Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: U
- u flag
: sendmail, 30.8. Alphabetized F= Flags
- U flag
: sendmail, 30.8. Alphabetized F= Flags
- U line (host status file)
: sendmail, B.1. Status file lines
- $u macro
- sendmail, 6.3. The local Delivery Agent
- sendmail, 7.3. Predefined Macros
- sendmail, 31.10. Alphabetized Reference
- $U macro
: sendmail, 31.10. Alphabetized Reference
- u option
: (see DefaultUser (u,g) option)
- U option
: (see UserDatabaseSpec (U) option)
- -U switch (sendmail)
: sendmail, 36.7. Alphabetized Reference
- U= equate
- sendmail, 30.3.1. Tuning Without an Appropriate Keyword
- sendmail, 30.4. The Equates
- sendmail, 30.8. Alphabetized F= Flags
- UDB_DEFAULT_SPEC macro
: sendmail, 18.8. Alphabetized Reference
- UDP (User Datagram Protocol)
- Building Internet Firewalls, 6.3.3.2. UDP
- Building Internet Firewalls, C.6.1. User Datagram Protocol
- Practical UNIX & Internet Security, 16.2.4.3. UDP
- Practical UNIX & Internet Security, 17.1.3. The /etc/inetd Program
- TCP/IP Network Administration, 1.2. A Data Communications Model
- TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
- TCP/IP Network Administration, 1.6. Transport Layer
- (see also network services)
- checksum errors in
: TCP/IP Network Administration, 5.3.1.1. Options
- packet relayer
- Building Internet Firewalls, 7.6. Using SOCKS for
- Building Internet Firewalls, B.4.3. UDP Packet Relayer
- Practical UNIX & Internet Security, E.4.15. UDP Packet Relayer
- ufsdump
: (see dump/restore program)
- UIDs (user identifiers)
- Practical UNIX & Internet Security, 4.1. Users and Groups
- Practical UNIX & Internet Security, 4.1.2. Multiple Accounts with the Same UID
- TCP/IP Network Administration, 5.4. The Internet Daemon
- assume specified
: sendmail, 30.8. Alphabetized F= Flags
- real versus effective
- Practical UNIX & Internet Security, 4.3.1. Real and Effective UIDs
- Practical UNIX & Internet Security, C.1.3.2. Process real and effective UID
- RPC requests and
: Practical UNIX & Internet Security, 19.2.2.2. AUTH_UNIX
- running agent as
: sendmail, 30.4. The Equates
- su command and
: Practical UNIX & Internet Security, 10.1.2.1. su commandutmp and wtmp files andsu
- of web servers
: Practical UNIX & Internet Security, 18.2.1. The Server's UID
- zero
: (see root account/user; superusers)
- UK Defense Research Agency
: Practical UNIX & Internet Security, F.3.4.37. UK Defense Research Agency
- ulimit command
: Practical UNIX & Internet Security, 25.2.5. Soft Process Limits: Preventing Accidental Denial
- Ultrix
: Practical UNIX & Internet Security, 1.3. History of UNIX
- trusted path
: Practical UNIX & Internet Security, 8.5.3.1. Trusted path
- UUCP
: Practical UNIX & Internet Security, 15.4.1.3. Format of USERFILE entry without system name
- umask
- Practical UNIX & Internet Security, 5.3. The umask
- Practical UNIX & Internet Security, 5.3.2. Common umask Values
- Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts
- umount command
: TCP/IP Network Administration, 9.1.3.1. The mount command
- uname system call
: sendmail, 18.8. Alphabetized Reference
- unattended terminals
- Practical UNIX & Internet Security, 12.3.5. Unattended Terminals
- Practical UNIX & Internet Security, 12.3.5.2. X screen savers
- unauthenticated users
: TCP/IP Network Administration, 9.1.5. NFS Authentication Server
- unavailable resource error
: sendmail, 36.5.9. EX_UNAVAILABLE A Resource
- "Unbalanced" warning
: sendmail, 28.1.2. Rules Are Treated Like Addresses
- undeliverable addresses in aliases
: sendmail, 4.1.4. Verify Mode (-bv)
- undivert command (m4)
: sendmail, 19.1.4. m4 diversions
