S


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y]

SAINT
     (Security Administrator's Integrated Network Tool)
Samba
     domains 2nd
     Network Name Service 2nd
     server setup 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd
SANS Institute Web site 2nd
Sans Web site
Sarbanes-Oxley Act 2nd
SBA
     (System Backup Administrator)
scanlogd
Scanlogd tool 2nd 3rd
schedules
     backups 2nd 3rd 4th 5th 6th 7th
         consideration points 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
         databases 2nd 3rd 4th 5th 6th
         GFS rotation scheme 2nd 3rd 4th
         Tower of Hanoi rotation scheme 2nd 3rd
Schneier, Bruce Web site
script kiddie
script language
     bash shell
scripts
     login shell 2nd 3rd 4th 5th 6th 7th
seccheck
seccheck scripts
secret keys
     wireless network data 2nd 3rd 4th 5th 6th 7th
secret-key encryption
secure file deletion 2nd 3rd 4th
Secure Shell [See ssh]
security
     automating hardening 2nd 3rd 4th 5th 6th
    backups
         boot rescue disks 2nd 3rd 4th
         implementation 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd
         strategies 2nd 3rd 4th 5th 6th 7th
         tools 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th 68th 69th 70th 71st 72nd 73rd 74th 75th 76th 77th 78th 79th 80th 81st 82nd 83rd 84th 85th 86th 87th 88th 89th 90th 91st 92nd 93rd 94th 95th 96th 97th 98th 99th 100th 101st 102nd 103rd 104th 105th
     complete 2nd
     daemons 2nd
     filesystem permissions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
         ACLs (access control lists) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
         changing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
         data encryption 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th
         default access 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
         hacker exploits 2nd 3rd 4th 5th
         metadata 2nd 3rd 4th 5th 6th
         ownership changes 2nd 3rd 4th
         secure file deletion 2nd 3rd 4th
         special permission bits 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd
     hardening system 2nd 3rd 4th 5th 6th 7th 8th
    intrusion detection
         assessing vulnerabilities 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd
         defining 2nd 3rd 4th 5th
         host intrusions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th
         network-based intrusions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th
         reducing exposure 2nd 3rd 4th 5th 6th
         tools 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
     network services 2nd 3rd
         chroot jails 2nd 3rd
         hardening hardware 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
         hardening remote services 2nd 3rd 4th 5th
         iptables packet filtering 2nd 3rd 4th 5th 6th 7th 8th 9th
         rights limitations 2nd 3rd 4th 5th
         UML (User Mode Linux) 2nd 3rd 4th
         wireless networks 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th
     operating system ratings 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
     policies 2nd 3rd 4th 5th 6th 7th 8th
         AUP (acceptable user policy) 2nd 3rd 4th 5th 6th
         firewalls 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
         incident response 2nd 3rd 4th
         information protection 2nd 3rd 4th
         passwords 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th
         physical security 2nd 3rd 4th 5th 6th 7th
         remote access 2nd
         user account 2nd 3rd 4th 5th 6th 7th
     resources 2nd 3rd 4th
         newsgroups 2nd
         Web sites 2nd 3rd
     restricting root login 2nd 3rd 4th
     Sarbanes-Oxley Act
     SLES 9 hardening packages 2nd 3rd
     SUID/SGID permission bits 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
     syslog server 2nd 3rd 4th 5th 6th
         hardening central host 2nd 3rd 4th 5th 6th 7th
         stealth logging host 2nd 3rd
     users 2nd
         account authentication 2nd 3rd 4th
         auditing default accounts 2nd
         environment configuration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd
         multiple groups per user 2nd
         resource management 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st
         root account 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
         strong passwords 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th
         su and sudo command 2nd 3rd 4th 5th 6th 7th
     YaST maintenance
Security Administrator's Integrated Network Tool
     (SAINT)
Security Focus Web site
Security Settings
Security Target
sed text editor
Sendmail
sendmail
Sendmail 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th
serial interface type
server
     hardware 2nd
         adding disk 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th
         preparation 2nd 3rd 4th
    network configuration
         changing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
     packages 2nd
         installation
         removing components 2nd 3rd 4th 5th
Server Message Block [See SMB]
     (SMB)
server-side applications
     security 2nd 3rd
         chroot jails 2nd 3rd
         hardening hardware 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
         hardening remote services 2nd 3rd 4th 5th
         iptables packet filtering 2nd 3rd 4th 5th 6th 7th 8th 9th
         rights limitations 2nd 3rd 4th 5th
         UML (User Mode Linux) 2nd 3rd 4th
         wireless networks 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th
servers
    booting
         boot loaders 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
         emergency recovery 2nd 3rd 4th 5th
         init program 2nd 3rd 4th
         kernel boot 2nd 3rd
     load management 2nd 3rd
    network security
         policies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th
     shutdowns 2nd 3rd 4th
     syslog 2nd 3rd 4th 5th 6th
         hardening central host 2nd 3rd 4th 5th 6th 7th
         stealth logging host 2nd 3rd
     system configuration 2nd
         SuSEconfig 2nd 3rd 4th 5th
         YaST 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
     system management 2nd
         filesystem access 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
         kernel parameters 2nd 3rd 4th 5th 6th
Service Location Protocol [See SLP]
Service Set ID [See SSID]
services
