 
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: A
- a flag
: sendmail, 30.8. Alphabetized F= Flags
- A flag
: sendmail, 30.8. Alphabetized F= Flags
- $a macro
- 
  - sendmail, 14.2.2. The Date: Header 
  - sendmail, 31.10. Alphabetized Reference 
 
- a option
: (see AliasWait (a) option)
- A option
: (see AliasFile (A) option)
- A records
- 
  - sendmail, 15.3. MX Records 
  - sendmail, 21.3.1. MX Must Point to an A Record 
  - sendmail, 34.8. Alphabetized Reference 
 
- -a switch (sendmail)
: sendmail, 33.3.4.2. -a  append tag on successful match (V8.1 and above) 
- -A switch (sendmail)
: sendmail, 33.3.4.1. -A  append values for duplicate keys (V8.7 and above) 
- A= equate
- 
  - sendmail, 6.2. Define a Mail Delivery Agent 
  - sendmail, 6.3. The local Delivery Agent 
  - sendmail, 30.4. The Equates
 
- ABORT keyword
: TCP/IP Network Administration, A.3. chat
- absolute pathnames
: Practical UNIX & Internet Security, 5.1.3. Current Directory and Paths
- Abstract Syntax Notation One (ASN.1)
: TCP/IP Network Administration, 11.9. Simple Network Management Protocol 
- Academic-Firewalls mailing list
: Building Internet Firewalls, A.3.3. Academic-Firewalls
- accept()
: sendmail, 21.2.2. Look Up a Remote Host's Name 
- access and access control
- 
  - Practical UNIX & Internet Security, 2.1. Planning Your Security Needs
  - TCP/IP Network Administration, 12.5. Access Control 
  - ACLs
  
- 
    - Practical UNIX & Internet Security, 5.2.5. Access Control Lists
    - Practical UNIX & Internet Security, 5.2.5.1. AIX Access Control Lists
    - Practical UNIX & Internet Security, 5.2.5.2. HP-UX access control lists
    - Practical UNIX & Internet Security, 17.3.13. Network News Transport Protocol (NNTP)  (TCP Port
  
 
- anonymous FTP
: Practical UNIX & Internet Security, 17.3.2.1. Using anonymous FTP 
  - employee access, monitoring
: Practical UNIX & Internet Security, 13.2.4. Auditing Access
  - /etc/exports file
: Practical UNIX & Internet Security, 20.2.1.1. /etc/exports
  - fail safety and
: Building Internet Firewalls, 3.5. Fail-Safe Stance
  - Internet servers
: Practical UNIX & Internet Security, 17.2. Controlling Access to Servers
  - least privilege
: Building Internet Firewalls, 3.1. Least Privilege
  - levels of
  
- 
    - Practical UNIX & Internet Security, 19.5.4. Using NIS+
    - TCP/IP Network Administration, 9.1.2.1. The share command 
  
 
- logging
: (see logs/logging)
  - monitoring at choke point
: Building Internet Firewalls, 3.3. Choke Point
  - to networks
: Building Internet Firewalls, 1.3.4. Network Security
  - non-citizens
: Practical UNIX & Internet Security, 26.4.1. Munitions Export
  - physical
: Practical UNIX & Internet Security, 12.2.3. Physical Access 
  - restricted filesystems
  
- 
    - Practical UNIX & Internet Security, 8.1.5. Restricted Filesystem
    - Practical UNIX & Internet Security, 8.1.5.2. Checking new software
  
 
- restricting data availability
: Practical UNIX & Internet Security, 2.1. Planning Your Security Needs
  - services to place under, listed
: TCP/IP Network Administration, 12.5.1. wrapper 
  - software for
: TCP/IP Network Administration, 12.5. Access Control 
  - tradition of open
: Practical UNIX & Internet Security, 1.4.1. Expectations
  - to unbuilt bastion host
: Building Internet Firewalls, 5.8. Building a Bastion Host
  - USERFILE (UUCP)
  
- 
    - Practical UNIX & Internet Security, 15.4.1. USERFILE: Providing Remote File Access 
    - Practical UNIX & Internet Security, 15.4.2.1. Some bad examples
  
 
- Web server files
  
- 
    - Practical UNIX & Internet Security, 18.2.2.2. Additional configuration issues
    - Practical UNIX & Internet Security, 18.3. Controlling Access to Files on Your Server
    - Practical UNIX & Internet Security, 18.3.3. Setting Up Web Users and Passwords
  
 
- X Window System
  
- 
    - Practical UNIX & Internet Security, 17.3.21.2. X security
    - Practical UNIX & Internet Security, 17.3.21.3. The xhost facility 
  
 
 
- access()
: Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- access control lists (ACLs)
- 
  - Practical UNIX & Internet Security, 5.2.5. Access Control Lists
  - Practical UNIX & Internet Security, 5.2.5.2. HP-UX access control lists
  - errors in
: Practical UNIX & Internet Security, 5.2.5.1. AIX Access Control Lists
  - NNTP with
: Practical UNIX & Internet Security, 17.3.13. Network News Transport Protocol (NNTP)  (TCP Port
 
- access router
: (see exterior routers)
- access.conf file
: Practical UNIX & Internet Security, 18.3.1. The access.conf and .htaccess Files
- access_log file
- 
  - Practical UNIX & Internet Security, 10.3.5. access_log Log File
  - Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
  - with refer_log file
: Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
 
- accidents
- 
  - Building Internet Firewalls, 1.2.3. Stupidity and Accidents
  - Practical UNIX & Internet Security, 12.2.2. Preventing Accidents 
  - (see also natural disasters)
 
- accounting process
- 
  - Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File 
  - Practical UNIX & Internet Security, 10.2.3. messages Log File
  - (see also auditing)
 
- accounts
: Practical UNIX & Internet Security, 3.1. Usernames 
- 
  - aliases for
: Practical UNIX & Internet Security, 8.8.9. Account Names Revisited: Using Aliases  for Increased
  - changing login shell
  
- 
    - Practical UNIX & Internet Security, 8.4.2. Changing the Account's Login
    - Practical UNIX & Internet Security, 8.7.1. Integrating One-time Passwords with UNIX
  
 
- created by intruders
: Practical UNIX & Internet Security, 24.4.1. New Accounts 
  - default
: Practical UNIX & Internet Security, 8.1.2. Default Accounts 
  - defense checklist
: Practical UNIX & Internet Security, A.1.1.7. Chapter 8: Defending Your Accounts 
  - dormant
  
- 
    - Practical UNIX & Internet Security, 8.4. Managing Dormant Accounts 
    - Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts 
  
 
- expiring old
: Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts 
  - group
: Practical UNIX & Internet Security, 8.1.6. Group Accounts
  - importing to NIS server
  
- 
    - Practical UNIX & Internet Security, 19.4.1. Including or excluding specific accounts:
    - Practical UNIX & Internet Security, 19.4.4.2. Using netgroups to limit the importing of accounts
  
 
- Joes
  
- 
    - Practical UNIX & Internet Security, 3.6.2. Smoking Joes
    - Practical UNIX & Internet Security, 8.8.3.1. Joetest: a simple password cracker
  
 
- locking automatically
: Practical UNIX & Internet Security, 3.3. Entering Your Password 
  - logging changes to
: Practical UNIX & Internet Security, 10.7.2.1. Exception and activity reports
  - managing
: Building Internet Firewalls, 12.1.2. Managing Your Accounts
  - multiple, same UID
: Practical UNIX & Internet Security, 4.1.2. Multiple Accounts with the Same UID
  - names for
: (see usernames)
  - restricted, with rsh
: Practical UNIX & Internet Security, 8.1.4.5. How to set up a restricted account with rsh
  - restricting FTP from
: Practical UNIX & Internet Security, 17.3.2.5. Restricting FTP with the standard UNIX FTP server
  - running single command
: Practical UNIX & Internet Security, 8.1.3. Accounts That Run a Single Command 
  - without passwords
: Practical UNIX & Internet Security, 8.1.1. Accounts Without Passwords 
 
- acct file
: Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File 
- acctcom program
- 
  - Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File 
  - Practical UNIX & Internet Security, 10.2.2. Accounting with BSD
 
