[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] VA Linux vacation program vampire taps vandalism vandals, computer [See intruders] /var directory [See also /usr firectory]2nd /var/adm directory /var/adm/acct file /var/adm/lastlog file /var/adm/loginlog file /var/adm/messages file /var/adm/savacct file /var/adm/wtmp file /var/log directory variables , bounds checking Varley, John (Press Enter) VC-I video encryption algorithm vendors security access given to all-in-one contracts corporate stability of evaluating employees of experience of hackers as mailing lists for referrals and references for trusting software loss of trusting 2nd Venema, Wietse 2nd 3rd 4th 5th 6th 7th ventilation access through holes (in hardware) VERB command, SMTP vfork() system call vfstab file vi editor 2nd 3rd vibrations, effects on hardware Viega, John (Building Secure Software) Vinge, Vernor (True Names and Other Dangers) vipw command virtual filesystem interface Virtual Light (Gibson, William) virtual nodes Virtual Private Network (VPN) The Virus Bulletin viruses 2nd on distribution disk published resources on visitors , security regarding vnode interface [See virtual filesystem interface] vold.log file voltage spikes [See power, surges] VonStorch, William (Computer Crime: A Crimefighter's Handbook) VPN (Virtual Private Network) VRFY command, SMTP 2nd 3rd vsnprintf() system call vsprintf() system call 2nd vsyslog() system call |