home | O'Reilly's CD bookshelfs | FreeBSD | Linux | Cisco | Cisco Exam  



[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

U.S. Secret Service (USSS) 
UDP (User Datagram Protocol)  2nd  3rd  [See also network services]
    DNS and 
    NFS protocol built on 
    TCP Wrappers support for 
UDP socket 
UFS (Unix File System)  2nd 
ufsdump  [See dump program]
UIDs (user identifiers)  2nd  3rd  4th  5th  [See also SUID programs]
    for superuser 
    real versus effective  2nd 
    and RPC requests 
    for server process 
    stored in inodes 
    su command and 
    switching temporarily 
    zero  [See root account superuser]
ulimit command 
Ultrix  2nd 
umask  2nd 
UMNT request 
UMNTALL request 
unattended terminals 
Underground (Dreyfus, Suelette) 
underscore (_), in hostnames 
Unicode 
unintended disclosure and 
uninterruptable power supply  [See UPS]
unison program 
United States
    federal computer crime laws 
    federal jurisdiction 
Universal Coordinated Time (UTC) 
Unix  [See also specific operating systems]
    add-on functionality of 
    current trends 
    deployment environments using 
    free versions of 
    history of  2nd  3rd  4th 
    installing new system 
    kernel  [See kernel]
    mobile versions of 
    open source 
    parts of 
    published resources for 
    secure versions of 
    security and  2nd 
    security policy  [See policy, security]
    servers 
    starting up 
    system database files 
    system software, updating 
    thin-client systems 
    utilities  2nd 
    versions covered in this book 
    versions of 
Unix domain socket 
Unix File System  [See UFS]
The UNIX Programming Environment (Kernighan, Brian; Ritchie, Dennis; Pike, Rob) 
Unix Support Group (USG) 
UNIX System Administration Handbook (Nemeth, Evi; Snyder, Garth; Seebass, Scott; Hein, Trent R.) 
UNIX System Security (Wood, Patrick H. and Kochan, Stephen G.) 
Unix-to-Unix Copy System (UUCP) 
unowned files 
unsecure 
unshare command 
upgrades 
    backing out of 
    logging 
    sensitive 
UPS (uninterruptable power supply)  2nd 
uptime account 
urandom device 
Usenet  [See also NNTP]
    groups, security-related 
    news user 
    reporting security holes on 
USENIX/SAGE Association 
User Datagram Protocol  [See UDP]
user IDs  [See UIDs]
usermod command
    -e option 
    -f option 
    -s option 
usernames 
    aliases for 
    doubling as passwords (Joes)  2nd 
    for superuser 
    switching temporarily 
users  [See also employees; groups; superuser]2nd 
    accidentally deleting files 
    assigning passwords to 
    auditing equipment access of 
    auditing system activity of 
    authenticating 
    backup errors of 
    effects of obscurity on 
    identifiers for  [See UIDs]
    importing to NIS server  2nd 
    as intruders 
    logging 
    monitoring 
    NIS passwords for 
    nobody  2nd 
    participation in security policy 
    power users 
    security awareness of  2nd  3rd  4th 
    security checklist for  2nd 
    security regarding 
    security threats caused by  2nd 
    sending messages to 
    summarizing filesystem usage by 
    switching temporarily 
    system 
    trusted 
users command  2nd 
USG (Unix Support Group) 
/usr directory  [See also /var directory]
    /usr/adm directory 
    /usr/bin directory 
    /usr/bin/uudecode  [See uudecode program]
    /usr/etc/yp/makedbm program 
    /usr/lib directory 
    /usr/lib/preserve program 
    /usr/lib/sendmail  [See sendmail program]
    /usr/lib/uucp/Devices file 
    /usr/lib/uucp/L-devices file 
    /usr/local/lib directory 
    /usr/sbin/rexecd  [See rexec service]
    /usr/ucb directory 
USSS (U.S. Secret Service) 
UTC (Universal Coordinated Time) 
utilities, Unix
    security vulnerabilities with 
    standard 
utimes() system call 
utmp file  2nd  3rd  4th 
utmpx file 
UUCP (Unix-to-Unix Copy System) 
uucp user 
uudecode program