Huseby, Sverre H. Innocent Code: A Security Wake-up Call for Web Programmers, West Sussex: John Wiley & Sons, 2003.
Shimomura, Tsutomu; Markoff, John.
Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw- by the Man Who Did It, New York: Hyperion, 1996.
Stoll, Cliff. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage, New York: Simon & Schuster, 1989.
Malware.Com: We stole the ActiveX shell/link/HTA exploit from http://www.malware.com
The Wayback Machine: Old images of the l0pht web site are available at
http://www.archive.org
Wiki: Project TICOM: A footnote in the Wikipedia discussion of the history
of Cryptography, available at http://en.wikipedia.org/wiki/TICOM
Insecure Wireless Access at DNC Convention: A
fun article alluding to accidental association tricks, available at http://www.internetweek.com/allStories/showArticle.jhtml?articleID=23905152
Sweetypig, JoMoKun, grunch, Phenfen, Fizzgig, Eyebiter, Shrdlu, Xam, Monster Magnet, CoffeeWars, dc-stuff, #dc-stuff, WI2600
This page is maintained by Foofus. Please direct comments and questions to
foofus <at> foofus.net.