start page | rating of books | rating of authors | reviews | copyrights
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: E
- earthquakes : 12.2.1.4. Earthquake
- eavesdropping
- 12.3.1. Eavesdropping
- 12.3.1.5. Fiber optic cable
- 12.4.1.2. Potential for eavesdropping and data theft
- 14.4.4. Protecting Against Eavesdropping
- 14.4.4.2. Protection against eavesdropping
- 16.3.1. Link-level Security
- IP packets
- 16.3.1. Link-level Security
- 17.3.3. TELNET (TCP Port 23)
- through log files : 18.4.2. Eavesdropping Through Log Files
- on the Web
- 18.4. Avoiding the Risks of Eavesdropping
- 18.4.2. Eavesdropping Through Log Files
- X clients : 17.3.21.2. X security
- ECB (electronic code book)
- 6.4.4.2. DES modes
- 6.6.2. des: The Data Encryption Standard
- echo command : 23.5. Tips on Using Passwords
- ECPA (Electronic Communications Privacy Act) : 26.2.3. Federal Computer Crime Laws
- editing wtmp file : 10.1.3.1. Pruning the wtmp file
- editors : 11.5.2.7. Other initializations
- buffers for : 11.1.4. Trojan Horses
- Emacs : 11.5.2.3. GNU .emacs
- ex
- 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
- 11.5.2.4. .exrc
- 11.5.2.7. Other initializations
- startup file attacks : 11.5.2.4. .exrc
- vi
- 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
- 11.5.2.4. .exrc
- 11.5.2.7. Other initializations
- edquota command : 25.2.2.5. Using quotas
- EDS : F.3.4.11. EDS and EDS customers worldwide
- education : (see security, user awareness of)
- effective UIDs/GIDs
- 4.3.1. Real and Effective UIDs
- 5.5. SUID
- 10.1.2.1. su command and /etc/utmp and /var/adm/wtmp files
- C.1.3.2. Process real and effective UID
- 8mm video tape : 7.1.4. Guarding Against Media Failure
- electrical fires
- 12.2.1.2. Smoke
- (see also fires; smoke and smoking)
- electrical noise : 12.2.1.8. Electrical noise
- electronic
- breakins : (see breakins; cracking)
- code book (ECB)
- 6.4.4.2. DES modes
- 6.6.2. des: The Data Encryption Standard
- mail : (see mail)
- Electronic Communications Privacy Act (ECPA) : 26.2.3. Federal Computer Crime Laws
- ElGamal algorithm
- 6.4.2. Summary of Public Key Systems
- 6.5.3. Digital Signatures
- elm (mail system) : 11.5.2.5. .forward, .procmailrc
- emacs editor : 11.5.2.7. Other initializations
- .emacs file : 11.5.2.3. GNU .emacs
- email : (see mail)
- embedded commands : (see commands)
- embezzlers : 11.3. Authors
- emergency response organizations : (see response teams)
- employees
- 11.3. Authors
- 13. Personnel Security
- 13.3. Outsiders
- departure of : 13.2.6. Departure
- phonebook of : 12.3.3. Other Media
- security checklist for : A.1.1.12. Chapter 13: Personnel Security
- targeted in legal investigation : 26.2.5. If You or One of Your Employees Is a Target of an Investigation...
- trusting : 27.3.1. Your Employees?
- written authorization for : 26.2.6. Other Tips
- encryption
- 6.2. What Is Encryption?
- 6.2.2. The Elements of Encryption
- 12.2.6.2. Encryption
- (see also cryptography)
- algorithms : 2.5. The Problem with Security Through Obscurity
- crypt
- 6.6.1. UNIX crypt: The Original UNIX Encryption Command
- 6.6.1.3. Example
- Digital Signature Algorithm
- 6.4.2. Summary of Public Key Systems
- 6.5.3. Digital Signatures
- ElGamal : 6.4.2. Summary of Public Key Systems
- IDEA : 6.4.1. Summary of Private Key Systems
- RC2, RC4, and RC5
- 6.4.1. Summary of Private Key Systems
- 6.4.8. Proprietary Encryption Systems
- ROT13 : 6.4.3. ROT13: Great for Encoding Offensive Jokes
- RSA
- 6.4.2. Summary of Public Key Systems
- 6.4.6. RSA and Public Key Cryptography
- 6.4.6.3. Strength of RSA
- application-level : 16.3.1. Link-level Security
- of backups
- 7.1.6.3. Data security for backups
- 7.4.4. Encrypting Your Backups
- 12.3.2.4. Backup encryption
- checklist for : A.1.1.5. Chapter 6: Cryptography
- Data Encryption Standard (DES)
- 6.4.1. Summary of Private Key Systems
- 6.4.4. DES
- 6.4.5.2. Triple DES
- 6.6.2. des: The Data Encryption Standard
- DCE and : 3.2.2. The /etc/passwd File and Network Databases
- Diffie-Hellman : (see Diffie-Hellman key exchange system)
- end-to-end : 16.3.1. Link-level Security
- Enigma system
- 6.3. The Enigma Encryption System
- 6.6.1.1. The crypt program
- (see also crypt command/algorithm)
- escrowing keys
- 6.1.3. Modern Controversy
- 7.1.6.3. Data security for backups
- exporting software : 26.4.1. Munitions Export
- of hypertext links : 18.4.1. Eavesdropping Over the Wire
- laws about
- 6.7. Encryption and U.S. Law
- 6.7.2. Cryptography and Export Controls
- link-level : 16.3.1. Link-level Security
- of modems : 14.6. Additional Security for Modems
- Netscape Navigator system : 18.4.1. Eavesdropping Over the Wire
- with network services : 17.4. Security Implications of Network Services
- one-time pad mechanism : 6.4.7. An Unbreakable Encryption Algorithm
- of passwords
- 8.6. The UNIX Encrypted Password System
- 8.6.4. Crypt16() and Other Algorithms
- 23.5. Tips on Using Passwords
- PGP : (see PGP)
- programs for UNIX
- 6.6. Encryption Programs Available for UNIX
- 6.6.3.6. PGP detached signatures
- proprietary algorithms : 6.4.8. Proprietary Encryption Systems
- RC4 and RC5 algorithms : 6.4.1. Summary of Private Key Systems
- references on : D.1.5. Cryptography Books
- Skipjack algorithm : 6.4.1. Summary of Private Key Systems
- superencryption : 6.4.5. Improving the Security of DES
- and superusers : 6.2.4. Why Use Encryption with UNIX?
- of Web information : 18.4.1. Eavesdropping Over the Wire
- end-to-end encryption : 16.3.1. Link-level Security
- Energy Sciences Network (ESnet) : F.3.4.43. U.S. Department of Energy sites, Energy Sciences Network (ESnet), and DOE contractors
- Enigma encryption system
- 6.3. The Enigma Encryption System
- 6.6.1.1. The crypt program
- Enterprise Networks : 16.1. Networking
- environment variables
- 11.5.2.7. Other initializations
- 23.2. Tips on Avoiding Security-related Bugs
- environment, physical
- 12.2.1. The Environment
- 12.2.1.13. Environmental monitoring
- erasing disks : 12.3.2.3. Sanitize your media before disposal
- erotica, laws governing : 26.4.5. Pornography and Indecent Material
- errno variable : 23.2. Tips on Avoiding Security-related Bugs
- errors : 7.1.1.1. A taxonomy of computer failures
- in ACLs : 5.2.5.1. AIX Access Control Lists
- configuration : 9.1. Prevention
- human : 7.1.4. Guarding Against Media Failure
- errors
- Preface
- (see also auditing, system activity)
- escape sequences, modems and : 14.5.3.1. Originate testing
- escrowing encryption keys
- 6.1.3. Modern Controversy
- 7.1.6.3. Data security for backups
- ESnet (Energy Sciences Network) : F.3.4.43. U.S. Department of Energy sites, Energy Sciences Network (ESnet), and DOE contractors
- espionage : 11.3. Authors
- /etc directory
- 11.1.2. Back Doors and Trap Doors
- 11.5.3.5. System initialization files
- backups of : 7.1.3. Types of Backups
- /etc/aliases file : 11.5.3.3. /usr/lib/aliases, /etc/aliases, /etc/sendmail/aliases, aliases.dir, or aliases.pag
- /etc/default/login file : 8.5.1. Secure Terminals
- /etc/exports file
- 11.6.1.2. Writable system files and directories
- 19.3.2.4. Using Secure NFS
- making changes to : 20.2.1.2. /usr/etc/exportfs
- /etc/fbtab file : 17.3.21.1. /etc/fbtab and /etc/logindevperm
- /etc/fingerd program : (see finger command)
- /etc/fsck program : 24.4.1.7. Hidden files and directories
- /etc/fstab file
- 11.1.2. Back Doors and Trap Doors
- 19.3.2.5. Mounting a secure filesystem
- /etc/ftpd : (see ftpd server)
- /etc/ftpusers file : 17.3.2.5. Restricting FTP with the standard UNIX FTP server
- /etc/group file
- 1.2. What Is an Operating System?
- 4.1.3.1. The /etc/group file
- 4.2.3. Impact of the /etc/passwd and /etc/group Files on Security
- 8.1.6. Group Accounts
- /etc/halt command : 24.2.6. Anatomy of a Break-in
- /etc/hosts file : 16.2.3.1. The /etc/hosts file
- /etc/hosts.equiv : (see hosts.equiv file)
- /etc/hosts.lpd file : 17.3.18.6. /etc/hosts.lpd file
- /etc/inetd : (see inetd daemon)
- /etc/inetd.conf file : 17.3. Primary UNIX Network Services
- /etc/init program : C.5.1. Process #1: /etc/init
- /etc/inittab : (see inittab program)
- /etc/keystore file : 19.3.1.1. Proving your identity
- /etc/logindevperm file : 17.3.21.1. /etc/fbtab and /etc/logindevperm
- /etc/motd file : 26.2.6. Other Tips
- /etc/named.boot file
- 17.3.6.1. DNS zone transfers
- 17.3.6.2. DNS nameserver attacks
- /etc/passwd file
- 1.2. What Is an Operating System?
- 3.2.1. The /etc/passwd File
- 3.2.2. The /etc/passwd File and Network Databases
- 4.2.3. Impact of the /etc/passwd and /etc/group Files on Security
- 8.1.1. Accounts Without Passwords
- 8.6. The UNIX Encrypted Password System
- C.5.1. Process #1: /etc/init
- + in : (see NIS)
- accounts without passwords : 8.1.1. Accounts Without Passwords
- backing up : 7.1.2. What Should You Back Up?
- new accounts : 24.4.1. New Accounts
- NFS : 20.2.1.1. /etc/exports
- uucp user and : 15.1.4. How the UUCP Commands Work
- /etc/profile file
- 11.5.2.1. .login, .profile, /etc/profile
- 24.4.1.6. Changes to startup files
- /etc/publickey file : 19.3.2.1. Creating passwords for users
- /etc/rc directory
- 11.5.3.5. System initialization files
- 17.1.2. Starting the Servers
- C.5.1. Process #1: /etc/init
- commenting out services : 17.3. Primary UNIX Network Services
- /etc/remote file
- 10.3.1. aculog File
- 14.5.1. Hooking Up a Modem to Your Computer
- /etc/renice : (see renice command)
- /etc/secure/passwd file : 8.1.1. Accounts Without Passwords
- /etc/security/passwd.adjunct file : 8.8.5. Shadow Password Files
- /etc/sendmail/aliases file : 11.5.3.3. /usr/lib/aliases, /etc/aliases, /etc/sendmail/aliases, aliases.dir, or aliases.pag
- /etc/services file : 17.1.1. The /etc/services File
- /etc/services file : 17.1.1. The /etc/services File
- /etc/shadow file
- 8.1.1. Accounts Without Passwords
- 8.8.5. Shadow Password Files
- /etc/shells file : 8.4.2. Changing the Account's Login Shell
- /etc/syslogd : (see syslog facility)
- /etc/tty file, backing up : 7.1.2. What Should You Back Up?
- /etc/ttys file
- 8.5.1. Secure Terminals
- 14.5.1. Hooking Up a Modem to Your Computer
- /etc/ttytab file : C.5.1. Process #1: /etc/init
- /etc/utmp file
- 10.1.2. utmp and wtmp Files
- 10.1.2.1. su command and /etc/utmp and /var/adm/wtmp files
- 24.2.1. Catching One in the Act
- 24.2.4. Tracing a Connection
- /etc/uucp directory : 15.4.2.1. Some bad examples
- /etc/yp/makedbm program : 19.4.4.1. Setting up netgroups
- in restricted filesystems : 8.1.5. Restricted Filesystem
- Ethernet : 16.1. Networking
- addresses for random seeds : 23.8. Picking a Random Seed
- cables : (see cables, network)
- eavesdropping by : 12.3.1.2. Eavesdropping by Ethernet and 10Base-T
- Ethers table (NIS+) : 19.5.3. NIS+ Tables
- Euler Totient Function : 6.4.6.1. How RSA works
- eval function
- 18.2.3.2. Testing is not enough!
- 18.2.3.3. Sending mail
- evidence, equipment seized as : 26.2.4. Hazards of Criminal Prosecution
- ex editor
- 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
- 11.5.2.4. .exrc
- 11.5.2.7. Other initializations
- exceptions : C.2. Creating Processes
- exclamation mark (!) and mail command : 15.1.3. mail Command
- exclusive OR (XOR) : 6.4.7. An Unbreakable Encryption Algorithm
- exec (in Swatch program) : 10.6.2. The Swatch Configuration File
- exec system call
- 5.1.7. File Permissions in Detail
- 18.2.3.3. Sending mail
- 23.2. Tips on Avoiding Security-related Bugs
- 25.2.1.1. Too many processes
- ExecCGI option : 18.3.2. Commands Within the <Directory> Block
- execl system call : 23.4. Tips on Writing SUID/SGID Programs
- execlp system call : 23.4. Tips on Writing SUID/SGID Programs
- execute permission
- 5.1.7. File Permissions in Detail
- 5.4. Using Directory Permissions
- execv system call : 23.4. Tips on Writing SUID/SGID Programs
- execve system call : 23.4. Tips on Writing SUID/SGID Programs
- execvp system call : 23.4. Tips on Writing SUID/SGID Programs
- expiring
- accounts : 8.4.3. Finding Dormant Accounts
- FTP depositories : 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP server
- passwords : 8.8.6. Password Aging and Expiration
- explosions : 12.2.1.5. Explosion
- export laws : 26.4.1. Munitions Export
- cryptography
- 6.4.4.1. Use and export of DES
- 6.7.2. Cryptography and Export Controls
- exportfs command : 20.2.1.2. /usr/etc/exportfs
- exports file
- 11.6.1.2. Writable system files and directories
- 19.3.2.4. Using Secure NFS
- 20.2.1.1. /etc/exports
- 20.2.1.2. /usr/etc/exportfs
- .exrc file : 11.5.2.4. .exrc
- ext2 filesystem (Linux) : 25.2.2.6. Reserved space
- external data representation (XDR) : 19.2. Sun's Remote Procedure Call (RPC)
- extinguishers, fire : (see fires)
- extortion : 11.3. Authors
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.