B. Linux, BackTrack 4 (www.backtrack-linux.org)

J. Ballard, HiPPIE (sourceforge.net/projects/hippie)

N. Fox-news, Report: Marine One information found on computer in Iran, 2009.

T. Gil, NSTX (IP-over-DNS) HOWTO (thomer.com/howtos/nstx .html)

D. Kaminsky, OzymanDNS v. 0.1 (dankaminsky.com, 2004.

A. Karasaridis, K. Meier-hellstern, and D. Hoeflin, NIS04-2: Detection of DNS Anomalies using Flow Data Analysis, IEEE Globecom 2006, pp.1-6, 2006.
DOI : 10.1109/GLOCOM.2006.280

. Kryo, Iodine (code.kryo.se/iodine)

O. Pearson, DNS tunnel ? Through bastion hosts (archives.neohap sis.com/archives/bugtraq, 1998.

A. Revelli and N. Leidecker, Introducing Heyoka: DNS tunneling 2.0, presented at the SOURCE Boston Conference (www.sourcecon ference.com/bos09pubs/Revelli-Leidecker Heyoka, 2009.

D. Romana, S. Kubota, K. Sugitani, and Y. Musashi, DNS Based Spam Bots Detection in a University, 2008 First International Conference on Intelligent Networks and Intelligent Systems, pp.205-208, 2008.
DOI : 10.1109/ICINIS.2008.54

K. Schrader, B. Mullins, G. Peterson, and R. Mills, Tracking Contraband Files Transmitted Using Bittorrent, Advances in Digital Forensics V, pp.159-174, 2009.
DOI : 10.1145/1060289.1060319

. Xilinx, Xilinx University Program Virtex-II Pro Development System

O. Yigit, Hash functions

O. Yigit and D. Substitute, The Guild of PD Software Toolmakers

K. Zetter, Google hack attack was ultra sophisticated, new details show, Wired.com (www.wired.com/threatlevel, 2010.