Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: T
- table objects (NIS+)
: 19.5.3. NIS+ Tables
- TACACS
: 17.3.5. TACACS (UDP Port 49)
- tainting
- 18.2.3.4. Tainting with Perl
- 23.4. Tips on Writing SUID/SGID Programs
- taintperl
- 5.5.3. SUID Shell Scripts
- 18.2.3.4. Tainting with Perl
- 23.4. Tips on Writing SUID/SGID Programs
- talk program
: 11.1.4. Trojan Horses
- tandem backup
: 7.1.4. Guarding Against Media Failure
- tar program
- 6.6.1.2. Ways of improving the security of crypt
- 7.3.2. Building an Automatic Backup System
- 7.4.2. Simple Archives
- 7.4.4. Encrypting Your Backups
- 24.2.6. Anatomy of a Break-in
- Taylor UUCP
: 15.2. Versions of UUCP
- TCB (trusted computing base)
: 8.5.3.2. Trusted computing base
- /tcb directory
: 8.1.1. Accounts Without Passwords
- tcov tester
: 23.2. Tips on Avoiding Security-related Bugs
- TCP (Transmission Control Protocol)
- 16.2.4.2. TCP
- 17.1.3. The /etc/inetd Program
- (see also network services)
- connections, clogging
: 25.3.4. Clogging
- TCP/IP
- 1.4.3. Add-On Functionality Breeds Problems
- 10.5.2.2. Logging across the network
- (see also networks)
- checklist for
- A.1.1.15. Chapter 16: TCP/IP Networks
- A.1.1.16. Chapter 17: TCP/IP Services
- network services
: (see network services)
- networks
- 16. TCP/IP Networks
- 16.5. Summary
- tcpwrapper program
- 17.2. Controlling Access to Servers
- E.4.10. tcpwrapper
- tcsh
- 11.5.1. Shell Features
- (see also shells)
- history file
: 10.4.1. Shell History
- telecommunications
: 26.2.2. Federal Jurisdiction
- telephone
- 14.3.1. Originate and Answer
- (see also modems)
- calls, recording outgoing
: 10.3.1. aculog File
- cellular
: 12.2.1.8. Electrical noise
- checklist for
: A.1.1.13. Chapter 14: Telephone Security
- hang-up signal
: (see signals)
- lines
: 14.5.4. Physical Protection of Modems
- leasing
: 14.5.4. Physical Protection of Modems
- one-way
: 14.4.1. One-Way Phone Lines
- physical security of
: 14.5.4. Physical Protection of Modems
- Telnet versus
: 17.3.3. TELNET (TCP Port 23)
- Telnet utility
- 3.5. Verifying Your New Password
- 16.2.5. Clients and Servers
- 17.3.3. TELNET (TCP Port 23)
- versus rlogin
: 17.3.18. rlogin and rsh (TCP Ports 513 and 514)
- telnetd program
: 11.1.2. Back Doors and Trap Doors
- temperature
: 12.2.1.6. Temperature extremes
- TEMPEST system
: 12.3.1.3. Eavesdropping by radio and using TEMPEST
- terminal name and last command
: 10.1.3. last Program
- terrorism
: 12.2.5. Defending Against Acts of War and Terrorism
- testing
- CGI scripts
: 18.2.3.2. Testing is not enough!
- core files and
: 23.2. Tips on Avoiding Security-related Bugs
- programs
: 23.2. Tips on Avoiding Security-related Bugs
- software
: 1.4.2. Software Quality
- TFTP (Trivial File Transfer Protocol)
: 17.3.7. Trivial File Transfer Protocol (TFTP) (UDP Port 69)
- tftpd server
: 17.3.7. Trivial File Transfer Protocol (TFTP) (UDP Port 69)
- theft
- 7.1.1.1. A taxonomy of computer failures
- 12.2.6. Preventing Theft
- 12.2.6.4. Minimizing downtime
- 12.4.1.2. Potential for eavesdropping and data theft
- of backups
- 12.3.2. Protecting Backups
- 12.3.2.4. Backup encryption
- of RAM chips
: 12.2.6. Preventing Theft
- thieves
: 11.3. Authors
- third-party billing
: 14.5.4. Physical Protection of Modems
- Thompson, Ken
- 1.3. History of UNIX
- 8.6. The UNIX Encrypted Password System
- threats
- assessing cost of
: 2.3.3. Adding Up the Numbers
- back doors
: (see back doors)
- to backups
- 7.1.6. Security for Backups
- 7.1.6.3. Data security for backups
- bacteria programs
: 11.1.7. Bacteria and Rabbits
- biological
: 12.2.1.7. Bugs (biological)
- broadcast storms
: 25.3.2. Message Flooding
- via CGI scripts
: 18.2.3.2. Testing is not enough!
