Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: W

w class
sendmail, 15.4. Hub Accepts Mail for Client
sendmail, 17.2.1. Is the Host Local?
sendmail, 29.6.3. Delivering to Local Recipient
sendmail, 32.5. Alphabetized Reference
w command
Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
Practical UNIX & Internet Security, 17.3.1. systat (TCP Port 11)
Practical UNIX & Internet Security, 24.2.1. Catching One in the Act
w flag : sendmail, 30.8. Alphabetized F= Flags
$w macro
sendmail, 7.3.1. The hostname
sendmail, 11.6. Handling user@thishost
sendmail, 21.2.1. Determine the Local Canonical Name
sendmail, 31.10. Alphabetized Reference
$W macro : sendmail, 31.10. Alphabetized Reference
w option : (see TryNullMXList (w) option)
WAIS (Wide Area Information Servers)
Building Internet Firewalls, 2.6. Other Information Services
Building Internet Firewalls, 8.7.2. Wide Area Information Servers
wait ogin> command : TCP/IP Network Administration, 6.3.2. Dial-Up PPP
wait-status : TCP/IP Network Administration, 5.4. The Internet Daemon
-Wall option (in C) : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
WANs (Wide Area Networks) : Practical UNIX & Internet Security, 16.1. Networking
"want recursion" string : DNS & BIND, 11.6.1. Seeing the Query and Response Packets
war : Practical UNIX & Internet Security, 12.2.5. Defending Against Acts of War and Terrorism
warning messages
sendmail, 26.1. Logging with syslog
(see also logs/logging)
ERRLIST_PREDEFINED macro : sendmail, 18.8. Alphabetized Reference
-f switch and : sendmail, 14.6. Trusted User
severity level
sendmail, 26.1.1. syslog(3)
sendmail, 26.1.2. Tuning syslog.conf
warrants
Practical UNIX & Internet Security, 26.2.4. Hazards of Criminal Prosecution
Practical UNIX & Internet Security, 26.2.5. If You or One of Your Employees Is a Target
water
Practical UNIX & Internet Security, 12.2.1.1. Fire
Practical UNIX & Internet Security, 12.2.1.11. Humidity
Practical UNIX & Internet Security, 12.2.1.12. Water
weakest link
Building Internet Firewalls, 3.4. Weakest Link
Building Internet Firewalls, 9.1.4.4. Weakest link
Building Internet Firewalls, 9.2.3.4. Weakest link
web : (see World Wide Web)
web browsers
Building Internet Firewalls, 2.5. The World Wide Web
Practical UNIX & Internet Security, 18.5. Risks of Web Browsers
Practical UNIX & Internet Security, 18.5.2. Trusting Your Software Vendor
TCP/IP Network Administration, 13.1. The World Wide Web
as FTP clients : Building Internet Firewalls, 8.2.1.1. Packet filtering characteristics of
as Gopher clients : (see Gopher)
MIME in : Building Internet Firewalls, 8.1.3. Multipurpose Internet Mail Extensions
Netscape Navigator
Building Internet Firewalls, 2.5. The World Wide Web
TCP/IP Network Administration, 13.1. The World Wide Web
encryption system of : Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire
random number generator : Practical UNIX & Internet Security, 23.8. Picking a Random Seed
web documents : (see HTML documents)
web servers
Practical UNIX & Internet Security, 18.2. Running a Secure Server
Practical UNIX & Internet Security, 18.2.5. Other Issues
access to files on
Practical UNIX & Internet Security, 18.3. Controlling Access to Files on Your Server
Practical UNIX & Internet Security, 18.3.3. Setting Up Web Users and Passwords
authentication users : Practical UNIX & Internet Security, 18.3.3. Setting Up Web Users and Passwords
.htaccess file bug : Practical UNIX & Internet Security, 18.3.1. The access.conf and .htaccess Files
log files : Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
Macintosh : Practical UNIX & Internet Security, 18.2. Running a Secure Server
multiple suppliers of : Practical UNIX & Internet Security, 18.6. Dependence on Third Parties
as superuser : Practical UNIX & Internet Security, 18.2.1. The Server's UID
symbolic-link following : Practical UNIX & Internet Security, 18.2.2.2. Additional configuration issues
Weiner, Michael : Practical UNIX & Internet Security, 6.4.4.3. DES strength
well-known ports
Building Internet Firewalls, C.12.3. Sockets
TCP/IP Network Administration, 2.7.3. Sockets
TCP/IP Network Administration, 3.6. Bootstrap Protocol
TCP/IP Network Administration, 11.4.4. Subdividing an Ethernet
Well-Known Services (WKS) resource records
TCP/IP Network Administration, 2.7. Protocols, Ports, and Sockets
TCP/IP Network Administration, C.3.1.8. Well-Known Services record