- ACEs
: (see ACLs)
- ACK (acknowledgment) bit
- 
  - Building Internet Firewalls, 6.3.1.3. TCP layer
  - Building Internet Firewalls, C.6.2. Transmission Control Protocol
  - Practical UNIX & Internet Security, 16.2.4.2. TCP
  - TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
  - TCP connections and
: Building Internet Firewalls, 6.3.3.1. TCP
  - with SMTP
: Building Internet Firewalls, 8.1.1.4. Packet filtering characteristics of
 
- ACKD command, in POP
: TCP/IP Network Administration, 3.4.2. Post Office Protocol
- Acknowledgment Number field
: TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
- acledit command
: Practical UNIX & Internet Security, 5.2.5.1. AIX Access Control Lists
- aclget, aclput commands
: Practical UNIX & Internet Security, 5.2.5.1. AIX Access Control Lists
- ACLs (access control lists)
- 
  - Practical UNIX & Internet Security, 5.2.5. Access Control Lists
  - Practical UNIX & Internet Security, 5.2.5.2. HP-UX access control lists
  - errors in
: Practical UNIX & Internet Security, 5.2.5.1. AIX Access Control Lists
  - NNTP with
: Practical UNIX & Internet Security, 17.3.13. Network News Transport Protocol (NNTP)  (TCP Port
 
- ACM (Association for Computing Machinery)
: Practical UNIX & Internet Security, F.1.1. Association for Computing Machinery (ACM) 
- active FTP
: Practical UNIX & Internet Security, 17.3.2.2. Passive vs. active FTP
- activity logs
: (see logs/logging)
- aculog file
: Practical UNIX & Internet Security, 10.3.1. aculog File 
- adaptive modems
: (see modems)
- adaptive protocol value
: TCP/IP Network Administration, 6.4.1. slattach 
- adb debugger
- 
  - Practical UNIX & Internet Security, 19.3.1.3. Setting the window 
  - Practical UNIX & Internet Security, C.4. The kill Command 
 
- add-on functionality
: Practical UNIX & Internet Security, 1.4.3. Add-On Functionality Breeds Problems
- addheader()
: sendmail, 20.3. Alphabetized V8.8 Subroutines 
- adding
- 
  - to classes
: sendmail, 38.2.2. Add to a Class with .C 
  - to files
: (see appending to files)
  - message header lines
: sendmail, 20.3. Alphabetized V8.8 Subroutines 
 
- "Address already in use" message
: sendmail, 4.1.1.4. If you forget to kill the daemon 
- Address Resolution Protocol
: (see ARP)
- "ADDRESS *to" structure
: sendmail, 20.1.1. Arguments Passed to checkcompat() 
- addresses
- 
  - sendmail, 8. Addresses and Rules 
  - sendmail, 8.2. Why Rules? 
  - TCP/IP Network Administration, 1.1.1. TCP/IP Features
  - TCP/IP Network Administration, 1.7. Application Layer
  - TCP/IP Network Administration, 2.1. Addressing, Routing, and Multiplexing
  - (see also email)
  - (see also IP addresses)
  - (see also leases on addresses)
  - (see also rule sets; rules)
  - % character in
  
- 
    - sendmail, 17.1.5. The % Hack 
    - sendmail, 21.5.1. Offsite MX Hosts 
  
 
- accepted by router
: Building Internet Firewalls, 6.5. Conventions for Packet Filtering
  - accepting old-style lists
: sendmail, 13.2.7. Accept Old-Style Lists of Addresses 
  - address depletion
: Building Internet Firewalls, C.9.1. Address Depletion
  - address-based authentication
: Building Internet Firewalls, 2.13. Window Systems
  - address-testing mode
: sendmail, 8.3. Rule Sets 
  - allocating
: TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
  - assigning
  
- 
    - in blocks
: TCP/IP Network Administration, 4.2.1.1. Assigning host addresses 
    - in contiguous blocks
    
- 
      - TCP/IP Network Administration, 2.2.2. Classless IP Addresses
      - TCP/IP Network Administration, B.11. The Aggregate Statements
    
 
- in DHCP
: TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
  
 
- broadcast
  
- 
    - Building Internet Firewalls, C.9. The IP Address
    - TCP/IP Network Administration, 2.2.2.1. Final notes on IP addresses
    - TCP/IP Network Administration, 2.6. Address Resolution
    - TCP/IP Network Administration, 4. Getting Started 
    - TCP/IP Network Administration, 6.1. The ifconfig Command 
    - TCP/IP Network Administration, 6.1.2. Checking the Interface with ifconfig 
    - limited
: TCP/IP Network Administration, 3.6. Bootstrap Protocol
    - setting
: TCP/IP Network Administration, 6.1.4. Setting the Broadcast Address 
    - specifying
: TCP/IP Network Administration, 4.2.2. Defining the Subnet Mask 
  
 
- checking with check_compat
: sendmail, 29.10.4. The check_compat Rule Set 
  - CIDR
: Practical UNIX & Internet Security, 16.2.1.3. CIDR addresses
  - classes of
  
- 
    - TCP/IP Network Administration, 1.7. Application Layer
    - TCP/IP Network Administration, 2.2.1. Address Classes
    - TCP/IP Network Administration, 4.2.1. Obtaining an IP Address 
    - class rules
: TCP/IP Network Administration, 7.4.1.1. Running RIP with routed 
  
 
- commands embedded in
: Practical UNIX & Internet Security, 15.7. Early Security Problems with UUCP 
  - converting
: TCP/IP Network Administration, 10.6.3. The Set Ruleset Command 
  - DECnet
: sendmail, 31.10. Alphabetized Reference 
  - filtering by
: Building Internet Firewalls, 6.6. Filtering by Address
  - gateway
: (see gateways)
  - getting in pppd
: TCP/IP Network Administration, 6.3.2. Dial-Up PPP 
  - host addresses
  
- 
    - sendmail, 31.10. Alphabetized Reference 
    - TCP/IP Network Administration, 2.2.1. Address Classes
    - assigning
: TCP/IP Network Administration, 4.2.1.1. Assigning host addresses 
  
 
- Internet
  
- 
    - Practical UNIX & Internet Security, 16.2.1. Internet Addresses 
    - Practical UNIX & Internet Security, 16.2.1.3. CIDR addresses
    - sendmail, 17.1.3. Internet Addresses 
    - TCP/IP Network Administration, 10.7.1. Modifying Local Information 
  
 
- looking up with DNS
: sendmail, 21.2.3. Look Up Addresses for Delivery 
  - loopback
: Building Internet Firewalls, C.9. The IP Address
  - mask, written in hexadecimal
: TCP/IP Network Administration, 6.1.2. Checking the Interface with ifconfig 
  - masquerading
: (see masquerading)
  - mixtures of in DHCP
: TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
  - multiple
: TCP/IP Network Administration, 8.2.1. The Resolver Configuration File 
  - null (empty)
  
- 
    - sendmail, 10.3. Missing Addresses 
    - sendmail, 17.1.1.3. Handle null address 
    - sendmail, 30.8. Alphabetized F= Flags
  
 
- numeric
: TCP/IP Network Administration, 3.1. Names and Addresses
  - parsing
: sendmail, 38.5.5. Parse an Address with /parse 
  - preprocessing
: (see rule set 3)
  - processing
  
- 
    - by several rewrite rules
: TCP/IP Network Administration, 10.6.2. Transforming the Address 
    - verifying
: TCP/IP Network Administration, 10.8. Testing sendmail.cf 
  
 
- qualified
  
- 
    - sendmail, 16.5. Qualify All Addresses? 
    - sendmail, D.3. K Command's -d switch 
  
 
- recipient
  
- 
    - sendmail, 6.3. The local Delivery Agent 
    - sendmail, 23.9. The qf File Internals 
    - sendmail, 29.10.4. The check_compat Rule Set 
    - sendmail, 31.10. Alphabetized Reference 
    - TCP/IP Network Administration, 10.6.3. The Set Ruleset Command 
  
 
- records of
: TCP/IP Network Administration, C.3.1.3. Address record
  - reserved
  
- 
    - TCP/IP Network Administration, 2.2.1. Address Classes
    - TCP/IP Network Administration, 2.2.2.1. Final notes on IP addresses
  
