Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: B
- back doors
 
  - 2.5. The Problem with Security  Through Obscurity
  
- 6.2.3. Cryptographic Strength
  
- 11.1. Programmed Threats: Definitions
  
- 11.1.2. Back Doors and Trap Doors
  
- 11.5. Protecting Yourself
  
- 27.1.2. Trusting Trust
  
- in MUDs and IRCs
: 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
       
- background checks, employee
: 13.1. Background Checks
- backquotes in CGI input
  
  - 18.2.3.2. Testing is not enough!
  
- 18.2.3.3. Sending mail
  
- BACKSPACE key
: 3.4. Changing Your Password
- backup program
: 7.4.3. Specialized Backup Programs
- backups
   
  - 7. Backups
  
- 7.4.7. inode Modification Times
  
- 9.1.2. Read-only Filesystems
  
- 24.2.2. What to Do When You Catch Somebody
  
- across networks
: 7.4.5. Backups Across the Net
  
- for archiving information
: 7.1.1.1. A taxonomy of computer failures
  
- automatic
  
       
    - 7.3.2. Building an Automatic Backup System
    
- 18.2.3.5. Beware stray CGI scripts
  
  
  - checklist for
: A.1.1.6. Chapter 7: Backups
  
- criminal investigations and
: 26.2.4. Hazards of Criminal Prosecution
  
- of critical files
  
   
    - 7.3. Backing Up System Files
    
- 7.3.2. Building an Automatic Backup System
  
  
  - encrypting
  
 
    - 7.4.4. Encrypting Your Backups
    
- 12.3.2.4. Backup encryption
  
  
  - hardcopy
: 24.5.1. Never Trust Anything Except Hardcopy
  
- keeping secure
  
  
    - 2.4.2. Standards
    
- 2.4.3. Guidelines
    
- 7.1.6. Security for Backups
    
- 7.1.6.3. Data security for backups
    
- 26.2.6. Other Tips
  
     
  - laws concerning
: 7.1.7. Legal Issues
  
- of log files
: 10.2.2. Accounting with BSD
  
- retention of
  
   
    - 7.1.5. How Long Should You Keep a Backup?
    
- 7.2. Sample Backup Strategies
    
- 7.2.5. Deciding upon a Backup Strategy
  
   
  - rotating media
: 7.1.3. Types of Backups
  
- software for
  
  
    - 7.4. Software for Backups
    
- 7.4.7. inode Modification Times
    
- commercial
: 7.4.6. Commercial Offerings
  
   
  - special programs for
: 7.4.3. Specialized Backup Programs
  
- strategies for
  
  
    - 7.2. Sample Backup Strategies
    
- 7.2.5. Deciding upon a Backup Strategy
    
- 10.8. Managing Log Files
  
   
  - theft of
  
 
    - 12.3.2. Protecting Backups
    
- 12.3.2.4. Backup encryption
  
  
  - verifying
: 12.3.2.1. Verify your backups
  
- zero-filled bytes in
: 7.4. Software for Backups
  
- bacteria
 
  - 11.1. Programmed Threats: Definitions
  
- 11.1.7. Bacteria and Rabbits
  
- BADSU attempts
: (see sulog file)
- Baldwin, Robert
: 6.6.1.1. The crypt program
- bang (!) and mail command
: 15.1.3. mail Command
- Bash shell (bsh)
: 8.1.4.4. No restricted bash
- Basic Networking Utilities
: (see BNU UUCP)
- bastion hosts
: 21.1.3. Anatomy of a Firewall
- batch command
: 25.2.1.2. System overload attacks
- batch jobs
: (see cron file)
- baud
: 14.1. Modems: Theory of Operation
- bell (in Swatch program)
: 10.6.2. The Swatch Configuration File
- Bellcore
: F.3.4.5. Bellcore
- Berkeley UNIX
: (see BSD UNIX)
- Berkeley's sendmail
: (see sendmail)
- bidirectionality
              
  - 14.1. Modems: Theory of Operation
  
- 14.4.1. One-Way Phone Lines
  
- bigcrypt algorithm
: 8.6.4. Crypt16() and Other Algorithms
- /bin directory
  
  - 11.1.5. Viruses
  
- 11.5.1.1. PATH attacks
  
- backing up
: 7.1.2. What Should You Back Up?
  
- /bin/csh
: (see csh)
  
- /bin/ksh
: (see ksh)
  
- /bin/login
: (see login program)
  
- /bin/passwd
: (see passwd command)
  
- /bin/sh
: (see sh)
  
- in restricted filesystems
: 8.1.5. Restricted Filesystem
         
- binary code
: 11.1.5. Viruses
- bind system call
  
  - 16.2.6.1. DNS under UNIX
  
- 17.1.3. The /etc/inetd Program
  
- biological threats
: 12.2.1.7. Bugs (biological)
- block devices
: 5.6. Device Files
- block send commands
: 11.1.4. Trojan Horses
- blocking systems
: 19.2. Sun's Remote Procedure Call (RPC)
- BNU UUCP
     
  - 15.5. Security in BNU UUCP
  
- 15.5.3. uucheck: Checking Your Permissions File
  
- Boeing CERT
: F.3.4.5. Bellcore
- bogusns directive
: 17.3.6.2. DNS nameserver attacks
- boot viruses
: 11.1.5. Viruses
- Bootparams table (NIS+)
: 19.5.3. NIS+ Tables
- Bourne shell
     
  - C.5.3. Running the User's Shell
  
- (see also sh program; shells)
  
- (see sh)
   
- Bourne shell (sh)
: C.5.3. Running the User's Shell
- bps (bits per second)
: 14.1. Modems: Theory of Operation
- BREAK key
: 14.5.3.2. Answer testing
- breakins
    
  - checklist for
: A.1.1.23. Chapter 24: Discovering a Break-in
  
- legal options following
: 26.1. Legal Options After a Break-in
  
- responding to
  
   
    - 24. Discovering a  Break-in
    
- 24.7. Damage Control
  
  
  - resuming operation after
: 24.6. Resuming Operation
 
- broadcast storm
: 25.3.2. Message Flooding
- browsers
: (see Web browsers)
- BSD UNIX
   
  - Which UNIX System?
  
- 1.3. History of UNIX
  
- accounting with
: 10.2.2. Accounting with BSD
  
- Fast Filesystem (FFS)
: 25.2.2.6. Reserved space
  
- groups and
: 4.1.3.3. Groups and BSD or SVR4 UNIX
  
- immutable files
: 9.1.1. Immutable and Append-Only Files
  
- modems and
: 14.5.1. Hooking Up a Modem to Your Computer
  
- programming references
: D.1.11. UNIX Programming and System Administration
  
- ps command with
: C.1.2.2. Listing processes with Berkeley-derived versions of UNIX
  
- published resources for
: D.1. UNIX Security References
  
- restricted shells
: 8.1.4.2. Restricted shells under Berkeley versions
  
- SUID files, list of
: B.3. SUID and SGID Files
  
- sulog log under
: 4.3.7.1. The sulog under Berkeley UNIX
  
- utmp and wtmp files
: 10.1.2. utmp and wtmp Files
              
- BSD/OS (operating system)
: 1.3. History of UNIX
- bsh (Bash shell)
: 8.1.4.4. No restricted bash
- BSI/GISA
: F.3.4.15. Germany: government institutions
- buffers
    
  - checking boundaries
: 23.2. Tips on Avoiding Security-related Bugs
  
- for editors
: 11.1.4. Trojan Horses
  
- bugs
 
  - 1.1. What Is Computer Security?
  
- 1.4.2. Software Quality
  
- 23.1.2.1. What they found
  
- 27.2.3. Buggy Software
  
- 27.2.5. Security Bugs that Never Get Fixed
  
- Bugtraq mailing list
: E.1.3.3. Bugtraq
  
- hacker challenges
: 27.2.4. Hacker Challenges
  
- hardware
: 27.2.1. Hardware Bugs
  
- .htaccess file
: 18.3.1. The access.conf and .htaccess Files
  
- keeping secret
: 2.5. The Problem with Security  Through Obscurity
  
- tips on avoiding
: 23.2. Tips on Avoiding Security-related Bugs
           
- bugs (biological)
: 12.2.1.7. Bugs (biological)
- bugs
  
  - Preface
  
- (see also security holes)
  
- bulk erasers
: 12.3.2.3. Sanitize your media before disposal
- byte-by-byte comparisons
  
  - 9.2.1. Comparison Copies
  
- 9.2.1.3. rdist
  
- bytes, zero-filled
: 7.4. Software for Backups
 
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
 O'Reilly & Associates, Inc.
All Rights Reserved.