The World Wide Web Consortium (W3C) is an international community where Member organizations, a full-time staff, and the public work together to develop Web standards. Led by Web inventor Tim Berners-Lee and CEO Jeffrey Jaffe, W3C's mission is to lead the Web to its full potential.
W3schools is the world's largest web developer site. They provide a vast amount of resources, learning tools, sample code, web building techniques, certifications and so much more. If you are looking for web design resources, you just found it!
Google Developers is now the place to find all Google developer documentation, resources, events, and products.
GitHub helps you build software better, together. Powerful collaboration, code review, and code management for open source and private projects.
Microsoft Leaning provides computer training for Microsoft products and technologies.
DreamSpark is a Microsoft Program that supports technical education by providing access to Microsoft software for learning, teaching and research purposes.
Use On Guard Online to report unwanted spam emails, learn about cyber crimes.
After several years of researching the world's internet traffic patterns, our MM-7 Labs discovered a unique set of testing models that led to the creation of our many different computer products & services. If it's connected to technology, we can provide assistance. Since the late 1990s, Mica Specialties has been deep in the design and development of all things technically related to the web. This journey helped us create many unique tools & resources for our internal use, and for those of our clients.
Our MM7 Labs provided extensive product research and validation for computer hardware and software, and it paved the way for our software, too. Currently, MM7 Labs is for our internal use only. Please take look at the many useful resources and articles by CERT. We have learned a whole lost from them over the past decade and continue to study up regularly.
Technology Resources by CERT
Latest Computer Software Threats - Technical Cyber Security Alerts by CERT
Protect Your Workplace - Posters and brochure with guidance on making your workplace a more secure environment.
Build Security In - Software assurance and software security information to help developers, architects, and security practitioners create secure systems.
CERT Technical Documents
Technical Information Paper: Coreflood Trojan BotnetThis TIP provides an overview of the Coreflood Trojan Botnet as well as mitigation strategies against this vulnerability-independent malware.
Technical Information Paper: System Integrity Best PracticesRecommendations for best practices to use to achieve system integrity through software authenticity and the assurance of user identity.
Technical Information Paper: Cyber Threats to Mobile DevicesIntroduces emerging threats likely to have a significant impact on mobile devices and their users.
SQL InjectionThis paper discusses the Structured Query Language (SQL) injection attack technique and offers mitigation methods.
Combating Insider Threat - These web pages include surveys, case studies, podcasts, and more on mitigating insider threat.
Computer ForensicsDiscusses the need for computer forensics to be practiced in an effective and legal way, outlines basic technical issues, and points to references for further reading.
The Continuing Denial of Service Threat Posed by DNS Recursion (v2.0)US-CERT has been alerted to an increase in distributed denial of service (DDoS) attacks using spoofed recursive DNS requests. These attacks are troublesome because all systems communicating over the internet need to allow DNS traffic. This paper provides information about configuring DNS servers to protect against this threat.
Malware Threats and Mitigation StrategiesFocuses on the rapidly growing problem of malicious code and provides organizations with best practice defense tactics.
Malware Tunneling in IPv6Describes Malware Tunneling and how to manage attacks.
National Strategy to Secure CyberspaceEngages and empowers Americans to secure the portions of cyberspace that they own, operate, control, or with which they interact.
Technical Trends in Phishing AttacksIdentifies technical capabilities behind phishing attacks, reviews trends, and discusses countermeasures.