Apple Training Series: Mac OS X System Administration Reference, Volume 1

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

tail command

tail-f command

TCP (Transmission Control Protocol)

     in IP stack

     ports

     threat assessment and

TCP/IP

     Mac OS X support for

     networking and

tcpdump 2nd

Telnet

     for testing connectivity

     overview

     Password Server and

     replacing with SSH

Temporal Key Integrity Protocol (TKIP)

Terminal 2nd

testparm command

tethereal

text editors 2nd

text files, searching from command line

TGTs (ticket-granting tickets)

     accessing kerberized services

     cross-realm authentication

     from KDC

     in Kerberos authentication process 2nd

     krbtgt

     pre-authentication

threat assessment, network security 2nd

ticket-granting tickets. [See TGTs (ticket-granting tickets)]

Tiger Server

time error, Active Directory errors

TKIP (Temporal Key Integrity Protocol)

top command 2nd

topology, replication

traceroute

traffic, network

Transmission Control Protocol. [See TCP (Transmission Control Protocol)]

Trash

tree structure

Tripwire

Trojan horses

     mobile security and

     overview

     threat assessment and

troubleshooting

     Active Directory plug-in

     browsing

     connection failures

     DirectoryService

     file permissions

     file systems

     flags

     home directories

     Kerberos

     LDAP connections 2nd

     Mac OS X integration with third-party directory services

     managed networks

     mount issues

     replicas

     SMB

     SSO (single-sign-on)

troubleshooting networks

     adding monitoring to startup items

     DNS and domain names

     Ethereal for

     fixing issue

     gathering information

     log files for monitoring

     login or logout hooks

     methodology for

     monitoring network activity

     network access

     network services

     overview

     references

     remote monitoring

     review

     third-party tools for

     verifying issue

trust management, Mac OS X security

Trust Policy modules, in CDSA

trusted binding 2nd

trusted third party

tunneling, SSH (Secure Shell)

     AFP traffic

     local-to-remote

     remote-to-local

two-factor authentication

     configuring Mac OS X servers

     VPN authentication methods

Категории