Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] Daemon group defaults GID daemon user default UID daemons network services 2nd 3rd 4th 5th /etc/xinetd.conf file 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th access control 2nd 3rd 4th 5th security 2nd xinetd configuration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th Darik's Boot and Nuke (DBAN) data backup policies backups boot rescue disks 2nd 3rd 4th implementation 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd strategies 2nd 3rd 4th 5th 6th 7th tools 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th 68th 69th 70th 71st 72nd 73rd 74th 75th 76th 77th 78th 79th 80th 81st 82nd 83rd 84th 85th 86th 87th 88th 89th 90th 91st 92nd 93rd 94th 95th 96th 97th 98th 99th 100th 101st 102nd 103rd 104th 105th encryption 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th security corporate policies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th data snooping unauthorized sniffers data-entry mode vi text editor databases backups 2nd 3rd 4th 5th 6th trusted application DAYTIME xinetd DBAN (Darik's Boot and Nuke) dd utility backups 2nd 3rd 4th 5th 6th 7th 8th defaults file access permissions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th system group settings 2nd 3rd 4th 5th 6th 7th 8th system user settings 2nd 3rd Definitive Guide to Samba 3, The demilitarized zones (DMZ) deploying Web sites 2nd DES-based algorithm user password security 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th devices network YaST maintenance df command DHCP (Dynamic Host Configuration Protocol) DNS linking 2nd Network Name Service 2nd 3rd 4th 5th 6th 7th 8th dhcpd user default UID dialog boxes Archive Settings Dialout group defaults GID differential backups 2nd 3rd 4th directories permissions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th changing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th hacker exploits 2nd 3rd 4th 5th ownership changes 2nd 3rd 4th disasters recovery emergency bootup 2nd 3rd 4th 5th DISCARD xinetd Disk And Execution Monitor [See daemons] Disk group defaults GID disk space user management 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th diskettes creating boot disks disks adding to server 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th installation requirements preparation 2nd 3rd 4th distributions DMZ (demilitarized zones) DNS (Domain Name Service) DHCP linking 2nd Network Name Service 2nd 3rd 4th 5th 6th 7th 8th documentation filesystem metadata 2nd 3rd 4th 5th 6th Domain Name Service [See DNS] Download Floppy Images downloads installation manual dpt (indexer put colon here) mysql packets du command dumb terminals dump images dump program 2nd basics 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th command-line options 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th staggered incremental dumps 2nd 3rd 4th Dynamic Host Configuration Protocol [See DHCP] |