Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: K
- k class
: sendmail, 32.5. Alphabetized Reference
- K commands
- TCP/IP Network Administration, 10.8.2. Using Key Files in sendmail
- TCP/IP Network Administration, E.4.4. The sendmail K Command
- K configuration command
- sendmail, 5.3.11. Keyed Databases
- sendmail, 20.3. Alphabetized V8.8 Subroutines
- sendmail, 33.3. The K Configuration Command
- -d switch for
: sendmail, D.3. K Command's -d switch
- -k database switch
: sendmail, 33.3.4.4. -k specify column for key (V8.7 and above)
- k flag
: sendmail, 30.8. Alphabetized F= Flags
- K line (qf file)
: sendmail, 23.9. The qf File Internals
- $k macro
- sendmail, 18.8. Alphabetized Reference
- sendmail, 31.10. Alphabetized Reference
- sendmail, D.1. Sun Enhancements
- overriding
: sendmail, 31.10. Alphabetized Reference
- k option
: (see ConnectionCacheSize (k) option)
- K option
: (see ConnectionCacheTimeout (K) option)
- KarlBridge package
: Building Internet Firewalls, B.3.3. KarlBridge
- Karn, Phil
: Practical UNIX & Internet Security, 6.6.2. des: The Data Encryption Standard
- keepalives
- TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
- TCP/IP Network Administration, B.8.5. The bgp Statement
- Kerberos authentication system
- Building Internet Firewalls, 2.12. Network File Systems
- Building Internet Firewalls, 10.4.1. Kerberos
- Building Internet Firewalls, B.1.2. Kerberos
- Practical UNIX & Internet Security, 8.7.3. Code Books
- Practical UNIX & Internet Security, 19.6. Kerberos
- Practical UNIX & Internet Security, 19.6.5. Kerberos Limitations
- Practical UNIX & Internet Security, E.4.5. Kerberos
- installing
: Practical UNIX & Internet Security, 19.6.3. Installing Kerberos
- RPC system and
: Practical UNIX & Internet Security, 19.2.2.4. AUTH_KERB
- supporting versions of POP
: Building Internet Firewalls, 8.1.2. Post Office Protocol
- Versions 4 and 5
: Practical UNIX & Internet Security, 19.6.1.4. Kerberos 4 vs. Kerberos 5
- versus Secure RPC
: Practical UNIX & Internet Security, 19.6.2. Kerberos vs. Secure RPC
- kermit program
- Practical UNIX & Internet Security, 14.5. Modems and UNIX
- Practical UNIX & Internet Security, 14.5.3.3. Privilege testing
- kernel
- Practical UNIX & Internet Security, 1.2. What Is an Operating System?
- Practical UNIX & Internet Security, 5.5.3. SUID Shell Scripts
- TCP/IP Network Administration, 5.1. Kernel Configuration
- reconfiguring
: Building Internet Firewalls, 5.8.4.1. Reconfigure and rebuild the kernel
- statement (in gated)
: TCP/IP Network Administration, B.8.10.1. The routerdiscovery client statement
- key
- distribution, encryption
: Building Internet Firewalls, 10.5.4. Key Distribution
- escrow
: Practical UNIX & Internet Security, 6.1.3. Modern Controversy
- fingerprints
: Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
- search
- Practical UNIX & Internet Security, 6.2.3. Cryptographic Strength
- Practical UNIX & Internet Security, 8.6.1. The crypt()
- switches
: Practical UNIX & Internet Security, 12.3.6. Key Switches
- keyboard interrupts
: TCP/IP Network Administration, 9.1.3.2. The vfstab and fstab files
- keyed databases
: (see databases)
- keylogin program
- Practical UNIX & Internet Security, 19.3.3. Using Secure RPC
- Practical UNIX & Internet Security, 19.5.4. Using NIS+
- keylogout program
: Practical UNIX & Internet Security, 19.3.3. Using Secure RPC
- keys, duplicate database
: sendmail, 33.2.1.1. -d allow duplicate keys
- keyserv process
- Practical UNIX & Internet Security, 19.3.1.1. Proving your identity
- Practical UNIX & Internet Security, 19.3.2.3. Making sure Secure RPC programs are running on every
- Practical UNIX & Internet Security, 19.5.4. Using NIS+
- keystore file
: Practical UNIX & Internet Security, 19.3.1.1. Proving your identity
- keystrokes
- monitoring
- Practical UNIX & Internet Security, 17.3.21.2. X security
- Practical UNIX & Internet Security, 24.2.3. Monitoring the Intruder
- (see also sniffing)
- time between
- Building Internet Firewalls, 10.2.1. Something You Are
- Practical UNIX & Internet Security, 23.8. Picking a Random Seed
- keyword search
: Building Internet Firewalls, 2.6. Other Information Services
- "Keywords:" header line
: sendmail, 35.10. Alphabetized Reference
- kill command
- Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
- Practical UNIX & Internet Security, 24.2.5. Getting Rid of the Intruder
- Practical UNIX & Internet Security, C.4. The kill Command
- to stop process overload
- Practical UNIX & Internet Security, 25.2.1.1. Too many processes
- Practical UNIX & Internet Security, 25.2.1.2. System overload attacks
- killing sendmail daemon
- sendmail, 4.1.1.1. Kill and restart, beginning with V8.7
- sendmail, 15.5. Prevent the Daemon from Running
- kinit program
: Practical UNIX & Internet Security, 19.6.4. Using Kerberos
- kmem device
- Practical UNIX & Internet Security, 5.6. Device Files
- Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
- known text attacks
: Practical UNIX & Internet Security, 6.2.3. Cryptographic Strength
- Koblas, David
: Practical UNIX & Internet Security, 22.4. SOCKS
- Koblas, Michelle
: Practical UNIX & Internet Security, 22.4. SOCKS
- KPOP (Kerberos-supporting Post Office Protocol)
: Building Internet Firewalls, 8.1.2. Post Office Protocol
- ksh (Korn shell)
- Practical UNIX & Internet Security, 11.5.1. Shell Features
- Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
- Practical UNIX & Internet Security, C.5.3. Running the User's Shell
- (see also shells)
- history file
: Practical UNIX & Internet Security, 10.4.1. Shell History
- restricted shell
: Practical UNIX & Internet Security, 8.1.4.3. Restricted Korn shell
- TMOUT variable
: Practical UNIX & Internet Security, 12.3.5.1. Built-in shell autologout
- umask and
: Practical UNIX & Internet Security, 5.3.1. The umask Command
- ksh93 shell
- Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
- .kshrc file
: Practical UNIX & Internet Security, 11.5.2.2. .cshrc, .kshrc
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
O'Reilly & Associates, Inc.
All Rights Reserved.
|