start page  | rating of books | rating of authors | reviews | copyrights
 
  
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z  
Index: H
   - H configuration command 
    - sendmail, 5.3.8. Headers    
- sendmail, 14.1. Headers    
- sendmail, 35.1. The H Configuration Command  
   
 - h flag : sendmail, 30.8. Alphabetized F= Flags 
- H line (host status file) : sendmail, B.1. Status file lines  
- H line (qf file) : sendmail, 23.9. The qf File Internals  
- $h macro 
       - sendmail, 6.2. Define a Mail Delivery Agent    
- sendmail, 7.3. Predefined Macros    
- sendmail, 31.10. Alphabetized Reference    
- (see also rule set 0) 
    
 - $H macro : sendmail, 31.10. Alphabetized Reference  
- h option : (see MaxHopCount (h) option) 
- H option : (see HelpFile (H) option) 
- -h switch : sendmail, 36.7. Alphabetized Reference  
- H_ACHECK flag 
        - sendmail, 35.5.6. H_ACHECK    
- sendmail, 35.5.16. Replacing Headers with H_ACHECK  
  
 - H_BCC flag : sendmail, 35.5.14. H_BCC  
- H_CHECK flag : sendmail, 35.5.5. H_CHECK  
- H_CTE flag : sendmail, 35.5.12. H_CTE  
- H_CTYPE flag : sendmail, 35.5.13. H_CTYPE  
- H_DEFAULT flag : sendmail, 35.5.3. H_DEFAULT  
- H_ENCODABLE flag : sendmail, 35.5.15. H_ENCODABLE  
- H_EOH flag : sendmail, 35.5.1. H_EOH  
- H_ERRSTO flag : sendmail, 35.5.11. H_ERRSTO  
- H_FORCE flag : sendmail, 35.5.7. H_FORCE  
- H_FROM flag : sendmail, 35.5.9. H_FROM  
- H_RCPT flag : sendmail, 35.5.2. H_RCPT  
- H_RESENT flag : sendmail, 35.5.4. H_RESENT  
- H_TRACE flag : sendmail, 35.5.8. H_TRACE  
- H_VALID flag : sendmail, 35.5.10. H_VALID  
- HACK macro (m4) : sendmail, 19.6. Alphabetized m4 Macros  
- hacker challenges : Practical UNIX & Internet Security, 27.2.4. Hacker Challenges 
- hackers : Practical UNIX & Internet Security, 1. Introduction 
- Haley, Chuck : Practical UNIX & Internet Security, 1.3. History of UNIX  
- Halon fire extinguishers : Practical UNIX & Internet Security, 12.2.1.1. Fire  
                      - and radio transmitters : Practical UNIX & Internet Security, 12.2.1.8. Electrical noise  
 
 - halt command : Practical UNIX & Internet Security, 24.2.6. Anatomy of a Break-in 
- handshakes 
     - Building Internet Firewalls, C.6.2. Transmission Control Protocol   
- TCP/IP Network Administration, 1.5.1. Internet Protocol   
- TCP/IP Network Administration, 1.6.2. Transmission Control Protocol   
- TCP : TCP/IP Network Administration, 2.7.3. Sockets   
- three-way : TCP/IP Network Administration, 7.5.2. Border Gateway Protocol  
     
 - hanging up modem : (see signals) 
- harassment : Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication,  and Defamation 
- hard copy : (see paper) 
- hard disks : (see media) 
- hardcopy device, logging to : Practical UNIX & Internet Security, 10.5.2.1. Logging to a printer 
- hardware 
         - bugs in : Practical UNIX & Internet Security, 27.2.1. Hardware Bugs   
- configuration of : Building Internet Firewalls, 5.3.3. What Hardware Configuration?   
- failure of : Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures   
- food and drink threats : Practical UNIX & Internet Security, 12.2.2.1. Food and drink    
- modems   
          - Practical UNIX & Internet Security, 14. Telephone Security     
- Practical UNIX & Internet Security, 14.6. Additional Security for Modems    
  
