start page | rating of books | rating of authors | reviews | copyrights
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: M
- m class
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 32.5. Alphabetized Reference
- M configuration command
- sendmail, 5.3.1. Mail Delivery Agents
- sendmail, 6.2. Define a Mail Delivery Agent
- sendmail, 6.3. The local Delivery Agent
- sendmail, 30.1. Configuration File Syntax
- -m database switch : sendmail, 33.3.4.5. -m suppress replacement on match (V8.1 and above)
- m flag : sendmail, 30.8. Alphabetized F= Flags
- M flag
- sendmail, 14.2.3. The Message-ID: Header
- sendmail, 30.8. Alphabetized F= Flags
- M line (qf file)
- sendmail, 23.4.1. Printing the Queue in Verbose Mode
- sendmail, 23.9. The qf File Internals
- M lines in sendmail.cf : sendmail, 3.1. Role in the Filesystem
- $m macro
- sendmail, 7.3.1. The hostname
- sendmail, 12.1.7. Adding the Domain
- sendmail, 31.10. Alphabetized Reference
- $M macro : sendmail, 31.10. Alphabetized Reference
- m option : (see MeToo (m) option)
- M option
- sendmail, 31.2. Command-Line Definitions
- sendmail, 34.1.3. Appropriateness of Options
- sendmail, 34.8. Alphabetized Reference
- M rule-testing command : sendmail, 38.4.2. Show Delivery Agents with =M
- -m switch (sendmail)
- sendmail, 18.3.2. The makesendmail Script
- sendmail, 36.7. Alphabetized Reference
- -M switch (sendmail)
- sendmail, 31.2. Command-Line Definitions
- sendmail, 36.7. Alphabetized Reference
- m4 macros
- TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros
- TCP/IP Network Administration, E.3. m4 sendmail Macros
- m4 preprocessor
- sendmail, 16.3. Run m4
- sendmail, 19. V8 m4 Configuration
- class macros and : sendmail, 32.3. Class with m4
- comments in files : sendmail, 19.5. Pitfalls
- configuration version : sendmail, 31.10. Alphabetized Reference
- database maps and : sendmail, 33.6. Database Maps and m4
- delivery agent configuration : sendmail, 30.3. m4 Configuration Syntax
- diversions : sendmail, 19.1.4. m4 diversions
- macros and : sendmail, 31.8. Macros with the m4 Technique
- rule sets and : sendmail, 29.2. Rule Sets and m4
- sendmail options and : sendmail, 34.3. Configuring with V8 m4 Options
- M= equate : sendmail, 30.4. The Equates
- MAC (Mandatory Access Controls) : Practical UNIX & Internet Security, 4.1.3. Groups and Group Identifiers (GIDs)
- MACH operating system : Practical UNIX & Internet Security, 1.3. History of UNIX
- machine
- auditing : (see auditing)
- backing up : Building Internet Firewalls, 13.5.1. Backing Up Your Filesystems
- choosing : Building Internet Firewalls, 5.3. Choosing a Machine
- configuring : Building Internet Firewalls, 5.8.4. Reconfiguring for Production
- connecting : Building Internet Firewalls, 5.8.6. Connecting the Machine
- disconnecting or shutting down : Building Internet Firewalls, 13.4.3. Planning for Disconnecting or
- hardware : (see hardware)
- hijacking : Building Internet Firewalls, 10.1.1. Hijacking
- name : Practical UNIX & Internet Security, 16.2.3. Hostnames
- physical location of : Building Internet Firewalls, 5.4. Choosing a Physical Location
- securing : Building Internet Firewalls, 5.8.1. Securing the Machine
- software : (see software)
- speed of : Building Internet Firewalls, 5.3.2. How Fast a Machine?
- MACHINE= command
- Practical UNIX & Internet Security, 15.5.1.2. Name-value pairs
- Practical UNIX & Internet Security, 15.5.2. Permissions Commands
- macid() : sendmail, 20.3. Alphabetized V8.8 Subroutines
- Macintosh
- Practical UNIX & Internet Security, 18.2. Running a Secure Server
- sendmail, 3.3.3. Other Protocols
- macro conditionals
- sendmail, 14.1.3. Testing So Far
- sendmail, 31.6. Macro Conditionals: $?, $|, and $.
- TCP/IP Network Administration, 10.5.2.1. Conditionals
- macro virus : (see viruses)
- macros
- sendmail, 5.3.2. Macros
- sendmail, 7. Macros
- sendmail, 31.9. Pitfalls
- class macros
- sendmail, 5.3.5. Class Macros
- sendmail, 12. Class
- sendmail, 32. Class Macros
- classes and : sendmail, 12.1.1.1. A caveat
- database macros : sendmail, 33. Database Macros
- declaring
- sendmail, 7.2. Defining Macros
- sendmail, 31.2. Command-Line Definitions
- defining
- sendmail, 19.4.2. Define Macros
- sendmail, 20.3. Alphabetized V8.8 Subroutines
- sendmail, 36.7. Alphabetized Reference
- sendmail, 38.2.1. Define a Macro with .D
- with M option : sendmail, 34.8. Alphabetized Reference
- dumping : sendmail, 38.3. Dump a Macro
- expanding : TCP/IP Network Administration, 10.6.2. Transforming the Address
- fetching value of : sendmail, 20.3. Alphabetized V8.8 Subroutines
- file class macros : sendmail, 5.3.6. File Class Macros
- for compiling sendmail : sendmail, 18.8. Alphabetized Reference
- in header fields : sendmail, 35.3.1. Macros in the Header Field
- initializing : sendmail, 36.4.2.2. Initialize macros
- m4 preprocessor : sendmail, 19. V8 m4 Configuration
- naming
- sendmail, 5.3.2. Macros
- sendmail, 7.2. Defining Macros
- sendmail, 31.4. Macro Names
- converting names to integers : sendmail, 20.3. Alphabetized V8.8 Subroutines
- predefined
- sendmail, 7.3. Predefined Macros
- sendmail, 31.1. Preassigned Macros
- required : sendmail, 31.3.1. Required Macros (V8.6 and earlier)
- restoring macro values : sendmail, 23.9. The qf File Internals
- in rule set names : sendmail, 29.1.4. Macros in Rule-Set Names
- in rules : sendmail, 28.1.1. Macros in Rules
- for time and date : sendmail, 31.7.2. Macros and the Date
- macvalue() : sendmail, 20.3. Alphabetized V8.8 Subroutines
- MAEs (Metropolitan Area Exchanges) : TCP/IP Network Administration, 1.1. TCP/IP and the Internet
- magic cookies : Practical UNIX & Internet Security, 17.3.21.4. Using Xauthority magic cookies
- magic number
- Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail
- TCP/IP Network Administration, A.2. The PPP Daemon
- mail
- (see email)
- (see sendmail)
- MAIL command (SMTP)
- sendmail, 29.10.1. The check_mail Rule Set
- sendmail, 34.8. Alphabetized Reference
- Mail Exchanger records : (see MX records)
- "Mail-From:" header line : sendmail, 35.10. Alphabetized Reference
- mail hubs : (see hubs)
- /mail/imap.tar.Z file : TCP/IP Network Administration, 9.7.2. IMAP Server
- mail program
- Practical UNIX & Internet Security, 15.1.3. mail Command
- sendmail, 3.2.1. Delivery to a Mailbox
- mail11 program : sendmail, 3.3.3. Other Protocols
- Mail_Aliases table (NIS+) : Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
- MAIL_HUB macro (m4)
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 31.10. Alphabetized Reference
- mailbox file : sendmail, 3.2.1. Delivery to a Mailbox
- mailbox servers : TCP/IP Network Administration, 9.7. Mail Servers
- synchronizing : TCP/IP Network Administration, 9.7.2. IMAP Server
- mailer
- definition fields : TCP/IP Network Administration, 10.5.8. Defining Mailers
- common : TCP/IP Network Administration, 10.5.8.1. Some common mailer definitions
- local : TCP/IP Network Administration, 10.5.8. Defining Mailers
- MAILER command (UUCP) : sendmail, 31.10. Alphabetized Reference
- MAILER() (m4)
- sendmail, 19.3.2. MAILER()
- sendmail, 30.3. m4 Configuration Syntax
- MAILER-DAEMON alias
- sendmail, 3.1.1. The Aliases File
- sendmail, 24.4.2. The MAILER-DAEMON Alias
- sendmail, 31.10. Alphabetized Reference
- (see also $n macro)
- MAILER source file (in sendmail)
- TCP/IP Network Administration, E.3. m4 sendmail Macros
- TCP/IP Network Administration, E.3.5. MAILER
- values available, listed : TCP/IP Network Administration, E.3.5. MAILER
- mailer= equate (syslog output) : sendmail, 26.1.3.4. mailer= the delivery agent used
- MAILER_DEFINITIONS macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
- mailertable database
- sendmail, 19.6. Alphabetized m4 Macros
- TCP/IP Network Administration, 10.7.1. Modifying Local Information
- mailing lists
- Practical UNIX & Internet Security, E.1. Mailing Lists
- Practical UNIX & Internet Security, E.1.3.10. WWW-security
- sendmail, 1.3.3. Aliases and Mailing Lists
- sendmail, 17.1.2.1. A rule to handle List:;
- sendmail, 20.2.2. Workstation Refuses to Act as a Mail Gateway
- sendmail, 34.8. Alphabetized Reference
- (see also email)
- exploder lists : sendmail, 25.4. Exploder Mailing Lists
- EXPN command (SMTP) : sendmail, 22.3.2. SMTP vrfy and expn
- for distributing security information : TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
- for exchanging information and ideas : TCP/IP Network Administration, 13.5. Mailing Lists
- :include: directive
- sendmail, 22.5.2. Permissions for :include:
- sendmail, 23.9. The qf File Internals
- sendmail, 25.2. :include: Mailing Lists
- including oneself on : sendmail, 34.8. Alphabetized Reference
- internal : sendmail, 25.1. Internal Mailing Lists
- joining : TCP/IP Network Administration, 13.5. Mailing Lists
- keeping current : Building Internet Firewalls, 12.3.1.1. Mailing lists
- list precedence : sendmail, 14.4. Precedence
- owner : sendmail, 25.3. Defining a Mailing List Owner
- packages for : sendmail, 25.6. Packages That Help
- resources via : Building Internet Firewalls, A.3. Mailing Lists
- sendmail and : TCP/IP Network Administration, 10.1. sendmail's Function
- troubleshooting : sendmail, 25.5. Problems with Mailing Lists
- mailq command
- sendmail, 4.1.2. Show Queue Mode (-bp)
- sendmail, 36.1.2. mailq
- mailstats program : sendmail, 26.2.2. Viewing Statistics: mailstats
- maintaining firewalls : Building Internet Firewalls, 12. Maintaining Firewalls
- maintenance mode : Practical UNIX & Internet Security, C.5.1. Process #1: /etc/init
- maintenance personnel : Practical UNIX & Internet Security, 13.3. Outsiders
- maintenance toolkits, ready-made : TCP/IP Network Administration, 11.2. Diagnostic Tools
- Majordomo package
- sendmail, 25.6.1. Majordomo
- TCP/IP Network Administration, 13.5. Mailing Lists
- make command
- sendmail, 2.5. Build
- TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- make config command : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- make install.man : TCP/IP Network Administration, 9.4. A BOOTP Server
- make zImage command : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- in NIS : TCP/IP Network Administration, 9.3. Network Information Service
- makedbm program : Practical UNIX & Internet Security, 19.4.4.1. Setting up netgroups
- Makefile file
- sendmail, 2.4. Preliminaries
- sendmail, 18.4. Tuning Makefile
- db library package : sendmail, C.2. Get the Source
- makemap command
- sendmail, 33.2. Create Files with makemap
- TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros
- TCP/IP Network Administration, E.1. Compiling sendmail
- TCP/IP Network Administration, E.4.4. The sendmail K Command
- makesendmail script
- sendmail, 2.4. Preliminaries
- sendmail, 18.3.2. The makesendmail Script
- sendmail, 18.6. Install sendmail
- malware : Practical UNIX & Internet Security, 11.1. Programmed Threats: Definitions
- man pages : Practical UNIX & Internet Security, 2.5. The Problem with Security Through Obscurity
- man-in-the-middle forgery : Building Internet Firewalls, 6.6.1. Risks of Filtering by Source
- Management Information Base (MIB) : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- management tools : Building Internet Firewalls, 2.10. Network Management Services
- management, role of
- Practical UNIX & Internet Security, 2.3.4. Convincing Management
- Practical UNIX & Internet Security, 2.5. The Problem with Security Through Obscurity
- managing accounts : Building Internet Firewalls, 12.1.2. Managing Your Accounts
- MANs (Metropolitan Networks) : Practical UNIX & Internet Security, 16.1. Networking
- manual logging
- Practical UNIX & Internet Security, 10.7. Handwritten Logs
- Practical UNIX & Internet Security, 10.7.2.2. Informational material
- manual pages : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- manual sendmail use : sendmail, 1.4. Run sendmail by Hand
- map
- TCP/IP Network Administration, 1.7. Application Layer
- (see also automounter daemon)
- (see also /etc/hosts file)
- (see also /etc/networks file)
- (see also IMAP)
- (see also Network Information Service)
- (see also portmapper)
- building : TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- name assigned a database : TCP/IP Network Administration, 10.6.2.1. Transforming with a database
- NIS : (see NIS)
- /map rule-testing command : sendmail, 38.5.3. Look up a Database Item with /map
- map_lookup() : sendmail, 20.3. Alphabetized V8.8 Subroutines
- martians
- TCP/IP Network Administration, 4.2.1. Obtaining an IP Address
- TCP/IP Network Administration, B.7. Definition Statements
- mask information : (see information)
- masking
- TCP/IP Network Administration, 2.2.2. Classless IP Addresses
- TCP/IP Network Administration, 2.3. Subnets
- MASQUERADE_AS macro (m4)
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 31.10. Alphabetized Reference
- MASQUERADE_DOMAIN macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
- MASQUERADE_DOMAIN_FILE macro (m4) : sendmail, 19.6. Alphabetized m4 Macros
- masquerade_entire_domain feature : sendmail, 19.6. Alphabetized m4 Macros
- masquerade_envelope feature : sendmail, 19.6. Alphabetized m4 Macros
- masquerading
- sendmail, 19.4.4. Masquerading
- sendmail, 19.6. Alphabetized m4 Macros
- TCP/IP Network Administration, E.3.2. FEATURE
- TCP/IP Network Administration, E.3.4. DOMAIN
- Massey, James L. : Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- Master mode (uucico) : Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work
- master server
- Practical UNIX & Internet Security, 19.4. Sun's Network Information Service (NIS)
- (see also NIS)
- MatchGecos (G) option
- sendmail, 20.1.2. Global Variables
- sendmail, 34.8. Alphabetized Reference
- MATCHGECOS macro : sendmail, 18.8. Alphabetized Reference
- matching : (see wildcard operators)
- MAX... macros : sendmail, 18.8. Alphabetized Reference
- MaxDaemonChildren option
- sendmail, 34.1.3. Appropriateness of Options
- sendmail, 34.8. Alphabetized Reference
- MaxHopCount (h) option : sendmail, 34.8. Alphabetized Reference
- maximum line length
- sendmail, 30.4. The Equates
- sendmail, 30.8. Alphabetized F= Flags
- maximum receive unit (MRU) : TCP/IP Network Administration, A.2. The PPP Daemon
- maximum transmission unit (MTU)
- Building Internet Firewalls, C.5.1.3. Fragmenting datagrams
- TCP/IP Network Administration, 1.5.1.3. Fragmenting datagrams
- TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- TCP/IP Network Administration, 6.1.2. Checking the Interface with ifconfig
- TCP/IP Network Administration, 6.1.5.4. Maximum transmission unit
- TCP/IP Network Administration, A.1. Dial-Up IP
- determining smallest : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- MAXLINE variable : sendmail, 18.8. Alphabetized Reference
- MaxMessageSize : sendmail, 34.8. Alphabetized Reference
- maxpacketsize : TCP/IP Network Administration, B.8.6. The egp Statement
- MaxQueueRunSize option
- sendmail, 23.4. Printing the Queue
- sendmail, 34.8. Alphabetized Reference
- MAXRWSETS variable : sendmail, 29.1.2. Rule-Set Names
- MBONE (Multicast Backbone)
- Building Internet Firewalls, 2.8. Real-Time Conferencing
- TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- TCP/IP Network Administration, 5.3.1.1. Options
- configuring : Building Internet Firewalls, 8.9.3. The Multicast Backbone (MBONE)
- mc files
- sendmail, 19.3. The Minimal mc File
- sendmail, 19.6. Alphabetized m4 Macros
- MCERT : Practical UNIX & Internet Security, F.3.4.21. Motorola, Inc.
- MCI Corporation : Practical UNIX & Internet Security, F.3.4.19. MCI Corporation
- MD2 algorithm : Practical UNIX & Internet Security, 6.5.4.1. MD2, MD4, and MD5
- MD4 algorithm
- Building Internet Firewalls, 10.3.1. One-Time Passwords
- Practical UNIX & Internet Security, 6.5.4.1. MD2, MD4, and MD5
- MD5 algorithm
- Practical UNIX & Internet Security, 6.5.2. Using Message Digests
- Practical UNIX & Internet Security, 6.5.4.1. MD2, MD4, and MD5
- Practical UNIX & Internet Security, 23.5.1. Use Message Digests for Storing Passwords
- Practical UNIX & Internet Security, 23.9. A Good Random Seed
- digital signatures versus : Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
- in POP : Practical UNIX & Internet Security, 17.3.10. Post Office Protocol (POP) (TCP Ports
- MDAs (mail delivery agents) : (see MTAs)
- media : Practical UNIX & Internet Security, 12.3.3. Other Media
- damaged by smoke : Practical UNIX & Internet Security, 12.2.1.2. Smoke
- destroying : Practical UNIX & Internet Security, 12.3.2.3. Sanitize your media before disposal
- failure of : Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
- hard/soft disk quotas : Practical UNIX & Internet Security, 25.2.2.5. Using quotas
- print through process : Practical UNIX & Internet Security, 12.3.2.1. Verify your backups
- rotating for backups : Practical UNIX & Internet Security, 7.1.3. Types of Backups
- rotation of : Practical UNIX & Internet Security, 7.2.1.2. Media rotation
- sanitizing : Practical UNIX & Internet Security, 12.3.2.3. Sanitize your media before disposal
- viruses from : Practical UNIX & Internet Security, 11.1.5. Viruses
- meet-in-the-middle attacks : Practical UNIX & Internet Security, 6.4.5.1. Double DES
- MEMCHUNKSIZE macro : sendmail, 18.8. Alphabetized Reference
- memory
- Building Internet Firewalls, 1.1.2. Your Resources
- Building Internet Firewalls, 5.3.3. What Hardware Configuration?
- Practical UNIX & Internet Security, 25.2.2. Disk Attacks
- Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
- sendmail, 34.8. Alphabetized Reference
- hidden space : Practical UNIX & Internet Security, 25.2.2.7. Hidden space
- for logs
- Building Internet Firewalls, 12.1.3. Managing Your Disk Space
- Building Internet Firewalls, 12.2.2. What Should You Watch For?
- managing : Building Internet Firewalls, 12.1.3. Managing Your Disk Space
- reserved space : Practical UNIX & Internet Security, 25.2.2.6. Reserved space
- swap space : Practical UNIX & Internet Security, 25.2.3. Swap Space Problems
- /tmp directory and : Practical UNIX & Internet Security, 25.2.4. /tmp Problems
- tree-structure attacks : Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
- memory-to-memory copies : TCP/IP Network Administration, 6.1.5.2. ARP and trailers
- merging interior and exterior routers : Building Internet Firewalls, 4.3.2. It's OK to Merge the Interior Router and the Exterior Router
- Merkle, Ralph : Practical UNIX & Internet Security, 6.4.5.1. Double DES
- Message Authentication Code (MAC) : Practical UNIX & Internet Security, 6.5.5.2. Message authentication codes
- Message Digest 5 (MD5) cryptographic checksum
- TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- TCP/IP Network Administration, 7.7.1.1. A host configuration
- TCP/IP Network Administration, B.8.2. The rip Statement
- message digests
- Practical UNIX & Internet Security, 6.5. Message Digests and Digital Signatures
- Practical UNIX & Internet Security, 6.5.2. Using Message Digests
- Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
- Practical UNIX & Internet Security, 23.5.1. Use Message Digests for Storing Passwords
- Tripwire package
- Practical UNIX & Internet Security, 9.2.4. Tripwire
- Practical UNIX & Internet Security, 9.2.4.2. Running Tripwire
- "Message:" header line : sendmail, 35.10. Alphabetized Reference
- message queue : (see queue)
- "Message-ID:" header line
- sendmail, 1.5. The Header
- sendmail, 13.4. Sending Mail
- sendmail, 14.2.3. The Message-ID: Header
- sendmail, 26.1.3.5. msgid= the Message-ID: identifier
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 35.5.16. Replacing Headers with H_ACHECK
- sendmail, 35.10. Alphabetized Reference
- message_volume.sh script : sendmail, 26.1.4.1. message_volume.sh
- messages file : TCP/IP Network Administration, 12.4.2.2. Checking login activity
- messages log file : Practical UNIX & Internet Security, 10.2.3. messages Log File
- messages, error : (see error messages)
- messages, email
- sendmail, 34.8. Alphabetized Reference
- TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
- TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
- assigning priority to : TCP/IP Network Administration, 10.5.6. Defining Mail Precedence
- blank lines ending : sendmail, 30.8. Alphabetized F= Flags
- body of
- sendmail, 1.6. The Body
- sendmail, 23.2.2. The Data (Message Body) File: df
- (see also -B switch (sendmail))
- bouncing
- sendmail, 10.3. Missing Addresses
- sendmail, 13.2.2. Limit the Life of Queued Messages
- sendmail, 14.4. Precedence
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 22.8.3.4. The PostmasterCopy option
- sendmail, 23.3.6. Savemail Panic
- sendmail, 23.7.1. Handling a Down Site
- sendmail, 24.4.1. The Postmaster Alias
- sendmail, 25.5.1. Reply Versus Bounce
- sendmail, 25.5.3. A list-bounced Alias
- sendmail, 34.8. Alphabetized Reference
- sendmail, 35.10. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- (see also $n macro)
- content type : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- converting between 7- and 8-bit : sendmail, 18.8. Alphabetized Reference
- delivering : (see delivery)
- envelope : (see envelope)
- encapsulated : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- error : (see errors)
- flooding : Practical UNIX & Internet Security, 25.3.2. Message Flooding
- forged : sendmail, 22.7. Forged Mail
- forwarding : sendmail, 35.7. Forwarding with Resent-Headers
- forwarding loops : sendmail, 25.7.2. Forwarding Loops
- headers for : (see headers, message)
- holding : (see queue)
- hop count : (see hop count)
- hub's acceptance of : sendmail, 15.4. Hub Accepts Mail for Client
- leading dots in : sendmail, 34.8. Alphabetized Reference
- limiting size of : sendmail, 20.2.3. Limit the Size of Guest Messages
- multipart subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- multiple objects in single : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- origin date of : (see $a macro)
- priority of
- sendmail, 14.4. Precedence
- (see priority, message)
- processing limits on : sendmail, 23.5. How the Queue Is Processed
- queue
- sendmail, 1.3.2. The Queue
- sendmail, 23. The Queue
- checkpointing : sendmail, 34.8. Alphabetized Reference
- down sites and : sendmail, 23.7.1. Handling a Down Site
- lifetime
- sendmail, 13.2.2. Limit the Life of Queued Messages
- sendmail, 34.8. Alphabetized Reference
- message life : sendmail, 13.2.2. Limit the Life of Queued Messages
- message parts : sendmail, 23.2. Parts of a Queued Message
- printing
- sendmail, 4.1.2. Show Queue Mode (-bp)
- sendmail, 23.2.3.2. Locks shown when printing the queue
- sendmail, 23.4. Printing the Queue
- sendmail, 36.7. Alphabetized Reference
- processing
- sendmail, 23.5. How the Queue Is Processed
- sendmail, 23.9. The qf File Internals
- sendmail, 36.7. Alphabetized Reference
- putting everything in : sendmail, 34.8. Alphabetized Reference
- requeuing on error : sendmail, 25.7.6. Force Requeue on Error
- sendmail options for : sendmail, 34.6.2. The Queue
- sorting : sendmail, 34.8. Alphabetized Reference
- time message placed in : sendmail, 23.9. The qf File Internals
- troubleshooting : sendmail, 23.8. Pitfalls
- why message is stored in : sendmail, 23.9. The qf File Internals
- rejecting
- sendmail, 18.8. Alphabetized Reference
- sendmail, 20.2.6. Reject Mail from Spamming or Mail-bombing Sites
- relays for : sendmail, 19.4.5. Relays
- sending
- sendmail, 13.4. Sending Mail
- sendmail, 14.5. Sending Real Mail
- size of
- sendmail, 26.1.3.10. size= the size of the message
- sendmail, 30.4. The Equates
- sendmail, 34.8. Alphabetized Reference
- stored in queue in error : sendmail, 23.9. The qf File Internals
- time placed in queue : sendmail, 23.9. The qf File Internals
- unique identifier for
- sendmail, 13.4. Sending Mail
- sendmail, 14.2.3. The Message-ID: Header
- sendmail, 26.1.3.5. msgid= the Message-ID: identifier
- messages, SMTP greeting
- sendmail, 31.10. Alphabetized Reference
- sendmail, 34.8. Alphabetized Reference
- messages, warning : (see warning messages)
- meta characters : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- meta-packets, and filtering : Building Internet Firewalls, 6.8.4. It Should Allow Rules Based on Any
- metadata
- Practical UNIX & Internet Security, 9.2.2. Checklists and Metadata
- Practical UNIX & Internet Security, 9.2.2.2. Ancestor directories
- metasymbols : TCP/IP Network Administration, 10.6.1. Pattern Matching
- for transforming the address : TCP/IP Network Administration, 10.6.2. Transforming the Address
- MeToo (m) option
- sendmail, 34.8. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- metrics : TCP/IP Network Administration, 6.1.5.3. Metric
- arbitrariness of : TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
- incompatibility of : TCP/IP Network Administration, 7.6.1. gated's Preference Value
- Metropolitan Area Exchanges (MAEs) : TCP/IP Network Administration, 1.1. TCP/IP and the Internet
- Metropolitan Networks (MANs) : Practical UNIX & Internet Security, 16.1. Networking
- MH (mail handler) : Practical UNIX & Internet Security, 11.5.2.5. .forward, .procmailrc
- MIB (Management Information Base) : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- MIBI and MIBII : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- Micro-BIT Virus Center : Practical UNIX & Internet Security, F.3.4.16. Germany: Southern area
- mil domain : TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
- Miller, Barton : Practical UNIX & Internet Security, 23.1.2. An Empirical Study of the Reliability of UNIX Utilities
- MILNET : Practical UNIX & Internet Security, F.3.4.20. Motorola, Inc.
- MIME (Multipurpose Internet Mail Extensions)
- Building Internet Firewalls, 8.1.3. Multipurpose Internet Mail Extensions
- Practical UNIX & Internet Security, 11.1.5. Viruses
- sendmail, 5.3.8. Headers
- TCP/IP Network Administration, 1.2. A Data Communications Model
- TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- format errors : sendmail, 34.8. Alphabetized Reference
- headers for : sendmail, 35.6.7. MIME Headers
- sendmail and : TCP/IP Network Administration, 10.5.8. Defining Mailers
- standardizing on : TCP/IP Network Administration, 4.5.3. Planning Your Mail System
- types : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- "MIME-Version:" header line : sendmail, 35.10. Alphabetized Reference
- MIME7TO8 macro : sendmail, 18.8. Alphabetized Reference
- MIME8TO7 macro : sendmail, 18.8. Alphabetized Reference
- MinFreeBlocks (b) option : sendmail, 34.8. Alphabetized Reference
- minicom : TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- minimum matching
- sendmail, 8.7.2. Minimal Matching
- sendmail, 28.5.1. Minimum Matching
- sendmail, 32.2.3. Backup and Retry
- MinQueueAge option
- sendmail, 23.9. The qf File Internals
- sendmail, 34.8. Alphabetized Reference
- minus sign (hyphen)
- in machine conversation : sendmail, 4.2. Verbose (-v)
- non-equivalent host : TCP/IP Network Administration, 12.2.5. Secure the r Commands
- missing addresses : (see addresses, null)
- "Missing username" error : sendmail, 9.4. The error Delivery Agent
- MIT-KERBEROS-5 authentication : Practical UNIX & Internet Security, 17.3.21.3. The xhost facility
- Mitnick, Kevin : Practical UNIX & Internet Security, 27.2.6. Network Providers that Network Too Well
- mixed multipart subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- mknod command : TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- mkpasswd program : Practical UNIX & Internet Security, 8.8.4. Password Generators
- mktemp function : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- mobile network computing : Practical UNIX & Internet Security, 8.7. One-Time Passwords
- mobile systems, requirements of : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- mode command : TCP/IP Network Administration, 6.3.2. Dial-Up PPP
- modem pools : Building Internet Firewalls, 10.6. Terminal Servers and Modem Pools
- modems
- Practical UNIX & Internet Security, 14. Telephone Security
- Practical UNIX & Internet Security, 14.6. Additional Security for Modems
- TCP/IP Network Administration, 1.7. Application Layer
- (see also Automatic Call Unit)
- asynchronous : TCP/IP Network Administration, 5.3.1.2. Pseudo-device
- callback setups
- Practical UNIX & Internet Security, 14.4.2.
- Practical UNIX & Internet Security, 14.6. Additional Security for Modems
- carrier-detect (DCD) indicator, monitoring : TCP/IP Network Administration, 6.3.3. chat
- checking configuration of : TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- clogging : Practical UNIX & Internet Security, 25.3.4. Clogging
- documentation : TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- encrypting : Practical UNIX & Internet Security, 14.6. Additional Security for Modems
- hanging up : (see signals)
- high-speed dial-up : TCP/IP Network Administration, 6.2. TCP/IP Over a Serial Line
- physical security of
- Practical UNIX & Internet Security, 14.5.4. Physical Protection of Modems
- Practical UNIX & Internet Security, 14.6. Additional Security for Modems
- recording call information : Practical UNIX & Internet Security, 10.3.1. aculog File
- synchronous : TCP/IP Network Administration, 5.3.1.2. Pseudo-device
- tracing connections
- Practical UNIX & Internet Security, 24.2.4. Tracing a Connection
- Practical UNIX & Internet Security, 24.2.4.2. How to contact the system administrator of a computer
- UNIX and
- Practical UNIX & Internet Security, 14.5. Modems and UNIX
- Practical UNIX & Internet Security, 14.5.3.3. Privilege testing
- modes
- daemon : sendmail, 4.1.1. Daemon Mode (-bd)
- delivery : sendmail, 13.2.3. The Default Delivery Mode
- sendmail operating : sendmail, 36.7. Alphabetized Reference
- TempFileMode option
- sendmail, 13.2.4. The Default File Permissions
- sendmail, 22.8.3.7. The TempFileMode option
- modification times
- Practical UNIX & Internet Security, 5.1.2. Inodes
- Practical UNIX & Internet Security, 5.1.5. File Times
- Practical UNIX & Internet Security, 7.4.7. inode Modification Times
- Practical UNIX & Internet Security, 9.2.2. Checklists and Metadata
- modifying Internet services : Building Internet Firewalls, 5.8.3. Installing and Modifying Services
- modules, loadable : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- monitoring
- automatically : Building Internet Firewalls, 5.9.2. Consider Writing Software to Automate Monitoring
- hardware for : (see detectors)
- intruders : Practical UNIX & Internet Security, 24.2.3. Monitoring the Intruder
- performance : Practical UNIX & Internet Security, 13.2.3. Performance Reviews and Monitoring
- security : (see logs/logging)
- software
- TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- TCP/IP Network Administration, 12.4.3. Automated Monitoring
- system usage
- Building Internet Firewalls, 12.2. Monitoring Your System
- TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- users : Practical UNIX & Internet Security, 26.2.6. Other Tips
- monitors and screen savers : Practical UNIX & Internet Security, 12.3.5.2. X screen savers
- more command : TCP/IP Network Administration, 8.4. Using nslookup
- Morris worm : Building Internet Firewalls, 8.1. Electronic Mail
- Morris, Robert T.
- Practical UNIX & Internet Security, 1. Introduction
- Practical UNIX & Internet Security, 8.6. The UNIX Encrypted Password System
- Practical UNIX & Internet Security, 17.4. Security Implications of Network Services
- Mosaic
- Building Internet Firewalls, 2.5. The World Wide Web
- TCP/IP Network Administration, 13.1. The World Wide Web
- motd file : Practical UNIX & Internet Security, 26.2.6. Other Tips
- Motorola, Inc. : Practical UNIX & Internet Security, F.3.4.20. Motorola, Inc.
- mount command
- Practical UNIX & Internet Security, 20.3. Client-Side NFS Security
- TCP/IP Network Administration, 9.1.3.1. The mount command
- Practical UNIX & Internet Security, 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
- mount daemon (mountd)
- Building Internet Firewalls, 5.8.2.4. Which services should you disable?
- TCP/IP Network Administration, 9.1.1. NFS Daemons
- mount point : TCP/IP Network Administration, 9.1.3.1. The mount command
- mounted filesystems
- Building Internet Firewalls, 5.8.4.3. Mount filesystems as read-only
- Practical UNIX & Internet Security, 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
- TCP/IP Network Administration, 9.1.3. Mounting Remote Filesystems
- (see also directories)
- mounting directory : TCP/IP Network Administration, 9.1. The Network File System
- mpeg video subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- mqueue directory : (see queue directory)
- mqueue temporary files : TCP/IP Network Administration, 10.5.4. The Set Option Command
- mrand48 function : Practical UNIX & Internet Security, 23.7.3. drand48 ( ), lrand48 ( ), and mrand48 ( )
- mrouter
- Building Internet Firewalls, 6.3.3.5. IP over IP
- Building Internet Firewalls, 8.9.3. The Multicast Backbone (MBONE)
- MRU (maximum receive unit) : TCP/IP Network Administration, A.2. The PPP Daemon
- ${ms} macro : sendmail, D.1. Sun Enhancements
- msgid= equate (syslog output) : sendmail, 26.1.3.5. msgid= the Message-ID: identifier
- MTAs
- Building Internet Firewalls, 8.1. Electronic Mail
- sendmail, 1.1. MUA Versus MTA
- sendmail, 5.3.1. Mail Delivery Agents
- sendmail, 6.2. Define a Mail Delivery Agent
- sendmail, 30. Delivery Agents
- (see also M configuration command)
- $# operator and
- sendmail, 9.2.1. The Delivery Agent ($#)
- sendmail, 28.6.5. Specify a Delivery Agent: $#
- advantages to sendmail : sendmail, 18.1. To Use or Not to Use
- choosing
- sendmail, 9. Rule Set 0
- sendmail, 9.5. Things to Try
- declaring : sendmail, 19.3.2. MAILER()
- default : sendmail, 34.8. Alphabetized Reference
- equates for : sendmail, 30.4. The Equates
- for errors : sendmail, 9.4. The error Delivery Agent
- expensive
- sendmail, 23.6.1. Periodically with -q
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 34.8. Alphabetized Reference
- flags
- sendmail, 6.3. The local Delivery Agent
- sendmail, 6.4. Add the Missing Parts to Mhub
- sendmail, 14.2. Headers Versus Delivery Agent Flags
- sendmail, 30.8. Alphabetized F= Flags
- sendmail, 35.4. ?flags? in Header Definitions
- ignoring MX records : sendmail, 21.3.5. What? They Ignore MX Records?
- local
- sendmail, 6.3. The local Delivery Agent
- sendmail, 19.6. Alphabetized m4 Macros
- logging : sendmail, 26.1.3.4. mailer= the delivery agent used
- printing list of : sendmail, 38.4.2. Show Delivery Agents with =M
- as recipients : sendmail, 30.8. Alphabetized F= Flags
- scripts via : sendmail, 24.3. Write a Delivery Agent Script
- statistics : (see statistics)
- symbolic name : sendmail, 30.2. The Symbolic Name
- testing : sendmail, 38.5.6. Try a Delivery Agent with /try
- UUCP : sendmail, 19.4.6. UUCP
- mtime
- Practical UNIX & Internet Security, 5.1.2. Inodes
- Practical UNIX & Internet Security, 5.1.5. File Times
- Practical UNIX & Internet Security, 9.2.2. Checklists and Metadata
- Practical UNIX & Internet Security, 24.4.1.6. Changes to startup files
- MTU (maximum transmission unit)
- Building Internet Firewalls, C.5.1.3. Fragmenting datagrams
- TCP/IP Network Administration, 1.5.1.3. Fragmenting datagrams
- TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- TCP/IP Network Administration, 6.1.2. Checking the Interface with ifconfig
- TCP/IP Network Administration, 6.1.5.4. Maximum transmission unit
- TCP/IP Network Administration, A.1. Dial-Up IP
- determining smallest : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- MUAs (mail user agents)
- sendmail, 1.1. MUA Versus MTA
- sendmail, 36.7. Alphabetized Reference
- (see also delivery agents)
- MUDs (Multiuser Dungeons) : Practical UNIX & Internet Security, 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
- Muffet, Alec : Practical UNIX & Internet Security, 10.5.3.1. Beware false log entries
- Multicast Backbone : (see MBONE)
- multicast groups : Practical UNIX & Internet Security, 16.2.1.2. Classical network addresses
- multicast IP : Building Internet Firewalls, 6.3.3.5. IP over IP
- multicasting
- Building Internet Firewalls, 8.9.3. The Multicast Backbone (MBONE)
- TCP/IP Network Administration, 6.1.2. Checking the Interface with ifconfig
- TCP/IP Network Administration, 6.1.5.5. Point-to-point
- addresses
- TCP/IP Network Administration, 2.2.1. Address Classes
- TCP/IP Network Administration, 2.2.2.1. Final notes on IP addresses
- TCP/IP Network Administration, 2.6. Address Resolution
- TCP/IP Network Administration, 7.4.2. RIP Version 2
- routing, support for
- TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- TCP/IP Network Administration, 5.3.1.1. Options
- Multichannel Memorandum Distribution Facility (MMDF) : TCP/IP Network Administration, 10. sendmail
- multicharacter
- names : (see names)
- options : (see options, sendmail)
- MULTICS (Multiplexed Information and Computing Service) : Practical UNIX & Internet Security, 1.3. History of UNIX
- multidirectional connections : Building Internet Firewalls, 7.4.2. Unidirectional Versus Multidirectional
- multihomed
- hosts
- Building Internet Firewalls, C.5.1.2. Routing datagrams
- TCP/IP Network Administration, 5.3.1.1. Options
- TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
- architecture of : TCP/IP Network Administration, 12.7. Firewalls
- site : TCP/IP Network Administration, 4.3.1. Obtaining an autonomous system number
- multilevel security
- Practical UNIX & Internet Security, 1.3. History of UNIX
- Practical UNIX & Internet Security, 2.4.4.7. Defend in depth
- Practical UNIX & Internet Security, 2.5.3. Final Words: Risk Management Means Common Sense
- Practical UNIX & Internet Security, 17.2. Controlling Access to Servers
- multimedia mail : (see email)
- multipart content type : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- multipart encryption : (see encryption)
- multipart messages : (see messages)
- multiple
- recipients : sendmail, 30.8. Alphabetized F= Flags
- SMTP connections : sendmail, 34.8. Alphabetized Reference
- timeouts : sendmail, 34.8. Alphabetized Reference
- multiplexing
- TCP/IP Network Administration, 2.1. Addressing, Routing, and Multiplexing
- TCP/IP Network Administration, 2.7. Protocols, Ports, and Sockets
- Multipurpose Internet Mail Extensions : (see MIME)
- multitasking
- Practical UNIX & Internet Security, 1.4. Security and UNIX
- Practical UNIX & Internet Security, C.1.3.3. Process priority and niceness
- multiuser operating systems : Practical UNIX & Internet Security, 1.4. Security and UNIX
- multiuser workstations : Practical UNIX & Internet Security, 17.3.21.1. etc/fbtab and /etc/logindevperm
- munitions export : Practical UNIX & Internet Security, 26.4.1. Munitions Export
- MustQuoteChars option : sendmail, 34.8. Alphabetized Reference
- MX records
- Building Internet Firewalls, 8.10.5.1. Set up a `fake'
- Practical UNIX & Internet Security, 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
- sendmail, 15.3. MX Records
- sendmail, 18.8. Alphabetized Reference
- sendmail, 21.3. Set Up MX Records
- sendmail, 34.8. Alphabetized Reference
- sendmail, 38.5.2. Look Up MX Records with /mx
- TCP/IP Network Administration, 8.3.2. Standard Resource Records
- TCP/IP Network Administration, 8.3.6. The named.hosts File
- TCP/IP Network Administration, 8.4. Using nslookup
- TCP/IP Network Administration, 10.7.1. Modifying Local Information
- TCP/IP Network Administration, C.3.1.4. Mail exchanger record
- 0 flag : sendmail, 30.8. Alphabetized F= Flags
- bestmx database class : sendmail, 33.8. Alphabetized Reference
- bestmx_is_local feature : sendmail, 19.6. Alphabetized m4 Macros
- fallback MX host : sendmail, 34.8. Alphabetized Reference
- ignored by delivery agents : sendmail, 21.3.5. What? They Ignore MX Records?
- looking up for addresses : sendmail, 21.2.3. Look Up Addresses for Delivery
- offsite hosts : sendmail, 21.5.1. Offsite MX Hosts
- with wildcards : sendmail, 21.3.4. Wildcard MX Records
- /mx rule-testing command : sendmail, 38.5.2. Look Up MX Records with /mx
- MYNAME= command : Practical UNIX & Internet Security, 15.5.2. Permissions Commands
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.