Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: U
- U.S. Department of Energy
: F.3.4.12. France: universities, Ministry of Research and Education in France, CNRS, CEA, INRIA, CNES, INRA, IFREMER, and EDF
- U.S. Department of the Navy
: F.3.4.44. U.S. Department of the Navy
- U.S. law
: (see laws)
- U.S. Secret Service
    
  - 26.2.2. Federal Jurisdiction
  
- F.3.3. U.S. Secret Service (USSS)
  
- UDP (User Datagram Protocol)
 
  - 16.2.4.3. UDP
  
- 17.1.3. The /etc/inetd Program
  
- (see also network services)
  
- packet relayer
: E.4.15. UDP Packet Relayer
    
- ufsdump
: (see dump/restore program)
- UIDs (user identifiers)
  
  - 4.1. Users and Groups
  
- 4.1.2. Multiple Accounts with the Same UID
  
- real versus effective
  
   
    - 4.3.1. Real and Effective UIDs
    
- C.1.3.2. Process real and effective UID
  
  
  - RPC requests and
: 19.2.2.2. AUTH_UNIX
  
- su command and
: 10.1.2.1. su command and /etc/utmp and /var/adm/wtmp files
  
- of web servers
: 18.2.1. The Server's UID
  
- zero
: (see root account; superuser)
    
- UK Defense Research Agency
: F.3.4.37. UK: Defense Research Agency
- ulimit command
: 25.2.5. Soft Process Limits: Preventing Accidental  Denial of Service
- Ultrix
: 1.3. History of UNIX
   
  - trusted path
: 8.5.3.1. Trusted path
  
- UUCP
: 15.4.1.3. Format of USERFILE entry without system name
  
- umask
 
  - 5.3. The umask
  
- 5.3.2. Common umask Values
  
- 8.4.3. Finding Dormant Accounts
   
- unattended terminals
 
  - 12.3.5. Unattended Terminals
  
- 12.3.5.2. X screen savers
  
- uninterruptable power supply (UPS)
 
  - 2.2. Risk Assessment
  
- 12.2.1.1. Fire
  
- Unisys
: F.3.4.39. UK: other government departments and agencies
- universes
: 5.9.1. Dual Universes
- UNIX
: 1. Introduction
   
  - add-on functionality of
: 1.4.3. Add-On Functionality Breeds Problems
  
- conventional passwords
: 3.2.6. Conventional UNIX Passwords
  
- DAC (Discretionary Access Controls)
: 4.1.3. Groups and Group Identifiers (GIDs)
  
- DNS under
: 16.2.6.1. DNS under UNIX
  
- encryption programs for
  
     
    - 6.6. Encryption Programs Available for UNIX
    
- 6.6.3.6. PGP detached signatures
  
  
  - filesystem
  
 
    - 5. The UNIX Filesystem
    
- 5.10. Summary
  
  
  - history of
: 1.3. History of UNIX
  
- modems and
  
  
    - 14.5. Modems and UNIX
    
- 14.5.3.3. Privilege testing
  
  
  - networking and
: 16.1.2. Networking and UNIX
  
- operating systems
: (see operating systems)
  
- primary network services
  
   
    - 17.3. Primary UNIX Network Services
    
- 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
  
  
  - process scheduler
: C.1.3.3. Process priority and niceness
  
- processes
: (see processes)
  
- programming references
: D.1.11. UNIX Programming and System Administration
  
- published resources for
: D.1. UNIX Security References
  
- security and
  
     
    - 1.4. Security and UNIX
    
- 1.4.3. Add-On Functionality Breeds Problems
  
  
  - signals
: C.3. Signals
  
- starting up
  
  
    - C.5. Starting Up UNIX and Logging In
    
- C.5.3. Running the User's Shell
  
  
  - Version 6
: 1.3. History of UNIX
  
- viruses
: (see viruses)
  
- web server on
: 18.2. Running a Secure Server
   
- unlinked files
: 25.2.2.7. Hidden space
- unowned files
: 24.4.1.8. Unowned files
- unplugging connections
: 24.2.5. Getting Rid of the Intruder
- unpredictability of randomness
: 23.6. Tips on Generating Random Numbers
- upgrades, logging
: 10.7.2.1. Exception and activity reports
- uploading stored information
: 12.3.4. Protecting Local Storage
- UPS (uninterruptable power supply)
       
  - 2.2. Risk Assessment
  
- 12.2.1.1. Fire
  
- uptime command
: 8.1.3. Accounts That Run a Single Command
- urandom device
: 23.7.4. Other random number generators
- Usenet
   
  - 17.3.13. Network News Transport Protocol (NNTP)  (TCP Port 119)
  
- E.2. Usenet Groups
  
- (see also NNTP)
  
- cleanup scripts
: 11.5.3. Abusing Automatic Mechanisms
  
- encryption for
: (see ROT13 algorithm)
  
