start page  | rating of books | rating of authors | reviews | copyrights
 
  
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z  
Index: L
   - L command (sendmail.cf) 
    - sendmail, D.1. Sun Enhancements    
- sendmail, D.4. L and G Configuration Commands  
  
 - l flag : sendmail, 30.8. Alphabetized F= Flags 
- L flag : sendmail, 30.8. Alphabetized F= Flags 
- $l macro : (see UnixFromLine option) 
- $L macro : sendmail, 31.10. Alphabetized Reference  
- l option : (see UseErrorsTo (l) option) 
- L option : (see LogLevel (L) option) 
- L-devices file : Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer  
- L.cmds file : Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution  
- L.sys file : Practical UNIX & Internet Security, 15.3.3. Security of L.sys and Systems Files  
- L= equate 
             - sendmail, 18.8. Alphabetized Reference    
- sendmail, 30.4. The Equates 
  
 - LA_TYPE macro : sendmail, 18.8. Alphabetized Reference  
- labeling the system : Building Internet Firewalls, 13.5.2. Labeling and Diagraming Your System 
- laboratory networks : Building Internet Firewalls, 4.4.1. Laboratory Networks 
- Lai, Xuejia : Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems  
- laid-off employees : Practical UNIX & Internet Security, 13.2.6. Departure 
- LaMacchia, Brian : Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC 
- LANs (local area networks) 
          - Practical UNIX & Internet Security, 16.1. Networking    
- Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4   
- TCP/IP Network Administration, 1.7. Application Layer   
- (see also Ethernet)   
- applications : TCP/IP Network Administration, 3.7.1. File Sharing   
- proprietary : TCP/IP Network Administration, 3.7.1. File Sharing   
- servers : TCP/IP Network Administration, 3. Network Services 
       
 - LAN-oriented service : Building Internet Firewalls, 5.6. Selecting Services Provided by the 
- Lance Ethernet Interface : TCP/IP Network Administration, 6.1.1. Determining the Interface Name  
- laptop computers 
      - Practical UNIX & Internet Security, 12.2.6.3. Portables   
- TCP/IP Network Administration, 11.2. Diagnostic Tools  
  
 - large transmission window size : TCP/IP Network Administration, 5.2. Linux Kernel Configuration  
- last connection time : sendmail, B.1. Status file lines  
- last program 
      - Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts    
- Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files    
- Practical UNIX & Internet Security, 10.1.3. last Program    
- Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file    
- Practical UNIX & Internet Security, 15.3.1. Assigning Additional UUCP Logins    
- TCP/IP Network Administration, 12.4.2.2. Checking login activity    
- -f option : Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file  
       
 - lastcomm program 
    - Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File    
- Practical UNIX & Internet Security, 10.2.2. Accounting with BSD 
  
 - lastlog file : Practical UNIX & Internet Security, 10.1.1. lastlog File  
- laws 
     - Practical UNIX & Internet Security, 26. Computer Security and U.S. Law   
- Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication,  and Defamation   
- backups and : Practical UNIX & Internet Security, 7.1.7. Legal Issues   
- checklist for : Practical UNIX & Internet Security, A.1.1.25. Chapter 26: Computer Security and U.S. Law    
- copyright   
          - Practical UNIX & Internet Security, 9.2.1. Comparison Copies      
- Practical UNIX & Internet Security, 26.4.2. Copyright Infringement     
- Practical UNIX & Internet Security, 26.4.2.1. Software piracy and the SPA   
   
   - criminal prosecution   
      - Practical UNIX & Internet Security, 26.2. Criminal Prosecution      
- Practical UNIX & Internet Security, 26.2.7. A Final Note on Criminal Actions   
  
   - documentation of incidents : Building Internet Firewalls, 13.1.7. Document the Incident   
- Electronic Communications Privacy Act (ECPA) : Practical UNIX & Internet Security, 26.2.3. Federal Computer Crime Laws    
- encryption   
        - Practical UNIX & Internet Security, 6.7. Encryption and U.S. Law     
- Practical UNIX & Internet Security, 6.7.2. Cryptography and Export Controls     
- Practical UNIX & Internet Security, 12.2.6.3. Portables   
   
   - enforcement agencies : Practical UNIX & Internet Security, 14.4.4.1. Kinds of eavesdropping   
- export   
       - Practical UNIX & Internet Security, 6.4.4.1. Use and export of DES      
- Practical UNIX & Internet Security, 6.7.2. Cryptography and Export Controls     
- Practical UNIX & Internet Security, 26.4.1. Munitions Export   
   
   - federal enforcement   
      - Practical UNIX & Internet Security, 26.2.2. Federal Jurisdiction      
- Practical UNIX & Internet Security, 26.2.3. Federal Computer Crime Laws    
  
   - indecent material : Practical UNIX & Internet Security, 26.4.5. Pornography and Indecent Material   
- liability   
       - Practical UNIX & Internet Security, 26.4. Other Liability     
- Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication,  and Defamation   
  
