SUSE LINUX Enterprise Server 9 Administrators Handbook

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y]

SAINT

     (Security Administrator's Integrated Network Tool)

Samba

     domains 2nd

     Network Name Service 2nd

     server setup 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd

SANS Institute Web site 2nd

Sans Web site

Sarbanes-Oxley Act 2nd

SBA

     (System Backup Administrator)

scanlogd

Scanlogd tool 2nd 3rd

schedules

     backups 2nd 3rd 4th 5th 6th 7th

         consideration points 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

         databases 2nd 3rd 4th 5th 6th

         GFS rotation scheme 2nd 3rd 4th

         Tower of Hanoi rotation scheme 2nd 3rd

Schneier, Bruce Web site

script kiddie

script language

     bash shell

scripts

     login shell 2nd 3rd 4th 5th 6th 7th

seccheck

seccheck scripts

secret keys

     wireless network data 2nd 3rd 4th 5th 6th 7th

secret-key encryption

secure file deletion 2nd 3rd 4th

Secure Shell [See ssh]

security

     automating hardening 2nd 3rd 4th 5th 6th

    backups

         boot rescue disks 2nd 3rd 4th

         implementation 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd

         strategies 2nd 3rd 4th 5th 6th 7th

         tools 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th 68th 69th 70th 71st 72nd 73rd 74th 75th 76th 77th 78th 79th 80th 81st 82nd 83rd 84th 85th 86th 87th 88th 89th 90th 91st 92nd 93rd 94th 95th 96th 97th 98th 99th 100th 101st 102nd 103rd 104th 105th

     complete 2nd

     daemons 2nd

     filesystem permissions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

         ACLs (access control lists) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

         changing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

         data encryption 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th

         default access 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

         hacker exploits 2nd 3rd 4th 5th

         metadata 2nd 3rd 4th 5th 6th

         ownership changes 2nd 3rd 4th

         secure file deletion 2nd 3rd 4th

         special permission bits 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd

     hardening system 2nd 3rd 4th 5th 6th 7th 8th

    intrusion detection

         assessing vulnerabilities 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd

         defining 2nd 3rd 4th 5th

         host intrusions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th

         network-based intrusions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th

         reducing exposure 2nd 3rd 4th 5th 6th

         tools 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

     network services 2nd 3rd

         chroot jails 2nd 3rd

         hardening hardware 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

         hardening remote services 2nd 3rd 4th 5th

         iptables packet filtering 2nd 3rd 4th 5th 6th 7th 8th 9th

         rights limitations 2nd 3rd 4th 5th

         UML (User Mode Linux) 2nd 3rd 4th

         wireless networks 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th

     operating system ratings 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

     policies 2nd 3rd 4th 5th 6th 7th 8th

         AUP (acceptable user policy) 2nd 3rd 4th 5th 6th

         firewalls 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

         incident response 2nd 3rd 4th

         information protection 2nd 3rd 4th

         passwords 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th

         physical security 2nd 3rd 4th 5th 6th 7th

         remote access 2nd

         user account 2nd 3rd 4th 5th 6th 7th

     resources 2nd 3rd 4th

         newsgroups 2nd

         Web sites 2nd 3rd

     restricting root login 2nd 3rd 4th

     Sarbanes-Oxley Act

     SLES 9 hardening packages 2nd 3rd

     SUID/SGID permission bits 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

     syslog server 2nd 3rd 4th 5th 6th

         hardening central host 2nd 3rd 4th 5th 6th 7th

         stealth logging host 2nd 3rd

     users 2nd

         account authentication 2nd 3rd 4th

         auditing default accounts 2nd

         environment configuration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd

         multiple groups per user 2nd

         resource management 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st

         root account 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

         strong passwords 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th

         su and sudo command 2nd 3rd 4th 5th 6th 7th

     YaST maintenance

Security Administrator's Integrated Network Tool

     (SAINT)

Security Focus Web site

Security Settings

Security Target

sed text editor

Sendmail

sendmail

Sendmail 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th

serial interface type

server

     hardware 2nd

         adding disk 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th

         preparation 2nd 3rd 4th

    network configuration

         changing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

     packages 2nd

         installation

         removing components 2nd 3rd 4th 5th

Server Message Block [See SMB]

     (SMB)

server-side applications

     security 2nd 3rd

         chroot jails 2nd 3rd

         hardening hardware 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

         hardening remote services 2nd 3rd 4th 5th

         iptables packet filtering 2nd 3rd 4th 5th 6th 7th 8th 9th

         rights limitations 2nd 3rd 4th 5th

         UML (User Mode Linux) 2nd 3rd 4th

         wireless networks 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th

servers

    booting

         boot loaders 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

         emergency recovery 2nd 3rd 4th 5th

         init program 2nd 3rd 4th

         kernel boot 2nd 3rd

     load management 2nd 3rd

    network security

         policies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th

     shutdowns 2nd 3rd 4th

     syslog 2nd 3rd 4th 5th 6th

         hardening central host 2nd 3rd 4th 5th 6th 7th

         stealth logging host 2nd 3rd

     system configuration 2nd

         SuSEconfig 2nd 3rd 4th 5th

         YaST 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

     system management 2nd

         filesystem access 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

         kernel parameters 2nd 3rd 4th 5th 6th

Service Location Protocol [See SLP]

