Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: L
- L-devices file
: 14.5.1. Hooking Up a Modem to Your Computer
- L.cmds file
: 15.4.3. L.cmds: Providing Remote Command Execution
- L.sys file
: 15.3.3. Security of L.sys and Systems Files
- Lai, Xuejia
: 6.4.1. Summary of Private Key Systems
- laid-off employees
: 13.2.6. Departure
- LaMacchia, Brian
: 19.3.4. Limitations of Secure RPC
- LANs (local area networks)
       
  - 16.1. Networking
  
- 16.2. IPv4: The Internet Protocol Version 4
  
- laptop computers
: 12.2.6.3. Portables
- last program
  
  - 8.4.3. Finding Dormant Accounts
  
- 10.1.2. utmp and wtmp Files
  
- 10.1.3. last Program
  
- 10.1.3.1. Pruning the wtmp file
  
- 15.3.1. Assigning Additional UUCP Logins
  
- -f option
: 10.1.3.1. Pruning the wtmp file
      
- lastcomm program
 
  - 10.2. The acct/pacct Process Accounting File
  
- 10.2.2. Accounting with BSD
  
- lastlog file
: 10.1.1. lastlog File
- laws
  
  - 26. Computer Security and U.S. Law
  
- 26.4.7. Harassment, Threatening Communication,  and Defamation
  
- backups and
: 7.1.7. Legal Issues
  
- checklist for
: A.1.1.25. Chapter 26: Computer Security and U.S. Law
  
- copyright
  
     
    - 9.2.1. Comparison Copies
    
- 26.4.2. Copyright Infringement
    
- 26.4.2.1. Software piracy and the SPA
  
   
  - criminal prosecution
  
 
    - 26.2. Criminal Prosecution
    
- 26.2.7. A Final Note on Criminal Actions
  
  
  - Electronic Communications Privacy Act (ECPA)
: 26.2.3. Federal Computer Crime Laws
  
- encryption
  
  
    - 6.7. Encryption and U.S. Law
    
- 6.7.2. Cryptography and Export Controls
    
- 12.2.6.3. Portables
  
   
  - enforcement agencies
: 14.4.4.1. Kinds of eavesdropping
  
- export
  
  
    - 6.4.4.1. Use and export of DES
    
- 6.7.2. Cryptography and Export Controls
    
- 26.4.1. Munitions Export
  
   
  - federal enforcement
  
 
    - 26.2.2. Federal Jurisdiction
    
- 26.2.3. Federal Computer Crime Laws
  
  
  - indecent material
: 26.4.5. Pornography and Indecent Material
  
- liability
  
  
    - 26.4. Other Liability
    
- 26.4.7. Harassment, Threatening Communication,  and Defamation
  
  
  - monitoring keystrokes
: 24.2.3. Monitoring the Intruder
  
- non-citizen access
: 26.4.1. Munitions Export
  
- patents
: 26.4.4. Patent Concerns
  
- for portable computers
: 12.2.6.3. Portables
  
- resources on
: D.1.1. Other Computer References
  
- search warrants
  
      
    - 26.2.4. Hazards of Criminal Prosecution
    
- 26.2.5. If You or One of Your Employees Is a Target  of an Investigation...
  
  
  - smoking
: 12.2.1.2. Smoke
  
- state and local enforcement
: 26.2.1. The Local Option
  
- trademarks
: 26.4.3. Trademark Violations
  
- vendor liability
: 18.5.2. Trusting Your Software Vendor
    
- lawsuits (civil)
: 26.3. Civil Actions
- leased telephone lines
: 14.5.4. Physical Protection of Modems
- least privilege
   
  - 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
  
- 13.2.5. Least Privilege and Separation of Duties
  
- Lee, Ying-Da
: 22.4. SOCKS
- Lesk, Mike
  
  - 1.3. History of UNIX
  
- 15.2. Versions of UUCP
  
- liability, legal
 
  - 26.4. Other Liability
  
- 26.4.7. Harassment, Threatening Communication,  and Defamation
  
- /lib directory
: 11.5.3.6. Other files
- license agreements
: 18.5.2. Trusting Your Software Vendor
  
  - comparison copies and
: 9.2.1. Comparison Copies
 
- lie-detector tests
: 13.1. Background Checks
- lightning
  
  - 12.2. Protecting Computer Hardware
  
- 12.2.1.9. Lightning
  
- limit command
: 25.2.5. Soft Process Limits: Preventing Accidental  Denial of Service
- Limit command (<Directory>)
: 18.3.2. Commands Within the <Directory> Block
- limited user access
: 8.1.5.1. Limited users
- link-level security
: 16.3.1. Link-level Security
- links
     
  - encryption of
: 18.4.1. Eavesdropping Over the Wire
  
- link-level security
: 16.3.1. Link-level Security
  
- static
: 23.4. Tips on Writing SUID/SGID Programs
  
- symbolic, following (Web)
  
