home | O'Reilly's CD bookshelfs | FreeBSD | Linux | Cisco | Cisco Exam  


Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: U

u flag : sendmail, 30.8. Alphabetized F= Flags
U flag : sendmail, 30.8. Alphabetized F= Flags
U line (host status file) : sendmail, B.1. Status file lines
$u macro
sendmail, 6.3. The local Delivery Agent
sendmail, 7.3. Predefined Macros
sendmail, 31.10. Alphabetized Reference
$U macro : sendmail, 31.10. Alphabetized Reference
u option : (see DefaultUser (u,g) option)
U option : (see UserDatabaseSpec (U) option)
-U switch (sendmail) : sendmail, 36.7. Alphabetized Reference
U= equate
sendmail, 30.3.1. Tuning Without an Appropriate Keyword
sendmail, 30.4. The Equates
sendmail, 30.8. Alphabetized F= Flags
UDB_DEFAULT_SPEC macro : sendmail, 18.8. Alphabetized Reference
UDP (User Datagram Protocol)
Building Internet Firewalls, 6.3.3.2. UDP
Building Internet Firewalls, C.6.1. User Datagram Protocol
Practical UNIX & Internet Security, 16.2.4.3. UDP
Practical UNIX & Internet Security, 17.1.3. The /etc/inetd Program
TCP/IP Network Administration, 1.2. A Data Communications Model
TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
TCP/IP Network Administration, 1.6. Transport Layer
(see also network services)
checksum errors in : TCP/IP Network Administration, 5.3.1.1. Options
packet relayer
Building Internet Firewalls, 7.6. Using SOCKS for
Building Internet Firewalls, B.4.3. UDP Packet Relayer
Practical UNIX & Internet Security, E.4.15. UDP Packet Relayer
ufsdump : (see dump/restore program)
UIDs (user identifiers)
Practical UNIX & Internet Security, 4.1. Users and Groups
Practical UNIX & Internet Security, 4.1.2. Multiple Accounts with the Same UID
TCP/IP Network Administration, 5.4. The Internet Daemon
assume specified : sendmail, 30.8. Alphabetized F= Flags
real versus effective
Practical UNIX & Internet Security, 4.3.1. Real and Effective UIDs
Practical UNIX & Internet Security, C.1.3.2. Process real and effective UID
RPC requests and : Practical UNIX & Internet Security, 19.2.2.2. AUTH_UNIX
running agent as : sendmail, 30.4. The Equates
su command and : Practical UNIX & Internet Security, 10.1.2.1. su commandutmp and wtmp files andsu
of web servers : Practical UNIX & Internet Security, 18.2.1. The Server's UID
zero : (see root account/user; superusers)
UK Defense Research Agency : Practical UNIX & Internet Security, F.3.4.37. UK Defense Research Agency
ulimit command : Practical UNIX & Internet Security, 25.2.5. Soft Process Limits: Preventing Accidental Denial
Ultrix : Practical UNIX & Internet Security, 1.3. History of UNIX
trusted path : Practical UNIX & Internet Security, 8.5.3.1. Trusted path
UUCP : Practical UNIX & Internet Security, 15.4.1.3. Format of USERFILE entry without system name
umask
Practical UNIX & Internet Security, 5.3. The umask
Practical UNIX & Internet Security, 5.3.2. Common umask Values
Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts
umount command : TCP/IP Network Administration, 9.1.3.1. The mount command
uname system call : sendmail, 18.8. Alphabetized Reference
unattended terminals
Practical UNIX & Internet Security, 12.3.5. Unattended Terminals
Practical UNIX & Internet Security, 12.3.5.2. X screen savers
unauthenticated users : TCP/IP Network Administration, 9.1.5. NFS Authentication Server
unavailable resource error : sendmail, 36.5.9. EX_UNAVAILABLE A Resource
"Unbalanced" warning : sendmail, 28.1.2. Rules Are Treated Like Addresses
undeliverable addresses in aliases : sendmail, 4.1.4. Verify Mode (-bv)
undivert command (m4) : sendmail, 19.1.4. m4 diversions
unexpected, dealing with the : TCP/IP Network Administration, 11. Troubleshooting TCP/IP
unicasting
Building Internet Firewalls, 8.9.3. The Multicast Backbone (MBONE)
TCP/IP Network Administration, 2.2.2.1. Final notes on IP addresses
(see also addresses)
unidirectional connections : Building Internet Firewalls, 7.4.2. Unidirectional Versus Multidirectional
uniformity : sendmail, 18.2. Vendor Versus Compiling
uninterruptable power supply (UPS)
Practical UNIX & Internet Security, 2.2. Risk Assessment
Practical UNIX & Internet Security, 12.2.1.1. Fire
United States Department of Energy : Practical UNIX & Internet Security, F.3.4.12. France
United States Department of the Navy : Practical UNIX & Internet Security, F.3.4.44. U.S. Department of the Navy
United States law : (see laws)
United States Naval Research Laboratory (NRL) : TCP/IP Network Administration, 12.2.4. OPIE
United States Secret Service
Practical UNIX & Internet Security, 26.2.2. Federal Jurisdiction
Practical UNIX & Internet Security, F.3.3. U.S. Secret Service
Unisys : Practical UNIX & Internet Security, F.3.4.39. Unisys
universal participation : Building Internet Firewalls, 3.6. Universal Participation
universal resource locators (URLs) : TCP/IP Network Administration, 13.1. The World Wide Web
universes : Practical UNIX & Internet Security, 5.9.1. Dual Universes
UNIX
Building Internet Firewalls, 5.3.1. What Operating System?
Practical UNIX & Internet Security, 1. Introduction
add-on functionality of : Practical UNIX & Internet Security, 1.4.3. Add-On Functionality Breeds Problems
checksum programs
Building Internet Firewalls, 5.8.5.3. About checksums for auditing
(see also checksums)
computers : TCP/IP Network Administration, Audience
conventional passwords : Practical UNIX & Internet Security, 3.2.6. Conventional UNIX Passwords
DAC (Discretionary Access Controls) : Practical UNIX & Internet Security, 4.1.3. Groups and Group Identifiers (GIDs)
DNS under : Practical UNIX & Internet Security, 16.2.6.1. DNS under UNIX
encryption programs for
Practical UNIX & Internet Security, 6.6. Encryption Programs Available for UNIX
Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
error numbers : sendmail, B.1. Status file lines
exit status : sendmail, B.1. Status file lines
filesystem
Practical UNIX & Internet Security, 5. The UNIX Filesystem
Practical UNIX & Internet Security, 5.10. Summary
history of : Practical UNIX & Internet Security, 1.3. History of UNIX
kernels : TCP/IP Network Administration, 4.2.2. Defining the Subnet Mask
mailbox file : sendmail, 3.2.1. Delivery to a Mailbox
modems and
Practical UNIX & Internet Security, 14.5. Modems and UNIX
Practical UNIX & Internet Security, 14.5.3.3. Privilege testing
networking and : Practical UNIX & Internet Security, 16.1.2. Networking and UNIX
primary network services
Practical UNIX & Internet Security, 17.3. Primary UNIX Network Services
Practical UNIX & Internet Security, 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
process scheduler
Practical UNIX & Internet Security, C.1.3.3. Process priority and niceness
(see also processes)
programming references : Practical UNIX & Internet Security, D.1.11. UNIX Programming and System Administration
published resources for : Practical UNIX & Internet Security, D.1. UNIX Security References
security and
Building Internet Firewalls, A.3.4. BugTraq
Practical UNIX & Internet Security, 1.4. Security and UNIX
Practical UNIX & Internet Security, 1.4.3. Add-On Functionality Breeds Problems
