start page | rating of books | rating of authors | reviews | copyrights
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: E
- e class : sendmail, 32.5. Alphabetized Reference
- E configuration command : sendmail, 22.2.1. The E Configuration Command
- e flag
- sendmail, 23.6.1. Periodically with -q
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 34.8. Alphabetized Reference
- E flag : sendmail, 30.8. Alphabetized F= Flags
- E line (host status file) : sendmail, B.1. Status file lines
- E line (qf file) : sendmail, 23.9. The qf File Internals
- $e macro : (see SmtpGreetingMessage option)
- $E macro : sendmail, 31.10. Alphabetized Reference
- e option : (see ErrorMode (e) option)
- E option : (see ErrorHeader (E) option)
- -e switch (sendmail) : sendmail, 36.7. Alphabetized Reference
- -E switch (sendmail) : sendmail, 36.7. Alphabetized Reference
- E= equate : sendmail, 30.4. The Equates
- earthquakes : Practical UNIX & Internet Security, 12.2.1.4. Earthquake
- eavesdropping
- Practical UNIX & Internet Security, 12.3.1. Eavesdropping
- Practical UNIX & Internet Security, 12.3.1.5. Fiber optic cable
- Practical UNIX & Internet Security, 12.4.1.2. Potential for eavesdropping and data theft
- Practical UNIX & Internet Security, 14.4.4. Protecting Against Eavesdropping
- Practical UNIX & Internet Security, 14.4.4.2. Protection against eavesdropping
- Practical UNIX & Internet Security, 16.3.1. Link-level Security
- IP packets
- Building Internet Firewalls, 10.1.2. Packet Sniffing
- Practical UNIX & Internet Security, 16.3.1. Link-level Security
- Practical UNIX & Internet Security, 17.3.3. TELNET (TCP Port 23)
- through log files : Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
- on the Web
- Practical UNIX & Internet Security, 18.4. Avoiding the Risks of Eavesdropping
- Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
- X clients : Practical UNIX & Internet Security, 17.3.21.2. X security
- EBCDIC : sendmail, 30.8. Alphabetized F= Flags
- ECB (electronic code book)
- Practical UNIX & Internet Security, 6.4.4.2. DES modes
- Practical UNIX & Internet Security, 6.6.2. des: The Data Encryption Standard
- echo command : Practical UNIX & Internet Security, 23.5. Tips on Using Passwords
- Echo Message
- TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
- TCP/IP Network Administration, 7.2. The Minimal Routing Table
- ECPA (Electronic Communications Privacy Act) : Practical UNIX & Internet Security, 26.2.3. Federal Computer Crime Laws
- edit FYIs (For Your Information) : TCP/IP Network Administration, 13.7. Summary
- editing Makefile file : sendmail, 2.4. Preliminaries
- editing wtmp file : Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file
- editors : Practical UNIX & Internet Security, 11.5.2.7. Other initializations
- buffers for : Practical UNIX & Internet Security, 11.1.4. Trojan Horses
- Emacs : Practical UNIX & Internet Security, 11.5.2.3. GNU .emacs
- ex
- Practical UNIX & Internet Security, 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve
- Practical UNIX & Internet Security, 11.5.2.4. .exrc
- Practical UNIX & Internet Security, 11.5.2.7. Other initializations
- startup file attacks : Practical UNIX & Internet Security, 11.5.2.4. .exrc
- vi
- Practical UNIX & Internet Security, 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve
- Practical UNIX & Internet Security, 11.5.2.4. .exrc
- Practical UNIX & Internet Security, 11.5.2.7. Other initializations
- edquota command : Practical UNIX & Internet Security, 25.2.2.5. Using quotas
- EDS : Practical UNIX & Internet Security, F.3.4.11. EDS and EDS customers worldwide
- edu domain : TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
- EF_DELETE_BCC flag : sendmail, 23.9. The qf File Internals
- EF_HAS8BIT flag : sendmail, 23.9. The qf File Internals
- EF_NO_BODY_RETN flag : sendmail, 20.2.1. Accept Mail Only From Our Domain
- EF_RESPONSE flag : sendmail, 23.9. The qf File Internals
- EF_WARNING flag : sendmail, 23.9. The qf File Internals
- effective UIDs/GIDs
- Practical UNIX & Internet Security, 4.3.1. Real and Effective UIDs
- Practical UNIX & Internet Security, 5.5. SUID
- Practical UNIX & Internet Security, 10.1.2.1. su commandutmp and wtmp files andsu
- Practical UNIX & Internet Security, C.1.3.2. Process real and effective UID
- EGP (Exterior Gateway Protocol)
- TCP/IP Network Administration, 2.4. Internet Routing Architecture
- TCP/IP Network Administration, 7.5.1. Exterior Gateway Protocol
- TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- neighbors : TCP/IP Network Administration, 7.5.1. Exterior Gateway Protocol
- statement (in gated) : TCP/IP Network Administration, B.8.6. The egp Statement
- EHLO command (SMTP)
- sendmail, 4.2. Verbose (-v)
- sendmail, 34.8. Alphabetized Reference
- TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- TCP/IP Network Administration, 10.8. Testing sendmail.cf
- EightBitMode encoding
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 34.8. Alphabetized Reference
- 8mm video tape : Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
- electrical fires
- Practical UNIX & Internet Security, 12.2.1.2. Smoke
- (see also fires; smoke and smoking)
- electronic breakins : (see breakins; cracking)
- electronic code book (ECB)
- Practical UNIX & Internet Security, 6.4.4.2. DES modes
- Practical UNIX & Internet Security, 6.6.2. des: The Data Encryption Standard
- Electronic Communications Privacy Act (ECPA) : Practical UNIX & Internet Security, 26.2.3. Federal Computer Crime Laws
- electronic mail
- sendmail, 1. Introduction
- (see email)
- addresses : (see addresses)
- messages : (see messages)
- electrical noise : Practical UNIX & Internet Security, 12.2.1.8. Electrical noise
- electronic sabotage : (see denial of service)
- ElGamal algorithm
- Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
- Practical UNIX & Internet Security, 6.5.3. Digital Signatures
- elm (mail system) : Practical UNIX & Internet Security, 11.5.2.5. .forward, .procmailrc
- emacs editor : Practical UNIX & Internet Security, 11.5.2.7. Other initializations
- .emacs file : Practical UNIX & Internet Security, 11.5.2.3. GNU .emacs
- email
- Building Internet Firewalls, 2.1. Electronic Mail
- Building Internet Firewalls, 5.6. Selecting Services Provided by the
- Practical UNIX & Internet Security, 11.5.3.3. /usr/lib/aliases, /etc/aliases,
- TCP/IP Network Administration, 1.7. Application Layer
- (see also addresses)
- (see also mail, servers)
- (see also sendmail)
- accepted by programs : Practical UNIX & Internet Security, 17.3.4.1. sendmail and security
- action, in Swatch program : Practical UNIX & Internet Security, 10.6.2. The Swatch Configuration File
- addresses
- Building Internet Firewalls, 2.7. Information About People
- TCP/IP Network Administration, 13.3.1. archie
- alias back door : Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
- aliases
- TCP/IP Network Administration, 10.3. sendmail Aliases
- (see aliases/aliasing)
- Archie access via : Building Internet Firewalls, 8.7.3.3. Providing Archie service to your
- bombs : sendmail, 20.2.6. Reject Mail from Spamming or Mail-bombing Sites
- configuring : Building Internet Firewalls, 8.1. Electronic Mail
- copyrights on : Practical UNIX & Internet Security, 26.4.2. Copyright Infringement
- delivering : TCP/IP Network Administration, 1.7. Application Layer
- delivery agents (MTAs)
- Building Internet Firewalls, 8.1. Electronic Mail
- sendmail, 1.1. MUA Versus MTA
- sendmail, 5.3.1. Mail Delivery Agents
- sendmail, 6.2. Define a Mail Delivery Agent
- sendmail, 30. Delivery Agents
- (see also M configuration command)
- $# operator and
- sendmail, 9.2.1. The Delivery Agent ($#)
- sendmail, 28.6.5. Specify a Delivery Agent: $#
- advantages to sendmail : sendmail, 18.1. To Use or Not to Use
- choosing
- sendmail, 9. Rule Set 0
- sendmail, 9.5. Things to Try
- declaring : sendmail, 19.3.2. MAILER()
- default : sendmail, 34.8. Alphabetized Reference
- equates for : sendmail, 30.4. The Equates
- for errors : sendmail, 9.4. The error Delivery Agent
- expensive
- sendmail, 23.6.1. Periodically with -q
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 34.8. Alphabetized Reference
- flags
- sendmail, 6.3. The local Delivery Agent
- sendmail, 6.4. Add the Missing Parts to Mhub
- sendmail, 14.2. Headers Versus Delivery Agent Flags
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 35.4. ?flags? in Header Definitions
- ignoring MX records : sendmail, 21.3.5. What? They Ignore MX Records?
- local
- sendmail, 6.3. The local Delivery Agent
- sendmail, 19.6. Alphabetized m4 Macros
- logging : sendmail, 26.1.3.4. mailer= the delivery agent used
- printing list of : sendmail, 38.4.2. Show Delivery Agents with =M
- as recipients : sendmail, 30.8. Alphabetized F= Flags
- scripts via : sendmail, 24.3. Write a Delivery Agent Script
- statistics : (see statistics)
- symbolic name : sendmail, 30.2. The Symbolic Name
- testing : sendmail, 38.5.6. Try a Delivery Agent with /try
- UUCP : sendmail, 19.4.6. UUCP
- Electronic Communications Privacy Act (ECPA) : Practical UNIX & Internet Security, 26.2.3. Federal Computer Crime Laws
- ESMTP (Extended SMTP)
- sendmail, 4.2. Verbose (-v)
- sendmail, 23.9. The qf File Internals
- sendmail, 30.8. Alphabetized F= Flags
- TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- TCP/IP Network Administration, 10.8. Testing sendmail.cf
- BODY parameter (ESMTP)
- sendmail, 31.10. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- private extensions to : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- file transfers : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- firewalls : Practical UNIX & Internet Security, 21.4.2. Electronic Mail
- flooding : Building Internet Firewalls, 1.2.1.2. Denial of Service
- forwarding (UUCP) : Practical UNIX & Internet Security, 15.6.1. Mail Forwarding for UUCP
- gateway : TCP/IP Network Administration, 4.5.3. Planning Your Mail System
- growing importance of : TCP/IP Network Administration, 9.7.2. IMAP Server
- harassment via : Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
- logging : Practical UNIX & Internet Security, 10.4.2. Mail
- mailing lists, firewalls resources via : Building Internet Firewalls, A.3. Mailing Lists
- messages
- sendmail, 34.8. Alphabetized Reference
- TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
- TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
- assigning priority to : TCP/IP Network Administration, 10.5.6. Defining Mail Precedence
- blank lines ending : sendmail, 30.8. Alphabetized F= Flags
- body of
- sendmail, 1.6. The Body
- sendmail, 23.2.2. The Data (Message Body) File: df
- (see also -B switch (sendmail))
- bouncing
- sendmail, 10.3. Missing Addresses
- sendmail, 13.2.2. Limit the Life of Queued Messages
- sendmail, 14.4. Precedence
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 22.8.3.4. The PostmasterCopy option
- sendmail, 23.3.6. Savemail Panic
- sendmail, 23.7.1. Handling a Down Site
- sendmail, 24.4.1. The Postmaster Alias
- sendmail, 25.5.1. Reply Versus Bounce
- sendmail, 25.5.3. A list-bounced Alias
- sendmail, 34.8. Alphabetized Reference
- sendmail, 35.10. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- (see also $n macro)
- content type : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- converting between 7- and 8-bit : sendmail, 18.8. Alphabetized Reference
- delivering : (see delivery)
- envelope : (see envelope)
- encapsulated : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- error : (see errors)
- flooding : Practical UNIX & Internet Security, 25.3.2. Message Flooding
- forged : sendmail, 22.7. Forged Mail
- forwarding : sendmail, 35.7. Forwarding with Resent-Headers
- forwarding loops : sendmail, 25.7.2. Forwarding Loops
- headers for : (see headers, message)
- holding : (see queue)
- hop count : (see hop count)
- hub's acceptance of : sendmail, 15.4. Hub Accepts Mail for Client
- leading dots in : sendmail, 34.8. Alphabetized Reference
- limiting size of : sendmail, 20.2.3. Limit the Size of Guest Messages
- multipart subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- multiple objects in single : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- origin date of : (see $a macro)
- priority of
- sendmail, 14.4. Precedence
- (see priority, message)
- processing limits on : sendmail, 23.5. How the Queue Is Processed
- queue
- sendmail, 1.3.2. The Queue
- sendmail, 4.1.2. Show Queue Mode (-bp)
- sendmail, 13.2.2. Limit the Life of Queued Messages
- sendmail, 23. The Queue
- sendmail, 23.2. Parts of a Queued Message
- sendmail, 23.2.3.2. Locks shown when printing the queue
- sendmail, 23.4. Printing the Queue
- sendmail, 23.5. How the Queue Is Processed
- sendmail, 23.7.1. Handling a Down Site
- sendmail, 23.8. Pitfalls
- sendmail, 23.9. The qf File Internals
- sendmail, 25.7.6. Force Requeue on Error
- sendmail, 34.6.2. The Queue
- sendmail, 34.8. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- rejecting
- sendmail, 18.8. Alphabetized Reference
- sendmail, 20.2.6. Reject Mail from Spamming or Mail-bombing Sites
- relays for : sendmail, 19.4.5. Relays
- sending
- sendmail, 13.4. Sending Mail
- sendmail, 14.5. Sending Real Mail
- size of
- sendmail, 26.1.3.10. size= the size of the message
- sendmail, 30.4. The Equates
- sendmail, 34.8. Alphabetized Reference
- stored in queue in error : sendmail, 23.9. The qf File Internals
- time placed in queue : sendmail, 23.9. The qf File Internals
- unique identifier for
- sendmail, 13.4. Sending Mail
- sendmail, 14.2.3. The Message-ID: Header
- sendmail, 26.1.3.5. msgid= the Message-ID: identifier
- phantom, monitoring : Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
- processing addresses : TCP/IP Network Administration, 10.6.3. The Set Ruleset Command
- queue
- sendmail, 1.3.2. The Queue
- sendmail, 23. The Queue
- checkpointing : sendmail, 34.8. Alphabetized Reference
- down sites and : sendmail, 23.7.1. Handling a Down Site
- lifetime
- sendmail, 13.2.2. Limit the Life of Queued Messages
- sendmail, 34.8. Alphabetized Reference
- message life : sendmail, 13.2.2. Limit the Life of Queued Messages
- message parts : sendmail, 23.2. Parts of a Queued Message
- printing
- sendmail, 4.1.2. Show Queue Mode (-bp)
- sendmail, 23.2.3.2. Locks shown when printing the queue
- sendmail, 23.4. Printing the Queue
- sendmail, 36.7. Alphabetized Reference
- processing
- sendmail, 23.5. How the Queue Is Processed
- sendmail, 23.9. The qf File Internals
- sendmail, 36.7. Alphabetized Reference
- putting everything in : sendmail, 34.8. Alphabetized Reference
- requeuing on error : sendmail, 25.7.6. Force Requeue on Error
- sendmail options for : sendmail, 34.6.2. The Queue
- sorting : sendmail, 34.8. Alphabetized Reference
- time message placed in : sendmail, 23.9. The qf File Internals
- troubleshooting : sendmail, 23.8. Pitfalls
- why message is stored in : sendmail, 23.9. The qf File Internals
- receiving by sendmail : Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
- relay : TCP/IP Network Administration, 4.5.3. Planning Your Mail System
- for RFCs : TCP/IP Network Administration, 13.4.1. Retrieving RFCs by mail
- sendmail
- Building Internet Firewalls, 2.1. Electronic Mail
- (see also sendmail)
- sending via CGI scripts : Practical UNIX & Internet Security, 18.2.3.3. Sending mail
- sent directly to file : Practical UNIX & Internet Security, 15.7. Early Security Problems with UUCP
- servers
- TCP/IP Network Administration, 3.4. Mail Services
- TCP/IP Network Administration, 4.5.3. Planning Your Mail System
- interoperability and : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- simplified addresses : TCP/IP Network Administration, 10.5.3. The Define Class Command
- SMTP (Simple Mail Transfer Protocol)
- Building Internet Firewalls, 2.1. Electronic Mail
- Building Internet Firewalls, 5.6. Selecting Services Provided by the
- Building Internet Firewalls, 7.5. Proxying Without a Proxy Server
- Building Internet Firewalls, 8.1.1. Simple Mail Transfer Protocol
- Practical UNIX & Internet Security, 17.3.4. Simple Mail Transfer Protocol (SMTP) (TCP Port 25)
- Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
- sendmail, 4.2. Verbose (-v)
- sendmail, 18.8. Alphabetized Reference
- TCP/IP Network Administration, 1.7. Application Layer
- TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
- commands, listed : TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
- configuring
- Building Internet Firewalls, 8.1.1.6. Configuring SMTP to
- Building Internet Firewalls, 9.1.1.3. SMTP
- Building Internet Firewalls, 9.2.1.3. SMTP
- EHLO command
- sendmail, 4.2. Verbose (-v)
- sendmail, 34.8. Alphabetized Reference
- ETRN command : sendmail, 23.6.2.4. Process the queue via ESMTP ETRN
- EXPN command
- sendmail, 22.3.2. SMTP vrfy and expn
- sendmail, 22.8.3.5. The PrivacyOptions option
- Extended : (see ESMTP)
- forging mail with : sendmail, 22.7.2. Forging with SMTP
- greeting message : sendmail, 31.10. Alphabetized Reference
- HELO command
- sendmail, 18.8. Alphabetized Reference
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 34.8. Alphabetized Reference
- incoming connection rate : sendmail, 34.8. Alphabetized Reference
- MAIL command
- sendmail, 29.10.1. The check_mail Rule Set
- sendmail, 34.8. Alphabetized Reference
- multiple connections : sendmail, 34.8. Alphabetized Reference
- multiple timeouts : sendmail, 34.8. Alphabetized Reference
- RCPT command
- sendmail, 23.9. The qf File Internals
- sendmail, 29.10.2. The check_rcpt Rule Set
- sendmail, 36.7. Alphabetized Reference
- refusing on high load : sendmail, 34.8. Alphabetized Reference
- running on stdin : sendmail, 36.7. Alphabetized Reference
- sendmail and : TCP/IP Network Administration, 10.1. sendmail's Function
- service extensions to : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- SMTP probes : sendmail, 22.3. SMTP Probes
- standardizing on : TCP/IP Network Administration, 4.5.3. Planning Your Mail System
- status codes : sendmail, B.1. Status file lines
- for UNIX : (see Sendmail)
- VRFY command
- sendmail, 22.3.2. SMTP vrfy and expn
- sendmail, 22.8.3.5. The PrivacyOptions option
- sendmail, 30.8. Alphabetized F= Flags
- startup file attacks : Practical UNIX & Internet Security, 11.5.2.5. .forward, .procmailrc
- tracing intruders : Building Internet Firewalls, 13.3. Pursuing and Capturing the
- transport agents (MTAs) : (see delivery agents)
- user agents : (see MUAs)
- embedded commands : (see commands)
- embezzlers : Practical UNIX & Internet Security, 11.3. Authors
- emergencies : (see disasters and disaster recovery)
- emergency response organizations : (see response teams)
- employees
- Practical UNIX & Internet Security, 11.3. Authors
- Practical UNIX & Internet Security, 13. Personnel Security
- Practical UNIX & Internet Security, 13.3. Outsiders
- departure of : Practical UNIX & Internet Security, 13.2.6. Departure
- phonebook of : Practical UNIX & Internet Security, 12.3.3. Other Media
- security checklist for : Practical UNIX & Internet Security, A.1.1.12. Chapter 13: Personnel Security
- targeted in legal investigation : Practical UNIX & Internet Security, 26.2.5. If You or One of Your Employees Is a Target
- trusting : Practical UNIX & Internet Security, 27.3.1. Your Employees?
- written authorization for : Practical UNIX & Internet Security, 26.2.6. Other Tips
- empty
- email addresses
- sendmail, 10.3. Missing Addresses
- sendmail, 17.1.1.3. Handle null address
- sendmail, 30.8. Alphabetized F= Flags
- sendmail.cf file : sendmail, 5.2. The Minimal File
- encapsulation
- Building Internet Firewalls, 6.3. What Does a Packet Look Like?
- Building Internet Firewalls, C.3. TCP/IP Protocol Architecture
- TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
- of datagrams : TCP/IP Network Administration, 1.4. Network Access Layer
- of mail messages : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- encoding
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 32.5. Alphabetized Reference
- data : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- text
- TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- TCP/IP Network Administration, 12.6. Encryption
- "Encrypted:" header line : sendmail, 35.10. Alphabetized Reference
- encryption
- Practical UNIX & Internet Security, 6.2. What Is Encryption?
- Practical UNIX & Internet Security, 6.2.2. The Elements of Encryption
- Practical UNIX & Internet Security, 12.2.6.2. Encryption
- Practical UNIX & Internet Security, 17.4. Security Implications of Network Services
- TCP/IP Network Administration, 4.2.1. Obtaining an IP Address
- TCP/IP Network Administration, 6.3.4. PPP Daemon Security
- TCP/IP Network Administration, 12.6. Encryption
- (see also cryptography)
- algorithms
- Practical UNIX & Internet Security, 2.5. The Problem with Security Through Obscurity
- Practical UNIX & Internet Security, 6.4.8. Proprietary Encryption Systems
- Practical UNIX & Internet Security, 6.6. Encryption Programs Available for UNIX
- Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
- crypt
- Practical UNIX & Internet Security, 6.6.1. UNIX crypt: The Original UNIX Encryption Command
- Practical UNIX & Internet Security, 6.6.1.3. Example
- Digital Signature Algorithm
- Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
- Practical UNIX & Internet Security, 6.5.3. Digital Signatures
- ElGamal : Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
- IDEA : Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- RC2, RC4, and RC5
- Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- Practical UNIX & Internet Security, 6.4.8. Proprietary Encryption Systems
- ROT13 : Practical UNIX & Internet Security, 6.4.3. ROT13: Great for Encoding Offensive Jokes
- RSA
- Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
- Practical UNIX & Internet Security, 6.4.6. RSA and Public Key Cryptography
- Practical UNIX & Internet Security, 6.4.6.3. Strength of RSA
- application-level
- Building Internet Firewalls, 10.5.1. At What Level Do You Encrypt?
- Practical UNIX & Internet Security, 16.3.1. Link-level Security
- of backups
- Practical UNIX & Internet Security, 7.1.6.3. Data security for backups
- Practical UNIX & Internet Security, 7.4.4. Encrypting Your Backups
- Practical UNIX & Internet Security, 12.3.2.4. Backup encryption
- checklist for : Practical UNIX & Internet Security, A.1.1.5. Chapter 6: Cryptography
- Data Encryption Standard (DES)
- Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- Practical UNIX & Internet Security, 6.4.4. DES
- Practical UNIX & Internet Security, 6.4.5.2. Triple DES
- Practical UNIX & Internet Security, 6.6.2. des: The Data Encryption Standard
- DCE and : Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
- Diffie-Hellman : (see Diffie-Hellman key exchange system)
- end-to-end : Practical UNIX & Internet Security, 16.3.1. Link-level Security
- Enigma system
- Practical UNIX & Internet Security, 6.3. The Enigma Encryption System
- Practical UNIX & Internet Security, 6.6.1.1. The crypt program
- (see also crypt command/algorithm)
- escrowing keys
- Practical UNIX & Internet Security, 6.1.3. Modern Controversy
- Practical UNIX & Internet Security, 7.1.6.3. Data security for backups
- of executables : Building Internet Firewalls, 5.8.2.2. How to disable services
- exporting software : Practical UNIX & Internet Security, 26.4.1. Munitions Export
- of hypertext links : Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire
- key distribution : Building Internet Firewalls, 10.5.4. Key Distribution
- laws about
- Practical UNIX & Internet Security, 6.7. Encryption and U.S. Law
- Practical UNIX & Internet Security, 6.7.2. Cryptography and Export Controls
- link-level : Practical UNIX & Internet Security, 16.3.1. Link-level Security
- of modems : Practical UNIX & Internet Security, 14.6. Additional Security for Modems
- multipart subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- Netscape Navigator system : Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire
- with network services : Practical UNIX & Internet Security, 17.4. Security Implications of Network Services
- network-level : Building Internet Firewalls, 10.5. Network-Level Encryption
- one-time pad mechanism : Practical UNIX & Internet Security, 6.4.7. An Unbreakable Encryption Algorithm
- packet filtering perimeter and : Building Internet Firewalls, 10.5.3. Where Do You Encrypt?
- of passwords
- Practical UNIX & Internet Security, 8.6. The UNIX Encrypted Password System
- Practical UNIX & Internet Security, 8.6.4. Crypt16() and Other Algorithms
- Practical UNIX & Internet Security, 23.5. Tips on Using Passwords
- PGP : (see PGP)
- private-key
- Practical UNIX & Internet Security, 6.4. Common Cryptographic Algorithms
- Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- TCP/IP Network Administration, 12.6. Encryption
- public-key
- Building Internet Firewalls, 10. Authentication and Inbound
- Practical UNIX & Internet Security, 6.4. Common Cryptographic Algorithms
- Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
- Practical UNIX & Internet Security, 6.4.6. RSA and Public Key Cryptography
- Practical UNIX & Internet Security, 6.4.6.3. Strength of RSA
- Practical UNIX & Internet Security, 6.5.3. Digital Signatures
- Practical UNIX & Internet Security, 18.3. Controlling Access to Files on Your Server
- Practical UNIX & Internet Security, 18.6. Dependence on Third Parties
- TCP/IP Network Administration, 12.6. Encryption
- breaking : Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
- PGP : Practical UNIX & Internet Security, 6.6.3.2. Creating your PGP public key
- proving identity with : Practical UNIX & Internet Security, 19.3.1.1. Proving your identity
- RC4 and RC5 algorithms : Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- references on : Practical UNIX & Internet Security, D.1.5. Cryptography Books
- Skipjack algorithm : Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- superencryption : Practical UNIX & Internet Security, 6.4.5. Improving the Security of DES
- and superusers : Practical UNIX & Internet Security, 6.2.4. Why Use Encryption with UNIX?
- of time-stamp : Building Internet Firewalls, 10.2.2. Something You Know
- uses for : TCP/IP Network Administration, 12.6. Encryption
- of Web information : Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire
- end systems : (see hosts)
- end-of-line string : sendmail, 30.4. The Equates
- end-to-end
- data encryption
- Practical UNIX & Internet Security, 16.3.1. Link-level Security
- TCP/IP Network Administration, 12.6. Encryption
- routes
- TCP/IP Network Administration, 2.5. The Routing Table
- TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
- TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
- TCP/IP Network Administration, B.10. Control Statements
- Energy Sciences Network (ESnet) : Practical UNIX & Internet Security, F.3.4.43. U.S. Department of Energy
- Enigma encryption system
- Practical UNIX & Internet Security, 6.3. The Enigma Encryption System
- Practical UNIX & Internet Security, 6.6.1.1. The crypt program
- enriched text subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- enterprise
- networks
- Practical UNIX & Internet Security, 16.1. Networking
- TCP/IP Network Administration, 4.1. Connected and Non-Connected Networks
- subnets : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- enterpriseSpecific trap : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- ENVDEF= directive : sendmail, 18.4.2. ENVDEF=
- envelope
- sendmail, 1.7. The Envelope
- sendmail, 8.2. Why Rules?
- DSN ENVID identifier
- sendmail, 23.9. The qf File Internals
- sendmail, 36.7. Alphabetized Reference
- logging sender of : sendmail, 26.1.3.3. from= show envelope sender
- masquerading : sendmail, 19.6. Alphabetized m4 Macros
- original DSN : sendmail, 31.10. Alphabetized Reference
- rewriting address of : sendmail, 29.3.1. V8 Enhancements
- specifying recipient's address : sendmail, 29.10.2. The check_rcpt Rule Set
- UDB rewrite on : sendmail, 30.8. Alphabetized F= Flags
- ENVELOPE *e structure : sendmail, 20.1.1. Arguments Passed to checkcompat()
- ${envid} macro : sendmail, 31.10. Alphabetized Reference
- environment variables
- Practical UNIX & Internet Security, 11.5.2.7. Other initializations
- Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- sendmail, 5.3.12. Environment variables
- sendmail, 22.2. The Environment
- sendmail, 36.4.2.1. Initialize the environment
- E configuration command : sendmail, 22.2.1. The E Configuration Command
- environment, physical
- Practical UNIX & Internet Security, 12.2.1. The Environment
- Practical UNIX & Internet Security, 12.2.1.13. Environmental monitoring
- equal-cost multi-path routing : TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- equates
- sendmail, 30.4. The Equates
- (see also under specific equate)
- equivalent hosts : TCP/IP Network Administration, 12.2.5. Secure the r Commands
- erasing disks : Practical UNIX & Internet Security, 12.3.2.3. Sanitize your media before disposal
- erotica, laws governing : Practical UNIX & Internet Security, 26.4.5. Pornography and Indecent Material
- ERRLIST_PREDEFINED macro : sendmail, 18.8. Alphabetized Reference
- errno variable : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- errno.h file : sendmail, B.1. Status file lines
- error messages
- ErrorHeader (E) option : sendmail, 34.8. Alphabetized Reference
- ErrorMode (e) option
- sendmail, 34.1.3. Appropriateness of Options
- sendmail, 34.8. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- errors
- Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
- sendmail, 26.1. Logging with syslog
- sendmail, 36.5.5. EX_OSERR A System Resource Error
- (see also exit signal)
- (see also logs/logging)
- in ACLs : Practical UNIX & Internet Security, 5.2.5.1. AIX Access Control Lists
- addressing : sendmail, 8.2. Why Rules?
- building with m4 : sendmail, 19.2. Build with m4
- configuration : Practical UNIX & Internet Security, 9.1. Prevention
- correction, not provided in SLIP : TCP/IP Network Administration, 6.2.1. The Serial Protocols
- delivery agent for
- sendmail, 9.4. The error Delivery Agent
- sendmail, 30.5.2. The error Delivery Agent
- delivery failure count : sendmail, 23.9. The qf File Internals
- detection
- TCP/IP Network Administration, 1.5.1. Internet Protocol
- TCP/IP Network Administration, 11.8. Protocol Case Study
- end-to-end : TCP/IP Network Administration, 1.6. Transport Layer
- DNS error numbers : sendmail, B.1. Status file lines
- error message header : sendmail, 34.8. Alphabetized Reference
- human
- Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
- TCP/IP Network Administration, 11.1.1. Troubleshooting Hints
- ICMP codes for : Building Internet Firewalls, 6.4.2. Returning ICMP
- illegal command-line switches : sendmail, 36.7. Alphabetized Reference
- List:; form addresses
- sendmail, 17.1.2.1. A rule to handle List:;
- sendmail, 17.3. Rule Set 0
- MIME format : sendmail, 34.8. Alphabetized Reference
- overwriting rule sets : sendmail, 8.4. Rules
- recovery from : TCP/IP Network Administration, 1.5.1. Internet Protocol
- requeuing in response to : sendmail, 25.7.6. Force Requeue on Error
- rule set 0 for : sendmail, 17.3. Rule Set 0
- on sending errors : sendmail, 34.8. Alphabetized Reference
- in sendmail.cf file : sendmail, 5.1. Overview
- suppressing messages : sendmail, 12.2. The File Form of Class
- temporary : sendmail, 36.5.8. EX_TEMPFAIL A Recoverable Error
- UNIX error number : sendmail, B.1. Status file lines
- "Errors-To:" header line
- sendmail, 34.8. Alphabetized Reference
- sendmail, 35.10. Alphabetized Reference
- escape characters
- Practical UNIX & Internet Security, 14.5.3.1. Originate testing
- sendmail, 35.3.2. Escape Character in the Header Field
- escrowing encryption keys
- Practical UNIX & Internet Security, 6.1.3. Modern Controversy
- Practical UNIX & Internet Security, 7.1.6.3. Data security for backups
- ESMTP (Extended SMTP)
- sendmail, 4.2. Verbose (-v)
- sendmail, 23.9. The qf File Internals
- sendmail, 30.8. Alphabetized F= Flags
- TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- TCP/IP Network Administration, 10.8. Testing sendmail.cf
- BODY parameter (ESMTP)
- sendmail, 31.10. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- private extensions to : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- ESnet (Energy Sciences Network) : Practical UNIX & Internet Security, F.3.4.43. U.S. Department of Energy
- espionage
- Building Internet Firewalls, 1.2.2.4. Spies (Industrial and
- Practical UNIX & Internet Security, 11.3. Authors
- ESTABLISHED state : TCP/IP Network Administration, B.8.5. The bgp Statement
- /etc directory
- Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
- Practical UNIX & Internet Security, 11.5.3.5. System initialization files
- backups of : Practical UNIX & Internet Security, 7.1.3. Types of Backups
- /etc/aliases file
- Practical UNIX & Internet Security, 11.5.3.3. /usr/lib/aliases, /etc/aliases,
- sendmail, 3.1.1. The Aliases File
- sendmail, 22.6. The Aliases File
- sendmail, 24.1. The aliases(5) File
- sendmail, 24.5. The Aliases Database
- sendmail, 33.3.4.1. -A append values for duplicate keys (V8.7 and above)
- sendmail, 33.8. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
- TCP/IP Network Administration, 9.3. Network Information Service
- in symbol table
- sendmail, 24.5.4. No DBM Aliasing
- sendmail, 33.8. Alphabetized Reference
- /etc/aspppd.cf file : TCP/IP Network Administration, 6.3.6. Solaris PPP
- /etc/auto_direct file : TCP/IP Network Administration, 9.1.4. NFS Automounter
- /etc/auto_home file : TCP/IP Network Administration, 9.1.4. NFS Automounter
- /etc/auto_master file : TCP/IP Network Administration, 9.1.4. NFS Automounter
- /etc/bootptab file
- TCP/IP Network Administration, 9.4. A BOOTP Server
- TCP/IP Network Administration, 9.6.1. rdist
- configuration parameters : TCP/IP Network Administration, 9.4.2. BOOTP extensions
- updating : TCP/IP Network Administration, 9.4.2. BOOTP extensions
- /etc/default/login file : Practical UNIX & Internet Security, 8.5.1. Secure Terminals
- /etc/default/passwd file : TCP/IP Network Administration, 12.2.1. The Shadow Password File
- /etc/defaultdomain file : TCP/IP Network Administration, 9.3. Network Information Service
- /etc/dfs/dfstab file
- TCP/IP Network Administration, 9.1.2.1. The share command
- TCP/IP Network Administration, 9.1.5.1. NFS print services
- /etc/dhcpd.conf file : TCP/IP Network Administration, 9.5.1. dhcpd.conf
- /etc/diphosts file : TCP/IP Network Administration, 6.4.3. SLIP Server Configuration
- /etc/ethers file
- TCP/IP Network Administration, 3.5.1. Reverse Address Resolution Protocol
- TCP/IP Network Administration, 9.3. Network Information Service
- TCP/IP Network Administration, 11.4.2.1. ARP problem case study
- /etc/exports file
- Practical UNIX & Internet Security, 11.6.1.2. Writable system files and directories
- Practical UNIX & Internet Security, 19.3.2.4. Using Secure NFS
- Practical UNIX & Internet Security, 20.2.1.1. /etc/exports
- Practical UNIX & Internet Security, 20.2.1.2. /usr/etc/exportfs
- TCP/IP Network Administration, 9.1.5.1. NFS print services
- /etc/fbtab file : Practical UNIX & Internet Security, 17.3.21.1. /etc/fbtab and /etc/logindevperm
- /etc/fingerd program : (see finger service)
- /etc/fsck program : Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
- /etc/fstab file
- Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
- Practical UNIX & Internet Security, 19.3.2.5. Mounting a secure filesystem
- TCP/IP Network Administration, 9.1.3.2. The vfstab and fstab files
- /etc/ftpd : (see ftpd server)
- /etc/ftpusers file : Practical UNIX & Internet Security, 17.3.2.5. Restricting FTP with the standard UNIX FTP server
- /etc/gated.conf file
- TCP/IP Network Administration, 7.6. Gateway Routing Daemon
- TCP/IP Network Administration, 7.7.1.1. A host configuration
- TCP/IP Network Administration, 7.7.2.1. Running gated at startup
- /etc/gateways file
- TCP/IP Network Administration, 7.3.1.1. Installing static routes at startup
- TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
- /etc/group file
- Practical UNIX & Internet Security, 1.2. What Is an Operating System?
- Practical UNIX & Internet Security, 4.1.3.1. The /etc/group file
- Practical UNIX & Internet Security, 4.2.3. Impact of the /etc/passwd and /etc/group
- Practical UNIX & Internet Security, 8.1.6. Group Accounts
- TCP/IP Network Administration, 9.3. Network Information Service
- TCP/IP Network Administration, 13.2.1. Creating an FTP Server
- /etc/halt command : Practical UNIX & Internet Security, 24.2.6. Anatomy of a Break-in
- /etc/hosts file
- Practical UNIX & Internet Security, 16.2.3.1. The /etc/hosts file
- sendmail, 7.3.1. The hostname
- sendmail, 18.8. Alphabetized Reference
- sendmail, 34.8. Alphabetized Reference
- TCP/IP Network Administration, 3.2. The Host Table
- TCP/IP Network Administration, 6.1. The ifconfig Command
- TCP/IP Network Administration, 7.3. Building a Static Routing Table
- TCP/IP Network Administration, 9.1.4. NFS Automounter
- TCP/IP Network Administration, 9.3. Network Information Service
- creating : TCP/IP Network Administration, 3.2. The Host Table
- as maps : TCP/IP Network Administration, 3.3.5. Network Information Service
- modifying : TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
- /etc/hosts.allow file : TCP/IP Network Administration, 12.5.1.1. tcpd access control files
- /etc/hosts.deny file
- Building Internet Firewalls, 5.8.3.1. Using the TCP Wrapper package to protect services
- TCP/IP Network Administration, 12.5.1.1. tcpd access control files
- /etc/hosts.equiv file
- Practical UNIX & Internet Security, 17.3.18.4. The ~/.rhosts file
- Practical UNIX & Internet Security, 17.3.18.6. /etc/hosts.lpd file
- Practical UNIX & Internet Security, 24.4.1.5. Changes to the hosts.equiv file
- TCP/IP Network Administration, 12.2.5. Secure the r Commands
- in security checks : TCP/IP Network Administration, 12.4.2. Looking for Trouble
- /etc/hosts.lpd file
- Practical UNIX & Internet Security, 17.3.18.6. /etc/hosts.lpd file
- TCP/IP Network Administration, 9.2.1.1. LPD security
- in security checks : TCP/IP Network Administration, 12.4.2. Looking for Trouble
- /etc/inetd : (see inetd daemon)
- /etc/inetd.conf file
- Practical UNIX & Internet Security, 11.5.3.2. inetd.conf
- Practical UNIX & Internet Security, 17.3. Primary UNIX Network Services
- TCP/IP Network Administration, 5.4. The Internet Daemon
- TCP/IP Network Administration, 9.4. A BOOTP Server
- editing in tcpd : TCP/IP Network Administration, 12.5.1. wrapper
- removing daemons from : TCP/IP Network Administration, 12.3.1. Remove Unnecessary Software
- in security checks : TCP/IP Network Administration, 12.4.2. Looking for Trouble
- /etc/init program : Practical UNIX & Internet Security, C.5.1. Process #1: /etc/init
- /etc/init.d directory : TCP/IP Network Administration, 9.1.1. NFS Daemons
- autofs script : TCP/IP Network Administration, 9.1.4. NFS Automounter
- inetinit script : TCP/IP Network Administration, 7.3.1.1. Installing static routes at startup
- sendmail script : TCP/IP Network Administration, 10.2. Running sendmail as a Daemon
- /etc/inittab : (see inittab program)
- /etc/keystore file : Practical UNIX & Internet Security, 19.3.1.1. Proving your identity
- /etc/logindevperm file : Practical UNIX & Internet Security, 17.3.21.1. /etc/fbtab and /etc/logindevperm
- /etc/lp directory : TCP/IP Network Administration, 9.2.2. Solaris Line Printer Service
- /etc/lp/Systems file : TCP/IP Network Administration, 9.2.2. Solaris Line Printer Service
- /etc/motd file : Practical UNIX & Internet Security, 26.2.6. Other Tips
- /etc/named.boot file
- Practical UNIX & Internet Security, 17.3.6.1. DNS zone transfers
- Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
- TCP/IP Network Administration, 8.3.1. The named.boot File
- TCP/IP Network Administration, 11.6.3. Cache corruption
- TCP/IP Network Administration, C.1. The named Command
- TCP/IP Network Administration, C.2. named.boot Configuration Commands
- /etc/named.ca file : TCP/IP Network Administration, 11.6.3. Cache corruption
- /etc/named.hosts file : TCP/IP Network Administration, 8.3.6. The named.hosts File
- /etc/named.local file : TCP/IP Network Administration, 8.3.4. The named.local File
- /etc/named.pid file : TCP/IP Network Administration, 11.6.3. Cache corruption
- /etc/named.rev file : TCP/IP Network Administration, 8.3.5. The Reverse Domain File
- /etc/networks file
- TCP/IP Network Administration, 3.2. The Host Table
- TCP/IP Network Administration, 6.1.3. Assigning a Subnet Mask
- TCP/IP Network Administration, 7.3. Building a Static Routing Table
- TCP/IP Network Administration, 9.3. Network Information Service
- as maps : TCP/IP Network Administration, 3.3.5. Network Information Service
- /etc/nsswitch.conf
- sendmail, 7.3.1. The hostname
- sendmail, D.4. L and G Configuration Commands
- TCP/IP Network Administration, 9.3.1. The nsswitch.conf file
- TCP/IP Network Administration, E.4.2. sendmail Options
- /etc/passwd file
- Practical UNIX & Internet Security, 1.2. What Is an Operating System?
- Practical UNIX & Internet Security, 3.2.1. The /etc/passwd File
- Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
- Practical UNIX & Internet Security, 4.2.3. Impact of the /etc/passwd and /etc/group
- Practical UNIX & Internet Security, 7.1.2. What Should You Back Up?
- Practical UNIX & Internet Security, 8.1.1. Accounts Without Passwords
- Practical UNIX & Internet Security, 8.6. The UNIX Encrypted Password System
- Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work
- Practical UNIX & Internet Security, 24.4.1. New Accounts
- Practical UNIX & Internet Security, C.5.1. Process #1: /etc/init
- sendmail, 30.8. Alphabetized F= Flags
- TCP/IP Network Administration, 6.3.5. PPP Server Configuration
- TCP/IP Network Administration, 6.4.3. SLIP Server Configuration
- TCP/IP Network Administration, 9.1.5. NFS Authentication Server
- TCP/IP Network Administration, 9.3. Network Information Service
- TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros
- TCP/IP Network Administration, 12.2.1. The Shadow Password File
- TCP/IP Network Administration, 13.2.1. Creating an FTP Server
- + in : (see NIS)
- accounts without passwords : Practical UNIX & Internet Security, 8.1.1. Accounts Without Passwords
- backing up : Practical UNIX & Internet Security, 7.1.2. What Should You Back Up?
