Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: N
- name service
 
  - 16.2.6. Name Service
  
- 16.2.6.2. Other naming services
  
- security and
: 16.3.2. Security and Nameservice
   
- name-value pairs in BNU UUCP
: 15.5.1.2. Name-value pairs
- named daemon
: 16.2.6.1. DNS under UNIX
- named nameserver
: 17.3.6.2. DNS nameserver attacks
- named-xfer program
: 16.2.6.1. DNS under UNIX
- named.boot file
     
  - 17.3.6.1. DNS zone transfers
  
- 17.3.6.2. DNS nameserver attacks
  
- names
 
  - choosing UUCP
: 15.5.2. Permissions Commands
  
- computer
  
  
    - 16.2.3. Hostnames
    
- 16.2.3.1. The /etc/hosts file
  
  
  - user
: (see usernames)
 
- nameserver attacks, DNS
: 17.3.6.2. DNS nameserver attacks
- nameserver cache loading
: 16.3.2. Security and Nameservice
- NASA
   
  - Ames Research Center
: F.3.4.22. NASA: Ames Research Center
 
- NASA: Goddard Space Flight Center
: F.3.4.23. NASA: Goddard Space Flight Center
- National Aeronautical Space Agency
: (see NASA)
- National Computer Security Center (NCSC)
: F.2.1. National Institute of Standards and Technology (NIST)
- National Institute of Standards and Technology
: (see NIST)
- National Science Foundation Network
: (see networks, NFSNET)
- national security
: 26.2.2. Federal Jurisdiction
- natural disasters
       
  - 1.1. What Is Computer Security?
  
- 7.1.1.1. A taxonomy of computer failures
  
- 7.1.6.1. Physical security for backups
  
- 12.2.1.1. Fire
  
- (see also physical security)
  
- accidents
: 12.2.2. Preventing Accidents
  
- earthquakes
: 12.2.1.4. Earthquake
  
- fires
  
        
    - 12.2.1.1. Fire
    
- 12.2.1.2. Smoke
  
  
  - lightning
  
 
    - 12.2. Protecting Computer Hardware
    
- 12.2.1.9. Lightning
  
  
- natural gas
: 12.2.1.5. Explosion
- Naval Computer Incident Response Team (NAVCIRT)
: F.3.4.44. U.S. Department of the Navy
- ncheck command
: 5.5.4.1. The ncheck command
   
  - -s option
  
 
    - 5.5.4.1. The ncheck command
    
- 5.6. Device Files
  
  
- NCSA HTTPD server
: 10.3.5. access_log Log File
- NCSA server
: (see Web servers)
- NCSC (National Computer Security Center)
: F.2.1. National Institute of Standards and Technology (NIST)
- needexpnhelo (sendmail)
: 17.3.4.3. Improving the security of Berkeley sendmail V8
- needmailhelo (sendmail)
: 17.3.4.3. Improving the security of Berkeley sendmail V8
- needvrfyhelo (sendmail)
: 17.3.4.3. Improving the security of Berkeley sendmail V8
- nested directories
: 25.2.2.8. Tree-structure attacks
- Netgroup table (NIS+)
: 19.5.3. NIS+ Tables
- netgroups, NIS
         
  - 19.4.4. NIS Netgroups
  
- 19.4.4.6. NIS is confused about "+"
  
- limiting imported accounts
: 19.4.4.2. Using netgroups to limit the importing of accounts
   
- NetInfo
 
  - 3.2.2. The /etc/passwd File and Network Databases
  
- 16.2.6.2. Other naming services
  
- Netmasks table (NIS+)
: 19.5.3. NIS+ Tables
- netnews~firewalls
: 21.4.3. Netnews
- .netrc file
: 10.4.3. Network Setup
- Netscape Navigator
    
  - encryption system of
: 18.4.1. Eavesdropping Over the Wire
  
- random number generator
: 23.8. Picking a Random Seed
  
- netstat command
 
  - 17.5. Monitoring Your Network with netstat
  
- 24.2.1. Catching One in the Act
  
- 24.2.4. Tracing a Connection
  
- -a option
: 17.5. Monitoring Your Network with netstat
  
- -n option
: 17.5. Monitoring Your Network with netstat
     
- network connections
: 17.3.3. TELNET (TCP Port 23)
- network databases
: 3.2.2. The /etc/passwd File and Network Databases
- Network Filesystem
: (see NFS)
- network filesystems
: 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
- Network Information Center (NIC)
: 24.2.4.2. How to contact the system administrator of a computer you don't know
- Network Information System
: (see NIS)
- Network News Transport Protocol
: (see NNTP)
- network providers
: 27.2.6. Network Providers that Network Too Well
- network services
         
  - 17. TCP/IP Services
  
- 17.7. Summary
  
- 23.3. Tips on Writing Network Programs
  
- DNS
: (see DNS)
  
