Practical Unix & Internet Security, 3rd Edition

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Bace, Rebecca (Intrusion Detection)  

Bach, Maurice (The Design of the UNIX Operating System)  

back doors   2nd   3rd  

       as common threat  

       in MUDs and IRCs  

       strength of encryption and  

background checks   2nd  

background processes  

backing out of upgrades  

backups

       across network  

       automatic system for  

       commercial systems for  

       configuration files, paper copies of  

       criminal investigations and   2nd   3rd  

       data security for  

       dedicated programs for  

       destruction of  

       differential  

       encryption of   2nd   3rd   4th  

       file modification times and  

       files with holes  

       guidelines for  

       human error and  

       of individual workstations  

       legal issues concerning  

       levels of  

       location of   2nd  

       of log files  

       media failure, protecting against  

        methods of  

       migrating  

       of networks  

       performing before upgrades  

       public key encryption and PGP  

       purposes of  

       read-only partitions  

       retention of   2nd  

       rotating media  

       schedule for  

       security checklist for  

       security of  

       simple archives  

       simple local copies  

       simultaneous  

       software for  

       standards for  

       strategies for   2nd  

       of system-critical files  

       theft of  

       verifying   2nd  

       what to back up  

       world-readable  

       write-protecting  

bacteria   2nd  

BADSU attempts, logging  

Badulescu, Ion  

banners

       modem  

       SMTP  

bash history file  

Basic Input/Output System (BIOS)  

batch command  

batch jobs   [See cron file]

baud  

Bellovin, Steve (Firewalls and Internet Security)  

Berkeley BSD Unix   [See BSD Unix]

Berkeley FTP server, restricting accounts with  

Berkeley Software Design, Inc. (BSDI)  

Bernstein, Dan  

best practices  

beverages, effects on hardware  

bftpd server  

bidirectionality of modems   2nd  

biff service  

bigcrypt algorithm  

/bin directory  

       /bin/csh   [See csh]

       /bin/ksh   [See ksh]

       /bin/login   [See login program]

       /bin/passwd   [See passwd command]

       /bin/sh   [See sh]

       in restricted filesystems  

binary code, downloading   2nd  

binary owner  

BIND name server   2nd  

bind() system call  

BIOS (Basic Input/Output System)  

Bishop, Matt  

Blaze, Matt  

block algorithms  

block devices   2nd   3rd  

block/send commands, Trojan horses and  

Blowfish algorithm  

bogus nameserver cache poisoning  

bogusns directive  

Bolsky, Morris I. (The New Kornshell Command and Programmang Language)  

bombs , as destructive attack  

books, security  

boot disks, viruses on  

BOOTP protocol  

Bootparams table (NIS+)  

Bostic, Keith (The Design and Implementation of the 4.4 BSD UNIX Operating System)  

Bosworth, S. (Computer Security Handbook)  

bounds checking  

Bourne shell   [See sh]

bps (bits per second)  

brackets ([]), indicating optional syntax  

Brand, Russell  

break-ins

       case studies of  

       commands used to discover  

       commands used to monitor   2nd  

       contacting a remote system administrator  

       detecting and discovering   2nd  

       documenting  

       legal recourses after  

       planning for  

        preserving evidence from  

       recovering from  

       responding to   2nd  

       resuming operation after  

       security checklist for  

       software toolkit for  

A Brief History of Time: From the Big Bang to Black Holes (Hawking, Stephen W.)  

broadcast storms  

Brunner, John (Shockwave Rider)  

brute force attacks   2nd   3rd   4th  

BSD 4.2  

BSD 4.4 Lite   2nd  

BSD Unix   2nd   3rd   [See also FreeBSD; Mac OS X; NetBSD; OpenBSD]4th  

       "no dump" file attribute  

       append-only files  

       chroot wrapper  

       exporting filesystems read-only  

       exporting NFS directories  

       Fast File System (FFS) reserved space  

       forcible unmounts with  

       history of  

       host-based firewall for   2nd  

       immutable files  

       inetd program and  

        integrity-checking tools  

       jail() system call   2nd  

       kernel security levels on  

       modems and  

       mtree program  

       nonexecutable stack  

       package management commands  

       packaging tools  

       periodic security scans  

       permission options for  

       pkg (package) system  

        portmapper program  

       process accounting with  

       ps command  

       published resources on  

       secure terminals  

       server startup on  

       SGID and sticky bits for directories  

       shadow password file  

       SMB kernel support  

       spongy mounts  

       TCP Wrappers support  

       terminal security on  

       utmp and wtmp log files  

       vipw command  

BSD/OS   2nd   3rd  

BSDI (Berkeley Software Design, Inc.)  

buffers

       checking boundaries  

       overflow attack  

       overruns  

bugs   2nd   [See also insects , effects on hardware]3rd  

       Bugtraq mailing list  

       hacker challenges and  

       hardware  

       in Unix utilities  

       keeping secret  

       in NFS  

       security  

       software  

       testing for   2nd  

       tips on avoiding  

Bugtraq mailing list  

Building a Secure Computer System (Gasser, Morrie)  

Building in Big Brother: The Cryptographic Policy Debate (Hoffman, Lance J.)  

Building Internet Firewalls (Zwicky, Elizabeth D.; Chapman, D. Bren; Cooper, Simon)  

Building Secure Software (Viega, John and McGraw, Gary)  

bulk erasers  

Burning Chrome (Gibson, William)  

byte-by-byte comparisons  

Категории