start page | rating of books | rating of authors | reviews | copyrights
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: M
- MAC (Mandatory Access Controls) : 4.1.3. Groups and Group Identifiers (GIDs)
- MACH operating system : 1.3. History of UNIX
- machine name : 16.2.3. Hostnames
- MACHINE= command
- 15.5.1.2. Name-value pairs
- 15.5.2. Permissions Commands
- Macintosh, Web server on : 18.2. Running a Secure Server
- macro virus : (see viruses)
- magic cookies : 17.3.21.4. Using Xauthority magic cookies
- magic number : 5.1.7. File Permissions in Detail
- mail
- 11.5.3.3. /usr/lib/aliases, /etc/aliases, /etc/sendmail/aliases, aliases.dir, or aliases.pag
- (see also sendmail)
- accepted by programs : 17.3.4.1. sendmail and security
- action, in Swatch program : 10.6.2. The Swatch Configuration File
- alias back door : 11.1.2. Back Doors and Trap Doors
- aliases : (see aliases)
- copyrights on : 26.4.2. Copyright Infringement
- Electronic Communications Privacy Act (ECPA) : 26.2.3. Federal Computer Crime Laws
- firewalls : 21.4.2. Electronic Mail
- forwarding (UUCP) : 15.6.1. Mail Forwarding for UUCP
- harassment via : 26.4.7. Harassment, Threatening Communication, and Defamation
- logging : 10.4.2. Mail
- message flooding : 25.3.2. Message Flooding
- phantom, monitoring : 17.3.4.2. Using sendmail to receive email
- receiving by sendmail : 17.3.4.2. Using sendmail to receive email
- sending via CGI scripts : 18.2.3.3. Sending mail
- sent directly to file : 15.7. Early Security Problems with UUCP
- startup file attacks : 11.5.2.5. .forward, .procmailrc
- mail command : 15.1.3. mail Command
- Mail_Aliases table (NIS+) : 19.5.3. NIS+ Tables
- mailing lists
- E.1. Mailing Lists
- E.1.3.10. WWW-security
- maintenance mode : C.5.1. Process #1: /etc/init
- maintenance personnel : 13.3. Outsiders
- makedbm program : 19.4.4.1. Setting up netgroups
- malware : 11.1. Programmed Threats: Definitions
- man pages : 2.5. The Problem with Security Through Obscurity
- management, role of
- 2.3.4. Convincing Management
- 2.5. The Problem with Security Through Obscurity
- MANs (Metropolitan Networks) : 16.1. Networking
- manual logging
- 10.7. Handwritten Logs
- 10.7.2.2. Informational material
- manual pages : 23.2. Tips on Avoiding Security-related Bugs
- maps, NIS : (see NIS)
- Massey, James L. : 6.4.1. Summary of Private Key Systems
- Master mode (uucico) : 15.1.4. How the UUCP Commands Work
- master server
- 19.4. Sun's Network Information Service (NIS)
- (see also NIS)
- MCERT : F.3.4.21. Motorola, Inc. and subsidiaries
- MCI Corporation : F.3.4.19. MCI Corporation
- MD2 algorithm : 6.5.4.1. MD2, MD4, and MD5
- MD4 algorithm : 6.5.4.1. MD2, MD4, and MD5
- MD5 algorithm
- 6.5.2. Using Message Digests
- 6.5.4.1. MD2, MD4, and MD5
- 23.5.1. Use Message Digests for Storing Passwords
- 23.9. A Good Random Seed Generator
- digital signatures versus : 6.6.3.6. PGP detached signatures
- in POP : 17.3.10. Post Office Protocol (POP) (TCP Ports 109 and 110)
- media : 12.3.3. Other Media
- damaged by smoke : 12.2.1.2. Smoke
- destroying : 12.3.2.3. Sanitize your media before disposal
- failure of : 7.1.4. Guarding Against Media Failure
- hard/soft disk quotas : 25.2.2.5. Using quotas
- print through process : 12.3.2.1. Verify your backups
- rotating for backups : 7.1.3. Types of Backups
- rotation of : 7.2.1.2. Media rotation
- sanitizing : 12.3.2.3. Sanitize your media before disposal
- viruses from : 11.1.5. Viruses
- meet-in-the-middle attacks : 6.4.5.1. Double DES
- memory
- 25.2.2. Disk Attacks
- 25.2.2.8. Tree-structure attacks
- hidden space : 25.2.2.7. Hidden space
- reserved space : 25.2.2.6. Reserved space
- swap space : 25.2.3. Swap Space Problems
- /tmp directory and : 25.2.4. /tmp Problems
- tree-structure attacks : 25.2.2.8. Tree-structure attacks
- Merkle, Ralph : 6.4.5.1. Double DES
- Message Authentication Code (MAC) : 6.5.5.2. Message authentication codes
- message digests
- 6.5. Message Digests and Digital Signatures
- 6.5.2. Using Message Digests
- 9.2.3. Checksums and Signatures
- 23.5.1. Use Message Digests for Storing Passwords
- Tripwire package
- 9.2.4. Tripwire
- 9.2.4.2. Running Tripwire
- message flooding : 25.3.2. Message Flooding
- messages log file : 10.2.3. messages Log File
- meta characters : 23.2. Tips on Avoiding Security-related Bugs
- metadata
- 9.2.2. Checklists and Metadata
- 9.2.2.2. Ancestor directories
- Metropolitan Networks (MANs) : 16.1. Networking
- MH (mail handler) : 11.5.2.5. .forward, .procmailrc
- Micro-BIT Virus Center : F.3.4.16. Germany: Southern area
- Miller, Barton : 23.1.2. An Empirical Study of the Reliability of UNIX Utilities
- MILNET : F.3.4.20. MILNET
- MIME : 11.1.5. Viruses
- MIT-KERBEROS-5 authentication : 17.3.21.3. The xhost facility
- Mitnick, Kevin : 27.2.6. Network Providers that Network Too Well
- mkpasswd program : 8.8.4. Password Generators
- mktemp function : 23.2. Tips on Avoiding Security-related Bugs
- MLS (Multilevel Security) environment : "Secure" Versions of UNIX
- mobile network computing : 8.7. One-Time Passwords
- modems
- 14. Telephone Security
- 14.6. Additional Security for Modems
- callback setups
- 14.4.2.
- 14.6. Additional Security for Modems
- clogging : 25.3.4. Clogging
- encrypting : 14.6. Additional Security for Modems
- hanging up : (see signals)
- physical security of
- 14.5.4. Physical Protection of Modems
- 14.6. Additional Security for Modems
- recording call information : 10.3.1. aculog File
- tracing connections
- 24.2.4. Tracing a Connection
- 24.2.4.2. How to contact the system administrator of a computer you don't know
- UNIX and
- 14.5. Modems and UNIX
- 14.5.3.3. Privilege testing
- modification times
- 5.1.2. Inodes
- 5.1.5. File Times
- 7.4.7. inode Modification Times
- 9.2.2. Checklists and Metadata
- monitoring
- hardware for : (see detectors)
- intruders : 24.2.3. Monitoring the Intruder
- performance : 13.2.3. Performance Reviews and Monitoring
- security : (see logging)
- users : 26.2.6. Other Tips
- monitors and screen savers : 12.3.5.2. X screen savers
- Morris, Robert T.
- 1. Introduction
- 8.6. The UNIX Encrypted Password System
- 17.4. Security Implications of Network Services
- motd file : 26.2.6. Other Tips
- Motorola, Inc. : F.3.4.20. MILNET
- Motorola, Inc. and subsidiaries : F.3.4.21. Motorola, Inc. and subsidiaries
- mount command : 20.3. Client-Side NFS Security
- -nodev option : 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
- -nosuid option : 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
- mounted filesystems : 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
- mouting filesystem : (see directories)
- mrand48 function : 23.7.3. drand48 ( ), lrand48 ( ), and mrand48 ( )
- mtime
- 5.1.2. Inodes
- 5.1.5. File Times
- 9.2.2. Checklists and Metadata
- 24.4.1.6. Changes to startup files
- MUDs (Multiuser Dungeons) : 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
- Muffet, Alec : 10.5.3.1. Beware false log entries
- multicast groups : 16.2.1.2. Classical network addresses
- MULTICS (Multiplexed Information and Computing Service) : 1.3. History of UNIX
- multilevel security
- 1.3. History of UNIX
- 2.4.4.7. Defend in depth
- 2.5.3. Final Words: Risk Management Means Common Sense
- 17.2. Controlling Access to Servers
- multitasking
- 1.4. Security and UNIX
- C.1.3.3. Process priority and niceness
- multiuser operating systems : 1.4. Security and UNIX
- multiuser workstations : 17.3.21.1. /etc/fbtab and /etc/logindevperm
- munitions export : 26.4.1. Munitions Export
- MX record type : 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
- MYNAME= command : 15.5.2. Permissions Commands
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.