Practical Unix & Internet Security, 3rd Edition

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

tables (NIS+)   2nd  

TACACS and TACACS+ protocols  

tagging, hardware  

TAI (International Atomic Time)  

taint option, Perl  

tainting  

taintperl  

Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw -- By the  

talk program   2nd  

talk service  

tandem backup  

Tanenbaum, Andrew S.  

Tangled Web (Power, Richard)  

tape drives

       cleaning  

       problems with  

       world-readable  

tapes   [See also media]

       degradation of  

       print through process  

       upgrading  

tar program   2nd   3rd   4th   5th  

TCB (trusted computing base)  

/tcb directory  

TCFS (Transparent Cryptographic Filesystem)  

tcov tester  

TCP (Transmission Control Protocol)   2nd   3rd   [See also network services]4th  

       connections, clogging  

       connections, controlling   [See TCP Wrappers program]

TCP Wrappers program   2nd   3rd   4th  

       -DPARANOID option  

       -DPROCESS_OPTION option  

       -DPROCESS_OPTIONS option   2nd  

       configuration language for  

       finger daemons provided with  

       inetd and   2nd  

       IP spoofing and  

       tcpdchk utility for  

       tcpdmatch utility for  

       UDP support  

TCP/IP   [See also networks]

       authentication with ident  

       security checklist for  

TCP/IP Network Administration (Hunt, Craig)  

TCP/IP networks  

       SMB running on  

tcpd program   2nd   [See also TCP Wrappers program; TCP/IP]

tcpdchk utility  

tcpdmatch utility  

tcpdump command   2nd  

tcpserver program  

tcsh   [See also shells ]

       history file  

.tcshrc file  

TD (Transmit Data)  

telephone firewalls  

telephone lines

       leasing  

       one-way  

       physical security of  

       sweeping  

       unauthorized  

telephones   [See also modems]

       cellular, computer malfunctions caused by  

       recording call information  

        scanners for  

       security checklist for  

       service, loss of  

       tracing connections from  

telnet program   2nd   3rd   4th  

       compared to rlogin  

       verifying new password with  

Telnet utility  

telnetd program  

       back doors in  

temperature, effects on hardware  

TEMPEST system  

terminal emulators  

terminal service, remote   2nd  

terminals   [See hardware]

terrorism  

testing

       employee  

       modems  

       software   2nd  

TeX files, Trojan horses in  

TFTP (Trivial File Transfer Protocol)   2nd  

tftpd daemon  

The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (Singh, Simon)  

theft of backups  

theft of hardware   2nd  

       encryption and  

       locks preventing  

        precautions for  

       RAM theft  

       recovery for   2nd  

       tagging preventing  

thieves , planting programmed threats  

thin-client Unix systems  

third-party billing  

Thomas, Robert and Carleen  

Thompson, Ken

       "Reflections on Trusting Trust"   2nd  

       crypt() designed by  

       discussing password security  

       Unix developed by  

threads  

threats

       estimating probability of  

       identifying and quantifying   2nd  

       mailing list for  

       replay attacks  

three-way handshake, TCP  

tickets (Kerberos)   2nd  

Tiger system  

tilde (~)

       ~! in mail messages  

       as home directory  

time   [See also NTP; system clock]

       defining random seed by  

       determining accurately  

       file modification  

       granularity of  

       modification  

time service   2nd  

time-sharing   2nd  

timeouts   2nd  

timestamp, Secure RPC window  

Timezone table (NIS+)  

tip command   2nd   3rd   4th   5th  

TLS protocol   2nd  

TMOUT variable  

tmp directory, overload attacks using  

tmpfile () system call  

token cards  

toll fraud  

tools   [See software]

top command   2nd  

Torvalds, Linus  

traceroute command  

tracing connections  

tracing programs  

traffic analysis  

training, employees  

transaction audits  

Transmission Control Protocol   [See TCP]

Transmit Data (TD)  

Transparent Cryptographic Filesystem (TCFS)  

transposition ciphers  

trap doors   [See back doors]2nd   [See back doors]

trashing  

tree structure attacks  

trimlog system  

Triple-DES (3DES) algorithm  

Tripwire package   2nd  

Trivial File Transfer Protocol (TFTP)  

Trojan horses   2nd   3rd  

       as common threat  

       Kerberos and  

       in mass-market software  

       NFS and  

       X clients  

Trojan processes  

truck bombs , as destructive attack  

True Names and Other Dangers (Vinge, Vernor)  

truncate() system call  

trust  

       checklist for  

       in computers   2nd   3rd  

       in consultants  

       in employees  

       in log files  

       in network providers  

       in security response teams  

       in software  

       in system administrator  

       in vendors   2nd  

trusted computing base (TCB)  

trusted hosts  

Trusted Linux  

trusted path  

trusted ports   2nd  

Trusted Solaris  

trusted Unix   [See secure Unix systems]

trusted users  

Tse Huong Choo  

ttymon program  

ttys file   2nd   3rd   4th  

ttytab file  

ttywatch program  

tunefs command  

tunneling   2nd  

two-key cryptography  

twoftpd server  

TZ variable  

Категории