home | O'Reilly's CD bookshelfs | FreeBSD | Linux | Cisco | Cisco Exam  


Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: M

MAC (Mandatory Access Controls) : 4.1.3. Groups and Group Identifiers (GIDs)
MACH operating system : 1.3. History of UNIX
machine name : 16.2.3. Hostnames
MACHINE= command
15.5.1.2. Name-value pairs
15.5.2. Permissions Commands
Macintosh, Web server on : 18.2. Running a Secure Server
macro virus : (see viruses)
magic cookies : 17.3.21.4. Using Xauthority magic cookies
magic number : 5.1.7. File Permissions in Detail
mail
11.5.3.3. /usr/lib/aliases, /etc/aliases, /etc/sendmail/aliases, aliases.dir, or aliases.pag
(see also sendmail)
accepted by programs : 17.3.4.1. sendmail and security
action, in Swatch program : 10.6.2. The Swatch Configuration File
alias back door : 11.1.2. Back Doors and Trap Doors
aliases : (see aliases)
copyrights on : 26.4.2. Copyright Infringement
Electronic Communications Privacy Act (ECPA) : 26.2.3. Federal Computer Crime Laws
firewalls : 21.4.2. Electronic Mail
forwarding (UUCP) : 15.6.1. Mail Forwarding for UUCP
harassment via : 26.4.7. Harassment, Threatening Communication, and Defamation
logging : 10.4.2. Mail
message flooding : 25.3.2. Message Flooding
phantom, monitoring : 17.3.4.2. Using sendmail to receive email
receiving by sendmail : 17.3.4.2. Using sendmail to receive email
sending via CGI scripts : 18.2.3.3. Sending mail
sent directly to file : 15.7. Early Security Problems with UUCP
startup file attacks : 11.5.2.5. .forward, .procmailrc
mail command : 15.1.3. mail Command
Mail_Aliases table (NIS+) : 19.5.3. NIS+ Tables
mailing lists
E.1. Mailing Lists
E.1.3.10. WWW-security
maintenance mode : C.5.1. Process #1: /etc/init
maintenance personnel : 13.3. Outsiders
makedbm program : 19.4.4.1. Setting up netgroups
malware : 11.1. Programmed Threats: Definitions
man pages : 2.5. The Problem with Security Through Obscurity
management, role of
2.3.4. Convincing Management
2.5. The Problem with Security Through Obscurity
MANs (Metropolitan Networks) : 16.1. Networking
manual logging
10.7. Handwritten Logs
10.7.2.2. Informational material
manual pages : 23.2. Tips on Avoiding Security-related Bugs
maps, NIS : (see NIS)
Massey, James L. : 6.4.1. Summary of Private Key Systems
Master mode (uucico) : 15.1.4. How the UUCP Commands Work
master server
19.4. Sun's Network Information Service (NIS)
(see also NIS)
MCERT : F.3.4.21. Motorola, Inc. and subsidiaries
MCI Corporation : F.3.4.19. MCI Corporation
MD2 algorithm : 6.5.4.1. MD2, MD4, and MD5
MD4 algorithm : 6.5.4.1. MD2, MD4, and MD5
MD5 algorithm
6.5.2. Using Message Digests
6.5.4.1. MD2, MD4, and MD5
23.5.1. Use Message Digests for Storing Passwords
23.9. A Good Random Seed Generator
digital signatures versus : 6.6.3.6. PGP detached signatures
in POP : 17.3.10. Post Office Protocol (POP) (TCP Ports 109 and 110)
media : 12.3.3. Other Media
damaged by smoke : 12.2.1.2. Smoke
destroying : 12.3.2.3. Sanitize your media before disposal
failure of : 7.1.4. Guarding Against Media Failure
hard/soft disk quotas : 25.2.2.5. Using quotas
print through process : 12.3.2.1. Verify your backups
rotating for backups : 7.1.3. Types of Backups
rotation of : 7.2.1.2. Media rotation
sanitizing : 12.3.2.3. Sanitize your media before disposal
viruses from : 11.1.5. Viruses
meet-in-the-middle attacks : 6.4.5.1. Double DES
memory
25.2.2. Disk Attacks
25.2.2.8. Tree-structure attacks
hidden space : 25.2.2.7. Hidden space
reserved space : 25.2.2.6. Reserved space
swap space : 25.2.3. Swap Space Problems
/tmp directory and : 25.2.4. /tmp Problems
tree-structure attacks : 25.2.2.8. Tree-structure attacks
Merkle, Ralph : 6.4.5.1. Double DES