- posting breakins to
: 24.6. Resuming Operation
  
- reporting security holes on
: 2.5.1. Going Public
       
- User Datagram Protocol (UDP)
: 16.2.4.3. UDP
- user error
: 7.1.1.1. A taxonomy of computer failures
- user IDs
: (see UIDs)
- USERFILE file (UUCP)
    
  - 15.4.1. USERFILE: Providing Remote File Access
  
- 15.4.2.1. Some bad examples
  
- usermod command
 
  - -e option
: 8.4.3. Finding Dormant Accounts
  
- -f option
: 8.4.3. Finding Dormant Accounts
  
- -s option
: 8.3. Restricting Logins
   
- usernames
: 3.1. Usernames
 
  - aliases for
: 8.8.9. Account Names Revisited: Using Aliases  for Increased Security
  
- doubling as passwords (Joes)
: 3.6.2. Smoking Joes
  
- last command and
: 10.1.3. last Program
  
- as passwords
: 8.8.3.1. Joetest: a simple password cracker
  
- special
  
     
    - 4.2. Special Usernames
    
- 4.2.3. Impact of the /etc/passwd and /etc/group Files  on Security
  
  
  - using someone else's
  
 
    - 4.3. su: Changing Who You Claim to Be
    
- 4.3.8. Other Uses of su
  
  
- users
 
  - 4. Users, Groups, and the Superuser
  
- 4.1. Users and Groups
  
- 4.1.2. Multiple Accounts with the Same UID
  
- (see also groups; su command)
  
- assigning passwords to
: 8.8.1. Assigning Passwords to Users
  
- auditing who is logged in
  
      
    - 10.1.2. utmp and wtmp Files
    
- 10.1.2.1. su command and /etc/utmp and /var/adm/wtmp files
  
  
  - authentication for Web
: 18.3.3. Setting Up Web Users and Passwords
  
- becoming other
  
  
    - 4.3. su: Changing Who You Claim to Be
    
- 4.3.8. Other Uses of su
  
  
  - checklist for
: A.1.1.2. Chapter 3: Users and Passwords
  
- dormant accounts and
  
  
    - 8.4. Managing Dormant Accounts
    
- 8.4.3. Finding Dormant Accounts
  
  
  - identifiers for
: (see UIDs)
  
- importing to NIS server
  
  
    - 19.4.1. Including or excluding specific accounts:
    
- 19.4.4.2. Using netgroups to limit the importing of accounts
  
  
  - letting in threats
: 11.4. Entry
  
- limited
: 8.1.5.1. Limited users
  
- logging
  
   
    - 10.4. Per-User Trails in the Filesystem
    
- 10.4.3. Network Setup
  
  
  - NIS passwords for
: 19.3.2.1. Creating passwords for users
  
- nobody (Secure RPC)
: 19.3.2.1. Creating passwords for users
  
- notifying about monitoring
: 26.2.6. Other Tips
  
- proving identity of
: 19.3.1.1. Proving your identity
  
- recognizing as intruders
  
     
    - 24.2. Discovering an Intruder
    
- 24.2.6. Anatomy of a Break-in
  
  
  - restricting certain
: 18.3. Controlling Access to Files on Your Server
  
- root
: (see root account; superuser)
  
- sending messages to
: 10.5.1. The syslog.conf Configuration File
  
- summarizing system usage by
: 25.2.2.2. quot command
  
- tainting
: 18.2.3.4. Tainting with Perl
  
- training
: 13.2.1. Initial Training
  
- UIDs
: (see UIDs)
  
- unattended terminals
  
        
    - 12.3.5. Unattended Terminals
    
- 12.3.5.2. X screen savers
  
  
  - USERFILE entries for
: 15.4.1.2. USERFILE entries for local users
  
- www
: 18.2.2. Understand Your Server's Directory Structure
  
- users command
 
  - 10.1.2. utmp and wtmp Files
  
- 24.2.1. Catching One in the Act
  
- USG (UNIX Support Group)
: 1.3. History of UNIX
- /usr directory
  
  - 4.3.7. The Bad su Log
  
- (see also /var directory)
  
- backing up /usr/bin
: 7.1.2. What Should You Back Up?
  
- /usr/adm directory
: 11.5.3.6. Other files
  
- /usr/adm/lastlog file
: 10.1.1. lastlog File
  
- /usr/adm/messages file
: 10.2.3. messages Log File
  
- /usr/bin directory
  
       
    - 11.1.5. Viruses
    
- 11.5.1.1. PATH attacks
  
  
  - /usr/bin/uudecode
: (see uudecode program)
  
- /usr/etc/yp/makedbm program
: 19.4.4.1. Setting up netgroups
  
- /usr/lib/aliases file
: 11.5.3.3. /usr/lib/aliases, /etc/aliases, /etc/sendmail/aliases, aliases.dir, or aliases.pag
  
- /usr/lib directory
: 11.5.3.6. Other files
  
    
    - in restricted filesystems
: 8.1.5. Restricted Filesystem
  
 
  - /usr/lib/preserve program
: 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
  
