About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Introduction to Hacking
Hack Attack
Hacker Zines
Hacking LANs, WANs, Networks, & Outdials
Magnetic Stripes and Other Data Formats
Software Cracking
Understanding the Internet
Legalities of Hacking
Word Lists
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Bibliography of Technical Papers on Computer Security


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
BIBLIOGRAPHY OF TECHNICAL PAPERS ON COMPUTER SECURITY

Note: This bibliography was prepared in 1988. A bibliography is
currently being developed that will encompass 1989.

ACCESS CONTROL

AUTHOR: Arsenault, Alfred W.

TITLE: Developments in Guidance for Trusted
Computer Networks

CATEGORY: Access Control
ORGANIZATION: National Computer Security Center
Ft. George G. Meade, MD
DESCRIPTION: Discusses the current status and
future plans for guidance in the area of trusted
computer networks.


AUTHOR: Branstad, Dennis K.

TITLE: Considerations for Security in the OSI
Architecture

CATEGORY: Access Control
ORGANIZATION: Institute for Computer Sciences
and Technology
National Institute of Standards
and Technology
Gaithersburg, MD 20899
DESCRIPTION: Discusses several goals of security
in the OIS architecture as well as where and how
the security services that satisfy them could be
implemented.

AUTHOR: Branstad, Dennis K.

TITLE: SP4: A Transport Encapsulation Security
Protocol

CATEGORY: Access Control
ORGANIZATION: National Institute of Standards and
Technology
DESCRIPTION: Discusses SDNS architecture that is
designed to satisfy the security requirements of
both classified and unclassified applications.

AUTHOR: Clyde, Allan R.

TITLE: Insider Threat Identification Systems

CATEGORY: Access Control
ORGANIZATION: A.R. Clyde Associates
10101 Grosvenor Place, #2006
Rockville, MD 20852
DESCRIPTION: Discusses basic components of a
insider threat identification system and how
internal surveillance affects such a system.

AUTHOR: Engelman, Captain Paul D.

TITLE: The Application of "Orange Book" Standards
to Secure Telephone Switching Systems

CATEGORY: Access Control
ORGANIZATION: Scott Air Force Base
IL 62225
DESCRIPTION: Discusses reference monitor concept
and provides the motivation for applying "Orange
Book" standards to telephone systems.

AUTHOR: Fellow, Jon, Hemenway, Judy, Kelem, Nancy
and Romero, Sandra
TITLE: The Architecture of a Distributed Trusted
Computing Base

CATEGORY: Access Control
ORGANIZATION: Unisys
2525 Colorado Blvd.
Santa Monica, CA 90405
DESCRIPTION: Explores the difference between
monolithic and distributed trusted computing bases,
using as an example an actual system.

AUTHOR: Halpern, Daniel J. & Owre, Sam

TITLE: Specification and Verification Tools for
Secure Distributed Systems

CATEGORY: Access Control
ORGANIZATION: Sytek, Inc.
1225 Charleston Road
Mountain View, CA 94043
DESCRIPTION: This paper examines the fields of
formal specification and verification, software
engineering support, and security.



AUTHOR: Johnson, Howard L. & Layne, Daniel J.

TITLE: A Mission - Critical Approach to Network
Security

CATEGORY: Access Control
ORGANIZATION: Computer Technology Associates, Inc.
7150 Campus Drive, Suite 100
Colorado Springs, CO 80918
DESCRIPTION: This paper presents an approach to
network security that treats sensitivity issues
independent of criticality issues to gain
architectural and economic advantage.


AUTHOR: Linn, John

TITLE: SDNS Products in the Type II Environment

CATEGORY: Access Control
ORGANIZATION: BBN Communications Corporation
Cambridge, MA
DESCRIPTION: This paper examines the ramifications
of communications security for the type II
environment and considers the role that SDNS can
play in satisfying that environments needs.


AUTHOR: Loscocco, Peter

TITLE: A Security Policy and Model for a MLS LAN

CATEGORY: Access Control
ORGANIZATION: Office of Research and Development
National Computer Security Center
9800 Savage Road
Ft. George G. Meade, MD 20755-6000
DESCRIPTION: This paper explains in detail the
MLS LAN implemented into the Department of
Defense Security Policy.