   - monitoring keystrokes : Practical UNIX & Internet Security, 24.2.3. Monitoring the Intruder   
- non-citizen access : Practical UNIX & Internet Security, 26.4.1. Munitions Export   
- patents : Practical UNIX & Internet Security, 26.4.4. Patent Concerns   
- for portable computers : Practical UNIX & Internet Security, 12.2.6.3. Portables   
- pursuing intruders : Building Internet Firewalls, 13.3. Pursuing and Capturing the   
- resources on : Practical UNIX & Internet Security, D.1.1. Other Computer References   
- search warrants   
            - Practical UNIX & Internet Security, 26.2.4. Hazards of Criminal Prosecution      
- Practical UNIX & Internet Security, 26.2.5. If You or One of Your Employees Is a Target   
  
   - security responsibilities : Building Internet Firewalls, 11.2.3. External Factors That Influence   
- smoking : Practical UNIX & Internet Security, 12.2.1.2. Smoke    
- state and local enforcement : Practical UNIX & Internet Security, 26.2.1. The Local Option    
- trademarks : Practical UNIX & Internet Security, 26.4.3. Trademark Violations   
- vendor liability : Practical UNIX & Internet Security, 18.5.2. Trusting Your Software Vendor 
     
 - lawsuits (civil) : Practical UNIX & Internet Security, 26.3. Civil Actions  
- layering firewalls : Building Internet Firewalls, 3.2. Defense in Depth 
- layers 
      - TCP/IP Network Administration, 1.2. A Data Communications Model   
- TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture 
  
 - LCP (Link Control Protocol) 
    - TCP/IP Network Administration, 6.2.1. The Serial Protocols    
- TCP/IP Network Administration, A.2. The PPP Daemon 
  
 - LD_LIBRARY_PATH variable : sendmail, 22.2. The Environment  
- LDAPMAP macro : sendmail, 18.8. Alphabetized Reference  
- ldapx database class : sendmail, 33.8. Alphabetized Reference  
- LDOPTS= directive : sendmail, 18.4.4. LDOPTS=  
- leased telephone lines : Practical UNIX & Internet Security, 14.5.4. Physical Protection of Modems 
- leases on addresses : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol 
         - default-lease-time : TCP/IP Network Administration, 9.5.1. dhcpd.conf    
- renewing : TCP/IP Network Administration, 9.4.2. BOOTP extensions  
  
 - least privilege 
    - Building Internet Firewalls, 3.1. Least Privilege   
- Building Internet Firewalls, 9.1.4.1. Least privilege   
- Building Internet Firewalls, 9.2.3.1. Least privilege   
- Practical UNIX & Internet Security, 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve   
- Practical UNIX & Internet Security, 13.2.5. Least Privilege and Separation of Duties 
     
 - Lee, Ying-Da : Practical UNIX & Internet Security, 22.4. SOCKS 
- legal : (see laws) 
- Lesk, Mike 
      - Practical UNIX & Internet Security, 1.3. History of UNIX    
- Practical UNIX & Internet Security, 15.2. Versions of UUCP  
  
 - level, debugging : sendmail, 4.3. Debugging (-d)  
- level, logging : (see logs/logging) 
- level, version : (see versions) 
- level, warning 
       - sendmail, 26.1.1. syslog(3)    
- sendmail, 26.1.2. Tuning syslog.conf  
  
 - LHS, rule 
    - sendmail, 8.4. Rules    
- sendmail, 8.7.1. Other Text in the LHS    
- sendmail, 28.5. The LHS    
- (see also rule sets)   
- class macros in : sendmail, 12.1.3. Class Macros in the LHS    
- wildcards for : (see wildcard operators) 
      
 - liability, legal 
    - Practical UNIX & Internet Security, 26.4. Other Liability   
- Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication,  and Defamation 
  
 - /lib directory : Practical UNIX & Internet Security, 11.5.3.6. Other files  
- LIBDIRS= directive : sendmail, 18.4.5. LIBDIRS=  
- libresolv.a : sendmail, 18.5.1. Use libresolv.a  
- LIBS= directive : sendmail, 18.4.6. LIBS=  
- libwrap.a package 
        - sendmail, 18.8. Alphabetized Reference    
- sendmail, 22.4.1. Accept/Reject Connections via libwrap.a  
  
 - license agreements : Practical UNIX & Internet Security, 18.5.2. Trusting Your Software Vendor 
    - comparison copies and : Practical UNIX & Internet Security, 9.2.1. Comparison Copies  
 
 - lie-detector tests : Practical UNIX & Internet Security, 13.1. Background Checks 
- life, queue messages : sendmail, 13.2.2. Limit the Life of Queued Messages  
- lightning 
      - Practical UNIX & Internet Security, 12.2. Protecting Computer Hardware    
- Practical UNIX & Internet Security, 12.2.1.9. Lightning  
  
 - Lightweight Directory Access Protocol (LDAP) 
    - sendmail, 18.8. Alphabetized Reference    
- sendmail, 33.8. Alphabetized Reference  
  
 - limit command : Practical UNIX & Internet Security, 25.2.5. Soft Process Limits: Preventing Accidental  Denial 
- Limit command (<Directory>) : Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory> 
- limited user access : Practical UNIX & Internet Security, 8.1.5.1. Limited users 
- limited_masquerade feature : sendmail, 19.6. Alphabetized m4 Macros  
- limiting 
        - DHCP servers : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol   
- number of processable messages : sendmail, 23.5. How the Queue Is Processed    
- queue message lifetime   
        - sendmail, 13.2.2. Limit the Life of Queued Messages      
- sendmail, 34.8. Alphabetized Reference    
  
 
 - line length 
    - sendmail, 30.4. The Equates   
- sendmail, 30.8. Alphabetized F= Flags 
  
 - line length restriction : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions 
- Line Printer (LP) print service, in Solaris : TCP/IP Network Administration, 9.2.2. Solaris Line Printer Service  
- Link Control Protocol (LCP) 
      - TCP/IP Network Administration, 6.2.1. The Serial Protocols    
- TCP/IP Network Administration, A.2. The PPP Daemon 
  
 - link-level encryption : Building Internet Firewalls, 10.5.1. At What Level Do You Encrypt? 
- link-level security : Practical UNIX & Internet Security, 16.3.1. Link-level Security 
- link-state 
      - database : TCP/IP Network Administration, 7.4.3. Open Shortest Path First    
- routing protocols   
       - TCP/IP Network Administration, 7.4. Interior Routing Protocols      
- TCP/IP Network Administration, 7.4.2. RIP Version 2    
  
 
 - Link-State Advertisements (LSAs) 
    - TCP/IP Network Administration, 7.4.3. Open Shortest Path First    
- TCP/IP Network Administration, B.8.1. The ospf Statement 
  
 - links 
    - encryption of : Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire   
- link-level security : Practical UNIX & Internet Security, 16.3.1. Link-level Security   
- static : Practical UNIX & Internet Security, 23.4. Tips on Writing SUID/SGID Programs   
- symbolic, following (Web)   
         - Practical UNIX & Internet Security, 18.2.2.2. Additional configuration issues     
- Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>   
  
 
 - lint program : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs 
- LINUX operating system 
     - Practical UNIX & Internet Security, 1.3. History of UNIX    
- Practical UNIX & Internet Security, 3.3. Entering Your Password    
- Practical UNIX & Internet Security, 23.1.2.1. What they found   
- TCP/IP Network Administration, UNIX Versions   
- TCP/IP Network Administration, 4.7. netconfig    
- TCP/IP Network Administration, 10.2. Running sendmail as a Daemon    
- ext2 filesystem : Practical UNIX & Internet Security, 25.2.2.6. Reserved space    
- ifconfig command on   
             - TCP/IP Network Administration, 6.1.2. Checking the Interface with ifconfig      
- TCP/IP Network Administration, 6.1.5.3. Metric    
  
   - kernel configuration : TCP/IP Network Administration, 5.2. Linux Kernel Configuration    
      - of PPP : TCP/IP Network Administration, 6.3. Installing PPP    
 
   - random number generators : Practical UNIX & Internet Security, 23.7.4. Other random number generators   
- remounting filesystems on : TCP/IP Network Administration, 9.1.3.2. The vfstab and fstab files    
- sharing directories on : TCP/IP Network Administration, 9.1.2.2. The /etc/exports file    
- source directory : TCP/IP Network Administration, 5.2. Linux Kernel Configuration  
    
 - linux.mc macro control file : TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros  
- linux.smtp.cf file 
     - TCP/IP Network Administration, 10.4.2. General sendmail.cf Structure    
- TCP/IP Network Administration, 10.7. Modifying a sendmail.cf File  
  
 - list-bounce alias : sendmail, 25.5.3. A list-bounced Alias  
- list-of-lists : TCP/IP Network Administration, 13.5. Mailing Lists  
- list precedence : sendmail, 14.4. Precedence  
- list syntax : (see mailing lists) 
- List:; form addresses 
        - sendmail, 17.1.2.1. A rule to handle List:;    
- sendmail, 17.3. Rule Set 0  
  
 - ListProcessor package : sendmail, 25.6.3. ListProcessor  
- lists, old-style address : sendmail, 13.2.7. Accept Old-Style Lists of Addresses  
- LISTSERV : TCP/IP Network Administration, 13.5. Mailing Lists  
- literals : TCP/IP Network Administration, 10.6.2. Transforming the Address  
- Live Script : Practical UNIX & Internet Security, 18.5.2. Trusting Your Software Vendor 
- Livingston routers : Building Internet Firewalls, 6.5. Conventions for Packet Filtering 
- *LK* keyword : TCP/IP Network Administration, 12.2.1. The Shadow Password File  
- load : (see performance) 
- local 
            - aliases : sendmail, 24.1.2. Local Must Be Local    
- area networks (LANs)   
       - Practical UNIX & Internet Security, 16.1. Networking      
- Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4   
  
   - authentication (NIS+) : Practical UNIX & Internet Security, 19.5.4. Using NIS+   
- canonical name   
       - sendmail, 21.2.1. Determine the Local Canonical Name      
- sendmail, 31.10. Alphabetized Reference    
  
   - checking if host is : sendmail, 17.2.1. Is the Host Local?    
- delivery : sendmail, 30.8. Alphabetized F= Flags   
- delivery agent   
        - sendmail, 6.3. The local Delivery Agent      
- sendmail, 30.2.1. Required Symbolic Names     
- sendmail, 30.8. Alphabetized F= Flags   
   
   - domains, list of : sendmail, 32.5. Alphabetized Reference    
- gateways : (see gateways)   
- law enforcement : Practical UNIX & Internet Security, 26.2.1. The Local Option    
- newsgroups : Building Internet Firewalls, 2.4. Usenet News   
- recipients   
          - sendmail, 3.2. Role in Local Delivery      
- sendmail, 19.6. Alphabetized m4 Macros      
- sendmail, 29.6.3. Delivering to Local Recipient    
   
   - server, local delivery on : sendmail, 19.6. Alphabetized m4 Macros    
- storage   
       - Practical UNIX & Internet Security, 12.3.4. Protecting Local Storage      
- Practical UNIX & Internet Security, 12.3.4.5. Function keys    
  
   - users   
      - Practical UNIX & Internet Security, 15.4.1.2. USERFILE entries for local users      
- sendmail, 20.2.1. Accept Mail Only From Our Domain      
- sendmail, 31.10. Alphabetized Reference    
   
   - UUCP handling : sendmail, 29.6.5. Handling UUCP Locally  
 
 - LOCAL_CONFIG macro (m4) : sendmail, 19.6. Alphabetized m4 Macros  
- LOCAL_NET_CONFIG macro (m4) : sendmail, 19.6. Alphabetized m4 Macros  
- local_procmail feature : sendmail, 19.6. Alphabetized m4 Macros  
- LOCAL_RELAY macro (m4) : sendmail, 19.6. Alphabetized m4 Macros  
- LOCAL_REPLAY macro (m4) : sendmail, 31.10. Alphabetized Reference  
- LOCAL_RULE macro (m4) : sendmail, 19.6. Alphabetized m4 Macros  
- LOCAL_RULE_# macros (m4) : sendmail, 19.6. Alphabetized m4 Macros  
- LOCAL_RULESETS macro (m4) : sendmail, 19.6. Alphabetized m4 Macros  
- LOCAL_USER macro (m4) : sendmail, 19.6. Alphabetized m4 Macros  
- LOCALDOMAIN variable : TCP/IP Network Administration, 8.2.1. The Resolver Configuration File  
- localhost 
              - TCP/IP Network Administration, 3.2. The Host Table   
- TCP/IP Network Administration, 7.2. The Minimal Routing Table    
- TCP/IP Network Administration, 8.3.4. The named.local File  
   
 - LOCALRES environmental variable : TCP/IP Network Administration, 11.6.4. dig: An Alternative to nslookup  
- lock daemon (lockd) : TCP/IP Network Administration, 9.1.1. NFS Daemons  
- lock file : sendmail, 23.2.3. The Lock File (obsolete as of V5.62): lf  
- lock program : Practical UNIX & Internet Security, 12.3.5.2. X screen savers 
- lock requests : (see files, lock requests, handling) 
- locked accounts : Practical UNIX & Internet Security, 3.3. Entering Your Password  
- locking files : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs 
- log files and logging 
           - Building Internet Firewalls, 5.8.1.4. Safeguard the system logs   
- Building Internet Firewalls, 8.11. syslog   
- Building Internet Firewalls, 13.5.4. Keeping Activity Logs   
- Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures   
- Practical UNIX & Internet Security, 10. Auditing and Logging   
- Practical UNIX & Internet Security, 10.8. Managing Log Files   
- Practical UNIX & Internet Security, 11.5.3.5. System initialization files    
- Practical UNIX & Internet Security, 21.5. Special Considerations    
- Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs   
- sendmail, 13.2.6. The Default Logging Level    
- sendmail, 18.8. Alphabetized Reference    
- sendmail, 26.1. Logging with syslog    
- sendmail, 36.7. Alphabetized Reference    
- (see also syslog)   
- access_log   
                    - Practical UNIX & Internet Security, 10.3.5. access_log Log File     
- Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files   
  
   - across networks : Practical UNIX & Internet Security, 10.5.2.2. Logging across the network   
- aculog : Practical UNIX & Internet Security, 10.3.1. aculog File    
- agent_log file : Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files   
- archiving information : Practical UNIX & Internet Security, 7.4.2. Simple Archives   
- backups and   
          - Building Internet Firewalls, 5.10.2. Do Secure Backups     
- Practical UNIX & Internet Security, 10.2.2. Accounting with BSD   
  
   - breakins : Practical UNIX & Internet Security, 24.1.2. Rule #2: DOCUMENT   
- C2 audit : Practical UNIX & Internet Security, 10.1. The Basic Log Files   
- checklist for : Practical UNIX & Internet Security, A.1.1.9. Chapter 10: Auditing and Logging   
- creating with SOCKS : Building Internet Firewalls, 7.6. Using SOCKS for   
- critical messages   
          - Practical UNIX & Internet Security, 10.5.3. syslog Messages     
- Practical UNIX & Internet Security, 10.5.3.1. Beware false log entries   
  
   - documenting incidents : Building Internet Firewalls, 13.1.7. Document the Incident   
- downloaded files   
       - Practical UNIX & Internet Security, 10.3.3. xferlog Log File     
- Practical UNIX & Internet Security, 10.3.5. access_log Log File   
  
   - of dropped packets : Building Internet Firewalls, 6.9. Where to Do Packet Filtering   
- failed su attempts : Practical UNIX & Internet Security, 4.3.7. The Bad su Log    
- file format : Practical UNIX & Internet Security, 8.2. Monitoring File Format   
- files transferred by FTP : Practical UNIX & Internet Security, 10.3.3. xferlog Log File   
- to hardcopy device : Practical UNIX & Internet Security, 10.5.2.1. Logging to a printer   
- individual users   
           - Practical UNIX & Internet Security, 10.4. Per-User Trails in the Filesystem     
- Practical UNIX & Internet Security, 10.4.3. Network Setup   
  
   - lastlog : Practical UNIX & Internet Security, 10.1.1. lastlog File    
- managing : Practical UNIX & Internet Security, 10.8. Managing Log Files   
- manually logging   
        - Practical UNIX & Internet Security, 10.7. Handwritten Logs     
- Practical UNIX & Internet Security, 10.7.2.2. Informational material   
  
   - memory required for   
      - Building Internet Firewalls, 12.1.3. Managing Your Disk Space     
- Building Internet Firewalls, 12.2.2. What Should You Watch For?   
  
   - mistyped passwords : Practical UNIX & Internet Security, 10.5.3. syslog Messages   
- network services : Practical UNIX & Internet Security, 10.3.6. Logging Network Services   
- outgoing mail : Practical UNIX & Internet Security, 10.4.2. Mail   
- per-machine : Practical UNIX & Internet Security, 10.7.2. Per-Machine Logs   
- per-site : Practical UNIX & Internet Security, 10.7.1. Per-Site Logs   
- potentially criminal activity : Practical UNIX & Internet Security, 26.2.6. Other Tips    
- proxy services and : Building Internet Firewalls, 7.1.1.2. Proxy services are good at logging   
- refer_log file : Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files   
- of router actions : Building Internet Firewalls, 6.4.1. Logging Actions   
- sulog : (see sulog file)   
- Swatch program   
                - Practical UNIX & Internet Security, 10.6. Swatch: A Log File Tool      
- Practical UNIX & Internet Security, 10.6.2. The Swatch Configuration File     
- Practical UNIX & Internet Security, E.4.9. Swatch   
   
   - syslog facility   
      - Practical UNIX & Internet Security, 10.5. The UNIX System Log (syslog) Facility     
- Practical UNIX & Internet Security, 10.5.3.1. Beware false log entries     
- sendmail, 26.1.1. syslog(3)    
   
   - system clock and : Practical UNIX & Internet Security, 17.3.14. Network Time Protocol (NTP) (UDP Port 123)   
- tracking intruders with : Practical UNIX & Internet Security, 24.3. The Log Files: Discovering an Intruder's   
- trimlog program for : Building Internet Firewalls, B.6.5. trimlog   
- unexpectedly deleted or modified : Building Internet Firewalls, 12.2.3. The Good, the Bad, and the Ugly   
- /usr/adm/messages : Practical UNIX & Internet Security, 10.2.3. messages Log File   
- utmp and wtmp   
           - Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files      
- Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file    
  
   - UUCP : Practical UNIX & Internet Security, 10.3.4. uucp Log Files   
- /var/adm/acct : Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File    
- /var/adm/loginlog : Practical UNIX & Internet Security, 10.1.4. loginlog File   
- of web servers : Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files   
- what to watch for : Building Internet Firewalls, 12.2.2. What Should You Watch For?   
- what not to log : Practical UNIX & Internet Security, 10.5.3. syslog Messages   
- -X switch for : sendmail, 26.4. Log Transactions with -X    
- xferlog : Practical UNIX & Internet Security, 10.3.3. xferlog Log File 
        
 - LOG macro : sendmail, 18.8. Alphabetized Reference  
- LOG_MAIL : (see facility, mail-handling program) 
- LOG_PID : sendmail, 26.1.1. syslog(3)  
- logdaemon package : Practical UNIX & Internet Security, 17.3.18.5. Searching for .rhosts files  
- logger command : Practical UNIX & Internet Security, 10.5.3. syslog Messages 
- logging in 
         - Practical UNIX & Internet Security, C.5. Starting Up UNIX and Logging In    
- Practical UNIX & Internet Security, C.5.3. Running the User's Shell    
- FTP access without : Practical UNIX & Internet Security, 17.3.2.7. Allowing only FTP access   
- Kerberos system : Practical UNIX & Internet Security, 19.6.1.1. Initial login   
- last program   
          - Practical UNIX & Internet Security, 10.1.3. last Program      
- Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file    
  
   - lastlog file : Practical UNIX & Internet Security, 10.1.1. lastlog File    
- passwords : Practical UNIX & Internet Security, 3.3. Entering Your Password    
- preventing   
        - Practical UNIX & Internet Security, 8.4. Managing Dormant Accounts      
- Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts    
  
   - remotely : TCP/IP Network Administration, 1.7. Application Layer   
- restricting : Practical UNIX & Internet Security, 8.3. Restricting Logins   
- with Secure RPC : Practical UNIX & Internet Security, 19.3.3. Using Secure RPC    
- startup file attacks   
         - Practical UNIX & Internet Security, 11.5.2. Start-up File Attacks      
- Practical UNIX & Internet Security, 11.5.2.7. Other initializations    
  
 
 - logging out with Secure RPC[logging out:Secure RPC] : Practical UNIX & Internet Security, 19.3.3. Using Secure RPC  
- loghost : TCP/IP Network Administration, 3.2. The Host Table 
- logic bombs 
      - Practical UNIX & Internet Security, 11.1. Programmed Threats: Definitions    
- Practical UNIX & Internet Security, 11.1.3. Logic Bombs    
- Practical UNIX & Internet Security, 27.2.2. Viruses on the Distribution Disk 
   
 - login activity, checking : TCP/IP Network Administration, 12.4.2.2. Checking login activity  
- .login file 
     - Practical UNIX & Internet Security, 8.5.1. Secure Terminals    
- Practical UNIX & Internet Security, 11.5.2.1. .login, .profile, /etc/profile    
- Practical UNIX & Internet Security, 24.4.1.6. Changes to startup files  
   
 - login program 
    - Practical UNIX & Internet Security, 8.6. The UNIX Encrypted Password System    
- Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors    
- Practical UNIX & Internet Security, 19.5.4. Using NIS+   
- Practical UNIX & Internet Security, 26.2.6. Other Tips    
- Practical UNIX & Internet Security, 27.1.2. Trusting Trust 
     
 - logindevperm file : Practical UNIX & Internet Security, 17.3.21.1. /etc/fbtab and /etc/logindevperm 
- loginlog file : Practical UNIX & Internet Security, 10.1.4. loginlog File 
- logins 
      - authentication : Practical UNIX & Internet Security, 17.3.5. TACACS (UDP Port 49)   
- FTP : Practical UNIX & Internet Security, 17.3.2. (FTP) File Transfer Protocol (TCP Ports 20 and 21)   
- remote : Building Internet Firewalls, 2.3. Remote Terminal Access and Command   
- successful, from unexpected site : Building Internet Firewalls, 12.2.3. The Good, the Bad, and the Ugly   
- UUCP, additional : Practical UNIX & Internet Security, 15.3.1. Assigning Additional UUCP Logins  
     
 - logins command 
    - Practical UNIX & Internet Security, 8.1.1. Accounts Without Passwords    
- Practical UNIX & Internet Security, 8.2. Monitoring File Format 
  
 - LogLevel (L) option 
    - sendmail, 13.2.6. The Default Logging Level    
- sendmail, 22.8.3.3. The LogLevel option    
- sendmail, 26.1.1. syslog(3)    
- sendmail, 34.8. Alphabetized Reference    
- LogLevel variable for : sendmail, 20.1.2. Global Variables  
     
 - LOGNAME= command 
    - Practical UNIX & Internet Security, 15.5.1.3. A Sample Permissions file    
- Practical UNIX & Internet Security, 15.5.2. Permissions Commands  
  
 - .logout file : Practical UNIX & Internet Security, 19.3.3. Using Secure RPC  
- logs/logging 
     - Building Internet Firewalls, 5.8.1.4. Safeguard the system logs   
- Building Internet Firewalls, 8.11. syslog   
- Building Internet Firewalls, 13.5.4. Keeping Activity Logs   
- Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures   
- Practical UNIX & Internet Security, 10. Auditing and Logging   
- Practical UNIX & Internet Security, 10.8. Managing Log Files   
- Practical UNIX & Internet Security, 11.5.3.5. System initialization files    
- Practical UNIX & Internet Security, 21.5. Special Considerations    
- Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs   
- sendmail, 13.2.6. The Default Logging Level    
- sendmail, 18.8. Alphabetized Reference    
- sendmail, 26.1. Logging with syslog    
- sendmail, 36.7. Alphabetized Reference    
- (see also syslog)   
- access_log   
                    - Practical UNIX & Internet Security, 10.3.5. access_log Log File     
- Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files   
  
   - across networks : Practical UNIX & Internet Security, 10.5.2.2. Logging across the network   
- aculog : Practical UNIX & Internet Security, 10.3.1. aculog File    
- agent_log file : Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files   
- archiving information : Practical UNIX & Internet Security, 7.4.2. Simple Archives   
- backups and   
          - Building Internet Firewalls, 5.10.2. Do Secure Backups     
- Practical UNIX & Internet Security, 10.2.2. Accounting with BSD   
  
   - breakins : Practical UNIX & Internet Security, 24.1.2. Rule #2: DOCUMENT   
- C2 audit : Practical UNIX & Internet Security, 10.1. The Basic Log Files   
- checklist for : Practical UNIX & Internet Security, A.1.1.9. Chapter 10: Auditing and Logging   
- creating with SOCKS : Building Internet Firewalls, 7.6. Using SOCKS for   
- critical messages   
          - Practical UNIX & Internet Security, 10.5.3. syslog Messages     
- Practical UNIX & Internet Security, 10.5.3.1. Beware false log entries   
  
   - documenting incidents : Building Internet Firewalls, 13.1.7. Document the Incident   
- downloaded files   
       - Practical UNIX & Internet Security, 10.3.3. xferlog Log File     
- Practical UNIX & Internet Security, 10.3.5. access_log Log File   
  
   - of dropped packets : Building Internet Firewalls, 6.9. Where to Do Packet Filtering   
- failed su attempts : Practical UNIX & Internet Security, 4.3.7. The Bad su Log    
- file format : Practical UNIX & Internet Security, 8.2. Monitoring File Format   
- files transferred by FTP : Practical UNIX & Internet Security, 10.3.3. xferlog Log File   
- to hardcopy device : Practical UNIX & Internet Security, 10.5.2.1. Logging to a printer   
- individual users   
           - Practical UNIX & Internet Security, 10.4. Per-User Trails in the Filesystem     
- Practical UNIX & Internet Security, 10.4.3. Network Setup   
  
   - lastlog : Practical UNIX & Internet Security, 10.1.1. lastlog File    
- managing : Practical UNIX & Internet Security, 10.8. Managing Log Files   
- manually logging   
        - Practical UNIX & Internet Security, 10.7. Handwritten Logs     
- Practical UNIX & Internet Security, 10.7.2.2. Informational material   
  
   - memory required for   
      - Building Internet Firewalls, 12.1.3. Managing Your Disk Space     
- Building Internet Firewalls, 12.2.2. What Should You Watch For?   
  
   - mistyped passwords : Practical UNIX & Internet Security, 10.5.3. syslog Messages   
- network services : Practical UNIX & Internet Security, 10.3.6. Logging Network Services   
- outgoing mail : Practical UNIX & Internet Security, 10.4.2. Mail   
- per-machine : Practical UNIX & Internet Security, 10.7.2. Per-Machine Logs   
- per-site : Practical UNIX & Internet Security, 10.7.1. Per-Site Logs   
- potentially criminal activity : Practical UNIX & Internet Security, 26.2.6. Other Tips    
- proxy services and : Building Internet Firewalls, 7.1.1.2. Proxy services are good at logging   
- refer_log file : Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files   
- of router actions : Building Internet Firewalls, 6.4.1. Logging Actions   
- sulog : (see sulog file)   
- Swatch program   
                - Practical UNIX & Internet Security, 10.6. Swatch: A Log File Tool      
- Practical UNIX & Internet Security, 10.6.2. The Swatch Configuration File     
- Practical UNIX & Internet Security, E.4.9. Swatch   
   
   - syslog facility   
      - Practical UNIX & Internet Security, 10.5. The UNIX System Log (syslog) Facility     
- Practical UNIX & Internet Security, 10.5.3.1. Beware false log entries     
- sendmail, 26.1.1. syslog(3)    
   
   - system clock and : Practical UNIX & Internet Security, 17.3.14. Network Time Protocol (NTP) (UDP Port 123)   
- tracking intruders with : Practical UNIX & Internet Security, 24.3. The Log Files: Discovering an Intruder's   
- trimlog program for : Building Internet Firewalls, B.6.5. trimlog   
- unexpectedly deleted or modified : Building Internet Firewalls, 12.2.3. The Good, the Bad, and the Ugly   
- /usr/adm/messages : Practical UNIX & Internet Security, 10.2.3. messages Log File   
- utmp and wtmp   
           - Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files      
- Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file    
  
   - UUCP : Practical UNIX & Internet Security, 10.3.4. uucp Log Files   
- /var/adm/acct : Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File    
- /var/adm/loginlog : Practical UNIX & Internet Security, 10.1.4. loginlog File   
- of web servers : Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files   
- what to watch for : Building Internet Firewalls, 12.2.2. What Should You Watch For?   
- what not to log : Practical UNIX & Internet Security, 10.5.3. syslog Messages   
- -X switch for : sendmail, 26.4. Log Transactions with -X    
- xferlog : Practical UNIX & Internet Security, 10.3.3. xferlog Log File 
        
 - long distance service 
    - Practical UNIX & Internet Security, 14.5.4. Physical Protection of Modems   
- Practical UNIX & Internet Security, 17.3.3. TELNET (TCP Port 23) 
  
 - looking up database keys : sendmail, 20.3. Alphabetized V8.8 Subroutines  
- lookups, DNS 
     - Building Internet Firewalls, 8.10.1. Packet Filtering Characteristics of   
- Building Internet Firewalls, 8.10.4.2. Mismatched data between the hostname 
  
 - loopback 
    - address   
      - Building Internet Firewalls, C.9. The IP Address     
- TCP/IP Network Administration, 2.2.2.1. Final notes on IP addresses     
- TCP/IP Network Administration, 3.2. The Host Table     
- TCP/IP Network Administration, 8.3.4. The named.local File    
    
