Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: B

b flag : sendmail, 30.8. Alphabetized F= Flags
B line (qf file) : sendmail, 23.9. The qf File Internals
$b macro
sendmail, 14.1.2. The Received: Header
sendmail, 31.10. Alphabetized Reference
$B macro : sendmail, 31.10. Alphabetized Reference
b option : sendmail, 34.8. Alphabetized Reference
B option
sendmail, 13.2.8. The Unquoted Space Replacement Character
sendmail, 28.2.3. Pasting Addresses Back Together
sendmail, 34.8. Alphabetized Reference
-b switch (sendmail)
sendmail, 4.1. Become a Mode (-b)
sendmail, 36.7. Alphabetized Reference
-ba switch : sendmail, 36.7. Alphabetized Reference
-bd switch
sendmail, 3.4. Role as a Daemon
sendmail, 4.1.1. Daemon Mode (-bd)
sendmail, 15.5. Prevent the Daemon from Running
sendmail, 36.7. Alphabetized Reference
-bD switch : sendmail, 36.7. Alphabetized Reference
-bh switch : sendmail, 36.7. Alphabetized Reference
-bH switch : sendmail, 36.7. Alphabetized Reference
-bi switch
sendmail, 4.1.3. Rebuild Aliases Mode (-bi)
sendmail, 24.5.1. Rebuild the Alias Database
sendmail, 36.7. Alphabetized Reference
-bm switch : sendmail, 36.7. Alphabetized Reference
-bp switch
sendmail, 4.1.2. Show Queue Mode (-bp)
sendmail, 36.7. Alphabetized Reference
-bs switch
sendmail, 14.6. Trusted User
sendmail, 36.7. Alphabetized Reference
-bt switch
sendmail, 5.2. The Minimal File
sendmail, 8.3. Rule Sets
sendmail, 36.7. Alphabetized Reference
sendmail, 38. Rule-Set Testing with -bt
-bv switch
sendmail, 4.1.4. Verify Mode (-bv)
sendmail, 36.7. Alphabetized Reference
-bz switch : sendmail, 36.7. Alphabetized Reference
-B switch (sendmail) : sendmail, 36.7. Alphabetized Reference
back doors
Practical UNIX & Internet Security, 2.5. The Problem with Security Through Obscurity
Practical UNIX & Internet Security, 6.2.3. Cryptographic Strength
Practical UNIX & Internet Security, 11.1. Programmed Threats: Definitions
Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
Practical UNIX & Internet Security, 11.5. Protecting Yourself
Practical UNIX & Internet Security, 27.1.2. Trusting Trust
in MUDs and IRCs : Practical UNIX & Internet Security, 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
back-off algorithms : TCP/IP Network Administration, 9.4. A BOOTP Server
backbones
TCP/IP Network Administration, 7.4.3. Open Shortest Path First
TCP/IP Network Administration, 7.7.1.2. Interior gateway configurations
background checks, employee : Practical UNIX & Internet Security, 13.1. Background Checks
background delivery mode : sendmail, 13.2.3. The Default Delivery Mode
backquotes in CGI input
Practical UNIX & Internet Security, 18.2.3.2. Testing is not enough!
