start page | rating of books | rating of authors | reviews | copyrights
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: N
- name service
- 16.2.6. Name Service
- 16.2.6.2. Other naming services
- security and : 16.3.2. Security and Nameservice
- name-value pairs in BNU UUCP : 15.5.1.2. Name-value pairs
- named daemon : 16.2.6.1. DNS under UNIX
- named nameserver : 17.3.6.2. DNS nameserver attacks
- named-xfer program : 16.2.6.1. DNS under UNIX
- named.boot file
- 17.3.6.1. DNS zone transfers
- 17.3.6.2. DNS nameserver attacks
- names
- choosing UUCP : 15.5.2. Permissions Commands
- computer
- 16.2.3. Hostnames
- 16.2.3.1. The /etc/hosts file
- user : (see usernames)
- nameserver attacks, DNS : 17.3.6.2. DNS nameserver attacks
- nameserver cache loading : 16.3.2. Security and Nameservice
- NASA
- Ames Research Center : F.3.4.22. NASA: Ames Research Center
- NASA: Goddard Space Flight Center : F.3.4.23. NASA: Goddard Space Flight Center
- National Aeronautical Space Agency : (see NASA)
- National Computer Security Center (NCSC) : F.2.1. National Institute of Standards and Technology (NIST)
- National Institute of Standards and Technology : (see NIST)
- National Science Foundation Network : (see networks, NFSNET)
- national security : 26.2.2. Federal Jurisdiction
- natural disasters
- 1.1. What Is Computer Security?
- 7.1.1.1. A taxonomy of computer failures
- 7.1.6.1. Physical security for backups
- 12.2.1.1. Fire
- (see also physical security)
- accidents : 12.2.2. Preventing Accidents
- earthquakes : 12.2.1.4. Earthquake
- fires
- 12.2.1.1. Fire
- 12.2.1.2. Smoke
- lightning
- 12.2. Protecting Computer Hardware
- 12.2.1.9. Lightning
- natural gas : 12.2.1.5. Explosion
- Naval Computer Incident Response Team (NAVCIRT) : F.3.4.44. U.S. Department of the Navy
- ncheck command : 5.5.4.1. The ncheck command
- -s option
- 5.5.4.1. The ncheck command
- 5.6. Device Files
- NCSA HTTPD server : 10.3.5. access_log Log File
- NCSA server : (see Web servers)
- NCSC (National Computer Security Center) : F.2.1. National Institute of Standards and Technology (NIST)
- needexpnhelo (sendmail) : 17.3.4.3. Improving the security of Berkeley sendmail V8
- needmailhelo (sendmail) : 17.3.4.3. Improving the security of Berkeley sendmail V8
- needvrfyhelo (sendmail) : 17.3.4.3. Improving the security of Berkeley sendmail V8
- nested directories : 25.2.2.8. Tree-structure attacks
- Netgroup table (NIS+) : 19.5.3. NIS+ Tables
- netgroups, NIS
- 19.4.4. NIS Netgroups
- 19.4.4.6. NIS is confused about "+"
- limiting imported accounts : 19.4.4.2. Using netgroups to limit the importing of accounts
- NetInfo
- 3.2.2. The /etc/passwd File and Network Databases
- 16.2.6.2. Other naming services
- Netmasks table (NIS+) : 19.5.3. NIS+ Tables
- netnews~firewalls : 21.4.3. Netnews
- .netrc file : 10.4.3. Network Setup
- Netscape Navigator
- encryption system of : 18.4.1. Eavesdropping Over the Wire
- random number generator : 23.8. Picking a Random Seed
- netstat command
- 17.5. Monitoring Your Network with netstat
- 24.2.1. Catching One in the Act
- 24.2.4. Tracing a Connection
- -a option : 17.5. Monitoring Your Network with netstat
- -n option : 17.5. Monitoring Your Network with netstat
- network connections : 17.3.3. TELNET (TCP Port 23)
- network databases : 3.2.2. The /etc/passwd File and Network Databases
- Network Filesystem : (see NFS)
- network filesystems : 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
- Network Information Center (NIC) : 24.2.4.2. How to contact the system administrator of a computer you don't know
- Network Information System : (see NIS)
- Network News Transport Protocol : (see NNTP)
- network providers : 27.2.6. Network Providers that Network Too Well
- network services
- 17. TCP/IP Services
- 17.7. Summary
- 23.3. Tips on Writing Network Programs
- DNS : (see DNS)
- encryption with : 17.4. Security Implications of Network Services
- finger : (see finger command)
- FTP : (see FTP)
- NNTP : (see NNTP)
- NTP : (see NTP)
- passwords for : 17.4. Security Implications of Network Services
- POP : (see POP)
- root account with : 17.4. Security Implications of Network Services
- securing : 19.1. Securing Network Services
- SMTP : (see SMTP)
- SNMP : (see SNMP)
- spoofing : 17.5. Monitoring Your Network with netstat
- systat : 17.3.1. systat (TCP Port 11)
- table of : G. Table of IP Services
- Telnet : (see Telnet utility)
- TFTP : (see TFTP)
- UUCP over TCP : 17.3.20. UUCP over TCP (TCP Port 540)
- Network Time Protocol : (see NTP)
- network weaving : 16.1.1.1. Who is on the Internet?
