start page | rating of books | rating of authors | reviews | copyrights
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: T
- table objects (NIS+) : 19.5.3. NIS+ Tables
- TACACS : 17.3.5. TACACS (UDP Port 49)
- tainting
- 18.2.3.4. Tainting with Perl
- 23.4. Tips on Writing SUID/SGID Programs
- taintperl
- 5.5.3. SUID Shell Scripts
- 18.2.3.4. Tainting with Perl
- 23.4. Tips on Writing SUID/SGID Programs
- talk program : 11.1.4. Trojan Horses
- tandem backup : 7.1.4. Guarding Against Media Failure
- tar program
- 6.6.1.2. Ways of improving the security of crypt
- 7.3.2. Building an Automatic Backup System
- 7.4.2. Simple Archives
- 7.4.4. Encrypting Your Backups
- 24.2.6. Anatomy of a Break-in
- Taylor UUCP : 15.2. Versions of UUCP
- TCB (trusted computing base) : 8.5.3.2. Trusted computing base
- /tcb directory : 8.1.1. Accounts Without Passwords
- tcov tester : 23.2. Tips on Avoiding Security-related Bugs
- TCP (Transmission Control Protocol)
- 16.2.4.2. TCP
- 17.1.3. The /etc/inetd Program
- (see also network services)
- connections, clogging : 25.3.4. Clogging
- TCP/IP
- 1.4.3. Add-On Functionality Breeds Problems
- 10.5.2.2. Logging across the network
- (see also networks)
- checklist for
- A.1.1.15. Chapter 16: TCP/IP Networks
- A.1.1.16. Chapter 17: TCP/IP Services
- network services : (see network services)
- networks
- 16. TCP/IP Networks
- 16.5. Summary
- tcpwrapper program
- 17.2. Controlling Access to Servers
- E.4.10. tcpwrapper
- tcsh
- 11.5.1. Shell Features
- (see also shells)
- history file : 10.4.1. Shell History
- telecommunications : 26.2.2. Federal Jurisdiction
- telephone
- 14.3.1. Originate and Answer
- (see also modems)
- calls, recording outgoing : 10.3.1. aculog File
- cellular : 12.2.1.8. Electrical noise
- checklist for : A.1.1.13. Chapter 14: Telephone Security
- hang-up signal : (see signals)
- lines : 14.5.4. Physical Protection of Modems
- leasing : 14.5.4. Physical Protection of Modems
- one-way : 14.4.1. One-Way Phone Lines
- physical security of : 14.5.4. Physical Protection of Modems
- Telnet versus : 17.3.3. TELNET (TCP Port 23)
- Telnet utility
- 3.5. Verifying Your New Password
- 16.2.5. Clients and Servers
- 17.3.3. TELNET (TCP Port 23)
- versus rlogin : 17.3.18. rlogin and rsh (TCP Ports 513 and 514)
- telnetd program : 11.1.2. Back Doors and Trap Doors
- temperature : 12.2.1.6. Temperature extremes
- TEMPEST system : 12.3.1.3. Eavesdropping by radio and using TEMPEST
- terminal name and last command : 10.1.3. last Program
- terrorism : 12.2.5. Defending Against Acts of War and Terrorism
- testing
- CGI scripts : 18.2.3.2. Testing is not enough!
- core files and : 23.2. Tips on Avoiding Security-related Bugs
- programs : 23.2. Tips on Avoiding Security-related Bugs
- software : 1.4.2. Software Quality
- TFTP (Trivial File Transfer Protocol) : 17.3.7. Trivial File Transfer Protocol (TFTP) (UDP Port 69)
- tftpd server : 17.3.7. Trivial File Transfer Protocol (TFTP) (UDP Port 69)
- theft
- 7.1.1.1. A taxonomy of computer failures
- 12.2.6. Preventing Theft
- 12.2.6.4. Minimizing downtime
- 12.4.1.2. Potential for eavesdropping and data theft
- of backups
- 12.3.2. Protecting Backups
- 12.3.2.4. Backup encryption
- of RAM chips : 12.2.6. Preventing Theft
- thieves : 11.3. Authors
- third-party billing : 14.5.4. Physical Protection of Modems
- Thompson, Ken
- 1.3. History of UNIX
- 8.6. The UNIX Encrypted Password System
- threats
- assessing cost of : 2.3.3. Adding Up the Numbers
- back doors : (see back doors)
- to backups
- 7.1.6. Security for Backups
- 7.1.6.3. Data security for backups
- bacteria programs : 11.1.7. Bacteria and Rabbits
- biological : 12.2.1.7. Bugs (biological)
- broadcast storms : 25.3.2. Message Flooding
- via CGI scripts : 18.2.3.2. Testing is not enough!
