Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: E
- e class
: sendmail, 32.5. Alphabetized Reference
- E configuration command
: sendmail, 22.2.1. The E Configuration Command
- e flag
- sendmail, 23.6.1. Periodically with -q
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 34.8. Alphabetized Reference
- E flag
: sendmail, 30.8. Alphabetized F= Flags
- E line (host status file)
: sendmail, B.1. Status file lines
- E line (qf file)
: sendmail, 23.9. The qf File Internals
- $e macro
: (see SmtpGreetingMessage option)
- $E macro
: sendmail, 31.10. Alphabetized Reference
- e option
: (see ErrorMode (e) option)
- E option
: (see ErrorHeader (E) option)
- -e switch (sendmail)
: sendmail, 36.7. Alphabetized Reference
- -E switch (sendmail)
: sendmail, 36.7. Alphabetized Reference
- E= equate
: sendmail, 30.4. The Equates
- earthquakes
: Practical UNIX & Internet Security, 12.2.1.4. Earthquake
- eavesdropping
- Practical UNIX & Internet Security, 12.3.1. Eavesdropping
- Practical UNIX & Internet Security, 12.3.1.5. Fiber optic cable
- Practical UNIX & Internet Security, 12.4.1.2. Potential for eavesdropping and data theft
- Practical UNIX & Internet Security, 14.4.4. Protecting Against Eavesdropping
- Practical UNIX & Internet Security, 14.4.4.2. Protection against eavesdropping
- Practical UNIX & Internet Security, 16.3.1. Link-level Security
- IP packets
- Building Internet Firewalls, 10.1.2. Packet Sniffing
- Practical UNIX & Internet Security, 16.3.1. Link-level Security
- Practical UNIX & Internet Security, 17.3.3. TELNET (TCP Port 23)
- through log files
: Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
- on the Web
- Practical UNIX & Internet Security, 18.4. Avoiding the Risks of Eavesdropping
- Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
- X clients
: Practical UNIX & Internet Security, 17.3.21.2. X security
- EBCDIC
: sendmail, 30.8. Alphabetized F= Flags
- ECB (electronic code book)
- Practical UNIX & Internet Security, 6.4.4.2. DES modes
- Practical UNIX & Internet Security, 6.6.2. des: The Data Encryption Standard
- echo command
: Practical UNIX & Internet Security, 23.5. Tips on Using Passwords
- Echo Message
- TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
- TCP/IP Network Administration, 7.2. The Minimal Routing Table
- ECPA (Electronic Communications Privacy Act)
: Practical UNIX & Internet Security, 26.2.3. Federal Computer Crime Laws
- edit FYIs (For Your Information)
: TCP/IP Network Administration, 13.7. Summary
- editing Makefile file
: sendmail, 2.4. Preliminaries
- editing wtmp file
: Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file
- editors
: Practical UNIX & Internet Security, 11.5.2.7. Other initializations
- buffers for
: Practical UNIX & Internet Security, 11.1.4. Trojan Horses
- Emacs
: Practical UNIX & Internet Security, 11.5.2.3. GNU .emacs
- ex
- Practical UNIX & Internet Security, 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve
- Practical UNIX & Internet Security, 11.5.2.4. .exrc
- Practical UNIX & Internet Security, 11.5.2.7. Other initializations
- startup file attacks
: Practical UNIX & Internet Security, 11.5.2.4. .exrc
- vi
- Practical UNIX & Internet Security, 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve
- Practical UNIX & Internet Security, 11.5.2.4. .exrc
- Practical UNIX & Internet Security, 11.5.2.7. Other initializations
- edquota command
: Practical UNIX & Internet Security, 25.2.2.5. Using quotas
- EDS
: Practical UNIX & Internet Security, F.3.4.11. EDS and EDS customers worldwide
- edu domain
- DNS & BIND, 2.2.1. Top-Level Domains
- TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
- EF_DELETE_BCC flag
: sendmail, 23.9. The qf File Internals
- EF_HAS8BIT flag
: sendmail, 23.9. The qf File Internals
- EF_NO_BODY_RETN flag
: sendmail, 20.2.1. Accept Mail Only From Our Domain
- EF_RESPONSE flag
: sendmail, 23.9. The qf File Internals
- EF_WARNING flag
: sendmail, 23.9. The qf File Internals
- effective UIDs/GIDs
- Practical UNIX & Internet Security, 4.3.1. Real and Effective UIDs
- Practical UNIX & Internet Security, 5.5. SUID
- Practical UNIX & Internet Security, 10.1.2.1. su commandutmp and wtmp files andsu
- Practical UNIX & Internet Security, C.1.3.2. Process real and effective UID
- EGP (Exterior Gateway Protocol)
- TCP/IP Network Administration, 2.4. Internet Routing Architecture
- TCP/IP Network Administration, 7.5.1. Exterior Gateway Protocol
- TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- neighbors
: TCP/IP Network Administration, 7.5.1. Exterior Gateway Protocol
- statement (in gated)
: TCP/IP Network Administration, B.8.6. The egp Statement
- EHLO command (SMTP)
- sendmail, 4.2. Verbose (-v)
- sendmail, 34.8. Alphabetized Reference
- TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- TCP/IP Network Administration, 10.8. Testing sendmail.cf
- EightBitMode encoding
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 34.8. Alphabetized Reference
- 8mm video tape
: Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
- electrical fires
- Practical UNIX & Internet Security, 12.2.1.2. Smoke
- (see also fires; smoke and smoking)
- electrical noise
: Practical UNIX & Internet Security, 12.2.1.8. Electrical noise
- electronic breakins
: (see breakins; cracking)
- electronic code book (ECB)
- Practical UNIX & Internet Security, 6.4.4.2. DES modes
- Practical UNIX & Internet Security, 6.6.2. des: The Data Encryption Standard
- Electronic Communications Privacy Act (ECPA)
: Practical UNIX & Internet Security, 26.2.3. Federal Computer Crime Laws
- electronic mail
: (see email)
- electronic sabotage
: (see denial of service)
- ElGamal algorithm
- Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
- Practical UNIX & Internet Security, 6.5.3. Digital Signatures
- elm (mail system)
: Practical UNIX & Internet Security, 11.5.2.5. .forward, .procmailrc
- emacs editor
: Practical UNIX & Internet Security, 11.5.2.7. Other initializations
- .emacs file
: Practical UNIX & Internet Security, 11.5.2.3. GNU .emacs
- email
- DNS & BIND, 5. DNS and Electronic Mail
- Building Internet Firewalls, 2.1. Electronic Mail
- Building Internet Firewalls, 5.6. Selecting Services Provided by the
- Practical UNIX & Internet Security, 11.5.3.3. /usr/lib/aliases, /etc/aliases,
- sendmail, 1. Introduction
- TCP/IP Network Administration, 1.7. Application Layer
- (see also addresses)
- (see also mail, servers)
- (see also sendmail)
- accepted by programs
: Practical UNIX & Internet Security, 17.3.4.1. sendmail and security
- action, in Swatch program
: Practical UNIX & Internet Security, 10.6.2. The Swatch Configuration File
- addresses
: (see addresses)
- administrator's address
: DNS & BIND, 4.2.3. SOA Records
- alias back door
: Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
- aliases
: (see aliases/aliasing)
- Archie access via
: Building Internet Firewalls, 8.7.3.3. Providing Archie service to your
- bombs
: sendmail, 20.2.6. Reject Mail from Spamming or Mail-bombing Sites
- configuring
: Building Internet Firewalls, 8.1. Electronic Mail
- copyrights on
: Practical UNIX & Internet Security, 26.4.2. Copyright Infringement
- delivering
: TCP/IP Network Administration, 1.7. Application Layer
- delivery agents (MTAs)
- Building Internet Firewalls, 8.1. Electronic Mail
- sendmail, 1.1. MUA Versus MTA
- sendmail, 5.3.1. Mail Delivery Agents
- sendmail, 6.2. Define a Mail Delivery Agent
- sendmail, 30. Delivery Agents
- (see also M configuration command)
- $# operator and
- sendmail, 9.2.1. The Delivery Agent ($#)
- sendmail, 28.6.5. Specify a Delivery Agent: $#
- advantages to sendmail
: sendmail, 18.1. To Use or Not to Use
- choosing
- sendmail, 9. Rule Set 0
- sendmail, 9.5. Things to Try
- declaring
: sendmail, 19.3.2. MAILER()
- default
: sendmail, 34.8. Alphabetized Reference
- equates for
: sendmail, 30.4. The Equates
- for errors
: sendmail, 9.4. The error Delivery Agent
- expensive
- sendmail, 23.6.1. Periodically with -q
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 34.8. Alphabetized Reference
- flags
- sendmail, 6.3. The local Delivery Agent
- sendmail, 6.4. Add the Missing Parts to Mhub
- sendmail, 14.2. Headers Versus Delivery Agent Flags
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 35.4. ?flags? in Header Definitions
- ignoring MX records
: sendmail, 21.3.5. What? They Ignore MX Records?
- local
- sendmail, 6.3. The local Delivery Agent
- sendmail, 19.6. Alphabetized m4 Macros
- logging
: sendmail, 26.1.3.4. mailer= the delivery agent used
- printing list of
: sendmail, 38.4.2. Show Delivery Agents with =M
- as recipients
: sendmail, 30.8. Alphabetized F= Flags
- scripts via
: sendmail, 24.3. Write a Delivery Agent Script
- statistics
: (see statistics)
- symbolic name
: sendmail, 30.2. The Symbolic Name
- testing
: sendmail, 38.5.6. Try a Delivery Agent with /try
- UUCP
: sendmail, 19.4.6. UUCP
- DNS and
: DNS & BIND, 6.3.2. Electronic Mail
- Electronic Communications Privacy Act (ECPA)
: Practical UNIX & Internet Security, 26.2.3. Federal Computer Crime Laws
- ESMTP (Extended SMTP)
- sendmail, 4.2. Verbose (-v)
- sendmail, 23.9. The qf File Internals
- sendmail, 30.8. Alphabetized F= Flags
- TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- TCP/IP Network Administration, 10.8. Testing sendmail.cf
- BODY parameter (ESMTP)
- sendmail, 31.10. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- private extensions to
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- file transfers
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- firewalls
: Practical UNIX & Internet Security, 21.4.2. Electronic Mail
- flooding
: Building Internet Firewalls, 1.2.1.2. Denial of Service
- forwarding (UUCP)
: Practical UNIX & Internet Security, 15.6.1. Mail Forwarding for UUCP
- gateway
: TCP/IP Network Administration, 4.5.3. Planning Your Mail System
- growing importance of
: TCP/IP Network Administration, 9.7.2. IMAP Server
- harassment via
: Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
- logging
: Practical UNIX & Internet Security, 10.4.2. Mail
- mail exchangers
- DNS & BIND, 5.1. MX Records
- DNS & BIND, 5.2. What's a Mail Exchanger, Again?
- mailing lists, firewalls resources via
: Building Internet Firewalls, A.3. Mailing Lists
- messages
- sendmail, 34.8. Alphabetized Reference
- TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
- TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
- assigning priority to
: TCP/IP Network Administration, 10.5.6. Defining Mail Precedence
- blank lines ending
: sendmail, 30.8. Alphabetized F= Flags
- body of
- sendmail, 1.6. The Body
- sendmail, 23.2.2. The Data (Message Body) File: df
- (see also -B switch (sendmail))
- bouncing
- sendmail, 10.3. Missing Addresses
- sendmail, 13.2.2. Limit the Life of Queued Messages
- sendmail, 14.4. Precedence
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 22.8.3.4. The PostmasterCopy option
- sendmail, 23.3.6. Savemail Panic
- sendmail, 23.7.1. Handling a Down Site
- sendmail, 24.4.1. The Postmaster Alias
- sendmail, 25.5.1. Reply Versus Bounce
- sendmail, 25.5.3. A list-bounced Alias
- sendmail, 34.8. Alphabetized Reference
- sendmail, 35.10. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- (see also $n macro)
- content type
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- converting between 7- and 8-bit
: sendmail, 18.8. Alphabetized Reference
- delivering
: (see delivery)
- encapsulated
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- envelope
: (see envelope)
- error
: (see errors)
- flooding
: Practical UNIX & Internet Security, 25.3.2. Message Flooding
- forged
: sendmail, 22.7. Forged Mail
- forwarding
: sendmail, 35.7. Forwarding with Resent-Headers
- forwarding loops
: sendmail, 25.7.2. Forwarding Loops
- headers for
: (see headers, message)
- holding
: (see queue)
- hop count
: (see hop count)
- hub's acceptance of
: sendmail, 15.4. Hub Accepts Mail for Client
- leading dots in
: sendmail, 34.8. Alphabetized Reference
- limiting size of
: sendmail, 20.2.3. Limit the Size of Guest Messages
- multipart subtype
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- multiple objects in single
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- origin date of
: (see $a macro)
- priority of
- sendmail, 14.4. Precedence
- (see priority, message)
- processing limits on
: sendmail, 23.5. How the Queue Is Processed
- queue
- sendmail, 1.3.2. The Queue
- sendmail, 4.1.2. Show Queue Mode (-bp)
- sendmail, 13.2.2. Limit the Life of Queued Messages
- sendmail, 23. The Queue
- sendmail, 23.2. Parts of a Queued Message
- sendmail, 23.2.3.2. Locks shown when printing the queue
- sendmail, 23.4. Printing the Queue
- sendmail, 23.5. How the Queue Is Processed
- sendmail, 23.7.1. Handling a Down Site
- sendmail, 23.8. Pitfalls
- sendmail, 23.9. The qf File Internals
- sendmail, 25.7.6. Force Requeue on Error
- sendmail, 34.6.2. The Queue
- sendmail, 34.8. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- rejecting
- sendmail, 18.8. Alphabetized Reference
- sendmail, 20.2.6. Reject Mail from Spamming or Mail-bombing Sites
- relays for
: sendmail, 19.4.5. Relays
- sending
- sendmail, 13.4. Sending Mail
- sendmail, 14.5. Sending Real Mail
- size of
- sendmail, 26.1.3.10. size= the size of the message
- sendmail, 30.4. The Equates
- sendmail, 34.8. Alphabetized Reference
- stored in queue in error
: sendmail, 23.9. The qf File Internals
- time placed in queue
: sendmail, 23.9. The qf File Internals
- unique identifier for
- sendmail, 13.4. Sending Mail
- sendmail, 14.2.3. The Message-ID: Header
- sendmail, 26.1.3.5. msgid= the Message-ID: identifier
- MX records
: DNS & BIND, 5.1. MX Records
- phantom, monitoring
: Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
- processing addresses
: TCP/IP Network Administration, 10.6.3. The Set Ruleset Command
- queue
- sendmail, 1.3.2. The Queue
- sendmail, 23. The Queue
- checkpointing
: sendmail, 34.8. Alphabetized Reference
- down sites and
: sendmail, 23.7.1. Handling a Down Site
- lifetime
- sendmail, 13.2.2. Limit the Life of Queued Messages
- sendmail, 34.8. Alphabetized Reference
- message life
: sendmail, 13.2.2. Limit the Life of Queued Messages
- message parts
: sendmail, 23.2. Parts of a Queued Message
- printing
- sendmail, 4.1.2. Show Queue Mode (-bp)
- sendmail, 23.2.3.2. Locks shown when printing the queue
- sendmail, 23.4. Printing the Queue
- sendmail, 36.7. Alphabetized Reference
- processing
- sendmail, 23.5. How the Queue Is Processed
- sendmail, 23.9. The qf File Internals
- sendmail, 36.7. Alphabetized Reference
- putting everything in
: sendmail, 34.8. Alphabetized Reference
- requeuing on error
: sendmail, 25.7.6. Force Requeue on Error
- sendmail options for
: sendmail, 34.6.2. The Queue
- sorting
: sendmail, 34.8. Alphabetized Reference
- time message placed in
: sendmail, 23.9. The qf File Internals
- troubleshooting
: sendmail, 23.8. Pitfalls
- why message is stored in
: sendmail, 23.9. The qf File Internals
- receiving by sendmail
: Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
- relay
: TCP/IP Network Administration, 4.5.3. Planning Your Mail System
- for RFCs
: TCP/IP Network Administration, 13.4.1. Retrieving RFCs by mail
- routing loops
: DNS & BIND, 5.3. The MX Algorithm
- sending via CGI scripts
: Practical UNIX & Internet Security, 18.2.3.3. Sending mail
- sendmail
- Building Internet Firewalls, 2.1. Electronic Mail
- (see also sendmail)
- sent directly to file
: Practical UNIX & Internet Security, 15.7. Early Security Problems with UUCP
- servers
- TCP/IP Network Administration, 3.4. Mail Services
- TCP/IP Network Administration, 4.5.3. Planning Your Mail System
- interoperability and
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- simplified addresses
: TCP/IP Network Administration, 10.5.3. The Define Class Command
- SMTP (Simple Mail Transfer Protocol)
- Building Internet Firewalls, 2.1. Electronic Mail
- Building Internet Firewalls, 5.6. Selecting Services Provided by the
- Building Internet Firewalls, 7.5. Proxying Without a Proxy Server
- Building Internet Firewalls, 8.1.1. Simple Mail Transfer Protocol
- Practical UNIX & Internet Security, 17.3.4. Simple Mail Transfer Protocol (SMTP) (TCP Port 25)
- Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
- sendmail, 4.2. Verbose (-v)
- sendmail, 18.8. Alphabetized Reference
- TCP/IP Network Administration, 1.7. Application Layer
- TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
- commands, listed
: TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
- configuring
- Building Internet Firewalls, 8.1.1.6. Configuring SMTP to
- Building Internet Firewalls, 9.1.1.3. SMTP
- Building Internet Firewalls, 9.2.1.3. SMTP
- EHLO command
- sendmail, 4.2. Verbose (-v)
- sendmail, 34.8. Alphabetized Reference
- ETRN command
: sendmail, 23.6.2.4. Process the queue via ESMTP ETRN
- EXPN command
- sendmail, 22.3.2. SMTP vrfy and expn
- sendmail, 22.8.3.5. The PrivacyOptions option
- Extended
: (see ESMTP)
- forging mail with
: sendmail, 22.7.2. Forging with SMTP
- greeting message
: sendmail, 31.10. Alphabetized Reference
- HELO command
- sendmail, 18.8. Alphabetized Reference
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 34.8. Alphabetized Reference
- incoming connection rate
: sendmail, 34.8. Alphabetized Reference
- MAIL command
- sendmail, 29.10.1. The check_mail Rule Set
- sendmail, 34.8. Alphabetized Reference
- multiple connections
: sendmail, 34.8. Alphabetized Reference
- multiple timeouts
: sendmail, 34.8. Alphabetized Reference
- RCPT command
- sendmail, 23.9. The qf File Internals
- sendmail, 29.10.2. The check_rcpt Rule Set
- sendmail, 36.7. Alphabetized Reference
- refusing on high load
: sendmail, 34.8. Alphabetized Reference
- running on stdin
: sendmail, 36.7. Alphabetized Reference
- sendmail and
: TCP/IP Network Administration, 10.1. sendmail's Function
- service extensions to
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- SMTP probes
: sendmail, 22.3. SMTP Probes
- standardizing on
: TCP/IP Network Administration, 4.5.3. Planning Your Mail System
- status codes
: sendmail, B.1. Status file lines
- for UNIX
: (see Sendmail)
- VRFY command
- sendmail, 22.3.2. SMTP vrfy and expn
- sendmail, 22.8.3.5. The PrivacyOptions option
- sendmail, 30.8. Alphabetized F= Flags
- startup file attacks
: Practical UNIX & Internet Security, 11.5.2.5. .forward, .procmailrc
- tracing intruders
: Building Internet Firewalls, 13.3. Pursuing and Capturing the
- transport agents (MTAs)
: (see delivery agents)
- user agents
: (see MUAs)
- from within firewalls
: DNS & BIND, 15.4.4.7. Mail from internal hosts to the Internet
- embedded commands
: (see commands)
- embezzlers
: Practical UNIX & Internet Security, 11.3. Authors
- emergencies
: (see disasters and disaster recovery)
- emergency response organizations
: (see response teams)
- employees
- Practical UNIX & Internet Security, 11.3. Authors
- Practical UNIX & Internet Security, 13. Personnel Security
- Practical UNIX & Internet Security, 13.3. Outsiders
- departure of
: Practical UNIX & Internet Security, 13.2.6. Departure
- phonebook of
: Practical UNIX & Internet Security, 12.3.3. Other Media
- security checklist for
: Practical UNIX & Internet Security, A.1.1.12. Chapter 13: Personnel Security
- targeted in legal investigation
: Practical UNIX & Internet Security, 26.2.5. If You or One of Your Employees Is a Target
- trusting
: Practical UNIX & Internet Security, 27.3.1. Your Employees?
- written authorization for
: Practical UNIX & Internet Security, 26.2.6. Other Tips
- empty
- email addresses
- sendmail, 10.3. Missing Addresses
- sendmail, 17.1.1.3. Handle null address
- sendmail, 30.8. Alphabetized F= Flags
- sendmail.cf file
: sendmail, 5.2. The Minimal File
- encapsulation
- Building Internet Firewalls, 6.3. What Does a Packet Look Like?
- Building Internet Firewalls, C.3. TCP/IP Protocol Architecture
- TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
- of datagrams
: TCP/IP Network Administration, 1.4. Network Access Layer
- of mail messages
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- encoding
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 32.5. Alphabetized Reference
- data
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- text
- TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- TCP/IP Network Administration, 12.6. Encryption
- "Encrypted:" header line
: sendmail, 35.10. Alphabetized Reference
- encryption
- Practical UNIX & Internet Security, 6.2. What Is Encryption?
- Practical UNIX & Internet Security, 6.2.2. The Elements of Encryption
- Practical UNIX & Internet Security, 12.2.6.2. Encryption
- Practical UNIX & Internet Security, 17.4. Security Implications of Network Services
- TCP/IP Network Administration, 4.2.1. Obtaining an IP Address
- TCP/IP Network Administration, 6.3.4. PPP Daemon Security
- TCP/IP Network Administration, 12.6. Encryption
- (see also cryptography)
- algorithms
- Practical UNIX & Internet Security, 2.5. The Problem with Security Through Obscurity
- Practical UNIX & Internet Security, 6.4.8. Proprietary Encryption Systems
- Practical UNIX & Internet Security, 6.6. Encryption Programs Available for UNIX
- Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
- crypt
- Practical UNIX & Internet Security, 6.6.1. UNIX crypt: The Original UNIX Encryption Command
- Practical UNIX & Internet Security, 6.6.1.3. Example
- Digital Signature Algorithm
- Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
- Practical UNIX & Internet Security, 6.5.3. Digital Signatures
- ElGamal
: Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
- IDEA
: Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- RC2, RC4, and RC5
- Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- Practical UNIX & Internet Security, 6.4.8. Proprietary Encryption Systems
- ROT13
: Practical UNIX & Internet Security, 6.4.3. ROT13: Great for Encoding Offensive Jokes
- RSA
- Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
- Practical UNIX & Internet Security, 6.4.6. RSA and Public Key Cryptography
- Practical UNIX & Internet Security, 6.4.6.3. Strength of RSA
- application-level
- Building Internet Firewalls, 10.5.1. At What Level Do You Encrypt?
- Practical UNIX & Internet Security, 16.3.1. Link-level Security
- of backups
- Practical UNIX & Internet Security, 7.1.6.3. Data security for backups
- Practical UNIX & Internet Security, 7.4.4. Encrypting Your Backups
- Practical UNIX & Internet Security, 12.3.2.4. Backup encryption
- checklist for
: Practical UNIX & Internet Security, A.1.1.5. Chapter 6: Cryptography
- Data Encryption Standard (DES)
- Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- Practical UNIX & Internet Security, 6.4.4. DES
- Practical UNIX & Internet Security, 6.4.5.2. Triple DES
- Practical UNIX & Internet Security, 6.6.2. des: The Data Encryption Standard
- DCE and
: Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
- Diffie-Hellman
: (see Diffie-Hellman key exchange system)
- end-to-end
: Practical UNIX & Internet Security, 16.3.1. Link-level Security
- Enigma system
- Practical UNIX & Internet Security, 6.3. The Enigma Encryption System
- Practical UNIX & Internet Security, 6.6.1.1. The crypt program
- (see also crypt command/algorithm)
- escrowing keys
- Practical UNIX & Internet Security, 6.1.3. Modern Controversy
- Practical UNIX & Internet Security, 7.1.6.3. Data security for backups
- of executables
: Building Internet Firewalls, 5.8.2.2. How to disable services
- exporting software
: Practical UNIX & Internet Security, 26.4.1. Munitions Export
- of hypertext links
: Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire
- key distribution
: Building Internet Firewalls, 10.5.4. Key Distribution
- laws about
- Practical UNIX & Internet Security, 6.7. Encryption and U.S. Law
- Practical UNIX & Internet Security, 6.7.2. Cryptography and Export Controls
- link-level
: Practical UNIX & Internet Security, 16.3.1. Link-level Security
- of modems
: Practical UNIX & Internet Security, 14.6. Additional Security for Modems
- multipart subtype
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- Netscape Navigator system
: Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire
- with network services
: Practical UNIX & Internet Security, 17.4. Security Implications of Network Services
- network-level
: Building Internet Firewalls, 10.5. Network-Level Encryption
- one-time pad mechanism
: Practical UNIX & Internet Security, 6.4.7. An Unbreakable Encryption Algorithm
- packet filtering perimeter and
: Building Internet Firewalls, 10.5.3. Where Do You Encrypt?
- of passwords
- Practical UNIX & Internet Security, 8.6. The UNIX Encrypted Password System
- Practical UNIX & Internet Security, 8.6.4. Crypt16() and Other Algorithms
- Practical UNIX & Internet Security, 23.5. Tips on Using Passwords
- PGP
: (see PGP)
- private-key
- Practical UNIX & Internet Security, 6.4. Common Cryptographic Algorithms
- Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- TCP/IP Network Administration, 12.6. Encryption
- public-key
- Building Internet Firewalls, 10. Authentication and Inbound
- Practical UNIX & Internet Security, 6.4. Common Cryptographic Algorithms
- Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
- Practical UNIX & Internet Security, 6.4.6. RSA and Public Key Cryptography
- Practical UNIX & Internet Security, 6.4.6.3. Strength of RSA
- Practical UNIX & Internet Security, 6.5.3. Digital Signatures
- Practical UNIX & Internet Security, 18.3. Controlling Access to Files on Your Server
- Practical UNIX & Internet Security, 18.6. Dependence on Third Parties
- TCP/IP Network Administration, 12.6. Encryption
- breaking
: Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
- PGP
: Practical UNIX & Internet Security, 6.6.3.2. Creating your PGP public key
- proving identity with
: Practical UNIX & Internet Security, 19.3.1.1. Proving your identity
- RC4 and RC5 algorithms
: Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- references on
: Practical UNIX & Internet Security, D.1.5. Cryptography Books
- Skipjack algorithm
: Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- superencryption
: Practical UNIX & Internet Security, 6.4.5. Improving the Security of DES
- and superusers
: Practical UNIX & Internet Security, 6.2.4. Why Use Encryption with UNIX?
- of time-stamp
: Building Internet Firewalls, 10.2.2. Something You Know
- uses for
: TCP/IP Network Administration, 12.6. Encryption
- of Web information
: Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire
- end systems
: (see hosts)
- end-of-line string
: sendmail, 30.4. The Equates
- end-to-end
- data encryption
- Practical UNIX & Internet Security, 16.3.1. Link-level Security
- TCP/IP Network Administration, 12.6. Encryption
- routes
- TCP/IP Network Administration, 2.5. The Routing Table
- TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
- TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
- TCP/IP Network Administration, B.10. Control Statements
- Energy Sciences Network (ESnet)
: Practical UNIX & Internet Security, F.3.4.43. U.S. Department of Energy
- Enigma encryption system
- Practical UNIX & Internet Security, 6.3. The Enigma Encryption System
- Practical UNIX & Internet Security, 6.6.1.1. The crypt program
- enriched text subtype
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- enterprise
- networks
- Practical UNIX & Internet Security, 16.1. Networking
- TCP/IP Network Administration, 4.1. Connected and Non-Connected Networks
- subnets
: TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- enterpriseSpecific trap
: TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- ENVDEF= directive
: sendmail, 18.4.2. ENVDEF=
- envelope
- sendmail, 1.7. The Envelope
- sendmail, 8.2. Why Rules?
- DSN ENVID identifier
- sendmail, 23.9. The qf File Internals
- sendmail, 36.7. Alphabetized Reference
- logging sender of
: sendmail, 26.1.3.3. from= show envelope sender
- masquerading
: sendmail, 19.6. Alphabetized m4 Macros
- original DSN
: sendmail, 31.10. Alphabetized Reference
- rewriting address of
: sendmail, 29.3.1. V8 Enhancements
- specifying recipient's address
: sendmail, 29.10.2. The check_rcpt Rule Set
- UDB rewrite on
: sendmail, 30.8. Alphabetized F= Flags
- ENVELOPE *e structure
: sendmail, 20.1.1. Arguments Passed to checkcompat()
- ${envid} macro
: sendmail, 31.10. Alphabetized Reference
- environment variables
- Practical UNIX & Internet Security, 11.5.2.7. Other initializations
- Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- sendmail, 5.3.12. Environment variables
- sendmail, 22.2. The Environment
- sendmail, 36.4.2.1. Initialize the environment
- E configuration command
: sendmail, 22.2.1. The E Configuration Command
- environment, physical
- Practical UNIX & Internet Security, 12.2.1. The Environment
- Practical UNIX & Internet Security, 12.2.1.13. Environmental monitoring
- equal-cost multi-path routing
: TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- equates
- sendmail, 30.4. The Equates
- (see also under specific equate)
- equivalent hosts
: TCP/IP Network Administration, 12.2.5. Secure the r Commands
- erasing disks
: Practical UNIX & Internet Security, 12.3.2.3. Sanitize your media before disposal
- erotica, laws governing
: Practical UNIX & Internet Security, 26.4.5. Pornography and Indecent Material
- ERRLIST_PREDEFINED macro
: sendmail, 18.8. Alphabetized Reference
- errno variable
: Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- errno.h file
: sendmail, B.1. Status file lines
- error messages
- ErrorHeader (E) option
: sendmail, 34.8. Alphabetized Reference
- ErrorMode (e) option
- sendmail, 34.1.3. Appropriateness of Options
- sendmail, 34.8. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- errors
- DNS & BIND, 4.7.2. Check for Syslog Errors
- Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
- sendmail, 26.1. Logging with syslog
- sendmail, 36.5.5. EX_OSERR A System Resource Error
- (see also exit signal)
- (see also logs/logging)
- in ACLs
: Practical UNIX & Internet Security, 5.2.5.1. AIX Access Control Lists
- addressing
: sendmail, 8.2. Why Rules?