Practical UNIX & Internet Security, 18.2.3.3. Sending mail
backslash (\)
escaping newline characters
TCP/IP Network Administration, 9.2.1. The printcap File
TCP/IP Network Administration, A.3. chat
TCP/IP Network Administration, C.3.1. Standard Resource Records
in UUCP addresses
sendmail, 17.1.4. UUCP Addresses
sendmail, 19.6. Alphabetized m4 Macros
mail command and : Practical UNIX & Internet Security, 15.1.3. mail Command
in header fields : sendmail, 35.3.2. Escape Character in the Header Field
in rules : sendmail, 28.1.2.1. Backslashes in rules
BACKSPACE key : Practical UNIX & Internet Security, 3.4. Changing Your Password
backup program : Practical UNIX & Internet Security, 7.4.3. Specialized Backup Programs
backups
Building Internet Firewalls, 3.1. Least Privilege
Building Internet Firewalls, 5.10. Protecting the Machine and Backups
Building Internet Firewalls, 13.5.1. Backing Up Your Filesystems
Practical UNIX & Internet Security, 7. Backups
Practical UNIX & Internet Security, 7.4.7. inode Modification Times
Practical UNIX & Internet Security, 9.1.2. Read-only Filesystems
Practical UNIX & Internet Security, 24.2.2. What to Do When You Catch Somebody
across networks : Practical UNIX & Internet Security, 7.4.5. Backups Across the Net
archiving information : Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
automatic
Practical UNIX & Internet Security, 7.3.2. Building an Automatic Backup System
Practical UNIX & Internet Security, 18.2.3.5. Beware stray CGI scripts
battery power : DNS & BIND, 8.5.2. Recommendations
checklist for : Practical UNIX & Internet Security, A.1.1.6. Chapter 7: Backups
criminal investigations and : Practical UNIX & Internet Security, 26.2.4. Hazards of Criminal Prosecution
critical files
Practical UNIX & Internet Security, 7.3. Backing Up System Files
Practical UNIX & Internet Security, 7.3.2. Building an Automatic Backup System
encrypting
Practical UNIX & Internet Security, 7.4.4. Encrypting Your Backups
Practical UNIX & Internet Security, 12.3.2.4. Backup encryption
of firewalls : Building Internet Firewalls, 12.1.1. Backing Up Your Firewall
hardcopy : Practical UNIX & Internet Security, 24.5.1. Never Trust Anything Except Hardcopy
keeping secure
Practical UNIX & Internet Security, 2.4.2. Standards
Practical UNIX & Internet Security, 2.4.3. Guidelines
Practical UNIX & Internet Security, 7.1.6. Security for Backups
Practical UNIX & Internet Security, 7.1.6.3. Data security for backups
Practical UNIX & Internet Security, 26.2.6. Other Tips
laws concerning : Practical UNIX & Internet Security, 7.1.7. Legal Issues
of log files : Practical UNIX & Internet Security, 10.2.2. Accounting with BSD
logs and : Building Internet Firewalls, 5.10.2. Do Secure Backups
name servers
DNS & BIND, 6.1.4. The nameserver Directive
DNS & BIND, 6.2.2. Local Name Server
retention of
Practical UNIX & Internet Security, 7.1.5. How Long Should You Keep a Backup?
Practical UNIX & Internet Security, 7.2. Sample Backup Strategies
Practical UNIX & Internet Security, 7.2.5. Deciding upon a Backup Strategy
rotating media : Practical UNIX & Internet Security, 7.1.3. Types of Backups
serial number and
DNS & BIND, 7.2.3. Starting Over with a New Serial Number
DNS & BIND, 7.6.1. Common Syslog Messages
software for
Practical UNIX & Internet Security, 7.4. Software for Backups
Practical UNIX & Internet Security, 7.4.7. inode Modification Times
commercial : Practical UNIX & Internet Security, 7.4.6. Commercial Offerings
special programs for : Practical UNIX & Internet Security, 7.4.3. Specialized Backup Programs
strategies for
Practical UNIX & Internet Security, 7.2. Sample Backup Strategies
