The automation of these Top 20 Controls will radically lower the cost of security while improving its effectiveness. The US State Department, under CISO John Streufert, has already demonstrated more than 94% reduction in “measured” security risk through the rigorous automation and measurement of the Top 20 Controls.
Tag Archives: reference
Open Source Directory benchmark
As interns, we recently completed an assignment to benchmark read, write, modify and authentication performance of different Directory servers. This two part blog entry reports on our findings. This first part introduces the directory servers we subjected to our benchmark. The second part contains the benchmark results and conclusions.
via IS4U blog.
20 Iptables Examples For New SysAdmins
This Linux based firewall is controlled by the program called iptables to handles filtering for IPv4, and ip6tables handles filtering for IPv6. I strongly recommend that you first read our quick tutorial that explains how to configure a host-based firewall called Netfilter (iptables) under CentOS / RHEL / Fedora / Redhat Enterprise Linux. This post list most common iptables solutions required by a new Linux user to secure his or her Linux operating system from intruders.
ARM Information Center
Welcome to the ARM Infocenter. The Infocenter contains all ARM non-confidential† Technical Publications, including:
- ARM Architecture Reference Manuals
- Cortex-A, Cortex-R, Cortex-M, ARM11, ARM9, and ARM7 Technical Reference Manuals
- AMBA specifications and design tools and CoreLink peripherals and controllers product manuals
- CoreSight on-chip debug and trace TRMs and Architecture documentation
- ARM Software Development tools and Modeling tools documentation
- Application Notes and Technical Support Knowledge Articles (FAQs).
Quantum cryptography: yesterday, today, and tomorrow
Imagine you have a product of two prime numbers, say, 221. Now, we set that number to be an endpoint—for the purposes of our game, there are no higher integers. If we multiply two numbers together and get a number larger than 221, it wraps around, so 15 times 15 results in 225-221 = 4. If we multiply two by itself, we only get four, which doesn’t wrap, and we can do that 7 times before it wraps. But 28 results in 35. Got that? Great.
via Quantum cryptography: yesterday, today, and tomorrow | Ars Technica.
Let’s consider a consequence of using phase to calculate prime factors: 221 has prime factors 17 and 13, and factors 1 and 221. We can eliminate the latter in the classical part of our algorithm. But, what about two and 111? “Wait,” you say. “That is not a factor. The product is 222.” Nevertheless, we need to think about it, because quantum algorithms are probabilistic. 17 and 13 have the highest probabilities, but two and 111 only have a phase error of 0.5 percent. The probability of Shor’s algorithm returning the incorrect result is rather high. Unfortunately, a near miss (though easy to spot, since it is very quick to calculate that 2×111=222 not 221). This is likely not very useful in terms of decrypting a message, so we need to do something to increase the chance of getting the correct answer.
MythTV, Open Source DVR
Initially, installation of MythTV seems like a huge task. There are lots of dependencies, and various distributions seem to do the same thing different ways. This document will attempt to give general installation instructions, as well as including distribution-specific instructions where necessary.
Configuring and Managing a Red Hat Cluster
Configuring and Managing a Red Hat Cluster describes the configuration and management of Red Hat cluster systems for Red Hat Enterprise Linux 5. It does not include information about Red Hat Linux Virtual Servers (LVS). Information about installing and configuring LVS is in a separate document.
Set Up the Master Boot Record
When setting up the Master Boot Record, you need to enter appropriate partition information. In this example, Grub is in the first partition on the first hard drive, which is (hd0,0) in Grub. Change this to whatever partition Grub is in.
After getting the Grub prompt, type:
root (hd0,0)
setup (hd0)
quit
via Set Up the Master Boot Record.
This has been sitting as draft since August 5 and works in setting the MBR on a hard drive and since things like this can be easily forgotten, it has become a reference. Even Testdisk couldn’t write the MBR correctly when I tried to transfer a Fedora14 VM onto a real hard drive. After setting the MBR and getting it to boot the network and graphic interfaces required manual intervention. I’m not convinced transferring a virtual image to a physical image is much of a time saver.
Note: Not all installations have grub installed by default. The command to get the grub prompt is /sbin/grub run as root.
List of TCP and UDP port numbers
List of TCP and UDP port numbers – Wikipedia, the free encyclopedia.
This site was also a good reference when I tried to find out what common services used port 9000.
IETF Network Management RFCs by SMI/MIB modules
Network management RFCs sorted by SMI/MIB modules
Via The Simpleweb – IETF Network Management RFCs by SMI/MIB modules.