- unexpected, dealing with the
: TCP/IP Network Administration, 11. Troubleshooting TCP/IP
- unicasting
- Building Internet Firewalls, 8.9.3. The Multicast Backbone (MBONE)
- TCP/IP Network Administration, 2.2.2.1. Final notes on IP addresses
- (see also addresses)
- unidirectional connections
: Building Internet Firewalls, 7.4.2. Unidirectional Versus Multidirectional
- uniformity
: sendmail, 18.2. Vendor Versus Compiling
- uninterruptable power supply (UPS)
- Practical UNIX & Internet Security, 2.2. Risk Assessment
- Practical UNIX & Internet Security, 12.2.1.1. Fire
- United States Department of Energy
: Practical UNIX & Internet Security, F.3.4.12. France
- United States Department of the Navy
: Practical UNIX & Internet Security, F.3.4.44. U.S. Department of the Navy
- United States law
: (see laws)
- United States Naval Research Laboratory (NRL)
: TCP/IP Network Administration, 12.2.4. OPIE
- United States Secret Service
- Practical UNIX & Internet Security, 26.2.2. Federal Jurisdiction
- Practical UNIX & Internet Security, F.3.3. U.S. Secret Service
- Unisys
: Practical UNIX & Internet Security, F.3.4.39. Unisys
- universal participation
: Building Internet Firewalls, 3.6. Universal Participation
- universal resource locators (URLs)
: TCP/IP Network Administration, 13.1. The World Wide Web
- universes
: Practical UNIX & Internet Security, 5.9.1. Dual Universes
- UNIX
- Building Internet Firewalls, 5.3.1. What Operating System?
- Practical UNIX & Internet Security, 1. Introduction
- add-on functionality of
: Practical UNIX & Internet Security, 1.4.3. Add-On Functionality Breeds Problems
- checksum programs
- Building Internet Firewalls, 5.8.5.3. About checksums for auditing
- (see also checksums)
- computers
: TCP/IP Network Administration, Audience
- conventional passwords
: Practical UNIX & Internet Security, 3.2.6. Conventional UNIX Passwords
- DAC (Discretionary Access Controls)
: Practical UNIX & Internet Security, 4.1.3. Groups and Group Identifiers (GIDs)
- DNS under
: Practical UNIX & Internet Security, 16.2.6.1. DNS under UNIX
- encryption programs for
- Practical UNIX & Internet Security, 6.6. Encryption Programs Available for UNIX
- Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
- error numbers
: sendmail, B.1. Status file lines
- exit status
: sendmail, B.1. Status file lines
- filesystem
- Practical UNIX & Internet Security, 5. The UNIX Filesystem
- Practical UNIX & Internet Security, 5.10. Summary
- history of
: Practical UNIX & Internet Security, 1.3. History of UNIX
- kernels
: TCP/IP Network Administration, 4.2.2. Defining the Subnet Mask
- mailbox file
: sendmail, 3.2.1. Delivery to a Mailbox
- modems and
- Practical UNIX & Internet Security, 14.5. Modems and UNIX
- Practical UNIX & Internet Security, 14.5.3.3. Privilege testing
- networking and
: Practical UNIX & Internet Security, 16.1.2. Networking and UNIX
- primary network services
- Practical UNIX & Internet Security, 17.3. Primary UNIX Network Services
- Practical UNIX & Internet Security, 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
- process scheduler
- Practical UNIX & Internet Security, C.1.3.3. Process priority and niceness
- (see also processes)
- programming references
: Practical UNIX & Internet Security, D.1.11. UNIX Programming and System Administration
- published resources for
: Practical UNIX & Internet Security, D.1. UNIX Security References
- security and
- Building Internet Firewalls, A.3.4. BugTraq
- Practical UNIX & Internet Security, 1.4. Security and UNIX
- Practical UNIX & Internet Security, 1.4.3. Add-On Functionality Breeds Problems
- services
: TCP/IP Network Administration, 2.7.2. Port Numbers
