home | O'Reilly's CD bookshelfs | FreeBSD | Linux | Cisco | Cisco Exam  


Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: M

m class
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 32.5. Alphabetized Reference
M configuration command
sendmail, 5.3.1. Mail Delivery Agents
sendmail, 6.2. Define a Mail Delivery Agent
sendmail, 6.3. The local Delivery Agent
sendmail, 30.1. Configuration File Syntax
-m database switch : sendmail, 33.3.4.5. -m suppress replacement on match (V8.1 and above)
m flag : sendmail, 30.8. Alphabetized F= Flags
M flag
sendmail, 14.2.3. The Message-ID: Header
sendmail, 30.8. Alphabetized F= Flags
M line (qf file)
sendmail, 23.4.1. Printing the Queue in Verbose Mode
sendmail, 23.9. The qf File Internals
M lines in sendmail.cf : sendmail, 3.1. Role in the Filesystem
$m macro
sendmail, 7.3.1. The hostname
sendmail, 12.1.7. Adding the Domain
sendmail, 31.10. Alphabetized Reference
$M macro : sendmail, 31.10. Alphabetized Reference
m option : (see MeToo (m) option)
M option
sendmail, 31.2. Command-Line Definitions
sendmail, 34.1.3. Appropriateness of Options
sendmail, 34.8. Alphabetized Reference
M rule-testing command : sendmail, 38.4.2. Show Delivery Agents with =M
-m switch (sendmail)
sendmail, 18.3.2. The makesendmail Script
sendmail, 36.7. Alphabetized Reference
-M switch (sendmail)
sendmail, 31.2. Command-Line Definitions
sendmail, 36.7. Alphabetized Reference
m4 macros
TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros
TCP/IP Network Administration, E.3. m4 sendmail Macros
m4 preprocessor
sendmail, 16.3. Run m4
sendmail, 19. V8 m4 Configuration
class macros and : sendmail, 32.3. Class with m4
comments in files : sendmail, 19.5. Pitfalls
configuration version : sendmail, 31.10. Alphabetized Reference
database maps and : sendmail, 33.6. Database Maps and m4
delivery agent configuration : sendmail, 30.3. m4 Configuration Syntax
diversions : sendmail, 19.1.4. m4 diversions
macros and : sendmail, 31.8. Macros with the m4 Technique
rule sets and : sendmail, 29.2. Rule Sets and m4
sendmail options and : sendmail, 34.3. Configuring with V8 m4 Options
M= equate : sendmail, 30.4. The Equates
MAC (Mandatory Access Controls) : Practical UNIX & Internet Security, 4.1.3. Groups and Group Identifiers (GIDs)
MACH operating system : Practical UNIX & Internet Security, 1.3. History of UNIX
machine
auditing : (see auditing)
backing up : Building Internet Firewalls, 13.5.1. Backing Up Your Filesystems
choosing : Building Internet Firewalls, 5.3. Choosing a Machine
configuring : Building Internet Firewalls, 5.8.4. Reconfiguring for Production
connecting : Building Internet Firewalls, 5.8.6. Connecting the Machine
disconnecting or shutting down : Building Internet Firewalls, 13.4.3. Planning for Disconnecting or
hardware : (see hardware)
hijacking : Building Internet Firewalls, 10.1.1. Hijacking
name : Practical UNIX & Internet Security, 16.2.3. Hostnames
physical location of : Building Internet Firewalls, 5.4. Choosing a Physical Location
securing : Building Internet Firewalls, 5.8.1. Securing the Machine
software : (see software)
speed of : Building Internet Firewalls, 5.3.2. How Fast a Machine?
MACHINE= command
Practical UNIX & Internet Security, 15.5.1.2. Name-value pairs
Practical UNIX & Internet Security, 15.5.2. Permissions Commands
macid() : sendmail, 20.3. Alphabetized V8.8 Subroutines
Macintosh
Practical UNIX & Internet Security, 18.2. Running a Secure Server
sendmail, 3.3.3. Other Protocols
macro conditionals
sendmail, 14.1.3. Testing So Far
sendmail, 31.6. Macro Conditionals: $?, $|, and $.