    
    - 18.2.2.2. Additional configuration issues
    
- 18.3.2. Commands Within the <Directory> Block
  
  
- lint program
: 23.2. Tips on Avoiding Security-related Bugs
- LINUX operating system
  
  - 1.3. History of UNIX
  
- 3.3. Entering Your Password
  
- 23.1.2.1. What they found
  
- ext2 filesystem
: 25.2.2.6. Reserved space
  
- random number generators
: 23.7.4. Other random number generators
     
- Live Script
: 18.5.2. Trusting Your Software Vendor
- load shedding
: 23.3. Tips on Writing Network Programs
- local
   
  - area networks (LANs)
  
 
    - 16.1. Networking
    
- 16.2. IPv4: The Internet Protocol Version 4
  
  
  - authentication (NIS+)
: 19.5.4. Using NIS+
  
- law enforcement
: 26.2.1. The Local Option
  
- storage
  
   
    - 12.3.4. Protecting Local Storage
    
- 12.3.4.5. Function keys
  
  
  - users, and USERFILE
: 15.4.1.2. USERFILE entries for local users
 
- lock program
: 12.3.5.2. X screen savers
- locked accounts
: 3.3. Entering Your Password
- locking files
: 23.2. Tips on Avoiding Security-related Bugs
- log files
    
  - 11.5.3.5. System initialization files
  
- (see also logging)
  
- access_log
  
   
    - 10.3.5. access_log Log File
    
- 18.4.2. Eavesdropping Through Log Files
  
  
  - aculog
: 10.3.1. aculog File
  
- agent_log file
: 18.4.2. Eavesdropping Through Log Files
  
- backing up
: 10.2.2. Accounting with BSD
  
- lastlog
: 10.1.1. lastlog File
  
- managing
: 10.8. Managing Log Files
  
- manually generated
  
      
    - 10.7. Handwritten Logs
    
- 10.7.2.2. Informational material
  
  
  - per-machine
: 10.7.2. Per-Machine Logs
  
- per-site
: 10.7.1. Per-Site Logs
  
- refer_log file
: 18.4.2. Eavesdropping Through Log Files
  
- sulog
: (see sulog file)
  
- system clock and
: 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
  
- tracking intruders with
: 24.3. The Log Files: Discovering an Intruder's Tracks
  
- /usr/adm/messages
: 10.2.3. messages Log File
  
- utmp and wtmp
  
        
    - 10.1.2. utmp and wtmp Files
    
- 10.1.3.1. Pruning the wtmp file
  
  
  - uucp
: 10.3.4. uucp Log Files
  
- /var/adm/acct
: 10.2. The acct/pacct Process Accounting File
  
- /var/adm/loginlog
: 10.1.4. loginlog File
  
- of Web servers
: 18.4.2. Eavesdropping Through Log Files
  
- xferlog
: 10.3.3. xferlog Log File
     
- logdaemon package
: 17.3.18.5. Searching for .rhosts files
- logger command
: 10.5.3. syslog Messages
- logging
   
  - 7.1.1.1. A taxonomy of computer failures
  
- 10. Auditing and Logging
  
- 10.8. Managing Log Files
  
- 11.5.3.5. System initialization files
  
- 21.5. Special Considerations
  
- 23.2. Tips on Avoiding Security-related Bugs
  
- (see also log files)
  
- across networks
: 10.5.2.2. Logging across the network
  
- archiving information
: 7.4.2. Simple Archives
  
- breakins
: 24.1.2. Rule #2: DOCUMENT
  
- C2 audit
: 10.1. The Basic Log Files
  
- checklist for
: A.1.1.9. Chapter 10: Auditing and Logging
  
- critical messages
  
             
    - 10.5.3. syslog Messages
    
- 10.5.3.1. Beware false log entries
  
  
  - downloaded files
  
 
    - 10.3.3. xferlog Log File
    
- 10.3.5. access_log Log File
  
  
  - failed su attempts
: 4.3.7. The Bad su Log
  
- file format
: 8.2. Monitoring File Format
  
- files transferred by FTP
: 10.3.3. xferlog Log File
  
- to hardcopy device
: 10.5.2.1. Logging to a printer
  
- individual users
  
     
    - 10.4. Per-User Trails in the Filesystem
    
- 10.4.3. Network Setup
  
  
  - manually
  
 
    - 10.7. Handwritten Logs
    
- 10.7.2.2. Informational material
  
  
  - mistyped passwords
: 10.5.3. syslog Messages
  
- network services
: 10.3.6. Logging Network Services
  
- outgoing mail
: 10.4.2. Mail
  
- potentially criminal activity
: 26.2.6. Other Tips
  
- Swatch program
  
     
    - 10.6. Swatch: A Log File Tool
    
- 10.6.2. The Swatch Configuration File
    
- E.4.9. Swatch
  
   
  - syslog facility
  
 
    - 10.5. The UNIX System Log (syslog) Facility
    
- 10.5.3.1. Beware false log entries
  
  
  - UUCP
: 10.3.4. uucp Log Files
  
- what not to log
: 10.5.3. syslog Messages
  
- logging in
 
  - C.5. Starting Up UNIX and Logging In
  
- C.5.3. Running the User's Shell
  
- FTP access without
: 17.3.2.7. Allowing only FTP access
  
- Kerberos system
: 19.6.1.1. Initial login
  
- last program
  
     
    - 10.1.3. last Program
    
- 10.1.3.1. Pruning the wtmp file
  
  
  - lastlog file
: 10.1.1. lastlog File
  
- passwords
: 3.3. Entering Your Password
  
- preventing
  
   
    - 8.4. Managing Dormant Accounts
    
- 8.4.3. Finding Dormant Accounts
  
  
  - restricting
: 8.3. Restricting Logins
  
- with Secure RPC
: 19.3.3. Using Secure RPC
  
- startup file attacks
  
   
    - 11.5.2. Start-up File Attacks
    
- 11.5.2.7. Other initializations
  
  
- logging out with Secure RPC[logging out:Secure RPC]
: 19.3.3. Using Secure RPC
- logic bombs
  
  - 11.1. Programmed Threats: Definitions
  
- 11.1.3. Logic Bombs
  
- 27.2.2. Viruses on the Distribution Disk
   
- .login file
 
  - 8.5.1. Secure Terminals
  
- 11.5.2.1. .login, .profile, /etc/profile
  
- 24.4.1.6. Changes to startup files
   
- login program
 
  - 8.6. The UNIX Encrypted Password System
  
- 11.1.2. Back Doors and Trap Doors
  
- 19.5.4. Using NIS+
  
- 26.2.6. Other Tips
  
- 27.1.2. Trusting Trust
     
- logindevperm file
: 17.3.21.1. /etc/fbtab and /etc/logindevperm
- loginlog file
: 10.1.4. loginlog File
- logins
   
  - authentication
: 17.3.5. TACACS (UDP Port 49)
  
- FTP
: 17.3.2. (FTP) File Transfer Protocol (TCP Ports 20 and 21)
  
- UUCP, additional
: 15.3.1. Assigning Additional UUCP Logins
   
- logins command
: 8.1.1. Accounts Without Passwords
 
  - -d option
: 8.2. Monitoring File Format
  
- -p option
: 8.2. Monitoring File Format
  
- LOGNAME= command
 
  - 15.5.1.3. A Sample Permissions file
  
- 15.5.2. Permissions Commands
  
- .logout file
: 19.3.3. Using Secure RPC
- long distance service
  
  - 14.5.4. Physical Protection of Modems
  
- 17.3.3. TELNET (TCP Port 23)
  
- losses, cost of preventing
 
  - 2.3. Cost-Benefit Analysis
  
- 2.3.4. Convincing Management
  
- lp (user)
: 4.1. Users and Groups
- lpd system
: 17.3.18.6. /etc/hosts.lpd file
- lrand48 function
: 23.7.3. drand48  (  ), lrand48  (  ), and mrand48  (  )
- ls command
    
  - 5.1.4. Using the ls Command
  
- 5.1.5. File Times
  
- 9.2.2. Checklists and Metadata
  
- -c option
: 5.1.5. File Times
  
- -d option
: 9.2.2.1. Simple listing
  
- -e option
: 5.2.5.1. AIX Access Control Lists
  
- -F option
: 5.1.4. Using the ls Command
  
- -g option
: 5.1.4. Using the ls Command
  
- -H option
: 5.9.2. Context-Dependent Files
  
- -i option
: 9.2.2.1. Simple listing
  
- -l option
  
           
    - 5.1.4. Using the ls Command
    
- 5.2.5.1. AIX Access Control Lists
    
- 5.5.1. SUID, SGID, and Sticky Bits
  
   
  - -q option
: 5.4. Using Directory Permissions
  
- -u option
: 5.1.5. File Times
  
- -c option
: 24.4.1.6. Changes to startup files
  
- -H option
: 24.4.1.7. Hidden files and directories
  
- -l option
: 24.4.1.6. Changes to startup files
     
- lsacl command
: 5.2.5.2. HP-UX access control lists
- lsof program
: 25.2.2.7. Hidden space
- lstat function
: 23.2. Tips on Avoiding Security-related Bugs
- Lucifer algorithm
    
  - 6.4.4. DES
  
- 6.4.4.3. DES strength
  
- LUCIFER cipher
: 6.4.4. DES
 
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
 O'Reilly & Associates, Inc.
All Rights Reserved.