 
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: S
- S/Key codebook scheme
: 8.7.3. Code Books
- sa command
: 10.2. The acct/pacct Process Accounting File
- sabotage
: (see terrorism; vandalism)
- salt
- 
  - 8.6.2. What Is Salt?
  - 8.6.3. What the Salt Doesn't Do
 
- sanitizing media
: 12.3.2.3. Sanitize your media before disposal
- SATAN package
- 
  - 17.6.1. SATAN
  - E.4.7. SATAN
 
- savacct file
: 10.2. The acct/pacct Process Accounting File
- saved UID
: 4.3.2. Saved IDs
- saving backup media
- 
  - 7.1.5. How Long Should You Keep a Backup?
  - (see also archiving information; backups)
 
- sbrk command
: 23.2. Tips on Avoiding Security-related Bugs
- scanf function
: 23.2. Tips on Avoiding Security-related Bugs
- scanning networks
: 17.6. Network Scanning
- SCCS (Source Code Control System)
- 
  - 7.3.2. Building an Automatic Backup System
  - 17.3. Primary UNIX Network Services
 
- Scherbius, Arthur
: 6.3. The Enigma Encryption System
- screen savers
: 12.3.5.2. X screen savers
- screens, multiple
: 12.3.4.3. Multiple screens
- script command
: 24.1.2. Rule #2: DOCUMENT
- scripts, CGI
: (see CGI, scripts)
- scytales
: 6.1. A Brief History of Cryptography
- search warrants
- 
  - 26.2.4. Hazards of Criminal Prosecution
  - 26.2.5. If You or One of Your Employees Is a Target  of an Investigation...
 
- searching for .rhosts file
: 17.3.18.5. Searching for .rhosts files
- Seberry, Jennifer
: 6.5.4.3. HAVAL
- secrecy, Kerberos
: 19.6.1.3. Authentication, data integrity, and secrecy
- secret keys
: 6.4.6. RSA and Public Key Cryptography
- Secret Service, U.S.
- 
  - 26.2.2. Federal Jurisdiction
  - F.3.3. U.S. Secret Service (USSS)
 
- Secure Hash Algorithm (SHA)
- 
  - 6.5.3. Digital Signatures
  - 6.5.4.2. SHA
 
- Secure HTTP
: 18.4.1. Eavesdropping Over the Wire
- Secure NFS
: 19.3.2.4. Using Secure NFS
- -secure option
- 
  - 19.3.2.4. Using Secure NFS
  - 19.4.4.5. Spoofing NIS
 
- secure option for /etc/exports
: 20.2.1.1. /etc/exports
- Secure RPC
- 
  - 19.3. Secure RPC (AUTH_DES)
  - 19.3.4. Limitations of Secure RPC
  - with NIS/NIS+
  
- 
    - 19.3.2. Setting Up Secure RPC with NIS
    - 19.3.4. Limitations of Secure RPC
  
 
- NTP and
: 19.3.1.3. Setting the window
  - reauthentication
: 19.3.1.3. Setting the window
  - versus Kerberos
: 19.6.2. Kerberos vs. Secure RPC
 
- Secure Socket Layer
: (see SSL)
- secure terminals
: 8.5.1. Secure Terminals
- SecureID
: 8.7.2. Token Cards
- SecureNet key
: 8.7.2. Token Cards
- security
- 
  - 2.1. Planning Your Security Needs
  - 9.1.2. Read-only Filesystems
  - 12.1.1. The Physical Security Plan
  - (see also integrity; physical security; system administration; threats)
  - of CGI scripts
  
- 
    - 18.2.3. Writing Secure CGI Scripts and Programs
    - 18.2.4.1. Beware mixing HTTP with anonymous FTP
  
 
- changed detection
  
- 
    - 9.2. Detecting Change
    - 9.3. A Final Note
  
 
- checking arguments
: 23.2. Tips on Avoiding Security-related Bugs
  - critical messages to log
  
- 
    - 10.5.3. syslog Messages
    - 10.5.3.1. Beware false log entries
  
 
- cryptography
  
- 
    - 6. Cryptography
    - 6.7.2. Cryptography and Export Controls
  
 
- definition of
: 1.1. What Is Computer Security?
  - digital signatures
: (see digital signatures)
  - disabling finger
: 17.3.8.2. Disabling finger
  - disk quotas
: 25.2.2.5. Using quotas
  - dormant accounts, finding
: 8.4.3. Finding Dormant Accounts
  - drills
: 24.1.3. Rule #3: PLAN AHEAD
  - /etc/passwd
: (see /etc/group file; /etc/passwd file)
  - firewalls
: (see firewalls)
  - four steps toward
: 2.4.4.7. Defend in depth
  - guessable passwords
  
