💾 Archived View for spam.works › mirrors › textfiles › hacking › COLORBOOKS › index.gmi captured on 2023-11-14 at 09:47:27. Gemini links have been rewritten to link to archived content

View Raw

More Information

⬅️ Previous capture (2023-06-14)

-=-=-=-=-=-=-

T E X T F I L E S

Hacking Textfiles: The Color Books

Somehow I missed this series of files when I was on BBSes in the 1980's, but

they seem legitimate enough, so now you have them too. These are the "Color

Books", books about computer security guidelines purported to be written for

the Department of Defense from the 1980's to the 1990's. They are assigned

arbitrary colors, and each one goes into great detail about a specific

aspect of computer security or, more likely computer security administration.

I've seen these files make a lot of appearences in computer security textfile

archives, so I assume the combination of Department of Defense conspiracy and

seemingly in-depth (if boring) recounting of principles reach out to something

in the archivist's gut. Judge for yourself.

aqua.txt

The Aqua Book: A Glossary of Computer Security Acronyms

b_blue.txt

The Blue Book: Procedures for Interacting with the NSA's Information Security Organization (March 1, 1988)

blue.txt

The Blue Book: The Trusted Product Evaluation Questionnaire (1989)

brown.txt

The Brown Book: The Guide to Understanding Trusted Facility Management

burgendy.txt

The Burgundy Book: A Guide to Understanding Design Documentation

greenbook.txt

The Green Book: The Department of Defense Password Management Guideline (April 12, 1985)

grey.txt

The Grey Book: A Rationale for Selecting Access Control List Features for the UNIX System

lavender.txt

The Lavender Book: A Guide to Understanding Trusted Distribution in Trusted Systems (December 15, 1988)

lightblue.txt

The Light Blue Book: A Guide to Understanding Identification and Authentication in Trusted Systems (September 1991)

n_orange.txt

The Orange Book: A Guide to Understanding Discretionary Access Control in Trusted Systems (September 30, 1987)

nsaorder.txt

Order Form for Computer Security Products from the NSA

nsapubs.txt

List of National Security Agency Computer Security Documents

orange.book

Computer Security - 1983 Orange Book (August 15, 1983)

orange.txt

The Orange Book: The Guide to Trusted Computer System Evaluation Criteria (August 15, 1983)

orange2.txt

The Orange Book II: A Guide to Understanding Configuration Management in Trusted Systems

peach.txt

The Peach Book: A Guide to Writing the Security Features Users Guide for Trusted Systems (September 1991)

pink.txt

The Pink Book: A Guide to Rating Maintenance Phase

purple.txt

The Purple Book: Guidelines for Formal Verification Systems (April 1, 1991)

red.txt

The Red Book: Evaluation of Trusted Network Systems and Components (July 31, 1987)

redii.txt

The Red Book II: Trusted Network Interpretation Environments Guideline (August 1, 1990)

std001.txt

DoD 5200.28-STD: Department of Defense Trusted Computer System Evaluation Criteria (December 26, 1985)

tan.txt

The Tan Book: A Guide to Understanding Audit in Trusted Systems

tg004.txt

Glossary of Computer Security Acronyms

tg006.txt

National Computer Security Center: A Guide to Understanding Configuration Management in Trusted Systems

veniceblue.txt

The Venice Blue Book: Computer Security Subsystems (September 1988)

yellow.txt

The Yellow Book: Guideance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in SPecific Environm,ents (June 1985)

yellow_2.txt

Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments (June 25, 1985)