start page  | rating of books | rating of authors | reviews | copyrights
 
  
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z  
Index: O
   - O configuration command 
    - sendmail, 5.3.7. Options    
- sendmail, 13.1. Options: An Overview  
  
 - -o database switch : sendmail, 33.3.4.8. -o  the database file is optional (V8.1 and above)  
- -O database switch : sendmail, 33.3.4.7. -O  adaptive versus never add a null (V8.2 and above)  
- o flag : sendmail, 30.8. Alphabetized F= Flags 
- O lines in sendmail.cf : sendmail, 3.1. Role in the Filesystem  
- $o macro : (see OperatorChars (o) option) 
- o option : (see OldStyleHeaders (o) option) 
- O option : (see DaemonPortOptions (O) option) 
- -o switch (F command) : sendmail, 12.2. The File Form of Class  
- -o switch (makemap) : sendmail, 33.2.1.4. -o  append to, don't overwrite the file  
- -o switch (sendmail) : sendmail, 36.7. Alphabetized Reference  
- -O switch (sendmail) : sendmail, 36.7. Alphabetized Reference  
- OBJADD= directive : sendmail, 18.4.10. OBJADD=  
- object identifier : TCP/IP Network Administration, 11.9. Simple Network Management Protocol  
- obscurity 
                 - Building Internet Firewalls, 1.3.2. Security Through Obscurity   
- Practical UNIX & Internet Security, 2.5. The Problem with Security  Through Obscurity    
- Practical UNIX & Internet Security, 2.5.3. Final Words: Risk Management Means  Common Sense   
- Practical UNIX & Internet Security, 8.8.9. Account Names Revisited: Using Aliases  for Increased   
- Practical UNIX & Internet Security, 18.2.4. Keep Your Scripts Secret! 
     
 - obtaining 
    - BIND via FTP : sendmail, 21.1.1. Which DNS? 4.8.3 or 4.9?    
- db library package : sendmail, C.2. Get the Source    
- sendmail source code   
        - sendmail, 2.1. Get the Source      
- sendmail, 18.3. Obtain the Source    
  
 
 - octal file permissions 
    - Practical UNIX & Internet Security, 5.2.3. Calculating Octal File Permissions    
- Practical UNIX & Internet Security, 5.2.4. Using Octal File Permissions  
  
 - octal-type arguments : sendmail, 34.5. Option Argument Types  
- octet data 
     - Practical UNIX & Internet Security, 16.2.1. Internet Addresses    
- TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions 
  
 - octet-stream application subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions 
- Odlyzko, Andrew : Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC 
- -odq switch : sendmail, 23.6.1. Periodically with -q  
- Oerrs (output errors) : TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat  
- OFB (output feedback) : Practical UNIX & Internet Security, 6.4.4.2. DES modes  
- offsite primary name servers : sendmail, 21.5.2. Offsite Servers  
- "ok" message : sendmail, 4.2. Verbose (-v)  
- old-style address lists : sendmail, 13.2.7. Accept Old-Style Lists of Addresses  
- OLD_NEWDB macro : sendmail, 18.8. Alphabetized Reference  
- OldStyleHeaders (o) option 
             - sendmail, 13.2.7. Accept Old-Style Lists of Addresses    
- sendmail, 34.8. Alphabetized Reference  
  
 - on program : Building Internet Firewalls, 2.3. Remote Terminal Access and Command 
- on-the-job security 
     - Practical UNIX & Internet Security, 13.2. On the Job   
- Practical UNIX & Internet Security, 13.2.6. Departure 
  
 - one : Practical UNIX & Internet Security, 9.2.1. Comparison Copies  
- one-command accounts : Practical UNIX & Internet Security, 8.1.3. Accounts That Run a Single Command  
- one-time pad encryption 
      - Practical UNIX & Internet Security, 6.4.7. An Unbreakable Encryption Algorithm   
- Practical UNIX & Internet Security, 8.7.3. Code Books 
  
 - one-time passwords 
    - Building Internet Firewalls, 10.3.1. One-Time Passwords   
- Practical UNIX & Internet Security, 8.7. One-Time Passwords   
- Practical UNIX & Internet Security, 8.7.3. Code Books   
- Practical UNIX & Internet Security, 17.4. Security Implications of Network Services    
- Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs   
- TCP/IP Network Administration, Preface   
- TCP/IP Network Administration, 12.2.3. One-Time Passwords  
       
 - One-time Passwords In Everything (OPIE) : TCP/IP Network Administration, 12.2.4. OPIE  
- one-way phone lines : Practical UNIX & Internet Security, 14.4.1. One-Way Phone Lines  
- ONEX command, in ESMTP : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions 
- open access, tradition of : Practical UNIX & Internet Security, 1.4.1. Expectations 
- open accounts 
        - Practical UNIX & Internet Security, 8.1.4. Open Accounts    
- Practical UNIX & Internet Security, 8.1.4.6. Potential problems with rsh    
- Practical UNIX & Internet Security, 8.8.7. Algorithm and Library Changes  
   
 - open command 
    - Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail    
- Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs   
- O_CREAT and O_EXCL flags : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs 
   
 - open file descriptors : sendmail, 26.3.3.1. -- open file descriptors: --  
- open protocol suite : TCP/IP Network Administration, 3.7.1. File Sharing 
- Open Shortest Path First : (see OSPF protocol) 
- Open Software Foundation (OSF) : Practical UNIX & Internet Security, 1.3. History of UNIX  
- Open System Interconnection (OSI) 
        - Building Internet Firewalls, C.2.1. OSI Reference Model   
- Practical UNIX & Internet Security, 16.4.4. OSI   
- TCP/IP Network Administration, 1.2. A Data Communications Model   
- TCP/IP Network Administration, 6.1.1. Determining the Interface Name  
    
 - opendir library call : Practical UNIX & Internet Security, 5.4. Using Directory Permissions  
- openlog command : sendmail, 26.1.1. syslog(3)  
- operating systems 
      - Building Internet Firewalls, Platforms   
- Practical UNIX & Internet Security, 1.2. What Is an Operating System?    
- Practical UNIX & Internet Security, 12.3.3. Other Media   
- administration : (see system administration)   
- choosing : Building Internet Firewalls, 5.3.1. What Operating System?   
- errors   
           - sendmail, 36.5.3. EX_IOERR   A System I/O Error Occurred      
- sendmail, 36.5.5. EX_OSERR     A System Resource Error    
  
   - file failure : sendmail, 36.5.6. EX_OSFILE   A Critical System File Failure    
- fixing bugs in : Building Internet Firewalls, 5.8.1.2. Fix all known system bugs   
- installation of : Building Internet Firewalls, 5.8.1.1. Start with a minimal clean operating system   
- keeping secret : Practical UNIX & Internet Security, 2.5. The Problem with Security  Through Obscurity    
- load : (see performance)   
- multiple, and proxying : Building Internet Firewalls, 7.1. Why Proxying?   
- OSTYPE declaration   
            - sendmail, 16.2.2. OSTYPE      
- sendmail, 19.3.1. OSTYPE()      
- TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros      
- defines, listed : TCP/IP Network Administration, E.3.3. OSTYPE     
- in sendmail     
            - TCP/IP Network Administration, E.3. m4 sendmail Macros       
- TCP/IP Network Administration, E.3.3. OSTYPE     
  
   
   - testing reload of : Building Internet Firewalls, 13.5.6. Testing the Reload of the Operating   
- UNIX : (see UNIX) 
  
 - OperatorChars (o) option 
    - sendmail, 8.3. Rule Sets    
- sendmail, 31.10. Alphabetized Reference    
- sendmail, 34.8. Alphabetized Reference  
   
 - operators, token separation : (see OperatorChars (o) option) 
- opiekey software : TCP/IP Network Administration, 12.2.4. OPIE  
- opiepassword : TCP/IP Network Administration, 12.2.4. OPIE  
- ${opmode} macro : sendmail, 31.10. Alphabetized Reference  
- optic cables : (see cables, network) 
- optical vampire taps : Practical UNIX & Internet Security, 12.3.1.5. Fiber optic cable  
- option set, invoking dialup IP (dip) : TCP/IP Network Administration, A.1. Dial-Up IP 
- optional database files : sendmail, 33.3.4.8. -o  the database file is optional (V8.1 and above)  
- Options command : Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory> 
- options entry, in resolv.conf : TCP/IP Network Administration, 8.2.1. The Resolver Configuration File  
- option field, in DHCP : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol 
- options file 
               - TCP/IP Network Administration, 6.3.1. The PPP Daemon    
- TCP/IP Network Administration, 6.3.2. Dial-Up PPP  
  
 - options statement : TCP/IP Network Administration, 5.3.1.1. Options  
    - in gated : TCP/IP Network Administration, B.5. Options Statements   
- INET   
       - TCP/IP Network Administration, 5.3.1.1. Options      
- TCP/IP Network Administration, A.2. The PPP Daemon   
  
 
 - options, sendmail 
    - sendmail, 3.1. Role in the Filesystem    
- sendmail, 4. How to Run sendmail    
- sendmail, 5.3.7. Options    
- sendmail, 13. Setting Options    
- sendmail, 19.4.1. Options    
- sendmail, 34. Options    
- (see also switches, command-line)   
- m4 and : sendmail, 34.3. Configuring with V8 m4 Options    
- multicharacter   
              - sendmail, 34.1.2. V8.7 Multicharacter Options in the Command Line      
- sendmail, 36.7. Alphabetized Reference    
  
   - required : sendmail, 13.2. Required Options    
- safe : sendmail, 34.1.4. Options that Are Safe    
- security : sendmail, 22.8.3. Security Options    
- single-character : sendmail, 36.7. Alphabetized Reference    
- testing : sendmail, 13.3. Testing the Options  
     
 - options.device file : TCP/IP Network Administration, A.2. The PPP Daemon 
- Orange Book : Practical UNIX & Internet Security, 2.3.3. Adding Up the Numbers 
- ORCPT address : sendmail, 23.9. The qf File Internals  
- org domain : TCP/IP Network Administration, 3.3.1. The Domain Hierarchy 
- origin date, message : (see $a macro) 
- originate mode : Practical UNIX & Internet Security, 14.3.1. Originate and Answer  
- originate testing : Practical UNIX & Internet Security, 14.5.3.1. Originate testing  
- orphaned locks : sendmail, 23.2.3.3. Locks can get stuck  
- OSF (Open Software Foundation) : Practical UNIX & Internet Security, 1.3. History of UNIX  
- OSF/1 operating system : Practical UNIX & Internet Security, 1.3. History of UNIX  
- OSI (Open System Interconnection) 
              - Building Internet Firewalls, C.2.1. OSI Reference Model   
- Practical UNIX & Internet Security, 16.4.4. OSI   
- TCP/IP Network Administration, 1.2. A Data Communications Model   
- TCP/IP Network Administration, 6.1.1. Determining the Interface Name  
    
 - OSPF protocol 
    - TCP/IP Network Administration, Preface   
- TCP/IP Network Administration, 1.7. Application Layer   
- TCP/IP Network Administration, 7.4.3. Open Shortest Path First    
- authenticating packets : TCP/IP Network Administration, B.8.1. The ospf Statement   
- enabling (in gated)   
          - TCP/IP Network Administration, 7.7.1.2. Interior gateway configurations      
- TCP/IP Network Administration, 7.7.1.3. Exterior gateway configuration      
- TCP/IP Network Administration, B.8.1. The ospf Statement   
   
 
 - ospf statement (in gated) : TCP/IP Network Administration, B.8.1. The ospf Statement 
- ospfase protocol : TCP/IP Network Administration, 7.7.1.3. Exterior gateway configuration  
- OSTYPE command (m4) 
      - sendmail, 16.2.2. OSTYPE    
- sendmail, 19.3.1. OSTYPE()    
- TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros    
- defines, listed : TCP/IP Network Administration, E.3.3. OSTYPE   
- in sendmail   
          - TCP/IP Network Administration, E.3. m4 sendmail Macros     
- TCP/IP Network Administration, E.3.3. OSTYPE   
  
 
 - out-of-date files, defined : TCP/IP Network Administration, 9.6.1. rdist  
- outgoing (outbound) 
     - calls : Practical UNIX & Internet Security, 14.5. Modems and UNIX   
- finger requests : Building Internet Firewalls, 8.8.1. finger   
- mail, logging : Practical UNIX & Internet Security, 10.4.2. Mail   
- packets : Building Internet Firewalls, 6.2.2. Be Careful of `Inbound'   
         - filtering rules for : Building Internet Firewalls, 6.8.6. It Should Apply Rules Separately to     
- Telnet : Building Internet Firewalls, 6.7.1. Outbound Telnet Service   
  
 
 - Outcome table (NIS+) : Practical UNIX & Internet Security, 19.5.3. NIS+ Tables 
- outdated software : (see software) 
- output 
      - debugging : sendmail, 37.3. Interpreting the Output    
- errors (Oerrs) : TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat    
- feedback (OFB) : Practical UNIX & Internet Security, 6.4.4.2. DES modes    
- rule testing : sendmail, 38.6.4. The Output    
- syslog : sendmail, 26.1.3. syslog's Output  
     
 - outsiders : Practical UNIX & Internet Security, 13.3. Outsiders 
- overload attacks 
     - Practical UNIX & Internet Security, 25.2. Overload Attacks    
- Practical UNIX & Internet Security, 25.2.5. Soft Process Limits: Preventing Accidental  Denial 
  
 - overruns : (see buffers, overruns) 
- overtime : Practical UNIX & Internet Security, 13.2.3. Performance Reviews and Monitoring 
- overwhelming the server : TCP/IP Network Administration, 9.4. A BOOTP Server  
- overwriting 
       - files : sendmail, 33.2.1.4. -o  append to, don't overwrite the file    
- media : Practical UNIX & Internet Security, 12.3.2.3. Sanitize your media before disposal    
- rule sets : sendmail, 8.4. Rules  
   
 - OW- (sendmail.cf) : Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email 
- owner, mailing list : sendmail, 25.3. Defining a Mailing List Owner  
- owner-admin alias : TCP/IP Network Administration, 10.3. sendmail Aliases  
- owners of information : Practical UNIX & Internet Security, 2.4.4.1. Assign an owner 
- owners, changing : Practical UNIX & Internet Security, 5.7. chown: Changing a File's Owner  
- ownership : (see permissions) 
- ownership notices : Practical UNIX & Internet Security, 26.2.6. Other Tips  
       
   
  Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z  
Copyright © 1999  O'Reilly & Associates, Inc. All Rights Reserved.