SUSE LINUX Enterprise Server 9 Administrators Handbook

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y]

F-Prot

facilities

Fake AP

fdisk

     command set 2nd

     Tool Session 2nd

Federal Trade Commission (FTC) Web site

Feigenbaum, Dr. Bary

File Transfer Protocol [See FTP]

files

     manual configuration

    sharing

         network services 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th

filesystems

     access tuning 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

     basic commands

     maximum size 2nd

     permissions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

         ACLs (access control lists) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

         changing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

         data encryption 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th

         default access 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

         hacker exploits 2nd 3rd 4th 5th

         metadata 2nd 3rd 4th 5th 6th

         ownership changes 2nd 3rd 4th

         secure file deletion 2nd 3rd 4th

         special permission bits 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd

     root 2nd 3rd 4th 5th

filters

     print job lifecycle 2nd

find command

     locating user files

     ownerless files

FINGER

     xinetd

finger utility

     GCOS field of /etc/passwd file

firewalls

     ACID (Analysis Console for Intrusion Databases) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

     intrusion detection 2nd 3rd

     iptables packet filtering 2nd 3rd 4th 5th 6th 7th 8th 9th

     multilayers

     NIDS (Network Intrusion Detection Systems) 2nd 3rd 4th

     security policies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

     Snort 2nd 3rd 4th 5th

floppy disks

     boot rescue disks 2nd

Floppy group

     defaults GID

forwarders

free command

fs.file-max parameter

fstab file 2nd

FTC (Federal Trade Commission) Web site

FTP 2nd 3rd

     (File Transfer Protocol)

     anonymous

     Pure-FTPd 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th

     security

     TFTP server 2nd 3rd

     vsftpd (Very Secure FTP Daemon) 2nd 3rd 4th 5th 6th 7th 8th 9th

ftp group

     defaults GID

ftp user

     default UID

full backups

fuser command

Категории