Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: R
- rabbit programs
- 11.1. Programmed Threats: Definitions
- 11.1.7. Bacteria and Rabbits
- race conditions
: 23.2. Tips on Avoiding Security-related Bugs
- radio
- eavesdropping
: 12.3.1.3. Eavesdropping by radio and using TEMPEST
- transmissions
: 14.4.4.1. Kinds of eavesdropping
- transmitters
: 12.2.1.8. Electrical noise
- rain
: (see water)
- RAM theft
: 12.2.6. Preventing Theft
- rand function
: 23.7.1. rand ( )
- random device
: 23.7.4. Other random number generators
- random function
: 23.7.2. random ( )
- random numbers
: 23.6. Tips on Generating Random Numbers
- raw devices
: 5.6. Device Files
- rc directory
: C.5.1. Process #1: /etc/init
- RC2, RC4, and RC5 algorithms
- 6.4.1. Summary of Private Key Systems
- 6.4.8. Proprietary Encryption Systems
- RC4 and RC5 algorithms
: 6.4.1. Summary of Private Key Systems
- rcp command
- 1.4.3. Add-On Functionality Breeds Problems
- 7.4.5. Backups Across the Net
- RCS (Revision Control System)
- 7.3.2. Building an Automatic Backup System
- 17.3. Primary UNIX Network Services
- rdist program
- 7.4.5. Backups Across the Net
- 9.2.1.3. rdist
- rdump/rrestore program
: 7.4.5. Backups Across the Net
- read permission
- 5.1.7. File Permissions in Detail
- 5.4. Using Directory Permissions
- read system call
: 5.1.7. File Permissions in Detail
- time-outs on
: 23.3. Tips on Writing Network Programs
- read-only exporting filesystems
: 11.6.1.2. Writable system files and directories
- read-only filesystems
: 9.1.2. Read-only Filesystems
- READ= command
: 15.5.2. Permissions Commands
- readdir library call
: 5.4. Using Directory Permissions
- real UIDs/GIDs
- 4.3.1. Real and Effective UIDs
- C.1.3.2. Process real and effective UID
- realpath function
: 23.2. Tips on Avoiding Security-related Bugs
- reauthentication
- Kerberos
: 19.6.4. Using Kerberos
- Secure RPC
: 19.3.1.3. Setting the window
- Receive Data (RD)
: 14.3. The RS-232 Serial Protocol
- Redman, Brian E.
: 15.2. Versions of UUCP
- refer_log file
: 18.4.2. Eavesdropping Through Log Files
- reflectors (in Enigma system)
: 6.3. The Enigma Encryption System
- reformatting attack
: 25.1. Destructive Attacks
- relative humidity
: 12.2.1.11. Humidity
- relative pathnames
: 5.1.3. Current Directory and Paths
- remote
- command execution
- 15.1.2. uux Command
- 15.4.3. L.cmds: Providing Remote Command Execution
- 17.3.17. rexec (TCP Port 512)
- comparison copies
: 9.2.1.2. Remote copies
- computers
- transferring files to
: 15.1.1. uucp Command
- file access (UUCP)
- 15.4.1. USERFILE: Providing Remote File Access
- 15.4.2.1. Some bad examples
- network filesystems
: 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
- procedure calls
: (see RPCs)
- remote file
- 10.3.1. aculog File
- 14.5.1. Hooking Up a Modem to Your Computer
- remote.unknown file
: 15.5. Security in BNU UUCP
- renice command
- 25.2.1.2. System overload attacks
- C.1.3.3. Process priority and niceness
- replay attacks
- 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
- 19.6.1.2. Using the ticket granting ticket
- reporting security holes
: 2.5.1. Going Public
- Request to Send (RTS)
: 14.3. The RS-232 Serial Protocol
- REQUEST= command
- 15.5.1.3. A Sample Permissions file
- 15.5.2. Permissions Commands
- reserved memory space
: 25.2.2.6. Reserved space
- resolution, time
: 23.8. Picking a Random Seed
- resolver library (bind)
: 16.2.6.1. DNS under UNIX
- resolving (DNS)
: 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
- response teams
- 27.3.5. Response Personnel?
- F.3. Emergency Response Organizations
- F.3.4.46. Westinghouse Electric Corporation
- mailing lists for
: E.1.1. Response Teams and Vendors
- restore
: (see dump/restore program)
- restricted
- filesystems
- 8.1.5. Restricted Filesystem
- 8.1.5.2. Checking new software
- FTP
: 17.3.2.5. Restricting FTP with the standard UNIX FTP server
- logins
: 8.3. Restricting Logins
- shells
- 8.1.4.1. Restricted shells under System V UNIX
- 8.1.4.6. Potential problems with rsh
- su use
: 4.3.6. Restricting su
- restrictmailq (sendmail)
: 17.3.4.3. Improving the security of Berkeley sendmail V8
- retention of backups
- 7.1.5. How Long Should You Keep a Backup?
