home | O'Reilly's CD bookshelfs | FreeBSD | Linux | Cisco | Cisco Exam  



[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

S/Key codebook scheme 
S/MIME 
sa command 
sabotage 
saboteurs  [See intruders]
safe shutdown, accounts for 
SafeTP 
Safeware: System Safety and Computers. A Guide to Preventing Accidents and Losses Caused by Technolo 
salt 
Saltzer, Jerome 
Samba  2nd  [See also SMB]3rd 
    authorization 
    client security 
    configuring 
    data integrity 
    security and 
    server connections 
    user authentication 
sanitizing media 
SANS (Systems Administration and Network Security)  2nd 
SANTA (Security Administrator Network Tool for Analysis) 
SASL (Simple Authentication and Security Layer) 
SATAN (Security Administrator Tool for Analyzing Networks)  2nd 
savacct file 
saved UIDs 
sbrk() system call 
SC Magazine (InfoSecurity News) 
scanf() system call 
scanners, telephone 
SCCS (Source Code Control System) 
Schales, Doug 
Schiller, Jeffrey  2nd 
Schneier, Bruce 
    Applied Cryptography: Protocols, Algorithms, and Source Code in C 
    Secrets and Lies: Digital Security in a Networked World 
Schroeder, M. D. 
Schwartz, Randal L. (Learning Perl) 
scp program 
screensavers
    back doors to 
    password-protected 
script command, logging break-ins with 
SE Linux (Security Enhanced Linux) 
secrecy  [See confidentiality]
secret key algorithms  [See symmetric key algorithms]
secret keys  2nd  3rd  4th 
Secret Service, U.S. 
Secrets and Lies: Digital Security in a Networked World (Schneier, Bruce) 
Secure European System for Applications in a Multivendor Environment (SESAME) 
secure file 
Secure Hash Algorithms (SHA) 
Secure NFS 
Secure RPC 
    authentication 
    limitations of 
    logging in/out with 
    NFS using 
    NIS+ using  2nd 
    with NIS/NIS+ 
    and NTP 
Secure Shell  [See SSH]
Secure Sockets Layer  [See SSL]
secure terminals  2nd 
Secure Tracking of Office Property (STOP) 
secure Unix systems 
SecureID card 
securenets file 
securetty file 
security 
    breaches, responding to  [See break-ins]
    design principles for 
    history of 
    laws and  [See legal issues]
    mailing lists regarding 
    organizations regarding 
    outsourcing 
    policy of  2nd  3rd 
    published resources on 
    responsibility for 
    risks  [See risks]
    simplified in four steps 
    software for  2nd 
    through obscurity  2nd 
    types of 
    Unix and 
    Usenet groups regarding 
    web sites regarding 
security account 
Security Administrator Network Tool for Analysis (SANTA) 
Security Administrator Tool for Analyzing Networks  [See SATAN]
Security Alert Consensus mailing list 
Security Engineering (Anderson, Ross) 
Security Enhanced Linux (SE Linux) 
security experts, shortage of 
security holes  [See also back doors; threats]
    preserve program 
    reporting 
    superuser account 
Security in Computing (Pfleeger, Charles P.) 
security levels, kernel 
security response teams  [See response teams]
security scanners 
security tools
    published resources on 
    used as programmed threats  2nd 
sed scripts, Trojan horses in 
Seebass, Scott (UNIX System Administration Handbook) 
seeds, random number  2nd 
Seger, Karl (Computer Crime: A Crimefighter's Handbook) 
select() system call 
self-destruct sequences 
sendmail program  2nd  3rd  4th  [See also email]
    .forward file  2nd 
    aliases 
    back door in 
    configuration files, security and 
    disabling mail delivery to programs 
    DontBlameSendmail option 
    finding system administrator using 
    .forward file 
    options, security 
    run as daemon 
    same Internet/NIS domain 
    security problems with 
    startup file attacks 
sendmail.cf file  2nd 
sendmail.mc file 
separation of duties principle 
sequence of commands 
ser2net program 
serial interfaces 
Serial Line Internet Protocol  [See SLIP]
serial numbers, logging 
serial ports, uucp user for 
Server Message Block  [See SMB]
server statelessness 
server vulnerability attacks 
server-side NFS security 
servers  2nd 
    backing up 
    bringing up securely 
    Internet  [See Internet servers]
    load shedding 
    master/slave  [See NIS]
    nameserver  [See DNS]
    overloading with requests 
    physical security of  [See physical security]
    run as root 
    setting up for FTP 
    Xauthority 
service overloading 
services  [See denial of service attacks network services]
services file  2nd  3rd 
Services table (NIS+) 
SESAME (Secure European System for Applications in a Multivendor Environment) 
session hijacking 
session IDs  2nd 
session keys  2nd 
SETATTR function (RPC) 
setgid() system call  2nd  [See also SGID programs]3rd 
setlogmask() system call 
setpgrp() system call 
setrlimit() system call 
setsid() system call 
setuid file 
setuid() system call  [See also SUID programs]2nd 
SG (Signal Ground) 
SGID bit 
    clearing with chown command 
    on directories 
    on files 
SGID permission 
SGID programs 
    created by intruders 
    disabling (turning off) 
    finding all files for 
    security problems with 
    writing 
sh (Bourne shell)  [See also shells]
    IFS variable used by 
    prompt 
    SUID version of 
SHA (Secure Hash Algorithms) 
SHA-1 algorithm 
shadow file  2nd  3rd  4th  5th 
shadow passwords  2nd  3rd  4th 
Shamir, Adi 
    "A Method for Obtaining Digital Signatures" 
share command 
shared libraries, protecting 
shared systems 
sharetab file 
shareware, viruses in 
SHARITY client 
shell escapes  2nd 
shell scripts, SUID 
shell service 
shells 
    changing for one-time passwords 
    history files 
    in passwd file 
    login, changing 
    protecting from attacks 
    restricted 
    running 
    Trojan horses in 
shells file 
Shender, Alex 
Shimomura, Tsutomu (Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Comput 
Shockwave Rider (Brunner, John) 
shoulder surfing 
showmount command  2nd 
showrev command 
shredders, paper 
shutdown command 
shutdowns
    logged by wtmp file 
    safe 
        accounts for 
SIGHUP signal 
SIGKILL signal 
Signal Ground (SG) 
signal-grounding attacks 
signals 
    catching 
    kill command and 
signatures, data  [See also digital signatures]
    detecting file changes with  2nd 
    RPM files having 
SIGSTOP signal  2nd 
SIGTERM signal  2nd  3rd 
Simple Authentication and Security Layer (SASL) 
Simple Mail Transfer Protocol  [See SMTP]
Simple Network Management Protocol (SNMP) 
Singh, Simon (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography) 
single-user mode
    booting in 
    upgrading in 
single-user reboot 
site inspection, example of 
slash (/)
    as IFS separator 
    pathnames beginning with 
slave server  [See also NIS]2nd 
SLIP (Serial Line Internet Protocol)  2nd 
SMB (Server Message Block)  2nd 
    authentication 
    file access for 
    history of 
    name service for 
    protocols for 
    Samba implementation of  [See Samba]
smb.conf file  2nd 
smbclient 
smbpasswd program 
smoke detectors 
smoke, damaging hardware 
smoking, effects on hardware 
SMTP (Simple Mail Transfer Protocol)  2nd 
    banners, security and 
    commands, security and 
    relaying 
    security and  2nd 
    TLS for encryption with  2nd 
smtp service 
SNA (System Network Architecture) 
sniffers  2nd  [See also eavesdropping]
    network 
    packet  2nd 
    password  2nd  3rd 
SNMP (Simple Network Management Protocol)  2nd 
snoop program  2nd 
Snort system 
snprintf() system call 
Snyder, Garth (UNIX System Administration Handbook) 
So, Bryan ("An Empirical Study of the Reliability of UNIX Utilities") 
social engineering attacks  2nd 
socket
    UDP 
    Unix domain 
SOCKS 
socks service 
soft process limits 
software  [See also programming]
    access to  2nd 
    backing up  [See backups]
    backups 