AUTHOR: Mizuno, Massaaki & Oldehoef, Arthur E.

TITLE: Information Flow Control in a Distributed
Object - Oriented System with Statically
Bound Object Variables
CATEGORY: Access Control
ORGANIZATION: Department of Computer Science
Iowa State University
Ames, Iowa 50011
DESCRIPTION: This paper presents a combined
approach of compile-time and run-time information
flow certification.

AUTHOR: Nelson, Ruth

TITLE: SDNS Services and Architecture

CATEGORY: Access Control
ORGANIZATION: Electronic Defense Communications
Directorate
GTE Government Systems Corporation
77 A Street, Needham, MA 02194
DESCRIPTION: This paper focuses on the protocols
and system architecture of the secure data network
system.

AUTHOR: Parker, T.A.

TITLE: Security in Open Systems: A Report on the
Standards Work of ECMA'S TC32/TG9

CATEGORY: Access Control
ORGANIZATION: ICL Defence Systems UK
DESCRIPTION: This paper addresses the topic of
access authorization and offers a uniform approach
which caters for a spectrum of access control
schemes ranging from capability systems to access
control lists.

AUTHOR: Rogers, Herbert L.

TITLE: An Overview of the Caneware Program

CATEGORY: Access Control
ORGANIZATION: National Security Agency - C6
Ft. George G. Meade, MD 20755
DESCRIPTION: The purpose of this paper is to
present an overview of the caneware program
functionality and its concern with communications
security.

AUTHOR: Schnackenberg, Dan

TITLE: Applying the Orange Book to an MLS LAN

CATEGORY: Access Control
ORGANIZATION: Boeing Aerospace Company
Mail Stop 87-06
P.O. Box 3999
Seattle, WA 98124
DESCRIPTION: This paper presents an overview of
Boeing's multilevel secure local area network and
a discussion of the issues that have arisen from
applying the DOD Trusted Computer System Evaluation
Criteria to this MLS LAN.

AUTHOR: Sheehan, Edward R.

TITLE: Access Control Within SDNS

CATEGORY: Access Control
ORGANIZATION: Analytics Incorporated
9821 Broken Land Parkway
Columbia, MD 21046

DESCRIPTION: This paper addresses the subject of
access control within the Secure Data Network
System and its fundamental elements.


AUTHOR: Tater, Gary L. & Kerut, Edmund G.

TITLE: The Secure Data Network System:
An Overview

CATEGORY: Access Control
ORGANIZATION: None Specified
DESCRIPTION: This paper discusses the rationale
and programmatic decisions for the Secure Data
Network System project.

AUTHOR: Teng, Henry S. & Brown, Dr. David C.

TITLE: An Expert System Approach to Security
Inspection of a VAX/VMS System in a
Network Environment
CATEGORY: Access Control
ORGANIZATION: Artificial Intelligence Research
Group
Computer Science Department
Worcester Polytechnic Institute
Worcester, MA 01609
DESCRIPTION: This paper addresses the development
of the XSAFE prototype expert system and its use
for computer security inspection of a VAX/VMS
system in a network environment.

AUDIT AND EVALUATION


AUTHOR: Lanenga, David

TITLE: Security Evaluations of Computer Systems

CATEGORY: Audit and Evaluation
ORGANIZATION: National Computer Security Center
9800 Savage Road
Ft. George G. Meade, MD 20755-6000
DESCRIPTION: This paper describes the process of
computer security evaluations as presently
performed by the National Computer Security Center.

CERTIFICATION


AUTHOR: Ferris, Martin & Cerulli, Andrea

TITLE: Certification: A Risky Business

CATEGORY: Certification
ORGANIZATION: National Security Agency
Ft. George G. Meade. MD 20755
DESCRIPTION: This paper addresses certification
in management terms, provides examples of
certification in everyday life, and examines ways
to maximize the use of national resources and
policies to achieve a certified AIS application.

CONTINGENCY PLANNING

AUTHOR: Judd, Thomas C. & Ward, Howard W. Jr.