- bogus name servers
: DNS & BIND, 10.10. Avoiding a Bogus Name Server
- building with m4
: sendmail, 19.2. Build with m4
- common syslog messages
: DNS & BIND, 7.6.1. Common Syslog Messages
- configuration
: Practical UNIX & Internet Security, 9.1. Prevention
- correction, not provided in SLIP
: TCP/IP Network Administration, 6.2.1. The Serial Protocols
- delivery agent for
- sendmail, 9.4. The error Delivery Agent
- sendmail, 30.5.2. The error Delivery Agent
- delivery failure count
: sendmail, 23.9. The qf File Internals
- detection
- TCP/IP Network Administration, 1.5.1. Internet Protocol
- TCP/IP Network Administration, 11.8. Protocol Case Study
- end-to-end
: TCP/IP Network Administration, 1.6. Transport Layer
- disasters
: DNS & BIND, 8.5. Planning for Disasters
- DNS error numbers
: sendmail, B.1. Status file lines
- error message header
: sendmail, 34.8. Alphabetized Reference
- herror routine
: DNS & BIND, 14.2.4. The Resolver Library Routines
- human
- Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
- TCP/IP Network Administration, 11.1.1. Troubleshooting Hints
- ICMP codes for
: Building Internet Firewalls, 6.4.2. Returning ICMP
- illegal command-line switches
: sendmail, 36.7. Alphabetized Reference
- invalid owner name
: DNS & BIND, 7.6.1. Common Syslog Messages
- List:; form addresses
- sendmail, 17.1.2.1. A rule to handle List:;
- sendmail, 17.3. Rule Set 0
- MIME format
: sendmail, 34.8. Alphabetized Reference
- mutual data infection
: DNS & BIND, 13.6.8.3. Mutual infection
- name server
: DNS & BIND, 6.1.4.1. One name server configured
- overwriting rule sets
: sendmail, 8.4. Rules
- rcodes for
: DNS & BIND, 11.6.1. Seeing the Query and Response Packets
- recovery from
: TCP/IP Network Administration, 1.5.1. Internet Protocol
- requeuing in response to
: sendmail, 25.7.6. Force Requeue on Error
- in resolv.conf file
: DNS & BIND, 13.3.11. 11. Syntax Error in resolv.conf
- rule set 0 for
: sendmail, 17.3. Rule Set 0
- on sending errors
: sendmail, 34.8. Alphabetized Reference
- in sendmail.cf file
: sendmail, 5.1. Overview
- statistics for
: DNS & BIND, 7.6.2. Understanding the BIND Statistics
- subdomain delegation
: DNS & BIND, 13.3.10. 10. Incorrect Subdomain Delegation
- suppressing messages
: sendmail, 12.2. The File Form of Class
- syntax errors
- DNS & BIND, 4.7.2. Check for Syslog Errors
- DNS & BIND, 13.3.5. 5. Syntax Error in the Conf File or DNS Database File
- temporary
: sendmail, 36.5.8. EX_TEMPFAIL A Recoverable Error
- UNIX error number
: sendmail, B.1. Status file lines
- unspecified (nslookup)
: DNS & BIND, 11.7.7. Unspecified Error
- "Errors-To:" header line
- sendmail, 34.8. Alphabetized Reference
- sendmail, 35.10. Alphabetized Reference
- escape characters
- Practical UNIX & Internet Security, 14.5.3.1. Originate testing
- sendmail, 35.3.2. Escape Character in the Header Field
- escrowing encryption keys
- Practical UNIX & Internet Security, 6.1.3. Modern Controversy
- Practical UNIX & Internet Security, 7.1.6.3. Data security for backups
- ESMTP (Extended SMTP)
- sendmail, 4.2. Verbose (-v)
- sendmail, 23.9. The qf File Internals
- sendmail, 30.8. Alphabetized F= Flags
- TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- TCP/IP Network Administration, 10.8. Testing sendmail.cf
- BODY parameter (ESMTP)
- sendmail, 31.10. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- private extensions to
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- ESnet (Energy Sciences Network)
: Practical UNIX & Internet Security, F.3.4.43. U.S. Department of Energy
- espionage
- Building Internet Firewalls, 1.2.2.4. Spies (Industrial and
- Practical UNIX & Internet Security, 11.3. Authors
- ESTABLISHED state
: TCP/IP Network Administration, B.8.5. The bgp Statement
- /etc directory
- Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
- Practical UNIX & Internet Security, 11.5.3.5. System initialization files
- /etc/aliases file
- Practical UNIX & Internet Security, 11.5.3.3. /usr/lib/aliases, /etc/aliases,
- sendmail, 3.1.1. The Aliases File
- sendmail, 22.6. The Aliases File
- sendmail, 24.1. The aliases(5) File
- sendmail, 24.5. The Aliases Database
- sendmail, 33.3.4.1. -A append values for duplicate keys (V8.7 and above)
- sendmail, 33.8. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
- TCP/IP Network Administration, 9.3. Network Information Service
- in symbol table
- sendmail, 24.5.4. No DBM Aliasing
- sendmail, 33.8. Alphabetized Reference
- /etc/aspppd.cf file
: TCP/IP Network Administration, 6.3.6. Solaris PPP
- /etc/auto_direct file
: TCP/IP Network Administration, 9.1.4. NFS Automounter
- /etc/auto_home file
: TCP/IP Network Administration, 9.1.4. NFS Automounter
- /etc/auto_master file
: TCP/IP Network Administration, 9.1.4. NFS Automounter
- /etc/bootptab file
- TCP/IP Network Administration, 9.4. A BOOTP Server
- TCP/IP Network Administration, 9.6.1. rdist
- configuration parameters
: TCP/IP Network Administration, 9.4.2. BOOTP extensions
- updating
: TCP/IP Network Administration, 9.4.2. BOOTP extensions
- /etc/default/passwd file
: TCP/IP Network Administration, 12.2.1. The Shadow Password File
- /etc/defaultdomain file
: TCP/IP Network Administration, 9.3. Network Information Service
- /etc/defaultrouter file
: DNS & BIND, 8.5.2. Recommendations
- /etc/dfs/dfstab file
- TCP/IP Network Administration, 9.1.2.1. The share command
- TCP/IP Network Administration, 9.1.5.1. NFS print services
- /etc/dhcpd.conf file
: TCP/IP Network Administration, 9.5.1. dhcpd.conf
- /etc/diphosts file
: TCP/IP Network Administration, 6.4.3. SLIP Server Configuration
- /etc/ethers file
- TCP/IP Network Administration, 3.5.1. Reverse Address Resolution Protocol
- TCP/IP Network Administration, 9.3. Network Information Service
- TCP/IP Network Administration, 11.4.2.1. ARP problem case study
- /etc/exports file
- Practical UNIX & Internet Security, 11.6.1.2. Writable system files and directories
- Practical UNIX & Internet Security, 19.3.2.4. Using Secure NFS
- Practical UNIX & Internet Security, 20.2.1.1. /etc/exports
- Practical UNIX & Internet Security, 20.2.1.2. /usr/etc/exportfs
- TCP/IP Network Administration, 9.1.5.1. NFS print services
- /etc/fstab file
- Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
- Practical UNIX & Internet Security, 19.3.2.5. Mounting a secure filesystem
- TCP/IP Network Administration, 9.1.3.2. The vfstab and fstab files
- /etc/gated.conf file
- TCP/IP Network Administration, 7.6. Gateway Routing Daemon
- TCP/IP Network Administration, 7.7.1.1. A host configuration
- TCP/IP Network Administration, 7.7.2.1. Running gated at startup
- /etc/gateways file
- TCP/IP Network Administration, 7.3.1.1. Installing static routes at startup
- TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
- /etc/group file
- Practical UNIX & Internet Security, 1.2. What Is an Operating System?
- Practical UNIX & Internet Security, 4.1.3.1. The /etc/group file
- Practical UNIX & Internet Security, 4.2.3. Impact of the /etc/passwd and /etc/group
- Practical UNIX & Internet Security, 8.1.6. Group Accounts
- TCP/IP Network Administration, 9.3. Network Information Service
- TCP/IP Network Administration, 13.2.1. Creating an FTP Server
- /etc/hosts file
- Practical UNIX & Internet Security, 16.2.3.1. The /etc/hosts file
- sendmail, 7.3.1. The hostname
- sendmail, 18.8. Alphabetized Reference
- sendmail, 34.8. Alphabetized Reference
- TCP/IP Network Administration, 3.2. The Host Table
- TCP/IP Network Administration, 6.1. The ifconfig Command
- TCP/IP Network Administration, 7.3. Building a Static Routing Table
- TCP/IP Network Administration, 9.1.4. NFS Automounter
- TCP/IP Network Administration, 9.3. Network Information Service
- creating
: TCP/IP Network Administration, 3.2. The Host Table
- as maps
: TCP/IP Network Administration, 3.3.5. Network Information Service
- modifying
: TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
- /etc/hosts.allow file
: TCP/IP Network Administration, 12.5.1.1. tcpd access control files
- /etc/hosts.deny file
- Building Internet Firewalls, 5.8.3.1. Using the TCP Wrapper package to protect services
- TCP/IP Network Administration, 12.5.1.1. tcpd access control files
- /etc/hosts.equiv file
- Practical UNIX & Internet Security, 17.3.18.4. The ~/.rhosts file
- Practical UNIX & Internet Security, 17.3.18.6. /etc/hosts.lpd file
- Practical UNIX & Internet Security, 24.4.1.5. Changes to the hosts.equiv file
- TCP/IP Network Administration, 12.2.5. Secure the r Commands
- in security checks
: TCP/IP Network Administration, 12.4.2. Looking for Trouble
- /etc/hosts.lpd file
- Practical UNIX & Internet Security, 17.3.18.6. /etc/hosts.lpd file
- TCP/IP Network Administration, 9.2.1.1. LPD security
- in security checks
: TCP/IP Network Administration, 12.4.2. Looking for Trouble
- /etc/inetd.conf file
- Practical UNIX & Internet Security, 11.5.3.2. inetd.conf
- Practical UNIX & Internet Security, 17.3. Primary UNIX Network Services
- TCP/IP Network Administration, 5.4. The Internet Daemon
- TCP/IP Network Administration, 9.4. A BOOTP Server
- editing in tcpd
: TCP/IP Network Administration, 12.5.1. wrapper
- removing daemons from
: TCP/IP Network Administration, 12.3.1. Remove Unnecessary Software
- in security checks
: TCP/IP Network Administration, 12.4.2. Looking for Trouble
- /etc/init.d directory
: TCP/IP Network Administration, 9.1.1. NFS Daemons
- autofs script
: TCP/IP Network Administration, 9.1.4. NFS Automounter
- inetinit script
: TCP/IP Network Administration, 7.3.1.1. Installing static routes at startup
- sendmail script
: TCP/IP Network Administration, 10.2. Running sendmail as a Daemon
- /etc/lp directory
: TCP/IP Network Administration, 9.2.2. Solaris Line Printer Service
- /etc/lp/Systems file
: TCP/IP Network Administration, 9.2.2. Solaris Line Printer Service
- /etc/named.boot file
- Practical UNIX & Internet Security, 17.3.6.1. DNS zone transfers
- Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
- TCP/IP Network Administration, 8.3.1. The named.boot File
- TCP/IP Network Administration, 11.6.3. Cache corruption
- TCP/IP Network Administration, C.1. The named Command
- TCP/IP Network Administration, C.2. named.boot Configuration Commands
- /etc/named.ca file
: TCP/IP Network Administration, 11.6.3. Cache corruption
- /etc/named.hosts file
: TCP/IP Network Administration, 8.3.6. The named.hosts File
- /etc/named.local file
: TCP/IP Network Administration, 8.3.4. The named.local File
- /etc/named.pid file
: TCP/IP Network Administration, 11.6.3. Cache corruption
- /etc/named.rev file
: TCP/IP Network Administration, 8.3.5. The Reverse Domain File
- /etc/networks file
- TCP/IP Network Administration, 3.2. The Host Table
- TCP/IP Network Administration, 6.1.3. Assigning a Subnet Mask
- TCP/IP Network Administration, 7.3. Building a Static Routing Table
- TCP/IP Network Administration, 9.3. Network Information Service
- as maps
: TCP/IP Network Administration, 3.3.5. Network Information Service
- /etc/passwd file
- Practical UNIX & Internet Security, 1.2. What Is an Operating System?
- Practical UNIX & Internet Security, 3.2.1. The /etc/passwd File
- Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
- Practical UNIX & Internet Security, 4.2.3. Impact of the /etc/passwd and /etc/group
- Practical UNIX & Internet Security, 7.1.2. What Should You Back Up?
- Practical UNIX & Internet Security, 8.1.1. Accounts Without Passwords
- Practical UNIX & Internet Security, 8.6. The UNIX Encrypted Password System
- Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work
- Practical UNIX & Internet Security, 24.4.1. New Accounts
- Practical UNIX & Internet Security, C.5.1. Process #1: /etc/init
- sendmail, 30.8. Alphabetized F= Flags
- TCP/IP Network Administration, 6.3.5. PPP Server Configuration
- TCP/IP Network Administration, 6.4.3. SLIP Server Configuration
- TCP/IP Network Administration, 9.1.5. NFS Authentication Server
- TCP/IP Network Administration, 9.3. Network Information Service
- TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros
- TCP/IP Network Administration, 12.2.1. The Shadow Password File
- TCP/IP Network Administration, 13.2.1. Creating an FTP Server
- + in
: (see NIS)
- accounts without passwords
: Practical UNIX & Internet Security, 8.1.1. Accounts Without Passwords
- backing up
: Practical UNIX & Internet Security, 7.1.2. What Should You Back Up?
- gecos field
: sendmail, 14.2.1. The Full-Name: Header
- mail hubs and
: sendmail, 6. The Mail Hub and Delivery Agents
- new accounts
: Practical UNIX & Internet Security, 24.4.1. New Accounts
- NFS
: Practical UNIX & Internet Security, 20.2.1.1. /etc/exports
- protecting
: TCP/IP Network Administration, 12.2. User Authentication
- in security checks
: TCP/IP Network Administration, 12.4.2. Looking for Trouble
- trusted users and
: sendmail, 14.6. Trusted User
- user database class for
: sendmail, 33.8. Alphabetized Reference
- uucp user and
: Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work
- /etc/pcnfsd.conf file
: TCP/IP Network Administration, 9.1.5.1. NFS print services
- /etc/ppp directory, protecting
: TCP/IP Network Administration, A.2. The PPP Daemon
- /etc/ppp/options file
- TCP/IP Network Administration, 6.3.1. The PPP Daemon
- TCP/IP Network Administration, 6.3.2. Dial-Up PPP
- TCP/IP Network Administration, A.2. The PPP Daemon
- /etc/ppp/options.device file
: TCP/IP Network Administration, A.2. The PPP Daemon
- /etc/printcap file
: TCP/IP Network Administration, 9.2.1. The printcap File
- /etc/protocols file
- TCP/IP Network Administration, 2.7.1. Protocol Numbers
- TCP/IP Network Administration, 5.4. The Internet Daemon
- TCP/IP Network Administration, 9.3. Network Information Service
- /etc/renice command
- Practical UNIX & Internet Security, 25.2.1.2. System overload attacks
- Practical UNIX & Internet Security, C.1.3.3. Process priority and niceness
- /etc/resolv.conf file
- TCP/IP Network Administration, 8.1.1. BIND Configurations
- TCP/IP Network Administration, 8.2. Configuring the Resolver
- TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
- TCP/IP Network Administration, 11.6.4. dig: An Alternative to nslookup
- /etc/services file
- Practical UNIX & Internet Security, 17.1.1. The /etc/services File
- TCP/IP Network Administration, 5.4. The Internet Daemon
- TCP/IP Network Administration, 9.3. Network Information Service
- TCP/IP Network Administration, 9.4. A BOOTP Server
- TCP/IP Network Administration, 9.7.1. POP Server
- TCP/IP Network Administration, 9.7.2. IMAP Server
- /etc/shadow file
- Practical UNIX & Internet Security, 8.1.1. Accounts Without Passwords
- Practical UNIX & Internet Security, 8.8.5. Shadow Password Files
- TCP/IP Network Administration, 12.2.1. The Shadow Password File
- /etc/ssh_known_hosts file
: TCP/IP Network Administration, 12.2.6. Secure Shell
- /etc/system file
: TCP/IP Network Administration, 5.1. Kernel Configuration
- /etc/tty files
- Practical UNIX & Internet Security, 7.1.2. What Should You Back Up?
