[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] rabbit programs 2nd race conditions radio transmissions computer malfunctions caused by eavesdropping on 2nd RADIUS (Remote Authentication Dial-In User Service) 2nd 3rd RAID filesystems RAM theft rand() system call random device random numbers device file abstractions for requirements for seeds 2nd random() system call raw devices rc script 2nd RC2 algorithm RC4 algorithm RC5 algorithm rcp command 2nd RCS (Revision Control System) 2nd RD (Receive Data) rdist program rdump/rrestore program read command READ function (RPC) read permission directories files read() system call, timeouts on read-only filesystems 2nd READADDR function (RPC) readdir() system call READDIRPLUS function (RPC) READLINK function (RPC) real GIDs real UIDs 2nd realpath() system call reboots logged by wtmp file single-user Receive Data (RD) record locking, mandatory Red Hat Linux default accounts for sulog, scanning X security reiserfs filesystem relative pathnames Remote Authentication Dial-In User Service [See RADIUS] remote command execution remote file 2nd Remote Job Entry (RJE) remote log server Remote Method Invocation (RMI) remote network filesystems Remote Procedure Call [See RPC] REMOVE function (RPC) RENAME function (RPC) renice command 2nd replay attacks 2nd replicated filesystems Request to Send (RTS) resolution, time resolv.conf file resolver library (BIND) resolving (DNS) response teams mailing lists for trusting restore [See dump program] restore program restricted accounts restricted filesystems restricted logins restricted shells restricted terminals restrictmailq option, sendmail retention of backups [See backups , retention of] return codes, checking reverse lookup 2nd Revision Control System (RCS) 2nd rexd service rexec service RFC (Request For Comments), web site for .rhosts file 2nd 3rd back door in searching for RI (Ring Indicator) Rijmen, Vincent Ring Indicator (RI) Rinjdael (AES) algorithm 2nd 3rd RIP (Routing Internet Protocol) risks [See also cost-benefit analysis] assessment of 2nd difficulty in analyzing inability to eliminate secondary RISKS mailing list Ritchie, Dennis discussing Unix security The UNIX Programming Environment Unix developed by Rivest, Ron 2nd 3rd "A Method for Obtaining Digital Signatures" RJE (Remote Job Entry) rlogin program 2nd 3rd compared to telnet security and verifying new password with rm command 2nd 3rd 4th RMDIR function (RPC) RMI (Remote Method Invocation) Rogue Programs: Viruses, Worms and Trojan Horses (Hoffman, Lance J.) ROM monitor passwords root account [See also superuser]2nd prompt for root domain server (NIS+) root user [See superuser] rootkits 2nd route service routed daemon routers routing Routing Internet Protocol (RIP) RPC (Remote Procedure Call) 2nd authentication of functions used with NFS MOUNT based on 2nd NFS built on NFS protocol based on portmapper program and 2nd 3rd 4th rpc.rexd Secure 2nd security checklist for spoofing table (NIS+) rpc. mountd daemon rpc.rexd service rpcbind [See portmapper program] rpm command rpm files RPM Package Manager 2nd RS-232 serial protocol RSA algorithm RSA Data Security factoring challenges SSH using 2nd rsh (restricted shell) rsh program 2nd 3rd rshd program, back doors in rsync program 2nd RTS (Request to Send) rtty program RUID [See real UIDs] run levels runacct command Running Linux (Welsh, Matt; Kaufman, Lar; Dalheimer, Matthias K.; Dawson, Terry) Russell, Deborah (Computer Security Basics) |