   - physical security of   
      - Practical UNIX & Internet Security, 12.2. Protecting Computer Hardware      
- Practical UNIX & Internet Security, 12.2.7. Related Concerns   
  
   - read-only filesystems : Practical UNIX & Internet Security, 9.1.2. Read-only Filesystems   
- router : (see routers and routing)   
- seized as evidence : Practical UNIX & Internet Security, 26.2.4. Hazards of Criminal Prosecution  
   
 - HAS... macros : sendmail, 18.8. Alphabetized Reference  
- hash database class : sendmail, 33.8. Alphabetized Reference  
- hash functions : Practical UNIX & Internet Security, 6.5.1. Message Digests 
      - for comments   
      - sendmail, 5.1. Overview      
- sendmail, 5.2.2. Comments      
- sendmail, 27.2. Comments      
- sendmail, 38.2. Configuration Lines      
- TCP/IP Network Administration, 3.2. The Host Table     
- TCP/IP Network Administration, 5.4. The Internet Daemon      
- TCP/IP Network Administration, 7.7.1.1. A host configuration      
- TCP/IP Network Administration, 9.1.4. NFS Automounter      
- TCP/IP Network Administration, 9.2.1. The printcap File      
- TCP/IP Network Administration, 9.4. A BOOTP Server      
- TCP/IP Network Administration, A.1.1. The dip Script File     
- TCP/IP Network Administration, D.3. The dhcpd.conf Configuration File   
            
   - disabling services with : Practical UNIX & Internet Security, 17.3. Primary UNIX Network Services    
- in :include: lists : sendmail, 25.2.1. Comments in :include: Lists    
- lines in sendmail.cf : sendmail, 3.1. Role in the Filesystem    
- in m4 files : sendmail, 19.5. Pitfalls  
    
 - HAVAL algorithm 
    - Practical UNIX & Internet Security, 6.5.4.3. HAVAL   
- Practical UNIX & Internet Security, 23.9. A Good Random Seed 
  
 - Hayes modems : TCP/IP Network Administration, 6.3.2. Dial-Up PPP  
    - compatibility problems : TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections  
 
 - HDB UUCP : Practical UNIX & Internet Security, 15.2. Versions of UUCP  
- header packet 
     - Building Internet Firewalls, 6.3. What Does a Packet Look Like?   
- Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4 
  
 - headers 
    - TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture   
- TCP/IP Network Administration, 1.5.1.1. The datagram   
- TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions   
- .h files : TCP/IP Network Administration, 5.3.1.2. Pseudo-device    
- compressing : TCP/IP Network Administration, 5.2. Linux Kernel Configuration    
- email message   
           - sendmail, 1.5. The Header      
- sendmail, 5.3.8. Headers      
- sendmail, 13.4. Sending Mail      
- sendmail, 14.1. Headers      
- (see also under specific header line)     
- adding : sendmail, 20.3. Alphabetized V8.8 Subroutines      
- changing values of : sendmail, 20.3. Alphabetized V8.8 Subroutines      
- conf.c file : sendmail, 35.5. Header Behavior in conf.c      
- defining : (see H configuration command)     
- delivery agent flags and     
                 - sendmail, 14.2. Headers Versus Delivery Agent Flags       
- sendmail, 35.4. ?flags? in Header Definitions      
  
     - field contents : sendmail, 35.3. Header Field Contents      
- firewalls and : sendmail, 20.2.5. Prune Received: Headers at Firewall      
- getting recipients from : sendmail, 36.7. Alphabetized Reference      
- mailing lists and : sendmail, 25.5.1. Reply Versus Bounce      
- in qf file : sendmail, 23.9. The qf File Internals      
- in queue : sendmail, 3.1.2. The Queue Directory      
- removing (deleting) : sendmail, 20.3. Alphabetized V8.8 Subroutines      
- using old style of : sendmail, 34.8. Alphabetized Reference    
        
   - nested IP : Building Internet Firewalls, 6.3.6. IP Version 6   
- packet filtering and : Building Internet Firewalls, 6.8.4. It Should Allow Rules Based on Any 
  
 - heat, extreme : Practical UNIX & Internet Security, 12.2.1.6. Temperature extremes  
- Hellman, Martin : Practical UNIX & Internet Security, 6.4.5.1. Double DES 
- Hellman-Merkle : Practical UNIX & Internet Security, 18.6. Dependence on Third Parties 
- hello 
       - messages : TCP/IP Network Administration, 7.5.1. Exterior Gateway Protocol    
- packets : TCP/IP Network Administration, 7.4.3. Open Shortest Path First    
- statement (in gated) : TCP/IP Network Administration, B.8.3. The hello Statement 
   
 - HELO command 
    - sendmail, 18.8. Alphabetized Reference    
- sendmail, 30.8. Alphabetized F= Flags   
- sendmail, 34.8. Alphabetized Reference    
- TCP/IP Network Administration, 3.4.2. Post Office Protocol   
- TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions   
- TCP/IP Network Administration, 7.4. Interior Routing Protocols  
      
 - help on sendmail 
    - sendmail, Additional Sources of Information    
- sendmail, 2.2. Read the Documents  
  
 - HELP command 
    - in ESMTP : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions   
- in nslookup : TCP/IP Network Administration, 8.4. Using nslookup    
- in SMTP   
        - sendmail, 34.8. Alphabetized Reference      
- TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol   
  
 
 - HelpFile (H) option : sendmail, 34.8. Alphabetized Reference  
- HES_GETMAILHOST macro : sendmail, 18.8. Alphabetized Reference  
- hesiod database class : sendmail, 33.8. Alphabetized Reference  
- HESIOD macro : sendmail, 18.8. Alphabetized Reference  
- Hewlett-Packard (HP) : Practical UNIX & Internet Security, F.3.4.17. Hewlett-Packard (HP) 
- HFDIR= directive : sendmail, 18.4.9. HFDIR=  
- hidden 
          - data, in CGI scripts : Practical UNIX & Internet Security, 18.2.3.1. Do not trust the user's browser!   
- files, created by intruders : Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories    
- space : Practical UNIX & Internet Security, 25.2.2.7. Hidden space 
   
 - hidden dot algorithm : sendmail, 4.2. Verbose (-v)  
- hiding information with DNS : Building Internet Firewalls, 8.10.5. Setting Up DNS to Hide 
- hierarchy, system : TCP/IP Network Administration, 3.3.1. The Domain Hierarchy 
      - database system : TCP/IP Network Administration, 9.3.2. NIS+    
- of responsibility : TCP/IP Network Administration, 12.1.2.1. Use subnets to distribute control  
  
 - high bit : sendmail, 30.8. Alphabetized F= Flags 
- High-level Data Link Control (HDLC) : TCP/IP Network Administration, 6.2.1. The Serial Protocols  
- high-speed dial-up modems : (see modems) 
- hijacking : Building Internet Firewalls, 10.1.1. Hijacking 
- hijacking Telnet sessions : Practical UNIX & Internet Security, 17.3.3. TELNET (TCP Port 23) 
- HINFO resource records 
         - Building Internet Firewalls, 8.10.4.3. Revealing too much information to   
- TCP/IP Network Administration, 11.6.2. The data is here and the server can't find it!    
- TCP/IP Network Administration, C.3.1.7. Host Information record 
   
 - hints file : TCP/IP Network Administration, 8.3.3. The Cache Initialization File  
- history file (csh) 
     - Practical UNIX & Internet Security, 10.4.1. Shell History   
- Practical UNIX & Internet Security, 15.1.1.1. uucp with the C shell  
  
 - history, sendmail 
    - sendmail, History    
- sendmail, 27.5. The V Configuration Command  
  
 - hit lists of passwords : Practical UNIX & Internet Security, 3.6.1. Bad Passwords: Open Doors  
- hoaxes about viruses : TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information  
- HoldExpensive (c) option 
      - sendmail, 23.6.1. Periodically with -q    
- sendmail, 34.8. Alphabetized Reference    
- sendmail, 36.7. Alphabetized Reference  
   
 - holding messages : (see queue) 
- holes, security : (see security holes) 
- home directory, recipient's : sendmail, 31.10. Alphabetized Reference  
- HOME variable, attacks via : Practical UNIX & Internet Security, 11.5.1.3. $HOME attacks  
- HoneyDanBer (HDB) UUCP : Practical UNIX & Internet Security, 15.2. Versions of UUCP  
- Honeyman, Peter : Practical UNIX & Internet Security, 15.2. Versions of UUCP  
- hop count 
          - sendmail, 14.1.2. The Received: Header    
- sendmail, 31.10. Alphabetized Reference    
- sendmail, 34.8. Alphabetized Reference    
- sendmail, 36.7. Alphabetized Reference    
- TCP/IP Network Administration, 7.4.1.1. Running RIP with routed  
     
 - hops 
    - TCP/IP Network Administration, 1.7. Application Layer   
- TCP/IP Network Administration, 2.5. The Routing Table   
- (see also next hop) 
   
 - host database class : sendmail, 33.8. Alphabetized Reference  
- Host Information records : (see HINFO resource records) 
- host status : sendmail, B.1. Status file lines  
- host unreachable codes : (see ICMP) 
- Host-to-Host Transport Layer : (see Transport Layer) 
- hostname command : sendmail, 7.3.1. The hostname  
- hostnames 
          - Practical UNIX & Internet Security, 16.2.3. Hostnames   
- Practical UNIX & Internet Security, 16.2.3.1. The /etc/hosts file   
- sendmail, 7.3.1. The hostname    
- sendmail, 21.2.2. Look Up a Remote Host's Name    
- TCP/IP Network Administration, 3.1. Names and Addresses   
- $@ operator and   
           - sendmail, 9.2.2. The Host ($@)      
- sendmail, 9.3. Testing Rule Set 0      
- sendmail, 17.1.1.3. Handle null address      
- sendmail, 33.4.2. Specify Numbered Substitution with $@    
    
   - canonicalizing : (see canonicalization)   
- capitalization of : sendmail, 30.8. Alphabetized F= Flags   
- changing to hub name : sendmail, 11.6. Handling user@thishost    
- choosing : TCP/IP Network Administration, 4.4.2. Choosing a Hostname    
- controlling access to : Practical UNIX & Internet Security, 17.2. Controlling Access to Servers   
- default : sendmail, 33.5.3. A :default Outgoing Hostname    
- domain part : (see $m macro)   
- easing transition from old to new : TCP/IP Network Administration, C.3.1.5. Canonical Name record   
- name service and   
              - Practical UNIX & Internet Security, 16.2.6. Name Service     
- Practical UNIX & Internet Security, 16.2.6.2. Other naming services   
  
   - parameter : TCP/IP Network Administration, 9.4. A BOOTP Server    
- short form of : (see $w macro) 
  
 - hosts 
    - sendmail, 6.3. The local Delivery Agent    
- TCP/IP Network Administration, 1.7. Application Layer   
- (see also $h macro)   
- (see also remote, hosts, checking)   
- $_ macro : (see $_ macro)   
- addresses : (see addresses)   
- architecture of   
            - dual-homed : Building Internet Firewalls, 4.2.1. Dual-Homed Host Architecture     
- screened     
         - Building Internet Firewalls, 4.2.2. Screened Host Architecture       
- Building Internet Firewalls, 9.2. Screened Host Architecture     
  
   
   - bastion : (see bastion hosts)   
- canonical names of : sendmail, 31.10. Alphabetized Reference    
- checking if local : sendmail, 17.2.1. Is the Host Local?    
- file, caution regarding : TCP/IP Network Administration, 6.1.3. Assigning a Subnet Mask    
- IP addresses of : sendmail, 31.10. Alphabetized Reference    
- list : TCP/IP Network Administration, 12.5.1.1. tcpd access control files    
- masquerading : (see masquerading)   
- multi-homed : TCP/IP Network Administration, 1.5.1.2. Routing datagrams   
- name service for : Building Internet Firewalls, 2.9. Name Service   
- NID passwords for : Practical UNIX & Internet Security, 19.3.2.2. Creating passwords for hosts    
- offsite MX : sendmail, 21.5.1. Offsite MX Hosts    
- preference   
                 - sendmail, 15.3. MX Records      
- sendmail, 21.3. Set Up MX Records    
  
   - security of : Building Internet Firewalls, 1.3.3. Host Security   
- sender's : (see $s macro)   
- sending, variables for : sendmail, 20.1.2. Global Variables    
- setting : sendmail, 36.7. Alphabetized Reference    
- smart   
          - sendmail, 19.6. Alphabetized m4 Macros      
- sendmail, 29.6.4. Forwarding to a Knowledgeable Host      
- sendmail, 31.10. Alphabetized Reference    
   
   - speed of : Building Internet Firewalls, 5.3.2. How Fast a Machine?   
- sticky and nonsticky : sendmail, 19.6. Alphabetized m4 Macros    
- table   
        - TCP/IP Network Administration, 3.1. Names and Addresses     
- TCP/IP Network Administration, 3.2. The Host Table     
- system, problems with : TCP/IP Network Administration, 3.2. The Host Table   
   
   - trusted : (see trusted hosts)   
- victim : (see victim hosts) 
  
 - hosts file 
    - Practical UNIX & Internet Security, 16.2.3.1. The /etc/hosts file   
- sendmail, 7.3.1. The hostname    
- sendmail, 18.8. Alphabetized Reference    
- sendmail, 34.8. Alphabetized Reference    
- TCP/IP Network Administration, 3.2. The Host Table   
- TCP/IP Network Administration, 6.1. The ifconfig Command    
- TCP/IP Network Administration, 7.3. Building a Static Routing Table    
- TCP/IP Network Administration, 9.1.4. NFS Automounter    
- TCP/IP Network Administration, 9.3. Network Information Service    
- creating : TCP/IP Network Administration, 3.2. The Host Table   
- as maps : TCP/IP Network Administration, 3.3.5. Network Information Service   
- modifying : TCP/IP Network Administration, 3.3.4. BIND, resolver, and named 
            
 - hosts.allow file : TCP/IP Network Administration, 12.5.1.1. tcpd access control files  
- hosts.deny file 
     - Building Internet Firewalls, 5.8.3.1. Using the TCP Wrapper package to protect services   
- TCP/IP Network Administration, 12.5.1.1. tcpd access control files  
  
 - hosts.equiv file 
    - Practical UNIX & Internet Security, 17.3.18.4. The ~/.rhosts file   
- Practical UNIX & Internet Security, 17.3.18.6. /etc/hosts.lpd file   
- Practical UNIX & Internet Security, 24.4.1.5. Changes to the hosts.equiv file   
- TCP/IP Network Administration, 12.2.5. Secure the r Commands    
- TCP/IP Network Administration, 12.4.2. Looking for Trouble  
     
 - hosts.lpd file 
    - Practical UNIX & Internet Security, 17.3.18.6. /etc/hosts.lpd file   
- TCP/IP Network Administration, 9.2.1.1. LPD security    
- TCP/IP Network Administration, 12.4.2. Looking for Trouble  
   
 - HostsFile option : sendmail, 34.8. Alphabetized Reference  
- hoststat command : sendmail, 36.1.1. hoststat (V8.8 and Above)  
- HostStatusDirectory option 
      - sendmail, 34.8. Alphabetized Reference    
- sendmail, B. Host Status File Internals  
  
 - housekeeping : Building Internet Firewalls, 12.1. Housekeeping 
- HP (Hewlett-Packard) : Practical UNIX & Internet Security, F.3.4.17. Hewlett-Packard (HP) 
- HP-UX 
      - access control lists : Practical UNIX & Internet Security, 5.2.5.2. HP-UX access control lists   
- context-dependent files : Practical UNIX & Internet Security, 5.9.2. Context-Dependent Files 
  
 - htable command : TCP/IP Network Administration, 3.2. The Host Table 
- .htaccess file : Practical UNIX & Internet Security, 18.3.1. The access.conf and .htaccess Files 
- HTML (Hypertext Markup Language) : Building Internet Firewalls, 2.5. The World Wide Web 
- HTML documents 
       - controlling access to   
      - Practical UNIX & Internet Security, 18.3. Controlling Access to Files on Your Server     
- Practical UNIX & Internet Security, 18.3.3. Setting Up Web Users and Passwords   
  
   - delivering : TCP/IP Network Administration, 1.7. Application Layer   
- encrypting : Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire   
- server-side includes   
        - Practical UNIX & Internet Security, 18.2.2.2. Additional configuration issues     
- Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>   
  
 
 - html text subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions 
- htpasswd program : Practical UNIX & Internet Security, 18.3.3. Setting Up Web Users and Passwords 
- HTTP (Hypertext Transfer Protocol) 
      - Building Internet Firewalls, 2.5. The World Wide Web   
- Practical UNIX & Internet Security, 17.3.9. HyperText Transfer Protocol (HTTP) (TCP Port 80)   
- TCP/IP Network Administration, 1.7. Application Layer   
- TCP/IP Network Administration, 13.1. The World Wide Web    
- anonymous FTP and : Practical UNIX & Internet Security, 18.2.4.1. Beware mixing HTTP with anonymous FTP    
- CERN server : Building Internet Firewalls, 8.6.2. Proxying Characteristics of   
- configuring : Building Internet Firewalls, 8.6. World Wide Web (WWW) and HTTP   
            - in screened host architecture : Building Internet Firewalls, 9.2.1.5. HTTP     
- in screened subnet architecture : Building Internet Firewalls, 9.1.1.5. HTTP   
  
   - logging downloaded files : Practical UNIX & Internet Security, 10.3.5. access_log Log File   
- message subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions   
- proxying with TIS FWTK : Building Internet Firewalls, 7.7.4. Other TIS FWTK   
- Secure   
         - Building Internet Firewalls, 8.6.4. Secure HTTP     
- (see Secure HTTP)   
  
   - TIS FWTK proxy server : Building Internet Firewalls, 8.6.2. Proxying Characteristics of 
 
 - http server 
    - group file : Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>   
- log files of : Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files   
- password file : Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory> 
   
 - http-gw proxy 
    - Building Internet Firewalls, 7.7.4. Other TIS FWTK   
- Building Internet Firewalls, 8.6.2. Proxying Characteristics of 
  
 - httpd.conf file : Practical UNIX & Internet Security, 18.2.1. The Server's UID 
- hubs 
     - sendmail, 6. The Mail Hub and Delivery Agents    
- sendmail, 11.3. All Mail from the Hub    
- accepting mail : sendmail, 15.4. Hub Accepts Mail for Client    
- changing hostname to : sendmail, 11.6. Handling user@thishost    
- delivery agent flags for : sendmail, 6.4. Add the Missing Parts to Mhub    
- $H macro : sendmail, 31.10. Alphabetized Reference    
- internal name for : sendmail, 11.4.2. A Word About ${HUB}    
- rules for : sendmail, 17. The Hub's Complex Rules  
        
 - Hubset rule set 
    - sendmail, 11.2. Rule Set S=    
- sendmail, 11.4. Rule Set Hubset  
  
 - human error 
    - Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure   
- TCP/IP Network Administration, 11.1.1. Troubleshooting Hints  
  
 - humidity : Practical UNIX & Internet Security, 12.2.1.11. Humidity  
- hunches, verifying : TCP/IP Network Administration, 10.8.1. Testing Rewrite Rules  
- hvalue() : sendmail, 20.3. Alphabetized V8.8 Subroutines  
- hypertext links, encrypting : Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire 
- Hypertext Markup Language : (see HTML) 
- Hypertext Transfer Protocol : (see HTTP) 
- hyphen (-) 
          - in machine conversation : sendmail, 4.2. Verbose (-v)    
- non-equivalent host : TCP/IP Network Administration, 12.2.5. Secure the r Commands  
  
 - hyphen/greater than (->), for copying files : TCP/IP Network Administration, 9.6.1. rdist  
 
   
  Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z  
Copyright © 1999  O'Reilly & Associates, Inc. All Rights Reserved.