Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: C

C configuration command
sendmail, 5.3.5. Class Macros
sendmail, 12.1.1. Declaring a Class
sendmail, 12.1.6. Add Class w to client.cf
sendmail, 14.6. Trusted User
sendmail, 32.1. Class Configuration Commands
sendmail, 32.1.1. The C Class Command
c flag : sendmail, 30.8. Alphabetized F= Flags
C flag
sendmail, 30.7. Pitfalls
sendmail, 30.8. Alphabetized F= Flags
C line (qf file) : sendmail, 23.9. The qf File Internals
$c macro : sendmail, 31.10. Alphabetized Reference
$C macro : sendmail, 31.10. Alphabetized Reference
c option : (see HoldExpensive (c) option)
C option : (see CheckpointInterval (C) option)
C programming language
Practical UNIX & Internet Security, 1.3. History of UNIX
Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
-Wall compiler option : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
.C rule-testing command : sendmail, 38.2.2. Add to a Class with .C
C shell : (see csh)
-c switch (sendmail) : sendmail, 36.7. Alphabetized Reference
-C switch (sendmail)
sendmail, 5.2. The Minimal File
sendmail, 15.2. The Real Queue Directory
sendmail, 36.7. Alphabetized Reference
C2 audit : Practical UNIX & Internet Security, 10.1. The Basic Log Files
C= equate : sendmail, 30.4. The Equates
cable tester
TCP/IP Network Administration, 11.2. Diagnostic Tools
TCP/IP Network Administration, 11.3.1. The ping Command
TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
cables
Category 5 : TCP/IP Network Administration, 11.4.4. Subdividing an Ethernet
checking
TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
TCP/IP Network Administration, 11.4.4.1. Network hardware problems
network
Practical UNIX & Internet Security, 12.2.4.2. Network cables
Practical UNIX & Internet Security, 12.3.1.5. Fiber optic cable
Practical UNIX & Internet Security, 12.3.1.1. Wiretapping
cutting : Practical UNIX & Internet Security, 25.1. Destructive Attacks
wiretapping : Practical UNIX & Internet Security, 12.3.1.1. Wiretapping
Unshielded Twisted Pair (UTP) : TCP/IP Network Administration, 11.4.4. Subdividing an Ethernet
caching
Practical UNIX & Internet Security, 5.6. Device Files
TCP/IP Network Administration, 3.3. Domain Name Service
corruption : TCP/IP Network Administration, 11.6.3. Cache corruption
initialization file : TCP/IP Network Administration, 8.3.3. The Cache Initialization File
MX records : sendmail, 21.3.6. Caching MX Records
nameserver : Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
servers : sendmail, 21.1. Overview
single answers : TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
statement
TCP/IP Network Administration, 8.3.1.1. Configuring a caching-only nameserver
TCP/IP Network Administration, C.2. named.boot Configuration Commands
caching-only servers
TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
TCP/IP Network Administration, 8.1.1. BIND Configurations
TCP/IP Network Administration, 8.3.1.1. Configuring a caching-only nameserver
Caesar Cipher : Practical UNIX & Internet Security, 6.4.3. ROT13: Great for Encoding Offensive Jokes
calculating costs of losses : Practical UNIX & Internet Security, 2.3.1. The Cost of Loss
call forwarding : Practical UNIX & Internet Security, 14.5.4. Physical Protection of Modems
Call Trace : Practical UNIX & Internet Security, 24.2.4. Tracing a Connection
CALLBACK= command : Practical UNIX & Internet Security, 15.5.2. Permissions Commands
callbacks
Practical UNIX & Internet Security, 14.4.2.
Practical UNIX & Internet Security, 14.6. Additional Security for Modems
BNU UUCP : Practical UNIX & Internet Security, 15.5.2. Permissions Commands
Version 2 UUCP : Practical UNIX & Internet Security, 15.4.1.5. Requiring callback
Caller-ID (CNID)
Practical UNIX & Internet Security, 14.4.3. Caller-ID (CNID)
Practical UNIX & Internet Security, 14.6. Additional Security for Modems
Practical UNIX & Internet Security, 24.2.4. Tracing a Connection
Canada, export control in : Practical UNIX & Internet Security, 6.7.2. Cryptography and Export Controls
cannot connect error : TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
/canon rule-testing command : sendmail, 38.5.1. Canonify a Host with /canon
canonical name : sendmail, 7.3.1. The hostname
CNAME resource records
sendmail, 21.3.2. MX to CNAME Causes Extra Lookups
sendmail, 34.8. Alphabetized Reference
TCP/IP Network Administration, 8.3.6. The named.hosts File
TCP/IP Network Administration, 10.7.1. Modifying Local Information
TCP/IP Network Administration, C.3.1.5. Canonical Name record
determining with DNS : sendmail, 21.2.1. Determine the Local Canonical Name
host : sendmail, 31.10. Alphabetized Reference
local : (see $j macro)
canonicalization
sendmail, 17.2.1. Is the Host Local?
sendmail, 38.5.1. Canonify a Host with /canon
$[ and $] operators and
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 21.2.4. The $[ and $] Operators
sendmail, 28.6.6. Canonicalize Hostname: $[ and $]
sendmail, 33.4.3. $[ and $]: A Special Case
nocanonify feature : sendmail, 19.6. Alphabetized m4 Macros
capitalization
aliases : sendmail, 3.1.1. The Aliases File
database keys
sendmail, 33.2.1.2. -f don't fold uppercase to lowercase
sendmail, 33.3.4.3. -f don't fold keys to lowercase (V8.1 and above)
hostnames : sendmail, 30.8. Alphabetized F= Flags
macro names and : sendmail, 7.2. Defining Macros
usernames
Practical UNIX & Internet Security, 3.1. Usernames
sendmail, 30.8. Alphabetized F= Flags
capturing intruders : Building Internet Firewalls, 13.3. Pursuing and Capturing the
carbon copies : sendmail, 35.10. Alphabetized Reference
carbon monoxide : Practical UNIX & Internet Security, 12.2.1.2. Smoke
caret (^) in encrypted messages : Practical UNIX & Internet Security, 6.2. What Is Encryption?
carrier-detect (DCD) indicator, monitoring : TCP/IP Network Administration, 6.3.3. chat
case : (see capitalization)
cat command
Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution
-ve option : Practical UNIX & Internet Security, 5.5.4.1. The ncheck command
-v option : Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
cat-passwd command : Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
catastrophe logs : Building Internet Firewalls, 5.8.1.4. Safeguard the system logs
category data, DSN delivery : sendmail, 30.5.2.1. The $@ dsn part
CBC (cipher block chaining)
Practical UNIX & Internet Security, 6.4.4.2. DES modes
Practical UNIX & Internet Security, 6.6.2. des: The Data Encryption Standard
CBW (Crypt Breaker's Workbench) : Practical UNIX & Internet Security, 6.6.1.1. The crypt program
"Cc:" header line : sendmail, 35.10. Alphabetized Reference
CCTA IT Security & Infrastructure Group : Practical UNIX & Internet Security, F.3.4.39. UnisysUK: other government
CD-ROM
Building Internet Firewalls, 5.3.3. What Hardware Configuration?
Practical UNIX & Internet Security, 9.1.2. Read-only Filesystems
CDFs (context-dependent files)
Practical UNIX & Internet Security, 5.9.2. Context-Dependent Files
Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
ceilings, dropped : Practical UNIX & Internet Security, 12.2.3.1. Raised floors and dropped ceilings
cellular telephones : Practical UNIX & Internet Security, 12.2.1.8. Electrical noise
central administrator : (see system administration)
CERCUS (Computer Emergency Response Committee for Unclassified Systems) : Practical UNIX & Internet Security, F.3.4.36. TRW Network Area and System Administrators
Cerf, Vint : Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
CERN : Practical UNIX & Internet Security, E.4.1. CERN HTTP Daemon
HTTP daemon : Building Internet Firewalls, B.5.2. CERN httpd
HTTP server : Building Internet Firewalls, 8.6.2. Proxying Characteristics of
CERT (Computer Emergency Response Team)
Practical UNIX & Internet Security, 6.5.2. Using Message Digests
Practical UNIX & Internet Security, 27.3.5. Response Personnel?
Practical UNIX & Internet Security, F.3.4.1. All Internet sites
CERT-NL (Netherlands) : Practical UNIX & Internet Security, F.3.4.25. Netherlands: German government institutions
mailing list for : Practical UNIX & Internet Security, E.1.3.4. CERT-advisory
CERT-CC response teams
Building Internet Firewalls, 13.4.4.2. CERT-CC and other incident response teams
Building Internet Firewalls, A.2.2. info.cert.org
Building Internet Firewalls, A.3.5. CERT-Advisory
Building Internet Firewalls, A.5.1. CERT-CC
contacting regarding incident : Building Internet Firewalls, 13.1.4.2. CERT-CC or other incident response
cf directory : sendmail, 16.1. The cf/cf Directory
cf/cf directory : TCP/IP Network Administration, 10.4.1. Locating a Sample sendmail.cf File
cf/feature directory : TCP/IP Network Administration, E.3.2. FEATURE
cf/ostype directory : TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros
_CF_DIR_ macro : sendmail, 19.2.1. Maintain local files with _CF_DIR_
CFB (cipher feedback) : Practical UNIX & Internet Security, 6.4.4.2. DES modes
CGI (Common Gateway Interface)
Building Internet Firewalls, 8.6.3.1. What can a malicious client do to
Practical UNIX & Internet Security, 18.1. Security and the World Wide Web
scripts
Practical UNIX & Internet Security, 18.2. Running a Secure Server
Practical UNIX & Internet Security, 18.2.3. Writing Secure CGI Scripts and ProgramsThe
Practical UNIX & Internet Security, 18.2.4.1. Beware mixing HTTP with anonymous FTP
cgi-bin directory : Practical UNIX & Internet Security, 18.2.2. Understand Your Server's Directory Structure
cgm image subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
chacl command : Practical UNIX & Internet Security, 5.2.5.2. HP-UX access control lists
Challenge Handshake Authentication Protocol : (see CHAP)
challenge string : TCP/IP Network Administration, 6.3.4. PPP Daemon Security
challenge-response system
Building Internet Firewalls, 10.2.2. Something You Know
Building Internet Firewalls, 10.3.3. Challenge-Response Schemes
change detection
Practical UNIX & Internet Security, 9.2. Detecting Change
Practical UNIX & Internet Security, 9.3. A Final Note
CHAP (Challenge Handshake Authentication Protocol)
TCP/IP Network Administration, 6.3.4. PPP Daemon Security
TCP/IP Network Administration, A.2. The PPP Daemon
chap-secrets file : TCP/IP Network Administration, 6.3.4. PPP Daemon Security
Chapman, Brent : TCP/IP Network Administration, 12.1.1. Assessing the Threat
character devices : Practical UNIX & Internet Security, 5.6. Device Files
character set : sendmail, 30.4. The Equates
character-type arguments : sendmail, 34.5. Option Argument Types
chat groups, harassment via : Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
chat script
TCP/IP Network Administration, 6.3.3. chat
TCP/IP Network Administration, A.2. The PPP Daemon
TCP/IP Network Administration, A.3. chat
chatkey : TCP/IP Network Administration, A.1.1. The dip Script File
chdir command
Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
check_compat rule set : sendmail, 29.10.4. The check_compat Rule Set
check_mail rule set
sendmail, 20.2.6. Reject Mail from Spamming or Mail-bombing Sites
sendmail, 29.10.1. The check_mail Rule Set
check_rcpt rule set : sendmail, 29.10.2. The check_rcpt Rule Set
check_relay rule set : sendmail, 29.10.3. The check_relay Rule Set
CheckAliases (n) option
sendmail, 24.5.2. Check the Right Side of Aliases
sendmail, 34.8. Alphabetized Reference
checkcompat()
sendmail, 20. The checkcompat() Cookbook
sendmail, 20.3. Alphabetized V8.8 Subroutines
checking : (see testing)
checklists for detecting changes
Practical UNIX & Internet Security, 9.2.2. Checklists and Metadata
Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
CheckpointInterval (C) option : sendmail, 34.8. Alphabetized Reference
checksums
Building Internet Firewalls, 5.8.5.3. About checksums for auditing
Practical UNIX & Internet Security, 6.5.5.1. Checksums
Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
TCP/IP Network Administration, 11.8. Protocol Case Study
keeping secure : Building Internet Firewalls, 13.5.3. Keeping Secured Checksums
recalculating
TCP/IP Network Administration, 4.2.1. Obtaining an IP Address
TCP/IP Network Administration, 5.3.1.1. Options
using Tripwire for : Building Internet Firewalls, 5.8.5.1. Auditing packages
Chesson, Greg : Practical UNIX & Internet Security, 15.2. Versions of UUCP
chfn command : Practical UNIX & Internet Security, 8.2. Monitoring File Format
chgrp command : Practical UNIX & Internet Security, 5.8. chgrp: Changing a File's Group
child processes : Practical UNIX & Internet Security, C.2. Creating Processes
child, sendmail : sendmail, 30.6.2. The Child
chkey command : Practical UNIX & Internet Security, 19.3.1.1. Proving your identity
chmod command
Practical UNIX & Internet Security, 5.2.1. chmod: Changing a File's Permissions
Practical UNIX & Internet Security, 5.2.4. Using Octal File Permissions
Practical UNIX & Internet Security, 8.3. Restricting Logins
-A option : Practical UNIX & Internet Security, 5.2.5.2. HP-UX access control lists
-f option : Practical UNIX & Internet Security, 5.2.1. chmod: Changing a File's Permissions
-h option : Practical UNIX & Internet Security, 5.2.1. chmod: Changing a File's Permissions
-R option : Practical UNIX & Internet Security, 5.2.1. chmod: Changing a File's Permissions
choke points
Building Internet Firewalls, 3.3. Choke Point
Building Internet Firewalls, 9.2.3.3. Choke point
(see also firewalls)
(see also interior router)
using router as : Building Internet Firewalls, 6.1. Why Packet Filtering?
choot mechanism : Building Internet Firewalls, 5.3.1. What Operating System?
chown command
Practical UNIX & Internet Security, 5.7. chown: Changing a File's Owner
Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
chroot command
Building Internet Firewalls, 8.2.1.3. Providing anonymous
Practical UNIX & Internet Security, 8.1.5. Restricted Filesystem
Practical UNIX & Internet Security, 8.1.5.2. Checking new software
Practical UNIX & Internet Security, 11.1.4. Trojan Horses
Practical UNIX & Internet Security, 23.4.1. Using chroot()
with anonymous FTP : Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
chrootuid daemon
Building Internet Firewalls, B.6.3. chrootuid
Practical UNIX & Internet Security, E.4.2. chrootuid
chsh command : Practical UNIX & Internet Security, 8.7.1. Integrating One-time Passwords with UNIX
CIAC (Computer Incident Advisory Capability) : Practical UNIX & Internet Security, F.3.4.43. U.S. Department of Energy
CIDR (Classless Inter-Domain Routing)
Practical UNIX & Internet Security, 16.2.1.1. IP networks
Practical UNIX & Internet Security, 16.2.1.3. CIDR addresses
TCP/IP Network Administration, 2.2.2. Classless IP Addresses
address mask
TCP/IP Network Administration, 2.2. The IP Address
TCP/IP Network Administration, 2.2.2. Classless IP Addresses
blocks : TCP/IP Network Administration, B.11. The Aggregate Statements
cigarettes : Practical UNIX & Internet Security, 12.2.1.2. Smoke
cipher
Practical UNIX & Internet Security, 6.4.3. ROT13: Great for Encoding Offensive Jokes
TCP/IP Network Administration, 12.6. Encryption
(see also cryptography; encryption)
block chaining (CBC)
Practical UNIX & Internet Security, 6.4.4.2. DES modes
Practical UNIX & Internet Security, 6.6.2. des: The Data Encryption Standard
ciphertext
Practical UNIX & Internet Security, 6.2. What Is Encryption?
Practical UNIX & Internet Security, 8.6.1. The crypt()
feedback (CFB) : Practical UNIX & Internet Security, 6.4.4.2. DES modes
circuit-level proxy servers : Building Internet Firewalls, 7.3.1. Application-Level Versus Circuit-Level
CISCO : Practical UNIX & Internet Security, F.3.4.8. CISCO Systems
Cisco routers
Building Internet Firewalls, 6.5. Conventions for Packet Filtering
TCP/IP Network Administration, 12.5. Access Control
civil actions (lawsuits) : Practical UNIX & Internet Security, 26.3. Civil Actions
class command : sendmail, 12.1. The Class Command
class macros
sendmail, 5.3.5. Class Macros
sendmail, 12. Class
sendmail, 32. Class Macros
m4 and : sendmail, 32.3. Class with m4
class w, defining : TCP/IP Network Administration, 10.7.1. Modifying Local Information
class= equate (syslog output) : sendmail, 26.1.3.1. class= the queue class
classes
adding to : sendmail, 38.2.2. Add to a Class with .C
of addresses : (see addresses, classes of)
database : sendmail, 33.8. Alphabetized Reference
declaring : sendmail, 32.1. Class Configuration Commands
looking up words in : sendmail, 20.3. Alphabetized V8.8 Subroutines
name hashing algorithm : sendmail, 32.2.4. Class Name Hashing Algorithm
storing in files : sendmail, 12.2. The File Form of Class
ClassFactor (z) option : sendmail, 34.8. Alphabetized Reference
classified data and breakins
Practical UNIX & Internet Security, 26.1. Legal Options After a Break-in
Practical UNIX & Internet Security, 26.2.2. Federal Jurisdiction
Classless Inter-Domain Routing (CIDR)
Practical UNIX & Internet Security, 16.2.1.1. IP networks
Practical UNIX & Internet Security, 16.2.1.3. CIDR addresses
TCP/IP Network Administration, 2.2.2. Classless IP Addresses
address mask
TCP/IP Network Administration, 2.2. The IP Address
TCP/IP Network Administration, 2.2.2. Classless IP Addresses
blocks : TCP/IP Network Administration, B.11. The Aggregate Statements
clear text
Practical UNIX & Internet Security, 8.6.1. The crypt()
TCP/IP Network Administration, 12.6. Encryption
Clear to Send (CTS) : Practical UNIX & Internet Security, 14.3. The RS-232 Serial Protocol
client
authentication, network filesystems and : Building Internet Firewalls, 2.12. Network File Systems
flooding : Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
internal versus external : Building Internet Firewalls, 7.4.5. Internal Versus External Clients
NIS : (see NIS)
port numbers : Building Internet Firewalls, 8. Configuring Internet Services
software for proxying : Building Internet Firewalls, 7.2.1. Using Custom Client Software for
client statement : TCP/IP Network Administration, B.8.10. The routerdiscovery Statement
client.cf : sendmail, A. The client.cf File
client/server model : Practical UNIX & Internet Security, 16.2.5. Clients and Servers
${client_addr} macro : sendmail, 31.10. Alphabetized Reference
${client_name} macro : sendmail, 31.10. Alphabetized Reference
clock, system
Practical UNIX & Internet Security, 5.1.5. File Times
Practical UNIX & Internet Security, 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
configuring : Building Internet Firewalls, 8.13. Network Time Protocol (NTP)
for random seeds : Practical UNIX & Internet Security, 23.8. Picking a Random Seed
resetting : Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
setting : Building Internet Firewalls, 2.11. Time Service
Secure RPC timestamp : Practical UNIX & Internet Security, 19.3.1.3. Setting the window
clogging : Practical UNIX & Internet Security, 25.3.4. Clogging
CNAME resource records
sendmail, 21.3.2. MX to CNAME Causes Extra Lookups
sendmail, 34.8. Alphabetized Reference
TCP/IP Network Administration, 8.3.6. The named.hosts File
TCP/IP Network Administration, 10.7.1. Modifying Local Information
TCP/IP Network Administration, C.3.1.5. Canonical Name record
CNID (Caller-ID)
Practical UNIX & Internet Security, 14.4.3. Caller-ID (CNID)
Practical UNIX & Internet Security, 14.6. Additional Security for Modems
Practical UNIX & Internet Security, 24.2.4. Tracing a Connection
CO2 system (for fires) : Practical UNIX & Internet Security, 12.2.1.1. Fire
COAST (Computer Operations, Audit, and Security Technology)
Building Internet Firewalls, A.1.2. COAST
Building Internet Firewalls, A.2.1. coast.cs.purdue.edu
Practical UNIX & Internet Security, E.3.2. COAST
Practical UNIX & Internet Security, E.4. Software Resources
code breaking : (see cryptography)
codebooks : Practical UNIX & Internet Security, 8.7.3. Code Books
CodeCenter : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
codes : (see numbers)
cold, extreme : Practical UNIX & Internet Security, 12.2.1.6. Temperature extremes
Collis field : TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
collision rate
TCP/IP Network Administration, 6.1.1. Determining the Interface Name
TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
reducing : TCP/IP Network Administration, 11.4.4. Subdividing an Ethernet
colon (:)
in addresses
sendmail, 17.1.2.1. A rule to handle List:;
sendmail, 34.8. Alphabetized Reference
beginning and ending fields
TCP/IP Network Administration, 9.2.1. The printcap File
TCP/IP Network Administration, 9.2.2. Solaris Line Printer Service
separating parameters : TCP/IP Network Administration, 9.4. A BOOTP Server
ColonOkInAddr option : sendmail, 34.8. Alphabetized Reference
columns, database key
sendmail, 33.3.4.4. -k specify column for key (V8.7 and above)
sendmail, 33.3.4.11. -v specify the value's column (V8.7 and above)
com domain : TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
command channel attacks : Building Internet Firewalls, 8.1. Electronic Mail
command execution : Building Internet Firewalls, 2.3. Remote Terminal Access and Command
command line : sendmail, 4. How to Run sendmail
bugs : Building Internet Firewalls, 8.1. Electronic Mail
processing : sendmail, 36.4. Processing the Command Line
troubleshooting : sendmail, 36.6. Pitfalls
command shells : (see shells)
commands
Practical UNIX & Internet Security, 8.1.3. Accounts That Run a Single Command
(see also under specific command name)
accounts running single : Practical UNIX & Internet Security, 8.1.3. Accounts That Run a Single Command
in addresses : Practical UNIX & Internet Security, 15.7. Early Security Problems with UUCP
configuration
sendmail, 5.1. Overview
sendmail, 27.1. Overall Syntax
in <Directory> blocks : Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
editor, embedded : Practical UNIX & Internet Security, 11.5.2.7. Other initializations
incorrect usage error : sendmail, 36.5.10. EX_USAGE A Command Was Used Incorrectly
remote execution of
Practical UNIX & Internet Security, 15.1.2. uux Command
Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution
Practical UNIX & Internet Security, 17.3.17. rexec (TCP Port 512)
running simultaneously
Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
(see also multitasking)
COMMANDS= command : Practical UNIX & Internet Security, 15.5.2. Permissions Commands
commenting out lines : Building Internet Firewalls, 5.8.2.2. How to disable services
commenting out services : Practical UNIX & Internet Security, 17.3. Primary UNIX Network Services
comments
sendmail, 5.2.2. Comments
sendmail, 6.3.2. Adding Comments
in BNU UUCP : Practical UNIX & Internet Security, 15.5.1.3. A Sample Permissions file
in header fields : sendmail, 35.3.4. Comments in the Header Field
in :include: lists : sendmail, 25.2.1. Comments in :include: Lists
in m4 files : sendmail, 19.5. Pitfalls
in rule definitions : sendmail, 8.4. Rules
in sendmail.cf file
sendmail, 3.1. Role in the Filesystem
sendmail, 5.1. Overview
sendmail, 27.2. Comments
stripping from headers : sendmail, 30.8. Alphabetized F= Flags
"Comments:" header line : sendmail, 35.10. Alphabetized Reference
commercial authentication systems : Building Internet Firewalls, 10.4.3. Commercial Solutions
Commercial Information Exchange (CIX) : TCP/IP Network Administration, 1.1. TCP/IP and the Internet
Common Gateway Interface (CGI)
Building Internet Firewalls, 8.6.3.1. What can a malicious client do to
Practical UNIX & Internet Security, 18.1. Security and the World Wide Web
scripts
Practical UNIX & Internet Security, 18.2. Running a Secure Server
Practical UNIX & Internet Security, 18.2.3. Writing Secure CGI Scripts and ProgramsThe
Practical UNIX & Internet Security, 18.2.4.1. Beware mixing HTTP with anonymous FTP
communications
interpersonal : (see email)
modems : (see modems)
national telecommunications : Practical UNIX & Internet Security, 26.2.2. Federal Jurisdiction
threatening : Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
comp.security newsgroups : TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
comparison copies
Practical UNIX & Internet Security, 9.2.1. Comparison Copies
Practical UNIX & Internet Security, 9.2.1.3. rdist
compatibility between sendmail versions
sendmail, 5.2.1. Version
sendmail, 27.5. The V Configuration Command
sendmail, D.2. Backward Compatibility
compiling db library package : sendmail, C.3. Compile and Install
compiling sendmail : sendmail, 2.5. Build
enabling databases : sendmail, 33.1. Enable at Compile Time
macros for : sendmail, 18.8. Alphabetized Reference
vendor copies versus : sendmail, 18.2. Vendor Versus Compiling
completion, command option : sendmail, 34.1.2.1. Multicharacter name shorthand
compress program : Practical UNIX & Internet Security, 6.6.1.2. Ways of improving the security of crypt
Compressed SLIP (CSLIP) : Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
Computer Emergency Response Committee for Unclassified Systems (CERCUS) : Practical UNIX & Internet Security, F.3.4.36. TRW Network Area and System Administrators
Computer Emergency Response Team (CERT) advisories
Practical UNIX & Internet Security, 6.5.2. Using Message Digests
Practical UNIX & Internet Security, 27.3.5. Response Personnel?
Practical UNIX & Internet Security, F.3.4.1. All Internet sites
TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
CERT-NL (Netherlands) : Practical UNIX & Internet Security, F.3.4.25. Netherlands: German government institutions
mailing list for : Practical UNIX & Internet Security, E.1.3.4. CERT-advisory
Computer Incident Advisory Capability (CIAC) : Practical UNIX & Internet Security, F.3.4.43. U.S. Department of Energy
computer networks : Practical UNIX & Internet Security, 1.4.3. Add-On Functionality Breeds Problems
Computer Security Institute (CSI) : Practical UNIX & Internet Security, F.1.3. Computer Security Institute (CSI)
Computer Security Resource Clearinghouse : TCP/IP Network Administration, 13.1. The World Wide Web
computers
assigning UUCP name : Practical UNIX & Internet Security, 15.5.2. Permissions Commands
auxiliary ports : Practical UNIX & Internet Security, 12.3.1.4. Auxiliary ports on terminals
backing up individual : Practical UNIX & Internet Security, 7.2.1. Individual Workstation
computer-to-computer services, providing : TCP/IP Network Administration, 9. Configuring Network Servers
contacting administrator of : Practical UNIX & Internet Security, 24.2.4.2. How to contact the system administrator of a computer
cutting cables to : Practical UNIX & Internet Security, 25.1. Destructive Attacks
failure of : Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
hostnames for
Practical UNIX & Internet Security, 16.2.3. Hostnames
Practical UNIX & Internet Security, 16.2.3.1. The /etc/hosts file
modems : (see modems)
multiple screens : Practical UNIX & Internet Security, 12.3.4.3. Multiple screens
multiple suppliers of : Practical UNIX & Internet Security, 18.6. Dependence on Third Parties
non-citizen access to : Practical UNIX & Internet Security, 26.4.1. Munitions Export
operating after breakin : Practical UNIX & Internet Security, 24.6. Resuming Operation
portable : Practical UNIX & Internet Security, 12.2.6.3. Portables
remote command execution : Practical UNIX & Internet Security, 17.3.17. rexec (TCP Port 512)
running NIS+ : Practical UNIX & Internet Security, 19.5.5. NIS+ Limitations
screen savers : Practical UNIX & Internet Security, 12.3.5.2. X screen savers
security
culture of : Practical UNIX & Internet Security, D.1.10. Understanding the Computer Security "Culture"
four steps toward : Practical UNIX & Internet Security, 2.4.4.7. Defend in depth
physical : Practical UNIX & Internet Security, 12.2.6.1. Physically secure your computer
references for : Practical UNIX & Internet Security, D.1.7. General Computer Security
resources on : Practical UNIX & Internet Security, D.1.1. Other Computer References
seized as evidence : Practical UNIX & Internet Security, 26.2.4. Hazards of Criminal Prosecution
transferring files between : Practical UNIX & Internet Security, 15.1.1. uucp Command
trusting
Practical UNIX & Internet Security, 27.1. Can you Trust Your Computer?
Practical UNIX & Internet Security, 27.1.3. What the Superuser Can and Cannot Do
unattended
Practical UNIX & Internet Security, 12.3.5. Unattended Terminals
Practical UNIX & Internet Security, 12.3.5.2. X screen savers
unplugging : Practical UNIX & Internet Security, 24.2.5. Getting Rid of the Intruder
vacuums for : Practical UNIX & Internet Security, 12.2.1.3. Dust
vandalism of : (see vandalism)
virtual : (see Telnet service)
viruses : (see viruses)
computing base (TCB) : Practical UNIX & Internet Security, 8.5.3.2. Trusted computing base
conditionals in macro definitions
sendmail, 14.1.3. Testing So Far
sendmail, 31.6. Macro Conditionals: $?, $|, and $.
TCP/IP Network Administration, 10.5.2.1. Conditionals
conf directory
Practical UNIX & Internet Security, 18.2.2.1. Configuration files
TCP/IP Network Administration, 5.3. The BSD Kernel Configuration File
conf/access.conf : (see access.conf file)
conf/master directory : TCP/IP Network Administration, 8.3.4. The named.local File
conf/srm.conf file : Practical UNIX & Internet Security, 18.3.1. The access.conf and .htaccess Files
conf.c file
sendmail, 18.3.3. What to Tune
sendmail, 35.5. Header Behavior in conf.c
conf.h file : sendmail, 18.3.3. What to Tune
conferencing services, real-time
Building Internet Firewalls, 2.8. Real-Time Conferencing
Building Internet Firewalls, 8.9. Real-Time Conferencing Services
confidence factor : TCP/IP Network Administration, 11.1.1. Troubleshooting Hints
confidentiality : (see encryption; privacy)
configuration
Archie : Building Internet Firewalls, 8.7.3. Archie
audit packages : Building Internet Firewalls, 5.8.5.2. Use the auditing packages
clocks : Building Internet Firewalls, 8.13. Network Time Protocol (NTP)
commands for
sendmail, 5.1. Overview
sendmail, 27.1. Overall Syntax
DNS (Domain Name Service) : Building Internet Firewalls, 8.10. Domain Name System
in screened host architecture : Building Internet Firewalls, 9.2.1.6. DNS
in screened subnet architecture : Building Internet Firewalls, 9.1.1.6. DNS
email : Building Internet Firewalls, 8.1. Electronic Mail
errors : Practical UNIX & Internet Security, 9.1. Prevention
exterior routers : Building Internet Firewalls, 9.1.2.2. Exterior Router
files : Practical UNIX & Internet Security, 11.5.3. Abusing Automatic Mechanisms
logging : Practical UNIX & Internet Security, 10.7.2.2. Informational material
MCSA web server : Practical UNIX & Internet Security, 18.2.2.1. Configuration files
UUCP version differences : Practical UNIX & Internet Security, 15.2. Versions of UUCP
FSP (File Service Protocol) : Building Internet Firewalls, 8.2.3. File Service Protocol (FSP)
FTP (File Transfer Protocol) : Building Internet Firewalls, 8.2.1. File Transfer Protocol
in screened host architecture : Building Internet Firewalls, 9.2.1.2. FTP
in screened subnet architecture : Building Internet Firewalls, 9.1.1.2. FTP
Gopher : Building Internet Firewalls, 8.7.1. Gopher
hardware : Building Internet Firewalls, 5.3.3. What Hardware Configuration?
HTTP (Hypertext Transfer Protocol)
in screened host architecture : Building Internet Firewalls, 9.2.1.5. HTTP
in screened subnet architecture : Building Internet Firewalls, 9.1.1.5. HTTP
hub : sendmail, 15.4. Hub Accepts Mail for Client
information lookup services : Building Internet Firewalls, 8.8. Information Lookup Services
interior router : Building Internet Firewalls, 9.1.2.1. Interior Router
Internet services : Building Internet Firewalls, 8. Configuring Internet Services
IRC (Internet Relay Chat) : Building Internet Firewalls, 8.9.2. Internet Relay Chat
kernel : Building Internet Firewalls, 5.8.4.1. Reconfigure and rebuild the kernel
labeling system : Building Internet Firewalls, 13.5.2. Labeling and Diagraming Your System
machine : Building Internet Firewalls, 5.8.4. Reconfiguring for Production
MBONE (Multicast Backbone) : Building Internet Firewalls, 8.9.3. The Multicast Backbone (MBONE)
network management services : Building Internet Firewalls, 8.12. Network Management Services
NFS (Network File System) : Building Internet Firewalls, 8.14. Network File System
NIS/YP (Network Information Service) : Building Internet Firewalls, 8.15. Network Information Service/Yellow
NNTP (Network News Transfer Protocol) : Building Internet Firewalls, 8.5. Network News Transfer Protocol
in screened host architecture : Building Internet Firewalls, 9.2.1.4. NNTP
in screened subnet architecture : Building Internet Firewalls, 9.1.1.4. NNTP
packet filtering router : Building Internet Firewalls, 6.2. Configuring a Packet Filtering
parameters for (in dhcpd) : TCP/IP Network Administration, D.3.2. Configuration Parameters
ping program : Building Internet Firewalls, 8.12.3. ping
printing protocols : Building Internet Firewalls, 8.17. Printing Protocols (lpr and lp)
problems : TCP/IP Network Administration, 11.4.1. Troubleshooting with the ifconfig Command
r commands : Building Internet Firewalls, 8.4.1. BSD
real-time conferencing services : Building Internet Firewalls, 8.9. Real-Time Conferencing Services
RIP (Routing Information Protocol) : Building Internet Firewalls, 8.12.2. Routing Information Protocol
sendmail
sendmail, 2.4. Preliminaries
sendmail, 18.6. Install sendmail
sendmail, 19.6. Alphabetized m4 Macros
(see also sendmail.cf configuration file)
servers : TCP/IP Network Administration, 3.5. Configuration Servers
simplifying management of : Practical UNIX & Internet Security, 9.1.2. Read-only Filesystems
SMTP (Simple Mail Transfer Protocol)
in screened host architecture : Building Internet Firewalls, 9.2.1.3. SMTP
in screened subnet architecture : Building Internet Firewalls, 9.1.1.3. SMTP
with firewalls : Building Internet Firewalls, 8.1.1.6. Configuring SMTP to
SNMP (Simple Network Management Protocol) : Building Internet Firewalls, 8.12.1. Simple Network Management
syslog : Building Internet Firewalls, 8.11. syslog
system, prerequisites for : TCP/IP Network Administration, 4. Getting Started
Telnet : Building Internet Firewalls, 8.3. Terminal Access (Telnet)
in screened host architecture : Building Internet Firewalls, 9.2.1.1. Telnet
in screened subnet architecture : Building Internet Firewalls, 9.1.1.1. Telnet
TFTP (Trivial File Transport Protocol) : Building Internet Firewalls, 8.2.2. Trivial File Transfer Protocol
TNP (Network Time Protocol) : Building Internet Firewalls, 8.13. Network Time Protocol (NTP)
traceroute program : Building Internet Firewalls, 8.12.4. traceroute
UUCP (UNIX-to-UNIX Copy Protocol) : Building Internet Firewalls, 8.2.4. UNIX-to-UNIX
WAIS (Wide Area Information Servers) : Building Internet Firewalls, 8.7.2. Wide Area Information Servers
WWW (World Wide Web) and HTTP : Building Internet Firewalls, 8.6. World Wide Web (WWW) and HTTP
X11 Window wystem : Building Internet Firewalls, 8.16. X11 Window System
connection cache
sendmail, 26.3.3.2. -- connection cache: --
sendmail, 34.6.5. Connection Caching
connection command-line option, in pppd : TCP/IP Network Administration, 6.3.3. chat
"Connection timed out" message : sendmail, 4.2. Verbose (-v)
ConnectionCacheSize (k) option : sendmail, 34.8. Alphabetized Reference
ConnectionCacheTimeout (K) option : sendmail, 34.8. Alphabetized Reference
ConnectionRateThrottle option : sendmail, 34.8. Alphabetized Reference
connections
between Internet and unbuilt bastion host : Building Internet Firewalls, 5.8. Building a Bastion Host
checking network : (see ping command)
disconnecting after incident : Building Internet Firewalls, 13.1.2. Disconnect or Shut Down, as
disconnecting machine : Building Internet Firewalls, 13.4.3. Planning for Disconnecting or
hijacking : Practical UNIX & Internet Security, 16.3. IP Security
killed by TCP : Building Internet Firewalls, 6.3.3.1. TCP
laundering : Practical UNIX & Internet Security, 16.1.1.1. Who is on the Internet?
multiple Internet : Building Internet Firewalls, 4.3.6. It's OK to Use
tracing
Practical UNIX & Internet Security, 24.2.4. Tracing a Connection
Practical UNIX & Internet Security, 24.2.4.2. How to contact the system administrator of a computer
unidirectional versus multidirectional : Building Internet Firewalls, 7.4.2. Unidirectional Versus Multidirectional
unplugging : Practical UNIX & Internet Security, 24.2.5. Getting Rid of the Intruder
connectivity
TCP/IP Network Administration, 1.7. Application Layer
(see also firewalls)
troubleshooting : TCP/IP Network Administration, 11.3. Testing Basic Connectivity
connectors, network : Practical UNIX & Internet Security, 12.2.4.3. Network connectors
consistency of software : Practical UNIX & Internet Security, 2.1. Planning Your Security Needs
console device : Practical UNIX & Internet Security, 5.6. Device Files
CONSOLE variable : Practical UNIX & Internet Security, 8.5.1. Secure Terminals
constraining passwords : Practical UNIX & Internet Security, 8.8.2. Constraining Passwords
consultants : Practical UNIX & Internet Security, 27.3.4. Your Consultants?
content types : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
"Content-Length:" header line
sendmail, 35.10. Alphabetized Reference
sendmail, D. Sun Enhancements
"Content-Transfer-Encoding:" header line
sendmail, 35.10. Alphabetized Reference
TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
"Content-Type:" header line
sendmail, 30.4. The Equates
sendmail, 32.5. Alphabetized Reference
sendmail, 34.8. Alphabetized Reference
sendmail, 35.10. Alphabetized Reference
TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
context-dependent files (CDFs)
Practical UNIX & Internet Security, 5.9.2. Context-Dependent Files
Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
contiguous blocks : (see addresses, assigning)
continuation lines : sendmail, 27.4. Continuation Lines
control
information : TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
statements (in gated) : TCP/IP Network Administration, B.10. Control Statements
control characters
Practical UNIX & Internet Security, 3.1. Usernames
sendmail, 23.3.4. Unknown Control Character in qf File
control headers : sendmail, 35.6.4. Identification and Control Headers
convergence of routing, delays in : TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
converting
Japanese font conversion : sendmail, 36.7. Alphabetized Reference
macro names to integers : sendmail, 20.3. Alphabetized V8.8 Subroutines
cookies
Practical UNIX & Internet Security, 17.3.21.4. Using Xauthority magic cookies
Practical UNIX & Internet Security, 18.2.3.1. Do not trust the user's browser!
COPS (Computer Oracle and Password System)
Building Internet Firewalls, B.2.1. COPS
Practical UNIX & Internet Security, 19.5.5. NIS+ Limitations
Practical UNIX & Internet Security, E.4.3. COPS (Computer Oracle and Password System)COPS
TCP/IP Network Administration, 12.4.3.1. COPS
auditing package : Building Internet Firewalls, 5.8.5.1. Auditing packages
copy (cp) command, in NFS : TCP/IP Network Administration, 9.1. The Network File System
copying
bounced messages to postmaster : sendmail, 22.8.3.4. The PostmasterCopy option
messages to postmaster : sendmail, 24.4.1. The Postmaster Alias
qf file temporarily : sendmail, 23.2.6. The Temporary qf Rewrite Image: tf
copyright
Practical UNIX & Internet Security, 9.2.1. Comparison Copies
Practical UNIX & Internet Security, 26.4.2. Copyright Infringement
Practical UNIX & Internet Security, 26.4.2.1. Software piracy and the SPA
notices of : Practical UNIX & Internet Security, 26.2.6. Other Tips
CORBA (Common Object Request Broker Architecture) : Practical UNIX & Internet Security, 19.2. Sun's Remote Procedure Call (RPC)
core files
Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
Practical UNIX & Internet Security, C.4. The kill Command
core gateways
TCP/IP Network Administration, 2.4. Internet Routing Architecture
TCP/IP Network Administration, 7.5.1. Exterior Gateway Protocol
cost : (see preference)
cost-benefit analysis
Practical UNIX & Internet Security, 2.3. Cost-Benefit Analysis
Practical UNIX & Internet Security, 2.3.4. Convincing Management
costs of losses : Practical UNIX & Internet Security, 2.3.1. The Cost of Loss
"could not exec" error : sendmail, 26.3.2. SIGHUP Restart
count field : TCP/IP Network Administration, 11.3.1. The ping Command
count-to-infinity problem : TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
cp command : Practical UNIX & Internet Security, 7.4.1. Simple Local Copies
cpio program
Practical UNIX & Internet Security, 7.3.2. Building an Automatic Backup System
Practical UNIX & Internet Security, 7.4.2. Simple Archives
crack program
Practical UNIX & Internet Security, 8.8.3. Cracking Your Own Passwords
Practical UNIX & Internet Security, 18.3.3. Setting Up Web Users and Passwords
cracking
backing up because of : Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
passwords
Practical UNIX & Internet Security, 3.6.1. Bad Passwords: Open Doors
Practical UNIX & Internet Security, 3.6.4. Passwords on Multiple Machines
Practical UNIX & Internet Security, 8.6.1. The crypt()
Practical UNIX & Internet Security, 8.8.3. Cracking Your Own Passwords
Practical UNIX & Internet Security, 8.8.3.2. The dilemma of password crackers
Practical UNIX & Internet Security, 17.3.3. TELNET (TCP Port 23)
logging failed attempts : Practical UNIX & Internet Security, 10.5.3. syslog Messages
responding to
Practical UNIX & Internet Security, 24. Discovering a Break-in
Practical UNIX & Internet Security, 24.7. Damage Control
using rexecd : Practical UNIX & Internet Security, 17.3.17. rexec (TCP Port 512)
crash : Building Internet Firewalls, 5.10.1. Watch Reboots Carefully
logging crashes : Practical UNIX & Internet Security, 10.7.2.1. Exception and activity reports
resetting locks after : TCP/IP Network Administration, 9.1.1. NFS Daemons
restarting after : TCP/IP Network Administration, 9.2.2. Solaris Line Printer Service
CRC (cyclic redundancy counter) : (see checksums)
Cred table (NIS+) : Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
criminal prosecution
Practical UNIX & Internet Security, 26.2. Criminal Prosecution
Practical UNIX & Internet Security, 26.2.7. A Final Note on Criminal Actions
crises : (see disasters and disaster recovery)
cron file
Practical UNIX & Internet Security, 9.2.2.1. Simple listing
Practical UNIX & Internet Security, 11.5.1.4. Filename attacks
Practical UNIX & Internet Security, 11.5.3.1. crontab entries
Practical UNIX & Internet Security, 15.6.2. Automatic Execution of Cleanup Scripts
automating backups : Practical UNIX & Internet Security, 7.3.2. Building an Automatic Backup System
cleaning up /tmp directory : Practical UNIX & Internet Security, 25.2.4. /tmp Problems
collecting login times : Practical UNIX & Internet Security, 10.1.1. lastlog File
security checks : TCP/IP Network Administration, 12.4.2. Looking for Trouble
statistics and : sendmail, 26.2.3. Using cron for Daily and Weekly Statistics
symbolic links in : Practical UNIX & Internet Security, 10.3.7. Other Logs
system clock and : Practical UNIX & Internet Security, 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
uucp scripts in : Practical UNIX & Internet Security, 15.6.2. Automatic Execution of Cleanup Scripts
crtscts option : TCP/IP Network Administration, 6.3.1. The PPP Daemon
Crypt Breaker's Workbench (CBW) : Practical UNIX & Internet Security, 6.6.1.1. The crypt program
crypt command/algorithm
Building Internet Firewalls, 5.8.2.2. How to disable services
Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
Practical UNIX & Internet Security, 6.6.1. UNIX crypt: The Original UNIX Encryption Command
Practical UNIX & Internet Security, 6.6.1.3. Example
Practical UNIX & Internet Security, 8.6. The UNIX Encrypted Password System
Practical UNIX & Internet Security, 8.6.1. The crypt()
Practical UNIX & Internet Security, 8.8.7. Algorithm and Library Changes
Practical UNIX & Internet Security, 18.3.3. Setting Up Web Users and Passwords
Practical UNIX & Internet Security, 23.5. Tips on Using Passwords
crypt16 algorithm : Practical UNIX & Internet Security, 8.6.4. Crypt16() and Other Algorithms
crypto-checksum : TCP/IP Network Administration, 7.4.3. Open Shortest Path First
cryptography
Building Internet Firewalls, 10. Authentication and Inbound
Practical UNIX & Internet Security, 6. Cryptography
Practical UNIX & Internet Security, 6.7.2. Cryptography and Export Controls
Practical UNIX & Internet Security, 14.4.4.2. Protection against eavesdropping
checklist for : Practical UNIX & Internet Security, A.1.1.5. Chapter 6: Cryptography
checksums
Building Internet Firewalls, 5.8.5.3. About checksums for auditing
Practical UNIX & Internet Security, 6.5.5.1. Checksums
Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
TCP/IP Network Administration, 11.8. Protocol Case Study
keeping secure : Building Internet Firewalls, 13.5.3. Keeping Secured Checksums
recalculating
TCP/IP Network Administration, 4.2.1. Obtaining an IP Address
TCP/IP Network Administration, 5.3.1.1. Options
using Tripwire for : Building Internet Firewalls, 5.8.5.1. Auditing packages
digital signatures : (see digital signatures)
export laws concerning : Practical UNIX & Internet Security, 6.7.2. Cryptography and Export Controls
Message Authentication Codes (MACs) : Practical UNIX & Internet Security, 6.5.5.2. Message authentication codes
message digests : (see message digests)
PGP : (see PGP)
private-key
Practical UNIX & Internet Security, 6.4. Common Cryptographic Algorithms
Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
TCP/IP Network Administration, 12.6. Encryption
public-key
Building Internet Firewalls, 10. Authentication and Inbound
Practical UNIX & Internet Security, 6.4. Common Cryptographic Algorithms
Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
Practical UNIX & Internet Security, 6.4.6. RSA and Public Key Cryptography
Practical UNIX & Internet Security, 6.4.6.3. Strength of RSA
Practical UNIX & Internet Security, 6.5.3. Digital Signatures
Practical UNIX & Internet Security, 18.3. Controlling Access to Files on Your Server
Practical UNIX & Internet Security, 18.6. Dependence on Third Parties
TCP/IP Network Administration, 12.6. Encryption
breaking : Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
PGP : Practical UNIX & Internet Security, 6.6.3.2. Creating your PGP public key
proving identity with : Practical UNIX & Internet Security, 19.3.1.1. Proving your identity
references on : Practical UNIX & Internet Security, D.1.5. Cryptography Books
U.S. patents and : Practical UNIX & Internet Security, 6.7.1. Cryptography and the U.S. Patent System
csh (C shell)
Practical UNIX & Internet Security, 5.5.2. Problems with SUID
Practical UNIX & Internet Security, 11.5.1. Shell Features
Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
Practical UNIX & Internet Security, C.5.3. Running the User's Shell
(see also shells)
autologout variable : Practical UNIX & Internet Security, 12.3.5.1. Built-in shell autologout
history file : Practical UNIX & Internet Security, 10.4.1. Shell History
uucp command : Practical UNIX & Internet Security, 15.1.1.1. uucp with the C shell
.cshrc file
Practical UNIX & Internet Security, 11.5.2.2. .cshrc, .kshrc
Practical UNIX & Internet Security, 12.3.5.1. Built-in shell autologout
Practical UNIX & Internet Security, 24.4.1.6. Changes to startup files
CSI (Computer Security Institute) : Practical UNIX & Internet Security, F.1.3. Computer Security Institute (CSI)
CSLIP (Compressed SLIP)
Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
TCP/IP Network Administration, 5.2. Linux Kernel Configuration
TCP/IP Network Administration, 6.4.1. slattach
disabling : TCP/IP Network Administration, A.2. The PPP Daemon
CSRC (Computer Security Resource Clearinghouse) : Building Internet Firewalls, A.5.3. NIST CSRC
-Ctest.cf argument : TCP/IP Network Administration, 10.8. Testing sendmail.cf
ctime
Practical UNIX & Internet Security, 5.1.2. Inodes
Practical UNIX & Internet Security, 5.1.5. File Times
Practical UNIX & Internet Security, 5.2.1. chmod: Changing a File's Permissions
Practical UNIX & Internet Security, 7.4.7. inode Modification Times
Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
cu command
Practical UNIX & Internet Security, 14.5. Modems and UNIX
Practical UNIX & Internet Security, 14.5.3.1. Originate testing
Practical UNIX & Internet Security, 14.5.3.3. Privilege testing
-l option : Practical UNIX & Internet Security, 14.5.3.1. Originate testing
cua devices : TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
culture, computer security : Practical UNIX & Internet Security, D.1.10. Understanding the Computer Security "Culture"
curly braces ({})
sendmail, 5.3.2. Macros
sendmail, 5.3.5. Class Macros
sendmail, 7.1. Overview
configuration statements
TCP/IP Network Administration, 7.7.1.1. A host configuration
TCP/IP Network Administration, B.2. The gated Configuration Language
TCP/IP Network Administration, D.3. The dhcpd.conf Configuration File
long variable names : TCP/IP Network Administration, 10.5. sendmail Configuration
macro names : TCP/IP Network Administration, 10.5.2. The Define Macro Command
current
date : (see $d macro)
directory : Practical UNIX & Internet Security, 5.1.3. Current Directory and Paths
time and date : (see $b macro)
custom
client software for proxying : Building Internet Firewalls, 7.2.1. Using Custom Client Software for
system : Building Internet Firewalls, 13.1.6. Restore and Recover
user procedures for proxying : Building Internet Firewalls, 7.2.2. Using Custom User Procedures for
Customer Warning System (CWS) : Practical UNIX & Internet Security, F.3.4.34. Sun Microsystems
customizing sendmail temporarily : sendmail, 19.6. Alphabetized m4 Macros
cyclic redundancy counter (CRC) : Building Internet Firewalls, 5.8.5.3. About checksums for auditing
cyrus and cyrusbb mailers : TCP/IP Network Administration, E.3.5. MAILER


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.