- /usr/lib/sendmail
: (see sendmail)
  
- /usr/lib/uucp/Devices file
: 14.5.1. Hooking Up a Modem to Your Computer
  
- /usr/lib/uucp directory
  
    
    - 15.4.2.1. Some bad examples
    
- 15.5.2. Permissions Commands
  
  
  - /usr/lib/uucp/L-devices file
: 14.5.1. Hooking Up a Modem to Your Computer
  
- /usr/lib/uucp/L.cmds file
: (see L.cmds file)
  
- /usr/lib/uucp/L.sys file
: 15.3.3. Security of L.sys and Systems Files
  
- /usr/lib/uucp/Permissions file
: (see Permissions file)
  
- /usr/lib/uucp/Systems file
: 15.3.3. Security of L.sys and Systems Files
  
- /usr/lib/uucp/USERFILE file
  
      
    - 15.4.1. USERFILE: Providing Remote File Access
    
- 15.4.2.1. Some bad examples
  
  
  - /usr/local/bin
: 1.1. What Is Computer Security?
  
- /usr/local/bin directory
: 11.5.1.1. PATH attacks
  
- /usr/local/etc/http/logs directory
: 10.3.5. access_log Log File
  
- /usr/local/lib directory
: 11.5.3.6. Other files
  
- /usr/sbin/rexecd
: (see rexec service)
  
- /usr/spool/cron/crontabs directory
: 15.6.2. Automatic Execution of Cleanup Scripts
  
- /usr/spool/uucp directory
: 15.1.4. How the UUCP Commands Work
  
- /usr/spool/uucppublic
: (see uucppublic directory)
  
- /usr/ucb directory
: 11.1.5. Viruses
         
- utility programs
: 1.2. What Is an Operating System?
- utimes commandn
: 24.5.1. Never Trust Anything Except Hardcopy
- utmp file
   
  - 10.1.2. utmp and wtmp Files
  
- 10.1.2.1. su command and /etc/utmp and /var/adm/wtmp files
  
- 24.2.1. Catching One in the Act
  
- 24.2.4. Tracing a Connection
    
- uucheck program
: 15.5.3. uucheck: Checking Your Permissions File
- uucico program
  
  - 15.1.4. How the UUCP Commands Work
  
- 15.3. UUCP and Security
  
- 15.5.1.1. Starting up
   
- uucp (user)
 
  - 4.1. Users and Groups
  
- 4.2.2. Other Special Users
  
- uucp command
: 15.1.1. uucp Command
- UUCP system
  
  - 4.1.2. Multiple Accounts with the Same UID
  
- 14.5. Modems and UNIX
  
- 15. UUCP
  
- 15.9. Summary
  
- additional logins
: 15.3.1. Assigning Additional UUCP Logins
  
- BNU
  
      
    - 15.2. Versions of UUCP
    
- 15.5. Security in BNU UUCP
    
- 15.5.3. uucheck: Checking Your Permissions File
  
   
  - checklist for
: A.1.1.14. Chapter 15: UUCP
  
- cleanup scripts
  
  
    - 11.5.3. Abusing Automatic Mechanisms
    
- 15.6.2. Automatic Execution of Cleanup Scripts
  
  
  - early security problems
: 15.7. Early Security Problems with UUCP
  
- HoneyDanBer (HDB)
: 15.2. Versions of UUCP
  
- logging
: 10.3.4. uucp Log Files
  
- mail forwarding
: 15.6.1. Mail Forwarding for UUCP
  
- naming computer
: 15.5.2. Permissions Commands
  
- over networks
: 15.8. UUCP Over Networks
  
- NFS server and
: 15.3. UUCP and Security
  
- passwords for
: 15.3.2. Establishing UUCP Passwords
  
- Taylor
: 15.2. Versions of UUCP
  
- over TCP
: 17.3.20. UUCP over TCP (TCP Port 540)
  
- Version 2
  
           
    - 15.2. Versions of UUCP
    
- 15.4. Security in Version 2 UUCP
    
- 15.4.3. L.cmds: Providing Remote Command Execution
  
   
- uucpa account
: 15.3.1. Assigning Additional UUCP Logins
- uucpd program
: 15.8. UUCP Over Networks
- uucppublic directory
   
  - 15.1.1. uucp Command
  
- 15.4.1.3. Format of USERFILE entry without system name
  
- 15.5.2. Permissions Commands
   
- uudecode program
: 17.3.4.2. Using sendmail to receive email
- uuencode program
: 6.6.1.2. Ways of improving the security of crypt
- uux command
: 15.1.2. uux Command
   
  - - (hyphen) option
: 15.1.2. uux Command
  
- -r option
: 15.1.4. How the UUCP Commands Work
  
- uuxqt program
: 15.4.1.3. Format of USERFILE entry without system name
- uuxqtcmds files
: 15.4.3. L.cmds: Providing Remote Command Execution
  
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
 O'Reilly & Associates, Inc.
All Rights Reserved.