sites. It includes links to Commercial Organizations, University Computer Sites, Cryptography & Security Newsgroups, Cryptography Books & Publications, Number Theory, Cryptographic Algorithms & Protocols, Cryptographers Home Pages, Cryptographic Software & Security Tools, ECC Elliptic Curve Cryptosystems, STU-III (Secure Telephone III), and a variety of other related topics.

Electronic Privacy Information Center (EPIC): a public interest research center. Tracks news and legislation on First Amendment, and constitutional issues of privacy.

Introduction to Cryptography People mean different things when they talk about cryptography. Children play with toy ciphers and secret languages. However, these have nothing to do with real security and strong encryption. Strong encryption is the kind of encryption that can be used to protect information of real value against organized criminals, multinational corporations, and major governments. Strong encryption used to be only military business; however, in the information society it has become one of the central tools for maintaining privacy and confidentiality.

Papers from Ross Anderson Over the last seven years, I have been involved in studying how computer security systems fail in real life. This is a prerequisite for building robust secure systems; many security designs are poor because they are based on unrealistic threat models. This work began with a study of automatic teller machine fraud, and then expanded to other applications as well.

PGP Timeline The topic of PGPs history seems to be fraught with controversy, and it is difficult for a new comer to discover the full story

Pretty Good Privacy Public Key in the U.S. and International Site

Popular Cryptography - The Journal of Internet Privacy If you're looking for electronic privacy information (including Private Idaho, TEMPEST, and PGP), you'll want to jump over to Popular Cryptography.

Python Cryptography Toolkit Home Page The Python Cryptography Toolkit is free software by Andrew Kuchling. Due to the USA's export restrictions, this site only has documentation. The toolkit, itself, is available via anonymous FTP in the directory [Visit-Source] RSA Security One of the leaders in cryptography software.

Snake Oil Warning Signs: Encryption Software to Avoid Good cryptography is an excellent and necessary tool for almost anyone. Many good cryptographic products are available commercially, as shareware, or free. However, there are also extremely bad cryptographic products which not only fail to provide security, but also contribute to the many misconceptions and misunderstandings surrounding cryptography and security.

Speak Freely is a Windows application that allows you to talk (actually send voice, not typed characters) over a network. If your network connection isn't fast enough to support real-time voice data, four forms of compression may allow you, assuming your computer is fast enough, to converse nonetheless.

Terry Ritters Papers on Cryptography For some reason, good cryptography is just much harder than it looks. This field seems to have a continuous flow of experts from other fields who offer cryptographic variations of ideas which are common in their other field. Ritters Crypto Glossary and Dictionary of Technical Cryptography Hyperlinked definitions and discussions of many cryptographic, mathematic, logic, statistics, and electronics terms used in cipher construction and analysis.


Center for Democracy and Technology The Center for Democracy and Technology works to promote democratic values and constitutional liberties in the digital age. With expertise in law, technology, and policy, CDT seeks practical solutions to enhance free expression and privacy in global communications technologies. CDT is dedicated to building consensus among all parties interested in the future of the Internet and other new communications media.

EFF Homepage - the Electronic Frontier Foundation: Large sections on digital identity and personal privacy on the internet. Privacy news.

The Global Internet Liberty Campaign advocates freedom of expression and privacy on the Internet Members of the coalition include the American Civil Liberties Union, the Electronic Privacy Information Center, Human Rights Watch, the Internet Society, Privacy International, the Association des Utilisateurs d'Internet, and other civil liberties and human rights organizations.

The Internet Society (ISOC) provides leadership in addressing issues that confront the future of the Internet, and is the organizational home for groups responsible for Internet infrastructure standards, including the Internet Engineering Task Force (IETF) and the Internet Architecture Board (IAB).

The Network Abuse Clearinghouse is intended to help the Internet community to report and control network abuse and abusive users.

Privacy Council Internet library on global privacy law and an extensive balanced link to privacy on the internet. Privacy Surveys with benchmarks.

Privacy International (PI) is a human rights group formed in 1990 as a watchdog on surveillance by governments and corporations. PI is based in London, England, and has an office in Washington, DC PI has conducted campaigns throughout the world on issues ranging from wiretapping and national security activities, to ID cards, video surveillance, data matching, police information systems, and medical privacy. - The Consumer Information Organization: Internet privacy issues, details and examples the information that is available to web sites when you visit and submit information by displaying yours.

Union for the Public Domain (UPD) is a nonprofit citizens group. Its mission is to protect and enhance the public domain in matters concerning intellectual property.


Attrition is a computer security Web site dedicated to the collection, dissemination and distribution of information about the industry for anyone interested in the subject. They maintain one of the largest catalogs of security advisories, cryptography, text files, and denial of service attack information. They are also known for the largest mirror of Web site defacements and their crusade to expose industry frauds and inform the public about incorrect information in computer security articles.

Fringe of the Web The Fringe of the Web has returned again. Started in 1994 by Bronc Buster and Silicon Toad, as a ring of only the best, or 'fringe,' underground and computer security sites. Users may vote on which site is the best, bringing the quality sites to the top and slowly eliminating the lacking sites. The Fringe is run by the community, for the community.

Help Net Security has been online since October 1998. From the initial site that was conceived as a download archive, the site grew into a daily updated security related news site with lots of additional content.

