Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: H
- H configuration command
- sendmail, 5.3.8. Headers
- sendmail, 14.1. Headers
- sendmail, 35.1. The H Configuration Command
- h flag
: sendmail, 30.8. Alphabetized F= Flags
- H line (host status file)
: sendmail, B.1. Status file lines
- H line (qf file)
: sendmail, 23.9. The qf File Internals
- $h macro
- sendmail, 6.2. Define a Mail Delivery Agent
- sendmail, 7.3. Predefined Macros
- sendmail, 31.10. Alphabetized Reference
- (see also rule set 0)
- $H macro
: sendmail, 31.10. Alphabetized Reference
- h option
: (see MaxHopCount (h) option)
- H option
: (see HelpFile (H) option)
- -h switch
: sendmail, 36.7. Alphabetized Reference
- H_ACHECK flag
- sendmail, 35.5.6. H_ACHECK
- sendmail, 35.5.16. Replacing Headers with H_ACHECK
- H_BCC flag
: sendmail, 35.5.14. H_BCC
- H_CHECK flag
: sendmail, 35.5.5. H_CHECK
- H_CTE flag
: sendmail, 35.5.12. H_CTE
- H_CTYPE flag
: sendmail, 35.5.13. H_CTYPE
- H_DEFAULT flag
: sendmail, 35.5.3. H_DEFAULT
- H_ENCODABLE flag
: sendmail, 35.5.15. H_ENCODABLE
- H_EOH flag
: sendmail, 35.5.1. H_EOH
- H_ERRSTO flag
: sendmail, 35.5.11. H_ERRSTO
- H_FORCE flag
: sendmail, 35.5.7. H_FORCE
- H_FROM flag
: sendmail, 35.5.9. H_FROM
- H_RCPT flag
: sendmail, 35.5.2. H_RCPT
- H_RESENT flag
: sendmail, 35.5.4. H_RESENT
- H_TRACE flag
: sendmail, 35.5.8. H_TRACE
- H_VALID flag
: sendmail, 35.5.10. H_VALID
- HACK macro (m4)
: sendmail, 19.6. Alphabetized m4 Macros
- hacker challenges
: Practical UNIX & Internet Security, 27.2.4. Hacker Challenges
- hackers
: Practical UNIX & Internet Security, 1. Introduction
- Haley, Chuck
: Practical UNIX & Internet Security, 1.3. History of UNIX
- Halon fire extinguishers
: Practical UNIX & Internet Security, 12.2.1.1. Fire
- and radio transmitters
: Practical UNIX & Internet Security, 12.2.1.8. Electrical noise
- halt command
: Practical UNIX & Internet Security, 24.2.6. Anatomy of a Break-in
- handshakes
- Building Internet Firewalls, C.6.2. Transmission Control Protocol
- TCP/IP Network Administration, 1.5.1. Internet Protocol
- TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
- TCP
: TCP/IP Network Administration, 2.7.3. Sockets
- three-way
: TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
- hanging up modem
: (see signals)
- harassment
: Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
- hard copy
: (see paper)
- hard disks
: (see media)
- hardcopy device, logging to
: Practical UNIX & Internet Security, 10.5.2.1. Logging to a printer
- hardware
- bugs in
: Practical UNIX & Internet Security, 27.2.1. Hardware Bugs
- configuration of
: Building Internet Firewalls, 5.3.3. What Hardware Configuration?
- failure of
: Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
- food and drink threats
: Practical UNIX & Internet Security, 12.2.2.1. Food and drink
- modems
- Practical UNIX & Internet Security, 14. Telephone Security
- Practical UNIX & Internet Security, 14.6. Additional Security for Modems
- physical security of
- Practical UNIX & Internet Security, 12.2. Protecting Computer Hardware
- Practical UNIX & Internet Security, 12.2.7. Related Concerns
- read-only filesystems
: Practical UNIX & Internet Security, 9.1.2. Read-only Filesystems
- router
: (see routers and routing)
- seized as evidence
: Practical UNIX & Internet Security, 26.2.4. Hazards of Criminal Prosecution
- HAS... macros
: sendmail, 18.8. Alphabetized Reference
- hash database class
: sendmail, 33.8. Alphabetized Reference
- hash functions
: Practical UNIX & Internet Security, 6.5.1. Message Digests
- for comments
- sendmail, 5.1. Overview
- sendmail, 5.2.2. Comments
- sendmail, 27.2. Comments
- sendmail, 38.2. Configuration Lines
- TCP/IP Network Administration, 3.2. The Host Table
- TCP/IP Network Administration, 5.4. The Internet Daemon
- TCP/IP Network Administration, 7.7.1.1. A host configuration
- TCP/IP Network Administration, 9.1.4. NFS Automounter
- TCP/IP Network Administration, 9.2.1. The printcap File
- TCP/IP Network Administration, 9.4. A BOOTP Server
- TCP/IP Network Administration, A.1.1. The dip Script File
- TCP/IP Network Administration, D.3. The dhcpd.conf Configuration File
- disabling services with
: Practical UNIX & Internet Security, 17.3. Primary UNIX Network Services
- in :include: lists
: sendmail, 25.2.1. Comments in :include: Lists
- lines in sendmail.cf
: sendmail, 3.1. Role in the Filesystem
- in m4 files
: sendmail, 19.5. Pitfalls
- HAVAL algorithm
- Practical UNIX & Internet Security, 6.5.4.3. HAVAL
- Practical UNIX & Internet Security, 23.9. A Good Random Seed
- Hayes modems
: TCP/IP Network Administration, 6.3.2. Dial-Up PPP
- compatibility problems
: TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- HDB UUCP
: Practical UNIX & Internet Security, 15.2. Versions of UUCP
- header packet
- Building Internet Firewalls, 6.3. What Does a Packet Look Like?
- Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
- headers
- TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
- TCP/IP Network Administration, 1.5.1.1. The datagram
- TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- .h files
: TCP/IP Network Administration, 5.3.1.2. Pseudo-device
- compressing
: TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- email message
- sendmail, 1.5. The Header
- sendmail, 5.3.8. Headers
- sendmail, 13.4. Sending Mail
- sendmail, 14.1. Headers
- (see also under specific header line)
- adding
: sendmail, 20.3. Alphabetized V8.8 Subroutines
- changing values of
: sendmail, 20.3. Alphabetized V8.8 Subroutines
- conf.c file
: sendmail, 35.5. Header Behavior in conf.c
- defining
: (see H configuration command)
- delivery agent flags and
- sendmail, 14.2. Headers Versus Delivery Agent Flags
- sendmail, 35.4. ?flags? in Header Definitions
- field contents
: sendmail, 35.3. Header Field Contents
- firewalls and
: sendmail, 20.2.5. Prune Received: Headers at Firewall
- getting recipients from
: sendmail, 36.7. Alphabetized Reference
- mailing lists and
: sendmail, 25.5.1. Reply Versus Bounce
- in qf file
: sendmail, 23.9. The qf File Internals
- in queue
: sendmail, 3.1.2. The Queue Directory
- removing (deleting)
: sendmail, 20.3. Alphabetized V8.8 Subroutines
- using old style of
: sendmail, 34.8. Alphabetized Reference
- nested IP
: Building Internet Firewalls, 6.3.6. IP Version 6
- packet filtering and
: Building Internet Firewalls, 6.8.4. It Should Allow Rules Based on Any
- heat, extreme
: Practical UNIX & Internet Security, 12.2.1.6. Temperature extremes
- Hellman, Martin
: Practical UNIX & Internet Security, 6.4.5.1. Double DES
- Hellman-Merkle
: Practical UNIX & Internet Security, 18.6. Dependence on Third Parties
- hello
- messages
: TCP/IP Network Administration, 7.5.1. Exterior Gateway Protocol
- packets
: TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- statement (in gated)
: TCP/IP Network Administration, B.8.3. The hello Statement
- HELO command
- sendmail, 18.8. Alphabetized Reference
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 34.8. Alphabetized Reference
- TCP/IP Network Administration, 3.4.2. Post Office Protocol
- TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- TCP/IP Network Administration, 7.4. Interior Routing Protocols
- help on sendmail
- sendmail, Additional Sources of Information
- sendmail, 2.2. Read the Documents
- HELP command
- in ESMTP
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- in nslookup
: TCP/IP Network Administration, 8.4. Using nslookup
- in SMTP
- sendmail, 34.8. Alphabetized Reference
- TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
- HelpFile (H) option
: sendmail, 34.8. Alphabetized Reference
- HES_GETMAILHOST macro
: sendmail, 18.8. Alphabetized Reference
- hesiod database class
: sendmail, 33.8. Alphabetized Reference
- HESIOD macro
: sendmail, 18.8. Alphabetized Reference
- Hewlett-Packard (HP)
: Practical UNIX & Internet Security, F.3.4.17. Hewlett-Packard (HP)
- HFDIR= directive
: sendmail, 18.4.9. HFDIR=
- hidden
- data, in CGI scripts
: Practical UNIX & Internet Security, 18.2.3.1. Do not trust the user's browser!