 
- resolution of
: TCP/IP Network Administration, 2.6. Address Resolution
  - route addresses
  
- 
    - sendmail, 17.1.5. The % Hack 
    - sendmail, 21.5.1. Offsite MX Hosts 
    - sendmail, 29.4.3. Handling Routing Addresses 
    - sendmail, 30.8. Alphabetized F= Flags
    - sendmail, 34.8. Alphabetized Reference 
  
 
- sender
  
- 
    - sendmail, 6.3. The local Delivery Agent 
    - sendmail, 11.1. Flow of the Sender's Address 
    - sendmail, 23.4. Printing the Queue 
    - sendmail, 23.9. The qf File Internals 
    - sendmail, 31.10. Alphabetized Reference 
    - sendmail, 36.7. Alphabetized Reference 
    - TCP/IP Network Administration, 10.6.3. The Set Ruleset Command 
    - TCP/IP Network Administration, 10.8.1. Testing Rewrite Rules 
    - (see also $f macro; $g macro; rule set 1)
    - default format of
: sendmail, 31.10. Alphabetized Reference 
    - genericstable feature
: sendmail, 19.6. Alphabetized m4 Macros 
    - hostname part
: (see $s macro)
    - rewriting
: sendmail, 11.4.1. Rewrite the Lone Username 
    - testing with check_compat
: sendmail, 29.10.4. The check_compat Rule Set 
  
 
- sending host's
: sendmail, 20.1.2. Global Variables 
  - separate BITNET
: sendmail, 19.6. Alphabetized m4 Macros 
  - spoofing
  
- 
    - TCP/IP Network Administration, 4.2.1. Obtaining an IP Address 
    - TCP/IP Network Administration, 5.2. Linux Kernel Configuration 
  
 
- starting with |
: sendmail, 3.2.2. Delivery Through a Program 
  - stripping quotation marks from
  
- 
    - sendmail, 30.8. Alphabetized F= Flags
    - sendmail, 33.3.4.9. -q  don't strip quotes from key (V8.7 and above) 
  
 
- timing out
: TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
  - tokenizing
: (see tokenization)
  - transformation rules
: sendmail, 5.3.3. Rules 
  - translating
: TCP/IP Network Administration, 5.2. Linux Kernel Configuration 
  - undeliverable
: sendmail, 4.1.4. Verify Mode (-bv) 
  - UUCP
: sendmail, 17.1.4. UUCP Addresses 
  - X.400 standard
: sendmail, 25.5.6. X.400 Addresses 
 
- Adleman, Leonard
- 
  - Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems 
  - Practical UNIX & Internet Security, 6.4.6. RSA and Public Key Cryptography 
 
- admin alias
: TCP/IP Network Administration, 10.3. sendmail Aliases 
- .Admin directory
: Practical UNIX & Internet Security, 10.3.4. uucp Log Files
- administration
: (see system administration)
- admintool
- 
  - TCP/IP Network Administration, 9.2.2. Solaris Line Printer Service 
  - TCP/IP Network Administration, 12.2.1. The Shadow Password File 
 
- adult material
: Practical UNIX & Internet Security, 26.4.5. Pornography and Indecent Material
- Advanced Network & Services (ANS)
: Practical UNIX & Internet Security, F.3.4.2. ANS customers
- adventurous users, supporting
: TCP/IP Network Administration, 9.7.2. IMAP Server 
- AFCERT
: Practical UNIX & Internet Security, F.3.4.41. U.S. Air Force
- AFS (Andrew File System)
- 
  - Building Internet Firewalls, 2.12. Network File Systems
  - Building Internet Firewalls, B.5.5. Andrew File System
 
- aftpd server
: Practical UNIX & Internet Security, 17.3.2.4. Setting up an FTP server
- agent (user)
: Practical UNIX & Internet Security, 4.1. Users and Groups 
- agent_log file
: Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
- aggregate statements (in gated)
: TCP/IP Network Administration, B.11. The Aggregate Statements
- aging
: (see expiring)
- air ducts
: Practical UNIX & Internet Security, 12.2.3.2. Entrance through air ducts 
- air filters
: Practical UNIX & Internet Security, 12.2.1.3. Dust 
- Air Force Computer Emergency Response Team (AFCERT)
: Practical UNIX & Internet Security, F.3.4.41. U.S. Air Force
- AIX
- 
  - Practical UNIX & Internet Security, 3.3. Entering Your Password 
  - Practical UNIX & Internet Security, 8.7.1. Integrating One-time Passwords with UNIX
  - access control lists
: Practical UNIX & Internet Security, 5.2.5.1. AIX Access Control Lists
  - tftp access
: Practical UNIX & Internet Security, 17.3.7. Trivial File Transfer Protocol (TFTP) (UDP Port 69)
  - trusted path
: Practical UNIX & Internet Security, 8.5.3.1. Trusted path
 
- alarms
- 
  - TCP/IP Network Administration, 11.9. Simple Network Management Protocol 
  - (see also detectors)
 
- algorithms
- 
  - back-off
: TCP/IP Network Administration, 9.4. A BOOTP Server 
  - Dijkstra Shortest Path First (SPF)
: TCP/IP Network Administration, 7.4.3. Open Shortest Path First 
  - distance-vector
: TCP/IP Network Administration, 7.4. Interior Routing Protocols 
 
- aliases/aliasing
- 
  - Practical UNIX & Internet Security, 8.8.9. Account Names Revisited: Using Aliases  for Increased
  - Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors 
  - Practical UNIX & Internet Security, 11.5.3.3. /usr/lib/aliases, /etc/aliases,
  - sendmail, 1.3.3. Aliases and Mailing Lists 
  - sendmail, 3.1.1. The Aliases File 
  - sendmail, 24. Aliases 
  - TCP/IP Network Administration, 2.7.2. Port Numbers
  - AUTO_NIS_ALIASES macro
: sendmail, 18.8. Alphabetized Reference 
  - decode
: Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
  - email
: Practical UNIX & Internet Security, 17.3.4. Simple Mail Transfer Protocol (SMTP) (TCP Port 25)
  - file
: TCP/IP Network Administration, 10.3. sendmail Aliases 
  
- 
    - processing addresses against
: TCP/IP Network Administration, 10.6.3. The Set Ruleset Command 
  
 
- for hostnames
: TCP/IP Network Administration, 8.3.6. The named.hosts File 
  - internal mailing lists
: sendmail, 25.1. Internal Mailing Lists 
  - postmaster
: (see postmaster alias)
  - preventing
: sendmail, 24.6. Prevent Aliasing with -n 
  - rebuilding aliases mode
: sendmail, 4.1.3. Rebuild Aliases Mode (-bi) 
  - retired accounts
: sendmail, 19.6. Alphabetized m4 Macros 
  - selective expansion
: sendmail, D.3. K Command's -d switch 
  - sendmail
  
- 
    - sendmail, 34.6.3. Managing Aliases 
    - TCP/IP Network Administration, 10.1. sendmail's Function 
  
 
- special aliases
: sendmail, 24.4. Special Aliases 
  - storing aliases as symbol table
  
- 
    - sendmail, 24.5.4. No DBM Aliasing 
    - sendmail, 33.8. Alphabetized Reference 
  
 
- testing aliases
  
- 
    - sendmail, 4.1.4. Verify Mode (-bv) 
    - sendmail, 24.5.2. Check the Right Side of Aliases 
  
 
- turning off
: sendmail, 36.7. Alphabetized Reference 
  - user as LHS of
: sendmail, 30.8. Alphabetized F= Flags
  - using db for alias files
: sendmail, C.1. Overview 
  - w class
  
- 
    - sendmail, 15.4. Hub Accepts Mail for Client 
    - sendmail, 17.2.1. Is the Host Local? 
    - sendmail, 29.6.3. Delivering to Local Recipient 
    - sendmail, 32.5. Alphabetized Reference 
  
 
 
- aliases file
- 
  - Practical UNIX & Internet Security, 11.5.3.3. /usr/lib/aliases, /etc/aliases,
  - sendmail, 3.1.1. The Aliases File 
  - sendmail, 22.6. The Aliases File 
  - sendmail, 24.1. The aliases(5) File 
  - sendmail, 24.5. The Aliases Database 
  - sendmail, 33.3.4.1. -A  append values for duplicate keys (V8.7 and above) 
  - sendmail, 33.8. Alphabetized Reference 
  - sendmail, 36.7. Alphabetized Reference 
  - TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
  - TCP/IP Network Administration, 9.3. Network Information Service 
  - in symbol table
  
