start page | rating of books | rating of authors | reviews | copyrights
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: D
- DAC (Discretionary Access Controls) : 4.1.3. Groups and Group Identifiers (GIDs)
- daemon (user) : 4.1. Users and Groups
- damage, liability for : 26.4.6. Liability for Damage
- DARPA : (see ARPA)
- DAT (Digital Audio Tape) : 7.1.4. Guarding Against Media Failure
- data
- assigning owners to : 2.4.4.1. Assign an owner
- availability of : 2.1. Planning Your Security Needs
- communication equipment (DCE) : 14.3. The RS-232 Serial Protocol
- confidential
- 2.1. Planning Your Security Needs
- 2.5.2. Confidential Information
- disclosure of : 11.2. Damage
- giving away with NIS : 19.4.5. Unintended Disclosure of Site Information with NIS
- identifying assets : 2.2.1.1. Identifying assets
- integrity of : (see integrity, data)
- spoofing : 16.3. IP Security
- terminal equipment (DTE) : 14.3. The RS-232 Serial Protocol
- Data Carrier Detect (DCD) : 14.3. The RS-232 Serial Protocol
- Data Defense Network (DDN) : F.3.4.20. MILNET
- Data Encryption Standard : (see DES)
- Data Set Ready (DSR) : 14.3. The RS-232 Serial Protocol
- Data Terminal Ready (DTR) : 14.3. The RS-232 Serial Protocol
- database files : 1.2. What Is an Operating System?
- databases : (see network databases)
- date command
- 8.1.3. Accounts That Run a Single Command
- 24.5.1. Never Trust Anything Except Hardcopy
- day-zero backups : 7.1.3. Types of Backups
- dbx debugger : C.4. The kill Command
- DCE (data communication equipment) : 14.3. The RS-232 Serial Protocol
- DCE (Distributed Computing Environment)
- 3.2.2. The /etc/passwd File and Network Databases
- 8.7.3. Code Books
- 16.2.6.2. Other naming services
- 19.2. Sun's Remote Procedure Call (RPC)
- 19.7.1. DCE
- dd command
- 6.6.1.2. Ways of improving the security of crypt
- 7.4.1. Simple Local Copies
- DDN (Data Defense Network) : F.3.4.20. MILNET
- deadlock : 23.2. Tips on Avoiding Security-related Bugs
- debug command : 17.3.4.2. Using sendmail to receive email
- debugfs command : 25.2.2.8. Tree-structure attacks
- DEC (Digital Equipment Corporation) : F.3.4.9. Digital Equipment Corporation and customers
- DECnet protocol : 16.4.3. DECnet
- decode aliases : 17.3.4.2. Using sendmail to receive email
- decryption : (see encryption)
- defamation : 26.4.7. Harassment, Threatening Communication, and Defamation
- default
- accounts : 8.1.2. Default Accounts
- deny : 21.1.1. Default Permit vs. Default Deny
- domain : 16.2.3. Hostnames
- permit : 21.1.1. Default Permit vs. Default Deny
- defense in depth : (see multilevel security)
- DELETE key : 3.4. Changing Your Password
- deleting
- destructive attack via : 25.1. Destructive Attacks
- files : 5.4. Using Directory Permissions
- demo accounts : 8.1.2. Default Accounts
- denial-of-service attacks
- 1.5. Role of This Book
- 25. Denial of Service Attacks and Solutions
- 25.3.4. Clogging
- accidental : 25.2.5. Soft Process Limits: Preventing Accidental Denial of Service
- automatic lockout : 3.3. Entering Your Password
- checklist for : A.1.1.24. Chapter 25: Denial of Service Attacks and Solutions
- inodes : 25.2.2.3. Inode problems
- internal inetd services : 17.1.3. The /etc/inetd Program
- on networks
- 25.3. Network Denial of Service Attacks
- 25.3.4. Clogging
- via syslog : 10.5.1. The syslog.conf Configuration File
- X Window System : 17.3.21.5. Denial of service attacks under X
- departure of employees : 13.2.6. Departure
- depository directories, FTP : 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP server
- DES (Data Encryption Standard)
- 6.4.1. Summary of Private Key Systems
- 6.4.4. DES
- 6.4.5.2. Triple DES
- 8.6.1. The crypt() Algorithm
- authentication (NIS+) : 19.5.4. Using NIS+
- improving security of
- 6.4.5. Improving the Security of DES
- 6.4.5.2. Triple DES
- des program
- 6.4.4. DES
- 6.6.2. des: The Data Encryption Standard
- 7.4.4. Encrypting Your Backups
- destroying media : 12.3.2.3. Sanitize your media before disposal
- destructive attacks : 25.1. Destructive Attacks
- detached signatures : 6.6.3.6. PGP detached signatures
- detectors
- cable tampering : 12.3.1.1. Wiretapping
- carbon-monoxide : 12.2.1.2. Smoke
- humidity : 12.2.1.11. Humidity
- logging alarm systems : 10.7.1.1. Exception and activity reports
- smoke : 12.2.1.2. Smoke
- temperature alarms : 12.2.1.6. Temperature extremes
- water sensors : 12.2.1.12. Water
- Deutsches Forschungsnetz : F.3.4.14. Germany: DFN-WiNet Internet sites
- /dev directory : 14.5.1. Hooking Up a Modem to Your Computer
- /dev/audio device : 23.8. Picking a Random Seed
- /dev/console device : 5.6. Device Files
- /dev/kmem device
- 5.6. Device Files
- 11.1.2. Back Doors and Trap Doors
- /dev/null device : 5.6. Device Files
- /dev/random device : 23.7.4. Other random number generators
- /dev/swap device : 5.5.1. SUID, SGID, and Sticky Bits
- /dev/urandom device : 23.7.4. Other random number generators
