Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: C
- C configuration command
- sendmail, 5.3.5. Class Macros
- sendmail, 12.1.1. Declaring a Class
- sendmail, 12.1.6. Add Class w to client.cf
- sendmail, 14.6. Trusted User
- sendmail, 32.1. Class Configuration Commands
- sendmail, 32.1.1. The C Class Command
- c flag
: sendmail, 30.8. Alphabetized F= Flags
- C flag
- sendmail, 30.7. Pitfalls
- sendmail, 30.8. Alphabetized F= Flags
- C line (qf file)
: sendmail, 23.9. The qf File Internals
- $c macro
: sendmail, 31.10. Alphabetized Reference
- $C macro
: sendmail, 31.10. Alphabetized Reference
- c option
: (see HoldExpensive (c) option)
- C option
: (see CheckpointInterval (C) option)
- C programming language
- DNS & BIND, 14.2. C Programming with the Resolver Library Routines
- DNS & BIND, 14.3.6. A Perl Version of check_soa
- Practical UNIX & Internet Security, 1.3. History of UNIX
- Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- -Wall compiler option
: Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- .C rule-testing command
: sendmail, 38.2.2. Add to a Class with .C
- C shell
: (see csh)
- -c switch (sendmail)
: sendmail, 36.7. Alphabetized Reference
- -C switch (sendmail)
- sendmail, 5.2. The Minimal File
- sendmail, 15.2. The Real Queue Directory
- sendmail, 36.7. Alphabetized Reference
- C-style and C++-style comments
: DNS & BIND, 4.3. Setting Up a BIND Configuration File
- C2 audit
: Practical UNIX & Internet Security, 10.1. The Basic Log Files
- C= equate
: sendmail, 30.4. The Equates
- cable tester
- TCP/IP Network Administration, 11.2. Diagnostic Tools
- TCP/IP Network Administration, 11.3.1. The ping Command
- TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
- cables
- Category 5
: TCP/IP Network Administration, 11.4.4. Subdividing an Ethernet
- checking
- TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
- TCP/IP Network Administration, 11.4.4.1. Network hardware problems
- network
- Practical UNIX & Internet Security, 12.2.4.2. Network cables
- Practical UNIX & Internet Security, 12.3.1.1. Wiretapping
- Practical UNIX & Internet Security, 12.3.1.5. Fiber optic cable
- cutting
: Practical UNIX & Internet Security, 25.1. Destructive Attacks
- wiretapping
: Practical UNIX & Internet Security, 12.3.1.1. Wiretapping
- Unshielded Twisted Pair (UTP)
: TCP/IP Network Administration, 11.4.4. Subdividing an Ethernet
- cache directive
- DNS & BIND, 15.4.4.4. The db.root file
- DNS & BIND, F.1.4. cache
- caching
- DNS & BIND, 2.7. Caching
- DNS & BIND, 2.7.1. Time to Live
- Practical UNIX & Internet Security, 5.6. Device Files
- TCP/IP Network Administration, 3.3. Domain Name Service
- caching-only name servers
- DNS & BIND, 8.2.2. Caching-Only Servers
- DNS & BIND, 8.3. Registering Name Servers
- cleaning interval
: DNS & BIND, 10.4.3.1. Cleaning interval
- corrupted
- DNS & BIND, 13.6.8. Name Server Keeps Loading Old Data
- DNS & BIND, 13.6.8.4. What have I got?
- TCP/IP Network Administration, 11.6.3. Cache corruption
- forwarders and
: DNS & BIND, 10.7. Building Up a Large Site-wide Cache with Forwarders
- initialization file
: TCP/IP Network Administration, 8.3.3. The Cache Initialization File
- missing cache data
: DNS & BIND, 13.3.7. 7. Missing Cache Data
- MX records
: sendmail, 21.3.6. Caching MX Records
- nameserver
: Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
- negative
- DNS & BIND, 12.4. The Resolver Search Algorithm and Negative Caching
- DNS & BIND, 13.5.7. Other Name Servers Don't Cache Your Negative Answers
- root cache data
: DNS & BIND, 4.2.9. The Root Cache Data
- servers
: sendmail, 21.1. Overview
- single answers
: TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
- statement
- TCP/IP Network Administration, 8.3.1.1. Configuring a caching-only nameserver
- TCP/IP Network Administration, C.2. named.boot Configuration Commands
- TTL (time to live)
- DNS & BIND, 2.7.1. Time to Live
- DNS & BIND, 4.2.9. The Root Cache Data
- DNS & BIND, 4.8.4. SOA Values
- DNS & BIND, 8.4. Changing TTLs
- DNS & BIND, 10.12. Load Sharing Between Mirrored Servers
- caching-only servers
- TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
- TCP/IP Network Administration, 8.1.1. BIND Configurations
- TCP/IP Network Administration, 8.3.1.1. Configuring a caching-only nameserver
- Caesar Cipher
: Practical UNIX & Internet Security, 6.4.3. ROT13: Great for Encoding Offensive Jokes
- calculating costs of losses
: Practical UNIX & Internet Security, 2.3.1. The Cost of Loss
- call forwarding
: Practical UNIX & Internet Security, 14.5.4. Physical Protection of Modems
- Call Trace
: Practical UNIX & Internet Security, 24.2.4. Tracing a Connection
- CALLBACK= command
: Practical UNIX & Internet Security, 15.5.2. Permissions Commands
- callbacks
- Practical UNIX & Internet Security, 14.4.2.
- Practical UNIX & Internet Security, 14.6. Additional Security for Modems
- BNU UUCP
: Practical UNIX & Internet Security, 15.5.2. Permissions Commands
- Version 2 UUCP
: Practical UNIX & Internet Security, 15.4.1.5. Requiring callback
- Caller-ID (CNID)
- Practical UNIX & Internet Security, 14.4.3. Caller-ID (CNID)
- Practical UNIX & Internet Security, 14.6. Additional Security for Modems
- Practical UNIX & Internet Security, 24.2.4. Tracing a Connection
- Canada, export control in
: Practical UNIX & Internet Security, 6.7.2. Cryptography and Export Controls
- cannot connect error
: TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
- "cannot set resource limits" message
: DNS & BIND, 7.6.1. Common Syslog Messages
- /canon rule-testing command
: sendmail, 38.5.1. Canonify a Host with /canon
- canonical name
: sendmail, 7.3.1. The hostname
- CNAME resource records
- sendmail, 21.3.2. MX to CNAME Causes Extra Lookups
- sendmail, 34.8. Alphabetized Reference
- TCP/IP Network Administration, 8.3.6. The named.hosts File
- TCP/IP Network Administration, 10.7.1. Modifying Local Information
- TCP/IP Network Administration, C.3.1.5. Canonical Name record
- determining with DNS
: sendmail, 21.2.1. Determine the Local Canonical Name
- host
: sendmail, 31.10. Alphabetized Reference
- local
: (see $j macro)
- canonical names
: (see CNAME records)
- canonicalization
- DNS & BIND, 4.2.5. Address and Alias Records
- DNS & BIND, 6.3.2. Electronic Mail
- sendmail, 17.2.1. Is the Host Local?
- sendmail, 38.5.1. Canonify a Host with /canon
- $[ and $] operators and
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 21.2.4. The $[ and $] Operators
- sendmail, 28.6.6. Canonicalize Hostname: $[ and $]
- sendmail, 33.4.3. $[ and $]: A Special Case
- nocanonify feature
: sendmail, 19.6. Alphabetized m4 Macros
- capacity planning
: DNS & BIND, 8.1.2. Capacity Planning
- capitalization
- aliases
: sendmail, 3.1.1. The Aliases File
- database keys
- sendmail, 33.2.1.2. -f don't fold uppercase to lowercase
- sendmail, 33.3.4.3. -f don't fold keys to lowercase (V8.1 and above)
- db files
- DNS & BIND, 4.2.1. The db Files
- DNS & BIND, A.1.1. Character Case
- hostnames
: sendmail, 30.8. Alphabetized F= Flags
- macro names and
: sendmail, 7.2. Defining Macros
- usernames
- Practical UNIX & Internet Security, 3.1. Usernames
- sendmail, 30.8. Alphabetized F= Flags
- capturing intruders
: Building Internet Firewalls, 13.3. Pursuing and Capturing the
- carbon copies
: sendmail, 35.10. Alphabetized Reference
- carbon monoxide
: Practical UNIX & Internet Security, 12.2.1.2. Smoke
- caret (^) in encrypted messages
: Practical UNIX & Internet Security, 6.2. What Is Encryption?
