After several years of researching the world's internet traffic patterns, our MM-7 Labs discovered a unique set of testing models that led to the creation of our many different computer products & services. If it's connected to technology, we can provide assistance. Since the late 1990s, Mica Specialties has been deep in the design and development of all things technically related to the web. This journey helped us create many unique tools & resources for our internal use, and for those of our clients.
Our MM7 Labs provided extensive product research and validation for computer hardware and software, and it paved the way for our software, too. Currently, MM7 Labs is for our internal use only. Please take look at the many useful resources and articles by CERT. We have learned a whole lost from them over the past decade and continue to study up regularly.
Technology Resources by CERT
Latest Computer Software Threats - Technical Cyber Security Alerts by CERT
Vulnerability Resources
Protect Your Workplace - Posters and brochure with guidance on making your workplace a more secure environment.
Build Security In - Software assurance and software security information to help developers, architects, and security practitioners create secure systems.
CERT Technical Documents
Technical Information Paper: Coreflood Trojan BotnetThis
TIP provides an overview of the Coreflood Trojan Botnet as well
as mitigation strategies against this vulnerability-independent
malware.
Technical Information Paper: System Integrity Best PracticesRecommendations
for best practices to use to achieve system integrity through
software authenticity and the assurance of user identity.
Technical Information Paper: Cyber Threats to Mobile DevicesIntroduces
emerging threats likely to have a significant impact on mobile
devices and their users.
SQL InjectionThis
paper discusses the Structured Query Language (SQL) injection
attack technique and offers mitigation methods.
Combating Insider Threat - These web pages include surveys, case studies, podcasts, and more on mitigating insider threat.
Computer ForensicsDiscusses
the need for computer forensics to be practiced in an effective
and legal way, outlines basic technical issues, and points to
references for further reading.
The Continuing Denial of Service Threat Posed by DNS Recursion
(v2.0)US-CERT
has been alerted to an increase in distributed denial of service
(DDoS) attacks using spoofed recursive DNS requests. These
attacks are troublesome because all systems communicating over
the internet need to allow DNS traffic. This paper provides
information about configuring DNS servers to protect against
this threat.
Malware Threats and Mitigation StrategiesFocuses
on the rapidly growing problem of malicious code and provides
organizations with best practice defense tactics.
Malware Tunneling in IPv6Describes
Malware Tunneling and how to manage attacks.
National Strategy to Secure CyberspaceEngages
and empowers Americans to secure the portions of cyberspace that
they own, operate, control, or with which they interact.
Technical Trends in Phishing AttacksIdentifies
technical capabilities behind phishing attacks, reviews trends,
and discusses countermeasures.
The World Wide Web Consortium (W3C) is an international community where Member organizations, a full-time staff, and the public work together to develop Web standards. Led by Web inventor Tim Berners-Lee and CEO Jeffrey Jaffe, W3C's mission is to lead the Web to its full potential.
W3schools is the world's largest web developer site. They provide a vast amount of resources, learning tools, sample code, web building techniques, certifications and so much more. If you are looking for web design resources, you just found it!
Google Developers is now the place to find all Google developer documentation, resources, events, and products.
GitHub helps you build software better, together. Powerful collaboration, code review, and code management for open source and private projects.
Microsoft Leaning provides computer training for Microsoft products and technologies.
Use On Guard Online to report unwanted spam emails, learn about cyber crimes.