Practical UNIX & Internet Security, 7.2.5. Deciding upon a Backup Strategy
Practical UNIX & Internet Security, 10.8. Managing Log Files
theft of
Practical UNIX & Internet Security, 12.3.2. Protecting Backups
Practical UNIX & Internet Security, 12.3.2.4. Backup encryption
using to restore system : Building Internet Firewalls, 13.1.6. Restore and Recover
verifying : Practical UNIX & Internet Security, 12.3.2.1. Verify your backups
zero-filled bytes in : Practical UNIX & Internet Security, 7.4. Software for Backups
zone data : DNS & BIND, 4.8.2. Backup Files
zone transfers and : DNS & BIND, 7.6.1. Common Syslog Messages
backward compatibility : sendmail, D.2. Backward Compatibility
bacteria
Practical UNIX & Internet Security, 11.1. Programmed Threats: Definitions
Practical UNIX & Internet Security, 11.1.7. Bacteria and Rabbits
"Bad file number" error : sendmail, 6.2.1. Testing the client.cf File
"bad ruleset definition" error : sendmail, 29.1.3. Associate Number with Name
BADSU attempts : (see sulog file)
Baldwin, Robert : Practical UNIX & Internet Security, 6.6.1.1. The crypt program
bandwidth
increasing : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
using efficiently
TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
TCP/IP Network Administration, 8.3.1.1. Configuring a caching-only nameserver
bang (!) and mail command : Practical UNIX & Internet Security, 15.1.3. mail Command
base64 encoding type
sendmail, 18.8. Alphabetized Reference
TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
Bash shell (bsh) : Practical UNIX & Internet Security, 8.1.4.4. No restricted bash
basic audio subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
Basic Encoding Rules (BER) : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
Basic Networking Utilities : (see BNU UUCP)
basic terminology : (see terminology, importance of using standard)
bastion hosts
DNS & BIND, 15.4.6.1. The bastion host
Building Internet Firewalls, 4.1. Some Firewall Definitions
Building Internet Firewalls, 4.2.3.2. Bastion host
Building Internet Firewalls, 5. Bastion Hosts
Practical UNIX & Internet Security, 21.1.3. Anatomy of a Firewall
TCP/IP Network Administration, 12.7. Firewalls
backups of : Building Internet Firewalls, 5.10. Protecting the Machine and Backups
building : Building Internet Firewalls, 5.8. Building a Bastion Host
fake DNS server on : Building Internet Firewalls, 8.10.5.1. Set up a `fake'
graphics on : Building Internet Firewalls, 5.3.3. What Hardware Configuration?
internal : Building Internet Firewalls, 5.2.3. Internal Bastion Hosts
on internal firewalls : Building Internet Firewalls, 4.4.6. An Internal Firewall May or May Not
isolating : Building Internet Firewalls, 4.2.3. Screened Subnet Architecture
merging with exterior router : Building Internet Firewalls, 4.3.3. It's OK to Merge
merging with interior router : Building Internet Firewalls, 4.3.4. It's Dangerous to Merge the Bastion
multiple : Building Internet Firewalls, 4.3.1. It's OK to Use
network location of : Building Internet Firewalls, 5.5. Locating the Bastion Host on the Network
as news server : Building Internet Firewalls, 8.5.3. Dangerous Ways to Set up
nonrouting dual-homed : Building Internet Firewalls, 5.2.1. Nonrouting Dual-homed Hosts
operating : Building Internet Firewalls, 5.9. Operating the Bastion Host
physical location of : Building Internet Firewalls, 5.4. Choosing a Physical Location
selecting services for : Building Internet Firewalls, 5.6. Selecting Services Provided by the
Sendmail on
Building Internet Firewalls, 8.1.1.2. Why does Sendmail have security
Building Internet Firewalls, 8.1.1.6. Configuring SMTP to
speed of : Building Internet Firewalls, 5.3.2. How Fast a Machine?
