Civil Consulting and Training 
Civil in Name, Civil in Service 

Encryption

IPSEC

Administrator's Guide to Microsoft L2TP-IPSec VPN Client
Connection Security and IPsec
Description of the IPSec policy created for L2TP-IPSec
Download details Server and Domain Isolation Demo
How To Configure IPSec Tunneling in Windows Server 2003
How to create offline L2TP-IPSec Certificates
IETF documents about IPSEC
Microsoft documents on IPSec

Other

. General Purpose Hash Function Algorithms - By Arash Partow .
Block Ciphers (part 1)
Block Ciphers
CertCities.com Column BitLocker Drive Encryption in Windows Vista
Download details Deployment of IEEE 802.1X for Wired Networks Using Microsoft Windows
How does SSL work Step 1 - Determine Encryption Method
PGP Education Series The Dawn of Pervasive Encryption.
Protecting Data by Using EFS to Encrypt Hard Drives
Restore Access to EFS-Encrypted Files
RSA Laboratories - What is a block cipher
Securing Your Online Data Transfer with SSL
SecurStar, Disk Encryption Software Solutions - Home
SSL Certificates - Secure Your Data & Transactions - Go Daddy
SSL Certificates, Wildcard SSL. Get Free SSL Certificates from RapidSSL
Using Efsinfo.exe to determine information about encrypted files
What is a Stream Cipher
. General Purpose Hash Function Algorithms - By Arash Partow .
ASE Labs Articles - Cryptography Part 1 - Why Cryptography
BitLocker Drive Encryption in Windows Vista
Block Ciphers (part 1)
Block Ciphers
Description of the IPSec policy created for L2TP-IPSec
Download details Server and Domain Isolation Demo
http--www.crackpassword.com-products-prs-mswin-efs-
IETF documents about IPSEC
IPsec and L2TP implementation in Windows 2000
IPSec Best practices Internet Protocol Security (IPsec)
PGP Education Series The Dawn of Pervasive Encryption.
Protecting Data by Using EFS to Encrypt Hard Drives
q86 What is a Stream Cipher
RSA Laboratories - 2.1.4 What is a block cipher
Russian researchers achieve 100-fold increase in WPA2 cracking speed - Security and the Net
Securing Your Online Data Transfer with SSL
SSL-TLS in Windows Server 2003
Straightforward Explanation of SSL and HTTPS
Using Efsinfo.exe to determine information about encrypted files

Firewalls

Check Point Firewall
Cisco PIX Firewall Software - Support - Cisco Systems
Download details Forefront Protection Server Script Kit
Download details Microsoft Internet Security and Acceleration (ISA) Server Best Practices Analyzer (BPA) Tool
Firewall Shopping 101
Intelligent Application Gateway 2007
Internet Security and Acceleration Server Home page
Introduction to Network Access Protection
ISA Firewall Fairy Tales - What Hardware Firewall Vendors Don't Want You to Know (v1.02)
Jim Harrison's ISA Tools Repository
Microsoft ISA Server Firewall Resource Site Articles & Tutorials
Network Access Protection
Network Access Quarantine Control in Windows Server 2003
Picking the Right Firewall -- Redmondmag.com
Q&A What's new with Microsoft identity and access management
Setting up ISA Server 2004 for secure RPC communications
Six steps for deploying Network Access Quarantine Control
Support for the Windows Server 2003 Network Access Quarantine Control feature in ISA Server 2006 and in ISA Server 2004
TechNet Magazine Using Microsoft Forefront TMG 2010 as a Secure Web Gateway
Windows Server 2008 R2 Security and Policy Enforcement

General

'Mafiaboy' spills the beans at IT360 on underground hackers
Blocking Unwanted Parasites with a Hosts File
Browsing the Web and Reading E-mail Safely as an Administrator, Part 2
Employee awareness The missing link - Computerworld
Hardening the TCP-IP stack to SYN attacks Symantec Connect
How to gather host-level data with Network Miner
How to harden the TCP-IP stack against denial of service attacks in Windows Server 2003
IBM Security Solutions Threat Mitigation Products
ICSA Labs
IDG Connect AnalyzeAir Wi-Fi Spectrum Analyzer Free Trial Software
Information security policies for the midmarket
McAfee Network User Behavior Analysis
Metasploit 3.1 updates improve Windows penetration testing
Microsoft Security Computer Security Malicious Software
Modifying and writing custom Snort IDS rules
Network Security Articles for Windows Server 2003, 2008 & Vista
NIST.gov - Computer Security Division - Computer Security Resource Center
Open Source Security Testing Methodology Manual
Responding to IT Security Incidents
SANS Top 20 Internet Security Attacks
screencast Nessus
Security Certified Program - Certifications
Security Configuration Guides - NSA-CSS
Security Tools - Detection Assessment Management Malware Protection
Security Watch The Most Misunderstood Windows Security Setting of All Time
Service overview and network port requirements for the Windows Server system
ShellRunas
Snort Home Page
Steve Riley on Security
The Center for Internet Security
Welcome to ISSA.org