- 
    - sendmail, 24.5.4. No DBM Aliasing 
    - sendmail, 33.8. Alphabetized Reference 
  
 
 
- AliasFile (A) option
- 
  - sendmail, 3.1.1. The Aliases File 
  - sendmail, 24.1.1. The aliases(5) file's location 
  - sendmail, 34.8. Alphabetized Reference 
  - TCP/IP Network Administration, 10.5.4. The Set Option Command 
 
- AliasWait (a) option
: sendmail, 34.8. Alphabetized Reference 
- Allman, Eric
: sendmail, Eric Allman Speaks 
- allmasquerade feature
: sendmail, 19.6. Alphabetized m4 Macros 
- allmulti parameter
: TCP/IP Network Administration, 6.1.5.5. Point-to-point 
- AllowBogusHELO option
: sendmail, 34.8. Alphabetized Reference 
- AllowOverride option
: Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
- Almanac package
: sendmail, 25.6.2. Almanac 
- alternate queues
: sendmail, 23.7. Process Alternate Queues 
- alternative multipart subtype
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- always_add_domain feature
: sendmail, 19.6. Alphabetized m4 Macros 
- ambiguous MX records
: sendmail, 21.3.7. Ambiguous MX Records 
- America Online (AOL)
: TCP/IP Network Administration, 4.1. Connected and Non-Connected Networks 
- American Society for Industrial Security (ASIS)
: Practical UNIX & Internet Security, F.1.2. American Society for Industrial Security (ASIS)
- ancestor directories
: Practical UNIX & Internet Security, 9.2.2.2. Ancestor directories
- Andrew File System
- 
  - TCP/IP Network Administration, 3.7.1. File Sharing
  - (see AFS)
 
- angle brackets (<>)
- 
  - sendmail, 10.1. Why Preprocess? 
  - sendmail, 17.1.1.1. At least one <> pair 
  - > option
: sendmail, D.5. The > Option 
  - >>> as leading characters
: sendmail, 4.2. Verbose (-v) 
  - nested
  
- 
    - sendmail, 10.4. Nested Angle Brackets 
    - sendmail, 17.1.1.2. Strip to left of < 
  
 
- null address
: (see addresses, null)
 
- ANI schemes
: Practical UNIX & Internet Security, 14.6. Additional Security for Modems 
- animals
: Practical UNIX & Internet Security, 12.2.1.7. Bugs (biological) 
- anlpasswd package
: Practical UNIX & Internet Security, 8.8.2. Constraining Passwords
- anon option for /etc/exports
: Practical UNIX & Internet Security, 20.2.1.1. /etc/exports
- anonymous FTP
- 
  - Building Internet Firewalls, 2.2. File Transfer
  - Building Internet Firewalls, 5.8.2.4. Which services should you disable?
  - Building Internet Firewalls, 8.2.1. File Transfer Protocol
  - Practical UNIX & Internet Security, 4.1. Users and Groups 
  - Practical UNIX & Internet Security, 17.3.2.1. Using anonymous FTP 
  - Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
  - TCP/IP Network Administration, 13.2. Anonymous FTP 
  - (see also FTP)
  - Archie
: Building Internet Firewalls, 2.6. Other Information Services
  - HTTP and
: Practical UNIX & Internet Security, 18.2.4.1. Beware mixing HTTP with anonymous FTP 
  - providing
: Building Internet Firewalls, 8.2.1.3. Providing anonymous
  - removing files from
: Building Internet Firewalls, 8.2.1.6. Be careful of writable
  - via proxy server
: Building Internet Firewalls, 7.2.2. Using Custom User Procedures for
  - writing directories in
: Building Internet Firewalls, 8.2.1.6. Be careful of writable
  - wuarchive server
: Building Internet Firewalls, 8.2.1.4. Using the wuarchive
 
- ANS (Advanced Network & Services, Inc.)
: Practical UNIX & Internet Security, F.3.4.2. ANS customers
- ANSI C standards
: Practical UNIX & Internet Security, 1.4.2. Software Quality
- answer mode
: Practical UNIX & Internet Security, 14.3.1. Originate and Answer 
- answer testing
: Practical UNIX & Internet Security, 14.5.3.2. Answer testing 
- answerback terminal mode
: Practical UNIX & Internet Security, 11.1.4. Trojan Horses 
- ANY query
: TCP/IP Network Administration, 11.6. Checking Name Service 
- APOP (version of POP)
- 
  - Building Internet Firewalls, 8.1.2. Post Office Protocol
  - Practical UNIX & Internet Security, 17.3.10. Post Office Protocol (POP) (TCP Ports
 
- apostrophes ('') (expect nothing)
- 
  - TCP/IP Network Administration, 6.3.3. chat 
  - TCP/IP Network Administration, A.3. chat
 
- "Apparently-From:" header line
: sendmail, 35.10. Alphabetized Reference 
- "Apparently-To:" header line
- 
  - sendmail, 34.8. Alphabetized Reference 
  - sendmail, 35.10. Alphabetized Reference 
 
- appending to files
- 
  - sendmail, 24.2.2. Delivery to Files 
  - sendmail, 30.8. Alphabetized F= Flags
  - sendmail, 33.2.1.4. -o  append to, don't overwrite the file 
  - (see files)
  - . line (qf file)
: sendmail, 23.9. The qf File Internals 
  - control lines in qf files
: sendmail, 23.3.3. Extra Data at End of qf File 
  - .forward file and
: sendmail, 25.7.3. Appending to Files 
  - SafeFileEnvironment option
: sendmail, 22.8.3.6. The SafeFileEnvironment option 
 
- appending to programs
: (see programs, delivering to)
- Apple CORES (Computer Response Squad)
: Practical UNIX & Internet Security, F.3.4.3. Apple Computer worldwide R&D community
- Apple Macintosh, Web server on
: Practical UNIX & Internet Security, 18.2. Running a Secure Server
- AppleTalk network
: sendmail, 3.3.3. Other Protocols 
- applets
: Practical UNIX & Internet Security, 11.1.5. Viruses 
- Application Layer
: TCP/IP Network Administration, 1.2. A Data Communications Model
- 
  - in TCP/IP
: TCP/IP Network Administration, 1.7. Application Layer
 
- application-level
- 
  - encryption
  
- 
    - Building Internet Firewalls, 10.5.1. At What Level Do You Encrypt?
    - Practical UNIX & Internet Security, 16.3.1. Link-level Security
  
 
- gateways
: (see proxy servers/services)
  - proxy servers
: Building Internet Firewalls, 7.3.1. Application-Level Versus Circuit-Level
 
- applications
- 
  - content type
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
  - CGI
: (see CGI, scripts)
  - protocols for
: TCP/IP Network Administration, 2.7.2. Port Numbers
  
- 
    - widely implemented
: TCP/IP Network Administration, 1.7. Application Layer
  
 
- security issues concerning
: TCP/IP Network Administration, 12.3. Application Security 
 
- ar program
: Practical UNIX & Internet Security, 7.4.2. Simple Archives
- Archie
- 
  - Building Internet Firewalls, 6.8.4. It Should Allow Rules Based on Any
  - Building Internet Firewalls, 2.6. Other Information Services
  - Building Internet Firewalls, 8.7.3.3. Providing Archie service to your
  - TCP/IP Network Administration, 13.3.1. archie 
  - client software
: TCP/IP Network Administration, 13.3.1.1. archie client software 
  - configuring
: Building Internet Firewalls, 8.7.3. Archie
  - server
  
- 
    - Building Internet Firewalls, 8.7.3.4. Running an Archie server
    - TCP/IP Network Administration, 13.3.1. archie 
  
 
 
- archie.internic.net
: TCP/IP Network Administration, 13.3.1. archie 
- architecture, room
: Practical UNIX & Internet Security, 12.2.3. Physical Access 
- archiving information
- 
  - Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
  - (see also logs/logging)
 