- 
    - 3.6.1. Bad Passwords: Open Doors
    - 3.6.4. Passwords on Multiple Machines
  
 
- identification protocol
: 17.3.12. Identification Protocol (auth) (TCP Port 113)
  - improving DES algorithm
  
- 
    - 6.4.5. Improving the Security of DES
    - 6.4.5.2. Triple DES
  
 
- IP
  
- 
    - 16.3. IP Security
    - 16.3.3. Authentication
  
 
- laws and
: (see laws)
  - legal liability
  
- 
    - 26.4. Other Liability
    - 26.4.7. Harassment, Threatening Communication,  and Defamation
  
 
- levels of NIS+ servers
: 19.5.5. NIS+ Limitations
  - link-level
: 16.3.1. Link-level Security
  - message digests
: (see message digests)
  - modems and
  
- 
    - 14.4. Modems and Security
    - 14.4.4.2. Protection against eavesdropping
  
 
- monitoring
: (see logging)
  - multilevel (defense in depth)
  
- 
    - 1.3. History of UNIX
    - 2.4.4.7. Defend in depth
    - 2.5.3. Final Words: Risk Management Means  Common Sense
    - 17.2. Controlling Access to Servers
  
 
- name service and
: 16.3.2. Security and Nameservice
  - national
: 26.2.2. Federal Jurisdiction
  - network services
  
- 
    - 17.4. Security Implications of Network Services
    - 19.1. Securing Network Services
  
 
- passwords
  
- 
    - 3.2. Passwords
    - 3.8. Summary
  
 
- personnel
  
- 
    - 13. Personnel Security
    - 13.3. Outsiders
    - A.1.1.12. Chapter 13: Personnel Security
  
 
- policy of
  
- 
    - 1.2. What Is an Operating System?
    - 2. Policies and Guidelines
    - 2.5.3. Final Words: Risk Management Means  Common Sense
  
 
- protecting backups
  
- 
    - 7.1.6. Security for Backups
    - 7.1.6.3. Data security for backups
  
 
- published resources on
  
- 
    - D. Paper Sources
    - D.2. Security Periodicals
  
 
- responding to breakins
  
- 
    - 24. Discovering a  Break-in
    - 24.7. Damage Control
  
 
- restricting login
: 8.3. Restricting Logins
  - .rhosts
: (see .rhosts file)
  - sendmail problems
: 17.3.4.1. sendmail and security
  - Skipjack algorithm
: 6.4.1. Summary of Private Key Systems
  - SNMP and
: 17.3.15. Simple Network Management Protocol (SNMP) (UDP Ports 161 and 162)
  - software piracy
: 26.4.2.1. Software piracy and the SPA
  - standards of
: 2.4.2. Standards
  - superuser problems
: 4.2.1.5. The problem with the superuser
  - through obscurity
  
- 
    - 2.5. The Problem with Security  Through Obscurity
    - 2.5.3. Final Words: Risk Management Means  Common Sense
    - 8.8.9. Account Names Revisited: Using Aliases  for Increased Security
    - 18.2.4. Keep Your Scripts Secret!
  
 
- tools for
: 11.1. Programmed Threats: Definitions
  - Tripwire package
  
- 
    - 9.2.4. Tripwire
    - 9.2.4.2. Running Tripwire
  
 
- UNIX and
  
- 
    - 1. Introduction
    - 1.4. Security and UNIX
    - 1.4.3. Add-On Functionality Breeds Problems
  
 
- user awareness of
  
- 
    - 1.4.1. Expectations
    - 2. Policies and Guidelines
    - 2.4.4.4. Concentrate on education
    - 13.2.2. Ongoing Training and Awareness
  
 
- UUCP
: (see UUCP)
  - weakness-finding tools
: 11.1.1. Security Tools
  - World Wide Web
  
- 
    - 18. WWW Security
    - 18.7. Summary
  
 
- X Window System
  
- 
    - 17.3.21.2. X security
    - 17.3.21.3. The xhost facility
  
 
 