Guides

2007 Microsoft Office Security Guide
A pre-implementation Windows 7 security guide for enterprises
Download details 2007 Microsoft Office Security Guide
Download details Microsoft Exchange Server 2003 Operations Guide
Download details Microsoft Operations Manager 2005 Security Guide
Download details Security Guide Scripts Download
Download details Windows Server 2003 PKI Operations Guide
Download details Windows Server 2003 Security Guide
Download details Windows Server 2008 Security Guide
Download details Windows Vista Security Guide
Security Guide for Operations Manager 2007 R2
Services and Service Accounts Security Planning Guide
Windows Server 2008 Security Baseline
Windows Server 2008 Security Guide Executive Overview
Windows Server 2008 Security Guide

Permissions and Rights

AccessEnum
BeyondTrust Application Rights Auditor
BeyondTrust Eliminate Admin Rights
Download NCS Z-tools.he ACLView 1.4.104.17 Freeware
Efsinfo Overview File and Storage Services
How IT Works NTFS Permissions, Part 2
How IT Works NTFS Permissions
SystemTools.com - Windows NT-2000-XP-2003 System Management Software

Security - Passwords

Account Passwords and Policies in Windows Server 2003
Audit security policies, examine network security and recover account passwords
BioID AG Home
Bypass BIOS Passwords Password Recovery and Resetting How-To's
Cain & Abel is a password recovery tool for Microsoft Operating Systems
Cain & Abel password recovery tool
Download details Account Lockout and Management Tools
How To Reset the Directory Services Restore Mode Administrator Account Password in Windows Server 2003
KerbCrack consists of two programs, kerbsniff and kerbcrack
KerbCrack
Kerberos Authentication Technical Reference Logon and Authentication
Kerberos for the Busy Admin - Ask the Directory Services Team - Site Home - TechNet Blogs
kerberos The Network Authentication Protocol
Lockpicking - by Deviant Ollam
Microsoft Identity and Access Management Series
New Windows security tool protects users from keyloggers XecureCK
Offline NT Password & Registry Editor
RADIUS Protocol Security and Best Practices
Rainbow Crack Limited
Rainbow Crack
RainbowCrack Project - Crack Hashes with Rainbow Tables
Step-by-step guide Cracking network passwords
The Essentials of Replacing the Microsoft Graphical Identification and Authentication Dynamic Link Library
Welcome to MCSE Support

Tools

Centralized event log monitoring and management.
Download details SubInACL (SubInACL.exe)
Download details Windows® Defender
Endpoint Protection, Antivirus Software, Email & Anti-Malware Protection - Sunbelt Software
EventSentry Real-Time Event Log Monitoring Consolidation Suite
Foundstone Network Security - Risk Management - Free Tools
Google your Windows security vulnerabilities
How to Google hack Windows servers
How to run a Nessus system scan
KNOPPIX is a bootable Live system on CD or DVD
Microsoft Baseline Security Analyzer MBSA Legacy Product Support
Nessus 3 Tutorial
Nmap - Free Security Scanner For Network Exploration & Security Audits.
NTI - Computer Forensics and Security Software
Patch Management, Configuration Management, Application Control, Power Management - Shavlik Technologies
Penetration Testing The Metasploit Project
Protect IIS with the URLScan Security Tool
SpectorSoft - Spector
Sysinternals Suite
The Strider GhostBuster Project
Vulnerability Management, Assessment, Penetration Testing SAINT
Wireshark · Go deep.
wsus - Windows Server Update Services Wiki

Wireless

802.1X Authenticated Wired and Wireless Access
Download details IEEE 802.11 Wireless LAN Security with Microsoft Windows
Download details Secure Wireless Access Point Configuration
Fending off VoIP security problems - Computerworld
How To Building a BlueSniper Rifle - Part 1 - SmallNetBuilder
How To Crack WEP - Part 1 Setup & Network Recon - SmallNetBuilder
How To Sniffing the Air - SmallNetBuilder##
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system
Light Reading - Service Provider IT - Hackers Say Wireless Is Weak - Telecom News Analysis
VoIP Security Learning Guide
WEP Cracking...Reloaded - SmallNetBuilder
What is 802.1X
Wireless Attacks and Penetration Testing (part 1 of 3) Symantec Connect
Wireless Provisioning Services Overview
Wirelessdefence.org (aircrack-ng)