Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: M
- MAC (Mandatory Access Controls) : Groups and Group Identifiers (GIDs)
- MACH operating system : History of UNIX
- machine name : Hostnames
- MACHINE= command
- Macintosh, Web server on : Running a Secure Server
- macro virus : (see viruses)
- magic cookies : Using Xauthority magic cookies
- magic number : File Permissions in Detail
-
- /usr/lib/aliases, /etc/aliases, /etc/sendmail/aliases, aliases.dir, or aliases.pag
- (see also sendmail)
- accepted by programs : sendmail and security
- action, in Swatch program : The Swatch Configuration File
- alias back door : Back Doors and Trap Doors
- aliases : (see aliases)
- copylefts on : copyleft Infringement
- Electronic Communications Privacy Act (ECPA) : Federal Computer Crime Laws
- firewalls : Electronic Mail
- forwarding (UUCP) : Mail Forwarding for UUCP
- harassment via : Harassment, Threatening Communication, and Defamation
- logging : Mail
- message flooding : Message Flooding
- phantom, monitoring : Using sendmail to receive email
- receiving by sendmail : Using sendmail to receive email
- sending via CGI scripts : Sending mail
- sent directly to file : Early Security Problems with UUCP
- startup file attacks : forward, .procmailrc
- mail command : mail Command
- Mail_Aliases table (NIS+) : NIS+ Tables
- mailing lists
- maintenance mode : Process #1: /etc/init
- maintenance personnel : Outsiders
- makedbm program : Setting up netgroups
- malware : Programmed Threats: Definitions
- man pages : The Problem with Security Through Obscurity
- management, role of
- MANs (Metropolitan Networks) : Networking
- manual logging
- manual pages : Tips on Avoiding Security-related Bugs
- maps, NIS : (see NIS)
- Massey, James L. : Summary of Private Key Systems
- Master mode (uucico) : How the UUCP Commands Work
- master server
-
- Sun's Network Information Service (NIS)
- (see also NIS)
- MCERT : Motorola, Inc. and subsidiaries
- MCI Corporation : MCI Corporation
- MD2 algorithm : MD2, MD4, and MD5
- MD4 algorithm : MD2, MD4, and MD5
- MD5 algorithm
- media : Other Media
-
- damaged by smoke : Smoke
- destroying : Sanitize your media before disposal
- failure of : Guarding Against Media Failure
- hard/soft disk quotas : Using quotas
- print through process : Verify your backups
- rotating for backups : Types of Backups
- rotation of : Media rotation
- sanitizing : Sanitize your media before disposal
- viruses from : Viruses
- meet-in-the-middle attacks : Double DES
- memory
-
- Disk Attacks
- Tree-structure attacks
- hidden space : Hidden space
- reserved space : Reserved space
- swap space : Swap Space Problems
- /tmp directory and : /tmp Problems
- tree-structure attacks : Tree-structure attacks
- Merkle, Ralph : Double DES
- Message Authentication Code (MAC) : Message authentication codes
- message digests
- message flooding : Message Flooding
- messages log file : messages Log File
- meta characters : Tips on Avoiding Security-related Bugs
- metadata
- Metropolitan Networks (MANs) : Networking
- MH (mail handler) : forward, .procmailrc
- Micro-BIT Virus Center : Germany: Southern area
- Miller, Barton : An Empirical Study of the Reliability of UNIX Utilities
- MILNET : MILNET
- MIME : Viruses
- MIT-KERBEROS-5 authentication : The xhost facility
- Mitnick, Kevin : Network Providers that Network Too Well
- mkpasswd program : Password Generators
- mktemp function : Tips on Avoiding Security-related Bugs
- MLS (Multilevel Security) environment : "Secure" Versions of UNIX
- mobile network computing : One-Time Passwords
- modems
-
- Telephone Security
- Additional Security for Modems
- callback setups
- clogging : Clogging
- encrypting : Additional Security for Modems
- hanging up : (see signals)
- physical security of
- recording call information : aculog File
- tracing connections
- UNIX and
- modification times
- monitoring
-
- hardware for : (see detectors)
- intruders : Monitoring the Intruder
- performance : Performance Reviews and Monitoring
- security : (see logging)
- users : Other Tips
- monitors and screen savers : screen savers
- Morris, Robert T.
- motd file : Other Tips
- Motorola, Inc. : MILNET
- Motorola, Inc. and subsidiaries : Motorola, Inc. and subsidiaries
- mount command : Client-Side NFS Security
-
- -nodev option : Turning Off SUID and SGID in Mounted Filesystems
- -nosuid option : Turning Off SUID and SGID in Mounted Filesystems
- mounted filesystems : Turning Off SUID and SGID in Mounted Filesystems
- mouting filesystem : (see directories)
- mrand48 function : drand48 ( ), lrand48 ( ), and mrand48 ( )
- mtime
- MUDs (Multiuser Dungeons) : Other TCP Ports: MUDs and Internet Relay Chat (IRC)
- Muffet, Alec : Beware false log entries
- multicast groups : Classical network addresses
- MULTICS (Multiplexed Information and Computing Service) : History of UNIX
- multilevel security
- multitasking
- multiuser operating systems : Security and UNIX
- multiuser workstations : /etc/fbtab and /etc/logindevperm
- munitions export : Munitions Export
- MX record type : Domain Name System (DNS) (TCP and UDP Port 53)
- MYNAME= command : Permissions Commands
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
copyleft 1999 Anonymous All Rights Reserved.
[ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | Practical Security ]