- ARCnet interface
: TCP/IP Network Administration, 5.2. Linux Kernel Configuration 
- area border routers
: TCP/IP Network Administration, 7.4.3. Open Shortest Path First 
- arguments, checking
: Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- arguments, command-line
- 
  - sendmail, 4. How to Run sendmail 
  - (see also switches, command-line)
  - specifying for delivery agents
  
- 
    - sendmail, 6.2. Define a Mail Delivery Agent 
    - sendmail, 6.3. The local Delivery Agent 
  
 
- time arguments
: sendmail, 13.2.2. Limit the Life of Queued Messages 
 
- argv[0]
: sendmail, 36.1. Alternative argv[0] Names 
- ARP (Address Resolution Protocol)
- 
  - TCP/IP Network Administration, 2.6. Address Resolution
  - TCP/IP Network Administration, 2.8. Summary
  - TCP/IP Network Administration, 3.5.1. Reverse Address Resolution Protocol
  - TCP/IP Network Administration, 5.3.1.1. Options 
  - enabling
: TCP/IP Network Administration, 6.1.5.2. ARP and trailers 
  - proxy server for
: TCP/IP Network Administration, 5.3.1.1. Options 
  - support in BSD
: TCP/IP Network Administration, 5.3.1.2. Pseudo-device 
  - table
: TCP/IP Network Administration, A.1.1. The dip Script File
  
- 
    - viewing contents of
: TCP/IP Network Administration, 11.4.2. Troubleshooting with the arp Command 
  
 
- in troubleshooting
  
- 
    - TCP/IP Network Administration, 11.2. Diagnostic Tools 
    - TCP/IP Network Administration, 11.4.2. Troubleshooting with the arp Command 
  
 
 
- ARPA (Advanced Research Projects Agency)
- 
  - Practical UNIX & Internet Security, 1.3. History of UNIX 
  - (see also UNIX, history of)
  - Internet Text Messages
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
 
- arpa/nameser.h file
: sendmail, B.1. Status file lines 
- ARPANET
- 
  - Practical UNIX & Internet Security, 16.1.1. The InternetWe recommend that readers
  - TCP/IP Network Administration, 1.1. TCP/IP and the Internet
  - TCP/IP Network Administration, 1.5.1.1. The datagram
  - TCP/IP Network Administration, 2.4. Internet Routing Architecture
  - TCP/IP Network Administration, 6.2. TCP/IP Over a Serial Line 
 
- ARPAnet/Grey Book protocols
: sendmail, 36.7. Alphabetized Reference 
- arrow (->), for copying files
: TCP/IP Network Administration, 9.6.1. rdist 
- AS (autonomous systems)
: Building Internet Firewalls, C.10. Internet Routing Architecture
- AS path
: TCP/IP Network Administration, B.10. Control Statements
- ASCII data (US)
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- ASIS (American Society for Industrial Security)
: Practical UNIX & Internet Security, F.1.2. American Society for Industrial Security (ASIS) 
- aspppd.cf file
: TCP/IP Network Administration, 6.3.6. Solaris PPP 
- assert macro
: Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- assessing risks
- 
  - Practical UNIX & Internet Security, 2.2. Risk Assessment
  - Practical UNIX & Internet Security, 2.2.2. Review Your Risks
  - Practical UNIX & Internet Security, 2.5.3. Final Words: Risk Management Means  Common Sense
 
- assets, identifying
: Practical UNIX & Internet Security, 2.2.1.1. Identifying assets
- Assigned Numbers RFC
- 
  - TCP/IP Network Administration, 2.7. Protocols, Ports, and Sockets
  - TCP/IP Network Administration, C.3.1.7. Host Information record
 
- ASSIST
: Practical UNIX & Internet Security, F.3.4.42. U.S. Department of Defense
- Association for Computing Machinery (ACM)
: Practical UNIX & Internet Security, F.1.1. Association for Computing Machinery (ACM) 
- assumptions, making
- 
  - TCP/IP Network Administration, 11.1.1. Troubleshooting Hints 
  - TCP/IP Network Administration, 11.8. Protocol Case Study 
 
- asterisk (*)
- 
  - in mail queue listing
  
- 
    - sendmail, 4.1.2. Show Queue Mode (-bp) 
    - sendmail, 23.4. Printing the Queue 
  
 
- meaning interface not enabled
: TCP/IP Network Administration, 6.1.1. Determining the Interface Name 
  - in name field, indicating wildcard character
: TCP/IP Network Administration, C.3.1. Standard Resource Records
 
- asymmetric key cryptography
: Practical UNIX & Internet Security, 6.4. Common Cryptographic Algorithms 
- asynchronous modems
: (see modems)
- Asynchronous PPP Daemon (aspppd)
: TCP/IP Network Administration, 6.3.6. Solaris PPP 
- asynchronous systems
: Practical UNIX & Internet Security, 19.2. Sun's Remote Procedure Call (RPC)
- Asynchronous Transfer Mode (ATM)
: Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
- at program
- 
  - Practical UNIX & Internet Security, 11.5.3.4. The at program 
  - Practical UNIX & Internet Security, 25.2.1.2. System overload attacks
  - files run by, in security checks
: TCP/IP Network Administration, 12.4.2. Looking for Trouble 
 
- at sign (@)
- 
  - in addresses
  
- 
    - sendmail, 17.1.1.3. Handle null address 
    - sendmail, 29.4.5. Focusing for @ Syntax 
  
 
- chacl command with
: Practical UNIX & Internet Security, 5.2.5.2. HP-UX access control lists
  - for current origin
: TCP/IP Network Administration, C.3.1. Standard Resource Records
  - excluding an individual parameter
: TCP/IP Network Administration, 9.4. A BOOTP Server 
  - referencing current domain
: TCP/IP Network Administration, 8.3.5. The Reverse Domain File 
  - in xhost list
: Practical UNIX & Internet Security, 17.3.21.3. The xhost facility 
 
- Athena
: (see Kerberos authentication system)
- atime
- 
  - Practical UNIX & Internet Security, 5.1.2. Inodes
  - Practical UNIX & Internet Security, 5.1.5. File Times
 
- ATM (Asynchronous Transfer Mode)
: Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
- attackers/intruders
- 
  - Practical UNIX & Internet Security, 1. Introduction
  - TCP/IP Network Administration, 1.7. Application Layer
  - TCP/IP Network Administration, 5.2. Linux Kernel Configuration 
  - (see also finger service)
  - (see also firewalls)
  - (see also TFTP)
  - confronting
: Practical UNIX & Internet Security, 24.2.2. What to Do When You Catch Somebody 
  - creating hidden files
: Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories 
  - discovering
  
- 
    - Practical UNIX & Internet Security, 24.2. Discovering an Intruder 
    - Practical UNIX & Internet Security, 24.2.6. Anatomy of a Break-in
  
 
- legal options regarding
: Practical UNIX & Internet Security, 26.1. Legal Options After a Break-in 
  - pursuing and capturing
: Building Internet Firewalls, 13.3. Pursuing and Capturing the
  - recovering from
: Building Internet Firewalls, 13.1.6. Restore and Recover
  - responding to
  
- 
    - Practical UNIX & Internet Security, 24. Discovering a  Break-in
    - Practical UNIX & Internet Security, 24.7. Damage Control
  
 
- revealing DNS information to
: Building Internet Firewalls, 8.10.4.3. Revealing too much information to
  - reviewing response strategies
: Building Internet Firewalls, 13.4.8. Periodic Review of Plans
  - slower machines and
: Building Internet Firewalls, 5.3.2. How Fast a Machine?
  - tracking from log files
: Practical UNIX & Internet Security, 24.3. The Log Files: Discovering an Intruder's
  - types of
: Building Internet Firewalls, 1.2.2. Types of Attackers
 
- attacks, incidents, threats
- 
  - TCP/IP Network Administration, 1.7. Application Layer
  - TCP/IP Network Administration, 4.2.1. Obtaining an IP Address 
  - accidental
: Building Internet Firewalls, 1.2.3. Stupidity and Accidents
  - assessing
  
- 
    - Practical UNIX & Internet Security, 2.3.3. Adding Up the Numbers
    - TCP/IP Network Administration, 12.1.1. Assessing the Threat 
  
