Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: K
- Karn, Phil
: 6.6.2. des: The Data Encryption Standard
- Kerberos system
- 8.7.3. Code Books
- 19.6. Kerberos
- 19.6.5. Kerberos Limitations
- E.4.5. Kerberos
- installing
: 19.6.3. Installing Kerberos
- RPC system and
: 19.2.2.4. AUTH_KERB
- Versions 4 and 5
: 19.6.1.4. Kerberos 4 vs. Kerberos 5
- versus Secure RPC
: 19.6.2. Kerberos vs. Secure RPC
- kermit program
- 14.5. Modems and UNIX
- 14.5.3.3. Privilege testing
- kernel
- 1.2. What Is an Operating System?
- 5.5.3. SUID Shell Scripts
- key
- escrow
: 6.1.3. Modern Controversy
- fingerprints
: 6.6.3.6. PGP detached signatures
- search
- 6.2.3. Cryptographic Strength
- 8.6.1. The crypt() Algorithm
- switches
: 12.3.6. Key Switches
- keylogin program
- 19.3.3. Using Secure RPC
- 19.5.4. Using NIS+
- keylogout program
: 19.3.3. Using Secure RPC
- keyserv process
- 19.3.1.1. Proving your identity
- 19.3.2.3. Making sure Secure RPC programs are running on every workstation
- 19.5.4. Using NIS+
- keystore file
: 19.3.1.1. Proving your identity
- keystrokes
- monitoring
- 17.3.21.2. X security
- 24.2.3. Monitoring the Intruder
- monitoring
- 17.3.21.2. X security
- (see also sniffers)
- time between
: 23.8. Picking a Random Seed
- kill command
- 17.3.4.2. Using sendmail to receive email
- 24.2.5. Getting Rid of the Intruder
- C.4. The kill Command
- to stop process overload
- 25.2.1.1. Too many processes
- 25.2.1.2. System overload attacks
- kinit program
: 19.6.4. Using Kerberos
- kmem device
- 5.6. Device Files
- 11.1.2. Back Doors and Trap Doors
- known text attacks
: 6.2.3. Cryptographic Strength
- Koblas, David
: 22.4. SOCKS
- Koblas, Michelle
: 22.4. SOCKS
- ksh (Korn shell)
- 11.5.1. Shell Features
- 24.4.1.7. Hidden files and directories
- C.5.3. Running the User's Shell
- (see also shells)
- history file
: 10.4.1. Shell History
- restricted shell
: 8.1.4.3. Restricted Korn shell
- TMOUT variable
: 12.3.5.1. Built-in shell autologout
- umask and
: 5.3.1. The umask Command
- ksh93 shell
- 23.2. Tips on Avoiding Security-related Bugs
- 24.4.1.7. Hidden files and directories
- .kshrc file
: 11.5.2.2. .cshrc, .kshrc
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
O'Reilly & Associates, Inc.
All Rights Reserved.
|