background preloader

NIST SP 800 Series

NIST SP 800 Series
NIST uses three NIST Special Publication subseries to publish computer/cyber/information security and guidelines, recommendations and reference materials: SP 800, Computer Security (December 1990-present): NIST's primary mode of publishing computer/cyber/information security guidelines, recommendations and reference materials (SP 800s are also searchable in the NIST Library Catalog); SP 1800, NIST Cybersecurity Practice Guides (2015-present): A new subseries created to complement the SP 800s; targets specific cybersecurity challenges in the public and private sectors; practical, user-friendly guides to facilitate adoption of standards-based approaches to cybersecurity; SP 500, Computer Systems Technology (January 1977-present): A general IT subseries used more broadly by NIST's Information Technology Laboratory (ITL), this page lists selected SP 500s related to NIST's computer security efforts. Note: Publications that link to dx.doi.org/... will redirect to another NIST website.

http://csrc.nist.gov/publications/PubsSPs.html

VMware ESX 4 can even virtualize itself NEW: VMware vSphere 5 makes this even easier and supports nested 64-bit guests. Running VMware ESX inside a virtual machine is a great way to experiment with different configurations and features without building out a whole lab full of hardware and storage. It is pretty common to do this on VMware Workstation nowadays — the first public documentation of this process that I know of was published by Xtravirt a couple of years ago.

Powerful thin clients may be alternative to PCs Thin clients introduced this week by Dell and Hewlett-Packard have faster processor than existing thin clients as well as high-definition graphics capabilities, so they could be alternatives to traditional PCs as computing continues moving to the cloud. The desk-side thin clients also have advanced virtualization features for virtual desktops to host multiple applications in one session. They were announced at the Citrix Synergy conference in Los Angeles. Dell introduced its first quad-core thin clients called the Wyse D90Q7 and Z90Q7, and also its first dual-core thin client, the Xenith Pro 2. HP upgraded its TM40 thin client to run Advanced Micro Devices’ A-series processors code-named Richland, which are an upgrade from Intel’s third-generation Celeron processors.

How to Enable Support for Nested 64bit & Hyper-V VMs in vSphere 5 With the release of vSphere 5, one of the most sought out feature from VMware is the ability to run nested 64bit and Hyper-V guest virtual machines in a virtual ESXi instance. Previous to this, only 32bit virtual machines were supported as the VT-x/AMD-V Hardware Virtualization CPU instructions could not be virtualized and presented to the virtual ESX(i) guest. This feature is quite useful for home and lab setups in testing new features or studying for VMware certifications and running multiple vESX(i) instances. Thoughts on virtualizing of server running PDC, DNS, DHCP, exchange server, and website - Virtualization - Business Computing johnny-mac said: It sounds like you're planning on using a desktop version of VMware (Workstation or player). These options are great for developers, and demo/test, but they're not intended for running data centers. Yes. I'm thinking about using the desktop version of VMware Workstation. (the server I'm using now is -or rather was- a desktop machine that's been running solid 24/7 for nearly 12 years!

Learn How to Pass (or Beat) a Polygraph Test Educate yourself. Before playing Russian roulette with your reputation, learn how to protect yourself against this invalid test. Download AntiPolygraph.org's free book (1 mb PDF): The Lie Behind the Lie Detector The dirty little secret behind the polygraph is that the "test" depends on trickery, not science. 200 Series Switches Data Sheet Build a Powerful, Easy-to-Use Basic Business Network at an Affordable Price The key to succeeding in today's competitive business environment is investing resources wisely - knowing how to separate the essential from the extraneous and get the most value for your dollar. As the backbone of your business and productivity applications, the small business network clearly falls into the "essential" category. But that doesn't mean you need the most advanced feature set on the market.

Four ways to disable or enable USB Ports in Windows 7 How often you have witnessed blocked Pen drive or USB drive access in your work place or college or school? I believe many times; in fact every time you try to use the USB drive, you are not allowed, simply because the administrator has disabled USB drive detection on your PC. Again, how often has your data been stolen because someone connected an unauthorized USB to your computer and copied your files?

Windows Server 2012 Upgrade January 30, 2013By Michael Gabriel Sumastre If recent surveys cited by tech blogs and mainstream media are to be believed, then Windows Server 2012 is a win. Microsoft reveals that according to one survey, 65% of customers were satisfied with the new platform, which was released on August 1, 2012. Make Your Email Hacker Proof It's only a matter of time until your email gets hacked. Don't believe me? Just read this harrowing cautionary tale. When [my wife] came back to her desk, half an hour later, she couldn’t log into Gmail at all. By that time, I was up and looking at e‑mail, and we both quickly saw what the real problem was.

Windows Hardening Guide - Erik's IT-Security notes Be advised that work on this guide has only just begun. Latest change: 2008-11-29 01 2009 V0.5 Erik Zalitis How to optimize PostgreSQL database size PostgreSQL is a powerful, open source relational database system. It has more than 15 years of active development and a proven architecture that has earned it a strong reputation for reliability, data integrity, and correctness. One of the PostgreSQL's most sophisticated features is so called Multi-Version Concurrency Control (MVCC), a standard technique for avoiding conflicts between reads and writes of the same object in database. MVCC guarantees that each transaction sees a consistent view of the database by reading non-current data for objects modified by concurrent transactions. Thanks to MVCC, PostgreSQL has great scalability, a robust hot backup tool and many other nice features comparable to the most advanced commercial databases.

[ROOT] Droid 3 root instructions (One Click added for Windows/ Linux/ OSX) Thanks to Framework43 for writing the early one click and psouza4 for rewriting the whole damn thing 6 times Instructions couldn't be more simple: The new Do-All One Click by psouza4. Motorola DROID Bionic Rooted with one-click-root [Download] We already knew this was going down but you can now root your DROID Bionic using the simple one-click-root method found to work on a slew of other recent Motorola phones such as the Droid X2 and the Droid 3 all running on Moto's latest Gingerbread builds. Last week we saw the Bionic was already rooted, but today we have instructions and the download for you. This literally took me about 1 minute to download the latest Motorola drivers and another minute or two to actually root and it was a done deal. Now I'm free to fly around and do titanium backup's and all that good stuff. Obviously this doesn't fix or do anything with the bootloader "situation" but we'll take root any day for now. Image thanks to kellex.

Upside-Down-Ternet My neighbours are stealing my wireless internet access. I could encrypt it or alternately I could have fun. I'm starting here by splitting the network into two parts, the trusted half and the untrusted half. The trusted half has one netblock, the untrusted a different netblock. We use the DHCP server to identify mac addresses to give out the relevant addresses.

Related: