[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] L-devices file Lai, Xuejia ("On the Design and Security of Block Ciphers") LaMacchia, Brian A. "Computation of Discrete Logarithms in Prime Fields" LANs (Local Area Networks) 2nd 3rd laptops locking recovery from theft ruggedized tagging temperature of theft prevention for vibration protection for last program 2nd 3rd 4th lastcomm program 2nd lastlog file 2nd laws [See legal issues] LDAP (Lightweight Directory Access Protocol) 2nd 3rd 4th authentication with data integrity and nss_ldap configuration protocol for reliability and TLS support for using with Kerberos using with PAM versions of Learning Perl (Schwartz, Randal L. and Phoenix, Tom) leased telephone lines least privilege principle 2nd legal issues access device limitations avoiding computer abuse backups comparison copies and compromised networks, risks of being prosecuted for copyright laws 2nd criminal complaints, filing criminal prosecution , disadvantages of federal laws regarding computer crimes jurisdiction for computer crimes law enforcement, wiretapping by license agreements for worms monitoring intruders pornography, indecency, obscenity published resources on recourses after a break-in responsibilities to report crime security checklist for situations requiring legal action Lenstra, Arjen "The Number Field Sieve" Lenstra, H. W., Jr. ("The Number Field Sieve") Lesk, Mike level-zero backup Leveson, Nancy G. (Safeware: System Safety and Computers. A Guide to Preventing Accidents and Losses Levy, Steven (Hackers: Heroes of the Computer Revolution) Leyland, Paul /lib directory Libes, Don license agreements, comparison copies and lie-detector tests, of employees lightning 2nd Lightweight Directory Access Protocol [See LDAP] limit command LINK function (RPC) link-level encryption links 2nd [See also symbolic links] to directories static Linux 2nd [See also System V Unix] "no dump" file attribute ACL support for append-only files bug fixes, responsibility for capabilities system chattr() system call chroot wrapper Cryptfs support for current trends debugfs command default accounts for exim mailer program for expiring accounts exporting NFS directories ext2fs filesystem 2nd 3rd FIFO file type filesystem UID (FSUID) filesystem, minfree amount filesystems group disk quotas for handheld computers history of 2nd host-based firewall for 2nd immutable files Kerberos client for kernel security levels logrotate program mobile versions of npasswd package Openwall patches packaging tools PAM resource limits support for periodic security-checking scripts portmapper program portmon variable process accounting with ps command published resources on Red Hat [See Red Hat Linux] reliability of RPM Package Manager 2nd S/Key support secure terminals secure versions of server startup on shadow password file smbfs support software quality source packages stateful inspection program sudo program 2nd sulog, scanning swapping to files TCP Wrappers support ttywatch program VA [See VA Linux] versions of 2nd X security Littman, Jonathan (The Fugitive Game: Online with Kevin Mitnick) Liu, Cricket (DNS and BIND) ln command load shedding local area networks [See LANs] LOCAL authentication (NIS+) local jurisdiction local storage, protecting lock program lock-down locking accounts locking files 2nd locks, hardware log books log events log files [See also history files; email, logging]2nd access_log acct aculog analysis tools analyzing for intruders created during initialization crontab hardcopy of 2nd immutable lastlog list of locations of loginlog managing messages pacct rotating sulog 2nd syslog creating system clock and 2nd utmp 2nd 3rd wtmp wtmpx log server logcheck program logdaemon package logger program 2nd logging 2nd 3rd 4th [See also forensics; log files] across networks break-ins C2 audit criminal investigations, and critical messages from failed passwords failed su attempts from third-party software handwritten logs to hardcopy device individual users network services newsyslog program outgoing mail policy for process accounting security checklist for Swatch program syslog facility what not to log who is logged in logging in authentication of failed attempts, logging FTP access without Kerberos system preventing for dormant accounts recorded in log file restricting with Secure RPC startup file attacks logging out automatic with Secure RPC logic bombs 2nd 3rd login file .login file 2nd login program 2nd back doors in trusted path for login service logindevperm file loginlog file 2nd 3rd logins command .logout file long distance service LOOKUP function (RPC) loopback encryption losses [See also disaster planning] calculating cost of calculating cost of prevention determining whether to protect against estimating probability of lp user lpd system lrand48() system call ls command 2nd -d option -i option -c option file permissions listed by file times displayed by -H option indicating SUID/SGID programs -l option listing files with control characters lsof command 2nd 3rd 4th 5th 6th lstat () system call |