start page | rating of books | rating of authors | reviews | copyrights
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: U
- u flag : sendmail, 30.8. Alphabetized F= Flags
- U flag : sendmail, 30.8. Alphabetized F= Flags
- U line (host status file) : sendmail, B.1. Status file lines
- $u macro
- sendmail, 6.3. The local Delivery Agent
- sendmail, 7.3. Predefined Macros
- sendmail, 31.10. Alphabetized Reference
- $U macro : sendmail, 31.10. Alphabetized Reference
- u option : (see DefaultUser (u,g) option)
- U option : (see UserDatabaseSpec (U) option)
- -U switch (sendmail) : sendmail, 36.7. Alphabetized Reference
- U= equate
- sendmail, 30.3.1. Tuning Without an Appropriate Keyword
- sendmail, 30.4. The Equates
- sendmail, 30.8. Alphabetized F= Flags
- UDB_DEFAULT_SPEC macro : sendmail, 18.8. Alphabetized Reference
- UDP (User Datagram Protocol)
- Building Internet Firewalls, 6.3.3.2. UDP
- Building Internet Firewalls, C.6.1. User Datagram Protocol
- Practical UNIX & Internet Security, 16.2.4.3. UDP
- Practical UNIX & Internet Security, 17.1.3. The /etc/inetd Program
- TCP/IP Network Administration, 1.2. A Data Communications Model
- TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
- TCP/IP Network Administration, 1.6. Transport Layer
- (see also network services)
- checksum errors in : TCP/IP Network Administration, 5.3.1.1. Options
- packet relayer
- Building Internet Firewalls, 7.6. Using SOCKS for
- Building Internet Firewalls, B.4.3. UDP Packet Relayer
- Practical UNIX & Internet Security, E.4.15. UDP Packet Relayer
- ufsdump : (see dump/restore program)
- UIDs (user identifiers)
- Practical UNIX & Internet Security, 4.1. Users and Groups
- Practical UNIX & Internet Security, 4.1.2. Multiple Accounts with the Same UID
- TCP/IP Network Administration, 5.4. The Internet Daemon
- assume specified : sendmail, 30.8. Alphabetized F= Flags
- real versus effective
- Practical UNIX & Internet Security, 4.3.1. Real and Effective UIDs
- Practical UNIX & Internet Security, C.1.3.2. Process real and effective UID
- RPC requests and : Practical UNIX & Internet Security, 19.2.2.2. AUTH_UNIX
- running agent as : sendmail, 30.4. The Equates
- su command and : Practical UNIX & Internet Security, 10.1.2.1. su commandutmp and wtmp files andsu
- of web servers : Practical UNIX & Internet Security, 18.2.1. The Server's UID
- zero : (see root account/user; superusers)
- UK Defense Research Agency : Practical UNIX & Internet Security, F.3.4.37. UK Defense Research Agency
- ulimit command : Practical UNIX & Internet Security, 25.2.5. Soft Process Limits: Preventing Accidental Denial
- Ultrix : Practical UNIX & Internet Security, 1.3. History of UNIX
- trusted path : Practical UNIX & Internet Security, 8.5.3.1. Trusted path
- UUCP : Practical UNIX & Internet Security, 15.4.1.3. Format of USERFILE entry without system name
- umask
- Practical UNIX & Internet Security, 5.3. The umask
- Practical UNIX & Internet Security, 5.3.2. Common umask Values
- Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts
- umount command : TCP/IP Network Administration, 9.1.3.1. The mount command
- uname system call : sendmail, 18.8. Alphabetized Reference
- unattended terminals
- Practical UNIX & Internet Security, 12.3.5. Unattended Terminals
- Practical UNIX & Internet Security, 12.3.5.2. X screen savers
- unauthenticated users : TCP/IP Network Administration, 9.1.5. NFS Authentication Server
- unavailable resource error : sendmail, 36.5.9. EX_UNAVAILABLE A Resource
- "Unbalanced" warning : sendmail, 28.1.2. Rules Are Treated Like Addresses
- undeliverable addresses in aliases : sendmail, 4.1.4. Verify Mode (-bv)
