Practical Guide to Software Quality Management (Artech House Computing Library)

 < Day Day Up >   

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] race conditions 2nd

random number generators raw devices 2nd 3rd Raymond, Eric RBLs (real-time blacklists) 2nd 3rd

rc.conf file     BIND 9 and     immutability of     IPFW firewall_type     launching BIND from     OpenBSD and     screen blanking

     syslogd_flags variable

     turning off services     tweakingrc.conf.local file

     disabling services

     immutability of

     PF and

     pflogd and     rdate and

     rdate_flags     syslogd_flags variable

     tweaking rc.firewall file 2nd 3rd RC2 algorithm 2nd RC4 algorithm 2nd rcmd command

RCPT TO: command (SMTP)

RCS (Revision Control System) 2nd

rdate command (OpenBSD) 2nd

rdate_flags option

rdist command

rdonly option (mount)

rdump command

read permission

     ACLs and

     expectations for

     securelevel and

     Unix standard

     wheel group and

Real Secure real-time blacklists (RBLs) 2nd

Received (SMTP header)

recursion, limiting 2nd

recursive queries 2nd 3rd 4th 5th

RedHat operating system REFERER checks refuse files

register_globals setting (PHP) registration hijacking 2nd regression testing regular expressions

reject suspect mail REJECT value (Sendmail) reject_rbl_clcient directive RELAY value (Sendmail) relay-domains filereliability     FreeBSD and

     syslog-ng and

     syslogd and     UDP and remote administration 2nd 3rd

repository, CVS 2nd

Request for Comments [See RFCs]

reset action (ipfw)

resolv.conf file 2nd 3rd --restart-time command-line argument

restore command restrictexpand value (PrivacyOptions)

restrictmailq value (PrivacyOptions) restrictqrun value (PrivacyOptions) reverse zones 2nd Revision Control System (RCS) 2nd RFC 931

RFC 1135

RFC 1918 2nd 3rd

RFC 1945

RFC 2068

RFC 2196

RFC 2246

RFC 2518

RFC 2554

RFC 2845

RFC 3195

RFC 3330

RFC-ignorant.org

RFCs (Request for Comments)

     DNS-related     logging-related

     mail-related 2nd

     security-related

     web-related

RIP routing protocolrisk mitigation     authorized_keys file and

     considerations     controlling mail flow     DNS attacks and     DoS attacks and

     listening services     malware and     NTP servers     overview     recommendations     response planning and execution     syslogd and 2nd

risks [See also vulnerabilities] [See also vulnerabilities]

     and consequences     accepting     DNS and

     DoS attacks

     identifying

     identifying attacks

     improper configuration and use     infrastructure servers and

     Internet connectivity and     network installations and

     network versus local attacks     physical security 2nd     problems in software     security and 2nd 3rd     transferring

rlogin protocol

rlogind command

rm command

rndc command 2nd

rndc-confgen script (BIND 9)

rndc.conf file 2nd

rndc.key file

Roesch, Marty

root access

     log monitoring and

     NIS and

     ports system and

     safeguarding 2nd

     sendmail and     setuid binary and

     su command and

     syslogd and

Rootkit Hunter

rootkitsrouters     denied traffic

     NAT and 2nd     protocols and Rowland, Craig RPC 2nd 3rd

RSA algorithm rsh protocol RSH variable rsync command 2nd 3rd rules keyword (pfctl)rulesets     IPFW and 2nd 3rd

     PF and 2nd

     updating     validating     verbose output

RunAsUser option (sendmail)

ruserok command

 < Day Day Up >   

Категории