start page  | rating of books | rating of authors | reviews | copyrights
 
  
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z  
Index: U
   - u flag : sendmail, 30.8. Alphabetized F= Flags 
- U flag : sendmail, 30.8. Alphabetized F= Flags 
- U line (host status file) : sendmail, B.1. Status file lines  
- $u macro 
       - sendmail, 6.3. The local Delivery Agent    
- sendmail, 7.3. Predefined Macros    
- sendmail, 31.10. Alphabetized Reference  
   
 - $U macro : sendmail, 31.10. Alphabetized Reference  
- u option : (see DefaultUser (u,g) option) 
- U option : (see UserDatabaseSpec (U) option) 
- -U switch (sendmail) : sendmail, 36.7. Alphabetized Reference  
- U= equate 
        - sendmail, 30.3.1. Tuning Without an Appropriate Keyword   
- sendmail, 30.4. The Equates   
- sendmail, 30.8. Alphabetized F= Flags 
   
 - UDB_DEFAULT_SPEC macro : sendmail, 18.8. Alphabetized Reference  
- UDP (User Datagram Protocol) 
     - Building Internet Firewalls, 6.3.3.2. UDP   
- Building Internet Firewalls, C.6.1. User Datagram Protocol   
- Practical UNIX & Internet Security, 16.2.4.3. UDP   
- Practical UNIX & Internet Security, 17.1.3. The /etc/inetd Program    
- TCP/IP Network Administration, 1.2. A Data Communications Model   
- TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture   
- TCP/IP Network Administration, 1.6. Transport Layer   
- (see also network services)   
- checksum errors in : TCP/IP Network Administration, 5.3.1.1. Options    
- packet relayer   
               - Building Internet Firewalls, 7.6. Using SOCKS for     
- Building Internet Firewalls, B.4.3. UDP Packet Relayer     
- Practical UNIX & Internet Security, E.4.15. UDP Packet Relayer   
   
 
 - ufsdump : (see dump/restore program) 
- UIDs (user identifiers) 
     - Practical UNIX & Internet Security, 4.1. Users and Groups    
- Practical UNIX & Internet Security, 4.1.2. Multiple Accounts with the Same UID   
- TCP/IP Network Administration, 5.4. The Internet Daemon    
- assume specified : sendmail, 30.8. Alphabetized F= Flags   
- real versus effective   
          - Practical UNIX & Internet Security, 4.3.1. Real and Effective UIDs     
- Practical UNIX & Internet Security, C.1.3.2. Process real and effective UID    
  
   - RPC requests and : Practical UNIX & Internet Security, 19.2.2.2. AUTH_UNIX   
- running agent as : sendmail, 30.4. The Equates   
- su command and : Practical UNIX & Internet Security, 10.1.2.1. su commandutmp and wtmp files andsu   
- of web servers : Practical UNIX & Internet Security, 18.2.1. The Server's UID   
- zero : (see root account/user; superusers) 
     
 - UK Defense Research Agency : Practical UNIX & Internet Security, F.3.4.37. UK Defense Research Agency 
- ulimit command : Practical UNIX & Internet Security, 25.2.5. Soft Process Limits: Preventing Accidental  Denial 
- Ultrix : Practical UNIX & Internet Security, 1.3. History of UNIX  
      - trusted path : Practical UNIX & Internet Security, 8.5.3.1. Trusted path   
- UUCP : Practical UNIX & Internet Security, 15.4.1.3. Format of USERFILE entry without system name  
  
 - umask 
    - Practical UNIX & Internet Security, 5.3. The umask    
- Practical UNIX & Internet Security, 5.3.2. Common umask Values    
- Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts  
   
 - umount command : TCP/IP Network Administration, 9.1.3.1. The mount command  
- uname system call : sendmail, 18.8. Alphabetized Reference  
- unattended terminals 
      - Practical UNIX & Internet Security, 12.3.5. Unattended Terminals    
- Practical UNIX & Internet Security, 12.3.5.2. X screen savers 
  
 - unauthenticated users : TCP/IP Network Administration, 9.1.5. NFS Authentication Server  
- unavailable resource error : sendmail, 36.5.9. EX_UNAVAILABLE   A Resource 
- "Unbalanced" warning : sendmail, 28.1.2. Rules Are Treated Like Addresses  
- undeliverable addresses in aliases : sendmail, 4.1.4. Verify Mode (-bv)  
- undivert command (m4) : sendmail, 19.1.4. m4 diversions  
- unexpected, dealing with the : TCP/IP Network Administration, 11. Troubleshooting TCP/IP  
- unicasting 
          - Building Internet Firewalls, 8.9.3. The Multicast Backbone (MBONE)   
- TCP/IP Network Administration, 2.2.2.1. Final notes on IP addresses   
- (see also addresses) 
   
 - unidirectional connections : Building Internet Firewalls, 7.4.2. Unidirectional Versus Multidirectional 
- uniformity : sendmail, 18.2. Vendor Versus Compiling  
- uninterruptable power supply (UPS) 
      - Practical UNIX & Internet Security, 2.2. Risk Assessment   
- Practical UNIX & Internet Security, 12.2.1.1. Fire  
  
 - United States Department of Energy : Practical UNIX & Internet Security, F.3.4.12. France 
- United States Department of the Navy : Practical UNIX & Internet Security, F.3.4.44. U.S. Department of the Navy 
- United States law : (see laws) 
- United States Naval Research Laboratory (NRL) : TCP/IP Network Administration, 12.2.4. OPIE  
- United States Secret Service 
        - Practical UNIX & Internet Security, 26.2.2. Federal Jurisdiction    
- Practical UNIX & Internet Security, F.3.3. U.S. Secret Service 
  
 - Unisys : Practical UNIX & Internet Security, F.3.4.39. Unisys 
- universal participation : Building Internet Firewalls, 3.6. Universal Participation 
- universal resource locators (URLs) : TCP/IP Network Administration, 13.1. The World Wide Web  
- universes : Practical UNIX & Internet Security, 5.9.1. Dual Universes 
- UNIX 
        - Building Internet Firewalls, 5.3.1. What Operating System?   
- Practical UNIX & Internet Security, 1. Introduction   
- add-on functionality of : Practical UNIX & Internet Security, 1.4.3. Add-On Functionality Breeds Problems   
- checksum programs   
         - Building Internet Firewalls, 5.8.5.3. About checksums for auditing     
- (see also checksums)   
  
   - computers : TCP/IP Network Administration, Audience   
- conventional passwords : Practical UNIX & Internet Security, 3.2.6. Conventional UNIX Passwords   
- DAC (Discretionary Access Controls) : Practical UNIX & Internet Security, 4.1.3. Groups and Group Identifiers (GIDs)    
- DNS under : Practical UNIX & Internet Security, 16.2.6.1. DNS under UNIX   
- encryption programs for   
          - Practical UNIX & Internet Security, 6.6. Encryption Programs Available for UNIX     
- Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures   
  
   - error numbers : sendmail, B.1. Status file lines    
- exit status : sendmail, B.1. Status file lines    
- filesystem   
        - Practical UNIX & Internet Security, 5. The UNIX Filesystem      
- Practical UNIX & Internet Security, 5.10. Summary   
  
   - history of : Practical UNIX & Internet Security, 1.3. History of UNIX    
- kernels : TCP/IP Network Administration, 4.2.2. Defining the Subnet Mask    
- mailbox file : sendmail, 3.2.1. Delivery to a Mailbox    
- modems and   
         - Practical UNIX & Internet Security, 14.5. Modems and UNIX     
- Practical UNIX & Internet Security, 14.5.3.3. Privilege testing    
  
   - networking and : Practical UNIX & Internet Security, 16.1.2. Networking and UNIX   
- primary network services   
       - Practical UNIX & Internet Security, 17.3. Primary UNIX Network Services      
- Practical UNIX & Internet Security, 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)   
  
   - process scheduler   
      - Practical UNIX & Internet Security, C.1.3.3. Process priority and niceness      
- (see also processes)   
  
   - programming references : Practical UNIX & Internet Security, D.1.11. UNIX Programming and System Administration    
- published resources for : Practical UNIX & Internet Security, D.1. UNIX Security References   
- security and   
        - Building Internet Firewalls, A.3.4. BugTraq     
- Practical UNIX & Internet Security, 1.4. Security and UNIX      
- Practical UNIX & Internet Security, 1.4.3. Add-On Functionality Breeds Problems   
   
   - services : TCP/IP Network Administration, 2.7.2. Port Numbers   
- signals : Practical UNIX & Internet Security, C.3. Signals    
- starting up   
        - Practical UNIX & Internet Security, C.5. Starting Up UNIX and Logging In      
- Practical UNIX & Internet Security, C.5.3. Running the User's Shell    
  
   - systems   
      - TCP/IP Network Administration, Foreword from the First Edition     
- TCP/IP Network Administration, 3.3.4. BIND, resolver, and named     
- TCP/IP Network Administration, 7.4.1. Routing Information Protocol      
- TCP/IP Network Administration, 7.5.3. Choosing a Routing Protocol      
- installation scripts for : TCP/IP Network Administration, 6.1.1. Determining the Interface Name    
     
   - vendor, for security information : TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information    
- versions of   
       - Practical UNIX & Internet Security, 1.3. History of UNIX      
- TCP/IP Network Administration, 3.2. The Host Table     
- TCP/IP Network Administration, 6.1. The ifconfig Command    
   
   - viruses : (see viruses)   
- web server on : Practical UNIX & Internet Security, 18.2. Running a Secure Server   
- window system : Building Internet Firewalls, 2.13. Window Systems 
   
 - UNIX commands 
    - ability to use : TCP/IP Network Administration, 9.1. The Network File System    
- r-commands   
       - TCP/IP Network Administration, 9.6. Managing Distributed Servers      
- TCP/IP Network Administration, 12.2.5. Secure the r Commands      
- disabling : TCP/IP Network Administration, 12.2.6. Secure Shell    
   
   - tar : TCP/IP Network Administration, 9.7.1. POP Server    
- untar : TCP/IP Network Administration, 9.7.2. IMAP Server  
  
 - UnixFromLine option 
    - sendmail, 31.10. Alphabetized Reference    
- sendmail, 34.8. Alphabetized Reference  
  
 - "unknown control line" message : sendmail, 5.1. Overview  
- unknown host error message 
     - TCP/IP Network Administration, 11.3. Testing Basic Connectivity    
- TCP/IP Network Administration, 11.6. Checking Name Service  
  
 - "Unknown host status version" message : sendmail, B.1. Status file lines  
- unknown local users : sendmail, 31.10. Alphabetized Reference  
- "unknown mailer" error : sendmail, 29.6. Rule Set 0  
- unlinked files : Practical UNIX & Internet Security, 25.2.2.7. Hidden space 
- unowned files : Practical UNIX & Internet Security, 24.4.1.8. Unowned files  
- unpacking source code 
         - sendmail, 2.1. Get the Source    
- sendmail, 18.3.1. What's Where in the Source  
  
 - unplugging connections : Practical UNIX & Internet Security, 24.2.5. Getting Rid of the Intruder  
- unpredictability of randomness : Practical UNIX & Internet Security, 23.6. Tips on Generating Random Numbers 
- unqualified 
      - addresses : sendmail, 16.5. Qualify All Addresses?    
- names   
       - sendmail, 19.6. Alphabetized m4 Macros      
- sendmail, 31.10. Alphabetized Reference    
  
 
 - unquoted whitespace : sendmail, 13.2.8. The Unquoted Space Replacement Character  
- unreachable destinations, detecting : TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol 
- Unreachable Port message : TCP/IP Network Administration, 11.5.2. Tracing Routes  
- UnsafeGroupWrites option : sendmail, 34.8. Alphabetized Reference  
- unused accounts 
        - removing from system : TCP/IP Network Administration, 12.2.2. Choosing a Password    
- security problems with : TCP/IP Network Administration, 12.2.1. The Shadow Password File  
  
 - UPDATE messages : TCP/IP Network Administration, 7.5.2. Border Gateway Protocol  
- updating : TCP/IP Network Administration, 7.5.1. Exterior Gateway Protocol  
- updating aliases file : sendmail, 4.1.3. Rebuild Aliases Mode (-bi)  
- upgrades, logging : Practical UNIX & Internet Security, 10.7.2.1. Exception and activity reports 
- upgrading sendmail : sendmail, 18.2. Vendor Versus Compiling  
- uploading programs on HTTP server : Building Internet Firewalls, 8.6.3.1. What can a malicious client do to 
- uploading stored information : Practical UNIX & Internet Security, 12.3.4. Protecting Local Storage  
- UPS (uninterruptable power supply) 
           - Practical UNIX & Internet Security, 2.2. Risk Assessment   
- Practical UNIX & Internet Security, 12.2.1.1. Fire  
  
 - uptime command : Practical UNIX & Internet Security, 8.1.3. Accounts That Run a Single Command  
- urandom device : Practical UNIX & Internet Security, 23.7.4. Other random number generators 
- URLs (universal resource locators) 
      - Building Internet Firewalls, 8.6. World Wide Web (WWW) and HTTP   
- TCP/IP Network Administration, 13.1. The World Wide Web  
  
 - U.S. Department of Energy : Practical UNIX & Internet Security, F.3.4.12. France 
- U.S. Department of the Navy : Practical UNIX & Internet Security, F.3.4.44. U.S. Department of the Navy 
- U.S. law : (see laws) 
- U.S. Naval Research Laboratory (NRL) : TCP/IP Network Administration, 12.2.4. OPIE  
- U.S. Secret Service 
        - Practical UNIX & Internet Security, 26.2.2. Federal Jurisdiction    
- Practical UNIX & Internet Security, F.3.3. U.S. Secret Service 
  
 - usage profile : Building Internet Firewalls, 5.9.1. Learn What the Normal Usage Profile Is 
- use_ct_file feature : sendmail, 19.6. Alphabetized m4 Macros  
- use_cw_file feature : sendmail, 19.6. Alphabetized m4 Macros  
- UseErrorsTo (l) option : sendmail, 34.8. Alphabetized Reference  
- Usenet news 
        - Practical UNIX & Internet Security, 17.3.13. Network News Transport Protocol (NNTP)  (TCP Port   
- Practical UNIX & Internet Security, E.2. Usenet Groups   
- TCP/IP Network Administration, 13.5.1. Newsgroups    
- TCP/IP Network Administration, E.3.5. MAILER   
- (see also NNTP)   
- cleanup scripts : Practical UNIX & Internet Security, 11.5.3. Abusing Automatic Mechanisms    
- encryption for : (see ROT13 algorithm)   
- newsgroups   
             - Building Internet Firewalls, 2.4. Usenet News     
- TCP/IP Network Administration, 13.5.1. Newsgroups      
- defamation/harassment via : Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication,  and Defamation     
- keeping current : Building Internet Firewalls, 12.3.1.2. Newsgroups     
- for security information : TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information      
- security resources via : Building Internet Firewalls, A.4. Newsgroups     
- using     
              - TCP/IP Network Administration, 4.1.1. Network Contacts        
- TCP/IP Network Administration, 13.5.1. Newsgroups      
  
   
   - posting breakins to : Practical UNIX & Internet Security, 24.6. Resuming Operation   
- reporting security holes on : Practical UNIX & Internet Security, 2.5.1. Going Public 
  
 - USENIX Association : Building Internet Firewalls, A.6.1. USENIX Association 
- user accounts on bastion host : Building Internet Firewalls, 5.7. Don't Allow User Accounts on the 
- user authentication 
      - TCP/IP Network Administration, 9.3.2. NIS+    
- TCP/IP Network Administration, 12.2. User Authentication  
  
 - User Database 
    - sendmail, 18.8. Alphabetized Reference    
- sendmail, 30.8. Alphabetized F= Flags   
- sendmail, 33.5. The User Database    
- sendmail, 33.8. Alphabetized Reference    
- sendmail, 34.8. Alphabetized Reference    
- rewrite : sendmail, 30.8. Alphabetized F= Flags 
      
 - user database class : sendmail, 33.8. Alphabetized Reference  
- User Datagram Protocol (UDP) 
     - Building Internet Firewalls, 6.3.3.2. UDP   
- Building Internet Firewalls, C.6.1. User Datagram Protocol   
- Practical UNIX & Internet Security, 16.2.4.3. UDP   
- Practical UNIX & Internet Security, 17.1.3. The /etc/inetd Program    
- TCP/IP Network Administration, 1.2. A Data Communications Model   
- TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture   
- TCP/IP Network Administration, 1.6. Transport Layer   
- (see also network services)   
- checksum errors in : TCP/IP Network Administration, 5.3.1.1. Options    
- packet relayer   
               - Building Internet Firewalls, 7.6. Using SOCKS for     
- Building Internet Firewalls, B.4.3. UDP Packet Relayer     
- Practical UNIX & Internet Security, E.4.15. UDP Packet Relayer   
   
 
 - user IDs : (see UIDs) 
- "User unknown" message : sendmail, 4.2. Verbose (-v)  
- UserDatabaseSpec (U) option 
      - sendmail, 18.8. Alphabetized Reference    
- sendmail, 34.8. Alphabetized Reference  
  
 - userdb database class : sendmail, 33.8. Alphabetized Reference  
- USERDB macro : sendmail, 18.8. Alphabetized Reference  
- USERFILE file (UUCP) 
      - Practical UNIX & Internet Security, 15.4.1. USERFILE: Providing Remote File Access    
- Practical UNIX & Internet Security, 15.4.2.1. Some bad examples 
  
 - usermod command 
    - Practical UNIX & Internet Security, 8.3. Restricting Logins   
- Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts  
  
 - usernames : Practical UNIX & Internet Security, 3.1. Usernames  
    - aliases for : Practical UNIX & Internet Security, 8.8.9. Account Names Revisited: Using Aliases  for Increased   
- capitalization : sendmail, 30.8. Alphabetized F= Flags   
- doubling as passwords (Joes) : Practical UNIX & Internet Security, 3.6.2. Smoking Joes   
- last command and : Practical UNIX & Internet Security, 10.1.3. last Program    
- as passwords : Practical UNIX & Internet Security, 8.8.3.1. Joetest: a simple password cracker   
- recipient's : (see $u macro)   
- special   
            - Practical UNIX & Internet Security, 4.2. Special Usernames      
- Practical UNIX & Internet Security, 4.2.3. Impact of the /etc/passwd and /etc/group   
  
   - using someone else's   
      - Practical UNIX & Internet Security, 4.3. su: Changing Who You Claim to Be     
- Practical UNIX & Internet Security, 4.3.8. Other Uses of su    
  
 
 - users 
    - Practical UNIX & Internet Security, 4. Users, Groups, and the Superuser   
- Practical UNIX & Internet Security, 4.1. Users and Groups    
- Practical UNIX & Internet Security, 4.1.2. Multiple Accounts with the Same UID   
- (see also groups; su command)   
- $: operator and   
          - sendmail, 9.2.3. The User ($:)      
- sendmail, 9.3. Testing Rule Set 0      
- sendmail, 29.6.1. Further Processing: $:user      
- sendmail, 30.5.3. The $: Part     
- sendmail, 33.4.1. Specify a Default with $:    
     
   - alias delivery to : sendmail, 24.2.1. Delivery to Users    
- assigning passwords to : Practical UNIX & Internet Security, 8.8.1. Assigning Passwords to Users    
- auditing who is logged in   
        - Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files      
- Practical UNIX & Internet Security, 10.1.2.1. su commandutmp and wtmp files andsu   
  
   - authentication for Web : Practical UNIX & Internet Security, 18.3.3. Setting Up Web Users and Passwords   
- checklist for : Practical UNIX & Internet Security, A.1.1.2. Chapter 3: Users and Passwords    
- dormant accounts and   
        - Practical UNIX & Internet Security, 8.4. Managing Dormant Accounts      
- Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts    
  
   - errors by : Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures   
- .forward file : sendmail, 22.5.3. Permissions for ~/.forward Files    
- groups : sendmail, 18.8. Alphabetized Reference    
- identities of : (see also UIDs)   
         - default     
        - sendmail, 13.2.5. The Default User Identities        
- sendmail, 22.8.3.1. The DefaultUser option        
- sendmail, 34.8. Alphabetized Reference      
   
     - proving : Practical UNIX & Internet Security, 19.3.1.1. Proving your identity      
- recognizing as intruders     
         - Practical UNIX & Internet Security, 24.2. Discovering an Intruder        
- Practical UNIX & Internet Security, 24.2.6. Anatomy of a Break-in     
  
     - taking someone else's     
        - Practical UNIX & Internet Security, 4.3. su: Changing Who You Claim to Be       
- Practical UNIX & Internet Security, 4.3.8. Other Uses of su      
  
   
   - importing to NIS server   
      - Practical UNIX & Internet Security, 19.4.1. Including or excluding specific accounts:     
- Practical UNIX & Internet Security, 19.4.4.2. Using netgroups to limit the importing of accounts   
  
   - including oneself on mailing lists : sendmail, 34.8. Alphabetized Reference    
- letting in threats : Practical UNIX & Internet Security, 11.4. Entry    
- as LHS of alias : sendmail, 30.8. Alphabetized F= Flags   
- limited : Practical UNIX & Internet Security, 8.1.5.1. Limited users   
- local : sendmail, 31.10. Alphabetized Reference    
          - accepting mail from only : sendmail, 20.2.1. Accept Mail Only From Our Domain      
- delivery to     
         - sendmail, 3.2. Role in Local Delivery        
- sendmail, 19.6. Alphabetized m4 Macros        
- sendmail, 29.6.3. Delivering to Local Recipient        
- sendmail, 30.8. Alphabetized F= Flags     
    
   
   - logging   
      - Practical UNIX & Internet Security, 10.4. Per-User Trails in the Filesystem     
- Practical UNIX & Internet Security, 10.4.3. Network Setup   
  
   - mailing list instructions for : sendmail, 25.5.4. Users Ignore list-request    
- marked with + : sendmail, 24.4.3. Plussed Users    
- NIS passwords for : Practical UNIX & Internet Security, 19.3.2.1. Creating passwords for users    
- nobody (Secure RPC) : Practical UNIX & Internet Security, 19.3.2.1. Creating passwords for users    
- notifying about monitoring : Practical UNIX & Internet Security, 26.2.6. Other Tips    
- passwords : (see passwd file; passwords)   
- recipient of bounced mail : (see $n macro)   
- restricting certain : Practical UNIX & Internet Security, 18.3. Controlling Access to Files on Your Server   
- root : (see root account/user; superusers)   
- running sendmail manually : sendmail, 1.4. Run sendmail by Hand    
- security responsibilities : TCP/IP Network Administration, 12.1.3. Writing a Security Policy    
- semiprivileged : sendmail, 22.5. Permissions    
- sending messages to : Practical UNIX & Internet Security, 10.5.1. The syslog.conf Configuration File    
- summarizing system usage by : Practical UNIX & Internet Security, 25.2.2.2. quot command    
- tainting : Practical UNIX & Internet Security, 18.2.3.4. Tainting with Perl   
- training : Practical UNIX & Internet Security, 13.2.1. Initial Training   
- trusted   
                      - sendmail, 5.3.10. Trusted Users      
- sendmail, 14.6. Trusted User      
- sendmail, 19.6. Alphabetized m4 Macros      
- sendmail, 22.8.1. Trusted Users      
- sendmail, 32.5. Alphabetized Reference    
     
   - unattended terminals   
      - Practical UNIX & Internet Security, 12.3.5. Unattended Terminals      
- Practical UNIX & Internet Security, 12.3.5.2. X screen savers   
  
   - unavailable : (see undeliverable addresses in aliases)   
- USERFILE entries for : Practical UNIX & Internet Security, 15.4.1.2. USERFILE entries for local users    
- verifying with SMTP : sendmail, 22.3.2. SMTP vrfy and expn    
- www : Practical UNIX & Internet Security, 18.2.2. Understand Your Server's Directory Structure 
    
 - users command 
    - Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files    
- Practical UNIX & Internet Security, 24.2.1. Catching One in the Act  
  
 - USESETEUID macro : sendmail, 18.8. Alphabetized Reference  
- USG (UNIX Support Group) : Practical UNIX & Internet Security, 1.3. History of UNIX  
- /usr directory 
      - Practical UNIX & Internet Security, 4.3.7. The Bad su Log    
- (see also /var directory)   
- /usr/adm directory : Practical UNIX & Internet Security, 11.5.3.6. Other files    
        - /usr/adm/messages file, in security checks     
        - Practical UNIX & Internet Security, 10.2.3. messages Log File       
- TCP/IP Network Administration, 12.4.2.2. Checking login activity      
  
     - /usr/adm/lastlog file : Practical UNIX & Internet Security, 10.1.1. lastlog File    
 
   - /usr/bin directory   
      - Practical UNIX & Internet Security, 11.1.5. Viruses      
- Practical UNIX & Internet Security, 11.5.1.1. PATH attacks      
- backing up : Practical UNIX & Internet Security, 7.1.2. What Should You Back Up?      
- /usr/bin/uudecode : (see uudecode program)   
    
   - /usr/etc/bootpd file : TCP/IP Network Administration, 9.6.1. rdist    
- /usr/etc/yp/makedbm program : Practical UNIX & Internet Security, 19.4.4.1. Setting up netgroups    
- /usr/lib directory : Practical UNIX & Internet Security, 11.5.3.6. Other files    
        - in restricted filesystems : Practical UNIX & Internet Security, 8.1.5. Restricted Filesystem     
- /usr/lib/aliases file : Practical UNIX & Internet Security, 11.5.3.3. /usr/lib/aliases, /etc/aliases,     
- /usr/lib/preserve program : Practical UNIX & Internet Security, 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve     
- /usr/lib/sendmail : (see sendmail)     
- /usr/lib/uucp directory     
            - Practical UNIX & Internet Security, 15.4.2.1. Some bad examples       
- Practical UNIX & Internet Security, 15.5.2. Permissions Commands      
  
     - /usr/lib/uucp/Devices file : Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer      
- /usr/lib/uucp/L-devices file : Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer      
- /usr/lib/uucp/L.cmds file : (see L.cmds file)     
- /usr/lib/uucp/L.sys file : Practical UNIX & Internet Security, 15.3.3. Security of L.sys and Systems Files      
- /usr/lib/uucp/Permissions file : (see Permissions file)     
- /usr/lib/uucp/Systems file : Practical UNIX & Internet Security, 15.3.3. Security of L.sys and Systems Files      
- /usr/lib/uucp/USERFILE file     
              - Practical UNIX & Internet Security, 15.4.1. USERFILE: Providing Remote File Access        
- Practical UNIX & Internet Security, 15.4.2.1. Some bad examples     
  
   
   - /usr/local/bin directory   
      - Practical UNIX & Internet Security, 1.1. What Is Computer Security?      
- Practical UNIX & Internet Security, 11.5.1.1. PATH attacks      
- /usr/local/etc/http/logs directory : Practical UNIX & Internet Security, 10.3.5. access_log Log File     
- /usr/local/lib directory : Practical UNIX & Internet Security, 11.5.3.6. Other files    
    
   - /usr/sbin/imapd file : TCP/IP Network Administration, 9.7.2. IMAP Server    
- /usr/sbin/rexecd : (see rexec service)   
- /usr/spool/cron/crontabs directory : Practical UNIX & Internet Security, 15.6.2. Automatic Execution of Cleanup Scripts    
- /usr/spool/uucp directory : Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work    
- /usr/spool/uucppublic : (see uucppublic directory)   
- /usr/src/linux source directory : TCP/IP Network Administration, 5.2. Linux Kernel Configuration    
- /usr/src/sys/i386/conf directory : TCP/IP Network Administration, 5.3. The BSD Kernel Configuration File    
- /usr/tmp directory : sendmail, 18.8. Alphabetized Reference    
- /usr/tmp/gated_dump file : TCP/IP Network Administration, B.1.1. Signal Processing   
- /usr/ucb directory : Practical UNIX & Internet Security, 11.1.5. Viruses  
          
 - usrerr() : sendmail, 20.2.1. Accept Mail Only From Our Domain  
- USRX command, in ESMTP : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions 
- utility programs : Practical UNIX & Internet Security, 1.2. What Is an Operating System?  
- utimes commandn : Practical UNIX & Internet Security, 24.5.1. Never Trust Anything Except Hardcopy  
- utmp file 
        - Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files    
- Practical UNIX & Internet Security, 10.1.2.1. su commandutmp and wtmp files andsu   
- Practical UNIX & Internet Security, 24.2.1. Catching One in the Act    
- Practical UNIX & Internet Security, 24.2.4. Tracing a Connection  
    
 - uucheck program : Practical UNIX & Internet Security, 15.5.3. uucheck: Checking Your Permissions File  
- uucico program 
     - Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work    
- Practical UNIX & Internet Security, 15.3. UUCP and Security    
- Practical UNIX & Internet Security, 15.5.1.1. Starting up  
   
 - UUCP (UNIX-to-UNIX Copy Protocol) 
    - Building Internet Firewalls, 2.2. File Transfer   
- Practical UNIX & Internet Security, 4.1.2. Multiple Accounts with the Same UID   
- Practical UNIX & Internet Security, 14.5. Modems and UNIX   
- Practical UNIX & Internet Security, 15. UUCP    
- Practical UNIX & Internet Security, 15.1.1. uucp Command    
- Practical UNIX & Internet Security, 15.9. Summary    
- Practical UNIX & Internet Security, 17.3.20. UUCP over TCP (TCP Port 540)   
- sendmail, 3.3.2. UUCP    
- sendmail, 8.1.4. UUCP and Host Paths    
- sendmail, 19.6. Alphabetized m4 Macros    
- TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol   
- TCP/IP Network Administration, 5.4. The Internet Daemon    
- TCP/IP Network Administration, 10.5.8. Defining Mailers    
- additional logins : Practical UNIX & Internet Security, 15.3.1. Assigning Additional UUCP Logins    
- addresses   
                    - sendmail, 17.1.4. UUCP Addresses      
- sendmail, 17.4. Rule Set 4    
  
   - bang syntax : TCP/IP Network Administration, 10.7.1. Modifying Local Information    
- BNU   
       - Practical UNIX & Internet Security, 15.2. Versions of UUCP      
- Practical UNIX & Internet Security, 15.5. Security in BNU UUCP      
- Practical UNIX & Internet Security, 15.5.3. uucheck: Checking Your Permissions File    
   
   - checklist for : Practical UNIX & Internet Security, A.1.1.14. Chapter 15: UUCP    
- cleanup scripts   
       - Practical UNIX & Internet Security, 11.5.3. Abusing Automatic Mechanisms      
- Practical UNIX & Internet Security, 15.6.2. Automatic Execution of Cleanup Scripts    
  
   - configuring : Building Internet Firewalls, 8.2.4. UNIX-to-UNIX   
- early security problems : Practical UNIX & Internet Security, 15.7. Early Security Problems with UUCP    
- eliminating support of : sendmail, 19.6. Alphabetized m4 Macros    
- HoneyDanBer (HDB) : Practical UNIX & Internet Security, 15.2. Versions of UUCP    
- $k macro : sendmail, 31.10. Alphabetized Reference    
- local handling of : sendmail, 29.6.5. Handling UUCP Locally    
- logging : Practical UNIX & Internet Security, 10.3.4. uucp Log Files   
- m4 configuration options : sendmail, 19.4.6. UUCP    
- macros for repays : sendmail, 31.10. Alphabetized Reference    
- mail forwarding : Practical UNIX & Internet Security, 15.6.1. Mail Forwarding for UUCP    
- naming computer : Practical UNIX & Internet Security, 15.5.2. Permissions Commands    
- over networks : Practical UNIX & Internet Security, 15.8. UUCP Over Networks   
- NFS server and : Practical UNIX & Internet Security, 15.3. UUCP and Security    
- passwords for : Practical UNIX & Internet Security, 15.3.2. Establishing UUCP Passwords    
- sites, serving   
                    - TCP/IP Network Administration, E.3. m4 sendmail Macros     
- TCP/IP Network Administration, E.3.5. MAILER   
  
   - system connected with : TCP/IP Network Administration, 10.5.3. The Define Class Command    
- Taylor : Practical UNIX & Internet Security, 15.2. Versions of UUCP    
- over TCP : Practical UNIX & Internet Security, 17.3.20. UUCP over TCP (TCP Port 540)   
- Version 2   
         - Practical UNIX & Internet Security, 15.2. Versions of UUCP      
- Practical UNIX & Internet Security, 15.4. Security in Version 2 UUCP      
- Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution    
   
 
 - uucp (user) 
    - Practical UNIX & Internet Security, 4.1. Users and Groups    
- Practical UNIX & Internet Security, 4.2.2. Other Special Users  
  
 - UUCP_RELAY macro (m4) : sendmail, 19.6. Alphabetized m4 Macros  
- UUCP-style lock files 
     - TCP/IP Network Administration, 6.3.4. PPP Daemon Security    
- TCP/IP Network Administration, A.2. The PPP Daemon 
  
 - uucpa account : Practical UNIX & Internet Security, 15.3.1. Assigning Additional UUCP Logins  
- uucpd program : Practical UNIX & Internet Security, 15.8. UUCP Over Networks 
- uucpdomain feature : sendmail, 19.6. Alphabetized m4 Macros  
- uucppublic directory 
       - Practical UNIX & Internet Security, 15.1.1. uucp Command    
- Practical UNIX & Internet Security, 15.4.1.3. Format of USERFILE entry without system name    
- Practical UNIX & Internet Security, 15.5.2. Permissions Commands  
   
 - UUCPSMTP macro (m4) : sendmail, 19.6. Alphabetized m4 Macros  
- uudecode program 
     - Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email   
- sendmail, 22.6. The Aliases File  
  
 - uuencode program 
    - Practical UNIX & Internet Security, 6.6.1.2. Ways of improving the security of crypt    
- sendmail, 22.6. The Aliases File  
  
 - uux command 
    - Practical UNIX & Internet Security, 15.1.2. uux Command    
- Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work  
  
 - uuxqt program : Practical UNIX & Internet Security, 15.4.1.3. Format of USERFILE entry without system name  
- uuxqtcmds files : Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution  
  
   
  Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z  
Copyright © 1999  O'Reilly & Associates, Inc. All Rights Reserved.