<  Day Day Up  >    

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

LDR/STR (Load/Store) opcode  
lease period  
Liberty Crack Trojan  
library Trojan kits system library  
Light, Steve  
light-induced voltage alteration  
LIKE modifier command  
       debugging   [See gdb ptrace ]
       ELF   [See ELF]
       GNU development tools  
       hex dumps  
       iptables and ipchains  
       reverse code engineering  
               disassembly tools, writing  
               problem areas  
       runtime monitoring  
               lsof utility  
               ltrace utility  
Linux HOWTOs  
Litchfield, David  
little endian format  
LKM (Loadable Kernel Module)  
Load String system call  
Load/Store (LDR/STR) opcode  
local DoS resource attacks (Unix)  
log analysis  
       covert logging  
       global log aggregation  
       integration of Windows into Unix logging framework  
       kernel logging  
       log overflow  
       logfile types  
       loggable events  
       process accounting  
       SIM (Security Information Management) tools  
               remote logging  
       utilization of log data  
logfile monitors  
       post-cleanup file traces  
               application logs  
               editing tools  
               Unix binary logs  
               Unix shell history  
       remote logging  
Logical Shift Left LSL  
Logical Shift Right LSR  
login records  
logwatch   2nd  
low-energy charge induced voltage alteration  
lsof utility  
ltrace utility  

 <  Day Day Up  >    

Security Warrior
Security Warrior
ISBN: 0596005458
EAN: 2147483647
Year: 2004
Pages: 211

Similar book on Amazon © 2008-2017.
If you may any questions please contact us: