Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: M
- m class
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 32.5. Alphabetized Reference
- M configuration command
- sendmail, 5.3.1. Mail Delivery Agents
- sendmail, 6.2. Define a Mail Delivery Agent
- sendmail, 6.3. The local Delivery Agent
- sendmail, 30.1. Configuration File Syntax
- -m database switch
: sendmail, 33.3.4.5. -m suppress replacement on match (V8.1 and above)
- m flag
: sendmail, 30.8. Alphabetized F= Flags
- M flag
- sendmail, 14.2.3. The Message-ID: Header
- sendmail, 30.8. Alphabetized F= Flags
- M line (qf file)
- sendmail, 23.4.1. Printing the Queue in Verbose Mode
- sendmail, 23.9. The qf File Internals
- M lines in sendmail.cf
: sendmail, 3.1. Role in the Filesystem
- $m macro
- sendmail, 7.3.1. The hostname
- sendmail, 12.1.7. Adding the Domain
- sendmail, 31.10. Alphabetized Reference
- $M macro
: sendmail, 31.10. Alphabetized Reference
- M option
- sendmail, 31.2. Command-Line Definitions
- sendmail, 34.1.3. Appropriateness of Options
- sendmail, 34.8. Alphabetized Reference
- m option
: (see MeToo (m) option)
- M rule-testing command
: sendmail, 38.4.2. Show Delivery Agents with =M
- -m switch (sendmail)
- sendmail, 18.3.2. The makesendmail Script
- sendmail, 36.7. Alphabetized Reference
- -M switch (sendmail)
- sendmail, 31.2. Command-Line Definitions
- sendmail, 36.7. Alphabetized Reference
- m4 macros
- TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros
- TCP/IP Network Administration, E.3. m4 sendmail Macros
- m4 preprocessor
- sendmail, 16.3. Run m4
- sendmail, 19. V8 m4 Configuration
- class macros and
: sendmail, 32.3. Class with m4
- comments in files
: sendmail, 19.5. Pitfalls
- configuration version
: sendmail, 31.10. Alphabetized Reference
- database maps and
: sendmail, 33.6. Database Maps and m4
- delivery agent configuration
: sendmail, 30.3. m4 Configuration Syntax
- diversions
: sendmail, 19.1.4. m4 diversions
- macros and
: sendmail, 31.8. Macros with the m4 Technique
- rule sets and
: sendmail, 29.2. Rule Sets and m4
- sendmail options and
: sendmail, 34.3. Configuring with V8 m4 Options
- M= equate
: sendmail, 30.4. The Equates
- MAC (Mandatory Access Controls)
: Practical UNIX & Internet Security, 4.1.3. Groups and Group Identifiers (GIDs)
- MACH operating system
: Practical UNIX & Internet Security, 1.3. History of UNIX
- machine
- auditing
: (see auditing)
- backing up
: Building Internet Firewalls, 13.5.1. Backing Up Your Filesystems
- choosing
: Building Internet Firewalls, 5.3. Choosing a Machine
- configuring
: Building Internet Firewalls, 5.8.4. Reconfiguring for Production
- connecting
: Building Internet Firewalls, 5.8.6. Connecting the Machine
- disconnecting or shutting down
: Building Internet Firewalls, 13.4.3. Planning for Disconnecting or
- hardware
: (see hardware)
- hijacking
: Building Internet Firewalls, 10.1.1. Hijacking
- name
: Practical UNIX & Internet Security, 16.2.3. Hostnames
- physical location of
: Building Internet Firewalls, 5.4. Choosing a Physical Location
- securing
: Building Internet Firewalls, 5.8.1. Securing the Machine
- software
: (see software)
- speed of
: Building Internet Firewalls, 5.3.2. How Fast a Machine?
- MACHINE= command
- Practical UNIX & Internet Security, 15.5.1.2. Name-value pairs
- Practical UNIX & Internet Security, 15.5.2. Permissions Commands
- macid()
: sendmail, 20.3. Alphabetized V8.8 Subroutines
- Macintosh
- Practical UNIX & Internet Security, 18.2. Running a Secure Server
- sendmail, 3.3.3. Other Protocols
- macro conditionals
- sendmail, 14.1.3. Testing So Far
- sendmail, 31.6. Macro Conditionals: $?, $|, and $.
- TCP/IP Network Administration, 10.5.2.1. Conditionals
- macro virus
: (see viruses)
- macros
- sendmail, 5.3.2. Macros
- sendmail, 7. Macros
- sendmail, 31.9. Pitfalls
- class macros
- sendmail, 5.3.5. Class Macros
- sendmail, 12. Class
- sendmail, 32. Class Macros
- classes and
: sendmail, 12.1.1.1. A caveat
- database macros
: sendmail, 33. Database Macros
- declaring
- sendmail, 7.2. Defining Macros
- sendmail, 31.2. Command-Line Definitions
- defining
- sendmail, 19.4.2. Define Macros
- sendmail, 20.3. Alphabetized V8.8 Subroutines
- sendmail, 36.7. Alphabetized Reference
- sendmail, 38.2.1. Define a Macro with .D
- with M option
: sendmail, 34.8. Alphabetized Reference
- dumping
: sendmail, 38.3. Dump a Macro
- expanding
: TCP/IP Network Administration, 10.6.2. Transforming the Address
- fetching value of
: sendmail, 20.3. Alphabetized V8.8 Subroutines
- file class macros
: sendmail, 5.3.6. File Class Macros
- for compiling sendmail
: sendmail, 18.8. Alphabetized Reference
- in header fields
: sendmail, 35.3.1. Macros in the Header Field
- initializing
: sendmail, 36.4.2.2. Initialize macros
- m4 preprocessor
: sendmail, 19. V8 m4 Configuration
- naming
- sendmail, 5.3.2. Macros
- sendmail, 7.2. Defining Macros
- sendmail, 31.4. Macro Names
- converting names to integers
: sendmail, 20.3. Alphabetized V8.8 Subroutines
- predefined
- sendmail, 7.3. Predefined Macros
- sendmail, 31.1. Preassigned Macros
- required
: sendmail, 31.3.1. Required Macros (V8.6 and earlier)
- restoring macro values
: sendmail, 23.9. The qf File Internals
- in rule set names
: sendmail, 29.1.4. Macros in Rule-Set Names
- in rules
: sendmail, 28.1.1. Macros in Rules
- for time and date
: sendmail, 31.7.2. Macros and the Date
- macvalue()
: sendmail, 20.3. Alphabetized V8.8 Subroutines
- MAEs (Metropolitan Area Exchanges)
: TCP/IP Network Administration, 1.1. TCP/IP and the Internet
- magic cookies
- DNS & BIND, 6.4.1.2. Using DNS with NIS
- Practical UNIX & Internet Security, 17.3.21.4. Using Xauthority magic cookies
- magic number
- Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail
- TCP/IP Network Administration, A.2. The PPP Daemon
- mail
- (see email)
- (see sendmail)
- mail addr field
: DNS & BIND, 3.2.1. Where in the World Do I Fit?
