start page | rating of books | rating of authors | reviews | copyrights

Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: E

earthquakes : 12.2.1.4. Earthquake
eavesdropping
12.3.1. Eavesdropping
12.3.1.5. Fiber optic cable
12.4.1.2. Potential for eavesdropping and data theft
14.4.4. Protecting Against Eavesdropping
14.4.4.2. Protection against eavesdropping
16.3.1. Link-level Security
IP packets
16.3.1. Link-level Security
17.3.3. TELNET (TCP Port 23)
through log files : 18.4.2. Eavesdropping Through Log Files
on the Web
18.4. Avoiding the Risks of Eavesdropping
18.4.2. Eavesdropping Through Log Files
X clients : 17.3.21.2. X security
ECB (electronic code book)
6.4.4.2. DES modes
6.6.2. des: The Data Encryption Standard
echo command : 23.5. Tips on Using Passwords
ECPA (Electronic Communications Privacy Act) : 26.2.3. Federal Computer Crime Laws
editing wtmp file : 10.1.3.1. Pruning the wtmp file
editors : 11.5.2.7. Other initializations
buffers for : 11.1.4. Trojan Horses
Emacs : 11.5.2.3. GNU .emacs
ex
5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
11.5.2.4. .exrc
11.5.2.7. Other initializations
startup file attacks : 11.5.2.4. .exrc
vi
5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
11.5.2.4. .exrc
11.5.2.7. Other initializations
edquota command : 25.2.2.5. Using quotas
EDS : F.3.4.11. EDS and EDS customers worldwide
education : (see security, user awareness of)
effective UIDs/GIDs
4.3.1. Real and Effective UIDs
5.5. SUID
10.1.2.1. su command and /etc/utmp and /var/adm/wtmp files
C.1.3.2. Process real and effective UID
8mm video tape : 7.1.4. Guarding Against Media Failure
electrical fires
12.2.1.2. Smoke
(see also fires; smoke and smoking)
electrical noise : 12.2.1.8. Electrical noise
electronic
breakins : (see breakins; cracking)
code book (ECB)
6.4.4.2. DES modes
6.6.2. des: The Data Encryption Standard
mail : (see mail)
Electronic Communications Privacy Act (ECPA) : 26.2.3. Federal Computer Crime Laws
ElGamal algorithm
6.4.2. Summary of Public Key Systems
6.5.3. Digital Signatures
elm (mail system) : 11.5.2.5. .forward, .procmailrc
emacs editor : 11.5.2.7. Other initializations
.emacs file : 11.5.2.3. GNU .emacs
email : (see mail)
embedded commands : (see commands)
embezzlers : 11.3. Authors
emergency response organizations : (see response teams)
employees
11.3. Authors
13. Personnel Security
13.3. Outsiders
departure of : 13.2.6. Departure
phonebook of : 12.3.3. Other Media
security checklist for : A.1.1.12. Chapter 13: Personnel Security
targeted in legal investigation : 26.2.5. If You or One of Your Employees Is a Target of an Investigation...
trusting : 27.3.1. Your Employees?
written authorization for : 26.2.6. Other Tips
encryption
6.2. What Is Encryption?
6.2.2. The Elements of Encryption
12.2.6.2. Encryption
(see also cryptography)
algorithms : 2.5. The Problem with Security Through Obscurity
crypt
6.6.1. UNIX crypt: The Original UNIX Encryption Command
6.6.1.3. Example
Digital Signature Algorithm
6.4.2. Summary of Public Key Systems
6.5.3. Digital Signatures
ElGamal : 6.4.2. Summary of Public Key Systems
IDEA : 6.4.1. Summary of Private Key Systems
RC2, RC4, and RC5
6.4.1. Summary of Private Key Systems
6.4.8. Proprietary Encryption Systems
ROT13 : 6.4.3. ROT13: Great for Encoding Offensive Jokes
RSA
6.4.2. Summary of Public Key Systems
6.4.6. RSA and Public Key Cryptography
6.4.6.3. Strength of RSA
application-level : 16.3.1. Link-level Security
of backups
7.1.6.3. Data security for backups
7.4.4. Encrypting Your Backups
12.3.2.4. Backup encryption
checklist for : A.1.1.5. Chapter 6: Cryptography
Data Encryption Standard (DES)
6.4.1. Summary of Private Key Systems
6.4.4. DES
6.4.5.2. Triple DES
6.6.2. des: The Data Encryption Standard
DCE and : 3.2.2. The /etc/passwd File and Network Databases
Diffie-Hellman : (see Diffie-Hellman key exchange system)
end-to-end : 16.3.1. Link-level Security
Enigma system
6.3. The Enigma Encryption System
6.6.1.1. The crypt program
(see also crypt command/algorithm)
escrowing keys
6.1.3. Modern Controversy
7.1.6.3. Data security for backups
exporting software : 26.4.1. Munitions Export
of hypertext links : 18.4.1. Eavesdropping Over the Wire
laws about
6.7. Encryption and U.S. Law
6.7.2. Cryptography and Export Controls
link-level : 16.3.1. Link-level Security
of modems : 14.6. Additional Security for Modems
Netscape Navigator system : 18.4.1. Eavesdropping Over the Wire
with network services : 17.4. Security Implications of Network Services
one-time pad mechanism : 6.4.7. An Unbreakable Encryption Algorithm
of passwords
8.6. The UNIX Encrypted Password System
8.6.4. Crypt16() and Other Algorithms
23.5. Tips on Using Passwords
PGP : (see PGP)
programs for UNIX
6.6. Encryption Programs Available for UNIX
6.6.3.6. PGP detached signatures
proprietary algorithms : 6.4.8. Proprietary Encryption Systems
RC4 and RC5 algorithms : 6.4.1. Summary of Private Key Systems
references on : D.1.5. Cryptography Books
Skipjack algorithm : 6.4.1. Summary of Private Key Systems
superencryption : 6.4.5. Improving the Security of DES
and superusers : 6.2.4. Why Use Encryption with UNIX?
of Web information : 18.4.1. Eavesdropping Over the Wire
end-to-end encryption : 16.3.1. Link-level Security
Energy Sciences Network (ESnet) : F.3.4.43. U.S. Department of Energy sites, Energy Sciences Network (ESnet), and DOE contractors
Enigma encryption system
6.3. The Enigma Encryption System
6.6.1.1. The crypt program
Enterprise Networks : 16.1. Networking
environment variables
11.5.2.7. Other initializations
23.2. Tips on Avoiding Security-related Bugs
environment, physical
12.2.1. The Environment
12.2.1.13. Environmental monitoring
erasing disks : 12.3.2.3. Sanitize your media before disposal
erotica, laws governing : 26.4.5. Pornography and Indecent Material
errno variable : 23.2. Tips on Avoiding Security-related Bugs
errors : 7.1.1.1. A taxonomy of computer failures
in ACLs : 5.2.5.1. AIX Access Control Lists
configuration : 9.1. Prevention
human : 7.1.4. Guarding Against Media Failure
errors
Preface
(see also auditing, system activity)
escape sequences, modems and : 14.5.3.1. Originate testing
escrowing encryption keys
6.1.3. Modern Controversy
7.1.6.3. Data security for backups
ESnet (Energy Sciences Network) : F.3.4.43. U.S. Department of Energy sites, Energy Sciences Network (ESnet), and DOE contractors
espionage : 11.3. Authors
/etc directory
11.1.2. Back Doors and Trap Doors
11.5.3.5. System initialization files
backups of : 7.1.3. Types of Backups
/etc/aliases file : 11.5.3.3. /usr/lib/aliases, /etc/aliases, /etc/sendmail/aliases, aliases.dir, or aliases.pag
/etc/default/login file : 8.5.1. Secure Terminals
/etc/exports file
11.6.1.2. Writable system files and directories
19.3.2.4. Using Secure NFS
making changes to : 20.2.1.2. /usr/etc/exportfs
/etc/fbtab file : 17.3.21.1. /etc/fbtab and /etc/logindevperm
/etc/fingerd program : (see finger command)
/etc/fsck program : 24.4.1.7. Hidden files and directories
/etc/fstab file
11.1.2. Back Doors and Trap Doors
19.3.2.5. Mounting a secure filesystem
/etc/ftpd : (see ftpd server)
/etc/ftpusers file : 17.3.2.5. Restricting FTP with the standard UNIX FTP server
/etc/group file
1.2. What Is an Operating System?
4.1.3.1. The /etc/group file
4.2.3. Impact of the /etc/passwd and /etc/group Files on Security
8.1.6. Group Accounts
/etc/halt command : 24.2.6. Anatomy of a Break-in
/etc/hosts file : 16.2.3.1. The /etc/hosts file
/etc/hosts.equiv : (see hosts.equiv file)
/etc/hosts.lpd file : 17.3.18.6. /etc/hosts.lpd file
/etc/inetd : (see inetd daemon)
/etc/inetd.conf file : 17.3. Primary UNIX Network Services
/etc/init program : C.5.1. Process #1: /etc/init
/etc/inittab : (see inittab program)
/etc/keystore file : 19.3.1.1. Proving your identity
/etc/logindevperm file : 17.3.21.1. /etc/fbtab and /etc/logindevperm
/etc/motd file : 26.2.6. Other Tips
/etc/named.boot file
17.3.6.1. DNS zone transfers
17.3.6.2. DNS nameserver attacks
/etc/passwd file
1.2. What Is an Operating System?
3.2.1. The /etc/passwd File
3.2.2. The /etc/passwd File and Network Databases
4.2.3. Impact of the /etc/passwd and /etc/group Files on Security
8.1.1. Accounts Without Passwords
8.6. The UNIX Encrypted Password System
C.5.1. Process #1: /etc/init
+ in : (see NIS)
accounts without passwords : 8.1.1. Accounts Without Passwords
backing up : 7.1.2. What Should You Back Up?
new accounts : 24.4.1. New Accounts
NFS : 20.2.1.1. /etc/exports
uucp user and : 15.1.4. How the UUCP Commands Work
/etc/profile file
11.5.2.1. .login, .profile, /etc/profile
24.4.1.6. Changes to startup files
/etc/publickey file : 19.3.2.1. Creating passwords for users
/etc/rc directory
11.5.3.5. System initialization files
17.1.2. Starting the Servers
C.5.1. Process #1: /etc/init
commenting out services : 17.3. Primary UNIX Network Services
/etc/remote file
10.3.1. aculog File
14.5.1. Hooking Up a Modem to Your Computer
/etc/renice : (see renice command)
/etc/secure/passwd file : 8.1.1. Accounts Without Passwords
/etc/security/passwd.adjunct file : 8.8.5. Shadow Password Files
/etc/sendmail/aliases file : 11.5.3.3. /usr/lib/aliases, /etc/aliases, /etc/sendmail/aliases, aliases.dir, or aliases.pag
/etc/services file : 17.1.1. The /etc/services File
/etc/services file : 17.1.1. The /etc/services File
/etc/shadow file
8.1.1. Accounts Without Passwords
8.8.5. Shadow Password Files
/etc/shells file : 8.4.2. Changing the Account's Login Shell
/etc/syslogd : (see syslog facility)
/etc/tty file, backing up : 7.1.2. What Should You Back Up?
/etc/ttys file
8.5.1. Secure Terminals
14.5.1. Hooking Up a Modem to Your Computer
/etc/ttytab file : C.5.1. Process #1: /etc/init
/etc/utmp file
10.1.2. utmp and wtmp Files
10.1.2.1. su command and /etc/utmp and /var/adm/wtmp files
24.2.1. Catching One in the Act
24.2.4. Tracing a Connection
/etc/uucp directory : 15.4.2.1. Some bad examples
/etc/yp/makedbm program : 19.4.4.1. Setting up netgroups
in restricted filesystems : 8.1.5. Restricted Filesystem
Ethernet : 16.1. Networking
addresses for random seeds : 23.8. Picking a Random Seed
cables : (see cables, network)
eavesdropping by : 12.3.1.2. Eavesdropping by Ethernet and 10Base-T
Ethers table (NIS+) : 19.5.3. NIS+ Tables
Euler Totient Function : 6.4.6.1. How RSA works
eval function
18.2.3.2. Testing is not enough!
18.2.3.3. Sending mail
evidence, equipment seized as : 26.2.4. Hazards of Criminal Prosecution
ex editor
5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
11.5.2.4. .exrc
11.5.2.7. Other initializations
exceptions : C.2. Creating Processes
exclamation mark (!) and mail command : 15.1.3. mail Command
exclusive OR (XOR) : 6.4.7. An Unbreakable Encryption Algorithm
exec (in Swatch program) : 10.6.2. The Swatch Configuration File
exec system call
5.1.7. File Permissions in Detail
18.2.3.3. Sending mail
23.2. Tips on Avoiding Security-related Bugs
25.2.1.1. Too many processes
ExecCGI option : 18.3.2. Commands Within the <Directory> Block
execl system call : 23.4. Tips on Writing SUID/SGID Programs
execlp system call : 23.4. Tips on Writing SUID/SGID Programs
execute permission
5.1.7. File Permissions in Detail
5.4. Using Directory Permissions
execv system call : 23.4. Tips on Writing SUID/SGID Programs
execve system call : 23.4. Tips on Writing SUID/SGID Programs
execvp system call : 23.4. Tips on Writing SUID/SGID Programs
expiring
accounts : 8.4.3. Finding Dormant Accounts
FTP depositories : 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP server
passwords : 8.8.6. Password Aging and Expiration
explosions : 12.2.1.5. Explosion
export laws : 26.4.1. Munitions Export
cryptography
6.4.4.1. Use and export of DES
6.7.2. Cryptography and Export Controls
exportfs command : 20.2.1.2. /usr/etc/exportfs
exports file
11.6.1.2. Writable system files and directories
19.3.2.4. Using Secure NFS
20.2.1.1. /etc/exports
20.2.1.2. /usr/etc/exportfs
.exrc file : 11.5.2.4. .exrc
ext2 filesystem (Linux) : 25.2.2.6. Reserved space
external data representation (XDR) : 19.2. Sun's Remote Procedure Call (RPC)
extinguishers, fire : (see fires)
extortion : 11.3. Authors


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.