[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] failures, computer [See also bugs ]2nd ’fair use “ provisions, copyright law Farmer, Dan 2nd 3rd 4th Fast File System [See FFS] FAT filesystem FAT32 filesystem FBI (Federal Bureau of Investigation) 2nd fchmod() system call 2nd fchow() system call Federal Bureau of Investigation (FBI) 2nd federal jurisdiction federal laws Ferbrache, David (The Pathology of Computer Viruses) FFS (Fast File System) 2nd 3rd FG (Frame Ground) fget() system call fgets() system call fiber optic cables FIFO file type file command file descriptors file handles 2nd File Transfer Protocol [See FTP] filenames, attacks through files 2nd access times of append-only backing up [See backups ] beginning with dash, deleting byte-by-byte comparisons of change time changing owner of checklists for comparing checksums detecting changes in context-dependent (CDFs) core critical, backing up critical, deleting deleted accidentally deleted as destructive attack detecting changes to device format of, monitoring group for group-writable hidden 2nd history immutable information about (metadata) inodes storing information about integrity of [See integrity] locating largest locking mandatory log [See log files] magic number in metadata, comparing modification times of 2nd 3rd 4th modified by intruders 2nd owner of permissions for [See permissions] security checklist for SGID bit on signatures detecting changes in startup [See startup files] SUID/SGID, finding swapping to system configuration system database system startup Trojan horses in trusted computing base (TCB) of types of 2nd unlinked , hidden space used by unowned which to back up world-writable zero-filled bytes (holes) in filesystems [See also directories]2nd Cryptfs cryptographic 2nd encrypted Fast File System journaling list of, available on Unix mounted network 2nd [See also NFS; SMB] remote network replicated (RAID) reserved space on restricted security checklist for 2nd summarizing usage per user superuser control of UFS virtual filesystem interface filter files (mail) filtering software 2nd filtering, on-demand find command -0 option -ls option -size option attacks on -H option -print option type -f option -xdev option finger account finger command 2nd 3rd 4th disabling finding contact information with login times displayed by running when not logged in finger service fingerd program 2nd [See also Internet worm program] fingerprint of files or keys [See message digest functions] Fingerprints Database fire 2nd 3rd firewalls account aliases and host-based program 2nd IP networks kernel-level mailing list for nameservers and for NIS sites packet-level portmapper program and standalone appliance for stateful inspection of telephone verifying proper operation of Firewalls and Internet Security (Bellovin, Steve and Cheswick, Bill) Firewire-based disk drive FIRST (Forum of Incident Response and Security Teams) 2nd 3rd flooding, client floors, raised, access through folders [See directories links] fonts used in this book food, effects on hardware forensics 2nd [See also logging] security checklist for fork bombs fork() system call 2nd Forrester, Justin Forum of Incident Response and Security Teams [See FIRST] .forward file 2nd Frame Ground (FG) fraud Fredricksen, Lars ("An Empirical Study of the Reliability of UNIX Utilities") Free Software Foundation (FSF) FreeBSD 2nd [See also BSD Unix]3rd 4th ACL support for bug fixes, responsibility for 2nd Cryptfs support for CVS used by history of 2nd host-based firewall for kernel security levels on master password file PAM support for password file, printing S/Key support source-based management systems su log sulog, scanning Freedman, David H. (@ Large) fscanf() system call fsck program 2nd FSF (Free Software Foundation) FSINFO function (RPC) fsirand program 2nd FSSTAT function (RPC) fstab file 2nd fstat () system call FSUID (filesystem UID) FTP (File Transfer Protocol) 2nd 3rd active mode allowing without logging in anonymous 2nd 3rd bounce attack chroot() system call and ~ftp/bin directory ~ftp/etc directory ~ftp/pub directory passive mode restricted filesystems and restricting accounts with setting up server ftp user ftpd server 2nd 3rd 4th ftpusers file ftruncate() system call The Fugitive Game: Online with Kevin Mitnick (Littman, Jonathan) full backup function keys, passwords programmed to functionality, add-on Fundamentals of Computer Security Technology (Amoroso, Edward) Fuzz program tests |