TITLE: Return to Normalcy: Issues in Contingency
Planning

CATEGORY: Contingency Planning
ORGANIZATION: Federal Reserve System
Culpepper, Va
DESCRIPTION: This paper presents a "Cook Book"
approach as an effort to provide a kind of
checklist of things to do.


AUTHOR: Pardo, O.R.

TITLE: Computer Disaster Recovery Planning: A
Fast - Track Approach

CATEGORY: Contingency Planning
ORGANIZATION: Bechtel Eastern Power Corporation
15740 Shady Grove Road
Gaithersburg, MD 20877
(301) 258-4023
DESCRIPTION: This paper outlines a method of
implementing a contingency plan in a single,
relatively short effort.

DATA BASE MANAGEMENT

AUTHOR: Hale, Michael W.

TITLE: Status of Trusted Database Management
System Interpretations

CATEGORY: Data Base Management
ORGANIZATION: National Computer Security Center
9800 Savage Road
Ft. George G. Meade, MD 20755-6000
(301) 859-4452
DESCRIPTION: This paper addresses the rationale
and security issues that are unique to database
management systems.


AUTHOR: Henning, Ronda R. and Walker, Swen A.

TITLE: Data Integrity vs. Data Security: A
Workable Compromise

CATEGORY: Data Base Management
ORGANIZATION: National Computer Security Center
Office of Research and Development
9800 Savage Road
Ft. George G. Meade, MD 20755-6000
DESCRIPTION: This paper addresses the issue of
unauthorized modification of data and the
implementation of the current state of the art in
integrity policies.

AUTHOR: Knode, Ronald B.

TITLE: TRUDATA: The Road To a Trusted DBMS

CATEGORY: Data Base Management
ORGANIZATION: ORI/Intercom Systems Corporation
9710 Patuxent Woods Drive
Columbia, MD 21046
(301) 381-9740
DESCRIPTION: This paper describes the INTERCON
Trusted Data Base Management System, including
its development, guidelines, system architecture,
security policy, and implementation status.

AUTHOR: Rougeau, Patricia A. & Sturms, Edwards D.

TITLE: The SYBASE Secure Dataserver: A Solution
To The Multilevel Secure DBMS Problem

CATEGORY: Data Base Management
ORGANIZATION: TRW Federal Systems Group
2751 Prosperity Avenue
P.O. Box 10440
Fairfax, VA 22031
DESCRIPTION: This paper presents the Sybase Secure
Dataserver (SYSDS) approach to solving the problem
of a cost-effective, reliable multilevel secure
Database Management System (DBMS) without loosing
essential performance characteristics.

GENERAL SECURITY

AUTHOR: Taylor, Phillip H.

TITLE: The National Computer Security Center
Technical Guidelines Program
CATEGORY: General Security
ORGANIZATION: National Computer Security Center
9800 Savage Road
Ft. George G. Meade, MD 20755-6000
(301) 859-4452
DESCRIPTION: The purpose of this paper is to
provide a national computer security literature
base that distributes computer security knowledge
and techniques, instills an accepted computer
security terminology, and applies research to
practical problems of computer security.


PHYSICAL SECURITY & HARDWARE

AUTHOR: Saydjari, Sami O., Beckman, Joseph M. and
Leaman, Jeffrey R.
TITLE: Locking Computers Securely

CATEGORY: Physical Security & Hardware
ORGANIZATION: Office of Research and Development
National Computer Security Center
9800 Savage Road
Ft. George G. Meade, MD 20755-6000
DESCRIPTION: This paper describes the Logical
Coprocessing Kernal (LOCK) project and the need for
secure computing in both defense and industry.

PRIVACY

AUTHOR: Campbell, Marlene Dr.

TITLE: Security and Privacy: Issues of
Issues of Professional Ethics

CATEGORY: Privacy
ORGANIZATION: Murray State University
Murray, Kentucky 42071

DESCRIPTION: The purpose of this paper is to
provide academicians with both motivation and ideas
for bringing ethics formulation into the computer
information systems classroom.

AUTHOR: Denning, Dorothy E., Newmann, Peter G. and
Parker, Donn B.
TITLE: Social Aspects of Computer Security

CATEGORY: Privacy
ORGANIZATION: SRI International
333 Ravenswood Avenue
Menlo Park, CA 94025
DESCRIPTION: This papers objective is to examine
social aspects of computer security, particularly
with respect to some of the technologies being
developed.

