Practical Unix & Internet Security, 3rd Edition

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

L-devices file  

Lai, Xuejia ("On the Design and Security of Block Ciphers")  

LaMacchia, Brian A.  

       "Computation of Discrete Logarithms in Prime Fields"  

LANs (Local Area Networks)   2nd   3rd  

laptops

       locking  

       recovery from theft  

       ruggedized  

       tagging  

       temperature of  

       theft prevention for  

        vibration protection for  

last program   2nd   3rd   4th  

lastcomm program   2nd  

lastlog file   2nd  

laws   [See legal issues]

LDAP (Lightweight Directory Access Protocol)   2nd   3rd   4th  

       authentication with  

       data integrity and  

       nss_ldap configuration  

       protocol for  

       reliability and  

       TLS support for  

       using with Kerberos  

       using with PAM  

       versions of  

Learning Perl (Schwartz, Randal L. and Phoenix, Tom)  

leased telephone lines  

least privilege principle   2nd  

legal issues

       access device limitations  

       avoiding computer abuse  

        backups  

       comparison copies and  

       compromised networks, risks of being prosecuted for  

       copyright laws   2nd  

       criminal complaints, filing  

       criminal prosecution , disadvantages of  

       federal laws regarding computer crimes  

       jurisdiction for computer crimes  

       law enforcement, wiretapping by  

       license agreements for worms  

       monitoring intruders  

       pornography, indecency, obscenity  

       published resources on  

       recourses after a break-in  

       responsibilities to report crime  

       security checklist for  

       situations requiring legal action  

Lenstra, Arjen  

       "The Number Field Sieve"  

Lenstra, H. W., Jr. ("The Number Field Sieve")  

Lesk, Mike  

level-zero backup  

Leveson, Nancy G. (Safeware: System Safety and Computers. A Guide to Preventing Accidents and Losses  

Levy, Steven (Hackers: Heroes of the Computer Revolution)  

Leyland, Paul  

/lib directory  

Libes, Don  

license agreements, comparison copies and  

lie-detector tests, of employees  

lightning   2nd  

Lightweight Directory Access Protocol   [See LDAP]

limit command  

LINK function (RPC)  

link-level encryption  

links   2nd   [See also symbolic links]

       to directories  

       static  

Linux   2nd   [See also System V Unix]

       "no dump" file attribute  

       ACL support for  

       append-only files  

       bug fixes, responsibility for  

       capabilities system  

       chattr() system call  

       chroot wrapper  

       Cryptfs support for  

       current trends  

       debugfs command  

       default accounts for  

       exim mailer program for  

       expiring accounts  

       exporting NFS directories  

       ext2fs filesystem   2nd   3rd  

       FIFO file type  

       filesystem UID (FSUID)  

       filesystem, minfree amount  

       filesystems  

        group disk quotas  

       for handheld computers  

       history of   2nd  

       host-based firewall for   2nd  

       immutable files  

       Kerberos client for  

       kernel security levels  

       logrotate program  

       mobile versions of  

       npasswd package  

       Openwall patches  

       packaging tools  

       PAM

               resource limits  

               support for  

       periodic security-checking scripts  

        portmapper program  

       portmon variable  

       process accounting with  

       ps command  

       published resources on  

       Red Hat   [See Red Hat Linux]

       reliability of  

       RPM Package Manager   2nd  

       S/Key support  

       secure terminals  

       secure versions of  

       server startup on  

       shadow password file  

        smbfs support  

       software quality  

       source packages  

       stateful inspection program  

       sudo program   2nd  

       sulog, scanning  

       swapping to files  

       TCP Wrappers support  

       ttywatch program  

       VA   [See VA Linux]

       versions of   2nd  

       X security  

Littman, Jonathan (The Fugitive Game: Online with Kevin Mitnick)  

Liu, Cricket (DNS and BIND)  

ln command  

load shedding  

local area networks   [See LANs]

LOCAL authentication (NIS+)  

local jurisdiction  

local storage, protecting  

lock program  

lock-down  

locking accounts  

locking files   2nd  

locks, hardware  

log books  

log events  

log files   [See also history files; email, logging]2nd  

       access_log  

       acct  

        aculog  

       analysis tools  

       analyzing for intruders  

       created during initialization  

       crontab  

       hardcopy of   2nd  

       immutable  

       lastlog  

       list of  

       locations of  

       loginlog  

       managing  

       messages  

       pacct  

       rotating  

       sulog   2nd  

       syslog creating  

       system clock and   2nd  

       utmp   2nd   3rd  

       wtmp  

       wtmpx  

log server  

logcheck program  

logdaemon package  

logger program   2nd  

logging   2nd   3rd   4th   [See also forensics; log files]

       across networks  

       break-ins  

       C2 audit  

       criminal investigations, and  

       critical messages from  

       failed passwords  

       failed su attempts  

       from third-party software  

        handwritten logs  

       to hardcopy device  

       individual users  

       network services  

       newsyslog program  

       outgoing mail  

       policy for  

       process accounting  

       security checklist for  

       Swatch program  

       syslog facility  

       what not to log  

       who is logged in  

logging in  

       authentication of  

       failed attempts, logging  

       FTP  

               access without  

       Kerberos system  

       preventing for dormant accounts  

       recorded in log file  

       restricting  

       with Secure RPC  

       startup file attacks  

logging out

       automatic  

       with Secure RPC  

logic bombs   2nd   3rd  

login file  

.login file   2nd  

login program   2nd  

       back doors in  

       trusted path for  

login service  

logindevperm file  

loginlog file   2nd   3rd  

logins command  

.logout file  

long distance service  

LOOKUP function (RPC)  

loopback encryption  

losses   [See also disaster planning]

       calculating cost of  

       calculating cost of prevention  

       determining whether to protect against  

       estimating probability of  

lp user  

lpd system  

lrand48() system call  

ls command   2nd  

       -d option  

       -i option  

       -c option  

       file permissions listed by  

       file times displayed by  

       -H option  

       indicating SUID/SGID programs  

       -l option  

       listing files with control characters  

lsof command   2nd   3rd   4th   5th   6th  

lstat () system call  

Категории