start page | rating of books | rating of authors | reviews | copyrights
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: L
- L command (sendmail.cf)
- sendmail, D.1. Sun Enhancements
- sendmail, D.4. L and G Configuration Commands
- l flag : sendmail, 30.8. Alphabetized F= Flags
- L flag : sendmail, 30.8. Alphabetized F= Flags
- $l macro : (see UnixFromLine option)
- $L macro : sendmail, 31.10. Alphabetized Reference
- l option : (see UseErrorsTo (l) option)
- L option : (see LogLevel (L) option)
- L-devices file : Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
- L.cmds file : Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution
- L.sys file : Practical UNIX & Internet Security, 15.3.3. Security of L.sys and Systems Files
- L= equate
- sendmail, 18.8. Alphabetized Reference
- sendmail, 30.4. The Equates
- LA_TYPE macro : sendmail, 18.8. Alphabetized Reference
- labeling the system : Building Internet Firewalls, 13.5.2. Labeling and Diagraming Your System
- laboratory networks : Building Internet Firewalls, 4.4.1. Laboratory Networks
- Lai, Xuejia : Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- laid-off employees : Practical UNIX & Internet Security, 13.2.6. Departure
- LaMacchia, Brian : Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
- LANs (local area networks)
- Practical UNIX & Internet Security, 16.1. Networking
- Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
- TCP/IP Network Administration, 1.7. Application Layer
- (see also Ethernet)
- applications : TCP/IP Network Administration, 3.7.1. File Sharing
- proprietary : TCP/IP Network Administration, 3.7.1. File Sharing
- servers : TCP/IP Network Administration, 3. Network Services
- LAN-oriented service : Building Internet Firewalls, 5.6. Selecting Services Provided by the
- Lance Ethernet Interface : TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- laptop computers
- Practical UNIX & Internet Security, 12.2.6.3. Portables
- TCP/IP Network Administration, 11.2. Diagnostic Tools
- large transmission window size : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- last connection time : sendmail, B.1. Status file lines
- last program
- Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts
- Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
- Practical UNIX & Internet Security, 10.1.3. last Program
- Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file
- Practical UNIX & Internet Security, 15.3.1. Assigning Additional UUCP Logins
- TCP/IP Network Administration, 12.4.2.2. Checking login activity
- -f option : Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file
- lastcomm program
- Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File
- Practical UNIX & Internet Security, 10.2.2. Accounting with BSD
- lastlog file : Practical UNIX & Internet Security, 10.1.1. lastlog File
- laws
- Practical UNIX & Internet Security, 26. Computer Security and U.S. Law
- Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
- backups and : Practical UNIX & Internet Security, 7.1.7. Legal Issues
- checklist for : Practical UNIX & Internet Security, A.1.1.25. Chapter 26: Computer Security and U.S. Law
- copyright
- Practical UNIX & Internet Security, 9.2.1. Comparison Copies
- Practical UNIX & Internet Security, 26.4.2. Copyright Infringement
- Practical UNIX & Internet Security, 26.4.2.1. Software piracy and the SPA
- criminal prosecution
- Practical UNIX & Internet Security, 26.2. Criminal Prosecution
- Practical UNIX & Internet Security, 26.2.7. A Final Note on Criminal Actions
- documentation of incidents : Building Internet Firewalls, 13.1.7. Document the Incident
- Electronic Communications Privacy Act (ECPA) : Practical UNIX & Internet Security, 26.2.3. Federal Computer Crime Laws
- encryption
- Practical UNIX & Internet Security, 6.7. Encryption and U.S. Law
- Practical UNIX & Internet Security, 6.7.2. Cryptography and Export Controls
- Practical UNIX & Internet Security, 12.2.6.3. Portables
- enforcement agencies : Practical UNIX & Internet Security, 14.4.4.1. Kinds of eavesdropping
- export
- Practical UNIX & Internet Security, 6.4.4.1. Use and export of DES
- Practical UNIX & Internet Security, 6.7.2. Cryptography and Export Controls
- Practical UNIX & Internet Security, 26.4.1. Munitions Export
- federal enforcement
- Practical UNIX & Internet Security, 26.2.2. Federal Jurisdiction
- Practical UNIX & Internet Security, 26.2.3. Federal Computer Crime Laws
- indecent material : Practical UNIX & Internet Security, 26.4.5. Pornography and Indecent Material
- liability
- Practical UNIX & Internet Security, 26.4. Other Liability
- Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
- monitoring keystrokes : Practical UNIX & Internet Security, 24.2.3. Monitoring the Intruder
- non-citizen access : Practical UNIX & Internet Security, 26.4.1. Munitions Export
- patents : Practical UNIX & Internet Security, 26.4.4. Patent Concerns
- for portable computers : Practical UNIX & Internet Security, 12.2.6.3. Portables