- Security Emergency Response Team (SERT)
: F.3.4.4. Australia: Internet .au domain
- security file (UUCP)
: 10.3.4. uucp Log Files
- security holes
- 
  - 2.5. The Problem with Security  Through Obscurity
  - (see also back doors; threats)
  - ftpd program
: 6.5.2. Using Message Digests
  - mailing list for
: E.1.3.3. Bugtraq
  - reporting
: 2.5.1. Going Public
  - ruusend in L.cmds file
: 15.4.3. L.cmds: Providing Remote Command Execution
  - SUID/SGID programs
: 5.5.3.1. write: Example of a possible SUID/SGID security hole
  - /usr/lib/preserve
: 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
  - UUCP
: 15.7. Early Security Problems with UUCP
 
- sed scripts
: 11.1.4. Trojan Horses
- seeds, random number
- 
  - 23.6. Tips on Generating Random Numbers
  - 23.8. Picking a Random Seed
 
- select system call
: 17.1.3. The /etc/inetd Program
- selection lists
: 18.2.3.1. Do not trust the user's browser!
- self-destruct sequences
: 27.2.1. Hardware Bugs
- SENDFILES= command
- 
  - 15.5.1.3. A Sample Permissions file
  - 15.5.2. Permissions Commands
 
- sendmail
- 
  - 11.1.2. Back Doors and Trap Doors
  - 11.5.2.5. .forward, .procmailrc
  - 11.5.3.3. /usr/lib/aliases, /etc/aliases, /etc/sendmail/aliases, aliases.dir, or aliases.pag
  - 17.3.4. Simple Mail Transfer Protocol (SMTP) (TCP Port 25)
  - 17.3.4.3. Improving the security of Berkeley sendmail V8
  - 24.2.4.2. How to contact the system administrator of a computer you don't know
  - (see also mail)
  - aliases
: 11.5.3.3. /usr/lib/aliases, /etc/aliases, /etc/sendmail/aliases, aliases.dir, or aliases.pag
  - determining version of
: 17.3.4.1. sendmail and security
  - .forward file
: 24.4.1.6. Changes to startup files
  - improving Version 8
: 17.3.4.3. Improving the security of Berkeley sendmail V8
  - logging to syslog
: 17.3.4.3. Improving the security of Berkeley sendmail V8
  - same Internet/NIS domain
: 19.4.3. NIS Domains
  - security problems with
: 17.3.4.1. sendmail and security
 
- sendmail.cf file
: 17.3.4. Simple Mail Transfer Protocol (SMTP) (TCP Port 25)
- sensors
: (see detectors)
- separation of duties
: 13.2.5. Least Privilege and Separation of Duties
- sequence of commands
: 23.2. Tips on Avoiding Security-related Bugs
- serial interfaces
: 14.2. Serial Interfaces
- Serial Line Internet Protocol (SLIP)
: 14.5. Modems and UNIX
- serial numbers, logging
: 10.7.1.2. Informational material
- SERT (Security Emergency Response Team)
: F.3.4.4. Australia: Internet .au domain
- server-side includes
- 
  - 18.2.2.2. Additional configuration issues
  - 18.3.2. Commands Within the <Directory> Block
 
- servers
- 
  - 16.2.5. Clients and Servers
  - 17.1. Understanding UNIX Internet Servers
  - 17.1.3. The /etc/inetd Program
  - backing up
: 7.2.2. Small Network of Workstations and a Server
  - checklist for bringing up
: 17.4. Security Implications of Network Services
  - controlling access to
: 17.2. Controlling Access to Servers
  - ftp
: (see FTP)
  - http
: (see http server)
  - load shedding
: 23.3. Tips on Writing Network Programs
  - master/slave
: (see NIS)
  - NIS+, security levels of
: 19.5.5. NIS+ Limitations
  - overloading with requests
: 25.3.1. Service Overloading
  - setting up for FTP
  
- 
    - 17.3.2.4. Setting up an FTP server
    - 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP server
  
 
- web
: (see web servers)
  - WN
: 18.3. Controlling Access to Files on Your Server
  - Xauthority
: 17.3.21.4. Using Xauthority magic cookies
 
- service overloading
: 25.3.1. Service Overloading
- services file
: 17.1.1. The /etc/services File
- Services table (NIS+)
: 19.5.3. NIS+ Tables
- SESAME (Secure European System for Applications in a Multivendor Environment)
: 19.7.2. SESAME
- session
- 
  - hijacking
: 17.3.3. TELNET (TCP Port 23)
  - IDs
  
- 
    - 4.3.3. Other IDs
    - C.1.3.4. Process groups and sessions
  
 
- keys
  
- 
    - 6.4. Common Cryptographic Algorithms
    - 19.3.1.1. Proving your identity
  
