 
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: M
- MAC (Mandatory Access Controls)
: 4.1.3. Groups and Group Identifiers (GIDs)
- MACH operating system
: 1.3. History of UNIX
- machine name
: 16.2.3. Hostnames
- MACHINE= command
- 
  - 15.5.1.2. Name-value pairs
  - 15.5.2. Permissions Commands
 
- Macintosh, Web server on
: 18.2. Running a Secure Server
- macro virus
: (see viruses)
- magic cookies
: 17.3.21.4. Using Xauthority magic cookies
- magic number
: 5.1.7. File Permissions in Detail
- mail
- 
  - 11.5.3.3. /usr/lib/aliases, /etc/aliases, /etc/sendmail/aliases, aliases.dir, or aliases.pag
  - (see also sendmail)
  - accepted by programs
: 17.3.4.1. sendmail and security
  - action, in Swatch program
: 10.6.2. The Swatch Configuration File
  - alias back door
: 11.1.2. Back Doors and Trap Doors
  - aliases
: (see aliases)
  - copyrights on
: 26.4.2. Copyright Infringement
  - Electronic Communications Privacy Act (ECPA)
: 26.2.3. Federal Computer Crime Laws
  - firewalls
: 21.4.2. Electronic Mail
  - forwarding (UUCP)
: 15.6.1. Mail Forwarding for UUCP
  - harassment via
: 26.4.7. Harassment, Threatening Communication,  and Defamation
  - logging
: 10.4.2. Mail
  - message flooding
: 25.3.2. Message Flooding
  - phantom, monitoring
: 17.3.4.2. Using sendmail to receive email
  - receiving by sendmail
: 17.3.4.2. Using sendmail to receive email
  - sending via CGI scripts
: 18.2.3.3. Sending mail
  - sent directly to file
: 15.7. Early Security Problems with UUCP
  - startup file attacks
: 11.5.2.5. .forward, .procmailrc
 
- mail command
: 15.1.3. mail Command
- Mail_Aliases table (NIS+)
: 19.5.3. NIS+ Tables
- mailing lists
- 
  - E.1. Mailing Lists
  - E.1.3.10. WWW-security
 
- maintenance mode
: C.5.1. Process #1: /etc/init
- maintenance personnel
: 13.3. Outsiders
- makedbm program
: 19.4.4.1. Setting up netgroups
- malware
: 11.1. Programmed Threats: Definitions
- man pages
: 2.5. The Problem with Security  Through Obscurity
- management, role of
- 
  - 2.3.4. Convincing Management
  - 2.5. The Problem with Security  Through Obscurity
 
- MANs (Metropolitan Networks)
: 16.1. Networking
- manual logging
- 
  - 10.7. Handwritten Logs
  - 10.7.2.2. Informational material
 
- manual pages
: 23.2. Tips on Avoiding Security-related Bugs
- maps, NIS
: (see NIS)
- Massey, James L.
: 6.4.1. Summary of Private Key Systems
- Master mode (uucico)
: 15.1.4. How the UUCP Commands Work
- master server
- 
  - 19.4. Sun's Network Information Service (NIS)
  - (see also NIS)
 
- MCERT
: F.3.4.21. Motorola, Inc. and subsidiaries
- MCI Corporation
: F.3.4.19. MCI Corporation
- MD2 algorithm
: 6.5.4.1. MD2, MD4, and MD5
- MD4 algorithm
: 6.5.4.1. MD2, MD4, and MD5
- MD5 algorithm
- 
  - 6.5.2. Using Message Digests
  - 6.5.4.1. MD2, MD4, and MD5
  - 23.5.1. Use Message Digests for Storing Passwords
  - 23.9. A Good Random Seed Generator
  - digital signatures versus
: 6.6.3.6. PGP detached signatures
  - in POP
: 17.3.10. Post Office Protocol (POP) (TCP Ports 109 and 110)
 
- media
: 12.3.3. Other Media
- 
  - damaged by smoke
: 12.2.1.2. Smoke
  - destroying
: 12.3.2.3. Sanitize your media before disposal
  - failure of
: 7.1.4. Guarding Against Media Failure
  - hard/soft disk quotas
: 25.2.2.5. Using quotas
  - print through process
: 12.3.2.1. Verify your backups
  - rotating for backups
: 7.1.3. Types of Backups
  - rotation of
: 7.2.1.2. Media rotation
  - sanitizing
: 12.3.2.3. Sanitize your media before disposal
  - viruses from
: 11.1.5. Viruses
 
- meet-in-the-middle attacks
: 6.4.5.1. Double DES
- memory
- 
  - 25.2.2. Disk Attacks
  - 25.2.2.8. Tree-structure attacks
  - hidden space
: 25.2.2.7. Hidden space
  - reserved space
: 25.2.2.6. Reserved space
  - swap space
: 25.2.3. Swap Space Problems
  - /tmp directory and
: 25.2.4. /tmp Problems
  - tree-structure attacks
: 25.2.2.8. Tree-structure attacks
 
- Merkle, Ralph
: 6.4.5.1. Double DES
- Message Authentication Code (MAC)
: 6.5.5.2. Message authentication codes
- message digests
- 
  - 6.5. Message Digests and Digital Signatures
  - 6.5.2. Using Message Digests
  - 9.2.3. Checksums and Signatures
  - 23.5.1. Use Message Digests for Storing Passwords
  - Tripwire package
  
- 
    - 9.2.4. Tripwire
    - 9.2.4.2. Running Tripwire
  
 
 
- message flooding
: 25.3.2. Message Flooding
- messages log file
: 10.2.3. messages Log File
- meta characters
: 23.2. Tips on Avoiding Security-related Bugs
- metadata
- 
  - 9.2.2. Checklists and Metadata
  - 9.2.2.2. Ancestor directories
 
- Metropolitan Networks (MANs)
: 16.1. Networking
- MH (mail handler)
: 11.5.2.5. .forward, .procmailrc
- Micro-BIT Virus Center
: F.3.4.16. Germany: Southern area
- Miller, Barton
: 23.1.2. An Empirical Study of the Reliability of UNIX Utilities
- MILNET
: F.3.4.20. MILNET
- MIME
: 11.1.5. Viruses
- MIT-KERBEROS-5 authentication
: 17.3.21.3. The xhost facility
- Mitnick, Kevin
: 27.2.6. Network Providers that Network Too Well
- mkpasswd program
: 8.8.4. Password Generators
- mktemp function
: 23.2. Tips on Avoiding Security-related Bugs
- MLS (Multilevel Security) environment
: "Secure" Versions of UNIX
- mobile network computing
: 8.7. One-Time Passwords
- modems
- 
  - 14. Telephone Security
  - 14.6. Additional Security for Modems
  - callback setups
  
- 
    - 14.4.2. 
    - 14.6. Additional Security for Modems
  
 
- clogging
: 25.3.4. Clogging
  - encrypting
: 14.6. Additional Security for Modems
  - hanging up
: (see signals)
  - physical security of
  
- 
    - 14.5.4. Physical Protection of Modems
    - 14.6. Additional Security for Modems
  
 
- recording call information
: 10.3.1. aculog File
  - tracing connections
  
- 
    - 24.2.4. Tracing a Connection
    - 24.2.4.2. How to contact the system administrator of a computer you don't know
  
 
- UNIX and
  
- 
    - 14.5. Modems and UNIX
    - 14.5.3.3. Privilege testing
  
 
 
- modification times
- 
  - 5.1.2. Inodes
  - 5.1.5. File Times
  - 7.4.7. inode Modification Times
  - 9.2.2. Checklists and Metadata
 
- monitoring
- 
  - hardware for
: (see detectors)
  - intruders
: 24.2.3. Monitoring the Intruder
  - performance
: 13.2.3. Performance Reviews and Monitoring
  - security
: (see logging)
  - users
: 26.2.6. Other Tips
 
- monitors and screen savers
: 12.3.5.2. X screen savers
- Morris, Robert T.
- 
  - 1. Introduction
  - 8.6. The UNIX Encrypted Password System
  - 17.4. Security Implications of Network Services
 
- motd file
: 26.2.6. Other Tips
- Motorola, Inc.
: F.3.4.20. MILNET
- Motorola, Inc. and subsidiaries
: F.3.4.21. Motorola, Inc. and subsidiaries
- mount command
: 20.3. Client-Side NFS Security
- 
  - -nodev option
: 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
  - -nosuid option
: 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
 
- mounted filesystems
: 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
- mouting filesystem
: (see directories)
- mrand48 function
: 23.7.3. drand48  (  ), lrand48  (  ), and mrand48  (  )
- mtime
- 
  - 5.1.2. Inodes
  - 5.1.5. File Times
  - 9.2.2. Checklists and Metadata
  - 24.4.1.6. Changes to startup files
 
- MUDs (Multiuser Dungeons)
: 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
- Muffet, Alec
: 10.5.3.1. Beware false log entries
- multicast groups
: 16.2.1.2. Classical network addresses
- MULTICS (Multiplexed Information and Computing Service)
: 1.3. History of UNIX
- multilevel security
- 
  - 1.3. History of UNIX
  - 2.4.4.7. Defend in depth
  - 2.5.3. Final Words: Risk Management Means  Common Sense
  - 17.2. Controlling Access to Servers
 
- multitasking
- 
  - 1.4. Security and UNIX
  - C.1.3.3. Process priority and niceness
 
- multiuser operating systems
: 1.4. Security and UNIX
- multiuser workstations
: 17.3.21.1. /etc/fbtab and /etc/logindevperm
- munitions export
: 26.4.1. Munitions Export
- MX record type
: 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
- MYNAME= command
: 15.5.2. Permissions Commands
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
 O'Reilly & Associates, Inc.
All Rights Reserved.