   - devices : TCP/IP Network Administration, 5.3.1.2. Pseudo-device    
- domain : TCP/IP Network Administration, 8.3.1.1. Configuring a caching-only nameserver    
- files : TCP/IP Network Administration, 8.1.1. BIND Configurations    
- interface   
         - TCP/IP Network Administration, 4.7. netconfig      
- TCP/IP Network Administration, 6.1.1. Determining the Interface Name      
- TCP/IP Network Administration, 6.1.5.6. Putting ifconfig in the startup files    
   
   - route   
      - TCP/IP Network Administration, 2.5. The Routing Table     
- TCP/IP Network Administration, 7.2. The Minimal Routing Table      
- TCP/IP Network Administration, 12.7.2. Routing control    
   
 
 - loops 
    - forwarding : sendmail, 25.7.2. Forwarding Loops    
- in HELO command : sendmail, 30.8. Alphabetized F= Flags   
- in rule sets : sendmail, 28.6.2. Rewrite Once Prefix: $:  
   
 - losses, cost of preventing 
    - Practical UNIX & Internet Security, 2.3. Cost-Benefit Analysis   
- Practical UNIX & Internet Security, 2.3.4. Convincing Management 
  
 - LOTUS_NOTES_HACK macro : sendmail, 18.8. Alphabetized Reference  
- lowest-cost path : TCP/IP Network Administration, 7.4.3. Open Shortest Path First  
- lp (user) : Practical UNIX & Internet Security, 4.1. Users and Groups  
- lp directory : TCP/IP Network Administration, 9.2.2. Solaris Line Printer Service  
- lp printing system : Building Internet Firewalls, 2.14. Printing Systems 
        - configuring : Building Internet Firewalls, 8.17. Printing Protocols (lpr and lp) 
 
 - lpd (Line Printer Daemon) 
    - Practical UNIX & Internet Security, 17.3.18.6. /etc/hosts.lpd file   
- TCP/IP Network Administration, 9.2. Line Printer Daemon    
- commands, listed : TCP/IP Network Administration, 9.2.1.2. Using LPD  
   
 - lpr printing system 
    - Building Internet Firewalls, 2.14. Printing Systems   
- TCP/IP Network Administration, 3.7.2. Print Services   
- TCP/IP Network Administration, 9.2.1.2. Using LPD    
- configuring : Building Internet Firewalls, 8.17. Printing Protocols (lpr and lp) 
    
 - lpr server, IP address of : TCP/IP Network Administration, 9.4. A BOOTP Server  
- lpsystem command : TCP/IP Network Administration, 9.2.2. Solaris Line Printer Service  
- lrand48 function : Practical UNIX & Internet Security, 23.7.3. drand48  (  ), lrand48  (  ), and mrand48  (  ) 
- ls command 
       - Practical UNIX & Internet Security, 5.1.4. Using the ls Command    
- Practical UNIX & Internet Security, 5.1.5. File Times   
- Practical UNIX & Internet Security, 9.2.2. Checklists and Metadata   
- TCP/IP Network Administration, 8.4. Using nslookup    
- TCP/IP Network Administration, 11.6. Checking Name Service    
- -c option   
           - Practical UNIX & Internet Security, 5.1.5. File Times     
- Practical UNIX & Internet Security, 24.4.1.6. Changes to startup files    
  
   - -d option : Practical UNIX & Internet Security, 9.2.2.1. Simple listing   
- -e option : Practical UNIX & Internet Security, 5.2.5.1. AIX Access Control Lists   
- -F option : Practical UNIX & Internet Security, 5.1.4. Using the ls Command    
- -g option : Practical UNIX & Internet Security, 5.1.4. Using the ls Command    
- -H option   
          - Practical UNIX & Internet Security, 5.9.2. Context-Dependent Files     
- Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories    
  
   - -i option : Practical UNIX & Internet Security, 9.2.2.1. Simple listing   
- -l option   
       - Practical UNIX & Internet Security, 5.1.4. Using the ls Command      
- Practical UNIX & Internet Security, 5.2.5.1. AIX Access Control Lists     
- Practical UNIX & Internet Security, 5.5.1. SUID, SGID, and Sticky Bits      
- Practical UNIX & Internet Security, 24.4.1.6. Changes to startup files    
    
   - -q option : Practical UNIX & Internet Security, 5.4. Using Directory Permissions    
- -u option : Practical UNIX & Internet Security, 5.1.5. File Times 
  
 - lsacl command : Practical UNIX & Internet Security, 5.2.5.2. HP-UX access control lists 
- lsof program : Practical UNIX & Internet Security, 25.2.2.7. Hidden space 
- lstat function : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs 
- Lucifer algorithm 
       - Practical UNIX & Internet Security, 6.4.4. DES   
- Practical UNIX & Internet Security, 6.4.4.3. DES strength  
  
 - LUCIFER cipher : Practical UNIX & Internet Security, 6.4.4. DES 
- LUSER-RELAY macro (m4) 
     - sendmail, 19.6. Alphabetized m4 Macros    
- sendmail, 31.10. Alphabetized Reference  
  
 
   
  Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z  
Copyright © 1999  O'Reilly & Associates, Inc. All Rights Reserved.