[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] Kahn, David (The Codebreakers) Karels, Michael (The Design and Implementation of the 4.4 BSD UNIX Operating System) Kaufman, Charles Network Security: Private Communications in a Public World Kaufman, Lar (Running Linux) Kerberos system 2nd 3rd 4th authentication with installing limitations of logical servers for OpenSSH and random number generator RPC system and server lock and key using using with LDAP using with PAM Versions 4 and 5 kermit program 2nd kernel immutable security levels for 2nd 3rd kernel-level firewalls Kernighan, Brian (The UNIX Programming Environment) key length and brute force attacks search times corresponding to strength relative to crypographic algorithms key search attacks 2nd 3rd 4th 5th key switches keyboard monitors keylogin program 2nd keylogout program keys (encryption/decryption) 2nd 3rd 4th 5th keyserv process 2nd 3rd keystore file keystrokes, monitoring 2nd 3rd [See also sniffers] kill command 2nd built in to ksh or csh to stop process overload killall command Kim, Gene H. 2nd kinit program Klaus, Christopher William kmem device 2nd known plaintext attacks 2nd Knuth, Donald Kochan, Stephen G. (UNIX System Security) Korn shell [See ksh] Korn, David G. (The New Kornshell Command and Programmang Language) ksh (Korn shell) [See also shells ] history file programs using prompt published resources on TMOUT variable umask and . kshrc file |