Index P


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

P1003.1e/2c security standards  
pacct file  
package-based software management systems   2nd  
       backing out of upgrades  
       upgrading with  
packet monitors  
packet sniffing   2nd  
packet-filtering firewalls  
packet-level firewalls  
packet-switching networks  
paging  
PAM (Pluggable Authentication Modules)  
       npasswd module  
       one-time password module  
       resource limits  
       restricting logins with  
       restrictions used with Samba  
       S/Key module  
       using LDAP with  
       using with Kerberos  
pam.conf file   2nd  
pam_ldap  
pam_time module  
paper   [See media, printed]
parent processes  
parentheses (()), indicating system call  
parity bit  
passive FTP  
passwd command   2nd  
       -l option  
       -n option  
       -x option  
       changing permissions for  
       -f flag  
       preventing bad password choices  
       as SUID program  
       using as superuser  
passwd file   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th  
Passwd table (NIS+)  
passwd+ package   2nd  
passwd.adjunct file  
password modems  
passwords
       accounts without  
       advisors for  
       aging  
       assigning to users  
       authentication with  
       bad choices for   2nd  
       changing  
               another user 's  
               to disable accounts  
        characters allowed in  
       choosing   2nd   3rd   4th  
       codebooks for  
       compromised  
       constraining choices for  
       control characters in   2nd  
       cracking   2nd   3rd   4th  
       encryption of   2nd   3rd   4th   5th  
       entering  
       expiring  
       file stored in  
       FTP and  
       generators for  
       good choices for  
        group  
       guessing attacks  
       hit lists of  
       identical to username (Joes)   2nd  
       for Instant Messaging  
       keeping secure   2nd   3rd  
       Kerberos  
       keystroke recorder capturing  
       location of  
       locking account if incorrect  
       logging changes to  
       logging failed attempts at  
       master file  
       for MUDs  
       on multiple machines  
       over network connections  
       NIS+, changing  
       NIS, with Secure RPC  
       one-time   2nd   3rd  
       periodic scanning of  
       with POP  
       preventing users from changing  
       programmed to function keys  
       public key authentication as alternative to  
       security checklist for  
       shadow   2nd   3rd  
       shoulder surfing  
       sniffing   2nd   3rd   4th   5th  
       spaces in  
       ssh keys used for  
       synchronized on multiple accounts  
       system clock and  
       token-based generator for  
       unique, number of  
       using in programs  
       verifying new  
       wizard's (sendmail)  
       writing down  
patch diff  
patch program  
patches
       finding  
       installing  
       logging  
PATH variable   2nd  
PATHCONF function (RPC)  
pathname  
The Pathology of Computer Viruses (Ferbrache, David)  
paths
       pathname for  
       trusted  
pax program  
PDP-11 processors  
peer review, verifying cryptographic algorithms with  
Pengo  
per-machine log books  
per-site log books  
percent sign (%), Unix C shell prompt  
performance reviews  
performance, overload attacks affecting  
peripheral devices   [See device files]
Perl  
       random seed generator  
       Trojan horses in scripts  
       using for SUID/SGID programs  
       using instead of shell scripts  
Perlman, Radia (Network Security: Private Communications in a Public World)  
permissions  
       changing  
       devices  
       directories   2nd  
       /etc/utmp file  
       execute   2nd   3rd  
       files  
       modem devices  
       modem files  
       modified by intruders  
       nameserver files  
       of NIS+ objects   2nd  
       octal  
       of commands  
       read   2nd   3rd  
       setting  
       sticky bit  
       stored in inodes  
       SUID and SGID   2nd  
       symbolic links and  
       umasks  
       write   2nd   3rd  
personnel   [See employees ]
pf program  
Pfleeger, Charles P. (Security in Computing)  
PGP (Pretty Good Privacy)  
       for backups  
       for email  
       software signature  
PGP: Pretty Good Privacy (Garfinkel, Simson)  
ph program  
phantom mail  
Phoenix, Tom (Learning Perl)  
phones   [See telephones]
physical security
       access to hardware   2nd  
       accidents  
       acts of war and terrorism  
       of backups  
       checklist for  
       costs of  
       environmental dangers  
       hardware, protection for  
       importance of  
       IP network computers  
       modems   2nd  
       planning  
       read-only filesystems  
       real-world example  
       security perimeter for  
       signal- grounding attacks  
       telephone lines  
       theft of hardware  
       vandalism  
PIDs (process IDs)   2nd  
Pike, Rob (The UNIX Programming Environment)  
ping of death attacks   2nd  
piracy, software  
pkg (package) system  
pkg_add command  
