Practical Unix & Internet Security, 3rd Edition

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

failures, computer   [See also bugs ]2nd  

’fair use “ provisions, copyright law  

Farmer, Dan   2nd   3rd   4th  

Fast File System   [See FFS]

FAT filesystem  

FAT32 filesystem  

FBI (Federal Bureau of Investigation)   2nd  

fchmod() system call   2nd  

fchow() system call  

Federal Bureau of Investigation (FBI)   2nd  

federal jurisdiction  

federal laws  

Ferbrache, David (The Pathology of Computer Viruses)  

FFS (Fast File System)   2nd   3rd  

FG (Frame Ground)  

fget() system call  

fgets() system call  

fiber optic cables  

FIFO file type  

file command  

file descriptors  

file handles   2nd  

File Transfer Protocol   [See FTP]

filenames, attacks through  

files   2nd  

       access times of  

       append-only  

       backing up   [See backups ]

       beginning with dash, deleting  

       byte-by-byte comparisons of  

       change time  

       changing owner of  

       checklists for comparing  

       checksums detecting changes in  

       context-dependent (CDFs)  

        core  

       critical, backing up  

       critical, deleting  

       deleted accidentally  

       deleted as destructive attack  

       detecting changes to  

       device  

       format of, monitoring  

        group for  

       group-writable  

       hidden   2nd  

       history  

       immutable  

       information about (metadata)  

       inodes storing information about  

       integrity of   [See integrity]

       locating largest  

       locking  

               mandatory  

       log   [See log files]

       magic number in  

       metadata, comparing  

       modification times of   2nd   3rd   4th  

       modified by intruders   2nd  

       owner of  

       permissions for   [See permissions]

       security checklist for  

       SGID bit on  

       signatures detecting changes in  

       startup   [See startup files]

       SUID/SGID, finding  

       swapping to  

       system configuration  

       system database  

       system startup  

       Trojan horses in  

       trusted computing base (TCB) of  

       types of   2nd  

        unlinked , hidden space used by  

       unowned  

       which to back up  

       world-writable  

       zero-filled bytes (holes) in  

filesystems   [See also directories]2nd  

       Cryptfs  

       cryptographic   2nd  

       encrypted  

       Fast File System  

       journaling  

       list of, available on Unix  

       mounted  

       network   2nd   [See also NFS; SMB]

       remote network  

       replicated (RAID)  

       reserved space on  

       restricted  

       security checklist for   2nd  

       summarizing usage per user  

       superuser control of  

       UFS  

       virtual filesystem interface  

filter files (mail)  

filtering software   2nd  

filtering, on-demand  

find command

       -0 option  

       -ls option  

       -size option  

       attacks on  

       -H option  

       -print option  

       type -f option  

       -xdev option  

finger account  

finger command   2nd   3rd   4th  

       disabling  

       finding contact information with  

       login times displayed by  

       running when not logged in  

finger service  

fingerd program   2nd   [See also Internet worm program]

fingerprint of files or keys   [See message digest functions]

Fingerprints Database  

fire   2nd   3rd  

firewalls

       account aliases and  

       host-based program   2nd  

       IP networks  

       kernel-level  

       mailing list for  

       nameservers and  

       for NIS sites  

       packet-level  

        portmapper program and  

       standalone appliance for  

       stateful inspection of  

       telephone  

       verifying proper operation of  

Firewalls and Internet Security (Bellovin, Steve and Cheswick, Bill)  

Firewire-based disk drive  

FIRST (Forum of Incident Response and Security Teams)   2nd   3rd  

flooding, client  

floors, raised, access through  

folders   [See directories links]

fonts used in this book  

food, effects on hardware  

forensics   2nd   [See also logging]

       security checklist for  

fork bombs  

fork() system call   2nd  

Forrester, Justin  

Forum of Incident Response and Security Teams   [See FIRST]

.forward file   2nd  

Frame Ground (FG)  

fraud  

Fredricksen, Lars ("An Empirical Study of the Reliability of UNIX Utilities")  

Free Software Foundation (FSF)  

FreeBSD   2nd   [See also BSD Unix]3rd   4th  

       ACL support for  

       bug fixes, responsibility for   2nd  

       Cryptfs support for  

       CVS used by  

       history of   2nd  

       host-based firewall for  

       kernel security levels on  

       master password file  

       PAM support for  

       password file, printing  

       S/Key support  

        source-based management systems  

       su log  

       sulog, scanning  

Freedman, David H. (@ Large)  

fscanf() system call  

fsck program   2nd  

FSF (Free Software Foundation)  

FSINFO function (RPC)  

fsirand program   2nd  

FSSTAT function (RPC)  

fstab file   2nd  

fstat () system call  

FSUID (filesystem UID)  

FTP (File Transfer Protocol)   2nd   3rd  

       active mode  

       allowing without logging in  

       anonymous   2nd   3rd  

       bounce attack  

       chroot() system call and  

       ~ftp/bin directory  

       ~ftp/etc directory  

       ~ftp/pub directory  

       passive mode  

       restricted filesystems and  

       restricting accounts with  

       setting up server  

ftp user  

ftpd server   2nd   3rd   4th  

ftpusers file  

ftruncate() system call  

The Fugitive Game: Online with Kevin Mitnick (Littman, Jonathan)  

full backup  

function keys, passwords programmed to  

functionality, add-on  

Fundamentals of Computer Security Technology (Amoroso, Edward)  

Fuzz program tests  

Категории