- MAIL command (SMTP)
- sendmail, 29.10.1. The check_mail Rule Set
- sendmail, 34.8. Alphabetized Reference
- Mail Exchanger records
: (see MX records)
- mail exchangers
- DNS & BIND, 5.1. MX Records
- DNS & BIND, 5.2. What's a Mail Exchanger, Again?
- mail hubs
: (see hubs)
- /mail/imap.tar.Z file
: TCP/IP Network Administration, 9.7.2. IMAP Server
- mail program
- Practical UNIX & Internet Security, 15.1.3. mail Command
- sendmail, 3.2.1. Delivery to a Mailbox
- "Mail-From:" header line
: sendmail, 35.10. Alphabetized Reference
- mail11 program
: sendmail, 3.3.3. Other Protocols
- Mail_Aliases table (NIS+)
: Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
- MAIL_HUB macro (m4)
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 31.10. Alphabetized Reference
- mailbox file
: sendmail, 3.2.1. Delivery to a Mailbox
- mailbox servers
: TCP/IP Network Administration, 9.7. Mail Servers
- synchronizing
: TCP/IP Network Administration, 9.7.2. IMAP Server
- mailer
- definition fields
: TCP/IP Network Administration, 10.5.8. Defining Mailers
- common
: TCP/IP Network Administration, 10.5.8.1. Some common mailer definitions
- local
: TCP/IP Network Administration, 10.5.8. Defining Mailers
- MAILER command (UUCP)
: sendmail, 31.10. Alphabetized Reference
- MAILER source file (in sendmail)
- TCP/IP Network Administration, E.3. m4 sendmail Macros
- TCP/IP Network Administration, E.3.5. MAILER
- values available, listed
: TCP/IP Network Administration, E.3.5. MAILER
- MAILER() (m4)
- sendmail, 19.3.2. MAILER()
- sendmail, 30.3. m4 Configuration Syntax
- MAILER-DAEMON alias
- sendmail, 3.1.1. The Aliases File
- sendmail, 24.4.2. The MAILER-DAEMON Alias
- sendmail, 31.10. Alphabetized Reference
- (see also $n macro)
- mailer= equate (syslog output)
: sendmail, 26.1.3.4. mailer= the delivery agent used
- MAILER_DEFINITIONS macro (m4)
: sendmail, 19.6. Alphabetized m4 Macros
- mailertable database
- sendmail, 19.6. Alphabetized m4 Macros
- TCP/IP Network Administration, 10.7.1. Modifying Local Information
- mailing lists
- Practical UNIX & Internet Security, E.1. Mailing Lists
- Practical UNIX & Internet Security, E.1.3.10. WWW-security
- sendmail, 1.3.3. Aliases and Mailing Lists
- sendmail, 17.1.2.1. A rule to handle List:;
- sendmail, 20.2.2. Workstation Refuses to Act as a Mail Gateway
- sendmail, 34.8. Alphabetized Reference
- (see also email)
- BIND-related
: DNS & BIND, 3.1.1. Handy Mailing Lists and Usenet Newsgroups
- exploder lists
: sendmail, 25.4. Exploder Mailing Lists
- EXPN command (SMTP)
: sendmail, 22.3.2. SMTP vrfy and expn
- for distributing security information
: TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
- for exchanging information and ideas
: TCP/IP Network Administration, 13.5. Mailing Lists
- :include: directive
- sendmail, 22.5.2. Permissions for :include:
- sendmail, 23.9. The qf File Internals
- sendmail, 25.2. :include: Mailing Lists
- including oneself on
: sendmail, 34.8. Alphabetized Reference
- internal
: sendmail, 25.1. Internal Mailing Lists
- joining
: TCP/IP Network Administration, 13.5. Mailing Lists
- keeping current
: Building Internet Firewalls, 12.3.1.1. Mailing lists
- list precedence
: sendmail, 14.4. Precedence
- owner
: sendmail, 25.3. Defining a Mailing List Owner
- packages for
: sendmail, 25.6. Packages That Help
- resources via
: Building Internet Firewalls, A.3. Mailing Lists
- sendmail and
: TCP/IP Network Administration, 10.1. sendmail's Function
- troubleshooting
: sendmail, 25.5. Problems with Mailing Lists
- mailq command
- sendmail, 4.1.2. Show Queue Mode (-bp)
- sendmail, 36.1.2. mailq
- mailstats program
: sendmail, 26.2.2. Viewing Statistics: mailstats
- maintaining firewalls
: Building Internet Firewalls, 12. Maintaining Firewalls
- maintenance
: (see administration)
- maintenance data category (logging)
: DNS & BIND, 7.5.3. Category Details
- maintenance mode
: Practical UNIX & Internet Security, C.5.1. Process #1: /etc/init
- maintenance personnel
: Practical UNIX & Internet Security, 13.3. Outsiders
- maintenance toolkits, ready-made
: TCP/IP Network Administration, 11.2. Diagnostic Tools
- Majordomo package
- sendmail, 25.6.1. Majordomo
- TCP/IP Network Administration, 13.5. Mailing Lists
- make command
- sendmail, 2.5. Build
- TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- in NIS
: TCP/IP Network Administration, 9.3. Network Information Service
- make config command
: TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- make install.man
: TCP/IP Network Administration, 9.4. A BOOTP Server
- make zImage command
: TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- makedbm program
: Practical UNIX & Internet Security, 19.4.4.1. Setting up netgroups
- Makefile file
- DNS & BIND, 6.4.1.2. Using DNS with NIS
- sendmail, 2.4. Preliminaries
- sendmail, 18.4. Tuning Makefile
- db library package
: sendmail, C.2. Get the Source
- makemap command
- sendmail, 33.2. Create Files with makemap
- TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros
- TCP/IP Network Administration, E.1. Compiling sendmail
- TCP/IP Network Administration, E.4.4. The sendmail K Command
- makesendmail script
- sendmail, 2.4. Preliminaries
- sendmail, 18.3.2. The makesendmail Script
- sendmail, 18.6. Install sendmail
- "malformed response" message
: DNS & BIND, 7.6.1. Common Syslog Messages
- malware
: Practical UNIX & Internet Security, 11.1. Programmed Threats: Definitions
- man pages
: Practical UNIX & Internet Security, 2.5. The Problem with Security Through Obscurity
- man-in-the-middle forgery
: Building Internet Firewalls, 6.6.1. Risks of Filtering by Source
- Management Information Base (MIB)
: TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- management tools
: Building Internet Firewalls, 2.10. Network Management Services
- management, role of
- Practical UNIX & Internet Security, 2.3.4. Convincing Management
- Practical UNIX & Internet Security, 2.5. The Problem with Security Through Obscurity
- managing accounts
: Building Internet Firewalls, 12.1.2. Managing Your Accounts
- MANs (Metropolitan Networks)
: Practical UNIX & Internet Security, 16.1. Networking
- manual logging
- Practical UNIX & Internet Security, 10.7. Handwritten Logs
- Practical UNIX & Internet Security, 10.7.2.2. Informational material
- manual pages
: Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- manual sendmail use
: sendmail, 1.4. Run sendmail by Hand
- many-answers format
: DNS & BIND, 10.4.1.4. More efficient zone transfers
- map
: TCP/IP Network Administration, 1.7. Application Layer
- /etc/hosts file
- Practical UNIX & Internet Security, 16.2.3.1. The /etc/hosts file
- sendmail, 7.3.1. The hostname
- sendmail, 18.8. Alphabetized Reference
- sendmail, 34.8. Alphabetized Reference
- TCP/IP Network Administration, 3.2. The Host Table
- TCP/IP Network Administration, 6.1. The ifconfig Command
- TCP/IP Network Administration, 7.3. Building a Static Routing Table
- TCP/IP Network Administration, 9.1.4. NFS Automounter
- TCP/IP Network Administration, 9.3. Network Information Service
- creating
: TCP/IP Network Administration, 3.2. The Host Table
- as maps
: TCP/IP Network Administration, 3.3.5. Network Information Service
- modifying
: TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
- /etc/networks file
- TCP/IP Network Administration, 3.2. The Host Table
- TCP/IP Network Administration, 6.1.3. Assigning a Subnet Mask
- TCP/IP Network Administration, 7.3. Building a Static Routing Table
- TCP/IP Network Administration, 9.3. Network Information Service
- as maps
- TCP/IP Network Administration, 3.3.5. Network Information Service
- (see also automounter daemon)
- (see also IMAP)
- (see also Network Information Service)
- (see also portmapper)
- building
: TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- name assigned a database
: TCP/IP Network Administration, 10.6.2.1. Transforming with a database
- NIS
: (see NIS)
- /map rule-testing command
: sendmail, 38.5.3. Look up a Database Item with /map
- map_lookup()
: sendmail, 20.3. Alphabetized V8.8 Subroutines
- mapping
: DNS & BIND, 4.2. Setting Up DNS Data
- addresses to names
- DNS & BIND, 2.6.4. Mapping Addresses to Names
- DNS & BIND, 4.2.6. PTR Records
- h2n utility for
: (see h2n utility)
- names to addresses
: DNS & BIND, 4.2.5. Address and Alias Records
- network names and numbers
: DNS & BIND, 15.6. Network Names and Numbers
- martians
- TCP/IP Network Administration, 4.2.1. Obtaining an IP Address
- TCP/IP Network Administration, B.7. Definition Statements
- mask information
: (see information)
- masking
- TCP/IP Network Administration, 2.2.2. Classless IP Addresses
- TCP/IP Network Administration, 2.3. Subnets
- MASQUERADE_AS macro (m4)
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 31.10. Alphabetized Reference
- MASQUERADE_DOMAIN macro (m4)
: sendmail, 19.6. Alphabetized m4 Macros
- MASQUERADE_DOMAIN_FILE macro (m4)
: sendmail, 19.6. Alphabetized m4 Macros
- masquerade_entire_domain feature
: sendmail, 19.6. Alphabetized m4 Macros
- masquerade_envelope feature
: sendmail, 19.6. Alphabetized m4 Macros
- masquerading
- sendmail, 19.4.4. Masquerading
- sendmail, 19.6. Alphabetized m4 Macros
- TCP/IP Network Administration, E.3.2. FEATURE
- TCP/IP Network Administration, E.3.4. DOMAIN
- Massey, James L.
: Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- master files
: (see db files)
- Master mode (uucico)
: Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work
- master server
- Practical UNIX & Internet Security, 19.4. Sun's Network Information Service (NIS)
- (see also NIS)
- master servers
: (see primary name server)
- "master unreachable" message
: DNS & BIND, 7.6.1. Common Syslog Messages
- "master zone loaded" message
: DNS & BIND, 7.6.1. Common Syslog Messages
- MatchGecos (G) option
- sendmail, 20.1.2. Global Variables
- sendmail, 34.8. Alphabetized Reference
- MATCHGECOS macro
: sendmail, 18.8. Alphabetized Reference
- matching
: (see wildcard operators)
- MAX... macros
: sendmail, 18.8. Alphabetized Reference
- MaxDaemonChildren option
- sendmail, 34.1.3. Appropriateness of Options
- sendmail, 34.8. Alphabetized Reference
- MaxHopCount (h) option
: sendmail, 34.8. Alphabetized Reference
- maximum line length
- sendmail, 30.4. The Equates
- sendmail, 30.8. Alphabetized F= Flags
- maximum receive unit (MRU)
: TCP/IP Network Administration, A.2. The PPP Daemon
- maximum transmission unit (MTU)
- Building Internet Firewalls, C.5.1.3. Fragmenting datagrams
- TCP/IP Network Administration, 1.5.1.3. Fragmenting datagrams
- TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- TCP/IP Network Administration, 6.1.2. Checking the Interface with ifconfig
- TCP/IP Network Administration, 6.1.5.4. Maximum transmission unit
- TCP/IP Network Administration, A.1. Dial-Up IP
- determining smallest
: TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- MAXLINE variable
: sendmail, 18.8. Alphabetized Reference
- MaxMessageSize
: sendmail, 34.8. Alphabetized Reference
- maxpacketsize
: TCP/IP Network Administration, B.8.6. The egp Statement
- MaxQueueRunSize option
- sendmail, 23.4. Printing the Queue
- sendmail, 34.8. Alphabetized Reference
- MAXRWSETS variable
: sendmail, 29.1.2. Rule-Set Names
- MB records
- DNS & BIND, 3.2.1. Where in the World Do I Fit?