- carrier-detect (DCD) indicator, monitoring
: TCP/IP Network Administration, 6.3.3. chat
- case
: (see capitalization)
- cat command
- Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
- Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution
- -ve option
: Practical UNIX & Internet Security, 5.5.4.1. The ncheck command
- -v option
: Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
- cat-passwd command
: Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
- catastrophe logs
: Building Internet Firewalls, 5.8.1.4. Safeguard the system logs
- categories of data (logging)
- DNS & BIND, 7.5. BIND 8 Logging
- DNS & BIND, 7.5.3. Category Details
- category data, DSN delivery
: sendmail, 30.5.2.1. The $@ dsn part
- CBC (cipher block chaining)
- Practical UNIX & Internet Security, 6.4.4.2. DES modes
- Practical UNIX & Internet Security, 6.6.2. des: The Data Encryption Standard
- CBW (Crypt Breaker's Workbench)
: Practical UNIX & Internet Security, 6.6.1.1. The crypt program
- "Cc:" header line
: sendmail, 35.10. Alphabetized Reference
- CCTA IT Security & Infrastructure Group
: Practical UNIX & Internet Security, F.3.4.39. UnisysUK: other government
- CD-ROM
- Building Internet Firewalls, 5.3.3. What Hardware Configuration?
- Practical UNIX & Internet Security, 9.1.2. Read-only Filesystems
- CDFs (context-dependent files)
- Practical UNIX & Internet Security, 5.9.2. Context-Dependent Files
- Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
- ceilings, dropped
: Practical UNIX & Internet Security, 12.2.3.1. Raised floors and dropped ceilings
- cellular telephones
: Practical UNIX & Internet Security, 12.2.1.8. Electrical noise
- central administrator
: (see system administration)
- CERCUS (Computer Emergency Response Committee for Unclassified Systems)
: Practical UNIX & Internet Security, F.3.4.36. TRW Network Area and System Administrators
- Cerf, Vint
: Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
- CERN
: Practical UNIX & Internet Security, E.4.1. CERN HTTP Daemon
- HTTP daemon
: Building Internet Firewalls, B.5.2. CERN httpd
- HTTP server
: Building Internet Firewalls, 8.6.2. Proxying Characteristics of
- CERT (Computer Emergency Response Team)
- Practical UNIX & Internet Security, 6.5.2. Using Message Digests
- Practical UNIX & Internet Security, 27.3.5. Response Personnel?
- Practical UNIX & Internet Security, F.3.4.1. All Internet sites
- CERT-NL (Netherlands)
: Practical UNIX & Internet Security, F.3.4.25. Netherlands: German government institutions
- mailing list for
: Practical UNIX & Internet Security, E.1.3.4. CERT-advisory
- CERT-CC response teams
- Building Internet Firewalls, 13.4.4.2. CERT-CC and other incident response teams
- Building Internet Firewalls, A.2.2. info.cert.org
- Building Internet Firewalls, A.3.5. CERT-Advisory
- Building Internet Firewalls, A.5.1. CERT-CC
- contacting regarding incident
: Building Internet Firewalls, 13.1.4.2. CERT-CC or other incident response
- cf directory
: sendmail, 16.1. The cf/cf Directory
- cf/cf directory
: TCP/IP Network Administration, 10.4.1. Locating a Sample sendmail.cf File
- cf/feature directory
: TCP/IP Network Administration, E.3.2. FEATURE
- cf/ostype directory
: TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros
- _CF_DIR_ macro
: sendmail, 19.2.1. Maintain local files with _CF_DIR_
- CFB (cipher feedback)
: Practical UNIX & Internet Security, 6.4.4.2. DES modes
- CGI (Common Gateway Interface)
- Building Internet Firewalls, 8.6.3.1. What can a malicious client do to
- Practical UNIX & Internet Security, 18.1. Security and the World Wide Web
- scripts
- Practical UNIX & Internet Security, 18.2. Running a Secure Server
- Practical UNIX & Internet Security, 18.2.3. Writing Secure CGI Scripts and ProgramsThe
- Practical UNIX & Internet Security, 18.2.4.1. Beware mixing HTTP with anonymous FTP
- cgi-bin directory
: Practical UNIX & Internet Security, 18.2.2. Understand Your Server's Directory Structure
- cgm image subtype
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- chacl command
: Practical UNIX & Internet Security, 5.2.5.2. HP-UX access control lists
- chaining
: (see recursive resolution)
- Challenge Handshake Authentication Protocol
: (see CHAP)
- challenge string
: TCP/IP Network Administration, 6.3.4. PPP Daemon Security
- challenge-response system
- Building Internet Firewalls, 10.2.2. Something You Know
- Building Internet Firewalls, 10.3.3. Challenge-Response Schemes
- change detection
- Practical UNIX & Internet Security, 9.2. Detecting Change
- Practical UNIX & Internet Security, 9.3. A Final Note
- channels (logging)
: DNS & BIND, 7.5. BIND 8 Logging
- Chaosnet class
: DNS & BIND, 2.1.3. Resource Records
- CHAP (Challenge Handshake Authentication Protocol)
- TCP/IP Network Administration, 6.3.4. PPP Daemon Security
- TCP/IP Network Administration, A.2. The PPP Daemon
- chap-secrets file
: TCP/IP Network Administration, 6.3.4. PPP Daemon Security
- Chapman, Brent
: TCP/IP Network Administration, 12.1.1. Assessing the Threat
- character devices
: Practical UNIX & Internet Security, 5.6. Device Files
- character set
: sendmail, 30.4. The Equates
- character strings
: DNS & BIND, A.4.1.3. Character string
- character-type arguments
: sendmail, 34.5. Option Argument Types
- chat groups, harassment via
: Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
- chat script
- TCP/IP Network Administration, 6.3.3. chat
- TCP/IP Network Administration, A.2. The PPP Daemon
- TCP/IP Network Administration, A.3. chat
- chatkey
: TCP/IP Network Administration, A.1.1. The dip Script File
- chdir command
- Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
- check_compat rule set
: sendmail, 29.10.4. The check_compat Rule Set
- check_del utility
- DNS & BIND, 9.6. Good Parenting
- DNS & BIND, 9.6.1. Using check_del
- check_mail rule set
- sendmail, 20.2.6. Reject Mail from Spamming or Mail-bombing Sites
- sendmail, 29.10.1. The check_mail Rule Set
- check-names directive
: DNS & BIND, F.1.14. check-names (4.9.4)
- check_rcpt rule set
: sendmail, 29.10.2. The check_rcpt Rule Set
- check_relay rule set
: sendmail, 29.10.3. The check_relay Rule Set
- check_soa program (example)
- DNS & BIND, 14.2.8. A Sample Program: check_soa
- DNS & BIND, 14.3.6. A Perl Version of check_soa
- CheckAliases (n) option
- sendmail, 24.5.2. Check the Right Side of Aliases
- sendmail, 34.8. Alphabetized Reference
- checkcompat()
- sendmail, 20. The checkcompat() Cookbook
- sendmail, 20.3. Alphabetized V8.8 Subroutines
- checking
: (see testing)
- delegation
- DNS & BIND, 9.6. Good Parenting
- DNS & BIND, 9.6.2. Managing Delegation
- DNS & BIND, 13.3.9. 9. Missing Subdomain Delegation
- host names
: DNS & BIND, 4.5. Host Name Checking (BIND 4.9.4 and Later Versions)
- zone (debugging example)
: DNS & BIND, 12.3.4. A Slave Name Server Checking Its Zone (Debug Level 1)
- checklists for detecting changes
- Practical UNIX & Internet Security, 9.2.2. Checklists and Metadata
- Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
- CheckpointInterval (C) option
: sendmail, 34.8. Alphabetized Reference
- checksums
- Building Internet Firewalls, 5.8.5.3. About checksums for auditing
- Practical UNIX & Internet Security, 6.5.5.1. Checksums
- Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
- TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
- TCP/IP Network Administration, 11.8. Protocol Case Study
- keeping secure
: Building Internet Firewalls, 13.5.3. Keeping Secured Checksums
- recalculating
- TCP/IP Network Administration, 4.2.1. Obtaining an IP Address
- TCP/IP Network Administration, 5.3.1.1. Options
- using Tripwire for
: Building Internet Firewalls, 5.8.5.1. Auditing packages
- Chesson, Greg
: Practical UNIX & Internet Security, 15.2. Versions of UUCP
- chfn command
: Practical UNIX & Internet Security, 8.2. Monitoring File Format
- chgrp command
: Practical UNIX & Internet Security, 5.8. chgrp: Changing a File's Group
- child processes
: Practical UNIX & Internet Security, C.2. Creating Processes
- child, sendmail
: sendmail, 30.6.2. The Child
- children
: (see parenting)
- chkey command
: Practical UNIX & Internet Security, 19.3.1.1. Proving your identity
- chmod command
- Practical UNIX & Internet Security, 5.2.1. chmod: Changing a File's Permissions
- Practical UNIX & Internet Security, 5.2.4. Using Octal File Permissions
- Practical UNIX & Internet Security, 8.3. Restricting Logins
- -A option
: Practical UNIX & Internet Security, 5.2.5.2. HP-UX access control lists
- -f option
: Practical UNIX & Internet Security, 5.2.1. chmod: Changing a File's Permissions
- -h option
: Practical UNIX & Internet Security, 5.2.1. chmod: Changing a File's Permissions
- -R option
: Practical UNIX & Internet Security, 5.2.1. chmod: Changing a File's Permissions
- choke points
- Building Internet Firewalls, 3.3. Choke Point
- Building Internet Firewalls, 9.2.3.3. Choke point
- (see also firewalls)
- (see also interior router)
- using router as
: Building Internet Firewalls, 6.1. Why Packet Filtering?
- choot mechanism
: Building Internet Firewalls, 5.3.1. What Operating System?
- chown command
- Practical UNIX & Internet Security, 5.7. chown: Changing a File's Owner
- Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- chroot command
- DNS & BIND, 10.11.4. Running BIND as a Non-Root User
- Building Internet Firewalls, 8.2.1.3. Providing anonymous
- Practical UNIX & Internet Security, 8.1.5. Restricted Filesystem
- Practical UNIX & Internet Security, 8.1.5.2. Checking new software
- Practical UNIX & Internet Security, 11.1.4. Trojan Horses
- Practical UNIX & Internet Security, 23.4.1. Using chroot()
- with anonymous FTP
: Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
- chrootuid daemon
- Building Internet Firewalls, B.6.3. chrootuid
- Practical UNIX & Internet Security, E.4.2. chrootuid
- chsh command
: Practical UNIX & Internet Security, 8.7.1. Integrating One-time Passwords with UNIX
- CIAC (Computer Incident Advisory Capability)
: Practical UNIX & Internet Security, F.3.4.43. U.S. Department of Energy
- CIDR (classless inter-domain routing)
- DNS & BIND, 3.2.3. Checking That Your Network Is Registered
- Practical UNIX & Internet Security, 16.2.1.1. IP networks
- Practical UNIX & Internet Security, 16.2.1.3. CIDR addresses
- TCP/IP Network Administration, 2.2.2. Classless IP Addresses
- address mask
- TCP/IP Network Administration, 2.2. The IP Address
- TCP/IP Network Administration, 2.2.2. Classless IP Addresses
- blocks
: TCP/IP Network Administration, B.11. The Aggregate Statements
- cigarettes
: Practical UNIX & Internet Security, 12.2.1.2. Smoke
- cipher
- Practical UNIX & Internet Security, 6.4.3. ROT13: Great for Encoding Offensive Jokes
- TCP/IP Network Administration, 12.6. Encryption
- (see also cryptography; encryption)
- block chaining (CBC)
- Practical UNIX & Internet Security, 6.4.4.2. DES modes
- Practical UNIX & Internet Security, 6.6.2. des: The Data Encryption Standard
- ciphertext
- Practical UNIX & Internet Security, 6.2. What Is Encryption?
- Practical UNIX & Internet Security, 8.6.1. The crypt()
- feedback (CFB)
: Practical UNIX & Internet Security, 6.4.4.2. DES modes
- circuit-level proxy servers
: Building Internet Firewalls, 7.3.1. Application-Level Versus Circuit-Level
- CISCO
: Practical UNIX & Internet Security, F.3.4.8. CISCO Systems
- Cisco routers
- Building Internet Firewalls, 6.5. Conventions for Packet Filtering
- TCP/IP Network Administration, 12.5. Access Control
- city-level domains
: DNS & BIND, 3.2.2.1. The us domain
- civil actions (lawsuits)
: Practical UNIX & Internet Security, 26.3. Civil Actions
- class A and B networks, subnetting
: DNS & BIND, 9.5.2.1. Class A and B networks
- class C networks, subnetting
: DNS & BIND, 9.5.2.2. /24 (class C-sized) networks
- class command
: sendmail, 12.1. The Class Command
- CLASS fields (db files)
: DNS & BIND, A.1.5. Classes
- class macros
- sendmail, 5.3.5. Class Macros
- sendmail, 12. Class
- sendmail, 32. Class Macros
- m4 and
: sendmail, 32.3. Class with m4
- class w, defining
: TCP/IP Network Administration, 10.7.1. Modifying Local Information
- class= equate (syslog output)
: sendmail, 26.1.3.1. class= the queue class
- classes
: DNS & BIND, A.1.5. Classes
- adding to
: sendmail, 38.2.2. Add to a Class with .C
- class option, nslookup
: DNS & BIND, 11.3. Option Settings
- database
: sendmail, 33.8. Alphabetized Reference
- declaring
: sendmail, 32.1. Class Configuration Commands
- internet
: DNS & BIND, 2.1.3. Resource Records
- looking up words in
: sendmail, 20.3. Alphabetized V8.8 Subroutines
- name hashing algorithm
: sendmail, 32.2.4. Class Name Hashing Algorithm
- of addresses
: (see addresses, classes of)
- storing in files
: sendmail, 12.2. The File Form of Class
- unusual
: DNS & BIND, 7.6.1. Common Syslog Messages
- ClassFactor (z) option
: sendmail, 34.8. Alphabetized Reference
- classified data and breakins
- Practical UNIX & Internet Security, 26.1. Legal Options After a Break-in
- Practical UNIX & Internet Security, 26.2.2. Federal Jurisdiction
- Classless Inter-Domain Routing (CIDR)
- DNS & BIND, 3.2.3. Checking That Your Network Is Registered
- Practical UNIX & Internet Security, 16.2.1.1. IP networks
- Practical UNIX & Internet Security, 16.2.1.3. CIDR addresses
- TCP/IP Network Administration, 2.2.2. Classless IP Addresses
- address mask
- TCP/IP Network Administration, 2.2. The IP Address
- TCP/IP Network Administration, 2.2.2. Classless IP Addresses
- blocks
: TCP/IP Network Administration, B.11. The Aggregate Statements
- cleaning interval
: DNS & BIND, 10.4.3.1. Cleaning interval
- clear text
- Practical UNIX & Internet Security, 8.6.1. The crypt()
- TCP/IP Network Administration, 12.6. Encryption
- Clear to Send (CTS)
: Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- client
- authentication, network filesystems and
: Building Internet Firewalls, 2.12. Network File Systems
- flooding
: Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
- internal versus external
: Building Internet Firewalls, 7.4.5. Internal Versus External Clients
- NIS
: (see NIS)
- port numbers
: Building Internet Firewalls, 8. Configuring Internet Services
- software for proxying
: Building Internet Firewalls, 7.2.1. Using Custom Client Software for
- client statement
: TCP/IP Network Administration, B.8.10. The routerdiscovery Statement
- client.cf
: sendmail, A. The client.cf File
- client/server model
: Practical UNIX & Internet Security, 16.2.5. Clients and Servers
- ${client_addr} macro
: sendmail, 31.10. Alphabetized Reference
- ${client_name} macro
: sendmail, 31.10. Alphabetized Reference
- clock, system
- Practical UNIX & Internet Security, 5.1.5. File Times
- Practical UNIX & Internet Security, 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
- configuring
: Building Internet Firewalls, 8.13. Network Time Protocol (NTP)
- for random seeds
: Practical UNIX & Internet Security, 23.8. Picking a Random Seed
- resetting
: Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
- Secure RPC timestamp
: Practical UNIX & Internet Security, 19.3.1.3. Setting the window
- setting
: Building Internet Firewalls, 2.11. Time Service
- clogging
: Practical UNIX & Internet Security, 25.3.4. Clogging
- closest known name servers
: DNS & BIND, 2.6.2. Recursion
- cname data category (logging)
: DNS & BIND, 7.5.3. Category Details
- CNAME records
- DNS & BIND, 4.2.1. The db Files
- DNS & BIND, 4.2.5. Address and Alias Records
- DNS & BIND, 7.6.1. Common Syslog Messages
- DNS & BIND, 15.1. Using CNAME Records
- DNS & BIND, 15.1.6. Finding Out a Host's Aliases
- DNS & BIND, A.1.2.2. CNAME canonical name
- sendmail, 21.3.2. MX to CNAME Causes Extra Lookups
- sendmail, 34.8. Alphabetized Reference
- TCP/IP Network Administration, 8.3.6. The named.hosts File
- TCP/IP Network Administration, 10.7.1. Modifying Local Information
- TCP/IP Network Administration, C.3.1.5. Canonical Name record
- (see also aliases)
- chaining
: DNS & BIND, 15.1.2. CNAMEs Pointing to CNAMEs
- "Looked for PTR, Found CNAME"
: DNS & BIND, 13.5.4. Resolver Reports Looked for PTR, Found CNAME
- looking up
: DNS & BIND, 15.1.5. Looking Up CNAMEs
- queries statistic
: DNS & BIND, 7.6.2. Understanding the BIND Statistics
- transition to subdomains
: DNS & BIND, 9.7. Managing the Transition to Subdomains
- CNID (Caller-ID)
- Practical UNIX & Internet Security, 14.4.3. Caller-ID (CNID)
- Practical UNIX & Internet Security, 14.6. Additional Security for Modems
- Practical UNIX & Internet Security, 24.2.4. Tracing a Connection
- CO2 system (for fires)
: Practical UNIX & Internet Security, 12.2.1.1. Fire
- COAST (Computer Operations, Audit, and Security Technology)
- Building Internet Firewalls, A.1.2. COAST
- Building Internet Firewalls, A.2.1. coast.cs.purdue.edu
- Practical UNIX & Internet Security, E.3.2. COAST
- Practical UNIX & Internet Security, E.4. Software Resources
- code breaking
: (see cryptography)
- code, BIND source
- DNS & BIND, 3.1. Getting BIND
- DNS & BIND, B.1. Get the Source Code
- codebooks
: Practical UNIX & Internet Security, 8.7.3. Code Books
- CodeCenter
: Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- codes
: (see numbers)
- cold, extreme
: Practical UNIX & Internet Security, 12.2.1.6. Temperature extremes
- Collis field
: TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
- collision rate
- TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
- reducing
: TCP/IP Network Administration, 11.4.4. Subdividing an Ethernet
- collisions
: DNS & BIND, 1.2.1. The History of the Domain Name System
- colon (:)
- in addresses
- sendmail, 17.1.2.1. A rule to handle List:;
- sendmail, 34.8. Alphabetized Reference
- beginning and ending fields
- TCP/IP Network Administration, 9.2.1. The printcap File
- TCP/IP Network Administration, 9.2.2. Solaris Line Printer Service
- separating parameters
: TCP/IP Network Administration, 9.4. A BOOTP Server
- ColonOkInAddr option
: sendmail, 34.8. Alphabetized Reference
- columns, database key
- sendmail, 33.3.4.4. -k specify column for key (V8.7 and above)
- sendmail, 33.3.4.11. -v specify the value's column (V8.7 and above)
- com domain
- DNS & BIND, 2.2.1. Top-Level Domains
- TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
- command channel attacks
: Building Internet Firewalls, 8.1. Electronic Mail
- command execution
: Building Internet Firewalls, 2.3. Remote Terminal Access and Command
- command line
: sendmail, 4. How to Run sendmail
- bugs
: Building Internet Firewalls, 8.1. Electronic Mail
- debugging on (DNS)
: DNS & BIND, 12.2.1. Debugging Command-Line Option
- processing (sendmail)
: sendmail, 36.4. Processing the Command Line
- troubleshooting (sendmail)
: sendmail, 36.6. Pitfalls
- command shells
: (see shells)
- commands
- Practical UNIX & Internet Security, 8.1.3. Accounts That Run a Single Command
- (see also under specific command name)
- accounts running single
: Practical UNIX & Internet Security, 8.1.3. Accounts That Run a Single Command
- in addresses
: Practical UNIX & Internet Security, 15.7. Early Security Problems with UUCP
- configuration
- sendmail, 5.1. Overview
- sendmail, 27.1. Overall Syntax
- editor, embedded
: Practical UNIX & Internet Security, 11.5.2.7. Other initializations
- in <Directory> blocks
: Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
- incorrect usage error
: sendmail, 36.5.10. EX_USAGE A Command Was Used Incorrectly
- remote execution of
- Practical UNIX & Internet Security, 15.1.2. uux Command
- Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution
- Practical UNIX & Internet Security, 17.3.17. rexec (TCP Port 512)
- running simultaneously
- Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- (see also multitasking)
- COMMANDS= command
: Practical UNIX & Internet Security, 15.5.2. Permissions Commands
- commenting out lines
: Building Internet Firewalls, 5.8.2.2. How to disable services
- commenting out services
: Practical UNIX & Internet Security, 17.3. Primary UNIX Network Services
- comments
- sendmail, 5.2.2. Comments
- sendmail, 6.3.2. Adding Comments
- in BIND configuration files
- DNS & BIND, 4.3. Setting Up a BIND Configuration File
- DNS & BIND, 6.1.7. Comments
- in header fields
: sendmail, 35.3.4. Comments in the Header Field
- in BNU UUCP
: Practical UNIX & Internet Security, 15.5.1.3. A Sample Permissions file
- in db files
: DNS & BIND, 4.2.2. Comments
- in :include: lists
: sendmail, 25.2.1. Comments in :include: Lists
- in m4 files
: sendmail, 19.5. Pitfalls
- in rule definitions
: sendmail, 8.4. Rules
- in sendmail.cf file
- sendmail, 3.1. Role in the Filesystem
- sendmail, 5.1. Overview
- sendmail, 27.2. Comments
- stripping from headers
: sendmail, 30.8. Alphabetized F= Flags
- "Comments:" header line
: sendmail, 35.10. Alphabetized Reference
- commercial authentication systems
: Building Internet Firewalls, 10.4.3. Commercial Solutions
- Commercial Information Exchange (CIX)
: TCP/IP Network Administration, 1.1. TCP/IP and the Internet
- Common Gateway Interface (CGI)
- Building Internet Firewalls, 8.6.3.1. What can a malicious client do to
- Practical UNIX & Internet Security, 18.1. Security and the World Wide Web
- scripts
- Practical UNIX & Internet Security, 18.2. Running a Secure Server
- Practical UNIX & Internet Security, 18.2.3. Writing Secure CGI Scripts and ProgramsThe
- Practical UNIX & Internet Security, 18.2.4.1. Beware mixing HTTP with anonymous FTP
- communications
- interpersonal
: (see email)
- modems
: (see modems)
- national telecommunications
: Practical UNIX & Internet Security, 26.2.2. Federal Jurisdiction
- threatening
: Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
- comp.security newsgroups
: TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
- comparison copies
- Practical UNIX & Internet Security, 9.2.1. Comparison Copies
- Practical UNIX & Internet Security, 9.2.1.3. rdist
- compatibility between sendmail versions
- sendmail, 5.2.1. Version
- sendmail, 27.5. The V Configuration Command
- sendmail, D.2. Backward Compatibility
- compiling BIND
: DNS & BIND, B. Compiling and Installing BIND on a Sun
- compiling db library package
: sendmail, C.3. Compile and Install
- compiling sendmail
: sendmail, 2.5. Build
- enabling databases
: sendmail, 33.1. Enable at Compile Time
- macros for
: sendmail, 18.8. Alphabetized Reference
- vendor copies versus
: sendmail, 18.2. Vendor Versus Compiling
- completion, command option
: sendmail, 34.1.2.1. Multicharacter name shorthand
- compress program
: Practical UNIX & Internet Security, 6.6.1.2. Ways of improving the security of crypt
- Compressed SLIP (CSLIP)
: Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
- compressing domain names
- DNS & BIND, 14.2.3. Domain Name Compression
- DNS & BIND, 14.2.6. The Name Server Library Routines
- compression, message
: DNS & BIND, A.4.1.2. Message compression
- Computer Emergency Response Committee for Unclassified Systems (CERCUS)
: Practical UNIX & Internet Security, F.3.4.36. TRW Network Area and System Administrators
- Computer Emergency Response Team (CERT) advisories
- Practical UNIX & Internet Security, 6.5.2. Using Message Digests
- Practical UNIX & Internet Security, 27.3.5. Response Personnel?
- Practical UNIX & Internet Security, F.3.4.1. All Internet sites
- TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
- CERT-NL (Netherlands)
: Practical UNIX & Internet Security, F.3.4.25. Netherlands: German government institutions
- mailing list for
: Practical UNIX & Internet Security, E.1.3.4. CERT-advisory
- Computer Incident Advisory Capability (CIAC)
: Practical UNIX & Internet Security, F.3.4.43. U.S. Department of Energy
- computer networks
: Practical UNIX & Internet Security, 1.4.3. Add-On Functionality Breeds Problems
- Computer Security Institute (CSI)
: Practical UNIX & Internet Security, F.1.3. Computer Security Institute (CSI)
- Computer Security Resource Clearinghouse
: TCP/IP Network Administration, 13.1. The World Wide Web
- computers
- assigning UUCP name
: Practical UNIX & Internet Security, 15.5.2. Permissions Commands
- auxiliary ports
: Practical UNIX & Internet Security, 12.3.1.4. Auxiliary ports on terminals
- backing up individual
: Practical UNIX & Internet Security, 7.2.1. Individual Workstation
- computer-to-computer services, providing
: TCP/IP Network Administration, 9. Configuring Network Servers
- contacting administrator of
: Practical UNIX & Internet Security, 24.2.4.2. How to contact the system administrator of a computer
- cutting cables to
: Practical UNIX & Internet Security, 25.1. Destructive Attacks
- failure of
: Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
- hostnames for
- Practical UNIX & Internet Security, 16.2.3. Hostnames
- Practical UNIX & Internet Security, 16.2.3.1. The /etc/hosts file
- modems
: (see modems)
- multiple screens
: Practical UNIX & Internet Security, 12.3.4.3. Multiple screens
- multiple suppliers of
: Practical UNIX & Internet Security, 18.6. Dependence on Third Parties
- non-citizen access to
: Practical UNIX & Internet Security, 26.4.1. Munitions Export
- operating after breakin
: Practical UNIX & Internet Security, 24.6. Resuming Operation
- portable
: Practical UNIX & Internet Security, 12.2.6.3. Portables
- remote command execution
: Practical UNIX & Internet Security, 17.3.17. rexec (TCP Port 512)
- running NIS+
: Practical UNIX & Internet Security, 19.5.5. NIS+ Limitations
- screen savers
: Practical UNIX & Internet Security, 12.3.5.2. X screen savers
- security
- culture of
: Practical UNIX & Internet Security, D.1.10. Understanding the Computer Security "Culture"
- four steps toward
: Practical UNIX & Internet Security, 2.4.4.7. Defend in depth
- physical
: Practical UNIX & Internet Security, 12.2.6.1. Physically secure your computer
- references for
: Practical UNIX & Internet Security, D.1.7. General Computer Security
- resources on
: Practical UNIX & Internet Security, D.1.1. Other Computer References
- seized as evidence
: Practical UNIX & Internet Security, 26.2.4. Hazards of Criminal Prosecution
- transferring files between
: Practical UNIX & Internet Security, 15.1.1. uucp Command
- trusting
- Practical UNIX & Internet Security, 27.1. Can you Trust Your Computer?
- Practical UNIX & Internet Security, 27.1.3. What the Superuser Can and Cannot Do
- unattended
- Practical UNIX & Internet Security, 12.3.5. Unattended Terminals
- Practical UNIX & Internet Security, 12.3.5.2. X screen savers
- unplugging
: Practical UNIX & Internet Security, 24.2.5. Getting Rid of the Intruder
- vacuums for
: Practical UNIX & Internet Security, 12.2.1.3. Dust
- vandalism of
: (see vandalism)
- virtual
: (see Telnet service)
- viruses
: (see viruses)
- computing base (TCB)
: Practical UNIX & Internet Security, 8.5.3.2. Trusted computing base
- conditionals in macro definitions
- sendmail, 14.1.3. Testing So Far
- sendmail, 31.6. Macro Conditionals: $?, $|, and $.
- TCP/IP Network Administration, 10.5.2.1. Conditionals
- conf directory
- Practical UNIX & Internet Security, 18.2.2.1. Configuration files
- TCP/IP Network Administration, 5.3. The BSD Kernel Configuration File
- conf.c file
- sendmail, 18.3.3. What to Tune
- sendmail, 35.5. Header Behavior in conf.c
- conf.h file
: sendmail, 18.3.3. What to Tune
- conf/access.conf
: (see access.conf file)
- conf/master directory
: TCP/IP Network Administration, 8.3.4. The named.local File
- conf/srm.conf file
: Practical UNIX & Internet Security, 18.3.1. The access.conf and .htaccess Files
- conferencing services, real-time
- Building Internet Firewalls, 2.8. Real-Time Conferencing
- Building Internet Firewalls, 8.9. Real-Time Conferencing Services
- confidence factor
: TCP/IP Network Administration, 11.1.1. Troubleshooting Hints
- confidentiality
: (see encryption; privacy)
- config data category (logging)
: DNS & BIND, 7.5.3. Category Details
- configuration
- DNS & BIND, 9.6. Good Parenting
- DNS & BIND, 9.6.2. Managing Delegation
- Archie
: Building Internet Firewalls, 8.7.3. Archie
- audit packages
: Building Internet Firewalls, 5.8.5.2. Use the auditing packages
- BIND syntax for
: DNS & BIND, 3.1. Getting BIND
- channels (logging)
: DNS & BIND, 7.5. BIND 8 Logging
- clocks
: Building Internet Firewalls, 8.13. Network Time Protocol (NTP)
- commands for
- sendmail, 5.1. Overview
- sendmail, 27.1. Overall Syntax
- dialup connections
: DNS & BIND, 15.5. Dialup Connections
- DNS (Domain Name Service)
: Building Internet Firewalls, 8.10. Domain Name System
- in screened host architecture
: Building Internet Firewalls, 9.2.1.6. DNS
- in screened subnet architecture
: Building Internet Firewalls, 9.1.1.6. DNS
- email
: Building Internet Firewalls, 8.1. Electronic Mail
- errors
: Practical UNIX & Internet Security, 9.1. Prevention
- exterior routers
: Building Internet Firewalls, 9.1.2.2. Exterior Router
- files
: Practical UNIX & Internet Security, 11.5.3. Abusing Automatic Mechanisms
- logging
: Practical UNIX & Internet Security, 10.7.2.2. Informational material
- MCSA web server
: Practical UNIX & Internet Security, 18.2.2.1. Configuration files
- UUCP version differences
: Practical UNIX & Internet Security, 15.2. Versions of UUCP
- firewalls
: DNS & BIND, 15.4. DNS and Internet Firewalls
- FSP (File Service Protocol)
: Building Internet Firewalls, 8.2.3. File Service Protocol (FSP)
- FTP (File Transfer Protocol)
: Building Internet Firewalls, 8.2.1. File Transfer Protocol
- in screened host architecture
: Building Internet Firewalls, 9.2.1.2. FTP
- in screened subnet architecture
: Building Internet Firewalls, 9.1.1.2. FTP
- Gopher
: Building Internet Firewalls, 8.7.1. Gopher
- hardware
: Building Internet Firewalls, 5.3.3. What Hardware Configuration?