- encryption with
: 17.4. Security Implications of Network Services
  
- finger
: (see finger command)
  
- FTP
: (see FTP)
  
- NNTP
: (see NNTP)
  
- NTP
: (see NTP)
  
- passwords for
: 17.4. Security Implications of Network Services
  
- POP
: (see POP)
  
- root account with
: 17.4. Security Implications of Network Services
  
- securing
: 19.1. Securing Network Services
  
- SMTP
: (see SMTP)
  
- SNMP
: (see SNMP)
  
- spoofing
: 17.5. Monitoring Your Network with netstat
  
- systat
: 17.3.1. systat (TCP Port 11)
  
- table of
: G. Table of IP Services
  
- Telnet
: (see Telnet utility)
  
- TFTP
: (see TFTP)
  
- UUCP over TCP
: 17.3.20. UUCP over TCP (TCP Port 540)
                     
- Network Time Protocol
: (see NTP)
- network weaving
: 16.1.1.1. Who is on the Internet?
- networks
   
  - 10Base-T
: 12.3.1.2. Eavesdropping by Ethernet and 10Base-T
  
- allowing threats from
: 11.4. Entry
  
- ARPANET
: 16.1.1. The Internet
  
- backing up
  
    
    - 7.2.2. Small Network of Workstations and a Server
    
- 7.2.4. Large Service-Based Networks with Large Budgets
  
  
  - backups across
: 7.4.5. Backups Across the Net
  
- cables for
: 12.2.4.2. Network cables
  
- checklist for
  
   
    - A.1.1.15. Chapter 16: TCP/IP Networks
    
- A.1.1.16. Chapter 17: TCP/IP Services
  
  
  - configuration files
: 10.4.3. Network Setup
  
- connectors for
: 12.2.4.3. Network connectors
  
- cutting cables
: 25.1. Destructive Attacks
  
- denial of service on
  
    
    - 25.3. Network Denial of Service Attacks
    
- 25.3.4. Clogging
  
  
  - disabling physically
: 25.3.3. Signal Grounding
  
- Internet
: 16.1.1. The Internet
  
- LANs
: (see LANs)
  
- logging across
: 10.5.2.2. Logging across the network
  
- logging services of
: 10.3.6. Logging Network Services
  
- MANs
: 16.1. Networking
  
- mobile computing
: 8.7. One-Time Passwords
  
- monitoring with netstat
: 17.5. Monitoring Your Network with netstat
  
- NFSNET
: 16.1.1. The Internet
  
- packet-switching
: 16.2. IPv4: The Internet Protocol Version 4
  
- scanning
: 17.6. Network Scanning
  
- security references
: D.1.8. Network Technology and Security
  
- services for
: 11.1.2. Back Doors and Trap Doors
  
- sniffers
: 16.3. IP Security
  
- spoofed connection
: 8.5.3.1. Trusted path
  
- TCP/IP
: (see TCP/IP, networks)
  
- UNIX and
: 16.1.2. Networking and UNIX
  
- UUCP over
: 15.8. UUCP Over Networks
  
- WANs
: 16.1. Networking
                   
- Networks table (NIS+)
: 19.5.3. NIS+ Tables
- networks, computer
: 1.4.3. Add-On Functionality Breeds Problems
- Neumann, Peter
: 1.3. History of UNIX
- newgrp command
: 4.1.3.2. Groups and older AT&T UNIX
- newkey -u command
     
  - 19.3.2.1. Creating passwords for users
  
- 19.5.4.2. When a user's passwords don't match
  
- news
: (see Usenet)
- news (user)
: 4.1. Users and Groups
- newsgroups, defamation/harassment via
: 26.4.7. Harassment, Threatening Communication,  and Defamation
- NEXTSTEP Window Server (NSWS)
: 17.3.16. NEXTSTEP Window Server (NSWS) (TCP Port 178)
- NFS (Network Filesystem)
: 19. RPC, NIS, NIS+,  and Kerberos
     
  - authentication and
  
 
    - 19.2.2. RPC Authentication
    
- 19.2.2.4. AUTH_KERB
  
  
  - checklist for
: A.1.1.19. Chapter 20: NFS
  
- file permissions
: 5.1.7. File Permissions in Detail
  
- find command on
: 5.5.4. Finding All of the SUID and SGID Files
  
- -local option
: 11.6.1.2. Writable system files and directories
  
- MOUNT
: 20.1.1. NFS History
  
- Secure NFS
: (see Secure NFS)
  
- server, and UUCP
: 15.3. UUCP and Security
  
- technical description of
: 20.1.1. NFS History
  
- and trusted hosts
: 17.3.18.2. The problem with trusted hosts
  
- -xdev option
: 11.6.1.2. Writable system files and directories
          
- NIC (Network Information Center)
: 24.2.4.2. How to contact the system administrator of a computer you don't know
- nice command
: 25.2.1.2. System overload attacks
- nice numbers
: C.1.3.3. Process priority and niceness
- NIS (Network Information Service)
    
  - + in
  
 
    - 19.4. Sun's Network Information Service (NIS)
    
- 19.4.4.6. NIS is confused about "+"
  
  
  - clients
: 19.4. Sun's Network Information Service (NIS)
  
- domains
: 19.4.3. NIS Domains
  
- maps
: 19.4. Sun's Network Information Service (NIS)
  
- netgroups
  
    
    - 19.4.4. NIS Netgroups
    
- 19.4.4.6. NIS is confused about "+"
    
- limiting imported accounts
: 19.4.4.2. Using netgroups to limit the importing of accounts
  
   
  - Secure RPC with
  
 
    - 19.3.2. Setting Up Secure RPC with NIS
    
- 19.3.4. Limitations of Secure RPC
  
  
  - spoofing
: 19.4.4.5. Spoofing NIS
  
- UDP
: 16.2.4.3. UDP
  
- Yellow Pages
: 16.2.6.2. Other naming services
   
- NIS (Network Information System)
 
  - 3.2.2. The /etc/passwd File and Network Databases
  
- 3.4. Changing Your Password
  
- 19. RPC, NIS, NIS+,  and Kerberos
  
- 19.4. Sun's Network Information Service (NIS)
  
- 19.4.5. Unintended Disclosure of Site Information with NIS
     
- NIS+
 
  - 3.2.2. The /etc/passwd File and Network Databases
  
- 3.4. Changing Your Password
  
- 16.2.6.2. Other naming services
  
- 19.5. Sun's NIS+
  
- 19.5.5. NIS+ Limitations
  
- integrity-checking software for
: 19.5.5. NIS+ Limitations
  
- principals
: 19.5.1. What NIS+ Does
  
- Secure RPC with
  
        
    - 19.3.2. Setting Up Secure RPC with NIS
    
- 19.3.4. Limitations of Secure RPC
  
  
- nisaddcred command
: 19.3.1.1. Proving your identity
- niscat command
: 3.2.2. The /etc/passwd File and Network Databases
- nischown command
: 19.5.4. Using NIS+
- nispasswd command
    
  - 3.4. Changing Your Password
  
- 19.5.4. Using NIS+
  
- 19.5.4.2. When a user's passwords don't match
   
- NIST (National Institute of Standards and Technology)
 
  - F.2.1. National Institute of Standards and Technology (NIST)
  
- F.3.4.26. NIST (National Institute of Standards and Technology)
  
- NNTP (Network News Transport Protocol)
: 17.3.13. Network News Transport Protocol (NNTP)  (TCP Port 119)
- nobody (user)
  
  - 4.1. Users and Groups
  
- 19.3.2.1. Creating passwords for users
  
- noexpn (sendmail)
: 17.3.4.3. Improving the security of Berkeley sendmail V8
- noise, electrical
: 12.2.1.8. Electrical noise
- nonadaptive modems
: (see modems)
- nonblocking systems
: 19.2. Sun's Remote Procedure Call (RPC)
- nonce
: 23.3. Tips on Writing Network Programs
- nonrepudiation
: 6.5. Message Digests and Digital Signatures
- NORDUNET
: F.3.4.27. NORDUNET: Denmark, Sweden, Norway, Finland, Iceland
- NOREAD= command
: 15.5.2. Permissions Commands
- Northwestern University
: F.3.4.28. Northwestern University
- nosuid
: 11.1.2. Back Doors and Trap Doors
- Novell
: 1.3. History of UNIX
- novrfy (sendmail)
: 17.3.4.3. Improving the security of Berkeley sendmail V8
- Nowitz, David
: 15.2. Versions of UUCP
- NOWRITE= command
: 15.5.2. Permissions Commands
- npasswd package
: 8.8.2. Constraining Passwords
- NPROC variable
: 25.2.1.1. Too many processes
- NSA (National Security Agency)
: F.2.2. National Security Agency (NSA)
- NSWS (NextStep Window Server)
: 17.3.16. NEXTSTEP Window Server (NSWS) (TCP Port 178)
- NTP (Network Time Protocol)
: 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
                   
  - Secure RPC and
: 19.3.1.3. Setting the window
 
- NU-CERT
: F.3.4.28. Northwestern University
- null device
: 5.6. Device Files
- nuucp account
   
  - 15.1.4. How the UUCP Commands Work
  
- 15.3.1. Assigning Additional UUCP Logins
  
- 15.4.1.3. Format of USERFILE entry without system name
   
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
 O'Reilly & Associates, Inc.
All Rights Reserved.