- files, created by intruders
: Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
- space
: Practical UNIX & Internet Security, 25.2.2.7. Hidden space
- hidden dot algorithm
: sendmail, 4.2. Verbose (-v)
- hiding information with DNS
: Building Internet Firewalls, 8.10.5. Setting Up DNS to Hide
- hierarchy, system
: TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
- database system
: TCP/IP Network Administration, 9.3.2. NIS+
- of responsibility
: TCP/IP Network Administration, 12.1.2.1. Use subnets to distribute control
- high bit
: sendmail, 30.8. Alphabetized F= Flags
- High-level Data Link Control (HDLC)
: TCP/IP Network Administration, 6.2.1. The Serial Protocols
- high-speed dial-up modems
: (see modems)
- hijacking
: Building Internet Firewalls, 10.1.1. Hijacking
- hijacking Telnet sessions
: Practical UNIX & Internet Security, 17.3.3. TELNET (TCP Port 23)
- HINFO resource records
- Building Internet Firewalls, 8.10.4.3. Revealing too much information to
- TCP/IP Network Administration, 11.6.2. The data is here and the server can't find it!
- TCP/IP Network Administration, C.3.1.7. Host Information record
- hints file
: TCP/IP Network Administration, 8.3.3. The Cache Initialization File
- history file (csh)
- Practical UNIX & Internet Security, 10.4.1. Shell History
- Practical UNIX & Internet Security, 15.1.1.1. uucp with the C shell
- history, sendmail
- sendmail, History
- sendmail, 27.5. The V Configuration Command
- hit lists of passwords
: Practical UNIX & Internet Security, 3.6.1. Bad Passwords: Open Doors
- hoaxes about viruses
: TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
- HoldExpensive (c) option
- sendmail, 23.6.1. Periodically with -q
- sendmail, 34.8. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- holding messages
: (see queue)
- holes, security
: (see security holes)
- home directory, recipient's
: sendmail, 31.10. Alphabetized Reference
- HOME variable, attacks via
: Practical UNIX & Internet Security, 11.5.1.3. $HOME attacks
- HoneyDanBer (HDB) UUCP
: Practical UNIX & Internet Security, 15.2. Versions of UUCP
- Honeyman, Peter
: Practical UNIX & Internet Security, 15.2. Versions of UUCP
- hop count
- sendmail, 14.1.2. The Received: Header
- sendmail, 31.10. Alphabetized Reference
- sendmail, 34.8. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
- hops
- TCP/IP Network Administration, 1.7. Application Layer
- TCP/IP Network Administration, 2.5. The Routing Table
- (see also next hop)
- host database class
: sendmail, 33.8. Alphabetized Reference
- Host Information records
: (see HINFO resource records)
- host status
: sendmail, B.1. Status file lines
- host unreachable codes
: (see ICMP)
- Host-to-Host Transport Layer
: (see Transport Layer)
- hostname command
: sendmail, 7.3.1. The hostname
- hostnames
- Practical UNIX & Internet Security, 16.2.3. Hostnames
- Practical UNIX & Internet Security, 16.2.3.1. The /etc/hosts file
- sendmail, 7.3.1. The hostname
- sendmail, 21.2.2. Look Up a Remote Host's Name
- TCP/IP Network Administration, 3.1. Names and Addresses
- $@ operator and
- sendmail, 9.2.2. The Host ($@)
- sendmail, 9.3. Testing Rule Set 0
- sendmail, 17.1.1.3. Handle null address
- sendmail, 33.4.2. Specify Numbered Substitution with $@
- canonicalizing
: (see canonicalization)
- capitalization of
: sendmail, 30.8. Alphabetized F= Flags
- changing to hub name
: sendmail, 11.6. Handling user@thishost
- choosing
: TCP/IP Network Administration, 4.4.2. Choosing a Hostname
- controlling access to
: Practical UNIX & Internet Security, 17.2. Controlling Access to Servers
- default
: sendmail, 33.5.3. A :default Outgoing Hostname
- domain part
: (see $m macro)
- easing transition from old to new
: TCP/IP Network Administration, C.3.1.5. Canonical Name record
- name service and
- Practical UNIX & Internet Security, 16.2.6. Name Service
- Practical UNIX & Internet Security, 16.2.6.2. Other naming services
- parameter
: TCP/IP Network Administration, 9.4. A BOOTP Server
- short form of
: (see $w macro)
- hosts
- sendmail, 6.3. The local Delivery Agent
- TCP/IP Network Administration, 1.7. Application Layer
- (see also $h macro)
- (see also remote, hosts, checking)
- $_ macro
: (see $_ macro)
- addresses
: (see addresses)
- architecture of
- dual-homed
: Building Internet Firewalls, 4.2.1. Dual-Homed Host Architecture
- screened
- Building Internet Firewalls, 4.2.2. Screened Host Architecture
- Building Internet Firewalls, 9.2. Screened Host Architecture
- bastion
: (see bastion hosts)
- canonical names of
: sendmail, 31.10. Alphabetized Reference
- checking if local
: sendmail, 17.2.1. Is the Host Local?