 
 
- setgid function
- 
  - 4.3.3. Other IDs
  - 23.4. Tips on Writing SUID/SGID Programs
 
- setpgrp function
: C.1.3.4. Process groups and sessions
- setrlimit function
: 23.2. Tips on Avoiding Security-related Bugs
- setsid function
: C.1.3.4. Process groups and sessions
- setuid file
: 4.3.1. Real and Effective UIDs
- setuid function
: 23.4. Tips on Writing SUID/SGID Programs
- setuid/setgid
: (see SUID/SGID programs)
- SGID bit
- 
  - 5.5.1. SUID, SGID, and Sticky Bits
  - 5.5.7. SGID Bit on Files (System V UNIX Only): Mandatory Record Locking
  - (see also SUID/SGID programs)
  - clearing with chown
: 5.7. chown: Changing a File's Owner
  - on directories
: 5.5.6. SGID and Sticky Bits on Directories
  - on files
: 5.5.7. SGID Bit on Files (System V UNIX Only): Mandatory Record Locking
 
- SGID files
: B.3.2.2. SGID files
- sh (Bourne shell)
- 
  - 11.5.1. Shell Features
  - C.5.3. Running the User's Shell
  - (see also shells)
 
- sh program
: 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
- 
  - SUID and
: 5.5.2. Problems with SUID
 
- SHA (Secure Hash Algorithm)
- 
  - 6.5.3. Digital Signatures
  - 6.5.4.2. SHA
 
- shadow file
- 
  - 8.1.1. Accounts Without Passwords
  - 8.8.5. Shadow Password Files
 
- shadow passwords
- 
  - 3.2.1. The /etc/passwd File
  - 8.4.1. Changing an Account's Password
  - 8.8.5. Shadow Password Files
 
- Shamir, Adi
- 
  - 6.4.2. Summary of Public Key Systems
  - 6.4.6. RSA and Public Key Cryptography
 
- shar format file
: 11.1.4. Trojan Horses
- shareware
: 27.2.2. Viruses on the Distribution Disk
- shell escapes
- 
  - 8.1.3. Accounts That Run a Single Command
  - 8.1.4.6. Potential problems with rsh
  - in L.cmds list
: 15.4.3. L.cmds: Providing Remote Command Execution
 
- shell scripts, SUID
- 
  - 5.5.3. SUID Shell Scripts
  - 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
 
- shells
- 
  - 1.2. What Is an Operating System?
  - 3.2.1. The /etc/passwd File
  - 11.1.4. Trojan Horses
  - 11.5.1. Shell Features
  - 11.5.1.4. Filename attacks
  - C.2. Creating Processes
  - C.5.3. Running the User's Shell
  - changing
  
- 
    - 8.4.2. Changing the Account's Login Shell
    - 8.7.1. Integrating One-time Passwords with UNIX
  
 
- history files
: 10.4.1. Shell History
  - one-command accounts
: 8.1.3. Accounts That Run a Single Command
  - restricted (rsh, ksh)
  
- 
    - 8.1.4.1. Restricted shells under System V UNIX
    - 8.1.4.6. Potential problems with rsh
  
 
- UUCP
: (see uucico program)
 
- shells file
: 8.4.2. Changing the Account's Login Shell
- Shimomura, Tsutomu
: 23.3. Tips on Writing Network Programs
- shoulder surfing
- 
  - 3.2.4. Passwords Are a Shared Secret
  - 5.5.2. Problems with SUID
 
- shredders
: 12.3.3. Other Media
- SHTTP
: (see Secure HTTP)
- shutdowns and wtmp file
: 10.1.3. last Program
- SIGHUP signal
: C.4. The kill Command
- SIGKILL signal
: C.4. The kill Command
- Signal Ground (SG)
: 14.3. The RS-232 Serial Protocol
- signal grounding
: 25.3.3. Signal Grounding
- signals
: C.3. Signals
- signature
: 9.2. Detecting Change
- signatures
: (see digital signatures)
- SIGSTOP signal
: C.4. The kill Command
- SIGTERM signal
: 25.2.1.1. Too many processes
- Simple Mail Transfer Protocol (SMTP)
- 
  - 17.3.4. Simple Mail Transfer Protocol (SMTP) (TCP Port 25)
  - 17.3.4.3. Improving the security of Berkeley sendmail V8
 
- Simple Network Management Protocol
: (see SNMP)
- single-user mode
: C.5.1. Process #1: /etc/init
- Skipjack algorithm
: 6.4.1. Summary of Private Key Systems
- slash (/)
- 
  - IFS separator
: 11.5.1.2. IFS attacks
  - root directory
  
- 
    - 5.1.1. Directories
    - (see also root directory)
  
 
 
- Slave mode (uucico)
: 15.1.4. How the UUCP Commands Work
- slave server
- 
  - 19.4. Sun's Network Information Service (NIS)
  - (see also NIS)
 
- SLIP (Serial Line Internet Protocol)
- 
  - 14.5. Modems and UNIX
  - 16.2. IPv4: The Internet Protocol Version 4
 
- Small Business Community Nationwide (SBA CERT)
: F.3.4.31. Small Business Association (SBA):  small business community nationwide
- smap program
: 17.3.4.1. sendmail and security
- smart cards, firewalls
: 21.5. Special Considerations
- smit tool
: 8.8.2. Constraining Passwords
- smoke and smoking
: 12.2.1.2. Smoke
- SMTP (Simple Mail Transfer Protocol)
- 
  - 17.3.4. Simple Mail Transfer Protocol (SMTP) (TCP Port 25)
  - 17.3.4.3. Improving the security of Berkeley sendmail V8
 
- SNA (System Network Architecture)
: 16.4.2. SNA
- SNEFRU algorithm
: 6.5.4.4. SNEFRU
- sniffers
- 
  - 1.4.3. Add-On Functionality Breeds Problems
  - 3. Users and Passwords
  - 8.7. One-Time Passwords
  - 17.3.3. TELNET (TCP Port 23)
  - (see also eavesdropping)
  - network
: 16.3. IP Security
  - packet
: 16.3.1. Link-level Security
 
- SNMP (Simple Network Management Protocol)
: 17.3.15. Simple Network Management Protocol (SNMP) (UDP Ports 161 and 162)
- snoop program
: 24.2.3. Monitoring the Intruder
- SOCKS
: E.4.8. SOCKS
- soft disk quotas
: 25.2.2.5. Using quotas
- software
- 
  - for backups
  
- 
    - 7.4. Software for Backups
    - 7.4.7. inode Modification Times
  
 
- bugs in
: (see bugs)
  - for checking integrity
: 19.5.5. NIS+ Limitations
  - checking new
  
- 
    - 8.1.5.2. Checking new software
    - 11.1.2. Back Doors and Trap Doors
  
 
- consistency of
: 2.1. Planning Your Security Needs
  - distributing
: (see FTP)
  - exporting
: 26.4.1. Munitions Export
  - failure of
: 7.1.1.1. A taxonomy of computer failures
  - hacker challenges
: 27.2.4. Hacker Challenges
  - logic bombs
: 11.1.3. Logic Bombs
  - operating system
: (see operating systems)
  - patches for, logging
: 10.7.2.2. Informational material
  - quality of
  
- 
    - 1.4.2. Software Quality
    - 1.4.3. Add-On Functionality Breeds Problems
  
 
- stolen (pirated)
  
- 
    - 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP server
    - 26.4.2.1. Software piracy and the SPA
  
 
- stored via FTP
: 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP server
  - testing
: 1.4.2. Software Quality
  - vendor license agreements
: 18.5.2. Trusting Your Software Vendor
  - viruses
: 11.1.5. Viruses
  - worms
: 11.1.6. Worms
 
- software patents
: 6.7.1. Cryptography and the U.S. Patent System
- Software Publishers Association (SPA)
: 26.4.2.1. Software piracy and the SPA
- Software Security Response Team (SSRT)
: F.3.4.9. Digital Equipment Corporation and customers
- Solaris
- 
  - 1.3. History of UNIX
  - 8.7.1. Integrating One-time Passwords with UNIX
  - /etc/logindevperm
: 17.3.21.1. /etc/fbtab and /etc/logindevperm
  - process limit
: 25.2.1.1. Too many processes
  - Secure RPC time window
: 19.3.1.3. Setting the window
  - /var/adm/loginlog file
: 10.1.4. loginlog File
  - wtmpx file
: 10.1.2. utmp and wtmp Files
 
- Source Code Control System (SCCS)
: 7.3.2. Building an Automatic Backup System
- source code, keeping secret
: 2.5. The Problem with Security  Through Obscurity
- SPA (Software Publishers Association)
: 26.4.2.1. Software piracy and the SPA
- Spaf's first principle
: 2.4.4.5. Have authority commensurate with responsibility
- spies
- 
  - 11.3. Authors
  - 14.4.4.1. Kinds of eavesdropping
 
- spoofing
: 16.3. IP Security
- 
  - network connection
: 8.5.3.1. Trusted path
  - network services
: 17.5. Monitoring Your Network with netstat
  - NIS
: 19.4.4.5. Spoofing NIS
  - RPCs
: 19.4.4.4. Spoofing RPC
 
- spool file
: 15.1.4. How the UUCP Commands Work
- spoolers, printer
: 12.3.4.1. Printer buffers
- sprinkler systems
- 
  - 12.2.1.1. Fire
  - (see also water)
 
- Sprint response team
: F.3.4.32. Sprint
- sprintf function
- 
  - 23.1.1. The Lesson of the Internet Worm
  - 23.2. Tips on Avoiding Security-related Bugs
 
- sscanf function
: 23.2. Tips on Avoiding Security-related Bugs
- SSL (Secure Socket Layer)
: 18.4.1. Eavesdropping Over the Wire
- SSRT (Software Security Response Team)
: F.3.4.9. Digital Equipment Corporation and customers
- Stallman, Richard
: 1. Introduction
- start bit
- 
  - 14.1. Modems: Theory of Operation
  - 14.2. Serial Interfaces
 
- startup command
: 10.2.1. Accounting with System V
- startup files
- 
  - attacks via
  
- 
    - 11.5.2. Start-up File Attacks
    - 11.5.2.7. Other initializations
  
 
- intruder's changes to
: 24.4.1.6. Changes to startup files
 
- stat function
: 5.4. Using Directory Permissions
- state law enforcement
: 26.2.1. The Local Option
- stateless
: 20.1.4.3. Connectionless and stateless
- static electricity
: 12.2.1.8. Electrical noise
- static links
: 23.4. Tips on Writing SUID/SGID Programs
- stdio
: (see portable I/O library)
- Steele, Guy L.
: 1. Introduction
- sticky bits
: 5.5.1. SUID, SGID, and Sticky Bits
- 
  - on directories
: 5.5.6. SGID and Sticky Bits on Directories
 
- stolen property
: (see theft)
- stop bit
- 
  - 14.1. Modems: Theory of Operation
  - 14.2. Serial Interfaces
 
- storage
- 
  - 12.3.4. Protecting Local Storage
  - 12.3.4.5. Function keys
 
- strcpy routine
: 23.1.1. The Lesson of the Internet Worm
- streadd function
: 23.2. Tips on Avoiding Security-related Bugs
- strecpy function
: 23.2. Tips on Avoiding Security-related Bugs
- strength, cryptographic
: 6.2.3. Cryptographic Strength
- 
  - of DES algorithm
  
- 
    - 6.4.4.3. DES strength
    - 6.4.5.2. Triple DES
  
 
- of RSA algorithm
: 6.4.6.3. Strength of RSA
 
- string command
: 12.3.5.2. X screen savers
- strtrns function
: 23.2. Tips on Avoiding Security-related Bugs
- su command
- 
  - 4.2.1.2. Superuser is not for casual use
  - 4.3. su: Changing Who You Claim to Be
  - 4.3.8. Other Uses of su
  - becoming superuser
: 4.3.4. Becoming the Superuser
  - log of failed attempts
: 4.3.7. The Bad su Log
  - sulog file
  
- 
    - 10.1. The Basic Log Files
    - 10.3.2. sulog Log File
  
 
- utmp and wtmp files and
: 10.1.2.1. su command and /etc/utmp and /var/adm/wtmp files
 
- subnetting
: 16.2.1.2. Classical network addresses
- substitution (in encryption)
: 6.1.2. Cryptography and Digital Computers
- SUID/SGID programs
- 
  - 4.3.1. Real and Effective UIDs
  - 5.5. SUID
  - 5.5.7. SGID Bit on Files (System V UNIX Only): Mandatory Record Locking
  - B.3. SUID and SGID Files
  - back door via
: 11.1.2. Back Doors and Trap Doors
  - chown command and
: 5.7. chown: Changing a File's Owner
  - chroot call and
: 8.1.5.2. Checking new software
  - created by intruders
: 24.4.1.3. New SUID and SGID files
  - on directories
: 5.5.6. SGID and Sticky Bits on Directories
  - disabling (turning off)
: 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
  - finding all files
  
- 
    - 5.5.4. Finding All of the SUID and SGID Files
    - 5.5.4.1. The ncheck command
  
