home | O'Reilly's CD bookshelfs | FreeBSD | Linux | Cisco | Cisco Exam  



[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

MAC (Mandatory Access Controls)  2nd 
Mac OS X  2nd  [See also BSD Unix]
    history of 
    host-based firewall for  2nd 
    kernel security levels on 
    NetInfo 
    password database 
    password file, printing 
    S/Key support 
    server startup on 
    SMB support 
    sudo program  2nd 
    TCP Wrappers support 
Mach kernel 
machine name 
macro virus  [See viruses]
MACs (message authentication codes)  2nd  3rd 
magic cookies 
magic number 
magnetic tapes  [See tapes]
mail  [See email]
MAIL command, SMTP 
mail handler (MH) 
mail systems  [See MTAs]
mail user 
Mail_Aliases table (NIS+) 
mailboxes  [See email]
mailing lists, security-related 
mailq command 
main.cf file 
maintenance mode 
maintenance personnel, security regarding 
makedbm program 
malicious code  [See programmed threats]
malware  [See programmed threats]
man-in-the-middle attack 
management
    participation in security policy 
    role of  2nd  3rd 
Manasse, M. S. ("The Number Field Sieve") 
Mandatory Access Controls  [See MAC]
mandatory filtering software 
mandatory record locking 
Mann, Charles C. (@ Large) 
manpages 
MANs (metropolitan area networks) 
manuals
    reading 
    restricting availability of 
maps, NIS  [See NIS]
Markoff, John
    Cyberpunk: Outlaws and Hackers on the Computer Frontier 
    Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw -- By the  
master password file 
master server  2nd  [See also NIS]
master.passwd file  2nd 
MCF (Modular Crypt Format) 
McGraw, Gary (Building Secure Software<Default Para Font) 
McKusick, Marshall Kirk (The Design and Implementation of the 4.4 BSD UNIX Operating System) 
MD2 functions 
MD4 functions 
MD5 algorithm  2nd 
MD5 cryptographic checksum 
MD5 functions 
media
    backing up to  [See backups]
    destroying  2nd 
    failure of, for backups 
    overwriting 
    print through process 
    printed  2nd  3rd 
    read-only 
    rotating for backups 
    sanitizing 
    tapes  2nd 
    upgrading 
    viruses from 
    write-once, logging to 
meet-in-the-middle plaintext attacks 
memory, swap space, running out of 
Merkle, Ralph
    "Hiding Information and Signatures in Trap Door Knapsacks" 
    "On the Security of Multiple Encryption" 
    "Secure Communication Over Insecure Channels" 
Merkle, Robert 
message authentication codes  [See MACs]
message digest functions  2nd 
    applications of  2nd 
    attacks on 
    checksums generated with 
    HMAC 
    Tripwire package and 
message flooding 
Message Transfer Agents  [See MTAs]
Message User Agents (MUA) 
messages file  2nd  3rd  [See also syslog file]4th  5th 
metadata  2nd 
Metcalf, Bob 
"A Method for Obtaining Digital Signatures" (Rivest, Ron; Shamir, A.; Adleman, L.) 
metropolitan area networks (MANs) 
MH (mail handler) 
Miller, Barton P.  2nd 
    "An Empirical Study of the Reliability of UNIX Utilities" 
Minix operating system 
mirror sites 
mirrored disks and servers 
MIT Kerberos  [See Kerberos system]
MIT-KERBEROS-5 authentication 
Mitnick, Kevin  2nd 
MKDIR function (RPC) 
mknod command 
MKNOD function (RPC) 
mkpasswd program 
mkstemp() system call 
MLS (Multilevel Security) environment 
MNT request 
mobile Unix systems 
mode bits  [See permissions]
modems 
    answer mode 
    banners displayed by 
    baud 
    bps (bits per second) 
    callback schemes and  2nd 
    Caller-ID and  2nd 
    clogging 
    connecting 
    current trends for use of 
    eavesdropping and 
    encrypting 
    hanging up with SIGHUP 
    initiating calls with 
    one-way phone lines used by 
    originate mode 
    password 
    phone numbers for, changing 
    physical security of 
    reasons to use 
    recording call information 
    RS-232 serial protocol used by 
    security and  2nd 
    security checklist for 
    serial interfaces used by 
    telephone scanning and firewalls for 
    testing 
    tracing connections 
    unauthorized 
    Unix devices for 
modification times, files  2nd 
Modular Crypt Format (MCF) 
Mona Lisa Overdrive (Gibson, William) 
monitoring  [See also logging]2nd 
monitoring services 
Morris, Robert H.  2nd 
    "UNIX Operating System Security" 
Morris, Robert T. 
motion detectors 
mount command  2nd  3rd 
MOUNT protocol 
mountd daemon 
mounted filesystems 
mrand48() system call 
MSDOS filesystem 
MTAs (Message Transfer Agents) 
mtime  2nd  3rd  4th 
mtree program 
MUA (Message User Agents) 
Muddleftpd server 
MUDs (Multiuser Dungeons/Dimensions) 
Muffet, Alec  2nd 
multicast groups 
MULTICS (Multiplexed Information and Computing Service) 
multilevel security (defense in depth)  2nd  3rd 
multitasking 
multithreaded programming 
Multiuser Dungeons/Dimensions (MUDs) 
multiuser operating systems 
multiuser, shared systems 
MX record type