[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Y]
[Z]
Bace, Rebecca (Intrusion Detection)
Bach, Maurice (The Design of the UNIX Operating System)
back doors
2nd
3rd
as common threat
in MUDs and IRCs
strength of encryption and
background checks
2nd
background processes
backing out of upgrades
backups across network
automatic system for
commercial systems for
configuration files, paper copies of
criminal investigations and
2nd
3rd
data security for
dedicated programs for
destruction of
differential
encryption of
2nd
3rd
4th
file modification times and
files with holes
guidelines for
human error and
of individual workstations
legal issues concerning
levels of
location of
2nd
of log files
media failure, protecting against
methods of
migrating
of networks
performing before upgrades
public key encryption and PGP
purposes of
read-only partitions
retention of
2nd
rotating media
schedule for
security checklist for
security of
simple archives
simple local copies
simultaneous
software for
standards for
strategies for
2nd
of system-critical files
theft of
verifying
2nd
what to back up
world-readable
write-protecting
bacteria
2nd
BADSU attempts, logging
Badulescu, Ion
banners modem
SMTP
bash history file
Basic Input/Output System (BIOS)
batch command
batch jobs
[See cron file] baud
Bellovin, Steve (Firewalls and Internet Security)
Berkeley BSD Unix
[See BSD Unix] Berkeley FTP server, restricting accounts with
Berkeley Software Design, Inc. (BSDI)
Bernstein, Dan
best practices
beverages, effects on hardware
bftpd server
bidirectionality of modems
2nd
biff service
bigcrypt algorithm
/bin directory
/bin/csh
[See csh] /bin/ksh
[See ksh] /bin/login
[See login program] /bin/passwd
[See passwd command] /bin/sh
[See sh] in restricted filesystems
binary code, downloading
2nd
binary owner
BIND name server
2nd
bind() system call
BIOS (Basic Input/Output System)
Bishop, Matt
Blaze, Matt
block algorithms
block devices
2nd
3rd
block/send commands, Trojan horses and
Blowfish algorithm
bogus nameserver cache poisoning
bogusns directive
Bolsky, Morris I. (The New Kornshell Command and Programmang Language)
bombs, as destructive attack
books, security
boot disks, viruses on
BOOTP protocol
Bootparams table (NIS+)
Bostic, Keith (The Design and Implementation of the 4.4 BSD UNIX Operating System)
Bosworth, S. (Computer Security Handbook)
bounds checking
Bourne shell
[See sh] bps (bits per second)
brackets ([]), indicating optional syntax
Brand, Russell
break-ins case studies of
commands used to discover
commands used to monitor
2nd
contacting a remote system administrator
detecting and discovering
2nd
documenting
legal recourses after
planning for
preserving evidence from
recovering from
responding to
2nd
resuming operation after
security checklist for
software toolkit for
A Brief History of Time: From the Big Bang to Black Holes (Hawking, Stephen W.)
broadcast storms
Brunner, John (Shockwave Rider)
brute force attacks
2nd
3rd
4th
BSD 4.2
BSD 4.4 Lite
2nd
BSD Unix
2nd
3rd
[See also FreeBSD; Mac OS X; NetBSD; OpenBSD]4th
"no dump" file attribute
append-only files
chroot wrapper
exporting filesystems read-only
exporting NFS directories
Fast File System (FFS) reserved space
forcible unmounts with
history of
host-based firewall for
2nd
immutable files
inetd program and
integrity-checking tools
jail() system call
2nd
kernel security levels on
modems and
mtree program
nonexecutable stack
package management commands
packaging tools
periodic security scans
permission options for
pkg (package) system
portmapper program
process accounting with
ps command
published resources on
secure terminals
server startup on
SGID and sticky bits for directories
shadow password file
SMB kernel support
spongy mounts
TCP Wrappers support
terminal security on
utmp and wtmp log files
vipw command
BSD/OS
2nd
3rd
BSDI (Berkeley Software Design, Inc.)
buffers checking boundaries
overflow attack
overruns
bugs
2nd
[See also insects, effects on hardware]3rd
Bugtraq mailing list
hacker challenges and
hardware
in Unix utilities
keeping secret
in NFS
security
software
testing for
2nd
tips on avoiding
Bugtraq mailing list
Building a Secure Computer System (Gasser, Morrie)
Building in Big Brother: The Cryptographic Policy Debate (Hoffman, Lance J.)
Building Internet Firewalls (Zwicky, Elizabeth D.; Chapman, D. Bren; Cooper, Simon)
Building Secure Software (Viega, John and McGraw, Gary)
bulk erasers
Burning Chrome (Gibson, William)
byte-by-byte comparisons
|
| |