Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: P
- pacct file : The acct/pacct Process Accounting File
- pack program : Ways of improving the security of crypt
- packet sniffing : Link-level Security
- packet-switching networks : IPv4: The Internet Protocol Version 4
- packets : (see IP packets)
- paper
-
- backups on : Never Trust Anything Except Hardcopy
- copies : Building an Automatic Backup System
- logging on : Handwritten Logs
- shredders for : Other Media
- throwing out : Other Media
- parent processes : Creating Processes
- partitions : Using partitions to protect your users
-
- backup by : Types of Backups
- root : (see root directory)
- pass phrases : (see passwords)
- pass phrases for PGP
-
- Encrypting files with IDEA
- (see also passwords)
- passive FTP
- passwd command
-
- Changing Your Password
- What Is Salt?
- as SUID program : SUID
- -l option
- -n option : Password Aging and Expiration
- -x option : Password Aging and Expiration
- -f nomemory option : Verifying Your New Password
- using as superuser : Verifying Your New Password
- passwd file
-
- What Is an Operating System?
- The /etc/passwd File
- The /etc/passwd File and Network Databases
- Impact of the /etc/passwd and /etc/group Files on Security
- What Should You Back Up?
- Accounts Without Passwords
- The UNIX Encrypted Password System
- How the UUCP Commands Work
- New Accounts
- Process #1: /etc/init
- (see /etc/passwd file)
- Passwd table (NIS+) : NIS+ Tables
- passwd+ package
- password coach : Password Generators
- password file : NIS is confused about "+"
- password modems : Additional Security for Modems
- password.adjunct file : Shadow Password Files
- passwords
-
- Passwords
- Bad Passwords: Open Doors
- Summary
- Tips on Using Passwords
- accounts without : Accounts Without Passwords
- assigning to users : Assigning Passwords to Users
- avoiding conventional
- bad choices for
- changing
- checklist for : Users and Passwords
- constraining : Constraining Passwords
- conventional : Conventional UNIX Passwords
- cracking
- encrypting
- expiring : Password Aging and Expiration
- federal jurisdiction over : Federal Jurisdiction
- FTP and : (FTP) File Transfer Protocol (TCP Ports 20 and 21)
- generators of : Password Generators
- hit lists of : Bad Passwords: Open Doors
- Kerberos : Kerberos Limitations
- logging changes to : Exception and activity reports
- logging failed attempts at : syslog Messages
- for MUDs : Other TCP Ports: MUDs and Internet Relay Chat (IRC)
- on multiple machines
- over network connections : Tips on Writing Network Programs
- with network services : Security Implications of Network Services
- NIS, with Secure RPC : Creating passwords for users
- NIS+, changing : Changing your password
- one-time
- with POP : Post Office Protocol (POP) (TCP Ports 109 and 110)
- required for Web use
- shadow
- sniffing
- system clock and : Network Time Protocol (NTP) (UDP Port 123)
- token cards with : Token Cards
- unique, number of : Good Passwords: Locked Doors
- usernames as : Joetest: a simple password cracker
- UUCP accounts : Establishing UUCP Passwords
- verifying new : Verifying Your New Password
- wizard's (sendmail) : sendmail and security
- writing down : Writing Down Passwords
- patches, logging : Informational material
- patents : Patent Concerns
-
- and cryptography : Cryptography and the U.S. Patent System
- PATH variable
- pathnames : Tips on Avoiding Security-related Bugs
- paths : Current Directory and Paths
-
- trusted : Trusted path
- pax program : Simple Archives
- PCERT (Purdue University) : Purdue University
- PCs
-
- viruses on : Viruses
- web server on : Running a Secure Server
- PDP-11 processors
- Penn State response team : Pennsylvania State University
- per-machine logs : Per-Machine Logs
- per-site logs : Per-Site Logs
- performance
-
- compromised
- reviews : Performance Reviews and Monitoring
- with Secure RPC : Limitations of Secure RPC
- using FFS : Reserved space
- perimeter, security : The Physical Security Plan
- perl command
- Perl developing language
-
- SUID Shell Scripts
- Trojan Horses
- IFS attacks
- random seed generator : Good Random Seed Generator
- script for reading lastlog file : lastlog File
- Swatch program
- tainting facility : Tainting with Perl
- permissions
-
- What Is Computer Security?
- Understanding File Permissions
- Using Octal File Permissions
- Viruses
- File Protections
- World-readable backup devices
- access control lists (ACLs)
- changing
- directory : Using Directory Permissions
- /etc/utmp file : utmp and wtmp Files
- intruder's modifications to : Changes in file and directory protections
- modem devices : Setting Up the UNIX Device
- modem files : Hooking Up a Modem to Your Computer
- of NIS+ objects : NIS+ Limitations
- octal
- of .rhosts file : The ~/.rhosts file
- SUID programs
- symbolic links and : File Permissions in Detail
- umasks
- UUCP : Special permissions
- Permissions file
- personnel : (see employees)
- PGP (Pretty Good Privacy)
-
- PGP: Pretty Good Privacy
- PGP detached signatures
- -eat and -seat options : Encrypting a message
- encrypting message with : Encrypting a message
- encrypting Web documents : Eavesdropping Over the Wire
- -ka option : Creating your PGP public key
- -kg option : Creating your PGP public key
- -kvc option : PGP detached signatures
- -kxaf option : Creating your PGP public key
- -o option : PGP detached signatures
- -sat option : Adding a digital signature to an announcement
- -sb option : PGP detached signatures
- software signature : Software Resources
- ph (phonetutorial) server : Replacing finger
- phantom mail : Using sendmail to receive email
- physical security
-
- Physical Security
- "Nothing to Lose?"
