home | O'Reilly's CD bookshelfs | FreeBSD | Linux | Cisco | Cisco Exam    

Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: H

H configuration command
sendmail, 5.3.8. Headers
sendmail, 14.1. Headers
sendmail, 35.1. The H Configuration Command
h flag : sendmail, 30.8. Alphabetized F= Flags
H line (host status file) : sendmail, B.1. Status file lines
H line (qf file) : sendmail, 23.9. The qf File Internals
$h macro
sendmail, 6.2. Define a Mail Delivery Agent
sendmail, 7.3. Predefined Macros
sendmail, 31.10. Alphabetized Reference
(see also rule set 0)
$H macro : sendmail, 31.10. Alphabetized Reference
h option : (see MaxHopCount (h) option)
H option : (see HelpFile (H) option)
-h switch : sendmail, 36.7. Alphabetized Reference
H_ACHECK flag
sendmail, 35.5.6. H_ACHECK
sendmail, 35.5.16. Replacing Headers with H_ACHECK
H_BCC flag : sendmail, 35.5.14. H_BCC
H_CHECK flag : sendmail, 35.5.5. H_CHECK
H_CTE flag : sendmail, 35.5.12. H_CTE
H_CTYPE flag : sendmail, 35.5.13. H_CTYPE
H_DEFAULT flag : sendmail, 35.5.3. H_DEFAULT
H_ENCODABLE flag : sendmail, 35.5.15. H_ENCODABLE
H_EOH flag : sendmail, 35.5.1. H_EOH
H_ERRSTO flag : sendmail, 35.5.11. H_ERRSTO
H_FORCE flag : sendmail, 35.5.7. H_FORCE
H_FROM flag : sendmail, 35.5.9. H_FROM
H_RCPT flag : sendmail, 35.5.2. H_RCPT
H_RESENT flag : sendmail, 35.5.4. H_RESENT
H_TRACE flag : sendmail, 35.5.8. H_TRACE
H_VALID flag : sendmail, 35.5.10. H_VALID
HACK macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
hacker challenges : Practical UNIX & Internet Security, 27.2.4. Hacker Challenges
hackers : Practical UNIX & Internet Security, 1. Introduction
Haley, Chuck : Practical UNIX & Internet Security, 1.3. History of UNIX
Halon fire extinguishers : Practical UNIX & Internet Security, 12.2.1.1. Fire
and radio transmitters : Practical UNIX & Internet Security, 12.2.1.8. Electrical noise
halt command : Practical UNIX & Internet Security, 24.2.6. Anatomy of a Break-in
handshakes
Building Internet Firewalls, C.6.2. Transmission Control Protocol
TCP/IP Network Administration, 1.5.1. Internet Protocol
TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
TCP : TCP/IP Network Administration, 2.7.3. Sockets
three-way : TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
hanging up modem : (see signals)
harassment : Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
hard copy : (see paper)
hard disks : (see media)
hardcopy device, logging to : Practical UNIX & Internet Security, 10.5.2.1. Logging to a printer
hardware
bugs in : Practical UNIX & Internet Security, 27.2.1. Hardware Bugs
configuration of : Building Internet Firewalls, 5.3.3. What Hardware Configuration?
failure of : Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
food and drink threats : Practical UNIX & Internet Security, 12.2.2.1. Food and drink
modems
Practical UNIX & Internet Security, 14. Telephone Security
Practical UNIX & Internet Security, 14.6. Additional Security for Modems
physical security of
Practical UNIX & Internet Security, 12.2. Protecting Computer Hardware
Practical UNIX & Internet Security, 12.2.7. Related Concerns
read-only filesystems : Practical UNIX & Internet Security, 9.1.2. Read-only Filesystems
router : (see routers and routing)
seized as evidence : Practical UNIX & Internet Security, 26.2.4. Hazards of Criminal Prosecution
HAS... macros : sendmail, 18.8. Alphabetized Reference
hash database class : sendmail, 33.8. Alphabetized Reference
hash functions : Practical UNIX & Internet Security, 6.5.1. Message Digests
for comments
sendmail, 5.1. Overview
sendmail, 5.2.2. Comments
sendmail, 27.2. Comments
sendmail, 38.2. Configuration Lines
TCP/IP Network Administration, 3.2. The Host Table
TCP/IP Network Administration, 5.4. The Internet Daemon
TCP/IP Network Administration, 7.7.1.1. A host configuration
TCP/IP Network Administration, 9.1.4. NFS Automounter
TCP/IP Network Administration, 9.2.1. The printcap File
TCP/IP Network Administration, 9.4. A BOOTP Server
TCP/IP Network Administration, A.1.1. The dip Script File
TCP/IP Network Administration, D.3. The dhcpd.conf Configuration File
disabling services with : Practical UNIX & Internet Security, 17.3. Primary UNIX Network Services
in :include: lists : sendmail, 25.2.1. Comments in :include: Lists
lines in sendmail.cf : sendmail, 3.1. Role in the Filesystem
in m4 files : sendmail, 19.5. Pitfalls
HAVAL algorithm
Practical UNIX & Internet Security, 6.5.4.3. HAVAL
Practical UNIX & Internet Security, 23.9. A Good Random Seed
Hayes modems : TCP/IP Network Administration, 6.3.2. Dial-Up PPP
compatibility problems : TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
HDB UUCP : Practical UNIX & Internet Security, 15.2. Versions of UUCP
header packet
Building Internet Firewalls, 6.3. What Does a Packet Look Like?
Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
headers
TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
TCP/IP Network Administration, 1.5.1.1. The datagram
TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
.h files : TCP/IP Network Administration, 5.3.1.2. Pseudo-device
compressing : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
email message
sendmail, 1.5. The Header
sendmail, 5.3.8. Headers
sendmail, 13.4. Sending Mail
sendmail, 14.1. Headers
(see also under specific header line)
adding : sendmail, 20.3. Alphabetized V8.8 Subroutines
changing values of : sendmail, 20.3. Alphabetized V8.8 Subroutines
conf.c file : sendmail, 35.5. Header Behavior in conf.c
defining : (see H configuration command)
delivery agent flags and
sendmail, 14.2. Headers Versus Delivery Agent Flags
sendmail, 35.4. ?flags? in Header Definitions
field contents : sendmail, 35.3. Header Field Contents
firewalls and : sendmail, 20.2.5. Prune Received: Headers at Firewall
getting recipients from : sendmail, 36.7. Alphabetized Reference
mailing lists and : sendmail, 25.5.1. Reply Versus Bounce
in qf file : sendmail, 23.9. The qf File Internals
in queue : sendmail, 3.1.2. The Queue Directory
removing (deleting) : sendmail, 20.3. Alphabetized V8.8 Subroutines
using old style of : sendmail, 34.8. Alphabetized Reference
nested IP : Building Internet Firewalls, 6.3.6. IP Version 6
packet filtering and : Building Internet Firewalls, 6.8.4. It Should Allow Rules Based on Any
heat, extreme : Practical UNIX & Internet Security, 12.2.1.6. Temperature extremes
Hellman, Martin : Practical UNIX & Internet Security, 6.4.5.1. Double DES
Hellman-Merkle : Practical UNIX & Internet Security, 18.6. Dependence on Third Parties
hello
messages : TCP/IP Network Administration, 7.5.1. Exterior Gateway Protocol
packets : TCP/IP Network Administration, 7.4.3. Open Shortest Path First
statement (in gated) : TCP/IP Network Administration, B.8.3. The hello Statement
HELO command
sendmail, 18.8. Alphabetized Reference
sendmail, 30.8. Alphabetized F= Flags
sendmail, 34.8. Alphabetized Reference
TCP/IP Network Administration, 3.4.2. Post Office Protocol
TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
TCP/IP Network Administration, 7.4. Interior Routing Protocols
help on sendmail
sendmail, Additional Sources of Information
sendmail, 2.2. Read the Documents
HELP command
in ESMTP : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
in nslookup : TCP/IP Network Administration, 8.4. Using nslookup
in SMTP
sendmail, 34.8. Alphabetized Reference
TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
HelpFile (H) option : sendmail, 34.8. Alphabetized Reference
HES_GETMAILHOST macro : sendmail, 18.8. Alphabetized Reference
hesiod database class : sendmail, 33.8. Alphabetized Reference
HESIOD macro : sendmail, 18.8. Alphabetized Reference
Hewlett-Packard (HP) : Practical UNIX & Internet Security, F.3.4.17. Hewlett-Packard (HP)
HFDIR= directive : sendmail, 18.4.9. HFDIR=
hidden
data, in CGI scripts : Practical UNIX & Internet Security, 18.2.3.1. Do not trust the user's browser!
files, created by intruders : Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
space : Practical UNIX & Internet Security, 25.2.2.7. Hidden space
hidden dot algorithm : sendmail, 4.2. Verbose (-v)
hiding information with DNS : Building Internet Firewalls, 8.10.5. Setting Up DNS to Hide
hierarchy, system : TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
database system : TCP/IP Network Administration, 9.3.2. NIS+
of responsibility : TCP/IP Network Administration, 12.1.2.1. Use subnets to distribute control
high bit : sendmail, 30.8. Alphabetized F= Flags
High-level Data Link Control (HDLC) : TCP/IP Network Administration, 6.2.1. The Serial Protocols
high-speed dial-up modems : (see modems)
hijacking : Building Internet Firewalls, 10.1.1. Hijacking
hijacking Telnet sessions : Practical UNIX & Internet Security, 17.3.3. TELNET (TCP Port 23)
HINFO resource records
Building Internet Firewalls, 8.10.4.3. Revealing too much information to
TCP/IP Network Administration, 11.6.2. The data is here and the server can't find it!
TCP/IP Network Administration, C.3.1.7. Host Information record
hints file : TCP/IP Network Administration, 8.3.3. The Cache Initialization File
history file (csh)
Practical UNIX & Internet Security, 10.4.1. Shell History
Practical UNIX & Internet Security, 15.1.1.1. uucp with the C shell
history, sendmail
sendmail, History
sendmail, 27.5. The V Configuration Command
hit lists of passwords : Practical UNIX & Internet Security, 3.6.1. Bad Passwords: Open Doors
hoaxes about viruses : TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
HoldExpensive (c) option
sendmail, 23.6.1. Periodically with -q
sendmail, 34.8. Alphabetized Reference
sendmail, 36.7. Alphabetized Reference
holding messages : (see queue)
holes, security : (see security holes)
home directory, recipient's : sendmail, 31.10. Alphabetized Reference
HOME variable, attacks via : Practical UNIX & Internet Security, 11.5.1.3. $HOME attacks
HoneyDanBer (HDB) UUCP : Practical UNIX & Internet Security, 15.2. Versions of UUCP
Honeyman, Peter : Practical UNIX & Internet Security, 15.2. Versions of UUCP
hop count
sendmail, 14.1.2. The Received: Header
sendmail, 31.10. Alphabetized Reference
sendmail, 34.8. Alphabetized Reference
sendmail, 36.7. Alphabetized Reference
TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
hops
TCP/IP Network Administration, 1.7. Application Layer
TCP/IP Network Administration, 2.5. The Routing Table
(see also next hop)
host database class : sendmail, 33.8. Alphabetized Reference
Host Information records : (see HINFO resource records)
host status : sendmail, B.1. Status file lines
host unreachable codes : (see ICMP)
Host-to-Host Transport Layer : (see Transport Layer)
hostname command : sendmail, 7.3.1. The hostname
hostnames
Practical UNIX & Internet Security, 16.2.3. Hostnames
Practical UNIX & Internet Security, 16.2.3.1. The /etc/hosts file
sendmail, 7.3.1. The hostname
sendmail, 21.2.2. Look Up a Remote Host's Name
TCP/IP Network Administration, 3.1. Names and Addresses
$@ operator and
sendmail, 9.2.2. The Host ($@)
sendmail, 9.3. Testing Rule Set 0
sendmail, 17.1.1.3. Handle null address
sendmail, 33.4.2. Specify Numbered Substitution with $@
canonicalizing : (see canonicalization)
capitalization of : sendmail, 30.8. Alphabetized F= Flags
changing to hub name : sendmail, 11.6. Handling user@thishost
choosing : TCP/IP Network Administration, 4.4.2. Choosing a Hostname
controlling access to : Practical UNIX & Internet Security, 17.2. Controlling Access to Servers
default : sendmail, 33.5.3. A :default Outgoing Hostname
domain part : (see $m macro)
easing transition from old to new : TCP/IP Network Administration, C.3.1.5. Canonical Name record
name service and
Practical UNIX & Internet Security, 16.2.6. Name Service
Practical UNIX & Internet Security, 16.2.6.2. Other naming services
parameter : TCP/IP Network Administration, 9.4. A BOOTP Server
short form of : (see $w macro)
hosts
sendmail, 6.3. The local Delivery Agent
TCP/IP Network Administration, 1.7. Application Layer
(see also $h macro)
(see also remote, hosts, checking)
$_ macro : (see $_ macro)
addresses : (see addresses)
architecture of
dual-homed : Building Internet Firewalls, 4.2.1. Dual-Homed Host Architecture
screened
Building Internet Firewalls, 4.2.2. Screened Host Architecture
Building Internet Firewalls, 9.2. Screened Host Architecture
bastion : (see bastion hosts)
canonical names of : sendmail, 31.10. Alphabetized Reference
checking if local : sendmail, 17.2.1. Is the Host Local?
