start page | rating of books | rating of authors | reviews | copyrights
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: U
- U.S. Department of Energy : F.3.4.12. France: universities, Ministry of Research and Education in France, CNRS, CEA, INRIA, CNES, INRA, IFREMER, and EDF
- U.S. Department of the Navy : F.3.4.44. U.S. Department of the Navy
- U.S. law : (see laws)
- U.S. Secret Service
- 26.2.2. Federal Jurisdiction
- F.3.3. U.S. Secret Service (USSS)
- UDP (User Datagram Protocol)
- 16.2.4.3. UDP
- 17.1.3. The /etc/inetd Program
- (see also network services)
- packet relayer : E.4.15. UDP Packet Relayer
- ufsdump : (see dump/restore program)
- UIDs (user identifiers)
- 4.1. Users and Groups
- 4.1.2. Multiple Accounts with the Same UID
- real versus effective
- 4.3.1. Real and Effective UIDs
- C.1.3.2. Process real and effective UID
- RPC requests and : 19.2.2.2. AUTH_UNIX
- su command and : 10.1.2.1. su command and /etc/utmp and /var/adm/wtmp files
- of web servers : 18.2.1. The Server's UID
- zero : (see root account; superuser)
- UK Defense Research Agency : F.3.4.37. UK: Defense Research Agency
- ulimit command : 25.2.5. Soft Process Limits: Preventing Accidental Denial of Service
- Ultrix : 1.3. History of UNIX
- trusted path : 8.5.3.1. Trusted path
- UUCP : 15.4.1.3. Format of USERFILE entry without system name
- umask
- 5.3. The umask
- 5.3.2. Common umask Values
- 8.4.3. Finding Dormant Accounts
- unattended terminals
- 12.3.5. Unattended Terminals
- 12.3.5.2. X screen savers
- uninterruptable power supply (UPS)
- 2.2. Risk Assessment
- 12.2.1.1. Fire
- Unisys : F.3.4.39. UK: other government departments and agencies
- universes : 5.9.1. Dual Universes
- UNIX : 1. Introduction
- add-on functionality of : 1.4.3. Add-On Functionality Breeds Problems
- conventional passwords : 3.2.6. Conventional UNIX Passwords
- DAC (Discretionary Access Controls) : 4.1.3. Groups and Group Identifiers (GIDs)
- DNS under : 16.2.6.1. DNS under UNIX
- encryption programs for
- 6.6. Encryption Programs Available for UNIX
- 6.6.3.6. PGP detached signatures
- filesystem
- 5. The UNIX Filesystem
- 5.10. Summary
- history of : 1.3. History of UNIX
- modems and
- 14.5. Modems and UNIX
- 14.5.3.3. Privilege testing
- networking and : 16.1.2. Networking and UNIX
- operating systems : (see operating systems)
- primary network services
- 17.3. Primary UNIX Network Services
- 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
- process scheduler : C.1.3.3. Process priority and niceness
- processes : (see processes)
- programming references : D.1.11. UNIX Programming and System Administration
- published resources for : D.1. UNIX Security References
- security and
- 1.4. Security and UNIX
- 1.4.3. Add-On Functionality Breeds Problems
- signals : C.3. Signals
- starting up
- C.5. Starting Up UNIX and Logging In
- C.5.3. Running the User's Shell
- Version 6 : 1.3. History of UNIX
- viruses : (see viruses)
- web server on : 18.2. Running a Secure Server
- unlinked files : 25.2.2.7. Hidden space
- unowned files : 24.4.1.8. Unowned files
- unplugging connections : 24.2.5. Getting Rid of the Intruder
- unpredictability of randomness : 23.6. Tips on Generating Random Numbers
- upgrades, logging : 10.7.2.1. Exception and activity reports
- uploading stored information : 12.3.4. Protecting Local Storage
- UPS (uninterruptable power supply)
- 2.2. Risk Assessment
- 12.2.1.1. Fire
- uptime command : 8.1.3. Accounts That Run a Single Command
- urandom device : 23.7.4. Other random number generators
- Usenet
- 17.3.13. Network News Transport Protocol (NNTP) (TCP Port 119)
- E.2. Usenet Groups
- (see also NNTP)
- cleanup scripts : 11.5.3. Abusing Automatic Mechanisms
- encryption for : (see ROT13 algorithm)
- posting breakins to : 24.6. Resuming Operation
- reporting security holes on : 2.5.1. Going Public
- User Datagram Protocol (UDP) : 16.2.4.3. UDP
- user error : 7.1.1.1. A taxonomy of computer failures
- user IDs : (see UIDs)
- USERFILE file (UUCP)
- 15.4.1. USERFILE: Providing Remote File Access
- 15.4.2.1. Some bad examples
- usermod command
- -e option : 8.4.3. Finding Dormant Accounts
- -f option : 8.4.3. Finding Dormant Accounts
- -s option : 8.3. Restricting Logins
- usernames : 3.1. Usernames
- aliases for : 8.8.9. Account Names Revisited: Using Aliases for Increased Security
- doubling as passwords (Joes) : 3.6.2. Smoking Joes
- last command and : 10.1.3. last Program
- as passwords : 8.8.3.1. Joetest: a simple password cracker
- special
- 4.2. Special Usernames
- 4.2.3. Impact of the /etc/passwd and /etc/group Files on Security
- using someone else's
- 4.3. su: Changing Who You Claim to Be
- 4.3.8. Other Uses of su
- users
- 4. Users, Groups, and the Superuser
- 4.1. Users and Groups
- 4.1.2. Multiple Accounts with the Same UID
- (see also groups; su command)
- assigning passwords to : 8.8.1. Assigning Passwords to Users
- auditing who is logged in
- 10.1.2. utmp and wtmp Files
- 10.1.2.1. su command and /etc/utmp and /var/adm/wtmp files
- authentication for Web : 18.3.3. Setting Up Web Users and Passwords
- becoming other
- 4.3. su: Changing Who You Claim to Be
- 4.3.8. Other Uses of su
- checklist for : A.1.1.2. Chapter 3: Users and Passwords
- dormant accounts and
- 8.4. Managing Dormant Accounts
- 8.4.3. Finding Dormant Accounts
- identifiers for : (see UIDs)
- importing to NIS server
- 19.4.1. Including or excluding specific accounts:
- 19.4.4.2. Using netgroups to limit the importing of accounts
- letting in threats : 11.4. Entry
- limited : 8.1.5.1. Limited users
- logging
- 10.4. Per-User Trails in the Filesystem
- 10.4.3. Network Setup
- NIS passwords for : 19.3.2.1. Creating passwords for users
- nobody (Secure RPC) : 19.3.2.1. Creating passwords for users
- notifying about monitoring : 26.2.6. Other Tips
- proving identity of : 19.3.1.1. Proving your identity
- recognizing as intruders
- 24.2. Discovering an Intruder
- 24.2.6. Anatomy of a Break-in
- restricting certain : 18.3. Controlling Access to Files on Your Server
- root : (see root account; superuser)
- sending messages to : 10.5.1. The syslog.conf Configuration File
- summarizing system usage by : 25.2.2.2. quot command
- tainting : 18.2.3.4. Tainting with Perl
- training : 13.2.1. Initial Training
- UIDs : (see UIDs)
- unattended terminals
- 12.3.5. Unattended Terminals
- 12.3.5.2. X screen savers
- USERFILE entries for : 15.4.1.2. USERFILE entries for local users
- www : 18.2.2. Understand Your Server's Directory Structure
- users command
- 10.1.2. utmp and wtmp Files
- 24.2.1. Catching One in the Act
- USG (UNIX Support Group) : 1.3. History of UNIX
- /usr directory
- 4.3.7. The Bad su Log
- (see also /var directory)
- backing up /usr/bin : 7.1.2. What Should You Back Up?
