 
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: T
- table objects (NIS+)
: 19.5.3. NIS+ Tables
- TACACS
: 17.3.5. TACACS (UDP Port 49)
- tainting
- 
  - 18.2.3.4. Tainting with Perl
  - 23.4. Tips on Writing SUID/SGID Programs
 
- taintperl
- 
  - 5.5.3. SUID Shell Scripts
  - 18.2.3.4. Tainting with Perl
  - 23.4. Tips on Writing SUID/SGID Programs
 
- talk program
: 11.1.4. Trojan Horses
- tandem backup
: 7.1.4. Guarding Against Media Failure
- tar program
- 
  - 6.6.1.2. Ways of improving the security of crypt
  - 7.3.2. Building an Automatic Backup System
  - 7.4.2. Simple Archives
  - 7.4.4. Encrypting Your Backups
  - 24.2.6. Anatomy of a Break-in
 
- Taylor UUCP
: 15.2. Versions of UUCP
- TCB (trusted computing base)
: 8.5.3.2. Trusted computing base
- /tcb directory
: 8.1.1. Accounts Without Passwords
- tcov tester
: 23.2. Tips on Avoiding Security-related Bugs
- TCP (Transmission Control Protocol)
- 
  - 16.2.4.2. TCP
  - 17.1.3. The /etc/inetd Program
  - (see also network services)
  - connections, clogging
: 25.3.4. Clogging
 
- TCP/IP
- 
  - 1.4.3. Add-On Functionality Breeds Problems
  - 10.5.2.2. Logging across the network
  - (see also networks)
  - checklist for
  
- 
    - A.1.1.15. Chapter 16: TCP/IP Networks
    - A.1.1.16. Chapter 17: TCP/IP Services
  
 
- network services
: (see network services)
  - networks
  
- 
    - 16. TCP/IP Networks
    - 16.5. Summary
  
 
 
- tcpwrapper program
- 
  - 17.2. Controlling Access to Servers
  - E.4.10. tcpwrapper
 
- tcsh
- 
  - 11.5.1. Shell Features
  - (see also shells)
  - history file
: 10.4.1. Shell History
 
- telecommunications
: 26.2.2. Federal Jurisdiction
- telephone
- 
  - 14.3.1. Originate and Answer
  - (see also modems)
  - calls, recording outgoing
: 10.3.1. aculog File
  - cellular
: 12.2.1.8. Electrical noise
  - checklist for
: A.1.1.13. Chapter 14: Telephone Security
  - hang-up signal
: (see signals)
  - lines
: 14.5.4. Physical Protection of Modems
  
- 
    - leasing
: 14.5.4. Physical Protection of Modems
    - one-way
: 14.4.1. One-Way Phone Lines
    - physical security of
: 14.5.4. Physical Protection of Modems
  
 
- Telnet versus
: 17.3.3. TELNET (TCP Port 23)
 
- Telnet utility
- 
  - 3.5. Verifying Your New Password
  - 16.2.5. Clients and Servers
  - 17.3.3. TELNET (TCP Port 23)
  - versus rlogin
: 17.3.18. rlogin and rsh (TCP Ports 513 and 514)
 
- telnetd program
: 11.1.2. Back Doors and Trap Doors
- temperature
: 12.2.1.6. Temperature extremes
- TEMPEST system
: 12.3.1.3. Eavesdropping by radio and using TEMPEST
- terminal name and last command
: 10.1.3. last Program
- terrorism
: 12.2.5. Defending Against Acts of War and Terrorism
- testing
- 
  - CGI scripts
: 18.2.3.2. Testing is not enough!
  - core files and
: 23.2. Tips on Avoiding Security-related Bugs
  - programs
: 23.2. Tips on Avoiding Security-related Bugs
  - software
: 1.4.2. Software Quality
 
- TFTP (Trivial File Transfer Protocol)
: 17.3.7. Trivial File Transfer Protocol (TFTP) (UDP Port 69)
- tftpd server
: 17.3.7. Trivial File Transfer Protocol (TFTP) (UDP Port 69)
- theft
- 
  - 7.1.1.1. A taxonomy of computer failures
  - 12.2.6. Preventing Theft
  - 12.2.6.4. Minimizing downtime
  - 12.4.1.2. Potential for eavesdropping and data theft
  - of backups
  