- signals
: Practical UNIX & Internet Security, C.3. Signals
- starting up
- Practical UNIX & Internet Security, C.5. Starting Up UNIX and Logging In
- Practical UNIX & Internet Security, C.5.3. Running the User's Shell
- systems
- TCP/IP Network Administration, Foreword from the First Edition
- TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
- TCP/IP Network Administration, 7.4.1. Routing Information Protocol
- TCP/IP Network Administration, 7.5.3. Choosing a Routing Protocol
- installation scripts for
: TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- vendor, for security information
: TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
- versions of
- Practical UNIX & Internet Security, 1.3. History of UNIX
- TCP/IP Network Administration, 3.2. The Host Table
- TCP/IP Network Administration, 6.1. The ifconfig Command
- viruses
: (see viruses)
- web server on
: Practical UNIX & Internet Security, 18.2. Running a Secure Server
- window system
: Building Internet Firewalls, 2.13. Window Systems
- UNIX commands
- ability to use
: TCP/IP Network Administration, 9.1. The Network File System
- r-commands
- TCP/IP Network Administration, 9.6. Managing Distributed Servers
- TCP/IP Network Administration, 12.2.5. Secure the r Commands
- disabling
: TCP/IP Network Administration, 12.2.6. Secure Shell
- tar
: TCP/IP Network Administration, 9.7.1. POP Server
- untar
: TCP/IP Network Administration, 9.7.2. IMAP Server
- UnixFromLine option
- sendmail, 31.10. Alphabetized Reference
- sendmail, 34.8. Alphabetized Reference
- "unknown control line" message
: sendmail, 5.1. Overview
- unknown host error message
- TCP/IP Network Administration, 11.3. Testing Basic Connectivity
- TCP/IP Network Administration, 11.6. Checking Name Service
- "Unknown host status version" message
: sendmail, B.1. Status file lines
- unknown local users
: sendmail, 31.10. Alphabetized Reference
- "unknown mailer" error
: sendmail, 29.6. Rule Set 0
- unlinked files
: Practical UNIX & Internet Security, 25.2.2.7. Hidden space
- unowned files
: Practical UNIX & Internet Security, 24.4.1.8. Unowned files
- unpacking source code
- sendmail, 2.1. Get the Source
- sendmail, 18.3.1. What's Where in the Source
- unplugging connections
: Practical UNIX & Internet Security, 24.2.5. Getting Rid of the Intruder
- unpredictability of randomness
: Practical UNIX & Internet Security, 23.6. Tips on Generating Random Numbers
- unqualified
- addresses
: sendmail, 16.5. Qualify All Addresses?
- names
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 31.10. Alphabetized Reference
- unquoted whitespace
: sendmail, 13.2.8. The Unquoted Space Replacement Character
- unreachable destinations, detecting
: TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
- Unreachable Port message
: TCP/IP Network Administration, 11.5.2. Tracing Routes
- UnsafeGroupWrites option
: sendmail, 34.8. Alphabetized Reference
- unused accounts
- removing from system
: TCP/IP Network Administration, 12.2.2. Choosing a Password
- security problems with
: TCP/IP Network Administration, 12.2.1. The Shadow Password File
- UPDATE messages
: TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
- updating
: TCP/IP Network Administration, 7.5.1. Exterior Gateway Protocol
- updating aliases file
: sendmail, 4.1.3. Rebuild Aliases Mode (-bi)
- upgrades, logging
: Practical UNIX & Internet Security, 10.7.2.1. Exception and activity reports
- upgrading sendmail
: sendmail, 18.2. Vendor Versus Compiling
- uploading programs on HTTP server
: Building Internet Firewalls, 8.6.3.1. What can a malicious client do to
- uploading stored information
