Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: T
- table objects (NIS+)
: 19.5.3. NIS+ Tables
- TACACS
: 17.3.5. TACACS (UDP Port 49)
- tainting
   
  - 18.2.3.4. Tainting with Perl
  
- 23.4. Tips on Writing SUID/SGID Programs
  
- taintperl
 
  - 5.5.3. SUID Shell Scripts
  
- 18.2.3.4. Tainting with Perl
  
- 23.4. Tips on Writing SUID/SGID Programs
   
- talk program
: 11.1.4. Trojan Horses
- tandem backup
: 7.1.4. Guarding Against Media Failure
- tar program
   
  - 6.6.1.2. Ways of improving the security of crypt
  
- 7.3.2. Building an Automatic Backup System
  
- 7.4.2. Simple Archives
  
- 7.4.4. Encrypting Your Backups
  
- 24.2.6. Anatomy of a Break-in
     
- Taylor UUCP
: 15.2. Versions of UUCP
- TCB (trusted computing base)
: 8.5.3.2. Trusted computing base
- /tcb directory
: 8.1.1. Accounts Without Passwords
- tcov tester
: 23.2. Tips on Avoiding Security-related Bugs
- TCP (Transmission Control Protocol)
     
  - 16.2.4.2. TCP
  
- 17.1.3. The /etc/inetd Program
  
- (see also network services)
  
- connections, clogging
: 25.3.4. Clogging
    
- TCP/IP
 
  - 1.4.3. Add-On Functionality Breeds Problems
  
- 10.5.2.2. Logging across the network
  
- (see also networks)
  
- checklist for
  
    
    - A.1.1.15. Chapter 16: TCP/IP Networks
    
- A.1.1.16. Chapter 17: TCP/IP Services
  
  
  - network services
: (see network services)
  
- networks
  
  
    - 16. TCP/IP Networks
    
- 16.5. Summary
  
  
- tcpwrapper program
 
  - 17.2. Controlling Access to Servers
  
- E.4.10. tcpwrapper
  
- tcsh
 
  - 11.5.1. Shell Features
  
- (see also shells)
  
- history file
: 10.4.1. Shell History
   
- telecommunications
: 26.2.2. Federal Jurisdiction
- telephone
  
  - 14.3.1. Originate and Answer
  
- (see also modems)
  
- calls, recording outgoing
: 10.3.1. aculog File
  
- cellular
: 12.2.1.8. Electrical noise
  
- checklist for
: A.1.1.13. Chapter 14: Telephone Security
  
- hang-up signal
: (see signals)
  
- lines
: 14.5.4. Physical Protection of Modems
  
       
    - leasing
: 14.5.4. Physical Protection of Modems
    
- one-way
: 14.4.1. One-Way Phone Lines
    
- physical security of
: 14.5.4. Physical Protection of Modems
  
   
  - Telnet versus
: 17.3.3. TELNET (TCP Port 23)
 
- Telnet utility
 
  - 3.5. Verifying Your New Password
  
- 16.2.5. Clients and Servers
  
- 17.3.3. TELNET (TCP Port 23)
  
- versus rlogin
: 17.3.18. rlogin and rsh (TCP Ports 513 and 514)
    
- telnetd program
: 11.1.2. Back Doors and Trap Doors
- temperature
: 12.2.1.6. Temperature extremes
- TEMPEST system
: 12.3.1.3. Eavesdropping by radio and using TEMPEST
- terminal name and last command
: 10.1.3. last Program
- terrorism
: 12.2.5. Defending Against Acts of War and Terrorism
- testing
      
  - CGI scripts
: 18.2.3.2. Testing is not enough!
  
- core files and
: 23.2. Tips on Avoiding Security-related Bugs
  
- programs
: 23.2. Tips on Avoiding Security-related Bugs
  
- software
: 1.4.2. Software Quality
    
- TFTP (Trivial File Transfer Protocol)
: 17.3.7. Trivial File Transfer Protocol (TFTP) (UDP Port 69)
- tftpd server
: 17.3.7. Trivial File Transfer Protocol (TFTP) (UDP Port 69)
- theft
   
