Index: M
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: M
- machine
 
  
  - auditing (see audit, security)
 
  
  - backing up: 27.5.1. Backing Up Your Filesystems
 
  
  - choosing: 10.3. Choosing a Machine
 
  
  - configuring: 10.10.6. Reconfiguring for Production
 
    
    - on Unix/Linux: 11.5. Reconfiguring for Production
 
  
 
  
  - connecting: 10.10.8. Connecting the Machine
 
  
  - disconnecting or shutting down: 27.4.3. Planning for Disconnecting or Shutting Down Machines
 
  
  - hardening: 10.8. Building a Bastion Host
 
  
  - hardware (see hardware)
 
  
  - physical location of: 10.4. Choosing a Physical Location
 
  
  - securing: 10.9. Securing the Machine
 
    - 13.6. Controlling Unsafe Configurations
 
    
    - on Unix/Linux: 11.2. Securing Unix
 
    
    - on Windows NT: 12.3. Securing Windows NT
 
  
 
  
  - software (see software)
 
  
  - speed of: 10.3.2. How Fast a Machine?
 
 
- mail (see email)
 
- mail delivery agent (MDA): 16.1. Electronic Mail
 
- mail servers, evaluating: 16.1.2.1. Junk mail
 
- mail transfer agent (MTA): 16.1. Electronic Mail
 
- mail user agent (MUA): 16.1. Electronic Mail
 
- mailing lists, keeping current: 26.3.1.1. Mailing lists
 
  - A.3. Mailing Lists
 
 
- maintaining firewalls: 26. Maintaining Firewalls
 
- man-in-the-middle forgery: 8.6.1. Risks of Filtering by Source Address
 
- management tools: 2.9. Administrative Services
 
- managing accounts: 26.1.2. Managing Your Accounts
 
- MAPI (Microsoft Messaging API): 16.8. Microsoft Messaging API (MAPI)
 
- masquerading: 8.9.1.3. Masquerading
 
- master browser, on Microsoft networks: 20.4.2.2. Master browser
 
- MBONE (Multicast Backbone): 2.6. Real-Time Conferencing Services
 
  - 19.6. Multicast and the Multicast Backbone (MBONE)
 
 
- MD4 algorithm: 21.3.1. One-Time Password Software
 
  - C.5.3. Cryptographic Hashes and Message Digests
 
  - C.5.3. Cryptographic Hashes and Message Digests
 
 
- MDA (mail delivery agent): 16.1. Electronic Mail
 
- memory: 10.3.3. What Hardware Configuration?
 
  
  - for logs: 26.1.3. Managing Your Disk Space
 
    - 26.2.3. What Should You Watch For?
 
  
 
  
  - managing: 26.1.3. Managing Your Disk Space
 
 
- merging interior and exterior routers: 6.5.2. It's OK to Merge the Interior Router and the Exterior Router
 
- message digests: C.2.2. Cryptographic Hashes, Checksums, and Message Digests
 
- meta-packets, and filtering: 8.8.4. It Should Allow Rules Based on Any Header or Meta-Packet Criteria
 
- Microsoft DNS server, disabling: 12.4.5. Specific Windows NT Services to Disable
 
- Microsoft Exchange: 2.3.1. Electronic Mail
 
  - 16.4. Microsoft Exchange
 
 
- Microsoft Internet Explorer (see Internet Explorer)
 
- Microsoft Messaging API (MAPI): 16.8. Microsoft Messaging API (MAPI)
 
- Microsoft networks
 
  
  - browser roles: 20.4.2.1. Domain master browser
 
  
  - common security problems in: 18.3.2. Remote Graphic Interfaces for Microsoft Operating Systems
 
  
  - domains: 20.4.1. Domains and Workgroups
 
  
  - file sharing on: 17.4. File Sharing for Microsoft Networks 
 
  
  - workgroups: 20.4.1. Domains and Workgroups
 
 
- Microsoft Proxy Server: 9.7. Using Microsoft Proxy Server
 
- Microsoft RPC: 14.1. Remote Procedure Call (RPC)
 
  - 14.1. Remote Procedure Call (RPC)
 
  - 16.4. Microsoft Exchange
 
  
  - authentication: 14.1.2. Microsoft RPC Authentication
 
 
- Microsoft SQL Server (see SQL Server)
 
- Microsoft TCP/IP printing services, disabling: 12.4.5. Specific Windows NT Services to Disable
 
- Microsoft Terminal Server/Terminal Services: 18.3.4. Microsoft Terminal Server and Terminal Services
 
- MIME (Multimedia Internet Mail Extensions): 16.1.3. Multimedia Internet Mail Extensions (MIME)
 
  
  - extensions (see S/MIME OpenPGP)
 
 
- mobile code systems: 15.4. Mobile Code and Web-Related Languages
 
- modem pools: 6.6. Terminal Servers and Modem Pools
 
- modifying services: 10.10.5. Installing and Modifying Services
 
  
  - on Windows NT: 12.5. Installing and Modifying Services
 
  
  - on Unix: 11.4. Installing and Modifying Services
 
 
- monitoring system: 26.2. Monitoring Your System
 
  
  - automatically: 10.11.2. Consider Using Software to Automate Monitoring
 
 
- Morris worm: 13.2.2. What Data Does the Protocol Transfer?
 
  - 13.2.3.1. Does it have any other commands in it?
 
 
- mountd: 11.3.4.1. NFS and related services
 
  - 17.3.1. NFS Authentication
 
  - 17.3.6. Packet Filtering Characteristics of NFS
 
 
- mounting filesystems: 10.10.6.2. Mount filesystems as read-only
 
  - 11.5.3. Mount Filesystems as Read-Only
 
 
- mrouter: 4.3.4. IP over IP and GRE
 
- MRTG program: 10.11.2. Consider Using Software to Automate Monitoring
 
- MTA (mail transfer agent): 16.1. Electronic Mail
 
- MUA (mail user agent): 16.1. Electronic Mail
 
- Multicase Backbone (see MBONE)
 
- multicast IP: 4.3.4. IP over IP and GRE
 
- multicasting: 19.6. Multicast and the Multicast Backbone (MBONE)
 
- Multimedia Internet Mail Extensions (see MIME)
 
- MX records: 20.1.5.1. Set up a "fake" DNS server on the bastion host for the outside world to use
 
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2002
O'Reilly & Associates, Inc.
All Rights Reserved.