ISS
Note: CIAC no longer issues ISS Keys. Please contact Neil Larson at DOE HQ's via his
email address to request an ISS Key. Neil's email address is: neil.larson@hq.doe.gov
back to top
NID and SafePatch
NID products and support have been retired effective 6/11/04. The products are no longer available for distribution, and there are no other resources available for support.
SafePatch products and support have been retired effective 6/11/04. The products are no longer available for distribution, and there are no other resources available for support.
back to top
DISA INFOSEC Tools
For DoD Only: The DoD version of NID (called JIDS) is available to DoD entities and DoD contractors at the DISA INFOSEC Tools Distribution site. If you are a DoD entity, download JIDS from that location.
back to top
MPTC (Multi-Platform Trusted Copy)
Developed at Los Alamos National Laboratory (LANL) with DOE/NNSA support, Multi-Platform Trusted Copy is a cyber security software application used to review computer files for specific elements that can hide sensitive or harmful information. MPTC detects macros, intelligent agents, steganography (in jpeg files), embedded objects, hidden data streams, compressed or encrypted files, MS Word fields, and cropped pictures. MPTC also searches for user-supplied keywords and provides a function to open the file in its original application. MPTC produces a "cleansed" version of the file and provides for transfer of this "trusted copy" to a removable medium. MPTC also generates encrypted logs containing information about who conducted the review and when, what was found, and what information was transferred. For more information, visit the LANL Multi-Platform Trusted Copy web site.
back to top
IEBT v.1.01
IEBT is freely available to all U.S. DOE personnel and contractors. The current version was released on Setember 30, 2000. The distribution is password-protected to limit use within the authorized user communities.
back to top
Public Tools
Following is a collection of pointers to public domain, freely available software tools, and other information on the Internet. A collection based on the Security Tools and Techniques CD-ROM assembled for the 1994 FIRST conference by David Curry of Purdue University is also included.
back to top
Note: The tools described here are provided as-is and are for use at your own risk. Unless otherwise noted, no effort has been made to verify that the software is free from viruses, Trojan horses, or other forms of malicious programming. No effort has been made to verify that the software performs as its authors claim.
|