 
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: E
- earthquakes
: 12.2.1.4. Earthquake
- eavesdropping
- 
  - 12.3.1. Eavesdropping
  - 12.3.1.5. Fiber optic cable
  - 12.4.1.2. Potential for eavesdropping and data theft
  - 14.4.4. Protecting Against Eavesdropping
  - 14.4.4.2. Protection against eavesdropping
  - 16.3.1. Link-level Security
  - IP packets
  
- 
    - 16.3.1. Link-level Security
    - 17.3.3. TELNET (TCP Port 23)
  
 
- through log files
: 18.4.2. Eavesdropping Through Log Files
  - on the Web
  
- 
    - 18.4. Avoiding the Risks of Eavesdropping
    - 18.4.2. Eavesdropping Through Log Files
  
 
- X clients
: 17.3.21.2. X security
 
- ECB (electronic code book)
- 
  - 6.4.4.2. DES modes
  - 6.6.2. des: The Data Encryption Standard
 
- echo command
: 23.5. Tips on Using Passwords
- ECPA (Electronic Communications Privacy Act)
: 26.2.3. Federal Computer Crime Laws
- editing wtmp file
: 10.1.3.1. Pruning the wtmp file
- editors
: 11.5.2.7. Other initializations
- 
  - buffers for
: 11.1.4. Trojan Horses
  - Emacs
: 11.5.2.3. GNU .emacs
  - ex
  
- 
    - 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
    - 11.5.2.4. .exrc
    - 11.5.2.7. Other initializations
  
 
- startup file attacks
: 11.5.2.4. .exrc
  - vi
  
- 
    - 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
    - 11.5.2.4. .exrc
    - 11.5.2.7. Other initializations
  
 
 
- edquota command
: 25.2.2.5. Using quotas
- EDS
: F.3.4.11. EDS and EDS customers worldwide
- education
: (see security, user awareness of)
- effective UIDs/GIDs
- 
  - 4.3.1. Real and Effective UIDs
  - 5.5. SUID
  - 10.1.2.1. su command and /etc/utmp and /var/adm/wtmp files
  - C.1.3.2. Process real and effective UID
 
- 8mm video tape
: 7.1.4. Guarding Against Media Failure
- electrical fires
- 
  - 12.2.1.2. Smoke
  - (see also fires; smoke and smoking)
 
- electrical noise
: 12.2.1.8. Electrical noise
- electronic
- 
  - breakins
: (see breakins; cracking)
  - code book (ECB)
  
- 
    - 6.4.4.2. DES modes
    - 6.6.2. des: The Data Encryption Standard
  
 
- mail
: (see mail)
 
- Electronic Communications Privacy Act (ECPA)
: 26.2.3. Federal Computer Crime Laws
- ElGamal algorithm
- 
  - 6.4.2. Summary of Public Key Systems
  - 6.5.3. Digital Signatures
 
- elm (mail system)
: 11.5.2.5. .forward, .procmailrc
- emacs editor
: 11.5.2.7. Other initializations
- .emacs file
: 11.5.2.3. GNU .emacs
- email
: (see mail)
- embedded commands
: (see commands)
- embezzlers
: 11.3. Authors
- emergency response organizations
: (see response teams)
- employees
- 
  - 11.3. Authors
  - 13. Personnel Security
  - 13.3. Outsiders
  - departure of
: 13.2.6. Departure
  - phonebook of
: 12.3.3. Other Media
  - security checklist for
: A.1.1.12. Chapter 13: Personnel Security
  - targeted in legal investigation
: 26.2.5. If You or One of Your Employees Is a Target  of an Investigation...
  - trusting
: 27.3.1. Your Employees?
  - written authorization for
: 26.2.6. Other Tips
 
- encryption
- 
  - 6.2. What Is Encryption?
  - 6.2.2. The Elements of Encryption
  - 12.2.6.2. Encryption
  - (see also cryptography)
  - algorithms
: 2.5. The Problem with Security  Through Obscurity
  
- 
    - crypt
    
- 
      - 6.6.1. UNIX crypt: The Original UNIX Encryption Command
      - 6.6.1.3. Example
    
 
- Digital Signature Algorithm
    
- 
      - 6.4.2. Summary of Public Key Systems
      - 6.5.3. Digital Signatures
    
 
- ElGamal
: 6.4.2. Summary of Public Key Systems
    - IDEA
: 6.4.1. Summary of Private Key Systems
    - RC2, RC4, and RC5
    
- 
      - 6.4.1. Summary of Private Key Systems
      - 6.4.8. Proprietary Encryption Systems
    
 
- ROT13
: 6.4.3. ROT13: Great for Encoding Offensive Jokes
    - RSA
    
- 
      - 6.4.2. Summary of Public Key Systems
      - 6.4.6. RSA and Public Key Cryptography
      - 6.4.6.3. Strength of RSA
    
 
 
- application-level
: 16.3.1. Link-level Security
  - of backups
  
- 
    - 7.1.6.3. Data security for backups
    - 7.4.4. Encrypting Your Backups
    - 12.3.2.4. Backup encryption
  
 
- checklist for
: A.1.1.5. Chapter 6: Cryptography
  - Data Encryption Standard (DES)
  
- 
    - 6.4.1. Summary of Private Key Systems
    - 6.4.4. DES
    - 6.4.5.2. Triple DES
    - 6.6.2. des: The Data Encryption Standard
  
 
- DCE and
: 3.2.2. The /etc/passwd File and Network Databases
  - Diffie-Hellman
: (see Diffie-Hellman key exchange system)
  - end-to-end
: 16.3.1. Link-level Security
  - Enigma system
  
- 
    - 6.3. The Enigma Encryption System
    - 6.6.1.1. The crypt program
    - (see also crypt command/algorithm)
  
 
- escrowing keys
  
- 
    - 6.1.3. Modern Controversy
    - 7.1.6.3. Data security for backups
  
 
- exporting software
: 26.4.1. Munitions Export
  - of hypertext links
: 18.4.1. Eavesdropping Over the Wire
  - laws about
  
- 
    - 6.7. Encryption and U.S. Law
    - 6.7.2. Cryptography and Export Controls
  
 
- link-level
: 16.3.1. Link-level Security
  - of modems
: 14.6. Additional Security for Modems
  - Netscape Navigator system
: 18.4.1. Eavesdropping Over the Wire
  - with network services
: 17.4. Security Implications of Network Services
  - one-time pad mechanism
: 6.4.7. An Unbreakable Encryption Algorithm
  - of passwords
  
- 
    - 8.6. The UNIX Encrypted Password System
    - 8.6.4. Crypt16() and Other Algorithms
    - 23.5. Tips on Using Passwords
  
 
- PGP
: (see PGP)
  - programs for UNIX
  
- 
    - 6.6. Encryption Programs Available for UNIX
    - 6.6.3.6. PGP detached signatures
  
 
- proprietary algorithms
: 6.4.8. Proprietary Encryption Systems
  - RC4 and RC5 algorithms
: 6.4.1. Summary of Private Key Systems
  - references on
: D.1.5. Cryptography Books
  - Skipjack algorithm
: 6.4.1. Summary of Private Key Systems
  - superencryption
: 6.4.5. Improving the Security of DES
  - and superusers
: 6.2.4. Why Use Encryption with UNIX?
  - of Web information
: 18.4.1. Eavesdropping Over the Wire
 
- end-to-end encryption
: 16.3.1. Link-level Security
- Energy Sciences Network (ESnet)
: F.3.4.43. U.S. Department of Energy sites,  Energy Sciences Network (ESnet), and DOE contractors
- Enigma encryption system
- 
  - 6.3. The Enigma Encryption System
  - 6.6.1.1. The crypt program
 
- Enterprise Networks
: 16.1. Networking
- environment variables
- 
  - 11.5.2.7. Other initializations
  - 23.2. Tips on Avoiding Security-related Bugs
 
- environment, physical
- 
  - 12.2.1. The Environment
  - 12.2.1.13. Environmental monitoring
 
- erasing disks
: 12.3.2.3. Sanitize your media before disposal
- erotica, laws governing
: 26.4.5. Pornography and Indecent Material
- errno variable
: 23.2. Tips on Avoiding Security-related Bugs
- errors
: 7.1.1.1. A taxonomy of computer failures
- 
  - in ACLs
: 5.2.5.1. AIX Access Control Lists
  - configuration
: 9.1. Prevention
  - human
: 7.1.4. Guarding Against Media Failure
 
- errors
- 
  - Preface
  - (see also auditing, system activity)
 
- escape sequences, modems and
: 14.5.3.1. Originate testing
- escrowing encryption keys
- 
  - 6.1.3. Modern Controversy
  - 7.1.6.3. Data security for backups
 
- ESnet (Energy Sciences Network)
: F.3.4.43. U.S. Department of Energy sites,  Energy Sciences Network (ESnet), and DOE contractors
- espionage
: 11.3. Authors
- /etc directory
- 
  - 11.1.2. Back Doors and Trap Doors
  - 11.5.3.5. System initialization files
  - backups of
: 7.1.3. Types of Backups
  - /etc/aliases file
: 11.5.3.3. /usr/lib/aliases, /etc/aliases, /etc/sendmail/aliases, aliases.dir, or aliases.pag
  - /etc/default/login file
: 8.5.1. Secure Terminals
  - /etc/exports file
  
- 
    - 11.6.1.2. Writable system files and directories
    - 19.3.2.4. Using Secure NFS
    - making changes to
: 20.2.1.2. /usr/etc/exportfs
  
 
- /etc/fbtab file
: 17.3.21.1. /etc/fbtab and /etc/logindevperm
  - /etc/fingerd program
: (see finger command)
  - /etc/fsck program
: 24.4.1.7. Hidden files and directories
  - /etc/fstab file
  
- 
    - 11.1.2. Back Doors and Trap Doors
    - 19.3.2.5. Mounting a secure filesystem
  
 
- /etc/ftpd
: (see ftpd server)
  - /etc/ftpusers file
: 17.3.2.5. Restricting FTP with the standard UNIX FTP server
  - /etc/group file
  
- 
    - 1.2. What Is an Operating System?
    - 4.1.3.1. The /etc/group file
    - 4.2.3. Impact of the /etc/passwd and /etc/group Files  on Security
    - 8.1.6. Group Accounts
  
 
- /etc/halt command
: 24.2.6. Anatomy of a Break-in
  - /etc/hosts file
: 16.2.3.1. The /etc/hosts file
  - /etc/hosts.equiv
: (see hosts.equiv file)
  - /etc/hosts.lpd file
: 17.3.18.6. /etc/hosts.lpd file
  - /etc/inetd
: (see inetd daemon)
  - /etc/inetd.conf file
: 17.3. Primary UNIX Network Services
  - /etc/init program
: C.5.1. Process #1: /etc/init
  - /etc/inittab
: (see inittab program)
  - /etc/keystore file
: 19.3.1.1. Proving your identity
  - /etc/logindevperm file
: 17.3.21.1. /etc/fbtab and /etc/logindevperm
  - /etc/motd file
: 26.2.6. Other Tips
  - /etc/named.boot file
  
- 
    - 17.3.6.1. DNS zone transfers
    - 17.3.6.2. DNS nameserver attacks
  
 
- /etc/passwd file
  
- 
    - 1.2. What Is an Operating System?
    - 3.2.1. The /etc/passwd File
    - 3.2.2. The /etc/passwd File and Network Databases
    - 4.2.3. Impact of the /etc/passwd and /etc/group Files  on Security
    - 8.1.1. Accounts Without Passwords
    - 8.6. The UNIX Encrypted Password System
    - C.5.1. Process #1: /etc/init
    - + in
: (see NIS)
    - accounts without passwords
: 8.1.1. Accounts Without Passwords
    - backing up
: 7.1.2. What Should You Back Up?
    - new accounts
: 24.4.1. New Accounts
    - NFS
: 20.2.1.1. /etc/exports
    - uucp user and
: 15.1.4. How the UUCP Commands Work
  
 
- /etc/profile file
  
- 
    - 11.5.2.1. .login, .profile, /etc/profile
    - 24.4.1.6. Changes to startup files
  
 
- /etc/publickey file
: 19.3.2.1. Creating passwords for users
  - /etc/rc directory
  
- 
    - 11.5.3.5. System initialization files
    - 17.1.2. Starting the Servers
    - C.5.1. Process #1: /etc/init
    - commenting out services
: 17.3. Primary UNIX Network Services
  
 
- /etc/remote file
  
- 
    - 10.3.1. aculog File
    - 14.5.1. Hooking Up a Modem to Your Computer
  
 
- /etc/renice
: (see renice command)
  - /etc/secure/passwd file
: 8.1.1. Accounts Without Passwords
  - /etc/security/passwd.adjunct file
: 8.8.5. Shadow Password Files
  - /etc/sendmail/aliases file
: 11.5.3.3. /usr/lib/aliases, /etc/aliases, /etc/sendmail/aliases, aliases.dir, or aliases.pag
  - /etc/services file
: 17.1.1. The /etc/services File
  - /etc/services file
: 17.1.1. The /etc/services File
  - /etc/shadow file
  
- 
    - 8.1.1. Accounts Without Passwords
    - 8.8.5. Shadow Password Files
  
 
- /etc/shells file
: 8.4.2. Changing the Account's Login Shell
  - /etc/syslogd
: (see syslog facility)
  - /etc/tty file, backing up
: 7.1.2. What Should You Back Up?
  - /etc/ttys file
  
- 
    - 8.5.1. Secure Terminals
    - 14.5.1. Hooking Up a Modem to Your Computer
  
 
- /etc/ttytab file
: C.5.1. Process #1: /etc/init
  - /etc/utmp file
  
- 
    - 10.1.2. utmp and wtmp Files
    - 10.1.2.1. su command and /etc/utmp and /var/adm/wtmp files
    - 24.2.1. Catching One in the Act
    - 24.2.4. Tracing a Connection
  
 
- /etc/uucp directory
: 15.4.2.1. Some bad examples
  - /etc/yp/makedbm program
: 19.4.4.1. Setting up netgroups
  - in restricted filesystems
: 8.1.5. Restricted Filesystem
 
- Ethernet
: 16.1. Networking
- 
  - addresses for random seeds
: 23.8. Picking a Random Seed
  - cables
: (see cables, network)
  - eavesdropping by
: 12.3.1.2. Eavesdropping by Ethernet and 10Base-T
 
- Ethers table (NIS+)
: 19.5.3. NIS+ Tables
- Euler Totient Function
: 6.4.6.1. How RSA works
- eval function
- 
  - 18.2.3.2. Testing is not enough!
  - 18.2.3.3. Sending mail
 
- evidence, equipment seized as
: 26.2.4. Hazards of Criminal Prosecution
- ex editor
- 
  - 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
  - 11.5.2.4. .exrc
  - 11.5.2.7. Other initializations
 
- exceptions
: C.2. Creating Processes
- exclamation mark (!) and mail command
: 15.1.3. mail Command
- exclusive OR (XOR)
: 6.4.7. An Unbreakable Encryption Algorithm
- exec (in Swatch program)
: 10.6.2. The Swatch Configuration File
- exec system call
- 
  - 5.1.7. File Permissions in Detail
  - 18.2.3.3. Sending mail
  - 23.2. Tips on Avoiding Security-related Bugs
  - 25.2.1.1. Too many processes
 
- ExecCGI option
: 18.3.2. Commands Within the <Directory> Block
- execl system call
: 23.4. Tips on Writing SUID/SGID Programs
- execlp system call
: 23.4. Tips on Writing SUID/SGID Programs
- execute permission
- 
  - 5.1.7. File Permissions in Detail
  - 5.4. Using Directory Permissions
 
- execv system call
: 23.4. Tips on Writing SUID/SGID Programs
- execve system call
: 23.4. Tips on Writing SUID/SGID Programs
- execvp system call
: 23.4. Tips on Writing SUID/SGID Programs
- expiring
- 
  - accounts
: 8.4.3. Finding Dormant Accounts
  - FTP depositories
: 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP server
  - passwords
: 8.8.6. Password Aging and Expiration
 
- explosions
: 12.2.1.5. Explosion
- export laws
: 26.4.1. Munitions Export
- 
  - cryptography
  
- 
    - 6.4.4.1. Use and export of DES
    - 6.7.2. Cryptography and Export Controls
  
 
 
- exportfs command
: 20.2.1.2. /usr/etc/exportfs
- exports file
- 
  - 11.6.1.2. Writable system files and directories
  - 19.3.2.4. Using Secure NFS
  - 20.2.1.1. /etc/exports
  - 20.2.1.2. /usr/etc/exportfs
 
- .exrc file
: 11.5.2.4. .exrc
- ext2 filesystem (Linux)
: 25.2.2.6. Reserved space
- external data representation (XDR)
: 19.2. Sun's Remote Procedure Call (RPC)
- extinguishers, fire
: (see fires)
- extortion
: 11.3. Authors
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
 O'Reilly & Associates, Inc.
All Rights Reserved.