Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: E
- earthquakes
: 12.2.1.4. Earthquake
- eavesdropping
  
  - 12.3.1. Eavesdropping
  
- 12.3.1.5. Fiber optic cable
  
- 12.4.1.2. Potential for eavesdropping and data theft
  
- 14.4.4. Protecting Against Eavesdropping
  
- 14.4.4.2. Protection against eavesdropping
  
- 16.3.1. Link-level Security
  
- IP packets
  
       
    - 16.3.1. Link-level Security
    
- 17.3.3. TELNET (TCP Port 23)
  
  
  - through log files
: 18.4.2. Eavesdropping Through Log Files
  
- on the Web
  
  
    - 18.4. Avoiding the Risks of Eavesdropping
    
- 18.4.2. Eavesdropping Through Log Files
  
  
  - X clients
: 17.3.21.2. X security
 
- ECB (electronic code book)
 
  - 6.4.4.2. DES modes
  
- 6.6.2. des: The Data Encryption Standard
  
- echo command
: 23.5. Tips on Using Passwords
- ECPA (Electronic Communications Privacy Act)
: 26.2.3. Federal Computer Crime Laws
- editing wtmp file
: 10.1.3.1. Pruning the wtmp file
- editors
: 11.5.2.7. Other initializations
    
  - buffers for
: 11.1.4. Trojan Horses
  
- Emacs
: 11.5.2.3. GNU .emacs
  
- ex
  
   
    - 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
    
- 11.5.2.4. .exrc
    
- 11.5.2.7. Other initializations
  
   
  - startup file attacks
: 11.5.2.4. .exrc
  
- vi
  
  
    - 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
    
- 11.5.2.4. .exrc
    
- 11.5.2.7. Other initializations
  
   
- edquota command
: 25.2.2.5. Using quotas
- EDS
: F.3.4.11. EDS and EDS customers worldwide
- education
: (see security, user awareness of)
- effective UIDs/GIDs
    
  - 4.3.1. Real and Effective UIDs
  
- 5.5. SUID
  
- 10.1.2.1. su command and /etc/utmp and /var/adm/wtmp files
  
- C.1.3.2. Process real and effective UID
    
- 8mm video tape
: 7.1.4. Guarding Against Media Failure
- electrical fires
  
  - 12.2.1.2. Smoke
  
- (see also fires; smoke and smoking)
  
- electrical noise
: 12.2.1.8. Electrical noise
- electronic
  
  - breakins
: (see breakins; cracking)
  
- code book (ECB)
  
  
    - 6.4.4.2. DES modes
    
- 6.6.2. des: The Data Encryption Standard
  
  
  - mail
: (see mail)
 
- Electronic Communications Privacy Act (ECPA)
: 26.2.3. Federal Computer Crime Laws
- ElGamal algorithm
  
  - 6.4.2. Summary of Public Key Systems
  
- 6.5.3. Digital Signatures
  
- elm (mail system)
: 11.5.2.5. .forward, .procmailrc
- emacs editor
: 11.5.2.7. Other initializations
- .emacs file
: 11.5.2.3. GNU .emacs
- email
: (see mail)
- embedded commands
: (see commands)
- embezzlers
: 11.3. Authors
- emergency response organizations
: (see response teams)
- employees
        
  - 11.3. Authors
  
- 13. Personnel Security
  
- 13.3. Outsiders
  
- departure of
: 13.2.6. Departure
  
- phonebook of
: 12.3.3. Other Media
  
- security checklist for
: A.1.1.12. Chapter 13: Personnel Security
  
- targeted in legal investigation
: 26.2.5. If You or One of Your Employees Is a Target  of an Investigation...
  
- trusting
: 27.3.1. Your Employees?
  
- written authorization for
: 26.2.6. Other Tips
         
- encryption
 
  - 6.2. What Is Encryption?
  
