start page  | rating of books | rating of authors | reviews | copyrights
 
  
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z  
Index: M
   - m class 
    - sendmail, 19.6. Alphabetized m4 Macros    
- sendmail, 32.5. Alphabetized Reference  
  
 - M configuration command 
    - sendmail, 5.3.1. Mail Delivery Agents    
- sendmail, 6.2. Define a Mail Delivery Agent    
- sendmail, 6.3. The local Delivery Agent    
- sendmail, 30.1. Configuration File Syntax 
    
 - -m database switch : sendmail, 33.3.4.5. -m  suppress replacement on match (V8.1 and above)  
- m flag : sendmail, 30.8. Alphabetized F= Flags 
- M flag 
      - sendmail, 14.2.3. The Message-ID: Header    
- sendmail, 30.8. Alphabetized F= Flags 
  
 - M line (qf file) 
    - sendmail, 23.4.1. Printing the Queue in Verbose Mode    
- sendmail, 23.9. The qf File Internals  
  
 - M lines in sendmail.cf : sendmail, 3.1. Role in the Filesystem  
- $m macro 
     - sendmail, 7.3.1. The hostname    
- sendmail, 12.1.7. Adding the Domain    
- sendmail, 31.10. Alphabetized Reference  
   
 - $M macro : sendmail, 31.10. Alphabetized Reference  
- m option : (see MeToo (m) option) 
- M option 
      - sendmail, 31.2. Command-Line Definitions    
- sendmail, 34.1.3. Appropriateness of Options    
- sendmail, 34.8. Alphabetized Reference  
   
 - M rule-testing command : sendmail, 38.4.2. Show Delivery Agents with =M  
- -m switch (sendmail) 
     - sendmail, 18.3.2. The makesendmail Script    
- sendmail, 36.7. Alphabetized Reference  
  
 - -M switch (sendmail) 
    - sendmail, 31.2. Command-Line Definitions    
- sendmail, 36.7. Alphabetized Reference  
  
 - m4 macros 
    - TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros    
- TCP/IP Network Administration, E.3. m4 sendmail Macros 
  
 - m4 preprocessor 
    - sendmail, 16.3. Run m4    
- sendmail, 19. V8 m4 Configuration    
- class macros and : sendmail, 32.3. Class with m4    
- comments in files : sendmail, 19.5. Pitfalls    
- configuration version : sendmail, 31.10. Alphabetized Reference    
- database maps and : sendmail, 33.6. Database Maps and m4    
- delivery agent configuration : sendmail, 30.3. m4 Configuration Syntax   
- diversions : sendmail, 19.1.4. m4 diversions    
- macros and : sendmail, 31.8. Macros with the m4 Technique    
- rule sets and : sendmail, 29.2. Rule Sets and m4    
- sendmail options and : sendmail, 34.3. Configuring with V8 m4 Options  
           
 - M= equate : sendmail, 30.4. The Equates 
- MAC (Mandatory Access Controls) : Practical UNIX & Internet Security, 4.1.3. Groups and Group Identifiers (GIDs)  
- MACH operating system : Practical UNIX & Internet Security, 1.3. History of UNIX  
- machine 
       - auditing : (see auditing)   
- backing up : Building Internet Firewalls, 13.5.1. Backing Up Your Filesystems   
- choosing : Building Internet Firewalls, 5.3. Choosing a Machine   
- configuring : Building Internet Firewalls, 5.8.4. Reconfiguring for Production   
- connecting : Building Internet Firewalls, 5.8.6. Connecting the Machine   
- disconnecting or shutting down : Building Internet Firewalls, 13.4.3. Planning for Disconnecting or   
- hardware : (see hardware)   
- hijacking : Building Internet Firewalls, 10.1.1. Hijacking   
- name : Practical UNIX & Internet Security, 16.2.3. Hostnames   
- physical location of : Building Internet Firewalls, 5.4. Choosing a Physical Location   
- securing : Building Internet Firewalls, 5.8.1. Securing the Machine   
- software : (see software)   
- speed of : Building Internet Firewalls, 5.3.2. How Fast a Machine? 
             
 - MACHINE= command 
    - Practical UNIX & Internet Security, 15.5.1.2. Name-value pairs    
- Practical UNIX & Internet Security, 15.5.2. Permissions Commands  
  
 - macid() : sendmail, 20.3. Alphabetized V8.8 Subroutines  
- Macintosh 
     - Practical UNIX & Internet Security, 18.2. Running a Secure Server   
- sendmail, 3.3.3. Other Protocols  
  
 - macro conditionals 
    - sendmail, 14.1.3. Testing So Far    
- sendmail, 31.6. Macro Conditionals: $?, $|, and $.    
- TCP/IP Network Administration, 10.5.2.1. Conditionals  
   
 - macro virus : (see viruses) 
- macros 
     - sendmail, 5.3.2. Macros    
- sendmail, 7. Macros    
- sendmail, 31.9. Pitfalls    
- class macros   
         - sendmail, 5.3.5. Class Macros      
- sendmail, 12. Class      
- sendmail, 32. Class Macros    
   
   - classes and : sendmail, 12.1.1.1. A caveat    
- database macros : sendmail, 33. Database Macros    
- declaring   
        - sendmail, 7.2. Defining Macros      
- sendmail, 31.2. Command-Line Definitions    
  
   - defining   
      - sendmail, 19.4.2. Define Macros      
- sendmail, 20.3. Alphabetized V8.8 Subroutines      
- sendmail, 36.7. Alphabetized Reference      
- sendmail, 38.2.1. Define a Macro with .D      
- with M option : sendmail, 34.8. Alphabetized Reference    
     
   - dumping : sendmail, 38.3. Dump a Macro    
- expanding : TCP/IP Network Administration, 10.6.2. Transforming the Address    
- fetching value of : sendmail, 20.3. Alphabetized V8.8 Subroutines    
- file class macros : sendmail, 5.3.6. File Class Macros    
- for compiling sendmail : sendmail, 18.8. Alphabetized Reference    
- in header fields : sendmail, 35.3.1. Macros in the Header Field    
- initializing : sendmail, 36.4.2.2. Initialize macros    
- m4 preprocessor : sendmail, 19. V8 m4 Configuration    
- naming   
              - sendmail, 5.3.2. Macros      
- sendmail, 7.2. Defining Macros      
- sendmail, 31.4. Macro Names      
- converting names to integers : sendmail, 20.3. Alphabetized V8.8 Subroutines    
    
