Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: M
- MAC (Mandatory Access Controls)
: 4.1.3. Groups and Group Identifiers (GIDs)
- MACH operating system
: 1.3. History of UNIX
- machine name
: 16.2.3. Hostnames
- MACHINE= command
    
  - 15.5.1.2. Name-value pairs
  
- 15.5.2. Permissions Commands
  
- Macintosh, Web server on
: 18.2. Running a Secure Server
- macro virus
: (see viruses)
- magic cookies
: 17.3.21.4. Using Xauthority magic cookies
- magic number
: 5.1.7. File Permissions in Detail
- mail
     
  - 11.5.3.3. /usr/lib/aliases, /etc/aliases, /etc/sendmail/aliases, aliases.dir, or aliases.pag
  
- (see also sendmail)
  
- accepted by programs
: 17.3.4.1. sendmail and security
  
- action, in Swatch program
: 10.6.2. The Swatch Configuration File
  
- alias back door
: 11.1.2. Back Doors and Trap Doors
  
- aliases
: (see aliases)
  
- copyrights on
: 26.4.2. Copyright Infringement
  
- Electronic Communications Privacy Act (ECPA)
: 26.2.3. Federal Computer Crime Laws
  
- firewalls
: 21.4.2. Electronic Mail
  
- forwarding (UUCP)
: 15.6.1. Mail Forwarding for UUCP
  
- harassment via
: 26.4.7. Harassment, Threatening Communication,  and Defamation
  
- logging
: 10.4.2. Mail
  
- message flooding
: 25.3.2. Message Flooding
  
- phantom, monitoring
: 17.3.4.2. Using sendmail to receive email
  
- receiving by sendmail
: 17.3.4.2. Using sendmail to receive email
  
- sending via CGI scripts
: 18.2.3.3. Sending mail
  
- sent directly to file
: 15.7. Early Security Problems with UUCP
  
- startup file attacks
: 11.5.2.5. .forward, .procmailrc
                  
- mail command
: 15.1.3. mail Command
- Mail_Aliases table (NIS+)
: 19.5.3. NIS+ Tables
- mailing lists
   
  - E.1. Mailing Lists
  
- E.1.3.10. WWW-security
  
- maintenance mode
: C.5.1. Process #1: /etc/init
- maintenance personnel
: 13.3. Outsiders
- makedbm program
: 19.4.4.1. Setting up netgroups
- malware
: 11.1. Programmed Threats: Definitions
- man pages
: 2.5. The Problem with Security  Through Obscurity
- management, role of
      
  - 2.3.4. Convincing Management
  
- 2.5. The Problem with Security  Through Obscurity
  
- MANs (Metropolitan Networks)
: 16.1. Networking
- manual logging
  
  - 10.7. Handwritten Logs
  
- 10.7.2.2. Informational material
  
- manual pages
: 23.2. Tips on Avoiding Security-related Bugs
- maps, NIS
: (see NIS)
- Massey, James L.
: 6.4.1. Summary of Private Key Systems
- Master mode (uucico)
: 15.1.4. How the UUCP Commands Work
- master server
     
  - 19.4. Sun's Network Information Service (NIS)
  
- (see also NIS)
  
- MCERT
: F.3.4.21. Motorola, Inc. and subsidiaries
- MCI Corporation
: F.3.4.19. MCI Corporation
- MD2 algorithm
: 6.5.4.1. MD2, MD4, and MD5
- MD4 algorithm
: 6.5.4.1. MD2, MD4, and MD5
- MD5 algorithm
     
  - 6.5.2. Using Message Digests
  
- 6.5.4.1. MD2, MD4, and MD5
  
- 23.5.1. Use Message Digests for Storing Passwords
  
- 23.9. A Good Random Seed Generator
  
- digital signatures versus
: 6.6.3.6. PGP detached signatures
  
- in POP
: 17.3.10. Post Office Protocol (POP) (TCP Ports 109 and 110)
      
- media
: 12.3.3. Other Media
 
  - damaged by smoke
: 12.2.1.2. Smoke
  
- destroying
: 12.3.2.3. Sanitize your media before disposal
  
- failure of
: 7.1.4. Guarding Against Media Failure
  
- hard/soft disk quotas
: 25.2.2.5. Using quotas
  
- print through process
: 12.3.2.1. Verify your backups
  
- rotating for backups
: 7.1.3. Types of Backups
  
- rotation of
: 7.2.1.2. Media rotation
  
- sanitizing
: 12.3.2.3. Sanitize your media before disposal
  
- viruses from
: 11.1.5. Viruses
         
- meet-in-the-middle attacks
: 6.4.5.1. Double DES
- memory
  
  - 25.2.2. Disk Attacks
  
- 25.2.2.8. Tree-structure attacks
  
- hidden space
: 25.2.2.7. Hidden space
  
- reserved space
: 25.2.2.6. Reserved space
  
- swap space
: 25.2.3. Swap Space Problems
  
- /tmp directory and
: 25.2.4. /tmp Problems
  
- tree-structure attacks
: 25.2.2.8. Tree-structure attacks
       
- Merkle, Ralph
: 6.4.5.1. Double DES
- Message Authentication Code (MAC)
: 6.5.5.2. Message authentication codes
- message digests
   
  - 6.5. Message Digests and Digital Signatures
  
- 6.5.2. Using Message Digests
  
- 9.2.3. Checksums and Signatures
  
- 23.5.1. Use Message Digests for Storing Passwords
  
- Tripwire package
  
     
    - 9.2.4. Tripwire
    
- 9.2.4.2. Running Tripwire
  
  
- message flooding
: 25.3.2. Message Flooding
- messages log file
: 10.2.3. messages Log File
- meta characters
: 23.2. Tips on Avoiding Security-related Bugs
- metadata
    
  - 9.2.2. Checklists and Metadata
  
- 9.2.2.2. Ancestor directories
  
- Metropolitan Networks (MANs)
: 16.1. Networking
- MH (mail handler)
: 11.5.2.5. .forward, .procmailrc
- Micro-BIT Virus Center
: F.3.4.16. Germany: Southern area
- Miller, Barton
: 23.1.2. An Empirical Study of the Reliability of UNIX Utilities
- MILNET
: F.3.4.20. MILNET
- MIME
: 11.1.5. Viruses
- MIT-KERBEROS-5 authentication
: 17.3.21.3. The xhost facility
- Mitnick, Kevin
: 27.2.6. Network Providers that Network Too Well
- mkpasswd program
: 8.8.4. Password Generators
- mktemp function
: 23.2. Tips on Avoiding Security-related Bugs
- MLS (Multilevel Security) environment
: "Secure" Versions of UNIX
- mobile network computing
: 8.7. One-Time Passwords
- modems
             
  - 14. Telephone Security
  
- 14.6. Additional Security for Modems
  
- callback setups
  
   
    - 14.4.2. 
    
- 14.6. Additional Security for Modems
  
  
  - clogging
: 25.3.4. Clogging
  
- encrypting
: 14.6. Additional Security for Modems
  
- hanging up
: (see signals)
  
- physical security of
  
    
    - 14.5.4. Physical Protection of Modems
    
- 14.6. Additional Security for Modems
  
  
  - recording call information
: 10.3.1. aculog File
  
- tracing connections
  
  
    - 24.2.4. Tracing a Connection
    
- 24.2.4.2. How to contact the system administrator of a computer you don't know
  
  
  - UNIX and
  
 
    - 14.5. Modems and UNIX
    
- 14.5.3.3. Privilege testing
  
  
- modification times
 
  - 5.1.2. Inodes
  
- 5.1.5. File Times
  
- 7.4.7. inode Modification Times
  
- 9.2.2. Checklists and Metadata
    
- monitoring
 
  - hardware for
: (see detectors)
  
- intruders
: 24.2.3. Monitoring the Intruder
  
- performance
: 13.2.3. Performance Reviews and Monitoring
  
- security
: (see logging)
  
- users
: 26.2.6. Other Tips
     
- monitors and screen savers
: 12.3.5.2. X screen savers
- Morris, Robert T.
  
  - 1. Introduction
  
- 8.6. The UNIX Encrypted Password System
  
- 17.4. Security Implications of Network Services
   
- motd file
: 26.2.6. Other Tips
- Motorola, Inc.
: F.3.4.20. MILNET
- Motorola, Inc. and subsidiaries
: F.3.4.21. Motorola, Inc. and subsidiaries
- mount command
: 20.3. Client-Side NFS Security
    
  - -nodev option
: 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
  
- -nosuid option
: 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
  
- mounted filesystems
: 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
- mouting filesystem
: (see directories)
- mrand48 function
: 23.7.3. drand48  (  ), lrand48  (  ), and mrand48  (  )
- mtime
    
  - 5.1.2. Inodes
  
- 5.1.5. File Times
  
- 9.2.2. Checklists and Metadata
  
- 24.4.1.6. Changes to startup files
    
- MUDs (Multiuser Dungeons)
: 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
- Muffet, Alec
: 10.5.3.1. Beware false log entries
- multicast groups
: 16.2.1.2. Classical network addresses
- MULTICS (Multiplexed Information and Computing Service)
: 1.3. History of UNIX
- multilevel security
     
  - 1.3. History of UNIX
  
- 2.4.4.7. Defend in depth
  
- 2.5.3. Final Words: Risk Management Means  Common Sense
  
- 17.2. Controlling Access to Servers
    
- multitasking
 
  - 1.4. Security and UNIX
  
- C.1.3.3. Process priority and niceness
  
- multiuser operating systems
: 1.4. Security and UNIX
- multiuser workstations
: 17.3.21.1. /etc/fbtab and /etc/logindevperm
- munitions export
: 26.4.1. Munitions Export
- MX record type
: 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
- MYNAME= command
: 15.5.2. Permissions Commands
     
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
 O'Reilly & Associates, Inc.
All Rights Reserved.