index_S

     
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

sambafs_t type
sample policy, examining
sandboxes
        protecting memory with
sbin_t type
scanner_device_t type
SCC (Secure Computing Corporation)
scmp_packet_t type
scsi_generic_device_t type
search operation
Seaudit tool 2nd 3rd
SeCmds tool
Secure Computing Corporation (SCC)
secure_levels macro
security (object security class) 2nd
security attributes
        associated with subjects/objects
        naming conventions for
security contexts 2nd
        assigned to filesystems by Genfs declarations
        assigning to new users
        changing permissions, to prevent denial messages
        elements of
        of files, determining
        for new domain
        of hosts , specifying
        of local ports, specifying
        of network interfaces, specifying
        of objects having initial SIDs
        specifying, when starting programs
        starting init scripts in correct
        viewing
        for Snort- related directories/files
security identifiers (SIDs)
        flask /initial_sids file
security model for SELinux, overview of
security object classes 2nd
security policy for SELinux
        associating users with nondefault roles
        enforcing mode vs. permissive mode
        loading
        roles defined by
        rules for dynamically setting operating mode
security.te file
security_classes file in flask subdirectory 2nd
security_t type
SELinux
        applications of
        architecture of
       commands
                for administration/use
                modified Linux commands
                supplementary
        Fedora Core 2 support of
        FTP sites for
        history of
        installing [See installing SELinux]
        kernel-level code
        limiting rate of log entries
        Linux 2.4/2.6 versions of 2nd
        log message format
        LSM (Linux Security Modules) feature and 2nd
        LSM-based version of
        monitoring
        operations
        overview of security model
        policy structure
        roles
                entering a different role
                newrole command
        security policy [See security policy for SELinux]
        source files
        switching modes
        tools in
        troubleshooting
        types related to
        User -Mode Linux (UML) and
        versions of
        web sites for
        using X with
/selinux filesystem
SELinux policy 2nd [See also entries under policy]
        examining sample policy
        FC (file context) files
        source tree
        syntax of
        TE (type enforcement) files
        two forms of
SELinux policy compiler 2nd
selinux-policy-default package
sem (object security class) 2nd
send operation
send_msg operation
sendto operation
Sepcut tool 2nd 3rd
server_pty type attribute
serviceusers file 2nd
sestatus command
setattr operation
setbool command 2nd
setcap operation
setenforce command 2nd 3rd
setfiles command
setfiles utility
        labeling/relabeling filesystems 2nd 3rd
        relabeling problem scripts with
        repairing file labels
        troubleshooting login problems with
setfscreate operation
setgid operation
setopt operation
setpcap operation
setpgid operation
setrlimit operation
setsched operation
setuid operation 2nd
Seuserx tool 2nd 3rd
shadow_t type
share operation
shared library in SELinux
shell_exec_t type
shlib_t type
shm (object security class) 2nd
shm (pseudofilesystem with shared memory object)
show_bools command
shutdown operation
Sid (Debian GNU/Linux 3.0 unstable)
sid_to_context operation
SIDs (security identifiers)
        flask/initial_sids file
sigchld operation
siginh operation
sigkill operation
signal operation
signal_perms macro
signull operation
sigstop operation
single_userdomain macro
Smalley, Stephen 2nd
snapshots of current processes
Snort intrusion detection application, files associated with
snort.fc file
snort.te file
sock_file (object security class) 2nd
socket (object security class) 2nd
socket_class_set macro 2nd
socket_type type attribute
sockfs (pseudofilesystem with socket)
software complexity, contributing to software threats
software threats and the Internet
sound_device_t type
source files for SELinux
        checkpolicy command and 2nd
SPEC file
special notations for types/classes/permissions
special tokens in regular expressions
src_t type
ssh program
ssh_sysadm_login macro
SSHd program, troubleshooting
sshd_t domain
stack canaries
stacks, nonexecutable
staff_r role 2nd
        authorizing users to access domain
        limiting permissions available to users
staff_read_sysadm_file macro
startx domain (domains/misc subdirectory)
stat_file_perms macro
status information, viewing with sestatus command
stream_socket_class_set macro 2nd
subjects
subtraction (special notation)
SUSE Linux
        installing SELinux using RPM packages
swapfile_t type
swapon operation
switching SELinux modes
        troubleshooting program execution programs
syntax diagrams
sys_admin operation
sys_boot operation
sys_chroot operation
sys_module operation
sys_nice operation
sys_pacct operation
sys_ptrace operation
sys_rawio operation
sys_resource operation
sys_time operation
sys_tty_config operation
sysadm_r role
        changing user_r role to
        customizing
        transitioning to
sysadmfile type attribute
sysctl_dev_t type
sysctl_fs_t type
sysctl_hotplug_t type
sysctl_irq_t type
sysctl_kernel_t type
sysctl_kernel_writer type attribute
sysctl_modprobe_t type
sysctl_net_t type
sysctl_net_unix_t type
sysctl_net_writer type attribute
sysctl_rpc_t type
sysctl_t type
sysctl_type type attribute
sysctl_vm_t type
sysfs_t type
syslog_console operation
syslog_mod operation
syslog_read operation
syslogd domain definition
syslogd_t type
system (object security class) 2nd
system administrators, adding
system_domain macro
system_map_t type
system_r role 2nd

 


SELinux. NSA's Open Source Security Enhanced Linux
Selinux: NSAs Open Source Security Enhanced Linux
ISBN: 0596007167
EAN: 2147483647
Year: 2003
Pages: 100
Authors: Bill McCarty

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net