Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: E
- earthquakes
: 12.2.1.4. Earthquake
- eavesdropping
- 12.3.1. Eavesdropping
- 12.3.1.5. Fiber optic cable
- 12.4.1.2. Potential for eavesdropping and data theft
- 14.4.4. Protecting Against Eavesdropping
- 14.4.4.2. Protection against eavesdropping
- 16.3.1. Link-level Security
- IP packets
- 16.3.1. Link-level Security
- 17.3.3. TELNET (TCP Port 23)
- through log files
: 18.4.2. Eavesdropping Through Log Files
- on the Web
- 18.4. Avoiding the Risks of Eavesdropping
- 18.4.2. Eavesdropping Through Log Files
- X clients
: 17.3.21.2. X security
- ECB (electronic code book)
- 6.4.4.2. DES modes
- 6.6.2. des: The Data Encryption Standard
- echo command
: 23.5. Tips on Using Passwords
- ECPA (Electronic Communications Privacy Act)
: 26.2.3. Federal Computer Crime Laws
- editing wtmp file
: 10.1.3.1. Pruning the wtmp file
- editors
: 11.5.2.7. Other initializations
- buffers for
: 11.1.4. Trojan Horses
- Emacs
: 11.5.2.3. GNU .emacs
- ex
- 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
- 11.5.2.4. .exrc
- 11.5.2.7. Other initializations
- startup file attacks
: 11.5.2.4. .exrc
- vi
- 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
- 11.5.2.4. .exrc
- 11.5.2.7. Other initializations
- edquota command
: 25.2.2.5. Using quotas
- EDS
: F.3.4.11. EDS and EDS customers worldwide
- education
: (see security, user awareness of)
- effective UIDs/GIDs
- 4.3.1. Real and Effective UIDs
- 5.5. SUID
- 10.1.2.1. su command and /etc/utmp and /var/adm/wtmp files
- C.1.3.2. Process real and effective UID
- 8mm video tape
: 7.1.4. Guarding Against Media Failure
- electrical fires
- 12.2.1.2. Smoke
- (see also fires; smoke and smoking)
- electrical noise
: 12.2.1.8. Electrical noise
- electronic
- breakins
: (see breakins; cracking)
- code book (ECB)
- 6.4.4.2. DES modes
- 6.6.2. des: The Data Encryption Standard
- mail
: (see mail)
- Electronic Communications Privacy Act (ECPA)
: 26.2.3. Federal Computer Crime Laws
- ElGamal algorithm
- 6.4.2. Summary of Public Key Systems
- 6.5.3. Digital Signatures
- elm (mail system)
: 11.5.2.5. .forward, .procmailrc
- emacs editor
: 11.5.2.7. Other initializations
- .emacs file
: 11.5.2.3. GNU .emacs
- email
: (see mail)
- embedded commands
: (see commands)
- embezzlers
: 11.3. Authors
- emergency response organizations
: (see response teams)
- employees
- 11.3. Authors
- 13. Personnel Security
- 13.3. Outsiders
- departure of
: 13.2.6. Departure
- phonebook of
: 12.3.3. Other Media
- security checklist for
: A.1.1.12. Chapter 13: Personnel Security
- targeted in legal investigation
: 26.2.5. If You or One of Your Employees Is a Target of an Investigation...
- trusting
: 27.3.1. Your Employees?
- written authorization for
: 26.2.6. Other Tips
- encryption
- 6.2. What Is Encryption?