services : TCP/IP Network Administration, 2.7.2. Port Numbers
signals : Practical UNIX & Internet Security, C.3. Signals
starting up
Practical UNIX & Internet Security, C.5. Starting Up UNIX and Logging In
Practical UNIX & Internet Security, C.5.3. Running the User's Shell
systems
TCP/IP Network Administration, Foreword from the First Edition
TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
TCP/IP Network Administration, 7.4.1. Routing Information Protocol
TCP/IP Network Administration, 7.5.3. Choosing a Routing Protocol
installation scripts for : TCP/IP Network Administration, 6.1.1. Determining the Interface Name
vendor, for security information : TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
versions of
Practical UNIX & Internet Security, 1.3. History of UNIX
TCP/IP Network Administration, 3.2. The Host Table
TCP/IP Network Administration, 6.1. The ifconfig Command
viruses : (see viruses)
web server on : Practical UNIX & Internet Security, 18.2. Running a Secure Server
window system : Building Internet Firewalls, 2.13. Window Systems
UNIX commands
ability to use : TCP/IP Network Administration, 9.1. The Network File System
r-commands
TCP/IP Network Administration, 9.6. Managing Distributed Servers
TCP/IP Network Administration, 12.2.5. Secure the r Commands
disabling : TCP/IP Network Administration, 12.2.6. Secure Shell
tar : TCP/IP Network Administration, 9.7.1. POP Server
untar : TCP/IP Network Administration, 9.7.2. IMAP Server
UnixFromLine option
sendmail, 31.10. Alphabetized Reference
sendmail, 34.8. Alphabetized Reference
"unknown control line" message : sendmail, 5.1. Overview
unknown host error message
TCP/IP Network Administration, 11.3. Testing Basic Connectivity
TCP/IP Network Administration, 11.6. Checking Name Service
"Unknown host status version" message : sendmail, B.1. Status file lines
unknown local users : sendmail, 31.10. Alphabetized Reference
"unknown mailer" error : sendmail, 29.6. Rule Set 0
unlinked files : Practical UNIX & Internet Security, 25.2.2.7. Hidden space
unowned files : Practical UNIX & Internet Security, 24.4.1.8. Unowned files
unpacking source code
sendmail, 2.1. Get the Source
sendmail, 18.3.1. What's Where in the Source
unplugging connections : Practical UNIX & Internet Security, 24.2.5. Getting Rid of the Intruder
unpredictability of randomness : Practical UNIX & Internet Security, 23.6. Tips on Generating Random Numbers
unqualified
addresses : sendmail, 16.5. Qualify All Addresses?
names
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 31.10. Alphabetized Reference
unquoted whitespace : sendmail, 13.2.8. The Unquoted Space Replacement Character
unreachable destinations, detecting : TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
Unreachable Port message : TCP/IP Network Administration, 11.5.2. Tracing Routes
UnsafeGroupWrites option : sendmail, 34.8. Alphabetized Reference
unused accounts
removing from system : TCP/IP Network Administration, 12.2.2. Choosing a Password
security problems with : TCP/IP Network Administration, 12.2.1. The Shadow Password File
UPDATE messages : TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
updating : TCP/IP Network Administration, 7.5.1. Exterior Gateway Protocol
updating aliases file : sendmail, 4.1.3. Rebuild Aliases Mode (-bi)
upgrades, logging : Practical UNIX & Internet Security, 10.7.2.1. Exception and activity reports
upgrading sendmail : sendmail, 18.2. Vendor Versus Compiling
uploading programs on HTTP server : Building Internet Firewalls, 8.6.3.1. What can a malicious client do to