- device files : 5.6. Device Files
- devices
- managing with SNMP : 17.3.15. Simple Network Management Protocol (SNMP) (UDP Ports 161 and 162)
- modem control : 14.5.2. Setting Up the UNIX Device
- Devices file : 14.5.1. Hooking Up a Modem to Your Computer
- df -i command : 25.2.2.3. Inode problems
- dictionary attack : 8.6.1. The crypt() Algorithm
- Diffie-Hellman key exchange system
- 6.4.2. Summary of Public Key Systems
- 18.6. Dependence on Third Parties
- 19.3. Secure RPC (AUTH_DES)
- breaking key : 19.3.4. Limitations of Secure RPC
- exponential key exchange : 19.3.1. Secure RPC Authentication
- Digital Audio Tape (DAT) : 7.1.4. Guarding Against Media Failure
- digital computers : 6.1.2. Cryptography and Digital Computers
- Digital Equipment Corporation (DEC) : F.3.4.9. Digital Equipment Corporation and customers
- Digital Signature Algorithm : (see DSA)
- digital signatures
- 6.4. Common Cryptographic Algorithms
- 6.5. Message Digests and Digital Signatures
- 6.5.5.2. Message authentication codes
- 9.2.3. Checksums and Signatures
- checksums : 6.5.5.1. Checksums
- detached signatures : 6.6.3.6. PGP detached signatures
- with PGP : 6.6.3.4. Adding a digital signature to an announcement
- Digital UNIX
- 1.3. History of UNIX
- (see also Ultrix)
- directories
- 5.1.1. Directories
- 5.1.3. Current Directory and Paths
- ancestor : 9.2.2.2. Ancestor directories
- backing up by : 7.1.3. Types of Backups
- CDFs (context-dependent files) : 24.4.1.7. Hidden files and directories
- checklist for : A.1.1.4. Chapter 5: The UNIX Filesystem
- dot, dot-dot, and / : 5.1.1. Directories
- FTP depositories : 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP server
- immutable : 9.1.1. Immutable and Append-Only Files
- listing automatically (Web) : 18.2.2.2. Additional configuration issues
- mounted : 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
- mounting secure : 19.3.2.5. Mounting a secure filesystem
- nested : 25.2.2.8. Tree-structure attacks
- NFS : (see NFS)
- permissions : 5.4. Using Directory Permissions
- read-only : 9.1.2. Read-only Filesystems
- restricted
- 8.1.5. Restricted Filesystem
- 8.1.5.2. Checking new software
- root : (see root directory)
- SGI and sticky bits on : 5.5.6. SGID and Sticky Bits on Directories
- Web server structure of
- 18.2.2. Understand Your Server's Directory Structure
- 18.2.2.2. Additional configuration issues
- world-writable : 11.6.1.1. World-writable user files and directories
- <Directory> blocks
- 18.3.1. The access.conf and .htaccess Files
- 18.3.2. Commands Within the <Directory> Block
- 18.3.2.1. Examples
- disaster recovery : 12.2.6.4. Minimizing downtime
- disk attacks
- 25.2.2. Disk Attacks
- 25.2.2.8. Tree-structure attacks
- disk quotas : 25.2.2.5. Using quotas
- diskettes : (see backups; media)
- dismissed employees : 13.2.6. Departure
- disposing of materials : 12.3.3. Other Media
- Distributed Computing Environment : (see DCE)
- DNS (Domain Name System)
- 16.2.6. Name Service
- 16.2.6.2. Other naming services
- 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
- 17.3.6.2. DNS nameserver attacks
- nameserver attacks : 17.3.6.2. DNS nameserver attacks
- rogue servers : 16.3.2. Security and Nameservice
- security and : 16.3.2. Security and Nameservice
- zone transfers
- 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
- 17.3.6.1. DNS zone transfers
- documentation
- 2.5. The Problem with Security Through Obscurity
- 23.2. Tips on Avoiding Security-related Bugs
- domain name : 16.2.3. Hostnames
- Domain Name System : (see DNS)
- domainname command : 19.4.3. NIS Domains
- domains : 19.4.3. NIS Domains
- dormant accounts
- 8.4. Managing Dormant Accounts
- 8.4.3. Finding Dormant Accounts
- dot (.) directory : 5.1.1. Directories
- dot-dot (..) directory : 5.1.1. Directories
- Double DES : 6.4.5. Improving the Security of DES
- double reverse lookup : 16.3.2. Security and Nameservice
- DOW USA : F.3.4.10. DOW USA
- downloading files : 12.3.4. Protecting Local Storage
- logging
- 10.3.3. xferlog Log File
- 10.3.5. access_log Log File
- downtime : 12.2.6.4. Minimizing downtime
- due to criminal investigations : 26.2.4. Hazards of Criminal Prosecution
- logging : 10.7.2.1. Exception and activity reports
- drand48 function : 23.7.3. drand48 ( ), lrand48 ( ), and mrand48 ( )
- drills, security : 24.1.3. Rule #3: PLAN AHEAD
- drink : 12.2.2.1. Food and drink
- DSA (Digital Signature Algorithm)
- 6.4.2. Summary of Public Key Systems
- 6.5.3. Digital Signatures
- DTE (data terminal equipment) : 14.3. The RS-232 Serial Protocol
- du command : 25.2.2.1. Disk-full attacks
- dual universes : 5.9.1. Dual Universes
- ducts, air : 12.2.3.2. Entrance through air ducts
- dump/restore program
- 7.1.3. Types of Backups
- 7.4.3. Specialized Backup Programs
- 7.4.4. Encrypting Your Backups
- dumpster diving : 12.3.3. Other Media
- duress code : 8.7.2. Token Cards
- dust : 12.2.1.3. Dust
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.