usage profile : Building Internet Firewalls, 5.9.1. Learn What the Normal Usage Profile Is
user accounts on : Building Internet Firewalls, 5.7. Don't Allow User Accounts on the
batch jobs
Practical UNIX & Internet Security, 25.2.1.2. System overload attacks
sendmail, 38.8. Batch Rule-Set Testing
(see also cron file)
baud : Practical UNIX & Internet Security, 14.1. Modems: Theory of Operation
"Bcc:" header line : sendmail, 35.10. Alphabetized Reference
bell (in Swatch program) : Practical UNIX & Internet Security, 10.6.2. The Swatch Configuration File
Bellcore : Practical UNIX & Internet Security, F.3.4.5. Bellcore
Berkeley db : (see db library package)
Berkeley Internet Name Domain : (see BIND)
Berkeley Software Distribution : (see BSD)
Berkeley UNIX : (see BSD UNIX)
Berkeley vendor specification : sendmail, 27.5.1. The vendor
Berkeley's sendmail : (see sendmail)
bestmx database class : sendmail, 33.8. Alphabetized Reference
bestmx_is_local feature : sendmail, 19.6. Alphabetized m4 Macros
BGP (Border Gateway Protocol)
TCP/IP Network Administration, Preface
TCP/IP Network Administration, 2.4. Internet Routing Architecture
TCP/IP Network Administration, 4.3.1. Obtaining an autonomous system number
TCP/IP Network Administration, 7.5. Exterior Routing Protocols
TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
enabling (in gated)
TCP/IP Network Administration, 7.7.1.3. Exterior gateway configuration
TCP/IP Network Administration, B.10. Control Statements
inside autonomous systems : TCP/IP Network Administration, 7.7.1.3. Exterior gateway configuration
statement (in gated) : TCP/IP Network Administration, B.8.5. The bgp Statement
bi-lateral agreements : TCP/IP Network Administration, 2.4. Internet Routing Architecture
bidirectionality
Building Internet Firewalls, 6.2.1. Protocols Are Usually
Practical UNIX & Internet Security, 14.1. Modems: Theory of Operation
Practical UNIX & Internet Security, 14.4.1. One-Way Phone Lines
bigcrypt algorithm : Practical UNIX & Internet Security, 8.6.4. Crypt16() and Other Algorithms
/bin directory
Practical UNIX & Internet Security, 11.1.5. Viruses
Practical UNIX & Internet Security, 11.5.1.1. PATH attacks
backing up : Practical UNIX & Internet Security, 7.1.2. What Should You Back Up?
/bin/csh : (see csh)
/bin/ksh : (see ksh)
/bin/login : (see login program)
/bin/mail : (see mail program)
/bin/passwd : (see passwd command)
/bin/sh : (see sh)
in restricted filesystems : Practical UNIX & Internet Security, 8.1.5. Restricted Filesystem
binary code : Practical UNIX & Internet Security, 11.1.5. Viruses
binary encoding type : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
BIND (Berkeley Internet Name Domain)
Building Internet Firewalls, 8.10. Domain Name System
Practical UNIX & Internet Security, 16.2.6.1. DNS under UNIX
Practical UNIX & Internet Security, 17.1.3. The /etc/inetd Program
TCP/IP Network Administration, Preface
TCP/IP Network Administration, UNIX Versions
TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
TCP/IP Network Administration, 8.1. BIND: UNIX Name Service
TCP/IP Network Administration, 11.2. Diagnostic Tools
compiling and installing : DNS & BIND, B. Compiling and Installing BIND on a Sun
configuration file : (see boot file)
configuration types : TCP/IP Network Administration, 8.1.1. BIND Configurations
debugging : TCP/IP Network Administration, 8.4. Using nslookup
directives and resolvers (list) : DNS & BIND, F.1. BIND Name Server Boot File Statements
firewalls and : DNS & BIND, 15.4. DNS and Internet Firewalls
history of : DNS & BIND, 1.4. The History of BIND
name server maintainence : DNS & BIND, 7. Maintaining BIND
logging (BIND 8) : DNS & BIND, 7.5. BIND 8 Logging
monitoring name servers : DNS & BIND, 7.6. Keeping Everything Running Smoothly
organizing db files : DNS & BIND, 7.3. Organizing Your Files
updating db files : DNS & BIND, 7.2. Updating db Files
name server signals : DNS & BIND, 7.1. BIND Name Server Signals
obtaining source code
DNS & BIND, 3.1. Getting BIND
DNS & BIND, B.1. Get the Source Code
resource on : sendmail, Other Books, Other Problems
resources for : DNS & BIND, 3.1.1. Handy Mailing Lists and Usenet Newsgroups
running as non-root user : DNS & BIND, 10.11.4. Running BIND as a Non-Root User
statistics : DNS & BIND, 7.6.2. Understanding the BIND Statistics
versions of
DNS & BIND, Versions
DNS & BIND, 3.1. Getting BIND
DNS & BIND, 10.11.1. BIND Version
DNS & BIND, 15.4.2. A Bad Example
interoperability problems : DNS & BIND, 13.5. Interoperability and Version Problems
transitions between : DNS & BIND, 13.4. Transition Problems
bind-users mailing list
DNS & BIND, 3.1.1. Handy Mailing Lists and Usenet Newsgroups
DNS & BIND, 4.2.9. The Root Cache Data
bind-workers mailing list : DNS & BIND, 3.1.1. Handy Mailing Lists and Usenet Newsgroups
BINDIR= directive : sendmail, 18.4.7. BINDIR=
biological threats : Practical UNIX & Internet Security, 12.2.1.7. Bugs (biological)
bit masks : TCP/IP Network Administration, 2.2.2. Classless IP Addresses
bit sets : TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
bitdomain feature : sendmail, 19.6. Alphabetized m4 Macros
BITNET addresses : sendmail, 19.6. Alphabetized m4 Macros
BITNET-RELAY macro (m4)
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 31.10. Alphabetized Reference
BITNET_SITECONFIG macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
blackhole
interface : TCP/IP Network Administration, B.6. Interface Statements
route : TCP/IP Network Administration, B.9. static Statements
BlankSub (B) option
sendmail, 13.2.8. The Unquoted Space Replacement Character
sendmail, 28.2.3. Pasting Addresses Back Together
sendmail, 34.8. Alphabetized Reference
blind carbon copy : sendmail, 35.10. Alphabetized Reference
block devices : Practical UNIX & Internet Security, 5.6. Device Files
block send commands : Practical UNIX & Internet Security, 11.1.4. Trojan Horses
blocking systems : Practical UNIX & Internet Security, 19.2. Sun's Remote Procedure Call (RPC)
BNU UUCP
Practical UNIX & Internet Security, 15.5. Security in BNU UUCP
Practical UNIX & Internet Security, 15.5.3. uucheck: Checking Your Permissions File
BODY parameter (ESMTP)
sendmail, 31.10. Alphabetized Reference
sendmail, 36.7. Alphabetized Reference
body, message : sendmail, 1.6. The Body
B line (qf file) : sendmail, 23.9. The qf File Internals
in queue
sendmail, 3.1.2. The Queue Directory
sendmail, 23.2.2. The Data (Message Body) File: df
${bodytype} macro : sendmail, 31.10. Alphabetized Reference
Boeing CERT : Practical UNIX & Internet Security, F.3.4.5. Bellcore
bogus name servers, avoiding : DNS & BIND, 10.10. Avoiding a Bogus Name Server
bogus qf files : sendmail, 23.3. A Bogus qf File (V8 only): Qf
bogusns directive
DNS & BIND, 10.10. Avoiding a Bogus Name Server
DNS & BIND, F.1.13. bogusns (4.9.3)
Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
TCP/IP Network Administration, 11.6.3. Cache corruption
TCP/IP Network Administration, C.2. named.boot Configuration Commands
bookptab file
TCP/IP Network Administration, 9.4. A BOOTP Server
TCP/IP Network Administration, 9.6.1. rdist
configuration parameters : TCP/IP Network Administration, 9.4.2. BOOTP extensions
updating : TCP/IP Network Administration, 9.4.2. BOOTP extensions
Boolean options, nslookup : DNS & BIND, 11.3. Option Settings
Boolean values
arguments, Boolean-type : sendmail, 34.5. Option Argument Types
in dhcpd parameters : TCP/IP Network Administration, 9.5.1. dhcpd.conf
in printcap parameters : TCP/IP Network Administration, 9.2.1. The printcap File
boot
Building Internet Firewalls, 5.8.2.4. Which services should you disable?
