Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: L
- L-devices file : Hooking Up a Modem to Your Computer
- cmds file : cmds: Providing Remote Command Execution
- sys file : Security of L.sys and Systems Files
- Lai, Xuejia : Summary of Private Key Systems
- laid-off employees : Departure
- LaMacchia, Brian : Limitations of Secure RPC
- LANs (local area networks)
- laptop computers : Portables
- last program
- lastcomm program
- lastlog file : lastlog File
- laws
-
- Computer Security and jungle law
- Harassment, Threatening Communication, and Defamation
- backups and : Legal Issues
- checklist for : Computer Security and jungle law
- copyleft
- criminal prosecution
- Electronic Communications Privacy Act (ECPA) : Federal Computer Crime Laws
- encryption
- enforcement agencies : Kinds of eavesdropping
- export
- federal enforcement
- indecent material : Pornography and Indecent Material
- liability
- monitoring keystrokes : Monitoring the Intruder
- non-citizen access : Munitions Export
- patents : Patent Concerns
- for portable computers : Portables
- resources on : Other Computer References
- search warrants
- smoking : Smoke
- state and local enforcement : The Local Option
- trademarks : Trademark Violations
- vendor liability : Trusting Your Software Vendor
- lawsuits (civil) : Civil Actions
- leased telephone lines : Physical Protection of Modems
- least privilege
- Lee, Ying-Da : SOCKS
- Lesk, Mike
- liability, legal
- /lib directory : Other files
- license agreements : Trusting Your Software Vendor
-
- comparison copies and : Comparison Copies
- lie-detector tests : Background Checks
- lightning
- limit command : Soft Process Limits: Preventing Accidental Denial of Service
- Limit command (<Directory>) : Commands Within the <Directory> Block
- limited user access : Limited users
- link-level security : Link-level Security
- links
-
- encryption of : Eavesdropping Over the Wire
- link-level security : Link-level Security
- static : Tips on Writing SUID/SGID Programs
- symbolic, following (Web)
- lint program : Tips on Avoiding Security-related Bugs
- LINUX operating system
-
- History of UNIX
- Entering Your Password
- What they found
- ext2 filesystem : Reserved space
- random number generators : Other random number generators
- Live Script : Trusting Your Software Vendor
- load shedding : Tips on Writing Network Programs
- local
-
- area networks (LANs)
- authentication (NIS+) : Using NIS+
- law enforcement : The Local Option
- storage
- users, and USERFILE : USERFILE entries for local users
- lock program : screen savers
- locked accounts : Entering Your Password
- locking files : Tips on Avoiding Security-related Bugs
- log files
-
- System initialization files
- (see also logging)
- access_log
- aculog : aculog File
- agent_log file : Eavesdropping Through Log Files
- backing up : Accounting with BSD
- lastlog : lastlog File
- managing : Managing Log Files
- manually generated
- per-machine : Per-Machine Logs
- per-site : Per-Site Logs
- refer_log file : Eavesdropping Through Log Files
- sulog : (see sulog file)
- system clock and : Network Time Protocol (NTP) (UDP Port 123)
- tracking intruders with : The Log Files: Discovering an Intruder's Tracks
- /usr/adm/messages : messages Log File
- utmp and wtmp
- uucp : uucp Log Files
- /var/adm/acct : The acct/pacct Process Accounting File
- /var/adm/loginlog : loginlog File
- of Web servers : Eavesdropping Through Log Files
- xferlog : xferlog Log File
- logdaemon package : Searching for .rhosts files
- logger command : syslog Messages
- logging
-
- taxonomy of computer failures
- Auditing and Logging
- Managing Log Files
- System initialization files
- Special Considerations
- Tips on Avoiding Security-related Bugs
- (see also log files)
- across networks : Logging across the network
- archiving information : Simple Archives
- breakins : Rule #2: DOCUMENT
- C2 audit : The Basic Log Files
- checklist for : Auditing and Logging
- critical messages
- downloaded files
- failed su attempts : The Bad su Log
- file format : Monitoring File Format
- files transferred by FTP : xferlog Log File
- to hardcopy device : Logging to a printer
- individual users
- manually
- mistyped passwords : syslog Messages
- network services : Logging Network Services
- outgoing mail : Mail
- potentially criminal activity : Other Tips
- Swatch program
- syslog facility
- UUCP : uucp Log Files
- what not to log : syslog Messages
- logging in
-
- Starting Up UNIX and Logging In
- Running the User's Shell
- FTP access without : Allowing only FTP access
- Kerberos system : Initial login
- last program
- lastlog file : lastlog File
- passwords : Entering Your Password
- preventing
- restricting : Restricting Logins
- with Secure RPC : Using Secure RPC
- startup file attacks
- logging out with Secure RPC[logging out:Secure RPC] : Using Secure RPC
- logic bombs
- login file
- login program
- logindevperm file : /etc/fbtab and /etc/logindevperm
- loginlog file : loginlog File
- logins
-
- authentication : TACACS (UDP Port 49)
- FTP : (FTP) File Transfer Protocol (TCP Ports 20 and 21)
- UUCP, additional : Assigning Additional UUCP Logins
- logins command : Accounts Without Passwords
-
- -d option : Monitoring File Format
- -p option : Monitoring File Format
- LOGNAME= command
- logout file : Using Secure RPC
- long distance service
- losses, cost of preventing
- lp (user) : Users and Groups
- lpd system : /etc/hosts.lpd file
- lrand48 function : drand48 ( ), lrand48 ( ), and mrand48 ( )
- ls command
-
- Using the ls Command
- File Times
- Checklists and Metadata
- -c option : File Times
- -d option : Simple listing
- -e option : AIX Access Control Lists
- -F option : Using the ls Command
- -g option : Using the ls Command
- -H option : Context-Dependent Files
- -i option : Simple listing
- -l option
- -q option : Using Directory Permissions
- -u option : File Times
- -c option : Changes to startup files
- -H option : Hidden files and directories
- -l option : Changes to startup files
- lsacl command : HP-UX access control lists
- lsof program : Hidden space
- lstat function : Tips on Avoiding Security-related Bugs
- Lucifer algorithm
- LUCIFER cipher : DES
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
copyleft 1999 Anonymous All Rights Reserved.
[ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | Practical Security ]