Index F


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

failures, computer   [See also bugs ]2nd  
’fair use “ provisions, copyright law  
Farmer, Dan   2nd   3rd   4th  
Fast File System   [See FFS]
FAT filesystem  
FAT32 filesystem  
FBI (Federal Bureau of Investigation)   2nd  
fchmod() system call   2nd  
fchow() system call  
Federal Bureau of Investigation (FBI)   2nd  
federal jurisdiction  
federal laws  
Ferbrache, David (The Pathology of Computer Viruses)  
FFS (Fast File System)   2nd   3rd  
FG (Frame Ground)  
fget() system call  
fgets() system call  
fiber optic cables  
FIFO file type  
file command  
file descriptors  
file handles   2nd  
File Transfer Protocol   [See FTP]
filenames, attacks through  
files   2nd  
       access times of  
       append-only  
       backing up   [See backups ]
       beginning with dash, deleting  
       byte-by-byte comparisons of  
       change time  
       changing owner of  
       checklists for comparing  
       checksums detecting changes in  
       context-dependent (CDFs)  
        core  
       critical, backing up  
       critical, deleting  
       deleted accidentally  
       deleted as destructive attack  
       detecting changes to  
       device  
       format of, monitoring  
        group for  
       group-writable  
       hidden   2nd  
       history  
       immutable  
       information about (metadata)  
       inodes storing information about  
       integrity of   [See integrity]
       locating largest  
       locking  
               mandatory  
       log   [See log files]
       magic number in  
       metadata, comparing  
       modification times of   2nd   3rd   4th  
       modified by intruders   2nd  
       owner of  
       permissions for   [See permissions]
       security checklist for  
       SGID bit on  
       signatures detecting changes in  
       startup   [See startup files]
       SUID/SGID, finding  
       swapping to  
       system configuration  
       system database  
       system startup  
       Trojan horses in  
       trusted computing base (TCB) of  
       types of   2nd  
        unlinked , hidden space used by  
       unowned  
       which to back up  
       world-writable  
       zero-filled bytes (holes) in  
filesystems   [See also directories]2nd  
       Cryptfs  
       cryptographic   2nd  
       encrypted  
       Fast File System  
       journaling  
       list of, available on Unix  
       mounted  
       network   2nd   [See also NFS; SMB]
       remote network  
       replicated (RAID)  
       reserved space on  
       restricted  
       security checklist for   2nd  
       summarizing usage per user  
       superuser control of  
       UFS  
       virtual filesystem interface  
filter files (mail)  
filtering software   2nd  
filtering, on-demand  
find command
       -0 option  
       -ls option  
       -size option  
       attacks on  
       -H option  
       -print option  
       type -f option  
       -xdev option  
finger account  
finger command   2nd   3rd   4th  
       disabling  
       finding contact information with  
       login times displayed by  
       running when not logged in  
finger service  
fingerd program   2nd   [See also Internet worm program]
fingerprint of files or keys   [See message digest functions]
Fingerprints Database  
fire   2nd   3rd  
firewalls
       account aliases and  
       host-based program   2nd  
       IP networks  
       kernel-level  
       mailing list for  
       nameservers and  
       for NIS sites  
       packet-level  
        portmapper program and  
       standalone appliance for  
       stateful inspection of  
       telephone  
       verifying proper operation of  
Firewalls and Internet Security (Bellovin, Steve and Cheswick, Bill)  
Firewire-based disk drive  
FIRST (Forum of Incident Response and Security Teams)   2nd   3rd  
flooding, client  
floors, raised, access through  
folders   [See directories links]
fonts used in this book  
food, effects on hardware  
forensics   2nd   [See also logging]
       security checklist for  
fork bombs  
fork() system call   2nd  
Forrester, Justin  
Forum of Incident Response and Security Teams   [See FIRST]
.forward file   2nd  
Frame Ground (FG)  
fraud  
Fredricksen, Lars ("An Empirical Study of the Reliability of UNIX Utilities")  
Free Software Foundation (FSF)  
FreeBSD   2nd   [See also BSD Unix]3rd   4th  
       ACL support for  
       bug fixes, responsibility for   2nd  
       Cryptfs support for  
       CVS used by  
       history of   2nd  
       host-based firewall for  
       kernel security levels on  
       master password file  
       PAM support for  
       password file, printing  
       S/Key support  
        source-based management systems  
       su log  
       sulog, scanning  
Freedman, David H. (@ Large)  
fscanf() system call  
fsck program   2nd  
FSF (Free Software Foundation)  
FSINFO function (RPC)  
fsirand program   2nd  
FSSTAT function (RPC)  
fstab file   2nd  
fstat () system call  
FSUID (filesystem UID)  
FTP (File Transfer Protocol)   2nd   3rd  
       active mode  
       allowing without logging in  
       anonymous   2nd   3rd  
       bounce attack  
       chroot() system call and  
       ~ftp/bin directory  
       ~ftp/etc directory  
       ~ftp/pub directory  
       passive mode  
       restricted filesystems and  
       restricting accounts with  
       setting up server  
ftp user  
ftpd server   2nd   3rd   4th  
ftpusers file  
ftruncate() system call  
The Fugitive Game: Online with Kevin Mitnick (Littman, Jonathan)  
full backup  
function keys, passwords programmed to  
functionality, add-on  
Fundamentals of Computer Security Technology (Amoroso, Edward)  
Fuzz program tests  



Practical UNIX and Internet Security
Practical Unix & Internet Security, 3rd Edition
ISBN: 0596003234
EAN: 2147483647
Year: 2003
Pages: 265

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net