Index: X

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

X Window System
12.3.4.4. X terminals
17.3.21. The X Window System (TCP Ports 6000-6063)
17.3.21.5. Denial of service attacks under X
denial of service under : 17.3.21.5. Denial of service attacks under X
screen savers : 12.3.5.2. X screen savers
X-rated material : 26.4.5. Pornography and Indecent Material
X.500 directory service : 16.4.4. OSI
X/Open Consortium : 1.3. History of UNIX
xargs command
5.2.5.1. AIX Access Control Lists
11.5.1.4. Filename attacks
Xauthority facility, magic cookies : 17.3.21.4. Using Xauthority magic cookies
xdm system : 17.3.21.4. Using Xauthority magic cookies
XDR (external data representation) : 19.2. Sun's Remote Procedure Call (RPC)
Xerox Network Systems (XNS) : 16.4.5. XNS
xferlog file : 10.3.3. xferlog Log File
xfrnets directive : 17.3.6.1. DNS zone transfers
xhost command : 17.3.21.3. The xhost facility
XOR (exclusive OR) : 6.4.7. An Unbreakable Encryption Algorithm
XScreensaver program : 12.3.5.2. X screen savers
XTACACS : (see TACACS)


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.

[ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | Practical Security ]



Practical Unix and Internet Security
Practical Unix and Internet Security, 2nd Edition
ISBN: B00009B1UZ
EAN: N/A
Year: 1995
Pages: 28

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net