TCP/IP Network Administration, 9.4. A BOOTP Server
scripts, starting daemons from : TCP/IP Network Administration, 9.1.1. NFS Daemons
viruses : Practical UNIX & Internet Security, 11.1.5. Viruses
boot file (BIND configuration file)
DNS & BIND, 4.2. Setting Up DNS Data
DNS & BIND, 4.3. Setting Up a BIND Configuration File
DNS & BIND, 7.3. Organizing Your Files
DNS & BIND, 7.3.2. Changing the Origin in a Database File
directives
DNS & BIND, F.1. BIND Name Server Boot File Statements
DNS & BIND, F.1.14. check-names (4.9.4)
DNS & BIND, F.1.19. options (8.X.X)
DNS & BIND, F.1.21. zone (8.X.X)
syntax errors in : DNS & BIND, 13.3.5. 5. Syntax Error in the Conf File or DNS Database File
BOOTP (Bootstrap Protocol)
TCP/IP Network Administration, Preface
TCP/IP Network Administration, 3.6. Bootstrap Protocol
TCP/IP Network Administration, A.1.1. The dip Script File
bootp-2.4.3.tar file : TCP/IP Network Administration, 9.4.2. BOOTP extensions
bootp-DDS2.4.3.tar file : TCP/IP Network Administration, 9.4. A BOOTP Server
bootpd (BOOTP daemon) : TCP/IP Network Administration, 9.4. A BOOTP Server
bootpd file : TCP/IP Network Administration, 9.6.1. rdist
bootpgw (BOOTP gateway) : TCP/IP Network Administration, 9.4.1. BOOTP gateway
bootptab file
TCP/IP Network Administration, 9.4. A BOOTP Server
TCP/IP Network Administration, 9.4.2. BOOTP extensions
TCP/IP Network Administration, 9.6.1. rdist
clients : TCP/IP Network Administration, D.3.2. Configuration Parameters
expanded by DHCP : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
Bootparams table (NIS+) : Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
BOOTREPLY packet : TCP/IP Network Administration, 3.6. Bootstrap Protocol
BOOTREQUEST packet
TCP/IP Network Administration, 3.6. Bootstrap Protocol
TCP/IP Network Administration, 9.4. A BOOTP Server
TCP/IP Network Administration, 9.4.1. BOOTP gateway
TCP/IP Network Administration, 9.5.1. dhcpd.conf
Bootstrap Protocol : (see BOOTP)
Border Gateway Protocol : (see BGP)
border routers : TCP/IP Network Administration, 7.7.1.3. Exterior gateway configuration
bouncing messages
sendmail, 10.3. Missing Addresses
sendmail, 35.10. Alphabetized Reference
sendmail, 36.7. Alphabetized Reference
down sites and : sendmail, 23.7.1. Handling a Down Site
error messages and : sendmail, 34.8. Alphabetized Reference
mailing lists and
sendmail, 25.5.1. Reply Versus Bounce
sendmail, 25.5.3. A list-bounced Alias
to postmaster
sendmail, 22.8.3.4. The PostmasterCopy option
sendmail, 24.4.1. The Postmaster Alias
priority and : sendmail, 14.4. Precedence
recipient of : (see $n macro)
from retired accounts : sendmail, 19.6. Alphabetized m4 Macros
return interval : sendmail, 13.2.2. Limit the Life of Queued Messages
saved in qf file : sendmail, 23.3.6. Savemail Panic
Bourne shell
Practical UNIX & Internet Security, 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve
Practical UNIX & Internet Security, 11.5.1. Shell Features
