[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] name service security and switch (NIS, NIS+) Name Service Caching Daemon (nscd) named daemon named nameserver named user named-xfer program named.conf file 2nd nameserver [See DNS] nameserver attacks, DNS nameserver service namespace National Institute of Standards and Technology (NIST) National Science Foundation Network National Security Agency (NSA) natural disasters [See environmental dangers] NBT (NetBIOS over TCP/IP) NcFTPD server ncheck command 2nd needexpnhelo option, sendmail needmailhelo option, sendmail needvrfyhelo option, sendmail Nemeth, Evi (UNIX System Administration Handbook) Nessus security scanner NetBIOS over TCP/IP (NBT) NetBIOS protocol NetBSD [See also BSD Unix]2nd 3rd CVS used by history of 2nd netfilter program 2nd netgroup file Netgroup table (NIS+) netgroups file 2nd netgroups, NIS NetInfo 2nd 3rd Netmasks table (NIS+) Netnews messages, authentication and . netrc file Netscape Navigator, random number generator netstat command 2nd 3rd 4th netwall service network authentication systems 2nd [See also PAM] DCE 2nd 3rd 4th 5th 6th Kerberos 2nd 3rd 4th LDAP 2nd 3rd 4th NetInfo 2nd 3rd NIS 2nd 3rd 4th NIS+ 2nd 3rd RADIUS 2nd 3rd requirements for SESAME network cables cutting, as destructive attack fiber optic routing of network connections eavesdropping on loss of Network Filesystem [See NFS] network filesystems 2nd [See also NFS; SMB] remote, mounted network forensics analysis tools (NFATs) Network Information Service [See NIS] Network News Transport Protocol (NNTP) network providers, trusting Network Security: Private Communications in a Public World (Kaufman, Charles; Perlman, Radia; Specin network servers [See Internet servers] network services auth Identification Protocol 2nd authentication for back doors in BOOTP protocol chargen service 2nd 3rd created by intruders DHCP protocol disabling DNS [See DNS] echo service 2nd 3rd in /etc/services file finger program 2nd FTP [See FTP] HTTP [See HTTP] inetd program handling list of 2nd logging monitoring NNTP [See NNTP] NTP 2nd POP [See POP] programming rexec rlogin RPC's portmapper 2nd rpc.rexd rsh 2nd securing security risks of SMTP [See SMTP] SNMP [See SNMP] SSH 2nd 3rd systat service TACACS and TACACS+ TCP protocol Telnet 2nd 3rd TFTP [See TFTP] UDP protocol X Window System Network Time Protocol [See NTP] network weaving network-based IDS (NIDS) networks ARPANET backing up cables for clogging (SYN flood attacks) compromised, risks of being prosecuted for configuration files connectors for denial of service attacks on disabling physically forensics analysis tools (NFATs) for Internet IP 2nd [See also TCP/IP networks] LANs [See LANs] logging across MANs [See MANs] message flooding attacks on NFSNET packet-switching partitioning ping of death attacks on published resources on scanning security and security checklist for 2nd service overloading attacks on sniffers spoofed connection superuser control of syslog facility and TCP/IP [See TCP/IP networks] WANs [See WANs] wireless, jamming Networks table (NIS+) Neumann, Peter G. Computer Related Risks Neuromancer (Gibson, William) The New Kornshell Command and Programmang Language (Bolsky, Morris I. and Korn, David G.) newgrp command newkey command 2nd news [See Usenet] news user newsyslog program newsyslog.conf file .nexrc file NFATs (network forensics analysis tools) NFS (Network Filesystem) 2nd 3rd [See also RPC]4th 5th bugs in client access, limiting client-side security exported filesystems, limiting exporting filesystems read-only exporting home directories exporting sensitive files with exporting server executables file handles file permissions find command on fsirand program and group write permission for files history of intruders compromising listing clients who have mounted directories listing export lists -local option MOUNT protocol and mounted filesystems, limiting NFS protocol and portmon variable and protection mode for files reasons not to use restricted filesystems mounted within Secure NFS security checklist for security of 2nd server-side security superuser ownership of files TCP links and Version 3 2nd Version 4 versions of WebNFS -xdev option NFS protocol connectionless servers and mounting filesystems with reliability of stateless servers and superuser and NFS service 2nd nice command nice number of processes NIDS (network-based IDS) nidump command NIH web site NIS (Network Information Service) 2nd 3rd 4th accounts importing 2nd including and excluding changing passwords clients domains intruders compromising limitations of maps name service switch netgroups plus sign (+) in files 2nd protecting database and commands secret keys and Secure RPC with spoofing UDP unintended information disclosure with Yellow Pages NIS+ 2nd 3rd access control for objects 2nd changing passwords limitations of name service switch passwords protecting database and commands running in NIS compatibility mode secret keys and Secure RPC with security levels of nisaddcred command niscat command nischown command nispasswd command 2nd 3rd 4th NIST (National Institute of Standards and Technology) NIST CSRC web site nmap network-mapping tools 2nd 3rd NNTP (Network News Transport Protocol) 2nd nobody user 2nd nobody variable noexpn option, sendmail nonce nosuid noverb option, sendmail novrfy (sendmail) npasswd package NPROC variable NSA (National Security Agency) 2nd nscd (Name Service Caching Daemon) nss_ldap 2nd nsswitch.conf file ntalk service NTFS filesystem NTP (Network Time Protocol) 2nd 3rd ntpd daemon 2nd ntpdate command 2nd null device null modem adapter null modem cable NULL request "The Number Field Sieve" (Lenstra, A. K.; Lenstra, H. W., Jr.; Manasse, M. S.; Pollard, J. M.) |