- 
    - 12.3.2. Protecting Backups
    - 12.3.2.4. Backup encryption
  
 
- of RAM chips
: 12.2.6. Preventing Theft
 
- thieves
: 11.3. Authors
- third-party billing
: 14.5.4. Physical Protection of Modems
- Thompson, Ken
- 
  - 1.3. History of UNIX
  - 8.6. The UNIX Encrypted Password System
 
- threats
- 
  - assessing cost of
: 2.3.3. Adding Up the Numbers
  - back doors
: (see back doors)
  - to backups
  
- 
    - 7.1.6. Security for Backups
    - 7.1.6.3. Data security for backups
  
 
- bacteria programs
: 11.1.7. Bacteria and Rabbits
  - biological
: 12.2.1.7. Bugs (biological)
  - broadcast storms
: 25.3.2. Message Flooding
  - via CGI scripts
: 18.2.3.2. Testing is not enough!
  - changing file owners
: 5.7. chown: Changing a File's Owner
  - changing system clock
: 5.1.5. File Times
  - code breaking
  
- 
    - 6.1.1. Code Making and Code Breaking
    - (see also cryptography)
  
 
- commonly attacked accounts
: 8.1.2. Default Accounts
  - computer failures
: 7.1.1.1. A taxonomy of computer failures
  - decode aliases
: 17.3.4.2. Using sendmail to receive email
  - deep tree structures
: 25.2.2.8. Tree-structure attacks
  - denial of service
  
- 
    - 17.1.3. The /etc/inetd Program
    - 17.3.21.5. Denial of service attacks under X
    - 25. Denial of Service Attacks and Solutions
    - 25.3.4. Clogging
    - accidental
: 25.2.5. Soft Process Limits: Preventing Accidental  Denial of Service
    - checklist for
: A.1.1.24. Chapter 25: Denial of Service Attacks and Solutions
    - destructive attacks
: 25.1. Destructive Attacks
    - disk attacks
    
- 
      - 25.2.2. Disk Attacks
      - 25.2.2.8. Tree-structure attacks
    
 
- overload attacks
    
- 
      - 25.2. Overload Attacks
      - 25.2.5. Soft Process Limits: Preventing Accidental  Denial of Service
    
 
- system overload attacks
: 25.2.1.2. System overload attacks
  
 
- disposed materials
: 12.3.3. Other Media
  - DNS client flooding
: 16.3.2. Security and Nameservice
  - DNS nameserver attacks
: 17.3.6.2. DNS nameserver attacks
  - DNS zone transfers
: 17.3.6.1. DNS zone transfers
  - dormant accounts
  
- 
    - 8.4. Managing Dormant Accounts
    - 8.4.3. Finding Dormant Accounts
  
 
- false syslog entries
: 10.5.3.1. Beware false log entries
  - filename attacks
: 11.5.1.4. Filename attacks
  - hidden space
: 25.2.2.7. Hidden space
  - HOME variable attacks
: 11.5.1.3. $HOME attacks
  - identifying and quantifying
  
- 
    - 2.2.1.2. Identifying threats
    - 2.2.2. Review Your Risks
  
 
- IFS variable attacks
: 11.5.1.2. IFS attacks
  - intruders
: (see intruders)
  - letting in accidentally
: 11.4. Entry
  - logic bombs
  
- 
    - 11.1.3. Logic Bombs
    - 27.2.2. Viruses on the Distribution Disk
  
 
- mailing list for
: E.1.3.9. RISKS
  - media failure
: 7.1.4. Guarding Against Media Failure
  - meet-in-the-middle attacks
: 6.4.5.1. Double DES
  - MUD/IRC client programs
: 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
  - newly created accounts
: 24.4.1. New Accounts
  - NIS, unintended disclosure
: 19.4.5. Unintended Disclosure of Site Information with NIS
  - with NNTP
: 17.3.13. Network News Transport Protocol (NNTP)  (TCP Port 119)
  - open (guest) accounts
  