: Practical UNIX & Internet Security, 12.3.4. Protecting Local Storage
- UPS (uninterruptable power supply)
- Practical UNIX & Internet Security, 2.2. Risk Assessment
- Practical UNIX & Internet Security, 12.2.1.1. Fire
- uptime command
: Practical UNIX & Internet Security, 8.1.3. Accounts That Run a Single Command
- urandom device
: Practical UNIX & Internet Security, 23.7.4. Other random number generators
- URLs (universal resource locators)
- Building Internet Firewalls, 8.6. World Wide Web (WWW) and HTTP
- TCP/IP Network Administration, 13.1. The World Wide Web
- U.S. Department of Energy
: Practical UNIX & Internet Security, F.3.4.12. France
- U.S. Department of the Navy
: Practical UNIX & Internet Security, F.3.4.44. U.S. Department of the Navy
- U.S. law
: (see laws)
- U.S. Naval Research Laboratory (NRL)
: TCP/IP Network Administration, 12.2.4. OPIE
- U.S. Secret Service
- Practical UNIX & Internet Security, 26.2.2. Federal Jurisdiction
- Practical UNIX & Internet Security, F.3.3. U.S. Secret Service
- usage profile
: Building Internet Firewalls, 5.9.1. Learn What the Normal Usage Profile Is
- use_ct_file feature
: sendmail, 19.6. Alphabetized m4 Macros
- use_cw_file feature
: sendmail, 19.6. Alphabetized m4 Macros
- UseErrorsTo (l) option
: sendmail, 34.8. Alphabetized Reference
- Usenet news
- Practical UNIX & Internet Security, 17.3.13. Network News Transport Protocol (NNTP) (TCP Port
- Practical UNIX & Internet Security, E.2. Usenet Groups
- TCP/IP Network Administration, 13.5.1. Newsgroups
- TCP/IP Network Administration, E.3.5. MAILER
- (see also NNTP)
- cleanup scripts
: Practical UNIX & Internet Security, 11.5.3. Abusing Automatic Mechanisms
- encryption for
: (see ROT13 algorithm)
- newsgroups
- Building Internet Firewalls, 2.4. Usenet News
- TCP/IP Network Administration, 13.5.1. Newsgroups
- defamation/harassment via
: Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
- keeping current
: Building Internet Firewalls, 12.3.1.2. Newsgroups
- for security information
: TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
- security resources via
: Building Internet Firewalls, A.4. Newsgroups
- using
- TCP/IP Network Administration, 4.1.1. Network Contacts
- TCP/IP Network Administration, 13.5.1. Newsgroups
- posting breakins to
: Practical UNIX & Internet Security, 24.6. Resuming Operation
- reporting security holes on
: Practical UNIX & Internet Security, 2.5.1. Going Public
- USENIX Association
: Building Internet Firewalls, A.6.1. USENIX Association
- user accounts on bastion host
: Building Internet Firewalls, 5.7. Don't Allow User Accounts on the
- user authentication
- TCP/IP Network Administration, 9.3.2. NIS+
- TCP/IP Network Administration, 12.2. User Authentication
- User Database
- sendmail, 18.8. Alphabetized Reference
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 33.5. The User Database
- sendmail, 33.8. Alphabetized Reference
- sendmail, 34.8. Alphabetized Reference
- rewrite
: sendmail, 30.8. Alphabetized F= Flags
- user database class
: sendmail, 33.8. Alphabetized Reference
- User Datagram Protocol (UDP)
- Building Internet Firewalls, 6.3.3.2. UDP
- Building Internet Firewalls, C.6.1. User Datagram Protocol
- Practical UNIX & Internet Security, 16.2.4.3. UDP
- Practical UNIX & Internet Security, 17.1.3. The /etc/inetd Program
- TCP/IP Network Administration, 1.2. A Data Communications Model
- TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
- TCP/IP Network Administration, 1.6. Transport Layer
- (see also network services)
- checksum errors in
: TCP/IP Network Administration, 5.3.1.1. Options
- packet relayer
