[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] Bace, Rebecca (Intrusion Detection) Bach, Maurice (The Design of the UNIX Operating System) back doors 2nd 3rd as common threat in MUDs and IRCs strength of encryption and background checks 2nd background processes backing out of upgrades backups across network automatic system for commercial systems for configuration files, paper copies of criminal investigations and 2nd 3rd data security for dedicated programs for destruction of differential encryption of 2nd 3rd 4th file modification times and files with holes guidelines for human error and of individual workstations legal issues concerning levels of location of 2nd of log files media failure, protecting against methods of migrating of networks performing before upgrades public key encryption and PGP purposes of read-only partitions retention of 2nd rotating media schedule for security checklist for security of simple archives simple local copies simultaneous software for standards for strategies for 2nd of system-critical files theft of verifying 2nd what to back up world-readable write-protecting bacteria 2nd BADSU attempts, logging Badulescu, Ion banners modem SMTP bash history file Basic Input/Output System (BIOS) batch command batch jobs [See cron file] baud Bellovin, Steve (Firewalls and Internet Security) Berkeley BSD Unix [See BSD Unix] Berkeley FTP server, restricting accounts with Berkeley Software Design, Inc. (BSDI) Bernstein, Dan best practices beverages, effects on hardware bftpd server bidirectionality of modems 2nd biff service bigcrypt algorithm /bin directory /bin/csh [See csh] /bin/ksh [See ksh] /bin/login [See login program] /bin/passwd [See passwd command] /bin/sh [See sh] in restricted filesystems binary code, downloading 2nd binary owner BIND name server 2nd bind() system call BIOS (Basic Input/Output System) Bishop, Matt Blaze, Matt block algorithms block devices 2nd 3rd block/send commands, Trojan horses and Blowfish algorithm bogus nameserver cache poisoning bogusns directive Bolsky, Morris I. (The New Kornshell Command and Programmang Language) bombs , as destructive attack books, security boot disks, viruses on BOOTP protocol Bootparams table (NIS+) Bostic, Keith (The Design and Implementation of the 4.4 BSD UNIX Operating System) Bosworth, S. (Computer Security Handbook) bounds checking Bourne shell [See sh] bps (bits per second) brackets ([]), indicating optional syntax Brand, Russell break-ins case studies of commands used to discover commands used to monitor 2nd contacting a remote system administrator detecting and discovering 2nd documenting legal recourses after planning for preserving evidence from recovering from responding to 2nd resuming operation after security checklist for software toolkit for A Brief History of Time: From the Big Bang to Black Holes (Hawking, Stephen W.) broadcast storms Brunner, John (Shockwave Rider) brute force attacks 2nd 3rd 4th BSD 4.2 BSD 4.4 Lite 2nd BSD Unix 2nd 3rd [See also FreeBSD; Mac OS X; NetBSD; OpenBSD]4th "no dump" file attribute append-only files chroot wrapper exporting filesystems read-only exporting NFS directories Fast File System (FFS) reserved space forcible unmounts with history of host-based firewall for 2nd immutable files inetd program and integrity-checking tools jail() system call 2nd kernel security levels on modems and mtree program nonexecutable stack package management commands packaging tools periodic security scans permission options for pkg (package) system portmapper program process accounting with ps command published resources on secure terminals server startup on SGID and sticky bits for directories shadow password file SMB kernel support spongy mounts TCP Wrappers support terminal security on utmp and wtmp log files vipw command BSD/OS 2nd 3rd BSDI (Berkeley Software Design, Inc.) buffers checking boundaries overflow attack overruns bugs 2nd [See also insects , effects on hardware]3rd Bugtraq mailing list hacker challenges and hardware in Unix utilities keeping secret in NFS security software testing for 2nd tips on avoiding Bugtraq mailing list Building a Secure Computer System (Gasser, Morrie) Building in Big Brother: The Cryptographic Policy Debate (Hoffman, Lance J.) Building Internet Firewalls (Zwicky, Elizabeth D.; Chapman, D. Bren; Cooper, Simon) Building Secure Software (Viega, John and McGraw, Gary) bulk erasers Burning Chrome (Gibson, William) byte-by-byte comparisons |