[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] MAC (Mandatory Access Controls) 2nd Mac OS X 2nd [See also BSD Unix] history of host-based firewall for 2nd kernel security levels on NetInfo password database password file, printing S/Key support server startup on SMB support sudo program 2nd TCP Wrappers support Mach kernel machine name macro virus [See viruses] MACs (message authentication codes) 2nd 3rd magic cookies magic number magnetic tapes [See tapes] mail [See email] MAIL command, SMTP mail handler (MH) mail systems [See MTAs] mail user Mail_Aliases table (NIS+) mailboxes [See email] mailing lists, security- related mailq command main.cf file maintenance mode maintenance personnel, security regarding makedbm program malicious code [See programmed threats] malware [See programmed threats] man-in-the-middle attack management participation in security policy role of 2nd 3rd Manasse, M. S. ("The Number Field Sieve") Mandatory Access Controls [See MAC] mandatory filtering software mandatory record locking Mann, Charles C. (@ Large) manpages MANs (metropolitan area networks) manuals reading restricting availability of maps, NIS [See NIS] Markoff, John Cyberpunk: Outlaws and Hackers on the Computer Frontier Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw -- By the master password file master server 2nd [See also NIS] master.passwd file 2nd MCF (Modular Crypt Format) McGraw, Gary (Building Secure Software<Default Para Font) McKusick, Marshall Kirk (The Design and Implementation of the 4.4 BSD UNIX Operating System) MD2 functions MD4 functions MD5 algorithm 2nd MD5 cryptographic checksum MD5 functions media backing up to [See backups ] destroying 2nd failure of, for backups overwriting print through process printed 2nd 3rd read-only rotating for backups sanitizing tapes 2nd upgrading viruses from write-once, logging to meet-in-the-middle plaintext attacks memory, swap space, running out of Merkle, Ralph "Hiding Information and Signatures in Trap Door Knapsacks" "On the Security of Multiple Encryption" "Secure Communication Over Insecure Channels" Merkle, Robert message authentication codes [See MACs] message digest functions 2nd applications of 2nd attacks on checksums generated with HMAC Tripwire package and message flooding Message Transfer Agents [See MTAs] Message User Agents (MUA) messages file 2nd 3rd [See also syslog file]4th 5th metadata 2nd Metcalf, Bob "A Method for Obtaining Digital Signatures" (Rivest, Ron; Shamir, A.; Adleman, L.) metropolitan area networks (MANs) MH (mail handler) Miller, Barton P. 2nd "An Empirical Study of the Reliability of UNIX Utilities" Minix operating system mirror sites mirrored disks and servers MIT Kerberos [See Kerberos system] MIT-KERBEROS-5 authentication Mitnick, Kevin 2nd MKDIR function (RPC) mknod command MKNOD function (RPC) mkpasswd program mkstemp() system call MLS (Multilevel Security) environment MNT request mobile Unix systems mode bits [See permissions] modems answer mode banners displayed by baud bps (bits per second) callback schemes and 2nd Caller-ID and 2nd clogging connecting current trends for use of eavesdropping and encrypting hanging up with SIGHUP initiating calls with one-way phone lines used by originate mode password phone numbers for, changing physical security of reasons to use recording call information RS-232 serial protocol used by security and 2nd security checklist for serial interfaces used by telephone scanning and firewalls for testing tracing connections unauthorized Unix devices for modification times, files 2nd Modular Crypt Format (MCF) Mona Lisa Overdrive (Gibson, William) monitoring [See also logging]2nd monitoring services Morris, Robert H. 2nd "UNIX Operating System Security" Morris, Robert T. motion detectors mount command 2nd 3rd MOUNT protocol mountd daemon mounted filesystems mrand48() system call MSDOS filesystem MTAs (Message Transfer Agents) mtime 2nd 3rd 4th mtree program MUA (Message User Agents) Muddleftpd server MUDs (Multiuser Dungeons/Dimensions) Muffet, Alec 2nd multicast groups MULTICS (Multiplexed Information and Computing Service) multilevel security (defense in depth) 2nd 3rd multitasking multithreaded programming Multiuser Dungeons/Dimensions (MUDs) multiuser operating systems multiuser, shared systems MX record type |