- DNS & BIND, A.1.2.4. MB mailbox domain name - experimental
- MBONE (Multicast Backbone)
- Building Internet Firewalls, 2.8. Real-Time Conferencing
- TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- TCP/IP Network Administration, 5.3.1.1. Options
- configuring
: Building Internet Firewalls, 8.9.3. The Multicast Backbone (MBONE)
- mc files
- sendmail, 19.3. The Minimal mc File
- sendmail, 19.6. Alphabetized m4 Macros
- MCERT
: Practical UNIX & Internet Security, F.3.4.21. Motorola, Inc.
- MCI Corporation
: Practical UNIX & Internet Security, F.3.4.19. MCI Corporation
- MD and MF records
- DNS & BIND, 5.1. MX Records
- DNS & BIND, A.1.2.5. MD mail destination - obsolete
- MD2 algorithm
: Practical UNIX & Internet Security, 6.5.4.1. MD2, MD4, and MD5
- MD4 algorithm
- Building Internet Firewalls, 10.3.1. One-Time Passwords
- Practical UNIX & Internet Security, 6.5.4.1. MD2, MD4, and MD5
- MD5 algorithm
- Practical UNIX & Internet Security, 6.5.2. Using Message Digests
- Practical UNIX & Internet Security, 6.5.4.1. MD2, MD4, and MD5
- Practical UNIX & Internet Security, 23.5.1. Use Message Digests for Storing Passwords
- Practical UNIX & Internet Security, 23.9. A Good Random Seed
- digital signatures versus
: Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
- in POP
: Practical UNIX & Internet Security, 17.3.10. Post Office Protocol (POP) (TCP Ports
- MDAs (mail delivery agents)
: (see MTAs)
- media
: Practical UNIX & Internet Security, 12.3.3. Other Media
- damaged by smoke
: Practical UNIX & Internet Security, 12.2.1.2. Smoke
- destroying
: Practical UNIX & Internet Security, 12.3.2.3. Sanitize your media before disposal
- failure of
: Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
- hard/soft disk quotas
: Practical UNIX & Internet Security, 25.2.2.5. Using quotas
- print through process
: Practical UNIX & Internet Security, 12.3.2.1. Verify your backups
- rotating for backups
: Practical UNIX & Internet Security, 7.1.3. Types of Backups
- rotation of
: Practical UNIX & Internet Security, 7.2.1.2. Media rotation
- sanitizing
: Practical UNIX & Internet Security, 12.3.2.3. Sanitize your media before disposal
- viruses from
: Practical UNIX & Internet Security, 11.1.5. Viruses
- meet-in-the-middle attacks
: Practical UNIX & Internet Security, 6.4.5.1. Double DES
- MEMCHUNKSIZE macro
: sendmail, 18.8. Alphabetized Reference
- memory
- DNS & BIND, 8.1.2. Capacity Planning
- Building Internet Firewalls, 1.1.2. Your Resources
- Building Internet Firewalls, 5.3.3. What Hardware Configuration?
- Practical UNIX & Internet Security, 25.2.2. Disk Attacks
- Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
- sendmail, 34.8. Alphabetized Reference
- data segment size
: DNS & BIND, 10.4.2.1. Changing the data segment size limit
- domain name storage
: DNS & BIND, 14.2.2. Domain Name Storage
- hidden space
: Practical UNIX & Internet Security, 25.2.2.7. Hidden space
- for logs
- Building Internet Firewalls, 12.1.3. Managing Your Disk Space
- Building Internet Firewalls, 12.2.2. What Should You Watch For?
- managing
: Building Internet Firewalls, 12.1.3. Managing Your Disk Space
- reserved space
: Practical UNIX & Internet Security, 25.2.2.6. Reserved space
- resource limits
: DNS & BIND, 10.4.2. Resource Limits
- swap space
: Practical UNIX & Internet Security, 25.2.3. Swap Space Problems
- /tmp directory and
: Practical UNIX & Internet Security, 25.2.4. /tmp Problems
- tree-structure attacks
: Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
- memory-to-memory copies
: TCP/IP Network Administration, 6.1.5.2. ARP and trailers
- merging interior and exterior routers
: Building Internet Firewalls, 4.3.2. It's OK to Merge the Interior Router and the Exterior Router
- Merkle, Ralph
: Practical UNIX & Internet Security, 6.4.5.1. Double DES
- Message Authentication Code (MAC)
: Practical UNIX & Internet Security, 6.5.5.2. Message authentication codes
- Message Digest 5 (MD5) cryptographic checksum
- TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- TCP/IP Network Administration, 7.7.1.1. A host configuration
- TCP/IP Network Administration, B.8.2. The rip Statement
- message digests
- Practical UNIX & Internet Security, 6.5. Message Digests and Digital Signatures
- Practical UNIX & Internet Security, 6.5.2. Using Message Digests
- Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
- Practical UNIX & Internet Security, 23.5.1. Use Message Digests for Storing Passwords
- Tripwire package
- Practical UNIX & Internet Security, 9.2.4. Tripwire
- Practical UNIX & Internet Security, 9.2.4.2. Running Tripwire
- "Message:" header line
: sendmail, 35.10. Alphabetized Reference
- message queue
: (see queue)
- "Message-ID:" header line
- sendmail, 1.5. The Header
- sendmail, 13.4. Sending Mail
- sendmail, 14.2.3. The Message-ID: Header
- sendmail, 26.1.3.5. msgid= the Message-ID: identifier
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 35.5.16. Replacing Headers with H_ACHECK
- sendmail, 35.10. Alphabetized Reference
- message_volume.sh script
: sendmail, 26.1.4.1. message_volume.sh
- messages
- compression
: DNS & BIND, A.4.1.2. Message compression
- format of
: DNS & BIND, A.2. DNS Message
- messages file
: TCP/IP Network Administration, 12.4.2.2. Checking login activity
- messages log file
: Practical UNIX & Internet Security, 10.2.3. messages Log File
- messages, email
- sendmail, 34.8. Alphabetized Reference
- TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
- TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
- assigning priority to
: TCP/IP Network Administration, 10.5.6. Defining Mail Precedence
- blank lines ending
: sendmail, 30.8. Alphabetized F= Flags
- body of
- sendmail, 1.6. The Body
- sendmail, 23.2.2. The Data (Message Body) File: df
- (see also -B switch (sendmail))
- bouncing
- sendmail, 10.3. Missing Addresses
- sendmail, 13.2.2. Limit the Life of Queued Messages
- sendmail, 14.4. Precedence
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 22.8.3.4. The PostmasterCopy option
- sendmail, 23.3.6. Savemail Panic
- sendmail, 23.7.1. Handling a Down Site
- sendmail, 24.4.1. The Postmaster Alias
- sendmail, 25.5.1. Reply Versus Bounce
- sendmail, 25.5.3. A list-bounced Alias
- sendmail, 34.8. Alphabetized Reference
- sendmail, 35.10. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- (see also $n macro)
- content type
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- converting between 7- and 8-bit
: sendmail, 18.8. Alphabetized Reference
- delivering
: (see delivery)
- encapsulated
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- envelope
: (see envelope)
- error
: (see errors)
- flooding
: Practical UNIX & Internet Security, 25.3.2. Message Flooding
- forged
: sendmail, 22.7. Forged Mail
- forwarding
: sendmail, 35.7. Forwarding with Resent-Headers
- forwarding loops
: sendmail, 25.7.2. Forwarding Loops
- headers for
: (see headers, message)
- holding
: (see queue)
- hop count
: (see hop count)
- hub's acceptance of
: sendmail, 15.4. Hub Accepts Mail for Client
- leading dots in
: sendmail, 34.8. Alphabetized Reference
- limiting size of
: sendmail, 20.2.3. Limit the Size of Guest Messages
- multipart subtype
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- multiple objects in single
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- origin date of
: (see $a macro)
- priority of
- sendmail, 14.4. Precedence
- (see priority, message)
- processing limits on
: sendmail, 23.5. How the Queue Is Processed
- queue
- sendmail, 1.3.2. The Queue
- sendmail, 23. The Queue
- checkpointing
: sendmail, 34.8. Alphabetized Reference
- down sites and
: sendmail, 23.7.1. Handling a Down Site
- lifetime
- sendmail, 13.2.2. Limit the Life of Queued Messages
- sendmail, 34.8. Alphabetized Reference
- message life
: sendmail, 13.2.2. Limit the Life of Queued Messages
- message parts
: sendmail, 23.2. Parts of a Queued Message
- printing
- sendmail, 4.1.2. Show Queue Mode (-bp)
- sendmail, 23.2.3.2. Locks shown when printing the queue
- sendmail, 23.4. Printing the Queue
- sendmail, 36.7. Alphabetized Reference
- processing
- sendmail, 23.5. How the Queue Is Processed
- sendmail, 23.9. The qf File Internals
- sendmail, 36.7. Alphabetized Reference
- putting everything in
: sendmail, 34.8. Alphabetized Reference
- requeuing on error
: sendmail, 25.7.6. Force Requeue on Error
- sendmail options for
: sendmail, 34.6.2. The Queue
- sorting
: sendmail, 34.8. Alphabetized Reference
- time message placed in
: sendmail, 23.9. The qf File Internals
- troubleshooting
: sendmail, 23.8. Pitfalls
- why message is stored in
: sendmail, 23.9. The qf File Internals
- rejecting
- sendmail, 18.8. Alphabetized Reference
- sendmail, 20.2.6. Reject Mail from Spamming or Mail-bombing Sites
- relays for
: sendmail, 19.4.5. Relays
- sending
- sendmail, 13.4. Sending Mail
- sendmail, 14.5. Sending Real Mail
- size of
- sendmail, 26.1.3.10. size= the size of the message
- sendmail, 30.4. The Equates
- sendmail, 34.8. Alphabetized Reference
- stored in queue in error
: sendmail, 23.9. The qf File Internals
- time placed in queue
: sendmail, 23.9. The qf File Internals
- unique identifier for
- sendmail, 13.4. Sending Mail
- sendmail, 14.2.3. The Message-ID: Header
- sendmail, 26.1.3.5. msgid= the Message-ID: identifier
- messages, error
: (see error messages)
- messages, SMTP greeting
- sendmail, 31.10. Alphabetized Reference
- sendmail, 34.8. Alphabetized Reference
- messages, warning
: (see warning messages)
- meta characters
: Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- meta-packets, and filtering
: Building Internet Firewalls, 6.8.4. It Should Allow Rules Based on Any
- metadata
- Practical UNIX & Internet Security, 9.2.2. Checklists and Metadata
- Practical UNIX & Internet Security, 9.2.2.2. Ancestor directories
- metasymbols
: TCP/IP Network Administration, 10.6.1. Pattern Matching
- for transforming the address
: TCP/IP Network Administration, 10.6.2. Transforming the Address
- MeToo (m) option
- sendmail, 34.8. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- metrics
: TCP/IP Network Administration, 6.1.5.3. Metric
- arbitrariness of
: TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
- incompatibility of
: TCP/IP Network Administration, 7.6.1. gated's Preference Value
- Metropolitan Area Exchanges (MAEs)
: TCP/IP Network Administration, 1.1. TCP/IP and the Internet
- Metropolitan Networks (MANs)
: Practical UNIX & Internet Security, 16.1. Networking
- MG records
- DNS & BIND, 3.2.1. Where in the World Do I Fit?
- DNS & BIND, A.1.2.7. MG mail group member - experimental
- MH (mail handler)
: Practical UNIX & Internet Security, 11.5.2.5. .forward, .procmailrc
- MIB (Management Information Base)
: TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- MIBI and MIBII
: TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- Micro-BIT Virus Center
: Practical UNIX & Internet Security, F.3.4.16. Germany: Southern area
- Microsoft Windows 95
: DNS & BIND, 6.4.9. Windows 95
- Microsoft Windows NT
: DNS & BIND, 6.4.10. Windows NT
- mil domain
- DNS & BIND, 2.2.1. Top-Level Domains
- TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
- Miller, Barton
: Practical UNIX & Internet Security, 23.1.2. An Empirical Study of the Reliability of UNIX Utilities
- MILNET
: Practical UNIX & Internet Security, F.3.4.20. Motorola, Inc.
- MIME (Multipurpose Internet Mail Extensions)
- Building Internet Firewalls, 8.1.3. Multipurpose Internet Mail Extensions
- Practical UNIX & Internet Security, 11.1.5. Viruses
- sendmail, 5.3.8. Headers
- TCP/IP Network Administration, 1.2. A Data Communications Model
- TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- format errors
: sendmail, 34.8. Alphabetized Reference
- headers for
: sendmail, 35.6.7. MIME Headers
- sendmail and
: TCP/IP Network Administration, 10.5.8. Defining Mailers
- standardizing on
: TCP/IP Network Administration, 4.5.3. Planning Your Mail System
- types
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- "MIME-Version:" header line
: sendmail, 35.10. Alphabetized Reference
- MIME7TO8 macro
: sendmail, 18.8. Alphabetized Reference
- MIME8TO7 macro
: sendmail, 18.8. Alphabetized Reference
- MINFO records
: DNS & BIND, A.1.2.8. MINFO mailbox or mail list information - experimental
- MinFreeBlocks (b) option
: sendmail, 34.8. Alphabetized Reference
- minicom
: TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- minimum matching
- sendmail, 8.7.2. Minimal Matching
- sendmail, 28.5.1. Minimum Matching
- sendmail, 32.2.3. Backup and Retry
- minimum TTL
: DNS & BIND, 8.4.1. Changing Other SOA Values
- MinQueueAge option
- sendmail, 23.9. The qf File Internals
- sendmail, 34.8. Alphabetized Reference
- minus sign (hyphen)
- in machine conversation
: sendmail, 4.2. Verbose (-v)
- non-equivalent host
: TCP/IP Network Administration, 12.2.5. Secure the r Commands
- mirrored servers
: DNS & BIND, 10.12. Load Sharing Between Mirrored Servers
- missing
- addresses
: (see addresses, null)
- cache data
: DNS & BIND, 13.3.7. 7. Missing Cache Data
- PTR records
- DNS & BIND, 11.7.3. No PTR Data for Name Server's Address
- DNS & BIND, 13.3.4. 4. Added Name to Database File, but Forgot to Add PTR Record
- subdomain delegation
: DNS & BIND, 13.3.9. 9. Missing Subdomain Delegation
- "Missing username" error
: sendmail, 9.4. The error Delivery Agent
- MIT-KERBEROS-5 authentication
: Practical UNIX & Internet Security, 17.3.21.3. The xhost facility
- Mitnick, Kevin
: Practical UNIX & Internet Security, 27.2.6. Network Providers that Network Too Well
- mixed multipart subtype
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- mknod command
: TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- mkpasswd program
: Practical UNIX & Internet Security, 8.8.4. Password Generators
- mktemp function
: Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- mobile network computing
: Practical UNIX & Internet Security, 8.7. One-Time Passwords
- mobile systems, requirements of
: TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- Mockapetris, Paul
- DNS & BIND, 1.2.1. The History of the Domain Name System
- DNS & BIND, 1.4. The History of BIND
- DNS & BIND, A. DNS Message Format and Resource Records
- mode command
: TCP/IP Network Administration, 6.3.2. Dial-Up PPP
- modem pools
: Building Internet Firewalls, 10.6. Terminal Servers and Modem Pools
- modems
- Practical UNIX & Internet Security, 14. Telephone Security
- Practical UNIX & Internet Security, 14.6. Additional Security for Modems
- TCP/IP Network Administration, 1.7. Application Layer
- (see also Automatic Call Unit)
- asynchronous
: TCP/IP Network Administration, 5.3.1.2. Pseudo-device
- callback setups
- Practical UNIX & Internet Security, 14.4.2.
- Practical UNIX & Internet Security, 14.6. Additional Security for Modems
- carrier-detect (DCD) indicator, monitoring
: TCP/IP Network Administration, 6.3.3. chat
- checking configuration of
: TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- clogging
: Practical UNIX & Internet Security, 25.3.4. Clogging
- documentation
: TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- encrypting
: Practical UNIX & Internet Security, 14.6. Additional Security for Modems
- hanging up
: (see signals)
- high-speed dial-up
: TCP/IP Network Administration, 6.2. TCP/IP Over a Serial Line
- physical security of
- Practical UNIX & Internet Security, 14.5.4. Physical Protection of Modems
- Practical UNIX & Internet Security, 14.6. Additional Security for Modems
- recording call information
: Practical UNIX & Internet Security, 10.3.1. aculog File
- synchronous
: TCP/IP Network Administration, 5.3.1.2. Pseudo-device
- tracing connections
- Practical UNIX & Internet Security, 24.2.4. Tracing a Connection
- Practical UNIX & Internet Security, 24.2.4.2. How to contact the system administrator of a computer
- UNIX and
- Practical UNIX & Internet Security, 14.5. Modems and UNIX
- Practical UNIX & Internet Security, 14.5.3.3. Privilege testing
- modes
- daemon
: sendmail, 4.1.1. Daemon Mode (-bd)
- delivery
: sendmail, 13.2.3. The Default Delivery Mode
- sendmail operating
: sendmail, 36.7. Alphabetized Reference
- TempFileMode option
- sendmail, 13.2.4. The Default File Permissions
- sendmail, 22.8.3.7. The TempFileMode option
- modification times
- Practical UNIX & Internet Security, 5.1.2. Inodes
- Practical UNIX & Internet Security, 5.1.5. File Times
- Practical UNIX & Internet Security, 7.4.7. inode Modification Times
- Practical UNIX & Internet Security, 9.2.2. Checklists and Metadata
- modifying Internet services
: Building Internet Firewalls, 5.8.3. Installing and Modifying Services
- modules, loadable
: TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- monitoring
- automatically
: Building Internet Firewalls, 5.9.2. Consider Writing Software to Automate Monitoring
- hardware for
: (see detectors)
- intruders
: Practical UNIX & Internet Security, 24.2.3. Monitoring the Intruder
- name servers
- DNS & BIND, 7.6. Keeping Everything Running Smoothly
- (see also administration; performance)
- Practical UNIX & Internet Security, 13.2.3. Performance Reviews and Monitoring
- security
: (see logs/logging)
- software
- TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- TCP/IP Network Administration, 12.4.3. Automated Monitoring
- system usage
- Building Internet Firewalls, 12.2. Monitoring Your System
- TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- users
: Practical UNIX & Internet Security, 26.2.6. Other Tips
- monitors and screen savers
: Practical UNIX & Internet Security, 12.3.5.2. X screen savers
- more command
: TCP/IP Network Administration, 8.4. Using nslookup
- Morris worm
: Building Internet Firewalls, 8.1. Electronic Mail
- Morris, Robert T.
- Practical UNIX & Internet Security, 1. Introduction
- Practical UNIX & Internet Security, 8.6. The UNIX Encrypted Password System
- Practical UNIX & Internet Security, 17.4. Security Implications of Network Services
- Mosaic
- Building Internet Firewalls, 2.5. The World Wide Web
- TCP/IP Network Administration, 13.1. The World Wide Web
- motd file
: Practical UNIX & Internet Security, 26.2.6. Other Tips
- Motorola, Inc.
: Practical UNIX & Internet Security, F.3.4.20. Motorola, Inc.
- mount command
- Practical UNIX & Internet Security, 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
- Practical UNIX & Internet Security, 20.3. Client-Side NFS Security
- TCP/IP Network Administration, 9.1.3.1. The mount command
- mount daemon (mountd)
- Building Internet Firewalls, 5.8.2.4. Which services should you disable?
- TCP/IP Network Administration, 9.1.1. NFS Daemons
- mount point
: TCP/IP Network Administration, 9.1.3.1. The mount command
- mounted filesystems
- Building Internet Firewalls, 5.8.4.3. Mount filesystems as read-only
- Practical UNIX & Internet Security, 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
- TCP/IP Network Administration, 9.1.3. Mounting Remote Filesystems
- (see also directories)
- mounting directory
: TCP/IP Network Administration, 9.1. The Network File System
- mpeg video subtype
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- mqueue directory
: (see queue directory)
- mqueue temporary files
: TCP/IP Network Administration, 10.5.4. The Set Option Command
- MR records
: DNS & BIND, A.1.2.9. MR mail rename - experimental
- mrand48 function
: Practical UNIX & Internet Security, 23.7.3. drand48 ( ), lrand48 ( ), and mrand48 ( )
- mrouter
- Building Internet Firewalls, 6.3.3.5. IP over IP
- Building Internet Firewalls, 8.9.3. The Multicast Backbone (MBONE)
- MRU (maximum receive unit)
: TCP/IP Network Administration, A.2. The PPP Daemon
- ${ms} macro
: sendmail, D.1. Sun Enhancements
- msgid= equate (syslog output)
: sendmail, 26.1.3.5. msgid= the Message-ID: identifier
- MTAs
- Building Internet Firewalls, 8.1. Electronic Mail
- sendmail, 1.1. MUA Versus MTA
- sendmail, 5.3.1. Mail Delivery Agents
- sendmail, 6.2. Define a Mail Delivery Agent
- sendmail, 30. Delivery Agents
- (see also M configuration command)
- $# operator and
- sendmail, 9.2.1. The Delivery Agent ($#)
- sendmail, 28.6.5. Specify a Delivery Agent: $#
- advantages to sendmail
: sendmail, 18.1. To Use or Not to Use
- choosing
- sendmail, 9. Rule Set 0
- sendmail, 9.5. Things to Try
- declaring
: sendmail, 19.3.2. MAILER()
- default
: sendmail, 34.8. Alphabetized Reference
- equates for
: sendmail, 30.4. The Equates
- for errors
: sendmail, 9.4. The error Delivery Agent
- expensive
- sendmail, 23.6.1. Periodically with -q
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 34.8. Alphabetized Reference
- flags
- sendmail, 6.3. The local Delivery Agent
- sendmail, 6.4. Add the Missing Parts to Mhub
- sendmail, 14.2. Headers Versus Delivery Agent Flags
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 35.4. ?flags? in Header Definitions
- ignoring MX records
: sendmail, 21.3.5. What? They Ignore MX Records?