RISK MANAGEMENT

AUTHOR: Moses, Robin H. and Clark, Rodney

TITLE: Risk Analysis and Management in Practice
for the UK Government The CCTA Risk
Analysis and Management Methodology: CRAMM

CATEGORY: Risk Management
ORGANIZATION: UK Central Computer and
Telecommunications Agency (CCTA)
Riverwalk House, 157-161 Millbank,
London, SW1P 9PN, England
DESCRIPTION: This paper discusses a risk analysis
and management methodology for Information
Technology (IT) Security developed by the UK
Government.


AUTHOR: Pinsky, Sylvan Dr.

TITLE: A Panel Discussion on Risk Management: A
Plan for the Future

CATEGORY: Risk Management
ORGANIZATION: Office of Research and Development
National Computer Security Center
9800 Savage Road
Ft. George G. Meade, MD 20755-6000
DESCRIPTION: This paper addresses a panel
discussion on the major issues of risk management
and the steps necessary to resolve the commonly
known problems.


SECURITY MANAGEMENT

AUTHOR: Arsenault, Alfred W.

TITLE: Advisory Memorandum on Office Automation
Security: An Overview

CATEGORY: Security Management
ORGANIZATION: National Computer Security Center
9800 Savage Road
Ft. George G. Meade, MD 20755-6000
(301) 859-4452
DESCRIPTION: This paper presents an overview of
National Telecommunications and Automated
Information Systems Security Advisory Memorandum
on Office Automation Security, which was issued
by COMPUSEC January 1987.


AUTHOR: Brown, Leonard R.

TITLE: Specification for a Canonical Configuration
Accounting Tool

CATEGORY: Security Management
ORGANIZATION: Computer Security Office, M1/055
The Aerospace Corporation
P.O. Box 92957
Los Angeles, CA 90009
DESCRIPTION: This paper describes the TCCS system
that has been designed as an aid in evaluation of
configuration accounting systems for use in
development of a secure system.


AUTHOR: Maria, Arturo PhD

TITLE: RACF Implementation at Puget Power

CATEGORY: Security Management
ORGANIZATION: Information Systems Consultant
DESCRIPTION: This document describes the approach
taken at Puget Sound Power and Light Company to
implement IBM's Resource Access Control Facility.


AUTHOR: Neugent, William

TITLE: Management Actions for Improving DoD
Computer Security
CATEGORY: Security Management
ORGANIZATION: The MITRE Corporation
HQ USAREUR, ODCSOPS
APO New York 09063
Tel. 011-49-6221-372710
DESCRIPTION: This paper focusses on the current
computer security practice in the field of the
Department of Defense computer security activities.


SOFTWARE & OPERATING SYSTEM SECURITY

AUTHOR: Addison, Katherine, Baron, Larry
Copple, Mark, Cragun, Don and
Hospers, Keith
TITLE: Computer Security at Sun Microsystems, Inc.

CATEGORY: Software & Operating System Security
ORGANIZATION: Sun Microsystems, Inc.
Mountain View, CA
DESCRIPTION: This paper describes the "Secure Sun
OS) product history, status, and goals. This paper
also describes some of Sun's future directions in
the secure systems marketplace.


AUTHOR: Bunch, Steve

TITLE: The Setuid Feature in UNIX and Security

CATEGORY: Software & Operating System Security
ORGANIZATION: Gould Computer Systems Divisions
1101 E. University
Urbana, Ill. 61801
(217) 384-8515
DESCRIPTION: This paper defines some important
terms with the SETUID/SETGID concepts and examines
some of the properties and uses of this mechanism.
It also examines some of the security implications
of this mechanism.

AUTHOR: Burger, Wilhelm

TITLE: Networking of Secure Xenix Systems

CATEGORY: Software & Operating System Security
ORGANIZATION: IBM Corporation Federal Systems
708 Quince Orchard Road
Gaithersburg, MD 20878
DESCRIPTION: This paper describes design and
implementation aspects of a network of Secure Xenix
systems.