- hosts to use DNS
: DNS & BIND, 6. Configuring Hosts
- consequences of
: DNS & BIND, 6.3. Minimizing Pain and Suffering
- vendor-specific differences
: DNS & BIND, 6.4. Vendor-Specific Options
- HTTP (Hypertext Transfer Protocol)
- in screened host architecture
: Building Internet Firewalls, 9.2.1.5. HTTP
- in screened subnet architecture
: Building Internet Firewalls, 9.1.1.5. HTTP
- hub
: sendmail, 15.4. Hub Accepts Mail for Client
- information lookup services
: Building Internet Firewalls, 8.8. Information Lookup Services
- interior router
: Building Internet Firewalls, 9.1.2.1. Interior Router
- Internet services
: Building Internet Firewalls, 8. Configuring Internet Services
- IRC (Internet Relay Chat)
: Building Internet Firewalls, 8.9.2. Internet Relay Chat
- kernel
: Building Internet Firewalls, 5.8.4.1. Reconfigure and rebuild the kernel
- labeling system
: Building Internet Firewalls, 13.5.2. Labeling and Diagraming Your System
- machine
: Building Internet Firewalls, 5.8.4. Reconfiguring for Production
- MBONE (Multicast Backbone)
: Building Internet Firewalls, 8.9.3. The Multicast Backbone (MBONE)
- name servers
: DNS & BIND, 6.1.4.1. One name server configured
- network management services
: Building Internet Firewalls, 8.12. Network Management Services
- NFS (Network File System)
: Building Internet Firewalls, 8.14. Network File System
- NIS/YP (Network Information Service)
: Building Internet Firewalls, 8.15. Network Information Service/Yellow
- NNTP (Network News Transfer Protocol)
: Building Internet Firewalls, 8.5. Network News Transfer Protocol
- in screened host architecture
: Building Internet Firewalls, 9.2.1.4. NNTP
- in screened subnet architecture
: Building Internet Firewalls, 9.1.1.4. NNTP
- packet filtering router
: Building Internet Firewalls, 6.2. Configuring a Packet Filtering
- parameters for (in dhcpd)
: TCP/IP Network Administration, D.3.2. Configuration Parameters
- ping program
: Building Internet Firewalls, 8.12.3. ping
- printing protocols
: Building Internet Firewalls, 8.17. Printing Protocols (lpr and lp)
- problems
: TCP/IP Network Administration, 11.4.1. Troubleshooting with the ifconfig Command
- r commands
: Building Internet Firewalls, 8.4.1. BSD
- real-time conferencing services
: Building Internet Firewalls, 8.9. Real-Time Conferencing Services
- resolvers
- DNS & BIND, 6.2. Sample Resolver Configurations
- DNS & BIND, 9.4.2. Creating and Delegating a Subdomain
- RIP (Routing Information Protocol)
: Building Internet Firewalls, 8.12.2. Routing Information Protocol
- sendmail
- sendmail, 2.4. Preliminaries
- sendmail, 18.6. Install sendmail
- sendmail, 19.6. Alphabetized m4 Macros
- (see also sendmail.cf configuration file)
- servers
: TCP/IP Network Administration, 3.5. Configuration Servers
- simplifying management of
: Practical UNIX & Internet Security, 9.1.2. Read-only Filesystems
- SMTP (Simple Mail Transfer Protocol)
- in screened host architecture
: Building Internet Firewalls, 9.2.1.3. SMTP
- in screened subnet architecture
: Building Internet Firewalls, 9.1.1.3. SMTP
- with firewalls
: Building Internet Firewalls, 8.1.1.6. Configuring SMTP to
- SNMP (Simple Network Management Protocol)
: Building Internet Firewalls, 8.12.1. Simple Network Management
- syslog
: Building Internet Firewalls, 8.11. syslog
- system, prerequisites for
: TCP/IP Network Administration, 4. Getting Started
- Telnet
: Building Internet Firewalls, 8.3. Terminal Access (Telnet)
- in screened host architecture
: Building Internet Firewalls, 9.2.1.1. Telnet
- in screened subnet architecture
: Building Internet Firewalls, 9.1.1.1. Telnet
- TFTP (Trivial File Transport Protocol)
: Building Internet Firewalls, 8.2.2. Trivial File Transfer Protocol
- TNP (Network Time Protocol)
: Building Internet Firewalls, 8.13. Network Time Protocol (NTP)
- traceroute program
: Building Internet Firewalls, 8.12.4. traceroute
- UUCP (UNIX-to-UNIX Copy Protocol)
: Building Internet Firewalls, 8.2.4. UNIX-to-UNIX
- vendor-specific
: DNS & BIND, 6.4.10. Windows NT
- WAIS (Wide Area Information Servers)
: Building Internet Firewalls, 8.7.2. Wide Area Information Servers
- WWW (World Wide Web) and HTTP
: Building Internet Firewalls, 8.6. World Wide Web (WWW) and HTTP
- X11 Window wystem
: Building Internet Firewalls, 8.16. X11 Window System
- configuration file, BIND
: (see boot file)
- connection cache
- sendmail, 26.3.3.2. -- connection cache: --
- sendmail, 34.6.5. Connection Caching
- connection command-line option, in pppd
: TCP/IP Network Administration, 6.3.3. chat
- "Connection timed out" message
: sendmail, 4.2. Verbose (-v)
- ConnectionCacheSize (k) option
: sendmail, 34.8. Alphabetized Reference
- ConnectionCacheTimeout (K) option
: sendmail, 34.8. Alphabetized Reference
- ConnectionRateThrottle option
: sendmail, 34.8. Alphabetized Reference
- connections/connectivity
- DNS & BIND, 5.2. What's a Mail Exchanger, Again?
- DNS & BIND, 8.1.1. Where Do I Put My Name Servers?
- DNS & BIND, 13.3.3. 3. Slave Server Can't Load Zone Data
- TCP/IP Network Administration, 1.7. Application Layer
- (see also firewalls)
- between Internet and unbuilt bastion host
: Building Internet Firewalls, 5.8. Building a Bastion Host
- checking network
: (see ping command)
- dialup connections
: DNS & BIND, 15.5. Dialup Connections
- disconnecting after incident
: Building Internet Firewalls, 13.1.2. Disconnect or Shut Down, as
- disconnecting machine
: Building Internet Firewalls, 13.4.3. Planning for Disconnecting or
- hijacking
: Practical UNIX & Internet Security, 16.3. IP Security
- killed by TCP
: Building Internet Firewalls, 6.3.3.1. TCP
- laundering
: Practical UNIX & Internet Security, 16.1.1.1. Who is on the Internet?
