start page | rating of books | rating of authors | reviews | copyrights
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: L
- L-devices file : 14.5.1. Hooking Up a Modem to Your Computer
- L.cmds file : 15.4.3. L.cmds: Providing Remote Command Execution
- L.sys file : 15.3.3. Security of L.sys and Systems Files
- Lai, Xuejia : 6.4.1. Summary of Private Key Systems
- laid-off employees : 13.2.6. Departure
- LaMacchia, Brian : 19.3.4. Limitations of Secure RPC
- LANs (local area networks)
- 16.1. Networking
- 16.2. IPv4: The Internet Protocol Version 4
- laptop computers : 12.2.6.3. Portables
- last program
- 8.4.3. Finding Dormant Accounts
- 10.1.2. utmp and wtmp Files
- 10.1.3. last Program
- 10.1.3.1. Pruning the wtmp file
- 15.3.1. Assigning Additional UUCP Logins
- -f option : 10.1.3.1. Pruning the wtmp file
- lastcomm program
- 10.2. The acct/pacct Process Accounting File
- 10.2.2. Accounting with BSD
- lastlog file : 10.1.1. lastlog File
- laws
- 26. Computer Security and U.S. Law
- 26.4.7. Harassment, Threatening Communication, and Defamation
- backups and : 7.1.7. Legal Issues
- checklist for : A.1.1.25. Chapter 26: Computer Security and U.S. Law
- copyright
- 9.2.1. Comparison Copies
- 26.4.2. Copyright Infringement
- 26.4.2.1. Software piracy and the SPA
- criminal prosecution
- 26.2. Criminal Prosecution
- 26.2.7. A Final Note on Criminal Actions
- Electronic Communications Privacy Act (ECPA) : 26.2.3. Federal Computer Crime Laws
- encryption
- 6.7. Encryption and U.S. Law
- 6.7.2. Cryptography and Export Controls
- 12.2.6.3. Portables
- enforcement agencies : 14.4.4.1. Kinds of eavesdropping
- export
- 6.4.4.1. Use and export of DES
- 6.7.2. Cryptography and Export Controls
- 26.4.1. Munitions Export
- federal enforcement
- 26.2.2. Federal Jurisdiction
- 26.2.3. Federal Computer Crime Laws
- indecent material : 26.4.5. Pornography and Indecent Material
- liability
- 26.4. Other Liability
- 26.4.7. Harassment, Threatening Communication, and Defamation
- monitoring keystrokes : 24.2.3. Monitoring the Intruder
- non-citizen access : 26.4.1. Munitions Export
- patents : 26.4.4. Patent Concerns
- for portable computers : 12.2.6.3. Portables
- resources on : D.1.1. Other Computer References
- search warrants
- 26.2.4. Hazards of Criminal Prosecution
- 26.2.5. If You or One of Your Employees Is a Target of an Investigation...
- smoking : 12.2.1.2. Smoke
- state and local enforcement : 26.2.1. The Local Option
- trademarks : 26.4.3. Trademark Violations
- vendor liability : 18.5.2. Trusting Your Software Vendor
- lawsuits (civil) : 26.3. Civil Actions
- leased telephone lines : 14.5.4. Physical Protection of Modems
- least privilege
- 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
- 13.2.5. Least Privilege and Separation of Duties
- Lee, Ying-Da : 22.4. SOCKS
- Lesk, Mike
- 1.3. History of UNIX
- 15.2. Versions of UUCP
- liability, legal
- 26.4. Other Liability
- 26.4.7. Harassment, Threatening Communication, and Defamation
- /lib directory : 11.5.3.6. Other files
- license agreements : 18.5.2. Trusting Your Software Vendor
- comparison copies and : 9.2.1. Comparison Copies
- lie-detector tests : 13.1. Background Checks
- lightning
- 12.2. Protecting Computer Hardware
- 12.2.1.9. Lightning
- limit command : 25.2.5. Soft Process Limits: Preventing Accidental Denial of Service
- Limit command (<Directory>) : 18.3.2. Commands Within the <Directory> Block
- limited user access : 8.1.5.1. Limited users
- link-level security : 16.3.1. Link-level Security
- links
- encryption of : 18.4.1. Eavesdropping Over the Wire
- link-level security : 16.3.1. Link-level Security
- static : 23.4. Tips on Writing SUID/SGID Programs
- symbolic, following (Web)
- 18.2.2.2. Additional configuration issues
- 18.3.2. Commands Within the <Directory> Block
- lint program : 23.2. Tips on Avoiding Security-related Bugs
- LINUX operating system
- 1.3. History of UNIX
- 3.3. Entering Your Password
- 23.1.2.1. What they found
- ext2 filesystem : 25.2.2.6. Reserved space
- random number generators : 23.7.4. Other random number generators
- Live Script : 18.5.2. Trusting Your Software Vendor
- load shedding : 23.3. Tips on Writing Network Programs
- local
- area networks (LANs)
- 16.1. Networking
- 16.2. IPv4: The Internet Protocol Version 4
- authentication (NIS+) : 19.5.4. Using NIS+
- law enforcement : 26.2.1. The Local Option
- storage
- 12.3.4. Protecting Local Storage
- 12.3.4.5. Function keys
- users, and USERFILE : 15.4.1.2. USERFILE entries for local users
- lock program : 12.3.5.2. X screen savers
- locked accounts : 3.3. Entering Your Password
- locking files : 23.2. Tips on Avoiding Security-related Bugs
- log files
- 11.5.3.5. System initialization files
- (see also logging)
- access_log
- 10.3.5. access_log Log File
- 18.4.2. Eavesdropping Through Log Files
- aculog : 10.3.1. aculog File
- agent_log file : 18.4.2. Eavesdropping Through Log Files
- backing up : 10.2.2. Accounting with BSD
- lastlog : 10.1.1. lastlog File
- managing : 10.8. Managing Log Files
- manually generated
- 10.7. Handwritten Logs
- 10.7.2.2. Informational material
- per-machine : 10.7.2. Per-Machine Logs
- per-site : 10.7.1. Per-Site Logs
- refer_log file : 18.4.2. Eavesdropping Through Log Files
- sulog : (see sulog file)
- system clock and : 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
- tracking intruders with : 24.3. The Log Files: Discovering an Intruder's Tracks
- /usr/adm/messages : 10.2.3. messages Log File
- utmp and wtmp
- 10.1.2. utmp and wtmp Files
- 10.1.3.1. Pruning the wtmp file
- uucp : 10.3.4. uucp Log Files
- /var/adm/acct : 10.2. The acct/pacct Process Accounting File
- /var/adm/loginlog : 10.1.4. loginlog File
- of Web servers : 18.4.2. Eavesdropping Through Log Files
- xferlog : 10.3.3. xferlog Log File
- logdaemon package : 17.3.18.5. Searching for .rhosts files
- logger command : 10.5.3. syslog Messages
- logging
- 7.1.1.1. A taxonomy of computer failures
- 10. Auditing and Logging
- 10.8. Managing Log Files
- 11.5.3.5. System initialization files
- 21.5. Special Considerations
- 23.2. Tips on Avoiding Security-related Bugs
- (see also log files)
- across networks : 10.5.2.2. Logging across the network
- archiving information : 7.4.2. Simple Archives
- breakins : 24.1.2. Rule #2: DOCUMENT
- C2 audit : 10.1. The Basic Log Files
- checklist for : A.1.1.9. Chapter 10: Auditing and Logging
- critical messages
- 10.5.3. syslog Messages
- 10.5.3.1. Beware false log entries
- downloaded files
- 10.3.3. xferlog Log File
- 10.3.5. access_log Log File
- failed su attempts : 4.3.7. The Bad su Log
- file format : 8.2. Monitoring File Format
- files transferred by FTP : 10.3.3. xferlog Log File
- to hardcopy device : 10.5.2.1. Logging to a printer
- individual users
- 10.4. Per-User Trails in the Filesystem
- 10.4.3. Network Setup
- manually
- 10.7. Handwritten Logs
- 10.7.2.2. Informational material