TCP/IP Network Administration, 10.5.2.1. Conditionals
macro virus : (see viruses)
macros
sendmail, 5.3.2. Macros
sendmail, 7. Macros
sendmail, 31.9. Pitfalls
class macros
sendmail, 5.3.5. Class Macros
sendmail, 12. Class
sendmail, 32. Class Macros
classes and : sendmail, 12.1.1.1. A caveat
database macros : sendmail, 33. Database Macros
declaring
sendmail, 7.2. Defining Macros
sendmail, 31.2. Command-Line Definitions
defining
sendmail, 19.4.2. Define Macros
sendmail, 20.3. Alphabetized V8.8 Subroutines
sendmail, 36.7. Alphabetized Reference
sendmail, 38.2.1. Define a Macro with .D
with M option : sendmail, 34.8. Alphabetized Reference
dumping : sendmail, 38.3. Dump a Macro
expanding : TCP/IP Network Administration, 10.6.2. Transforming the Address
fetching value of : sendmail, 20.3. Alphabetized V8.8 Subroutines
file class macros : sendmail, 5.3.6. File Class Macros
for compiling sendmail : sendmail, 18.8. Alphabetized Reference
in header fields : sendmail, 35.3.1. Macros in the Header Field
initializing : sendmail, 36.4.2.2. Initialize macros
m4 preprocessor : sendmail, 19. V8 m4 Configuration
naming
sendmail, 5.3.2. Macros
sendmail, 7.2. Defining Macros
sendmail, 31.4. Macro Names
converting names to integers : sendmail, 20.3. Alphabetized V8.8 Subroutines
predefined
sendmail, 7.3. Predefined Macros
sendmail, 31.1. Preassigned Macros
required : sendmail, 31.3.1. Required Macros (V8.6 and earlier)
restoring macro values : sendmail, 23.9. The qf File Internals
in rule set names : sendmail, 29.1.4. Macros in Rule-Set Names
in rules : sendmail, 28.1.1. Macros in Rules
for time and date : sendmail, 31.7.2. Macros and the Date
macvalue() : sendmail, 20.3. Alphabetized V8.8 Subroutines
MAEs (Metropolitan Area Exchanges) : TCP/IP Network Administration, 1.1. TCP/IP and the Internet
magic cookies : Practical UNIX & Internet Security, 17.3.21.4. Using Xauthority magic cookies
magic number
Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail
TCP/IP Network Administration, A.2. The PPP Daemon
mail
(see email)
(see sendmail)
MAIL command (SMTP)
sendmail, 29.10.1. The check_mail Rule Set
sendmail, 34.8. Alphabetized Reference
Mail Exchanger records : (see MX records)
"Mail-From:" header line : sendmail, 35.10. Alphabetized Reference
mail hubs : (see hubs)
/mail/imap.tar.Z file : TCP/IP Network Administration, 9.7.2. IMAP Server
mail program
Practical UNIX & Internet Security, 15.1.3. mail Command
sendmail, 3.2.1. Delivery to a Mailbox
mail11 program : sendmail, 3.3.3. Other Protocols
Mail_Aliases table (NIS+) : Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
MAIL_HUB macro (m4)
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 31.10. Alphabetized Reference
mailbox file : sendmail, 3.2.1. Delivery to a Mailbox
mailbox servers : TCP/IP Network Administration, 9.7. Mail Servers
synchronizing : TCP/IP Network Administration, 9.7.2. IMAP Server
mailer
definition fields : TCP/IP Network Administration, 10.5.8. Defining Mailers
common : TCP/IP Network Administration, 10.5.8.1. Some common mailer definitions
local : TCP/IP Network Administration, 10.5.8. Defining Mailers
MAILER command (UUCP) : sendmail, 31.10. Alphabetized Reference
MAILER() (m4)
sendmail, 19.3.2. MAILER()
sendmail, 30.3. m4 Configuration Syntax
MAILER-DAEMON alias
sendmail, 3.1.1. The Aliases File
sendmail, 24.4.2. The MAILER-DAEMON Alias
sendmail, 31.10. Alphabetized Reference
(see also $n macro)
MAILER source file (in sendmail)
TCP/IP Network Administration, E.3. m4 sendmail Macros
TCP/IP Network Administration, E.3.5. MAILER
values available, listed : TCP/IP Network Administration, E.3.5. MAILER
mailer= equate (syslog output) : sendmail, 26.1.3.4. mailer= the delivery agent used
MAILER_DEFINITIONS macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
mailertable database
sendmail, 19.6. Alphabetized m4 Macros
TCP/IP Network Administration, 10.7.1. Modifying Local Information
mailing lists
Practical UNIX & Internet Security, E.1. Mailing Lists
Practical UNIX & Internet Security, E.1.3.10. WWW-security
sendmail, 1.3.3. Aliases and Mailing Lists
sendmail, 17.1.2.1. A rule to handle List:;
sendmail, 20.2.2. Workstation Refuses to Act as a Mail Gateway
sendmail, 34.8. Alphabetized Reference
(see also email)
exploder lists : sendmail, 25.4. Exploder Mailing Lists
EXPN command (SMTP) : sendmail, 22.3.2. SMTP vrfy and expn
for distributing security information : TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
for exchanging information and ideas : TCP/IP Network Administration, 13.5. Mailing Lists
:include: directive
sendmail, 22.5.2. Permissions for :include:
sendmail, 23.9. The qf File Internals
sendmail, 25.2. :include: Mailing Lists
including oneself on : sendmail, 34.8. Alphabetized Reference
internal : sendmail, 25.1. Internal Mailing Lists
joining : TCP/IP Network Administration, 13.5. Mailing Lists
keeping current : Building Internet Firewalls, 12.3.1.1. Mailing lists
list precedence : sendmail, 14.4. Precedence
owner : sendmail, 25.3. Defining a Mailing List Owner
packages for : sendmail, 25.6. Packages That Help
resources via : Building Internet Firewalls, A.3. Mailing Lists
sendmail and : TCP/IP Network Administration, 10.1. sendmail's Function
troubleshooting : sendmail, 25.5. Problems with Mailing Lists
mailq command
sendmail, 4.1.2. Show Queue Mode (-bp)
sendmail, 36.1.2. mailq
mailstats program : sendmail, 26.2.2. Viewing Statistics: mailstats
maintaining firewalls : Building Internet Firewalls, 12. Maintaining Firewalls
maintenance mode : Practical UNIX & Internet Security, C.5.1. Process #1: /etc/init
maintenance personnel : Practical UNIX & Internet Security, 13.3. Outsiders
maintenance toolkits, ready-made : TCP/IP Network Administration, 11.2. Diagnostic Tools
Majordomo package
sendmail, 25.6.1. Majordomo
TCP/IP Network Administration, 13.5. Mailing Lists
make command
sendmail, 2.5. Build
TCP/IP Network Administration, 5.2. Linux Kernel Configuration
make config command : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
make install.man : TCP/IP Network Administration, 9.4. A BOOTP Server
make zImage command : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
in NIS : TCP/IP Network Administration, 9.3. Network Information Service
makedbm program : Practical UNIX & Internet Security, 19.4.4.1. Setting up netgroups
Makefile file
sendmail, 2.4. Preliminaries
sendmail, 18.4. Tuning Makefile
db library package : sendmail, C.2. Get the Source
makemap command
sendmail, 33.2. Create Files with makemap
TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros
TCP/IP Network Administration, E.1. Compiling sendmail
TCP/IP Network Administration, E.4.4. The sendmail K Command
makesendmail script
sendmail, 2.4. Preliminaries
sendmail, 18.3.2. The makesendmail Script
sendmail, 18.6. Install sendmail
malware : Practical UNIX & Internet Security, 11.1. Programmed Threats: Definitions
man pages : Practical UNIX & Internet Security, 2.5. The Problem with Security Through Obscurity
man-in-the-middle forgery : Building Internet Firewalls, 6.6.1. Risks of Filtering by Source
Management Information Base (MIB) : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
management tools : Building Internet Firewalls, 2.10. Network Management Services
management, role of
Practical UNIX & Internet Security, 2.3.4. Convincing Management
Practical UNIX & Internet Security, 2.5. The Problem with Security Through Obscurity
managing accounts : Building Internet Firewalls, 12.1.2. Managing Your Accounts
MANs (Metropolitan Networks) : Practical UNIX & Internet Security, 16.1. Networking
manual logging
Practical UNIX & Internet Security, 10.7. Handwritten Logs
Practical UNIX & Internet Security, 10.7.2.2. Informational material
manual pages : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
manual sendmail use : sendmail, 1.4. Run sendmail by Hand
map
TCP/IP Network Administration, 1.7. Application Layer
(see also automounter daemon)
(see also /etc/hosts file)
(see also /etc/networks file)
(see also IMAP)
(see also Network Information Service)
(see also portmapper)
building : TCP/IP Network Administration, 7.4.3. Open Shortest Path First
name assigned a database : TCP/IP Network Administration, 10.6.2.1. Transforming with a database
NIS : (see NIS)
/map rule-testing command : sendmail, 38.5.3. Look up a Database Item with /map
map_lookup() : sendmail, 20.3. Alphabetized V8.8 Subroutines
martians
TCP/IP Network Administration, 4.2.1. Obtaining an IP Address
TCP/IP Network Administration, B.7. Definition Statements
mask information : (see information)
masking
TCP/IP Network Administration, 2.2.2. Classless IP Addresses
TCP/IP Network Administration, 2.3. Subnets
MASQUERADE_AS macro (m4)
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 31.10. Alphabetized Reference
MASQUERADE_DOMAIN macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
MASQUERADE_DOMAIN_FILE macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
masquerade_entire_domain feature : sendmail, 19.6. Alphabetized m4 Macros
masquerade_envelope feature : sendmail, 19.6. Alphabetized m4 Macros
masquerading
sendmail, 19.4.4. Masquerading
sendmail, 19.6. Alphabetized m4 Macros
TCP/IP Network Administration, E.3.2. FEATURE
TCP/IP Network Administration, E.3.4. DOMAIN
Massey, James L. : Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
Master mode (uucico) : Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work
master server
Practical UNIX & Internet Security, 19.4. Sun's Network Information Service (NIS)
(see also NIS)
MatchGecos (G) option
sendmail, 20.1.2. Global Variables
sendmail, 34.8. Alphabetized Reference
MATCHGECOS macro : sendmail, 18.8. Alphabetized Reference
matching : (see wildcard operators)
MAX... macros : sendmail, 18.8. Alphabetized Reference
MaxDaemonChildren option
sendmail, 34.1.3. Appropriateness of Options
sendmail, 34.8. Alphabetized Reference
MaxHopCount (h) option : sendmail, 34.8. Alphabetized Reference
maximum line length
sendmail, 30.4. The Equates
sendmail, 30.8. Alphabetized F= Flags
maximum receive unit (MRU) : TCP/IP Network Administration, A.2. The PPP Daemon
maximum transmission unit (MTU)
Building Internet Firewalls, C.5.1.3. Fragmenting datagrams
TCP/IP Network Administration, 1.5.1.3. Fragmenting datagrams
TCP/IP Network Administration, 6.1.1. Determining the Interface Name
TCP/IP Network Administration, 6.1.2. Checking the Interface with ifconfig
TCP/IP Network Administration, 6.1.5.4. Maximum transmission unit
TCP/IP Network Administration, A.1. Dial-Up IP
determining smallest : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
MAXLINE variable : sendmail, 18.8. Alphabetized Reference
MaxMessageSize : sendmail, 34.8. Alphabetized Reference
maxpacketsize : TCP/IP Network Administration, B.8.6. The egp Statement
MaxQueueRunSize option
sendmail, 23.4. Printing the Queue
sendmail, 34.8. Alphabetized Reference
MAXRWSETS variable : sendmail, 29.1.2. Rule-Set Names
MBONE (Multicast Backbone)
Building Internet Firewalls, 2.8. Real-Time Conferencing
TCP/IP Network Administration, 5.2. Linux Kernel Configuration
TCP/IP Network Administration, 5.3.1.1. Options
configuring : Building Internet Firewalls, 8.9.3. The Multicast Backbone (MBONE)
mc files
sendmail, 19.3. The Minimal mc File
sendmail, 19.6. Alphabetized m4 Macros
MCERT : Practical UNIX & Internet Security, F.3.4.21. Motorola, Inc.