uploading stored information : Practical UNIX & Internet Security, 12.3.4. Protecting Local Storage
UPS (uninterruptable power supply)
Practical UNIX & Internet Security, 2.2. Risk Assessment
Practical UNIX & Internet Security, 12.2.1.1. Fire
uptime command : Practical UNIX & Internet Security, 8.1.3. Accounts That Run a Single Command
urandom device : Practical UNIX & Internet Security, 23.7.4. Other random number generators
URLs (universal resource locators)
Building Internet Firewalls, 8.6. World Wide Web (WWW) and HTTP
TCP/IP Network Administration, 13.1. The World Wide Web
U.S. Department of Energy : Practical UNIX & Internet Security, F.3.4.12. France
U.S. Department of the Navy : Practical UNIX & Internet Security, F.3.4.44. U.S. Department of the Navy
U.S. law : (see laws)
U.S. Naval Research Laboratory (NRL) : TCP/IP Network Administration, 12.2.4. OPIE
U.S. Secret Service
Practical UNIX & Internet Security, 26.2.2. Federal Jurisdiction
Practical UNIX & Internet Security, F.3.3. U.S. Secret Service
usage profile : Building Internet Firewalls, 5.9.1. Learn What the Normal Usage Profile Is
use_ct_file feature : sendmail, 19.6. Alphabetized m4 Macros
use_cw_file feature : sendmail, 19.6. Alphabetized m4 Macros
UseErrorsTo (l) option : sendmail, 34.8. Alphabetized Reference
Usenet news
Practical UNIX & Internet Security, 17.3.13. Network News Transport Protocol (NNTP) (TCP Port
Practical UNIX & Internet Security, E.2. Usenet Groups
TCP/IP Network Administration, 13.5.1. Newsgroups
TCP/IP Network Administration, E.3.5. MAILER
(see also NNTP)
cleanup scripts : Practical UNIX & Internet Security, 11.5.3. Abusing Automatic Mechanisms
encryption for : (see ROT13 algorithm)
newsgroups
Building Internet Firewalls, 2.4. Usenet News
TCP/IP Network Administration, 13.5.1. Newsgroups
defamation/harassment via : Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
keeping current : Building Internet Firewalls, 12.3.1.2. Newsgroups
for security information : TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
security resources via : Building Internet Firewalls, A.4. Newsgroups
using
TCP/IP Network Administration, 4.1.1. Network Contacts
TCP/IP Network Administration, 13.5.1. Newsgroups
posting breakins to : Practical UNIX & Internet Security, 24.6. Resuming Operation
reporting security holes on : Practical UNIX & Internet Security, 2.5.1. Going Public
USENIX Association : Building Internet Firewalls, A.6.1. USENIX Association
user accounts on bastion host : Building Internet Firewalls, 5.7. Don't Allow User Accounts on the
user authentication
TCP/IP Network Administration, 9.3.2. NIS+
TCP/IP Network Administration, 12.2. User Authentication
User Database
sendmail, 18.8. Alphabetized Reference
sendmail, 30.8. Alphabetized F= Flags
sendmail, 33.5. The User Database
sendmail, 33.8. Alphabetized Reference
sendmail, 34.8. Alphabetized Reference
rewrite : sendmail, 30.8. Alphabetized F= Flags
user database class : sendmail, 33.8. Alphabetized Reference
User Datagram Protocol (UDP)
Building Internet Firewalls, 6.3.3.2. UDP
Building Internet Firewalls, C.6.1. User Datagram Protocol
Practical UNIX & Internet Security, 16.2.4.3. UDP
Practical UNIX & Internet Security, 17.1.3. The /etc/inetd Program
TCP/IP Network Administration, 1.2. A Data Communications Model
TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
TCP/IP Network Administration, 1.6. Transport Layer
(see also network services)
checksum errors in : TCP/IP Network Administration, 5.3.1.1. Options
packet relayer
