Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: N
- class : sendmail, 32.5. Alphabetized Reference
- -N database switch : sendmail, 33.3.4.6. -N append a null byte to all keys (V8.1 and above)
- flag : sendmail, 30.8. Alphabetized F= Flags
- line (qf file) : sendmail, 23.9. The qf File Internals
- $n macro
- option : (see CheckAliases (n) option)
- -n switch (sendmail)
- -N switch (makemap) : sendmail, 33.2.1.3. -N append a null byte to all keys
- -N switch (sendmail) : sendmail, 36.7. Alphabetized Reference
- N= equate : sendmail, 30.4. The Equates
- name service
-
- Practical UNIX & Internet Security, 16.2.6. Name Service
- Practical UNIX & Internet Security, 16.2.6.2. Other naming services
- sendmail, 21.1. Overview
- sendmail, 21.5.2. Offsite Servers
- TCP/IP Network Administration, 1.7. Application Layer
- TCP/IP Network Administration, 8. Configuring DNS Name Service
- (see also DNS)
- addresses : (see addresses)
- name server lookups : sendmail, 33.4.3. $[ and $]: A Special Case
- process : TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
- security and : Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
- troubleshooting
- Name Service Switch file (nsswitch.conf) : TCP/IP Network Administration, 9.3.1. The nsswitch.conf file
- name-value pairs in BNU UUCP : Practical UNIX & Internet Security, 15.5.1.2. Name-value pairs
- named daemon
-
- Building Internet Firewalls, 8.10.5.2. Set up a real DNS
- Practical UNIX & Internet Security, 16.2.6.1. DNS under UNIX
- Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
- TCP/IP Network Administration, 5.4. The Internet Daemon
- TCP/IP Network Administration, 8.1. BIND: UNIX Name Service
- booting : TCP/IP Network Administration, 8.3.3. The Cache Initialization File
- command : TCP/IP Network Administration, C.1. The named Command
- configuring : TCP/IP Network Administration, 8.3. Configuring named
- process : TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
- starting at startup : TCP/IP Network Administration, 8.3.6.1. Starting named
- tools reference : TCP/IP Network Administration, C. A named Reference
- NAMED_BIND macro : sendmail, 18.8. Alphabetized Reference
- named.boot file
-
- Practical UNIX & Internet Security, 17.3.6.1. DNS zone transfers
- Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
- TCP/IP Network Administration, 8.3.1. The named.boot File
- TCP/IP Network Administration, 11.6.3. Cache corruption
- TCP/IP Network Administration, C.1. The named Command
- configuration commands
- named.ca file : TCP/IP Network Administration, 11.6.3. Cache corruption
- named.hosts file : TCP/IP Network Administration, 8.3.6. The named.hosts File
- named.local file : TCP/IP Network Administration, 8.3.4. The named.local File
- named.pid file : TCP/IP Network Administration, 11.6.3. Cache corruption
- named.rev file : TCP/IP Network Administration, 8.3.5. The Reverse Domain File
- named-xfer program : Practical UNIX & Internet Security, 16.2.6.1. DNS under UNIX
- names : TCP/IP Network Administration, 3.1. Names and Addresses
-
- alternative for sendmail : sendmail, 36.1. Alternative argv[0] Names
- canonical
- canonicalizing : (see canonicalization)
- changing from host to hub : sendmail, 11.6. Handling user@thishost
- choosing UUCP : Practical UNIX & Internet Security, 15.5.2. Permissions Commands
- classes
- computer
- controlling terminal : sendmail, 31.10. Alphabetized Reference
- DNS : (see DNS)
- domain
- application form : TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
- full sender : (see $x macro)
- fully qualified
- headers : sendmail, 35.2. Header Names
- hostnames : (see hostnames)
- hub, internal : sendmail, 11.4.2. A Word About ${HUB}
- local canonical
- macros
- in NIS : TCP/IP Network Administration, 9.3. Network Information Service
- obtaining : TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
- options : sendmail, 13.1. Options: An Overview
- parameter : TCP/IP Network Administration, 9.4. A BOOTP Server
- RealHostName variable : sendmail, 20.1.2. Global Variables
- rule set : sendmail, 29.1.2. Rule-Set Names
- symbol, delivery agent : sendmail, 30.2. The Symbolic Name
- trailing dot for
- unqualified
- user : (see usernames)
- nameser.h file : sendmail, B.1. Status file lines
- nameserver attacks, DNS : Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
- nameserver cache loading : Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