Practical UNIX & Internet Security, C.5.3. Running the User's Shell
SUID and
Practical UNIX & Internet Security, 5.5.2. Problems with SUID
(see also shells)
bps (bits per second) : Practical UNIX & Internet Security, 14.1. Modems: Theory of Operation
braces ({})
sendmail, 5.3.2. Macros
sendmail, 5.3.5. Class Macros
sendmail, 7.1. Overview
configuration statements
TCP/IP Network Administration, 7.7.1.1. A host configuration
TCP/IP Network Administration, B.2. The gated Configuration Language
TCP/IP Network Administration, D.3. The dhcpd.conf Configuration File
long variable names : TCP/IP Network Administration, 10.5. sendmail Configuration
macro names : TCP/IP Network Administration, 10.5.2. The Define Macro Command
BREAK key : Practical UNIX & Internet Security, 14.5.3.2. Answer testing
breakdowns : (see disasters and disaster recovery)
breakins
checklist for : Practical UNIX & Internet Security, A.1.1.23. Chapter 24: Discovering a Break-in
legal options following : Practical UNIX & Internet Security, 26.1. Legal Options After a Break-in
responding to
Practical UNIX & Internet Security, 24. Discovering a Break-in
Practical UNIX & Internet Security, 24.7. Damage Control
resuming operation after : Practical UNIX & Internet Security, 24.6. Resuming Operation
broadcast addresses
Building Internet Firewalls, C.9. The IP Address
TCP/IP Network Administration, 2.2.2.1. Final notes on IP addresses
TCP/IP Network Administration, 2.6. Address Resolution
TCP/IP Network Administration, 4. Getting Started
TCP/IP Network Administration, 6.1. The ifconfig Command
TCP/IP Network Administration, 6.1.2. Checking the Interface with ifconfig
(see also addresses)
broadcast messages : sendmail, 14.4. Precedence
broadcast storm : Practical UNIX & Internet Security, 25.3.2. Message Flooding
broadcasting : Building Internet Firewalls, 8.9.3. The Multicast Backbone (MBONE)
BROKEN_RES_SEARCH macro : sendmail, 18.8. Alphabetized Reference
browsers, web
Building Internet Firewalls, 2.5. The World Wide Web
Practical UNIX & Internet Security, 18.5. Risks of Web Browsers
Practical UNIX & Internet Security, 18.5.2. Trusting Your Software Vendor
TCP/IP Network Administration, 13.1. The World Wide Web
as FTP clients : Building Internet Firewalls, 8.2.1.1. Packet filtering characteristics of
as Gopher clients : (see Gopher)
MIME in : Building Internet Firewalls, 8.1.3. Multipurpose Internet Mail Extensions
Netscape Navigator
Building Internet Firewalls, 2.5. The World Wide Web
TCP/IP Network Administration, 13.1. The World Wide Web
encryption system of : Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire
random number generator : Practical UNIX & Internet Security, 23.8. Picking a Random Seed
BSD (Berkeley Software Distribution) : Building Internet Firewalls, 2.14. Printing Systems
kernel configuration file : TCP/IP Network Administration, 5.3. The BSD Kernel Configuration File
r commands
Building Internet Firewalls, 5.8.2.4. Which services should you disable?
