[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Y]
[Z]
VA Linux
vacation program
vampire taps
vandalism
vandals, computer
[See intruders] /var directory
[See also /usr firectory]2nd
/var/adm directory
/var/adm/acct file
/var/adm/lastlog file
/var/adm/loginlog file
/var/adm/messages file
/var/adm/savacct file
/var/adm/wtmp file
/var/log directory
variables, bounds checking
Varley, John (Press Enter)
VC-I video encryption algorithm
vendors security access given to
all-in-one contracts
corporate stability of
evaluating employees of
experience of
hackers as
mailing lists for
referrals and references for
trusting
software loss of
trusting
2nd
Venema, Wietse
2nd
3rd
4th
5th
6th
7th
ventilation access through
holes (in hardware)
VERB command, SMTP
vfork() system call
vfstab file
vi editor
2nd
3rd
vibrations, effects on hardware
Viega, John (Building Secure Software)
Vinge, Vernor (True Names and Other Dangers)
vipw command
virtual filesystem interface
Virtual Light (Gibson, William)
virtual nodes
Virtual Private Network (VPN)
The Virus Bulletin
viruses
2nd
on distribution disk
email
published resources on
visitors, security regarding
vnode interface
[See virtual filesystem interface] vold.log file
voltage spikes
[See power, surges] VonStorch, William (Computer Crime: A Crimefighter's Handbook)
VPN (Virtual Private Network)
VRFY command, SMTP
2nd
3rd
vsnprintf() system call
vsprintf() system call
2nd
vsyslog() system call
|
| |
|