start page | rating of books | rating of authors | reviews | copyrights
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: N
- n class : sendmail, 32.5. Alphabetized Reference
- -N database switch : sendmail, 33.3.4.6. -N append a null byte to all keys (V8.1 and above)
- n flag : sendmail, 30.8. Alphabetized F= Flags
- N line (qf file) : sendmail, 23.9. The qf File Internals
- $n macro
- sendmail, 10.3. Missing Addresses
- sendmail, 24.4.2. The MAILER-DAEMON Alias
- sendmail, 31.10. Alphabetized Reference
- n option : (see CheckAliases (n) option)
- -n switch (sendmail)
- sendmail, 18.3.2. The makesendmail Script
- sendmail, 24.6. Prevent Aliasing with -n
- sendmail, 36.7. Alphabetized Reference
- -N switch (makemap) : sendmail, 33.2.1.3. -N append a null byte to all keys
- -N switch (sendmail) : sendmail, 36.7. Alphabetized Reference
- N= equate : sendmail, 30.4. The Equates
- name service
- Practical UNIX & Internet Security, 16.2.6. Name Service
- Practical UNIX & Internet Security, 16.2.6.2. Other naming services
- sendmail, 21.1. Overview
- sendmail, 21.5.2. Offsite Servers
- TCP/IP Network Administration, 1.7. Application Layer
- TCP/IP Network Administration, 8. Configuring DNS Name Service
- (see also DNS)
- addresses : (see addresses)
- name server lookups : sendmail, 33.4.3. $[ and $]: A Special Case
- process : TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
- security and : Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
- troubleshooting
- TCP/IP Network Administration, 11.3. Testing Basic Connectivity
- TCP/IP Network Administration, 11.6. Checking Name Service
- Name Service Switch file (nsswitch.conf) : TCP/IP Network Administration, 9.3.1. The nsswitch.conf file
- name-value pairs in BNU UUCP : Practical UNIX & Internet Security, 15.5.1.2. Name-value pairs
- named daemon
- Building Internet Firewalls, 8.10.5.2. Set up a real DNS
- Practical UNIX & Internet Security, 16.2.6.1. DNS under UNIX
- Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
- TCP/IP Network Administration, 5.4. The Internet Daemon
- TCP/IP Network Administration, 8.1. BIND: UNIX Name Service
- booting : TCP/IP Network Administration, 8.3.3. The Cache Initialization File
- command : TCP/IP Network Administration, C.1. The named Command
- configuring : TCP/IP Network Administration, 8.3. Configuring named
- process : TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
- starting at startup : TCP/IP Network Administration, 8.3.6.1. Starting named
- tools reference : TCP/IP Network Administration, C. A named Reference
- NAMED_BIND macro : sendmail, 18.8. Alphabetized Reference
- named.boot file
- Practical UNIX & Internet Security, 17.3.6.1. DNS zone transfers
- Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
- TCP/IP Network Administration, 8.3.1. The named.boot File
- TCP/IP Network Administration, 11.6.3. Cache corruption
- TCP/IP Network Administration, C.1. The named Command
- configuration commands
- TCP/IP Network Administration, C.2. named.boot Configuration Commands
- TCP/IP Network Administration, 8.3.1. The named.boot File
- named.ca file : TCP/IP Network Administration, 11.6.3. Cache corruption
- named.hosts file : TCP/IP Network Administration, 8.3.6. The named.hosts File
- named.local file : TCP/IP Network Administration, 8.3.4. The named.local File
- named.pid file : TCP/IP Network Administration, 11.6.3. Cache corruption
- named.rev file : TCP/IP Network Administration, 8.3.5. The Reverse Domain File
- named-xfer program : Practical UNIX & Internet Security, 16.2.6.1. DNS under UNIX
- names : TCP/IP Network Administration, 3.1. Names and Addresses
- alternative for sendmail : sendmail, 36.1. Alternative argv[0] Names
- canonical
- sendmail, 7.3.1. The hostname
- sendmail, 31.10. Alphabetized Reference
- canonicalizing : (see canonicalization)
- changing from host to hub : sendmail, 11.6. Handling user@thishost
- choosing UUCP : Practical UNIX & Internet Security, 15.5.2. Permissions Commands
- classes
- sendmail, 12.1. The Class Command
- sendmail, 32.2.4. Class Name Hashing Algorithm
- computer
- Practical UNIX & Internet Security, 16.2.3. Hostnames
- Practical UNIX & Internet Security, 16.2.3.1. The /etc/hosts file
- controlling terminal : sendmail, 31.10. Alphabetized Reference
- DNS : (see DNS)
- domain
- Practical UNIX & Internet Security, 16.2.3. Hostnames
- sendmail, 8.1. A Fictional Network
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 31.10. Alphabetized Reference
- TCP/IP Network Administration, 3.3.3. Domain Names
- TCP/IP Network Administration, 4. Getting Started
- application form : TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
- full sender : (see $x macro)
- fully qualified
- sendmail, 4.2. Verbose (-v)
- sendmail, 7.3.1. The hostname
- sendmail, 8.1. A Fictional Network
- sendmail, 21.1. Overview
- TCP/IP Network Administration, 3.3.3. Domain Names
- (see also $j macro)
- headers : sendmail, 35.2. Header Names
- hostnames : (see hostnames)
- hub, internal : sendmail, 11.4.2. A Word About ${HUB}
- local canonical
- sendmail, 21.2.1. Determine the Local Canonical Name
- sendmail, 31.10. Alphabetized Reference
- macros
- sendmail, 5.3.2. Macros
- sendmail, 7.2. Defining Macros
- sendmail, 20.3. Alphabetized V8.8 Subroutines
- sendmail, 31.4. Macro Names
- in NIS : TCP/IP Network Administration, 9.3. Network Information Service
- obtaining : TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
- options : sendmail, 13.1. Options: An Overview
- parameter : TCP/IP Network Administration, 9.4. A BOOTP Server
- RealHostName variable : sendmail, 20.1.2. Global Variables
- rule set : sendmail, 29.1.2. Rule-Set Names
- symbol, delivery agent : sendmail, 30.2. The Symbolic Name
- trailing dot for
- sendmail, 15.3. MX Records
- sendmail, 17.4. Rule Set 4
- sendmail, 29.5.1. Stripping Trailing Dots
- unqualified
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 31.10. Alphabetized Reference
- user : (see usernames)
- nameser.h file : sendmail, B.1. Status file lines
- nameserver attacks, DNS : Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
- nameserver cache loading : Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
- nameserver entry, in resolv.conf : TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
- NAPs (Network Access Points)
- TCP/IP Network Administration, 1.1. TCP/IP and the Internet
- TCP/IP Network Administration, 2.4. Internet Routing Architecture
- TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
- AMES Research Center
- NASA (National Aeronautics and Space Agency) : Practical UNIX & Internet Security, F.3.4.23. NASA
- National Center for Supercomputer Applications (NCSA)
- Practical UNIX & Internet Security, F.2.1. National Computer Security Center
- TCP/IP Network Administration, 13.1. The World Wide Web
- NCSA HTTPD server
- Practical UNIX & Internet Security, 10.3.5. access_log Log File
- (see also web servers)
- NCSA Mosaic : Building Internet Firewalls, 2.5. The World Wide Web
- National Computer Security Center (NCSC) : Practical UNIX & Internet Security, F.2.1. National Computer Security Center
- National Institute of Standards and Technology (NIST)
- Practical UNIX & Internet Security, F.3.4.26. National Institute of Standards and Technology
- TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
- TCP/IP Network Administration, 13.1. The World Wide Web
- NIST CSRC (Computer Security Resource Clearinghouse) : Building Internet Firewalls, A.5.3. NIST CSRC
- National Science Foundation (NSF)
- TCP/IP Network Administration, 1.1. TCP/IP and the Internet
- TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
- NSFNET
- TCP/IP Network Administration, 2.4. Internet Routing Architecture
- TCP/IP Network Administration, 7.4. Interior Routing Protocols
- national security : Practical UNIX & Internet Security, 26.2.2. Federal Jurisdiction
- natural disasters
- Practical UNIX & Internet Security, 1.1. What Is Computer Security?
- Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
- Practical UNIX & Internet Security, 7.1.6.1. Physical security for backups
- Practical UNIX & Internet Security, 12.2.1.1. Fire
- (see also physical security)
- accidents : Practical UNIX & Internet Security, 12.2.2. Preventing Accidents
- earthquakes : Practical UNIX & Internet Security, 12.2.1.4. Earthquake
- fires
- Practical UNIX & Internet Security, 12.2.1.1. Fire
- Practical UNIX & Internet Security, 12.2.1.2. Smoke
- lightning
- Practical UNIX & Internet Security, 12.2. Protecting Computer Hardware
- Practical UNIX & Internet Security, 12.2.1.9. Lightning
- natural gas : Practical UNIX & Internet Security, 12.2.1.5. Explosion
- natural mask : TCP/IP Network Administration, 2.2.2. Classless IP Addresses
- NAVCIRT (Naval Computer Incident Response Team) : Practical UNIX & Internet Security, F.3.4.44. U.S. Department of the Navy
- NBMA interfaces
- TCP/IP Network Administration, B.6. Interface Statements
- TCP/IP Network Administration, B.8.1. The ospf Statement
- ncheck command
- Practical UNIX & Internet Security, 5.5.4.1. The ncheck command
- Practical UNIX & Internet Security, 5.6. Device Files
- NCSA (National Center for Supercomputer Applications)
- Practical UNIX & Internet Security, F.2.1. National Computer Security Center
- TCP/IP Network Administration, 13.1. The World Wide Web
- NCSA HTTPD server
- Practical UNIX & Internet Security, 10.3.5. access_log Log File
- (see also web servers)
- NCSA Mosaic : Building Internet Firewalls, 2.5. The World Wide Web
- NCSC (National Computer Security Center) : Practical UNIX & Internet Security, F.2.1. National Computer Security Center
- ndbm database : sendmail, 33.8. Alphabetized Reference
- NDBM macro : sendmail, 18.8. Alphabetized Reference
- NEED... macros : sendmail, 18.8. Alphabetized Reference
- needexpnhelo (sendmail) : Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
- needmailhelo (sendmail) : Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
- needvrfyhelo (sendmail) : Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
- negative precedence values : sendmail, 14.4. Precedence
- neighbors
- acquiring : TCP/IP Network Administration, 7.5.1. Exterior Gateway Protocol
- allowing
- TCP/IP Network Administration, 7.7.1.3. Exterior gateway configuration
- TCP/IP Network Administration, B.8.6. The egp Statement
- nested
- angle brackets
- sendmail, 10.4. Nested Angle Brackets
- sendmail, 17.1.1.2. Strip to left of <
- directories : Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
- IP over IP : Building Internet Firewalls, 6.3.3.5. IP over IP
- macro conditionals : sendmail, 31.6.1. Conditionals May Nest
- net domain : TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
- NET... macros : sendmail, 18.8. Alphabetized Reference
- Net/Dest value
- TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- TCP/IP Network Administration, 6.1.5.5. Point-to-point
- netacl program : Building Internet Firewalls, 5.8.3.2. Using netacl to protect services
- netconfig : TCP/IP Network Administration, 4.7. netconfig
- Netgroup table (NIS+) : Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
- netgroups, NIS
- Practical UNIX & Internet Security, 19.4.4. NIS Netgroups
- Practical UNIX & Internet Security, 19.4.4.6. NIS is confused about "+"
- limiting imported accounts : Practical UNIX & Internet Security, 19.4.4.2. Using netgroups to limit the importing of accounts
- NetInfo
- Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
- Practical UNIX & Internet Security, 16.2.6.2. Other naming services
- sendmail, 33.8. Alphabetized Reference
- NETINFO macro : sendmail, 18.8. Alphabetized Reference
- Netmasks table (NIS+) : Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
- netnews~firewalls : Practical UNIX & Internet Security, 21.4.3. Netnews
- .netrc file : Practical UNIX & Internet Security, 10.4.3. Network Setup
- Netscape Navigator
- Building Internet Firewalls, 2.5. The World Wide Web
- TCP/IP Network Administration, 13.1. The World Wide Web
- encryption system of : Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire
- random number generator : Practical UNIX & Internet Security, 23.8. Picking a Random Seed
- netstat command
- Practical UNIX & Internet Security, 17.5. Monitoring Your Network with netstat
- Practical UNIX & Internet Security, 24.2.1. Catching One in the Act
- Practical UNIX & Internet Security, 24.2.4. Tracing a Connection
- -a option : Practical UNIX & Internet Security, 17.5. Monitoring Your Network with netstat
- -in command : TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- -n option : Practical UNIX & Internet Security, 17.5. Monitoring Your Network with netstat
- -ni command : TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- -nr command
- TCP/IP Network Administration, 2.5. The Routing Table
- TCP/IP Network Administration, 7.3.1. Adding Static Routes
- TCP/IP Network Administration, 11.5. Checking Routing
- to display routing table : TCP/IP Network Administration, 12.7.2. Routing control
- troubleshooting with
- TCP/IP Network Administration, 11.2. Diagnostic Tools
- TCP/IP Network Administration, 11.3. Testing Basic Connectivity
- TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
- network services
- Building Internet Firewalls, 2. Internet Services
- Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
- Practical UNIX & Internet Security, 17. TCP/IP Services
- Practical UNIX & Internet Security, 17.7. Summary
- Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
- Practical UNIX & Internet Security, G. Table of IP Services
- administration : (see system administration)
- booting : Building Internet Firewalls, 5.8.2.4. Which services should you disable?
- configuring : Building Internet Firewalls, 8. Configuring Internet Services
- contacting providers about incidents : Building Internet Firewalls, 13.1.4.3. Vendors and service providers
- default deny stance : Building Internet Firewalls, 3.5.1. Default Deny Stance: That Which Is Not
- default permit stance : Building Internet Firewalls, 3.5.2. Default Permit Stance: That Which Is
- direct access to : Building Internet Firewalls, 7.1.1.1. Proxy services allow users to access Internet services
- disabling those not required : Building Internet Firewalls, 5.8.2. Disabling Nonrequired Services
- DNS : (see DNS)
- encryption with : (see encryption)
- filtering by : Building Internet Firewalls, 6.7. Filtering by Service
- finger : (see finger service)
- FTP : (see FTP)
- inbound : (see inbound, services)
- information lookup services : Building Internet Firewalls, 8.8. Information Lookup Services
- installing and modifying : Building Internet Firewalls, 5.8.3. Installing and Modifying Services
- LAN-oriented : Building Internet Firewalls, 5.6. Selecting Services Provided by the
- NFS (Network File System) : Building Internet Firewalls, 5.8.2.4. Which services should you disable?
- NNTP : (see NNTP)
- NTP : (see NTP)
- overloading : Practical UNIX & Internet Security, 25.3.1. Service Overloading
- passwords for : (see passwords)
- POP : (see POP)
- protecting with TCP Wrapper : Building Internet Firewalls, 5.8.3.1. Using the TCP Wrapper package to protect services
- proxy : (see proxy servers/services)
- r commands : Building Internet Firewalls, 5.8.2.4. Which services should you disable?
- real-time conferencing : Building Internet Firewalls, 8.9. Real-Time Conferencing Services
- root account with : (see root account/user)
- RPC (Remote Procedure Call) : Building Internet Firewalls, 5.8.2.4. Which services should you disable?
- securing
- Practical UNIX & Internet Security, 17.4. Security Implications of Network Services
- Practical UNIX & Internet Security, 19.1. Securing Network Services
- (see also security)
- selecting for bastion host : Building Internet Firewalls, 5.6. Selecting Services Provided by the
- SMTP : (see SMTP)
- SNMP : (see SNMP)
- spoofing
- Practical UNIX & Internet Security, 8.5.3.1. Trusted path
- Practical UNIX & Internet Security, 16.3. IP Security
- Practical UNIX & Internet Security, 17.5. Monitoring Your Network with netstat
- Practical UNIX & Internet Security, 19.4.4.4. Spoofing RPC
- Practical UNIX & Internet Security, 19.4.4.5. Spoofing NIS
- started by /etc/rc : Building Internet Firewalls, 5.8.2.1. How are services managed?
- store-and-forward
- Building Internet Firewalls, 7.5. Proxying Without a Proxy Server
- TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
- systat service : Practical UNIX & Internet Security, 17.3.1. systat (TCP Port 11)
- Telnet : (see Telnet service)
- TFTP : (see TFTP)
- UUCP : (see UUCP)
- networks and networking
- Practical UNIX & Internet Security, 16. TCP/IP Networks
- Practical UNIX & Internet Security, 16.5. Summary
- sendmail, 3.3. Role in Network Transport
- 10Base-T : Practical UNIX & Internet Security, 12.3.1.2. Eavesdropping by Ethernet and 10Base-T
- access
- access layer, TCP/IP : Building Internet Firewalls, C.4. Network Access Layer
- balancing against computer security : TCP/IP Network Administration, 12. Network Security
- troubleshooting : TCP/IP Network Administration, 11.4. Troubleshooting Network Access
- address translation (NAT) : TCP/IP Network Administration, 4.2.1. Obtaining an IP Address
- avoiding problems
- TCP/IP Network Administration, 11.4.2.1. ARP problem case study
- TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- decentralized : TCP/IP Network Administration, 2.3. Subnets
- defined
- TCP/IP Network Administration, 1. Overview of TCP/IP
- TCP/IP Network Administration, 11. Troubleshooting TCP/IP
- developing feel for : TCP/IP Network Administration, 12.4.1. Know Your System
- need for information about : TCP/IP Network Administration, Preface
- security responsibilites of : TCP/IP Network Administration, 12.1.3. Writing a Security Policy
- simplifying : TCP/IP Network Administration, 4.2.2. Defining the Subnet Mask
- allowing threats from : Practical UNIX & Internet Security, 11.4. Entry
- AppleTalk : sendmail, 3.3.3. Other Protocols
- architecture : (see firewalls, architecture of)
- ARPANET
- Practical UNIX & Internet Security, 16.1.1. The InternetWe recommend that readers
- TCP/IP Network Administration, 1.1. TCP/IP and the Internet
- TCP/IP Network Administration, 1.5.1.1. The datagram
- TCP/IP Network Administration, 2.4. Internet Routing Architecture
- TCP/IP Network Administration, 6.2. TCP/IP Over a Serial Line
- backing up
- Practical UNIX & Internet Security, 7.2.2. Small Network of Workstations and a Server
- Practical UNIX & Internet Security, 7.2.4. Large Service-Based Networks with Large Budgets
- Practical UNIX & Internet Security, 7.4.5. Backups Across the Net
- break-ins, increasing : TCP/IP Network Administration, 12. Network Security
- building : TCP/IP Network Administration, Foreword from the First Edition
- cables for : (see cables)
- checking connectivity of : (see ping command)
- checklist for
- Practical UNIX & Internet Security, A.1.1.15. Chapter 16: TCP/IP Networks
- Practical UNIX & Internet Security, A.1.1.16. Chapter 17: TCP/IP Services
- computer networks : Practical UNIX & Internet Security, 1.4.3. Add-On Functionality Breeds Problems
- configuration files : Practical UNIX & Internet Security, 10.4.3. Network Setup
- connected or not connected to Internet : TCP/IP Network Administration, 4.1. Connected and Non-Connected Networks
- connections : Practical UNIX & Internet Security, 17.3.3. TELNET (TCP Port 23)
- connectors for : Practical UNIX & Internet Security, 12.2.4.3. Network connectors
- databases, network : Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
- DECnet
- Practical UNIX & Internet Security, 16.4.3. DECnet
- sendmail, 3.3.3. Other Protocols
- $C macro : sendmail, 31.10. Alphabetized Reference
- denial of service on : (see denial of service)
- diameter
- TCP/IP Network Administration, 1.7. Application Layer
- TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
- disabling physically : Practical UNIX & Internet Security, 25.3.3. Signal Grounding
- disconnecting, after incident
- Building Internet Firewalls, 13.1.2. Disconnect or Shut Down, as
- Building Internet Firewalls, 13.4.3. Planning for Disconnecting or
- encryption : Building Internet Firewalls, 10.5. Network-Level Encryption
- File System : (see NFS)
- forwarding over
- sendmail, 29.6.6. Forwarding over the Network
- TCP/IP Network Administration, 1.5.1.4. Passing datagrams to the transport layer
- loops : sendmail, 25.7.2. Forwarding Loops
- Resent- headers : sendmail, 35.7. Forwarding with Resent-Headers
- hardware
- TCP/IP Network Administration, 1.7. Application Layer
- (see also physical network)
- with built-in diagnostic software : TCP/IP Network Administration, 11.3.1. The ping Command
- problems with
- TCP/IP Network Administration, 11.3.1. The ping Command
- TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
- TCP/IP Network Administration, 11.4.4.1. Network hardware problems
- heterogeneous : TCP/IP Network Administration, 1.1.2. Protocol Standards
- insecure : Building Internet Firewalls, 4.4.2. Insecure Networks
- interfaces : TCP/IP Network Administration, 3.1. Names and Addresses
- enabling or disabling : TCP/IP Network Administration, 6.1.5.1. Enabling and disabling the interface
- information need for : TCP/IP Network Administration, 6.1. The ifconfig Command
- Internet : (see Internet)
- joint : Building Internet Firewalls, 4.4.4. Joint Venture Firewalls
- lab/test : Building Internet Firewalls, 4.4.1. Laboratory Networks
- LANs : (see LANs)
- location of bastion host on : Building Internet Firewalls, 5.5. Locating the Bastion Host on the Network
- logging
- Practical UNIX & Internet Security, 10.5.2.2. Logging across the network
- Practical UNIX & Internet Security, 10.3.6. Logging Network Services
- (see also logs/logging)
- management services : Building Internet Firewalls, 2.10. Network Management Services
- configuring : Building Internet Firewalls, 8.12. Network Management Services
- MANs : Practical UNIX & Internet Security, 16.1. Networking
- maps drawn by monitors : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- mask
- TCP/IP Network Administration, 7.4.2. RIP Version 2
- TCP/IP Network Administration, 2.5. The Routing Table
- mobile computing : Practical UNIX & Internet Security, 8.7. One-Time Passwords
- monitoring
- Building Internet Firewalls, 5.9.2. Consider Writing Software to Automate Monitoring
- TCP/IP Network Administration, 11.7. Analyzing Protocol Problems
- netstat : Practical UNIX & Internet Security, 17.5. Monitoring Your Network with netstat
- news : (see Usenet news)
- NFSNET
- Practical UNIX & Internet Security, 16.1.1. The InternetWe recommend that readers
- TCP/IP Network Administration, 1.1. TCP/IP and the Internet
- numbers
- TCP/IP Network Administration, 2.2.1. Address Classes
- TCP/IP Network Administration, 4.2.1.1. Assigning host addresses
- packet switching
- Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
- Practical UNIX & Internet Security, 16.3. IP Security
- TCP/IP Network Administration, 1.5.1.1. The datagram
- TCP/IP Network Administration, 1.7. Application Layer
- perimeter
- Building Internet Firewalls, 4.1. Some Firewall Definitions
- Building Internet Firewalls, 4.2.3.1. Perimeter network
- problems, how to approach : TCP/IP Network Administration, 11. Troubleshooting TCP/IP
- processes : TCP/IP Network Administration, 8.2. Configuring the Resolver
- protecting internally : Building Internet Firewalls, 4.4. Internal Firewalls
- providers : (see ISPs)
- resources, controlling : TCP/IP Network Administration, 12.1.3. Writing a Security Policy
- saturated : TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
- scanning : Practical UNIX & Internet Security, 17.6. Network Scanning
- security : (see security)
- servers
- TCP/IP Network Administration, 2.7.2. Port Numbers
- TCP/IP Network Administration, 9. Configuring Network Servers
- services : (see network services)
- shared media : TCP/IP Network Administration, 11.4.4. Subdividing an Ethernet
- SOCKS for : (see SOCKS package)
- spoofing
- Practical UNIX & Internet Security, 8.5.3.1. Trusted path
- Practical UNIX & Internet Security, 16.3. IP Security
- Practical UNIX & Internet Security, 17.5. Monitoring Your Network with netstat
- Practical UNIX & Internet Security, 19.4.4.5. Spoofing NIS
- Practical UNIX & Internet Security, 19.4.4.4. Spoofing RPC
- subdividing : TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
- subnetted : TCP/IP Network Administration, 4.2.1.1. Assigning host addresses
- support : sendmail, 18.8. Alphabetized Reference
- taps : Building Internet Firewalls, 1.2.1.3. Information Theft
- TCP/IP : (see TCP/IP services)
- Time Protocol : (see NTP)
- topology of : TCP/IP Network Administration, 2.2.2. Classless IP Addresses
- transferring information across : (see packet filtering)
- underlying : TCP/IP Network Administration, 1.4. Network Access Layer
- UNIX and : Practical UNIX & Internet Security, 16.1.2. Networking and UNIX
- unreliable : TCP/IP Network Administration, 11.3.1. The ping Command
- unusual activity on : TCP/IP Network Administration, 12.4.1. Know Your System
- usage, monitoring : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- UUCP over
- Practical UNIX & Internet Security, 15.8. UUCP Over Networks
- (see also UUCP)
- X.25 : TCP/IP Network Administration, 1.5.1.3. Fragmenting datagrams
- WANs : Practical UNIX & Internet Security, 16.1. Networking
- weaving : Practical UNIX & Internet Security, 16.1.1.1. Who is on the Internet?
- Network Access Layer
- TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
- TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- protocols : TCP/IP Network Administration, 3.6. Bootstrap Protocol
- Network Access Points (NAPs)
- TCP/IP Network Administration, 1.1. TCP/IP and the Internet
- TCP/IP Network Administration, 2.4. Internet Routing Architecture
- TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
- Network Control protocols : TCP/IP Network Administration, 6.2.1. The Serial Protocols
- Network File System : (see NFS)
- Network Information Center (NIC)
- Practical UNIX & Internet Security, 24.2.4.2. How to contact the system administrator of a computer
- TCP/IP Network Administration, 3.3.2. Creating Domains and Subdomains
- handle : TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
- Network Information Service : (see NIS)
- Network Layer
- TCP/IP Network Administration, 1.2. A Data Communications Model
- TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- Network Management Station (NMS) : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- Network News Transfer Protocol (NNTP)
- Building Internet Firewalls, 2.4. Usenet News
- Building Internet Firewalls, 7.5. Proxying Without a Proxy Server
- Practical UNIX & Internet Security, 17.3.13. Network News Transport Protocol (NNTP) (TCP Port
- TCP/IP Network Administration, 13.5.1. Newsgroups
- (see also Usenet news)
- configuring
- Building Internet Firewalls, 8.5. Network News Transfer Protocol
- Building Internet Firewalls, 9.1.1.4. NNTP
- Building Internet Firewalls, 9.2.1.4. NNTP
- Network Terminal Protocol (TELNET) : TCP/IP Network Administration, 1.7. Application Layer
- Network Time Protocol
- Building Internet Firewalls, 2.11. Time Service
- Building Internet Firewalls, 7.5. Proxying Without a Proxy Server
- Practical UNIX & Internet Security, 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
- configuring : Building Internet Firewalls, 8.13. Network Time Protocol (NTP)
- Secure RPC and : Practical UNIX & Internet Security, 19.3.1.3. Setting the window
- network unreachable error message
- TCP/IP Network Administration, 11.3. Testing Basic Connectivity
- TCP/IP Network Administration, 11.5. Checking Routing
- (see also ICMP)
- Network/Destination value
- TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- TCP/IP Network Administration, 6.1.5.5. Point-to-point
- networks file
- TCP/IP Network Administration, 3.2. The Host Table
- TCP/IP Network Administration, 6.1.3. Assigning a Subnet Mask
- TCP/IP Network Administration, 7.3. Building a Static Routing Table
- TCP/IP Network Administration, 9.3. Network Information Service
- as maps : TCP/IP Network Administration, 3.3.5. Network Information Service
- Networks table (NIS+) : Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
- Neumann, Peter : Practical UNIX & Internet Security, 1.3. History of UNIX
- newaliases command
- sendmail, 4.1.3. Rebuild Aliases Mode (-bi)
- sendmail, 24.5.3. Prevent Simultaneous Rebuilds
- sendmail, 36.1.3. newaliases
- NEWDB macro : sendmail, 18.8. Alphabetized Reference
- newgrp command : Practical UNIX & Internet Security, 4.1.3.2. Groups and older AT&T UNIX
- newkey -u command
- Practical UNIX & Internet Security, 19.3.2.1. Creating passwords for users
- Practical UNIX & Internet Security, 19.5.4.2. When a user's passwords don't match
- newlines : (see whitespace)
- newly registered hosts : TCP/IP Network Administration, 3.2. The Host Table
- news (Usenet)
- Practical UNIX & Internet Security, 17.3.13. Network News Transport Protocol (NNTP) (TCP Port
- Practical UNIX & Internet Security, E.2. Usenet Groups
- TCP/IP Network Administration, 13.5.1. Newsgroups
- TCP/IP Network Administration, E.3.5. MAILER
- (see also NNTP)
- cleanup scripts : Practical UNIX & Internet Security, 11.5.3. Abusing Automatic Mechanisms
- encryption for : (see ROT13 algorithm)
- message subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- mailing list gateways to : sendmail, 25.5.2. Gateway Lists to News
- news user : Practical UNIX & Internet Security, 4.1. Users and Groups
- newsgroups
- Building Internet Firewalls, 2.4. Usenet News
- TCP/IP Network Administration, 13.5.1. Newsgroups
- defamation/harassment via : Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
- keeping current : Building Internet Firewalls, 12.3.1.2. Newsgroups
- for security information : TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
- security resources via : Building Internet Firewalls, A.4. Newsgroups
- using
- TCP/IP Network Administration, 4.1.1. Network Contacts
- TCP/IP Network Administration, 13.5.1. Newsgroups
- posting breakins to : Practical UNIX & Internet Security, 24.6. Resuming Operation
- reporting security holes on : Practical UNIX & Internet Security, 2.5.1. Going Public
- next hop
- Building Internet Firewalls, C.11. The Routing Table
- TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- specifying : TCP/IP Network Administration, 7.3. Building a Static Routing Table
- in RIP-2 : TCP/IP Network Administration, 7.4.2. RIP Version 2
- NEXTSTEP Window Server (NSWS) : Practical UNIX & Internet Security, 17.3.16. NEXTSTEP Window Server
- nf files : sendmail, 23.2.4. The ID Creation File (obsolete as of V5.62): nf
- NFS (Network File System)
- Building Internet Firewalls, 2.12. Network File Systems
- Practical UNIX & Internet Security, 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
- Practical UNIX & Internet Security, 19. RPC, NIS, NIS+, and Kerberos
- TCP/IP Network Administration, 1.7. Application Layer
- TCP/IP Network Administration, 3.7.1. File Sharing
- TCP/IP Network Administration, 9.1. The Network File System
- TCP/IP Network Administration, 9.6. Managing Distributed Servers
- authentication and
- Practical UNIX & Internet Security, 19.2.2. RPC Authentication
- Practical UNIX & Internet Security, 19.2.2.4. AUTH_KERB
- benefits of : TCP/IP Network Administration, 9.1. The Network File System
- checklist for : Practical UNIX & Internet Security, A.1.1.19. Chapter 20: NFS
- configuring : Building Internet Firewalls, 8.14. Network File System
- exporting news via : Building Internet Firewalls, 8.5.3.3. Exporting news to clients via
- file permissions : Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail
- find command on : Practical UNIX & Internet Security, 5.5.4. Finding All of the SUID and SGID Files
- -local option : Practical UNIX & Internet Security, 11.6.1.2. Writable system files and directories
- MOUNT : Practical UNIX & Internet Security, 20.1.1. NFS History
- Secure NFS : (see Secure NFS)
- server, and UUCP : Practical UNIX & Internet Security, 15.3. UUCP and Security
- services of : Building Internet Firewalls, 5.8.2.4. Which services should you disable?
- technical description of : Practical UNIX & Internet Security, 20.1.1. NFS History
- trusted hosts and : Practical UNIX & Internet Security, 17.3.18.2. The problem with trusted hosts
- -xdev option : Practical UNIX & Internet Security, 11.6.1.2. Writable system files and directories
- NFS-based print services : TCP/IP Network Administration, 9.1.5.1. NFS print services
- nfs.client script : TCP/IP Network Administration, 9.1.1. NFS Daemons
- nfs.server script : TCP/IP Network Administration, 9.1.1. NFS Daemons
- nfsd (NFS daemon) : TCP/IP Network Administration, 9.1.1. NFS Daemons
- NFSNET backbone : TCP/IP Network Administration, 1.1. TCP/IP and the Internet
- NIC (Network Information Center)
- Practical UNIX & Internet Security, 24.2.4.2. How to contact the system administrator of a computer
- TCP/IP Network Administration, 3.3.2. Creating Domains and Subdomains
- handle : TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
- nice command : Practical UNIX & Internet Security, 25.2.1.2. System overload attacks
- nice numbers : Practical UNIX & Internet Security, C.1.3.3. Process priority and niceness
- niceness, delivery agent : sendmail, 30.4. The Equates
- NIS (Network Information Service)
- Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
- Practical UNIX & Internet Security, 3.4. Changing Your Password
- Practical UNIX & Internet Security, 19. RPC, NIS, NIS+, and Kerberos
- Practical UNIX & Internet Security, 19.4. Sun's Network Information Service (NIS)
- Practical UNIX & Internet Security, 19.4.5. Unintended Disclosure of Site Information with NIS
- TCP/IP Network Administration, 3.3.5. Network Information Service
- TCP/IP Network Administration, 9.3. Network Information Service
- + in
- Practical UNIX & Internet Security, 19.4. Sun's Network Information Service (NIS)
- Practical UNIX & Internet Security, 19.4.4.6. NIS is confused about "+"
- clients : Practical UNIX & Internet Security, 19.4. Sun's Network Information Service (NIS)
- domains : Practical UNIX & Internet Security, 19.4.3. NIS Domains
- maps
- Practical UNIX & Internet Security, 19.4. Sun's Network Information Service (NIS)
- TCP/IP Network Administration, 3.3.5. Network Information Service
- TCP/IP Network Administration, 6.1.3. Assigning a Subnet Mask
- TCP/IP Network Administration, 10.6.1. Pattern Matching
- netgroups
- Practical UNIX & Internet Security, 19.4.4. NIS Netgroups
- Practical UNIX & Internet Security, 19.4.4.6. NIS is confused about "+"
- limiting imported accounts : Practical UNIX & Internet Security, 19.4.4.2. Using netgroups to limit the importing of accounts
- Secure RPC with
- Practical UNIX & Internet Security, 19.3.2. Setting Up Secure RPC with NIS
- Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
- spoofing : Practical UNIX & Internet Security, 19.4.4.5. Spoofing NIS
- UDP : Practical UNIX & Internet Security, 16.2.4.3. UDP
- Yellow Pages : Practical UNIX & Internet Security, 16.2.6.2. Other naming services
- nis database class : sendmail, 33.8. Alphabetized Reference
- NIS macro : sendmail, 18.8. Alphabetized Reference
- NIS+
- Building Internet Firewalls, 8.15. Network Information Service/Yellow
- Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
- Practical UNIX & Internet Security, 3.4. Changing Your Password
- Practical UNIX & Internet Security, 16.2.6.2. Other naming services
- Practical UNIX & Internet Security, 19.5. Sun's NIS+
- Practical UNIX & Internet Security, 19.5.5. NIS+ Limitations
- TCP/IP Network Administration, 9.3.2. NIS+
- integrity-checking software for : Practical UNIX & Internet Security, 19.5.5. NIS+ Limitations
- principals : Practical UNIX & Internet Security, 19.5.1. What NIS+ Does
- Secure RPC with
- Practical UNIX & Internet Security, 19.3.2. Setting Up Secure RPC with NIS
- Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
- NIS/YP (Network Information Service)
- Building Internet Firewalls, 2.9. Name Service
- Building Internet Firewalls, 5.8.2.4. Which services should you disable?
- Building Internet Firewalls, 8.10. Domain Name System
- configuring : Building Internet Firewalls, 8.15. Network Information Service/Yellow
- nisaddcred command : Practical UNIX & Internet Security, 19.3.1.1. Proving your identity
- niscat command : Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
- nischown command : Practical UNIX & Internet Security, 19.5.4. Using NIS+
- nispasswd command
- Practical UNIX & Internet Security, 3.4. Changing Your Password
- Practical UNIX & Internet Security, 19.5.4. Using NIS+
- Practical UNIX & Internet Security, 19.5.4.2. When a user's passwords don't match
- nisplus database class : sendmail, 33.8. Alphabetized Reference
- NISPLUS macro : sendmail, 18.8. Alphabetized Reference
- NIST (National Institute of Standards and Technology)
- Practical UNIX & Internet Security, F.2.1. National Computer Security Center
- Practical UNIX & Internet Security, F.3.4.26. National Institute of Standards and Technology
- TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
- TCP/IP Network Administration, 13.1. The World Wide Web
- NIST CSRC (Computer Security Resource Clearinghouse) : Building Internet Firewalls, A.5.3. NIST CSRC
- NMS (Network Management Station) : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- NNTP (Network News Transfer Protocol)
- Building Internet Firewalls, 2.4. Usenet News
- Building Internet Firewalls, 7.5. Proxying Without a Proxy Server
- Practical UNIX & Internet Security, 17.3.13. Network News Transport Protocol (NNTP) (TCP Port
- TCP/IP Network Administration, 13.5.1. Newsgroups
- (see also Usenet news)
- configuring
- Building Internet Firewalls, 8.5. Network News Transfer Protocol
- Building Internet Firewalls, 9.1.1.4. NNTP
- Building Internet Firewalls, 9.2.1.4. NNTP
- NNTPSERVER variable : sendmail, 31.2.1. Syntax of the Command-Line Macro's Text
- no answer error message : TCP/IP Network Administration, 11.3. Testing Basic Connectivity
- NO_GROUP_SET macro : sendmail, 18.8. Alphabetized Reference
- "No local mailer defined" message : sendmail, 6.2.1. Testing the client.cf File
- "no mailer in parsed address" error : sendmail, 29.6. Rule Set 0
- "no more data from sender" (FIN) bit : TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
- "No such file or directory" error : sendmail, 12.2. The File Form of Class
- nobody user
- Practical UNIX & Internet Security, 4.1. Users and Groups
- Practical UNIX & Internet Security, 19.3.2.1. Creating passwords for users
- sendmail, 22.8.3.1. The DefaultUser option
- TCP/IP Network Administration, 5.4. The Internet Daemon
- TCP/IP Network Administration, 9.1.2.1. The share command
- nocanonify feature : sendmail, 19.6. Alphabetized m4 Macros
- nodns feature
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 21.1.2. Make sendmail DNS Aware
- noexpn (sendmail) : Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
- noise, electrical : Practical UNIX & Internet Security, 12.2.1.8. Electrical noise
- nonadaptive modems : (see modems)
- nonauthoritative servers : TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
- nonblocking systems : Practical UNIX & Internet Security, 19.2. Sun's Remote Procedure Call (RPC)
- nonbroadcast multi-access (NBMA) interfaces
- TCP/IP Network Administration, B.6. Interface Statements
- TCP/IP Network Administration, B.8.1. The ospf Statement
- nonce : Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
- non-connected network : TCP/IP Network Administration, 4.1. Connected and Non-Connected Networks
- non-encoded binary data : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- non-Internet sites, delivering mail to : TCP/IP Network Administration, C.3.1.4. Mail exchanger record
- nonrecursive queries : TCP/IP Network Administration, 3.3.2. Creating Domains and Subdomains
- nonrepudiation : Practical UNIX & Internet Security, 6.5. Message Digests and Digital Signatures
- nonrouting dual-homed hosts
- Building Internet Firewalls, 5.2.1. Nonrouting Dual-homed Hosts
- Building Internet Firewalls, 5.8.2.5. Turning off routing
- NORDUNET : Practical UNIX & Internet Security, F.3.4.27. NORDUNET
- NOREAD= command : Practical UNIX & Internet Security, 15.5.2. Permissions Commands
- NoRecipientAction option : sendmail, 34.8. Alphabetized Reference
- normalizing addresses : sendmail, 17.1.2. Normalize the Address
- Northwestern University : Practical UNIX & Internet Security, F.3.4.28. Northwestern University
- nosuid : Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
- notation, dotted decimal : TCP/IP Network Administration, 2.3. Subnets
- NOTIFY command (SMTP) : sendmail, 36.7. Alphabetized Reference
- NOTIFY extension, DSN : sendmail, 23.9. The qf File Internals
- notifying people about problems
- Building Internet Firewalls, 13.1.4. Make `Incident in Progress'
- Building Internet Firewalls, 13.4.4. Planning for Notification of People
- TCP/IP Network Administration, 12.4.2. Looking for Trouble
- TCP/IP Network Administration, 12.4.2.2. Checking login activity
- notsticky feature : sendmail, 19.6. Alphabetized m4 Macros
- NOTUNIX macro : sendmail, 18.8. Alphabetized Reference
- nouucp feature : sendmail, 19.6. Alphabetized m4 Macros
- Novell : Practical UNIX & Internet Security, 1.3. History of UNIX
- novrfy (sendmail) : Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
- Nowitz, David : Practical UNIX & Internet Security, 15.2. Versions of UUCP
- NOWRITE= command : Practical UNIX & Internet Security, 15.5.2. Permissions Commands
- NP keyword : TCP/IP Network Administration, 12.2.1. The Shadow Password File
- npasswd package : Practical UNIX & Internet Security, 8.8.2. Constraining Passwords
- NPROC variable : Practical UNIX & Internet Security, 25.2.1.1. Too many processes
- nrcpts= equate (syslog output) : sendmail, 26.1.3.6. nrcpts= the number of recipients
- NS query : TCP/IP Network Administration, 11.6. Checking Name Service
- NS resource records
- TCP/IP Network Administration, 8.3.5. The Reverse Domain File
- TCP/IP Network Administration, 8.3.6. The named.hosts File
- TCP/IP Network Administration, C.3.1.2. Name server record
- NSA (National Security Agency) : Practical UNIX & Internet Security, F.2.2. National Security Agency (NSA)
- nservers option : TCP/IP Network Administration, 9.1.1. NFS Daemons
- NSF (National Science Foundation)
- TCP/IP Network Administration, 1.1. TCP/IP and the Internet
- TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
- NSFNET
- TCP/IP Network Administration, 2.4. Internet Routing Architecture
- TCP/IP Network Administration, 7.4. Interior Routing Protocols
- nslookup
- sendmail, 21.4. How to Use nslookup
- TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
- TCP/IP Network Administration, 8.4. Using nslookup
- in troubleshooting
- TCP/IP Network Administration, 11.2. Diagnostic Tools
- TCP/IP Network Administration, 11.3. Testing Basic Connectivity
- TCP/IP Network Administration, 11.6. Checking Name Service
- nsswitch.conf file
- sendmail, 7.3.1. The hostname
- sendmail, D.4. L and G Configuration Commands
- TCP/IP Network Administration, 9.3.1. The nsswitch.conf file
- TCP/IP Network Administration, E.4.2. sendmail Options
- NSWS (NextStep Window Server) : Practical UNIX & Internet Security, 17.3.16. NEXTSTEP Window Server
- NTP (Network Time Protocol)
- Building Internet Firewalls, 2.11. Time Service
- Building Internet Firewalls, 7.5. Proxying Without a Proxy Server
- Practical UNIX & Internet Security, 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
- configuring : Building Internet Firewalls, 8.13. Network Time Protocol (NTP)
- Secure RPC and : Practical UNIX & Internet Security, 19.3.1.3. Setting the window
- NU-CERT : Practical UNIX & Internet Security, F.3.4.28. Northwestern University
- null
- addresses
- sendmail, 10.3. Missing Addresses
- sendmail, 17.1.1.3. Handle null address
- sendmail, 30.8. Alphabetized F= Flags
- database class : sendmail, 33.8. Alphabetized Reference
- device : Practical UNIX & Internet Security, 5.6. Device Files
- sendmail.cf file : sendmail, 5.2. The Minimal File
- null.mc file : sendmail, 16.2. The null.mc File
- nullclient feature : sendmail, 19.6. Alphabetized m4 Macros
- numbers
- sendmail, 29.1.1. Rule-Set Numbers
- (see also identifiers)
- delivery failure count : sendmail, 23.9. The qf File Internals
- DNS errors : sendmail, B.1. Status file lines
- inode and device : sendmail, 23.9. The qf File Internals
- port : Building Internet Firewalls, C.12.2. Port Numbers
- protocol : Building Internet Firewalls, C.12.1. Protocol Numbers
- rule sets
- sendmail, 8.3. Rule Sets
- sendmail, 29.1.1. Rule-Set Numbers
- SMTP status codes : sendmail, B.1. Status file lines
- UNIX errors : sendmail, B.1. Status file lines
- numeric addresses : (see addresses)
- numeric-type arguments : sendmail, 34.5. Option Argument Types
- numeric values, in printcap parameters : TCP/IP Network Administration, 9.2.1. The printcap File
- nuucp account
- Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work
- Practical UNIX & Internet Security, 15.3.1. Assigning Additional UUCP Logins
- Practical UNIX & Internet Security, 15.4.1.3. Format of USERFILE entry without system name
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.