Message Authentication Code (MAC) : 6.5.5.2. Message authentication codes
message digests
6.5. Message Digests and Digital Signatures
6.5.2. Using Message Digests
9.2.3. Checksums and Signatures
23.5.1. Use Message Digests for Storing Passwords
Tripwire package
9.2.4. Tripwire
9.2.4.2. Running Tripwire
message flooding : 25.3.2. Message Flooding
messages log file : 10.2.3. messages Log File
meta characters : 23.2. Tips on Avoiding Security-related Bugs
metadata
9.2.2. Checklists and Metadata
9.2.2.2. Ancestor directories
Metropolitan Networks (MANs) : 16.1. Networking
MH (mail handler) : 11.5.2.5. .forward, .procmailrc
Micro-BIT Virus Center : F.3.4.16. Germany: Southern area
Miller, Barton : 23.1.2. An Empirical Study of the Reliability of UNIX Utilities
MILNET : F.3.4.20. MILNET
MIME : 11.1.5. Viruses
MIT-KERBEROS-5 authentication : 17.3.21.3. The xhost facility
Mitnick, Kevin : 27.2.6. Network Providers that Network Too Well
mkpasswd program : 8.8.4. Password Generators
mktemp function : 23.2. Tips on Avoiding Security-related Bugs
MLS (Multilevel Security) environment : "Secure" Versions of UNIX
mobile network computing : 8.7. One-Time Passwords
modems
14. Telephone Security
14.6. Additional Security for Modems
callback setups
14.4.2.
14.6. Additional Security for Modems
clogging : 25.3.4. Clogging
encrypting : 14.6. Additional Security for Modems
hanging up : (see signals)
physical security of
14.5.4. Physical Protection of Modems
14.6. Additional Security for Modems
recording call information : 10.3.1. aculog File
tracing connections
24.2.4. Tracing a Connection
24.2.4.2. How to contact the system administrator of a computer you don't know
UNIX and
14.5. Modems and UNIX
14.5.3.3. Privilege testing
modification times
5.1.2. Inodes
5.1.5. File Times
7.4.7. inode Modification Times
9.2.2. Checklists and Metadata
monitoring
hardware for : (see detectors)
intruders : 24.2.3. Monitoring the Intruder
performance : 13.2.3. Performance Reviews and Monitoring
security : (see logging)
users : 26.2.6. Other Tips
monitors and screen savers : 12.3.5.2. X screen savers
Morris, Robert T.
1. Introduction
8.6. The UNIX Encrypted Password System
17.4. Security Implications of Network Services
motd file : 26.2.6. Other Tips
Motorola, Inc. : F.3.4.20. MILNET
Motorola, Inc. and subsidiaries : F.3.4.21. Motorola, Inc. and subsidiaries
mount command : 20.3. Client-Side NFS Security
-nodev option : 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
-nosuid option : 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
mounted filesystems : 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
mouting filesystem : (see directories)
mrand48 function : 23.7.3. drand48 ( ), lrand48 ( ), and mrand48 ( )
mtime
5.1.2. Inodes
5.1.5. File Times
9.2.2. Checklists and Metadata
24.4.1.6. Changes to startup files
MUDs (Multiuser Dungeons) : 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
Muffet, Alec : 10.5.3.1. Beware false log entries
multicast groups : 16.2.1.2. Classical network addresses
MULTICS (Multiplexed Information and Computing Service) : 1.3. History of UNIX
multilevel security
1.3. History of UNIX
2.4.4.7. Defend in depth
2.5.3. Final Words: Risk Management Means Common Sense
17.2. Controlling Access to Servers
multitasking
1.4. Security and UNIX
C.1.3.3. Process priority and niceness
multiuser operating systems : 1.4. Security and UNIX
multiuser workstations : 17.3.21.1. /etc/fbtab and /etc/logindevperm
munitions export : 26.4.1. Munitions Export
MX record type : 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
MYNAME= command : 15.5.2. Permissions Commands


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.