Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: C
- developing language
-
- History of UNIX
- Tips on Avoiding Security-related Bugs
- -Wall compiler option : Tips on Avoiding Security-related Bugs
- shell : (see csh)
- audit : The Basic Log Files
- cables, network
-
- Network cables
- Fiber optic cable
- cutting : Destructive Attacks
- tampering detectors for : Wiretapping
- wiretapping : Wiretapping
- cache, nameserver : Security and Nameservice
- caching : Device Files
- Caesar Cipher : ROT13: Great for Encoding Offensive Jokes
- calculating costs of losses : The Cost of Loss
- call forwarding : Physical Protection of Modems
- Call Trace : Tracing a Connection
- CALLBACK= command : Permissions Commands
- callbacks
-
- Additional Security for Modems
- BNU UUCP : Permissions Commands
- Version 2 UUCP : Requiring callback
- Caller-ID (CNID)
- Canada, export control in : Cryptography and Export Controls
- carbon monoxide : Smoke
- caret (^) in encrypted messages : What Is Encryption?
- case in usernames : Usernames
- cat command
- cat-passwd command : The /etc/passwd File and Network Databases
- CBC (cipher block chaining)
- CBW (Crypt Breaker's Workbench) : The crypt program
- CCTA IT Security & Infrastructure Group : UK: other government departments and agencies
- tutorial : Read-only Filesystems
- CDFs (context-dependent files)
- ceilings, dropped : Raised floors and dropped ceilings
- cellular telephones : Electrical noise
- CERCUS (Computer Emergency Response Committee for Unclassified Systems) : TRW network area and system administrators
- Cerf, Vint : IPv4: The Internet Protocol Version 4
- CERN : CERN HTTP Daemon
- CERT (Computer Emergency Response Team)
-
- Using Message Digests
- Response Personnel?
- All Internet sites
- CERT-NL (Netherlands) : Netherlands: SURFnet-connected sites
- mailing list for : CERT-advisory
- CFB (cipher feedback) : DES modes
- CGI (Common Gateway Interface) : Security and the World Wide Web
- cgi-bin directory : Understand Your Server's Directory Structure
- chacl command : HP-UX access control lists
-
- -f option : HP-UX access control lists
- -r option : HP-UX access control lists
- change detection
- character devices : Device Files
- chat groups, harassment via : Harassment, Threatening Communication, and Defamation
- chdir command
- checklists for detecting changes
- checksums
- Chesson, Greg : Versions of UUCP
- chfn command : Monitoring File Format
- chgrp command : chgrp: Changing a File's Group
- child processes : Creating Processes
- chkey command : Proving your identity
- chmod command
-
- chmod: Changing a File's Permissions
- Using Octal File Permissions
- Restricting Logins
- -A option : HP-UX access control lists
- -f option : chmod: Changing a File's Permissions
- -h option : chmod: Changing a File's Permissions
- -R option : chmod: Changing a File's Permissions
- chokes : (see firewalls)
- chown command
- chroot system call
- chrootuid daemon : chrootuid
- chsh command : Integrating One-time Passwords with UNIX
- CIAC (Computer Incident Advisory Capability) : S. Department of Energy sites, Energy Sciences Network (ESnet), and DOE contractors
- CIDR (Classless InterDomain Routing)
- cigarettes : Smoke
- cipher
-
- ROT13: Great for Encoding Offensive Jokes
- (see also cryptography; encryption)
- block chaining (CBC)
- ciphertext
- feedback (CFB) : DES modes
- CISCO : CISCO Systems
- civil actions (lawsuits) : Civil Actions
- classified data and breakins
- Classless InterDomain Routing (CIDR)
- clear text : The crypt() Algorithm
- Clear to Send (CTS) : The RS-232 Serial Protocol
- client flooding : Security and Nameservice
- client/server model : Clients and Servers
- clients, NIS : (see NIS)
- clock, system
-
- File Times
- Network Time Protocol (NTP) (UDP Port 123)
- for random seeds : Picking a Random Seed
- resetting : Checksums and Signatures
- Secure RPC timestamp : Setting the window
- clogging : Clogging
- CMW (Compartmented-Mode Workstation) : "Secure" Versions of UNIX
- CNID (Caller-ID)
- CO2 system (for fires) : Fire
- COAST (Computer Operations, Audit, and Security Technology)
- code breaking : (see cryptography)
- codetutorials : Code Books
- CodeCenter : Tips on Avoiding Security-related Bugs
- cold, extreme : Temperature extremes
- command shells : (see shells)
- commands
-
- Accounts That Run a Single Command
- (see also under specific command name)
- accounts running single : Accounts That Run a Single Command
- in addresses : Early Security Problems with UUCP
- editor, embedded : Other initializations
- remote execution of
- running simultaneously
- commands in <Directory> blocks : Commands Within the <Directory> Block
- COMMANDS= command : Permissions Commands
- commenting out services : Primary UNIX Network Services
- comments in BNU UUCP : Sample Permissions file
- Common Gateway Interface : (see CGI)
- communications
-
- modems : (see modems)
- national telecommunications : Federal Jurisdiction
- threatening : Harassment, Threatening Communication, and Defamation
- comparison copies
- compress program : Ways of improving the security of crypt