AUTHOR: Castro, Lawrence

TITLE: An Overview of the DoD Computer Security
Research and Development Program
CATEGORY: Software & Operating System Security
ORGANIZATION: National Computer Security Center
9800 Savage Road
Ft. George G. Meade, MD 20755-6000
DESCRIPTION: The purpose of this paper is to
inform of the progress of and plans for the
research, development, testing, and evaluation
efforts by the Department of Defense Computer
Security Program.

AUTHOR: Craigen, Dan

TITLE: m-EVES

CATEGORY: Software & Operating System Security
ORGANIZATION: Research and Technology
I.P. Sharp Associates Limited
265 Carling Avenue, Suite 600
Ottawa, Ontario K1S 2E1 Canada
DESCRIPTION: This paper reports briefly upon the
progress of the m-EVES research and development
project. m-EVES is a prototype verification system
being developed by I.P. Sharp Associates Limited.


AUTHOR: Di Vito, Ben L. and Johnson, Larry A.

TITLE: A Gypsy Verifier's Assistant
CATEGORY: Software & Operating System Security
ORGANIZATION: TRW Defense Systems Group
One Space Park
Redondo Beach, CA 90278
DESCRIPTION: This paper describes an IR&D effort
underway at TRW to augment the gypsy verification
environment with a knowledge-based "verifier's
assistant."

AUTHOR: Eckman, Steven T.

TITLE: Ina Flo: The FDM Flow Tool

CATEGORY: Software & Operating System Security
ORGANIZATION: West Coast Research Center
System Development Group
Unisys Corporation
DESCRIPTION: This paper describes a new information
flow tool for the Ina Jo specification language.
The flow tool is being used for covert channel
analysis in ongoing A1 development projects.

AUTHOR: Guaspari, David, Harper, Douglas C. and
Ramsey, Norman
TITLE: An ADA Verification Environment

CATEGORY: Software & Operating System Security
ORGANIZATION: Odyssey Research Associates
1283 Trumansburg Road
Ithaca, New York 14850
(607) 277-2020
DESCRIPTION: This paper reviews and compares two
types of verification systems, PolyAnna and Anna.
A explanation of why these are suited to Ada
verification is included.

AUTHOR: Israel, Howard

TITLE: Computer Viruses: Myth or Reality?

CATEGORY: Software & Operating System Security
ORGANIZATION: National Computer Security Center
9800 Savage Road
Ft. George G. Meade, MD 20755-6000
DESCRIPTION: This paper addresses computer virus
defense by using protection mechanisms. It also
discusses possible protection mechanisms that
address the Trojan Horse threat.

AUTHOR: Joseph, Mark K.

TITLE: Towards the Elimination of the Effects of
Malicious Logic: Fault Tolerance
Approaches
CATEGORY: Software & Operating System Security
ORGANIZATION: Computer Science Department
University of California,
Los Angeles, CA
DESCRIPTION: This paper addresses two possible
effects of malicious logic, denial-of-service and
compromising data integrity. Presented are several
techniques that are designed to reduce the risk
posed by malicious logic.

AUTHOR: Kaufmann, Matt and Young, William D.

TITLE: Comparing Specification Paradigms for
Secure Systems: Gypsy and the Boyer-Moore
Logic

CATEGORY: Software & Operating System Security
ORGANIZATION: Institute for Computing Science and
Computer Applications
The University of Texas at Austin
Austin, Texas 78712
DESCRIPTION: This paper investigates the viability
of the Boyer-Moore logic as a specification
language for secure system modelling efforts by
comparing it to gypsy on a significant example.


AUTHOR: Knowles, Frank and Bunch, Steve

TITLE: A Least Privilege Mechanism for UNIX

CATEGORY: Software & Operating System Security
ORGANIZATION: Gould Computer Systems Division
1101 East University Avenue
Urbana, IL 61801
(217) 384-8500
DESCRIPTION: This paper describes a privilege
control mechanism for the UNIX operating system.
This system is designed to provide control over
access by users to services and objects.



AUTHOR: Pittelli, Paul A.

TITLE: The Bell-LaPadula Computer Security Model
Represented as a Special Case of the
Harrison-Ruzzo-Ullman Model

CATEGORY: Software & Operating System Security
ORGANIZATION: Department of Defense
DESCRIPTION: This paper describes a Bell-LaPadula
Model and an HRU model. It covers the access
control security that each has to offer.