   - predefined   
      - sendmail, 7.3. Predefined Macros      
- sendmail, 31.1. Preassigned Macros    
  
   - required : sendmail, 31.3.1. Required Macros (V8.6 and earlier)    
- restoring macro values : sendmail, 23.9. The qf File Internals    
- in rule set names : sendmail, 29.1.4. Macros in Rule-Set Names    
- in rules : sendmail, 28.1.1. Macros in Rules    
- for time and date : sendmail, 31.7.2. Macros and the Date  
     
 - macvalue() : sendmail, 20.3. Alphabetized V8.8 Subroutines  
- MAEs (Metropolitan Area Exchanges) : TCP/IP Network Administration, 1.1. TCP/IP and the Internet 
- magic cookies : Practical UNIX & Internet Security, 17.3.21.4. Using Xauthority magic cookies 
- magic number 
       - Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail    
- TCP/IP Network Administration, A.2. The PPP Daemon 
  
 - mail 
    - (see email)   
- (see sendmail) 
  
 - MAIL command (SMTP) 
    - sendmail, 29.10.1. The check_mail Rule Set    
- sendmail, 34.8. Alphabetized Reference  
  
 - Mail Exchanger records : (see MX records) 
- "Mail-From:" header line : sendmail, 35.10. Alphabetized Reference  
- mail hubs : (see hubs) 
- /mail/imap.tar.Z file : TCP/IP Network Administration, 9.7.2. IMAP Server  
- mail program 
        - Practical UNIX & Internet Security, 15.1.3. mail Command    
- sendmail, 3.2.1. Delivery to a Mailbox  
  
 - mail11 program : sendmail, 3.3.3. Other Protocols  
- Mail_Aliases table (NIS+) : Practical UNIX & Internet Security, 19.5.3. NIS+ Tables 
- MAIL_HUB macro (m4) 
      - sendmail, 19.6. Alphabetized m4 Macros    
- sendmail, 31.10. Alphabetized Reference  
  
 - mailbox file : sendmail, 3.2.1. Delivery to a Mailbox  
- mailbox servers : TCP/IP Network Administration, 9.7. Mail Servers  
     - synchronizing : TCP/IP Network Administration, 9.7.2. IMAP Server  
 
 - mailer 
    - definition fields : TCP/IP Network Administration, 10.5.8. Defining Mailers    
      - common : TCP/IP Network Administration, 10.5.8.1. Some common mailer definitions    
 
   - local : TCP/IP Network Administration, 10.5.8. Defining Mailers  
 
 - MAILER command (UUCP) : sendmail, 31.10. Alphabetized Reference  
- MAILER() (m4) 
     - sendmail, 19.3.2. MAILER()    
- sendmail, 30.3. m4 Configuration Syntax 
  
 - MAILER-DAEMON alias 
    - sendmail, 3.1.1. The Aliases File    
- sendmail, 24.4.2. The MAILER-DAEMON Alias    
- sendmail, 31.10. Alphabetized Reference    
- (see also $n macro) 
    
 - MAILER source file (in sendmail) 
    - TCP/IP Network Administration, E.3. m4 sendmail Macros   
- TCP/IP Network Administration, E.3.5. MAILER   
- values available, listed : TCP/IP Network Administration, E.3.5. MAILER 
   
 - mailer= equate (syslog output) : sendmail, 26.1.3.4. mailer= the delivery agent used  
- MAILER_DEFINITIONS macro (m4) : sendmail, 19.6. Alphabetized m4 Macros  
- mailertable database 
      - sendmail, 19.6. Alphabetized m4 Macros    
- TCP/IP Network Administration, 10.7.1. Modifying Local Information  
  
 - mailing lists 
    - Practical UNIX & Internet Security, E.1. Mailing Lists   
- Practical UNIX & Internet Security, E.1.3.10. WWW-security   
- sendmail, 1.3.3. Aliases and Mailing Lists    
- sendmail, 17.1.2.1. A rule to handle List:;    
- sendmail, 20.2.2. Workstation Refuses to Act as a Mail Gateway    
- sendmail, 34.8. Alphabetized Reference    
- (see also email)   
- exploder lists : sendmail, 25.4. Exploder Mailing Lists    
- EXPN command (SMTP) : sendmail, 22.3.2. SMTP vrfy and expn    
- for distributing security information : TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information    
- for exchanging information and ideas : TCP/IP Network Administration, 13.5. Mailing Lists    
- :include: directive   
                 - sendmail, 22.5.2. Permissions for :include:      
- sendmail, 23.9. The qf File Internals      
- sendmail, 25.2. :include: Mailing Lists    
   
   - including oneself on : sendmail, 34.8. Alphabetized Reference    
- internal : sendmail, 25.1. Internal Mailing Lists    
- joining : TCP/IP Network Administration, 13.5. Mailing Lists    
- keeping current : Building Internet Firewalls, 12.3.1.1. Mailing lists   
- list precedence : sendmail, 14.4. Precedence    
- owner : sendmail, 25.3. Defining a Mailing List Owner    
- packages for : sendmail, 25.6. Packages That Help    
- resources via : Building Internet Firewalls, A.3. Mailing Lists   
- sendmail and : TCP/IP Network Administration, 10.1. sendmail's Function    
- troubleshooting : sendmail, 25.5. Problems with Mailing Lists  
          
 - mailq command 
    - sendmail, 4.1.2. Show Queue Mode (-bp)    
- sendmail, 36.1.2. mailq  
  
 - mailstats program : sendmail, 26.2.2. Viewing Statistics: mailstats  
- maintaining firewalls : Building Internet Firewalls, 12. Maintaining Firewalls 
- maintenance mode : Practical UNIX & Internet Security, C.5.1. Process #1: /etc/init  
- maintenance personnel : Practical UNIX & Internet Security, 13.3. Outsiders 
- maintenance toolkits, ready-made : TCP/IP Network Administration, 11.2. Diagnostic Tools  
- Majordomo package 
         - sendmail, 25.6.1. Majordomo    
- TCP/IP Network Administration, 13.5. Mailing Lists  
  
 - make command 
    - sendmail, 2.5. Build    
- TCP/IP Network Administration, 5.2. Linux Kernel Configuration    
- make config command : TCP/IP Network Administration, 5.2. Linux Kernel Configuration    
- make install.man : TCP/IP Network Administration, 9.4. A BOOTP Server    
- make zImage command : TCP/IP Network Administration, 5.2. Linux Kernel Configuration    
- in NIS : TCP/IP Network Administration, 9.3. Network Information Service  
      
 - makedbm program : Practical UNIX & Internet Security, 19.4.4.1. Setting up netgroups  
- Makefile file 
     - sendmail, 2.4. Preliminaries    
- sendmail, 18.4. Tuning Makefile    
- db library package : sendmail, C.2. Get the Source  
   
 - makemap command 
    - sendmail, 33.2. Create Files with makemap    
- TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros    
- TCP/IP Network Administration, E.1. Compiling sendmail   
- TCP/IP Network Administration, E.4.4. The sendmail K Command 
    
 - makesendmail script 
    - sendmail, 2.4. Preliminaries    
- sendmail, 18.3.2. The makesendmail Script    
- sendmail, 18.6. Install sendmail  
   
 - malware : Practical UNIX & Internet Security, 11.1. Programmed Threats: Definitions  
- man pages : Practical UNIX & Internet Security, 2.5. The Problem with Security  Through Obscurity  
- man-in-the-middle forgery : Building Internet Firewalls, 6.6.1. Risks of Filtering by Source 
- Management Information Base (MIB) : TCP/IP Network Administration, 11.9. Simple Network Management Protocol  
- management tools : Building Internet Firewalls, 2.10. Network Management Services 
- management, role of 
         - Practical UNIX & Internet Security, 2.3.4. Convincing Management   
- Practical UNIX & Internet Security, 2.5. The Problem with Security  Through Obscurity  
  
 - managing accounts : Building Internet Firewalls, 12.1.2. Managing Your Accounts 
- MANs (Metropolitan Networks) : Practical UNIX & Internet Security, 16.1. Networking  
- manual logging 
      - Practical UNIX & Internet Security, 10.7. Handwritten Logs   
- Practical UNIX & Internet Security, 10.7.2.2. Informational material 
  
 - manual pages : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs 
- manual sendmail use : sendmail, 1.4. Run sendmail by Hand  
- map 
      - TCP/IP Network Administration, 1.7. Application Layer   
- (see also automounter daemon)   
- (see also /etc/hosts file)   
- (see also /etc/networks file)   
- (see also IMAP)   
- (see also Network Information Service)   
- (see also portmapper)   
- building : TCP/IP Network Administration, 7.4.3. Open Shortest Path First    
- name assigned a database : TCP/IP Network Administration, 10.6.2.1. Transforming with a database    
- NIS : (see NIS) 
          
 - /map rule-testing command : sendmail, 38.5.3. Look up a Database Item with /map  
- map_lookup() : sendmail, 20.3. Alphabetized V8.8 Subroutines  
- martians 
      - TCP/IP Network Administration, 4.2.1. Obtaining an IP Address    
- TCP/IP Network Administration, B.7. Definition Statements 
  
 - mask information : (see information) 
- masking 
     - TCP/IP Network Administration, 2.2.2. Classless IP Addresses   
- TCP/IP Network Administration, 2.3. Subnets 
  
 - MASQUERADE_AS macro (m4) 
    - sendmail, 19.6. Alphabetized m4 Macros    
- sendmail, 31.10. Alphabetized Reference  
  
 - MASQUERADE_DOMAIN macro (m4) : sendmail, 19.6. Alphabetized m4 Macros  
- MASQUERADE_DOMAIN_FILE macro (m4) : sendmail, 19.6. Alphabetized m4 Macros  
- masquerade_entire_domain feature : sendmail, 19.6. Alphabetized m4 Macros  
- masquerade_envelope feature : sendmail, 19.6. Alphabetized m4 Macros  
- masquerading 
        - sendmail, 19.4.4. Masquerading    
- sendmail, 19.6. Alphabetized m4 Macros    
- TCP/IP Network Administration, E.3.2. FEATURE   
- TCP/IP Network Administration, E.3.4. DOMAIN 
    
 - Massey, James L. : Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems  
- Master mode (uucico) : Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work  
- master server 
      - Practical UNIX & Internet Security, 19.4. Sun's Network Information Service (NIS)   
- (see also NIS) 
  
 - MatchGecos (G) option 
    - sendmail, 20.1.2. Global Variables    
- sendmail, 34.8. Alphabetized Reference  
  
 - MATCHGECOS macro : sendmail, 18.8. Alphabetized Reference  
- matching : (see wildcard operators) 
- MAX... macros : sendmail, 18.8. Alphabetized Reference  
- MaxDaemonChildren option 
       - sendmail, 34.1.3. Appropriateness of Options    
- sendmail, 34.8. Alphabetized Reference  
  
 - MaxHopCount (h) option : sendmail, 34.8. Alphabetized Reference  
- maximum line length 
     - sendmail, 30.4. The Equates   
- sendmail, 30.8. Alphabetized F= Flags 
  
 - maximum receive unit (MRU) : TCP/IP Network Administration, A.2. The PPP Daemon 
- maximum transmission unit (MTU) 
     - Building Internet Firewalls, C.5.1.3. Fragmenting datagrams   
- TCP/IP Network Administration, 1.5.1.3. Fragmenting datagrams   
- TCP/IP Network Administration, 6.1.1. Determining the Interface Name    
- TCP/IP Network Administration, 6.1.2. Checking the Interface with ifconfig    
- TCP/IP Network Administration, 6.1.5.4. Maximum transmission unit    
- TCP/IP Network Administration, A.1. Dial-Up IP   
- determining smallest : TCP/IP Network Administration, 5.2. Linux Kernel Configuration  
       
 - MAXLINE variable : sendmail, 18.8. Alphabetized Reference  
- MaxMessageSize : sendmail, 34.8. Alphabetized Reference  
- maxpacketsize : TCP/IP Network Administration, B.8.6. The egp Statement 
- MaxQueueRunSize option 
       - sendmail, 23.4. Printing the Queue    
- sendmail, 34.8. Alphabetized Reference  
  
 - MAXRWSETS variable : sendmail, 29.1.2. Rule-Set Names  
- MBONE (Multicast Backbone) 
     - Building Internet Firewalls, 2.8. Real-Time Conferencing   
- TCP/IP Network Administration, 5.2. Linux Kernel Configuration    
- TCP/IP Network Administration, 5.3.1.1. Options    
- configuring : Building Internet Firewalls, 8.9.3. The Multicast Backbone (MBONE) 
    
 - mc files 
    - sendmail, 19.3. The Minimal mc File    
- sendmail, 19.6. Alphabetized m4 Macros  
  
 - MCERT : Practical UNIX & Internet Security, F.3.4.21. Motorola, Inc. 
- MCI Corporation : Practical UNIX & Internet Security, F.3.4.19. MCI Corporation 
- MD2 algorithm : Practical UNIX & Internet Security, 6.5.4.1. MD2, MD4, and MD5 
- MD4 algorithm 
       - Building Internet Firewalls, 10.3.1. One-Time Passwords   
- Practical UNIX & Internet Security, 6.5.4.1. MD2, MD4, and MD5 
  
 - MD5 algorithm 
    - Practical UNIX & Internet Security, 6.5.2. Using Message Digests   
- Practical UNIX & Internet Security, 6.5.4.1. MD2, MD4, and MD5   
- Practical UNIX & Internet Security, 23.5.1. Use Message Digests for Storing Passwords   
- Practical UNIX & Internet Security, 23.9. A Good Random Seed   
- digital signatures versus : Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures   
- in POP : Practical UNIX & Internet Security, 17.3.10. Post Office Protocol (POP) (TCP Ports 
      
 - MDAs (mail delivery agents) : (see MTAs) 
- media : Practical UNIX & Internet Security, 12.3.3. Other Media 
     - damaged by smoke : Practical UNIX & Internet Security, 12.2.1.2. Smoke    
- destroying : Practical UNIX & Internet Security, 12.3.2.3. Sanitize your media before disposal    
- failure of : Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure   
- hard/soft disk quotas : Practical UNIX & Internet Security, 25.2.2.5. Using quotas    
- print through process : Practical UNIX & Internet Security, 12.3.2.1. Verify your backups    
- rotating for backups : Practical UNIX & Internet Security, 7.1.3. Types of Backups    
- rotation of : Practical UNIX & Internet Security, 7.2.1.2. Media rotation   
- sanitizing : Practical UNIX & Internet Security, 12.3.2.3. Sanitize your media before disposal    
- viruses from : Practical UNIX & Internet Security, 11.1.5. Viruses  
         
 - meet-in-the-middle attacks : Practical UNIX & Internet Security, 6.4.5.1. Double DES 
- MEMCHUNKSIZE macro : sendmail, 18.8. Alphabetized Reference  
- memory 
      - Building Internet Firewalls, 1.1.2. Your Resources   
- Building Internet Firewalls, 5.3.3. What Hardware Configuration?   
- Practical UNIX & Internet Security, 25.2.2. Disk Attacks    
- Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks   
- sendmail, 34.8. Alphabetized Reference    
- hidden space : Practical UNIX & Internet Security, 25.2.2.7. Hidden space   
- for logs   
            - Building Internet Firewalls, 12.1.3. Managing Your Disk Space     
- Building Internet Firewalls, 12.2.2. What Should You Watch For?   
  
   - managing : Building Internet Firewalls, 12.1.3. Managing Your Disk Space   
- reserved space : Practical UNIX & Internet Security, 25.2.2.6. Reserved space    
- swap space : Practical UNIX & Internet Security, 25.2.3. Swap Space Problems    
- /tmp directory and : Practical UNIX & Internet Security, 25.2.4. /tmp Problems   
- tree-structure attacks : Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks 
     
 - memory-to-memory copies : TCP/IP Network Administration, 6.1.5.2. ARP and trailers  
- merging interior and exterior routers : Building Internet Firewalls, 4.3.2. It's OK to Merge the Interior Router and the Exterior Router 
- Merkle, Ralph : Practical UNIX & Internet Security, 6.4.5.1. Double DES 
- Message Authentication Code (MAC) : Practical UNIX & Internet Security, 6.5.5.2. Message authentication codes 
- Message Digest 5 (MD5) cryptographic checksum 
        - TCP/IP Network Administration, 7.4.3. Open Shortest Path First    
- TCP/IP Network Administration, 7.7.1.1. A host configuration    
- TCP/IP Network Administration, B.8.2. The rip Statement 
   
 - message digests 
    - Practical UNIX & Internet Security, 6.5. Message Digests and Digital Signatures   
- Practical UNIX & Internet Security, 6.5.2. Using Message Digests   
- Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures   
- Practical UNIX & Internet Security, 23.5.1. Use Message Digests for Storing Passwords   
- Tripwire package   
          - Practical UNIX & Internet Security, 9.2.4. Tripwire     
- Practical UNIX & Internet Security, 9.2.4.2. Running Tripwire   
  
 
 - "Message:" header line : sendmail, 35.10. Alphabetized Reference  
- message queue : (see queue) 
- "Message-ID:" header line 
      - sendmail, 1.5. The Header    
- sendmail, 13.4. Sending Mail    
- sendmail, 14.2.3. The Message-ID: Header    
- sendmail, 26.1.3.5. msgid= the Message-ID: identifier    
- sendmail, 30.8. Alphabetized F= Flags   
- sendmail, 35.5.16. Replacing Headers with H_ACHECK    
- sendmail, 35.10. Alphabetized Reference  
       
 - message_volume.sh script : sendmail, 26.1.4.1. message_volume.sh  
- messages file : TCP/IP Network Administration, 12.4.2.2. Checking login activity  
- messages log file : Practical UNIX & Internet Security, 10.2.3. messages Log File 
- messages, error : (see error messages) 
- messages, email 
        - sendmail, 34.8. Alphabetized Reference    
- TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture   
- TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol   
- assigning priority to : TCP/IP Network Administration, 10.5.6. Defining Mail Precedence    
- blank lines ending : sendmail, 30.8. Alphabetized F= Flags   
- body of   
           - sendmail, 1.6. The Body      
- sendmail, 23.2.2. The Data (Message Body) File: df      
- (see also -B switch (sendmail))   
   
   - bouncing   
      - sendmail, 10.3. Missing Addresses      
- sendmail, 13.2.2. Limit the Life of Queued Messages      
- sendmail, 14.4. Precedence      
- sendmail, 19.6. Alphabetized m4 Macros      
- sendmail, 22.8.3.4. The PostmasterCopy option      
- sendmail, 23.3.6. Savemail Panic      
- sendmail, 23.7.1. Handling a Down Site      
- sendmail, 24.4.1. The Postmaster Alias      
- sendmail, 25.5.1. Reply Versus Bounce      
- sendmail, 25.5.3. A list-bounced Alias      
- sendmail, 34.8. Alphabetized Reference      
- sendmail, 35.10. Alphabetized Reference      
- sendmail, 36.7. Alphabetized Reference      
- (see also $n macro)   
              
   - content type : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions   
- converting between 7- and 8-bit : sendmail, 18.8. Alphabetized Reference    
- delivering : (see delivery)   
- envelope : (see envelope)   
- encapsulated : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions   
- error : (see errors)   
- flooding : Practical UNIX & Internet Security, 25.3.2. Message Flooding    
- forged : sendmail, 22.7. Forged Mail    
- forwarding : sendmail, 35.7. Forwarding with Resent-Headers    
- forwarding loops : sendmail, 25.7.2. Forwarding Loops    
- headers for : (see headers, message)   
- holding : (see queue)   
- hop count : (see hop count)   
- hub's acceptance of : sendmail, 15.4. Hub Accepts Mail for Client    
- leading dots in : sendmail, 34.8. Alphabetized Reference    
- limiting size of : sendmail, 20.2.3. Limit the Size of Guest Messages    
- multipart subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions   
- multiple objects in single : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions   
- origin date of : (see $a macro)   
- priority of   
                         - sendmail, 14.4. Precedence      
- (see priority, message)   
  
   - processing limits on : sendmail, 23.5. How the Queue Is Processed    
- queue   
       - sendmail, 1.3.2. The Queue      
- sendmail, 23. The Queue      
- checkpointing : sendmail, 34.8. Alphabetized Reference      
- down sites and : sendmail, 23.7.1. Handling a Down Site      
- lifetime     
            - sendmail, 13.2.2. Limit the Life of Queued Messages        
- sendmail, 34.8. Alphabetized Reference      
  
     - message life : sendmail, 13.2.2. Limit the Life of Queued Messages      
- message parts : sendmail, 23.2. Parts of a Queued Message      
- printing     
          - sendmail, 4.1.2. Show Queue Mode (-bp)        
- sendmail, 23.2.3.2. Locks shown when printing the queue        
- sendmail, 23.4. Printing the Queue        
- sendmail, 36.7. Alphabetized Reference      
    
     - processing     
        - sendmail, 23.5. How the Queue Is Processed        
- sendmail, 23.9. The qf File Internals        
- sendmail, 36.7. Alphabetized Reference      
   
     - putting everything in : sendmail, 34.8. Alphabetized Reference      
- requeuing on error : sendmail, 25.7.6. Force Requeue on Error      
- sendmail options for : sendmail, 34.6.2. The Queue      
- sorting : sendmail, 34.8. Alphabetized Reference      
- time message placed in : sendmail, 23.9. The qf File Internals      
- troubleshooting : sendmail, 23.8. Pitfalls      
- why message is stored in : sendmail, 23.9. The qf File Internals    
       
   - rejecting   
      - sendmail, 18.8. Alphabetized Reference      
- sendmail, 20.2.6. Reject Mail from Spamming or Mail-bombing Sites    
  
   - relays for : sendmail, 19.4.5. Relays    
- sending   
       - sendmail, 13.4. Sending Mail      
- sendmail, 14.5. Sending Real Mail    
  
   - size of   
      - sendmail, 26.1.3.10. size= the size of the message      
- sendmail, 30.4. The Equates     
- sendmail, 34.8. Alphabetized Reference    
   
   - stored in queue in error : sendmail, 23.9. The qf File Internals    
- time placed in queue : sendmail, 23.9. The qf File Internals    
- unique identifier for   
        - sendmail, 13.4. Sending Mail      
- sendmail, 14.2.3. The Message-ID: Header      
- sendmail, 26.1.3.5. msgid= the Message-ID: identifier    
   
 
 - messages, SMTP greeting 
    - sendmail, 31.10. Alphabetized Reference    
- sendmail, 34.8. Alphabetized Reference  
  
 - messages, warning : (see warning messages) 
- meta characters : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs 
- meta-packets, and filtering : Building Internet Firewalls, 6.8.4. It Should Allow Rules Based on Any 
- metadata 
       - Practical UNIX & Internet Security, 9.2.2. Checklists and Metadata   
- Practical UNIX & Internet Security, 9.2.2.2. Ancestor directories 
  
 - metasymbols : TCP/IP Network Administration, 10.6.1. Pattern Matching  
    - for transforming the address : TCP/IP Network Administration, 10.6.2. Transforming the Address  
 
 - MeToo (m) option 
    - sendmail, 34.8. Alphabetized Reference    
- sendmail, 36.7. Alphabetized Reference  
  
 - metrics : TCP/IP Network Administration, 6.1.5.3. Metric  
    - arbitrariness of : TCP/IP Network Administration, 7.4.1.1. Running RIP with routed    
- incompatibility of : TCP/IP Network Administration, 7.6.1. gated's Preference Value  
  
 - Metropolitan Area Exchanges (MAEs) : TCP/IP Network Administration, 1.1. TCP/IP and the Internet 
- Metropolitan Networks (MANs) : Practical UNIX & Internet Security, 16.1. Networking  
- MH (mail handler) : Practical UNIX & Internet Security, 11.5.2.5. .forward, .procmailrc 
- MIB (Management Information Base) : TCP/IP Network Administration, 11.9. Simple Network Management Protocol  
- MIBI and MIBII : TCP/IP Network Administration, 11.9. Simple Network Management Protocol  
- Micro-BIT Virus Center : Practical UNIX & Internet Security, F.3.4.16. Germany: Southern area 
- mil domain : TCP/IP Network Administration, 3.3.1. The Domain Hierarchy 
- Miller, Barton : Practical UNIX & Internet Security, 23.1.2. An Empirical Study of the Reliability of UNIX Utilities 
- MILNET : Practical UNIX & Internet Security, F.3.4.20. Motorola, Inc. 
- MIME (Multipurpose Internet Mail Extensions) 
             - Building Internet Firewalls, 8.1.3. Multipurpose Internet Mail Extensions   
- Practical UNIX & Internet Security, 11.1.5. Viruses    
- sendmail, 5.3.8. Headers    
- TCP/IP Network Administration, 1.2. A Data Communications Model   
- TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions   
- format errors : sendmail, 34.8. Alphabetized Reference    
- headers for : sendmail, 35.6.7. MIME Headers    
- sendmail and : TCP/IP Network Administration, 10.5.8. Defining Mailers    
- standardizing on : TCP/IP Network Administration, 4.5.3. Planning Your Mail System    
- types : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions 
          
 - "MIME-Version:" header line : sendmail, 35.10. Alphabetized Reference  
- MIME7TO8 macro : sendmail, 18.8. Alphabetized Reference  
- MIME8TO7 macro : sendmail, 18.8. Alphabetized Reference  
- MinFreeBlocks (b) option : sendmail, 34.8. Alphabetized Reference  
- minicom : TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections  
- minimum matching 
         - sendmail, 8.7.2. Minimal Matching    
- sendmail, 28.5.1. Minimum Matching    
- sendmail, 32.2.3. Backup and Retry  
   
 - MinQueueAge option 
    - sendmail, 23.9. The qf File Internals    
- sendmail, 34.8. Alphabetized Reference  
  
 - minus sign (hyphen) 
    - in machine conversation : sendmail, 4.2. Verbose (-v)    
- non-equivalent host : TCP/IP Network Administration, 12.2.5. Secure the r Commands  
  
 - missing addresses : (see addresses, null) 
- "Missing username" error : sendmail, 9.4. The error Delivery Agent  
- MIT-KERBEROS-5 authentication : Practical UNIX & Internet Security, 17.3.21.3. The xhost facility  
- Mitnick, Kevin : Practical UNIX & Internet Security, 27.2.6. Network Providers that Network Too Well 
- mixed multipart subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions 
- mknod command : TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections  
- mkpasswd program : Practical UNIX & Internet Security, 8.8.4. Password Generators  
- mktemp function : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs 
- mobile network computing : Practical UNIX & Internet Security, 8.7. One-Time Passwords 
- mobile systems, requirements of : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol 
- mode command : TCP/IP Network Administration, 6.3.2. Dial-Up PPP  
- modem pools : Building Internet Firewalls, 10.6. Terminal Servers and Modem Pools 
- modems 
                - Practical UNIX & Internet Security, 14. Telephone Security   
- Practical UNIX & Internet Security, 14.6. Additional Security for Modems    
- TCP/IP Network Administration, 1.7. Application Layer   
- (see also Automatic Call Unit)   
- asynchronous : TCP/IP Network Administration, 5.3.1.2. Pseudo-device    
- callback setups   
           - Practical UNIX & Internet Security, 14.4.2.      
- Practical UNIX & Internet Security, 14.6. Additional Security for Modems    
  
   - carrier-detect (DCD) indicator, monitoring : TCP/IP Network Administration, 6.3.3. chat    
- checking configuration of : TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections    
- clogging : Practical UNIX & Internet Security, 25.3.4. Clogging   
- documentation : TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections    
- encrypting : Practical UNIX & Internet Security, 14.6. Additional Security for Modems    
- hanging up : (see signals)   
- high-speed dial-up : TCP/IP Network Administration, 6.2. TCP/IP Over a Serial Line    
- physical security of   
             - Practical UNIX & Internet Security, 14.5.4. Physical Protection of Modems     
- Practical UNIX & Internet Security, 14.6. Additional Security for Modems    
  
   - recording call information : Practical UNIX & Internet Security, 10.3.1. aculog File    
- synchronous : TCP/IP Network Administration, 5.3.1.2. Pseudo-device    
- tracing connections   
        - Practical UNIX & Internet Security, 24.2.4. Tracing a Connection      
- Practical UNIX & Internet Security, 24.2.4.2. How to contact the system administrator of a computer   
  
   - UNIX and   
      - Practical UNIX & Internet Security, 14.5. Modems and UNIX     
- Practical UNIX & Internet Security, 14.5.3.3. Privilege testing    
  
 
 - modes 
    - daemon : sendmail, 4.1.1. Daemon Mode (-bd)    
- delivery : sendmail, 13.2.3. The Default Delivery Mode    
- sendmail operating : sendmail, 36.7. Alphabetized Reference    
- TempFileMode option   
         - sendmail, 13.2.4. The Default File Permissions      
- sendmail, 22.8.3.7. The TempFileMode option    
  
 
 - modification times 
    - Practical UNIX & Internet Security, 5.1.2. Inodes   
- Practical UNIX & Internet Security, 5.1.5. File Times   
- Practical UNIX & Internet Security, 7.4.7. inode Modification Times   
- Practical UNIX & Internet Security, 9.2.2. Checklists and Metadata 
    
 - modifying Internet services : Building Internet Firewalls, 5.8.3. Installing and Modifying Services 
- modules, loadable : TCP/IP Network Administration, 5.2. Linux Kernel Configuration  
- monitoring 
      - automatically : Building Internet Firewalls, 5.9.2. Consider Writing Software to Automate Monitoring   
- hardware for : (see detectors)   
- intruders : Practical UNIX & Internet Security, 24.2.3. Monitoring the Intruder   
- performance : Practical UNIX & Internet Security, 13.2.3. Performance Reviews and Monitoring   
- security : (see logs/logging)   
- software   
           - TCP/IP Network Administration, 11.9. Simple Network Management Protocol      
- TCP/IP Network Administration, 12.4.3. Automated Monitoring    
  
   - system usage   
      - Building Internet Firewalls, 12.2. Monitoring Your System     
- TCP/IP Network Administration, 5.2. Linux Kernel Configuration    
  
   - users : Practical UNIX & Internet Security, 26.2.6. Other Tips  
 
 - monitors and screen savers : Practical UNIX & Internet Security, 12.3.5.2. X screen savers 
- more command : TCP/IP Network Administration, 8.4. Using nslookup  
- Morris worm : Building Internet Firewalls, 8.1. Electronic Mail 
- Morris, Robert T. 
       - Practical UNIX & Internet Security, 1. Introduction   
- Practical UNIX & Internet Security, 8.6. The UNIX Encrypted Password System    
- Practical UNIX & Internet Security, 17.4. Security Implications of Network Services  
   
 - Mosaic 
    - Building Internet Firewalls, 2.5. The World Wide Web   
- TCP/IP Network Administration, 13.1. The World Wide Web  
  
 - motd file : Practical UNIX & Internet Security, 26.2.6. Other Tips  
- Motorola, Inc. : Practical UNIX & Internet Security, F.3.4.20. Motorola, Inc. 
- mount command 
      - Practical UNIX & Internet Security, 20.3. Client-Side NFS Security   
- TCP/IP Network Administration, 9.1.3.1. The mount command    
- Practical UNIX & Internet Security, 5.5.5. Turning Off SUID and SGID in Mounted Filesystems  
   
 - mount daemon (mountd) 
    - Building Internet Firewalls, 5.8.2.4. Which services should you disable?   
- TCP/IP Network Administration, 9.1.1. NFS Daemons  
  
 - mount point : TCP/IP Network Administration, 9.1.3.1. The mount command  
- mounted filesystems 
     - Building Internet Firewalls, 5.8.4.3. Mount filesystems as read-only   
- Practical UNIX & Internet Security, 5.5.5. Turning Off SUID and SGID in Mounted Filesystems    
- TCP/IP Network Administration, 9.1.3. Mounting Remote Filesystems    
- (see also directories) 
    
 - mounting directory : TCP/IP Network Administration, 9.1. The Network File System  
- mpeg video subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions 
- mqueue directory : (see queue directory) 
- mqueue temporary files : TCP/IP Network Administration, 10.5.4. The Set Option Command  
- mrand48 function : Practical UNIX & Internet Security, 23.7.3. drand48  (  ), lrand48  (  ), and mrand48  (  ) 
- mrouter 
         - Building Internet Firewalls, 6.3.3.5. IP over IP   
- Building Internet Firewalls, 8.9.3. The Multicast Backbone (MBONE) 
  
 - MRU (maximum receive unit) : TCP/IP Network Administration, A.2. The PPP Daemon 
- ${ms} macro : sendmail, D.1. Sun Enhancements  
- msgid= equate (syslog output) : sendmail, 26.1.3.5. msgid= the Message-ID: identifier  
- MTAs 
       - Building Internet Firewalls, 8.1. Electronic Mail   
- sendmail, 1.1. MUA Versus MTA    
- sendmail, 5.3.1. Mail Delivery Agents    
- sendmail, 6.2. Define a Mail Delivery Agent    
- sendmail, 30. Delivery Agents   
- (see also M configuration command)   
- $# operator and   
            - sendmail, 9.2.1. The Delivery Agent ($#)      
- sendmail, 28.6.5. Specify a Delivery Agent: $#    
  
   - advantages to sendmail : sendmail, 18.1. To Use or Not to Use    
- choosing   
       - sendmail, 9. Rule Set 0      
- sendmail, 9.5. Things to Try    
  
   - declaring : sendmail, 19.3.2. MAILER()    
- default : sendmail, 34.8. Alphabetized Reference    
- equates for : sendmail, 30.4. The Equates   
- for errors : sendmail, 9.4. The error Delivery Agent    
- expensive   
          - sendmail, 23.6.1. Periodically with -q      
- sendmail, 30.8. Alphabetized F= Flags     
- sendmail, 34.8. Alphabetized Reference    
   
   - flags   
      - sendmail, 6.3. The local Delivery Agent      
- sendmail, 6.4. Add the Missing Parts to Mhub      
- sendmail, 14.2. Headers Versus Delivery Agent Flags     
- sendmail, 30.8. Alphabetized F= Flags     
- sendmail, 35.4. ?flags? in Header Definitions    
     
   - ignoring MX records : sendmail, 21.3.5. What? They Ignore MX Records?    
- local   
       - sendmail, 6.3. The local Delivery Agent      
- sendmail, 19.6. Alphabetized m4 Macros    
  
   - logging : sendmail, 26.1.3.4. mailer= the delivery agent used    
- printing list of : sendmail, 38.4.2. Show Delivery Agents with =M    
- as recipients : sendmail, 30.8. Alphabetized F= Flags   
- scripts via : sendmail, 24.3. Write a Delivery Agent Script    
- statistics : (see statistics)   
- symbolic name : sendmail, 30.2. The Symbolic Name   
- testing : sendmail, 38.5.6. Try a Delivery Agent with /try    
- UUCP : sendmail, 19.4.6. UUCP  
        
 - mtime 
    - Practical UNIX & Internet Security, 5.1.2. Inodes   
- Practical UNIX & Internet Security, 5.1.5. File Times   
- Practical UNIX & Internet Security, 9.2.2. Checklists and Metadata   
- Practical UNIX & Internet Security, 24.4.1.6. Changes to startup files  
    
 - MTU (maximum transmission unit) 
    - Building Internet Firewalls, C.5.1.3. Fragmenting datagrams   
- TCP/IP Network Administration, 1.5.1.3. Fragmenting datagrams   
- TCP/IP Network Administration, 6.1.1. Determining the Interface Name    
- TCP/IP Network Administration, 6.1.2. Checking the Interface with ifconfig    
- TCP/IP Network Administration, 6.1.5.4. Maximum transmission unit    
- TCP/IP Network Administration, A.1. Dial-Up IP   
- determining smallest : TCP/IP Network Administration, 5.2. Linux Kernel Configuration  
       
 - MUAs (mail user agents) 
    - sendmail, 1.1. MUA Versus MTA    
- sendmail, 36.7. Alphabetized Reference    
- (see also delivery agents) 
   
 - MUDs (Multiuser Dungeons) : Practical UNIX & Internet Security, 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC) 
- Muffet, Alec : Practical UNIX & Internet Security, 10.5.3.1. Beware false log entries 
- Multicast Backbone : (see MBONE) 
- multicast groups : Practical UNIX & Internet Security, 16.2.1.2. Classical network addresses 
- multicast IP : Building Internet Firewalls, 6.3.3.5. IP over IP 
- multicasting 
         - Building Internet Firewalls, 8.9.3. The Multicast Backbone (MBONE)   
- TCP/IP Network Administration, 6.1.2. Checking the Interface with ifconfig    
- TCP/IP Network Administration, 6.1.5.5. Point-to-point    
- addresses   
         - TCP/IP Network Administration, 2.2.1. Address Classes     
- TCP/IP Network Administration, 2.2.2.1. Final notes on IP addresses     
- TCP/IP Network Administration, 2.6. Address Resolution     
- TCP/IP Network Administration, 7.4.2. RIP Version 2    
    
   - routing, support for   
      - TCP/IP Network Administration, 5.2. Linux Kernel Configuration      
- TCP/IP Network Administration, 5.3.1.1. Options    
  
 
 - Multichannel Memorandum Distribution Facility (MMDF) : TCP/IP Network Administration, 10. sendmail  
- multicharacter 
     - names : (see names)   
- options : (see options, sendmail) 
  
 - MULTICS (Multiplexed Information and Computing Service) : Practical UNIX & Internet Security, 1.3. History of UNIX  
- multidirectional connections : Building Internet Firewalls, 7.4.2. Unidirectional Versus Multidirectional 
- multihomed 
      - hosts   
      - Building Internet Firewalls, C.5.1.2. Routing datagrams     
- TCP/IP Network Administration, 5.3.1.1. Options      
- TCP/IP Network Administration, 8.2.1. The Resolver Configuration File      
- architecture of : TCP/IP Network Administration, 12.7. Firewalls    
    
   - site : TCP/IP Network Administration, 4.3.1. Obtaining an autonomous system number  
 
 - multilevel security 
    - Practical UNIX & Internet Security, 1.3. History of UNIX    
- Practical UNIX & Internet Security, 2.4.4.7. Defend in depth   
- Practical UNIX & Internet Security, 2.5.3. Final Words: Risk Management Means  Common Sense   
- Practical UNIX & Internet Security, 17.2. Controlling Access to Servers 
    
 - multimedia mail : (see email) 
- multipart content type : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions 
- multipart encryption : (see encryption) 
- multipart messages : (see messages) 
- multiple 
        - recipients : sendmail, 30.8. Alphabetized F= Flags   
- SMTP connections : sendmail, 34.8. Alphabetized Reference    
- timeouts : sendmail, 34.8. Alphabetized Reference  
   
 - multiplexing 
    - TCP/IP Network Administration, 2.1. Addressing, Routing, and Multiplexing   
- TCP/IP Network Administration, 2.7. Protocols, Ports, and Sockets 
  
 - Multipurpose Internet Mail Extensions : (see MIME) 
- multitasking 
     - Practical UNIX & Internet Security, 1.4. Security and UNIX    
- Practical UNIX & Internet Security, C.1.3.3. Process priority and niceness  
  
 - multiuser operating systems : Practical UNIX & Internet Security, 1.4. Security and UNIX  
- multiuser workstations : Practical UNIX & Internet Security, 17.3.21.1. etc/fbtab and /etc/logindevperm 
- munitions export : Practical UNIX & Internet Security, 26.4.1. Munitions Export 
- MustQuoteChars option : sendmail, 34.8. Alphabetized Reference  
- MX records 
        - Building Internet Firewalls, 8.10.5.1. Set up a `fake'   
- Practical UNIX & Internet Security, 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)   
- sendmail, 15.3. MX Records    
- sendmail, 18.8. Alphabetized Reference    
- sendmail, 21.3. Set Up MX Records    
- sendmail, 34.8. Alphabetized Reference    
- sendmail, 38.5.2. Look Up MX Records with /mx    
- TCP/IP Network Administration, 8.3.2. Standard Resource Records    
- TCP/IP Network Administration, 8.3.6. The named.hosts File    
- TCP/IP Network Administration, 8.4. Using nslookup    
- TCP/IP Network Administration, 10.7.1. Modifying Local Information    
- TCP/IP Network Administration, C.3.1.4. Mail exchanger record   
- 0 flag : sendmail, 30.8. Alphabetized F= Flags   
- bestmx database class : sendmail, 33.8. Alphabetized Reference    
- bestmx_is_local feature : sendmail, 19.6. Alphabetized m4 Macros    
- fallback MX host : sendmail, 34.8. Alphabetized Reference    
- ignored by delivery agents : sendmail, 21.3.5. What? They Ignore MX Records?    
- looking up for addresses : sendmail, 21.2.3. Look Up Addresses for Delivery    
- offsite hosts : sendmail, 21.5.1. Offsite MX Hosts    
- with wildcards : sendmail, 21.3.4. Wildcard MX Records  
                    
 - /mx rule-testing command : sendmail, 38.5.2. Look Up MX Records with /mx  
- MYNAME= command : Practical UNIX & Internet Security, 15.5.2. Permissions Commands  
  
   
  Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z  
Copyright © 1999  O'Reilly & Associates, Inc. All Rights Reserved.