Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] CA (Certificate Authority) management configuration 2nd Cacti tool 2nd 3rd 4th capacity server hardware 2nd adding disk 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th preparation 2nd 3rd 4th CCITSE (Common Criteria for Information Technology Security Evaluation) CD-ROMs SLES installation 2nd 3rd Cdrom group defaults GID central servers syslog 2nd 3rd 4th 5th 6th hardening central host 2nd 3rd 4th 5th 6th 7th stealth logging host 2nd 3rd CERT (Computer Emergency Response Team) Web site Certificate Authority [See CA] certifications operating system 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th CFS Web site CHARGEN xinetd chgrp command file ownership changes 2nd 3rd 4th chiark Web site chkrootkit 2nd 3rd 4th chmod command access mode changes common settings 2nd 3rd 4th chown command file assignment file ownership changes 2nd 3rd 4th chroot jail chroot jails 2nd 3rd CIFS (Common Internet File System) 2nd cold backups databases 2nd 3rd 4th 5th 6th cold booting servers boot loaders 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th kernel boot 2nd 3rd command-line completion bash shell piplines bash shell command-line tools managing user accounts 2nd 3rd 4th 5th 6th 7th creating accounts 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th creating groups 2nd 3rd 4th 5th 6th default properties 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th command-lines print queue configuration 2nd 3rd 4th 5th 6th commands bash shell standards history bash shell 2nd 3rd system management 2nd 3rd 4th 5th vi text editor 2nd 3rd 4th Common Criteria for Information Technology Security Evaluation (CCITSE) Common Internet File System [See CIFS] (CIFS) Common UNIX Printing System [See CUPS] complete security 2nd Compressing Tape Archiver [See CTAR] Computer Associates website Computer Emergency Response Team (CERT) Web site conduits running between floors configuration hardware 2nd 3rd LILO 2nd manual editing network changing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th NTP client 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th server 2nd 3rd 4th 5th 6th 7th 8th PAM (Pluggable Authentication Module) 2nd printing adding local printers 2nd 3rd 4th adding network printers 2nd 3rd 4th 5th local printers 2nd 3rd network printers 2nd services 2nd SLES installation systems 2nd SuSEconfig 2nd 3rd 4th 5th YaST 2nd 3rd 4th 5th 6th 7th 8th 9th 10th users 2nd 3rd 4th 5th default shell 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th environment variables 2nd 3rd 4th 5th 6th 7th login scripts 2nd 3rd 4th 5th 6th 7th configuration passwords versus bootup passwords Console group defaults GID control flags copy in-out utility [See cpio utility] copy-in mode (cpio -i mode) copy-out mode (cpio -o mode) copy-pass mode (cpio -p mode) Corbato, Fernando J CPAN Web site cpio -i mode (copy-in mode) cpio -o mode (copy-out mode) cpio -p mode (copy-pass mode) cpio utility backups 2nd 3rd 4th 5th 6th 7th 8th Crack 2nd password cracker crypt library call hash algorithms Crypticide Web site cryptographic CSRC Web site CTAR (Compressing Tape Archiver) CUPS (Common UNIX Printing System) queue management 2nd 3rd 4th command-line configuration 2nd 3rd 4th 5th 6th printer basics 2nd 3rd 4th Web interface 2nd 3rd 4th 5th 6th 7th 8th YaST configuration 2nd 3rd CUPS/IPP protocol Custom Floppies Cyrus user default UID |