- Building Internet Firewalls, 7.6. Using SOCKS for
- Building Internet Firewalls, B.4.3. UDP Packet Relayer
- Practical UNIX & Internet Security, E.4.15. UDP Packet Relayer
- user IDs
: (see UIDs)
- "User unknown" message
: sendmail, 4.2. Verbose (-v)
- UserDatabaseSpec (U) option
- sendmail, 18.8. Alphabetized Reference
- sendmail, 34.8. Alphabetized Reference
- userdb database class
: sendmail, 33.8. Alphabetized Reference
- USERDB macro
: sendmail, 18.8. Alphabetized Reference
- USERFILE file (UUCP)
- Practical UNIX & Internet Security, 15.4.1. USERFILE: Providing Remote File Access
- Practical UNIX & Internet Security, 15.4.2.1. Some bad examples
- usermod command
- Practical UNIX & Internet Security, 8.3. Restricting Logins
- Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts
- usernames
: Practical UNIX & Internet Security, 3.1. Usernames
- aliases for
: Practical UNIX & Internet Security, 8.8.9. Account Names Revisited: Using Aliases for Increased
- capitalization
: sendmail, 30.8. Alphabetized F= Flags
- doubling as passwords (Joes)
: Practical UNIX & Internet Security, 3.6.2. Smoking Joes
- last command and
: Practical UNIX & Internet Security, 10.1.3. last Program
- as passwords
: Practical UNIX & Internet Security, 8.8.3.1. Joetest: a simple password cracker
- recipient's
: (see $u macro)
- special
- Practical UNIX & Internet Security, 4.2. Special Usernames
- Practical UNIX & Internet Security, 4.2.3. Impact of the /etc/passwd and /etc/group
- using someone else's
- Practical UNIX & Internet Security, 4.3. su: Changing Who You Claim to Be
- Practical UNIX & Internet Security, 4.3.8. Other Uses of su
- users
- Practical UNIX & Internet Security, 4. Users, Groups, and the Superuser
- Practical UNIX & Internet Security, 4.1. Users and Groups
- Practical UNIX & Internet Security, 4.1.2. Multiple Accounts with the Same UID
- (see also groups; su command)
- $: operator and
- sendmail, 9.2.3. The User ($:)
- sendmail, 9.3. Testing Rule Set 0
- sendmail, 29.6.1. Further Processing: $:user
- sendmail, 30.5.3. The $: Part
- sendmail, 33.4.1. Specify a Default with $:
- alias delivery to
: sendmail, 24.2.1. Delivery to Users
- assigning passwords to
: Practical UNIX & Internet Security, 8.8.1. Assigning Passwords to Users
- auditing who is logged in
- Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
- Practical UNIX & Internet Security, 10.1.2.1. su commandutmp and wtmp files andsu
- authentication for Web
: Practical UNIX & Internet Security, 18.3.3. Setting Up Web Users and Passwords
- checklist for
: Practical UNIX & Internet Security, A.1.1.2. Chapter 3: Users and Passwords
- dormant accounts and
- Practical UNIX & Internet Security, 8.4. Managing Dormant Accounts
- Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts
- errors by
: Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
- .forward file
: sendmail, 22.5.3. Permissions for ~/.forward Files
- groups
: sendmail, 18.8. Alphabetized Reference
- identities of
: (see also UIDs)
- default
- sendmail, 13.2.5. The Default User Identities
- sendmail, 22.8.3.1. The DefaultUser option
- sendmail, 34.8. Alphabetized Reference
- proving
: Practical UNIX & Internet Security, 19.3.1.1. Proving your identity
- recognizing as intruders
- Practical UNIX & Internet Security, 24.2. Discovering an Intruder
- Practical UNIX & Internet Security, 24.2.6. Anatomy of a Break-in
- taking someone else's
- Practical UNIX & Internet Security, 4.3. su: Changing Who You Claim to Be
- Practical UNIX & Internet Security, 4.3.8. Other Uses of su
- importing to NIS server
- Practical UNIX & Internet Security, 19.4.1. Including or excluding specific accounts:
- Practical UNIX & Internet Security, 19.4.4.2. Using netgroups to limit the importing of accounts
- including oneself on mailing lists
: sendmail, 34.8. Alphabetized Reference
- letting in threats
: Practical UNIX & Internet Security, 11.4. Entry
- as LHS of alias
: sendmail, 30.8. Alphabetized F= Flags
- limited
: Practical UNIX & Internet Security, 8.1.5.1. Limited users
- local
: sendmail, 31.10. Alphabetized Reference
- accepting mail from only
: sendmail, 20.2.1. Accept Mail Only From Our Domain
- delivery to
- sendmail, 3.2. Role in Local Delivery
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 29.6.3. Delivering to Local Recipient
- sendmail, 30.8. Alphabetized F= Flags
- logging
- Practical UNIX & Internet Security, 10.4. Per-User Trails in the Filesystem
- Practical UNIX & Internet Security, 10.4.3. Network Setup
- mailing list instructions for
: sendmail, 25.5.4. Users Ignore list-request
- marked with +
: sendmail, 24.4.3. Plussed Users
- NIS passwords for
: Practical UNIX & Internet Security, 19.3.2.1. Creating passwords for users
- nobody (Secure RPC)
: Practical UNIX & Internet Security, 19.3.2.1. Creating passwords for users
- notifying about monitoring
: Practical UNIX & Internet Security, 26.2.6. Other Tips
- passwords
: (see passwd file; passwords)
- recipient of bounced mail
: (see $n macro)
- restricting certain
: Practical UNIX & Internet Security, 18.3. Controlling Access to Files on Your Server
- root
: (see root account/user; superusers)
- running sendmail manually
: sendmail, 1.4. Run sendmail by Hand
- security responsibilities
: TCP/IP Network Administration, 12.1.3. Writing a Security Policy
- semiprivileged
: sendmail, 22.5. Permissions
- sending messages to
: Practical UNIX & Internet Security, 10.5.1. The syslog.conf Configuration File
- summarizing system usage by
: Practical UNIX & Internet Security, 25.2.2.2. quot command
- tainting
: Practical UNIX & Internet Security, 18.2.3.4. Tainting with Perl
- training
: Practical UNIX & Internet Security, 13.2.1. Initial Training
- trusted
- sendmail, 5.3.10. Trusted Users
- sendmail, 14.6. Trusted User
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 22.8.1. Trusted Users
- sendmail, 32.5. Alphabetized Reference
- unattended terminals
- Practical UNIX & Internet Security, 12.3.5. Unattended Terminals
- Practical UNIX & Internet Security, 12.3.5.2. X screen savers
- unavailable
: (see undeliverable addresses in aliases)
- USERFILE entries for
: Practical UNIX & Internet Security, 15.4.1.2. USERFILE entries for local users
- verifying with SMTP
: sendmail, 22.3.2. SMTP vrfy and expn
- www
: Practical UNIX & Internet Security, 18.2.2. Understand Your Server's Directory Structure
- users command
- Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
- Practical UNIX & Internet Security, 24.2.1. Catching One in the Act
- USESETEUID macro
: sendmail, 18.8. Alphabetized Reference
- USG (UNIX Support Group)
: Practical UNIX & Internet Security, 1.3. History of UNIX
- /usr directory
- Practical UNIX & Internet Security, 4.3.7. The Bad su Log
- (see also /var directory)
- /usr/adm directory
: Practical UNIX & Internet Security, 11.5.3.6. Other files
- /usr/adm/messages file, in security checks
- Practical UNIX & Internet Security, 10.2.3. messages Log File
- TCP/IP Network Administration, 12.4.2.2. Checking login activity
- /usr/adm/lastlog file
: Practical UNIX & Internet Security, 10.1.1. lastlog File
- /usr/bin directory
- Practical UNIX & Internet Security, 11.1.5. Viruses
- Practical UNIX & Internet Security, 11.5.1.1. PATH attacks
- backing up
: Practical UNIX & Internet Security, 7.1.2. What Should You Back Up?