- file, caution regarding
: TCP/IP Network Administration, 6.1.3. Assigning a Subnet Mask
- IP addresses of
: sendmail, 31.10. Alphabetized Reference
- list
: TCP/IP Network Administration, 12.5.1.1. tcpd access control files
- masquerading
: (see masquerading)
- multi-homed
: TCP/IP Network Administration, 1.5.1.2. Routing datagrams
- name service for
: Building Internet Firewalls, 2.9. Name Service
- NID passwords for
: Practical UNIX & Internet Security, 19.3.2.2. Creating passwords for hosts
- offsite MX
: sendmail, 21.5.1. Offsite MX Hosts
- preference
- sendmail, 15.3. MX Records
- sendmail, 21.3. Set Up MX Records
- security of
: Building Internet Firewalls, 1.3.3. Host Security
- sender's
: (see $s macro)
- sending, variables for
: sendmail, 20.1.2. Global Variables
- setting
: sendmail, 36.7. Alphabetized Reference
- smart
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 29.6.4. Forwarding to a Knowledgeable Host
- sendmail, 31.10. Alphabetized Reference
- speed of
: Building Internet Firewalls, 5.3.2. How Fast a Machine?
- sticky and nonsticky
: sendmail, 19.6. Alphabetized m4 Macros
- table
- TCP/IP Network Administration, 3.1. Names and Addresses
- TCP/IP Network Administration, 3.2. The Host Table
- system, problems with
: TCP/IP Network Administration, 3.2. The Host Table
- trusted
: (see trusted hosts)
- victim
: (see victim hosts)
- hosts file
- Practical UNIX & Internet Security, 16.2.3.1. The /etc/hosts file
- sendmail, 7.3.1. The hostname
- sendmail, 18.8. Alphabetized Reference
- sendmail, 34.8. Alphabetized Reference
- TCP/IP Network Administration, 3.2. The Host Table
- TCP/IP Network Administration, 6.1. The ifconfig Command
- TCP/IP Network Administration, 7.3. Building a Static Routing Table
- TCP/IP Network Administration, 9.1.4. NFS Automounter
- TCP/IP Network Administration, 9.3. Network Information Service
- creating
: TCP/IP Network Administration, 3.2. The Host Table
- as maps
: TCP/IP Network Administration, 3.3.5. Network Information Service
- modifying
: TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
- hosts.allow file
: TCP/IP Network Administration, 12.5.1.1. tcpd access control files
- hosts.deny file
- Building Internet Firewalls, 5.8.3.1. Using the TCP Wrapper package to protect services
- TCP/IP Network Administration, 12.5.1.1. tcpd access control files
- hosts.equiv file
- Practical UNIX & Internet Security, 17.3.18.4. The ~/.rhosts file
- Practical UNIX & Internet Security, 17.3.18.6. /etc/hosts.lpd file
- Practical UNIX & Internet Security, 24.4.1.5. Changes to the hosts.equiv file
- TCP/IP Network Administration, 12.2.5. Secure the r Commands
- TCP/IP Network Administration, 12.4.2. Looking for Trouble
- hosts.lpd file
- Practical UNIX & Internet Security, 17.3.18.6. /etc/hosts.lpd file
- TCP/IP Network Administration, 9.2.1.1. LPD security
- TCP/IP Network Administration, 12.4.2. Looking for Trouble
- HostsFile option
: sendmail, 34.8. Alphabetized Reference
- hoststat command
: sendmail, 36.1.1. hoststat (V8.8 and Above)
- HostStatusDirectory option
- sendmail, 34.8. Alphabetized Reference
- sendmail, B. Host Status File Internals
- housekeeping
: Building Internet Firewalls, 12.1. Housekeeping
- HP (Hewlett-Packard)
: Practical UNIX & Internet Security, F.3.4.17. Hewlett-Packard (HP)
- HP-UX
- access control lists
: Practical UNIX & Internet Security, 5.2.5.2. HP-UX access control lists
- context-dependent files
: Practical UNIX & Internet Security, 5.9.2. Context-Dependent Files
- htable command
: TCP/IP Network Administration, 3.2. The Host Table
- .htaccess file
: Practical UNIX & Internet Security, 18.3.1. The access.conf and .htaccess Files
- HTML (Hypertext Markup Language)