- nameserver entry, in resolv.conf : TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
- NAPs (Network Access Points)
- NASA (National Aeronautics and Space Agency) : Practical UNIX & Internet Security, F.3.4.23. NASA
- National Center for Supercomputer Applications (NCSA)
- National Computer Security Center (NCSC) : Practical UNIX & Internet Security, F.2.1. National Computer Security Center
- National Institute of Standards and Technology (NIST)
-
- Practical UNIX & Internet Security, F.3.4.26. National Institute of Standards and Technology
- TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
- TCP/IP Network Administration, 13.1. The World Wide Web
- NIST CSRC (Computer Security Resource Clearinghouse) : Building Internet Firewalls, A.5.3. NIST CSRC
- National Science Foundation (NSF)
- national security : Practical UNIX & Internet Security, 26.2.2. Federal Jurisdiction
- natural disasters
-
- Practical UNIX & Internet Security, 1.1. What Is Computer Security?
- Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
- Practical UNIX & Internet Security, 7.1.6.1. Physical security for backups
- Practical UNIX & Internet Security, 12.2.1.1. Fire
- (see also physical security)
- accidents : Practical UNIX & Internet Security, 12.2.2. Preventing Accidents
- earthquakes : Practical UNIX & Internet Security, 12.2.1.4. Earthquake
- fires
- lightning
- natural gas : Practical UNIX & Internet Security, 12.2.1.5. Explosion
- natural mask : TCP/IP Network Administration, 2.2.2. Classless IP Addresses
- NAVCIRT (Naval Computer Incident Response Team) : Practical UNIX & Internet Security, F.3.4.44. U.S. Department of the Navy
- NBMA interfaces
- ncheck command
- NCSA (National Center for Supercomputer Applications)
- NCSC (National Computer Security Center) : Practical UNIX & Internet Security, F.2.1. National Computer Security Center
- ndbm database : sendmail, 33.8. Alphabetized Reference
- NDBM macro : sendmail, 18.8. Alphabetized Reference
- NEED... macros : sendmail, 18.8. Alphabetized Reference
- needexpnhelo (sendmail) : Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
- needmailhelo (sendmail) : Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
- needvrfyhelo (sendmail) : Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
- negative precedence values : sendmail, 14.4. Precedence
- neighbors
- nested
-
- angle brackets
- directories : Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
- IP over IP : Building Internet Firewalls, 6.3.3.5. IP over IP
- macro conditionals : sendmail, 31.6.1. Conditionals May Nest
- net domain : TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
- NET... macros : sendmail, 18.8. Alphabetized Reference
- Net/Dest value
- netacl program : Building Internet Firewalls, 5.8.3.2. Using netacl to protect services
- netconfig : TCP/IP Network Administration, 4.7. netconfig
- Netgroup table (NIS+) : Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
- netgroups, NIS
- NetInfo
- NETINFO macro : sendmail, 18.8. Alphabetized Reference
- Netmasks table (NIS+) : Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
- netnews~firewalls : Practical UNIX & Internet Security, 21.4.3. Netnews
- netrc file : Practical UNIX & Internet Security, 10.4.3. Network Setup
- Netscape Navigator
- netstat command
-
- Practical UNIX & Internet Security, 17.5. Monitoring Your Network with netstat
- Practical UNIX & Internet Security, 24.2.1. Catching One in the Act
- Practical UNIX & Internet Security, 24.2.4. Tracing a Connection
- -a option : Practical UNIX & Internet Security, 17.5. Monitoring Your Network with netstat
- -in command : TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- -n option : Practical UNIX & Internet Security, 17.5. Monitoring Your Network with netstat
- -ni command : TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- -nr command
- to display routing table : TCP/IP Network Administration, 12.7.2. Routing control
- troubleshooting with
- network services
-
- Building Internet Firewalls, 2. Internet Services
- Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
- Practical UNIX & Internet Security, 17. TCP/IP Services
- Practical UNIX & Internet Security, 17.7. Summary
- Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
- Practical UNIX & Internet Security, G. Table of IP Services
- administration : (see system administration)
- booting : Building Internet Firewalls, 5.8.2.4. Which services should you disable?
- configuring : Building Internet Firewalls, 8. Configuring Internet Services
- contacting providers about incidents : Building Internet Firewalls, 13.1.4.3. Vendors and service providers
- default deny stance : Building Internet Firewalls, 3.5.1. Default Deny Stance: That Which Is Not
- default permit stance : Building Internet Firewalls, 3.5.2. Default Permit Stance: That Which Is
- direct access to : Building Internet Firewalls, 7.1.1.1. Proxy services allow users to access Internet services
- disabling those not required : Building Internet Firewalls, 5.8.2. Disabling Nonrequired Services
- DNS : (see DNS)
- encryption with : (see encryption)
- filtering by : Building Internet Firewalls, 6.7. Filtering by Service
- finger : (see finger service)
- FTP : (see FTP)
- inbound : (see inbound, services)
- information lookup services : Building Internet Firewalls, 8.8. Information Lookup Services
- installing and modifying : Building Internet Firewalls, 5.8.3. Installing and Modifying Services
- LAN-oriented : Building Internet Firewalls, 5.6. Selecting Services Provided by the
- NFS (Network File System) : Building Internet Firewalls, 5.8.2.4. Which services should you disable?
- NNTP : (see NNTP)
- NTP : (see NTP)
- overloading : Practical UNIX & Internet Security, 25.3.1. Service Overloading
- passwords for : (see passwords)
- POP : (see POP)
- protecting with TCP Wrapper : Building Internet Firewalls, 5.8.3.1. Using the TCP Wrapper package to protect services
- proxy : (see proxy servers/services)
- r commands : Building Internet Firewalls, 5.8.2.4. Which services should you disable?
- real-time conferencing : Building Internet Firewalls, 8.9. Real-Time Conferencing Services
- root account with : (see root account/user)
- RPC (Remote Procedure Call) : Building Internet Firewalls, 5.8.2.4. Which services should you disable?
- securing
- selecting for bastion host : Building Internet Firewalls, 5.6. Selecting Services Provided by the
- SMTP : (see SMTP)
- SNMP : (see SNMP)
- spoofing
-
- Practical UNIX & Internet Security, 8.5.3.1. Trusted path
- Practical UNIX & Internet Security, 16.3. IP Security
- Practical UNIX & Internet Security, 17.5. Monitoring Your Network with netstat
- Practical UNIX & Internet Security, 19.4.4.4. Spoofing RPC
- Practical UNIX & Internet Security, 19.4.4.5. Spoofing NIS
- started by /etc/rc : Building Internet Firewalls, 5.8.2.1. How are services managed?