Building Internet Firewalls, 7.6. Using SOCKS for
Building Internet Firewalls, B.4.3. UDP Packet Relayer
Practical UNIX & Internet Security, E.4.15. UDP Packet Relayer
user IDs : (see UIDs)
"User unknown" message : sendmail, 4.2. Verbose (-v)
UserDatabaseSpec (U) option
sendmail, 18.8. Alphabetized Reference
sendmail, 34.8. Alphabetized Reference
userdb database class : sendmail, 33.8. Alphabetized Reference
USERDB macro : sendmail, 18.8. Alphabetized Reference
USERFILE file (UUCP)
Practical UNIX & Internet Security, 15.4.1. USERFILE: Providing Remote File Access
Practical UNIX & Internet Security, 15.4.2.1. Some bad examples
usermod command
Practical UNIX & Internet Security, 8.3. Restricting Logins
Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts
usernames : Practical UNIX & Internet Security, 3.1. Usernames
aliases for : Practical UNIX & Internet Security, 8.8.9. Account Names Revisited: Using Aliases for Increased
capitalization : sendmail, 30.8. Alphabetized F= Flags
doubling as passwords (Joes) : Practical UNIX & Internet Security, 3.6.2. Smoking Joes
last command and : Practical UNIX & Internet Security, 10.1.3. last Program
as passwords : Practical UNIX & Internet Security, 8.8.3.1. Joetest: a simple password cracker
recipient's : (see $u macro)
special
Practical UNIX & Internet Security, 4.2. Special Usernames
Practical UNIX & Internet Security, 4.2.3. Impact of the /etc/passwd and /etc/group
using someone else's
Practical UNIX & Internet Security, 4.3. su: Changing Who You Claim to Be
Practical UNIX & Internet Security, 4.3.8. Other Uses of su
users
Practical UNIX & Internet Security, 4. Users, Groups, and the Superuser
Practical UNIX & Internet Security, 4.1. Users and Groups
Practical UNIX & Internet Security, 4.1.2. Multiple Accounts with the Same UID
(see also groups; su command)
$: operator and
sendmail, 9.2.3. The User ($:)
sendmail, 9.3. Testing Rule Set 0
sendmail, 29.6.1. Further Processing: $:user
sendmail, 30.5.3. The $: Part
sendmail, 33.4.1. Specify a Default with $:
alias delivery to : sendmail, 24.2.1. Delivery to Users
assigning passwords to : Practical UNIX & Internet Security, 8.8.1. Assigning Passwords to Users
auditing who is logged in
Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
Practical UNIX & Internet Security, 10.1.2.1. su commandutmp and wtmp files andsu
authentication for Web : Practical UNIX & Internet Security, 18.3.3. Setting Up Web Users and Passwords
checklist for : Practical UNIX & Internet Security, A.1.1.2. Chapter 3: Users and Passwords
dormant accounts and
Practical UNIX & Internet Security, 8.4. Managing Dormant Accounts
Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts
errors by : Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
.forward file : sendmail, 22.5.3. Permissions for ~/.forward Files
groups : sendmail, 18.8. Alphabetized Reference
identities of : (see also UIDs)
default
sendmail, 13.2.5. The Default User Identities
sendmail, 22.8.3.1. The DefaultUser option
sendmail, 34.8. Alphabetized Reference
proving : Practical UNIX & Internet Security, 19.3.1.1. Proving your identity
recognizing as intruders
Practical UNIX & Internet Security, 24.2. Discovering an Intruder
Practical UNIX & Internet Security, 24.2.6. Anatomy of a Break-in
taking someone else's
Practical UNIX & Internet Security, 4.3. su: Changing Who You Claim to Be
Practical UNIX & Internet Security, 4.3.8. Other Uses of su
importing to NIS server
Practical UNIX & Internet Security, 19.4.1. Including or excluding specific accounts:
Practical UNIX & Internet Security, 19.4.4.2. Using netgroups to limit the importing of accounts
including oneself on mailing lists : sendmail, 34.8. Alphabetized Reference
letting in threats : Practical UNIX & Internet Security, 11.4. Entry
as LHS of alias : sendmail, 30.8. Alphabetized F= Flags
limited : Practical UNIX & Internet Security, 8.1.5.1. Limited users
local : sendmail, 31.10. Alphabetized Reference
accepting mail from only : sendmail, 20.2.1. Accept Mail Only From Our Domain
delivery to
sendmail, 3.2. Role in Local Delivery
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 29.6.3. Delivering to Local Recipient
sendmail, 30.8. Alphabetized F= Flags
logging
Practical UNIX & Internet Security, 10.4. Per-User Trails in the Filesystem
Practical UNIX & Internet Security, 10.4.3. Network Setup
mailing list instructions for : sendmail, 25.5.4. Users Ignore list-request
marked with + : sendmail, 24.4.3. Plussed Users
NIS passwords for : Practical UNIX & Internet Security, 19.3.2.1. Creating passwords for users
nobody (Secure RPC) : Practical UNIX & Internet Security, 19.3.2.1. Creating passwords for users
notifying about monitoring : Practical UNIX & Internet Security, 26.2.6. Other Tips
passwords : (see passwd file; passwords)
recipient of bounced mail : (see $n macro)
restricting certain : Practical UNIX & Internet Security, 18.3. Controlling Access to Files on Your Server
root : (see root account/user; superusers)
running sendmail manually : sendmail, 1.4. Run sendmail by Hand
security responsibilities : TCP/IP Network Administration, 12.1.3. Writing a Security Policy
semiprivileged : sendmail, 22.5. Permissions
sending messages to : Practical UNIX & Internet Security, 10.5.1. The syslog.conf Configuration File
summarizing system usage by : Practical UNIX & Internet Security, 25.2.2.2. quot command
tainting : Practical UNIX & Internet Security, 18.2.3.4. Tainting with Perl
training : Practical UNIX & Internet Security, 13.2.1. Initial Training
trusted
sendmail, 5.3.10. Trusted Users
sendmail, 14.6. Trusted User
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 22.8.1. Trusted Users
sendmail, 32.5. Alphabetized Reference
unattended terminals
Practical UNIX & Internet Security, 12.3.5. Unattended Terminals
Practical UNIX & Internet Security, 12.3.5.2. X screen savers
unavailable : (see undeliverable addresses in aliases)
USERFILE entries for : Practical UNIX & Internet Security, 15.4.1.2. USERFILE entries for local users
verifying with SMTP : sendmail, 22.3.2. SMTP vrfy and expn
www : Practical UNIX & Internet Security, 18.2.2. Understand Your Server's Directory Structure
users command
Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
Practical UNIX & Internet Security, 24.2.1. Catching One in the Act
USESETEUID macro : sendmail, 18.8. Alphabetized Reference
USG (UNIX Support Group) : Practical UNIX & Internet Security, 1.3. History of UNIX
/usr directory
Practical UNIX & Internet Security, 4.3.7. The Bad su Log
(see also /var directory)
/usr/adm directory : Practical UNIX & Internet Security, 11.5.3.6. Other files
/usr/adm/messages file, in security checks
Practical UNIX & Internet Security, 10.2.3. messages Log File
TCP/IP Network Administration, 12.4.2.2. Checking login activity
/usr/adm/lastlog file : Practical UNIX & Internet Security, 10.1.1. lastlog File
/usr/bin directory
Practical UNIX & Internet Security, 11.1.5. Viruses
Practical UNIX & Internet Security, 11.5.1.1. PATH attacks
backing up : Practical UNIX & Internet Security, 7.1.2. What Should You Back Up?
