[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] UMAC32 umasks universal hash functions Unix 2nd access control restricting for new files creating temporary files crypt( ) cryptographic algorithms, timing on debuggers and ptrace domain sockets, authentication using operating systems, differences among entropy gathering from keyboards from system state from threads entropy, observable on environment variables, dependencies on external programs, executing locking files passwords, prompting for recipes for resource starvation attacks, preventing setrlimit( ), limiting resources with restricting filesystem access signal handling guidelines program termination writing signal handlers standard randomness infrastructure, using user and group information, getting UnlockFile( ) UnlockFileEx( ) unsetenv( ) URLs (Uniform Resource Locators) evaluating encodings of user IDs users, acquiring information about on Unix on Windows using a high-level, error-resistant encryption and decryption API UTF-8 encoding detecting illegal characters invalid sequences |