    bugs in  2nd 
    checking new  2nd 
    coding standards for 
    consistency of 
    copyrighted, legal issues regarding 
    data corruption by 
    default accounts for 
    design principles for 
    development files, protecting 
    digital signatures distributed with 
    distributed through mirror sites 
    documentation for 
    filtering, for schools 
    hacker challenges and 
    integrity-checking 
    log files created by 
    malicious  [See programmed threats]
    management systems 
    monitoring 
    obtained from outside sources  2nd 
    operating systems  [See specific operating systems]
    patches for, logging 
    processes and 
    published resources on 
    quality of 
    race conditions 
    running as superuser 
    security bugs in 
    security-related  2nd 
    specifications, importance of 
    stolen (pirated)  2nd 
    stored via FTP 
    system, updating 
    testing  2nd 
    threads and 
    toolkit for break-ins 
    tools in Unix 
    trusting 
Solaris  2nd  [See also System V Unix]
    ACL support for 
    AUTH_SYS and AUTH_UNIX 
    bug fixes, responsibility for 
    clri command 
    Cryptfs support for 
    Door construct  2nd 
    exporting NFS directories with 
    extra file permission character 
    Fingerprints Database 
    group passwords and 
    history of 
    host-based firewall for 
    Kerberos client and server support 
    Kerberos client for 
    loginlog file 
    mountd daemon 
    ncheck command 
    nonexecutable stack 
    package management commands 
    PAM support for 
    passwd command, -r option supported 
    password file, printing 
    portmon variable 
    process limit 
    random number generators 
    rpcbind program  2nd 
    S/Key support 
    Secure RPC time window 
    secure version of 
    server startup on 
    SGID and sticky bits for directories 
    SGID bit used for file locking 
    shadow password file 
    SMB support 
    snoop program 
    su log, scanning 
    swapping to files 
    TCP wrappers support 
    ttywatch program 
    ufsdump program 
    versions of 
    wtmpx log file 
    X security 
Solstice PC-NetLink 
Source Code Control System (SCCS) 
source code, keeping secret  2nd  [See also programming; software]
source-based software management systems 
    backing out of upgrades 
    upgrading with 
space bit 
spaces, in passwords 
Spaf's first principle 
Spafford, Gene  2nd  3rd  4th  5th  6th 
spam, email  2nd  3rd 
sparse files 
Speciner, Mike (Network Security: Private Communications in a Public World) 
spies
    industrial 
    planting programmed threats 
spoofing
    IP  2nd 
    network connection 
sprinkler systems 
sprintf() system call  2nd 
square brackets ([]), indicating optional syntax 
sscanf() system call 
ssh keys, using for passwords 
ssh program  2nd  3rd 
SSH protocol 
    client authentication with 
    host authentication with 
    tunneling X with 
ssh service 
.ssh/authorized_keys file 
    back door in 
.ssh/known_hosts file 
ssh_config file 
sshd binary, back door in 
sshd user 
sshd_config file  2nd 
SSL (Secure Sockets Layer)
    attacks on 
    MD5, use of 
SSL/TLS  2nd 
staff  [See employees]
stale file handles 
Stallings, William (Cryptography and Network Security: Principles and Practices) 
Stallman, Richard  2nd  3rd 
standalone firewall appliance 
standards, security policy  2nd 
Starnes, W. Wyatt 
start bit  2nd 
startup command 
startup files 
    attacks through 
    modified by intruders 
stat command 
stateful inspection, firewalls 
stateless servers (NFS)  2nd 
static electricity 
static links 
Steele, Guy L., Jr. (C, a Reference Manual) 
Sterling, Bruce (The Hacker Crackdown: Law and Disorder on the Electronic Frontier) 
sticky bit permission 
sticky bits 
    clearing with chown command 
    on directories 
Stoll, Cliff (The Cuckoo's Egg) 
STOP (Secure Tracking of Office Property) 
stop bit  2nd 
storage, local 
strcat() system call 
strcpy() system call  2nd 
streadd() system call 
stream algorithms 
strecpy() system call 
Stripp, Alan (Code Breakers: The Inside Story of Bletchley Park) 
strncat() system call 
strncpy() system call 
strtrns() system call 
students, programmed threats authored by 
stunnel 
su command  2nd 
    becoming superuser with  2nd 
    log of failed attempts 
    logging by 
    logging to sulog file 
    restrictions on 
    running commands from scripts 
    running with exec command 
    security precautions for 
    sudo program as alternative to 
    using while superuser 
    utmp and wtmp files and 
su file 
subnetting 
substitution ciphers 
sudo program  2nd 
sudoers file 
SUID bit  2nd 
SUID permission 
SUID programs  2nd 
    back door via 
    chroot() system call and 
    created by intruders 
    disabling (turning off) 
    finding all files for 
    security problems with  2nd 
    shell scripts 
    writing 
sulog file  2nd  3rd  4th 
sum command 
Sun NIS  [See NIS]
Sun NIS+  [See NIS+]
Sun RPC  [See RPC]
SUN-DES-1 authentication 
SunOS
    history of 
    SGID and sticky bits for directories 
    trusted hosts and 
    unlink command 
    versions of 
SunRay systems 
sunrpc service  2nd 
Superincreasing Knapsack Problem 
superuser  2nd 
    abilities of 
    becoming with su command  2nd  3rd 
    becoming with SUID csh 
    bugs giving access to 
    capabilities of 
    changing file group 
    changing file owner 
    changing file permissions 
    changing file times 
    changing system clock 
    changing user passwords  2nd 
    compartmentalization as alternative to 
    fingering 
    kermit program and 
    logging attempts to become  [See sulog file]
    MAC systems not having 
    modem devices owned by 
    nameserver owned by 
    NFS ownership 
    NFS protocol and 
    NTP running as 
    password for 
        forgetting 
    as point of attack 
    Posix P1003.1e/2c restrictions for 
    privileges removed by secure Unix 
    programs running as 
    prompt for 
    protecting account for 
    restricting abilities of 
    restrictions on  2nd 
    Samba daemons run as 
    security checklist for 
    security implications of 
    security precautions for  2nd 
    security problems with 
    sendmail running as 
    servers run as 
    stealing 
    SUID scripts run as 
    Trojan horse compromising 
    UID for 
    username for 
    using passwd command 
    using privileges with sudo command 
    wheel group and  2nd 
suppliers  [See vendors]
surge suppressors 
SVR4 Unix  [See also System V Unix]
    chroot() system call and 
    expiring accounts 
    group passwords and 
    history of 
    password aging 
    preventing users from changing passwords 
    process accounting with 
    restricting root account to console 
    shadow password file 
    wtmp file, viewing 
swap partition 
swap space, running out of 
swapping 
Swatch program  2nd 
sweeping telephone lines 
symbolic links  [See also links]
    avoiding in restricted filesystems 
    permissions and 
    read-only partitions and 
SYMLINK function (RPC) 
symmetric key algorithms 
    attacks on 
    block algorithms 
    common types of 
    cryptographic strength of 
    key length and  2nd 
    security problems with 
    stream algorithms 
    verifying with peer review 
SYN bit 
SYN flood attacks  2nd 
sync account 
sync command 
sync() system call 
synchronization of passwords 
sysadmsh program 
sysctl command 
syslog facility  2nd  3rd 
    alternatives to 
    argument length checked by 
    buffer overruns in 
    configuration file 
    false log entries 
    files used by 
    library for 
    list of facilities in 
    messages generated by 
    in networked environment 
    priorities for 
    programming with 
    where to log 
syslog file  2nd 
syslog service 
syslog.conf file  2nd 
syslogd file 
systat service 
system  [See also specific operating systems]
    auditing activity on 
    backing up critical files 
    configuration files 
    CPU overload attacks 
    database files 
    safe shutdown  2nd 
    startup files 
    trust in 
system administrator  [See also superuser]
    adm account for 
    blocking system accounts from 
    changing password for 
    cooperating with intruders 
    errors by 
    listed in wheel group 
    mail aliases for 
    published resources for 
    remote, contacting regarding break-in 
    sanitizing backup tapes 
    setting umask 
    sudo program used by multiple administrators 
    trusting 
system calls  [See also specific system calls]
    checking arguments to 
    checking return codes from 
    failures of 
    format used in book 
system clock
    changing 
    for random seeds 
    Secure RPC timestamp 
    sudden time changes in 
    synchronizing 
system files
    initialization files 
    read-only access to 
    world-writable 
system libraries, protecting 
system manuals  [See manuals]
System Network Architecture (SNA) 
system software, updating 
system users 
System V Unix  2nd  [See also Linux; Solaris; SVR4 Unix]
    chroot() system call and 
    default umask value 
    device file permissions 
    exporting NFS directories 
    FIFO file type 
    history of 
    inittab program 
    loginlog file 
    logins recorded in lastlog 
    modems and 
    password files 
    password generators 
    permission options for 
    process accounting with 
    ps command 
    published resources for 
    random number generators 
    Release 4  [See SVR4 Unix]
    server startup on 
    SGID bit on files 
    su command and 
    sulog file settings 
    terminal security on 
    utmp and wtmp log files 
    wtmpx log file 
system() system call  2nd  3rd 
Systems Administration and Network Security  [See SANS]
systems-based crytpographic attacks