alt.security
Compromise FAQ
 - What do to do if your Unix machine is compromised by an intruder.
 
comp.security
Firewalls
Firewalls
 - Introduction, commercial vendors, design decisions, proxy servers, reasonable filtering rules for a Cisco, WWW/DNS/FTP/telnet/finger/whois/gopher/archie/X with firewalls, source routed traffic, ICMP redirects, denial of service.
 
INTAC
Kerberos
PGP
PGP (Usenet)
PGP 2.62 Buglist
RSA
Ssh (Secure Shell) FAQ