- pursuing intruders : Building Internet Firewalls, 13.3. Pursuing and Capturing the
- resources on : Practical UNIX & Internet Security, D.1.1. Other Computer References
- search warrants
- Practical UNIX & Internet Security, 26.2.4. Hazards of Criminal Prosecution
- Practical UNIX & Internet Security, 26.2.5. If You or One of Your Employees Is a Target
- security responsibilities : Building Internet Firewalls, 11.2.3. External Factors That Influence
- smoking : Practical UNIX & Internet Security, 12.2.1.2. Smoke
- state and local enforcement : Practical UNIX & Internet Security, 26.2.1. The Local Option
- trademarks : Practical UNIX & Internet Security, 26.4.3. Trademark Violations
- vendor liability : Practical UNIX & Internet Security, 18.5.2. Trusting Your Software Vendor
- lawsuits (civil) : Practical UNIX & Internet Security, 26.3. Civil Actions
- layering firewalls : Building Internet Firewalls, 3.2. Defense in Depth
- layers
- TCP/IP Network Administration, 1.2. A Data Communications Model
- TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
- LCP (Link Control Protocol)
- TCP/IP Network Administration, 6.2.1. The Serial Protocols
- TCP/IP Network Administration, A.2. The PPP Daemon
- LD_LIBRARY_PATH variable : sendmail, 22.2. The Environment
- LDAPMAP macro : sendmail, 18.8. Alphabetized Reference
- ldapx database class : sendmail, 33.8. Alphabetized Reference
- LDOPTS= directive : sendmail, 18.4.4. LDOPTS=
- leased telephone lines : Practical UNIX & Internet Security, 14.5.4. Physical Protection of Modems
- leases on addresses : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- default-lease-time : TCP/IP Network Administration, 9.5.1. dhcpd.conf
- renewing : TCP/IP Network Administration, 9.4.2. BOOTP extensions
- least privilege
- Building Internet Firewalls, 3.1. Least Privilege
- Building Internet Firewalls, 9.1.4.1. Least privilege
- Building Internet Firewalls, 9.2.3.1. Least privilege
- Practical UNIX & Internet Security, 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve
- Practical UNIX & Internet Security, 13.2.5. Least Privilege and Separation of Duties
- Lee, Ying-Da : Practical UNIX & Internet Security, 22.4. SOCKS
- legal : (see laws)
- Lesk, Mike
- Practical UNIX & Internet Security, 1.3. History of UNIX
- Practical UNIX & Internet Security, 15.2. Versions of UUCP
- level, debugging : sendmail, 4.3. Debugging (-d)
- level, logging : (see logs/logging)
- level, version : (see versions)
- level, warning
- sendmail, 26.1.1. syslog(3)
- sendmail, 26.1.2. Tuning syslog.conf
- LHS, rule
- sendmail, 8.4. Rules
- sendmail, 8.7.1. Other Text in the LHS
- sendmail, 28.5. The LHS
- (see also rule sets)
- class macros in : sendmail, 12.1.3. Class Macros in the LHS
- wildcards for : (see wildcard operators)
- liability, legal
- Practical UNIX & Internet Security, 26.4. Other Liability
- Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
- /lib directory : Practical UNIX & Internet Security, 11.5.3.6. Other files
- LIBDIRS= directive : sendmail, 18.4.5. LIBDIRS=
- libresolv.a : sendmail, 18.5.1. Use libresolv.a
- LIBS= directive : sendmail, 18.4.6. LIBS=
- libwrap.a package
- sendmail, 18.8. Alphabetized Reference
- sendmail, 22.4.1. Accept/Reject Connections via libwrap.a
- license agreements : Practical UNIX & Internet Security, 18.5.2. Trusting Your Software Vendor
- comparison copies and : Practical UNIX & Internet Security, 9.2.1. Comparison Copies
- lie-detector tests : Practical UNIX & Internet Security, 13.1. Background Checks
- life, queue messages : sendmail, 13.2.2. Limit the Life of Queued Messages
- lightning
- Practical UNIX & Internet Security, 12.2. Protecting Computer Hardware
- Practical UNIX & Internet Security, 12.2.1.9. Lightning
- Lightweight Directory Access Protocol (LDAP)
- sendmail, 18.8. Alphabetized Reference
- sendmail, 33.8. Alphabetized Reference
- limit command : Practical UNIX & Internet Security, 25.2.5. Soft Process Limits: Preventing Accidental Denial
- Limit command (<Directory>) : Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
- limited user access : Practical UNIX & Internet Security, 8.1.5.1. Limited users
- limited_masquerade feature : sendmail, 19.6. Alphabetized m4 Macros
- limiting
- DHCP servers : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- number of processable messages : sendmail, 23.5. How the Queue Is Processed
- queue message lifetime
- sendmail, 13.2.2. Limit the Life of Queued Messages
- sendmail, 34.8. Alphabetized Reference
- line length
- sendmail, 30.4. The Equates
- sendmail, 30.8. Alphabetized F= Flags
- line length restriction : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- Line Printer (LP) print service, in Solaris : TCP/IP Network Administration, 9.2.2. Solaris Line Printer Service
- Link Control Protocol (LCP)
- TCP/IP Network Administration, 6.2.1. The Serial Protocols
- TCP/IP Network Administration, A.2. The PPP Daemon
- link-level encryption : Building Internet Firewalls, 10.5.1. At What Level Do You Encrypt?