- undivert command (m4) : sendmail, 19.1.4. m4 diversions
- unexpected, dealing with the : TCP/IP Network Administration, 11. Troubleshooting TCP/IP
- unicasting
- Building Internet Firewalls, 8.9.3. The Multicast Backbone (MBONE)
- TCP/IP Network Administration, 2.2.2.1. Final notes on IP addresses
- (see also addresses)
- unidirectional connections : Building Internet Firewalls, 7.4.2. Unidirectional Versus Multidirectional
- uniformity : sendmail, 18.2. Vendor Versus Compiling
- uninterruptable power supply (UPS)
- Practical UNIX & Internet Security, 2.2. Risk Assessment
- Practical UNIX & Internet Security, 12.2.1.1. Fire
- United States Department of Energy : Practical UNIX & Internet Security, F.3.4.12. France
- United States Department of the Navy : Practical UNIX & Internet Security, F.3.4.44. U.S. Department of the Navy
- United States law : (see laws)
- United States Naval Research Laboratory (NRL) : TCP/IP Network Administration, 12.2.4. OPIE
- United States Secret Service
- Practical UNIX & Internet Security, 26.2.2. Federal Jurisdiction
- Practical UNIX & Internet Security, F.3.3. U.S. Secret Service
- Unisys : Practical UNIX & Internet Security, F.3.4.39. Unisys
- universal participation : Building Internet Firewalls, 3.6. Universal Participation
- universal resource locators (URLs) : TCP/IP Network Administration, 13.1. The World Wide Web
- universes : Practical UNIX & Internet Security, 5.9.1. Dual Universes
- UNIX
- Building Internet Firewalls, 5.3.1. What Operating System?
- Practical UNIX & Internet Security, 1. Introduction
- add-on functionality of : Practical UNIX & Internet Security, 1.4.3. Add-On Functionality Breeds Problems
- checksum programs
- Building Internet Firewalls, 5.8.5.3. About checksums for auditing
- (see also checksums)
- computers : TCP/IP Network Administration, Audience
- conventional passwords : Practical UNIX & Internet Security, 3.2.6. Conventional UNIX Passwords
- DAC (Discretionary Access Controls) : Practical UNIX & Internet Security, 4.1.3. Groups and Group Identifiers (GIDs)
- DNS under : Practical UNIX & Internet Security, 16.2.6.1. DNS under UNIX
- encryption programs for
- Practical UNIX & Internet Security, 6.6. Encryption Programs Available for UNIX
- Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
- error numbers : sendmail, B.1. Status file lines
- exit status : sendmail, B.1. Status file lines
- filesystem
- Practical UNIX & Internet Security, 5. The UNIX Filesystem
- Practical UNIX & Internet Security, 5.10. Summary
- history of : Practical UNIX & Internet Security, 1.3. History of UNIX
- kernels : TCP/IP Network Administration, 4.2.2. Defining the Subnet Mask
- mailbox file : sendmail, 3.2.1. Delivery to a Mailbox
- modems and
- Practical UNIX & Internet Security, 14.5. Modems and UNIX
- Practical UNIX & Internet Security, 14.5.3.3. Privilege testing
- networking and : Practical UNIX & Internet Security, 16.1.2. Networking and UNIX
- primary network services
- Practical UNIX & Internet Security, 17.3. Primary UNIX Network Services
- Practical UNIX & Internet Security, 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
- process scheduler
- Practical UNIX & Internet Security, C.1.3.3. Process priority and niceness
- (see also processes)
- programming references : Practical UNIX & Internet Security, D.1.11. UNIX Programming and System Administration
- published resources for : Practical UNIX & Internet Security, D.1. UNIX Security References
- security and
- Building Internet Firewalls, A.3.4. BugTraq
- Practical UNIX & Internet Security, 1.4. Security and UNIX
- Practical UNIX & Internet Security, 1.4.3. Add-On Functionality Breeds Problems
- services : TCP/IP Network Administration, 2.7.2. Port Numbers
- signals : Practical UNIX & Internet Security, C.3. Signals
- starting up
- Practical UNIX & Internet Security, C.5. Starting Up UNIX and Logging In
- Practical UNIX & Internet Security, C.5.3. Running the User's Shell
- systems
- TCP/IP Network Administration, Foreword from the First Edition
- TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
- TCP/IP Network Administration, 7.4.1. Routing Information Protocol
- TCP/IP Network Administration, 7.5.3. Choosing a Routing Protocol
- installation scripts for : TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- vendor, for security information : TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
- versions of
- Practical UNIX & Internet Security, 1.3. History of UNIX
- TCP/IP Network Administration, 3.2. The Host Table
- TCP/IP Network Administration, 6.1. The ifconfig Command
- viruses : (see viruses)
- web server on : Practical UNIX & Internet Security, 18.2. Running a Secure Server
- window system : Building Internet Firewalls, 2.13. Window Systems
- UNIX commands
- ability to use : TCP/IP Network Administration, 9.1. The Network File System
- r-commands
- TCP/IP Network Administration, 9.6. Managing Distributed Servers
- TCP/IP Network Administration, 12.2.5. Secure the r Commands
- disabling : TCP/IP Network Administration, 12.2.6. Secure Shell
- tar : TCP/IP Network Administration, 9.7.1. POP Server
- untar : TCP/IP Network Administration, 9.7.2. IMAP Server
- UnixFromLine option
- sendmail, 31.10. Alphabetized Reference
- sendmail, 34.8. Alphabetized Reference
- "unknown control line" message : sendmail, 5.1. Overview
- unknown host error message
- TCP/IP Network Administration, 11.3. Testing Basic Connectivity
- TCP/IP Network Administration, 11.6. Checking Name Service
- "Unknown host status version" message : sendmail, B.1. Status file lines
- unknown local users : sendmail, 31.10. Alphabetized Reference
- "unknown mailer" error : sendmail, 29.6. Rule Set 0
- unlinked files : Practical UNIX & Internet Security, 25.2.2.7. Hidden space
- unowned files : Practical UNIX & Internet Security, 24.4.1.8. Unowned files
- unpacking source code
- sendmail, 2.1. Get the Source
- sendmail, 18.3.1. What's Where in the Source
- unplugging connections : Practical UNIX & Internet Security, 24.2.5. Getting Rid of the Intruder
- unpredictability of randomness : Practical UNIX & Internet Security, 23.6. Tips on Generating Random Numbers
- unqualified
- addresses : sendmail, 16.5. Qualify All Addresses?
- names
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 31.10. Alphabetized Reference
- unquoted whitespace : sendmail, 13.2.8. The Unquoted Space Replacement Character
- unreachable destinations, detecting : TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
- Unreachable Port message : TCP/IP Network Administration, 11.5.2. Tracing Routes
- UnsafeGroupWrites option : sendmail, 34.8. Alphabetized Reference
- unused accounts
- removing from system : TCP/IP Network Administration, 12.2.2. Choosing a Password
- security problems with : TCP/IP Network Administration, 12.2.1. The Shadow Password File
- UPDATE messages : TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
- updating : TCP/IP Network Administration, 7.5.1. Exterior Gateway Protocol
- updating aliases file : sendmail, 4.1.3. Rebuild Aliases Mode (-bi)
- upgrades, logging : Practical UNIX & Internet Security, 10.7.2.1. Exception and activity reports
- upgrading sendmail : sendmail, 18.2. Vendor Versus Compiling
- uploading programs on HTTP server : Building Internet Firewalls, 8.6.3.1. What can a malicious client do to