- sendmail, 18.8. Alphabetized Reference
- TCP/IP Network Administration, 6.3.5. PPP Server Configuration
- TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- /etc/yp.conf file
: TCP/IP Network Administration, 9.3. Network Information Service
- backups of
: Practical UNIX & Internet Security, 7.1.3. Types of Backups
- /etc/default/login file
: Practical UNIX & Internet Security, 8.5.1. Secure Terminals
- /etc/exports file
: DNS & BIND, 6.3.1. Differences in Service Behavior
- /etc/fbtab file
: Practical UNIX & Internet Security, 17.3.21.1. /etc/fbtab and /etc/logindevperm
- /etc/fingerd program
: (see finger service)
- /etc/fsck program
: Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
- /etc/ftpd
: (see ftpd server)
- /etc/ftpusers file
: Practical UNIX & Internet Security, 17.3.2.5. Restricting FTP with the standard UNIX FTP server
- /etc/halt command
: Practical UNIX & Internet Security, 24.2.6. Anatomy of a Break-in
- /etc/host.aliases file
: DNS & BIND, 6.3.4. Providing Aliases
- /etc/hosts file
: DNS & BIND, 4.6. Tools
- empty
: DNS & BIND, 6.4.1.3. Ignoring NIS
- nslookup and
: DNS & BIND, 11.1.5. Using NIS and /etc/hosts
- power outages and
: DNS & BIND, 8.6.2. Longer Outages (Days)
- /etc/inetd
: (see inetd daemon)
- /etc/init program
: Practical UNIX & Internet Security, C.5.1. Process #1: /etc/init
- /etc/inittab
: (see inittab program)
- /etc/keystore file
: Practical UNIX & Internet Security, 19.3.1.1. Proving your identity
- /etc/logindevperm file
: Practical UNIX & Internet Security, 17.3.21.1. /etc/fbtab and /etc/logindevperm
- /etc/motd file
: Practical UNIX & Internet Security, 26.2.6. Other Tips
- /etc/named.boot
: (see boot file)
- /etc/named.pid file
: (see named.pid file)
- /etc/netgroups file
: DNS & BIND, 6.3.1. Differences in Service Behavior
- /etc/netsvc.conf file
: DNS & BIND, 6.4.4. IBM's AIX
- /etc/nsswitch.conf
- sendmail, 7.3.1. The hostname
- sendmail, D.4. L and G Configuration Commands
- TCP/IP Network Administration, 9.3.1. The nsswitch.conf file
- TCP/IP Network Administration, E.4.2. sendmail Options
- /etc/profile file
- Practical UNIX & Internet Security, 11.5.2.1. .login, .profile, /etc/profile
- Practical UNIX & Internet Security, 24.4.1.6. Changes to startup files
- /etc/publickey file
: Practical UNIX & Internet Security, 19.3.2.1. Creating passwords for users
- /etc/rc directory
- Practical UNIX & Internet Security, 11.5.3.5. System initialization files
- Practical UNIX & Internet Security, 17.1.2. Starting the Servers
- Practical UNIX & Internet Security, C.5.1. Process #1: /etc/init
- /etc/rc.d/rc.inet1 script
: TCP/IP Network Administration, 7.3.1.1. Installing static routes at startup
- /etc/rc.d/rc.M startup script
: TCP/IP Network Administration, 10.2. Running sendmail as a Daemon
- commenting out services
: Practical UNIX & Internet Security, 17.3. Primary UNIX Network Services
- services started by
: Building Internet Firewalls, 5.8.2.1. How are services managed?
- /etc/remote file
- Practical UNIX & Internet Security, 10.3.1. aculog File
- Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
- /etc/resolv.conf
: (see resolv.conf file)
- /etc/secure/passwd file
: Practical UNIX & Internet Security, 8.1.1. Accounts Without Passwords
- /etc/security/passwd.adjunct file
: Practical UNIX & Internet Security, 8.8.5. Shadow Password Files
- /etc/sendmail/aliases file
: Practical UNIX & Internet Security, 11.5.3.3. /usr/lib/aliases, /etc/aliases,
- /etc/sendmail.cf
: (see sendmail.cf configuration file)
- /etc/sendmail.ct file
: sendmail, 19.6. Alphabetized m4 Macros
- /etc/sendmail.cw file
: sendmail, 19.6. Alphabetized m4 Macros
- /etc/shells file
- Practical UNIX & Internet Security, 8.4.2. Changing the Account's Login
- sendmail, 18.8. Alphabetized Reference
- sendmail, 22.8.4. The /etc/shells file
- sendmail, D.1. Sun Enhancements
- /etc/syslogd
- sendmail, 26.1.2. Tuning syslog.conf
- TCP/IP Network Administration, 3.2. The Host Table
- TCP/IP Network Administration, A.2. The PPP Daemon
- TCP/IP Network Administration, A.3. chat
- /etc/ttys file
- Practical UNIX & Internet Security, 8.5.1. Secure Terminals
- Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
- /etc/ttytab file
: Practical UNIX & Internet Security, C.5.1. Process #1: /etc/init
- /etc/utmp file
- Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
- Practical UNIX & Internet Security, 10.1.2.1. su commandutmp and wtmp files andsu
- Practical UNIX & Internet Security, 24.2.1. Catching One in the Act
- Practical UNIX & Internet Security, 24.2.4. Tracing a Connection
- /etc/uucp directory
: Practical UNIX & Internet Security, 15.4.2.1. Some bad examples
- /etc/yp/makedbm program
: Practical UNIX & Internet Security, 19.4.4.1. Setting up netgroups
- in restricted filesystems
: Practical UNIX & Internet Security, 8.1.5. Restricted Filesystem
- Ethernet
- Practical UNIX & Internet Security, 16.1. Networking
- TCP/IP Network Administration, 1.5.1.3. Fragmenting datagrams
- TCP/IP Network Administration, 4.2.2. Defining the Subnet Mask
- addresses
: TCP/IP Network Administration, 1.4. Network Access Layer
- identifying DHCP client by
: TCP/IP Network Administration, 9.5.1. dhcpd.conf
- keeping records of
: TCP/IP Network Administration, 11.4.2. Troubleshooting with the arp Command
- addresses for random seeds
: Practical UNIX & Internet Security, 23.8. Picking a Random Seed
- cables
: (see cables, network)
- cards, configuring
- TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- eavesdropping by
: Practical UNIX & Internet Security, 12.3.1.2. Eavesdropping by Ethernet and 10Base-T
- fast ports (100 Mbps)
: TCP/IP Network Administration, 11.4.4. Subdividing an Ethernet
- FreeBSD device drivers, listed
: TCP/IP Network Administration, 5.3.1.3. Devices
- interfaces
- TCP/IP Network Administration, 5.3.1.3. Devices
- TCP/IP Network Administration, 6.1. The ifconfig Command
- TCP/IP Network Administration, 6.1.5.2. ARP and trailers
- TCP/IP Network Administration, 6.1.5.6. Putting ifconfig in the startup files
- LAN
: TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- networks
: TCP/IP Network Administration, 1.4. Network Access Layer
- subdividing
: TCP/IP Network Administration, 11.4.4. Subdividing an Ethernet
- support in BSD
: TCP/IP Network Administration, 5.3.1.2. Pseudo-device
- switch
: TCP/IP Network Administration, 11.4.4. Subdividing an Ethernet
- Ethernet packet layer
: Building Internet Firewalls, 6.3.1.1. Ethernet layer
- ethers file
- TCP/IP Network Administration, 3.5.1. Reverse Address Resolution Protocol
- TCP/IP Network Administration, 9.3. Network Information Service
- TCP/IP Network Administration, 11.4.2.1. ARP problem case study
- Ethers table (NIS+)
: Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
- ETRN command (SMTP)
: sendmail, 23.6.2.4. Process the queue via ESMTP ETRN
- Euler Totient Function
: Practical UNIX & Internet Security, 6.4.6.1. How RSA works
- eval function
- Practical UNIX & Internet Security, 18.2.3.2. Testing is not enough!