- loss of
: DNS & BIND, 13.3.8. 8. Loss of Network Connectivity
- multiple Internet
: Building Internet Firewalls, 4.3.6. It's OK to Use
- troubleshooting
: TCP/IP Network Administration, 11.3. Testing Basic Connectivity
- tracing
- Practical UNIX & Internet Security, 24.2.4. Tracing a Connection
- Practical UNIX & Internet Security, 24.2.4.2. How to contact the system administrator of a computer
- unidirectional versus multidirectional
: Building Internet Firewalls, 7.4.2. Unidirectional Versus Multidirectional
- unplugging
: Practical UNIX & Internet Security, 24.2.5. Getting Rid of the Intruder
- connectors, network
: Practical UNIX & Internet Security, 12.2.4.3. Network connectors
- consistency in domain naming
- DNS & BIND, 1.2.1. The History of the Domain Name System
- DNS & BIND, 2.4. Name Servers and Zones
- consistency of software
: Practical UNIX & Internet Security, 2.1. Planning Your Security Needs
- console device
: Practical UNIX & Internet Security, 5.6. Device Files
- CONSOLE variable
: Practical UNIX & Internet Security, 8.5.1. Secure Terminals
- constraining passwords
: Practical UNIX & Internet Security, 8.8.2. Constraining Passwords
- consultants
: Practical UNIX & Internet Security, 27.3.4. Your Consultants?
- content types
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- "Content-Length:" header line
- sendmail, 35.10. Alphabetized Reference
- sendmail, D. Sun Enhancements
- "Content-Transfer-Encoding:" header line
- sendmail, 35.10. Alphabetized Reference
- TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- "Content-Type:" header line
- sendmail, 30.4. The Equates
- sendmail, 32.5. Alphabetized Reference
- sendmail, 34.8. Alphabetized Reference
- sendmail, 35.10. Alphabetized Reference
- TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- context-dependent files (CDFs)
- Practical UNIX & Internet Security, 5.9.2. Context-Dependent Files
- Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
- contiguous blocks
: (see addresses, assigning)
- continuation lines
: sendmail, 27.4. Continuation Lines
- control
- information
: TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
- statements (in gated)
: TCP/IP Network Administration, B.10. Control Statements
- control characters
- Practical UNIX & Internet Security, 3.1. Usernames
- sendmail, 23.3.4. Unknown Control Character in qf File
- control headers
: sendmail, 35.6.4. Identification and Control Headers
- convergence of routing, delays in
: TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
- converting
- Japanese font conversion
: sendmail, 36.7. Alphabetized Reference
- macro names to integers
: sendmail, 20.3. Alphabetized V8.8 Subroutines
- cookies
- Practical UNIX & Internet Security, 17.3.21.4. Using Xauthority magic cookies
- Practical UNIX & Internet Security, 18.2.3.1. Do not trust the user's browser!
- COPS (Computer Oracle and Password System)
- Building Internet Firewalls, B.2.1. COPS
- Practical UNIX & Internet Security, 19.5.5. NIS+ Limitations
- Practical UNIX & Internet Security, E.4.3. COPS (Computer Oracle and Password System)COPS
- TCP/IP Network Administration, 12.4.3.1. COPS
- auditing package
: Building Internet Firewalls, 5.8.5.1. Auditing packages
- copy (cp) command, in NFS
: TCP/IP Network Administration, 9.1. The Network File System
- copying
- bounced messages to postmaster
: sendmail, 22.8.3.4. The PostmasterCopy option
- messages to postmaster
: sendmail, 24.4.1. The Postmaster Alias
- qf file temporarily
: sendmail, 23.2.6. The Temporary qf Rewrite Image: tf
- copyright
- Practical UNIX & Internet Security, 9.2.1. Comparison Copies
- Practical UNIX & Internet Security, 26.4.2. Copyright Infringement
- Practical UNIX & Internet Security, 26.4.2.1. Software piracy and the SPA
- notices of
: Practical UNIX & Internet Security, 26.2.6. Other Tips
- CORBA (Common Object Request Broker Architecture)
: Practical UNIX & Internet Security, 19.2. Sun's Remote Procedure Call (RPC)
- core files
- DNS & BIND, 10.4.2.3. Changing the core size limit
- Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- Practical UNIX & Internet Security, C.4. The kill Command
- core gateways
- TCP/IP Network Administration, 2.4. Internet Routing Architecture
- TCP/IP Network Administration, 7.5.1. Exterior Gateway Protocol
- cost
- (see also preference)
- cost-benefit analysis
- Practical UNIX & Internet Security, 2.3. Cost-Benefit Analysis
- Practical UNIX & Internet Security, 2.3.4. Convincing Management
- of losses
: Practical UNIX & Internet Security, 2.3.1. The Cost of Loss
- registering domains
: DNS & BIND, 3.2.4. Registering with Your Parent
- "could not exec" error
: sendmail, 26.3.2. SIGHUP Restart
- count field
: TCP/IP Network Administration, 11.3.1. The ping Command
- count-to-infinity problem
: TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
- cp command
: Practical UNIX & Internet Security, 7.4.1. Simple Local Copies
- cpio program
- Practical UNIX & Internet Security, 7.3.2. Building an Automatic Backup System
- Practical UNIX & Internet Security, 7.4.2. Simple Archives
- CPU load
: DNS & BIND, 8.1.2. Capacity Planning
- crack program
- Practical UNIX & Internet Security, 8.8.3. Cracking Your Own Passwords
- Practical UNIX & Internet Security, 18.3.3. Setting Up Web Users and Passwords
- cracking
- backing up because of
: Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
- passwords
- Practical UNIX & Internet Security, 3.6.1. Bad Passwords: Open Doors
- Practical UNIX & Internet Security, 3.6.4. Passwords on Multiple Machines
- Practical UNIX & Internet Security, 8.6.1. The crypt()
- Practical UNIX & Internet Security, 8.8.3. Cracking Your Own Passwords
- Practical UNIX & Internet Security, 8.8.3.2. The dilemma of password crackers
- Practical UNIX & Internet Security, 17.3.3. TELNET (TCP Port 23)
- logging failed attempts
: Practical UNIX & Internet Security, 10.5.3. syslog Messages
- responding to
- Practical UNIX & Internet Security, 24. Discovering a Break-in
- Practical UNIX & Internet Security, 24.7. Damage Control
- using rexecd
: Practical UNIX & Internet Security, 17.3.17. rexec (TCP Port 512)
- crash
: Building Internet Firewalls, 5.10.1. Watch Reboots Carefully
- logging crashes
: Practical UNIX & Internet Security, 10.7.2.1. Exception and activity reports
- resetting locks after
: TCP/IP Network Administration, 9.1.1. NFS Daemons
- restarting after
: TCP/IP Network Administration, 9.2.2. Solaris Line Printer Service
- CRC (cyclic redundancy counter)
: (see checksums)
- creating
: (see adding)
- Cred table (NIS+)
: Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
- credibility measures
: DNS & BIND, 13.2.2. How to Read a Database Dump
- criminal prosecution
- Practical UNIX & Internet Security, 26.2. Criminal Prosecution
- Practical UNIX & Internet Security, 26.2.7. A Final Note on Criminal Actions
- crises
: (see disasters and disaster recovery)
- cron file
- Practical UNIX & Internet Security, 9.2.2.1. Simple listing
- Practical UNIX & Internet Security, 11.5.1.4. Filename attacks
- Practical UNIX & Internet Security, 11.5.3.1. crontab entries
- Practical UNIX & Internet Security, 15.6.2. Automatic Execution of Cleanup Scripts
- automating backups
: Practical UNIX & Internet Security, 7.3.2. Building an Automatic Backup System
- cleaning up /tmp directory
: Practical UNIX & Internet Security, 25.2.4. /tmp Problems
- collecting login times
: Practical UNIX & Internet Security, 10.1.1. lastlog File
