Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: M
- MAC (Mandatory Access Controls)
: 4.1.3. Groups and Group Identifiers (GIDs)
- MACH operating system
: 1.3. History of UNIX
- machine name
: 16.2.3. Hostnames
- MACHINE= command
- 15.5.1.2. Name-value pairs
- 15.5.2. Permissions Commands
- Macintosh, Web server on
: 18.2. Running a Secure Server
- macro virus
: (see viruses)
- magic cookies
: 17.3.21.4. Using Xauthority magic cookies
- magic number
: 5.1.7. File Permissions in Detail
- mail
- 11.5.3.3. /usr/lib/aliases, /etc/aliases, /etc/sendmail/aliases, aliases.dir, or aliases.pag
- (see also sendmail)
- accepted by programs
: 17.3.4.1. sendmail and security
- action, in Swatch program
: 10.6.2. The Swatch Configuration File
- alias back door
: 11.1.2. Back Doors and Trap Doors
- aliases
: (see aliases)
- copyrights on
: 26.4.2. Copyright Infringement
- Electronic Communications Privacy Act (ECPA)
: 26.2.3. Federal Computer Crime Laws
- firewalls
: 21.4.2. Electronic Mail
- forwarding (UUCP)
: 15.6.1. Mail Forwarding for UUCP
- harassment via
: 26.4.7. Harassment, Threatening Communication, and Defamation
- logging
: 10.4.2. Mail
- message flooding
: 25.3.2. Message Flooding
- phantom, monitoring
: 17.3.4.2. Using sendmail to receive email
- receiving by sendmail
: 17.3.4.2. Using sendmail to receive email
- sending via CGI scripts
: 18.2.3.3. Sending mail
- sent directly to file
: 15.7. Early Security Problems with UUCP
- startup file attacks
: 11.5.2.5. .forward, .procmailrc
- mail command
: 15.1.3. mail Command
- Mail_Aliases table (NIS+)
: 19.5.3. NIS+ Tables
- mailing lists
- E.1. Mailing Lists
- E.1.3.10. WWW-security
- maintenance mode
: C.5.1. Process #1: /etc/init
- maintenance personnel
: 13.3. Outsiders
- makedbm program
: 19.4.4.1. Setting up netgroups
- malware
: 11.1. Programmed Threats: Definitions
- man pages
: 2.5. The Problem with Security Through Obscurity
- management, role of
- 2.3.4. Convincing Management
- 2.5. The Problem with Security Through Obscurity
- MANs (Metropolitan Networks)
: 16.1. Networking
- manual logging
- 10.7. Handwritten Logs
- 10.7.2.2. Informational material
- manual pages
: 23.2. Tips on Avoiding Security-related Bugs
- maps, NIS
: (see NIS)
- Massey, James L.
: 6.4.1. Summary of Private Key Systems
- Master mode (uucico)
: 15.1.4. How the UUCP Commands Work
- master server
- 19.4. Sun's Network Information Service (NIS)
- (see also NIS)
- MCERT
: F.3.4.21. Motorola, Inc. and subsidiaries
- MCI Corporation
: F.3.4.19. MCI Corporation
- MD2 algorithm
: 6.5.4.1. MD2, MD4, and MD5
- MD4 algorithm
: 6.5.4.1. MD2, MD4, and MD5
- MD5 algorithm
- 6.5.2. Using Message Digests
- 6.5.4.1. MD2, MD4, and MD5
- 23.5.1. Use Message Digests for Storing Passwords
- 23.9. A Good Random Seed Generator
- digital signatures versus
: 6.6.3.6. PGP detached signatures
- in POP
: 17.3.10. Post Office Protocol (POP) (TCP Ports 109 and 110)
- media
: 12.3.3. Other Media
- damaged by smoke
: 12.2.1.2. Smoke
- destroying
: 12.3.2.3. Sanitize your media before disposal
- failure of
: 7.1.4. Guarding Against Media Failure
- hard/soft disk quotas
: 25.2.2.5. Using quotas
- print through process
: 12.3.2.1. Verify your backups
- rotating for backups
: 7.1.3. Types of Backups
- rotation of
: 7.2.1.2. Media rotation
- sanitizing
: 12.3.2.3. Sanitize your media before disposal
- viruses from
: 11.1.5. Viruses
- meet-in-the-middle attacks
: 6.4.5.1. Double DES
- memory
- 25.2.2. Disk Attacks
- 25.2.2.8. Tree-structure attacks
- hidden space
: 25.2.2.7. Hidden space
- reserved space
: 25.2.2.6. Reserved space
- swap space
: 25.2.3. Swap Space Problems
- /tmp directory and
: 25.2.4. /tmp Problems
- tree-structure attacks
: 25.2.2.8. Tree-structure attacks
- Merkle, Ralph
: 6.4.5.1. Double DES
- Message Authentication Code (MAC)
: 6.5.5.2. Message authentication codes
