Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] A (address) records access control 2nd 3rd Apache executable files host-based, X Window System tcpd rules tcpd, controlling access to inetd services access file (Sendmail) 2nd access modes 2nd binary representation classes of users file ownership and octal notation permissions, listed setting 2nd changing with chmod new files SGID property sticky bit string SUID property access points, SSID ACL (access control list) kernel patches Squid acl option Squid passwd ACL using for DNS servers action directive (syslog.conf) active partitions active processes, signaling address (A) records addresses configuration with ifconfig aliases local delivery IP network SCSI 2nd controller address sed utility regular expressions as Advanced Package Tool (APT) management system aide (IDS tool) aliases 2nd /etc/modprobe.d/aliases file CNAME records email 2nd 3rd 4th 5th aliases file contents created by users in .forward file database reversing virtual user accounts interface Majordomo administrator modules.conf NIS map aliases alien command 2nd .allow files analog devices, asynchronous connections anchors (regular expressions) 2nd 3rd and operator (&&) annex anonymous FTP 2nd Apache 2nd 3rd authentication configuring 2nd access control directives httpd.conf file third-party modules Exam 202 review installing checking DSOs compiled compile-time options from source httpd running configure script test run, performing verifying web server is running jobs that monitor, scheduling Kerberos authentication, using performance tuning starting and stopping 2nd applications, problems with configuration files apropos command 2nd APSfilter 2nd apsfilterrc file apt-get tool 2nd 3rd architecture, PC review questions and exercises arguments command function ARP (Address Resolution Protocol) spoofing, attacks involving arp command arpwatch command problems reported by sample results syntax ash interpreter assembler asynchronous connections at facility 2nd 3rd 4th controlling user access to attacks ARP spoofing failed logins on DNS servers spoofing source addresses of packets SQL injection through ports auth log files authentication Apache CHAP INN (InterNet News service) Kerberos MIT-MAGIC-COOKIE-1 OpenSSH PAM PPP (Point-to-Point Protocol) protocols used by PPP public key rhosts Squid SSH and Kerberos, problems caused by DNS SSL authorization problems, troubleshooting authpriv facility (syslogd) 2nd autofs awk parsing command output scripting with shell scripting and |