Index: P
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: P
- passwd command (Unix): 3.3.2.1. Unix account creation and deletion routines
 
- Passwd\:\:Solaris module: 3.1.4. Shadow Passwords
 
- password field (Unix): 3.1.1. The Classic Unix Password File
 
- password files
 
  
  - BSD 4.4: 3.1.3. Binary Database Format in BSD 4.4
 
  
  - shadow: 3.1.4. Shadow Passwords
 
  
  - Unix: 3.1.1. The Classic Unix Password File
 
 
- passwords
 
  
  - program for setting/changing: 10.5. Preventing Suspicious Activities
 
  
  - security and: 10.5. Preventing Suspicious Activities
 
  
  - Unix: 3.3.2.1. Unix account creation and deletion routines
 
  
  - Windows NT/2000: 3.2.3. NT/2000 Passwords
 
 
- PDUs (protocol data units): E. The Twenty-Minute SNMP Tutorial
 
- Perl
 
  
  - advantages/disadvantages of: 1.2. How Perl Can Help
 
  
  - databases
 
    
    - managing logins: 7.5. Database Logins
 
    
    - monitoring from: 7.6. Monitoring Server Health
 
  
 
  
  - DBI, using: 7.2. Using the DBI Framework
 
  
  - disk quotas, editing: 2.5.1. Editing Quotas with edquota Trickery
 
  
  - DNS, querying
 
    
    - Net\:\:DNS: 5.3.2.3. Using Net::DNS
 
    
    - nslookup: 5.3.2.1. Using nslookup
 
    
    - raw sockets: 5.3.2.2. Working with raw network sockets
 
  
 
  
  - edquota command, calling: 2.5.1. Editing Quotas with edquota Trickery
 
  
  - email
 
    
    - dissecting mailboxes/messages: 8.3.1. Dissecting a Single Message
 
    
    - sending: 8.1. Sending Mail
 
  
 
  
  - filesystems, dealing with differences in: 2.2.5. Dealing with Filesystem Differences from Perl
 
  
  - functions, detecting file changes: 10.1.1. Local Filesystem Changes
 
  
  - host files, reading: 5.1. Host Files
 
  
  - LDAP
 
    
    - modifying entries: 6.4.8. Modifying Entry Names
 
    
    - programming: 6.4.1. LDAP Programming with Perl 
 
  
 
  
  - LDIF, reading/writing: 6.4.5. Adding Entries with LDIF
 
  
  - log files
 
    
    - analyzing: 9.5. Log Analysis
 
    
    - rotating: 9.4.1. Log Rotation
 
    
    - scanning: 9.1. Text Logs
 
    
    - using unpack(): 9.2.1. Using unpack( )
 
  
 
  
  - modules (see modules)
 
  
  - networks, pinging/sniffing: 10.4.1. Perl Saves the Day
 
  
  - NIS, querying: 5.2. NIS, NIS+, and WINS
 
  
  - ODBC, using: 7.3. Using the ODBC Framework
 
  
  - repositories: 1.5. Locating and Installing Modules
 
  
  - security of: 1.6. It's Not Easy Being Omnipotent
 
  
  - SNMP, using: 10.3.1. Using SNMP from Perl
 
  
  - spam, finding source of: 8.3.3. Tracking Down Spam
 
  
  - SQL commands, sending: 7.3. Using the ODBC Framework
 
  
  - SQL databases, documenting: 7.4. Server Documentation
 
  
  - SQL Server, interacting with: 7.1. Interacting with an SQL Server from Perl
 
  
  - SYN attacks, detecting: 10.4.1. Perl Saves the Day
 
  
  - system administration, as language for: 1.2. How Perl Can Help
 
  
  - using Finger: 6.2. Finger: A Simple Directory Service
 
  
  - using WHOIS: 6.3. The WHOIS Directory Service
 
  
  - using WMI: 4.2.4. Using Window Management Instrumentation (WMI)
 
 
- Perl Package Manager (see PPM)
 
- placeholders, DBI: 7.2. Using the DBI Framework
 
- Poison Null Byte exploit: 1.6.3. Be Careful When Reading Data
 
- PPM (Perl Package Manager): 1.5. Locating and Installing Modules
 
  - 1.5.2. Installing Modules on Win32
 
 
- printers, managing with ADSI: 6.5.11. Working with Print Queues and Print Jobs via ADSI
 
- privileges: 1.6.2. Drop Your Privileges as Soon as Possible
 
  - 1.6.2. Drop Your Privileges as Soon as Possible
 
  
  - dropping: 1.6.2. Drop Your Privileges as Soon as Possible
 
 
- /proc filesystem: 4.3.3. Using the /proc Filesystem
 
- process control
 
  
  - Mac OS: 4.1. MacOS Process Control
 
  
  - Unix: 4.3. Unix Process Control
 
  
  - Windows NT/2000: 4.2. NT/2000 Process Control
 
 
- process handles: 4.2.2. Using the Win32::IProc Module
 
- processes: 4. User Activity
 
  
  - DLLs used by: 4.2.2. Using the Win32::IProc Module
 
  
  - executables used by: 4.2.2. Using the Win32::IProc Module
 
  
  - killing
 
    
    - Unix: 4.3.4. Using the Proc::ProcessTable Module
 
    
    - Windows NT/2000: 4.2.1. Using the Microsoft Resource Kit Binaries
 
      - 4.2.3. Using the Win32::Setupsup Module
 
    
 
  
 
  
  - listing
 
    
    - Mac: 4.1. MacOS Process Control
 
    
    - Unix: 4.3. Unix Process Control
 
    
    - Windows NT/2000: 4.2.1. Using the Microsoft Resource Kit Binaries
 
      - 4.2.3. Using the Win32::Setupsup Module
 
    
 
  
 
  
  - windows open, interacting with: 4.2.3. Using the Win32::Setupsup Module
 
 
- procmail program: 3.3.4. Account System Wrap-Up
 
- Proc\:\:ProcessTable module: 4.3.4. Using the Proc::ProcessTable Module
 
- programming, secure: 1.6. It's Not Easy Being Omnipotent
 
- programs
 
  
  - for setting/changing passwords: 10.5. Preventing Suspicious Activities
 
  
  - password-cracking: 10.5. Preventing Suspicious Activities
 
 
- properties, interface-/schema-defined: 6.5.1. ADSI Basics
 
- protocol data units (PDUs): E. The Twenty-Minute SNMP Tutorial
 
- providers (ADSI): 6.5.1. ADSI Basics
 
- ps program (Unix): 4.3.1. Calling an External Program 
 
- pulist.exe (Windows NT/2000): 4.2.1. Using the Microsoft Resource Kit Binaries
 
- pwd_mkdb command (BSD 4.4): 3.1.3. Binary Database Format in BSD 4.4
 
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2001
O'Reilly & Associates, Inc.
All Rights Reserved.