1
0
mirror of https://github.com/opsxcq/mirror-textfiles.com.git synced 2025-08-09 20:26:33 +02:00
Files
mirror-textfiles.com/hacking/COLORBOOKS.html

52 lines
6.3 KiB
HTML

<HTML>
<TITLE>T E X T F I L E S</TITLE>
<BODY BGCOLOR="#000000" TEXT="#00FF00" LINK="#00FF00" ALINK="#00AA00" VLINK="#00AA00">
<H1>Hacking Textfiles: The Color Books</H1>
<P>
Somehow I missed this series of files when I was on BBSes in the 1980's, but
they seem legitimate enough, so now you have them too. These are the "Color
Books", books about computer security guidelines purported to be written for
the Department of Defense from the 1980's to the 1990's. They are assigned
arbitrary colors, and each one goes into great detail about a specific
aspect of computer security or, more likely computer security administration.
I've seen these files make a lot of appearences in computer security textfile
archives, so I assume the combination of Department of Defense conspiracy and
seemingly in-depth (if boring) recounting of principles reach out to something
in the archivist's gut. Judge for yourself.
<P>
<TABLE WIDTH=100%>
<TD BGCOLOR=#00FF00><FONT COLOR=#000000><B>Filename</B><BR></FONT></TD>
<TD BGCOLOR=#00DD00><FONT COLOR=#000000><B>Size</B><BR></FONT></TD>
<TD BGCOLOR=#00AA00><FONT COLOR=#000000><B>Description of the Textfile</B><BR></TD></TR>
<tab indent=60 id=T><br>
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="COLORBOOKS/aqua.txt">aqua.txt</A> <tab to=T><TD> 67633<BR><TD> The Aqua Book: A Glossary of Computer Security Acronyms
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="COLORBOOKS/b_blue.txt">b_blue.txt</A> <tab to=T><TD> 52053<BR><TD> The Blue Book: Procedures for Interacting with the NSA's Information Security Organization (March 1, 1988)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="COLORBOOKS/blue.txt">blue.txt</A> <tab to=T><TD> 60038<BR><TD> The Blue Book: The Trusted Product Evaluation Questionnaire (1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="COLORBOOKS/brown.txt">brown.txt</A> <tab to=T><TD> 97701<BR><TD> The Brown Book: The Guide to Understanding Trusted Facility Management
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="COLORBOOKS/burgendy.txt">burgendy.txt</A> <tab to=T><TD> 66951<BR><TD> The Burgundy Book: A Guide to Understanding Design Documentation
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="COLORBOOKS/greenbook.txt">greenbook.txt</A> <tab to=T><TD> 60908<BR><TD> The Green Book: The Department of Defense Password Management Guideline (April 12, 1985)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="COLORBOOKS/grey.txt">grey.txt</A> <tab to=T><TD> 141699<BR><TD> The Grey Book: A Rationale for Selecting Access Control List Features for the UNIX System
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="COLORBOOKS/lavender.txt">lavender.txt</A> <tab to=T><TD> 55484<BR><TD> The Lavender Book: A Guide to Understanding Trusted Distribution in Trusted Systems (December 15, 1988)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="COLORBOOKS/lightblue.txt">lightblue.txt</A> <tab to=T><TD> 53868<BR><TD> The Light Blue Book: A Guide to Understanding Identification and Authentication in Trusted Systems (September 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="COLORBOOKS/n_orange.txt">n_orange.txt</A> <tab to=T><TD> 86796<BR><TD> The Orange Book: A Guide to Understanding Discretionary Access Control in Trusted Systems (September 30, 1987)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="COLORBOOKS/nsaorder.txt">nsaorder.txt</A> <tab to=T><TD> 2676<BR><TD> Order Form for Computer Security Products from the NSA
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="COLORBOOKS/nsapubs.txt">nsapubs.txt</A> <tab to=T><TD> 8268<BR><TD> List of National Security Agency Computer Security Documents
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="COLORBOOKS/orange.book">orange.book</A> <tab to=T><TD> 325120<BR><TD> Computer Security - 1983 Orange Book (August 15, 1983)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="COLORBOOKS/orange.txt">orange.txt</A> <tab to=T><TD> 247993<BR><TD> The Orange Book: The Guide to Trusted Computer System Evaluation Criteria (August 15, 1983)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="COLORBOOKS/orange2.txt">orange2.txt</A> <tab to=T><TD> 141806<BR><TD> The Orange Book II: A Guide to Understanding Configuration Management in Trusted Systems
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="COLORBOOKS/peach.txt">peach.txt</A> <tab to=T><TD> 59080<BR><TD> The Peach Book: A Guide to Writing the Security Features Users Guide for Trusted Systems (September 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="COLORBOOKS/pink.txt">pink.txt</A> <tab to=T><TD> 143547<BR><TD> The Pink Book: A Guide to Rating Maintenance Phase
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="COLORBOOKS/purple.txt">purple.txt</A> <tab to=T><TD> 57408<BR><TD> The Purple Book: Guidelines for Formal Verification Systems (April 1, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="COLORBOOKS/red.txt">red.txt</A> <tab to=T><TD> 819493<BR><TD> The Red Book: Evaluation of Trusted Network Systems and Components (July 31, 1987)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="COLORBOOKS/redii.txt">redii.txt</A> <tab to=T><TD> 119791<BR><TD> The Red Book II: Trusted Network Interpretation Environments Guideline (August 1, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="COLORBOOKS/std001.txt">std001.txt</A> <tab to=T><TD> 277123<BR><TD> DoD 5200.28-STD: Department of Defense Trusted Computer System Evaluation Criteria (December 26, 1985)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="COLORBOOKS/tan.txt">tan.txt</A> <tab to=T><TD> 56311<BR><TD> The Tan Book: A Guide to Understanding Audit in Trusted Systems
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="COLORBOOKS/tg004.txt">tg004.txt</A> <tab to=T><TD> 65376<BR><TD> Glossary of Computer Security Acronyms
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="COLORBOOKS/tg006.txt">tg006.txt</A> <tab to=T><TD> 137992<BR><TD> National Computer Security Center: A Guide to Understanding Configuration Management in Trusted Systems
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="COLORBOOKS/veniceblue.txt">veniceblue.txt</A> <tab to=T><TD> 61920<BR><TD> The Venice Blue Book: Computer Security Subsystems (September 1988)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="COLORBOOKS/yellow.txt">yellow.txt</A> <tab to=T><TD> 76867<BR><TD> The Yellow Book: Guideance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in SPecific Environm,ents (June 1985)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="COLORBOOKS/yellow_2.txt">yellow_2.txt</A> <tab to=T><TD> 20194<BR><TD> Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments (June 25, 1985)
</TABLE><P><TABLE WIDTH=100%><TR><TD ALIGN=RIGHT><SMALL>There are 27 files for a total of 3,364,096 bytes.</SMALL></TABLE></BODY>
</HTML>