start page | rating of books | rating of authors | reviews | copyrights
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: R
- rabbit programs
- 11.1. Programmed Threats: Definitions
- 11.1.7. Bacteria and Rabbits
- race conditions : 23.2. Tips on Avoiding Security-related Bugs
- radio
- eavesdropping : 12.3.1.3. Eavesdropping by radio and using TEMPEST
- transmissions : 14.4.4.1. Kinds of eavesdropping
- transmitters : 12.2.1.8. Electrical noise
- rain : (see water)
- RAM theft : 12.2.6. Preventing Theft
- rand function : 23.7.1. rand ( )
- random device : 23.7.4. Other random number generators
- random function : 23.7.2. random ( )
- random numbers : 23.6. Tips on Generating Random Numbers
- raw devices : 5.6. Device Files
- rc directory : C.5.1. Process #1: /etc/init
- RC2, RC4, and RC5 algorithms
- 6.4.1. Summary of Private Key Systems
- 6.4.8. Proprietary Encryption Systems
- RC4 and RC5 algorithms : 6.4.1. Summary of Private Key Systems
- rcp command
- 1.4.3. Add-On Functionality Breeds Problems
- 7.4.5. Backups Across the Net
- RCS (Revision Control System)
- 7.3.2. Building an Automatic Backup System
- 17.3. Primary UNIX Network Services
- rdist program
- 7.4.5. Backups Across the Net
- 9.2.1.3. rdist
- rdump/rrestore program : 7.4.5. Backups Across the Net
- read permission
- 5.1.7. File Permissions in Detail
- 5.4. Using Directory Permissions
- read system call : 5.1.7. File Permissions in Detail
- time-outs on : 23.3. Tips on Writing Network Programs
- read-only exporting filesystems : 11.6.1.2. Writable system files and directories
- read-only filesystems : 9.1.2. Read-only Filesystems
- READ= command : 15.5.2. Permissions Commands
- readdir library call : 5.4. Using Directory Permissions
- real UIDs/GIDs
- 4.3.1. Real and Effective UIDs
- C.1.3.2. Process real and effective UID
- realpath function : 23.2. Tips on Avoiding Security-related Bugs
- reauthentication
- Kerberos : 19.6.4. Using Kerberos
- Secure RPC : 19.3.1.3. Setting the window
- Receive Data (RD) : 14.3. The RS-232 Serial Protocol
- Redman, Brian E. : 15.2. Versions of UUCP
- refer_log file : 18.4.2. Eavesdropping Through Log Files
- reflectors (in Enigma system) : 6.3. The Enigma Encryption System
- reformatting attack : 25.1. Destructive Attacks
- relative humidity : 12.2.1.11. Humidity
- relative pathnames : 5.1.3. Current Directory and Paths
- remote
- command execution
- 15.1.2. uux Command
- 15.4.3. L.cmds: Providing Remote Command Execution
- 17.3.17. rexec (TCP Port 512)
- comparison copies : 9.2.1.2. Remote copies
- computers
- transferring files to : 15.1.1. uucp Command
- file access (UUCP)
- 15.4.1. USERFILE: Providing Remote File Access
- 15.4.2.1. Some bad examples
- network filesystems : 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
- procedure calls : (see RPCs)
- remote file
- 10.3.1. aculog File
- 14.5.1. Hooking Up a Modem to Your Computer
- remote.unknown file : 15.5. Security in BNU UUCP
- renice command
- 25.2.1.2. System overload attacks
- C.1.3.3. Process priority and niceness
- replay attacks
- 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
- 19.6.1.2. Using the ticket granting ticket
- reporting security holes : 2.5.1. Going Public
- Request to Send (RTS) : 14.3. The RS-232 Serial Protocol
- REQUEST= command
- 15.5.1.3. A Sample Permissions file
- 15.5.2. Permissions Commands
- reserved memory space : 25.2.2.6. Reserved space
- resolution, time : 23.8. Picking a Random Seed
- resolver library (bind) : 16.2.6.1. DNS under UNIX
- resolving (DNS) : 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
- response teams
- 27.3.5. Response Personnel?
- F.3. Emergency Response Organizations
- F.3.4.46. Westinghouse Electric Corporation
- mailing lists for : E.1.1. Response Teams and Vendors
- restore : (see dump/restore program)
- restricted
- filesystems
- 8.1.5. Restricted Filesystem
- 8.1.5.2. Checking new software
- FTP : 17.3.2.5. Restricting FTP with the standard UNIX FTP server
- logins : 8.3. Restricting Logins
- shells
- 8.1.4.1. Restricted shells under System V UNIX
- 8.1.4.6. Potential problems with rsh
- su use : 4.3.6. Restricting su
- restrictmailq (sendmail) : 17.3.4.3. Improving the security of Berkeley sendmail V8
- retention of backups
- 7.1.5. How Long Should You Keep a Backup?