- security checks
: TCP/IP Network Administration, 12.4.2. Looking for Trouble
- statistics and
: sendmail, 26.2.3. Using cron for Daily and Weekly Statistics
- symbolic links in
: Practical UNIX & Internet Security, 10.3.7. Other Logs
- system clock and
: Practical UNIX & Internet Security, 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
- uucp scripts in
: Practical UNIX & Internet Security, 15.6.2. Automatic Execution of Cleanup Scripts
- crtscts option
: TCP/IP Network Administration, 6.3.1. The PPP Daemon
- Crypt Breaker's Workbench (CBW)
: Practical UNIX & Internet Security, 6.6.1.1. The crypt program
- crypt command/algorithm
- Building Internet Firewalls, 5.8.2.2. How to disable services
- Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- Practical UNIX & Internet Security, 6.6.1. UNIX crypt: The Original UNIX Encryption Command
- Practical UNIX & Internet Security, 6.6.1.3. Example
- Practical UNIX & Internet Security, 8.6. The UNIX Encrypted Password System
- Practical UNIX & Internet Security, 8.6.1. The crypt()
- Practical UNIX & Internet Security, 8.8.7. Algorithm and Library Changes
- Practical UNIX & Internet Security, 18.3.3. Setting Up Web Users and Passwords
- Practical UNIX & Internet Security, 23.5. Tips on Using Passwords
- crypt16 algorithm
: Practical UNIX & Internet Security, 8.6.4. Crypt16() and Other Algorithms
- crypto-checksum
: TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- cryptography
- Building Internet Firewalls, 10. Authentication and Inbound
- Practical UNIX & Internet Security, 6. Cryptography
- Practical UNIX & Internet Security, 6.7.2. Cryptography and Export Controls
- Practical UNIX & Internet Security, 14.4.4.2. Protection against eavesdropping
- checklist for
: Practical UNIX & Internet Security, A.1.1.5. Chapter 6: Cryptography
- checksums
- Building Internet Firewalls, 5.8.5.3. About checksums for auditing
- Practical UNIX & Internet Security, 6.5.5.1. Checksums
- Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
- TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
- TCP/IP Network Administration, 11.8. Protocol Case Study
- keeping secure
: Building Internet Firewalls, 13.5.3. Keeping Secured Checksums
- recalculating
- TCP/IP Network Administration, 4.2.1. Obtaining an IP Address
- TCP/IP Network Administration, 5.3.1.1. Options
- using Tripwire for
: Building Internet Firewalls, 5.8.5.1. Auditing packages
- digital signatures
: (see digital signatures)
- export laws concerning
: Practical UNIX & Internet Security, 6.7.2. Cryptography and Export Controls
- Message Authentication Codes (MACs)
: Practical UNIX & Internet Security, 6.5.5.2. Message authentication codes
- message digests
: (see message digests)
- PGP
: (see PGP)
- private-key
- Practical UNIX & Internet Security, 6.4. Common Cryptographic Algorithms
- Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- TCP/IP Network Administration, 12.6. Encryption
- public-key
- Building Internet Firewalls, 10. Authentication and Inbound
- Practical UNIX & Internet Security, 6.4. Common Cryptographic Algorithms
- Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
- Practical UNIX & Internet Security, 6.4.6. RSA and Public Key Cryptography
- Practical UNIX & Internet Security, 6.4.6.3. Strength of RSA
- Practical UNIX & Internet Security, 6.5.3. Digital Signatures
- Practical UNIX & Internet Security, 18.3. Controlling Access to Files on Your Server
- Practical UNIX & Internet Security, 18.6. Dependence on Third Parties
- TCP/IP Network Administration, 12.6. Encryption
- breaking
: Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
- PGP
: Practical UNIX & Internet Security, 6.6.3.2. Creating your PGP public key
- proving identity with
: Practical UNIX & Internet Security, 19.3.1.1. Proving your identity
- references on
: Practical UNIX & Internet Security, D.1.5. Cryptography Books
- U.S. patents and
: Practical UNIX & Internet Security, 6.7.1. Cryptography and the U.S. Patent System
- csh (C shell)
- Practical UNIX & Internet Security, 5.5.2. Problems with SUID
- Practical UNIX & Internet Security, 11.5.1. Shell Features
- Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- Practical UNIX & Internet Security, C.5.3. Running the User's Shell
- (see also shells)
- autologout variable
: Practical UNIX & Internet Security, 12.3.5.1. Built-in shell autologout
- history file
: Practical UNIX & Internet Security, 10.4.1. Shell History
- uucp command
: Practical UNIX & Internet Security, 15.1.1.1. uucp with the C shell
- .cshrc file
- Practical UNIX & Internet Security, 11.5.2.2. .cshrc, .kshrc
- Practical UNIX & Internet Security, 12.3.5.1. Built-in shell autologout
- Practical UNIX & Internet Security, 24.4.1.6. Changes to startup files
- CSI (Computer Security Institute)
: Practical UNIX & Internet Security, F.1.3. Computer Security Institute (CSI)
- CSLIP (Compressed SLIP)
- Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
- TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- TCP/IP Network Administration, 6.4.1. slattach
- disabling
: TCP/IP Network Administration, A.2. The PPP Daemon
- CSRC (Computer Security Resource Clearinghouse)
: Building Internet Firewalls, A.5.3. NIST CSRC
- -Ctest.cf argument
: TCP/IP Network Administration, 10.8. Testing sendmail.cf
- ctime
- Practical UNIX & Internet Security, 5.1.2. Inodes
- Practical UNIX & Internet Security, 5.1.5. File Times
- Practical UNIX & Internet Security, 5.2.1. chmod: Changing a File's Permissions
- Practical UNIX & Internet Security, 7.4.7. inode Modification Times
- Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
- cu command
- Practical UNIX & Internet Security, 14.5. Modems and UNIX
- Practical UNIX & Internet Security, 14.5.3.1. Originate testing
- Practical UNIX & Internet Security, 14.5.3.3. Privilege testing
- -l option
: Practical UNIX & Internet Security, 14.5.3.1. Originate testing
- cua devices
: TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- culture, computer security
: Practical UNIX & Internet Security, D.1.10. Understanding the Computer Security "Culture"
- curly braces ({})
- sendmail, 5.3.2. Macros
- sendmail, 5.3.5. Class Macros
- sendmail, 7.1. Overview
- configuration statements
- TCP/IP Network Administration, 7.7.1.1. A host configuration
- TCP/IP Network Administration, B.2. The gated Configuration Language
- TCP/IP Network Administration, D.3. The dhcpd.conf Configuration File
- long variable names
: TCP/IP Network Administration, 10.5. sendmail Configuration
- macro names
: TCP/IP Network Administration, 10.5.2. The Define Macro Command
- current
- date
: (see $d macro)
- directory
: Practical UNIX & Internet Security, 5.1.3. Current Directory and Paths
- time and date
: (see $b macro)
- custom
- client software for proxying
: Building Internet Firewalls, 7.2.1. Using Custom Client Software for
- system
: Building Internet Firewalls, 13.1.6. Restore and Recover
- user procedures for proxying
: Building Internet Firewalls, 7.2.2. Using Custom User Procedures for
- Customer Warning System (CWS)
: Practical UNIX & Internet Security, F.3.4.34. Sun Microsystems
- customizing sendmail temporarily
: sendmail, 19.6. Alphabetized m4 Macros
- cyclic redundancy counter (CRC)
: Building Internet Firewalls, 5.8.5.3. About checksums for auditing
- cyrus and cyrusbb mailers
: TCP/IP Network Administration, E.3.5. MAILER
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
O'Reilly & Associates, Inc.
All Rights Reserved.