- changing file owners
: 5.7. chown: Changing a File's Owner
- changing system clock
: 5.1.5. File Times
- code breaking
- 6.1.1. Code Making and Code Breaking
- (see also cryptography)
- commonly attacked accounts
: 8.1.2. Default Accounts
- computer failures
: 7.1.1.1. A taxonomy of computer failures
- decode aliases
: 17.3.4.2. Using sendmail to receive email
- deep tree structures
: 25.2.2.8. Tree-structure attacks
- denial of service
- 17.1.3. The /etc/inetd Program
- 17.3.21.5. Denial of service attacks under X
- 25. Denial of Service Attacks and Solutions
- 25.3.4. Clogging
- accidental
: 25.2.5. Soft Process Limits: Preventing Accidental Denial of Service
- checklist for
: A.1.1.24. Chapter 25: Denial of Service Attacks and Solutions
- destructive attacks
: 25.1. Destructive Attacks
- disk attacks
- 25.2.2. Disk Attacks
- 25.2.2.8. Tree-structure attacks
- overload attacks
- 25.2. Overload Attacks
- 25.2.5. Soft Process Limits: Preventing Accidental Denial of Service
- system overload attacks
: 25.2.1.2. System overload attacks
- disposed materials
: 12.3.3. Other Media
- DNS client flooding
: 16.3.2. Security and Nameservice
- DNS nameserver attacks
: 17.3.6.2. DNS nameserver attacks
- DNS zone transfers
: 17.3.6.1. DNS zone transfers
- dormant accounts
- 8.4. Managing Dormant Accounts
- 8.4.3. Finding Dormant Accounts
- false syslog entries
: 10.5.3.1. Beware false log entries
- filename attacks
: 11.5.1.4. Filename attacks
- hidden space
: 25.2.2.7. Hidden space
- HOME variable attacks
: 11.5.1.3. $HOME attacks
- identifying and quantifying
- 2.2.1.2. Identifying threats
- 2.2.2. Review Your Risks
- IFS variable attacks
: 11.5.1.2. IFS attacks
- intruders
: (see intruders)
- letting in accidentally
: 11.4. Entry
- logic bombs
- 11.1.3. Logic Bombs
- 27.2.2. Viruses on the Distribution Disk
- mailing list for
: E.1.3.9. RISKS
- media failure
: 7.1.4. Guarding Against Media Failure
- meet-in-the-middle attacks
: 6.4.5.1. Double DES
- MUD/IRC client programs
: 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
- newly created accounts
: 24.4.1. New Accounts
- NIS, unintended disclosure
: 19.4.5. Unintended Disclosure of Site Information with NIS
- with NNTP
: 17.3.13. Network News Transport Protocol (NNTP) (TCP Port 119)
- open (guest) accounts
- 8.1.4. Open Accounts
- 8.1.4.6. Potential problems with rsh
- PATH variable attacks
: 11.5.1.1. PATH attacks
- plaintext attacks
: 6.2.3. Cryptographic Strength
- playback (replay) attacks
: 19.6.1.2. Using the ticket granting ticket
- programmed
- 11. Protecting Against Programmed Threats
- 11.6.2. Shared Libraries
- A.1.1.10. Chapter 11: Protecting Against Programmed Threats
- D.1.4. Computer Viruses and Programmed Threats
- authors of
: 11.3. Authors
- damage from
: 11.2. Damage
- replay attacks
: 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
- rsh, problems with
: 8.1.4.6. Potential problems with rsh
- sendmail problems
: 17.3.4.1. sendmail and security
- spoofed network connection
: 8.5.3.1. Trusted path
- start-up file attacks
- 11.5.2. Start-up File Attacks
- 11.5.2.7. Other initializations
- system clock
: (see system clock)
- theft
: (see theft)
- /tmp directory attacks
: 25.2.4. /tmp Problems
- toll fraud
: 14.4.1. One-Way Phone Lines
- traffic analysis
: 18.4. Avoiding the Risks of Eavesdropping
- tree-structure attacks
: 25.2.2.8. Tree-structure attacks
- Trojan horses
- 4.3.5. Using su with Caution
- 11.1.4. Trojan Horses
- 11.5. Protecting Yourself
- 17.3.21.2. X security
- 19.6.5. Kerberos Limitations
- 27.2.2. Viruses on the Distribution Disk
- trusted hosts
: (see trusted, hosts)
- unattended terminals
- 12.3.5. Unattended Terminals
- 12.3.5.2. X screen savers
- unowned files
: 24.4.1.8. Unowned files
- vandalism
- 12.2.4. Vandalism
- 12.2.4.3. Network connectors
- viruses
- 11.1.5. Viruses
- (see viruses)
- war and terrorism
: 12.2.5. Defending Against Acts of War and Terrorism
- weakness-finding tools
: 11.1.1. Security Tools
- by web browsers
- 18.5. Risks of Web Browsers
- 18.5.2. Trusting Your Software Vendor
- worms
: 11.1.6. Worms
- three-way handshake (TCP)
: 16.2.4.2. TCP
- ticket-granting service
- 19.6.1.1. Initial login
- 19.6.1.2. Using the ticket granting ticket