- uploading stored information : Practical UNIX & Internet Security, 12.3.4. Protecting Local Storage
- UPS (uninterruptable power supply)
- Practical UNIX & Internet Security, 2.2. Risk Assessment
- Practical UNIX & Internet Security, 12.2.1.1. Fire
- uptime command : Practical UNIX & Internet Security, 8.1.3. Accounts That Run a Single Command
- urandom device : Practical UNIX & Internet Security, 23.7.4. Other random number generators
- URLs (universal resource locators)
- Building Internet Firewalls, 8.6. World Wide Web (WWW) and HTTP
- TCP/IP Network Administration, 13.1. The World Wide Web
- U.S. Department of Energy : Practical UNIX & Internet Security, F.3.4.12. France
- U.S. Department of the Navy : Practical UNIX & Internet Security, F.3.4.44. U.S. Department of the Navy
- U.S. law : (see laws)
- U.S. Naval Research Laboratory (NRL) : TCP/IP Network Administration, 12.2.4. OPIE
- U.S. Secret Service
- Practical UNIX & Internet Security, 26.2.2. Federal Jurisdiction
- Practical UNIX & Internet Security, F.3.3. U.S. Secret Service
- usage profile : Building Internet Firewalls, 5.9.1. Learn What the Normal Usage Profile Is
- use_ct_file feature : sendmail, 19.6. Alphabetized m4 Macros
- use_cw_file feature : sendmail, 19.6. Alphabetized m4 Macros
- UseErrorsTo (l) option : sendmail, 34.8. Alphabetized Reference
- Usenet news
- Practical UNIX & Internet Security, 17.3.13. Network News Transport Protocol (NNTP) (TCP Port
- Practical UNIX & Internet Security, E.2. Usenet Groups
- TCP/IP Network Administration, 13.5.1. Newsgroups
- TCP/IP Network Administration, E.3.5. MAILER
- (see also NNTP)
- cleanup scripts : Practical UNIX & Internet Security, 11.5.3. Abusing Automatic Mechanisms
- encryption for : (see ROT13 algorithm)
- newsgroups
- Building Internet Firewalls, 2.4. Usenet News
- TCP/IP Network Administration, 13.5.1. Newsgroups
- defamation/harassment via : Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
- keeping current : Building Internet Firewalls, 12.3.1.2. Newsgroups
- for security information : TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
- security resources via : Building Internet Firewalls, A.4. Newsgroups
- using
- TCP/IP Network Administration, 4.1.1. Network Contacts
- TCP/IP Network Administration, 13.5.1. Newsgroups
- posting breakins to : Practical UNIX & Internet Security, 24.6. Resuming Operation
- reporting security holes on : Practical UNIX & Internet Security, 2.5.1. Going Public
- USENIX Association : Building Internet Firewalls, A.6.1. USENIX Association
- user accounts on bastion host : Building Internet Firewalls, 5.7. Don't Allow User Accounts on the
- user authentication
- TCP/IP Network Administration, 9.3.2. NIS+
- TCP/IP Network Administration, 12.2. User Authentication
- User Database
- sendmail, 18.8. Alphabetized Reference
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 33.5. The User Database
- sendmail, 33.8. Alphabetized Reference
- sendmail, 34.8. Alphabetized Reference
- rewrite : sendmail, 30.8. Alphabetized F= Flags
- user database class : sendmail, 33.8. Alphabetized Reference
- User Datagram Protocol (UDP)
- Building Internet Firewalls, 6.3.3.2. UDP
- Building Internet Firewalls, C.6.1. User Datagram Protocol
- Practical UNIX & Internet Security, 16.2.4.3. UDP
- Practical UNIX & Internet Security, 17.1.3. The /etc/inetd Program
- TCP/IP Network Administration, 1.2. A Data Communications Model
- TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
- TCP/IP Network Administration, 1.6. Transport Layer
- (see also network services)
- checksum errors in : TCP/IP Network Administration, 5.3.1.1. Options
- packet relayer
