start page | rating of books | rating of authors | reviews | copyrights
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: O
- obscurity : (see security, through obscurity)
- octal file permissions
- 5.2.3. Calculating Octal File Permissions
- 5.2.4. Using Octal File Permissions
- octets : 16.2.1. Internet Addresses
- Odlyzko, Andrew : 19.3.4. Limitations of Secure RPC
- OFB (output feedback) : 6.4.4.2. DES modes
- on-the-job security
- 13.2. On the Job
- 13.2.6. Departure
- one : 9.2.1. Comparison Copies
- one-command accounts : 8.1.3. Accounts That Run a Single Command
- one-time pad encryption
- 6.4.7. An Unbreakable Encryption Algorithm
- 8.7.3. Code Books
- one-time passwords
- 3.7. One-Time Passwords
- 8.7. One-Time Passwords
- 8.7.3. Code Books
- 17.4. Security Implications of Network Services
- 23.3. Tips on Writing Network Programs
- one-way phone lines : 14.4.1. One-Way Phone Lines
- open access, tradition of : 1.4.1. Expectations
- open accounts
- 8.1.4. Open Accounts
- 8.1.4.6. Potential problems with rsh
- 8.8.7. Algorithm and Library Changes
- open command : 23.2. Tips on Avoiding Security-related Bugs
- O_CREAT and O_EXCL flags : 23.2. Tips on Avoiding Security-related Bugs
- Open Software Distribution (OSD) : Preface
- Open Software Foundation (OSF) : 1.3. History of UNIX
- open system call : 5.1.7. File Permissions in Detail
- Open System Interconnection (OSI) : 16.4.4. OSI
- opendir library call : 5.4. Using Directory Permissions
- operating systems
- 1.2. What Is an Operating System?
- 12.3.3. Other Media
- keeping secret : 2.5. The Problem with Security Through Obscurity
- operating systems
- Which UNIX System?
- (see also under specific name)
- optic cables : (see cables, network)
- optical vampire taps : 12.3.1.5. Fiber optic cable
- Options command : 18.3.2. Commands Within the <Directory> Block
- Orange Book : 2.3.3. Adding Up the Numbers
- originate mode : 14.3.1. Originate and Answer
- originate testing : 14.5.3.1. Originate testing
- OSF (Open Software Foundation) : 1.3. History of UNIX
- OSF/1 operating system : 1.3. History of UNIX
- OSI (Open System Interconnection) : 16.4.4. OSI
- Outcome table (NIS+) : 19.5.3. NIS+ Tables
- outgoing calls : 14.5. Modems and UNIX
- outgoing mail, logging : 10.4.2. Mail
- output feedback (OFB) : 6.4.4.2. DES modes
- outsiders : 13.3. Outsiders
- overload attacks
- 25.2. Overload Attacks
- 25.2.5. Soft Process Limits: Preventing Accidental Denial of Service
- overtime : 13.2.3. Performance Reviews and Monitoring
- overwriting media : 12.3.2.3. Sanitize your media before disposal
- OW- (sendmail.cf) : 17.3.4.2. Using sendmail to receive email
- owners of information : 2.4.4.1. Assign an owner
- owners, changing : 5.7. chown: Changing a File's Owner
- ownership notices : 26.2.6. Other Tips
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.