References

  1. Krzywinski, M. 2003. Port Knocking: Network Authentication Across Closed Ports. SysAdmin Magazine 12: 12-17.
  2. Ellen Messmer. Can software patching be automated?, Network World Fusion. May 24, 2004.
  3. Larry Seltzer. Multiple Vulnerabilities Found in Symantec Client Products. http://www.eweek.com/article2/0,1759,1591504,00.asp. May 12, 2004.
  4. Arno Wagner, Thomas D. Attack Analysis: Observation of the W32.Blaster Worm. http://www.tik.ee.ethz.ch/~ddosvax/attacks/blaster/
  5. Stanford University Information Technology Security Services. Year end/Year beginning report. http://www.stanford.edu/group/itss-ccs/security/FY02Security-status.pdf
  6. Ricketts, Camille. Hackers unleash new virus. http://daily.stanford.edu/daily/servlet/tempo? page=content&id=11670&repository=0001_article#. The Stanford Daily. August 21 2003.
  7. Sado, Whitney. Blaster worm strikes campus. http://daily.stanford.edu/daily/servlet/tempo? page=content&id=11884&repository=0001_article. The Stanford Daily. September 22 2003.
  8. Smith, Matt. Virus hits campus. http://daily.stanford.edu/daily/servlet/tempo? page=content&id=13965&repository=0001_article The Stanford Daily. April 26 2004.
  9. Shen, John. Gaobot virus continues to infect thousands of campus computers. http://daily.stanford.edu/daily/servlet/tempo? page=content&id=14040&repository=0001_article. May 3 2004.
  10. Wagner, Jim; Maraine, Ryan. Stanford's Linux supercomputers compromised. http://www.securesynergy.com/securitynews/newsitems/ 2004/apr-04/160404-05.htm. April 16 2004