Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: D
- DAC (Discretionary Access Controls) : Groups and Group Identifiers (GIDs)
- daemon (user) : Users and Groups
- damage, liability for : Liability for Damage
- DARPA : (see ARPA)
- DAT (Digital Audio Tape) : Guarding Against Media Failure
- data
-
- assigning owners to : Assign an owner
- availability of : Planning Your Security Needs
- communication equipment (DCE) : The RS-232 Serial Protocol
- confidential
- disclosure of : Damage
- giving away with NIS : Unintended Disclosure of Site Information with NIS
- identifying assets : Identifying assets
- integrity of : (see integrity, data)
- spoofing : IP Security
- terminal equipment (DTE) : The RS-232 Serial Protocol
- Data Carrier Detect (DCD) : The RS-232 Serial Protocol
- Data Defense Network (DDN) : MILNET
- Data Encryption Standard : (see DES)
- Data Set Ready (DSR) : The RS-232 Serial Protocol
- Data Terminal Ready (DTR) : The RS-232 Serial Protocol
- database files : What Is an Operating System?
- databases : (see network databases)
- date command
- day-zero backups : Types of Backups
- dbx debugger : The kill Command
- DCE (data communication equipment) : The RS-232 Serial Protocol
- DCE (Distributed Computing Environment)
- dd command
- DDN (Data Defense Network) : MILNET
- deadlock : Tips on Avoiding Security-related Bugs
- debug command : Using sendmail to receive email
- debugfs command : Tree-structure attacks
- DEC (Digital Equipment Corporation) : Digital Equipment Corporation and customers
- DECnet protocol : DECnet
- decode aliases : Using sendmail to receive email
- decryption : (see encryption)
- defamation : Harassment, Threatening Communication, and Defamation
- default
-
- accounts : Default Accounts
- deny : Default Permit vs. Default Deny
- domain : Hostnames
- permit : Default Permit vs. Default Deny
- defense in depth : (see multilevel security)
- DELETE key : Changing Your Password
- deleting
-
- destructive attack via : Destructive Attacks
- files : Using Directory Permissions
- demo accounts : Default Accounts
- denial-of-service attacks
-
- Role of this tutorial
- Denial of Service Attacks and Solutions
- Clogging
- accidental : Soft Process Limits: Preventing Accidental Denial of Service
- automatic lockout : Entering Your Password
- checklist for : Denial of Service Attacks and Solutions
- inodes : Inode problems
- internal inetd services : The /etc/inetd Program
- on networks
- via syslog : The syslog.conf Configuration File
- X Window System : Denial of service attacks under X
- departure of employees : Departure
- depository directories, FTP : Setting up anonymous FTP with the standard UNIX FTP server
- DES (Data Encryption Standard)
-
- Summary of Private Key Systems
- DES
- Triple DES
- The crypt() Algorithm
- authentication (NIS+) : Using NIS+
- improving security of
- des program
- destroying media : Sanitize your media before disposal
- destructive attacks : Destructive Attacks
- detached signatures : PGP detached signatures
- detectors
-
- cable tampering : Wiretapping
- carbon-monoxide : Smoke
- humidity : Humidity
- logging alarm systems : Exception and activity reports
- smoke : Smoke
- temperature alarms : Temperature extremes
- water sensors : Water
- Deutsches Forschungsnetz : Germany: DFN-WiNet Internet sites
- /dev directory : Hooking Up a Modem to Your Computer
-
- /dev/audio device : Picking a Random Seed
- /dev/console device : Device Files
- /dev/kmem device
- /dev/null device : Device Files
- /dev/random device : Other random number generators
- /dev/swap device : SUID, SGID, and Sticky Bits
- /dev/urandom device : Other random number generators
- device files : Device Files
- devices
-
- managing with SNMP : Simple Network Management Protocol (SNMP) (UDP Ports 161 and 162)
- modem control : Setting Up the UNIX Device
- Devices file : Hooking Up a Modem to Your Computer
- df -i command : Inode problems
- dictionary attack : The crypt() Algorithm
- Diffie-Hellman key exchange system
-
- Summary of Public Key Systems
- Dependence on Third Parties
- Secure RPC (AUTH_DES)
- breaking key : Limitations of Secure RPC
- exponential key exchange : Secure RPC Authentication
- Digital Audio Tape (DAT) : Guarding Against Media Failure
- digital computers : Cryptography and Digital Computers
- Digital Equipment Corporation (DEC) : Digital Equipment Corporation and customers
- Digital Signature Algorithm : (see DSA)
- digital signatures
-
- Common Cryptographic Algorithms
- Message Digests and Digital Signatures
- Message authentication codes
- Checksums and Signatures
- checksums : Checksums
- detached signatures : PGP detached signatures
- with PGP : Adding a digital signature to an announcement
- Digital UNIX
-
- History of UNIX
- (see also Ultrix)
- directories
-
- Directories
- Current Directory and Paths
- ancestor : Ancestor directories
- backing up by : Types of Backups
- CDFs (context-dependent files) : Hidden files and directories
- checklist for : The UNIX Filesystem
- dot, dot-dot, and / : Directories
- FTP depositories : Setting up anonymous FTP with the standard UNIX FTP server
- immutable : Immutable and Append-Only Files
- listing automatically (Web) : Additional configuration issues
- mounted : Turning Off SUID and SGID in Mounted Filesystems
- mounting secure : Mounting a secure filesystem
- nested : Tree-structure attacks
- NFS : (see NFS)
- permissions : Using Directory Permissions
- read-only : Read-only Filesystems
- restricted
- root : (see root directory)
- SGI and sticky bits on : SGID and Sticky Bits on Directories
- Web server structure of
- world-writable : World-writable user files and directories
- <Directory> blocks
- disaster recovery : Minimizing downtime
- disk attacks
- disk quotas : Using quotas
- diskettes : (see backups; media)
- dismissed employees : Departure
- disposing of materials : Other Media
- Distributed Computing Environment : (see DCE)
- DNS (Domain Name System)
-
- Name Service
- Other naming services
- Domain Name System (DNS) (TCP and UDP Port 53)
- DNS nameserver attacks
- nameserver attacks : DNS nameserver attacks
- rogue servers : Security and Nameservice
- security and : Security and Nameservice
- zone transfers
- documentation
- domain name : Hostnames
- Domain Name System : (see DNS)
- domainname command : NIS Domains
- domains : NIS Domains
- dormant accounts
- dot (.) directory : Directories
- dot-dot (..) directory : Directories
- Double DES : Improving the Security of DES
- double reverse lookup : Security and Nameservice
- DOW USA : DOW USA
- downloading files : Protecting Local Storage
-
- logging
- downtime : Minimizing downtime
-
- due to criminal investigations : Hazards of Criminal Prosecution
- logging : Exception and activity reports
- drand48 function : drand48 ( ), lrand48 ( ), and mrand48 ( )
- drills, security : Rule #3: PLAN AHEAD
- drink : Food and drink
- DSA (Digital Signature Algorithm)
- DTE (data terminal equipment) : The RS-232 Serial Protocol
- du command : Disk-full attacks
- dual universes : Dual Universes
- ducts, air : Entrance through air ducts
- dump/restore program
- dumpster diving : Other Media
- duress code : Token Cards
- dust : Dust
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
copyleft 1999 Anonymous All Rights Reserved.
[ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | Practical Security ]