Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: U
- Department of Energy : France: universities, Ministry of Research and Education in France, CNRS, CEA, INRIA, CNES, INRA, IFREMER, and EDF
- Department of the Navy : S. Department of the Navy
- jungle law : (see laws)
- Secret Service
- UDP (User Datagram Protocol)
-
- UDP
- The /etc/inetd Program
- (see also network services)
- packet relayer : UDP Packet Relayer
- ufsdump : (see dump/restore program)
- UIDs (user identifiers)
-
- Users and Groups
- Multiple Accounts with the Same UID
- real versus effective
- RPC requests and : AUTH_UNIX
- su command and : su command and /etc/utmp and /var/adm/wtmp files
- of web servers : The Server's UID
- zero : (see root account; superuser)
- UK Defense Research Agency : UK: Defense Research Agency
- ulimit command : Soft Process Limits: Preventing Accidental Denial of Service
- Ultrix : History of UNIX
-
- trusted path : Trusted path
- UUCP : Format of USERFILE entry without system name
- umask
- unattended terminals
- uninterruptable power supply (UPS)
- Unisys : UK: other government departments and agencies
- universes : Dual Universes
- UNIX : Introduction
-
- add-on functionality of : Add-On Functionality Breeds Problems
- conventional passwords : Conventional UNIX Passwords
- DAC (Discretionary Access Controls) : Groups and Group Identifiers (GIDs)
- DNS under : DNS under UNIX
- encryption programs for
- filesystem
- history of : History of UNIX
- modems and
- networking and : Networking and UNIX
- operating systems : (see operating systems)
- primary network services
- process scheduler : Process priority and niceness
- processes : (see processes)
- developing references : UNIX Developing and System Administration
- published resources for : UNIX Security References
- security and
- signals : Signals
- starting up
- Version 6 : History of UNIX
- viruses : (see viruses)
- web server on : Running a Secure Server
- unlinked files : Hidden space
- unowned files : Unowned files
- unplugging connections : Getting Rid of the Intruder
- unpredictability of randomness : Tips on Generating Random Numbers
- upgrades, logging : Exception and activity reports
- uploading stored information : Protecting Local Storage
- UPS (uninterruptable power supply)
- uptime command : Accounts That Run a Single Command
- urandom device : Other random number generators
- Usenet
-
- Network News Transport Protocol (NNTP) (TCP Port 119)
- Usenet Groups
- (see also NNTP)
- cleanup scripts : Abusing Automatic Mechanisms
- encryption for : (see ROT13 algorithm)
- posting breakins to : Resuming Operation
- reporting security holes on : Going Public
- User Datagram Protocol (UDP) : UDP
- user error : taxonomy of computer failures
- user IDs : (see UIDs)
- USERFILE file (UUCP)
- usermod command
-
- -e option : Finding Dormant Accounts
- -f option : Finding Dormant Accounts
- -s option : Restricting Logins
- usernames : Usernames
-
- aliases for : Account Names Revisited: Using Aliases for Increased Security
- doubling as passwords (Joes) : Smoking Joes
- last command and : last Program
- as passwords : Joetest: a simple password cracker
- special
- using someone else's
- users
-
- Users, Groups, and the Superuser
- Users and Groups
- Multiple Accounts with the Same UID
- (see also groups; su command)
- assigning passwords to : Assigning Passwords to Users
- auditing who is logged in
- authentication for Web : Setting Up Web Users and Passwords
- becoming other
- checklist for : Users and Passwords
- dormant accounts and
- identifiers for : (see UIDs)
- importing to NIS server
- letting in threats : Entry
- limited : Limited users
- logging
- NIS passwords for : Creating passwords for users
- nobody (Secure RPC) : Creating passwords for users
- notifying about monitoring : Other Tips
- proving identity of : Proving your identity
- recognizing as intruders
- restricting certain : Controlling Access to Files on Your Server
- root : (see root account; superuser)
- sending messages to : The syslog.conf Configuration File
- summarizing system usage by : quot command
- tainting : Tainting with Perl
- training : Initial Training
- UIDs : (see UIDs)
- unattended terminals
- USERFILE entries for : USERFILE entries for local users
- www : Understand Your Server's Directory Structure
- users command
- USG (UNIX Support Group) : History of UNIX
- /usr directory
-
- The Bad su Log
- (see also /var directory)
- backing up /usr/bin : What Should You Back Up?
- /usr/adm directory : Other files
- /usr/adm/lastlog file : lastlog File
- /usr/adm/messages file : messages Log File
- /usr/bin directory
- /usr/bin/uudecode : (see uudecode program)
- /usr/etc/yp/makedbm program : Setting up netgroups
- /usr/lib/aliases file : /usr/lib/aliases, /etc/aliases, /etc/sendmail/aliases, aliases.dir, or aliases.pag
- /usr/lib directory : Other files
-
- in restricted filesystems : Restricted Filesystem
- /usr/lib/preserve program : Another SUID example: IFS and the /usr/lib/preserve hole
- /usr/lib/sendmail : (see sendmail)
- /usr/lib/uucp/Devices file : Hooking Up a Modem to Your Computer
- /usr/lib/uucp directory
- /usr/lib/uucp/L-devices file : Hooking Up a Modem to Your Computer
- /usr/lib/uucp/L.cmds file : (see cmds file)
- /usr/lib/uucp/L.sys file : Security of L.sys and Systems Files
- /usr/lib/uucp/Permissions file : (see Permissions file)
- /usr/lib/uucp/Systems file : Security of L.sys and Systems Files
- /usr/lib/uucp/USERFILE file
- /usr/local/bin : What Is Computer Security?
- /usr/local/bin directory : PATH attacks
- /usr/local/etc/http/logs directory : access_log Log File
- /usr/local/lib directory : Other files
- /usr/sbin/rexecd : (see rexec service)
- /usr/spool/cron/crontabs directory : Automatic Execution of Cleanup Scripts
- /usr/spool/uucp directory : How the UUCP Commands Work
- /usr/spool/uucppublic : (see uucppublic directory)
- /usr/ucb directory : Viruses
- utility programs : What Is an Operating System?
- utimes commandn : Never Trust Anything Except Hardcopy
- utmp file
- uucheck program : uucheck: Checking Your Permissions File
- uucico program
- uucp (user)
- uucp command : uucp Command
- UUCP system
-
- Multiple Accounts with the Same UID
- Modems and UNIX
- UUCP
- Summary
- additional logins : Assigning Additional UUCP Logins
- BNU
- checklist for : UUCP
- cleanup scripts
- early security problems : Early Security Problems with UUCP
- HoneyDanBer (HDB) : Versions of UUCP
- logging : uucp Log Files
- mail forwarding : Mail Forwarding for UUCP
- naming computer : Permissions Commands
- over networks : UUCP Over Networks
- NFS server and : UUCP and Security
- passwords for : Establishing UUCP Passwords
- Taylor : Versions of UUCP
- over TCP : UUCP over TCP (TCP Port 540)
- Version 2
- uucpa account : Assigning Additional UUCP Logins
- uucpd program : UUCP Over Networks
- uucppublic directory
- uudecode program : Using sendmail to receive email
- uuencode program : Ways of improving the security of crypt
- uux command : uux Command
-
- - (hyphen) option : uux Command
- -r option : How the UUCP Commands Work
- uuxqt program : Format of USERFILE entry without system name
- uuxqtcmds files : cmds: Providing Remote Command Execution
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
copyleft 1999 Anonymous All Rights Reserved.
[ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | Practical Security ]