Practical Unix & Internet Security, 3rd Edition

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

rabbit programs   2nd  

race conditions  

radio transmissions

       computer malfunctions caused by  

       eavesdropping on   2nd  

RADIUS (Remote Authentication Dial-In User Service)   2nd   3rd  

RAID filesystems  

RAM theft  

rand() system call  

random device  

random numbers  

       device file abstractions for  

       requirements for  

        seeds   2nd  

random() system call  

raw devices  

rc script   2nd  

RC2 algorithm  

RC4 algorithm  

RC5 algorithm  

rcp command   2nd  

RCS (Revision Control System)   2nd  

RD (Receive Data)  

rdist program  

rdump/rrestore program  

read command  

READ function (RPC)  

read permission  

       directories  

       files  

read() system call, timeouts on  

read-only filesystems   2nd  

READADDR function (RPC)  

readdir() system call  

READDIRPLUS function (RPC)  

READLINK function (RPC)  

real GIDs  

real UIDs   2nd  

realpath() system call  

reboots

       logged by wtmp file  

       single-user  

Receive Data (RD)  

record locking, mandatory  

Red Hat Linux  

       default accounts for  

       sulog, scanning  

       X security  

reiserfs filesystem  

relative pathnames  

Remote Authentication Dial-In User Service   [See RADIUS]

remote command execution  

remote file   2nd  

Remote Job Entry (RJE)  

remote log server  

Remote Method Invocation (RMI)  

remote network filesystems  

Remote Procedure Call   [See RPC]

REMOVE function (RPC)  

RENAME function (RPC)  

renice command   2nd  

replay attacks   2nd  

replicated filesystems  

Request to Send (RTS)  

resolution, time  

resolv.conf file  

resolver library (BIND)  

resolving (DNS)  

response teams  

       mailing lists for  

       trusting  

restore   [See dump program]

restore program  

restricted accounts  

restricted filesystems  

restricted logins  

restricted shells  

restricted terminals  

restrictmailq option, sendmail  

retention of backups   [See backups , retention of]

return codes, checking  

reverse lookup   2nd  

Revision Control System (RCS)   2nd  

rexd service  

rexec service  

RFC (Request For Comments), web site for  

.rhosts file   2nd   3rd  

       back door in  

       searching for  

RI (Ring Indicator)  

Rijmen, Vincent  

Ring Indicator (RI)  

Rinjdael (AES) algorithm   2nd   3rd  

RIP (Routing Internet Protocol)  

risks   [See also cost-benefit analysis]

       assessment of   2nd  

       difficulty in analyzing  

       inability to eliminate  

       secondary  

RISKS mailing list  

Ritchie, Dennis

       discussing Unix security  

       The UNIX Programming Environment  

       Unix developed by  

Rivest, Ron   2nd   3rd  

       "A Method for Obtaining Digital Signatures"  

RJE (Remote Job Entry)  

rlogin program   2nd   3rd  

       compared to telnet  

       security and  

       verifying new password with  

rm command   2nd   3rd   4th  

RMDIR function (RPC)  

RMI (Remote Method Invocation)  

Rogue Programs: Viruses, Worms and Trojan Horses (Hoffman, Lance J.)  

ROM monitor passwords  

root account   [See also superuser]2nd  

       prompt for  

root domain server (NIS+)  

root user   [See superuser]

rootkits   2nd  

route service  

routed daemon  

routers  

routing  

Routing Internet Protocol (RIP)  

RPC (Remote Procedure Call)   2nd  

       authentication of  

       functions used with NFS  

       MOUNT based on   2nd  

       NFS built on  

       NFS protocol based on  

        portmapper program and   2nd   3rd   4th  

       rpc.rexd  

       Secure   2nd  

       security checklist for  

       spoofing  

       table (NIS+)  

rpc. mountd daemon  

rpc.rexd service  

rpcbind   [See portmapper program]

rpm command  

rpm files  

RPM Package Manager   2nd  

RS-232 serial protocol  

RSA algorithm  

RSA Data Security  

       factoring challenges  

       SSH using   2nd  

rsh (restricted shell)  

rsh program   2nd   3rd  

rshd program, back doors in  

rsync program   2nd  

RTS (Request to Send)  

rtty program  

RUID   [See real UIDs]

run levels  

runacct command  

Running Linux (Welsh, Matt; Kaufman, Lar; Dalheimer, Matthias K.; Dawson, Terry)  

Russell, Deborah (Computer Security Basics)  

Категории