- Compressed SLIP (CSLIP) : IPv4: The Internet Protocol Version 4
- Computer Emergency Response Committee for Unclassified Systems (CERCUS) : TRW network area and system administrators
- Computer Emergency Response Team : (see CERT)
- Computer Incident Advisory Capability (CIAC) : S. Department of Energy sites, Energy Sciences Network (ESnet), and DOE contractors
- computer networks : Add-On Functionality Breeds Problems
- Computer Security Institute (CSI) : Computer Security Institute (CSI)
- computers
-
- assigning UUCP name : Permissions Commands
- auxiliary ports : Auxiliary ports on terminals
- backing up individual : Individual Workstation
- contacting administrator of : How to contact the system administrator of a computer you don't know
- cutting cables to : Destructive Attacks
- failure of : taxonomy of computer failures
- hostnames for
- modems : (see modems)
- multiple screens : Multiple screens
- multiple suppliers of : Dependence on Third Parties
- non-citizen access to : Munitions Export
- operating after breakin : Resuming Operation
- portable : Portables
- remote command execution : rexec (TCP Port 512)
- running NIS+ : NIS+ Limitations
- screen savers : screen savers
- security
-
- culture of : Understanding the Computer Security "Culture"
- four steps toward : Defend in depth
- physical : Physically secure your computer
- references for : General Computer Security
- resources on : Other Computer References
- seized as evidence : Hazards of Criminal Prosecution
- transferring files between : uucp Command
- trusting
- unattended
- unplugging : Getting Rid of the Intruder
- vacuums for : Dust
- vandalism of : (see vandalism)
- virtual : (see Telnet utility)
- computing base (TCB) : Trusted computing base
- conf directory : Configuration files
-
- conf/access.conf : (see access.conf file)
- conf/srm.conf file : The access.conf and .htaccess Files
- confidentiality : (see encryption; privacy)
- configuration
-
- errors : Prevention
- files : Abusing Automatic Mechanisms
-
- logging : Informational material
- MCSA web server : Configuration files
- UUCP version differences : Versions of UUCP
- simplifying management of : Read-only Filesystems
- connections
-
- hijacking : IP Security
- laundering : Who is on the Internet?
- tracing
- unplugging : Getting Rid of the Intruder
- connectors, network : Network connectors
- consistency of software : Planning Your Security Needs
- console device : Device Files
- CONSOLE variable : Secure Terminals
- constraining passwords : Constraining Passwords
- consultants : Your Consultants?
- context-dependent files (CDFs)
- control characters in usernames : Usernames
- cookies
- COPS (Computer Oracle and Password System)
- copyleft
- CORBA (Common Object Request Broker Architecture) : Sun's Remote Procedure Call (RPC)
- core files
- cost-benefit analysis
- costs of losses : The Cost of Loss
- cp command : Simple Local Copies
- cpio program
- crack program
- cracking
-
- backing up because of : taxonomy of computer failures
- passwords
- responding to
- using rexecd : rexec (TCP Port 512)
- crashes, logging : Exception and activity reports
- CRC checksums : (see checksums)
- Cred table (NIS+) : NIS+ Tables
- criminal prosecution
- cron file
-
- Simple listing
- Filename attacks
- crontab entries
- automating backups : Building an Automatic Backup System
- cleaning up /tmp directory : /tmp Problems
- collecting login times : lastlog File
- symbolic links in : Other Logs
- system clock and : Network Time Protocol (NTP) (UDP Port 123)
- uucp scripts in : Automatic Execution of Cleanup Scripts
- crontab file : Automatic Execution of Cleanup Scripts
- Crypt Breaker's Workbench (CBW) : The crypt program
- crypt command/algorithm
- crypt function
- crypt16 algorithm : Crypt16() and Other Algorithms
- cryptography
-
- Cryptography
- Cryptography and Export Controls
- Protection against eavesdropping
- checklist for : Cryptography
- checksums : Checksums
- digital signatures : (see digital signatures)
- export laws concerning : Cryptography and Export Controls
- Message Authentication Codes (MACs) : Message authentication codes
- message digests : (see message digests)
- PGP : (see PGP)
- private-key
- public-key
- references on : Cryptography Books
- and U.S. patents : Cryptography and the U.S. Patent System
- csh (C shell)
-
- Problems with SUID
- Shell Features
- Tips on Avoiding Security-related Bugs
- Running the User's Shell
- (see also shells)
- autologout variable : Built-in shell autologout
- history file : Shell History
- uucp command : uucp with the C shell
- cshrc file
- CSI (Computer Security Institute) : Computer Security Institute (CSI)
- CSLIP (Compressed SLIP) : IPv4: The Internet Protocol Version 4
- ctime
- cu command
- culture, computer security : Understanding the Computer Security "Culture"
- current directory : Current Directory and Paths
- Customer Warning System (CWS) : Oracle customers
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
copyleft 1999 Anonymous All Rights Reserved.
[ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | Practical Security ]