Practical Unix & Internet Security, 3rd Edition

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

games user  

games, accounts for  

Gangemi, G. T., Sr. (Computer Security Basics)  

Garfinkel, Simson (PGP: Pretty Good Privacy)  

gas-charged fire extinguishers  

Gasser, Morrie (Building a Secure Computer System)  

gated daemon  

gateways   [See routers]

gcore program  

gcov tester  

gdb command  

gdb debugger  

GECOS (General Electric Computer Operating System)  

Geer, Dan  

General Electric Computer Operating System (GECOS)  

generation count, file handle   2nd  

generators, password  

GETATTR function (RPC)  

gethostbyaddresses() system call  

gethostbyname() system call  

getopt() system call  

getpass () system call   2nd  

getpwuid() system call  

gets() system call   2nd  

getservbyname() system call   2nd  

getty program  

Gibson, William

       All Tomorrow's Parties  

       Burning Chrome  

       Count Zero  

       Idora  

       Mona Lisa Overdrive  

       Neuromancer  

       Virtual Light  

GIDs ( group identifiers)   2nd   3rd   [See also SGID programs]

       real versus effective  

       and RPC requests  

       stored in inodes  

glass walls, security aspects  

GMT   [See UTC]

GNU Emacs   2nd   3rd   4th  

GNU project  

GNU utilities, reliability of  

gnupg signatures   2nd  

goaway option, sendmail  

Gollmann, Dieter (Computer Security)  

gopher  

gpg signatures  

Graff, Michael  

Grampp, F. T. ("UNIX Operating System Security")  

granularity, time  

graphical displays, sharing with X Window System  

grep command, scanning su log file with  

grounding signals, attacks by  

group disk quotas  

group file   2nd   3rd   4th  

       monitoring  

group IDs   [See GIDs]

Group table (NIS+)  

groups  

       accounts for  

       changing  

       files writable by  

       identifiers for   [See GIDs]

       NIS netgroups  

       passwords for  

       permissions for  

       process  

       security checklist for  

       umask for group projects  

       wheel   [See wheel group]

groups command  

grpck command  

Gr ¼nbacher, Andreas  

guest account   2nd  

guest user  

guidelines, in security policy  

Категории