- 6.2.2. The Elements of Encryption
- 12.2.6.2. Encryption
- (see also cryptography)
- algorithms
: 2.5. The Problem with Security Through Obscurity
- crypt
- 6.6.1. UNIX crypt: The Original UNIX Encryption Command
- 6.6.1.3. Example
- Digital Signature Algorithm
- 6.4.2. Summary of Public Key Systems
- 6.5.3. Digital Signatures
- ElGamal
: 6.4.2. Summary of Public Key Systems
- IDEA
: 6.4.1. Summary of Private Key Systems
- RC2, RC4, and RC5
- 6.4.1. Summary of Private Key Systems
- 6.4.8. Proprietary Encryption Systems
- ROT13
: 6.4.3. ROT13: Great for Encoding Offensive Jokes
- RSA
- 6.4.2. Summary of Public Key Systems
- 6.4.6. RSA and Public Key Cryptography
- 6.4.6.3. Strength of RSA
- application-level
: 16.3.1. Link-level Security
- of backups
- 7.1.6.3. Data security for backups
- 7.4.4. Encrypting Your Backups
- 12.3.2.4. Backup encryption
- checklist for
: A.1.1.5. Chapter 6: Cryptography
- Data Encryption Standard (DES)
- 6.4.1. Summary of Private Key Systems
- 6.4.4. DES
- 6.4.5.2. Triple DES
- 6.6.2. des: The Data Encryption Standard
- DCE and
: 3.2.2. The /etc/passwd File and Network Databases
- Diffie-Hellman
: (see Diffie-Hellman key exchange system)
- end-to-end
: 16.3.1. Link-level Security
- Enigma system
- 6.3. The Enigma Encryption System
- 6.6.1.1. The crypt program
- (see also crypt command/algorithm)
- escrowing keys
- 6.1.3. Modern Controversy
- 7.1.6.3. Data security for backups
- exporting software
: 26.4.1. Munitions Export
- of hypertext links
: 18.4.1. Eavesdropping Over the Wire
- laws about
- 6.7. Encryption and U.S. Law
- 6.7.2. Cryptography and Export Controls
- link-level
: 16.3.1. Link-level Security
- of modems
: 14.6. Additional Security for Modems
- Netscape Navigator system
: 18.4.1. Eavesdropping Over the Wire
- with network services
: 17.4. Security Implications of Network Services
- one-time pad mechanism
: 6.4.7. An Unbreakable Encryption Algorithm
- of passwords
- 8.6. The UNIX Encrypted Password System
- 8.6.4. Crypt16() and Other Algorithms
- 23.5. Tips on Using Passwords
- PGP
: (see PGP)
- programs for UNIX
- 6.6. Encryption Programs Available for UNIX
- 6.6.3.6. PGP detached signatures
- proprietary algorithms
: 6.4.8. Proprietary Encryption Systems
- RC4 and RC5 algorithms
: 6.4.1. Summary of Private Key Systems
- references on
: D.1.5. Cryptography Books
- Skipjack algorithm
: 6.4.1. Summary of Private Key Systems
- superencryption
: 6.4.5. Improving the Security of DES
- and superusers
: 6.2.4. Why Use Encryption with UNIX?
- of Web information
: 18.4.1. Eavesdropping Over the Wire
- end-to-end encryption
: 16.3.1. Link-level Security
- Energy Sciences Network (ESnet)
: F.3.4.43. U.S. Department of Energy sites, Energy Sciences Network (ESnet), and DOE contractors
- Enigma encryption system
- 6.3. The Enigma Encryption System
- 6.6.1.1. The crypt program
- Enterprise Networks
: 16.1. Networking
- environment variables
- 11.5.2.7. Other initializations
- 23.2. Tips on Avoiding Security-related Bugs
- environment, physical
- 12.2.1. The Environment
- 12.2.1.13. Environmental monitoring
- erasing disks
: 12.3.2.3. Sanitize your media before disposal
- erotica, laws governing
: 26.4.5. Pornography and Indecent Material
- errno variable
: 23.2. Tips on Avoiding Security-related Bugs
- errors
: 7.1.1.1. A taxonomy of computer failures
- in ACLs
: 5.2.5.1. AIX Access Control Lists
- configuration
: 9.1. Prevention
- human
: 7.1.4. Guarding Against Media Failure
- errors
- Preface
- (see also auditing, system activity)
- escape sequences, modems and