 
- back doors
  
- 
    - Practical UNIX & Internet Security, 2.5. The Problem with Security  Through Obscurity 
    - Practical UNIX & Internet Security, 6.2.3. Cryptographic Strength 
    - Practical UNIX & Internet Security, 11.1. Programmed Threats: Definitions 
    - Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors 
    - Practical UNIX & Internet Security, 11.5. Protecting Yourself 
    - Practical UNIX & Internet Security, 27.1.2. Trusting Trust
    - in MUDs and IRCs
: Practical UNIX & Internet Security, 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
  
 
- backup-related
  
- 
    - Practical UNIX & Internet Security, 7.1.6. Security for Backups 
    - Practical UNIX & Internet Security, 7.1.6.3. Data security for backups
  
 
- bacteria programs
: Practical UNIX & Internet Security, 11.1.7. Bacteria and Rabbits 
  - biological threats
: Practical UNIX & Internet Security, 12.2.1.7. Bugs (biological) 
  - broadcast storms
: Practical UNIX & Internet Security, 25.3.2. Message Flooding 
  - via CGI scripts
: Practical UNIX & Internet Security, 18.2.3.2. Testing is not enough!
  - changing file owners
: Practical UNIX & Internet Security, 5.7. chown: Changing a File's Owner 
  - changing system clock
: Practical UNIX & Internet Security, 5.1.5. File Times
  - code breaking
  
- 
    - Practical UNIX & Internet Security, 6.1.1. Code Making and Code Breaking
    - (see also cryptography)
  
 
- command channel
: Building Internet Firewalls, 8.1. Electronic Mail
  - commonly attacked accounts
: Practical UNIX & Internet Security, 8.1.2. Default Accounts 
  - computer failures
: Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
  - contacting service providers about
: Building Internet Firewalls, 13.4.4.3. Vendors and service providers
  - data-driven attacks
: Building Internet Firewalls, 8.1. Electronic Mail
  - decode aliases
: Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
  - deep tree structures
: Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
  - denial of service
  
- 
    - Building Internet Firewalls, 1.2.1.2. Denial of Service
    - Practical UNIX & Internet Security, 1.5. Role of This Book
    - Practical UNIX & Internet Security, 17.1.3. The /etc/inetd Program 
    - Practical UNIX & Internet Security, 17.3.21.5. Denial of service attacks under X 
    - Practical UNIX & Internet Security, 25. Denial of Service Attacks and Solutions
    - Practical UNIX & Internet Security, 25.3. Network Denial of Service Attacks 
    - Practical UNIX & Internet Security, 25.3.4. Clogging
    - TCP/IP Network Administration, 12.1.1. Assessing the Threat 
    - accidental
    
- 
      - Building Internet Firewalls, 1.2.3. Stupidity and Accidents
      - Practical UNIX & Internet Security, 25.2.5. Soft Process Limits: Preventing Accidental  Denial
    
 
- automatic lockout
: Practical UNIX & Internet Security, 3.3. Entering Your Password 
    - checklist for
: Practical UNIX & Internet Security, A.1.1.24. Chapter 25: Denial of Service Attacks and Solutions
    - destructive attacks
: Practical UNIX & Internet Security, 25.1. Destructive Attacks 
    - disk attacks
    
- 
      - Practical UNIX & Internet Security, 25.2.2. Disk Attacks 
      - Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
    
 
- inodes
: Practical UNIX & Internet Security, 25.2.2.3. Inode problems 
    - internal inetd services
: Practical UNIX & Internet Security, 17.1.3. The /etc/inetd Program 
    - on networks
    
- 
      - Practical UNIX & Internet Security, 25.3. Network Denial of Service Attacks 
      - Practical UNIX & Internet Security, 25.3.4. Clogging
    
 
- overload attacks
    
- 
      - Practical UNIX & Internet Security, 25.2. Overload Attacks 
      - Practical UNIX & Internet Security, 25.2.5. Soft Process Limits: Preventing Accidental  Denial
    
 
- via syslog
: Practical UNIX & Internet Security, 10.5.1. The syslog.conf Configuration File 
    - system overload attacks
: Practical UNIX & Internet Security, 25.2.1.2. System overload attacks
    - X Window System
: Practical UNIX & Internet Security, 17.3.21.5. Denial of service attacks under X 
  
 
- detecting, plan for
: Building Internet Firewalls, 13.4.1. Planning for Detection 
  - dictionary attacks
  
- 
    - Building Internet Firewalls, 10.3.1. One-Time Passwords
    - Practical UNIX & Internet Security, 8.6.1. The crypt()
    - TCP/IP Network Administration, 12.2. User Authentication 
  
 
- disposed materials
: Practical UNIX & Internet Security, 12.3.3. Other Media
  - DNS client flooding
: Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
  - DNS nameserver attacks
: Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
  - DNS zone transfers
: Practical UNIX & Internet Security, 17.3.6.1. DNS zone transfers
  - documenting
  
- 
    - Building Internet Firewalls, 13.1.5. Snapshot the System
    - Building Internet Firewalls, 13.1.7. Document the Incident
    - planning for
: Building Internet Firewalls, 13.4.5. Planning for Snapshots
  
 
- dormant accounts
  
- 
    - Practical UNIX & Internet Security, 8.4. Managing Dormant Accounts 
    - Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts 
  
 
- evaluating, plan for
: Building Internet Firewalls, 13.4.2. Planning for Evaluation of the Incident
  - false syslog entries
: Practical UNIX & Internet Security, 10.5.3.1. Beware false log entries
  - filename attacks
: Practical UNIX & Internet Security, 11.5.1.4. Filename attacks 
  - having tools and supplies for
: Building Internet Firewalls, 13.5.5. Keeping a Cache of Tools and Supplies
  - hidden space
: Practical UNIX & Internet Security, 25.2.2.7. Hidden space
  - hijacking
: Building Internet Firewalls, 10.1.1. Hijacking
  - HOME variable attacks
: Practical UNIX & Internet Security, 11.5.1.3. $HOME attacks 
  - identifying and quantifying
  
- 
    - Practical UNIX & Internet Security, 2.2.1.2. Identifying threats
    - Practical UNIX & Internet Security, 2.2.2. Review Your Risks
  
 
- IFS variable attacks
: Practical UNIX & Internet Security, 11.5.1.2. IFS attacks 
  - intruders/attackers
  
- 
    - Building Internet Firewalls, 1.2.1.1. Intrusion
    - Practical UNIX & Internet Security, 1. Introduction
    - TCP/IP Network Administration, 1.7. Application Layer
    - TCP/IP Network Administration, 5.2. Linux Kernel Configuration 
    - (see also finger service)
    - (see also firewalls)
    - (see also TFTP)
    - confronting
: Practical UNIX & Internet Security, 24.2.2. What to Do When You Catch Somebody 
    - creating hidden files
: Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories 
    - discovering
    
- 
      - Practical UNIX & Internet Security, 24.2. Discovering an Intruder 
      - Practical UNIX & Internet Security, 24.2.6. Anatomy of a Break-in
    
 
- legal options regarding
: Practical UNIX & Internet Security, 26.1. Legal Options After a Break-in 
    - pursuing and capturing
: Building Internet Firewalls, 13.3. Pursuing and Capturing the
    - recovering from
: Building Internet Firewalls, 13.1.6. Restore and Recover
    - responding to
    
- 
      - Practical UNIX & Internet Security, 24. Discovering a Break-in
      - Practical UNIX & Internet Security, 24.7. Damage Control
    
 
- revealing DNS information to
: Building Internet Firewalls, 8.10.4.3. Revealing too much information to
    - reviewing response strategies
: Building Internet Firewalls, 13.4.8. Periodic Review of Plans
    - slower machines and
: Building Internet Firewalls, 5.3.2. How Fast a Machine?
    - tracking from log files
: Practical UNIX & Internet Security, 24.3. The Log Files: Discovering an Intruder's
    - types of
: Building Internet Firewalls, 1.2.2. Types of Attackers
  
 
- letting in accidentally
: Practical UNIX & Internet Security, 11.4. Entry 
  - logic bombs
  
- 
    - Practical UNIX & Internet Security, 11.1.3. Logic Bombs 
    - Practical UNIX & Internet Security, 27.2.2. Viruses on the Distribution Disk
  
