Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: V
- vacuums, computer
: 12.2.1.3. Dust
- VALIDATE= command
: 15.5.2. Permissions Commands
- vampire taps
: 12.3.1.5. Fiber optic cable
- vandalism
- 7.1.1.1. A taxonomy of computer failures
- 12.2.4. Vandalism
- 12.2.4.3. Network connectors
- /var directory
- 4.3.7. The Bad su Log
- 9.1.2. Read-only Filesystems
- (see also /usr directory)
- /var/adm/acct
: 10.2. The acct/pacct Process Accounting File
- /var/adm directory
: 11.5.3.6. Other files
- /var/adm/lastlog file
: 10.1.1. lastlog File
- /var/adm/loginlog file
: 10.1.4. loginlog File
- /var/adm/messages
: 10.2.3. messages Log File
- /var/adm/messages file
: 4.3.7. The Bad su Log
- /var/adm/savacct
: 10.2. The acct/pacct Process Accounting File
- /var/adm/sulog file
: 4.3.7. The Bad su Log
- /var/adm/wtmp file
- 10.1.2. utmp and wtmp Files
- 10.1.3.1. Pruning the wtmp file
- /var/adm/xferlog
: 10.3.3. xferlog Log File
- /var/log directory
: 11.5.3.6. Other files
- /var/spool/uucp/.Admin directory
: 10.3.4. uucp Log Files
- variables
- bounds checking
: 23.2. Tips on Avoiding Security-related Bugs
- to CGI scripts
: 18.2.3.1. Do not trust the user's browser!
- vendor liability
: 18.5.2. Trusting Your Software Vendor
- vendors
: 27.3.3. Your Vendor?
- ventilation
- 12.2.1.10. Vibration
- (see also dust; smoke and smoking)
- air ducts
: 12.2.3.2. Entrance through air ducts
- holes (in hardware)
: 12.2.4.1. Ventilation holes
- VERB command (sendmail)
: 17.3.4.3. Improving the security of Berkeley sendmail V8
- verifying
- backups
: 12.3.2.1. Verify your backups
- new passwords
: 3.5. Verifying Your New Password
- signatures with PGP
: 6.6.3.5. Decrypting messages and verifying signatures
- Verisign Inc.
: 18.6. Dependence on Third Parties
- Version 2 UUCP
- 15.2. Versions of UUCP
- 15.4. Security in Version 2 UUCP
- 15.4.3. L.cmds: Providing Remote Command Execution
- callback feature
: 15.4.1.5. Requiring callback
- Veteran's Health Administration
: F.3.4.45. U.S. Veteran's Health Administration
- vi editor
- 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
- 11.5.2.4. .exrc
- 11.5.2.7. Other initializations
- vibration
: 12.2.1.10. Vibration
- video tape
: 7.1.4. Guarding Against Media Failure
- vipw command
: 8.4.1. Changing an Account's Password
- virtual terminals
: (see Telnet utility)
- Virual Private Network
: 21.1.2. Uses of Firewalls
- viruses
- 11.1. Programmed Threats: Definitions
- 11.1.5. Viruses
- 27.2.2. Viruses on the Distribution Disk
- bacteria programs
: 11.1.7. Bacteria and Rabbits
- references on
: D.1.4. Computer Viruses and Programmed Threats
- voltage spikes
: 12.2.1.8. Electrical noise
- VPN
: 21.1.2. Uses of Firewalls
- VRFY option (sendmail)
: 17.3.4.3. Improving the security of Berkeley sendmail V8
- vsprintf function
: 23.2. Tips on Avoiding Security-related Bugs
- VT100 terminal
: 27.2.1. Hardware Bugs
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
O'Reilly & Associates, Inc.
All Rights Reserved.