: 14.5.3.1. Originate testing
- escrowing encryption keys
- 6.1.3. Modern Controversy
- 7.1.6.3. Data security for backups
- ESnet (Energy Sciences Network)
: F.3.4.43. U.S. Department of Energy sites, Energy Sciences Network (ESnet), and DOE contractors
- espionage
: 11.3. Authors
- /etc directory
- 11.1.2. Back Doors and Trap Doors
- 11.5.3.5. System initialization files
- backups of
: 7.1.3. Types of Backups
- /etc/aliases file
: 11.5.3.3. /usr/lib/aliases, /etc/aliases, /etc/sendmail/aliases, aliases.dir, or aliases.pag
- /etc/default/login file
: 8.5.1. Secure Terminals
- /etc/exports file
- 11.6.1.2. Writable system files and directories
- 19.3.2.4. Using Secure NFS
- making changes to
: 20.2.1.2. /usr/etc/exportfs
- /etc/fbtab file
: 17.3.21.1. /etc/fbtab and /etc/logindevperm
- /etc/fingerd program
: (see finger command)
- /etc/fsck program
: 24.4.1.7. Hidden files and directories
- /etc/fstab file
- 11.1.2. Back Doors and Trap Doors
- 19.3.2.5. Mounting a secure filesystem
- /etc/ftpd
: (see ftpd server)
- /etc/ftpusers file
: 17.3.2.5. Restricting FTP with the standard UNIX FTP server
- /etc/group file
- 1.2. What Is an Operating System?
- 4.1.3.1. The /etc/group file
- 4.2.3. Impact of the /etc/passwd and /etc/group Files on Security
- 8.1.6. Group Accounts
- /etc/halt command
: 24.2.6. Anatomy of a Break-in
- /etc/hosts file
: 16.2.3.1. The /etc/hosts file
- /etc/hosts.equiv
: (see hosts.equiv file)
- /etc/hosts.lpd file
: 17.3.18.6. /etc/hosts.lpd file
- /etc/inetd
: (see inetd daemon)
- /etc/inetd.conf file
: 17.3. Primary UNIX Network Services
- /etc/init program
: C.5.1. Process #1: /etc/init
- /etc/inittab
: (see inittab program)
- /etc/keystore file
: 19.3.1.1. Proving your identity
- /etc/logindevperm file
: 17.3.21.1. /etc/fbtab and /etc/logindevperm
- /etc/motd file
: 26.2.6. Other Tips
- /etc/named.boot file
- 17.3.6.1. DNS zone transfers
- 17.3.6.2. DNS nameserver attacks
- /etc/passwd file
- 1.2. What Is an Operating System?
- 3.2.1. The /etc/passwd File
- 3.2.2. The /etc/passwd File and Network Databases
- 4.2.3. Impact of the /etc/passwd and /etc/group Files on Security
- 8.1.1. Accounts Without Passwords
- 8.6. The UNIX Encrypted Password System
- C.5.1. Process #1: /etc/init
- + in
: (see NIS)
- accounts without passwords
: 8.1.1. Accounts Without Passwords
- backing up
: 7.1.2. What Should You Back Up?
- new accounts
: 24.4.1. New Accounts
- NFS
: 20.2.1.1. /etc/exports
- uucp user and
: 15.1.4. How the UUCP Commands Work
- /etc/profile file
- 11.5.2.1. .login, .profile, /etc/profile
- 24.4.1.6. Changes to startup files
- /etc/publickey file
: 19.3.2.1. Creating passwords for users
- /etc/rc directory
- 11.5.3.5. System initialization files
- 17.1.2. Starting the Servers
- C.5.1. Process #1: /etc/init
- commenting out services
: 17.3. Primary UNIX Network Services
- /etc/remote file
- 10.3.1. aculog File
- 14.5.1. Hooking Up a Modem to Your Computer
- /etc/renice
: (see renice command)
- /etc/secure/passwd file
: 8.1.1. Accounts Without Passwords
- /etc/security/passwd.adjunct file
: 8.8.5. Shadow Password Files
- /etc/sendmail/aliases file
: 11.5.3.3. /usr/lib/aliases, /etc/aliases, /etc/sendmail/aliases, aliases.dir, or aliases.pag
- /etc/services file
: 17.1.1. The /etc/services File
- /etc/services file
: 17.1.1. The /etc/services File
- /etc/shadow file
- 8.1.1. Accounts Without Passwords
- 8.8.5. Shadow Password Files
- /etc/shells file
: 8.4.2. Changing the Account's Login Shell
- /etc/syslogd
: (see syslog facility)
- /etc/tty file, backing up
: 7.1.2. What Should You Back Up?