- /usr/bin/uudecode
: (see uudecode program)
- /usr/etc/bootpd file
: TCP/IP Network Administration, 9.6.1. rdist
- /usr/etc/yp/makedbm program
: Practical UNIX & Internet Security, 19.4.4.1. Setting up netgroups
- /usr/lib directory
: Practical UNIX & Internet Security, 11.5.3.6. Other files
- in restricted filesystems
: Practical UNIX & Internet Security, 8.1.5. Restricted Filesystem
- /usr/lib/aliases file
: Practical UNIX & Internet Security, 11.5.3.3. /usr/lib/aliases, /etc/aliases,
- /usr/lib/preserve program
: Practical UNIX & Internet Security, 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve
- /usr/lib/sendmail
: (see sendmail)
- /usr/lib/uucp directory
- Practical UNIX & Internet Security, 15.4.2.1. Some bad examples
- Practical UNIX & Internet Security, 15.5.2. Permissions Commands
- /usr/lib/uucp/Devices file
: Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
- /usr/lib/uucp/L-devices file
: Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
- /usr/lib/uucp/L.cmds file
: (see L.cmds file)
- /usr/lib/uucp/L.sys file
: Practical UNIX & Internet Security, 15.3.3. Security of L.sys and Systems Files
- /usr/lib/uucp/Permissions file
: (see Permissions file)
- /usr/lib/uucp/Systems file
: Practical UNIX & Internet Security, 15.3.3. Security of L.sys and Systems Files
- /usr/lib/uucp/USERFILE file
- Practical UNIX & Internet Security, 15.4.1. USERFILE: Providing Remote File Access
- Practical UNIX & Internet Security, 15.4.2.1. Some bad examples
- /usr/local/bin directory
- Practical UNIX & Internet Security, 1.1. What Is Computer Security?
- Practical UNIX & Internet Security, 11.5.1.1. PATH attacks
- /usr/local/etc/http/logs directory
: Practical UNIX & Internet Security, 10.3.5. access_log Log File
- /usr/local/lib directory
: Practical UNIX & Internet Security, 11.5.3.6. Other files
- /usr/sbin/imapd file
: TCP/IP Network Administration, 9.7.2. IMAP Server
- /usr/sbin/rexecd
: (see rexec service)
- /usr/spool/cron/crontabs directory
: Practical UNIX & Internet Security, 15.6.2. Automatic Execution of Cleanup Scripts
- /usr/spool/uucp directory
: Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work
- /usr/spool/uucppublic
: (see uucppublic directory)
- /usr/src/linux source directory
: TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- /usr/src/sys/i386/conf directory
: TCP/IP Network Administration, 5.3. The BSD Kernel Configuration File
- /usr/tmp directory
: sendmail, 18.8. Alphabetized Reference
- /usr/tmp/gated_dump file
: TCP/IP Network Administration, B.1.1. Signal Processing
- /usr/ucb directory
: Practical UNIX & Internet Security, 11.1.5. Viruses
- usrerr()
: sendmail, 20.2.1. Accept Mail Only From Our Domain
- USRX command, in ESMTP
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- utility programs
: Practical UNIX & Internet Security, 1.2. What Is an Operating System?
- utimes commandn
: Practical UNIX & Internet Security, 24.5.1. Never Trust Anything Except Hardcopy
- utmp file
- Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
- Practical UNIX & Internet Security, 10.1.2.1. su commandutmp and wtmp files andsu
- Practical UNIX & Internet Security, 24.2.1. Catching One in the Act
- Practical UNIX & Internet Security, 24.2.4. Tracing a Connection
- uucheck program
: Practical UNIX & Internet Security, 15.5.3. uucheck: Checking Your Permissions File
- uucico program
- Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work
- Practical UNIX & Internet Security, 15.3. UUCP and Security
- Practical UNIX & Internet Security, 15.5.1.1. Starting up
- UUCP (UNIX-to-UNIX Copy Protocol)
- Building Internet Firewalls, 2.2. File Transfer
- Practical UNIX & Internet Security, 4.1.2. Multiple Accounts with the Same UID
- Practical UNIX & Internet Security, 14.5. Modems and UNIX
- Practical UNIX & Internet Security, 15. UUCP
- Practical UNIX & Internet Security, 15.1.1. uucp Command
- Practical UNIX & Internet Security, 15.9. Summary
- Practical UNIX & Internet Security, 17.3.20. UUCP over TCP (TCP Port 540)
- sendmail, 3.3.2. UUCP
- sendmail, 8.1.4. UUCP and Host Paths