/usr/bin/uudecode : (see uudecode program)
/usr/etc/bootpd file : TCP/IP Network Administration, 9.6.1. rdist
/usr/etc/yp/makedbm program : Practical UNIX & Internet Security, 19.4.4.1. Setting up netgroups
/usr/lib directory : Practical UNIX & Internet Security, 11.5.3.6. Other files
in restricted filesystems : Practical UNIX & Internet Security, 8.1.5. Restricted Filesystem
/usr/lib/aliases file : Practical UNIX & Internet Security, 11.5.3.3. /usr/lib/aliases, /etc/aliases,
/usr/lib/preserve program : Practical UNIX & Internet Security, 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve
/usr/lib/sendmail : (see sendmail)
/usr/lib/uucp directory
Practical UNIX & Internet Security, 15.4.2.1. Some bad examples
Practical UNIX & Internet Security, 15.5.2. Permissions Commands
/usr/lib/uucp/Devices file : Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
/usr/lib/uucp/L-devices file : Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
/usr/lib/uucp/L.cmds file : (see L.cmds file)
/usr/lib/uucp/L.sys file : Practical UNIX & Internet Security, 15.3.3. Security of L.sys and Systems Files
/usr/lib/uucp/Permissions file : (see Permissions file)
/usr/lib/uucp/Systems file : Practical UNIX & Internet Security, 15.3.3. Security of L.sys and Systems Files
/usr/lib/uucp/USERFILE file
Practical UNIX & Internet Security, 15.4.1. USERFILE: Providing Remote File Access
Practical UNIX & Internet Security, 15.4.2.1. Some bad examples
/usr/local/bin directory
Practical UNIX & Internet Security, 1.1. What Is Computer Security?
Practical UNIX & Internet Security, 11.5.1.1. PATH attacks
/usr/local/etc/http/logs directory : Practical UNIX & Internet Security, 10.3.5. access_log Log File
/usr/local/lib directory : Practical UNIX & Internet Security, 11.5.3.6. Other files
/usr/sbin/imapd file : TCP/IP Network Administration, 9.7.2. IMAP Server
/usr/sbin/rexecd : (see rexec service)
/usr/spool/cron/crontabs directory : Practical UNIX & Internet Security, 15.6.2. Automatic Execution of Cleanup Scripts
/usr/spool/uucp directory : Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work
/usr/spool/uucppublic : (see uucppublic directory)
/usr/src/linux source directory : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
/usr/src/sys/i386/conf directory : TCP/IP Network Administration, 5.3. The BSD Kernel Configuration File
/usr/tmp directory : sendmail, 18.8. Alphabetized Reference
/usr/tmp/gated_dump file : TCP/IP Network Administration, B.1.1. Signal Processing
/usr/ucb directory : Practical UNIX & Internet Security, 11.1.5. Viruses
usrerr() : sendmail, 20.2.1. Accept Mail Only From Our Domain
USRX command, in ESMTP : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
utility programs : Practical UNIX & Internet Security, 1.2. What Is an Operating System?
utimes commandn : Practical UNIX & Internet Security, 24.5.1. Never Trust Anything Except Hardcopy
utmp file
Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
Practical UNIX & Internet Security, 10.1.2.1. su commandutmp and wtmp files andsu
Practical UNIX & Internet Security, 24.2.1. Catching One in the Act
Practical UNIX & Internet Security, 24.2.4. Tracing a Connection
uucheck program : Practical UNIX & Internet Security, 15.5.3. uucheck: Checking Your Permissions File
uucico program
Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work
Practical UNIX & Internet Security, 15.3. UUCP and Security
Practical UNIX & Internet Security, 15.5.1.1. Starting up
UUCP (UNIX-to-UNIX Copy Protocol)
Building Internet Firewalls, 2.2. File Transfer
Practical UNIX & Internet Security, 4.1.2. Multiple Accounts with the Same UID
Practical UNIX & Internet Security, 14.5. Modems and UNIX
Practical UNIX & Internet Security, 15. UUCP
Practical UNIX & Internet Security, 15.1.1. uucp Command
Practical UNIX & Internet Security, 15.9. Summary
Practical UNIX & Internet Security, 17.3.20. UUCP over TCP (TCP Port 540)
sendmail, 3.3.2. UUCP