- local
- sendmail, 6.3. The local Delivery Agent
- sendmail, 19.6. Alphabetized m4 Macros
- logging
: sendmail, 26.1.3.4. mailer= the delivery agent used
- printing list of
: sendmail, 38.4.2. Show Delivery Agents with =M
- as recipients
: sendmail, 30.8. Alphabetized F= Flags
- scripts via
: sendmail, 24.3. Write a Delivery Agent Script
- statistics
: (see statistics)
- symbolic name
: sendmail, 30.2. The Symbolic Name
- testing
: sendmail, 38.5.6. Try a Delivery Agent with /try
- UUCP
: sendmail, 19.4.6. UUCP
- mtime
- Practical UNIX & Internet Security, 5.1.2. Inodes
- Practical UNIX & Internet Security, 5.1.5. File Times
- Practical UNIX & Internet Security, 9.2.2. Checklists and Metadata
- Practical UNIX & Internet Security, 24.4.1.6. Changes to startup files
- MTU (maximum transmission unit)
- Building Internet Firewalls, C.5.1.3. Fragmenting datagrams
- TCP/IP Network Administration, 1.5.1.3. Fragmenting datagrams
- TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- TCP/IP Network Administration, 6.1.2. Checking the Interface with ifconfig
- TCP/IP Network Administration, 6.1.5.4. Maximum transmission unit
- TCP/IP Network Administration, A.1. Dial-Up IP
- determining smallest
: TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- MUAs (mail user agents)
- sendmail, 1.1. MUA Versus MTA
- sendmail, 36.7. Alphabetized Reference
- (see also delivery agents)
- MUDs (Multiuser Dungeons)
: Practical UNIX & Internet Security, 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
- Muffet, Alec
: Practical UNIX & Internet Security, 10.5.3.1. Beware false log entries
- Multicast Backbone
: (see MBONE)
- multicast groups
: Practical UNIX & Internet Security, 16.2.1.2. Classical network addresses
- multicast IP
: Building Internet Firewalls, 6.3.3.5. IP over IP
- multicasting
- Building Internet Firewalls, 8.9.3. The Multicast Backbone (MBONE)
- TCP/IP Network Administration, 6.1.2. Checking the Interface with ifconfig
- TCP/IP Network Administration, 6.1.5.5. Point-to-point
- addresses
- TCP/IP Network Administration, 2.2.1. Address Classes
- TCP/IP Network Administration, 2.2.2.1. Final notes on IP addresses
- TCP/IP Network Administration, 2.6. Address Resolution
- TCP/IP Network Administration, 7.4.2. RIP Version 2
- routing, support for
- TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- TCP/IP Network Administration, 5.3.1.1. Options
- Multichannel Memorandum Distribution Facility (MMDF)
: TCP/IP Network Administration, 10. sendmail
- multicharacter
- names
: (see names)
- options
: (see options, sendmail)
- MULTICS (Multiplexed Information and Computing Service)
: Practical UNIX & Internet Security, 1.3. History of UNIX
- multidirectional connections
: Building Internet Firewalls, 7.4.2. Unidirectional Versus Multidirectional
- multihomed
- hosts
- DNS & BIND, 4.2.4. NS Records
- DNS & BIND, 4.2.5. Address and Alias Records
- DNS & BIND, 10.5. Name Server Address Sorting
- Building Internet Firewalls, C.5.1.2. Routing datagrams
- TCP/IP Network Administration, 5.3.1.1. Options
- TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
- architecture of
: TCP/IP Network Administration, 12.7. Firewalls
- security
- Practical UNIX & Internet Security, 1.3. History of UNIX
- Practical UNIX & Internet Security, 2.4.4.7. Defend in depth
- Practical UNIX & Internet Security, 2.5.3. Final Words: Risk Management Means Common Sense
- Practical UNIX & Internet Security, 17.2. Controlling Access to Servers
- site
: TCP/IP Network Administration, 4.3.1. Obtaining an autonomous system number
- multimedia mail
: (see email)
- multipart content type
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- multipart encryption
: (see encryption)
- multipart messages
: (see messages)
- multiple
- recipients
: sendmail, 30.8. Alphabetized F= Flags
- SMTP connections
: sendmail, 34.8. Alphabetized Reference
- timeouts
: sendmail, 34.8. Alphabetized Reference
- multiplexing
- TCP/IP Network Administration, 2.1. Addressing, Routing, and Multiplexing
- TCP/IP Network Administration, 2.7. Protocols, Ports, and Sockets
- Multipurpose Internet Mail Extensions
: (see MIME)
- multitasking
- Practical UNIX & Internet Security, 1.4. Security and UNIX
- Practical UNIX & Internet Security, C.1.3.3. Process priority and niceness
- multiuser operating systems
: Practical UNIX & Internet Security, 1.4. Security and UNIX
- multiuser workstations
: Practical UNIX & Internet Security, 17.3.21.1. etc/fbtab and /etc/logindevperm
- munitions export
: Practical UNIX & Internet Security, 26.4.1. Munitions Export
- MustQuoteChars option
: sendmail, 34.8. Alphabetized Reference
- mutual data infection
: DNS & BIND, 13.6.8.3. Mutual infection
- MX records
- DNS & BIND, 5.1. MX Records
- DNS & BIND, 15.3. A Limitation of MX Records
- DNS & BIND, A.1.2.10. MX mail exchanger
- Building Internet Firewalls, 8.10.5.1. Set up a `fake'
- Practical UNIX & Internet Security, 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
- sendmail, 15.3. MX Records
- sendmail, 18.8. Alphabetized Reference
- sendmail, 21.3. Set Up MX Records
- sendmail, 34.8. Alphabetized Reference
- sendmail, 38.5.2. Look Up MX Records with /mx
- TCP/IP Network Administration, 8.3.2. Standard Resource Records
- TCP/IP Network Administration, 8.3.6. The named.hosts File
- TCP/IP Network Administration, 8.4. Using nslookup
- TCP/IP Network Administration, 10.7.1. Modifying Local Information
- TCP/IP Network Administration, C.3.1.4. Mail exchanger record
- 0 flag
: sendmail, 30.8. Alphabetized F= Flags
- bestmx database class
: sendmail, 33.8. Alphabetized Reference
- bestmx_is_local feature
: sendmail, 19.6. Alphabetized m4 Macros
- email and firewalls
: DNS & BIND, 15.4.4.7. Mail from internal hosts to the Internet
- fallback MX host
: sendmail, 34.8. Alphabetized Reference
- ignored by delivery agents
: sendmail, 21.3.5. What? They Ignore MX Records?
- looking up for addresses
: sendmail, 21.2.3. Look Up Addresses for Delivery
- offsite hosts
: sendmail, 21.5.1. Offsite MX Hosts
- performance limitation of
: DNS & BIND, 15.3. A Limitation of MX Records
- queries statistic
: DNS & BIND, 7.6.2. Understanding the BIND Statistics
- routing loops
: DNS & BIND, 5.3. The MX Algorithm
- RT records vs.
: DNS & BIND, 15.7.3. X25, ISDN, and RT
- sendmail and
: DNS & BIND, 6.3.2. Electronic Mail
- with wildcards
: sendmail, 21.3.4. Wildcard MX Records
- /mx rule-testing command
: sendmail, 38.5.2. Look Up MX Records with /mx
- MYNAME= command
: Practical UNIX & Internet Security, 15.5.2. Permissions Commands
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
O'Reilly & Associates, Inc.
All Rights Reserved.