 
- mailing list for
: Practical UNIX & Internet Security, E.1.3.9. RISKS
  - media failure
: Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
  - meet-in-the-middle attacks
: Practical UNIX & Internet Security, 6.4.5.1. Double DES
  - MUD/IRC client programs
: Practical UNIX & Internet Security, 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
  - multiple failed attacks
: Building Internet Firewalls, 12.2.3. The Good, the Bad, and the Ugly
  - newly created accounts
: Practical UNIX & Internet Security, 24.4.1. New Accounts 
  - NIS, unintended disclosure
: Practical UNIX & Internet Security, 19.4.5. Unintended Disclosure of Site Information with NIS
  - notifying people about
  
- 
    - Building Internet Firewalls, 13.1.4. Make `Incident in Progress'
    - Building Internet Firewalls, 13.4.4. Planning for Notification of People
    - TCP/IP Network Administration, 12.4.2. Looking for Trouble 
    - TCP/IP Network Administration, 12.4.2.2. Checking login activity 
  
 
- with NNTP
: Practical UNIX & Internet Security, 17.3.13. Network News Transport Protocol (NNTP)  (TCP Port
  - open (guest) accounts
  
- 
    - Practical UNIX & Internet Security, 8.1.4. Open Accounts 
    - Practical UNIX & Internet Security, 8.1.4.6. Potential problems with rsh 
  
 
- password attacks
: Building Internet Firewalls, 10.3.1. One-Time Passwords
  - PATH variable attacks
: Practical UNIX & Internet Security, 11.5.1.1. PATH attacks 
  - plaintext attacks
: Practical UNIX & Internet Security, 6.2.3. Cryptographic Strength 
  - playback (replay) attacks
: Practical UNIX & Internet Security, 19.6.1.2. Using the ticket granting ticket
  - practicing drills for
: Building Internet Firewalls, 13.5.7. Doing Drills
  - programmed
  
- 
    - Practical UNIX & Internet Security, 11. Protecting Against Programmed Threats 
    - Practical UNIX & Internet Security, 11.6.2. Shared Libraries
    - Practical UNIX & Internet Security, A.1.1.10. Chapter 11: Protecting Against Programmed Threats
    - Practical UNIX & Internet Security, D.1.4. Computer Viruses and Programmed Threats
    - authors of
: Practical UNIX & Internet Security, 11.3. Authors 
    - damage from
: Practical UNIX & Internet Security, 11.2. Damage 
  
 
- recovering from
: Building Internet Firewalls, 13.1.6. Restore and Recover
  
- 
    - planning to
: Building Internet Firewalls, 13.4.6. Planning for Restoration and Recovery
  
 
- replay attacks
: Practical UNIX & Internet Security, 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
  - responding to
  
- 
    - Building Internet Firewalls, 12.2.5. Responding to Attacks
    - Building Internet Firewalls, 13. Responding to Security Incidents
  
 
- reviewing response strategies
: Building Internet Firewalls, 13.4.8. Periodic Review of Plans
  - rsh, problems with
: Practical UNIX & Internet Security, 8.1.4.6. Potential problems with rsh 
  - sendmail problems
: Practical UNIX & Internet Security, 17.3.4.1. sendmail and security 
  - spoofed network connection
: Practical UNIX & Internet Security, 8.5.3.1. Trusted path
  - start-up file attacks
  
- 
    - Practical UNIX & Internet Security, 11.5.2. Start-up File Attacks 
    - Practical UNIX & Internet Security, 11.5.2.7. Other initializations 
  
 
- system clock
: (see system clock)
  - theft
: (see theft)
  - /tmp directory attacks
: Practical UNIX & Internet Security, 25.2.4. /tmp Problems
  - toll fraud
: Practical UNIX & Internet Security, 14.4.1. One-Way Phone Lines 
  - traffic analysis
: Practical UNIX & Internet Security, 18.4. Avoiding the Risks of Eavesdropping
  - tree-structure attacks
: Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
  - Trojan horses
  
- 
    - Practical UNIX & Internet Security, 4.3.5. Using su with Caution
    - Practical UNIX & Internet Security, 11.1.4. Trojan Horses 
    - Practical UNIX & Internet Security, 11.5. Protecting Yourself 
    - Practical UNIX & Internet Security, 17.3.21.2. X security
    - Practical UNIX & Internet Security, 19.6.5. Kerberos Limitations
    - Practical UNIX & Internet Security, 27.2.2. Viruses on the Distribution Disk
  
 
- trusted hosts
: (see trusted hosts)
  - types of
: Building Internet Firewalls, 1.2. What Are You Trying To Protect
  - unattended terminals
  
- 
    - Practical UNIX & Internet Security, 12.3.5. Unattended Terminals 
    - Practical UNIX & Internet Security, 12.3.5.2. X screen savers
  
 
- unowned files
: Practical UNIX & Internet Security, 24.4.1.8. Unowned files 
  - vandalism
  
- 
    - Practical UNIX & Internet Security, 12.2.4. Vandalism 
    - Practical UNIX & Internet Security, 12.2.4.3. Network connectors 
  
 
- viruses
  
- 
    - Building Internet Firewalls, 1.4.2.4. A firewall can't protect against
    - Practical UNIX & Internet Security, 11.1. Programmed Threats: Definitions 
    - Practical UNIX & Internet Security, 11.1.5. Viruses 
    - Practical UNIX & Internet Security, 27.2.2. Viruses on the Distribution Disk
    - bacteria programs
: Practical UNIX & Internet Security, 11.1.7. Bacteria and Rabbits 
    - references on
: Practical UNIX & Internet Security, D.1.4. Computer Viruses and Programmed Threats
  
 
- war and terrorism
: Practical UNIX & Internet Security, 12.2.5. Defending Against Acts of War and Terrorism 
  - weakness-finding tools
: Practical UNIX & Internet Security, 11.1.1. Security Tools
  - by web browsers
  
- 
    - Practical UNIX & Internet Security, 18.5. Risks of Web Browsers
    - Practical UNIX & Internet Security, 18.5.2. Trusting Your Software Vendor
  
 
- worms
: Practical UNIX & Internet Security, 11.1.6. Worms 
 
- audio data content
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- audio device
: Practical UNIX & Internet Security, 23.8. Picking a Random Seed
- audit IDs
- 
  - Practical UNIX & Internet Security, 4.3.3. Other IDs
  - Practical UNIX & Internet Security, 10.1. The Basic Log Files
 
- auditing
- 
  - Building Internet Firewalls, 5.8.5. Running a Security Audit
  - Practical UNIX & Internet Security, 10. Auditing and Logging
  - (see also logs/logging)
  - C2 audit
: Practical UNIX & Internet Security, 10.1. The Basic Log Files
  - checklist for
: Practical UNIX & Internet Security, A.1.1.9. Chapter 10: Auditing and Logging
  - checksums
  
- 
    - Building Internet Firewalls, 5.8.5.3. About checksums for auditing
    - Practical UNIX & Internet Security, 6.5.5.1. Checksums
    - Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
    - TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
    - TCP/IP Network Administration, 11.8. Protocol Case Study 
    - keeping secure
: Building Internet Firewalls, 13.5.3. Keeping Secured Checksums
    - recalculating
    
- 
      - TCP/IP Network Administration, 4.2.1. Obtaining an IP Address 
      - TCP/IP Network Administration, 5.3.1.1. Options 
    
 
- using Tripwire for
: Building Internet Firewalls, 5.8.5.1. Auditing packages
  
 
- employee access
: Practical UNIX & Internet Security, 13.2.4. Auditing Access
  - login times
: Practical UNIX & Internet Security, 10.1.1. lastlog File 
  - of packages
: Building Internet Firewalls, 5.8.5.1. Auditing packages
  - system activity
: Practical UNIX & Internet Security, 2.1. Planning Your Security Needs
  - tools for
: Building Internet Firewalls, B.2. Analysis Tools
  - user activity
: Practical UNIX & Internet Security, 4.1.2. Multiple Accounts with the Same UID
  - who is logged in
  
- 
    - Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files 
    - Practical UNIX & Internet Security, 10.1.2.1. su commandutmp and wtmp files andsu
  
 
 