- mistyped passwords : 10.5.3. syslog Messages
- network services : 10.3.6. Logging Network Services
- outgoing mail : 10.4.2. Mail
- potentially criminal activity : 26.2.6. Other Tips
- Swatch program
- 10.6. Swatch: A Log File Tool
- 10.6.2. The Swatch Configuration File
- E.4.9. Swatch
- syslog facility
- 10.5. The UNIX System Log (syslog) Facility
- 10.5.3.1. Beware false log entries
- UUCP : 10.3.4. uucp Log Files
- what not to log : 10.5.3. syslog Messages
- logging in
- C.5. Starting Up UNIX and Logging In
- C.5.3. Running the User's Shell
- FTP access without : 17.3.2.7. Allowing only FTP access
- Kerberos system : 19.6.1.1. Initial login
- last program
- 10.1.3. last Program
- 10.1.3.1. Pruning the wtmp file
- lastlog file : 10.1.1. lastlog File
- passwords : 3.3. Entering Your Password
- preventing
- 8.4. Managing Dormant Accounts
- 8.4.3. Finding Dormant Accounts
- restricting : 8.3. Restricting Logins
- with Secure RPC : 19.3.3. Using Secure RPC
- startup file attacks
- 11.5.2. Start-up File Attacks
- 11.5.2.7. Other initializations
- logging out with Secure RPC[logging out:Secure RPC] : 19.3.3. Using Secure RPC
- logic bombs
- 11.1. Programmed Threats: Definitions
- 11.1.3. Logic Bombs
- 27.2.2. Viruses on the Distribution Disk
- .login file
- 8.5.1. Secure Terminals
- 11.5.2.1. .login, .profile, /etc/profile
- 24.4.1.6. Changes to startup files
- login program
- 8.6. The UNIX Encrypted Password System
- 11.1.2. Back Doors and Trap Doors
- 19.5.4. Using NIS+
- 26.2.6. Other Tips
- 27.1.2. Trusting Trust
- logindevperm file : 17.3.21.1. /etc/fbtab and /etc/logindevperm
- loginlog file : 10.1.4. loginlog File
- logins
- authentication : 17.3.5. TACACS (UDP Port 49)
- FTP : 17.3.2. (FTP) File Transfer Protocol (TCP Ports 20 and 21)
- UUCP, additional : 15.3.1. Assigning Additional UUCP Logins
- logins command : 8.1.1. Accounts Without Passwords
- -d option : 8.2. Monitoring File Format
- -p option : 8.2. Monitoring File Format
- LOGNAME= command
- 15.5.1.3. A Sample Permissions file
- 15.5.2. Permissions Commands
- .logout file : 19.3.3. Using Secure RPC
- long distance service
- 14.5.4. Physical Protection of Modems
- 17.3.3. TELNET (TCP Port 23)
- losses, cost of preventing
- 2.3. Cost-Benefit Analysis
- 2.3.4. Convincing Management
- lp (user) : 4.1. Users and Groups
- lpd system : 17.3.18.6. /etc/hosts.lpd file
- lrand48 function : 23.7.3. drand48 ( ), lrand48 ( ), and mrand48 ( )
- ls command
- 5.1.4. Using the ls Command
- 5.1.5. File Times
- 9.2.2. Checklists and Metadata
- -c option : 5.1.5. File Times
- -d option : 9.2.2.1. Simple listing
- -e option : 5.2.5.1. AIX Access Control Lists
- -F option : 5.1.4. Using the ls Command
- -g option : 5.1.4. Using the ls Command
- -H option : 5.9.2. Context-Dependent Files
- -i option : 9.2.2.1. Simple listing
- -l option
- 5.1.4. Using the ls Command
- 5.2.5.1. AIX Access Control Lists
- 5.5.1. SUID, SGID, and Sticky Bits
- -q option : 5.4. Using Directory Permissions
- -u option : 5.1.5. File Times
- -c option : 24.4.1.6. Changes to startup files
- -H option : 24.4.1.7. Hidden files and directories
- -l option : 24.4.1.6. Changes to startup files
- lsacl command : 5.2.5.2. HP-UX access control lists
- lsof program : 25.2.2.7. Hidden space
- lstat function : 23.2. Tips on Avoiding Security-related Bugs
- Lucifer algorithm
- 6.4.4. DES
- 6.4.4.3. DES strength
- LUCIFER cipher : 6.4.4. DES
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.