- store-and-forward
- systat service : Practical UNIX & Internet Security, 17.3.1. systat (TCP Port 11)
- Telnet : (see Telnet service)
- TFTP : (see TFTP)
- UUCP : (see UUCP)
- networks and networking
-
- Practical UNIX & Internet Security, 16. TCP/IP Networks
- Practical UNIX & Internet Security, 16.5. Summary
- sendmail, 3.3. Role in Network Transport
- 10Base-T : Practical UNIX & Internet Security, 12.3.1.2. Eavesdropping by Ethernet and 10Base-T
- access
-
- access layer, TCP/IP : Building Internet Firewalls, C.4. Network Access Layer
- balancing against computer security : TCP/IP Network Administration, 12. Network Security
- troubleshooting : TCP/IP Network Administration, 11.4. Troubleshooting Network Access
- address translation (NAT) : TCP/IP Network Administration, 4.2.1. Obtaining an IP Address
-
- avoiding problems
- decentralized : TCP/IP Network Administration, 2.3. Subnets
- defined
- developing feel for : TCP/IP Network Administration, 12.4.1. Know Your System
- need for information about : TCP/IP Network Administration, Preface
- security responsibilites of : TCP/IP Network Administration, 12.1.3. Writing a Security Policy
- simplifying : TCP/IP Network Administration, 4.2.2. Defining the Subnet Mask
- allowing threats from : Practical UNIX & Internet Security, 11.4. Entry
- AppleTalk : sendmail, 3.3.3. Other Protocols
- architecture : (see firewalls, architecture of)
- ARPANET
-
- Practical UNIX & Internet Security, 16.1.1. The InternetWe recommend that readers
- TCP/IP Network Administration, 1.1. TCP/IP and the Internet
- TCP/IP Network Administration, 1.5.1.1. The datagram
- TCP/IP Network Administration, 2.4. Internet Routing Architecture
- TCP/IP Network Administration, 6.2. TCP/IP Over a Serial Line
- backing up
- break-ins, increasing : TCP/IP Network Administration, 12. Network Security
- building : TCP/IP Network Administration, Foreword from the First version
- cables for : (see cables)
- checking connectivity of : (see ping command)
- checklist for
- computer networks : Practical UNIX & Internet Security, 1.4.3. Add-On Functionality Breeds Problems
- configuration files : Practical UNIX & Internet Security, 10.4.3. Network Setup
- connected or not connected to Internet : TCP/IP Network Administration, 4.1. Connected and Non-Connected Networks
- connections : Practical UNIX & Internet Security, 17.3.3. TELNET (TCP Port 23)
- connectors for : Practical UNIX & Internet Security, 12.2.4.3. Network connectors
- databases, network : Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
- DECnet
- denial of service on : (see denial of service)
- diameter
- disabling physically : Practical UNIX & Internet Security, 25.3.3. Signal Grounding
- disconnecting, after incident
- encryption : Building Internet Firewalls, 10.5. Network-Level Encryption
- File System : (see NFS)
- forwarding over
- hardware
-
- TCP/IP Network Administration, 1.7. Application Layer
- (see also physical network)
- with built-in diagnostic software : TCP/IP Network Administration, 11.3.1. The ping Command
- problems with
- heterogeneous : TCP/IP Network Administration, 1.1.2. Protocol Standards
- insecure : Building Internet Firewalls, 4.4.2. Insecure Networks
- interfaces : TCP/IP Network Administration, 3.1. Names and Addresses
-
- enabling or disabling : TCP/IP Network Administration, 6.1.5.1. Enabling and disabling the interface
- information need for : TCP/IP Network Administration, 6.1. The ifconfig Command
- Internet : (see Internet)
- joint : Building Internet Firewalls, 4.4.4. Joint Venture Firewalls
- lab/test : Building Internet Firewalls, 4.4.1. Laboratory Networks
- LANs : (see LANs)
- location of bastion host on : Building Internet Firewalls, 5.5. Locating the Bastion Host on the Network
- logging
- management services : Building Internet Firewalls, 2.10. Network Management Services
- MANs : Practical UNIX & Internet Security, 16.1. Networking
- maps drawn by monitors : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- mask
- mobile computing : Practical UNIX & Internet Security, 8.7. One-Time Passwords
- monitoring
- news : (see Usenet news)
- NFSNET
- numbers
- packet switching
- perimeter
- problems, how to approach : TCP/IP Network Administration, 11. Troubleshooting TCP/IP
- processes : TCP/IP Network Administration, 8.2. Configuring the Resolver
- protecting internally : Building Internet Firewalls, 4.4. Internal Firewalls
- providers : (see ISPs)
- resources, controlling : TCP/IP Network Administration, 12.1.3. Writing a Security Policy
- saturated : TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
- scanning : Practical UNIX & Internet Security, 17.6. Network Scanning
- security : (see security)
- servers
- services : (see network services)
- shared media : TCP/IP Network Administration, 11.4.4. Subdividing an Ethernet
- SOCKS for : (see SOCKS package)
- spoofing
-
- Practical UNIX & Internet Security, 8.5.3.1. Trusted path
- Practical UNIX & Internet Security, 16.3. IP Security
- Practical UNIX & Internet Security, 17.5. Monitoring Your Network with netstat
- Practical UNIX & Internet Security, 19.4.4.5. Spoofing NIS
- Practical UNIX & Internet Security, 19.4.4.4. Spoofing RPC
- subdividing : TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
- subnetted : TCP/IP Network Administration, 4.2.1.1. Assigning host addresses
- support : sendmail, 18.8. Alphabetized Reference
- taps : Building Internet Firewalls, 1.2.1.3. Information Theft
- TCP/IP : (see TCP/IP services)
- Time Protocol : (see NTP)
- topology of : TCP/IP Network Administration, 2.2.2. Classless IP Addresses
- transferring information across : (see packet filtering)
- underlying : TCP/IP Network Administration, 1.4. Network Access Layer
- UNIX and : Practical UNIX & Internet Security, 16.1.2. Networking and UNIX
- unreliable : TCP/IP Network Administration, 11.3.1. The ping Command
- unusual activity on : TCP/IP Network Administration, 12.4.1. Know Your System
- usage, monitoring : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- UUCP over
- X.25 : TCP/IP Network Administration, 1.5.1.3. Fragmenting datagrams
- WANs : Practical UNIX & Internet Security, 16.1. Networking
- weaving : Practical UNIX & Internet Security, 16.1.1.1. Who is on the Internet?
- Network Access Layer
- Network Access Points (NAPs)
- Network Control protocols : TCP/IP Network Administration, 6.2.1. The Serial Protocols
- Network File System : (see NFS)
- Network Information Center (NIC)
- Network Information Service : (see NIS)
- Network Layer
- Network Management Station (NMS) : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- Network News Transfer Protocol (NNTP)
- Network Terminal Protocol (TELNET) : TCP/IP Network Administration, 1.7. Application Layer
- Network Time Protocol
-
- Building Internet Firewalls, 2.11. Time Service
- Building Internet Firewalls, 7.5. Proxying Without a Proxy Server
- Practical UNIX & Internet Security, 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
- configuring : Building Internet Firewalls, 8.13. Network Time Protocol (NTP)
- Secure RPC and : Practical UNIX & Internet Security, 19.3.1.3. Setting the window
- network unreachable error message
- Network/Destination value
- networks file
-
- TCP/IP Network Administration, 3.2. The Host Table
- TCP/IP Network Administration, 6.1.3. Assigning a Subnet Mask
- TCP/IP Network Administration, 7.3. Building a Static Routing Table
- TCP/IP Network Administration, 9.3. Network Information Service
- as maps : TCP/IP Network Administration, 3.3.5. Network Information Service
- Networks table (NIS+) : Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
- Neumann, Peter : Practical UNIX & Internet Security, 1.3. History of UNIX
- newaliases command
- NEWDB macro : sendmail, 18.8. Alphabetized Reference
- newgrp command : Practical UNIX & Internet Security, 4.1.3.2. Groups and older AT&T UNIX
- newkey -u command
- newlines : (see whitespace)
- newly registered hosts : TCP/IP Network Administration, 3.2. The Host Table
- news (Usenet)
-
- Practical UNIX & Internet Security, 17.3.13. Network News Transport Protocol (NNTP) (TCP Port
- Practical UNIX & Internet Security, E.2. Usenet Groups
- TCP/IP Network Administration, 13.5.1. Newsgroups
- TCP/IP Network Administration, E.3.5. MAILER
- (see also NNTP)
- cleanup scripts : Practical UNIX & Internet Security, 11.5.3. Abusing Automatic Mechanisms
- encryption for : (see ROT13 algorithm)
- message subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- mailing list gateways to : sendmail, 25.5.2. Gateway Lists to News
- news user : Practical UNIX & Internet Security, 4.1. Users and Groups
- newsgroups
-
- Building Internet Firewalls, 2.4. Usenet News
- TCP/IP Network Administration, 13.5.1. Newsgroups
- defamation/harassment via : Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
- keeping current : Building Internet Firewalls, 12.3.1.2. Newsgroups
- for security information : TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
- security resources via : Building Internet Firewalls, A.4. Newsgroups
- using
- posting breakins to : Practical UNIX & Internet Security, 24.6. Resuming Operation
- reporting security holes on : Practical UNIX & Internet Security, 2.5.1. Going Public
- next hop
- NEXTSTEP Window Server (NSWS) : Practical UNIX & Internet Security, 17.3.16. NEXTSTEP Window Server
- nf files : sendmail, 23.2.4. The ID Creation File (obsolete as of V5.62): nf
- NFS (Network File System)
-
- Building Internet Firewalls, 2.12. Network File Systems
- Practical UNIX & Internet Security, 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
- Practical UNIX & Internet Security, 19. RPC, NIS, NIS+, and Kerberos
- TCP/IP Network Administration, 1.7. Application Layer
- TCP/IP Network Administration, 3.7.1. File Sharing
- TCP/IP Network Administration, 9.1. The Network File System
- TCP/IP Network Administration, 9.6. Managing Distributed Servers
- authentication and
- benefits of : TCP/IP Network Administration, 9.1. The Network File System
- checklist for : Practical UNIX & Internet Security, A.1.1.19. Chapter 20: NFS
- configuring : Building Internet Firewalls, 8.14. Network File System
- exporting news via : Building Internet Firewalls, 8.5.3.3. Exporting news to clients via
- file permissions : Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail
- find command on : Practical UNIX & Internet Security, 5.5.4. Finding All of the SUID and SGID Files
- -local option : Practical UNIX & Internet Security, 11.6.1.2. Writable system files and directories
- MOUNT : Practical UNIX & Internet Security, 20.1.1. NFS History
- Secure NFS : (see Secure NFS)
- server, and UUCP : Practical UNIX & Internet Security, 15.3. UUCP and Security
- services of : Building Internet Firewalls, 5.8.2.4. Which services should you disable?
- technical description of : Practical UNIX & Internet Security, 20.1.1. NFS History
- trusted hosts and : Practical UNIX & Internet Security, 17.3.18.2. The problem with trusted hosts
- -xdev option : Practical UNIX & Internet Security, 11.6.1.2. Writable system files and directories
- NFS-based print services : TCP/IP Network Administration, 9.1.5.1. NFS print services
- nfs.client script : TCP/IP Network Administration, 9.1.1. NFS Daemons
- nfs.server script : TCP/IP Network Administration, 9.1.1. NFS Daemons
- nfsd (NFS daemon) : TCP/IP Network Administration, 9.1.1. NFS Daemons
- NFSNET backbone : TCP/IP Network Administration, 1.1. TCP/IP and the Internet
- NIC (Network Information Center)
- nice command : Practical UNIX & Internet Security, 25.2.1.2. System overload attacks
- nice numbers : Practical UNIX & Internet Security, C.1.3.3. Process priority and niceness
- niceness, delivery agent : sendmail, 30.4. The Equates
- NIS (Network Information Service)
-
- Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
- Practical UNIX & Internet Security, 3.4. Changing Your Password
- Practical UNIX & Internet Security, 19. RPC, NIS, NIS+, and Kerberos
- Practical UNIX & Internet Security, 19.4. Sun's Network Information Service (NIS)
- Practical UNIX & Internet Security, 19.4.5. Unintended Disclosure of Site Information with NIS
- TCP/IP Network Administration, 3.3.5. Network Information Service
- TCP/IP Network Administration, 9.3. Network Information Service
- + in
- clients : Practical UNIX & Internet Security, 19.4. Sun's Network Information Service (NIS)
- domains : Practical UNIX & Internet Security, 19.4.3. NIS Domains
- maps
- netgroups
- Secure RPC with
- spoofing : Practical UNIX & Internet Security, 19.4.4.5. Spoofing NIS
- UDP : Practical UNIX & Internet Security, 16.2.4.3. UDP
- Yellow Pages : Practical UNIX & Internet Security, 16.2.6.2. Other naming services
- nis database class : sendmail, 33.8. Alphabetized Reference
- NIS macro : sendmail, 18.8. Alphabetized Reference
- NIS+
-
- Building Internet Firewalls, 8.15. Network Information Service/Yellow
- Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
- Practical UNIX & Internet Security, 3.4. Changing Your Password
- Practical UNIX & Internet Security, 16.2.6.2. Other naming services
- Practical UNIX & Internet Security, 19.5. Sun's NIS+
- Practical UNIX & Internet Security, 19.5.5. NIS+ Limitations
- TCP/IP Network Administration, 9.3.2. NIS+
- integrity-checking software for : Practical UNIX & Internet Security, 19.5.5. NIS+ Limitations
- principals : Practical UNIX & Internet Security, 19.5.1. What NIS+ Does
- Secure RPC with
- NIS/YP (Network Information Service)
- nisaddcred command : Practical UNIX & Internet Security, 19.3.1.1. Proving your identity
- niscat command : Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
- nischown command : Practical UNIX & Internet Security, 19.5.4. Using NIS+
- nispasswd command
- nisplus database class : sendmail, 33.8. Alphabetized Reference
- NISPLUS macro : sendmail, 18.8. Alphabetized Reference
- NIST (National Institute of Standards and Technology)
-
- Practical UNIX & Internet Security, F.2.1. National Computer Security Center
- Practical UNIX & Internet Security, F.3.4.26. National Institute of Standards and Technology
- TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
- TCP/IP Network Administration, 13.1. The World Wide Web
- NIST CSRC (Computer Security Resource Clearinghouse) : Building Internet Firewalls, A.5.3. NIST CSRC
- NMS (Network Management Station) : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- NNTP (Network News Transfer Protocol)
- NNTPSERVER variable : sendmail, 31.2.1. Syntax of the Command-Line Macro's Text
- no answer error message : TCP/IP Network Administration, 11.3. Testing Basic Connectivity
- NO_GROUP_SET macro : sendmail, 18.8. Alphabetized Reference
- "No local mailer defined" message : sendmail, 6.2.1. Testing the client.cf File
- "no mailer in parsed address" error : sendmail, 29.6. Rule Set 0
- "no more data from sender" (FIN) bit : TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
- "No such file or directory" error : sendmail, 12.2. The File Form of Class
- nobody user
- nocanonify feature : sendmail, 19.6. Alphabetized m4 Macros
- nodns feature
- noexpn (sendmail) : Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
- noise, electrical : Practical UNIX & Internet Security, 12.2.1.8. Electrical noise
- nonadaptive modems : (see modems)
- nonauthoritative servers : TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
- nonblocking systems : Practical UNIX & Internet Security, 19.2. Sun's Remote Procedure Call (RPC)
- nonbroadcast multi-access (NBMA) interfaces
- nonce : Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
- non-connected network : TCP/IP Network Administration, 4.1. Connected and Non-Connected Networks