Westinghouse : Practical UNIX & Internet Security, F.3.4.46. Westinghouse Electric
wheel group
Practical UNIX & Internet Security, 4.1.3.1. The /etc/group file
Practical UNIX & Internet Security, 4.3.6. Restricting su
Practical UNIX & Internet Security, 8.5.2. The wheel Group
white pages : TCP/IP Network Administration, 13.6. The White Pages
whitespace
blank line at message end : sendmail, 30.8. Alphabetized F= Flags
continuation lines : sendmail, 27.4. Continuation Lines
in macros
sendmail, 7.1. Overview
sendmail, 31.3.2. Syntax of the Configuration File Macro's Text
old-style address lists : sendmail, 13.2.7. Accept Old-Style Lists of Addresses
in recipient lists : sendmail, 34.8. Alphabetized Reference
replacement character for space
sendmail, 13.2.8. The Unquoted Space Replacement Character
sendmail, 34.8. Alphabetized Reference
replacing in database keys : sendmail, 33.3.4.10. -s space replacement character (V8.7 and above)
in sendmail.cf file : sendmail, 27.2. Comments
space character : sendmail, 28.2.2. The Space Character Is Special
stripping newlines from "From:" headers : sendmail, 34.8. Alphabetized Reference
who command
Practical UNIX & Internet Security, 8.1.3. Accounts That Run a Single Command
Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
Practical UNIX & Internet Security, 17.3.1. systat (TCP Port 11)
Practical UNIX & Internet Security, 24.2.1. Catching One in the Act
Practical UNIX & Internet Security, 24.2.4. Tracing a Connection
TCP/IP Network Administration, 12.4.1. Know Your System
whodo command
Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
Practical UNIX & Internet Security, 24.2.1. Catching One in the Act
whois service
DNS & BIND, 3.2.1.1. whois
DNS & BIND, 3.2.4. Registering with Your Parent
Building Internet Firewalls, 2.7. Information About People
Building Internet Firewalls, 8.8.2. whois
Practical UNIX & Internet Security, 24.2.4.2. How to contact the system administrator of a computer
TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
TCP/IP Network Administration, 13.6. The White Pages
checking network registration : DNS & BIND, 3.2.3. Checking That Your Network Is Registered
Wide Area Information Servers
Building Internet Firewalls, 2.6. Other Information Services
Building Internet Firewalls, 8.7.2. Wide Area Information Servers
wide area networks (WANs)
Practical UNIX & Internet Security, 16.1. Networking
TCP/IP Network Administration, 3.7.1. File Sharing
TCP/IP Network Administration, 6.2. TCP/IP Over a Serial Line
TCP/IP Network Administration, 11.3.1. The ping Command
TCP/IP Network Administration, 11.4.4.1. Network hardware problems
wildcard MX records : sendmail, 21.3.4. Wildcard MX Records
wildcard operators
DNS & BIND, 15.2. Wildcards
DNS & BIND, 15.4.4.7. Mail from internal hosts to the Internet
sendmail, 8.7. Wildcard Operators
sendmail, 8.7.3. More Play with LHS Matching
sendmail, 28.2.1. $ Operators Are Tokens
sendmail, 28.5. The LHS
sendmail, 28.6. The RHS
(see also $ operators)
positional operators
sendmail, 9.2.3. The User ($:)
sendmail, 28.6.1. Copy by Position: $digit
WILDCARD_SHELL macro : sendmail, 18.8. Alphabetized Reference
WINCH signal
DNS & BIND, 7.1. BIND Name Server Signals
DNS & BIND, 7.6.1. Common Syslog Messages
DNS & BIND, 13.2.3. Logging Queries
window : TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
window of time : (see time and date)
window systems : Building Internet Firewalls, 2.13. Window Systems
X11 : (see X11 window system)
windows (glass) : Practical UNIX & Internet Security, 12.2.3.3. Glass walls
Windows 95 : DNS & BIND, 6.4.9. Windows 95
Windows NT : DNS & BIND, 6.4.10. Windows NT
windows servers : (see NSWS; X Window System)
WINS records, proprietary : DNS & BIND, 13.5.1. Zone Transfer Fails Because of Proprietary WINS Record
WINS servers : DNS & BIND, 15.9. DNS and WINS
wireless transmission : (see radio)
wiretaps : (see eavesdropping)
Wisner, Bill : DNS & BIND, 6.4.1.1. Modified resolvers
wiz command : Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
wizard's password (sendmail) : Practical UNIX & Internet Security, 17.3.4.1. sendmail and security
WKS resource records
DNS & BIND, A.1.2.16. WKS well-known services
TCP/IP Network Administration, 2.7. Protocols, Ports, and Sockets
TCP/IP Network Administration, C.3.1.8. Well-Known Services record
WN server : Practical UNIX & Internet Security, 18.3. Controlling Access to Files on Your Server
wordinclass() : sendmail, 20.3. Alphabetized V8.8 Subroutines
