[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] w command 2nd 3rd Wall, Larry (Programming Perl) WANs (Wide Area Networks) war warez water damage humidity sprinkler systems Wayner, Peter (Disappearing Cryptography) web hosting, restricted filesystems and web pages, Trojan horses in web servers logging user account for web sites for this book logging dowloaded files from for RFCs security- related WebNFS well-known ports Welsh, Matt (Running Linux) wheel group 2nd members becoming superuser using su command who command 2nd 3rd 4th 5th who service whodo command 2nd whois command 2nd 3rd whois service wide area networks (WANs) window, time [See time] windows (glass), security aspects wireless networks eavesdropping on jamming one-time passwords for transmitter security wireless transmission [See radio transmissions] wiretapping [See eavesdropping] WIZ command, SMTP 2nd wizard's password (sendmail) Wood, Charles Cresson (Computer Security: A Comprehensive Controls Checklist) Wood, Patrick H. (UNIX System Security) workstations [See hardware] World Wide Web (WWW) [See HTTP web sites] world-readable devices world-writable files/directories worm program [See Internet worm program] worms 2nd WRITE function (RPC) write permission directories files write program timeouts on Trojan horses and write() system call write-protection backups disk drive wtmp file 2nd displayed by last program pruning su command and wtmpx file 2nd wuarchive FTP daemon wuftpd server www user |