AUTHOR: Rowe, Kenneth E. and
Ferguson, Clarence O.
TITLE: Ada Technology/COMPUSEC Insertion
Status Report

CATEGORY: Software & Operating System Security
ORGANIZATION: National Computer Security Center
Office of Research and Development
9800 Savage Road
Ft. George G. Meade, MD 20755-6000
DESCRIPTION: This report defines the problem of
developing same suite in Ada as a multilevel secure
(MLS) suite.


AUTHOR: Sibert, Olin W., Traxler, Holly M.
Downs, Deborah D. Dr. and Glass, Jeffrey
TITLE: UNIX and B2: Are They Compatible?

CATEGORY: Software & Operating System Security
ORGANIZATION: National Computer Security Center
9800 Savage Road
Ft. George G. Meade, MD 20755-6000
DESCRIPTION: This paper presents the results of a
study done on a prototype secure system assessing
the compatibility with the B2 assurance
requirements defined in the Trusted Computer System
Evaluation Criteria.



AUTHOR: Stoll, Cliff

TITLE: What Do You Feed a Trojan Horse?

CATEGORY: Software & Operating System Security
ORGANIZATION: Lawrence Berkeley Laboratory
Berkeley, CA 94720
DESCRIPTION: This paper addresses what to do when
you choose to track the penetration of a Trojan
Horse.

AUTHOR: Taylor, Tad and Hartman, Bret

TITLE: Formal Models, Bell and LaPadula, and
Gypsy

CATEGORY: Software & Operating System Security
ORGANIZATION: Research Triangle Institute
P.O. Box 12194
RTP, NC 27709
DESCRIPTION: This paper is an approach for
developing formal security models. It is
accompanied by a technique for expressing and
proving models in gypsy.

AUTHOR: Woodcock, Mark E.

TITLE: The Use of Ada in Secure and Reliable
Software
CATEGORY: Software & Operating System Security
ORGANIZATION: National Computer Security Center
Office of Research and Development
9800 Savage Road
Ft. George G. Meade, MD 20755-6000
DESCRIPTION: This paper describes the history of
Ada language and the current efforts to expand
to make it a secure reliable language.

AUTHOR: Young, Catherine L.
TITLE: Taxonomy of Computer Virus Defense
Mechanisms
CATEGORY: Software & Operating System Security
ORGANIZATION: Office of Research and Development
National Computer Security Center
9800 Savage Road
Ft. George G. Meade, MD 20755-6000
DESCRIPTION: This taxonomy aids in evaluating virus
defenses and provides a foundation for designing
new virus defenses.

TRAINING & AWARENESS

AUTHOR: Grandy, Patricia

TITLE: Department of the Navy Automated Data
Processing Security Program Training

CATEGORY: Training & Awareness
ORGANIZATION: Navy Regional Data Automation
Center San Francisco
NAS Alameda, CA 94501-5007
(415) 869-5300
DESCRIPTION: This document explains in detail the
training that is available for computer security
through the Department of the Navy.

AUTHOR: Markey, Elizabeth

TITLE: Getting Organizations Involved in Computer
Security: The Role of Security Awareness

CATEGORY: Training & Awareness
ORGANIZATION: Office of Information Systems
Security
Bureau of Diplomatic Security
U.S. Department of State
DESCRIPTION: This paper addresses the problem of
getting organizations aware and involved in
computer security through on-going training and
awareness programs aimed at employees at all
levels.

AUTHOR: Sohmer, Eliot

TITLE: The Computer Security Training Base of 1985

CATEGORY: Training & Awareness
ORGANIZATION: National Computer Security Center
9800 Savage Road
Ft. George G. Meade, MD 20755-6000
(301) 859-4452
DESCRIPTION: This paper outlines the recommended
training categories for personnel by the National
Computer Security Center in October of 1985.
 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Php
Withstanding an EMP
Good computer destroyer?
Wow, I never thought the navy would be so obvious.
Alternatives Internets to HTTP
Anti-Virus
a way to monitor someones AIM conversation
VERY simple question: browser history
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS