start page | rating of books | rating of authors | reviews | copyrights
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: H
- H configuration command
- sendmail, 5.3.8. Headers
- sendmail, 14.1. Headers
- sendmail, 35.1. The H Configuration Command
- h flag : sendmail, 30.8. Alphabetized F= Flags
- H line (host status file) : sendmail, B.1. Status file lines
- H line (qf file) : sendmail, 23.9. The qf File Internals
- $h macro
- sendmail, 6.2. Define a Mail Delivery Agent
- sendmail, 7.3. Predefined Macros
- sendmail, 31.10. Alphabetized Reference
- (see also rule set 0)
- $H macro : sendmail, 31.10. Alphabetized Reference
- h option : (see MaxHopCount (h) option)
- H option : (see HelpFile (H) option)
- -h switch : sendmail, 36.7. Alphabetized Reference
- H_ACHECK flag
- sendmail, 35.5.6. H_ACHECK
- sendmail, 35.5.16. Replacing Headers with H_ACHECK
- H_BCC flag : sendmail, 35.5.14. H_BCC
- H_CHECK flag : sendmail, 35.5.5. H_CHECK
- H_CTE flag : sendmail, 35.5.12. H_CTE
- H_CTYPE flag : sendmail, 35.5.13. H_CTYPE
- H_DEFAULT flag : sendmail, 35.5.3. H_DEFAULT
- H_ENCODABLE flag : sendmail, 35.5.15. H_ENCODABLE
- H_EOH flag : sendmail, 35.5.1. H_EOH
- H_ERRSTO flag : sendmail, 35.5.11. H_ERRSTO
- H_FORCE flag : sendmail, 35.5.7. H_FORCE
- H_FROM flag : sendmail, 35.5.9. H_FROM
- H_RCPT flag : sendmail, 35.5.2. H_RCPT
- H_RESENT flag : sendmail, 35.5.4. H_RESENT
- H_TRACE flag : sendmail, 35.5.8. H_TRACE
- H_VALID flag : sendmail, 35.5.10. H_VALID
- HACK macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
- hacker challenges : Practical UNIX & Internet Security, 27.2.4. Hacker Challenges
- hackers : Practical UNIX & Internet Security, 1. Introduction
- Haley, Chuck : Practical UNIX & Internet Security, 1.3. History of UNIX
- Halon fire extinguishers : Practical UNIX & Internet Security, 12.2.1.1. Fire
- and radio transmitters : Practical UNIX & Internet Security, 12.2.1.8. Electrical noise
- halt command : Practical UNIX & Internet Security, 24.2.6. Anatomy of a Break-in
- handshakes
- Building Internet Firewalls, C.6.2. Transmission Control Protocol
- TCP/IP Network Administration, 1.5.1. Internet Protocol
- TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
- TCP : TCP/IP Network Administration, 2.7.3. Sockets
- three-way : TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
- hanging up modem : (see signals)
- harassment : Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
- hard copy : (see paper)
- hard disks : (see media)
- hardcopy device, logging to : Practical UNIX & Internet Security, 10.5.2.1. Logging to a printer
- hardware
- bugs in : Practical UNIX & Internet Security, 27.2.1. Hardware Bugs
- configuration of : Building Internet Firewalls, 5.3.3. What Hardware Configuration?
- failure of : Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
- food and drink threats : Practical UNIX & Internet Security, 12.2.2.1. Food and drink
- modems
- Practical UNIX & Internet Security, 14. Telephone Security
- Practical UNIX & Internet Security, 14.6. Additional Security for Modems
- physical security of
- Practical UNIX & Internet Security, 12.2. Protecting Computer Hardware
- Practical UNIX & Internet Security, 12.2.7. Related Concerns
- read-only filesystems : Practical UNIX & Internet Security, 9.1.2. Read-only Filesystems
- router : (see routers and routing)
- seized as evidence : Practical UNIX & Internet Security, 26.2.4. Hazards of Criminal Prosecution
- HAS... macros : sendmail, 18.8. Alphabetized Reference
- hash database class : sendmail, 33.8. Alphabetized Reference
- hash functions : Practical UNIX & Internet Security, 6.5.1. Message Digests
- for comments
- sendmail, 5.1. Overview
- sendmail, 5.2.2. Comments
- sendmail, 27.2. Comments
- sendmail, 38.2. Configuration Lines
- TCP/IP Network Administration, 3.2. The Host Table
- TCP/IP Network Administration, 5.4. The Internet Daemon
- TCP/IP Network Administration, 7.7.1.1. A host configuration
- TCP/IP Network Administration, 9.1.4. NFS Automounter
- TCP/IP Network Administration, 9.2.1. The printcap File
- TCP/IP Network Administration, 9.4. A BOOTP Server
- TCP/IP Network Administration, A.1.1. The dip Script File
- TCP/IP Network Administration, D.3. The dhcpd.conf Configuration File
- disabling services with : Practical UNIX & Internet Security, 17.3. Primary UNIX Network Services
- in :include: lists : sendmail, 25.2.1. Comments in :include: Lists
- lines in sendmail.cf : sendmail, 3.1. Role in the Filesystem
- in m4 files : sendmail, 19.5. Pitfalls
- HAVAL algorithm
- Practical UNIX & Internet Security, 6.5.4.3. HAVAL
- Practical UNIX & Internet Security, 23.9. A Good Random Seed
- Hayes modems : TCP/IP Network Administration, 6.3.2. Dial-Up PPP
- compatibility problems : TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- HDB UUCP : Practical UNIX & Internet Security, 15.2. Versions of UUCP
- header packet
- Building Internet Firewalls, 6.3. What Does a Packet Look Like?
- Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
- headers
- TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
- TCP/IP Network Administration, 1.5.1.1. The datagram
- TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- .h files : TCP/IP Network Administration, 5.3.1.2. Pseudo-device
- compressing : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- email message
- sendmail, 1.5. The Header
- sendmail, 5.3.8. Headers
- sendmail, 13.4. Sending Mail
- sendmail, 14.1. Headers
- (see also under specific header line)
- adding : sendmail, 20.3. Alphabetized V8.8 Subroutines
- changing values of : sendmail, 20.3. Alphabetized V8.8 Subroutines
- conf.c file : sendmail, 35.5. Header Behavior in conf.c
- defining : (see H configuration command)
- delivery agent flags and
- sendmail, 14.2. Headers Versus Delivery Agent Flags
- sendmail, 35.4. ?flags? in Header Definitions
- field contents : sendmail, 35.3. Header Field Contents
- firewalls and : sendmail, 20.2.5. Prune Received: Headers at Firewall
- getting recipients from : sendmail, 36.7. Alphabetized Reference
- mailing lists and : sendmail, 25.5.1. Reply Versus Bounce
- in qf file : sendmail, 23.9. The qf File Internals
- in queue : sendmail, 3.1.2. The Queue Directory
- removing (deleting) : sendmail, 20.3. Alphabetized V8.8 Subroutines
- using old style of : sendmail, 34.8. Alphabetized Reference
- nested IP : Building Internet Firewalls, 6.3.6. IP Version 6
- packet filtering and : Building Internet Firewalls, 6.8.4. It Should Allow Rules Based on Any
- heat, extreme : Practical UNIX & Internet Security, 12.2.1.6. Temperature extremes
- Hellman, Martin : Practical UNIX & Internet Security, 6.4.5.1. Double DES
- Hellman-Merkle : Practical UNIX & Internet Security, 18.6. Dependence on Third Parties
- hello
- messages : TCP/IP Network Administration, 7.5.1. Exterior Gateway Protocol
- packets : TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- statement (in gated) : TCP/IP Network Administration, B.8.3. The hello Statement
- HELO command
- sendmail, 18.8. Alphabetized Reference
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 34.8. Alphabetized Reference
- TCP/IP Network Administration, 3.4.2. Post Office Protocol
- TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- TCP/IP Network Administration, 7.4. Interior Routing Protocols
- help on sendmail
- sendmail, Additional Sources of Information
- sendmail, 2.2. Read the Documents
- HELP command
- in ESMTP : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- in nslookup : TCP/IP Network Administration, 8.4. Using nslookup
- in SMTP
- sendmail, 34.8. Alphabetized Reference
- TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
- HelpFile (H) option : sendmail, 34.8. Alphabetized Reference
- HES_GETMAILHOST macro : sendmail, 18.8. Alphabetized Reference
- hesiod database class : sendmail, 33.8. Alphabetized Reference
- HESIOD macro : sendmail, 18.8. Alphabetized Reference
- Hewlett-Packard (HP) : Practical UNIX & Internet Security, F.3.4.17. Hewlett-Packard (HP)
- HFDIR= directive : sendmail, 18.4.9. HFDIR=
- hidden
- data, in CGI scripts : Practical UNIX & Internet Security, 18.2.3.1. Do not trust the user's browser!
- files, created by intruders : Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
- space : Practical UNIX & Internet Security, 25.2.2.7. Hidden space
- hidden dot algorithm : sendmail, 4.2. Verbose (-v)
- hiding information with DNS : Building Internet Firewalls, 8.10.5. Setting Up DNS to Hide
- hierarchy, system : TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
- database system : TCP/IP Network Administration, 9.3.2. NIS+
- of responsibility : TCP/IP Network Administration, 12.1.2.1. Use subnets to distribute control
- high bit : sendmail, 30.8. Alphabetized F= Flags
- High-level Data Link Control (HDLC) : TCP/IP Network Administration, 6.2.1. The Serial Protocols
- high-speed dial-up modems : (see modems)
- hijacking : Building Internet Firewalls, 10.1.1. Hijacking
- hijacking Telnet sessions : Practical UNIX & Internet Security, 17.3.3. TELNET (TCP Port 23)
- HINFO resource records
- Building Internet Firewalls, 8.10.4.3. Revealing too much information to
- TCP/IP Network Administration, 11.6.2. The data is here and the server can't find it!
- TCP/IP Network Administration, C.3.1.7. Host Information record
- hints file : TCP/IP Network Administration, 8.3.3. The Cache Initialization File
- history file (csh)
- Practical UNIX & Internet Security, 10.4.1. Shell History
- Practical UNIX & Internet Security, 15.1.1.1. uucp with the C shell
- history, sendmail
- sendmail, History
- sendmail, 27.5. The V Configuration Command
- hit lists of passwords : Practical UNIX & Internet Security, 3.6.1. Bad Passwords: Open Doors
- hoaxes about viruses : TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
- HoldExpensive (c) option
- sendmail, 23.6.1. Periodically with -q
- sendmail, 34.8. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- holding messages : (see queue)
- holes, security : (see security holes)
- home directory, recipient's : sendmail, 31.10. Alphabetized Reference
- HOME variable, attacks via : Practical UNIX & Internet Security, 11.5.1.3. $HOME attacks
- HoneyDanBer (HDB) UUCP : Practical UNIX & Internet Security, 15.2. Versions of UUCP
- Honeyman, Peter : Practical UNIX & Internet Security, 15.2. Versions of UUCP
- hop count
- sendmail, 14.1.2. The Received: Header
- sendmail, 31.10. Alphabetized Reference
- sendmail, 34.8. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
- hops
- TCP/IP Network Administration, 1.7. Application Layer
- TCP/IP Network Administration, 2.5. The Routing Table
- (see also next hop)
- host database class : sendmail, 33.8. Alphabetized Reference
- Host Information records : (see HINFO resource records)
- host status : sendmail, B.1. Status file lines
- host unreachable codes : (see ICMP)
- Host-to-Host Transport Layer : (see Transport Layer)
- hostname command : sendmail, 7.3.1. The hostname
- hostnames
- Practical UNIX & Internet Security, 16.2.3. Hostnames
- Practical UNIX & Internet Security, 16.2.3.1. The /etc/hosts file
- sendmail, 7.3.1. The hostname
- sendmail, 21.2.2. Look Up a Remote Host's Name
- TCP/IP Network Administration, 3.1. Names and Addresses
- $@ operator and
- sendmail, 9.2.2. The Host ($@)
- sendmail, 9.3. Testing Rule Set 0
- sendmail, 17.1.1.3. Handle null address
- sendmail, 33.4.2. Specify Numbered Substitution with $@
- canonicalizing : (see canonicalization)
- capitalization of : sendmail, 30.8. Alphabetized F= Flags
- changing to hub name : sendmail, 11.6. Handling user@thishost
- choosing : TCP/IP Network Administration, 4.4.2. Choosing a Hostname
- controlling access to : Practical UNIX & Internet Security, 17.2. Controlling Access to Servers
- default : sendmail, 33.5.3. A :default Outgoing Hostname
- domain part : (see $m macro)
- easing transition from old to new : TCP/IP Network Administration, C.3.1.5. Canonical Name record
- name service and
- Practical UNIX & Internet Security, 16.2.6. Name Service
- Practical UNIX & Internet Security, 16.2.6.2. Other naming services
- parameter : TCP/IP Network Administration, 9.4. A BOOTP Server
- short form of : (see $w macro)
- hosts
- sendmail, 6.3. The local Delivery Agent
- TCP/IP Network Administration, 1.7. Application Layer
- (see also $h macro)
- (see also remote, hosts, checking)
- $_ macro : (see $_ macro)
- addresses : (see addresses)
- architecture of
- dual-homed : Building Internet Firewalls, 4.2.1. Dual-Homed Host Architecture
- screened
- Building Internet Firewalls, 4.2.2. Screened Host Architecture
- Building Internet Firewalls, 9.2. Screened Host Architecture
- bastion : (see bastion hosts)
- canonical names of : sendmail, 31.10. Alphabetized Reference
- checking if local : sendmail, 17.2.1. Is the Host Local?
- file, caution regarding : TCP/IP Network Administration, 6.1.3. Assigning a Subnet Mask
- IP addresses of : sendmail, 31.10. Alphabetized Reference
- list : TCP/IP Network Administration, 12.5.1.1. tcpd access control files
- masquerading : (see masquerading)
- multi-homed : TCP/IP Network Administration, 1.5.1.2. Routing datagrams
- name service for : Building Internet Firewalls, 2.9. Name Service
- NID passwords for : Practical UNIX & Internet Security, 19.3.2.2. Creating passwords for hosts
- offsite MX : sendmail, 21.5.1. Offsite MX Hosts
- preference
- sendmail, 15.3. MX Records
- sendmail, 21.3. Set Up MX Records
- security of : Building Internet Firewalls, 1.3.3. Host Security
- sender's : (see $s macro)
- sending, variables for : sendmail, 20.1.2. Global Variables
- setting : sendmail, 36.7. Alphabetized Reference
- smart
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 29.6.4. Forwarding to a Knowledgeable Host
- sendmail, 31.10. Alphabetized Reference
- speed of : Building Internet Firewalls, 5.3.2. How Fast a Machine?
- sticky and nonsticky : sendmail, 19.6. Alphabetized m4 Macros
- table
- TCP/IP Network Administration, 3.1. Names and Addresses
- TCP/IP Network Administration, 3.2. The Host Table
- system, problems with : TCP/IP Network Administration, 3.2. The Host Table
- trusted : (see trusted hosts)
- victim : (see victim hosts)
- hosts file
- Practical UNIX & Internet Security, 16.2.3.1. The /etc/hosts file
- sendmail, 7.3.1. The hostname
- sendmail, 18.8. Alphabetized Reference
- sendmail, 34.8. Alphabetized Reference
- TCP/IP Network Administration, 3.2. The Host Table
- TCP/IP Network Administration, 6.1. The ifconfig Command
- TCP/IP Network Administration, 7.3. Building a Static Routing Table
- TCP/IP Network Administration, 9.1.4. NFS Automounter
- TCP/IP Network Administration, 9.3. Network Information Service
- creating : TCP/IP Network Administration, 3.2. The Host Table
- as maps : TCP/IP Network Administration, 3.3.5. Network Information Service
- modifying : TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
- hosts.allow file : TCP/IP Network Administration, 12.5.1.1. tcpd access control files
- hosts.deny file
- Building Internet Firewalls, 5.8.3.1. Using the TCP Wrapper package to protect services
- TCP/IP Network Administration, 12.5.1.1. tcpd access control files
- hosts.equiv file
- Practical UNIX & Internet Security, 17.3.18.4. The ~/.rhosts file
- Practical UNIX & Internet Security, 17.3.18.6. /etc/hosts.lpd file
- Practical UNIX & Internet Security, 24.4.1.5. Changes to the hosts.equiv file
- TCP/IP Network Administration, 12.2.5. Secure the r Commands
- TCP/IP Network Administration, 12.4.2. Looking for Trouble
- hosts.lpd file
- Practical UNIX & Internet Security, 17.3.18.6. /etc/hosts.lpd file
- TCP/IP Network Administration, 9.2.1.1. LPD security
- TCP/IP Network Administration, 12.4.2. Looking for Trouble
- HostsFile option : sendmail, 34.8. Alphabetized Reference
- hoststat command : sendmail, 36.1.1. hoststat (V8.8 and Above)
- HostStatusDirectory option
- sendmail, 34.8. Alphabetized Reference
- sendmail, B. Host Status File Internals
- housekeeping : Building Internet Firewalls, 12.1. Housekeeping
- HP (Hewlett-Packard) : Practical UNIX & Internet Security, F.3.4.17. Hewlett-Packard (HP)
- HP-UX
- access control lists : Practical UNIX & Internet Security, 5.2.5.2. HP-UX access control lists
- context-dependent files : Practical UNIX & Internet Security, 5.9.2. Context-Dependent Files
- htable command : TCP/IP Network Administration, 3.2. The Host Table
- .htaccess file : Practical UNIX & Internet Security, 18.3.1. The access.conf and .htaccess Files
- HTML (Hypertext Markup Language) : Building Internet Firewalls, 2.5. The World Wide Web
- HTML documents
- controlling access to
- Practical UNIX & Internet Security, 18.3. Controlling Access to Files on Your Server
- Practical UNIX & Internet Security, 18.3.3. Setting Up Web Users and Passwords
- delivering : TCP/IP Network Administration, 1.7. Application Layer
- encrypting : Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire
- server-side includes
- Practical UNIX & Internet Security, 18.2.2.2. Additional configuration issues
- Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
- html text subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- htpasswd program : Practical UNIX & Internet Security, 18.3.3. Setting Up Web Users and Passwords
- HTTP (Hypertext Transfer Protocol)
- Building Internet Firewalls, 2.5. The World Wide Web
- Practical UNIX & Internet Security, 17.3.9. HyperText Transfer Protocol (HTTP) (TCP Port 80)
- TCP/IP Network Administration, 1.7. Application Layer
- TCP/IP Network Administration, 13.1. The World Wide Web
- anonymous FTP and : Practical UNIX & Internet Security, 18.2.4.1. Beware mixing HTTP with anonymous FTP
- CERN server : Building Internet Firewalls, 8.6.2. Proxying Characteristics of
- configuring : Building Internet Firewalls, 8.6. World Wide Web (WWW) and HTTP
- in screened host architecture : Building Internet Firewalls, 9.2.1.5. HTTP
- in screened subnet architecture : Building Internet Firewalls, 9.1.1.5. HTTP
- logging downloaded files : Practical UNIX & Internet Security, 10.3.5. access_log Log File
- message subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- proxying with TIS FWTK : Building Internet Firewalls, 7.7.4. Other TIS FWTK
- Secure
- Building Internet Firewalls, 8.6.4. Secure HTTP
- (see Secure HTTP)
- TIS FWTK proxy server : Building Internet Firewalls, 8.6.2. Proxying Characteristics of
- http server
- group file : Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
- log files of : Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
- password file : Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
- http-gw proxy
- Building Internet Firewalls, 7.7.4. Other TIS FWTK
- Building Internet Firewalls, 8.6.2. Proxying Characteristics of
- httpd.conf file : Practical UNIX & Internet Security, 18.2.1. The Server's UID
- hubs
- sendmail, 6. The Mail Hub and Delivery Agents
- sendmail, 11.3. All Mail from the Hub
- accepting mail : sendmail, 15.4. Hub Accepts Mail for Client
- changing hostname to : sendmail, 11.6. Handling user@thishost
- delivery agent flags for : sendmail, 6.4. Add the Missing Parts to Mhub
- $H macro : sendmail, 31.10. Alphabetized Reference
- internal name for : sendmail, 11.4.2. A Word About ${HUB}
- rules for : sendmail, 17. The Hub's Complex Rules
- Hubset rule set
- sendmail, 11.2. Rule Set S=
- sendmail, 11.4. Rule Set Hubset
- human error
- Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
- TCP/IP Network Administration, 11.1.1. Troubleshooting Hints
- humidity : Practical UNIX & Internet Security, 12.2.1.11. Humidity
- hunches, verifying : TCP/IP Network Administration, 10.8.1. Testing Rewrite Rules
- hvalue() : sendmail, 20.3. Alphabetized V8.8 Subroutines
- hypertext links, encrypting : Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire
- Hypertext Markup Language : (see HTML)
- Hypertext Transfer Protocol : (see HTTP)
- hyphen (-)
- in machine conversation : sendmail, 4.2. Verbose (-v)
- non-equivalent host : TCP/IP Network Administration, 12.2.5. Secure the r Commands
- hyphen/greater than (->), for copying files : TCP/IP Network Administration, 9.6.1. rdist
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.