start page | rating of books | rating of authors | reviews | copyrights

Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: L

L-devices file : 14.5.1. Hooking Up a Modem to Your Computer
L.cmds file : 15.4.3. L.cmds: Providing Remote Command Execution
L.sys file : 15.3.3. Security of L.sys and Systems Files
Lai, Xuejia : 6.4.1. Summary of Private Key Systems
laid-off employees : 13.2.6. Departure
LaMacchia, Brian : 19.3.4. Limitations of Secure RPC
LANs (local area networks)
16.1. Networking
16.2. IPv4: The Internet Protocol Version 4
laptop computers : 12.2.6.3. Portables
last program
8.4.3. Finding Dormant Accounts
10.1.2. utmp and wtmp Files
10.1.3. last Program
10.1.3.1. Pruning the wtmp file
15.3.1. Assigning Additional UUCP Logins
-f option : 10.1.3.1. Pruning the wtmp file
lastcomm program
10.2. The acct/pacct Process Accounting File
10.2.2. Accounting with BSD
lastlog file : 10.1.1. lastlog File
laws
26. Computer Security and U.S. Law
26.4.7. Harassment, Threatening Communication, and Defamation
backups and : 7.1.7. Legal Issues
checklist for : A.1.1.25. Chapter 26: Computer Security and U.S. Law
copyright
9.2.1. Comparison Copies
26.4.2. Copyright Infringement
26.4.2.1. Software piracy and the SPA
criminal prosecution
26.2. Criminal Prosecution
26.2.7. A Final Note on Criminal Actions
Electronic Communications Privacy Act (ECPA) : 26.2.3. Federal Computer Crime Laws
encryption
6.7. Encryption and U.S. Law
6.7.2. Cryptography and Export Controls
12.2.6.3. Portables
enforcement agencies : 14.4.4.1. Kinds of eavesdropping
export
6.4.4.1. Use and export of DES
6.7.2. Cryptography and Export Controls
26.4.1. Munitions Export
federal enforcement
26.2.2. Federal Jurisdiction
26.2.3. Federal Computer Crime Laws
indecent material : 26.4.5. Pornography and Indecent Material
liability
26.4. Other Liability
26.4.7. Harassment, Threatening Communication, and Defamation
monitoring keystrokes : 24.2.3. Monitoring the Intruder
non-citizen access : 26.4.1. Munitions Export
patents : 26.4.4. Patent Concerns
for portable computers : 12.2.6.3. Portables
resources on : D.1.1. Other Computer References
search warrants
26.2.4. Hazards of Criminal Prosecution
26.2.5. If You or One of Your Employees Is a Target of an Investigation...
smoking : 12.2.1.2. Smoke
state and local enforcement : 26.2.1. The Local Option
trademarks : 26.4.3. Trademark Violations
vendor liability : 18.5.2. Trusting Your Software Vendor
lawsuits (civil) : 26.3. Civil Actions
leased telephone lines : 14.5.4. Physical Protection of Modems
least privilege
5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
13.2.5. Least Privilege and Separation of Duties
Lee, Ying-Da : 22.4. SOCKS
Lesk, Mike
1.3. History of UNIX
15.2. Versions of UUCP
liability, legal
26.4. Other Liability
26.4.7. Harassment, Threatening Communication, and Defamation
/lib directory : 11.5.3.6. Other files
license agreements : 18.5.2. Trusting Your Software Vendor
comparison copies and : 9.2.1. Comparison Copies
lie-detector tests : 13.1. Background Checks
lightning
12.2. Protecting Computer Hardware
12.2.1.9. Lightning
limit command : 25.2.5. Soft Process Limits: Preventing Accidental Denial of Service
Limit command (<Directory>) : 18.3.2. Commands Within the <Directory> Block
