[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] games user games, accounts for Gangemi, G. T., Sr. (Computer Security Basics) Garfinkel, Simson (PGP: Pretty Good Privacy) gas-charged fire extinguishers Gasser, Morrie (Building a Secure Computer System) gated daemon gateways [See routers] gcore program gcov tester gdb command gdb debugger GECOS (General Electric Computer Operating System) Geer, Dan General Electric Computer Operating System (GECOS) generation count, file handle 2nd generators, password GETATTR function (RPC) gethostbyaddresses() system call gethostbyname() system call getopt() system call getpass () system call 2nd getpwuid() system call gets() system call 2nd getservbyname() system call 2nd getty program Gibson, William All Tomorrow's Parties Burning Chrome Count Zero Idora Mona Lisa Overdrive Neuromancer Virtual Light GIDs ( group identifiers) 2nd 3rd [See also SGID programs] real versus effective and RPC requests stored in inodes glass walls, security aspects GMT [See UTC] GNU Emacs 2nd 3rd 4th GNU project GNU utilities, reliability of gnupg signatures 2nd goaway option, sendmail Gollmann, Dieter (Computer Security) gopher gpg signatures Graff, Michael Grampp, F. T. ("UNIX Operating System Security") granularity, time graphical displays, sharing with X Window System grep command, scanning su log file with grounding signals, attacks by group disk quotas group file 2nd 3rd 4th monitoring group IDs [See GIDs] Group table (NIS+) groups accounts for changing files writable by identifiers for [See GIDs] NIS netgroups passwords for permissions for process security checklist for umask for group projects wheel [See wheel group] groups command grpck command Gr ¼nbacher, Andreas guest account 2nd guest user guidelines, in security policy |