- 7.2.2.2. Retention schedule
- (see also networks, backing up)
- return calls
: 23.2. Tips on Avoiding Security-related Bugs
- reverse lookup
- 16.3.2. Security and Nameservice
- 23.3. Tips on Writing Network Programs
- Revision Control System (RCS)
- 7.3.2. Building an Automatic Backup System
- 17.3. Primary UNIX Network Services
- revocation certificate
: 6.6.3.2. Creating your PGP public key
- rexd service
: 19.2.2.4. AUTH_KERB
- rexec service
: 17.3.17. rexec (TCP Port 512)
- RFC 1750
: 23.8. Picking a Random Seed
- .rhosts file
- 10.4.3. Network Setup
- 17.3.18.4. The ~/.rhosts file
- 17.3.18.5. Searching for .rhosts files
- back door in
: 11.1.2. Back Doors and Trap Doors
- intruder's changes to
: 24.4.1.4. Changes in .rhosts files
- searching for
: 17.3.18.5. Searching for .rhosts files
- Ring Indicator (RI)
: 14.3. The RS-232 Serial Protocol
- RIP (Routing Internet Protocol)
: 17.3.19. Routing Internet Protocol (RIP routed) (UDP Port 520)
- risk assessment
- 2.2. Risk Assessment
- 2.2.2. Review Your Risks
- 2.5.3. Final Words: Risk Management Means Common Sense
- risks
: (see threats)
- Ritchie, Dennis
: 1.3. History of UNIX
- Rivest, Ronald L.
- 6.1.3. Modern Controversy
- 6.4.1. Summary of Private Key Systems
- 6.4.2. Summary of Public Key Systems
- 6.4.6. RSA and Public Key Cryptography
- 6.5.4.1. MD2, MD4, and MD5
- RJE (Remote Job Entry)
: 3.2.1. The /etc/passwd File
- rlogin command
- 1.4.3. Add-On Functionality Breeds Problems
- 3.5. Verifying Your New Password
- 16.3.2. Security and Nameservice
- 17.3.18. rlogin and rsh (TCP Ports 513 and 514)
- 17.3.18.6. /etc/hosts.lpd file
- versus Telnet
: 17.3.18. rlogin and rsh (TCP Ports 513 and 514)
- rlogind command
: 17.3.18. rlogin and rsh (TCP Ports 513 and 514)
- rm command
- 5.4. Using Directory Permissions
- 15.4.3. L.cmds: Providing Remote Command Execution
- and deep tree structures
: 25.2.2.8. Tree-structure attacks
- rmail program
: 15.4.3. L.cmds: Providing Remote Command Execution
- root account
- 4. Users, Groups, and the Superuser
- 4.1. Users and Groups
- 4.2.1. The Superuser
- 4.2.1.5. The problem with the superuser
- 5.5.2. Problems with SUID
- (see also superuser)
- abilities of
: 27.1.3. What the Superuser Can and Cannot Do
- chroot
- 8.1.5. Restricted Filesystem
- 8.1.5.2. Checking new software
- immutable files and
: 9.1.1. Immutable and Append-Only Files
- network services with
: 17.4. Security Implications of Network Services
- protecting
- 8.5. Protecting the root Account
- 8.5.3.2. Trusted computing base
- on remote machine, fingering
: 24.2.4.2. How to contact the system administrator of a computer you don't know
- single-command accounts and
: 8.1.3. Accounts That Run a Single Command
- web server as
: 18.2.1. The Server's UID
- root directory
: 5.1.1. Directories
- backups of
: 7.1.3. Types of Backups
- UUCP access from
: 15.4.2.1. Some bad examples
- root option for /etc/exports
: 20.2.1.1. /etc/exports
- ROT13 algorithm
- 6.4.1. Summary of Private Key Systems
- 6.4.3. ROT13: Great for Encoding Offensive Jokes
- rotating backup media
- 7.1.3. Types of Backups
- 7.2.1.2. Media rotation
- routed daemon
: 17.3.19. Routing Internet Protocol (RIP routed) (UDP Port 520)
- routers, intelligent
: 21.2.3. Setting Up the Choke
- routing
: 16.2.2. Routing
- Routing Internet Protocol
: (see RIP)
- RPC table (NIS+)
: 19.5.3. NIS+ Tables
- rpc.rexdserver
: 17.3.22. RPC rpc.rexd (TCP Port 512)
- rpcbind
: (see portmapper program)
- RPCs (remote procedure calls)
- 17.3.22. RPC rpc.rexd (TCP Port 512)
- 19. RPC, NIS, NIS+, and Kerberos
- 19.7.2. SESAME
- authentication of
- 19.2.2. RPC Authentication
- 19.2.2.4. AUTH_KERB
- portmapper program
: 17.3.11. Sun RPC's portmapper (UDP and TCP Ports 111)
- Secure
: (see Secure RPC)
- spoofing
: 19.4.4.4. Spoofing RPC
- RS-232 serial protocol
: 14.3. The RS-232 Serial Protocol
- RSA algorithm
- 6.4.2. Summary of Public Key Systems
- 6.4.6. RSA and Public Key Cryptography
- 6.4.6.3. Strength of RSA
- 6.5.3. Digital Signatures
- rsh (restricted shell)
- 8.1.4.1. Restricted shells under System V UNIX
- 8.1.4.6. Potential problems with rsh
- 17.3.18. rlogin and rsh (TCP Ports 513 and 514)
- 17.3.18.6. /etc/hosts.lpd file
- rsh command
: 16.3.2. Security and Nameservice
- rshd program
: 11.1.2. Back Doors and Trap Doors
- RUID
: (see real UIDs/GIDs)
- runacct command
: 10.2. The acct/pacct Process Accounting File
- ruusend command
: 15.4.3. L.cmds: Providing Remote Command Execution
- rw option for /etc/exports
: 20.2.1.1. /etc/exports
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
O'Reilly & Associates, Inc.
All Rights Reserved.
|