home | O'Reilly's CD bookshelfs | FreeBSD | Linux | Cisco | Cisco Exam  


Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: K

Karn, Phil : 6.6.2. des: The Data Encryption Standard
Kerberos system
8.7.3. Code Books
19.6. Kerberos
19.6.5. Kerberos Limitations
E.4.5. Kerberos
installing : 19.6.3. Installing Kerberos
RPC system and : 19.2.2.4. AUTH_KERB
Versions 4 and 5 : 19.6.1.4. Kerberos 4 vs. Kerberos 5
versus Secure RPC : 19.6.2. Kerberos vs. Secure RPC
kermit program
14.5. Modems and UNIX
14.5.3.3. Privilege testing
kernel
1.2. What Is an Operating System?
5.5.3. SUID Shell Scripts
key
escrow : 6.1.3. Modern Controversy
fingerprints : 6.6.3.6. PGP detached signatures
search
6.2.3. Cryptographic Strength
8.6.1. The crypt() Algorithm
switches : 12.3.6. Key Switches
keylogin program
19.3.3. Using Secure RPC
19.5.4. Using NIS+
keylogout program : 19.3.3. Using Secure RPC
keyserv process
19.3.1.1. Proving your identity
19.3.2.3. Making sure Secure RPC programs are running on every workstation
19.5.4. Using NIS+
keystore file : 19.3.1.1. Proving your identity
keystrokes
monitoring
17.3.21.2. X security
24.2.3. Monitoring the Intruder
monitoring
17.3.21.2. X security
(see also sniffers)
time between : 23.8. Picking a Random Seed
kill command
17.3.4.2. Using sendmail to receive email
24.2.5. Getting Rid of the Intruder
C.4. The kill Command
to stop process overload
25.2.1.1. Too many processes
25.2.1.2. System overload attacks
kinit program : 19.6.4. Using Kerberos
kmem device
5.6. Device Files
11.1.2. Back Doors and Trap Doors
known text attacks : 6.2.3. Cryptographic Strength
Koblas, David : 22.4. SOCKS
Koblas, Michelle : 22.4. SOCKS
ksh (Korn shell)
11.5.1. Shell Features
24.4.1.7. Hidden files and directories
C.5.3. Running the User's Shell
(see also shells)
history file : 10.4.1. Shell History
restricted shell : 8.1.4.3. Restricted Korn shell
TMOUT variable : 12.3.5.1. Built-in shell autologout
umask and : 5.3.1. The umask Command
ksh93 shell
23.2. Tips on Avoiding Security-related Bugs
24.4.1.7. Hidden files and directories
.kshrc file : 11.5.2.2. .cshrc, .kshrc


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.