Reference Guide 73Dictionaries of Computer Terminologynews.com.com/2547-1001_3-0-5.xmlCNET News Enterprise Hardware Feednews.com.com/2547-1009_3-0-5.xmlCNET News Security Feednews.com.com/2547-1035_3-0-5.xmlCNET News Networking FeedFun Feedswww.wired.com/news/feeds/rss2/0,2610,,00.xmlWired top storieswww.wired.com/news/feeds/rss2/0,2610,3,00.xmlWired technology storieswww.wired.com/news/feeds/rss2/0,2610,2,00.xmlWired culture storieswww.wired.com/news/feeds/rss2/0,2610,4,00.xmlWired political storiesdwlt.net/tapestry/dilbert.rdfDaily Dilbertdwlt.net/tapestry/pa.rdfPenny ArcadeWeb Logs (Blogs)F-SecureThis blog covers any kind of malware that spreads, and often has useful screen shots so youknow exactly what to watch out for.Microsoft Security Resource Center (MSRC)Run by the team that puts out Microsoft Security Bulletins, this is where you’ll get earlynotification of what they plan to patch each month. After Patch Day, get more in-depthexplanation of Microsoft vulnerabilities at their Security Vulnerability R&D blog.SANS Internet Storm CenterA great place to look for the earliest warning of emerging threats, especially if you prefer factsover FUD. The “Handler’s Diary” is updated at least every day, sometimes more often.The Security SkepticDave Piscitello is a very knowledgeable security consultant who currently works as a Fellow ofICANN’s Security and Stability Advisory Committee. His seasoned observations of networksecurity range from small-scale practical tips to questions about how to keep the Internetworking for decades to come.SunbeltSunbelt makes anti-spyware and anti-spam products, which means they survey the malwarescene every day. This is the spot where we often first hear of new threats. Though this is one ofthe earliest places a new problem might be reported, the information is fact-based and reliable.