[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] O'Reilly & Associates, Inc. objects (LDAP) obscenity laws obscurity, security through octal file permissions octets Odlyzko, Andrew M. "Computation of Discrete Logarithms in Prime Fields" oftpd server on-demand filtering one-command accounts one-time pad [See codebooks] one-time passwords 2nd 3rd 4th one- user workstations one-way hash functions [See message digest functions] one-way phone lines open access open accounts 2nd Open Software Foundation (OSF) open source Unix Open System Interconnection (OSI) open() system call 2nd 3rd OpenBSD [See also BSD Unix]2nd 3rd code reviews of CVS used by history of sudo program opendir() system call OpenLDAP [See LDAP] openlog() system call OpenSSH 2nd back door in Kerberos for authentication with sshd user for tunneling X with OpenSSL 2nd openssl program operating systems [See also specific operating systems]2nd bootable copy of keeping secret operator user optical vampire taps Orange Book organizations, security- related originate mode originate testing, modems Orwant, Jon (Programming Perl) OSF (Open Software Foundation) OSF/1 OSI (Open System Interconnection) Outcome table (NIS+) outgoing mail, logging outsourcing security 2nd choosing vendor for deciding on services needed monitoring services shortage of experts for overflow security vulnerabilities overload denial of service attacks accidental CPU overload disk attacks network service overloading on processes soft process limits swap space, running out of on tmp directory tree structure attacks overwriting media owners file permissions for file, changing of information |