- Building Internet Firewalls, 7.6. Using SOCKS for
- Building Internet Firewalls, B.4.3. UDP Packet Relayer
- Practical UNIX & Internet Security, E.4.15. UDP Packet Relayer
- user IDs : (see UIDs)
- "User unknown" message : sendmail, 4.2. Verbose (-v)
- UserDatabaseSpec (U) option
- sendmail, 18.8. Alphabetized Reference
- sendmail, 34.8. Alphabetized Reference
- userdb database class : sendmail, 33.8. Alphabetized Reference
- USERDB macro : sendmail, 18.8. Alphabetized Reference
- USERFILE file (UUCP)
- Practical UNIX & Internet Security, 15.4.1. USERFILE: Providing Remote File Access
- Practical UNIX & Internet Security, 15.4.2.1. Some bad examples
- usermod command
- Practical UNIX & Internet Security, 8.3. Restricting Logins
- Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts
- usernames : Practical UNIX & Internet Security, 3.1. Usernames
- aliases for : Practical UNIX & Internet Security, 8.8.9. Account Names Revisited: Using Aliases for Increased
- capitalization : sendmail, 30.8. Alphabetized F= Flags
- doubling as passwords (Joes) : Practical UNIX & Internet Security, 3.6.2. Smoking Joes
- last command and : Practical UNIX & Internet Security, 10.1.3. last Program
- as passwords : Practical UNIX & Internet Security, 8.8.3.1. Joetest: a simple password cracker
- recipient's : (see $u macro)
- special
- Practical UNIX & Internet Security, 4.2. Special Usernames
- Practical UNIX & Internet Security, 4.2.3. Impact of the /etc/passwd and /etc/group
- using someone else's
- Practical UNIX & Internet Security, 4.3. su: Changing Who You Claim to Be
- Practical UNIX & Internet Security, 4.3.8. Other Uses of su
- users
- Practical UNIX & Internet Security, 4. Users, Groups, and the Superuser
- Practical UNIX & Internet Security, 4.1. Users and Groups
- Practical UNIX & Internet Security, 4.1.2. Multiple Accounts with the Same UID
- (see also groups; su command)
- $: operator and
- sendmail, 9.2.3. The User ($:)
- sendmail, 9.3. Testing Rule Set 0
- sendmail, 29.6.1. Further Processing: $:user
- sendmail, 30.5.3. The $: Part
- sendmail, 33.4.1. Specify a Default with $:
- alias delivery to : sendmail, 24.2.1. Delivery to Users
- assigning passwords to : Practical UNIX & Internet Security, 8.8.1. Assigning Passwords to Users
- auditing who is logged in
- Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
- Practical UNIX & Internet Security, 10.1.2.1. su commandutmp and wtmp files andsu
- authentication for Web : Practical UNIX & Internet Security, 18.3.3. Setting Up Web Users and Passwords
- checklist for : Practical UNIX & Internet Security, A.1.1.2. Chapter 3: Users and Passwords
- dormant accounts and
- Practical UNIX & Internet Security, 8.4. Managing Dormant Accounts
- Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts
- errors by : Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
- .forward file : sendmail, 22.5.3. Permissions for ~/.forward Files
- groups : sendmail, 18.8. Alphabetized Reference
- identities of : (see also UIDs)
- default
- sendmail, 13.2.5. The Default User Identities
- sendmail, 22.8.3.1. The DefaultUser option
- sendmail, 34.8. Alphabetized Reference
- proving : Practical UNIX & Internet Security, 19.3.1.1. Proving your identity
- recognizing as intruders
- Practical UNIX & Internet Security, 24.2. Discovering an Intruder
- Practical UNIX & Internet Security, 24.2.6. Anatomy of a Break-in
- taking someone else's
- Practical UNIX & Internet Security, 4.3. su: Changing Who You Claim to Be
- Practical UNIX & Internet Security, 4.3.8. Other Uses of su
- importing to NIS server
- Practical UNIX & Internet Security, 19.4.1. Including or excluding specific accounts:
- Practical UNIX & Internet Security, 19.4.4.2. Using netgroups to limit the importing of accounts
- including oneself on mailing lists : sendmail, 34.8. Alphabetized Reference
- letting in threats : Practical UNIX & Internet Security, 11.4. Entry
- as LHS of alias : sendmail, 30.8. Alphabetized F= Flags
- limited : Practical UNIX & Internet Security, 8.1.5.1. Limited users
- local : sendmail, 31.10. Alphabetized Reference
- accepting mail from only : sendmail, 20.2.1. Accept Mail Only From Our Domain
- delivery to
- sendmail, 3.2. Role in Local Delivery
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 29.6.3. Delivering to Local Recipient
- sendmail, 30.8. Alphabetized F= Flags
- logging
- Practical UNIX & Internet Security, 10.4. Per-User Trails in the Filesystem
- Practical UNIX & Internet Security, 10.4.3. Network Setup
- mailing list instructions for : sendmail, 25.5.4. Users Ignore list-request
- marked with + : sendmail, 24.4.3. Plussed Users
- NIS passwords for : Practical UNIX & Internet Security, 19.3.2.1. Creating passwords for users
- nobody (Secure RPC) : Practical UNIX & Internet Security, 19.3.2.1. Creating passwords for users
- notifying about monitoring : Practical UNIX & Internet Security, 26.2.6. Other Tips
- passwords : (see passwd file; passwords)
- recipient of bounced mail : (see $n macro)
- restricting certain : Practical UNIX & Internet Security, 18.3. Controlling Access to Files on Your Server
- root : (see root account/user; superusers)
- running sendmail manually : sendmail, 1.4. Run sendmail by Hand
- security responsibilities : TCP/IP Network Administration, 12.1.3. Writing a Security Policy
- semiprivileged : sendmail, 22.5. Permissions
- sending messages to : Practical UNIX & Internet Security, 10.5.1. The syslog.conf Configuration File
- summarizing system usage by : Practical UNIX & Internet Security, 25.2.2.2. quot command
- tainting : Practical UNIX & Internet Security, 18.2.3.4. Tainting with Perl
- training : Practical UNIX & Internet Security, 13.2.1. Initial Training
- trusted
- sendmail, 5.3.10. Trusted Users
- sendmail, 14.6. Trusted User
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 22.8.1. Trusted Users
- sendmail, 32.5. Alphabetized Reference
- unattended terminals
- Practical UNIX & Internet Security, 12.3.5. Unattended Terminals
- Practical UNIX & Internet Security, 12.3.5.2. X screen savers
- unavailable : (see undeliverable addresses in aliases)
- USERFILE entries for : Practical UNIX & Internet Security, 15.4.1.2. USERFILE entries for local users
- verifying with SMTP : sendmail, 22.3.2. SMTP vrfy and expn
- www : Practical UNIX & Internet Security, 18.2.2. Understand Your Server's Directory Structure
- users command
- Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
- Practical UNIX & Internet Security, 24.2.1. Catching One in the Act
- USESETEUID macro : sendmail, 18.8. Alphabetized Reference
- USG (UNIX Support Group) : Practical UNIX & Internet Security, 1.3. History of UNIX
- /usr directory
- Practical UNIX & Internet Security, 4.3.7. The Bad su Log
- (see also /var directory)
- /usr/adm directory : Practical UNIX & Internet Security, 11.5.3.6. Other files
- /usr/adm/messages file, in security checks
- Practical UNIX & Internet Security, 10.2.3. messages Log File
- TCP/IP Network Administration, 12.4.2.2. Checking login activity
- /usr/adm/lastlog file : Practical UNIX & Internet Security, 10.1.1. lastlog File
- /usr/bin directory
- Practical UNIX & Internet Security, 11.1.5. Viruses
- Practical UNIX & Internet Security, 11.5.1.1. PATH attacks
- backing up : Practical UNIX & Internet Security, 7.1.2. What Should You Back Up?
