Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: P
- P configuration command
- sendmail, 5.3.9. Priority
- sendmail, 14.4. Precedence
- sendmail, 35.8.1. The P Configuration Command
- p flag
: sendmail, 30.8. Alphabetized F= Flags
- P flag
: sendmail, 30.8. Alphabetized F= Flags
- P line (qf file)
: sendmail, 23.9. The qf File Internals
- $p macro
: sendmail, 31.10. Alphabetized Reference
- p option
: (see PrivacyOptions (p) option)
- P option
: (see PostmasterCopy (P) option)
- -p switch (sendmail)
: sendmail, 36.7. Alphabetized Reference
- P= equate
- sendmail, 6.2. Define a Mail Delivery Agent
- sendmail, 6.3. The local Delivery Agent
- sendmail, 22.4.4. The P= of Delivery Agents
- sendmail, 30.4. The Equates
- pacct file
: Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File
- pack program
: Practical UNIX & Internet Security, 6.6.1.2. Ways of improving the security of crypt
- packages, auditing
: Building Internet Firewalls, 5.8.5.1. Auditing packages
- packet filtering
- Building Internet Firewalls, 4.1. Some Firewall Definitions
- Building Internet Firewalls, 4.1.1. Packet Filtering
- Building Internet Firewalls, 6. Packet Filtering
- TCP/IP Network Administration, 1.7. Application Layer
- TCP/IP Network Administration, 11.7.1. Packet Filters
- TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- by address
: Building Internet Firewalls, 6.6. Filtering by Address
- advice for
: Building Internet Firewalls, 6.5. Conventions for Packet Filtering
- Archie
: Building Internet Firewalls, 8.7.3.1. Packet filtering characteristics of
- bugs in packages
: Building Internet Firewalls, 6.1.2.1. Current filtering tools are not perfect
- choosing a router
: Building Internet Firewalls, 6.8. Choosing a Packet Filtering
- configuring router
: Building Internet Firewalls, 6.2. Configuring a Packet Filtering
- constructing filters
: TCP/IP Network Administration, 11.7.1. Packet Filters
- conventions for
: Building Internet Firewalls, 6.8.3. It Should Allow Simple Specification
- DNS
- Building Internet Firewalls, 8.10.1. Packet Filtering Characteristics of
- Building Internet Firewalls, 8.10.5.5. What your packet filtering system
- dynamic
: Building Internet Firewalls, 6.3.3.2. UDP
- example of
: Building Internet Firewalls, 6.10. Putting It All Together
- with exterior router
: Building Internet Firewalls, 4.2.3.4. Exterior router
- finger
: Building Internet Firewalls, 8.8.1.1. Packet filtering characteristics of
- in firewalls
: TCP/IP Network Administration, 12.7. Firewalls
- FSP
: Building Internet Firewalls, 8.2.3.1. Packet filtering characteristics of
- FTP
: Building Internet Firewalls, 8.2.1.1. Packet filtering characteristics of
- Gopher
: Building Internet Firewalls, 8.7.1.1. Packet filtering characteristics of
- HTTP
: Building Internet Firewalls, 8.6.1. Packet Filtering Characteristics of
- ICMP
: Building Internet Firewalls, 8.12.5.1. Packet filtering characteristics of
- inbound versus outbound
: Building Internet Firewalls, 6.8.6. It Should Apply Rules Separately to
- with interior router
: Building Internet Firewalls, 4.2.3.3. Interior router
- IP
: (see IP)
- IRC
: Building Internet Firewalls, 8.9.2.1. Packet filtering characteristics of
- lp
: Building Internet Firewalls, 8.17.3. Packet Filtering and Proxying
- lpr
: Building Internet Firewalls, 8.17.1. Packet Filtering Characteristics of
- NFS
: Building Internet Firewalls, 8.14.1. Packet Filtering Characteristics of
- NIS
: Building Internet Firewalls, 8.15.1. Packet Filtering Characteristics of
- NNTP
- Building Internet Firewalls, 8.5.1. Packet Filtering Characteristics of
- Building Internet Firewalls, 8.5.4. Good Ways to Set up
- NTP
: Building Internet Firewalls, 8.13.1. Packet Filtering Characteristics of
- performance level of
: Building Internet Firewalls, 6.8.1. It Should Have Good Enough
- perimeter, and encryption
: Building Internet Firewalls, 10.5.3. Where Do You Encrypt?