- message digests
- 6.5. Message Digests and Digital Signatures
- 6.5.2. Using Message Digests
- 9.2.3. Checksums and Signatures
- 23.5.1. Use Message Digests for Storing Passwords
- Tripwire package
- 9.2.4. Tripwire
- 9.2.4.2. Running Tripwire
- message flooding
: 25.3.2. Message Flooding
- messages log file
: 10.2.3. messages Log File
- meta characters
: 23.2. Tips on Avoiding Security-related Bugs
- metadata
- 9.2.2. Checklists and Metadata
- 9.2.2.2. Ancestor directories
- Metropolitan Networks (MANs)
: 16.1. Networking
- MH (mail handler)
: 11.5.2.5. .forward, .procmailrc
- Micro-BIT Virus Center
: F.3.4.16. Germany: Southern area
- Miller, Barton
: 23.1.2. An Empirical Study of the Reliability of UNIX Utilities
- MILNET
: F.3.4.20. MILNET
- MIME
: 11.1.5. Viruses
- MIT-KERBEROS-5 authentication
: 17.3.21.3. The xhost facility
- Mitnick, Kevin
: 27.2.6. Network Providers that Network Too Well
- mkpasswd program
: 8.8.4. Password Generators
- mktemp function
: 23.2. Tips on Avoiding Security-related Bugs
- MLS (Multilevel Security) environment
: "Secure" Versions of UNIX
- mobile network computing
: 8.7. One-Time Passwords
- modems
- 14. Telephone Security
- 14.6. Additional Security for Modems
- callback setups
- 14.4.2.
- 14.6. Additional Security for Modems
- clogging
: 25.3.4. Clogging
- encrypting
: 14.6. Additional Security for Modems
- hanging up
: (see signals)
- physical security of
- 14.5.4. Physical Protection of Modems
- 14.6. Additional Security for Modems
- recording call information
: 10.3.1. aculog File
- tracing connections
- 24.2.4. Tracing a Connection
- 24.2.4.2. How to contact the system administrator of a computer you don't know
- UNIX and
- 14.5. Modems and UNIX
- 14.5.3.3. Privilege testing
- modification times
- 5.1.2. Inodes
- 5.1.5. File Times
- 7.4.7. inode Modification Times
- 9.2.2. Checklists and Metadata
- monitoring
- hardware for
: (see detectors)
- intruders
: 24.2.3. Monitoring the Intruder
- performance
: 13.2.3. Performance Reviews and Monitoring
- security
: (see logging)
- users
: 26.2.6. Other Tips
- monitors and screen savers
: 12.3.5.2. X screen savers
- Morris, Robert T.
- 1. Introduction
- 8.6. The UNIX Encrypted Password System
- 17.4. Security Implications of Network Services
- motd file
: 26.2.6. Other Tips
- Motorola, Inc.
: F.3.4.20. MILNET
- Motorola, Inc. and subsidiaries
: F.3.4.21. Motorola, Inc. and subsidiaries
- mount command
: 20.3. Client-Side NFS Security
- -nodev option
: 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
- -nosuid option
: 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
- mounted filesystems
: 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
- mouting filesystem
: (see directories)
- mrand48 function
: 23.7.3. drand48 ( ), lrand48 ( ), and mrand48 ( )
- mtime
- 5.1.2. Inodes
- 5.1.5. File Times
- 9.2.2. Checklists and Metadata
- 24.4.1.6. Changes to startup files
- MUDs (Multiuser Dungeons)
: 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
- Muffet, Alec
: 10.5.3.1. Beware false log entries
- multicast groups
: 16.2.1.2. Classical network addresses
- MULTICS (Multiplexed Information and Computing Service)
: 1.3. History of UNIX
- multilevel security
- 1.3. History of UNIX
- 2.4.4.7. Defend in depth
- 2.5.3. Final Words: Risk Management Means Common Sense
- 17.2. Controlling Access to Servers
- multitasking
- 1.4. Security and UNIX
- C.1.3.3. Process priority and niceness
- multiuser operating systems
: 1.4. Security and UNIX
- multiuser workstations
: 17.3.21.1. /etc/fbtab and /etc/logindevperm
- munitions export
: 26.4.1. Munitions Export
- MX record type
: 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
- MYNAME= command
: 15.5.2. Permissions Commands
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
O'Reilly & Associates, Inc.
All Rights Reserved.