Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: P
- passwd command (Unix): 3.3.2.1. Unix account creation and deletion routines
- Passwd\:\:Solaris module: 3.1.4. Shadow Passwords
- password field (Unix): 3.1.1. The Classic Unix Password File
- password files
- BSD 4.4: 3.1.3. Binary Database Format in BSD 4.4
- shadow: 3.1.4. Shadow Passwords
- Unix: 3.1.1. The Classic Unix Password File
- passwords
- program for setting/changing: 10.5. Preventing Suspicious Activities
- security and: 10.5. Preventing Suspicious Activities
- Unix: 3.3.2.1. Unix account creation and deletion routines
- Windows NT/2000: 3.2.3. NT/2000 Passwords
- PDUs (protocol data units): E. The Twenty-Minute SNMP Tutorial
- Perl
- advantages/disadvantages of: 1.2. How Perl Can Help
- databases
- managing logins: 7.5. Database Logins
- monitoring from: 7.6. Monitoring Server Health
- DBI, using: 7.2. Using the DBI Framework
- disk quotas, editing: 2.5.1. Editing Quotas with edquota Trickery
- DNS, querying
- Net\:\:DNS: 5.3.2.3. Using Net::DNS
- nslookup: 5.3.2.1. Using nslookup
- raw sockets: 5.3.2.2. Working with raw network sockets
- edquota command, calling: 2.5.1. Editing Quotas with edquota Trickery
- email
- dissecting mailboxes/messages: 8.3.1. Dissecting a Single Message
- sending: 8.1. Sending Mail
- filesystems, dealing with differences in: 2.2.5. Dealing with Filesystem Differences from Perl
- functions, detecting file changes: 10.1.1. Local Filesystem Changes
- host files, reading: 5.1. Host Files
- LDAP
- modifying entries: 6.4.8. Modifying Entry Names
- programming: 6.4.1. LDAP Programming with Perl
- LDIF, reading/writing: 6.4.5. Adding Entries with LDIF
- log files
- analyzing: 9.5. Log Analysis
- rotating: 9.4.1. Log Rotation
- scanning: 9.1. Text Logs
- using unpack(): 9.2.1. Using unpack( )
- modules (see modules)
- networks, pinging/sniffing: 10.4.1. Perl Saves the Day
- NIS, querying: 5.2. NIS, NIS+, and WINS
- ODBC, using: 7.3. Using the ODBC Framework
- repositories: 1.5. Locating and Installing Modules
- security of: 1.6. It's Not Easy Being Omnipotent
- SNMP, using: 10.3.1. Using SNMP from Perl
- spam, finding source of: 8.3.3. Tracking Down Spam
- SQL commands, sending: 7.3. Using the ODBC Framework
- SQL databases, documenting: 7.4. Server Documentation
- SQL Server, interacting with: 7.1. Interacting with an SQL Server from Perl
- SYN attacks, detecting: 10.4.1. Perl Saves the Day
- system administration, as language for: 1.2. How Perl Can Help
- using Finger: 6.2. Finger: A Simple Directory Service
- using WHOIS: 6.3. The WHOIS Directory Service
- using WMI: 4.2.4. Using Window Management Instrumentation (WMI)
- Perl Package Manager (see PPM)
- placeholders, DBI: 7.2. Using the DBI Framework
- Poison Null Byte exploit: 1.6.3. Be Careful When Reading Data
- PPM (Perl Package Manager): 1.5. Locating and Installing Modules
- 1.5.2. Installing Modules on Win32
- printers, managing with ADSI: 6.5.11. Working with Print Queues and Print Jobs via ADSI
- privileges: 1.6.2. Drop Your Privileges as Soon as Possible
- 1.6.2. Drop Your Privileges as Soon as Possible
- dropping: 1.6.2. Drop Your Privileges as Soon as Possible
- /proc filesystem: 4.3.3. Using the /proc Filesystem
- process control
- Mac OS: 4.1. MacOS Process Control
- Unix: 4.3. Unix Process Control
- Windows NT/2000: 4.2. NT/2000 Process Control
- process handles: 4.2.2. Using the Win32::IProc Module
- processes: 4. User Activity
- DLLs used by: 4.2.2. Using the Win32::IProc Module
- executables used by: 4.2.2. Using the Win32::IProc Module
- killing
- Unix: 4.3.4. Using the Proc::ProcessTable Module
- Windows NT/2000: 4.2.1. Using the Microsoft Resource Kit Binaries
- 4.2.3. Using the Win32::Setupsup Module
- listing
- Mac: 4.1. MacOS Process Control
- Unix: 4.3. Unix Process Control
- Windows NT/2000: 4.2.1. Using the Microsoft Resource Kit Binaries
- 4.2.3. Using the Win32::Setupsup Module
- windows open, interacting with: 4.2.3. Using the Win32::Setupsup Module
- procmail program: 3.3.4. Account System Wrap-Up
- Proc\:\:ProcessTable module: 4.3.4. Using the Proc::ProcessTable Module
- programming, secure: 1.6. It's Not Easy Being Omnipotent
- programs
- for setting/changing passwords: 10.5. Preventing Suspicious Activities
- password-cracking: 10.5. Preventing Suspicious Activities
- properties, interface-/schema-defined: 6.5.1. ADSI Basics
- protocol data units (PDUs): E. The Twenty-Minute SNMP Tutorial
- providers (ADSI): 6.5.1. ADSI Basics
- ps program (Unix): 4.3.1. Calling an External Program
- pulist.exe (Windows NT/2000): 4.2.1. Using the Microsoft Resource Kit Binaries
- pwd_mkdb command (BSD 4.4): 3.1.3. Binary Database Format in BSD 4.4
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2001
O'Reilly & Associates, Inc.
All Rights Reserved.
|