Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: O
- obscurity
: (see security, through obscurity)
- octal file permissions
- 5.2.3. Calculating Octal File Permissions
- 5.2.4. Using Octal File Permissions
- octets
: 16.2.1. Internet Addresses
- Odlyzko, Andrew
: 19.3.4. Limitations of Secure RPC
- OFB (output feedback)
: 6.4.4.2. DES modes
- on-the-job security
- 13.2. On the Job
- 13.2.6. Departure
- one
: 9.2.1. Comparison Copies
- one-command accounts
: 8.1.3. Accounts That Run a Single Command
- one-time pad encryption
- 6.4.7. An Unbreakable Encryption Algorithm
- 8.7.3. Code Books
- one-time passwords
- 3.7. One-Time Passwords
- 8.7. One-Time Passwords
- 8.7.3. Code Books
- 17.4. Security Implications of Network Services
- 23.3. Tips on Writing Network Programs
- one-way phone lines
: 14.4.1. One-Way Phone Lines
- open access, tradition of
: 1.4.1. Expectations
- open accounts
- 8.1.4. Open Accounts
- 8.1.4.6. Potential problems with rsh
- 8.8.7. Algorithm and Library Changes
- open command
: 23.2. Tips on Avoiding Security-related Bugs
- O_CREAT and O_EXCL flags
: 23.2. Tips on Avoiding Security-related Bugs
- Open Software Distribution (OSD)
: Preface
- Open Software Foundation (OSF)
: 1.3. History of UNIX
- open system call
: 5.1.7. File Permissions in Detail
- Open System Interconnection (OSI)
: 16.4.4. OSI
- opendir library call
: 5.4. Using Directory Permissions
- operating systems
- 1.2. What Is an Operating System?
- 12.3.3. Other Media
- keeping secret
: 2.5. The Problem with Security Through Obscurity
- operating systems
- Which UNIX System?
- (see also under specific name)
- optic cables
: (see cables, network)
- optical vampire taps
: 12.3.1.5. Fiber optic cable
- Options command
: 18.3.2. Commands Within the <Directory> Block
- Orange Book
: 2.3.3. Adding Up the Numbers
- originate mode
: 14.3.1. Originate and Answer
- originate testing
: 14.5.3.1. Originate testing
- OSF (Open Software Foundation)
: 1.3. History of UNIX
- OSF/1 operating system
: 1.3. History of UNIX
- OSI (Open System Interconnection)
: 16.4.4. OSI
- Outcome table (NIS+)
: 19.5.3. NIS+ Tables
- outgoing calls
: 14.5. Modems and UNIX
- outgoing mail, logging
: 10.4.2. Mail
- output feedback (OFB)
: 6.4.4.2. DES modes
- outsiders
: 13.3. Outsiders
- overload attacks
- 25.2. Overload Attacks
- 25.2.5. Soft Process Limits: Preventing Accidental Denial of Service
- overtime
: 13.2.3. Performance Reviews and Monitoring
- overwriting media
: 12.3.2.3. Sanitize your media before disposal
- OW- (sendmail.cf)
: 17.3.4.2. Using sendmail to receive email
- owners of information
: 2.4.4.1. Assign an owner
- owners, changing
: 5.7. chown: Changing a File's Owner
- ownership notices
: 26.2.6. Other Tips
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
O'Reilly & Associates, Inc.
All Rights Reserved.
|