Building Internet Firewalls, 6.1.2.2. Some protocols are not well suited to packet
configuring : Building Internet Firewalls, 8.4.1. BSD
remounting filesystems on BSD systems : TCP/IP Network Administration, 9.1.3.2. The vfstab and fstab files
BSD UNIX : Practical UNIX & Internet Security, 1.3. History of UNIX
accounting with : Practical UNIX & Internet Security, 10.2.2. Accounting with BSD
Fast Filesystem (FFS) : Practical UNIX & Internet Security, 25.2.2.6. Reserved space
groups and : Practical UNIX & Internet Security, 4.1.3.3. Groups and BSD or SVR4 UNIX
immutable files : Practical UNIX & Internet Security, 9.1.1. Immutable and Append-Only Files
modems and : Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
programming references : Practical UNIX & Internet Security, D.1.11. UNIX Programming and System Administration
ps command with : Practical UNIX & Internet Security, C.1.2.2. Listing processes with Berkeley-derived versions of
published resources for : Practical UNIX & Internet Security, D.1. UNIX Security References
restricted shells : Practical UNIX & Internet Security, 8.1.4.2. Restricted shells under Berkeley versions
SUID files, list of : Practical UNIX & Internet Security, B.3. SUID and SGID Files
sulog log under : Practical UNIX & Internet Security, 4.3.7.1. The sulog under Berkeley UNIX
utmp and wtmp files : Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
BSD UNIX operating system : DNS & BIND, 1.1. A (Very) Brief History of the Internet
BSD-Compress scheme : TCP/IP Network Administration, A.2. The PPP Daemon
BSD/OS (operating system) : Practical UNIX & Internet Security, 1.3. History of UNIX
BSD4_3 and BSD4_4 macros : sendmail, 18.8. Alphabetized Reference
bsh (Bash shell) : Practical UNIX & Internet Security, 8.1.4.4. No restricted bash
BSI/GISA : Practical UNIX & Internet Security, F.3.4.15. Germany: government institutions
bstat utility : DNS & BIND, 7.6.2. Understanding the BIND Statistics
btree database class : sendmail, 33.8. Alphabetized Reference
buffers
checking boundaries : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
for editors : Practical UNIX & Internet Security, 11.1.4. Trojan Horses
overruns : TCP/IP Network Administration, 6.1.5.4. Maximum transmission unit
tokenizations : (see workspace)
bugs
Practical UNIX & Internet Security, 1.1. What Is Computer Security?
Practical UNIX & Internet Security, 1.4.2. Software Quality
Practical UNIX & Internet Security, 23.1.2.1. What they found
Practical UNIX & Internet Security, 27.2.3. Buggy Software
Practical UNIX & Internet Security, 27.2.5. Security Bugs that Never Get Fixed
sendmail, 18.2. Vendor Versus Compiling
sendmail, 18.8. Alphabetized Reference
sendmail, 22.3.1. SMTP debug
(see also debugging)
(see
Bugtraq mailing list : Practical UNIX & Internet Security, E.1.3.3. Bugtraq
command-line : Building Internet Firewalls, 8.1. Electronic Mail
db library package : sendmail, C.2. Get the Source
fixes : sendmail, 2.2. Read the Documents
hacker challenges : Practical UNIX & Internet Security, 27.2.4. Hacker Challenges
hardware : Practical UNIX & Internet Security, 27.2.1. Hardware Bugs
.htaccess file : Practical UNIX & Internet Security, 18.3.1. The access.conf and .htaccess Files
in packet filtering packages : Building Internet Firewalls, 6.1.2.1. Current filtering tools are not perfect
keeping secret : Practical UNIX & Internet Security, 2.5. The Problem with Security Through Obscurity
nested angle brackets : sendmail, 10.4. Nested Angle Brackets
NIS and vfork : sendmail, 18.8. Alphabetized Reference
tips on avoiding : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
bugs (biological) : Practical UNIX & Internet Security, 12.2.1.7. Bugs (biological)
BugTraq mailing list : Building Internet Firewalls, A.3.4. BugTraq
building
sendmail, 18.3.2. The makesendmail Script
(see also configuration)
alias database
sendmail, 24.5.1. Rebuild the Alias Database
sendmail, 24.5.2. Check the Right Side of Aliases
bastion hosts : Building Internet Firewalls, 5.8. Building a Bastion Host
sendmail
sendmail, 18.3.2. The makesendmail Script
sendmail, 18.5. Run Make
sendmail, 19.2. Build with m4
bulk erasers : Practical UNIX & Internet Security, 12.3.2.3. Sanitize your media before disposal
bulk precedence
sendmail, 14.4. Precedence
sendmail, 25.5.5. Precedence: bulk
byte-by-byte comparisons
Practical UNIX & Internet Security, 9.2.1. Comparison Copies
Practical UNIX & Internet Security, 9.2.1.3. rdist
byte-oriented masks : TCP/IP Network Administration, 2.3. Subnets
bytes, zero-filled : Practical UNIX & Internet Security, 7.4. Software for Backups


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.