- changing file owners : 5.7. chown: Changing a File's Owner
- changing system clock : 5.1.5. File Times
- code breaking
- 6.1.1. Code Making and Code Breaking
- (see also cryptography)
- commonly attacked accounts : 8.1.2. Default Accounts
- computer failures : 7.1.1.1. A taxonomy of computer failures
- decode aliases : 17.3.4.2. Using sendmail to receive email
- deep tree structures : 25.2.2.8. Tree-structure attacks
- denial of service
- 17.1.3. The /etc/inetd Program
- 17.3.21.5. Denial of service attacks under X
- 25. Denial of Service Attacks and Solutions
- 25.3.4. Clogging
- accidental : 25.2.5. Soft Process Limits: Preventing Accidental Denial of Service
- checklist for : A.1.1.24. Chapter 25: Denial of Service Attacks and Solutions
- destructive attacks : 25.1. Destructive Attacks
- disk attacks
- 25.2.2. Disk Attacks
- 25.2.2.8. Tree-structure attacks
- overload attacks
- 25.2. Overload Attacks
- 25.2.5. Soft Process Limits: Preventing Accidental Denial of Service
- system overload attacks : 25.2.1.2. System overload attacks
- disposed materials : 12.3.3. Other Media
- DNS client flooding : 16.3.2. Security and Nameservice
- DNS nameserver attacks : 17.3.6.2. DNS nameserver attacks
- DNS zone transfers : 17.3.6.1. DNS zone transfers
- dormant accounts
- 8.4. Managing Dormant Accounts
- 8.4.3. Finding Dormant Accounts
- false syslog entries : 10.5.3.1. Beware false log entries
- filename attacks : 11.5.1.4. Filename attacks
- hidden space : 25.2.2.7. Hidden space
- HOME variable attacks : 11.5.1.3. $HOME attacks
- identifying and quantifying
- 2.2.1.2. Identifying threats
- 2.2.2. Review Your Risks
- IFS variable attacks : 11.5.1.2. IFS attacks
- intruders : (see intruders)
- letting in accidentally : 11.4. Entry
- logic bombs
- 11.1.3. Logic Bombs
- 27.2.2. Viruses on the Distribution Disk
- mailing list for : E.1.3.9. RISKS
- media failure : 7.1.4. Guarding Against Media Failure
- meet-in-the-middle attacks : 6.4.5.1. Double DES
- MUD/IRC client programs : 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
- newly created accounts : 24.4.1. New Accounts
- NIS, unintended disclosure : 19.4.5. Unintended Disclosure of Site Information with NIS
- with NNTP : 17.3.13. Network News Transport Protocol (NNTP) (TCP Port 119)
- open (guest) accounts
- 8.1.4. Open Accounts
- 8.1.4.6. Potential problems with rsh
- PATH variable attacks : 11.5.1.1. PATH attacks
- plaintext attacks : 6.2.3. Cryptographic Strength
- playback (replay) attacks : 19.6.1.2. Using the ticket granting ticket
- programmed
- 11. Protecting Against Programmed Threats
- 11.6.2. Shared Libraries
- A.1.1.10. Chapter 11: Protecting Against Programmed Threats
- D.1.4. Computer Viruses and Programmed Threats
- authors of : 11.3. Authors
- damage from : 11.2. Damage
- replay attacks : 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
- rsh, problems with : 8.1.4.6. Potential problems with rsh
- sendmail problems : 17.3.4.1. sendmail and security
- spoofed network connection : 8.5.3.1. Trusted path
- start-up file attacks
- 11.5.2. Start-up File Attacks
- 11.5.2.7. Other initializations
- system clock : (see system clock)
- theft : (see theft)
- /tmp directory attacks : 25.2.4. /tmp Problems
- toll fraud : 14.4.1. One-Way Phone Lines
- traffic analysis : 18.4. Avoiding the Risks of Eavesdropping
- tree-structure attacks : 25.2.2.8. Tree-structure attacks
- Trojan horses
- 4.3.5. Using su with Caution
- 11.1.4. Trojan Horses
- 11.5. Protecting Yourself
- 17.3.21.2. X security
- 19.6.5. Kerberos Limitations
- 27.2.2. Viruses on the Distribution Disk
- trusted hosts : (see trusted, hosts)
- unattended terminals
- 12.3.5. Unattended Terminals
- 12.3.5.2. X screen savers
- unowned files : 24.4.1.8. Unowned files
- vandalism
- 12.2.4. Vandalism
- 12.2.4.3. Network connectors
- viruses
- 11.1.5. Viruses
- (see viruses)
- war and terrorism : 12.2.5. Defending Against Acts of War and Terrorism
- weakness-finding tools : 11.1.1. Security Tools
- by web browsers
- 18.5. Risks of Web Browsers
- 18.5.2. Trusting Your Software Vendor
- worms : 11.1.6. Worms
- three-way handshake (TCP) : 16.2.4.2. TCP
- ticket-granting service
- 19.6.1.1. Initial login