- 
    - 8.1.4. Open Accounts
    - 8.1.4.6. Potential problems with rsh
  
 
- PATH variable attacks
: 11.5.1.1. PATH attacks
  - plaintext attacks
: 6.2.3. Cryptographic Strength
  - playback (replay) attacks
: 19.6.1.2. Using the ticket granting ticket
  - programmed
  
- 
    - 11. Protecting Against Programmed Threats
    - 11.6.2. Shared Libraries
    - A.1.1.10. Chapter 11: Protecting Against Programmed Threats
    - D.1.4. Computer Viruses and Programmed Threats
    - authors of
: 11.3. Authors
    - damage from
: 11.2. Damage
  
 
- replay attacks
: 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
  - rsh, problems with
: 8.1.4.6. Potential problems with rsh
  - sendmail problems
: 17.3.4.1. sendmail and security
  - spoofed network connection
: 8.5.3.1. Trusted path
  - start-up file attacks
  
- 
    - 11.5.2. Start-up File Attacks
    - 11.5.2.7. Other initializations
  
 
- system clock
: (see system clock)
  - theft
: (see theft)
  - /tmp directory attacks
: 25.2.4. /tmp Problems
  - toll fraud
: 14.4.1. One-Way Phone Lines
  - traffic analysis
: 18.4. Avoiding the Risks of Eavesdropping
  - tree-structure attacks
: 25.2.2.8. Tree-structure attacks
  - Trojan horses
  
- 
    - 4.3.5. Using su with Caution
    - 11.1.4. Trojan Horses
    - 11.5. Protecting Yourself
    - 17.3.21.2. X security
    - 19.6.5. Kerberos Limitations
    - 27.2.2. Viruses on the Distribution Disk
  
 
- trusted hosts
: (see trusted, hosts)
  - unattended terminals
  
- 
    - 12.3.5. Unattended Terminals
    - 12.3.5.2. X screen savers
  
 
- unowned files
: 24.4.1.8. Unowned files
  - vandalism
  
- 
    - 12.2.4. Vandalism
    - 12.2.4.3. Network connectors
  
 
- viruses
  
- 
    - 11.1.5. Viruses
    - (see viruses)
  
 
- war and terrorism
: 12.2.5. Defending Against Acts of War and Terrorism
  - weakness-finding tools
: 11.1.1. Security Tools
  - by web browsers
  
- 
    - 18.5. Risks of Web Browsers
    - 18.5.2. Trusting Your Software Vendor
  
 
- worms
: 11.1.6. Worms
 
- three-way handshake (TCP)
: 16.2.4.2. TCP
- ticket-granting service
- 
  - 19.6.1.1. Initial login
  - 19.6.1.2. Using the ticket granting ticket
  - 19.6.1.3. Authentication, data integrity, and secrecy
 
- tickets
: (see Kerberos system)
- Tiger
: E.4.11. Tiger
- tilde (~)
- 
  - in automatic backups
: 18.2.3.5. Beware stray CGI scripts
  - as home directory
: 11.5.1.3. $HOME attacks
  - ~! in mail messages
: 8.1.3. Accounts That Run a Single Command
 
- time
- 
  - 19.3.1.3. Setting the window
  - (see also NTP; system clock)
  - CPU, accounting
  
- 
    - 10.2. The acct/pacct Process Accounting File
    - 10.2.3. messages Log File
  
 
- defining random seed by
: 23.8. Picking a Random Seed
  - modification
  
- 
    - 5.1.2. Inodes
    - 5.1.5. File Times
    - 7.4.7. inode Modification Times
    - 9.2.2. Checklists and Metadata
    - 24.5.1. Never Trust Anything Except Hardcopy
  
 
- most recent login
: 10.1.1. lastlog File
  - Secure RPC window of
: 19.3.1.3. Setting the window
 
- timeouts
- 
  - 11.1.3. Logic Bombs
  - 23.3. Tips on Writing Network Programs
 
- timesharing
- 
  - 19.6.5. Kerberos Limitations
  - 23.2. Tips on Avoiding Security-related Bugs
 
- Timezone table (NIS+)
: 19.5.3. NIS+ Tables
- tip command
- 
  - 10.3.1. aculog File
  - 14.5. Modems and UNIX
  - 14.5.3.1. Originate testing
  - 14.5.3.3. Privilege testing
  - -l option
: 14.5.3.1. Originate testing
 