 
- shell scripts
  
- 
    - 5.5.3. SUID Shell Scripts
    - 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
  
 
- uucp access
: 15.3. UUCP and Security
  - writing
: 23.4. Tips on Writing SUID/SGID Programs
 
- SUID/SGID programs:writing:programming:writing:zzz]
: 23. Writing Secure SUID and Network Programs
- suing
: (see civil actions)
- sulog file
- 
  - 4.3.7. The Bad su Log
  - 10.3.2. sulog Log File
 
- sum command
- 
  - 6.5.5.1. Checksums
  - 9.2.3. Checksums and Signatures
 
- Sun Microsystem's NIS
: (see NIS)
- Sun Microsystems
: F.3.4.34. Sun Microsystems customers
- SUN-DES-1 authentication
: 17.3.21.3. The xhost facility
- SunOS operating system
: 1.3. History of UNIX
- 
  - authdes_win variable
: 19.3.1.3. Setting the window
  - /etc/fbtab file
: 17.3.21.1. /etc/fbtab and /etc/logindevperm
  - TFTP sand
: 17.3.7. Trivial File Transfer Protocol (TFTP) (UDP Port 69)
  - trusted hosts and
: 17.3.18.5. Searching for .rhosts files
 
- superencryption
: 6.4.5. Improving the Security of DES
- superuser
- 
  - 4. Users, Groups, and the Superuser
  - 4.2.1. The Superuser
  - 4.2.1.5. The problem with the superuser
  - (see also root account)
  - abilities of
: 27.1.3. What the Superuser Can and Cannot Do
  - becoming with su
: 4.3.4. Becoming the Superuser
  - changing passwords
  
- 
    - 8.4.1. Changing an Account's Password
    - 8.8.8. Disabling an Account by Changing Its Password
  
 
- encryption and
: 6.2.4. Why Use Encryption with UNIX?
  - logging attempts to become
: (see sulog file)
  - problems with
: 4.2.1.5. The problem with the superuser
  - restrictions on
: 4.2.1.4. What the superuser can't do
  - TCB files
: 8.5.3.2. Trusted computing base
  - using passwd command
: 3.5. Verifying Your New Password
  - web server as
: 18.2.1. The Server's UID
 
- SURFnet
: F.3.4.25. Netherlands: SURFnet-connected sites
- surges
: (see power surges)
- SVR4 (System V Release 4)
: 1.3. History of UNIX
- swap partition
: 5.5.1. SUID, SGID, and Sticky Bits
- swap space
: 25.2.3. Swap Space Problems
- Swatch program
- 
  - 10.6. Swatch: A Log File Tool
  - 10.6.2. The Swatch Configuration File
  - E.4.9. Swatch
 
- SWITCH
: F.3.4.35. SWITCH-connected sites
- symbolic links and permissions
: 5.1.7. File Permissions in Detail
- symbolic-link following
- 
  - 18.2.2.2. Additional configuration issues
  - 18.3.2. Commands Within the <Directory> Block
 
- SymLinksIfOwnerMatch option
: 18.3.2. Commands Within the <Directory> Block
- symmetric key
: (see private-key cryptography)
- SYN bit
: 16.2.4.2. TCP
- sync system call
- 
  - 5.6. Device Files
  - 8.1.3. Accounts That Run a Single Command
 
- sys (user)
: 4.1. Users and Groups
- syslog facility
- 
  - 4.3.7. The Bad su Log
  - 10.5. The UNIX System Log (syslog) Facility
  - 10.5.3.1. Beware false log entries
  - 23.1.1. The Lesson of the Internet Worm
  - false log entries
: 10.5.3.1. Beware false log entries
  - where to log
  
- 
    - 10.5.2. Where to Log
    - 10.5.2.3. Logging everything everywhere
  
 
 
- syslog file
: 17.3.4.3. Improving the security of Berkeley sendmail V8
- syslog.conf file
: 10.5.1. The syslog.conf Configuration File
- systat service
: 17.3.1. systat (TCP Port 11)
- system
- 
  - auditing activity on
: 2.1. Planning Your Security Needs
  - backing up critical files
  
- 
    - 7.3. Backing Up System Files
    - 7.3.2. Building an Automatic Backup System
  
 
- control over
: (see access control)
  - database files
: 1.2. What Is an Operating System?
  - overload attacks
: 25.2.1.2. System overload attacks
  - performance
: (see performance)
  - remote, commands on
: 15.1.2. uux Command
  - summarizing usage per user
: 25.2.2.2. quot command
  - transfering files to other
: 15.1.1. uucp Command
 