pkg_delete command  
pkg_info command   2nd  
pkgadd command  
pkginfo command  
pkgrm command  
PKI (Public Key Infrastructure)   2nd  
pkill command  
plaintext attacks   2nd   3rd  
.plan file  
platforms   [See specific operating systems]
play account  
playback attacks  
Pluggable Authentication Modules   [See PAM]
plus sign (+)
       in file permissions  
       in hosts .equiv file  
       in NIS   2nd  
Point-to-Point Protocol   [See PPP]
policy, security   2nd  
       best practices used for  
       checklist for  
       compliance audits for  
       cost-benefit analysis  
       guidelines in  
       positive statements in  
       risk assessment   2nd  
       role of   2nd  
       simplified in four steps  
       standards in  
       writing  
political activists
       as authors of programmed threats  
       planting programmed threats  
Pollard, J. M. ("The Number Field Sieve")  
polygraph tests, of employees  
POP (Post Office Protocol)  
pop3 service  
popen() system call   2nd  
POPS (secure POP)  
pornography laws  
port scanners  
portable I/O library  
portmap daemon  
portmapper program   2nd   3rd  
        bugs in  
       firewalls and  
       proxy forwarding enabled by  
       spoofing RPC with  
portmon variable  
ports  
       for network services  
       trusted  
       well-known  
ports collection, source-based management systems in  
portsentry program  
POSIX
       and chown command  
       orphaned process groups  
       saved user ID  
       standards   2nd   3rd  
Post Office Protocol   [See POP]
postfix program   2nd   3rd  
postmaster account  
PostScript files
       Trojan horses in  
       viruses in  
power
       outages, logging  
       shutting off, as destructive attack  
       surges  
power users  
Power, Richard (Tangled Web)  
PPP (Point-to-Point Protocol)   2nd  
preserve program, security hole in  
Press Enter (Varley, John)  
Pretty Good Privacy   [See PGP]
primary group  
principals, NIS+  
print through process  
printed media   [See media, printed]
printer service  
printers
       /etc/hosts.lpd file  
       logging to  
       lp user for  
       output, security of  
priority of process  
privacy   [See confidentiality]
private key algorithms   [See symmetric key algorithms]
private keys   [See secret keys]2nd  
privilege testing, modems  
privileges, file   [See permissions]2nd   [See permissions]
privileges, SUID   [See SUID programs]
/proc filesystem  
process accounting  
process group IDs  
process IDs   [See PIDs]
processes  
       commands to control  
       controlling  
        core file of  
       creating  
        defunct  
       examining   2nd  
       group IDs for  
       listing with ps command  
       listing with top command  
       niceness of  
       overload attacks  
       priority of  
       programs running in  
       properties of  
       scheduler  
       session IDs for  
       signals and  
       slave ( zombies or Trojans)  
       soft process limits  
       stopping  
       superuser control of  
       tree for  
       Unix startup and login  
procmail system  
.procmailrc file  
.profile file  
profile file  
.profile file  
profile file  
ProFTPD server  
programmed threats
       authors of  
       to automatic mechanisms  
       back doors   2nd   3rd  
       bacteria  
       damage done by  
       entry into computer system  
       logic bombs   2nd  
       protection from  
       published resources on  
       rabbit programs  
       security checklist for  
       security tools  
       to shells  
       to startup files  
       Trojan horses   2nd   3rd  
       types of  
       viruses   2nd   3rd  
       worms  
programming
       coding standards for  
       design principles for   2nd  
       network services  
       published resources on  
       security checklist for  
       SUID/SGID programs  
       syslog calls in  
       threads and  
Programming Perl (Wall, Larry; Christiansen, Tom; Orwant, Jon)  
programs   [See software]2nd   [See software]
Project Athena   2nd   [See also Kerberos system]
.project file  
prompts, symbols for  
protocols   [See specific protocols]
Protocols table (NIS+)  
proxy, using in network services  
ps command   2nd   3rd   4th   5th  
       with kill command  
       to stop process overload  
pseudo-devices  
pseudorandom functions  
pstree command  
public key algorithms   2nd  
       applications of  
       attacks on  
       authentication and   2nd  
       backups and  
       computational expense of  
       digital signatures created with  
       key length and  
       known versus published methods of  
       types of  
Public Key Infrastructure   [See PKI]
Public Key Partners  
public keys   2nd   3rd   4th   5th  
publications , security  
publicity, as motivation for programmed threats  
publickey file  
PureFTPd server  
PurifyPlus (Rational)  
pwck command  
pwdadm program  



Practical UNIX and Internet Security
Practical Unix & Internet Security, 3rd Edition
ISBN: 0596003234
EAN: 2147483647
Year: 2003
Pages: 265

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net