start page | rating of books | rating of authors | reviews | copyrights
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: V
- V configuration command
- sendmail, 5.2.1. Version
- sendmail, 27.5. The V Configuration Command
- sendmail, D. Sun Enhancements
- -v database switch : sendmail, 33.3.4.11. -v specify the value's column (V8.7 and above)
- V line (host status file) : sendmail, B.1. Status file lines
- V line (qf file) : sendmail, 23.9. The qf File Internals
- $v macro : sendmail, 31.10. Alphabetized Reference
- $V macro : sendmail, 31.10. Alphabetized Reference
- v option : (see Verbose (v) option)
- V option : (see FallbackMXhost (V) option)
- -v switch (makemap) : sendmail, 33.2.1.6. -v watch keys and data being added
- -v switch (sendmail)
- sendmail, 4.2. Verbose (-v)
- sendmail, 23.4.1. Printing the Queue in Verbose Mode
- sendmail, 23.6.2.2. Combine -v with -q
- sendmail, 36.7. Alphabetized Reference
- -V switch (sendmail) : sendmail, 36.7. Alphabetized Reference
- V.35 : TCP/IP Network Administration, 1.2. A Data Communications Model
- V8 sendmail : sendmail, 29.3.1. V8 Enhancements
- comments and : sendmail, 27.3. V8 Comments
- killing and restarting daemon : sendmail, 4.1.1.1. Kill and restart, beginning with V8.7
- m4 preprocessor : sendmail, 19. V8 m4 Configuration
- obtaining source code : sendmail, 2.1. Get the Source
- Sun Microsystem V8.8 enhancements : sendmail, D. Sun Enhancements
- vacation program : sendmail, 25.5.5. Precedence: bulk
- vacuums, computer : Practical UNIX & Internet Security, 12.2.1.3. Dust
- VALIDATE= command : Practical UNIX & Internet Security, 15.5.2. Permissions Commands
- validating firewalls : Building Internet Firewalls, 6.8.7. It Should Be Able to Log Accepted and
- vampire taps : Practical UNIX & Internet Security, 12.3.1.5. Fiber optic cable
- Van Jacobson header compression
- Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
- TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- TCP/IP Network Administration, 6.4.1. slattach
- disabling : TCP/IP Network Administration, A.2. The PPP Daemon
- vandalism
- Building Internet Firewalls, 1.2.2.2. Vandals
- Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
- Practical UNIX & Internet Security, 12.2.4. Vandalism
- Practical UNIX & Internet Security, 12.2.4.3. Network connectors
- /var directory
- Practical UNIX & Internet Security, 4.3.7. The Bad su Log
- Practical UNIX & Internet Security, 9.1.2. Read-only Filesystems
- (see also /usr directory)
- /var/adm directory : Practical UNIX & Internet Security, 11.5.3.6. Other files
- /var/adm/acct : Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File
- /var/adm/lastlog file : Practical UNIX & Internet Security, 10.1.1. lastlog File
- /var/adm/loginlog file : Practical UNIX & Internet Security, 10.1.4. loginlog File
- /var/adm/messages
- Practical UNIX & Internet Security, 10.2.3. messages Log File
- Practical UNIX & Internet Security, 4.3.7. The Bad su Log
- /var/adm/savacct : Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File
- /var/adm/sulog file : Practical UNIX & Internet Security, 4.3.7. The Bad su Log
- /var/adm/wtmp file
- Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
- Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file
- /var/adm/xferlog : Practical UNIX & Internet Security, 10.3.3. xferlog Log File
- /var/log directory : Practical UNIX & Internet Security, 11.5.3.6. Other files
- /var/run/dhcpd.pid file : TCP/IP Network Administration, D.2. The dhcpd Command
- /var/spool/mqueue temporary files : TCP/IP Network Administration, 10.5.4. The Set Option Command
- /var/spool/uucp/.Admin directory : Practical UNIX & Internet Security, 10.3.4. uucp Log Files
- /var/yp/Makefile file : sendmail, 7.3.1. The hostname
- variable-length subnet masks (VLSMs) : TCP/IP Network Administration, 4.2.2. Defining the Subnet Mask
- variables
- bounds checking : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- to CGI scripts : Practical UNIX & Internet Security, 18.2.3.1. Do not trust the user's browser!
- environment
- sendmail, 5.3.12. Environment variables
- sendmail, 22.2. The Environment
- global : sendmail, 20.1.2. Global Variables
- Vendor Extensions field, in BOOTP : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- vendors : Practical UNIX & Internet Security, 27.3.3. Your Vendor?
- liability of : Practical UNIX & Internet Security, 18.5.2. Trusting Your Software Vendor
- sendmail versions
- sendmail, 18.2. Vendor Versus Compiling
- sendmail, 27.5.1. The vendor
- (see also versions)
- vendor-neutral language : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- vendor-specific syntax : TCP/IP Network Administration, 10.5.1. The Version Level Command
- ventilation
- Practical UNIX & Internet Security, 12.2.1.10. Vibration
- (see also dust; smoke and smoking)
- air ducts : Practical UNIX & Internet Security, 12.2.3.2. Entrance through air ducts
- holes (in hardware) : Practical UNIX & Internet Security, 12.2.4.1. Ventilation holes
- VERB command (ESMTP) : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- VERB command (sendmail) : Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
- VERB command (SMTP) : sendmail, 30.8. Alphabetized F= Flags
- Verbose (v) option
- sendmail, 34.1.3. Appropriateness of Options
- sendmail, 34.8. Alphabetized Reference
- verbose mode
- sendmail, 4.2. Verbose (-v)
- sendmail, 23.4.1. Printing the Queue in Verbose Mode
- sendmail, 23.6.2.2. Combine -v with -q
- sendmail, 34.8. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- TCP/IP Network Administration, A.1. Dial-Up IP
- TCP/IP Network Administration, A.3. chat
- verify mode
- sendmail, 4.1.4. Verify Mode (-bv)
- sendmail, 36.7. Alphabetized Reference
- verifying : (see testing)
- Verisign Inc. : Practical UNIX & Internet Security, 18.6. Dependence on Third Parties
- versions
- sendmail, 5.2.1. Version
- (see also V configuration command)
- BIND : sendmail, 21.1.1. Which DNS? 4.8.3 or 4.9?
- host status file : sendmail, B.1. Status file lines
- m4
- sendmail, 19.2. Build with m4
- sendmail, 31.10. Alphabetized Reference
- mc files : sendmail, 19.6. Alphabetized m4 Macros
- qf file : sendmail, 23.9. The qf File Internals
- sendmail
- sendmail, UNIX and sendmail Versions
- sendmail, 5.2.1. Version
- sendmail, 18.2. Vendor Versus Compiling
- sendmail, 27.5. The V Configuration Command
- sendmail, 31.10. Alphabetized Reference
- sendmail, D.2. Backward Compatibility
- UUCP
- Practical UNIX & Internet Security, 15.2. Versions of UUCP
- Practical UNIX & Internet Security, 15.4. Security in Version 2 UUCP
- Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution
- callback feature : Practical UNIX & Internet Security, 15.4.1.5. Requiring callback
- V configuration command : sendmail, D. Sun Enhancements
- VERSIONID macro
- sendmail, 19.6. Alphabetized m4 Macros
- TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros
- vertical bar (|)
- ! flag : sendmail, 30.8. Alphabetized F= Flags
- | prefix
- sendmail, 22.4.3. The F Command - Program Form
- sendmail, 24.2.3. Delivery via Programs
- in addresses : (see programs, delivering to)
- Veteran's Health Administration : Practical UNIX & Internet Security, F.3.4.45. U.S. Veteran's Health Administration
- vi editor
- Practical UNIX & Internet Security, 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve
- Practical UNIX & Internet Security, 11.5.2.4. .exrc
- Practical UNIX & Internet Security, 11.5.2.7. Other initializations
- "Via:" header line : sendmail, 35.10. Alphabetized Reference
- vibration : Practical UNIX & Internet Security, 12.2.1.10. Vibration
- victim hosts : Building Internet Firewalls, 5.6. Selecting Services Provided by the
- victim machines : Building Internet Firewalls, 5.2.2. Victim Machines
- video content type : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- video tape : Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
- view command
- TCP/IP Network Administration, 8.4. Using nslookup
- TCP/IP Network Administration, 11.6. Checking Name Service
- vipw command : Practical UNIX & Internet Security, 8.4.1. Changing an Account's Password
- virtual links : TCP/IP Network Administration, B.8.1. The ospf Statement
- virtual terminal devices : TCP/IP Network Administration, 5.3.1.2. Pseudo-device
- virtual terminals : (see Telnet service)
- virtusertable feature : sendmail, 19.6. Alphabetized m4 Macros
- Virual Private Networks (VPNs) : Practical UNIX & Internet Security, 21.1.2. Uses of Firewalls
- VIRUS-L list : TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
- viruses
- Building Internet Firewalls, 1.4.2.4. A firewall can't protect against
- Practical UNIX & Internet Security, 11.1. Programmed Threats: Definitions
- Practical UNIX & Internet Security, 11.1.5. Viruses
- Practical UNIX & Internet Security, 27.2.2. Viruses on the Distribution Disk
- voice authentication : Building Internet Firewalls, 10.2.1. Something You Are
- voice-message multipart subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- voltage levels : TCP/IP Network Administration, 1.2. A Data Communications Model
- voltage spikes : Practical UNIX & Internet Security, 12.2.1.8. Electrical noise
- VPNs (virtual private networks) : Practical UNIX & Internet Security, 21.1.2. Uses of Firewalls
- VRFY command (SMTP)
- Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
- sendmail, 22.3.2. SMTP vrfy and expn
- sendmail, 22.8.3.5. The PrivacyOptions option
- sendmail, 30.8. Alphabetized F= Flags
- TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
- vsprintf function : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- VT100 terminal : Practical UNIX & Internet Security, 27.2.1. Hardware Bugs
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.