- TIS Internet Firewall Toolkit (FWTK)
: E.4.12. TIS Internet Firewall Toolkit
- TMOUT variable
: 12.3.5.1. Built-in shell autologout
- /tmp directory
- 
  - 14.5.3.3. Privilege testing
  - 25.2.4. /tmp Problems
 
- tmpfile function
: 23.2. Tips on Avoiding Security-related Bugs
- token cards
: 8.7.2. Token Cards
- token ring
: 16.1. Networking
- toll fraud
: 14.4.1. One-Way Phone Lines
- tools
: 1.3. History of UNIX
- 
  - to find weaknesses
: 11.1.1. Security Tools
  - quality of
  
- 
    - 1.4.2. Software Quality
    - 1.4.3. Add-On Functionality Breeds Problems
  
 
 
- Totient Function
: 6.4.6.1. How RSA works
- tracing connections
- 
  - 24.2.4. Tracing a Connection
  - 24.2.4.2. How to contact the system administrator of a computer you don't know
 
- trademarks
: 26.4.3. Trademark Violations
- traffic analysis
: 18.4. Avoiding the Risks of Eavesdropping
- training
: 13.2.1. Initial Training
- transfer zones
: 16.2.6.1. DNS under UNIX
- transfering files
: 15.1.1. uucp Command
- Transmission Control Protocol (TCP)
: 16.2.4.2. TCP
- Transmit Data (TD)
: 14.3. The RS-232 Serial Protocol
- transmitters, radio
: 12.2.1.8. Electrical noise
- transposition (in encryption)
: 6.1.2. Cryptography and Digital Computers
- trap doors
: (see back doors)
- trashing
: 12.3.3. Other Media
- tree structures
: 25.2.2.8. Tree-structure attacks
- trimlog
: E.4.13. trimlog
- Triple DES
- 
  - 6.4.5. Improving the Security of DES
  - 6.4.5.2. Triple DES
 
- Tripwire package
- 
  - 9.2.4. Tripwire
  - 9.2.4.2. Running Tripwire
  - 19.5.5. NIS+ Limitations
  - E.4.14. Tripwire
 
- Trivial File Transfer Protocol (TFTP)
: 17.3.7. Trivial File Transfer Protocol (TFTP) (UDP Port 69)
- Trojan horses
- 
  - 4.3.5. Using su with Caution
  - 11.1.4. Trojan Horses
  - 11.5. Protecting Yourself
  - 27.2.2. Viruses on the Distribution Disk
  - Kerberos and
: 19.6.5. Kerberos Limitations
  - X clients
: 17.3.21.2. X security
 
- truncate system call
: 5.1.7. File Permissions in Detail
- trust
- 
  - 1.1. What Is Computer Security?
  - 2.1.1. Trust
  - 27. Who Do You Trust?
  - 27.4. What All This Means
  - of log files
: 10.8. Managing Log Files
 
- trusted
- 
  - 8.5.3.2. Trusted computing base
  - 17.1.1. The /etc/services File
  - hosts
  
- 
    - 17.3.18.1. Trusted hosts and users
    - 17.3.18.4. The ~/.rhosts file
    - NFS and
: 17.3.18.2. The problem with trusted hosts
  
 
- path
: 8.5.3.1. Trusted path
  - ports
: 1.4.3. Add-On Functionality Breeds Problems
  - users
  
- 
    - 17.3.4.1. sendmail and security
    - 17.3.18.1. Trusted hosts and users
  
 
 
- TRW Network Area and System Administrators
: F.3.4.36. TRW network area and system administrators
- tty file
: 7.1.2. What Should You Back Up?
- ttymon program
: C.5.2. Logging In
- ttys file
- 
  - 8.5.1. Secure Terminals
  - 14.5.1. Hooking Up a Modem to Your Computer
 
- ttytab file
: C.5.1. Process #1: /etc/init
- ttywatch program
: 24.2.3. Monitoring the Intruder
- tunefs command
: 25.2.2.6. Reserved space
- tunneling
: 16.4.1. IPX
- twisted pair
: 16.1. Networking
- TZ variable
: 23.2. Tips on Avoiding Security-related Bugs
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
 O'Reilly & Associates, Inc.
All Rights Reserved.