P



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

package customization, local system security
packet filters [See also firewalls]
packet sniffers
     Ethereal
     intrusion detection with
     monitoring Bonjour with
     monitoring network security
     Web security and
PAM (pluggable authentication module) 2nd
parental controls
     email security
     Web security
Password Assistant
password policies, Password Server 2nd
Password Server
     architecture
     authentication methods
     configuring
     hashes 2nd
     KDC synchronization with
     kerberized services
     overview
     policies
     replication 2nd
     SASL and
     security of
     utilities
Password servers
Password User Attribute mapping
passwords
     Active Directory password policies
     crypt passwords
     data confidentiality and
     disk images
     guidelines for good
     keychains and 2nd
     Password-based authentication in Mac OS X security model
     resetting lost account passwords 2nd
     setting master password for FileVault
     shadow passwords 2nd
     UNIX crypt function for generating
     WPA Personal
passwords, Open Firmware
     choosing
     disabling
     enabling
passwordserver value
PasswordService
patches, local system security
pbcopy command
pbpaste command
PDA sync, Bluetooth
PEAP (Protected EAP)
performance
     directory services deployment and
     in replication topology
permissions. [See file and folder permissions]
Personal File Sharing
     editing AppleFileServer
     local system security and
     overview
     starting
Personal Information Management (PIM)
personal settings, Mac OS X
Personal Web Sharing
PGP (Pretty Good Privacy) 2nd
phishing, Web security and
physical security
     email
     ensuring
     in Mac OS X security model
physical theft
PID (process ID)
     open file information
     ps command and
     top command and
PIM (Personal Information Management)
PIN numbers, in multifactor authentication
ping
     DoS (Denial of Service) attacks
     locking down
     troubleshooting network connectivity
pipes (|), searching text files
PKI (public key infrastructure)
planning directory services. [See directory services, planning and deploying]
plug-ins
    Active Directory. [See Active Directory plug-in]
     browser
     BSD 2nd
     CDSA add-in modules
     directory service protocols
     DirectoryService
    LDAPv3. [See OpenLDAP]
pluggable authentication
pluggable authentication module (PAM) 2nd
plutil command
Point-to-Point Tunneling Protocol. [See PPTP (Point-to-Point Tunneling Protocol)]
policies
     documenting security policies
     establishing security policies 2nd
     implementing security policies
     password 2nd
     Password Server
     search
pop-up windows, Web security
POP3 (Post Office Protocol version 3)
     advantages/disadvantages
     locking down access to public servers
     retrieving messages
     SSL and
Port Scan, Network Utility
ports
     6 to 4 port configuration
     HTTP 2nd
     intrusion detection and
     network connection security and
     Password Server
     rootkits and
     security
     sockets
     TCP
     UDP
Post Office Protocol version 3. [See POP3 (Post Office Protocol version 3)]
Postfix
PPTP (Point-to-Point Tunneling Protocol)
     configuring Mac OS X servers
     Mac OS X Server supporting
     VPN transport protocols
     VPNs Server configuration and
pre-authentication, Kerberos
preferences
     Mac OS X
     vi editor
     Web security
preferences.plist
preinstallation, security issues
Pretty Good Privacy (PGP) 2nd
principals, Kerberos 2nd
Printer Sharing
printers, network printer support with Bonjour
Private Browsing option
private data, in keychains
private IP addresses
private networks
     addresses reserved for
     locking down access to
private/public keys
     authentication and
     in keychains
     large vs. small keys
     SSH and
processes
     defined
     managing from command line
properties, vs. attributes
Property List Editor 2nd
Protected EAP (PEAP)
protocols
proxy clients, Safari configured as
proxy servers, Web security
ps command
     combining with grep
     managing processes
     monitoring system security
Public folder, permissions
public key infrastructure (PKI)
public keys. [See private/public keys]
public servers, locking down access to
public/private routing, for VPN users
pwpolicy
     disabling stored hashes
     hash types
     Password Server and 2nd




Apple Training Series. Mac OS X System Administration Reference, Volume 1
Apple Training Series: Mac OS X System Administration Reference, Volume 1
ISBN: 032136984X
EAN: 2147483647
Year: 2005
Pages: 258
Authors: Schoun Regan

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net