lotus



previous page: Secure Sockets Layer Discussion List FAQ
  
page up: Security
  
next page: Security Info

Vendor Security Contacts FAQ



Frequently Asked Questions about vendor security contacts.

This FAQ about vendor security contacts was compiled and written by Christopher Klaus cklaus@iss.net with numerous contributions by others.

Copyright

This paper is Copyright (c) 1994, 1995, 1996
by Christopher Klaus of Internet Security Systems, Inc.

Permission is hereby granted to give away free copies electronically. You may distribute, transfer, or spread this paper electronically. You may not pretend that you wrote it. This copyright notice must be maintained in any copy made. If you wish to reprint the whole or any part of this paper in any other medium excluding electronic medium, please ask the author for permission.

Acknowledgements

Thanks go to the following people for providing new or updated information to be included in this FAQ:

* Dave Millar for helping provide a portion of the information.
* (Walter Misar) misar@rbg.informatik.th-darmstadt.de
* Steve Cooper, spcooper@llnl.gov

-01 Introduction (computer-security/vendor-contacts FAQ)
It [Vendor Security Contact FAQ] is the kind of thing that ...
-02 A/UX (Vendor Security Contacts)
Contact information for A/UX as follows:...
-03 Cray Research (Vendor Security Contacts)
Contact information for Cray Research as follows:...
-04 DG, Data General Corporation (Vendor Security Contacts)
Contact information for DG is as follows:...
-05 DEC, Digital Equipment Corporation (Vendor Security Contacts)
Contact information for DEC is as follows:...
-06 HP, Hewlett Packard (Vendor Security Contacts)
Contact information for HP as follows:...
-07 IBM, International Business Machines (Vendor Security Contacts)
Contact information for IBM as follows:...
-08 Novell, Inc. (Vendor Security Contacts)
Contact information for Novell as follows:...
-09 Motorola (Vendor Security Contacts)
Contact information for Motorola is as follows:...
-10 NeXT (Vendor Security Contacts)
Contact information for Next as follows:...
-11 SCO (Vendor Security Contacts)
Contact information for The Santa Cruz Operation (SCO):...
-12 SGI - Silicon Graphics Incoporated (Vendor Security Contacts)
Contact information for SGI as follows:...
-13 Sun (Vendor Security Contacts)
Contact information for Sun as follows:...
-14 CIAC (Computer Incident Advisory Capability) (Other Security Contacts)
The CIAC (Computer Incident Advisory Capability) of DoE. To report ...
-15 FIRST (Forum of Incident Response and Security Teams) (Other Security Contacts)
FIRST (Forum of Incident Response and Security Teams). To report ...









TOP
previous page: Secure Sockets Layer Discussion List FAQ
  
page up: Security
  
next page: Security Info