| < Day Day Up > |
|
UDP, see User Datagram Protocol
Unicode input attack, 198
Uniform Domain Name Dispute Resolution Policy, 349, 350
United States v. Slanina, 396
UNIX, 136
auditing, 163
boot disk for, 246
crypt program, 471
dd command, 270, 281, 285
file system, 279, 280
hardware inventory, 164
logging, 240
shadow password file, 166
sum program, 472
UNIX-based investigations, 307
baseline comparison for SUID/SGID files, 314
coroner's toolkit, 309
data hiding techniques, 309
file recovery alternatives, 312
file stamps, 312
file system analysis, 307
hiding files, 310
log files, 314
steganography, 311
strong encrypted protections, 312
system configuration, 314
undeleting UNIX, 208
understanding file permissions, 312
user and password accounts, 314
Unlawful acts, types of, 343
URL, 227
U.S. copyright laws, 61
U.S. Department of Justice, 366
USENET newsgroups, 488, 496
User(s)
acceptance testing, 192
Datagram Protocol (UDP), 181
dial-in, 474
identification, 139
passwords
changing, 298
cracking, 299
security training, 243
U.S. government
employees, 29
publications, 134
U.S. Patent and Trademark Office, 346, 348
Utility(ies)
failures, 76
patents, 351
| < Day Day Up > |
|