Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: H

hacker challenges : 27.2.4. Hacker Challenges
hackers : 1. Introduction
Haley, Chuck : 1.3. History of UNIX
Halon fire extinguishers : 12.2.1.1. Fire
and radio transmitters : 12.2.1.8. Electrical noise
halt command : 24.2.6. Anatomy of a Break-in
hanging up modem : (see signals)
harassment : 26.4.7. Harassment, Threatening Communication, and Defamation
hard copy : (see paper)
hard disks : (see media)
hardcopy device, logging to : 10.5.2.1. Logging to a printer
hardware
bugs in : 27.2.1. Hardware Bugs
failure of : 7.1.1.1. A taxonomy of computer failures
food and drink threats : 12.2.2.1. Food and drink
modems
14. Telephone Security
14.6. Additional Security for Modems
physical security of
12.2. Protecting Computer Hardware
12.2.7. Related Concerns
read-only filesystems : 9.1.2. Read-only Filesystems
seized as evidence : 26.2.4. Hazards of Criminal Prosecution
hash functions : 6.5.1. Message Digests
hash mark (#), disabling services with : 17.3. Primary UNIX Network Services
HAVAL algorithm : 6.5.4.3. HAVAL
HAVAL algorithm : 23.9. A Good Random Seed Generator
HDB UUCP : 15.2. Versions of UUCP
header, packet : 16.2. IPv4: The Internet Protocol Version 4
heat, extreme : 12.2.1.6. Temperature extremes
Hellman, Martin : 6.4.5.1. Double DES
Hellman-Merkle : 18.6. Dependence on Third Parties
Hewlett-Packard (HP) : F.3.4.17. Hewlett-Packard customers
hidden
data, in CGI scripts : 18.2.3.1. Do not trust the user's browser!
files, created by intruders : 24.4.1.7. Hidden files and directories
space : 25.2.2.7. Hidden space
hijacking Telnet sessions : 17.3.3. TELNET (TCP Port 23)
history file (csh)
10.4.1. Shell History
15.1.1.1. uucp with the C shell
hit lists of passwords : 3.6.1. Bad Passwords: Open Doors
holes, security : (see security holes)
HOME variable, attacks via : 11.5.1.3. $HOME attacks
HoneyDanBer (HDB) UUCP : 15.2. Versions of UUCP
Honeyman, Peter : 15.2. Versions of UUCP
hostnames
16.2.3. Hostnames
16.2.3.1. The /etc/hosts file
controlling access to : 17.2. Controlling Access to Servers
name service and
16.2.6. Name Service
16.2.6.2. Other naming services
hosts
NID passwords for : 19.3.2.2. Creating passwords for hosts
trusted : (see trusted, hosts)
hosts file : 16.2.3.1. The /etc/hosts file
hosts.equiv file
17.3.18.4. The ~/.rhosts file
17.3.18.6. /etc/hosts.lpd file
24.4.1.5. Changes to the /etc/hosts.equiv file
hosts.lpd file : 17.3.18.6. /etc/hosts.lpd file
HP (Hewlett-Packard) : F.3.4.17. Hewlett-Packard customers
HP-UX
access control lists : 5.2.5.2. HP-UX access control lists
context-dependent files : 5.9.2. Context-Dependent Files
.htaccess file : 18.3.1. The access.conf and .htaccess Files
HTML documents
controlling access to
18.3. Controlling Access to Files on Your Server
18.3.3. Setting Up Web Users and Passwords
encrypting : 18.4.1. Eavesdropping Over the Wire
server-side includes
18.2.2.2. Additional configuration issues
18.3.2. Commands Within the <Directory> Block
htpasswd program : 18.3.3. Setting Up Web Users and Passwords
HTTP (Hypertext Transfer Protocol) : 17.3.9. HyperText Transfer Protocol (HTTP) (TCP Port 80)
and anonymous FTP : 18.2.4.1. Beware mixing HTTP with anonymous FTP
logging downloaded files : 10.3.5. access_log Log File
Secure : (see Secure HTTP)
http server
group file : 18.3.2. Commands Within the <Directory> Block
log files of : 18.4.2. Eavesdropping Through Log Files
password file : 18.3.2. Commands Within the <Directory> Block
httpd.conf file : 18.2.1. The Server's UID
human error and backups : 7.1.4. Guarding Against Media Failure
humidity : 12.2.1.11. Humidity
hypertext links, encrypting : 18.4.1. Eavesdropping Over the Wire
Hypertext Transfer Protocol : (see HTTP)


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.