The HNC Network is a ongoing project working to provide a common ground between developers, administrators, IT/IS Professionals and the common everyday web surfer. We provide a ever-growing archive of tools [ IDS, portscanning, encryptions, crackers, *nix distributions and utilities, etc. ], a wide selection of reading material and guides to secure, protect, and disseminate attacks to your network. We assist people, in their personal education on security, programming, protocols and even neophyte oriented materials.

The Text File Warehouse At the text file warehouse not only do we provide text files for reading online, but we provide over 30 categories packed with text files and currently hold over 3,000 files in our archive. Our mission is to provide the Internet the largest database of computer and Internet related text files available. Our staff members search the net and BBS'S daily and retrieve thousands of files for your viewing.

TESO is an international group of young and motivated computer programmers and security enthusiasts. With more than one dozen members specialized in the network security field they do spend a lot of time in research and development of new vulnerabilities and exploitation tools that are useful to both 'hackers' and security professionals.

Underground Security Systems Research USSR has many homegrown exploits and advisories, encryption resources, and much more.

Wiretrip A compilation of security related information and tools as presented by Rain Forest Puppy

w00w00 (WSD), with 30+ active members, is currently the largest nonprofit security team in the world. w00w00 was created a little under two years ago and has since grown rapidly. They have members on three continents, and in eight countries (Australia, Canada, France, Russia, United Kingdom, Netherlands, Sweden, Germany, and 11 states (USA). Each member is diverse in his or her abilities, location, and ethnicity. Our major affiliations include (in no particular order) eEye Digital Security, CW Security Research, Bindview Development Inc., Roses Labs, ADM, Technotronic, rfp.labs, Napster Inc.,, and


Active Privacy: to protect your personal information while you use the Internet.

Anonymous on the Internet (CNIL) Everything you ever wanted to know about the way you are traced on the net, including environment variables, cookies, cache memory and log file demonstrations. Shows you the traces you leave there and explains you how it works.

Collection of PC and Privacy News Articles: Newspaper articles and websites dealing with the legal and social implications of computer surveillance.

Cyber Defenders: privacy solutions in the computer age: Provides checklists and advice for protecting personal and business privacy on the internet.

CyberSpace Law Lessons: 13 chapters of this site are dedicated to the law and privacy. - Software called "Freedom" protects the privacy of web browsing and email, without the user having to do anything. Site also has news on Internet privacy and other issues.

FutureNet, DoubleClick and the Failed Prank: mplications of the "DoubleClick Information Alliance", the use of the Abacus consumer database and what you should do to ensure online privacy.

Internet privacy issues: Collection of articles on a variety of issues.

Internet privacy software: Freedom(R) internet privacy software allows for anonymous surfing online to protect your personal interests.

NovuWeb, Inc.: This paper provides an approach to e-consumer information which enables online corporations to find and use the trends/patterns in their data without ever releasing any identifiable personal information.

Online Privacy Alliance: - A group of corporations and associations who cooperate to promote business-wide actions to promote individuals' privacy online.

Online Privacy Resources - Compendium of links concerning online anonymity and cryptography

P3P or Platform for Privacy Preferences Project, protocol for privacy protection on the Web.

P3P FAQ: - Answers to frequently asked questions about data privacy and P3P; from Computer Professionals for Social Responsibility.

Privacy & security on the internet for free: How to surf anonymously, how to disable cookies, how not to be tracked, free internet access, proxies.

Privacy and Spying on the Internet: Documents and explains privacy issues on the internet and offers solutions.

Privacy in Cyberspace: The privacy offered by ordinary internet services is very limited, as this page shows.

Privacy on the Internet: (Bob Sherman) Computers collect information about every aspect of your life. Without taking precautions, your activities can be recorded and matched up with databases of your other activities.

Privacy Resources: Issues affecting privacy, security, anonymity, and encryption on the internet.

Privacy Rights Clearinghouse: Nonprofit consumer education and advocacy project.

Security and Privacy: Online privacy and anonymity tips. Internet safety, protecting online privacy, virus prevention, web security and e-mail tips.

TinHat: - Security and privacy issues for Internet users.

WebParanoia and Internet Privacy Solutions: protecting internet privacy using anonymous proxies, ad blocking software, encryption and secure file deletion.

WebVeil.Com: Internet users' privacy and what can be done to control cookies and keep Web surfing anonymous.

What does your browser tell about you? Shows some information about the user's current internet connection. Requires JavaScript.




JunkBusters  "Most junk doesn't find you by accident. It's carefully targeted based on information about you held in what we call junk databases. Our free web-based service, JUNKBUSTERS DECLARE, makes it easy to just say no by drafting letters for you to all the major list vendors.  Our extensive guide explains how direct marketers get and sell your name, and other ways to tell them not to disclose the information they keep about you. Be aware that as you browse the Web, junk data about you is being collected with your every mouseclick. Some is even stored in your own files as cookies. Our free software package, the Internet Junkbuster, stops cookies and helps you stay anonymous." - Anonymity services like Remailer list, Mixmaster list and Chain reliability rankings.

Secure Text: A free service that allows text to be made secret in such a form that it still passes through most firewalls. It does not need software installed and can be used direct from the web site.

Synnergy Networks - Freeware Security Solutions

WebFaucet: - Premium ISP service providing tools and environments that give members control of their personal information from the moment they connect to the Internet.



Copyright © 2000-2001 Interpact, Inc. All Rights Reserved
For comments about this page, contact: Kelley Walker, Interpact, Inc.
Copyright PolicyPrivacy Policy

Interpact Inc Security Awareness

Check out our FREE security awareness promotional art.  Download your copies today!