- AUTH_DES authentication
: Practical UNIX & Internet Security, 19.2.2.3. AUTH_DES 
- AUTH_KERB authentication
: Practical UNIX & Internet Security, 19.2.2.4. AUTH_KERB
- AUTH_NONE authentication
: Practical UNIX & Internet Security, 19.2.2.1. AUTH_NONE
- AUTH_UNIX authentication
: Practical UNIX & Internet Security, 19.2.2.2. AUTH_UNIX
- authd service
: Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
- authdes_win variable
: Practical UNIX & Internet Security, 19.3.1.3. Setting the window 
- authentication
- 
  - Building Internet Firewalls, 10. Authentication and Inbound
  - Practical UNIX & Internet Security, 3.2.3. Authentication
  - TCP/IP Network Administration, 1.7. Application Layer
  - TCP/IP Network Administration, 4.2.1. Obtaining an IP Address 
  - TCP/IP Network Administration, 7.4.2. RIP Version 2 
  - TCP/IP Network Administration, 9.3.2. NIS+ 
  - TCP/IP Network Administration, 12.2. User Authentication 
  - (see also packets)
  - (see also users)
  - address-based
: Building Internet Firewalls, 2.13. Window Systems
  - client, network filesystems and
: Building Internet Firewalls, 2.12. Network File Systems
  - commercial systems for
: Building Internet Firewalls, 10.4.3. Commercial Solutions
  - complete systems for
: Building Internet Firewalls, 10.4. Complete Authentication
  - DES-encrypted
: TCP/IP Network Administration, 9.3.2. NIS+ 
  - false
: Building Internet Firewalls, 10.1.3. False Authentication
  - ID services
: Practical UNIX & Internet Security, 16.3.3. Authentication
  - in pppd
  
- 
    - TCP/IP Network Administration, 6.3.4. PPP Daemon Security 
    - TCP/IP Network Administration, A.2. The PPP Daemon
  
 
- Kerberos
  
- 
    - Practical UNIX & Internet Security, 19.6.1. Kerberos Authentication
    - Practical UNIX & Internet Security, 19.6.1.4. Kerberos 4 vs. Kerberos 5
  
 
- of logins
: Practical UNIX & Internet Security, 17.3.5. TACACS (UDP Port 49)
  - message digests
  
- 
    - Practical UNIX & Internet Security, 6.5.2. Using Message Digests
    - Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
    - Practical UNIX & Internet Security, 23.5.1. Use Message Digests for Storing Passwords
  
 
- NFS
: Building Internet Firewalls, 8.14. Network File System
  - NIS+
: Practical UNIX & Internet Security, 19.5.4. Using NIS+
  - of remote logins
: Building Internet Firewalls, 2.3. Remote Terminal Access and Command
  - RPCs
  
- 
    - Practical UNIX & Internet Security, 19.2.2. RPC Authentication
    - Practical UNIX & Internet Security, 19.2.2.4. AUTH_KERB
    - Secure RPC
: Practical UNIX & Internet Security, 19.3.1. Secure RPC Authentication
  
 
- security standard for
: Practical UNIX & Internet Security, 2.4.2. Standards
  - server
: TCP/IP Network Administration, 9.1.5. NFS Authentication Server 
  - TIS FWTK server
: Building Internet Firewalls, 10.4.2. TIS FWTK 
  - tools for
: Building Internet Firewalls, B.1. Authentication Tools
  - types of
: Building Internet Firewalls, 10.2. What Is Authentication?
  - for Web use
: Practical UNIX & Internet Security, 18.3.3. Setting Up Web Users and Passwords
  - xhost facility
: Practical UNIX & Internet Security, 17.3.21.3. The xhost facility 
 
- authenticators
: Practical UNIX & Internet Security, 3.1. Usernames 
- AuthGroupFile option
: Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
- authoritative servers
- 
  - TCP/IP Network Administration, 1.7. Application Layer
  - TCP/IP Network Administration, 3.3. Domain Name Service
  - TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
  - (see also nonauthoritative servers)
 
- authors of programmed threats
: Practical UNIX & Internet Security, 11.3. Authors 
- AuthRealm, AuthType, AuthUserFile options
: Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
- "Auto-Submitted:" header line
: sendmail, 35.10. Alphabetized Reference 
- auto_direct file
: TCP/IP Network Administration, 9.1.4. NFS Automounter 
- auto_home file
: TCP/IP Network Administration, 9.1.4. NFS Automounter 
- auto_master file
: TCP/IP Network Administration, 9.1.4. NFS Automounter 
- Auto_Mounter table (NIS+)
: Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
- AUTO_NIS_ALIASES macro
: sendmail, 18.8. Alphabetized Reference 
- auto-revarp parameter
: TCP/IP Network Administration, 6.1.5.5. Point-to-point 
- autofs script
: TCP/IP Network Administration, 9.1.4. NFS Automounter 
- autologout shell variable
: Practical UNIX & Internet Security, 12.3.5.1. Built-in shell autologout 
- Automated Systems Incident Response Capability (NASA)
: Practical UNIX & Internet Security, F.3.4.24. Automated Systems Incident Response Capability
- automatic
- 
  - Practical UNIX & Internet Security, 11.5.3. Abusing Automatic Mechanisms 
  - (see also at program; cron file)
  - account lockout
: Practical UNIX & Internet Security, 3.3. Entering Your Password 
  - backups system
: Practical UNIX & Internet Security, 7.3.2. Building an Automatic Backup System
  - cleanup scripts (UUCP)
: Practical UNIX & Internet Security, 15.6.2. Automatic Execution of Cleanup Scripts 
  - directory listings (Web)
: Practical UNIX & Internet Security, 18.2.2.2. Additional configuration issues
  - disabling of dormant accounts
: Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts 
  - logging out
: Practical UNIX & Internet Security, 12.3.5.1. Built-in shell autologout 
  - mechanisms, abusing
  
- 
    - Practical UNIX & Internet Security, 11.5.3. Abusing Automatic Mechanisms 
    - Practical UNIX & Internet Security, 11.5.3.6. Other files 
  
 
- password generation
: Practical UNIX & Internet Security, 8.8.4. Password Generators 
  - power cutoff
: (see detectors)
  - sprinkler systems
: Practical UNIX & Internet Security, 12.2.1.1. Fire 
  - wtmp file pruning
: Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file 
 
- Automatic Call Unit (ACU)
: TCP/IP Network Administration, 6.3.6. Solaris PPP 
- automount
: TCP/IP Network Administration, 9.1.4. NFS Automounter 
- automounter daemon (automountd)
: TCP/IP Network Administration, 9.1.4. NFS Automounter 
- autonomous systems (AS)
- 
  - Building Internet Firewalls, C.10. Internet Routing Architecture
  - TCP/IP Network Administration, 2.4. Internet Routing Architecture
  - TCP/IP Network Administration, 7.4. Interior Routing Protocols 
  - defined
: TCP/IP Network Administration, 7.5. Exterior Routing Protocols 
  - external (ASE) routes
  
- 
    - TCP/IP Network Administration, 7.7.1.3. Exterior gateway configuration 
    - TCP/IP Network Administration, B.8.1. The ospf Statement
    - TCP/IP Network Administration, B.10.1. The import Statement
    - types of
: TCP/IP Network Administration, B.10.2. The export Statement
  
 
- listing of
: TCP/IP Network Administration, B.10. Control Statements
  - number (ASN)
  
- 
    - TCP/IP Network Administration, 4.3.1. Obtaining an autonomous system number 
    - TCP/IP Network Administration, B.7. Definition Statements
    - TCP/IP Network Administration, B.8.5. The bgp Statement
  
 
- subdividing
: TCP/IP Network Administration, 7.4.3. Open Shortest Path First 
 
- AutoRebuildAliases (D) option
- 
  - sendmail, 24.5.3. Prevent Simultaneous Rebuilds 
  - sendmail, 34.8. Alphabetized Reference 
 
- auxiliary (printer) ports
: Practical UNIX & Internet Security, 12.3.1.4. Auxiliary ports on terminals 
- awk scripts
- 
  - Practical UNIX & Internet Security, 11.1.4. Trojan Horses 
  - Practical UNIX & Internet Security, 11.5.1.2. IFS attacks 
 
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
 O'Reilly & Associates, Inc.
All Rights Reserved.