- 19.6.1.2. Using the ticket granting ticket
- 19.6.1.3. Authentication, data integrity, and secrecy
- tickets : (see Kerberos system)
- Tiger : E.4.11. Tiger
- tilde (~)
- in automatic backups : 18.2.3.5. Beware stray CGI scripts
- as home directory : 11.5.1.3. $HOME attacks
- ~! in mail messages : 8.1.3. Accounts That Run a Single Command
- time
- 19.3.1.3. Setting the window
- (see also NTP; system clock)
- CPU, accounting
- 10.2. The acct/pacct Process Accounting File
- 10.2.3. messages Log File
- defining random seed by : 23.8. Picking a Random Seed
- modification
- 5.1.2. Inodes
- 5.1.5. File Times
- 7.4.7. inode Modification Times
- 9.2.2. Checklists and Metadata
- 24.5.1. Never Trust Anything Except Hardcopy
- most recent login : 10.1.1. lastlog File
- Secure RPC window of : 19.3.1.3. Setting the window
- timeouts
- 11.1.3. Logic Bombs
- 23.3. Tips on Writing Network Programs
- timesharing
- 19.6.5. Kerberos Limitations
- 23.2. Tips on Avoiding Security-related Bugs
- Timezone table (NIS+) : 19.5.3. NIS+ Tables
- tip command
- 10.3.1. aculog File
- 14.5. Modems and UNIX
- 14.5.3.1. Originate testing
- 14.5.3.3. Privilege testing
- -l option : 14.5.3.1. Originate testing
- TIS Internet Firewall Toolkit (FWTK) : E.4.12. TIS Internet Firewall Toolkit
- TMOUT variable : 12.3.5.1. Built-in shell autologout
- /tmp directory
- 14.5.3.3. Privilege testing
- 25.2.4. /tmp Problems
- tmpfile function : 23.2. Tips on Avoiding Security-related Bugs
- token cards : 8.7.2. Token Cards
- token ring : 16.1. Networking
- toll fraud : 14.4.1. One-Way Phone Lines
- tools : 1.3. History of UNIX
- to find weaknesses : 11.1.1. Security Tools
- quality of
- 1.4.2. Software Quality
- 1.4.3. Add-On Functionality Breeds Problems
- Totient Function : 6.4.6.1. How RSA works
- tracing connections
- 24.2.4. Tracing a Connection
- 24.2.4.2. How to contact the system administrator of a computer you don't know
- trademarks : 26.4.3. Trademark Violations
- traffic analysis : 18.4. Avoiding the Risks of Eavesdropping
- training : 13.2.1. Initial Training
- transfer zones : 16.2.6.1. DNS under UNIX
- transfering files : 15.1.1. uucp Command
- Transmission Control Protocol (TCP) : 16.2.4.2. TCP
- Transmit Data (TD) : 14.3. The RS-232 Serial Protocol
- transmitters, radio : 12.2.1.8. Electrical noise
- transposition (in encryption) : 6.1.2. Cryptography and Digital Computers
- trap doors : (see back doors)
- trashing : 12.3.3. Other Media
- tree structures : 25.2.2.8. Tree-structure attacks
- trimlog : E.4.13. trimlog
- Triple DES
- 6.4.5. Improving the Security of DES
- 6.4.5.2. Triple DES
- Tripwire package
- 9.2.4. Tripwire
- 9.2.4.2. Running Tripwire
- 19.5.5. NIS+ Limitations
- E.4.14. Tripwire
- Trivial File Transfer Protocol (TFTP) : 17.3.7. Trivial File Transfer Protocol (TFTP) (UDP Port 69)
- Trojan horses
- 4.3.5. Using su with Caution
- 11.1.4. Trojan Horses
- 11.5. Protecting Yourself
- 27.2.2. Viruses on the Distribution Disk
- Kerberos and : 19.6.5. Kerberos Limitations
- X clients : 17.3.21.2. X security
- truncate system call : 5.1.7. File Permissions in Detail
- trust
- 1.1. What Is Computer Security?
- 2.1.1. Trust
- 27. Who Do You Trust?
- 27.4. What All This Means
- of log files : 10.8. Managing Log Files
- trusted
- 8.5.3.2. Trusted computing base
- 17.1.1. The /etc/services File
- hosts
- 17.3.18.1. Trusted hosts and users
- 17.3.18.4. The ~/.rhosts file
- NFS and : 17.3.18.2. The problem with trusted hosts
- path : 8.5.3.1. Trusted path
- ports : 1.4.3. Add-On Functionality Breeds Problems
- users
- 17.3.4.1. sendmail and security
- 17.3.18.1. Trusted hosts and users
- TRW Network Area and System Administrators : F.3.4.36. TRW network area and system administrators
- tty file : 7.1.2. What Should You Back Up?
- ttymon program : C.5.2. Logging In
- ttys file
- 8.5.1. Secure Terminals
- 14.5.1. Hooking Up a Modem to Your Computer
- ttytab file : C.5.1. Process #1: /etc/init
- ttywatch program : 24.2.3. Monitoring the Intruder
- tunefs command : 25.2.2.6. Reserved space
- tunneling : 16.4.1. IPX
- twisted pair : 16.1. Networking
- TZ variable : 23.2. Tips on Avoiding Security-related Bugs
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.