: Building Internet Firewalls, 2.5. The World Wide Web
- HTML documents
- controlling access to
- Practical UNIX & Internet Security, 18.3. Controlling Access to Files on Your Server
- Practical UNIX & Internet Security, 18.3.3. Setting Up Web Users and Passwords
- delivering
: TCP/IP Network Administration, 1.7. Application Layer
- encrypting
: Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire
- server-side includes
- Practical UNIX & Internet Security, 18.2.2.2. Additional configuration issues
- Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
- html text subtype
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- htpasswd program
: Practical UNIX & Internet Security, 18.3.3. Setting Up Web Users and Passwords
- HTTP (Hypertext Transfer Protocol)
- Building Internet Firewalls, 2.5. The World Wide Web
- Practical UNIX & Internet Security, 17.3.9. HyperText Transfer Protocol (HTTP) (TCP Port 80)
- TCP/IP Network Administration, 1.7. Application Layer
- TCP/IP Network Administration, 13.1. The World Wide Web
- anonymous FTP and
: Practical UNIX & Internet Security, 18.2.4.1. Beware mixing HTTP with anonymous FTP
- CERN server
: Building Internet Firewalls, 8.6.2. Proxying Characteristics of
- configuring
: Building Internet Firewalls, 8.6. World Wide Web (WWW) and HTTP
- in screened host architecture
: Building Internet Firewalls, 9.2.1.5. HTTP
- in screened subnet architecture
: Building Internet Firewalls, 9.1.1.5. HTTP
- logging downloaded files
: Practical UNIX & Internet Security, 10.3.5. access_log Log File
- message subtype
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- proxying with TIS FWTK
: Building Internet Firewalls, 7.7.4. Other TIS FWTK
- Secure
- Building Internet Firewalls, 8.6.4. Secure HTTP
- (see Secure HTTP)
- TIS FWTK proxy server
: Building Internet Firewalls, 8.6.2. Proxying Characteristics of
- http server
- group file
: Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
- log files of
: Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
- password file
: Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
- http-gw proxy
- Building Internet Firewalls, 7.7.4. Other TIS FWTK
- Building Internet Firewalls, 8.6.2. Proxying Characteristics of
- httpd.conf file
: Practical UNIX & Internet Security, 18.2.1. The Server's UID
- hubs
- sendmail, 6. The Mail Hub and Delivery Agents
- sendmail, 11.3. All Mail from the Hub
- accepting mail
: sendmail, 15.4. Hub Accepts Mail for Client
- changing hostname to
: sendmail, 11.6. Handling user@thishost
- delivery agent flags for
: sendmail, 6.4. Add the Missing Parts to Mhub
- $H macro
: sendmail, 31.10. Alphabetized Reference
- internal name for
: sendmail, 11.4.2. A Word About ${HUB}
- rules for
: sendmail, 17. The Hub's Complex Rules
- Hubset rule set
- sendmail, 11.2. Rule Set S=
- sendmail, 11.4. Rule Set Hubset
- human error
- Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
- TCP/IP Network Administration, 11.1.1. Troubleshooting Hints
- humidity
: Practical UNIX & Internet Security, 12.2.1.11. Humidity
- hunches, verifying
: TCP/IP Network Administration, 10.8.1. Testing Rewrite Rules
- hvalue()
: sendmail, 20.3. Alphabetized V8.8 Subroutines
- hypertext links, encrypting
: Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire
- Hypertext Markup Language
: (see HTML)
- Hypertext Transfer Protocol
: (see HTTP)
- hyphen (-)
- in machine conversation
: sendmail, 4.2. Verbose (-v)
- non-equivalent host
: TCP/IP Network Administration, 12.2.5. Secure the r Commands
- hyphen/greater than (->), for copying files
: TCP/IP Network Administration, 9.6.1. rdist
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
O'Reilly & Associates, Inc.
All Rights Reserved.
|