MCI Corporation : Practical UNIX & Internet Security, F.3.4.19. MCI Corporation
MD2 algorithm : Practical UNIX & Internet Security, 6.5.4.1. MD2, MD4, and MD5
MD4 algorithm
Building Internet Firewalls, 10.3.1. One-Time Passwords
Practical UNIX & Internet Security, 6.5.4.1. MD2, MD4, and MD5
MD5 algorithm
Practical UNIX & Internet Security, 6.5.2. Using Message Digests
Practical UNIX & Internet Security, 6.5.4.1. MD2, MD4, and MD5
Practical UNIX & Internet Security, 23.5.1. Use Message Digests for Storing Passwords
Practical UNIX & Internet Security, 23.9. A Good Random Seed
digital signatures versus : Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
in POP : Practical UNIX & Internet Security, 17.3.10. Post Office Protocol (POP) (TCP Ports
MDAs (mail delivery agents) : (see MTAs)
media : Practical UNIX & Internet Security, 12.3.3. Other Media
damaged by smoke : Practical UNIX & Internet Security, 12.2.1.2. Smoke
destroying : Practical UNIX & Internet Security, 12.3.2.3. Sanitize your media before disposal
failure of : Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
hard/soft disk quotas : Practical UNIX & Internet Security, 25.2.2.5. Using quotas
print through process : Practical UNIX & Internet Security, 12.3.2.1. Verify your backups
rotating for backups : Practical UNIX & Internet Security, 7.1.3. Types of Backups
rotation of : Practical UNIX & Internet Security, 7.2.1.2. Media rotation
sanitizing : Practical UNIX & Internet Security, 12.3.2.3. Sanitize your media before disposal
viruses from : Practical UNIX & Internet Security, 11.1.5. Viruses
meet-in-the-middle attacks : Practical UNIX & Internet Security, 6.4.5.1. Double DES
MEMCHUNKSIZE macro : sendmail, 18.8. Alphabetized Reference
memory
Building Internet Firewalls, 1.1.2. Your Resources
Building Internet Firewalls, 5.3.3. What Hardware Configuration?
Practical UNIX & Internet Security, 25.2.2. Disk Attacks
Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
sendmail, 34.8. Alphabetized Reference
hidden space : Practical UNIX & Internet Security, 25.2.2.7. Hidden space
for logs
Building Internet Firewalls, 12.1.3. Managing Your Disk Space
Building Internet Firewalls, 12.2.2. What Should You Watch For?
managing : Building Internet Firewalls, 12.1.3. Managing Your Disk Space
reserved space : Practical UNIX & Internet Security, 25.2.2.6. Reserved space
swap space : Practical UNIX & Internet Security, 25.2.3. Swap Space Problems
/tmp directory and : Practical UNIX & Internet Security, 25.2.4. /tmp Problems
tree-structure attacks : Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
memory-to-memory copies : TCP/IP Network Administration, 6.1.5.2. ARP and trailers
merging interior and exterior routers : Building Internet Firewalls, 4.3.2. It's OK to Merge the Interior Router and the Exterior Router
Merkle, Ralph : Practical UNIX & Internet Security, 6.4.5.1. Double DES
Message Authentication Code (MAC) : Practical UNIX & Internet Security, 6.5.5.2. Message authentication codes
Message Digest 5 (MD5) cryptographic checksum
TCP/IP Network Administration, 7.4.3. Open Shortest Path First
TCP/IP Network Administration, 7.7.1.1. A host configuration
TCP/IP Network Administration, B.8.2. The rip Statement
message digests
Practical UNIX & Internet Security, 6.5. Message Digests and Digital Signatures
Practical UNIX & Internet Security, 6.5.2. Using Message Digests
Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
Practical UNIX & Internet Security, 23.5.1. Use Message Digests for Storing Passwords
Tripwire package
Practical UNIX & Internet Security, 9.2.4. Tripwire
Practical UNIX & Internet Security, 9.2.4.2. Running Tripwire
"Message:" header line : sendmail, 35.10. Alphabetized Reference
message queue : (see queue)
"Message-ID:" header line
sendmail, 1.5. The Header
sendmail, 13.4. Sending Mail
sendmail, 14.2.3. The Message-ID: Header
sendmail, 26.1.3.5. msgid= the Message-ID: identifier
sendmail, 30.8. Alphabetized F= Flags
sendmail, 35.5.16. Replacing Headers with H_ACHECK
sendmail, 35.10. Alphabetized Reference
message_volume.sh script : sendmail, 26.1.4.1. message_volume.sh
messages file : TCP/IP Network Administration, 12.4.2.2. Checking login activity
messages log file : Practical UNIX & Internet Security, 10.2.3. messages Log File
messages, error : (see error messages)
messages, email
sendmail, 34.8. Alphabetized Reference
TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
assigning priority to : TCP/IP Network Administration, 10.5.6. Defining Mail Precedence
blank lines ending : sendmail, 30.8. Alphabetized F= Flags
body of
sendmail, 1.6. The Body
sendmail, 23.2.2. The Data (Message Body) File: df
(see also -B switch (sendmail))
bouncing
sendmail, 10.3. Missing Addresses
sendmail, 13.2.2. Limit the Life of Queued Messages
sendmail, 14.4. Precedence
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 22.8.3.4. The PostmasterCopy option
