Apple Training Series: Mac OS X System Administration Reference, Volume 1

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

package customization, local system security

packet filters [See also firewalls]

packet sniffers

     Ethereal

     intrusion detection with

     monitoring Bonjour with

     monitoring network security

     Web security and

PAM (pluggable authentication module) 2nd

parental controls

     email security

     Web security

Password Assistant

password policies, Password Server 2nd

Password Server

     architecture

     authentication methods

     configuring

     hashes 2nd

     KDC synchronization with

     kerberized services

     overview

     policies

     replication 2nd

     SASL and

     security of

     utilities

Password servers

Password User Attribute mapping

passwords

     Active Directory password policies

     crypt passwords

     data confidentiality and

     disk images

     guidelines for good

     keychains and 2nd

     Password-based authentication in Mac OS X security model

     resetting lost account passwords 2nd

     setting master password for FileVault

     shadow passwords 2nd

     UNIX crypt function for generating

     WPA Personal

passwords, Open Firmware

     choosing

     disabling

     enabling

passwordserver value

PasswordService

patches, local system security

pbcopy command

pbpaste command

PDA sync, Bluetooth

PEAP (Protected EAP)

performance

     directory services deployment and

     in replication topology

permissions. [See file and folder permissions]

Personal File Sharing

     editing AppleFileServer

     local system security and

     overview

     starting

Personal Information Management (PIM)

personal settings, Mac OS X

Personal Web Sharing

PGP (Pretty Good Privacy) 2nd

phishing, Web security and

physical security

     email

     ensuring

     in Mac OS X security model

physical theft

PID (process ID)

     open file information

     ps command and

     top command and

PIM (Personal Information Management)

PIN numbers, in multifactor authentication

ping

     DoS (Denial of Service) attacks

     locking down

     troubleshooting network connectivity

pipes (|), searching text files

PKI (public key infrastructure)

planning directory services. [See directory services, planning and deploying]

plug-ins

    Active Directory. [See Active Directory plug-in]

     browser

     BSD 2nd

     CDSA add-in modules

     directory service protocols

     DirectoryService

    LDAPv3. [See OpenLDAP]

pluggable authentication

pluggable authentication module (PAM) 2nd

plutil command

Point-to-Point Tunneling Protocol. [See PPTP (Point-to-Point Tunneling Protocol)]

policies

     documenting security policies

     establishing security policies 2nd

     implementing security policies

     password 2nd

     Password Server

     search

pop-up windows, Web security

POP3 (Post Office Protocol version 3)

     advantages/disadvantages

     locking down access to public servers

     retrieving messages

     SSL and

Port Scan, Network Utility

ports

     6 to 4 port configuration

     HTTP 2nd

     intrusion detection and

     network connection security and

     Password Server

     rootkits and

     security

     sockets

     TCP

     UDP

Post Office Protocol version 3. [See POP3 (Post Office Protocol version 3)]

Postfix

PPTP (Point-to-Point Tunneling Protocol)

     configuring Mac OS X servers

     Mac OS X Server supporting

     VPN transport protocols

     VPNs Server configuration and

pre-authentication, Kerberos

preferences

     Mac OS X

     vi editor

     Web security

preferences.plist

preinstallation, security issues

Pretty Good Privacy (PGP) 2nd

principals, Kerberos 2nd

Printer Sharing

printers, network printer support with Bonjour

Private Browsing option

private data, in keychains

private IP addresses

private networks

     addresses reserved for

     locking down access to

private/public keys

     authentication and

     in keychains

     large vs. small keys

     SSH and

processes

     defined

     managing from command line

properties, vs. attributes

Property List Editor 2nd

Protected EAP (PEAP)

protocols

proxy clients, Safari configured as

proxy servers, Web security

ps command

     combining with grep

     managing processes

     monitoring system security

Public folder, permissions

public key infrastructure (PKI)

public keys. [See private/public keys]

public servers, locking down access to

public/private routing, for VPN users

pwpolicy

     disabling stored hashes

     hash types

     Password Server and 2nd

Категории