Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: K
- Karn, Phil
: 6.6.2. des: The Data Encryption Standard
- Kerberos system
  
  - 8.7.3. Code Books
  
- 19.6. Kerberos
  
- 19.6.5. Kerberos Limitations
  
- E.4.5. Kerberos
  
- installing
: 19.6.3. Installing Kerberos
  
- RPC system and
: 19.2.2.4. AUTH_KERB
  
- Versions 4 and 5
: 19.6.1.4. Kerberos 4 vs. Kerberos 5
  
- versus Secure RPC
: 19.6.2. Kerberos vs. Secure RPC
        
- kermit program
 
  - 14.5. Modems and UNIX
  
- 14.5.3.3. Privilege testing
  
- kernel
 
  - 1.2. What Is an Operating System?
  
- 5.5.3. SUID Shell Scripts
  
- key
 
  - escrow
: 6.1.3. Modern Controversy
  
- fingerprints
: 6.6.3.6. PGP detached signatures
  
- search
  
   
    - 6.2.3. Cryptographic Strength
    
- 8.6.1. The crypt() Algorithm
  
  
  - switches
: 12.3.6. Key Switches
 
- keylogin program
 
  - 19.3.3. Using Secure RPC
  
- 19.5.4. Using NIS+
  
- keylogout program
: 19.3.3. Using Secure RPC
- keyserv process
  
  - 19.3.1.1. Proving your identity
  
- 19.3.2.3. Making sure Secure RPC programs are running on every workstation
  
- 19.5.4. Using NIS+
   
- keystore file
: 19.3.1.1. Proving your identity
- keystrokes
  
  - monitoring
  
 
    - 17.3.21.2. X security
    
- 24.2.3. Monitoring the Intruder
  
  
  - monitoring
  
 
    - 17.3.21.2. X security
    
- (see also sniffers)
  
  
  - time between
: 23.8. Picking a Random Seed
 
- kill command
 
  - 17.3.4.2. Using sendmail to receive email
  
- 24.2.5. Getting Rid of the Intruder
  
- C.4. The kill Command
  
- to stop process overload
  
    
    - 25.2.1.1. Too many processes
    
- 25.2.1.2. System overload attacks
  
  
- kinit program
: 19.6.4. Using Kerberos
- kmem device
  
  - 5.6. Device Files
  
- 11.1.2. Back Doors and Trap Doors
  
- known text attacks
: 6.2.3. Cryptographic Strength
- Koblas, David
: 22.4. SOCKS
- Koblas, Michelle
: 22.4. SOCKS
- ksh (Korn shell)
    
  - 11.5.1. Shell Features
  
- 24.4.1.7. Hidden files and directories
  
- C.5.3. Running the User's Shell
  
- (see also shells)
  
- history file
: 10.4.1. Shell History
  
- restricted shell
: 8.1.4.3. Restricted Korn shell
  
- TMOUT variable
: 12.3.5.1. Built-in shell autologout
  
- umask and
: 5.3.1. The umask Command
        
- ksh93 shell
 
  - 23.2. Tips on Avoiding Security-related Bugs
  
- 24.4.1.7. Hidden files and directories
  
- .kshrc file
: 11.5.2.2. .cshrc, .kshrc
 
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
 O'Reilly & Associates, Inc.
All Rights Reserved.