sendmail, 23.3.6. Savemail Panic
sendmail, 23.7.1. Handling a Down Site
sendmail, 24.4.1. The Postmaster Alias
sendmail, 25.5.1. Reply Versus Bounce
sendmail, 25.5.3. A list-bounced Alias
sendmail, 34.8. Alphabetized Reference
sendmail, 35.10. Alphabetized Reference
sendmail, 36.7. Alphabetized Reference
(see also $n macro)
content type : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
converting between 7- and 8-bit : sendmail, 18.8. Alphabetized Reference
delivering : (see delivery)
envelope : (see envelope)
encapsulated : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
error : (see errors)
flooding : Practical UNIX & Internet Security, 25.3.2. Message Flooding
forged : sendmail, 22.7. Forged Mail
forwarding : sendmail, 35.7. Forwarding with Resent-Headers
forwarding loops : sendmail, 25.7.2. Forwarding Loops
headers for : (see headers, message)
holding : (see queue)
hop count : (see hop count)
hub's acceptance of : sendmail, 15.4. Hub Accepts Mail for Client
leading dots in : sendmail, 34.8. Alphabetized Reference
limiting size of : sendmail, 20.2.3. Limit the Size of Guest Messages
multipart subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
multiple objects in single : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
origin date of : (see $a macro)
priority of
sendmail, 14.4. Precedence
(see priority, message)
processing limits on : sendmail, 23.5. How the Queue Is Processed
queue
sendmail, 1.3.2. The Queue
sendmail, 23. The Queue
checkpointing : sendmail, 34.8. Alphabetized Reference
down sites and : sendmail, 23.7.1. Handling a Down Site
lifetime
sendmail, 13.2.2. Limit the Life of Queued Messages
sendmail, 34.8. Alphabetized Reference
message life : sendmail, 13.2.2. Limit the Life of Queued Messages
message parts : sendmail, 23.2. Parts of a Queued Message
printing
sendmail, 4.1.2. Show Queue Mode (-bp)
sendmail, 23.2.3.2. Locks shown when printing the queue
sendmail, 23.4. Printing the Queue
sendmail, 36.7. Alphabetized Reference
processing
sendmail, 23.5. How the Queue Is Processed
sendmail, 23.9. The qf File Internals
sendmail, 36.7. Alphabetized Reference
putting everything in : sendmail, 34.8. Alphabetized Reference
requeuing on error : sendmail, 25.7.6. Force Requeue on Error
sendmail options for : sendmail, 34.6.2. The Queue
sorting : sendmail, 34.8. Alphabetized Reference
time message placed in : sendmail, 23.9. The qf File Internals
troubleshooting : sendmail, 23.8. Pitfalls
why message is stored in : sendmail, 23.9. The qf File Internals
rejecting
sendmail, 18.8. Alphabetized Reference
sendmail, 20.2.6. Reject Mail from Spamming or Mail-bombing Sites
relays for : sendmail, 19.4.5. Relays
sending
sendmail, 13.4. Sending Mail
sendmail, 14.5. Sending Real Mail
size of
sendmail, 26.1.3.10. size= the size of the message
sendmail, 30.4. The Equates
sendmail, 34.8. Alphabetized Reference
stored in queue in error : sendmail, 23.9. The qf File Internals
time placed in queue : sendmail, 23.9. The qf File Internals
unique identifier for
sendmail, 13.4. Sending Mail
sendmail, 14.2.3. The Message-ID: Header
sendmail, 26.1.3.5. msgid= the Message-ID: identifier
messages, SMTP greeting
sendmail, 31.10. Alphabetized Reference
sendmail, 34.8. Alphabetized Reference
messages, warning : (see warning messages)
meta characters : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
meta-packets, and filtering : Building Internet Firewalls, 6.8.4. It Should Allow Rules Based on Any
metadata
Practical UNIX & Internet Security, 9.2.2. Checklists and Metadata
Practical UNIX & Internet Security, 9.2.2.2. Ancestor directories
metasymbols : TCP/IP Network Administration, 10.6.1. Pattern Matching
for transforming the address : TCP/IP Network Administration, 10.6.2. Transforming the Address
MeToo (m) option
sendmail, 34.8. Alphabetized Reference
sendmail, 36.7. Alphabetized Reference
metrics : TCP/IP Network Administration, 6.1.5.3. Metric
arbitrariness of : TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
incompatibility of : TCP/IP Network Administration, 7.6.1. gated's Preference Value
Metropolitan Area Exchanges (MAEs) : TCP/IP Network Administration, 1.1. TCP/IP and the Internet
Metropolitan Networks (MANs) : Practical UNIX & Internet Security, 16.1. Networking
MH (mail handler) : Practical UNIX & Internet Security, 11.5.2.5. .forward, .procmailrc
MIB (Management Information Base) : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
MIBI and MIBII : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
Micro-BIT Virus Center : Practical UNIX & Internet Security, F.3.4.16. Germany: Southern area
mil domain : TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
Miller, Barton : Practical UNIX & Internet Security, 23.1.2. An Empirical Study of the Reliability of UNIX Utilities
MILNET : Practical UNIX & Internet Security, F.3.4.20. Motorola, Inc.
