Welcome to machinae.
Collected here are a few articles related to computer security. For my students, these materials may be useful as a supplement to the course materials.
I have reviewed some penetration testing tools here.
I have compiled a modest timeline of cryptology here, spanning pre-history to present day. In class, we have talked so much about the actual hands-on implementation of cryptology, but lacked the time to really delve into the historical usage and evolution of cryptology. It is quite edifying, and may give you some unconventional ideas for using crypto. I research crypto history as a hobby, so this section is slowly growing.
While I encourage you to learn how to implement technology, I would also encourage you to think about why you are using technology. Is it simply a means to an end, or are you using technology to make life better? I would like you all to be functionally competent, able to walk into a network and say: "I know how to make this work well." But beyond hands-on ability, which is not to be scoffed at, I would also like you to be able to step back and look at the system as a whole. Can you now strategize growth and improvement?
As always, we learn most when we engage. I would be delighted to hear from you. You may reach me via the slightly-munged email address at the bottom of the page.