- 6.2.2. The Elements of Encryption
  
- 12.2.6.2. Encryption
  
- (see also cryptography)
  
- algorithms
: 2.5. The Problem with Security  Through Obscurity
  
     
    - crypt
    
 
      - 6.6.1. UNIX crypt: The Original UNIX Encryption Command
      
- 6.6.1.3. Example
    
  
    - Digital Signature Algorithm
    
 
      - 6.4.2. Summary of Public Key Systems
      
- 6.5.3. Digital Signatures
    
  
    - ElGamal
: 6.4.2. Summary of Public Key Systems
    
- IDEA
: 6.4.1. Summary of Private Key Systems
    
- RC2, RC4, and RC5
    
   
      - 6.4.1. Summary of Private Key Systems
      
- 6.4.8. Proprietary Encryption Systems
    
  
    - ROT13
: 6.4.3. ROT13: Great for Encoding Offensive Jokes
    
- RSA
    
  
      - 6.4.2. Summary of Public Key Systems
      
- 6.4.6. RSA and Public Key Cryptography
      
- 6.4.6.3. Strength of RSA
    
   
  
  - application-level
: 16.3.1. Link-level Security
  
- of backups
  
  
    - 7.1.6.3. Data security for backups
    
- 7.4.4. Encrypting Your Backups
    
- 12.3.2.4. Backup encryption
  
   
  - checklist for
: A.1.1.5. Chapter 6: Cryptography
  
- Data Encryption Standard (DES)
  
  
    - 6.4.1. Summary of Private Key Systems
    
- 6.4.4. DES
    
- 6.4.5.2. Triple DES
    
- 6.6.2. des: The Data Encryption Standard
  
    
  - DCE and
: 3.2.2. The /etc/passwd File and Network Databases
  
- Diffie-Hellman
: (see Diffie-Hellman key exchange system)
  
- end-to-end
: 16.3.1. Link-level Security
  
- Enigma system
  
    
    - 6.3. The Enigma Encryption System
    
- 6.6.1.1. The crypt program
    
- (see also crypt command/algorithm)
  
   
  - escrowing keys
  
 
    - 6.1.3. Modern Controversy
    
- 7.1.6.3. Data security for backups
  
  
  - exporting software
: 26.4.1. Munitions Export
  
- of hypertext links
: 18.4.1. Eavesdropping Over the Wire
  
- laws about
  
   
    - 6.7. Encryption and U.S. Law
    
- 6.7.2. Cryptography and Export Controls
  
  
  - link-level
: 16.3.1. Link-level Security
  
- of modems
: 14.6. Additional Security for Modems
  
- Netscape Navigator system
: 18.4.1. Eavesdropping Over the Wire
  
- with network services
: 17.4. Security Implications of Network Services
  
- one-time pad mechanism
: 6.4.7. An Unbreakable Encryption Algorithm
  
- of passwords
  
      
    - 8.6. The UNIX Encrypted Password System
    
- 8.6.4. Crypt16() and Other Algorithms
    
- 23.5. Tips on Using Passwords
  
   
  - PGP
: (see PGP)
  
- programs for UNIX
  
  
    - 6.6. Encryption Programs Available for UNIX
    
- 6.6.3.6. PGP detached signatures
  
  
  - proprietary algorithms
: 6.4.8. Proprietary Encryption Systems
  
- RC4 and RC5 algorithms
: 6.4.1. Summary of Private Key Systems
  
- references on
: D.1.5. Cryptography Books
  
- Skipjack algorithm
: 6.4.1. Summary of Private Key Systems
  
- superencryption
: 6.4.5. Improving the Security of DES
  
- and superusers
: 6.2.4. Why Use Encryption with UNIX?
  
- of Web information
: 18.4.1. Eavesdropping Over the Wire
       
- end-to-end encryption
: 16.3.1. Link-level Security
- Energy Sciences Network (ESnet)
: F.3.4.43. U.S. Department of Energy sites,  Energy Sciences Network (ESnet), and DOE contractors
- Enigma encryption system
   
  - 6.3. The Enigma Encryption System
  
- 6.6.1.1. The crypt program
  
- Enterprise Networks
: 16.1. Networking
- environment variables
  
  - 11.5.2.7. Other initializations
  
- 23.2. Tips on Avoiding Security-related Bugs
  
- environment, physical
 
  - 12.2.1. The Environment
  
- 12.2.1.13. Environmental monitoring
  
- erasing disks
: 12.3.2.3. Sanitize your media before disposal
- erotica, laws governing
: 26.4.5. Pornography and Indecent Material
- errno variable
: 23.2. Tips on Avoiding Security-related Bugs
- errors
: 7.1.1.1. A taxonomy of computer failures
    
  - in ACLs
: 5.2.5.1. AIX Access Control Lists
  
- configuration
: 9.1. Prevention
  
- human
: 7.1.4. Guarding Against Media Failure
   
- errors
 
  - Preface
  
- (see also auditing, system activity)
  
- escape sequences, modems and
: 14.5.3.1. Originate testing
- escrowing encryption keys
  
  - 6.1.3. Modern Controversy
  
- 7.1.6.3. Data security for backups
  
- ESnet (Energy Sciences Network)
: F.3.4.43. U.S. Department of Energy sites,  Energy Sciences Network (ESnet), and DOE contractors
- espionage
: 11.3. Authors
- /etc directory
   
  - 11.1.2. Back Doors and Trap Doors
  
- 11.5.3.5. System initialization files
  
- backups of
: 7.1.3. Types of Backups
  
- /etc/aliases file
: 11.5.3.3. /usr/lib/aliases, /etc/aliases, /etc/sendmail/aliases, aliases.dir, or aliases.pag
  
- /etc/default/login file
: 8.5.1. Secure Terminals
  
- /etc/exports file
  
      
    - 11.6.1.2. Writable system files and directories
    
- 19.3.2.4. Using Secure NFS
    
- making changes to
: 20.2.1.2. /usr/etc/exportfs
  
   
  - /etc/fbtab file
: 17.3.21.1. /etc/fbtab and /etc/logindevperm
  
- /etc/fingerd program
: (see finger command)
  
- /etc/fsck program
: 24.4.1.7. Hidden files and directories
  
- /etc/fstab file
  
    
    - 11.1.2. Back Doors and Trap Doors
    
- 19.3.2.5. Mounting a secure filesystem
  
  
  - /etc/ftpd
: (see ftpd server)
  
- /etc/ftpusers file
: 17.3.2.5. Restricting FTP with the standard UNIX FTP server
  
- /etc/group file
  
   
    - 1.2. What Is an Operating System?
    
- 4.1.3.1. The /etc/group file
    
- 4.2.3. Impact of the /etc/passwd and /etc/group Files  on Security
    
- 8.1.6. Group Accounts
  
    
  - /etc/halt command
: 24.2.6. Anatomy of a Break-in
  
- /etc/hosts file
: 16.2.3.1. The /etc/hosts file
  
- /etc/hosts.equiv
: (see hosts.equiv file)
  
- /etc/hosts.lpd file
: 17.3.18.6. /etc/hosts.lpd file
  
- /etc/inetd
: (see inetd daemon)
  
- /etc/inetd.conf file
: 17.3. Primary UNIX Network Services
  
- /etc/init program
: C.5.1. Process #1: /etc/init
  
- /etc/inittab
: (see inittab program)
  
- /etc/keystore file
: 19.3.1.1. Proving your identity
  
- /etc/logindevperm file
: 17.3.21.1. /etc/fbtab and /etc/logindevperm
  
- /etc/motd file
: 26.2.6. Other Tips
  
- /etc/named.boot file
  
            
    - 17.3.6.1. DNS zone transfers
    
- 17.3.6.2. DNS nameserver attacks
  
  
  - /etc/passwd file
  
 
    - 1.2. What Is an Operating System?
    
- 3.2.1. The /etc/passwd File
    
- 3.2.2. The /etc/passwd File and Network Databases
    
- 4.2.3. Impact of the /etc/passwd and /etc/group Files  on Security
    
- 8.1.1. Accounts Without Passwords
    
- 8.6. The UNIX Encrypted Password System
    
- C.5.1. Process #1: /etc/init
    
- + in
: (see NIS)
    
- accounts without passwords
: 8.1.1. Accounts Without Passwords
    
- backing up
: 7.1.2. What Should You Back Up?
    
- new accounts
: 24.4.1. New Accounts
    
- NFS
: 20.2.1.1. /etc/exports
    
- uucp user and
: 15.1.4. How the UUCP Commands Work
  
             
  - /etc/profile file
  
 
    - 11.5.2.1. .login, .profile, /etc/profile
    
- 24.4.1.6. Changes to startup files
  
  
  - /etc/publickey file
: 19.3.2.1. Creating passwords for users
  
- /etc/rc directory
  
  
    - 11.5.3.5. System initialization files
    
- 17.1.2. Starting the Servers
    
- C.5.1. Process #1: /etc/init
    
- commenting out services
: 17.3. Primary UNIX Network Services
  
    
  - /etc/remote file
  
 
    - 10.3.1. aculog File
    
- 14.5.1. Hooking Up a Modem to Your Computer
  
  
  - /etc/renice
: (see renice command)
  
- /etc/secure/passwd file
: 8.1.1. Accounts Without Passwords
  
- /etc/security/passwd.adjunct file
: 8.8.5. Shadow Password Files
  
- /etc/sendmail/aliases file
: 11.5.3.3. /usr/lib/aliases, /etc/aliases, /etc/sendmail/aliases, aliases.dir, or aliases.pag
  
- /etc/services file
: 17.1.1. The /etc/services File
  
- /etc/services file
: 17.1.1. The /etc/services File
  
- /etc/shadow file
  
       
    - 8.1.1. Accounts Without Passwords
    
- 8.8.5. Shadow Password Files
  
  
  - /etc/shells file
: 8.4.2. Changing the Account's Login Shell
  
- /etc/syslogd
: (see syslog facility)
  
- /etc/tty file, backing up
: 7.1.2. What Should You Back Up?
  
- /etc/ttys file
  
    
    - 8.5.1. Secure Terminals
    
- 14.5.1. Hooking Up a Modem to Your Computer
  
  
  - /etc/ttytab file
: C.5.1. Process #1: /etc/init
  
- /etc/utmp file
  
  
    - 10.1.2. utmp and wtmp Files
    
- 10.1.2.1. su command and /etc/utmp and /var/adm/wtmp files
    
- 24.2.1. Catching One in the Act
    
- 24.2.4. Tracing a Connection
  
    
  - /etc/uucp directory
: 15.4.2.1. Some bad examples
  
- /etc/yp/makedbm program
: 19.4.4.1. Setting up netgroups
  
- in restricted filesystems
: 8.1.5. Restricted Filesystem
   
- Ethernet
: 16.1. Networking
 
  - addresses for random seeds
: 23.8. Picking a Random Seed
  
- cables
: (see cables, network)
  
- eavesdropping by
: 12.3.1.2. Eavesdropping by Ethernet and 10Base-T
   
- Ethers table (NIS+)
: 19.5.3. NIS+ Tables
- Euler Totient Function
: 6.4.6.1. How RSA works
- eval function
   
  - 18.2.3.2. Testing is not enough!
  
- 18.2.3.3. Sending mail
  
- evidence, equipment seized as
: 26.2.4. Hazards of Criminal Prosecution
- ex editor
  
  - 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
  
- 11.5.2.4. .exrc
  
- 11.5.2.7. Other initializations
   
- exceptions
: C.2. Creating Processes
- exclamation mark (!) and mail command
: 15.1.3. mail Command
- exclusive OR (XOR)
: 6.4.7. An Unbreakable Encryption Algorithm
- exec (in Swatch program)
: 10.6.2. The Swatch Configuration File
- exec system call
     
  - 5.1.7. File Permissions in Detail
  
- 18.2.3.3. Sending mail
  
- 23.2. Tips on Avoiding Security-related Bugs
  
- 25.2.1.1. Too many processes
    
- ExecCGI option
: 18.3.2. Commands Within the <Directory> Block
- execl system call
: 23.4. Tips on Writing SUID/SGID Programs
- execlp system call
: 23.4. Tips on Writing SUID/SGID Programs
- execute permission
    
  - 5.1.7. File Permissions in Detail
  
- 5.4. Using Directory Permissions
  
- execv system call
: 23.4. Tips on Writing SUID/SGID Programs
- execve system call
: 23.4. Tips on Writing SUID/SGID Programs
- execvp system call
: 23.4. Tips on Writing SUID/SGID Programs
- expiring
    
  - accounts
: 8.4.3. Finding Dormant Accounts
  
- FTP depositories
: 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP server
  
- passwords
: 8.8.6. Password Aging and Expiration
   
- explosions
: 12.2.1.5. Explosion
- export laws
: 26.4.1. Munitions Export
  
  - cryptography
  
 
    - 6.4.4.1. Use and export of DES
    
- 6.7.2. Cryptography and Export Controls
  
  
- exportfs command
: 20.2.1.2. /usr/etc/exportfs
- exports file
  
  - 11.6.1.2. Writable system files and directories
  
- 19.3.2.4. Using Secure NFS
  
- 20.2.1.1. /etc/exports
  
- 20.2.1.2. /usr/etc/exportfs
    
- .exrc file
: 11.5.2.4. .exrc
- ext2 filesystem (Linux)
: 25.2.2.6. Reserved space
- external data representation (XDR)
: 19.2. Sun's Remote Procedure Call (RPC)
- extinguishers, fire
: (see fires)
- extortion
: 11.3. Authors
     
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
 O'Reilly & Associates, Inc.
All Rights Reserved.