- link-level security : Practical UNIX & Internet Security, 16.3.1. Link-level Security
- link-state
- database : TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- routing protocols
- TCP/IP Network Administration, 7.4. Interior Routing Protocols
- TCP/IP Network Administration, 7.4.2. RIP Version 2
- Link-State Advertisements (LSAs)
- TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- TCP/IP Network Administration, B.8.1. The ospf Statement
- links
- encryption of : Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire
- link-level security : Practical UNIX & Internet Security, 16.3.1. Link-level Security
- static : Practical UNIX & Internet Security, 23.4. Tips on Writing SUID/SGID Programs
- symbolic, following (Web)
- Practical UNIX & Internet Security, 18.2.2.2. Additional configuration issues
- Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
- lint program : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- LINUX operating system
- Practical UNIX & Internet Security, 1.3. History of UNIX
- Practical UNIX & Internet Security, 3.3. Entering Your Password
- Practical UNIX & Internet Security, 23.1.2.1. What they found
- TCP/IP Network Administration, UNIX Versions
- TCP/IP Network Administration, 4.7. netconfig
- TCP/IP Network Administration, 10.2. Running sendmail as a Daemon
- ext2 filesystem : Practical UNIX & Internet Security, 25.2.2.6. Reserved space
- ifconfig command on
- TCP/IP Network Administration, 6.1.2. Checking the Interface with ifconfig
- TCP/IP Network Administration, 6.1.5.3. Metric
- kernel configuration : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- of PPP : TCP/IP Network Administration, 6.3. Installing PPP
- random number generators : Practical UNIX & Internet Security, 23.7.4. Other random number generators
- remounting filesystems on : TCP/IP Network Administration, 9.1.3.2. The vfstab and fstab files
- sharing directories on : TCP/IP Network Administration, 9.1.2.2. The /etc/exports file
- source directory : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- linux.mc macro control file : TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros
- linux.smtp.cf file
- TCP/IP Network Administration, 10.4.2. General sendmail.cf Structure
- TCP/IP Network Administration, 10.7. Modifying a sendmail.cf File
- list-bounce alias : sendmail, 25.5.3. A list-bounced Alias
- list-of-lists : TCP/IP Network Administration, 13.5. Mailing Lists
- list precedence : sendmail, 14.4. Precedence
- list syntax : (see mailing lists)
- List:; form addresses
- sendmail, 17.1.2.1. A rule to handle List:;
- sendmail, 17.3. Rule Set 0
- ListProcessor package : sendmail, 25.6.3. ListProcessor
- lists, old-style address : sendmail, 13.2.7. Accept Old-Style Lists of Addresses
- LISTSERV : TCP/IP Network Administration, 13.5. Mailing Lists
- literals : TCP/IP Network Administration, 10.6.2. Transforming the Address
- Live Script : Practical UNIX & Internet Security, 18.5.2. Trusting Your Software Vendor
- Livingston routers : Building Internet Firewalls, 6.5. Conventions for Packet Filtering
- *LK* keyword : TCP/IP Network Administration, 12.2.1. The Shadow Password File
- load : (see performance)
- local
- aliases : sendmail, 24.1.2. Local Must Be Local
- area networks (LANs)
- Practical UNIX & Internet Security, 16.1. Networking
- Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
- authentication (NIS+) : Practical UNIX & Internet Security, 19.5.4. Using NIS+
- canonical name
- sendmail, 21.2.1. Determine the Local Canonical Name
- sendmail, 31.10. Alphabetized Reference
- checking if host is : sendmail, 17.2.1. Is the Host Local?
- delivery : sendmail, 30.8. Alphabetized F= Flags
- delivery agent
- sendmail, 6.3. The local Delivery Agent
- sendmail, 30.2.1. Required Symbolic Names
- sendmail, 30.8. Alphabetized F= Flags
- domains, list of : sendmail, 32.5. Alphabetized Reference
- gateways : (see gateways)
- law enforcement : Practical UNIX & Internet Security, 26.2.1. The Local Option
- newsgroups : Building Internet Firewalls, 2.4. Usenet News
- recipients
- sendmail, 3.2. Role in Local Delivery
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 29.6.3. Delivering to Local Recipient
- server, local delivery on : sendmail, 19.6. Alphabetized m4 Macros
- storage
- Practical UNIX & Internet Security, 12.3.4. Protecting Local Storage
- Practical UNIX & Internet Security, 12.3.4.5. Function keys
- users
- Practical UNIX & Internet Security, 15.4.1.2. USERFILE entries for local users
- sendmail, 20.2.1. Accept Mail Only From Our Domain
- sendmail, 31.10. Alphabetized Reference
- UUCP handling : sendmail, 29.6.5. Handling UUCP Locally
- LOCAL_CONFIG macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
- LOCAL_NET_CONFIG macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
- local_procmail feature : sendmail, 19.6. Alphabetized m4 Macros
- LOCAL_RELAY macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
- LOCAL_REPLAY macro (m4) : sendmail, 31.10. Alphabetized Reference
- LOCAL_RULE macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
- LOCAL_RULE_# macros (m4) : sendmail, 19.6. Alphabetized m4 Macros
- LOCAL_RULESETS macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
- LOCAL_USER macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
- LOCALDOMAIN variable : TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
- localhost
- TCP/IP Network Administration, 3.2. The Host Table
- TCP/IP Network Administration, 7.2. The Minimal Routing Table
- TCP/IP Network Administration, 8.3.4. The named.local File
- LOCALRES environmental variable : TCP/IP Network Administration, 11.6.4. dig: An Alternative to nslookup
- lock daemon (lockd) : TCP/IP Network Administration, 9.1.1. NFS Daemons
- lock file : sendmail, 23.2.3. The Lock File (obsolete as of V5.62): lf
- lock program : Practical UNIX & Internet Security, 12.3.5.2. X screen savers
- lock requests : (see files, lock requests, handling)
- locked accounts : Practical UNIX & Internet Security, 3.3. Entering Your Password
- locking files : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- log files and logging
- Building Internet Firewalls, 5.8.1.4. Safeguard the system logs
- Building Internet Firewalls, 8.11. syslog
- Building Internet Firewalls, 13.5.4. Keeping Activity Logs
- Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
- Practical UNIX & Internet Security, 10. Auditing and Logging
- Practical UNIX & Internet Security, 10.8. Managing Log Files
- Practical UNIX & Internet Security, 11.5.3.5. System initialization files
- Practical UNIX & Internet Security, 21.5. Special Considerations
- Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- sendmail, 13.2.6. The Default Logging Level
- sendmail, 18.8. Alphabetized Reference
- sendmail, 26.1. Logging with syslog
- sendmail, 36.7. Alphabetized Reference
- (see also syslog)
- access_log
- Practical UNIX & Internet Security, 10.3.5. access_log Log File
- Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
- across networks : Practical UNIX & Internet Security, 10.5.2.2. Logging across the network
- aculog : Practical UNIX & Internet Security, 10.3.1. aculog File
- agent_log file : Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
- archiving information : Practical UNIX & Internet Security, 7.4.2. Simple Archives
- backups and
- Building Internet Firewalls, 5.10.2. Do Secure Backups
- Practical UNIX & Internet Security, 10.2.2. Accounting with BSD
- breakins : Practical UNIX & Internet Security, 24.1.2. Rule #2: DOCUMENT
- C2 audit : Practical UNIX & Internet Security, 10.1. The Basic Log Files
- checklist for : Practical UNIX & Internet Security, A.1.1.9. Chapter 10: Auditing and Logging
- creating with SOCKS : Building Internet Firewalls, 7.6. Using SOCKS for
- critical messages
- Practical UNIX & Internet Security, 10.5.3. syslog Messages
- Practical UNIX & Internet Security, 10.5.3.1. Beware false log entries
- documenting incidents : Building Internet Firewalls, 13.1.7. Document the Incident
- downloaded files
- Practical UNIX & Internet Security, 10.3.3. xferlog Log File
- Practical UNIX & Internet Security, 10.3.5. access_log Log File
- of dropped packets : Building Internet Firewalls, 6.9. Where to Do Packet Filtering
- failed su attempts : Practical UNIX & Internet Security, 4.3.7. The Bad su Log
- file format : Practical UNIX & Internet Security, 8.2. Monitoring File Format
- files transferred by FTP : Practical UNIX & Internet Security, 10.3.3. xferlog Log File
- to hardcopy device : Practical UNIX & Internet Security, 10.5.2.1. Logging to a printer
- individual users
- Practical UNIX & Internet Security, 10.4. Per-User Trails in the Filesystem
- Practical UNIX & Internet Security, 10.4.3. Network Setup
- lastlog : Practical UNIX & Internet Security, 10.1.1. lastlog File
- managing : Practical UNIX & Internet Security, 10.8. Managing Log Files
- manually logging
- Practical UNIX & Internet Security, 10.7. Handwritten Logs
- Practical UNIX & Internet Security, 10.7.2.2. Informational material
- memory required for
- Building Internet Firewalls, 12.1.3. Managing Your Disk Space
- Building Internet Firewalls, 12.2.2. What Should You Watch For?
- mistyped passwords : Practical UNIX & Internet Security, 10.5.3. syslog Messages
- network services : Practical UNIX & Internet Security, 10.3.6. Logging Network Services
- outgoing mail : Practical UNIX & Internet Security, 10.4.2. Mail
- per-machine : Practical UNIX & Internet Security, 10.7.2. Per-Machine Logs
- per-site : Practical UNIX & Internet Security, 10.7.1. Per-Site Logs
- potentially criminal activity : Practical UNIX & Internet Security, 26.2.6. Other Tips
- proxy services and : Building Internet Firewalls, 7.1.1.2. Proxy services are good at logging
- refer_log file : Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
- of router actions : Building Internet Firewalls, 6.4.1. Logging Actions
- sulog : (see sulog file)
- Swatch program
- Practical UNIX & Internet Security, 10.6. Swatch: A Log File Tool
- Practical UNIX & Internet Security, 10.6.2. The Swatch Configuration File
- Practical UNIX & Internet Security, E.4.9. Swatch
- syslog facility
- Practical UNIX & Internet Security, 10.5. The UNIX System Log (syslog) Facility
- Practical UNIX & Internet Security, 10.5.3.1. Beware false log entries
- sendmail, 26.1.1. syslog(3)
- system clock and : Practical UNIX & Internet Security, 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
- tracking intruders with : Practical UNIX & Internet Security, 24.3. The Log Files: Discovering an Intruder's
- trimlog program for : Building Internet Firewalls, B.6.5. trimlog
- unexpectedly deleted or modified : Building Internet Firewalls, 12.2.3. The Good, the Bad, and the Ugly
- /usr/adm/messages : Practical UNIX & Internet Security, 10.2.3. messages Log File
- utmp and wtmp
- Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
- Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file
- UUCP : Practical UNIX & Internet Security, 10.3.4. uucp Log Files
- /var/adm/acct : Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File
- /var/adm/loginlog : Practical UNIX & Internet Security, 10.1.4. loginlog File
- of web servers : Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
- what to watch for : Building Internet Firewalls, 12.2.2. What Should You Watch For?
- what not to log : Practical UNIX & Internet Security, 10.5.3. syslog Messages
- -X switch for : sendmail, 26.4. Log Transactions with -X
- xferlog : Practical UNIX & Internet Security, 10.3.3. xferlog Log File
- LOG macro : sendmail, 18.8. Alphabetized Reference
- LOG_MAIL : (see facility, mail-handling program)
- LOG_PID : sendmail, 26.1.1. syslog(3)
- logdaemon package : Practical UNIX & Internet Security, 17.3.18.5. Searching for .rhosts files
- logger command : Practical UNIX & Internet Security, 10.5.3. syslog Messages
- logging in
- Practical UNIX & Internet Security, C.5. Starting Up UNIX and Logging In
- Practical UNIX & Internet Security, C.5.3. Running the User's Shell
- FTP access without : Practical UNIX & Internet Security, 17.3.2.7. Allowing only FTP access
- Kerberos system : Practical UNIX & Internet Security, 19.6.1.1. Initial login
- last program
- Practical UNIX & Internet Security, 10.1.3. last Program
- Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file
- lastlog file : Practical UNIX & Internet Security, 10.1.1. lastlog File
- passwords : Practical UNIX & Internet Security, 3.3. Entering Your Password
- preventing
- Practical UNIX & Internet Security, 8.4. Managing Dormant Accounts
- Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts
- remotely : TCP/IP Network Administration, 1.7. Application Layer
- restricting : Practical UNIX & Internet Security, 8.3. Restricting Logins
- with Secure RPC : Practical UNIX & Internet Security, 19.3.3. Using Secure RPC
- startup file attacks
- Practical UNIX & Internet Security, 11.5.2. Start-up File Attacks
- Practical UNIX & Internet Security, 11.5.2.7. Other initializations
- logging out with Secure RPC[logging out:Secure RPC] : Practical UNIX & Internet Security, 19.3.3. Using Secure RPC
- loghost : TCP/IP Network Administration, 3.2. The Host Table
- logic bombs
- Practical UNIX & Internet Security, 11.1. Programmed Threats: Definitions
- Practical UNIX & Internet Security, 11.1.3. Logic Bombs
- Practical UNIX & Internet Security, 27.2.2. Viruses on the Distribution Disk
- login activity, checking : TCP/IP Network Administration, 12.4.2.2. Checking login activity
- .login file
- Practical UNIX & Internet Security, 8.5.1. Secure Terminals
- Practical UNIX & Internet Security, 11.5.2.1. .login, .profile, /etc/profile
- Practical UNIX & Internet Security, 24.4.1.6. Changes to startup files
- login program
- Practical UNIX & Internet Security, 8.6. The UNIX Encrypted Password System
- Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
- Practical UNIX & Internet Security, 19.5.4. Using NIS+
- Practical UNIX & Internet Security, 26.2.6. Other Tips
- Practical UNIX & Internet Security, 27.1.2. Trusting Trust
- logindevperm file : Practical UNIX & Internet Security, 17.3.21.1. /etc/fbtab and /etc/logindevperm
- loginlog file : Practical UNIX & Internet Security, 10.1.4. loginlog File
- logins
- authentication : Practical UNIX & Internet Security, 17.3.5. TACACS (UDP Port 49)
- FTP : Practical UNIX & Internet Security, 17.3.2. (FTP) File Transfer Protocol (TCP Ports 20 and 21)
- remote : Building Internet Firewalls, 2.3. Remote Terminal Access and Command
- successful, from unexpected site : Building Internet Firewalls, 12.2.3. The Good, the Bad, and the Ugly
- UUCP, additional : Practical UNIX & Internet Security, 15.3.1. Assigning Additional UUCP Logins
- logins command
- Practical UNIX & Internet Security, 8.1.1. Accounts Without Passwords
- Practical UNIX & Internet Security, 8.2. Monitoring File Format
- LogLevel (L) option
- sendmail, 13.2.6. The Default Logging Level
- sendmail, 22.8.3.3. The LogLevel option
- sendmail, 26.1.1. syslog(3)
- sendmail, 34.8. Alphabetized Reference
- LogLevel variable for : sendmail, 20.1.2. Global Variables
- LOGNAME= command
- Practical UNIX & Internet Security, 15.5.1.3. A Sample Permissions file
- Practical UNIX & Internet Security, 15.5.2. Permissions Commands
- .logout file : Practical UNIX & Internet Security, 19.3.3. Using Secure RPC
- logs/logging
- Building Internet Firewalls, 5.8.1.4. Safeguard the system logs
- Building Internet Firewalls, 8.11. syslog
- Building Internet Firewalls, 13.5.4. Keeping Activity Logs
- Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
- Practical UNIX & Internet Security, 10. Auditing and Logging
- Practical UNIX & Internet Security, 10.8. Managing Log Files
- Practical UNIX & Internet Security, 11.5.3.5. System initialization files
- Practical UNIX & Internet Security, 21.5. Special Considerations
- Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- sendmail, 13.2.6. The Default Logging Level
- sendmail, 18.8. Alphabetized Reference
- sendmail, 26.1. Logging with syslog
- sendmail, 36.7. Alphabetized Reference
- (see also syslog)
- access_log
- Practical UNIX & Internet Security, 10.3.5. access_log Log File
- Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
- across networks : Practical UNIX & Internet Security, 10.5.2.2. Logging across the network
- aculog : Practical UNIX & Internet Security, 10.3.1. aculog File
- agent_log file : Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
- archiving information : Practical UNIX & Internet Security, 7.4.2. Simple Archives
- backups and
- Building Internet Firewalls, 5.10.2. Do Secure Backups
- Practical UNIX & Internet Security, 10.2.2. Accounting with BSD
- breakins : Practical UNIX & Internet Security, 24.1.2. Rule #2: DOCUMENT