- 7.2.2.2. Retention schedule
- (see also networks, backing up)
- return calls : 23.2. Tips on Avoiding Security-related Bugs
- reverse lookup
- 16.3.2. Security and Nameservice
- 23.3. Tips on Writing Network Programs
- Revision Control System (RCS)
- 7.3.2. Building an Automatic Backup System
- 17.3. Primary UNIX Network Services
- revocation certificate : 6.6.3.2. Creating your PGP public key
- rexd service : 19.2.2.4. AUTH_KERB
- rexec service : 17.3.17. rexec (TCP Port 512)
- RFC 1750 : 23.8. Picking a Random Seed
- .rhosts file
- 10.4.3. Network Setup
- 17.3.18.4. The ~/.rhosts file
- 17.3.18.5. Searching for .rhosts files
- back door in : 11.1.2. Back Doors and Trap Doors
- intruder's changes to : 24.4.1.4. Changes in .rhosts files
- searching for : 17.3.18.5. Searching for .rhosts files
- Ring Indicator (RI) : 14.3. The RS-232 Serial Protocol
- RIP (Routing Internet Protocol) : 17.3.19. Routing Internet Protocol (RIP routed) (UDP Port 520)
- risk assessment
- 2.2. Risk Assessment
- 2.2.2. Review Your Risks
- 2.5.3. Final Words: Risk Management Means Common Sense
- risks : (see threats)
- Ritchie, Dennis : 1.3. History of UNIX
- Rivest, Ronald L.
- 6.1.3. Modern Controversy
- 6.4.1. Summary of Private Key Systems
- 6.4.2. Summary of Public Key Systems
- 6.4.6. RSA and Public Key Cryptography
- 6.5.4.1. MD2, MD4, and MD5
- RJE (Remote Job Entry) : 3.2.1. The /etc/passwd File
- rlogin command
- 1.4.3. Add-On Functionality Breeds Problems
- 3.5. Verifying Your New Password
- 16.3.2. Security and Nameservice
- 17.3.18. rlogin and rsh (TCP Ports 513 and 514)
- 17.3.18.6. /etc/hosts.lpd file
- versus Telnet : 17.3.18. rlogin and rsh (TCP Ports 513 and 514)
- rlogind command : 17.3.18. rlogin and rsh (TCP Ports 513 and 514)
- rm command
- 5.4. Using Directory Permissions
- 15.4.3. L.cmds: Providing Remote Command Execution
- and deep tree structures : 25.2.2.8. Tree-structure attacks
- rmail program : 15.4.3. L.cmds: Providing Remote Command Execution
- root account
- 4. Users, Groups, and the Superuser
- 4.1. Users and Groups
- 4.2.1. The Superuser
- 4.2.1.5. The problem with the superuser
- 5.5.2. Problems with SUID
- (see also superuser)
- abilities of : 27.1.3. What the Superuser Can and Cannot Do
- chroot
- 8.1.5. Restricted Filesystem
- 8.1.5.2. Checking new software
- immutable files and : 9.1.1. Immutable and Append-Only Files
- network services with : 17.4. Security Implications of Network Services
- protecting
- 8.5. Protecting the root Account
- 8.5.3.2. Trusted computing base
- on remote machine, fingering : 24.2.4.2. How to contact the system administrator of a computer you don't know
- single-command accounts and : 8.1.3. Accounts That Run a Single Command
- web server as : 18.2.1. The Server's UID
- root directory : 5.1.1. Directories
- backups of : 7.1.3. Types of Backups
- UUCP access from : 15.4.2.1. Some bad examples
- root option for /etc/exports : 20.2.1.1. /etc/exports
- ROT13 algorithm
- 6.4.1. Summary of Private Key Systems
- 6.4.3. ROT13: Great for Encoding Offensive Jokes
- rotating backup media
- 7.1.3. Types of Backups
- 7.2.1.2. Media rotation
- routed daemon : 17.3.19. Routing Internet Protocol (RIP routed) (UDP Port 520)
- routers, intelligent : 21.2.3. Setting Up the Choke
- routing : 16.2.2. Routing
- Routing Internet Protocol : (see RIP)
- RPC table (NIS+) : 19.5.3. NIS+ Tables
- rpc.rexdserver : 17.3.22. RPC rpc.rexd (TCP Port 512)
- rpcbind : (see portmapper program)
- RPCs (remote procedure calls)
- 17.3.22. RPC rpc.rexd (TCP Port 512)
- 19. RPC, NIS, NIS+, and Kerberos
- 19.7.2. SESAME
- authentication of
- 19.2.2. RPC Authentication
- 19.2.2.4. AUTH_KERB
- portmapper program : 17.3.11. Sun RPC's portmapper (UDP and TCP Ports 111)
- Secure : (see Secure RPC)
- spoofing : 19.4.4.4. Spoofing RPC
- RS-232 serial protocol : 14.3. The RS-232 Serial Protocol
- RSA algorithm
- 6.4.2. Summary of Public Key Systems
- 6.4.6. RSA and Public Key Cryptography
- 6.4.6.3. Strength of RSA
- 6.5.3. Digital Signatures
- rsh (restricted shell)
- 8.1.4.1. Restricted shells under System V UNIX
- 8.1.4.6. Potential problems with rsh
- 17.3.18. rlogin and rsh (TCP Ports 513 and 514)
- 17.3.18.6. /etc/hosts.lpd file
- rsh command : 16.3.2. Security and Nameservice
- rshd program : 11.1.2. Back Doors and Trap Doors
- RUID : (see real UIDs/GIDs)
- runacct command : 10.2. The acct/pacct Process Accounting File
- ruusend command : 15.4.3. L.cmds: Providing Remote Command Execution
- rw option for /etc/exports : 20.2.1.1. /etc/exports
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.