limited user access : 8.1.5.1. Limited users
link-level security : 16.3.1. Link-level Security
links
encryption of : 18.4.1. Eavesdropping Over the Wire
link-level security : 16.3.1. Link-level Security
static : 23.4. Tips on Writing SUID/SGID Programs
symbolic, following (Web)
18.2.2.2. Additional configuration issues
18.3.2. Commands Within the <Directory> Block
lint program : 23.2. Tips on Avoiding Security-related Bugs
LINUX operating system
1.3. History of UNIX
3.3. Entering Your Password
23.1.2.1. What they found
ext2 filesystem : 25.2.2.6. Reserved space
random number generators : 23.7.4. Other random number generators
Live Script : 18.5.2. Trusting Your Software Vendor
load shedding : 23.3. Tips on Writing Network Programs
local
area networks (LANs)
16.1. Networking
16.2. IPv4: The Internet Protocol Version 4
authentication (NIS+) : 19.5.4. Using NIS+
law enforcement : 26.2.1. The Local Option
storage
12.3.4. Protecting Local Storage
12.3.4.5. Function keys
users, and USERFILE : 15.4.1.2. USERFILE entries for local users
lock program : 12.3.5.2. X screen savers
locked accounts : 3.3. Entering Your Password
locking files : 23.2. Tips on Avoiding Security-related Bugs
log files
11.5.3.5. System initialization files
(see also logging)
access_log
10.3.5. access_log Log File
18.4.2. Eavesdropping Through Log Files
aculog : 10.3.1. aculog File
agent_log file : 18.4.2. Eavesdropping Through Log Files
backing up : 10.2.2. Accounting with BSD
lastlog : 10.1.1. lastlog File
managing : 10.8. Managing Log Files
manually generated
10.7. Handwritten Logs
10.7.2.2. Informational material
per-machine : 10.7.2. Per-Machine Logs
per-site : 10.7.1. Per-Site Logs
refer_log file : 18.4.2. Eavesdropping Through Log Files
sulog : (see sulog file)
system clock and : 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
tracking intruders with : 24.3. The Log Files: Discovering an Intruder's Tracks
/usr/adm/messages : 10.2.3. messages Log File
utmp and wtmp
10.1.2. utmp and wtmp Files
10.1.3.1. Pruning the wtmp file
uucp : 10.3.4. uucp Log Files
/var/adm/acct : 10.2. The acct/pacct Process Accounting File
/var/adm/loginlog : 10.1.4. loginlog File
of Web servers : 18.4.2. Eavesdropping Through Log Files
xferlog : 10.3.3. xferlog Log File
logdaemon package : 17.3.18.5. Searching for .rhosts files
logger command : 10.5.3. syslog Messages
logging
7.1.1.1. A taxonomy of computer failures
10. Auditing and Logging
10.8. Managing Log Files
11.5.3.5. System initialization files
21.5. Special Considerations
23.2. Tips on Avoiding Security-related Bugs
(see also log files)
across networks : 10.5.2.2. Logging across the network
archiving information : 7.4.2. Simple Archives
breakins : 24.1.2. Rule #2: DOCUMENT
C2 audit : 10.1. The Basic Log Files
checklist for : A.1.1.9. Chapter 10: Auditing and Logging
critical messages
10.5.3. syslog Messages
10.5.3.1. Beware false log entries
downloaded files
10.3.3. xferlog Log File
10.3.5. access_log Log File
failed su attempts : 4.3.7. The Bad su Log
file format : 8.2. Monitoring File Format
files transferred by FTP : 10.3.3. xferlog Log File
to hardcopy device : 10.5.2.1. Logging to a printer
individual users
10.4. Per-User Trails in the Filesystem
10.4.3. Network Setup
manually
10.7. Handwritten Logs
10.7.2.2. Informational material
mistyped passwords : 10.5.3. syslog Messages
network services : 10.3.6. Logging Network Services
outgoing mail : 10.4.2. Mail
potentially criminal activity : 26.2.6. Other Tips
Swatch program
10.6. Swatch: A Log File Tool
10.6.2. The Swatch Configuration File
E.4.9. Swatch
syslog facility
10.5. The UNIX System Log (syslog) Facility
10.5.3.1. Beware false log entries
UUCP : 10.3.4. uucp Log Files
what not to log : 10.5.3. syslog Messages
logging in
C.5. Starting Up UNIX and Logging In
C.5.3. Running the User's Shell
FTP access without : 17.3.2.7. Allowing only FTP access
Kerberos system : 19.6.1.1. Initial login
last program
10.1.3. last Program
10.1.3.1. Pruning the wtmp file
lastlog file : 10.1.1. lastlog File
passwords : 3.3. Entering Your Password
preventing
8.4. Managing Dormant Accounts
8.4.3. Finding Dormant Accounts
restricting : 8.3. Restricting Logins
with Secure RPC : 19.3.3. Using Secure RPC
startup file attacks
11.5.2. Start-up File Attacks
11.5.2.7. Other initializations
logging out with Secure RPC[logging out:Secure RPC] : 19.3.3. Using Secure RPC
logic bombs
11.1. Programmed Threats: Definitions
11.1.3. Logic Bombs
27.2.2. Viruses on the Distribution Disk
.login file
8.5.1. Secure Terminals
11.5.2.1. .login, .profile, /etc/profile
24.4.1.6. Changes to startup files
login program
8.6. The UNIX Encrypted Password System
11.1.2. Back Doors and Trap Doors
19.5.4. Using NIS+
26.2.6. Other Tips
27.1.2. Trusting Trust
logindevperm file : 17.3.21.1. /etc/fbtab and /etc/logindevperm
loginlog file : 10.1.4. loginlog File
logins
authentication : 17.3.5. TACACS (UDP Port 49)
FTP : 17.3.2. (FTP) File Transfer Protocol (TCP Ports 20 and 21)
UUCP, additional : 15.3.1. Assigning Additional UUCP Logins
logins command : 8.1.1. Accounts Without Passwords
-d option : 8.2. Monitoring File Format
-p option : 8.2. Monitoring File Format
LOGNAME= command
15.5.1.3. A Sample Permissions file
15.5.2. Permissions Commands
.logout file : 19.3.3. Using Secure RPC
long distance service
14.5.4. Physical Protection of Modems
17.3.3. TELNET (TCP Port 23)
losses, cost of preventing
2.3. Cost-Benefit Analysis
2.3.4. Convincing Management
lp (user) : 4.1. Users and Groups
lpd system : 17.3.18.6. /etc/hosts.lpd file
lrand48 function : 23.7.3. drand48 ( ), lrand48 ( ), and mrand48 ( )
ls command
5.1.4. Using the ls Command
5.1.5. File Times
9.2.2. Checklists and Metadata
-c option : 5.1.5. File Times
-d option : 9.2.2.1. Simple listing
-e option : 5.2.5.1. AIX Access Control Lists
-F option : 5.1.4. Using the ls Command
-g option : 5.1.4. Using the ls Command
-H option : 5.9.2. Context-Dependent Files
-i option : 9.2.2.1. Simple listing
-l option
5.1.4. Using the ls Command
5.2.5.1. AIX Access Control Lists
5.5.1. SUID, SGID, and Sticky Bits
-q option : 5.4. Using Directory Permissions
-u option : 5.1.5. File Times
-c option : 24.4.1.6. Changes to startup files
-H option : 24.4.1.7. Hidden files and directories
-l option : 24.4.1.6. Changes to startup files
lsacl command : 5.2.5.2. HP-UX access control lists
lsof program : 25.2.2.7. Hidden space
lstat function : 23.2. Tips on Avoiding Security-related Bugs
Lucifer algorithm
6.4.4. DES
6.4.4.3. DES strength
LUCIFER cipher : 6.4.4. DES


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.