file, caution regarding : TCP/IP Network Administration, 6.1.3. Assigning a Subnet Mask
IP addresses of : sendmail, 31.10. Alphabetized Reference
list : TCP/IP Network Administration, 12.5.1.1. tcpd access control files
masquerading : (see masquerading)
multi-homed : TCP/IP Network Administration, 1.5.1.2. Routing datagrams
name service for : Building Internet Firewalls, 2.9. Name Service
NID passwords for : Practical UNIX & Internet Security, 19.3.2.2. Creating passwords for hosts
offsite MX : sendmail, 21.5.1. Offsite MX Hosts
preference
sendmail, 15.3. MX Records
sendmail, 21.3. Set Up MX Records
security of : Building Internet Firewalls, 1.3.3. Host Security
sender's : (see $s macro)
sending, variables for : sendmail, 20.1.2. Global Variables
setting : sendmail, 36.7. Alphabetized Reference
smart
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 29.6.4. Forwarding to a Knowledgeable Host
sendmail, 31.10. Alphabetized Reference
speed of : Building Internet Firewalls, 5.3.2. How Fast a Machine?
sticky and nonsticky : sendmail, 19.6. Alphabetized m4 Macros
table
TCP/IP Network Administration, 3.1. Names and Addresses
TCP/IP Network Administration, 3.2. The Host Table
system, problems with : TCP/IP Network Administration, 3.2. The Host Table
trusted : (see trusted hosts)
victim : (see victim hosts)
hosts file
Practical UNIX & Internet Security, 16.2.3.1. The /etc/hosts file
sendmail, 7.3.1. The hostname
sendmail, 18.8. Alphabetized Reference
sendmail, 34.8. Alphabetized Reference
TCP/IP Network Administration, 3.2. The Host Table
TCP/IP Network Administration, 6.1. The ifconfig Command
TCP/IP Network Administration, 7.3. Building a Static Routing Table
TCP/IP Network Administration, 9.1.4. NFS Automounter
TCP/IP Network Administration, 9.3. Network Information Service
creating : TCP/IP Network Administration, 3.2. The Host Table
as maps : TCP/IP Network Administration, 3.3.5. Network Information Service
modifying : TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
hosts.allow file : TCP/IP Network Administration, 12.5.1.1. tcpd access control files
hosts.deny file
Building Internet Firewalls, 5.8.3.1. Using the TCP Wrapper package to protect services
TCP/IP Network Administration, 12.5.1.1. tcpd access control files
hosts.equiv file
Practical UNIX & Internet Security, 17.3.18.4. The ~/.rhosts file
Practical UNIX & Internet Security, 17.3.18.6. /etc/hosts.lpd file
Practical UNIX & Internet Security, 24.4.1.5. Changes to the hosts.equiv file
TCP/IP Network Administration, 12.2.5. Secure the r Commands
TCP/IP Network Administration, 12.4.2. Looking for Trouble
hosts.lpd file
Practical UNIX & Internet Security, 17.3.18.6. /etc/hosts.lpd file
TCP/IP Network Administration, 9.2.1.1. LPD security
TCP/IP Network Administration, 12.4.2. Looking for Trouble
HostsFile option : sendmail, 34.8. Alphabetized Reference
hoststat command : sendmail, 36.1.1. hoststat (V8.8 and Above)
HostStatusDirectory option
sendmail, 34.8. Alphabetized Reference
sendmail, B. Host Status File Internals
housekeeping : Building Internet Firewalls, 12.1. Housekeeping
HP (Hewlett-Packard) : Practical UNIX & Internet Security, F.3.4.17. Hewlett-Packard (HP)
HP-UX
access control lists : Practical UNIX & Internet Security, 5.2.5.2. HP-UX access control lists
context-dependent files : Practical UNIX & Internet Security, 5.9.2. Context-Dependent Files
htable command : TCP/IP Network Administration, 3.2. The Host Table
.htaccess file : Practical UNIX & Internet Security, 18.3.1. The access.conf and .htaccess Files
