Index L


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

L-devices file  
Lai, Xuejia ("On the Design and Security of Block Ciphers")  
LaMacchia, Brian A.  
       "Computation of Discrete Logarithms in Prime Fields"  
LANs (Local Area Networks)   2nd   3rd  
laptops
       locking  
       recovery from theft  
       ruggedized  
       tagging  
       temperature of  
       theft prevention for  
        vibration protection for  
last program   2nd   3rd   4th  
lastcomm program   2nd  
lastlog file   2nd  
laws   [See legal issues]
LDAP (Lightweight Directory Access Protocol)   2nd   3rd   4th  
       authentication with  
       data integrity and  
       nss_ldap configuration  
       protocol for  
       reliability and  
       TLS support for  
       using with Kerberos  
       using with PAM  
       versions of  
Learning Perl (Schwartz, Randal L. and Phoenix, Tom)  
leased telephone lines  
least privilege principle   2nd  
legal issues
       access device limitations  
       avoiding computer abuse  
        backups  
       comparison copies and  
       compromised networks, risks of being prosecuted for  
       copyright laws   2nd  
       criminal complaints, filing  
       criminal prosecution , disadvantages of  
       federal laws regarding computer crimes  
       jurisdiction for computer crimes  
       law enforcement, wiretapping by  
       license agreements for worms  
       monitoring intruders  
       pornography, indecency, obscenity  
       published resources on  
       recourses after a break-in  
       responsibilities to report crime  
       security checklist for  
       situations requiring legal action  
Lenstra, Arjen  
       "The Number Field Sieve"  
Lenstra, H. W., Jr. ("The Number Field Sieve")  
Lesk, Mike  
level-zero backup  
Leveson, Nancy G. (Safeware: System Safety and Computers. A Guide to Preventing Accidents and Losses  
Levy, Steven (Hackers: Heroes of the Computer Revolution)  
Leyland, Paul  
/lib directory  
Libes, Don  
license agreements, comparison copies and  
lie-detector tests, of employees  
lightning   2nd  
Lightweight Directory Access Protocol   [See LDAP]
limit command  
LINK function (RPC)  
link-level encryption  
links   2nd   [See also symbolic links]
       to directories  
       static  
Linux   2nd   [See also System V Unix]
       "no dump" file attribute  
       ACL support for  
       append-only files  
       bug fixes, responsibility for  
       capabilities system  
       chattr() system call  
       chroot wrapper  
       Cryptfs support for  
       current trends  
       debugfs command  
       default accounts for  
       exim mailer program for  
       expiring accounts  
       exporting NFS directories  
       ext2fs filesystem   2nd   3rd  
       FIFO file type  
       filesystem UID (FSUID)  
       filesystem, minfree amount  
       filesystems  
        group disk quotas  
       for handheld computers  
       history of   2nd  
       host-based firewall for   2nd  
       immutable files  
       Kerberos client for  
       kernel security levels  
       logrotate program  
       mobile versions of  
       npasswd package  
       Openwall patches  
       packaging tools  
       PAM
               resource limits  
               support for  
       periodic security-checking scripts  
        portmapper program  
       portmon variable  
       process accounting with  
       ps command  
       published resources on  
       Red Hat   [See Red Hat Linux]
       reliability of  
       RPM Package Manager   2nd  
       S/Key support  
       secure terminals  
       secure versions of  
       server startup on  
       shadow password file  
        smbfs support  
       software quality  
       source packages  
       stateful inspection program  
       sudo program   2nd  
       sulog, scanning  
       swapping to files  
       TCP Wrappers support  
       ttywatch program  
       VA   [See VA Linux]
       versions of   2nd  
       X security  
Littman, Jonathan (The Fugitive Game: Online with Kevin Mitnick)  
Liu, Cricket (DNS and BIND)  
ln command  
load shedding  
local area networks   [See LANs]
LOCAL authentication (NIS+)  
local jurisdiction  
local storage, protecting  
lock program  
lock-down  
locking accounts  
locking files   2nd  
locks, hardware  
log books  
log events  
log files   [See also history files; email, logging]2nd  
       access_log  
       acct  
        aculog  
       analysis tools  
       analyzing for intruders  
       created during initialization  
       crontab  
       hardcopy of   2nd  
       immutable  
       lastlog  
       list of  
       locations of  
       loginlog  
       managing  
       messages  
       pacct  
       rotating  
       sulog   2nd  
       syslog creating  
       system clock and   2nd  
       utmp   2nd   3rd  
       wtmp  
       wtmpx  
log server  
logcheck program  
logdaemon package  
logger program   2nd  
logging   2nd   3rd   4th   [See also forensics; log files]
       across networks  
       break-ins  
       C2 audit  
       criminal investigations, and  
       critical messages from  
       failed passwords  
       failed su attempts  
       from third-party software  
        handwritten logs  
       to hardcopy device  
       individual users  
       network services  
       newsyslog program  
       outgoing mail  
       policy for  
       process accounting  
       security checklist for  
       Swatch program  
       syslog facility  
       what not to log  
       who is logged in  
logging in  
       authentication of  
       failed attempts, logging  
       FTP  
               access without  
       Kerberos system  
       preventing for dormant accounts  
       recorded in log file  
       restricting  
       with Secure RPC  
       startup file attacks  
logging out
       automatic  
       with Secure RPC  
logic bombs   2nd   3rd  
login file  
.login file   2nd  
login program   2nd  
       back doors in  
       trusted path for  
login service  
logindevperm file  
loginlog file   2nd   3rd  
logins command  
.logout file  
long distance service  
LOOKUP function (RPC)  
loopback encryption  
losses   [See also disaster planning]
       calculating cost of  
       calculating cost of prevention  
       determining whether to protect against  
       estimating probability of  
lp user  
lpd system  
lrand48() system call  
ls command   2nd  
       -d option  
       -i option  
       -c option  
       file permissions listed by  
       file times displayed by  
       -H option  
       indicating SUID/SGID programs  
       -l option  
       listing files with control characters  
lsof command   2nd   3rd   4th   5th   6th  
lstat () system call  



Practical UNIX and Internet Security
Practical Unix & Internet Security, 3rd Edition
ISBN: 0596003234
EAN: 2147483647
Year: 2003
Pages: 265

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net