- C2 audit : Practical UNIX & Internet Security, 10.1. The Basic Log Files
- checklist for : Practical UNIX & Internet Security, A.1.1.9. Chapter 10: Auditing and Logging
- creating with SOCKS : Building Internet Firewalls, 7.6. Using SOCKS for
- critical messages
- Practical UNIX & Internet Security, 10.5.3. syslog Messages
- Practical UNIX & Internet Security, 10.5.3.1. Beware false log entries
- documenting incidents : Building Internet Firewalls, 13.1.7. Document the Incident
- downloaded files
- Practical UNIX & Internet Security, 10.3.3. xferlog Log File
- Practical UNIX & Internet Security, 10.3.5. access_log Log File
- of dropped packets : Building Internet Firewalls, 6.9. Where to Do Packet Filtering
- failed su attempts : Practical UNIX & Internet Security, 4.3.7. The Bad su Log
- file format : Practical UNIX & Internet Security, 8.2. Monitoring File Format
- files transferred by FTP : Practical UNIX & Internet Security, 10.3.3. xferlog Log File
- to hardcopy device : Practical UNIX & Internet Security, 10.5.2.1. Logging to a printer
- individual users
- Practical UNIX & Internet Security, 10.4. Per-User Trails in the Filesystem
- Practical UNIX & Internet Security, 10.4.3. Network Setup
- lastlog : Practical UNIX & Internet Security, 10.1.1. lastlog File
- managing : Practical UNIX & Internet Security, 10.8. Managing Log Files
- manually logging
- Practical UNIX & Internet Security, 10.7. Handwritten Logs
- Practical UNIX & Internet Security, 10.7.2.2. Informational material
- memory required for
- Building Internet Firewalls, 12.1.3. Managing Your Disk Space
- Building Internet Firewalls, 12.2.2. What Should You Watch For?
- mistyped passwords : Practical UNIX & Internet Security, 10.5.3. syslog Messages
- network services : Practical UNIX & Internet Security, 10.3.6. Logging Network Services
- outgoing mail : Practical UNIX & Internet Security, 10.4.2. Mail
- per-machine : Practical UNIX & Internet Security, 10.7.2. Per-Machine Logs
- per-site : Practical UNIX & Internet Security, 10.7.1. Per-Site Logs
- potentially criminal activity : Practical UNIX & Internet Security, 26.2.6. Other Tips
- proxy services and : Building Internet Firewalls, 7.1.1.2. Proxy services are good at logging
- refer_log file : Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
- of router actions : Building Internet Firewalls, 6.4.1. Logging Actions
- sulog : (see sulog file)
- Swatch program
- Practical UNIX & Internet Security, 10.6. Swatch: A Log File Tool
- Practical UNIX & Internet Security, 10.6.2. The Swatch Configuration File
- Practical UNIX & Internet Security, E.4.9. Swatch
- syslog facility
- Practical UNIX & Internet Security, 10.5. The UNIX System Log (syslog) Facility
- Practical UNIX & Internet Security, 10.5.3.1. Beware false log entries
- sendmail, 26.1.1. syslog(3)
- system clock and : Practical UNIX & Internet Security, 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
- tracking intruders with : Practical UNIX & Internet Security, 24.3. The Log Files: Discovering an Intruder's
- trimlog program for : Building Internet Firewalls, B.6.5. trimlog
- unexpectedly deleted or modified : Building Internet Firewalls, 12.2.3. The Good, the Bad, and the Ugly
- /usr/adm/messages : Practical UNIX & Internet Security, 10.2.3. messages Log File
- utmp and wtmp
- Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
- Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file
- UUCP : Practical UNIX & Internet Security, 10.3.4. uucp Log Files
- /var/adm/acct : Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File
- /var/adm/loginlog : Practical UNIX & Internet Security, 10.1.4. loginlog File
- of web servers : Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
- what to watch for : Building Internet Firewalls, 12.2.2. What Should You Watch For?
