Apple Training Series: Mac OS X System Administration Reference, Volume 1

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

back ups

     authentication and

     directory data

     protecting against malware

backdoors [See also rootkits]

bandwidth, in replication topology

BerkeleyDB

bill of materials (BOM) file

binding

     Active Directory plug-in

     anonymous 2nd

     behind the scenes operation of

     considerations

     errors

     initial configuration

     options selected during

     trusted 2nd

biometrics, in authentication

Block Pop-Up Windows

blocked hosts lists

Bluejacking

Bluesnarfing

Bluetooth

     discoverability

     file exchange security options

     file transfer security options

     implementation

     Internet access security

     overview

     PDA sync security options

     security risks associated with

Bluetooth File Exchange 2nd

Bluetooth Special Interest Group

BOM (bill of materials) files

Bonjour

     address assignments

     adopting

     browsing network with DNS Service Discovery

     Mac OS X support for

     manufacturers supporting

     network names

     overview

     troubleshooting

booting, start up security and

breach response plan

browsers/browsing. [See also Safari]

     Mac OS X vs. Windows XP

     mounting remote file systems

     on Windows network

     service discovery

     troubleshooting

BSD file systems

BSD flat files

     BSD plug-in for DirectoryServices

     configuring Mac OS X to use

     enabling BSD Open Directory plug-in

     list of

     modifying with text editor

     ssh login and

     testing BSD configuration files setup

     viewing

ByHost files

Категории