start page  | rating of books | rating of authors | reviews | copyrights
  
  
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z  
Index: O
   - obscurity : (see security, through obscurity) - octal file permissions 
-    - 5.2.3. Calculating Octal File Permissions   - 5.2.4. Using Octal File Permissions 
 
- octets : 16.2.1. Internet Addresses - Odlyzko, Andrew : 19.3.4. Limitations of Secure RPC - OFB (output feedback) : 6.4.4.2. DES modes - on-the-job security 
-    - 13.2. On the Job   - 13.2.6. Departure 
 
- one : 9.2.1. Comparison Copies - one-command accounts : 8.1.3. Accounts That Run a Single Command - one-time pad encryption 
-    - 6.4.7. An Unbreakable Encryption Algorithm   - 8.7.3. Code Books 
 
- one-time passwords 
-    - 3.7. One-Time Passwords   - 8.7. One-Time Passwords   - 8.7.3. Code Books   - 17.4. Security Implications of Network Services   - 23.3. Tips on Writing Network Programs 
 
- one-way phone lines : 14.4.1. One-Way Phone Lines - open access, tradition of : 1.4.1. Expectations - open accounts 
-    - 8.1.4. Open Accounts   - 8.1.4.6. Potential problems with rsh   - 8.8.7. Algorithm and Library Changes 
 
- open command : 23.2. Tips on Avoiding Security-related Bugs 
-    - O_CREAT and O_EXCL flags : 23.2. Tips on Avoiding Security-related Bugs 
 
- Open Software Distribution (OSD) : Preface - Open Software Foundation (OSF) : 1.3. History of UNIX - open system call : 5.1.7. File Permissions in Detail - Open System Interconnection (OSI) : 16.4.4. OSI - opendir library call : 5.4. Using Directory Permissions - operating systems 
-    - 1.2. What Is an Operating System?   - 12.3.3. Other Media   - keeping secret : 2.5. The Problem with Security  Through Obscurity 
 
- operating systems 
-    - Which UNIX System?   - (see also under specific name) 
 
- optic cables : (see cables, network) - optical vampire taps : 12.3.1.5. Fiber optic cable - Options command : 18.3.2. Commands Within the <Directory> Block - Orange Book : 2.3.3. Adding Up the Numbers - originate mode : 14.3.1. Originate and Answer - originate testing : 14.5.3.1. Originate testing - OSF (Open Software Foundation) : 1.3. History of UNIX - OSF/1 operating system : 1.3. History of UNIX - OSI (Open System Interconnection) : 16.4.4. OSI - Outcome table (NIS+) : 19.5.3. NIS+ Tables - outgoing calls : 14.5. Modems and UNIX - outgoing mail, logging : 10.4.2. Mail - output feedback (OFB) : 6.4.4.2. DES modes - outsiders : 13.3. Outsiders - overload attacks 
-    - 25.2. Overload Attacks   - 25.2.5. Soft Process Limits: Preventing Accidental  Denial of Service 
 
- overtime : 13.2.3. Performance Reviews and Monitoring - overwriting media : 12.3.2.3. Sanitize your media before disposal - OW- (sendmail.cf) : 17.3.4.2. Using sendmail to receive email - owners of information : 2.4.4.1. Assign an owner - owners, changing : 5.7. chown: Changing a File's Owner - ownership notices : 26.2.6. Other Tips 
 
  Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z  
Copyright © 1999  O'Reilly & Associates, Inc. All Rights Reserved.