Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: S
- SAM (Security Accounts Manager): NT/2000 User Identity Storage and Access
- SASL (Simple Authentication and Security Layer): The Initial LDAP Connection
- schema-defined properties: ADSI Basics
- scopes of searches: Performing LDAP Searches
- scripts: SQL
-
- (see also Perl)
- for sending email: Overzealous Message Sending
-
- message body of: Insufficient Information in the Message Body
- for user administration processes: The Process Scripts
- search base: Performing LDAP Searches
- search filters: Performing LDAP Searches
- secondary servers: Domain Name Service (DNS)
- Secure Socket Layer (SSL): The Initial LDAP Connection
- security
-
- of bots: Using the Proc::ProcessTable Module
- of SNMP: The Twenty-Minute SNMP Tutorial
- breaches in, documenting: Local Signs of Peril
- denial-of-service attacks: Perl Saves the Day
- detecting changes
-
- to files: Local Filesystem Changes
- to networks: Network Service Changes
- of Perl: It's Not Easy Being Omnipotent
- suspicious activities, noticing: Local Signs of Peril
- SYN attacks, detecting from Perl: Perl Saves the Day
- Security Accounts Manager (SAM): NT/2000 User Identity Storage and Access
- security identifier (SID): NT/2000 User ID Numbers
- SELECT command (SQL): Querying Information
- Sendmail for NT program: Getting sendmail (or Similar Mail Transport Agent)
- sendmail program: Sending Mail
-
- Speaking to the Mail Protocols Directly
- blacklists, local: Checking against a local blacklist
- services
-
- directory (see directory services)
- TCP/IP (see TCP/IP, name services)
- shadow password files (Unix): Shadow Passwords
- shell field (Unix): The Classic Unix Password File
- SID (security identifier): NT/2000 User ID Numbers
- Simple Authentication and Security Layer (SASL): The Initial LDAP Connection
- Simple Mail Transport Protocol (see SMTP)
- Simple Network Management Protocol (see SNMP)
- slave servers: NIS, NIS+, and WINS
- SMI RFCs: SNMP in Practice
- SMTP (Simple Mail Transport Protocol): Speaking to the Mail Protocols Directly
- SNMP Extension Module for the UCD SNMPv3 Library: Using SNMP from Perl
- SNMP (Simple Network Management Protocol): The Twenty-Minute SNMP Tutorial
-
- access policy: The Twenty-Minute SNMP Tutorial
- communities: The Twenty-Minute SNMP Tutorial
- modules, comparing: Using SNMP from Perl
- monitoring networks with: Using SNMP from Perl
- security of: The Twenty-Minute SNMP Tutorial
- theory: The Twenty-Minute SNMP Tutorial
- tutorial: SNMP in Practice
- using from Perl: Using SNMP from Perl
- variables: The Twenty-Minute SNMP Tutorial
- SNMP\:\:MIB module: Using SNMP from Perl
- SNMP_Session module: Using SNMP from Perl
- SNMP_utility module: Using SNMP from Perl
- SOA (Start of Authority): Creating the administrative header
- software metering: Using the Proc::ProcessTable Module
- source control systems: Incorporating a Source Code Control System
-
- RCS (see RCS)
- spam, finding source of: Tracking Down Spam
-
- blacklists, checking against
-
- Internet-wide: Checking against Internet-wide blacklists
- local: Checking against a local blacklist
- split() function (Unix): Generating Host Files
- SQL databases
-
- creating/deleting: Creating /Deleting Databases and Tables
- data in, manipulating: Simple Manipulation of Data Returned by Queries
- Perl-cliented: Using Perl-cliented SQL databases
- querying information: Querying Information
- stored procedures: Stored Procedures
- SQL (Structured Query Language): SQL Database Administration
-
- commands, sending from Perl: Using the ODBC Framework
- databases
-
- documenting from Perl: Server Documentation
- interacting with from Perl: Interacting with an SQL Server from Perl
- managing logins from Perl: Database Logins
- monitoring from Perl: Monitoring Server Health
- using DBI: Using the DBI Framework
- using ODBC: Using the ODBC Framework
- tutorial: The Fifteen-Minute SQL Tutorial
- SQL tables
-
- changing: Changing Table Information
- creating/deleting: Creating /Deleting Databases and Tables
- inserting data into: Inserting Data into a Table
- query results, adding: Adding the Query Results to Another Table
- relating: Relating Tables to Each Other
- rows in, retrieving: Retrieving All of the Rows in a Table
- views of: Views
- SSL (Secure Socket Layer): The Initial LDAP Connection
- Start of Authority (SOA): Creating the administrative header
- stat() function (Perl): Local Filesystem Changes
- statement handle, DBI: Using the DBI Framework
- Structure for Management Information (SMI): SNMP in Practice
- Structured Query Language (see SQL)
- SunOS
-
- host files: Host Files
- wtmp file: Using unpack( )
- suss program: Support Mail Augmentation
- Sybase OpenClient libraries: Interacting with an SQL Server from Perl
- Sybase server, documenting via DBI module: Sybase Server via DBI
- SYN-ACK attack: Perl Saves the Day
- SYN Flood: Perl Saves the Day
- Sys\:\:Hostname module: Using Perl-only databases
- SyslogScan package: Black Boxes
- system administration
-
- with ADSI: Working with Users via ADSI
- email for: Electronic Mail
-
- as support medium: Support Mail Augmentation
- limiting message sending: Controlling the frequency of mail
- sending: Sending Mail
- log files: Log Files
- monitoring
-
- networks: Using SNMP from Perl
- security: Security and Network Monitoring
- Perl as language for: How Perl Can Help
- SQL databases and: SQL Database Administration
- system administrators
-
- contacting: The WHOIS Directory Service
- mechanics vs. architects: The Backend Database
- \\\\$systemroot$\\\\system32\\\\drivers\\\\etc\\\\hosts file: Host Files
Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z