MIME (Multipurpose Internet Mail Extensions)
Building Internet Firewalls, 8.1.3. Multipurpose Internet Mail Extensions
Practical UNIX & Internet Security, 11.1.5. Viruses
sendmail, 5.3.8. Headers
TCP/IP Network Administration, 1.2. A Data Communications Model
TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
format errors : sendmail, 34.8. Alphabetized Reference
headers for : sendmail, 35.6.7. MIME Headers
sendmail and : TCP/IP Network Administration, 10.5.8. Defining Mailers
standardizing on : TCP/IP Network Administration, 4.5.3. Planning Your Mail System
types : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
"MIME-Version:" header line : sendmail, 35.10. Alphabetized Reference
MIME7TO8 macro : sendmail, 18.8. Alphabetized Reference
MIME8TO7 macro : sendmail, 18.8. Alphabetized Reference
MinFreeBlocks (b) option : sendmail, 34.8. Alphabetized Reference
minicom : TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
minimum matching
sendmail, 8.7.2. Minimal Matching
sendmail, 28.5.1. Minimum Matching
sendmail, 32.2.3. Backup and Retry
MinQueueAge option
sendmail, 23.9. The qf File Internals
sendmail, 34.8. Alphabetized Reference
minus sign (hyphen)
in machine conversation : sendmail, 4.2. Verbose (-v)
non-equivalent host : TCP/IP Network Administration, 12.2.5. Secure the r Commands
missing addresses : (see addresses, null)
"Missing username" error : sendmail, 9.4. The error Delivery Agent
MIT-KERBEROS-5 authentication : Practical UNIX & Internet Security, 17.3.21.3. The xhost facility
Mitnick, Kevin : Practical UNIX & Internet Security, 27.2.6. Network Providers that Network Too Well
mixed multipart subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
mknod command : TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
mkpasswd program : Practical UNIX & Internet Security, 8.8.4. Password Generators
mktemp function : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
mobile network computing : Practical UNIX & Internet Security, 8.7. One-Time Passwords
mobile systems, requirements of : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
mode command : TCP/IP Network Administration, 6.3.2. Dial-Up PPP
modem pools : Building Internet Firewalls, 10.6. Terminal Servers and Modem Pools
modems
Practical UNIX & Internet Security, 14. Telephone Security
Practical UNIX & Internet Security, 14.6. Additional Security for Modems
TCP/IP Network Administration, 1.7. Application Layer
(see also Automatic Call Unit)
asynchronous : TCP/IP Network Administration, 5.3.1.2. Pseudo-device
callback setups
Practical UNIX & Internet Security, 14.4.2.
Practical UNIX & Internet Security, 14.6. Additional Security for Modems
carrier-detect (DCD) indicator, monitoring : TCP/IP Network Administration, 6.3.3. chat
checking configuration of : TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
clogging : Practical UNIX & Internet Security, 25.3.4. Clogging
documentation : TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
encrypting : Practical UNIX & Internet Security, 14.6. Additional Security for Modems
hanging up : (see signals)
high-speed dial-up : TCP/IP Network Administration, 6.2. TCP/IP Over a Serial Line
physical security of
Practical UNIX & Internet Security, 14.5.4. Physical Protection of Modems
Practical UNIX & Internet Security, 14.6. Additional Security for Modems
recording call information : Practical UNIX & Internet Security, 10.3.1. aculog File
synchronous : TCP/IP Network Administration, 5.3.1.2. Pseudo-device
tracing connections
Practical UNIX & Internet Security, 24.2.4. Tracing a Connection
Practical UNIX & Internet Security, 24.2.4.2. How to contact the system administrator of a computer
UNIX and
Practical UNIX & Internet Security, 14.5. Modems and UNIX
Practical UNIX & Internet Security, 14.5.3.3. Privilege testing
modes
daemon : sendmail, 4.1.1. Daemon Mode (-bd)
delivery : sendmail, 13.2.3. The Default Delivery Mode
sendmail operating : sendmail, 36.7. Alphabetized Reference
TempFileMode option
sendmail, 13.2.4. The Default File Permissions
sendmail, 22.8.3.7. The TempFileMode option
modification times
Practical UNIX & Internet Security, 5.1.2. Inodes
Practical UNIX & Internet Security, 5.1.5. File Times
Practical UNIX & Internet Security, 7.4.7. inode Modification Times
Practical UNIX & Internet Security, 9.2.2. Checklists and Metadata
modifying Internet services : Building Internet Firewalls, 5.8.3. Installing and Modifying Services
modules, loadable : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
monitoring
automatically : Building Internet Firewalls, 5.9.2. Consider Writing Software to Automate Monitoring
hardware for : (see detectors)
intruders : Practical UNIX & Internet Security, 24.2.3. Monitoring the Intruder
performance : Practical UNIX & Internet Security, 13.2.3. Performance Reviews and Monitoring
security : (see logs/logging)
software
TCP/IP Network Administration, 11.9. Simple Network Management Protocol
TCP/IP Network Administration, 12.4.3. Automated Monitoring
system usage
Building Internet Firewalls, 12.2. Monitoring Your System
TCP/IP Network Administration, 5.2. Linux Kernel Configuration
users : Practical UNIX & Internet Security, 26.2.6. Other Tips
monitors and screen savers : Practical UNIX & Internet Security, 12.3.5.2. X screen savers
more command : TCP/IP Network Administration, 8.4. Using nslookup
Morris worm : Building Internet Firewalls, 8.1. Electronic Mail
Morris, Robert T.
