Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: R
- rabbit programs
- race conditions : Tips on Avoiding Security-related Bugs
- radio
-
- eavesdropping : Eavesdropping by radio and using TEMPEST
- transmissions : Kinds of eavesdropping
- transmitters : Electrical noise
- rain : (see water)
- RAM theft : Preventing Theft
- rand function : rand ( )
- random device : Other random number generators
- random function : random ( )
- random numbers : Tips on Generating Random Numbers
- raw devices : Device Files
- rc directory : Process #1: /etc/init
- RC2, RC4, and RC5 algorithms
- RC4 and RC5 algorithms : Summary of Private Key Systems
- rcp command
- RCS (Revision Control System)
- rdist program
- rdump/rrestore program : Backups Across the Net
- read permission
- read system call : File Permissions in Detail
-
- time-outs on : Tips on Writing Network Programs
- read-only exporting filesystems : Writable system files and directories
- read-only filesystems : Read-only Filesystems
- READ= command : Permissions Commands
- readdir library call : Using Directory Permissions
- real UIDs/GIDs
- realpath function : Tips on Avoiding Security-related Bugs
- reauthentication
-
- Kerberos : Using Kerberos
- Secure RPC : Setting the window
- Receive Data (RD) : The RS-232 Serial Protocol
- Redman, Brian E. : Versions of UUCP
- refer_log file : Eavesdropping Through Log Files
- reflectors (in Enigma system) : The Enigma Encryption System
- reformatting attack : Destructive Attacks
- relative humidity : Humidity
- relative pathnames : Current Directory and Paths
- remote
-
- command execution
- comparison copies : Remote copies
- computers
-
- transferring files to : uucp Command
- file access (UUCP)
- network filesystems : Turning Off SUID and SGID in Mounted Filesystems
- procedure calls : (see RPCs)
- remote file
- remote.unknown file : Security in BNU UUCP
- renice command
- replay attacks
- reporting security holes : Going Public
- Request to Send (RTS) : The RS-232 Serial Protocol
- REQUEST= command
- reserved memory space : Reserved space
- resolution, time : Picking a Random Seed
- resolver library (bind) : DNS under UNIX
- resolving (DNS) : Domain Name System (DNS) (TCP and UDP Port 53)
- response teams
- restore : (see dump/restore program)
- restricted
-
- filesystems
- FTP : Restricting FTP with the standard UNIX FTP server
- logins : Restricting Logins
- shells
- su use : Restricting su
- restrictmailq (sendmail) : Improving the security of Berkeley sendmail V8
- retention of backups
- return calls : Tips on Avoiding Security-related Bugs
- reverse lookup
- Revision Control System (RCS)
- revocation certificate : Creating your PGP public key
- rexd service : AUTH_KERB
- rexec service : rexec (TCP Port 512)
- RFC 1750 : Picking a Random Seed
- rhosts file
-
- Network Setup
- The ~/.rhosts file
- Searching for .rhosts files
- back door in : Back Doors and Trap Doors
- intruder's changes to : Changes in .rhosts files
- searching for : Searching for .rhosts files
- Ring Indicator (RI) : The RS-232 Serial Protocol
- RIP (Routing Internet Protocol) : Routing Internet Protocol (RIP routed) (UDP Port 520)
- risk assessment
- risks : (see threats)
- Ritchie, Dennis : History of UNIX
- Rivest, Ronald L.
- RJE (Remote Job Entry) : The /etc/passwd File
- rlogin command
- rlogind command : rlogin and rsh (TCP Ports 513 and 514)
- rm command
-
- Using Directory Permissions
- cmds: Providing Remote Command Execution
- and deep tree structures : Tree-structure attacks
- rmail program : cmds: Providing Remote Command Execution
- root account
-
- Users, Groups, and the Superuser
- Users and Groups
- The Superuser
- The problem with the superuser
- Problems with SUID
- (see also superuser)
- abilities of : What the Superuser Can and Cannot Do
- chroot
- immutable files and : Immutable and Append-Only Files
- network services with : Security Implications of Network Services
- protecting
- on remote machine, fingering : How to contact the system administrator of a computer you don't know
- single-command accounts and : Accounts That Run a Single Command
- web server as : The Server's UID
- root directory : Directories
-
- backups of : Types of Backups
- UUCP access from : Some bad examples
- root option for /etc/exports : /etc/exports
- ROT13 algorithm
- rotating backup media
- routed daemon : Routing Internet Protocol (RIP routed) (UDP Port 520)
- routers, intelligent : Setting Up the Choke
- routing : Routing
- Routing Internet Protocol : (see RIP)
- RPC table (NIS+) : NIS+ Tables
- rpc.rexdserver : RPC rpc.rexd (TCP Port 512)
- rpcbind : (see portmapper program)
- RPCs (remote procedure calls)
-
- RPC rpc.rexd (TCP Port 512)
- RPC, NIS, NIS+, and Kerberos
- SESAME
- authentication of
- portmapper program : Sun RPC's portmapper (UDP and TCP Ports 111)
- Secure : (see Secure RPC)
- spoofing : Spoofing RPC
- RS-232 serial protocol : The RS-232 Serial Protocol
- RSA algorithm
- rsh (restricted shell)
- rsh command : Security and Nameservice
- rshd program : Back Doors and Trap Doors
- RUID : (see real UIDs/GIDs)
- runacct command : The acct/pacct Process Accounting File
- ruusend command : cmds: Providing Remote Command Execution
- rw option for /etc/exports : /etc/exports
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
copyleft 1999 Anonymous All Rights Reserved.
[ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | Practical Security ]