- system (in swatch program)
: 10.6.2. The Swatch Configuration File
- system administration
: 2.4.4.5. Have authority commensurate with responsibility
- 
  - avoiding conventional passwords
  
- 
    - 8.8. Administrative Techniques for Conventional Passwords
    - 8.8.9. Account Names Revisited: Using Aliases  for Increased Security
  
 
- change monitoring
: 9.3. A Final Note
  - changing passwords
  
- 
    - 8.4.1. Changing an Account's Password
    - 8.8.8. Disabling an Account by Changing Its Password
  
 
- cleaning up /tmp directory
: 25.2.4. /tmp Problems
  - contacting administrator
: 24.2.4.2. How to contact the system administrator of a computer you don't know
  - controlling UUCP security
: 15.3. UUCP and Security
  - detached signatures (PGP)
: 6.6.3.6. PGP detached signatures
  - disabling finger system
: 17.3.8.2. Disabling finger
  - discovering intruders
  
- 
    - 24.2. Discovering an Intruder
    - 24.2.6. Anatomy of a Break-in
  
 
- dual universes and
: 5.9.1. Dual Universes
  - errors by
: 7.1.1.1. A taxonomy of computer failures
  - finding largest files
: 25.2.2.1. Disk-full attacks
  - immutable files and
: 9.1.1. Immutable and Append-Only Files
  - locked accounts
: 3.3. Entering Your Password
  - message authentication
: 6.5.2. Using Message Digests
  - monitoring phantom mail
: 17.3.4.2. Using sendmail to receive email
  - new passwords
: 3.4. Changing Your Password
  - read-only filesystems and
: 9.1.2. Read-only Filesystems
  - references on
: D.1.11. UNIX Programming and System Administration
  - removing automatic backups
: 18.2.3.5. Beware stray CGI scripts
  - sanitizing media
: 12.3.2.3. Sanitize your media before disposal
  - trusting
: 27.3.2. Your System Administrator?
  - weakness-finding tools
: 11.1.1. Security Tools
 
- system call
: 5.1.7. File Permissions in Detail
- system clock
- 
  - changing
  
- 
    - 5.1.5. File Times
    - 9.2.3. Checksums and Signatures
    - 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
  
 
- for random seeds
: 23.8. Picking a Random Seed
  - Secure RPC timestamp
: 19.3.1.3. Setting the window
 
- system files
: 11.6.1.2. Writable system files and directories
- 
  - initialization files
: 11.5.3.5. System initialization files
 
- system function
- 
  - 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
  - 18.2.3.2. Testing is not enough!
  - 18.2.3.3. Sending mail
  - 23.2. Tips on Avoiding Security-related Bugs
 
- system functions, checking arguments to
: 23.2. Tips on Avoiding Security-related Bugs
- System Network Architecture (SNA)
: 16.4.2. SNA
- System V UNIX
- 
  - Which UNIX System?
  - 1.3. History of UNIX
  - accounting with
: 10.2.1. Accounting with System V
  - chroot in
: 8.1.5. Restricted Filesystem
  - default umask value
: 5.3. The umask
  - groups and
: 4.1.3.2. Groups and older AT&T UNIX
  - inittab program
: C.5.1. Process #1: /etc/init
  - modems and
: 14.5.1. Hooking Up a Modem to Your Computer
  - passwords
: 8.1.1. Accounts Without Passwords
  - ps command with
: C.1.2.1. Listing processes with systems derived from System V
  - random number generators       
: 23.7.3. drand48  (  ), lrand48  (  ), and mrand48  (  )
  - recent login times
: 10.1.1. lastlog File
  - Release 4 (SVR4)
: 1.3. History of UNIX
  - restricted shells
: 8.1.4.1. Restricted shells under System V UNIX
  - SGI bit on files
: 5.5.7. SGID Bit on Files (System V UNIX Only): Mandatory Record Locking
  - su command and
: 4.3.6. Restricting su
  - SUID files, list of
: B.3. SUID and SGID Files
  - utmp and wtmp files
: 10.1.2. utmp and wtmp Files
  - UUCP
: 15.4.1.3. Format of USERFILE entry without system name
  - /var/adm/loginlog file
: 10.1.4. loginlog File
  - wtmpx file
: 10.1.2. utmp and wtmp Files
 
- Systems file
: 15.3.3. Security of L.sys and Systems Files
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
 O'Reilly & Associates, Inc.
All Rights Reserved.