  - 7.1.1.1. A taxonomy of computer failures
  
- 12.2.6. Preventing Theft
  
- 12.2.6.4. Minimizing downtime
  
- 12.4.1.2. Potential for eavesdropping and data theft
  
- of backups
  
     
    - 12.3.2. Protecting Backups
    
- 12.3.2.4. Backup encryption
  
  
  - of RAM chips
: 12.2.6. Preventing Theft
 
- thieves
: 11.3. Authors
- third-party billing
: 14.5.4. Physical Protection of Modems
- Thompson, Ken
   
  - 1.3. History of UNIX
  
- 8.6. The UNIX Encrypted Password System
  
- threats
 
  - assessing cost of
: 2.3.3. Adding Up the Numbers
  
- back doors
: (see back doors)
  
- to backups
  
   
    - 7.1.6. Security for Backups
    
- 7.1.6.3. Data security for backups
  
  
  - bacteria programs
: 11.1.7. Bacteria and Rabbits
  
- biological
: 12.2.1.7. Bugs (biological)
  
- broadcast storms
: 25.3.2. Message Flooding
  
- via CGI scripts
: 18.2.3.2. Testing is not enough!
  
- changing file owners
: 5.7. chown: Changing a File's Owner
  
- changing system clock
: 5.1.5. File Times
  
- code breaking
  
       
    - 6.1.1. Code Making and Code Breaking
    
- (see also cryptography)
  
  
  - commonly attacked accounts
: 8.1.2. Default Accounts
  
- computer failures
: 7.1.1.1. A taxonomy of computer failures
  
- decode aliases
: 17.3.4.2. Using sendmail to receive email
  
- deep tree structures
: 25.2.2.8. Tree-structure attacks
  
- denial of service
  
     
    - 17.1.3. The /etc/inetd Program
    
- 17.3.21.5. Denial of service attacks under X
    
- 25. Denial of Service Attacks and Solutions
    
- 25.3.4. Clogging
    
- accidental
: 25.2.5. Soft Process Limits: Preventing Accidental  Denial of Service
    
- checklist for
: A.1.1.24. Chapter 25: Denial of Service Attacks and Solutions
    
- destructive attacks
: 25.1. Destructive Attacks
    
- disk attacks
    
        
      - 25.2.2. Disk Attacks
      
- 25.2.2.8. Tree-structure attacks
    
  
    - overload attacks
    
 
      - 25.2. Overload Attacks
      
- 25.2.5. Soft Process Limits: Preventing Accidental  Denial of Service
    
  
    - system overload attacks
: 25.2.1.2. System overload attacks
  
 
  - disposed materials
: 12.3.3. Other Media
  
- DNS client flooding
: 16.3.2. Security and Nameservice
  
- DNS nameserver attacks
: 17.3.6.2. DNS nameserver attacks
  
- DNS zone transfers
: 17.3.6.1. DNS zone transfers
  
- dormant accounts
  
     
    - 8.4. Managing Dormant Accounts
    
- 8.4.3. Finding Dormant Accounts
  
  
  - false syslog entries
: 10.5.3.1. Beware false log entries
  
- filename attacks
: 11.5.1.4. Filename attacks
  
- hidden space
: 25.2.2.7. Hidden space
  
- HOME variable attacks
: 11.5.1.3. $HOME attacks
  
- identifying and quantifying
  
     
    - 2.2.1.2. Identifying threats
    
- 2.2.2. Review Your Risks
  
  
  - IFS variable attacks
: 11.5.1.2. IFS attacks
  
- intruders
: (see intruders)
  
- letting in accidentally
: 11.4. Entry
  
- logic bombs
  
    
    - 11.1.3. Logic Bombs
    
- 27.2.2. Viruses on the Distribution Disk
  
  
  - mailing list for
: E.1.3.9. RISKS
  
- media failure
: 7.1.4. Guarding Against Media Failure
  
- meet-in-the-middle attacks
: 6.4.5.1. Double DES
  
- MUD/IRC client programs
: 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
  
- newly created accounts
: 24.4.1. New Accounts
  
- NIS, unintended disclosure
: 19.4.5. Unintended Disclosure of Site Information with NIS
  
- with NNTP
: 17.3.13. Network News Transport Protocol (NNTP)  (TCP Port 119)
  
- open (guest) accounts
  
        
    - 8.1.4. Open Accounts
    
- 8.1.4.6. Potential problems with rsh
  
  
  - PATH variable attacks
: 11.5.1.1. PATH attacks
  
- plaintext attacks
: 6.2.3. Cryptographic Strength
  
- playback (replay) attacks
: 19.6.1.2. Using the ticket granting ticket
  
- programmed
  
    
    - 11. Protecting Against Programmed Threats
    
- 11.6.2. Shared Libraries
    
- A.1.1.10. Chapter 11: Protecting Against Programmed Threats
    
- D.1.4. Computer Viruses and Programmed Threats
    
- authors of
: 11.3. Authors
    
- damage from
: 11.2. Damage
  
      
  - replay attacks
: 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
  
- rsh, problems with
: 8.1.4.6. Potential problems with rsh
  
- sendmail problems
: 17.3.4.1. sendmail and security
  
- spoofed network connection
: 8.5.3.1. Trusted path
  
- start-up file attacks
  
     
    - 11.5.2. Start-up File Attacks
    
- 11.5.2.7. Other initializations
  
  
  - system clock
: (see system clock)
  
- theft
: (see theft)
  
- /tmp directory attacks
: 25.2.4. /tmp Problems
  
- toll fraud
: 14.4.1. One-Way Phone Lines
  
- traffic analysis
: 18.4. Avoiding the Risks of Eavesdropping
  
- tree-structure attacks
: 25.2.2.8. Tree-structure attacks
  
- Trojan horses
  
       
    - 4.3.5. Using su with Caution
    
- 11.1.4. Trojan Horses
    
- 11.5. Protecting Yourself
    
- 17.3.21.2. X security
    
- 19.6.5. Kerberos Limitations
    
- 27.2.2. Viruses on the Distribution Disk
  
      
  - trusted hosts
: (see trusted, hosts)
  
- unattended terminals
  
  
    - 12.3.5. Unattended Terminals
    
- 12.3.5.2. X screen savers
  
  
  - unowned files
: 24.4.1.8. Unowned files
  
- vandalism
  
  
    - 12.2.4. Vandalism
    
- 12.2.4.3. Network connectors
  
  
  - viruses
  
 
    - 11.1.5. Viruses
    
- (see viruses)
  
  
  - war and terrorism
: 12.2.5. Defending Against Acts of War and Terrorism
  
- weakness-finding tools
: 11.1.1. Security Tools
  
- by web browsers
  
   
    - 18.5. Risks of Web Browsers
    
- 18.5.2. Trusting Your Software Vendor
  
  
  - worms
: 11.1.6. Worms
 
- three-way handshake (TCP)
: 16.2.4.2. TCP
- ticket-granting service
  
  - 19.6.1.1. Initial login
  
- 19.6.1.2. Using the ticket granting ticket
  
- 19.6.1.3. Authentication, data integrity, and secrecy
   
- tickets
: (see Kerberos system)
- Tiger
: E.4.11. Tiger
- tilde (~)
   
  - in automatic backups
: 18.2.3.5. Beware stray CGI scripts
  
- as home directory
: 11.5.1.3. $HOME attacks
  
- ~! in mail messages
: 8.1.3. Accounts That Run a Single Command
   
- time
 
  - 19.3.1.3. Setting the window
  
- (see also NTP; system clock)
  
- CPU, accounting
  
   
    - 10.2. The acct/pacct Process Accounting File
    
- 10.2.3. messages Log File
  
  
  - defining random seed by
: 23.8. Picking a Random Seed
  
- modification
  
  
    - 5.1.2. Inodes
    
- 5.1.5. File Times
    
- 7.4.7. inode Modification Times
    
- 9.2.2. Checklists and Metadata
    
- 24.5.1. Never Trust Anything Except Hardcopy
  
     
  - most recent login
: 10.1.1. lastlog File
  
- Secure RPC window of
: 19.3.1.3. Setting the window
  
- timeouts
 
  - 11.1.3. Logic Bombs
  
- 23.3. Tips on Writing Network Programs
  
- timesharing
 
  - 19.6.5. Kerberos Limitations
  
- 23.2. Tips on Avoiding Security-related Bugs
  
- Timezone table (NIS+)
: 19.5.3. NIS+ Tables
- tip command
  
  - 10.3.1. aculog File
  
- 14.5. Modems and UNIX
  
- 14.5.3.1. Originate testing
  
- 14.5.3.3. Privilege testing
  
- -l option
: 14.5.3.1. Originate testing
     
- TIS Internet Firewall Toolkit (FWTK)
: E.4.12. TIS Internet Firewall Toolkit
- TMOUT variable
: 12.3.5.1. Built-in shell autologout
- /tmp directory
   
  - 14.5.3.3. Privilege testing
  
- 25.2.4. /tmp Problems
  
- tmpfile function
: 23.2. Tips on Avoiding Security-related Bugs
- token cards
: 8.7.2. Token Cards
- token ring
: 16.1. Networking
- toll fraud
: 14.4.1. One-Way Phone Lines
- tools
: 1.3. History of UNIX
     
  - to find weaknesses
: 11.1.1. Security Tools
  
- quality of
  
  
    - 1.4.2. Software Quality
    
- 1.4.3. Add-On Functionality Breeds Problems
  
  
- Totient Function
: 6.4.6.1. How RSA works
- tracing connections
  
  - 24.2.4. Tracing a Connection
  
- 24.2.4.2. How to contact the system administrator of a computer you don't know
  
- trademarks
: 26.4.3. Trademark Violations
- traffic analysis
: 18.4. Avoiding the Risks of Eavesdropping
- training
: 13.2.1. Initial Training
- transfer zones
: 16.2.6.1. DNS under UNIX
- transfering files
: 15.1.1. uucp Command
- Transmission Control Protocol (TCP)
: 16.2.4.2. TCP
- Transmit Data (TD)
: 14.3. The RS-232 Serial Protocol
- transmitters, radio
: 12.2.1.8. Electrical noise
- transposition (in encryption)
: 6.1.2. Cryptography and Digital Computers
- trap doors
: (see back doors)
- trashing
: 12.3.3. Other Media
- tree structures
: 25.2.2.8. Tree-structure attacks
- trimlog
: E.4.13. trimlog
- Triple DES
              
  - 6.4.5. Improving the Security of DES
  
- 6.4.5.2. Triple DES
  
- Tripwire package
 
  - 9.2.4. Tripwire
  
- 9.2.4.2. Running Tripwire
  
- 19.5.5. NIS+ Limitations
  
- E.4.14. Tripwire
    
- Trivial File Transfer Protocol (TFTP)
: 17.3.7. Trivial File Transfer Protocol (TFTP) (UDP Port 69)
- Trojan horses
  
  - 4.3.5. Using su with Caution
  
- 11.1.4. Trojan Horses
  
- 11.5. Protecting Yourself
  
- 27.2.2. Viruses on the Distribution Disk
  
- Kerberos and
: 19.6.5. Kerberos Limitations
  
- X clients
: 17.3.21.2. X security
      
- truncate system call
: 5.1.7. File Permissions in Detail
- trust
  
  - 1.1. What Is Computer Security?
  
- 2.1.1. Trust
  
- 27. Who Do You Trust?
  
- 27.4. What All This Means
  
- of log files
: 10.8. Managing Log Files
     
- trusted
 
  - 8.5.3.2. Trusted computing base
  
- 17.1.1. The /etc/services File
  
- hosts
  
   
    - 17.3.18.1. Trusted hosts and users
    
- 17.3.18.4. The ~/.rhosts file
    
- NFS and
: 17.3.18.2. The problem with trusted hosts
  
   
  - path
: 8.5.3.1. Trusted path
  
- ports
: 1.4.3. Add-On Functionality Breeds Problems
  
- users
  
   
    - 17.3.4.1. sendmail and security
    
- 17.3.18.1. Trusted hosts and users
  
  
- TRW Network Area and System Administrators
: F.3.4.36. TRW network area and system administrators
- tty file
: 7.1.2. What Should You Back Up?
- ttymon program
: C.5.2. Logging In
- ttys file
    
  - 8.5.1. Secure Terminals
  
- 14.5.1. Hooking Up a Modem to Your Computer
  
- ttytab file
: C.5.1. Process #1: /etc/init
- ttywatch program
: 24.2.3. Monitoring the Intruder
- tunefs command
: 25.2.2.6. Reserved space
- tunneling
: 16.4.1. IPX
- twisted pair
: 16.1. Networking
- TZ variable
: 23.2. Tips on Avoiding Security-related Bugs
      
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
 O'Reilly & Associates, Inc.
All Rights Reserved.