badBIOS Information http://arstechnica.com/security/2013/10/meet-badbios-the-mysterious-mac-...
Buffer Overflows http://en.wikipedia.org/wiki/Buffer_overflow http://www.linuxjournal.com/article/6701
Ultrasonic Communication http://alumni.media.mit.edu/~wiz/ultracom.html
The Ken Thompson Hack http://c2.com/cgi/wiki?TheKenThompsonHack http://cm.bell-labs.com/who/ken/trust.html
Obfuscating Code http://newsroom.ucla.edu/portal/ucla/ucla-computer-scientists-develop-24...
The Two Generals Problem http://en.wikipedia.org/wiki/Two_Generals%27_Problem
Rethinking the Computer http://www.nytimes.com/2012/10/30/science/rethinking-the-computer-at-80....
ACM RISKS-LIST http://catless.ncl.ac.uk/Risks
Securing Debian http://www.debian.org/doc/manuals/securing-debian-howto/
Securing Ubuntu http://www.andrewault.net/2010/05/17/securing-an-ubuntu-server/ http://www.computerworld.com/s/article/9002691/Tips_on_keeping_your_Ubun...
PHP Trojans / Shells http://www.localroot.net/ http://r57.gen.tr/ http://xavsec.blogspot.com/2006_09_01_archive.html
Wordpress http://smackdown.blogsblogsblogs.com/2008/06/24/how-to-completely-clean-... http://codex.wordpress.org/Hardening_WordPress
Malware Analyst's Cookbook http://www.malwarecookbook.com/
Metasploit http://en.wikipedia.org/wiki/Metasploit_Project http://metasploit.com/
Password Security https://www.grc.com/haystack.htm http://rumkin.com/tools/password/passchk.php http://world.std.com/~reinhold/diceware.html http://www.abs-comptech.com/home/headlines/news/calculating-password-pol... https://wiki.mozilla.org/WebAppSec/Secure_Coding_Guidelines#Password_Sto...
Web Security Testing http://en.wikipedia.org/wiki/WebScarab http://en.wikipedia.org/wiki/Soapui