- networks
- 10Base-T : 12.3.1.2. Eavesdropping by Ethernet and 10Base-T
- allowing threats from : 11.4. Entry
- ARPANET : 16.1.1. The Internet
- backing up
- 7.2.2. Small Network of Workstations and a Server
- 7.2.4. Large Service-Based Networks with Large Budgets
- backups across : 7.4.5. Backups Across the Net
- cables for : 12.2.4.2. Network cables
- checklist for
- A.1.1.15. Chapter 16: TCP/IP Networks
- A.1.1.16. Chapter 17: TCP/IP Services
- configuration files : 10.4.3. Network Setup
- connectors for : 12.2.4.3. Network connectors
- cutting cables : 25.1. Destructive Attacks
- denial of service on
- 25.3. Network Denial of Service Attacks
- 25.3.4. Clogging
- disabling physically : 25.3.3. Signal Grounding
- Internet : 16.1.1. The Internet
- LANs : (see LANs)
- logging across : 10.5.2.2. Logging across the network
- logging services of : 10.3.6. Logging Network Services
- MANs : 16.1. Networking
- mobile computing : 8.7. One-Time Passwords
- monitoring with netstat : 17.5. Monitoring Your Network with netstat
- NFSNET : 16.1.1. The Internet
- packet-switching : 16.2. IPv4: The Internet Protocol Version 4
- scanning : 17.6. Network Scanning
- security references : D.1.8. Network Technology and Security
- services for : 11.1.2. Back Doors and Trap Doors
- sniffers : 16.3. IP Security
- spoofed connection : 8.5.3.1. Trusted path
- TCP/IP : (see TCP/IP, networks)
- UNIX and : 16.1.2. Networking and UNIX
- UUCP over : 15.8. UUCP Over Networks
- WANs : 16.1. Networking
- Networks table (NIS+) : 19.5.3. NIS+ Tables
- networks, computer : 1.4.3. Add-On Functionality Breeds Problems
- Neumann, Peter : 1.3. History of UNIX
- newgrp command : 4.1.3.2. Groups and older AT&T UNIX
- newkey -u command
- 19.3.2.1. Creating passwords for users
- 19.5.4.2. When a user's passwords don't match
- news : (see Usenet)
- news (user) : 4.1. Users and Groups
- newsgroups, defamation/harassment via : 26.4.7. Harassment, Threatening Communication, and Defamation
- NEXTSTEP Window Server (NSWS) : 17.3.16. NEXTSTEP Window Server (NSWS) (TCP Port 178)
- NFS (Network Filesystem) : 19. RPC, NIS, NIS+, and Kerberos
- authentication and
- 19.2.2. RPC Authentication
- 19.2.2.4. AUTH_KERB
- checklist for : A.1.1.19. Chapter 20: NFS
- file permissions : 5.1.7. File Permissions in Detail
- find command on : 5.5.4. Finding All of the SUID and SGID Files
- -local option : 11.6.1.2. Writable system files and directories
- MOUNT : 20.1.1. NFS History
- Secure NFS : (see Secure NFS)
- server, and UUCP : 15.3. UUCP and Security
- technical description of : 20.1.1. NFS History
- and trusted hosts : 17.3.18.2. The problem with trusted hosts
- -xdev option : 11.6.1.2. Writable system files and directories
- NIC (Network Information Center) : 24.2.4.2. How to contact the system administrator of a computer you don't know
- nice command : 25.2.1.2. System overload attacks
- nice numbers : C.1.3.3. Process priority and niceness
- NIS (Network Information Service)
- + in
- 19.4. Sun's Network Information Service (NIS)
- 19.4.4.6. NIS is confused about "+"
- clients : 19.4. Sun's Network Information Service (NIS)
- domains : 19.4.3. NIS Domains
