Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: K
- class : sendmail, 32.5. Alphabetized Reference
- commands
- configuration command
- -k database switch : sendmail, 33.3.4.4. -k specify column for key (V8.7 and above)
- flag : sendmail, 30.8. Alphabetized F= Flags
- line (qf file) : sendmail, 23.9. The qf File Internals
- $k macro
- option : (see ConnectionCacheSize (k) option)
- option : (see ConnectionCacheTimeout (K) option)
- KarlBridge package : Building Internet Firewalls, B.3.3. KarlBridge
- Karn, Phil : Practical UNIX & Internet Security, 6.6.2. des: The Data Encryption Standard
- keepalives
- Kerberos authentication system
-
- Building Internet Firewalls, 2.12. Network File Systems
- Building Internet Firewalls, 10.4.1. Kerberos
- Building Internet Firewalls, B.1.2. Kerberos
- Practical UNIX & Internet Security, 8.7.3. Code Books
- Practical UNIX & Internet Security, 19.6. Kerberos
- Practical UNIX & Internet Security, 19.6.5. Kerberos Limitations
- Practical UNIX & Internet Security, E.4.5. Kerberos
- installing : Practical UNIX & Internet Security, 19.6.3. Installing Kerberos
- RPC system and : Practical UNIX & Internet Security, 19.2.2.4. AUTH_KERB
- supporting versions of POP : Building Internet Firewalls, 8.1.2. Post Office Protocol
- Versions 4 and 5 : Practical UNIX & Internet Security, 19.6.1.4. Kerberos 4 vs. Kerberos 5
- versus Secure RPC : Practical UNIX & Internet Security, 19.6.2. Kerberos vs. Secure RPC
- kermit program
- kernel
-
- Practical UNIX & Internet Security, 1.2. What Is an Operating System?
- Practical UNIX & Internet Security, 5.5.3. SUID Shell Scripts
- TCP/IP Network Administration, 5.1. Kernel Configuration
- reconfiguring : Building Internet Firewalls, 5.8.4.1. Reconfigure and rebuild the kernel
- statement (in gated) : TCP/IP Network Administration, B.8.10.1. The routerdiscovery client statement
- key
-
- distribution, encryption : Building Internet Firewalls, 10.5.4. Key Distribution
- escrow : Practical UNIX & Internet Security, 6.1.3. Modern Controversy
- fingerprints : Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
- search
- switches : Practical UNIX & Internet Security, 12.3.6. Key Switches
- keyboard interrupts : TCP/IP Network Administration, 9.1.3.2. The vfstab and fstab files
- keyed databases : (see databases)
- keylogin program
- keylogout program : Practical UNIX & Internet Security, 19.3.3. Using Secure RPC
- keys, duplicate database : sendmail, 33.2.1.1. -d allow duplicate keys
- keyserv process
- keystore file : Practical UNIX & Internet Security, 19.3.1.1. Proving your identity
- keystrokes
- keyword search : Building Internet Firewalls, 2.6. Other Information Services
- "Keywords:" header line : sendmail, 35.10. Alphabetized Reference
- kill command
- killing sendmail daemon
- kinit program : Practical UNIX & Internet Security, 19.6.4. Using Kerberos
- kmem device
- known text attacks : Practical UNIX & Internet Security, 6.2.3. Cryptographic Strength
- Koblas, David : Practical UNIX & Internet Security, 22.4. SOCKS
- Koblas, Michelle : Practical UNIX & Internet Security, 22.4. SOCKS
- KPOP (Kerberos-supporting Post Office Protocol) : Building Internet Firewalls, 8.1.2. Post Office Protocol
- ksh (Korn shell)
-
- Practical UNIX & Internet Security, 11.5.1. Shell Features
- Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
- Practical UNIX & Internet Security, C.5.3. Running the User's Shell
- (see also shells)
- history file : Practical UNIX & Internet Security, 10.4.1. Shell History
- restricted shell : Practical UNIX & Internet Security, 8.1.4.3. Restricted Korn shell
- TMOUT variable : Practical UNIX & Internet Security, 12.3.5.1. Built-in shell autologout
- umask and : Practical UNIX & Internet Security, 5.3.1. The umask Command
- ksh93 shell
- kshrc file : Practical UNIX & Internet Security, 11.5.2.2. .cshrc, .kshrc
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
[ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | Practical Security ]