sendmail, 8.1.4. UUCP and Host Paths
sendmail, 19.6. Alphabetized m4 Macros
TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
TCP/IP Network Administration, 5.4. The Internet Daemon
TCP/IP Network Administration, 10.5.8. Defining Mailers
additional logins : Practical UNIX & Internet Security, 15.3.1. Assigning Additional UUCP Logins
addresses
sendmail, 17.1.4. UUCP Addresses
sendmail, 17.4. Rule Set 4
bang syntax : TCP/IP Network Administration, 10.7.1. Modifying Local Information
BNU
Practical UNIX & Internet Security, 15.2. Versions of UUCP
Practical UNIX & Internet Security, 15.5. Security in BNU UUCP
Practical UNIX & Internet Security, 15.5.3. uucheck: Checking Your Permissions File
checklist for : Practical UNIX & Internet Security, A.1.1.14. Chapter 15: UUCP
cleanup scripts
Practical UNIX & Internet Security, 11.5.3. Abusing Automatic Mechanisms
Practical UNIX & Internet Security, 15.6.2. Automatic Execution of Cleanup Scripts
configuring : Building Internet Firewalls, 8.2.4. UNIX-to-UNIX
early security problems : Practical UNIX & Internet Security, 15.7. Early Security Problems with UUCP
eliminating support of : sendmail, 19.6. Alphabetized m4 Macros
HoneyDanBer (HDB) : Practical UNIX & Internet Security, 15.2. Versions of UUCP
$k macro : sendmail, 31.10. Alphabetized Reference
local handling of : sendmail, 29.6.5. Handling UUCP Locally
logging : Practical UNIX & Internet Security, 10.3.4. uucp Log Files
m4 configuration options : sendmail, 19.4.6. UUCP
macros for repays : sendmail, 31.10. Alphabetized Reference
mail forwarding : Practical UNIX & Internet Security, 15.6.1. Mail Forwarding for UUCP
naming computer : Practical UNIX & Internet Security, 15.5.2. Permissions Commands
over networks : Practical UNIX & Internet Security, 15.8. UUCP Over Networks
NFS server and : Practical UNIX & Internet Security, 15.3. UUCP and Security
passwords for : Practical UNIX & Internet Security, 15.3.2. Establishing UUCP Passwords
sites, serving
TCP/IP Network Administration, E.3. m4 sendmail Macros
TCP/IP Network Administration, E.3.5. MAILER
system connected with : TCP/IP Network Administration, 10.5.3. The Define Class Command
Taylor : Practical UNIX & Internet Security, 15.2. Versions of UUCP
over TCP : Practical UNIX & Internet Security, 17.3.20. UUCP over TCP (TCP Port 540)
Version 2
Practical UNIX & Internet Security, 15.2. Versions of UUCP
Practical UNIX & Internet Security, 15.4. Security in Version 2 UUCP
Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution
uucp (user)
Practical UNIX & Internet Security, 4.1. Users and Groups
Practical UNIX & Internet Security, 4.2.2. Other Special Users
UUCP_RELAY macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
UUCP-style lock files
TCP/IP Network Administration, 6.3.4. PPP Daemon Security
TCP/IP Network Administration, A.2. The PPP Daemon
uucpa account : Practical UNIX & Internet Security, 15.3.1. Assigning Additional UUCP Logins
uucpd program : Practical UNIX & Internet Security, 15.8. UUCP Over Networks
uucpdomain feature : sendmail, 19.6. Alphabetized m4 Macros
uucppublic directory
Practical UNIX & Internet Security, 15.1.1. uucp Command
Practical UNIX & Internet Security, 15.4.1.3. Format of USERFILE entry without system name
Practical UNIX & Internet Security, 15.5.2. Permissions Commands
UUCPSMTP macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
uudecode program
Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
sendmail, 22.6. The Aliases File
uuencode program
Practical UNIX & Internet Security, 6.6.1.2. Ways of improving the security of crypt
sendmail, 22.6. The Aliases File
uux command
Practical UNIX & Internet Security, 15.1.2. uux Command
Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work
uuxqt program : Practical UNIX & Internet Security, 15.4.1.3. Format of USERFILE entry without system name
uuxqtcmds files : Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.