HTML (Hypertext Markup Language) : Building Internet Firewalls, 2.5. The World Wide Web
HTML documents
controlling access to
Practical UNIX & Internet Security, 18.3. Controlling Access to Files on Your Server
Practical UNIX & Internet Security, 18.3.3. Setting Up Web Users and Passwords
delivering : TCP/IP Network Administration, 1.7. Application Layer
encrypting : Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire
server-side includes
Practical UNIX & Internet Security, 18.2.2.2. Additional configuration issues
Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
html text subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
htpasswd program : Practical UNIX & Internet Security, 18.3.3. Setting Up Web Users and Passwords
HTTP (Hypertext Transfer Protocol)
Building Internet Firewalls, 2.5. The World Wide Web
Practical UNIX & Internet Security, 17.3.9. HyperText Transfer Protocol (HTTP) (TCP Port 80)
TCP/IP Network Administration, 1.7. Application Layer
TCP/IP Network Administration, 13.1. The World Wide Web
anonymous FTP and : Practical UNIX & Internet Security, 18.2.4.1. Beware mixing HTTP with anonymous FTP
CERN server : Building Internet Firewalls, 8.6.2. Proxying Characteristics of
configuring : Building Internet Firewalls, 8.6. World Wide Web (WWW) and HTTP
in screened host architecture : Building Internet Firewalls, 9.2.1.5. HTTP
in screened subnet architecture : Building Internet Firewalls, 9.1.1.5. HTTP
logging downloaded files : Practical UNIX & Internet Security, 10.3.5. access_log Log File
message subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
proxying with TIS FWTK : Building Internet Firewalls, 7.7.4. Other TIS FWTK
Secure
Building Internet Firewalls, 8.6.4. Secure HTTP
(see Secure HTTP)
TIS FWTK proxy server : Building Internet Firewalls, 8.6.2. Proxying Characteristics of
http server
group file : Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
log files of : Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
password file : Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
http-gw proxy
Building Internet Firewalls, 7.7.4. Other TIS FWTK
Building Internet Firewalls, 8.6.2. Proxying Characteristics of
httpd.conf file : Practical UNIX & Internet Security, 18.2.1. The Server's UID
hubs
sendmail, 6. The Mail Hub and Delivery Agents
sendmail, 11.3. All Mail from the Hub
accepting mail : sendmail, 15.4. Hub Accepts Mail for Client
changing hostname to : sendmail, 11.6. Handling user@thishost
delivery agent flags for : sendmail, 6.4. Add the Missing Parts to Mhub
$H macro : sendmail, 31.10. Alphabetized Reference
internal name for : sendmail, 11.4.2. A Word About ${HUB}
rules for : sendmail, 17. The Hub's Complex Rules
Hubset rule set
sendmail, 11.2. Rule Set S=
sendmail, 11.4. Rule Set Hubset
human error
Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
TCP/IP Network Administration, 11.1.1. Troubleshooting Hints
humidity : Practical UNIX & Internet Security, 12.2.1.11. Humidity
hunches, verifying : TCP/IP Network Administration, 10.8.1. Testing Rewrite Rules
hvalue() : sendmail, 20.3. Alphabetized V8.8 Subroutines
hypertext links, encrypting : Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire
Hypertext Markup Language : (see HTML)
Hypertext Transfer Protocol : (see HTTP)
hyphen (-)
in machine conversation : sendmail, 4.2. Verbose (-v)
non-equivalent host : TCP/IP Network Administration, 12.2.5. Secure the r Commands
hyphen/greater than (->), for copying files : TCP/IP Network Administration, 9.6.1. rdist


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.







??????????????@Mail.ru