home
|
O'Reilly's CD bookshelfs
|
FreeBSD
|
Linux
|
Cisco
|
Cisco Exam
[
SYMBOL
] [
A
] [
B
] [
C
] [
D
] [
E
] [
F
] [
G
] [
H
] [
I
] [
J
] [
K
] [
L
] [
M
] [
N
] [
O
] [
P
] [
Q
] [
R
] [
S
] [
T
] [
U
] [
V
] [
W
] [
X
] [
Y
] [
Z
]
O'Reilly & Associates, Inc.
objects (LDAP)
obscenity laws
obscurity, security through
octal file permissions
octets
Odlyzko, Andrew M.
"Computation of Discrete Logarithms in Prime Fields"
oftpd server
on-demand filtering
one-command accounts
one-time pad
[See codebooks]
one-time passwords
2nd
3rd
4th
one-user workstations
one-way hash functions
[See message digest functions]
one-way phone lines
open access
open accounts
2nd
Open Software Foundation (OSF)
open source Unix
Open System Interconnection (OSI)
open() system call
2nd
3rd
OpenBSD
[See also BSD Unix]
2nd
3rd
code reviews of
CVS used by
history of
sudo program
opendir() system call
OpenLDAP
[See LDAP]
openlog() system call
OpenSSH
2nd
back door in
Kerberos for authentication with
sshd user for
tunneling X with
OpenSSL
2nd
openssl program
operating systems
[See also specific operating systems]
2nd
bootable copy of
keeping secret
operator user
optical vampire taps
Orange Book
organizations, security-related
originate mode
originate testing, modems
Orwant, Jon (Programming Perl)
OSF (Open Software Foundation)
OSF/1
OSI (Open System Interconnection)
Outcome table (NIS+)
outgoing mail, logging
outsourcing security
2nd
choosing vendor for
deciding on services needed
monitoring services
shortage of experts for
overflow security vulnerabilities
overload denial of service attacks
accidental
CPU overload
disk attacks
network service overloading
on processes
soft process limits
swap space, running out of
on tmp directory
tree structure attacks
overwriting media
owners
file permissions for
file, changing
of information