home | O'Reilly's CD bookshelfs | FreeBSD | Linux | Cisco | Cisco Exam  



[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

O'Reilly & Associates, Inc. 
objects (LDAP) 
obscenity laws 
obscurity, security through 
octal file permissions 
octets 
Odlyzko, Andrew M. 
    "Computation of Discrete Logarithms in Prime Fields" 
oftpd server 
on-demand filtering 
one-command accounts 
one-time pad  [See codebooks]
one-time passwords  2nd  3rd  4th 
one-user workstations 
one-way hash functions  [See message digest functions]
one-way phone lines 
open access 
open accounts  2nd 
Open Software Foundation (OSF) 
open source Unix 
Open System Interconnection (OSI) 
open() system call  2nd  3rd 
OpenBSD  [See also BSD Unix]2nd  3rd 
    code reviews of 
    CVS used by 
    history of 
    sudo program 
opendir() system call 
OpenLDAP  [See LDAP]
openlog() system call 
OpenSSH  2nd 
    back door in 
    Kerberos for authentication with 
    sshd user for 
    tunneling X with 
OpenSSL  2nd 
openssl program 
operating systems  [See also specific operating systems]2nd 
    bootable copy of 
    keeping secret 
operator user 
optical vampire taps 
Orange Book 
organizations, security-related 
originate mode 
originate testing, modems 
Orwant, Jon (Programming Perl) 
OSF (Open Software Foundation) 
OSF/1 
OSI (Open System Interconnection) 
Outcome table (NIS+) 
outgoing mail, logging 
outsourcing security  2nd 
    choosing vendor for 
    deciding on services needed 
    monitoring services 
    shortage of experts for 
overflow security vulnerabilities 
overload denial of service attacks 
    accidental 
    CPU overload 
    disk attacks 
    network service overloading 
    on processes 
    soft process limits 
    swap space, running out of 
    on tmp directory 
    tree structure attacks 
overwriting media 
owners
    file permissions for 
    file, changing 
    of information