- maps : 19.4. Sun's Network Information Service (NIS)
- netgroups
- 19.4.4. NIS Netgroups
- 19.4.4.6. NIS is confused about "+"
- limiting imported accounts : 19.4.4.2. Using netgroups to limit the importing of accounts
- Secure RPC with
- 19.3.2. Setting Up Secure RPC with NIS
- 19.3.4. Limitations of Secure RPC
- spoofing : 19.4.4.5. Spoofing NIS
- UDP : 16.2.4.3. UDP
- Yellow Pages : 16.2.6.2. Other naming services
- NIS (Network Information System)
- 3.2.2. The /etc/passwd File and Network Databases
- 3.4. Changing Your Password
- 19. RPC, NIS, NIS+, and Kerberos
- 19.4. Sun's Network Information Service (NIS)
- 19.4.5. Unintended Disclosure of Site Information with NIS
- NIS+
- 3.2.2. The /etc/passwd File and Network Databases
- 3.4. Changing Your Password
- 16.2.6.2. Other naming services
- 19.5. Sun's NIS+
- 19.5.5. NIS+ Limitations
- integrity-checking software for : 19.5.5. NIS+ Limitations
- principals : 19.5.1. What NIS+ Does
- Secure RPC with
- 19.3.2. Setting Up Secure RPC with NIS
- 19.3.4. Limitations of Secure RPC
- nisaddcred command : 19.3.1.1. Proving your identity
- niscat command : 3.2.2. The /etc/passwd File and Network Databases
- nischown command : 19.5.4. Using NIS+
- nispasswd command
- 3.4. Changing Your Password
- 19.5.4. Using NIS+
- 19.5.4.2. When a user's passwords don't match
- NIST (National Institute of Standards and Technology)
- F.2.1. National Institute of Standards and Technology (NIST)
- F.3.4.26. NIST (National Institute of Standards and Technology)
- NNTP (Network News Transport Protocol) : 17.3.13. Network News Transport Protocol (NNTP) (TCP Port 119)
- nobody (user)
- 4.1. Users and Groups
- 19.3.2.1. Creating passwords for users
- noexpn (sendmail) : 17.3.4.3. Improving the security of Berkeley sendmail V8
- noise, electrical : 12.2.1.8. Electrical noise
- nonadaptive modems : (see modems)
- nonblocking systems : 19.2. Sun's Remote Procedure Call (RPC)
- nonce : 23.3. Tips on Writing Network Programs
- nonrepudiation : 6.5. Message Digests and Digital Signatures
- NORDUNET : F.3.4.27. NORDUNET: Denmark, Sweden, Norway, Finland, Iceland
- NOREAD= command : 15.5.2. Permissions Commands
- Northwestern University : F.3.4.28. Northwestern University
- nosuid : 11.1.2. Back Doors and Trap Doors
- Novell : 1.3. History of UNIX
- novrfy (sendmail) : 17.3.4.3. Improving the security of Berkeley sendmail V8
- Nowitz, David : 15.2. Versions of UUCP
- NOWRITE= command : 15.5.2. Permissions Commands
- npasswd package : 8.8.2. Constraining Passwords
- NPROC variable : 25.2.1.1. Too many processes
- NSA (National Security Agency) : F.2.2. National Security Agency (NSA)
- NSWS (NextStep Window Server) : 17.3.16. NEXTSTEP Window Server (NSWS) (TCP Port 178)
- NTP (Network Time Protocol) : 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
- Secure RPC and : 19.3.1.3. Setting the window
- NU-CERT : F.3.4.28. Northwestern University
- null device : 5.6. Device Files
- nuucp account
- 15.1.4. How the UUCP Commands Work
- 15.3.1. Assigning Additional UUCP Logins
- 15.4.1.3. Format of USERFILE entry without system name
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.