- Practical UNIX & Internet Security, 18.2.3.3. Sending mail
- eventlib data category (logging)
: DNS & BIND, 7.5.3. Category Details
- evidence, equipment seized as
: Practical UNIX & Internet Security, 26.2.4. Hazards of Criminal Prosecution
- ex editor
- Practical UNIX & Internet Security, 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve
- Practical UNIX & Internet Security, 11.5.2.4. .exrc
- Practical UNIX & Internet Security, 11.5.2.7. Other initializations
- EX_CANTCREAT value
: sendmail, 36.5.1. EX_CANTCREAT Can't Write a User's File
- EX_CONFIG value
: sendmail, 36.5.2. EX_CONFIG A Configuration Error
- EX_IOERR value
: sendmail, 36.5.3. EX_IOERR A System I/O Error Occurred
- EX_OK value
: sendmail, 36.5.4. EX_OK No Problems, All Was Fine
- EX_OSERR value
: sendmail, 36.5.5. EX_OSERR A System Resource Error
- EX_OSFILE value
: sendmail, 36.5.6. EX_OSFILE A Critical System File Failure
- EX_SOFTWARE value
: sendmail, 36.5.7. EX_SOFTWARE An Internal Software Error
- EX_TEMPFAIL value
: sendmail, 36.5.8. EX_TEMPFAIL A Recoverable Error
- EX_UNAVAILABLE value
: sendmail, 36.5.9. EX_UNAVAILABLE A Resource
- EX_USAGE value
: sendmail, 36.5.10. EX_USAGE A Command Was Used Incorrectly
- example programs, obtaining
: DNS & BIND, Obtaining the Example Programs
- exceptions
: Practical UNIX & Internet Security, C.2. Creating Processes
- exclamation mark (!) and mail command
: Practical UNIX & Internet Security, 15.1.3. mail Command
- exclusive OR (XOR)
: Practical UNIX & Internet Security, 6.4.7. An Unbreakable Encryption Algorithm
- exec (in Swatch program)
: Practical UNIX & Internet Security, 10.6.2. The Swatch Configuration File
- exec system call
- Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail
- Practical UNIX & Internet Security, 18.2.3.3. Sending mail
- Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- Practical UNIX & Internet Security, 25.2.1.1. Too many processes
- ExecCGI option
: Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
- execl system call
: Practical UNIX & Internet Security, 23.4. Tips on Writing SUID/SGID Programs
- execlp system call
: Practical UNIX & Internet Security, 23.4. Tips on Writing SUID/SGID Programs
- executable files, in security checks
: TCP/IP Network Administration, 12.4.2. Looking for Trouble
- execute permission
- Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail
- Practical UNIX & Internet Security, 5.4. Using Directory Permissions
- execv system call
: Practical UNIX & Internet Security, 23.4. Tips on Writing SUID/SGID Programs
- execve system call
: Practical UNIX & Internet Security, 23.4. Tips on Writing SUID/SGID Programs
- execvp system call
: Practical UNIX & Internet Security, 23.4. Tips on Writing SUID/SGID Programs
- exhaustive database search
: (see inverse queries)
- exit signal
- sendmail, 26.3.1. SIGINT Cleanup and Exit
- sendmail, 36.5. sendmail's exit() Status
- expanding addresses selectively
: sendmail, D.3. K Command's -d switch
- expanding domain name
: DNS & BIND, 14.2.6. The Name Server Library Routines
- expanding macros
: sendmail, 31.5. Macro Expansion: $ and $&
- expect nothing ('')
- TCP/IP Network Administration, 6.3.3. chat
- TCP/IP Network Administration, A.3. chat
- expect scripting language
: TCP/IP Network Administration, A.1.1.1. A sample dip script
- expensive delivery agents
: sendmail, 30.8. Alphabetized F= Flags
- expensive mailers
- sendmail, 23.6.1. Periodically with -q
- sendmail, 34.8. Alphabetized Reference
- expire fields
: TCP/IP Network Administration, 12.2.1. The Shadow Password File
- expire value
- DNS & BIND, 4.8.4. SOA Values
- DNS & BIND, 8.4.1. Changing Other SOA Values
- expiring
- accounts
: Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts
- FTP depositories
: Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
- passwords
: Practical UNIX & Internet Security, 8.8.6. Password Aging and Expiration
- expiring cached data
- DNS & BIND, 2.7.1. Time to Live
- DNS & BIND, 4.2.9. The Root Cache Data
- DNS & BIND, 4.8.4. SOA Values
- changing TTL
: DNS & BIND, 8.4. Changing TTLs
- load sharing and
: DNS & BIND, 10.12. Load Sharing Between Mirrored Servers
- exploder lists
: sendmail, 25.4. Exploder Mailing Lists
- explosions
: Practical UNIX & Internet Security, 12.2.1.5. Explosion
- EXPN command
- sendmail, 22.3.2. SMTP vrfy and expn
- sendmail, 22.8.3.5. The PrivacyOptions option
- sendmail, 25.7.1. Unscrambling Forwards
- TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
- TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- export laws
: Practical UNIX & Internet Security, 26.4.1. Munitions Export
- cryptography
- Practical UNIX & Internet Security, 6.4.4.1. Use and export of DES
- Practical UNIX & Internet Security, 6.7.2. Cryptography and Export Controls
- export statement (in gated)
: TCP/IP Network Administration, B.10.2. The export Statement
- exportfs command
: Practical UNIX & Internet Security, 20.2.1.2. /usr/etc/exportfs
- exporting news via NFS
: Building Internet Firewalls, 8.5.3.3. Exporting news to clients via
- exports file
- DNS & BIND, 6.3.1. Differences in Service Behavior
- Practical UNIX & Internet Security, 11.6.1.2. Writable system files and directories
- Practical UNIX & Internet Security, 19.3.2.4. Using Secure NFS
- Practical UNIX & Internet Security, 20.2.1.1. /etc/exports
- Practical UNIX & Internet Security, 20.2.1.2. /usr/etc/exportfs
- TCP/IP Network Administration, 9.1.5.1. NFS print services
- EXPOSED_USER macro (m4)
: sendmail, 19.6. Alphabetized m4 Macros
- .exrc file
: Practical UNIX & Internet Security, 11.5.2.4. .exrc
- ext2 filesystem (Linux)
: Practical UNIX & Internet Security, 25.2.2.6. Reserved space
- Extended SMTP (ESMTP)
- sendmail, 4.2. Verbose (-v)
- sendmail, 23.9. The qf File Internals
- sendmail, 30.8. Alphabetized F= Flags
- TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- TCP/IP Network Administration, 10.8. Testing sendmail.cf
- BODY parameter (ESMTP)
- sendmail, 31.10. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- private extensions to
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- extensibility
- in monitors
: TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- of SMTP
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- Exterior Gateway Protocol
: (see EGP)
- exterior routers
: Building Internet Firewalls, 4.2.3.4. Exterior router
- configuring
: Building Internet Firewalls, 9.1.2.2. Exterior Router
- merging with bastion host
: Building Internet Firewalls, 4.3.3. It's OK to Merge
- merging with interior router
: Building Internet Firewalls, 4.3.2. It's OK to Merge the Interior Router and the Exterior Router
- multiple
: Building Internet Firewalls, 4.3.6. It's OK to Use
- exterior routing protocols
: TCP/IP Network Administration, 7.5. Exterior Routing Protocols
- external
- clients, and proxying
: Building Internet Firewalls, 7.4.5. Internal Versus External Clients
- programs on HTTP servers
: Building Internet Firewalls, 8.6.3.1. What can a malicious client do to
- external data representation (XDR)
: Practical UNIX & Internet Security, 19.2. Sun's Remote Procedure Call (RPC)
- external databases
: (see databases)
- External-body message subtype
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- extinguishers, fire
: (see fires)
- extortion
: Practical UNIX & Internet Security, 11.3. Authors
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
O'Reilly & Associates, Inc.
All Rights Reserved.