- what not to log : Practical UNIX & Internet Security, 10.5.3. syslog Messages
- -X switch for : sendmail, 26.4. Log Transactions with -X
- xferlog : Practical UNIX & Internet Security, 10.3.3. xferlog Log File
- long distance service
- Practical UNIX & Internet Security, 14.5.4. Physical Protection of Modems
- Practical UNIX & Internet Security, 17.3.3. TELNET (TCP Port 23)
- looking up database keys : sendmail, 20.3. Alphabetized V8.8 Subroutines
- lookups, DNS
- Building Internet Firewalls, 8.10.1. Packet Filtering Characteristics of
- Building Internet Firewalls, 8.10.4.2. Mismatched data between the hostname
- loopback
- address
- Building Internet Firewalls, C.9. The IP Address
- TCP/IP Network Administration, 2.2.2.1. Final notes on IP addresses
- TCP/IP Network Administration, 3.2. The Host Table
- TCP/IP Network Administration, 8.3.4. The named.local File
- devices : TCP/IP Network Administration, 5.3.1.2. Pseudo-device
- domain : TCP/IP Network Administration, 8.3.1.1. Configuring a caching-only nameserver
- files : TCP/IP Network Administration, 8.1.1. BIND Configurations
- interface
- TCP/IP Network Administration, 4.7. netconfig
- TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- TCP/IP Network Administration, 6.1.5.6. Putting ifconfig in the startup files
- route
- TCP/IP Network Administration, 2.5. The Routing Table
- TCP/IP Network Administration, 7.2. The Minimal Routing Table
- TCP/IP Network Administration, 12.7.2. Routing control
- loops
- forwarding : sendmail, 25.7.2. Forwarding Loops
- in HELO command : sendmail, 30.8. Alphabetized F= Flags
- in rule sets : sendmail, 28.6.2. Rewrite Once Prefix: $:
- losses, cost of preventing
- Practical UNIX & Internet Security, 2.3. Cost-Benefit Analysis
- Practical UNIX & Internet Security, 2.3.4. Convincing Management
- LOTUS_NOTES_HACK macro : sendmail, 18.8. Alphabetized Reference
- lowest-cost path : TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- lp (user) : Practical UNIX & Internet Security, 4.1. Users and Groups
- lp directory : TCP/IP Network Administration, 9.2.2. Solaris Line Printer Service
- lp printing system : Building Internet Firewalls, 2.14. Printing Systems
- configuring : Building Internet Firewalls, 8.17. Printing Protocols (lpr and lp)
- lpd (Line Printer Daemon)
- Practical UNIX & Internet Security, 17.3.18.6. /etc/hosts.lpd file
- TCP/IP Network Administration, 9.2. Line Printer Daemon
- commands, listed : TCP/IP Network Administration, 9.2.1.2. Using LPD
- lpr printing system
- Building Internet Firewalls, 2.14. Printing Systems
- TCP/IP Network Administration, 3.7.2. Print Services
- TCP/IP Network Administration, 9.2.1.2. Using LPD
- configuring : Building Internet Firewalls, 8.17. Printing Protocols (lpr and lp)
- lpr server, IP address of : TCP/IP Network Administration, 9.4. A BOOTP Server
- lpsystem command : TCP/IP Network Administration, 9.2.2. Solaris Line Printer Service
- lrand48 function : Practical UNIX & Internet Security, 23.7.3. drand48 ( ), lrand48 ( ), and mrand48 ( )
- ls command
- Practical UNIX & Internet Security, 5.1.4. Using the ls Command
- Practical UNIX & Internet Security, 5.1.5. File Times
- Practical UNIX & Internet Security, 9.2.2. Checklists and Metadata
- TCP/IP Network Administration, 8.4. Using nslookup
- TCP/IP Network Administration, 11.6. Checking Name Service
- -c option
- Practical UNIX & Internet Security, 5.1.5. File Times
- Practical UNIX & Internet Security, 24.4.1.6. Changes to startup files
- -d option : Practical UNIX & Internet Security, 9.2.2.1. Simple listing
- -e option : Practical UNIX & Internet Security, 5.2.5.1. AIX Access Control Lists
- -F option : Practical UNIX & Internet Security, 5.1.4. Using the ls Command
- -g option : Practical UNIX & Internet Security, 5.1.4. Using the ls Command
- -H option
- Practical UNIX & Internet Security, 5.9.2. Context-Dependent Files
- Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
- -i option : Practical UNIX & Internet Security, 9.2.2.1. Simple listing
- -l option
- Practical UNIX & Internet Security, 5.1.4. Using the ls Command
- Practical UNIX & Internet Security, 5.2.5.1. AIX Access Control Lists
- Practical UNIX & Internet Security, 5.5.1. SUID, SGID, and Sticky Bits
- Practical UNIX & Internet Security, 24.4.1.6. Changes to startup files
- -q option : Practical UNIX & Internet Security, 5.4. Using Directory Permissions
- -u option : Practical UNIX & Internet Security, 5.1.5. File Times
- lsacl command : Practical UNIX & Internet Security, 5.2.5.2. HP-UX access control lists
- lsof program : Practical UNIX & Internet Security, 25.2.2.7. Hidden space
- lstat function : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- Lucifer algorithm
- Practical UNIX & Internet Security, 6.4.4. DES
- Practical UNIX & Internet Security, 6.4.4.3. DES strength
- LUCIFER cipher : Practical UNIX & Internet Security, 6.4.4. DES
- LUSER-RELAY macro (m4)
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 31.10. Alphabetized Reference
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.