[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Y]
[Z]
failures, computer
[See also bugs]2nd
Òfair useÓ provisions, copyright law
Farmer, Dan
2nd
3rd
4th
Fast File System
[See FFS] FAT filesystem
FAT32 filesystem
FBI (Federal Bureau of Investigation)
2nd
fchmod() system call
2nd
fchow() system call
Federal Bureau of Investigation (FBI)
2nd
federal jurisdiction
federal laws
Ferbrache, David (The Pathology of Computer Viruses)
FFS (Fast File System)
2nd
3rd
FG (Frame Ground)
fget() system call
fgets() system call
fiber optic cables
FIFO file type
file command
file descriptors
file handles
2nd
File Transfer Protocol
[See FTP] filenames, attacks through
files
2nd
access times of
append-only
backing up
[See backups] beginning with dash, deleting
byte-by-byte comparisons of
change time
changing owner of
checklists for comparing
checksums detecting changes in
context-dependent (CDFs)
core
critical, backing up
critical, deleting
deleted accidentally
deleted as destructive attack
detecting changes to
device
format of, monitoring
group for
group-writable
hidden
2nd
history
immutable
information about (metadata)
inodes storing information about
integrity of
[See integrity] locating largest
locking
mandatory
log
[See log files] magic number in
metadata, comparing
modification times of
2nd
3rd
4th
modified by intruders
2nd
owner of
permissions for
[See permissions] security checklist for
SGID bit on
signatures detecting changes in
startup
[See startup files] SUID/SGID, finding
swapping to
system configuration
system database
system startup
Trojan horses in
trusted computing base (TCB) of
types of
2nd
unlinked, hidden space used by
unowned
which to back up
world-writable
zero-filled bytes (holes) in
filesystems
[See also directories]2nd
Cryptfs
cryptographic
2nd
encrypted
Fast File System
journaling
list of, available on Unix
mounted
network
2nd
[See also NFS; SMB] remote network
replicated (RAID)
reserved space on
restricted
security checklist for
2nd
summarizing usage per user
superuser control of
UFS
virtual filesystem interface
filter files (mail)
filtering software
2nd
filtering, on-demand
find command -0 option
-ls option
-size option
attacks on
-H option
-print option
type -f option
-xdev option
finger account
finger command
2nd
3rd
4th
disabling
finding contact information with
login times displayed by
running when not logged in
finger service
fingerd program
2nd
[See also Internet worm program] fingerprint of files or keys
[See message digest functions] Fingerprints Database
fire
2nd
3rd
firewalls account aliases and
host-based program
2nd
IP networks
kernel-level
mailing list for
nameservers and
for NIS sites
packet-level
portmapper program and
standalone appliance for
stateful inspection of
telephone
verifying proper operation of
Firewalls and Internet Security (Bellovin, Steve and Cheswick, Bill)
Firewire-based disk drive
FIRST (Forum of Incident Response and Security Teams)
2nd
3rd
flooding, client
floors, raised, access through
folders
[See directories links] fonts used in this book
food, effects on hardware
forensics
2nd
[See also logging] security checklist for
fork bombs
fork() system call
2nd
Forrester, Justin
Forum of Incident Response and Security Teams
[See FIRST] .forward file
2nd
Frame Ground (FG)
fraud
Fredricksen, Lars ("An Empirical Study of the Reliability of UNIX Utilities")
Free Software Foundation (FSF)
FreeBSD
2nd
[See also BSD Unix]3rd
4th
ACL support for
bug fixes, responsibility for
2nd
Cryptfs support for
CVS used by
history of
2nd
host-based firewall for
kernel security levels on
master password file
PAM support for
password file, printing
S/Key support
source-based management systems
su log
sulog, scanning
Freedman, David H. (@ Large)
fscanf() system call
fsck program
2nd
FSF (Free Software Foundation)
FSINFO function (RPC)
fsirand program
2nd
FSSTAT function (RPC)
fstab file
2nd
fstat() system call
FSUID (filesystem UID)
FTP (File Transfer Protocol)
2nd
3rd
active mode
allowing without logging in
anonymous
2nd
3rd
bounce attack
chroot() system call and
~ftp/bin directory
~ftp/etc directory
~ftp/pub directory
passive mode
restricted filesystems and
restricting accounts with
setting up server
ftp user
ftpd server
2nd
3rd
4th
ftpusers file
ftruncate() system call
The Fugitive Game: Online with Kevin Mitnick (Littman, Jonathan)
full backup
function keys, passwords programmed to
functionality, add-on
Fundamentals of Computer Security Technology (Amoroso, Edward)
Fuzz program tests
|
| |