 
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: N
- name service
- 
  - 16.2.6. Name Service
  - 16.2.6.2. Other naming services
  - security and
: 16.3.2. Security and Nameservice
 
- name-value pairs in BNU UUCP
: 15.5.1.2. Name-value pairs
- named daemon
: 16.2.6.1. DNS under UNIX
- named nameserver
: 17.3.6.2. DNS nameserver attacks
- named-xfer program
: 16.2.6.1. DNS under UNIX
- named.boot file
- 
  - 17.3.6.1. DNS zone transfers
  - 17.3.6.2. DNS nameserver attacks
 
- names
- 
  - choosing UUCP
: 15.5.2. Permissions Commands
  - computer
  
- 
    - 16.2.3. Hostnames
    - 16.2.3.1. The /etc/hosts file
  
 
- user
: (see usernames)
 
- nameserver attacks, DNS
: 17.3.6.2. DNS nameserver attacks
- nameserver cache loading
: 16.3.2. Security and Nameservice
- NASA
- 
  - Ames Research Center
: F.3.4.22. NASA: Ames Research Center
 
- NASA: Goddard Space Flight Center
: F.3.4.23. NASA: Goddard Space Flight Center
- National Aeronautical Space Agency
: (see NASA)
- National Computer Security Center (NCSC)
: F.2.1. National Institute of Standards and Technology (NIST)
- National Institute of Standards and Technology
: (see NIST)
- National Science Foundation Network
: (see networks, NFSNET)
- national security
: 26.2.2. Federal Jurisdiction
- natural disasters
- 
  - 1.1. What Is Computer Security?
  - 7.1.1.1. A taxonomy of computer failures
  - 7.1.6.1. Physical security for backups
  - 12.2.1.1. Fire
  - (see also physical security)
  - accidents
: 12.2.2. Preventing Accidents
  - earthquakes
: 12.2.1.4. Earthquake
  - fires
  
- 
    - 12.2.1.1. Fire
    - 12.2.1.2. Smoke
  
 
- lightning
  
- 
    - 12.2. Protecting Computer Hardware
    - 12.2.1.9. Lightning
  
 
 
- natural gas
: 12.2.1.5. Explosion
- Naval Computer Incident Response Team (NAVCIRT)
: F.3.4.44. U.S. Department of the Navy
- ncheck command
: 5.5.4.1. The ncheck command
- 
  - -s option
  
- 
    - 5.5.4.1. The ncheck command
    - 5.6. Device Files
  
 
 
- NCSA HTTPD server
: 10.3.5. access_log Log File
- NCSA server
: (see Web servers)
- NCSC (National Computer Security Center)
: F.2.1. National Institute of Standards and Technology (NIST)
- needexpnhelo (sendmail)
: 17.3.4.3. Improving the security of Berkeley sendmail V8
- needmailhelo (sendmail)
: 17.3.4.3. Improving the security of Berkeley sendmail V8
- needvrfyhelo (sendmail)
: 17.3.4.3. Improving the security of Berkeley sendmail V8
- nested directories
: 25.2.2.8. Tree-structure attacks
- Netgroup table (NIS+)
: 19.5.3. NIS+ Tables
- netgroups, NIS
- 
  - 19.4.4. NIS Netgroups
  - 19.4.4.6. NIS is confused about "+"
  - limiting imported accounts
: 19.4.4.2. Using netgroups to limit the importing of accounts
 
- NetInfo
- 
  - 3.2.2. The /etc/passwd File and Network Databases
  - 16.2.6.2. Other naming services
 
- Netmasks table (NIS+)
: 19.5.3. NIS+ Tables
- netnews~firewalls
: 21.4.3. Netnews
- .netrc file
: 10.4.3. Network Setup
- Netscape Navigator
- 
  - encryption system of
: 18.4.1. Eavesdropping Over the Wire
  - random number generator
: 23.8. Picking a Random Seed
 
- netstat command
- 
  - 17.5. Monitoring Your Network with netstat
  - 24.2.1. Catching One in the Act
  - 24.2.4. Tracing a Connection
  - -a option
: 17.5. Monitoring Your Network with netstat
  - -n option
: 17.5. Monitoring Your Network with netstat
 
- network connections
: 17.3.3. TELNET (TCP Port 23)
- network databases
: 3.2.2. The /etc/passwd File and Network Databases
- Network Filesystem
: (see NFS)
- network filesystems
: 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
- Network Information Center (NIC)
: 24.2.4.2. How to contact the system administrator of a computer you don't know
- Network Information System
: (see NIS)
- Network News Transport Protocol
: (see NNTP)
- network providers
: 27.2.6. Network Providers that Network Too Well
- network services
- 
  - 17. TCP/IP Services
  - 17.7. Summary
  - 23.3. Tips on Writing Network Programs
  - DNS
: (see DNS)
  - encryption with
: 17.4. Security Implications of Network Services
  - finger
: (see finger command)
  - FTP
: (see FTP)
  - NNTP
: (see NNTP)
  - NTP
: (see NTP)
  - passwords for
: 17.4. Security Implications of Network Services
  - POP
: (see POP)
  - root account with
: 17.4. Security Implications of Network Services
  - securing
: 19.1. Securing Network Services
  - SMTP
: (see SMTP)
  - SNMP
: (see SNMP)
  - spoofing
: 17.5. Monitoring Your Network with netstat
  - systat
: 17.3.1. systat (TCP Port 11)
  - table of
: G. Table of IP Services
  - Telnet
: (see Telnet utility)
  - TFTP
: (see TFTP)
  - UUCP over TCP
: 17.3.20. UUCP over TCP (TCP Port 540)
 
- Network Time Protocol
: (see NTP)
- network weaving
: 16.1.1.1. Who is on the Internet?
- networks
- 
  - 10Base-T
: 12.3.1.2. Eavesdropping by Ethernet and 10Base-T
  - allowing threats from
: 11.4. Entry
  - ARPANET
: 16.1.1. The Internet
  - backing up
  
- 
    - 7.2.2. Small Network of Workstations and a Server
    - 7.2.4. Large Service-Based Networks with Large Budgets
  
 
- backups across
: 7.4.5. Backups Across the Net
  - cables for
: 12.2.4.2. Network cables
  - checklist for
  
- 
    - A.1.1.15. Chapter 16: TCP/IP Networks
    - A.1.1.16. Chapter 17: TCP/IP Services
  
 
- configuration files
: 10.4.3. Network Setup
  - connectors for
: 12.2.4.3. Network connectors
  - cutting cables
: 25.1. Destructive Attacks
  - denial of service on
  
- 
    - 25.3. Network Denial of Service Attacks
    - 25.3.4. Clogging
  
 
- disabling physically
: 25.3.3. Signal Grounding
  - Internet
: 16.1.1. The Internet
  - LANs
: (see LANs)
  - logging across
: 10.5.2.2. Logging across the network
  - logging services of
: 10.3.6. Logging Network Services
  - MANs
: 16.1. Networking
  - mobile computing
: 8.7. One-Time Passwords
  - monitoring with netstat
: 17.5. Monitoring Your Network with netstat
  - NFSNET
: 16.1.1. The Internet
  - packet-switching
: 16.2. IPv4: The Internet Protocol Version 4
  - scanning
: 17.6. Network Scanning
  - security references
: D.1.8. Network Technology and Security
  - services for
: 11.1.2. Back Doors and Trap Doors
  - sniffers
: 16.3. IP Security
  - spoofed connection
: 8.5.3.1. Trusted path
  - TCP/IP
: (see TCP/IP, networks)
  - UNIX and
: 16.1.2. Networking and UNIX
  - UUCP over
: 15.8. UUCP Over Networks
  - WANs
: 16.1. Networking
 
- Networks table (NIS+)
: 19.5.3. NIS+ Tables
- networks, computer
: 1.4.3. Add-On Functionality Breeds Problems
- Neumann, Peter
: 1.3. History of UNIX
- newgrp command
: 4.1.3.2. Groups and older AT&T UNIX
- newkey -u command
- 
  - 19.3.2.1. Creating passwords for users
  - 19.5.4.2. When a user's passwords don't match
 
- news
: (see Usenet)
- news (user)
: 4.1. Users and Groups
- newsgroups, defamation/harassment via
: 26.4.7. Harassment, Threatening Communication,  and Defamation
- NEXTSTEP Window Server (NSWS)
: 17.3.16. NEXTSTEP Window Server (NSWS) (TCP Port 178)
- NFS (Network Filesystem)
: 19. RPC, NIS, NIS+,  and Kerberos
- 
  - authentication and
  
- 
    - 19.2.2. RPC Authentication
    - 19.2.2.4. AUTH_KERB
  
 
- checklist for
: A.1.1.19. Chapter 20: NFS
  - file permissions
: 5.1.7. File Permissions in Detail
  - find command on
: 5.5.4. Finding All of the SUID and SGID Files
  - -local option
: 11.6.1.2. Writable system files and directories
  - MOUNT
: 20.1.1. NFS History
  - Secure NFS
: (see Secure NFS)
  - server, and UUCP
: 15.3. UUCP and Security
  - technical description of
: 20.1.1. NFS History
  - and trusted hosts
: 17.3.18.2. The problem with trusted hosts
  - -xdev option
: 11.6.1.2. Writable system files and directories
 
- NIC (Network Information Center)
: 24.2.4.2. How to contact the system administrator of a computer you don't know
- nice command
: 25.2.1.2. System overload attacks
- nice numbers
: C.1.3.3. Process priority and niceness
- NIS (Network Information Service)
- 
  - + in
  
- 
    - 19.4. Sun's Network Information Service (NIS)
    - 19.4.4.6. NIS is confused about "+"
  
 
- clients
: 19.4. Sun's Network Information Service (NIS)
  - domains
: 19.4.3. NIS Domains
  - maps
: 19.4. Sun's Network Information Service (NIS)
  - netgroups
  
- 
    - 19.4.4. NIS Netgroups
    - 19.4.4.6. NIS is confused about "+"
    - limiting imported accounts
: 19.4.4.2. Using netgroups to limit the importing of accounts
  
 
- Secure RPC with
  
- 
    - 19.3.2. Setting Up Secure RPC with NIS
    - 19.3.4. Limitations of Secure RPC
  
 
- spoofing
: 19.4.4.5. Spoofing NIS
  - UDP
: 16.2.4.3. UDP
  - Yellow Pages
: 16.2.6.2. Other naming services
 
- NIS (Network Information System)
- 
  - 3.2.2. The /etc/passwd File and Network Databases
  - 3.4. Changing Your Password
  - 19. RPC, NIS, NIS+,  and Kerberos
  - 19.4. Sun's Network Information Service (NIS)
  - 19.4.5. Unintended Disclosure of Site Information with NIS
 
- NIS+
- 
  - 3.2.2. The /etc/passwd File and Network Databases
  - 3.4. Changing Your Password
  - 16.2.6.2. Other naming services
  - 19.5. Sun's NIS+
  - 19.5.5. NIS+ Limitations
  - integrity-checking software for
: 19.5.5. NIS+ Limitations
  - principals
: 19.5.1. What NIS+ Does
  - Secure RPC with
  
- 
    - 19.3.2. Setting Up Secure RPC with NIS
    - 19.3.4. Limitations of Secure RPC
  
 
 
- nisaddcred command
: 19.3.1.1. Proving your identity
- niscat command
: 3.2.2. The /etc/passwd File and Network Databases
- nischown command
: 19.5.4. Using NIS+
- nispasswd command
- 
  - 3.4. Changing Your Password
  - 19.5.4. Using NIS+
  - 19.5.4.2. When a user's passwords don't match
 
- NIST (National Institute of Standards and Technology)
- 
  - F.2.1. National Institute of Standards and Technology (NIST)
  - F.3.4.26. NIST (National Institute of Standards and Technology)
 
- NNTP (Network News Transport Protocol)
: 17.3.13. Network News Transport Protocol (NNTP)  (TCP Port 119)
- nobody (user)
- 
  - 4.1. Users and Groups
  - 19.3.2.1. Creating passwords for users
 
- noexpn (sendmail)
: 17.3.4.3. Improving the security of Berkeley sendmail V8
- noise, electrical
: 12.2.1.8. Electrical noise
- nonadaptive modems
: (see modems)
- nonblocking systems
: 19.2. Sun's Remote Procedure Call (RPC)
- nonce
: 23.3. Tips on Writing Network Programs
- nonrepudiation
: 6.5. Message Digests and Digital Signatures
- NORDUNET
: F.3.4.27. NORDUNET: Denmark, Sweden, Norway, Finland, Iceland
- NOREAD= command
: 15.5.2. Permissions Commands
- Northwestern University
: F.3.4.28. Northwestern University
- nosuid
: 11.1.2. Back Doors and Trap Doors
- Novell
: 1.3. History of UNIX
- novrfy (sendmail)
: 17.3.4.3. Improving the security of Berkeley sendmail V8
- Nowitz, David
: 15.2. Versions of UUCP
- NOWRITE= command
: 15.5.2. Permissions Commands
- npasswd package
: 8.8.2. Constraining Passwords
- NPROC variable
: 25.2.1.1. Too many processes
- NSA (National Security Agency)
: F.2.2. National Security Agency (NSA)
- NSWS (NextStep Window Server)
: 17.3.16. NEXTSTEP Window Server (NSWS) (TCP Port 178)
- NTP (Network Time Protocol)
: 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
- 
  - Secure RPC and
: 19.3.1.3. Setting the window
 
- NU-CERT
: F.3.4.28. Northwestern University
- null device
: 5.6. Device Files
- nuucp account
- 
  - 15.1.4. How the UUCP Commands Work
  - 15.3.1. Assigning Additional UUCP Logins
  - 15.4.1.3. Format of USERFILE entry without system name
 
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
 O'Reilly & Associates, Inc.
All Rights Reserved.