- non-encoded binary data : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- non-Internet sites, delivering mail to : TCP/IP Network Administration, C.3.1.4. Mail exchanger record
- nonrecursive queries : TCP/IP Network Administration, 3.3.2. Creating Domains and Subdomains
- nonrepudiation : Practical UNIX & Internet Security, 6.5. Message Digests and Digital Signatures
- nonrouting dual-homed hosts
- NORDUNET : Practical UNIX & Internet Security, F.3.4.27. NORDUNET
- NOREAD= command : Practical UNIX & Internet Security, 15.5.2. Permissions Commands
- NoRecipientAction option : sendmail, 34.8. Alphabetized Reference
- normalizing addresses : sendmail, 17.1.2. Normalize the Address
- Northwestern University : Practical UNIX & Internet Security, F.3.4.28. Northwestern University
- nosuid : Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
- notation, dotted decimal : TCP/IP Network Administration, 2.3. Subnets
- NOTIFY command (SMTP) : sendmail, 36.7. Alphabetized Reference
- NOTIFY extension, DSN : sendmail, 23.9. The qf File Internals
- notifying people about problems
- notsticky feature : sendmail, 19.6. Alphabetized m4 Macros
- NOTUNIX macro : sendmail, 18.8. Alphabetized Reference
- nouucp feature : sendmail, 19.6. Alphabetized m4 Macros
- Novell : Practical UNIX & Internet Security, 1.3. History of UNIX
- novrfy (sendmail) : Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
- Nowitz, David : Practical UNIX & Internet Security, 15.2. Versions of UUCP
- NOWRITE= command : Practical UNIX & Internet Security, 15.5.2. Permissions Commands
- NP keyword : TCP/IP Network Administration, 12.2.1. The Shadow Password File
- npasswd package : Practical UNIX & Internet Security, 8.8.2. Constraining Passwords
- NPROC variable : Practical UNIX & Internet Security, 25.2.1.1. Too many processes
- nrcpts= equate (syslog output) : sendmail, 26.1.3.6. nrcpts= the number of recipients
- NS query : TCP/IP Network Administration, 11.6. Checking Name Service
- NS resource records
- NSA (National Security Agency) : Practical UNIX & Internet Security, F.2.2. National Security Agency (NSA)
- nservers option : TCP/IP Network Administration, 9.1.1. NFS Daemons
- NSF (National Science Foundation)
- nslookup
- nsswitch.conf file
- NSWS (NextStep Window Server) : Practical UNIX & Internet Security, 17.3.16. NEXTSTEP Window Server
- NTP (Network Time Protocol)
-
- Building Internet Firewalls, 2.11. Time Service
- Building Internet Firewalls, 7.5. Proxying Without a Proxy Server
- Practical UNIX & Internet Security, 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
- configuring : Building Internet Firewalls, 8.13. Network Time Protocol (NTP)
- Secure RPC and : Practical UNIX & Internet Security, 19.3.1.3. Setting the window
- NU-CERT : Practical UNIX & Internet Security, F.3.4.28. Northwestern University
- null
-
- addresses
- database class : sendmail, 33.8. Alphabetized Reference
- device : Practical UNIX & Internet Security, 5.6. Device Files
- sendmail.cf file : sendmail, 5.2. The Minimal File
- null.mc file : sendmail, 16.2. The null.mc File
- nullclient feature : sendmail, 19.6. Alphabetized m4 Macros
- numbers
-
- sendmail, 29.1.1. Rule-Set Numbers
- (see also identifiers)
- delivery failure count : sendmail, 23.9. The qf File Internals
- DNS errors : sendmail, B.1. Status file lines
- inode and device : sendmail, 23.9. The qf File Internals
- port : Building Internet Firewalls, C.12.2. Port Numbers
- protocol : Building Internet Firewalls, C.12.1. Protocol Numbers
- rule sets
- SMTP status codes : sendmail, B.1. Status file lines
- UNIX errors : sendmail, B.1. Status file lines
- numeric addresses : (see addresses)
- numeric-type arguments : sendmail, 34.5. Option Argument Types
- numeric values, in printcap parameters : TCP/IP Network Administration, 9.2.1. The printcap File
- nuucp account
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
[ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | Practical Security ]