Service Set ID [See SSID]

services

     configuration 2nd

     network security 2nd 3rd

         chroot jails 2nd 3rd

         hardening hardware 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

         hardening remote services 2nd 3rd 4th 5th

         iptables packet filtering 2nd 3rd 4th 5th 6th 7th 8th 9th

         rights limitations 2nd 3rd 4th 5th

         UML (User Mode Linux) 2nd 3rd 4th

         wireless networks 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th

    networks

         authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

         daemons 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th

         email 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st

         file-sharing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th

         FTP (File Transfer Protocol) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd

         Network Name Service 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd

         remote access 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st

         timing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th

         Web 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

     packages 2nd

         installation

         removing components 2nd 3rd 4th 5th

     YaST maintenance

Set GID [See SGID]

Set UID [See SUID]

Settings screen

     installation

SGID

     (Set GID)

     permission value

     special permission bit 2nd 3rd 4th 5th 6th 7th 8th 9th

         file sharing 2nd 3rd 4th 5th

         security implications 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

Shadow group

     defaults GID

share name

shared key authentication

sharing files 2nd 3rd

     NFS server setup 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

     Samba server 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd

shell

    login

         scripts 2nd 3rd 4th 5th 6th 7th

     user configuration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

shell scripts

     file permissions

Shipley, Peter

Shred

shutdown command

shutdowns

     servers 2nd 3rd 4th

Silva, James da

     AMANDA

skeleton bash scripts

     creating new users

SLES

     (SuSE Linux Enterprise Server)

     installation 2nd 3rd 4th 5th

         AutoYaST 2nd

         CD-ROM 2nd 3rd

         configuration

         hard disks 2nd

         hardware configuration 2nd 3rd

         language preferences

         method selection 2nd 3rd

         network connectivity 2nd 3rd

         networks 2nd

         online updates

         pre-installation planning 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

         service configuration 2nd

         settings 2nd 3rd 4th

         troubleshooting 2nd 3rd

         user settings 2nd 3rd

         VNC-based method 2nd 3rd 4th 5th 6th 7th 8th

SLP

     (Service Location Protocol)

     Network Name Service 2nd

SMB

     (Server Message Block) 2nd

SMB protocol

snapshot devices

sniffers

     data snooping

sniffing

     switches 2nd 3rd

SNMP

     device monitoring

Snort 2nd 3rd 4th 5th 6th

Snort group

     defaults GID

Snort user

     default UID

Snort Web site

snort.conf file 2nd

social engineering

software

     package installation

     SLES installation planning

     support information

     YaST maintenance

Software Selection screen

Solar Designer

Sophos

Source Forge website

SourceForge.Net Web site

SpamAssassin

     Web site

special permission bits 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

     security against SUID program 2nd 3rd 4th 5th 6th 7th

     SGID file sharing 2nd 3rd 4th 5th

     SUID program 2nd 3rd 4th 5th 6th 7th

     SUID/SGID security 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

Spitzner, Lance

spooling

     print job lifecycle 2nd

squid user

     default UID

ssh

     (Secure Shell) 2nd 3rd

Sshd group

     defaults GID

sshd user

     default UID

SSID

     (Service Set ID)

     protecting wirless networks 2nd 3rd 4th 5th

Standard Boot Floppies

startup

    servers

         boot loaders 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

         emergency recovery 2nd 3rd 4th 5th

         init program 2nd 3rd 4th

         kernel boot 2nd 3rd

stat command

State packets

status line command mode

     vi text editor

stealth logging hosts 2nd 3rd

sticky bit

     special file permissions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

sticky permission

     value

storage

     backups

    disk space

         user management 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

    offsite

         policies

storage medias

     backups 2nd 3rd

stumbling utilities

Stunnel user

     default UID

su command 2nd 3rd 4th 5th 6th 7th 8th

sudo command 2nd 3rd 4th 5th 6th 7th

     restricting root login 2nd 3rd 4th

SUID

     (Set UID)

     permission value

     special permission bit 2nd 3rd 4th 5th 6th 7th 8th 9th

         sample program 2nd 3rd 4th 5th 6th 7th

         security against program 2nd 3rd 4th 5th 6th 7th

         security implications 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

super users

super-servers

SuSE

     FTP Server

     mailing lists

SUSE

     Web site

SuSE GmbH

SuSE Linux Enterprise Server [See SLES]

SuSEconfig 2nd 3rd 4th 5th

switches

     sniffing 2nd 3rd

symmetric encryption

     GnuPG

Sys group

     defaults GID

syslog servers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

     hardening central host 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

     message locations

     stealth logging host 2nd 3rd 4th 5th 6th

syslog-ng

     installation

SYSTAT

     xinetd

System Backup Administrator

     (SBA)

system requirements

     SLES installation planning 2nd 3rd 4th

system resources

    user management

         disk space 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

         PAM (Pluggable Authentication Module) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th

systems

    configuration

         maintaining 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th

    management

         basic commands 2nd 3rd 4th 5th

         monitoring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th

         root filesystem 2nd 3rd 4th 5th

         server tuning 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th

         tools 2nd

Категории