- /usr/adm directory : 11.5.3.6. Other files
- /usr/adm/lastlog file : 10.1.1. lastlog File
- /usr/adm/messages file : 10.2.3. messages Log File
- /usr/bin directory
- 11.1.5. Viruses
- 11.5.1.1. PATH attacks
- /usr/bin/uudecode : (see uudecode program)
- /usr/etc/yp/makedbm program : 19.4.4.1. Setting up netgroups
- /usr/lib/aliases file : 11.5.3.3. /usr/lib/aliases, /etc/aliases, /etc/sendmail/aliases, aliases.dir, or aliases.pag
- /usr/lib directory : 11.5.3.6. Other files
- in restricted filesystems : 8.1.5. Restricted Filesystem
- /usr/lib/preserve program : 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
- /usr/lib/sendmail : (see sendmail)
- /usr/lib/uucp/Devices file : 14.5.1. Hooking Up a Modem to Your Computer
- /usr/lib/uucp directory
- 15.4.2.1. Some bad examples
- 15.5.2. Permissions Commands
- /usr/lib/uucp/L-devices file : 14.5.1. Hooking Up a Modem to Your Computer
- /usr/lib/uucp/L.cmds file : (see L.cmds file)
- /usr/lib/uucp/L.sys file : 15.3.3. Security of L.sys and Systems Files
- /usr/lib/uucp/Permissions file : (see Permissions file)
- /usr/lib/uucp/Systems file : 15.3.3. Security of L.sys and Systems Files
- /usr/lib/uucp/USERFILE file
- 15.4.1. USERFILE: Providing Remote File Access
- 15.4.2.1. Some bad examples
- /usr/local/bin : 1.1. What Is Computer Security?
- /usr/local/bin directory : 11.5.1.1. PATH attacks
- /usr/local/etc/http/logs directory : 10.3.5. access_log Log File
- /usr/local/lib directory : 11.5.3.6. Other files
- /usr/sbin/rexecd : (see rexec service)
- /usr/spool/cron/crontabs directory : 15.6.2. Automatic Execution of Cleanup Scripts
- /usr/spool/uucp directory : 15.1.4. How the UUCP Commands Work
- /usr/spool/uucppublic : (see uucppublic directory)
- /usr/ucb directory : 11.1.5. Viruses
- utility programs : 1.2. What Is an Operating System?
- utimes commandn : 24.5.1. Never Trust Anything Except Hardcopy
- utmp file
- 10.1.2. utmp and wtmp Files
- 10.1.2.1. su command and /etc/utmp and /var/adm/wtmp files
- 24.2.1. Catching One in the Act
- 24.2.4. Tracing a Connection
- uucheck program : 15.5.3. uucheck: Checking Your Permissions File
- uucico program
- 15.1.4. How the UUCP Commands Work
- 15.3. UUCP and Security
- 15.5.1.1. Starting up
- uucp (user)
- 4.1. Users and Groups
- 4.2.2. Other Special Users
- uucp command : 15.1.1. uucp Command
- UUCP system
- 4.1.2. Multiple Accounts with the Same UID
- 14.5. Modems and UNIX
- 15. UUCP
- 15.9. Summary
- additional logins : 15.3.1. Assigning Additional UUCP Logins
- BNU
- 15.2. Versions of UUCP
- 15.5. Security in BNU UUCP
- 15.5.3. uucheck: Checking Your Permissions File
- checklist for : A.1.1.14. Chapter 15: UUCP
- cleanup scripts
- 11.5.3. Abusing Automatic Mechanisms
- 15.6.2. Automatic Execution of Cleanup Scripts
- early security problems : 15.7. Early Security Problems with UUCP
- HoneyDanBer (HDB) : 15.2. Versions of UUCP
- logging : 10.3.4. uucp Log Files
- mail forwarding : 15.6.1. Mail Forwarding for UUCP
- naming computer : 15.5.2. Permissions Commands
- over networks : 15.8. UUCP Over Networks
- NFS server and : 15.3. UUCP and Security
- passwords for : 15.3.2. Establishing UUCP Passwords
- Taylor : 15.2. Versions of UUCP
- over TCP : 17.3.20. UUCP over TCP (TCP Port 540)
- Version 2
- 15.2. Versions of UUCP
- 15.4. Security in Version 2 UUCP
- 15.4.3. L.cmds: Providing Remote Command Execution
- uucpa account : 15.3.1. Assigning Additional UUCP Logins
- uucpd program : 15.8. UUCP Over Networks
- uucppublic directory
- 15.1.1. uucp Command
- 15.4.1.3. Format of USERFILE entry without system name
- 15.5.2. Permissions Commands
- uudecode program : 17.3.4.2. Using sendmail to receive email
- uuencode program : 6.6.1.2. Ways of improving the security of crypt
- uux command : 15.1.2. uux Command
- - (hyphen) option : 15.1.2. uux Command
- -r option : 15.1.4. How the UUCP Commands Work
- uuxqt program : 15.4.1.3. Format of USERFILE entry without system name
- uuxqtcmds files : 15.4.3. L.cmds: Providing Remote Command Execution
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.