- /etc/ttys file
- 8.5.1. Secure Terminals
- 14.5.1. Hooking Up a Modem to Your Computer
- /etc/ttytab file
: C.5.1. Process #1: /etc/init
- /etc/utmp file
- 10.1.2. utmp and wtmp Files
- 10.1.2.1. su command and /etc/utmp and /var/adm/wtmp files
- 24.2.1. Catching One in the Act
- 24.2.4. Tracing a Connection
- /etc/uucp directory
: 15.4.2.1. Some bad examples
- /etc/yp/makedbm program
: 19.4.4.1. Setting up netgroups
- in restricted filesystems
: 8.1.5. Restricted Filesystem
- Ethernet
: 16.1. Networking
- addresses for random seeds
: 23.8. Picking a Random Seed
- cables
: (see cables, network)
- eavesdropping by
: 12.3.1.2. Eavesdropping by Ethernet and 10Base-T
- Ethers table (NIS+)
: 19.5.3. NIS+ Tables
- Euler Totient Function
: 6.4.6.1. How RSA works
- eval function
- 18.2.3.2. Testing is not enough!
- 18.2.3.3. Sending mail
- evidence, equipment seized as
: 26.2.4. Hazards of Criminal Prosecution
- ex editor
- 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
- 11.5.2.4. .exrc
- 11.5.2.7. Other initializations
- exceptions
: C.2. Creating Processes
- exclamation mark (!) and mail command
: 15.1.3. mail Command
- exclusive OR (XOR)
: 6.4.7. An Unbreakable Encryption Algorithm
- exec (in Swatch program)
: 10.6.2. The Swatch Configuration File
- exec system call
- 5.1.7. File Permissions in Detail
- 18.2.3.3. Sending mail
- 23.2. Tips on Avoiding Security-related Bugs
- 25.2.1.1. Too many processes
- ExecCGI option
: 18.3.2. Commands Within the <Directory> Block
- execl system call
: 23.4. Tips on Writing SUID/SGID Programs
- execlp system call
: 23.4. Tips on Writing SUID/SGID Programs
- execute permission
- 5.1.7. File Permissions in Detail
- 5.4. Using Directory Permissions
- execv system call
: 23.4. Tips on Writing SUID/SGID Programs
- execve system call
: 23.4. Tips on Writing SUID/SGID Programs
- execvp system call
: 23.4. Tips on Writing SUID/SGID Programs
- expiring
- accounts
: 8.4.3. Finding Dormant Accounts
- FTP depositories
: 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP server
- passwords
: 8.8.6. Password Aging and Expiration
- explosions
: 12.2.1.5. Explosion
- export laws
: 26.4.1. Munitions Export
- cryptography
- 6.4.4.1. Use and export of DES
- 6.7.2. Cryptography and Export Controls
- exportfs command
: 20.2.1.2. /usr/etc/exportfs
- exports file
- 11.6.1.2. Writable system files and directories
- 19.3.2.4. Using Secure NFS
- 20.2.1.1. /etc/exports
- 20.2.1.2. /usr/etc/exportfs
- .exrc file
: 11.5.2.4. .exrc
- ext2 filesystem (Linux)
: 25.2.2.6. Reserved space
- external data representation (XDR)
: 19.2. Sun's Remote Procedure Call (RPC)
- extinguishers, fire
: (see fires)
- extortion
: 11.3. Authors
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
O'Reilly & Associates, Inc.
All Rights Reserved.
|