[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] tables (NIS+) 2nd TACACS and TACACS+ protocols tagging, hardware TAI (International Atomic Time) taint option, Perl tainting taintperl Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw -- By the talk program 2nd talk service tandem backup Tanenbaum, Andrew S. Tangled Web (Power, Richard) tape drives cleaning problems with world-readable tapes [See also media] degradation of print through process upgrading tar program 2nd 3rd 4th 5th TCB (trusted computing base) /tcb directory TCFS (Transparent Cryptographic Filesystem) tcov tester TCP (Transmission Control Protocol) 2nd 3rd [See also network services]4th connections, clogging connections, controlling [See TCP Wrappers program] TCP Wrappers program 2nd 3rd 4th -DPARANOID option -DPROCESS_OPTION option -DPROCESS_OPTIONS option 2nd configuration language for finger daemons provided with inetd and 2nd IP spoofing and tcpdchk utility for tcpdmatch utility for UDP support TCP/IP [See also networks] authentication with ident security checklist for TCP/IP Network Administration (Hunt, Craig) TCP/IP networks SMB running on tcpd program 2nd [See also TCP Wrappers program; TCP/IP] tcpdchk utility tcpdmatch utility tcpdump command 2nd tcpserver program tcsh [See also shells ] history file .tcshrc file TD (Transmit Data) telephone firewalls telephone lines leasing one-way physical security of sweeping unauthorized telephones [See also modems] cellular, computer malfunctions caused by recording call information scanners for security checklist for service, loss of tracing connections from telnet program 2nd 3rd 4th compared to rlogin verifying new password with Telnet utility telnetd program back doors in temperature, effects on hardware TEMPEST system terminal emulators terminal service, remote 2nd terminals [See hardware] terrorism testing employee modems software 2nd TeX files, Trojan horses in TFTP (Trivial File Transfer Protocol) 2nd tftpd daemon The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (Singh, Simon) theft of backups theft of hardware 2nd encryption and locks preventing precautions for RAM theft recovery for 2nd tagging preventing thieves , planting programmed threats thin-client Unix systems third-party billing Thomas, Robert and Carleen Thompson, Ken "Reflections on Trusting Trust" 2nd crypt() designed by discussing password security Unix developed by threads threats estimating probability of identifying and quantifying 2nd mailing list for replay attacks three-way handshake, TCP tickets (Kerberos) 2nd Tiger system tilde (~) ~! in mail messages as home directory time [See also NTP; system clock] defining random seed by determining accurately file modification granularity of modification time service 2nd time-sharing 2nd timeouts 2nd timestamp, Secure RPC window Timezone table (NIS+) tip command 2nd 3rd 4th 5th TLS protocol 2nd TMOUT variable tmp directory, overload attacks using tmpfile () system call token cards toll fraud tools [See software] top command 2nd Torvalds, Linus traceroute command tracing connections tracing programs traffic analysis training, employees transaction audits Transmission Control Protocol [See TCP] Transmit Data (TD) Transparent Cryptographic Filesystem (TCFS) transposition ciphers trap doors [See back doors]2nd [See back doors] trashing tree structure attacks trimlog system Triple-DES (3DES) algorithm Tripwire package 2nd Trivial File Transfer Protocol (TFTP) Trojan horses 2nd 3rd as common threat Kerberos and in mass-market software NFS and X clients Trojan processes truck bombs , as destructive attack True Names and Other Dangers (Vinge, Vernor) truncate() system call trust checklist for in computers 2nd 3rd in consultants in employees in log files in network providers in security response teams in software in system administrator in vendors 2nd trusted computing base (TCB) trusted hosts Trusted Linux trusted path trusted ports 2nd Trusted Solaris trusted Unix [See secure Unix systems] trusted users Tse Huong Choo ttymon program ttys file 2nd 3rd 4th ttytab file ttywatch program tunefs command tunneling 2nd two-key cryptography twoftpd server TZ variable |