1. Krzywinski, M. 2003. Port Knocking: Network Authentication Across Closed Ports. SysAdmin Magazine 12: 12-17.
  2. Ellen Messmer. Can software patching be automated?, Network World Fusion. May 24, 2004.
  3. Larry Seltzer. Multiple Vulnerabilities Found in Symantec Client Products.,1759,1591504,00.asp. May 12, 2004.
  4. Arno Wagner, Thomas D. Attack Analysis: Observation of the W32.Blaster Worm.
  5. Stanford University Information Technology Security Services. Year end/Year beginning report.
  6. Ricketts, Camille. Hackers unleash new virus. page=content&id=11670&repository=0001_article#. The Stanford Daily. August 21 2003.
  7. Sado, Whitney. Blaster worm strikes campus. page=content&id=11884&repository=0001_article. The Stanford Daily. September 22 2003.
  8. Smith, Matt. Virus hits campus. page=content&id=13965&repository=0001_article The Stanford Daily. April 26 2004.
  9. Shen, John. Gaobot virus continues to infect thousands of campus computers. page=content&id=14040&repository=0001_article. May 3 2004.
  10. Wagner, Jim; Maraine, Ryan. Stanford's Linux supercomputers compromised. 2004/apr-04/160404-05.htm. April 16 2004