- 19.6.1.3. Authentication, data integrity, and secrecy
- tickets
: (see Kerberos system)
- Tiger
: E.4.11. Tiger
- tilde (~)
- in automatic backups
: 18.2.3.5. Beware stray CGI scripts
- as home directory
: 11.5.1.3. $HOME attacks
- ~! in mail messages
: 8.1.3. Accounts That Run a Single Command
- time
- 19.3.1.3. Setting the window
- (see also NTP; system clock)
- CPU, accounting
- 10.2. The acct/pacct Process Accounting File
- 10.2.3. messages Log File
- defining random seed by
: 23.8. Picking a Random Seed
- modification
- 5.1.2. Inodes
- 5.1.5. File Times
- 7.4.7. inode Modification Times
- 9.2.2. Checklists and Metadata
- 24.5.1. Never Trust Anything Except Hardcopy
- most recent login
: 10.1.1. lastlog File
- Secure RPC window of
: 19.3.1.3. Setting the window
- timeouts
- 11.1.3. Logic Bombs
- 23.3. Tips on Writing Network Programs
- timesharing
- 19.6.5. Kerberos Limitations
- 23.2. Tips on Avoiding Security-related Bugs
- Timezone table (NIS+)
: 19.5.3. NIS+ Tables
- tip command
- 10.3.1. aculog File
- 14.5. Modems and UNIX
- 14.5.3.1. Originate testing
- 14.5.3.3. Privilege testing
- -l option
: 14.5.3.1. Originate testing
- TIS Internet Firewall Toolkit (FWTK)
: E.4.12. TIS Internet Firewall Toolkit
- TMOUT variable
: 12.3.5.1. Built-in shell autologout
- /tmp directory
- 14.5.3.3. Privilege testing
- 25.2.4. /tmp Problems
- tmpfile function
: 23.2. Tips on Avoiding Security-related Bugs
- token cards
: 8.7.2. Token Cards
- token ring
: 16.1. Networking
- toll fraud
: 14.4.1. One-Way Phone Lines
- tools
: 1.3. History of UNIX
- to find weaknesses
: 11.1.1. Security Tools
- quality of
- 1.4.2. Software Quality
- 1.4.3. Add-On Functionality Breeds Problems
- Totient Function
: 6.4.6.1. How RSA works
- tracing connections
- 24.2.4. Tracing a Connection
- 24.2.4.2. How to contact the system administrator of a computer you don't know
- trademarks
: 26.4.3. Trademark Violations
- traffic analysis
: 18.4. Avoiding the Risks of Eavesdropping
- training
: 13.2.1. Initial Training
- transfer zones
: 16.2.6.1. DNS under UNIX
- transfering files
: 15.1.1. uucp Command
- Transmission Control Protocol (TCP)
: 16.2.4.2. TCP
- Transmit Data (TD)
: 14.3. The RS-232 Serial Protocol
- transmitters, radio
: 12.2.1.8. Electrical noise
- transposition (in encryption)
: 6.1.2. Cryptography and Digital Computers
- trap doors
: (see back doors)
- trashing
: 12.3.3. Other Media
- tree structures
: 25.2.2.8. Tree-structure attacks
- trimlog
: E.4.13. trimlog
- Triple DES
- 6.4.5. Improving the Security of DES
- 6.4.5.2. Triple DES
- Tripwire package
- 9.2.4. Tripwire
- 9.2.4.2. Running Tripwire
- 19.5.5. NIS+ Limitations
- E.4.14. Tripwire
- Trivial File Transfer Protocol (TFTP)
: 17.3.7. Trivial File Transfer Protocol (TFTP) (UDP Port 69)
- Trojan horses
- 4.3.5. Using su with Caution
- 11.1.4. Trojan Horses
- 11.5. Protecting Yourself
- 27.2.2. Viruses on the Distribution Disk
- Kerberos and
: 19.6.5. Kerberos Limitations
- X clients
: 17.3.21.2. X security
- truncate system call
: 5.1.7. File Permissions in Detail
- trust
- 1.1. What Is Computer Security?
- 2.1.1. Trust
- 27. Who Do You Trust?
- 27.4. What All This Means
- of log files
: 10.8. Managing Log Files
- trusted
- 8.5.3.2. Trusted computing base
- 17.1.1. The /etc/services File
- hosts
- 17.3.18.1. Trusted hosts and users
- 17.3.18.4. The ~/.rhosts file
- NFS and
: 17.3.18.2. The problem with trusted hosts
- path
: 8.5.3.1. Trusted path
- ports
: 1.4.3. Add-On Functionality Breeds Problems
- users
- 17.3.4.1. sendmail and security
- 17.3.18.1. Trusted hosts and users
- TRW Network Area and System Administrators
: F.3.4.36. TRW network area and system administrators
- tty file
: 7.1.2. What Should You Back Up?
- ttymon program
: C.5.2. Logging In
- ttys file
- 8.5.1. Secure Terminals
- 14.5.1. Hooking Up a Modem to Your Computer
- ttytab file
: C.5.1. Process #1: /etc/init
- ttywatch program
: 24.2.3. Monitoring the Intruder
- tunefs command
: 25.2.2.6. Reserved space
- tunneling
: 16.4.1. IPX
- twisted pair
: 16.1. Networking
- TZ variable
: 23.2. Tips on Avoiding Security-related Bugs
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
O'Reilly & Associates, Inc.
All Rights Reserved.
|