workspace
sendmail, 8.5. The Workspace
sendmail, 28.3. The Workspace
tokenizing : (see tokenization)
workstations, backing up : Practical UNIX & Internet Security, 7.2.1. Individual Workstation
world permissions : TCP/IP Network Administration, 9.1.5. NFS Authentication Server
World Wide Web (WWW)
Building Internet Firewalls, 2.5. The World Wide Web
Practical UNIX & Internet Security, 18. WWW Security
Practical UNIX & Internet Security, 18.7. Summary
TCP/IP Network Administration, 13.1. The World Wide Web
Archie access via : Building Internet Firewalls, 8.7.3.3. Providing Archie service to your
browsers : (see web browsers)
checklist for : Practical UNIX & Internet Security, A.1.1.17. Chapter 18: WWW Security
configuring : Building Internet Firewalls, 8.6. World Wide Web (WWW) and HTTP
documents on : (see HTML documents)
eavesdropping on
Practical UNIX & Internet Security, 18.4. Avoiding the Risks of Eavesdropping
Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
encrypting information on : Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire
HTTP : (see HTTP)
logging dowloaded files : Practical UNIX & Internet Security, 10.3.5. access_log Log File
MIME in : Building Internet Firewalls, 8.1.3. Multipurpose Internet Mail Extensions
posting breakins on : Practical UNIX & Internet Security, 24.6. Resuming Operation
resources for
Building Internet Firewalls, A.1. WWW Pages
Building Internet Firewalls, A.3.7. WWW-Security
Practical UNIX & Internet Security, E.3. WWW Pages
security mailing list : Practical UNIX & Internet Security, E.1.3.10. WWW-security
servers : (see Web servers)
trademarks and copyrights
Practical UNIX & Internet Security, 26.4.2. Copyright Infringement
Practical UNIX & Internet Security, 26.4.3. Trademark Violations
viruses through : Practical UNIX & Internet Security, 11.1.5. Viruses
world-readable file : TCP/IP Network Administration, 12.2.1. The Shadow Password File
world-writable files/directories : Practical UNIX & Internet Security, 11.6.1.1. World-writable user files and directories
Worm program
Practical UNIX & Internet Security, 1. Introduction
Practical UNIX & Internet Security, 23.1.1. The Lesson of the Internet Worm
worms
Practical UNIX & Internet Security, 11.1. Programmed Threats: Definitions
Practical UNIX & Internet Security, 11.1.6. Worms
wrappers
sendmail, 22.4.1. Accept/Reject Connections via libwrap.a
TCP/IP Network Administration, 12.5.1. wrapper
checklist for : Practical UNIX & Internet Security, A.1.1.21. Chapter 22: Wrappers and Proxies
tcpd : TCP/IP Network Administration, 5.4. The Internet Daemon
writable directories in anonymous FTP : Building Internet Firewalls, 8.2.1.6. Be careful of writable
write command
Practical UNIX & Internet Security, 5.5.3.1. write: Example of a possible SUID/SGID security
Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
in Swatch program : Practical UNIX & Internet Security, 10.6.2. The Swatch Configuration File
time-outs on : Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
write permission
Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail
Practical UNIX & Internet Security, 5.4. Using Directory Permissions
(see permissions)
backups : Practical UNIX & Internet Security, 7.1.6.2. Write-protect your backups
filesystems : Practical UNIX & Internet Security, 9.1.2. Read-only Filesystems
WRITE= command : Practical UNIX & Internet Security, 15.5.2. Permissions Commands
writing
passwords (on paper) : Practical UNIX & Internet Security, 3.6.5. Writing Down Passwords
programmed threats : Practical UNIX & Internet Security, 11.3. Authors
wrong answers : DNS & BIND, 13.6.3. Wrong or Inconsistent Answer
wtmp file
Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file
TCP/IP Network Administration, 12.4.2.2. Checking login activity
wtmpx file : Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
wuarchive daemon
Building Internet Firewalls, 8.2.1.4. Using the wuarchive
Building Internet Firewalls, B.5.1. wuarchive ftpd
wuftpd server : Practical UNIX & Internet Security, 17.3.2.4. Setting up an FTP server
WWW : (see World Wide Web)
www user/group : Practical UNIX & Internet Security, 18.2.2. Understand Your Server's Directory Structure
www.fugue.com/dhcp : TCP/IP Network Administration, D.1. Compiling dhcpd
www.internic.net : TCP/IP Network Administration, 13.4. Retrieving RFCs


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.