     configuration 2nd
     network security 2nd 3rd
         chroot jails 2nd 3rd
         hardening hardware 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
         hardening remote services 2nd 3rd 4th 5th
         iptables packet filtering 2nd 3rd 4th 5th 6th 7th 8th 9th
         rights limitations 2nd 3rd 4th 5th
         UML (User Mode Linux) 2nd 3rd 4th
         wireless networks 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th
    networks
         authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
         daemons 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th
         email 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st
         file-sharing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th
         FTP (File Transfer Protocol) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd
         Network Name Service 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd
         remote access 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st
         timing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th
         Web 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
     packages 2nd
         installation
         removing components 2nd 3rd 4th 5th
     YaST maintenance
Set GID [See SGID]
Set UID [See SUID]
Settings screen
     installation
SGID
     (Set GID)
     permission value
     special permission bit 2nd 3rd 4th 5th 6th 7th 8th 9th
         file sharing 2nd 3rd 4th 5th
         security implications 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
Shadow group
     defaults GID
share name
shared key authentication
sharing files 2nd 3rd
     NFS server setup 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
     Samba server 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd
shell
    login
         scripts 2nd 3rd 4th 5th 6th 7th
     user configuration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
shell scripts
     file permissions
Shipley, Peter
Shred
shutdown command
shutdowns
     servers 2nd 3rd 4th
Silva, James da
     AMANDA
skeleton bash scripts
     creating new users
SLES
     (SuSE Linux Enterprise Server)
     installation 2nd 3rd 4th 5th
         AutoYaST 2nd
         CD-ROM 2nd 3rd
         configuration
         hard disks 2nd
         hardware configuration 2nd 3rd
         language preferences
         method selection 2nd 3rd
         network connectivity 2nd 3rd
         networks 2nd
         online updates
         pre-installation planning 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
         service configuration 2nd
         settings 2nd 3rd 4th
         troubleshooting 2nd 3rd
         user settings 2nd 3rd
         VNC-based method 2nd 3rd 4th 5th 6th 7th 8th
SLP
     (Service Location Protocol)
     Network Name Service 2nd
SMB
     (Server Message Block) 2nd
SMB protocol
snapshot devices
sniffers
     data snooping
sniffing
     switches 2nd 3rd
SNMP
     device monitoring
Snort 2nd 3rd 4th 5th 6th
Snort group
     defaults GID
Snort user
     default UID
Snort Web site
snort.conf file 2nd
social engineering
software
     package installation
     SLES installation planning
     support information
     YaST maintenance
Software Selection screen
Solar Designer
Sophos
Source Forge website
SourceForge.Net Web site
SpamAssassin
     Web site
special permission bits 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
     security against SUID program 2nd 3rd 4th 5th 6th 7th
     SGID file sharing 2nd 3rd 4th 5th
     SUID program 2nd 3rd 4th 5th 6th 7th
     SUID/SGID security 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
Spitzner, Lance
spooling
     print job lifecycle 2nd
squid user
     default UID
ssh
     (Secure Shell) 2nd 3rd
Sshd group
     defaults GID
sshd user
     default UID
SSID
     (Service Set ID)
     protecting wirless networks 2nd 3rd 4th 5th
Standard Boot Floppies
startup
    servers
         boot loaders 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
         emergency recovery 2nd 3rd 4th 5th
         init program 2nd 3rd 4th
         kernel boot 2nd 3rd
stat command
State packets
status line command mode
     vi text editor
stealth logging hosts 2nd 3rd
sticky bit
     special file permissions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
sticky permission
     value
storage
     backups
    disk space
         user management 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
    offsite
         policies
storage medias
     backups 2nd 3rd
stumbling utilities
Stunnel user
     default UID
su command 2nd 3rd 4th 5th 6th 7th 8th
sudo command 2nd 3rd 4th 5th 6th 7th
     restricting root login 2nd 3rd 4th
SUID
     (Set UID)
     permission value
     special permission bit 2nd 3rd 4th 5th 6th 7th 8th 9th
         sample program 2nd 3rd 4th 5th 6th 7th
         security against program 2nd 3rd 4th 5th 6th 7th
         security implications 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
super users
super-servers
SuSE
     FTP Server
     mailing lists
SUSE
     Web site
SuSE GmbH
SuSE Linux Enterprise Server [See SLES]
SuSEconfig 2nd 3rd 4th 5th
switches
     sniffing 2nd 3rd
symmetric encryption
     GnuPG
Sys group
     defaults GID
syslog servers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
     hardening central host 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
     message locations
     stealth logging host 2nd 3rd 4th 5th 6th
syslog-ng
     installation
SYSTAT
     xinetd
System Backup Administrator
     (SBA)
system requirements
     SLES installation planning 2nd 3rd 4th
system resources
    user management
         disk space 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
         PAM (Pluggable Authentication Module) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th
systems
    configuration
         maintaining 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th
    management
         basic commands 2nd 3rd 4th 5th
         monitoring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th
         root filesystem 2nd 3rd 4th 5th
         server tuning 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th
         tools 2nd



SUSE LINUX Enterprise Server 9 Administrator's Handbook
SUSE LINUX Enterprise Server 9 Administrators Handbook
ISBN: 067232735X
EAN: 2147483647
Year: 2003
Pages: 134

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net