Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: D
- D configuration command
- sendmail, 5.3.2. Macros
- sendmail, 7.1. Overview
- sendmail, 31.3. Configuration File Definitions
- d flag
: sendmail, 30.8. Alphabetized F= Flags
- D flag
- sendmail, 14.2.2. The Date: Header
- sendmail, 30.8. Alphabetized F= Flags
- D line (host status file)
: sendmail, B.1. Status file lines
- D line (qf file)
: sendmail, 23.9. The qf File Internals
- $d macro
: sendmail, 31.10. Alphabetized Reference
- d option
: (see DeliveryMode (d) option)
- D option
: (see AutoRebuildAliases (D) option)
- .D rule-testing command
: sendmail, 38.2.1. Define a Macro with .D
- -d switch (sendmail)
- sendmail, 4.3. Debugging (-d)
- sendmail, 36.7. Alphabetized Reference
- sendmail, 37.1. The Syntax of -d
- complete list of switches
: sendmail, 37.5. Reference in Numerical Order
- -d0.1 switch
- sendmail, 7.3.1. The hostname
- sendmail, 11.6. Handling user@thishost
- sendmail, 37.5. Reference in Numerical Order
- -d0.15 switch
- sendmail, 6.3.3. Testing the New Delivery Agent Definitions
- sendmail, 37.5. Reference in Numerical Order
- -d0.4 switch
- sendmail, 31.7.1. Macros and the System Identity
- sendmail, 37.5. Reference in Numerical Order
- -d21.12 switch
- sendmail, 10.5. Details of Rule Flow
- sendmail, 37.5. Reference in Numerical Order
- -d35.9 switch
- sendmail, 7.3. Predefined Macros
- sendmail, 37.5. Reference in Numerical Order
- -d37.1 switch
- sendmail, 13.3. Testing the Options
- sendmail, 37.5. Reference in Numerical Order
- with rule testing
: sendmail, 38.7. Add Debugging for Detail
- -d switch (makemap)
: sendmail, 33.2.1.1. -d allow duplicate keys
- d2 option (nslookup)
- DNS & BIND, 11.3. Option Settings
- DNS & BIND, 11.6.1. Seeing the Query and Response Packets
- D= equate
: sendmail, 30.4. The Equates
- DAC (Discretionary Access Controls)
: Practical UNIX & Internet Security, 4.1.3. Groups and Group Identifiers (GIDs)
- daemon
- TCP/IP Network Administration, 3.2. The Host Table
- TCP/IP Network Administration, 5.4. The Internet Daemon
- options for
: sendmail, 34.8. Alphabetized Reference
- preventing from running
: sendmail, 15.5. Prevent the Daemon from Running
- privacy of
: sendmail, 34.8. Alphabetized Reference
- signals
: sendmail, 26.3. Signaling the Daemon
- tools for
: Building Internet Firewalls, B.5. Daemons
- user
- Practical UNIX & Internet Security, 4.1. Users and Groups
- sendmail, 14.6. Trusted User
- TCP/IP Network Administration, 5.4. The Internet Daemon
- daemon file
: DNS & BIND, 4.7.2. Check for Syslog Errors
- daemon mode
- sendmail, 3.4. Role as a Daemon
- sendmail, 4.1.1. Daemon Mode (-bd)
- sendmail, 36.7. Alphabetized Reference
- DaemonPortOptions (O) option
: sendmail, 34.8. Alphabetized Reference
- damage, liability for
: Practical UNIX & Internet Security, 26.4.6. Liability for Damage
- "dangerous write permissions" warning
: sendmail, 22.5.1. Dangerous Write Permissions
- DARPA
: DNS & BIND, 1.1. A (Very) Brief History of the Internet
- dash (hyphen)
- in machine conversation
: sendmail, 4.2. Verbose (-v)
- non-equivalent host
: TCP/IP Network Administration, 12.2.5. Secure the r Commands
- DAT (Digital Audio Tape)
: Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
- data
: Building Internet Firewalls, 1.1.1. Your Data
- assigning owners to
: Practical UNIX & Internet Security, 2.4.4.1. Assign an owner
- availability of
: Practical UNIX & Internet Security, 2.1. Planning Your Security Needs
- communication equipment (DCE)
: Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- communications model
: TCP/IP Network Administration, 1.2. A Data Communications Model
- communications protocols
: (see TCP/IP protocol and services)
- compression, not provided in SLIP
: TCP/IP Network Administration, 6.2.1. The Serial Protocols
- confidential
- Practical UNIX & Internet Security, 2.1. Planning Your Security Needs
- Practical UNIX & Internet Security, 2.5.2. Confidential Information
- disclosure of
: Practical UNIX & Internet Security, 11.2. Damage
- DNS
- Building Internet Firewalls, 8.10.3. DNS Data
- Building Internet Firewalls, 8.10.4.2. Mismatched data between the hostname
- espionage
- Building Internet Firewalls, 1.2.2.4. Spies (Industrial and
- Practical UNIX & Internet Security, 11.3. Authors
- giving away with NIS
: Practical UNIX & Internet Security, 19.4.5. Unintended Disclosure of Site Information with NIS
- identifying assets
: Practical UNIX & Internet Security, 2.2.1.1. Identifying assets
- protecting from sniffers
: Building Internet Firewalls, 10.1.2. Packet Sniffing
- spoofing
: Practical UNIX & Internet Security, 16.3. IP Security
- terminal equipment (DTE)
: Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- theft of
: (see information, theft and espionage)
- transferring
- Building Internet Firewalls, 6. Packet Filtering
- (see email; files, transferring)
- allowing/disallowing
: Building Internet Firewalls, 6.1. Why Packet Filtering?
- via TCP
: Building Internet Firewalls, 6.3.3.1. TCP
- user-specified, and proxying
: Building Internet Firewalls, 7.4.4. User-Specified Data
- Data Carrier Detect (DCD)
: Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- DATA command, in SMTP
: TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
- Data Defense Network (DDN)
: Practical UNIX & Internet Security, F.3.4.20. MILNET
- data-driven attacks
: Building Internet Firewalls, 8.1. Electronic Mail
- data dump
: DNS & BIND, 13.2.2. How to Read a Database Dump
- Data Encryption Standard
: (see DES)
- DATA keyword
: sendmail, 4.2. Verbose (-v)
- Data Link Layer
- TCP/IP Network Administration, 1.2. A Data Communications Model
- TCP/IP Network Administration, 5.3.1.2. Pseudo-device
- TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- in PPP
: TCP/IP Network Administration, 6.2.1. The Serial Protocols
- data segment size
: DNS & BIND, 10.4.2.1. Changing the data segment size limit
- Data Set Ready (DSR)
: Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- Data Terminal Ready (DTR)
- Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- TCP/IP Network Administration, A.2. The PPP Daemon
- data terminology
: TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
- data types, looking up with nslookup
: DNS & BIND, 11.5.1. Looking Up Different Data Types
- database files
- Practical UNIX & Internet Security, 1.2. What Is an Operating System?
- (see db files)
- database macros
: sendmail, 33. Database Macros
- databases
: (see networks and networking, databases, network)
- classes for
: sendmail, 33.8. Alphabetized Reference
- external (keyed)
- sendmail, 5.3.11. Keyed Databases
- sendmail, 20.3. Alphabetized V8.8 Subroutines
- K command types
: sendmail, 33.3.2. The class
- library support
: sendmail, 18.4.1. DBMDEF=
- m4 and
: sendmail, 33.6. Database Maps and m4
- /map rule-testing command
: sendmail, 38.5.3. Look up a Database Item with /map
- sendmail
: TCP/IP Network Administration, 10.6.2.1. Transforming with a database
- User Database
- sendmail, 33.5. The User Database
- sendmail, 33.8. Alphabetized Reference
- sendmail, 34.8. Alphabetized Reference
- datagrams
- Building Internet Firewalls, C.5.1.1. The datagram
- TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
- TCP/IP Network Administration, 1.5.1.1. The datagram
- TCP/IP Network Administration, 1.7. Application Layer
- (see also IP datagrams)
- (see also User Datagram Protocol)
- connectionless delivery of
: TCP/IP Network Administration, 1.6. Transport Layer
- converting source address of
: TCP/IP Network Administration, 4.2.1. Obtaining an IP Address
- forwarding
: TCP/IP Network Administration, 5.3.1.1. Options
- fragmented
- Building Internet Firewalls, C.5.1.3. Fragmenting datagrams
- TCP/IP Network Administration, 1.5.1.3. Fragmenting datagrams
- TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- headers
- TCP/IP Network Administration, 2.7.1. Protocol Numbers
- TCP/IP Network Administration, 2.7.2. Port Numbers
- marking end of
: TCP/IP Network Administration, 6.2.1. The Serial Protocols
- routing
: TCP/IP Network Administration, 1.5.1.2. Routing datagrams
- silently discarding
: TCP/IP Network Administration, 11.8. Protocol Case Study
- datasize substatement
- DNS & BIND, 10.4.2.1. Changing the data segment size limit
- DNS & BIND, F.1.11.3. limit datasize
- date
: (see time and date)
- date command
- Practical UNIX & Internet Security, 8.1.3. Accounts That Run a Single Command
- Practical UNIX & Internet Security, 24.5.1. Never Trust Anything Except Hardcopy
- "Date:" header line
- sendmail, 1.5. The Header
- sendmail, 14.2.2. The Date: Header
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 35.10. Alphabetized Reference
- day-zero backups
: Practical UNIX & Internet Security, 7.1.3. Types of Backups
- db data category (logging)
: DNS & BIND, 7.5.3. Category Details
- db files
- DNS & BIND, 2.4.3. Data Files
- DNS & BIND, 4.2. Setting Up DNS Data
- additional data in
: DNS & BIND, 7.2.4. Additional db File Entries
- comments in
: DNS & BIND, 4.2.2. Comments
- contents of (example)
- DNS & BIND, 4.2.7. The Completed Data Files
- DNS & BIND, 4.4.4. The Shortened db Files
- errors in
: DNS & BIND, 4.7.2. Check for Syslog Errors
- for root domain
: DNS & BIND, 15.4.4.4. The db.root file
- format of
: DNS & BIND, A.1. Master File Format
- generating from host tables
: (see h2n utility)
- organizing
: DNS & BIND, 7.3. Organizing Your Files
- shortcuts (abbreviations)
: DNS & BIND, 4.4. Abbreviations
- syntax errors in
: DNS & BIND, 13.3.5. 5. Syntax Error in the Conf File or DNS Database File
- updating
: DNS & BIND, 7.2. Updating db Files
- db library package
- sendmail, 2.4.1. Eliminate or Keep db Support?
- sendmail, 18.8. Alphabetized Reference
- sendmail, C.1. Overview
- compiling and installing
: sendmail, C.3. Compile and Install
- db.cache file, updating
: DNS & BIND, 7.2.6. Keeping db.cache Current
- db.root file
: DNS & BIND, 15.4.4.4. The db.root file
- dbm database
: sendmail, 33.8. Alphabetized Reference
- alias file and
- sendmail, 22.6.1. The Alias Database Files
- sendmail, 24.5. The Aliases Database
- dbx debugger
: Practical UNIX & Internet Security, C.4. The kill Command
- DCC (Direct Client Connections)
: Building Internet Firewalls, 8.9.2. Internet Relay Chat
- DCD (Data Carrier Detect) modem control line
: TCP/IP Network Administration, A.2. The PPP Daemon
- DCE (data communication equipment)
: Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- DCE (Distributed Computing Environment)
- Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
- Practical UNIX & Internet Security, 8.7.3. Code Books
- Practical UNIX & Internet Security, 16.2.6.2. Other naming services
- Practical UNIX & Internet Security, 19.2. Sun's Remote Procedure Call (RPC)
- Practical UNIX & Internet Security, 19.7.1. DCE
- dd command
- Practical UNIX & Internet Security, 6.6.1.2. Ways of improving the security of crypt
- Practical UNIX & Internet Security, 7.4.1. Simple Local Copies
- DDN (Data Defense Network)
- Building Internet Firewalls, C.10. Internet Routing Architecture
- Practical UNIX & Internet Security, F.3.4.20. MILNET
- TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
- Protocol Handbook
: TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
- deadlock
: Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- debug command
- Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
- sendmail, 22.3.1. SMTP debug
- debug option (nslookup)
- DNS & BIND, 11.3. Option Settings
- DNS & BIND, 11.6.1. Seeing the Query and Response Packets
- debug severity level (logging)
: DNS & BIND, 7.5. BIND 8 Logging
- debug substatement
- DNS & BIND, 6.1.6. The options Directive
- DNS & BIND, F.2.7. options debug (4.9.3 and later versions)
- debug_dumpstate rule set
: sendmail, 26.3.3.3. -- ruleset debug_dumpstate returns stat ..., pv: --
- debugfs command
: Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
- debugging
- DNS & BIND, 8.1.2. Capacity Planning
- DNS & BIND, 12. Reading BIND Debugging Output
- Building Internet Firewalls, 6.1.2.1. Current filtering tools are not perfect
- sendmail, 4.3. Debugging (-d)
- sendmail, 6.3.3. Testing the New Delivery Agent Definitions
- sendmail, 37.2. Debugging Behavior
- TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
- TCP/IP Network Administration, C.1.1. Signal Processing
- (see also bugs)
- (see also -d switch (sendmail))
- (see also testing)
- (see also troubleshooting)
- interpreting output
: DNS & BIND, 12.3. Reading Debugging Output
- levels of
: DNS & BIND, 12.1. Debugging Levels
- named-xfer program
: DNS & BIND, 13.2.1. How to Use named-xfer
- nslookup and
: DNS & BIND, 11.3. Option Settings
- operating system
: Building Internet Firewalls, 5.8.1.2. Fix all known system bugs
- resolver
- DNS & BIND, 6.1.6. The options Directive
- DNS & BIND, 14.2.5. The _res Structure
- with rule testing
: sendmail, 38.7. Add Debugging for Detail
- SMTPDEBUG macro
- sendmail, 18.8. Alphabetized Reference
- sendmail, 22.3.1. SMTP debug
- turning on
: DNS & BIND, 12.2. Turning On Debugging
- debugging mode
: sendmail, 36.7. Alphabetized Reference
- DEC (Digital Equipment Corporation)
: Practical UNIX & Internet Security, F.3.4.9. DEC (Digital Equipment Corporation)
- decentralizing management
: TCP/IP Network Administration, 2.3. Subnets
- decimal serial numbers
: DNS & BIND, 7.2.2. SOA Serial Numbers
- declaring
- classes
- sendmail, 12.1.1. Declaring a Class
- sendmail, 32.1. Class Configuration Commands
- delivery agents
: sendmail, 19.3.2. MAILER()
- macros
- sendmail, 7.2. Defining Macros
- sendmail, 31.2. Command-Line Definitions
- sites for SITECONFIG
: sendmail, 19.6. Alphabetized m4 Macros
- trusted users
: (see T configuration command)
- DECnet network
- Practical UNIX & Internet Security, 16.4.3. DECnet
- sendmail, 3.3.3. Other Protocols
- $C macro
: sendmail, 31.10. Alphabetized Reference
- DECNET-RELAY macro (m4)
: sendmail, 19.6. Alphabetized m4 Macros
- decode alias
- Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
- sendmail, 22.6. The Aliases File
- decryption
- TCP/IP Network Administration, 12.6. Encryption
- (see encryption)
- dedicated connections
- TCP/IP Network Administration, 6.3.1. The PPP Daemon
- TCP/IP Network Administration, 6.4. Installing SLIP
- dedicated proxy servers
: Building Internet Firewalls, 7.3.2. Generic Versus Dedicated Proxies
- defamation
: Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
- default
- accounts
: Practical UNIX & Internet Security, 8.1.2. Default Accounts
- canonicalization
: sendmail, 28.6.6.2. Default in canonicalization: $:
- character set
: sendmail, 30.4. The Equates
- content-type character set
: sendmail, 34.8. Alphabetized Reference
- database key
: sendmail, 33.4.1. Specify a Default with $:
- delivery agent
: sendmail, 34.8. Alphabetized Reference
- delivery mode
: sendmail, 13.2.3. The Default Delivery Mode
- deny
: Practical UNIX & Internet Security, 21.1.1. Default Permit vs. Default Deny
- domain
- Practical UNIX & Internet Security, 16.2.3. Hostnames
- TCP/IP Network Administration, 3.3.3. Domain Names
- TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
- how used
: TCP/IP Network Administration, 3.3.3. Domain Names
- file permissions
: sendmail, 13.2.4. The Default File Permissions
- gateway
- TCP/IP Network Administration, 2.5. The Routing Table
- TCP/IP Network Administration, 4.3. Planning Routing
- address
: TCP/IP Network Administration, 4. Getting Started
- hostname
: sendmail, 33.5.3. A :default Outgoing Hostname
- logging level
: sendmail, 13.2.6. The Default Logging Level
- macro definitions
: sendmail, 7.3. Predefined Macros
- mask
: TCP/IP Network Administration, 2.2.2. Classless IP Addresses
- passwords
: TCP/IP Network Administration, 12.2. User Authentication
- permit
: Practical UNIX & Internet Security, 21.1.1. Default Permit vs. Default Deny
- route
- TCP/IP Network Administration, 2.2.2.1. Final notes on IP addresses
- TCP/IP Network Administration, 2.5. The Routing Table
- TCP/IP Network Administration, 7.3. Building a Static Routing Table
- defining
: TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
- sender's address format
: sendmail, 31.10. Alphabetized Reference
- User Database location
: sendmail, 18.8. Alphabetized Reference
- user identity
- sendmail, 13.2.5. The Default User Identities
- sendmail, 22.8.3.1. The DefaultUser option
- sendmail, 34.8. Alphabetized Reference
- values
: TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- default data category (logging)
- DNS & BIND, 7.5. BIND 8 Logging
- DNS & BIND, 7.5.3. Category Details
- default deny stance
- Building Internet Firewalls, 3.5.1. Default Deny Stance: That Which Is Not
- Building Internet Firewalls, 6.2.3. Default Permit Versus Default Deny
- default domain
- DNS & BIND, 4.7.3.1. Initialize the default domain name
- DNS & BIND, 6.1.1. The Default Domain
- unset
: DNS & BIND, 13.3.12. 12. Default Domain Not Set
- with nslookup
: DNS & BIND, 11.3. Option Settings
- default permit stance
- Building Internet Firewalls, 3.5.2. Default Permit Stance: That Which Is
- Building Internet Firewalls, 6.2.3. Default Permit Versus Default Deny
- default search list
: DNS & BIND, 6.1.2. The Search List
- default_stderr channel (logging)
: DNS & BIND, 7.5.2.4. Stderr channel
- DefaultCharSet option
: sendmail, 34.8. Alphabetized Reference
- defaultdomain file
: TCP/IP Network Administration, 9.3. Network Information Service
- defaultroute option
: TCP/IP Network Administration, 6.3.1. The PPP Daemon
- defaultrouter file
: DNS & BIND, 8.5.2. Recommendations
- DefaultUser (u,g) option
- sendmail, 13.2.5. The Default User Identities
- sendmail, 22.8.3.1. The DefaultUser option
- sendmail, 34.8. Alphabetized Reference
- Defense Communications Agency (DCA)
: TCP/IP Network Administration, 1.1. TCP/IP and the Internet
- Defense Data Network (DDN)
: Building Internet Firewalls, C.10. Internet Routing Architecture
- defense in depth
- Building Internet Firewalls, 3.2. Defense in Depth
- Building Internet Firewalls, 9.2.3.2. Defense in depth
- define()
: sendmail, 20.3. Alphabetized V8.8 Subroutines
- define macro (in sendmail)
- TCP/IP Network Administration, E.3. m4 sendmail Macros
- TCP/IP Network Administration, E.3.1. define
- define statements (m4)
- sendmail, 19.1. The m4 Preprocessor
- sendmail, 19.4.1. Options
- defining
- headers
: (see H configuration command)
- macros
- sendmail, 20.3. Alphabetized V8.8 Subroutines
- sendmail, 34.8. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- sendmail, 38.2.1. Define a Macro with .D
- definition statements (in gated)
: TCP/IP Network Administration, B.7. Definition Statements
- defname option (nslookup)
: DNS & BIND, 11.3. Option Settings
- delay= equate (syslog output)
: sendmail, 26.1.3.2. delay= total time to deliver
- delay, transaction
: sendmail, 26.1.3.13. xdelay= transaction
- delays, inserting
- TCP/IP Network Administration, 6.3.2. Dial-Up PPP
- TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- delegation
- DNS & BIND, 2.3. Delegation
- DNS & BIND, 2.4.1. Delegating Domains
- DNS & BIND, 10.11.5. Delegated Name Server Configuration
- checking
- DNS & BIND, 9.6. Good Parenting
- DNS & BIND, 9.6.2. Managing Delegation
- in-addr.arpa domain
- DNS & BIND, 3.2.4. Registering with Your Parent
- DNS & BIND, 15.4.4.3. in-addr.arpa delegation
- internal roots
: DNS & BIND, 15.4.4.2. Forward mapping delegation
- lame
- DNS & BIND, 7.6.1. Common Syslog Messages
- DNS & BIND, 7.6.2. Understanding the BIND Statistics
- DNS & BIND, 8.3. Registering Name Servers
- number of subdomains
: DNS & BIND, 9.2. How Many Children?
- octet boundaries and
: DNS & BIND, 9.5.1. Subnetting on an Octet Boundary
- old information
: DNS & BIND, 13.6.8.1. Old delegation information
- subdomains
- DNS & BIND, 9.4.2. Creating and Delegating a Subdomain
- DNS & BIND, 13.3.9. 9. Missing Subdomain Delegation
- DELETE key
: Practical UNIX & Internet Security, 3.4. Changing Your Password
- deleting
- aliases
: DNS & BIND, 9.7.1. Removing Parent Aliases
- destructive attack via
: Practical UNIX & Internet Security, 25.1. Destructive Attacks
- files
: Practical UNIX & Internet Security, 5.4. Using Directory Permissions
- header lines
: sendmail, 20.3. Alphabetized V8.8 Subroutines
- hosts
: DNS & BIND, 7.2.1. Adding and Deleting Hosts
- delimiters
- database key column
: sendmail, 33.3.4.12. -z specify the column delimiter (V8.7 and above)
- tokens
- sendmail, 31.10. Alphabetized Reference
- sendmail, 34.8. Alphabetized Reference
- "Delivered-To:" header line
: sendmail, 35.10. Alphabetized Reference
- delivermail program
: sendmail, History
- delivery
- sendmail, 19.6. Alphabetized m4 Macros
- (see also users)
- alias, forms of
: sendmail, 24.2. Forms of Alias Delivery
- failure count
: sendmail, 23.9. The qf File Internals
- via FAX machine
: sendmail, 3.3.3. Other Protocols
- to files
: (see appending to files)
- local
- sendmail, 3.2. Role in Local Delivery
- sendmail, 29.6.3. Delivering to Local Recipient
- sendmail, 30.8. Alphabetized F= Flags
- (see local)
- looking up addresses with DNS
: sendmail, 21.2.3. Look Up Addresses for Delivery
- to mailbox
: sendmail, 3.2.1. Delivery to a Mailbox
- to multiple recipients
: sendmail, 30.8. Alphabetized F= Flags
- path of
: (see "Received:" header line)
- precedence
: (see priority, message)
- to programs
- sendmail, 3.2.2. Delivery Through a Program
- sendmail, 24.2.3. Delivery via Programs
- sendmail, 25.7.4. Piping Through Programs
- sendmail, 30.8. Alphabetized F= Flags
- relays
: (see relays)
- single threaded
: sendmail, 34.8. Alphabetized Reference
- total time for
: sendmail, 26.1.3.2. delay= total time to deliver
- delivery agents (MTAs)
- Building Internet Firewalls, 8.1. Electronic Mail
- sendmail, 1.1. MUA Versus MTA
- sendmail, 5.3.1. Mail Delivery Agents
- sendmail, 6.2. Define a Mail Delivery Agent
- sendmail, 30. Delivery Agents
- (see also M configuration command)
- $# operator and
- sendmail, 9.2.1. The Delivery Agent ($#)
- sendmail, 28.6.5. Specify a Delivery Agent: $#
- advantages to sendmail
: sendmail, 18.1. To Use or Not to Use
- choosing
- sendmail, 9. Rule Set 0
- sendmail, 9.5. Things to Try
- declaring
: sendmail, 19.3.2. MAILER()
- default
: sendmail, 34.8. Alphabetized Reference
- equates for
: sendmail, 30.4. The Equates
- for errors
: sendmail, 9.4. The error Delivery Agent
- expensive
- sendmail, 23.6.1. Periodically with -q
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 34.8. Alphabetized Reference
- flags
- sendmail, 6.3. The local Delivery Agent
- sendmail, 6.4. Add the Missing Parts to Mhub
- sendmail, 14.2. Headers Versus Delivery Agent Flags
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 35.4. ?flags? in Header Definitions
- ignoring MX records
: sendmail, 21.3.5. What? They Ignore MX Records?
- local
- sendmail, 6.3. The local Delivery Agent
- sendmail, 19.6. Alphabetized m4 Macros
- logging
: sendmail, 26.1.3.4. mailer= the delivery agent used
- printing list of
: sendmail, 38.4.2. Show Delivery Agents with =M
- as recipients
: sendmail, 30.8. Alphabetized F= Flags
- scripts via
: sendmail, 24.3. Write a Delivery Agent Script
- statistics
: (see statistics)
- symbolic name
: sendmail, 30.2. The Symbolic Name
- testing
: sendmail, 38.5.6. Try a Delivery Agent with /try
- UUCP
: sendmail, 19.4.6. UUCP
- delivery mode
: sendmail, 13.2.3. The Default Delivery Mode
- delivery program
: sendmail, 25.7.5.1. The deliver program
- Delivery Status Notification
: (see DSN)
- DeliveryMode (d) option
- sendmail, 13.2.3. The Default Delivery Mode
- sendmail, 23.6.1. Periodically with -q
- sendmail, 34.8. Alphabetized Reference
- Demilitarized Zone (DMZ)
: Building Internet Firewalls, 4.1. Some Firewall Definitions
- demo accounts
: Practical UNIX & Internet Security, 8.1.2. Default Accounts
- demultiplexing
: TCP/IP Network Administration, 2.7. Protocols, Ports, and Sockets
- denial of service
- Building Internet Firewalls, 1.2.1.2. Denial of Service
- Practical UNIX & Internet Security, 1.5. Role of This Book
- Practical UNIX & Internet Security, 17.1.3. The /etc/inetd Program
- Practical UNIX & Internet Security, 17.3.21.5. Denial of service attacks under X
- Practical UNIX & Internet Security, 25. Denial of Service Attacks and Solutions
- Practical UNIX & Internet Security, 25.3. Network Denial of Service Attacks
- Practical UNIX & Internet Security, 25.3.4. Clogging
- TCP/IP Network Administration, 12.1.1. Assessing the Threat
- accidental
- Building Internet Firewalls, 1.2.3. Stupidity and Accidents
- Practical UNIX & Internet Security, 25.2.5. Soft Process Limits: Preventing Accidental Denial
- automatic lockout
: Practical UNIX & Internet Security, 3.3. Entering Your Password
- checklist for
: Practical UNIX & Internet Security, A.1.1.24. Chapter 25: Denial of Service Attacks and Solutions
- destructive attacks
: Practical UNIX & Internet Security, 25.1. Destructive Attacks
- disk attacks
- Practical UNIX & Internet Security, 25.2.2. Disk Attacks
- Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
- inodes
: Practical UNIX & Internet Security, 25.2.2.3. Inode problems
- internal inetd services
: Practical UNIX & Internet Security, 17.1.3. The /etc/inetd Program
- on networks
- Practical UNIX & Internet Security, 25.3. Network Denial of Service Attacks
- Practical UNIX & Internet Security, 25.3.4. Clogging
- overload attacks
- Practical UNIX & Internet Security, 25.2. Overload Attacks
- Practical UNIX & Internet Security, 25.2.5. Soft Process Limits: Preventing Accidental Denial
- via syslog
: Practical UNIX & Internet Security, 10.5.1. The syslog.conf Configuration File
- system overload attacks
: Practical UNIX & Internet Security, 25.2.1.2. System overload attacks
- X Window System
: Practical UNIX & Internet Security, 17.3.21.5. Denial of service attacks under X
- departure of employees
: Practical UNIX & Internet Security, 13.2.6. Departure
- depository directories, FTP
: Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
- dequote database
- sendmail, 33.8. Alphabetized Reference
- TCP/IP Network Administration, 10.7.1. Modifying Local Information
- DES (Data Encryption Standard)
- Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- Practical UNIX & Internet Security, 6.4.4. DES
- Practical UNIX & Internet Security, 6.4.5.2. Triple DES
- Practical UNIX & Internet Security, 6.6.2. des: The Data Encryption Standard
- Practical UNIX & Internet Security, 7.4.4. Encrypting Your Backups
- Practical UNIX & Internet Security, 8.6.1. The crypt()
- (see also authentication)
- authentication (NIS+)
: Practical UNIX & Internet Security, 19.5.4. Using NIS+
- improving security of
- Practical UNIX & Internet Security, 6.4.5. Improving the Security of DES
- Practical UNIX & Internet Security, 6.4.5.2. Triple DES
- designated router
: TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- designing firewalls
: Building Internet Firewalls, 1.4.3. Buying Versus Building
- destination
- TCP/IP Network Administration, 1.7. Application Layer
- (see also unreachable destinations, detecting)
- fields
: TCP/IP Network Administration, 2.5. The Routing Table
- host
: TCP/IP Network Administration, 2.5. The Routing Table
- Destination Address
- TCP/IP Network Administration, 1.5.1.1. The datagram
- TCP/IP Network Administration, 2.2. The IP Address
- Destination Port number
- TCP/IP Network Administration, 1.6.1. User Datagram Protocol
- TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
- destination unreachable codes
: (see ICMP)
- Destination Unreachable Message
: TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
- destroying media
: Practical UNIX & Internet Security, 12.3.2.3. Sanitize your media before disposal
- destructive attacks
: Practical UNIX & Internet Security, 25.1. Destructive Attacks
- detached signatures
: Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
- detail data, DSN delivery
: sendmail, 30.5.2.1. The $@ dsn part
- detectors
- cable tampering
: Practical UNIX & Internet Security, 12.3.1.1. Wiretapping
- carbon-monoxide
: Practical UNIX & Internet Security, 12.2.1.2. Smoke
- humidity
: Practical UNIX & Internet Security, 12.2.1.11. Humidity
- logging alarm systems
: Practical UNIX & Internet Security, 10.7.1.1. Exception and activity reports
- smoke
: Practical UNIX & Internet Security, 12.2.1.2. Smoke
- temperature alarms
: Practical UNIX & Internet Security, 12.2.1.6. Temperature extremes
- water sensors
: Practical UNIX & Internet Security, 12.2.1.12. Water
- Deutsches Forschungsnetz
: Practical UNIX & Internet Security, F.3.4.14. Germany: DFN-WiNet Internet sites
- /dev directory
- Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
- TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- /dev/audio device
: Practical UNIX & Internet Security, 23.8. Picking a Random Seed
- /dev/console device
: Practical UNIX & Internet Security, 5.6. Device Files
- /dev/kmem device
- Practical UNIX & Internet Security, 5.6. Device Files
- Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
- sendmail, 18.8. Alphabetized Reference
- /dev/null device
- DNS & BIND, 10.11.4. Running BIND as a Non-Root User
- Practical UNIX & Internet Security, 5.6. Device Files
- sendmail, 5.2. The Minimal File
- /dev/random device
: Practical UNIX & Internet Security, 23.7.4. Other random number generators
- /dev/swap device
: Practical UNIX & Internet Security, 5.5.1. SUID, SGID, and Sticky Bits
- /dev/urandom device
: Practical UNIX & Internet Security, 23.7.4. Other random number generators
- device statement
: TCP/IP Network Administration, 5.3.1.3. Devices
- devices
: Practical UNIX & Internet Security, 5.6. Device Files
- managing with SNMP
: Practical UNIX & Internet Security, 17.3.15. Simple Network Management Protocol (SNMP) (UDP Ports
- modem control
: Practical UNIX & Internet Security, 14.5.2. Setting Up the UNIX Device
- numbers for
: sendmail, 23.9. The qf File Internals
- Devices file
: Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
- df -i command
: Practical UNIX & Internet Security, 25.2.2.3. Inode problems
- df files
- sendmail, 3.1.2. The Queue Directory
- sendmail, 23.2.2. The Data (Message Body) File: df
- sendmail, 23.9. The qf File Internals
- inode and device information
: sendmail, 23.9. The qf File Internals
- dfstab file
- TCP/IP Network Administration, 9.1.2.1. The share command
- TCP/IP Network Administration, 9.1.5.1. NFS print services
- dgram sockets
: TCP/IP Network Administration, 5.4. The Internet Daemon
- DHCP (Dynamic Host Configuration Protocol)
- TCP/IP Network Administration, Preface
- TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- backwards-compatible
: TCP/IP Network Administration, 9.5. DHCP
- based on Bootstrap Protocol (BOOTP)
: TCP/IP Network Administration, 9.4.2. BOOTP extensions
- benefits of
: TCP/IP Network Administration, 9.5. DHCP
- daemon (dhcpd)
: TCP/IP Network Administration, 9.5.1. dhcpd.conf
- command
: TCP/IP Network Administration, D.2. The dhcpd Command
- compiling
: TCP/IP Network Administration, D.1. Compiling dhcpd
- configuring
: TCP/IP Network Administration, D.3. The dhcpd.conf Configuration File
- tools reference
: TCP/IP Network Administration, D. A dhcpd Reference
- using latest versions of
: TCP/IP Network Administration, D. A dhcpd Reference
- dhcpd.conf file
: TCP/IP Network Administration, 9.5.1. dhcpd.conf
- dhcpd.pid file
: TCP/IP Network Administration, D.2. The dhcpd Command
- interoperability and
: TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- options available with
: TCP/IP Network Administration, D.3.3. DHCP Options
- commonly used
: TCP/IP Network Administration, D.3.3.1. Commonly used options
- others
: TCP/IP Network Administration, D.3.3.2. Other options
- diagnostic tools
: TCP/IP Network Administration, 11.2. Diagnostic Tools
- diagramming the system
: Building Internet Firewalls, 13.5.2. Labeling and Diagraming Your System
- dial-on-demand connections
: DNS & BIND, 15.5.2. Dial-on-Demand
- dial-up connections
- DNS & BIND, 6.4.9. Windows 95
- DNS & BIND, 15.5. Dialup Connections
- TCP/IP Network Administration, 6.3.1. The PPP Daemon
- dial-up IP (dip)
- TCP/IP Network Administration, 6.3.2. Dial-Up PPP
- TCP/IP Network Administration, 6.4.2. Dial-Up IP
- script file
: TCP/IP Network Administration, A.1.1. The dip Script File
- for SLIP
: TCP/IP Network Administration, 6.4.2. Dial-Up IP
- sample
: TCP/IP Network Administration, A.1.1.1. A sample dip script
- special variables, listed
: TCP/IP Network Administration, A.1.1. The dip Script File
- tools reference
: TCP/IP Network Administration, A.1. Dial-Up IP
- dial-up PPP
: TCP/IP Network Administration, 6.3.2. Dial-Up PPP
- DialDelay option
: sendmail, 34.8. Alphabetized Reference
- dictionary attacks
- Building Internet Firewalls, 10.3.1. One-Time Passwords
- Practical UNIX & Internet Security, 8.6.1. The crypt()
- TCP/IP Network Administration, 12.2. User Authentication
- Diffie-Hellman key exchange system
- Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
- Practical UNIX & Internet Security, 18.6. Dependence on Third Parties
- Practical UNIX & Internet Security, 19.3. Secure RPC (AUTH_DES)
- breaking key
: Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
- exponential key exchange
: Practical UNIX & Internet Security, 19.3.1. Secure RPC Authentication
- dig
- TCP/IP Network Administration, 11.2. Diagnostic Tools
- TCP/IP Network Administration, 11.3. Testing Basic Connectivity
- TCP/IP Network Administration, 11.6.4. dig: An Alternative to nslookup
- dig utility
: DNS & BIND, 7.2.6. Keeping db.cache Current
- digest multipart subtype
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- Digital Audio Tape (DAT)
: Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
- digital computers
: Practical UNIX & Internet Security, 6.1.2. Cryptography and Digital Computers
- Digital Equipment Corporation (DEC)
: Practical UNIX & Internet Security, F.3.4.9. DEC (Digital Equipment Corporation)
- Digital Signature Algorithm
: (see DSA)
- digital signatures
- Practical UNIX & Internet Security, 6.4. Common Cryptographic Algorithms
- Practical UNIX & Internet Security, 6.5. Message Digests and Digital Signatures
- Practical UNIX & Internet Security, 6.5.5.2. Message authentication codes
- Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
- TCP/IP Network Administration, 12.6. Encryption
- checksums
- Building Internet Firewalls, 5.8.5.3. About checksums for auditing
- Practical UNIX & Internet Security, 6.5.5.1. Checksums
- Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
- TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
- TCP/IP Network Administration, 11.8. Protocol Case Study
- keeping secure
: Building Internet Firewalls, 13.5.3. Keeping Secured Checksums
- recalculating
- TCP/IP Network Administration, 4.2.1. Obtaining an IP Address
- TCP/IP Network Administration, 5.3.1.1. Options
- using Tripwire for
: Building Internet Firewalls, 5.8.5.1. Auditing packages
- detached signatures
: Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
- with PGP
: Practical UNIX & Internet Security, 6.6.3.4. Adding a digital signature to an announcement
- Digital UNIX
- DNS & BIND, 6.4.5. Digital's Digital UNIX
- Practical UNIX & Internet Security, 1.3. History of UNIX
- (see also Ultrix)
- Dijkstra Shortest Path First (SPF) algorithm
: TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- dip (dial-up IP)
- TCP/IP Network Administration, 6.3.2. Dial-Up PPP
- TCP/IP Network Administration, 6.4.2. Dial-Up IP
- script file
: TCP/IP Network Administration, A.1.1. The dip Script File
- for SLIP
: TCP/IP Network Administration, 6.4.2. Dial-Up IP
- sample
: TCP/IP Network Administration, A.1.1.1. A sample dip script
- tools reference
: TCP/IP Network Administration, A.1. Dial-Up IP
- diphosts file
: TCP/IP Network Administration, 6.4.3. SLIP Server Configuration
- diplogin command
: TCP/IP Network Administration, 6.4.3. SLIP Server Configuration
- Direct Client Connections (DCC)
: Building Internet Firewalls, 8.9.2. Internet Relay Chat
- direct delivery
: TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
- directives
- DNS & BIND, 6.1.8. A Note on the 4.9 Resolver Directives
- (see also under specific directive)
- gated
: TCP/IP Network Administration, B.3. Directive Statements
- list of (BIND)
: DNS & BIND, F.1. BIND Name Server Boot File Statements
- Makefile
: sendmail, 18.4. Tuning Makefile
- resolver
- DNS & BIND, 6.1. The Resolver
- DNS & BIND, 6.1.8. A Note on the 4.9 Resolver Directives
- directories
- Practical UNIX & Internet Security, 5.1.1. Directories
- Practical UNIX & Internet Security, 5.1.3. Current Directory and Paths
- ancestor
: Practical UNIX & Internet Security, 9.2.2.2. Ancestor directories
- backing up by
: Practical UNIX & Internet Security, 7.1.3. Types of Backups
- CDFs (context-dependent files)
: Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
- cf
: sendmail, 16.1. The cf/cf Directory
- checklist for
: Practical UNIX & Internet Security, A.1.1.4. Chapter 5: The UNIX Filesystem
- dot, dot-dot, and /
: Practical UNIX & Internet Security, 5.1.1. Directories
- FTP depositories
: Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
- immutable
: Practical UNIX & Internet Security, 9.1.1. Immutable and Append-Only Files
- listing automatically (Web)
: Practical UNIX & Internet Security, 18.2.2.2. Additional configuration issues
- mounted
- Practical UNIX & Internet Security, 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
- Practical UNIX & Internet Security, 19.3.2.5. Mounting a secure filesystem
- nested
: Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
- NFS
: (see NFS)
- organizing db files in
: DNS & BIND, 7.3.1. Using Several Directories
- permissions
: Practical UNIX & Internet Security, 5.4. Using Directory Permissions
- queue
: (see queue directory)
- read-only
: Practical UNIX & Internet Security, 9.1.2. Read-only Filesystems
- recipient's home
: sendmail, 31.10. Alphabetized Reference
- requirement for mounting
: TCP/IP Network Administration, 9.1.3. Mounting Remote Filesystems
- restricted
- Practical UNIX & Internet Security, 8.1.5. Restricted Filesystem
- Practical UNIX & Internet Security, 8.1.5.2. Checking new software
- root
: (see root directory)
- for safe file writes
: sendmail, 34.8. Alphabetized Reference
- SGI and sticky bits on
: Practical UNIX & Internet Security, 5.5.6. SGID and Sticky Bits on Directories
- Web server structure of
- Practical UNIX & Internet Security, 18.2.2. Understand Your Server's Directory Structure
- Practical UNIX & Internet Security, 18.2.2.2. Additional configuration issues
- world-writable
: Practical UNIX & Internet Security, 11.6.1.1. World-writable user files and directories
- <Directory> blocks
- Practical UNIX & Internet Security, 18.3.1. The access.conf and .htaccess Files
- Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
- Practical UNIX & Internet Security, 18.3.2.1. Examples
- directory directive
- DNS & BIND, F.1. BIND Name Server Boot File Statements
- TCP/IP Network Administration, 8.3.1.2. Primary and secondary server configurations
- disabled UDP checksums
: DNS & BIND, 13.5.5. Name Server Startup Fails Because UDP Checksums Disabled
- disabling Internet services
: Building Internet Firewalls, 5.8.2. Disabling Nonrequired Services
- disabling routing
: (see routers and routing, disabling)
- disasters and disaster recovery
- Practical UNIX & Internet Security, 12.2.6.4. Minimizing downtime
- sendmail, 21.5. Prepare for Disaster
- TCP/IP Network Administration, 11.10. Summary
- TCP/IP Network Administration, 12.1.1. Assessing the Threat
- TCP/IP Network Administration, 12.1.3. Writing a Security Policy
- TCP/IP Network Administration, 12.8. Words to the Wise
- disasters, preventing and handling
: DNS & BIND, 8.5. Planning for Disasters
- disclosure of information, threat of
: TCP/IP Network Administration, 12.1.1. Assessing the Threat
- disconnecting after incident
: Building Internet Firewalls, 13.1.2. Disconnect or Shut Down, as
- disconnecting machine
: Building Internet Firewalls, 13.4.3. Planning for Disconnecting or
- disk attacks
- Practical UNIX & Internet Security, 25.2.2. Disk Attacks
- Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
- disk quotas
: Practical UNIX & Internet Security, 25.2.2.5. Using quotas
- disk space
: (see memory; resources)
- diskettes
: (see backups; media)
- disks, needs for
: Building Internet Firewalls, 5.3.3. What Hardware Configuration?
- dismissed employees
: Practical UNIX & Internet Security, 13.2.6. Departure
- dismounting directories, by booting
: TCP/IP Network Administration, 9.1.3.1. The mount command
- disposing of materials
: Practical UNIX & Internet Security, 12.3.3. Other Media
- distfile file
- DNS & BIND, 8.2.1. Primary Master and Slave Servers
- TCP/IP Network Administration, 9.6.1. rdist
- distributed
- architecture
: TCP/IP Network Administration, 7.5.1. Exterior Gateway Protocol
- control
: TCP/IP Network Administration, 12.1.2. Distributed Control
- servers, managing
: TCP/IP Network Administration, 9.6. Managing Distributed Servers
- Distributed Computing Environment
: (see DCE)
- Distributed File System (DFS)
: TCP/IP Network Administration, 3.7.1. File Sharing
- distributing public keys
: TCP/IP Network Administration, 12.6. Encryption
- diversity of defense systems
: Building Internet Firewalls, 3.7. Diversity of Defense
- divert command (m4)
- sendmail, 19.1.4. m4 diversions
- sendmail, 19.6. Alphabetized m4 Macros
- dividing problem into manageable pieces
: TCP/IP Network Administration, 11.1.1. Troubleshooting Hints
- DMBDEF variable
: TCP/IP Network Administration, E.4.4. The sendmail K Command
- DMBDEF= directive
: sendmail, 18.4.1. DBMDEF=
- dmesg command
: TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- DMZ (Demilitarized Zone)
: Building Internet Firewalls, 4.1. Some Firewall Definitions
- dname parameter (res_search)
: DNS & BIND, 14.2.4. The Resolver Library Routines
- dnl command (m4)
: sendmail, 19.1.2. m4 and dnl
- DNS (Domain Name Service)
- Building Internet Firewalls, 2.9. Name Service
- Building Internet Firewalls, 5.6. Selecting Services Provided by the
- Practical UNIX & Internet Security, 16.2.6. Name Service
- Practical UNIX & Internet Security, 16.2.6.2. Other naming services
- Practical UNIX & Internet Security, 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
- Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
- sendmail, 17.2.1. Is the Host Local?
- sendmail, 21.1. Overview
- TCP/IP Network Administration, 1.7. Application Layer
- TCP/IP Network Administration, 3.1. Names and Addresses
- TCP/IP Network Administration, 3.3. Domain Name Service
- (see also name service)
- benefits of
- TCP/IP Network Administration, 3.3. Domain Name Service
- TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
- bestmx_is_local feature
: sendmail, 19.6. Alphabetized m4 Macros
- configuring
: Building Internet Firewalls, 8.10. Domain Name System
- in screened host architecture
: Building Internet Firewalls, 9.2.1.6. DNS
- in screened subnet architecture
: Building Internet Firewalls, 9.1.1.6. DNS
- without hiding information
: Building Internet Firewalls, 8.10.6. Setting up DNS Without Hiding
- data
: Building Internet Firewalls, 8.10.3. DNS Data
- disasters
: sendmail, 21.5. Prepare for Disaster
- eliminating support for
: sendmail, 2.4.2. Eliminate DNS Support
- error numbers
: sendmail, B.1. Status file lines
- fake server
: Building Internet Firewalls, 8.10.5.1. Set up a `fake'
- hiding information with
: Building Internet Firewalls, 8.10.5. Setting Up DNS to Hide
- MX records
- Building Internet Firewalls, 8.10.5.1. Set up a `fake'
- Practical UNIX & Internet Security, 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
- sendmail, 15.3. MX Records
- sendmail, 18.8. Alphabetized Reference
- sendmail, 21.3. Set Up MX Records
- sendmail, 34.8. Alphabetized Reference
- sendmail, 38.5.2. Look Up MX Records with /mx
- TCP/IP Network Administration, 8.3.2. Standard Resource Records
- TCP/IP Network Administration, 8.3.6. The named.hosts File
- TCP/IP Network Administration, 8.4. Using nslookup
- TCP/IP Network Administration, 10.7.1. Modifying Local Information
- TCP/IP Network Administration, C.3.1.4. Mail exchanger record
- 0 flag
: sendmail, 30.8. Alphabetized F= Flags
- bestmx database class
: sendmail, 33.8. Alphabetized Reference
- bestmx_is_local feature
: sendmail, 19.6. Alphabetized m4 Macros
- fallback MX host
: sendmail, 34.8. Alphabetized Reference
- ignored by delivery agents
: sendmail, 21.3.5. What? They Ignore MX Records?
- looking up for addresses
: sendmail, 21.2.3. Look Up Addresses for Delivery
- offsite hosts
: sendmail, 21.5.1. Offsite MX Hosts
- with wildcards
: sendmail, 21.3.4. Wildcard MX Records
- nameserver attacks
: Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
- omitting support
: sendmail, 19.6. Alphabetized m4 Macros
- querying
: TCP/IP Network Administration, 10.7.1. Modifying Local Information
- resource on
: sendmail, Other Books, Other Problems
- revealing information to attackers
: Building Internet Firewalls, 8.10.4.3. Revealing too much information to
- rogue servers
: Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
- security and
: Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
- server for internal hosts
: Building Internet Firewalls, 8.10.5.2. Set up a real DNS
- starting
: TCP/IP Network Administration, 5.4. The Internet Daemon
- tuning lookups
: sendmail, 34.8. Alphabetized Reference
- zone transfers
- Practical UNIX & Internet Security, 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
- Practical UNIX & Internet Security, 17.3.6.1. DNS zone transfers
- DNS (Domain Name System)
- configuring hosts for
- DNS & BIND, 6. Configuring Hosts
- DNS & BIND, 6.3. Minimizing Pain and Suffering
- database files
: (see db files)
- disasters
: DNS & BIND, 8.5. Planning for Disasters
- documentation on
: DNS & BIND, Preface
- firewalls and
: DNS & BIND, 15.4. DNS and Internet Firewalls
- fundamentals of
: DNS & BIND, 1.3. The Domain Name System, in a Nutshell
- history of
: DNS & BIND, 1.2.1. The History of the Domain Name System
- NIS with
: DNS & BIND, 6.4.1.2. Using DNS with NIS
- packet format
- DNS & BIND, 11.6.1. Seeing the Query and Response Packets
- DNS & BIND, 14.2.1. DNS Packet Format
- resource records
: (see resource records)
- when to use
: DNS & BIND, 1.5. Must I Use DNS?
- WINS and
: DNS & BIND, 15.9. DNS and WINS
- X.500 directory system vs.
: DNS & BIND, 15.8. DNS Versus X.500
- DNS client
: DNS & BIND, 6.1.4. The nameserver Directive
- DNS NOTIFY
- DNS & BIND, 3.1. Getting BIND
- DNS & BIND, 10.2. DNS NOTIFY (Zone Change Notification)
- DNS UPDATE
: DNS & BIND, 3.1. Getting BIND
- docs/warnings file
: TCP/IP Network Administration, 12.4.3.1. COPS
- documentation
- Practical UNIX & Internet Security, 2.5. The Problem with Security Through Obscurity
- Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- BIND
: DNS & BIND, 3.1.1. Handy Mailing Lists and Usenet Newsgroups
- DNS
: DNS & BIND, Preface
- firewalls
: DNS & BIND, 15.4.1. Types of Firewall Software
- historical, of problems
: TCP/IP Network Administration, 11.1.1. Troubleshooting Hints
- incidents
: Building Internet Firewalls, 13.1.7. Document the Incident
- network numbers
: DNS & BIND, 3.2.3. Checking That Your Network Is Registered
- plan for
: Building Internet Firewalls, 13.4.7. Planning for Documentation
- sendmail
- sendmail, Additional Sources of Information
- sendmail, 2.2. Read the Documents
- system after incident
- Building Internet Firewalls, 13.1.5. Snapshot the System
- Building Internet Firewalls, 13.4.5. Planning for Snapshots
- using
: TCP/IP Network Administration, 4.6. Informing the Users
- DOL macro (m4)
: sendmail, 19.6. Alphabetized m4 Macros
- dollar sign ($)
- $ line (qf file)
: sendmail, 23.9. The qf File Internals
- wildcard operators
- sendmail, 8.7. Wildcard Operators
- (see also wildcard operators)
- $ rule-testing command
: sendmail, 38.3.1. Dump a Defined Macro with $
- $_ macro
- sendmail, 20.2.4. Verify identd Information
- sendmail, 23.9. The qf File Internals
- sendmail, 26.1.3.9. relay= the host that sent or accepted the message
- sendmail, 31.10. Alphabetized Reference
- $1, $2, ...
: (see positional operators)
- $&
- sendmail, 28.6.4. Rewrite Through Another Rule Set: $>set
- sendmail, 31.5.3. Use Value as Is with $&
- $>
: sendmail, 28.6.4. Rewrite Through Another Rule Set: $>set
- $*
: sendmail, 10.2.1. The LHS
- $@
- sendmail, 9.2.2. The Host ($@)
- sendmail, 9.3. Testing Rule Set 0
- sendmail, 11.4.1. Rewrite the Lone Username
- sendmail, 17.1.1.3. Handle null address
- sendmail, 28.6.3. Rewrite-and-Return Prefix: $@
- sendmail, 30.5.2.1. The $@ dsn part
- sendmail, 33.4.2. Specify Numbered Substitution with $@
- $[ and $]
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 21.2.4. The $[ and $] Operators
- sendmail, 28.6.6. Canonicalize Hostname: $[ and $]
- sendmail, 33.4.3. $[ and $]: A Special Case
- $:
- sendmail, 9.2.3. The User ($:)
- sendmail, 9.3. Testing Rule Set 0
- sendmail, 28.6.2. Rewrite Once Prefix: $:
- sendmail, 29.6.1. Further Processing: $:user
- sendmail, 30.5.3. The $: Part
- sendmail, 33.4. Use Maps with $( and $) in Rules
- sendmail, 33.4.1. Specify a Default with $:
- $.
- sendmail, 14.1.3. Testing So Far
- sendmail, 31.6. Macro Conditionals: $?, $|, and $.
- $=
- sendmail, 12.1. The Class Command
- sendmail, 32.2.1. Matching Any in a Class: $=
- sendmail, 38.3.2. Dump a Class Macro with $=
- $#
- sendmail, 9.2.1. The Delivery Agent ($#)
- sendmail, 28.6.5. Specify a Delivery Agent: $#
- $-
: sendmail, 11.4.1. Rewrite the Lone Username
- in macro names
: sendmail, 31.5. Macro Expansion: $ and $&
- $( and $)
: sendmail, 33.4. Use Maps with $( and $) in Rules
- $+
: sendmail, 8.7. Wildcard Operators
- $?
- sendmail, 14.1.3. Testing So Far
- sendmail, 31.6. Macro Conditionals: $?, $|, and $.
- $~
: sendmail, 32.2.2. Matching Any Not in a Class: $~
- $|
: sendmail, 31.6. Macro Conditionals: $?, $|, and $.
- DOMAIN()
: sendmail, 19.3.3. DOMAIN()
- domain directive
- DNS & BIND, 6.1.1. The Default Domain
- DNS & BIND, 6.1.3. The search Directive
- DNS & BIND, F.2.1. domain
- NIS and
: DNS & BIND, 6.4.1.2. Using DNS with NIS
- DOMAIN macro (in sendmail)
: TCP/IP Network Administration, E.3. m4 sendmail Macros
- Domain Name Pointer records
: (see PTR records)
- domain name space
- DNS & BIND, 2.1. The Domain Name Space
- DNS & BIND, 15.4.6. A Shadow Namespace
- CIDR and
: DNS & BIND, 3.2.3. Checking That Your Network Is Registered
- Internet
- DNS & BIND, 2.2. The Internet Domain Name Space
- DNS & BIND, 2.2.1. Top-Level Domains
- Domain Name System
: (see DNS)
- domain names
- DNS & BIND, 1.3. The Domain Name System, in a Nutshell
- DNS & BIND, 2.1.1. Domain Names
- DNS & BIND, A.4.1.1. Domain name
- Practical UNIX & Internet Security, 16.2.3. Hostnames
- sendmail, 8.1. A Fictional Network
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 31.10. Alphabetized Reference
- TCP/IP Network Administration, 3.3.3. Domain Names
- TCP/IP Network Administration, 4. Getting Started
- abbreviations
: DNS & BIND, 4.4. Abbreviations
- aliases
: (see aliases)
- application form
: TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
- checking host names
: DNS & BIND, 4.5. Host Name Checking (BIND 4.9.4 and Later Versions)
- choosing
- DNS & BIND, 3.2. Choosing a Domain Name
- DNS & BIND, 9.3. What to Name Your Children
- collisions
: DNS & BIND, 1.2.1. The History of the Domain Name System
- compressing/expanding
- DNS & BIND, 14.2.3. Domain Name Compression
- DNS & BIND, 14.2.6. The Name Server Library Routines
- consistency of
- DNS & BIND, 1.2.1. The History of the Domain Name System
- DNS & BIND, 2.4. Name Servers and Zones
- fully qualified (FQDNs)
- DNS & BIND, 2.1.1. Domain Names
- DNS & BIND, 6.1.2. The Search List
- TCP/IP Network Administration, 3.3.3. Domain Names
- geographic
: (see geographic domain names)
- how to read
: DNS & BIND, 2.2.3. Reading Domain Names
- in NIS
: TCP/IP Network Administration, 9.3. Network Information Service
- local, can't be looked up
: DNS & BIND, 13.6.1. Local Name Can't Be Looked Up
- mail exchangers
- DNS & BIND, 5.1. MX Records
- DNS & BIND, 5.2. What's a Mail Exchanger, Again?
- mapping [to]
- DNS & BIND, 2.6.4. Mapping Addresses to Names
- DNS & BIND, 4.2.5. Address and Alias Records
- DNS & BIND, 4.2.6. PTR Records
- (see also PTR records)
- MX records
: (see MX records)
- obtaining
: TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
- parameter
: TCP/IP Network Administration, 9.4. A BOOTP Server
- remote, looking up
: DNS & BIND, 4.7.3.4. Look up a remote name
- resolving
: (see resolution)
- servers for
: (see name servers)
- storage
: DNS & BIND, 14.2.2. Domain Name Storage
- subdomains
: DNS & BIND, 2.1.2. Domains
- trailing dot (.)
- DNS & BIND, 2.1.1. Domain Names
- DNS & BIND, 4.2.3. SOA Records
- DNS & BIND, 4.4.1. Appending Domains
- DNS & BIND, 13.3.6. 6. Missing Dot at the End of a Name in a DNS Database File
- DNS & BIND, A.1. Master File Format
- DOMAIN source file (in sendmail)
- TCP/IP Network Administration, E.3.2. FEATURE
- TCP/IP Network Administration, E.3.4. DOMAIN
- mail relay defines, listed
: TCP/IP Network Administration, E.3.4. DOMAIN
- domain-type addresses
: sendmail, 17.1.3. Internet Addresses
- domain/named.root
: TCP/IP Network Administration, 11.6.3. Cache corruption
- domainname command
- Practical UNIX & Internet Security, 19.4.3. NIS Domains
- TCP/IP Network Administration, 9.3. Network Information Service
- domains
- DNS & BIND, 1.3. The Domain Name System, in a Nutshell
- DNS & BIND, 2.1.2. Domains
- DNS & BIND, 3.2.2. Elsewhere in the World
- Practical UNIX & Internet Security, 19.4.3. NIS Domains
- TCP/IP Network Administration, 1.7. Application Layer
- (see also under specific domain name)
- accepting only internal mail
: sendmail, 20.2.1. Accept Mail Only From Our Domain
- adding
: DNS & BIND, 4.9. Adding More Domains
- adding to recipient address
: sendmail, 30.8. Alphabetized F= Flags
- administration
- TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
- TCP/IP Network Administration, 8.1. BIND: UNIX Name Service
- contacting
: TCP/IP Network Administration, 13.6. The White Pages
- allocating
: (see Network Information Center)
- always_add_domain feature
: sendmail, 19.6. Alphabetized m4 Macros
- creating
: TCP/IP Network Administration, 3.3.2. Creating Domains and Subdomains
- default
- DNS & BIND, 4.7.3.1. Initialize the default domain name
- DNS & BIND, 6.1.1. The Default Domain
- DNS & BIND, 11.3. Option Settings
- DNS & BIND, 13.3.12. 12. Default Domain Not Set
- delegating
- DNS & BIND, 2.3. Delegation
- DNS & BIND, 2.4.1. Delegating Domains
- DNS & BIND, 13.3.9. 9. Missing Subdomain Delegation
- DNS & BIND, 15.4.4.3. in-addr.arpa delegation
- old information
: DNS & BIND, 13.6.8.1. Old delegation information
- downloading an entire
: TCP/IP Network Administration, 8.4. Using nslookup
- email to specific
: DNS & BIND, 15.4.4.8. Mail to specific Internet domains
- entry, in resolv.conf
: TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
- FQDN
: (see FQDNs)
- getting information on
- DNS & BIND, 3.2.1. Where in the World Do I Fit?
- DNS & BIND, 3.2.2.1. The us domain
- hierarchy
- TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
- TCP/IP Network Administration, 8.1. BIND: UNIX Name Service
- in-addr.arpa
- DNS & BIND, 3.2.4. Registering with Your Parent
- DNS & BIND, 15.4.4.3. in-addr.arpa delegation
- DNS & BIND, E. in-addr.arpa Registration Form
- delegating
: DNS & BIND, 9.4.5. Delegating an in-addr.arpa Zone
- incorrect delegation
: DNS & BIND, 13.6.5. rlogin and rsh to Host Fails Access Check
- subdomains of
: DNS & BIND, 9.5. Subdomains of in-addr.arpa Domains
- international
: (see geographic domain names)
- levels of
: DNS & BIND, 2.1.2. Domains
- list of local
: sendmail, 32.5. Alphabetized Reference
- masquerading
: sendmail, 19.6. Alphabetized m4 Macros
- name servers
: TCP/IP Network Administration, 4.2.1.1. Assigning host addresses
- parameter
: TCP/IP Network Administration, 9.4. A BOOTP Server
- non-U.S.
: DNS & BIND, 2.2.2. Further Down
- "nonexistent domain" message
: DNS & BIND, 11.7.3. No PTR Data for Name Server's Address
- organizational
: TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
- parenting
: DNS & BIND, 9. Parenting
- checking delegation
: DNS & BIND, 9.6. Good Parenting
- creating subdomains
: DNS & BIND, 9.4. How to Become a Parent: Creating Subdomains
- managing transition to subdomains
: DNS & BIND, 9.7. Managing the Transition to Subdomains
- naming subdomains
: DNS & BIND, 9.3. What to Name Your Children
- part of hostname
: (see $m macro)
- registering
- DNS & BIND, 3.2.3. Checking That Your Network Is Registered
- DNS & BIND, D. Domain Registration Form
- root domain
- DNS & BIND, 1.3. The Domain Name System, in a Nutshell
- DNS & BIND, 2.1. The Domain Name Space
- cache data for
: DNS & BIND, 4.2.9. The Root Cache Data
- updating record of
: DNS & BIND, 7.2.6. Keeping db.cache Current
- searching
: DNS & BIND, 11.1.3. Domain Searches
- state- and city-level
- DNS & BIND, 2.2.2. Further Down
- DNS & BIND, 3.2.2.1. The us domain
- testing setup
: DNS & BIND, 4.7.3. Testing Your Setup with nslookup
- top-level
- (see top-level domains)
- (see
- virtual, mapping to addresses
: sendmail, 19.6. Alphabetized m4 Macros
- zones vs.
: DNS & BIND, 2.4. Name Servers and Zones
- domaintable database
- sendmail, 19.6. Alphabetized m4 Macros
- TCP/IP Network Administration, 10.7.1. Modifying Local Information
- DontExpandCNames option
: sendmail, 34.8. Alphabetized Reference
- DontInitGroups option
: sendmail, 34.8. Alphabetized Reference
- DontPruneRoutes command
: sendmail, 34.8. Alphabetized Reference
- dormant accounts
- Practical UNIX & Internet Security, 8.4. Managing Dormant Accounts
- Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts
- dot (.)
- for current directory
: Practical UNIX & Internet Security, 5.1.1. Directories
- . line (qf file)
: sendmail, 23.9. The qf File Internals
- .. directory
: Practical UNIX & Internet Security, 5.1.1. Directories
- .. for domain name
: TCP/IP Network Administration, C.3.1. Standard Resource Records
- checking for in ${pd}
: sendmail, D.1. Sun Enhancements
- default domain and
: DNS & BIND, 6.1.1. The Default Domain
- to end messages
- sendmail, 4.2. Verbose (-v)
- sendmail, 30.8. Alphabetized F= Flags
- filenames starting with, disabling creation of
: Building Internet Firewalls, 8.2.1.6. Be careful of writable
- host status file line
: sendmail, B.1. Status file lines
- leading in messages
: sendmail, 34.8. Alphabetized Reference
- ndots substatement
- DNS & BIND, 6.1.6. The options Directive
- DNS & BIND, F.2.6. options ndots (4.9.3 and later versions)
- root domain
- DNS & BIND, 1.3. The Domain Name System, in a Nutshell
- DNS & BIND, 2.1. The Domain Name Space
- DNS & BIND, 4.2.9. The Root Cache Data
- trailing in domain names
- DNS & BIND, 2.1.1. Domain Names
- DNS & BIND, 4.2.3. SOA Records
- DNS & BIND, 4.4.1. Appending Domains
- DNS & BIND, 13.3.6. 6. Missing Dot at the End of a Name in a DNS Database File
- DNS & BIND, A.1. Master File Format
- trailing in FQDNs
- sendmail, 15.3. MX Records
- sendmail, 17.4. Rule Set 4
- sendmail, 29.5.1. Stripping Trailing Dots
- dotted decimal notation
: TCP/IP Network Administration, 2.3. Subnets
- dotted-octet representation
: DNS & BIND, 2.6.4. Mapping Addresses to Names
- Double DES
: Practical UNIX & Internet Security, 6.4.5. Improving the Security of DES
- double quotation marks (")
- sendmail, 13.2.8. The Unquoted Space Replacement Character
- sendmail, 31.3.2. Syntax of the Configuration File Macro's Text
- double-reverse lookups
- Building Internet Firewalls, 8.10.4.2. Mismatched data between the hostname
- Building Internet Firewalls, 8.10.5.1. Set up a `fake'
- Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
- DoubleBounceAddress option
: sendmail, 34.8. Alphabetized Reference
- DOW USA
: Practical UNIX & Internet Security, F.3.4.10. DOW USADOW USA
- down sites
: sendmail, 23.7.1. Handling a Down Site
- downloading files
: Practical UNIX & Internet Security, 12.3.4. Protecting Local Storage
- logging
- Practical UNIX & Internet Security, 10.3.3. xferlog Log File
- Practical UNIX & Internet Security, 10.3.5. access_log Log File
- downtime
: Practical UNIX & Internet Security, 12.2.6.4. Minimizing downtime
- due to criminal investigations
: Practical UNIX & Internet Security, 26.2.4. Hazards of Criminal Prosecution
- logging
: Practical UNIX & Internet Security, 10.7.2.1. Exception and activity reports
- drand48 function
: Practical UNIX & Internet Security, 23.7.3. drand48 ( ), lrand48 ( ), and mrand48 ( )
- Drawbridge package
: Building Internet Firewalls, B.3.2. Drawbridge
- drills, security
: Practical UNIX & Internet Security, 24.1.3. Rule #3: PLAN AHEAD
- drink
: Practical UNIX & Internet Security, 12.2.2.1. Food and drink
- ds.internic.net
: TCP/IP Network Administration, 13.4. Retrieving RFCs
- DSA (Digital Signature Algorithm)
- Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
- Practical UNIX & Internet Security, 6.5.3. Digital Signatures
- DSN (Delivery Status Notification)
- sendmail, 6.3. The local Delivery Agent
- sendmail, B.1. Status file lines
- DSN macro
: sendmail, 18.8. Alphabetized Reference
- ENVID identifier
- sendmail, 23.9. The qf File Internals
- sendmail, 36.7. Alphabetized Reference
- ORCPT address
: sendmail, 23.9. The qf File Internals
- original envelope ID
: sendmail, 31.10. Alphabetized Reference
- types for
: (see T= equate)
- DTE (data terminal equipment)
: Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
- du command
: Practical UNIX & Internet Security, 25.2.2.1. Disk-full attacks
- dual universes
: Practical UNIX & Internet Security, 5.9.1. Dual Universes
- dual-homed hosts
- Building Internet Firewalls, 7. Proxy Systems
- (see also proxy servers/services)
- architecture of
: Building Internet Firewalls, 4.2.1. Dual-Homed Host Architecture
- with screen subnet architecture
: Building Internet Firewalls, 4.3.8. It's OK to Use
- as firewall
: Building Internet Firewalls, 5.8.2.5. Turning off routing
- nonrouting
: Building Internet Firewalls, 5.2.1. Nonrouting Dual-homed Hosts
- proxy services and
: (see proxy servers/services)
- ducts, air
: Practical UNIX & Internet Security, 12.2.3.2. Entrance through air ducts
- dummy interface
: TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- dump
: TCP/IP Network Administration, 7.7.2. Testing the Configuration
- dump, database
: DNS & BIND, 13.2.2. How to Read a Database Dump
- dump/restore program
- Practical UNIX & Internet Security, 7.1.3. Types of Backups
- Practical UNIX & Internet Security, 7.4.3. Specialized Backup Programs
- Practical UNIX & Internet Security, 7.4.4. Encrypting Your Backups
- dumping macros
: sendmail, 38.3. Dump a Macro
- dumping state
: sendmail, 26.3.3. SIGUSR1 Dump States
- dumpster diving
: Practical UNIX & Internet Security, 12.3.3. Other Media
- DUN (Dial-Up Networking)
- DNS & BIND, 6.4.9. Windows 95
- DNS & BIND, 15.5. Dialup Connections
- Dunlap, Kevin
: DNS & BIND, 1.4. The History of BIND
- duplicate database keys
: sendmail, 33.2.1.1. -d allow duplicate keys
- duplicate entries in alias file
: sendmail, 24.4.4. Duplicate Entries and Automation
- duplicate queries
: DNS & BIND, 7.6.2. Understanding the BIND Statistics
- duress code
: Practical UNIX & Internet Security, 8.7.2. Token Cards
- dust
: Practical UNIX & Internet Security, 12.2.1.3. Dust
- dynamic
- assignment of addresses
- TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- TCP/IP Network Administration, 4.2.1.1. Assigning host addresses
- automatic under DHCP
: TCP/IP Network Administration, 9.5. DHCP
- circumstances favoring
: TCP/IP Network Administration, 4.3. Planning Routing
- packet filtering
- Building Internet Firewalls, 6.3.3.2. UDP
- Building Internet Firewalls, 8.2.1.1. Packet filtering characteristics of
- port allocation
: TCP/IP Network Administration, 2.7.3. Sockets
- routing
- TCP/IP Network Administration, 4.3. Planning Routing
- TCP/IP Network Administration, 7.1. Common Routing Configurations
- dynamic-bootp flag
: TCP/IP Network Administration, D.3.2. Configuration Parameters
- dynamic-bootp-lease-cutoff parameter
: TCP/IP Network Administration, 9.5.1. dhcpd.conf
- dynamic-bootp-lease-length parameter
: TCP/IP Network Administration, 9.5.1. dhcpd.conf
- Dynamic DNS
: TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- Dynamic Host Configuration Protocol
: (see DHCP)
- dynamic update facility
: DNS & BIND, 10.3. DNS Dynamic Update
- Dynamic Update standard
: DNS & BIND, 3.1. Getting BIND
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
O'Reilly & Associates, Inc.
All Rights Reserved.