Practical Unix & Internet Security, 3rd Edition

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

VA Linux  

vacation program  

vampire taps  

vandalism  

vandals, computer   [See intruders]

/var directory   [See also /usr firectory]2nd  

       /var/adm directory  

       /var/adm/acct file  

       /var/adm/lastlog file  

       /var/adm/loginlog file  

       /var/adm/messages file  

       /var/adm/savacct file  

       /var/adm/wtmp file  

       /var/log directory  

variables , bounds checking  

Varley, John (Press Enter)  

VC-I video encryption algorithm  

vendors

       security

               access given to  

               all-in-one contracts  

               corporate stability of  

               evaluating employees of  

               experience of  

               hackers as  

               mailing lists for  

               referrals and references for  

               trusting  

       software

               loss of  

               trusting   2nd  

Venema, Wietse   2nd   3rd   4th   5th   6th   7th  

ventilation

       access through  

       holes (in hardware)  

VERB command, SMTP  

vfork() system call  

vfstab file  

vi editor   2nd   3rd  

vibrations, effects on hardware  

Viega, John (Building Secure Software)  

Vinge, Vernor (True Names and Other Dangers)  

vipw command  

virtual filesystem interface  

Virtual Light (Gibson, William)  

virtual nodes  

Virtual Private Network (VPN)  

The Virus Bulletin  

viruses   2nd  

       on distribution disk  

       email  

       published resources on  

visitors , security regarding  

vnode interface   [See virtual filesystem interface]

vold.log file  

voltage spikes   [See power, surges]

VonStorch, William (Computer Crime: A Crimefighter's Handbook)  

VPN (Virtual Private Network)  

VRFY command, SMTP   2nd   3rd  

vsnprintf() system call  

vsprintf() system call   2nd  

vsyslog() system call  

Категории