Practical Guide to Software Quality Management (Artech House Computing Library)

 < Day Day Up >   

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] -d flag (pfctl)

--daemon command-line argument daemon facility 2nd 3rd daemontools DATA command (SMTP)

data integrity [See integrity] data link layer data recovery, security and DAV module (Apache) DBx option (Postfix) dd command 2nd DDoS (distributed denial-of-service) attacks 2nd 3rd

debug level (syslog)

DEBUG option (FreeBSD) debugging 2nd 3rd default deny concept

default_process_limit variable (Postfix)

default_user_name option (cgi.cfg)

DefaultUser option (sendmail) 2nd

defense in depth principle 2nd 3rd delete command (ipfw)

Delivermail delivery status notifications (DSNs)

Delldemilitarized zone [See DMZ] Denver Project deny action (ipfw) DenyGroups option (sshd_config)

DenyUsers option (sshd_config)

DES encryption 2nd

DESTDIR environment variable

devfs filesystem

devfs.conf file

device bpf PF)

device nodes 2nd 3rd

device pf (PF)

device pflog (PF)

device pfsync (PF)

DHCP

     BIND and

     dangers of 2nd

     OpenBSD and     security and

digest authentication

digital signatures 2nd 3rd

directories

     chroot and 2nd     expectations for     immutable

     looking for strange     minirsyslogd     mod_userdir and     Sendmail permissions 2nd

     Snort and     union mounts and     world-writable 2nd disaster recovery DISCARD value (Sendmail) disclosure, file and data display_errors setting (PHP)

Distributed Authoring and Versioning (DAV) protocol

distributed denial-of-service (DDoS) attacks 2nd 3rd distribution sets 2nd divert action (ipfw)

djbdns

     additional resources

     BIND comparison

     cache poisoning and     installing

     missing zone data and     operating

     overview 2nd     secure file distribution     security and options andDMZ (demilitarized zone)     backup server and

     considerations

     firewalls and 2nd 3rd

     PF and 2nd

     recursion servers and

     security policies on

     web servers and

DNS (Domain Name Service)

     architecture 2nd

     BIND 2nd 3rd 4th

     criticality of

     djbdns 2nd 3rd 4th 5th

     IP addresses and

     mail servers and

     real-time blacklists     risks related to

DNS attacks 2nd

DNS servers

     chroot and

     firewalls and     MITM attacks     network buffering and

     security and 2nd 3rd     syscall auditing     trust and     user access and

DNS spoofing dnscache server (djbdns) 2nd 3rd dnscache-conf script dnsqr tool DNSSEC document templates 2nddocumentation

     change control and

     djbdns and 2ndDomain Name Service [See DNS]domains

     identifying internal

     internal mail servers and

     masquerading 2nd 3rd

     MX records and 2nd     registration hijacking

     syslogd and DontBlameSendmail option (sendmail)

DoS (denial of service) attacks     Apache and     backup MX servers and     identifying risks     logs to loghosts and

     mail servers and

     Postfix and

     Sendmail and 2nd

     severity assessment and

     syslog-ng and

     thttpd and

drop action (ipfw)

DSNs (delivery status notifications)

dummynet command

dump command

     arch flag and

     backups and 2nd 3rd

     nodump flag and 2nd 3rd 4th

     raw devices and dump flag

dumpcommand

     raw devices and

dynamic updates 2nd 3rd

 < Day Day Up >   

Категории