- access control : Physical Access
- of backups
- checklist for : Physical Security
- modems
- read-only filesystems : Read-only Filesystems
- signal grounding : Signal Grounding
- PIDs (process IDs)
- Pieprzyk, Josef : HAVAL
- PingWare program : PingWare
- pipe (in Swatch program) : The Swatch Configuration File
- pipes
- pipes (for smoking) : Smoke
- piracy of software
-
- Software piracy and the SPA
- (see also software)
- pirated software : (see software)
- plaintext attacks : Cryptographic Strength
- plan file : The .plan and .project files
- platforms : (see operating systems)
- play accounts : (see open accounts)
- playback attacks : Using the ticket granting ticket
- plus sign (+)
-
- in hosts.equiv file : Searching for .rhosts files
- in NIS
- Point-to-Point Protocol (PPP) : Modems and UNIX
- policy, security
-
- What Is an Operating System?
- Policies and Guidelines
- Final Words: Risk Management Means Common Sense
- Policies and Guidelines
- cost-benefit analysis
- risk assessment
- role of
- politics : Authors
- polyalphabetic ciphers : The Enigma Encryption System
- polygraph tests : Background Checks
- POP (Post Office Protocol) : Post Office Protocol (POP) (TCP Ports 109 and 110)
- popen function
- pornography : Pornography and Indecent Material
- port numbers
- portable computers : Portables
- portable I/O library : History of UNIX
- portmap service
- portmapper program
- ports
-
- TCP
- The /etc/services File
- Table of IP Services
- trusted : (see trusted, ports)
- positivity : Be positive
- POSIX
-
- History of UNIX
- Software Quality
- Process groups and sessions
- chown command and : chown: Changing a File's Owner
- Post Office Protocol : (see POP)
- postmaster, contacting : How to contact the system administrator of a computer you don't know
- PostScript files : Viruses
- power outages, logging : Exception and activity reports
- power surges
- PPP (Point-to-Point Protocol)
- preserve program : Another SUID example: IFS and the /usr/lib/preserve hole
- Pretty Good Privacy : (see PGP)
- prevention, cost of
- primary group : Groups and Group Identifiers (GIDs)
- principals, NIS+ : What NIS+ Does
- print through process : Verify your backups
- printers
-
- buffers : Printer buffers
- /etc/hosts.lpd file : /etc/hosts.lpd file
- logging to : Logging to a printer
- output from : Printer output
- ports for : Auxiliary ports on terminals
- priority of processes : Process priority and niceness
- privacy
-
- Planning Your Security Needs
- Confidential Information
- Integrity Management
- Protecting Data
- Key Switches
- (see also encryption; integrity)
- Electronic Communications Privacy Act (ECPA) : Federal Computer Crime Laws
- Secure RPC : Limitations of Secure RPC
- private-key cryptography
- privilege testing (modem) : Privilege testing
- privileges, file : (see permissions)
- privileges, SUID : (see SUID/SGID programs)
- processes
-
- About Processes
- Running the User's Shell
- accounting
- group IDs
- overload attacks
- priority of : Process priority and niceness
- scheduler : Process priority and niceness
- procmail system : forward, .procmailrc
- procmailrc file : forward, .procmailrc
- profile file
- coded threats
-
- Protecting Against Programmed Threats
- Shared Libraries
- authors of : Authors
- checklist for : Protecting Against Programmed Threats
- protection from : Protecting Yourself
- references on : Computer Viruses and Programmed Threats
- developing : Writing Secure SUID and Network Programs
-
- references for : UNIX Developing and System Administration
- programs
-
- CGI : (see CGI, scripts)
- integrity of : (see integrity, data)
- for network services : Tips on Writing Network Programs
- rabbit
- running simultaneously : Tips on Avoiding Security-related Bugs
- secure : Writing Secure SUID and Network Programs
- worms : Worms
- Project Athena : (see Kerberos system)
- project file : The .plan and .project files
- proprietary ownership notices : Other Tips
- prosecution, criminal
- protocols
-
- Packets and Protocols
- (see also under specific protocol)
- IP : (see IP protocols)
- Protocols table (NIS+) : NIS+ Tables
- proxies, checklist for : Wrappers and Proxies
- pruning the wtmp file : Pruning the wtmp file
- ps command
- pseudo-devices : Device Files
- pseudorandom functions : Tips on Generating Random Numbers
- PUBDIR= command : Permissions Commands
- public-key cryptography
-
- Common Cryptographic Algorithms
- Summary of Public Key Systems
- RSA and Public Key Cryptography
- Strength of RSA
- Digital Signatures
- Controlling Access to Files on Your Server
- Dependence on Third Parties
- breaking : Limitations of Secure RPC
- PGP : Creating your PGP public key
- proving identity with : Proving your identity
- publicity hounds : Authors
- publicizing security holes : Going Public
- publickey file : Creating passwords for users
- Purdue University (PCERT) : Purdue University
- Purify : Tips on Avoiding Security-related Bugs
- pwck command : Monitoring File Format
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
copyleft 1999 Anonymous All Rights Reserved.
[ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | Practical Security ]