- sendmail, 19.6. Alphabetized m4 Macros
- TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
- TCP/IP Network Administration, 5.4. The Internet Daemon
- TCP/IP Network Administration, 10.5.8. Defining Mailers
- additional logins
: Practical UNIX & Internet Security, 15.3.1. Assigning Additional UUCP Logins
- addresses
- sendmail, 17.1.4. UUCP Addresses
- sendmail, 17.4. Rule Set 4
- bang syntax
: TCP/IP Network Administration, 10.7.1. Modifying Local Information
- BNU
- Practical UNIX & Internet Security, 15.2. Versions of UUCP
- Practical UNIX & Internet Security, 15.5. Security in BNU UUCP
- Practical UNIX & Internet Security, 15.5.3. uucheck: Checking Your Permissions File
- checklist for
: Practical UNIX & Internet Security, A.1.1.14. Chapter 15: UUCP
- cleanup scripts
- Practical UNIX & Internet Security, 11.5.3. Abusing Automatic Mechanisms
- Practical UNIX & Internet Security, 15.6.2. Automatic Execution of Cleanup Scripts
- configuring
: Building Internet Firewalls, 8.2.4. UNIX-to-UNIX
- early security problems
: Practical UNIX & Internet Security, 15.7. Early Security Problems with UUCP
- eliminating support of
: sendmail, 19.6. Alphabetized m4 Macros
- HoneyDanBer (HDB)
: Practical UNIX & Internet Security, 15.2. Versions of UUCP
- $k macro
: sendmail, 31.10. Alphabetized Reference
- local handling of
: sendmail, 29.6.5. Handling UUCP Locally
- logging
: Practical UNIX & Internet Security, 10.3.4. uucp Log Files
- m4 configuration options
: sendmail, 19.4.6. UUCP
- macros for repays
: sendmail, 31.10. Alphabetized Reference
- mail forwarding
: Practical UNIX & Internet Security, 15.6.1. Mail Forwarding for UUCP
- naming computer
: Practical UNIX & Internet Security, 15.5.2. Permissions Commands
- over networks
: Practical UNIX & Internet Security, 15.8. UUCP Over Networks
- NFS server and
: Practical UNIX & Internet Security, 15.3. UUCP and Security
- passwords for
: Practical UNIX & Internet Security, 15.3.2. Establishing UUCP Passwords
- sites, serving
- TCP/IP Network Administration, E.3. m4 sendmail Macros
- TCP/IP Network Administration, E.3.5. MAILER
- system connected with
: TCP/IP Network Administration, 10.5.3. The Define Class Command
- Taylor
: Practical UNIX & Internet Security, 15.2. Versions of UUCP
- over TCP
: Practical UNIX & Internet Security, 17.3.20. UUCP over TCP (TCP Port 540)
- Version 2
- Practical UNIX & Internet Security, 15.2. Versions of UUCP
- Practical UNIX & Internet Security, 15.4. Security in Version 2 UUCP
- Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution
- uucp (user)
- Practical UNIX & Internet Security, 4.1. Users and Groups
- Practical UNIX & Internet Security, 4.2.2. Other Special Users
- UUCP_RELAY macro (m4)
: sendmail, 19.6. Alphabetized m4 Macros
- UUCP-style lock files
- TCP/IP Network Administration, 6.3.4. PPP Daemon Security
- TCP/IP Network Administration, A.2. The PPP Daemon
- uucpa account
: Practical UNIX & Internet Security, 15.3.1. Assigning Additional UUCP Logins
- uucpd program
: Practical UNIX & Internet Security, 15.8. UUCP Over Networks
- uucpdomain feature
: sendmail, 19.6. Alphabetized m4 Macros
- uucppublic directory
- Practical UNIX & Internet Security, 15.1.1. uucp Command
- Practical UNIX & Internet Security, 15.4.1.3. Format of USERFILE entry without system name
- Practical UNIX & Internet Security, 15.5.2. Permissions Commands
- UUCPSMTP macro (m4)
: sendmail, 19.6. Alphabetized m4 Macros
- uudecode program
- Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
- sendmail, 22.6. The Aliases File
- uuencode program
- Practical UNIX & Internet Security, 6.6.1.2. Ways of improving the security of crypt
- sendmail, 22.6. The Aliases File
- uux command
- Practical UNIX & Internet Security, 15.1.2. uux Command
- Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work
- uuxqt program
: Practical UNIX & Internet Security, 15.4.1.3. Format of USERFILE entry without system name
- uuxqtcmds files
: Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
O'Reilly & Associates, Inc.
All Rights Reserved.
|