[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] "An Empirical Study of the Reliability of UNIX Utilities" (Miller, Barton P.; Fredriksen, Lars; So, "Codes, Keys, and Conflicts: Issues in U.S. Crypto Policy" (Association for Computing Machinery) "Computation of Discrete Logarithms in Prime Fields" (LaMacchia, Brian A. and Odlyzko, Andrew M.) "Hiding Information and Signatures in Trap Door Knapsacks" (Merkle, Ralph and Hellman, Martin E.) "New Directions in Cryptography" (Diffie, Whitfield and Hellman, Martin E.) "On the Design and Security of Block Ciphers" (Lai, Xuejia) "On the Security of Multiple Encryption" (Merkle, Ralph and Hellman, Martin E.) "Reflections on Trusting Trust" (Thompson, Ken) "Secure Communication Over Insecure Channels" (Merkle, Ralph) "The First Ten Years of Public-Key Cryptography" (Diffie, Whitfield) "UNIX Operating System Security" (Grampp, F. T. and Morris, R. H.) # (hash mark) disabling services with Unix superuser prompt $ (dollar sign), as Unix Bourne or Korn shell prompt % (percent sign), Unix C shell prompt () (parentheses), indicating system call (ISC)2 (International Information Systems Security Certification Consoritium, Inc.) + (plus sign) in file permissions in hosts .equiv file in NIS 2nd . (dot) directory 2nd .. (dot-dot) directory 2nd .forward file .indent hidden file .profile file .rhosts file modified by intruders .shosts file, back door in .ssh/authorized_keys file modified by intruders / (slash) as IFS separator pathnames beginning with /bin directory /dev directory /dev/klog device /etc directory /etc/aliases file 2nd /etc/crontab file /etc/default/su file /etc/dfs/dfstab file 2nd /etc/dfs/dfstab script /etc/dfs/sharetab file /etc/exports file 2nd 3rd /etc/fstab file /etc/ group file 2nd /etc/hosts file /etc/hosts.allow file 2nd 3rd /etc/hosts.deny file 2nd 3rd /etc/hosts.equiv file 2nd /etc/hosts.lpd file /etc/inetd.conf file 2nd 3rd 4th /etc/init.d directory 2nd /etc/logindevperm file /etc/mail/aliases file 2nd 3rd /etc/master.passwd file 2nd /etc/named.conf file /etc/ netgroup file /etc/ netgroups file 2nd /etc/nsswitch.conf file /etc/pam.conf file 2nd /etc/pam.d directory 2nd /etc/passwd file 2nd 3rd 4th 5th 6th 7th 8th /etc/periodic/security directory /etc/rc directory /etc/rc script /etc/rcn.d directory /etc/remote file /etc/resolv.conf file /etc/ securetty file /etc/security/console.perms file /etc/security/passwd file /etc/sendmail/aliases file /etc/services file 2nd /etc/shadow file 2nd 3rd /etc/smb.conf file /etc/ sudoers file /etc/syslog.conf file 2nd /etc/ttys file 2nd /etc/ttytab file /etc/vfstab file /etc/X0.hosts file /etc/xinetd.d directory network servers in /proc directory /System/Library/Startup Items directory /usr directory /usr//lib/crontab files /usr/adm directory /usr/etc directory /usr/etc/exportfs program /usr/etc/netgroup file /usr/lib directory /usr/lib/aliases file 2nd /usr/libexec directory /usr/local/etc/rc.d directory /usr/local/src directory /usr/sbin directory /usr/src directory /var directory /var/account/acct file /var/adm directory 2nd /var/adm/messages file /var/log directory 2nd /var/log/messages file /var/xferlog file /var/yp/securenets file @ Large (Freedman, David H. and Mann, Charles C.) @ (at sign), in xhost list [] (square brackets), indicating optional syntax ^, indicating control character _ ( underscore ), in hostnames ~ (tilde) ~! in mail messages for home directory 3DES [See Triple-DES algorithm] |