- gecos field : sendmail, 14.2.1. The Full-Name: Header
- mail hubs and : sendmail, 6. The Mail Hub and Delivery Agents
- new accounts : Practical UNIX & Internet Security, 24.4.1. New Accounts
- NFS : Practical UNIX & Internet Security, 20.2.1.1. /etc/exports
- protecting : TCP/IP Network Administration, 12.2. User Authentication
- in security checks : TCP/IP Network Administration, 12.4.2. Looking for Trouble
- trusted users and : sendmail, 14.6. Trusted User
- user database class for : sendmail, 33.8. Alphabetized Reference
- uucp user and : Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work
- /etc/pcnfsd.conf file : TCP/IP Network Administration, 9.1.5.1. NFS print services
- /etc/ppp directory, protecting : TCP/IP Network Administration, A.2. The PPP Daemon
- /etc/ppp/options file
- TCP/IP Network Administration, 6.3.1. The PPP Daemon
- TCP/IP Network Administration, 6.3.2. Dial-Up PPP
- TCP/IP Network Administration, A.2. The PPP Daemon
- /etc/ppp/options.device file : TCP/IP Network Administration, A.2. The PPP Daemon
- /etc/printcap file : TCP/IP Network Administration, 9.2.1. The printcap File
- /etc/profile file
- Practical UNIX & Internet Security, 11.5.2.1. .login, .profile, /etc/profile
- Practical UNIX & Internet Security, 24.4.1.6. Changes to startup files
- /etc/protocols file
- TCP/IP Network Administration, 2.7.1. Protocol Numbers
- TCP/IP Network Administration, 5.4. The Internet Daemon
- TCP/IP Network Administration, 9.3. Network Information Service
- /etc/publickey file : Practical UNIX & Internet Security, 19.3.2.1. Creating passwords for users
- /etc/rc directory
- Practical UNIX & Internet Security, 11.5.3.5. System initialization files
- Practical UNIX & Internet Security, 17.1.2. Starting the Servers
- Practical UNIX & Internet Security, C.5.1. Process #1: /etc/init
- commenting out services : Practical UNIX & Internet Security, 17.3. Primary UNIX Network Services
- /etc/rc.d/rc.inet1 script : TCP/IP Network Administration, 7.3.1.1. Installing static routes at startup
- /etc/rc.d/rc.M startup script : TCP/IP Network Administration, 10.2. Running sendmail as a Daemon
- services started by : Building Internet Firewalls, 5.8.2.1. How are services managed?
- /etc/remote file
- Practical UNIX & Internet Security, 10.3.1. aculog File
- Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
- /etc/renice command
- Practical UNIX & Internet Security, 25.2.1.2. System overload attacks
- Practical UNIX & Internet Security, C.1.3.3. Process priority and niceness
- /etc/resolv.conf file
- TCP/IP Network Administration, 8.1.1. BIND Configurations
- TCP/IP Network Administration, 8.2. Configuring the Resolver
- TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
- TCP/IP Network Administration, 11.6.4. dig: An Alternative to nslookup
- /etc/secure/passwd file : Practical UNIX & Internet Security, 8.1.1. Accounts Without Passwords
- /etc/security/passwd.adjunct file : Practical UNIX & Internet Security, 8.8.5. Shadow Password Files
- /etc/sendmail.cf : (see sendmail.cf configuration file)
- /etc/sendmail.ct file : sendmail, 19.6. Alphabetized m4 Macros
- /etc/sendmail.cw file : sendmail, 19.6. Alphabetized m4 Macros
- /etc/sendmail/aliases file : Practical UNIX & Internet Security, 11.5.3.3. /usr/lib/aliases, /etc/aliases,
- /etc/services file
- Practical UNIX & Internet Security, 17.1.1. The /etc/services File
- TCP/IP Network Administration, 5.4. The Internet Daemon
- TCP/IP Network Administration, 9.3. Network Information Service
- TCP/IP Network Administration, 9.4. A BOOTP Server
- TCP/IP Network Administration, 9.7.1. POP Server
- TCP/IP Network Administration, 9.7.2. IMAP Server
- /etc/shadow file
- Practical UNIX & Internet Security, 8.1.1. Accounts Without Passwords
- Practical UNIX & Internet Security, 8.8.5. Shadow Password Files
- TCP/IP Network Administration, 12.2.1. The Shadow Password File
- /etc/shells file
- Practical UNIX & Internet Security, 8.4.2. Changing the Account's Login
- sendmail, 18.8. Alphabetized Reference
- sendmail, 22.8.4. The /etc/shells file
- sendmail, D.1. Sun Enhancements
- /etc/ssh_known_hosts file : TCP/IP Network Administration, 12.2.6. Secure Shell
- /etc/syslogd
- sendmail, 26.1.2. Tuning syslog.conf
- TCP/IP Network Administration, 3.2. The Host Table
- TCP/IP Network Administration, A.2. The PPP Daemon
- TCP/IP Network Administration, A.3. chat
- /etc/system file : TCP/IP Network Administration, 5.1. Kernel Configuration
- /etc/tty files
- Practical UNIX & Internet Security, 7.1.2. What Should You Back Up?
- sendmail, 18.8. Alphabetized Reference
- TCP/IP Network Administration, 6.3.5. PPP Server Configuration
- TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- /etc/ttys file
- Practical UNIX & Internet Security, 8.5.1. Secure Terminals
- Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
- /etc/ttytab file : Practical UNIX & Internet Security, C.5.1. Process #1: /etc/init
- /etc/utmp file
- Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
- Practical UNIX & Internet Security, 10.1.2.1. su commandutmp and wtmp files andsu
- Practical UNIX & Internet Security, 24.2.1. Catching One in the Act
- Practical UNIX & Internet Security, 24.2.4. Tracing a Connection
- /etc/uucp directory : Practical UNIX & Internet Security, 15.4.2.1. Some bad examples
- /etc/yp/makedbm program : Practical UNIX & Internet Security, 19.4.4.1. Setting up netgroups
- /etc/yp.conf file : TCP/IP Network Administration, 9.3. Network Information Service
- in restricted filesystems : Practical UNIX & Internet Security, 8.1.5. Restricted Filesystem
- Ethernet
- Practical UNIX & Internet Security, 16.1. Networking
- TCP/IP Network Administration, 1.5.1.3. Fragmenting datagrams
- TCP/IP Network Administration, 4.2.2. Defining the Subnet Mask
- addresses : TCP/IP Network Administration, 1.4. Network Access Layer
- identifying DHCP client by : TCP/IP Network Administration, 9.5.1. dhcpd.conf
- keeping records of : TCP/IP Network Administration, 11.4.2. Troubleshooting with the arp Command
- addresses for random seeds : Practical UNIX & Internet Security, 23.8. Picking a Random Seed
- cables : (see cables, network)
- cards, configuring
- TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- eavesdropping by : Practical UNIX & Internet Security, 12.3.1.2. Eavesdropping by Ethernet and 10Base-T
- fast ports (100 Mbps) : TCP/IP Network Administration, 11.4.4. Subdividing an Ethernet
- FreeBSD device drivers, listed : TCP/IP Network Administration, 5.3.1.3. Devices
- interfaces
- TCP/IP Network Administration, 5.3.1.3. Devices
- TCP/IP Network Administration, 6.1. The ifconfig Command
- TCP/IP Network Administration, 6.1.5.2. ARP and trailers
- TCP/IP Network Administration, 6.1.5.6. Putting ifconfig in the startup files
- LAN : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- networks : TCP/IP Network Administration, 1.4. Network Access Layer
- subdividing : TCP/IP Network Administration, 11.4.4. Subdividing an Ethernet
- support in BSD : TCP/IP Network Administration, 5.3.1.2. Pseudo-device
- switch : TCP/IP Network Administration, 11.4.4. Subdividing an Ethernet
- Ethernet packet layer : Building Internet Firewalls, 6.3.1.1. Ethernet layer
- ethers file
- TCP/IP Network Administration, 3.5.1. Reverse Address Resolution Protocol
- TCP/IP Network Administration, 9.3. Network Information Service
- TCP/IP Network Administration, 11.4.2.1. ARP problem case study
- Ethers table (NIS+) : Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
- ETRN command (SMTP) : sendmail, 23.6.2.4. Process the queue via ESMTP ETRN
- Euler Totient Function : Practical UNIX & Internet Security, 6.4.6.1. How RSA works
- eval function
- Practical UNIX & Internet Security, 18.2.3.2. Testing is not enough!
- Practical UNIX & Internet Security, 18.2.3.3. Sending mail
- evidence, equipment seized as : Practical UNIX & Internet Security, 26.2.4. Hazards of Criminal Prosecution
- ex editor
- Practical UNIX & Internet Security, 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve
- Practical UNIX & Internet Security, 11.5.2.4. .exrc
- Practical UNIX & Internet Security, 11.5.2.7. Other initializations
- EX_CANTCREAT value : sendmail, 36.5.1. EX_CANTCREAT Can't Write a User's File
- EX_CONFIG value : sendmail, 36.5.2. EX_CONFIG A Configuration Error
- EX_IOERR value : sendmail, 36.5.3. EX_IOERR A System I/O Error Occurred
- EX_OK value : sendmail, 36.5.4. EX_OK No Problems, All Was Fine
- EX_OSERR value : sendmail, 36.5.5. EX_OSERR A System Resource Error
- EX_OSFILE value : sendmail, 36.5.6. EX_OSFILE A Critical System File Failure
- EX_SOFTWARE value : sendmail, 36.5.7. EX_SOFTWARE An Internal Software Error
- EX_TEMPFAIL value : sendmail, 36.5.8. EX_TEMPFAIL A Recoverable Error
- EX_UNAVAILABLE value : sendmail, 36.5.9. EX_UNAVAILABLE A Resource
- EX_USAGE value : sendmail, 36.5.10. EX_USAGE A Command Was Used Incorrectly
- exceptions : Practical UNIX & Internet Security, C.2. Creating Processes
- exclamation mark (!) and mail command : Practical UNIX & Internet Security, 15.1.3. mail Command
- exclusive OR (XOR) : Practical UNIX & Internet Security, 6.4.7. An Unbreakable Encryption Algorithm
- exec (in Swatch program) : Practical UNIX & Internet Security, 10.6.2. The Swatch Configuration File
- exec system call
- Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail
- Practical UNIX & Internet Security, 18.2.3.3. Sending mail
- Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- Practical UNIX & Internet Security, 25.2.1.1. Too many processes
- ExecCGI option : Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
- execl system call : Practical UNIX & Internet Security, 23.4. Tips on Writing SUID/SGID Programs
- execlp system call : Practical UNIX & Internet Security, 23.4. Tips on Writing SUID/SGID Programs
- executable files, in security checks : TCP/IP Network Administration, 12.4.2. Looking for Trouble
- execute permission
- Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail
- Practical UNIX & Internet Security, 5.4. Using Directory Permissions
- execv system call : Practical UNIX & Internet Security, 23.4. Tips on Writing SUID/SGID Programs
- execve system call : Practical UNIX & Internet Security, 23.4. Tips on Writing SUID/SGID Programs
- execvp system call : Practical UNIX & Internet Security, 23.4. Tips on Writing SUID/SGID Programs
- exit signal
- sendmail, 26.3.1. SIGINT Cleanup and Exit
- sendmail, 36.5. sendmail's exit() Status
- expanding addresses selectively : sendmail, D.3. K Command's -d switch
- expanding macros : sendmail, 31.5. Macro Expansion: $ and $&
- expect nothing ('')
- TCP/IP Network Administration, 6.3.3. chat
- TCP/IP Network Administration, A.3. chat
- expect scripting language : TCP/IP Network Administration, A.1.1.1. A sample dip script
- expensive delivery agents : sendmail, 30.8. Alphabetized F= Flags
- expensive mailers
- sendmail, 23.6.1. Periodically with -q
- sendmail, 34.8. Alphabetized Reference
- expire fields : TCP/IP Network Administration, 12.2.1. The Shadow Password File
- expiring
- accounts : Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts
- FTP depositories : Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
- passwords : Practical UNIX & Internet Security, 8.8.6. Password Aging and Expiration
- exploder lists : sendmail, 25.4. Exploder Mailing Lists
- explosions : Practical UNIX & Internet Security, 12.2.1.5. Explosion
- EXPN command
- sendmail, 22.3.2. SMTP vrfy and expn
- sendmail, 22.8.3.5. The PrivacyOptions option
- sendmail, 25.7.1. Unscrambling Forwards
- TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
- TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- export laws : Practical UNIX & Internet Security, 26.4.1. Munitions Export
- cryptography
- Practical UNIX & Internet Security, 6.4.4.1. Use and export of DES
- Practical UNIX & Internet Security, 6.7.2. Cryptography and Export Controls
- export statement (in gated) : TCP/IP Network Administration, B.10.2. The export Statement
- exportfs command : Practical UNIX & Internet Security, 20.2.1.2. /usr/etc/exportfs
- exporting news via NFS : Building Internet Firewalls, 8.5.3.3. Exporting news to clients via
- exports file
- Practical UNIX & Internet Security, 11.6.1.2. Writable system files and directories
- Practical UNIX & Internet Security, 19.3.2.4. Using Secure NFS
- Practical UNIX & Internet Security, 20.2.1.1. /etc/exports
- Practical UNIX & Internet Security, 20.2.1.2. /usr/etc/exportfs
- TCP/IP Network Administration, 9.1.5.1. NFS print services
- EXPOSED_USER macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
- .exrc file : Practical UNIX & Internet Security, 11.5.2.4. .exrc
- ext2 filesystem (Linux) : Practical UNIX & Internet Security, 25.2.2.6. Reserved space
- Extended SMTP (ESMTP)
- sendmail, 4.2. Verbose (-v)
- sendmail, 23.9. The qf File Internals
- sendmail, 30.8. Alphabetized F= Flags
- TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- TCP/IP Network Administration, 10.8. Testing sendmail.cf
- BODY parameter (ESMTP)
- sendmail, 31.10. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- private extensions to : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- extensibility
- in monitors : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- of SMTP : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- Exterior Gateway Protocol : (see EGP)
- exterior routers : Building Internet Firewalls, 4.2.3.4. Exterior router
- configuring : Building Internet Firewalls, 9.1.2.2. Exterior Router
- merging with bastion host : Building Internet Firewalls, 4.3.3. It's OK to Merge
- merging with interior router : Building Internet Firewalls, 4.3.2. It's OK to Merge the Interior Router and the Exterior Router
- multiple : Building Internet Firewalls, 4.3.6. It's OK to Use
- exterior routing protocols : TCP/IP Network Administration, 7.5. Exterior Routing Protocols
- external
- clients, and proxying : Building Internet Firewalls, 7.4.5. Internal Versus External Clients
- programs on HTTP servers : Building Internet Firewalls, 8.6.3.1. What can a malicious client do to
- external data representation (XDR) : Practical UNIX & Internet Security, 19.2. Sun's Remote Procedure Call (RPC)
- external databases : (see databases)
- External-body message subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- extinguishers, fire : (see fires)
- extortion : Practical UNIX & Internet Security, 11.3. Authors
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.