Practical UNIX & Internet Security, 1. Introduction
Practical UNIX & Internet Security, 8.6. The UNIX Encrypted Password System
Practical UNIX & Internet Security, 17.4. Security Implications of Network Services
Mosaic
Building Internet Firewalls, 2.5. The World Wide Web
TCP/IP Network Administration, 13.1. The World Wide Web
motd file : Practical UNIX & Internet Security, 26.2.6. Other Tips
Motorola, Inc. : Practical UNIX & Internet Security, F.3.4.20. Motorola, Inc.
mount command
Practical UNIX & Internet Security, 20.3. Client-Side NFS Security
TCP/IP Network Administration, 9.1.3.1. The mount command
Practical UNIX & Internet Security, 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
mount daemon (mountd)
Building Internet Firewalls, 5.8.2.4. Which services should you disable?
TCP/IP Network Administration, 9.1.1. NFS Daemons
mount point : TCP/IP Network Administration, 9.1.3.1. The mount command
mounted filesystems
Building Internet Firewalls, 5.8.4.3. Mount filesystems as read-only
Practical UNIX & Internet Security, 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
TCP/IP Network Administration, 9.1.3. Mounting Remote Filesystems
(see also directories)
mounting directory : TCP/IP Network Administration, 9.1. The Network File System
mpeg video subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
mqueue directory : (see queue directory)
mqueue temporary files : TCP/IP Network Administration, 10.5.4. The Set Option Command
mrand48 function : Practical UNIX & Internet Security, 23.7.3. drand48 ( ), lrand48 ( ), and mrand48 ( )
mrouter
Building Internet Firewalls, 6.3.3.5. IP over IP
Building Internet Firewalls, 8.9.3. The Multicast Backbone (MBONE)
MRU (maximum receive unit) : TCP/IP Network Administration, A.2. The PPP Daemon
${ms} macro : sendmail, D.1. Sun Enhancements
msgid= equate (syslog output) : sendmail, 26.1.3.5. msgid= the Message-ID: identifier
MTAs
Building Internet Firewalls, 8.1. Electronic Mail
sendmail, 1.1. MUA Versus MTA
sendmail, 5.3.1. Mail Delivery Agents
sendmail, 6.2. Define a Mail Delivery Agent
sendmail, 30. Delivery Agents
(see also M configuration command)
$# operator and
sendmail, 9.2.1. The Delivery Agent ($#)
sendmail, 28.6.5. Specify a Delivery Agent: $#
advantages to sendmail : sendmail, 18.1. To Use or Not to Use
choosing
sendmail, 9. Rule Set 0
sendmail, 9.5. Things to Try
declaring : sendmail, 19.3.2. MAILER()
default : sendmail, 34.8. Alphabetized Reference
equates for : sendmail, 30.4. The Equates
for errors : sendmail, 9.4. The error Delivery Agent
expensive
sendmail, 23.6.1. Periodically with -q
sendmail, 30.8. Alphabetized F= Flags
sendmail, 34.8. Alphabetized Reference
flags
sendmail, 6.3. The local Delivery Agent
sendmail, 6.4. Add the Missing Parts to Mhub
sendmail, 14.2. Headers Versus Delivery Agent Flags
sendmail, 30.8. Alphabetized F= Flags
sendmail, 35.4. ?flags? in Header Definitions
ignoring MX records : sendmail, 21.3.5. What? They Ignore MX Records?
local
sendmail, 6.3. The local Delivery Agent
sendmail, 19.6. Alphabetized m4 Macros
logging : sendmail, 26.1.3.4. mailer= the delivery agent used
printing list of : sendmail, 38.4.2. Show Delivery Agents with =M
as recipients : sendmail, 30.8. Alphabetized F= Flags
scripts via : sendmail, 24.3. Write a Delivery Agent Script
statistics : (see statistics)
symbolic name : sendmail, 30.2. The Symbolic Name
testing : sendmail, 38.5.6. Try a Delivery Agent with /try
UUCP : sendmail, 19.4.6. UUCP
mtime
Practical UNIX & Internet Security, 5.1.2. Inodes
Practical UNIX & Internet Security, 5.1.5. File Times
Practical UNIX & Internet Security, 9.2.2. Checklists and Metadata
Practical UNIX & Internet Security, 24.4.1.6. Changes to startup files
MTU (maximum transmission unit)
Building Internet Firewalls, C.5.1.3. Fragmenting datagrams
TCP/IP Network Administration, 1.5.1.3. Fragmenting datagrams
TCP/IP Network Administration, 6.1.1. Determining the Interface Name
TCP/IP Network Administration, 6.1.2. Checking the Interface with ifconfig
TCP/IP Network Administration, 6.1.5.4. Maximum transmission unit
TCP/IP Network Administration, A.1. Dial-Up IP
determining smallest : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
MUAs (mail user agents)
sendmail, 1.1. MUA Versus MTA
sendmail, 36.7. Alphabetized Reference
(see also delivery agents)
MUDs (Multiuser Dungeons) : Practical UNIX & Internet Security, 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
Muffet, Alec : Practical UNIX & Internet Security, 10.5.3.1. Beware false log entries
Multicast Backbone : (see MBONE)
multicast groups : Practical UNIX & Internet Security, 16.2.1.2. Classical network addresses
multicast IP : Building Internet Firewalls, 6.3.3.5. IP over IP
multicasting
Building Internet Firewalls, 8.9.3. The Multicast Backbone (MBONE)
TCP/IP Network Administration, 6.1.2. Checking the Interface with ifconfig
TCP/IP Network Administration, 6.1.5.5. Point-to-point
addresses
TCP/IP Network Administration, 2.2.1. Address Classes
TCP/IP Network Administration, 2.2.2.1. Final notes on IP addresses
TCP/IP Network Administration, 2.6. Address Resolution
TCP/IP Network Administration, 7.4.2. RIP Version 2
routing, support for
TCP/IP Network Administration, 5.2. Linux Kernel Configuration
TCP/IP Network Administration, 5.3.1.1. Options
Multichannel Memorandum Distribution Facility (MMDF) : TCP/IP Network Administration, 10. sendmail
multicharacter
names : (see names)
options : (see options, sendmail)
MULTICS (Multiplexed Information and Computing Service) : Practical UNIX & Internet Security, 1.3. History of UNIX
multidirectional connections : Building Internet Firewalls, 7.4.2. Unidirectional Versus Multidirectional
multihomed
hosts
Building Internet Firewalls, C.5.1.2. Routing datagrams
TCP/IP Network Administration, 5.3.1.1. Options
TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
architecture of : TCP/IP Network Administration, 12.7. Firewalls
site : TCP/IP Network Administration, 4.3.1. Obtaining an autonomous system number
multilevel security
Practical UNIX & Internet Security, 1.3. History of UNIX
Practical UNIX & Internet Security, 2.4.4.7. Defend in depth
Practical UNIX & Internet Security, 2.5.3. Final Words: Risk Management Means Common Sense
Practical UNIX & Internet Security, 17.2. Controlling Access to Servers
multimedia mail : (see email)
multipart content type : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
multipart encryption : (see encryption)
multipart messages : (see messages)
multiple
recipients : sendmail, 30.8. Alphabetized F= Flags
SMTP connections : sendmail, 34.8. Alphabetized Reference
timeouts : sendmail, 34.8. Alphabetized Reference
multiplexing
TCP/IP Network Administration, 2.1. Addressing, Routing, and Multiplexing
TCP/IP Network Administration, 2.7. Protocols, Ports, and Sockets
Multipurpose Internet Mail Extensions : (see MIME)
multitasking
Practical UNIX & Internet Security, 1.4. Security and UNIX
Practical UNIX & Internet Security, C.1.3.3. Process priority and niceness
multiuser operating systems : Practical UNIX & Internet Security, 1.4. Security and UNIX
multiuser workstations : Practical UNIX & Internet Security, 17.3.21.1. etc/fbtab and /etc/logindevperm
munitions export : Practical UNIX & Internet Security, 26.4.1. Munitions Export
MustQuoteChars option : sendmail, 34.8. Alphabetized Reference
MX records
Building Internet Firewalls, 8.10.5.1. Set up a `fake'
Practical UNIX & Internet Security, 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
sendmail, 15.3. MX Records
sendmail, 18.8. Alphabetized Reference
sendmail, 21.3. Set Up MX Records
sendmail, 34.8. Alphabetized Reference
sendmail, 38.5.2. Look Up MX Records with /mx
TCP/IP Network Administration, 8.3.2. Standard Resource Records
TCP/IP Network Administration, 8.3.6. The named.hosts File
TCP/IP Network Administration, 8.4. Using nslookup
TCP/IP Network Administration, 10.7.1. Modifying Local Information
TCP/IP Network Administration, C.3.1.4. Mail exchanger record
0 flag : sendmail, 30.8. Alphabetized F= Flags
bestmx database class : sendmail, 33.8. Alphabetized Reference
bestmx_is_local feature : sendmail, 19.6. Alphabetized m4 Macros
fallback MX host : sendmail, 34.8. Alphabetized Reference
ignored by delivery agents : sendmail, 21.3.5. What? They Ignore MX Records?
looking up for addresses : sendmail, 21.2.3. Look Up Addresses for Delivery
offsite hosts : sendmail, 21.5.1. Offsite MX Hosts
with wildcards : sendmail, 21.3.4. Wildcard MX Records
/mx rule-testing command : sendmail, 38.5.2. Look Up MX Records with /mx
MYNAME= command : Practical UNIX & Internet Security, 15.5.2. Permissions Commands


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.