- /usr/bin/uudecode : (see uudecode program)
- /usr/etc/bootpd file : TCP/IP Network Administration, 9.6.1. rdist
- /usr/etc/yp/makedbm program : Practical UNIX & Internet Security, 19.4.4.1. Setting up netgroups
- /usr/lib directory : Practical UNIX & Internet Security, 11.5.3.6. Other files
- in restricted filesystems : Practical UNIX & Internet Security, 8.1.5. Restricted Filesystem
- /usr/lib/aliases file : Practical UNIX & Internet Security, 11.5.3.3. /usr/lib/aliases, /etc/aliases,
- /usr/lib/preserve program : Practical UNIX & Internet Security, 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve
- /usr/lib/sendmail : (see sendmail)
- /usr/lib/uucp directory
- Practical UNIX & Internet Security, 15.4.2.1. Some bad examples
- Practical UNIX & Internet Security, 15.5.2. Permissions Commands
- /usr/lib/uucp/Devices file : Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
- /usr/lib/uucp/L-devices file : Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
- /usr/lib/uucp/L.cmds file : (see L.cmds file)
- /usr/lib/uucp/L.sys file : Practical UNIX & Internet Security, 15.3.3. Security of L.sys and Systems Files
- /usr/lib/uucp/Permissions file : (see Permissions file)
- /usr/lib/uucp/Systems file : Practical UNIX & Internet Security, 15.3.3. Security of L.sys and Systems Files
- /usr/lib/uucp/USERFILE file
- Practical UNIX & Internet Security, 15.4.1. USERFILE: Providing Remote File Access
- Practical UNIX & Internet Security, 15.4.2.1. Some bad examples
- /usr/local/bin directory
- Practical UNIX & Internet Security, 1.1. What Is Computer Security?
- Practical UNIX & Internet Security, 11.5.1.1. PATH attacks
- /usr/local/etc/http/logs directory : Practical UNIX & Internet Security, 10.3.5. access_log Log File
- /usr/local/lib directory : Practical UNIX & Internet Security, 11.5.3.6. Other files
- /usr/sbin/imapd file : TCP/IP Network Administration, 9.7.2. IMAP Server
- /usr/sbin/rexecd : (see rexec service)
- /usr/spool/cron/crontabs directory : Practical UNIX & Internet Security, 15.6.2. Automatic Execution of Cleanup Scripts
- /usr/spool/uucp directory : Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work
- /usr/spool/uucppublic : (see uucppublic directory)
- /usr/src/linux source directory : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- /usr/src/sys/i386/conf directory : TCP/IP Network Administration, 5.3. The BSD Kernel Configuration File
- /usr/tmp directory : sendmail, 18.8. Alphabetized Reference
- /usr/tmp/gated_dump file : TCP/IP Network Administration, B.1.1. Signal Processing
- /usr/ucb directory : Practical UNIX & Internet Security, 11.1.5. Viruses
- usrerr() : sendmail, 20.2.1. Accept Mail Only From Our Domain
- USRX command, in ESMTP : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- utility programs : Practical UNIX & Internet Security, 1.2. What Is an Operating System?
- utimes commandn : Practical UNIX & Internet Security, 24.5.1. Never Trust Anything Except Hardcopy
- utmp file
- Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
- Practical UNIX & Internet Security, 10.1.2.1. su commandutmp and wtmp files andsu
- Practical UNIX & Internet Security, 24.2.1. Catching One in the Act
- Practical UNIX & Internet Security, 24.2.4. Tracing a Connection
- uucheck program : Practical UNIX & Internet Security, 15.5.3. uucheck: Checking Your Permissions File
- uucico program
- Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work
- Practical UNIX & Internet Security, 15.3. UUCP and Security
- Practical UNIX & Internet Security, 15.5.1.1. Starting up
- UUCP (UNIX-to-UNIX Copy Protocol)
- Building Internet Firewalls, 2.2. File Transfer
- Practical UNIX & Internet Security, 4.1.2. Multiple Accounts with the Same UID
- Practical UNIX & Internet Security, 14.5. Modems and UNIX
- Practical UNIX & Internet Security, 15. UUCP
- Practical UNIX & Internet Security, 15.1.1. uucp Command
- Practical UNIX & Internet Security, 15.9. Summary
- Practical UNIX & Internet Security, 17.3.20. UUCP over TCP (TCP Port 540)
- sendmail, 3.3.2. UUCP
- sendmail, 8.1.4. UUCP and Host Paths
- sendmail, 19.6. Alphabetized m4 Macros
- TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
- TCP/IP Network Administration, 5.4. The Internet Daemon
- TCP/IP Network Administration, 10.5.8. Defining Mailers
- additional logins : Practical UNIX & Internet Security, 15.3.1. Assigning Additional UUCP Logins
- addresses
- sendmail, 17.1.4. UUCP Addresses
- sendmail, 17.4. Rule Set 4
- bang syntax : TCP/IP Network Administration, 10.7.1. Modifying Local Information
- BNU
- Practical UNIX & Internet Security, 15.2. Versions of UUCP
- Practical UNIX & Internet Security, 15.5. Security in BNU UUCP
- Practical UNIX & Internet Security, 15.5.3. uucheck: Checking Your Permissions File
- checklist for : Practical UNIX & Internet Security, A.1.1.14. Chapter 15: UUCP
- cleanup scripts
- Practical UNIX & Internet Security, 11.5.3. Abusing Automatic Mechanisms
- Practical UNIX & Internet Security, 15.6.2. Automatic Execution of Cleanup Scripts
- configuring : Building Internet Firewalls, 8.2.4. UNIX-to-UNIX
- early security problems : Practical UNIX & Internet Security, 15.7. Early Security Problems with UUCP
- eliminating support of : sendmail, 19.6. Alphabetized m4 Macros
- HoneyDanBer (HDB) : Practical UNIX & Internet Security, 15.2. Versions of UUCP
- $k macro : sendmail, 31.10. Alphabetized Reference
- local handling of : sendmail, 29.6.5. Handling UUCP Locally
- logging : Practical UNIX & Internet Security, 10.3.4. uucp Log Files
- m4 configuration options : sendmail, 19.4.6. UUCP
- macros for repays : sendmail, 31.10. Alphabetized Reference
- mail forwarding : Practical UNIX & Internet Security, 15.6.1. Mail Forwarding for UUCP
- naming computer : Practical UNIX & Internet Security, 15.5.2. Permissions Commands
- over networks : Practical UNIX & Internet Security, 15.8. UUCP Over Networks
- NFS server and : Practical UNIX & Internet Security, 15.3. UUCP and Security
- passwords for : Practical UNIX & Internet Security, 15.3.2. Establishing UUCP Passwords
- sites, serving
- TCP/IP Network Administration, E.3. m4 sendmail Macros
- TCP/IP Network Administration, E.3.5. MAILER
- system connected with : TCP/IP Network Administration, 10.5.3. The Define Class Command
- Taylor : Practical UNIX & Internet Security, 15.2. Versions of UUCP
- over TCP : Practical UNIX & Internet Security, 17.3.20. UUCP over TCP (TCP Port 540)
- Version 2
- Practical UNIX & Internet Security, 15.2. Versions of UUCP
- Practical UNIX & Internet Security, 15.4. Security in Version 2 UUCP
- Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution
- uucp (user)
- Practical UNIX & Internet Security, 4.1. Users and Groups
- Practical UNIX & Internet Security, 4.2.2. Other Special Users
- UUCP_RELAY macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
- UUCP-style lock files
- TCP/IP Network Administration, 6.3.4. PPP Daemon Security
- TCP/IP Network Administration, A.2. The PPP Daemon
- uucpa account : Practical UNIX & Internet Security, 15.3.1. Assigning Additional UUCP Logins
- uucpd program : Practical UNIX & Internet Security, 15.8. UUCP Over Networks
- uucpdomain feature : sendmail, 19.6. Alphabetized m4 Macros
- uucppublic directory
- Practical UNIX & Internet Security, 15.1.1. uucp Command
- Practical UNIX & Internet Security, 15.4.1.3. Format of USERFILE entry without system name
- Practical UNIX & Internet Security, 15.5.2. Permissions Commands
- UUCPSMTP macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
- uudecode program
- Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
- sendmail, 22.6. The Aliases File
- uuencode program
- Practical UNIX & Internet Security, 6.6.1.2. Ways of improving the security of crypt
- sendmail, 22.6. The Aliases File
- uux command
- Practical UNIX & Internet Security, 15.1.2. uux Command
- Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work
- uuxqt program : Practical UNIX & Internet Security, 15.4.1.3. Format of USERFILE entry without system name
- uuxqtcmds files : Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.