- ping
: Building Internet Firewalls, 8.12.3.1. Packet filtering characteristics of
- POP
: Building Internet Firewalls, 8.1.2.1. Packet filtering characteristics of
- primitives used, listed
: TCP/IP Network Administration, 11.7.1. Packet Filters
- r commands
: Building Internet Firewalls, 8.4.1.1. Packet filtering characteristics of
- rex
: Building Internet Firewalls, 8.4.3.1. Packet filtering characteristics of
- rexec
: Building Internet Firewalls, 8.4.2.1. Packet filtering characteristics of
- RIP
: Building Internet Firewalls, 8.12.2.1. Packet filtering characteristics of
- rules for
: Building Internet Firewalls, 6.5. Conventions for Packet Filtering
- in screened host architecture
: Building Internet Firewalls, 9.2.2. Packet Filtering Rules
- in screened subnet architecture
: Building Internet Firewalls, 9.1.2. Packet Filtering Rules
- sequence of
: Building Internet Firewalls, 6.8.5. It Should Apply Rules in the Order
- screened host architecture
: Building Internet Firewalls, 4.2.2. Screened Host Architecture
- by service
: Building Internet Firewalls, 6.7. Filtering by Service
- SMTP
: Building Internet Firewalls, 8.1.1.4. Packet filtering characteristics of
- SNMP
: Building Internet Firewalls, 8.12.1.1. Packet filtering characteristics of
- by source port
: Building Internet Firewalls, 6.7.4. Risks of Filtering by Source
- syslog
: Building Internet Firewalls, 8.11.1. Packet Filtering Characteristics of
- talk
: Building Internet Firewalls, 8.9.1.1. Packet filtering characteristics of
- Telnet
: Building Internet Firewalls, 8.3.1. Packet Filtering Characteristics of
- testing
: Building Internet Firewalls, 6.8.7. It Should Be Able to Log Accepted and
- TFTP
: Building Internet Firewalls, 8.2.2.1. Packet filtering characteristics of
- tools for
: Building Internet Firewalls, B.3. Packet Filtering Tools
- traceroute
: Building Internet Firewalls, 8.12.4.1. Packet filtering characteristics of
- transparency of
: Building Internet Firewalls, 6.1.1.2. Packet filtering doesn't require user knowledge or
- UUCP
: Building Internet Firewalls, 8.2.4.1. Packet filtering characteristics of
- WAIS
: Building Internet Firewalls, 8.7.2.1. Packet filtering characteristics of
- where to do
: Building Internet Firewalls, 6.8.8. It Should Have Good Testing and
- whois
: Building Internet Firewalls, 8.8.2.1. Packet filtering characteristics of
- X11
: Building Internet Firewalls, 8.16.1. Packet Filtering Characteristics of
- packet sniffing
- Building Internet Firewalls, 10.1.2. Packet Sniffing
- Practical UNIX & Internet Security, 16.3.1. Link-level Security
- Practical UNIX & Internet Security, 17.3.3. TELNET (TCP Port 23)
- (see also sniffing)
- packet switching
- Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
- Practical UNIX & Internet Security, 16.3. IP Security
- TCP/IP Network Administration, 1.5.1.1. The datagram
- TCP/IP Network Administration, 1.7. Application Layer
- packets
- Building Internet Firewalls, 4.1. Some Firewall Definitions
- Building Internet Firewalls, 6. Packet Filtering
- Building Internet Firewalls, 6.3.1.2. IP layer
- Building Internet Firewalls, 8.12.4. traceroute
- Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
- Practical UNIX & Internet Security, 16.2.4. Packets and Protocols
- Practical UNIX & Internet Security, 16.2.4.3. UDP
- TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
- (see also traceroute utility)
- authentication
: (see authentication)
- bogus, interjecting
: TCP/IP Network Administration, 5.3.1.1. Options
- capturing
: TCP/IP Network Administration, 5.3.1.2. Pseudo-device
- damaged
: TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- eavesdropping
: (see packet sniffing)
- encrypting
: (see encryption)
- forged
: Building Internet Firewalls, 6.3.7. Non-IP Protocols
- fragmenting
- Building Internet Firewalls, 6.3.1.2. IP layer
- Building Internet Firewalls, 6.3.2.2. IP fragmentation
- handling (by router)
: Building Internet Firewalls, 6.4. What Does the Router Do with
- headers of
: Building Internet Firewalls, 6.3. What Does a Packet Look Like?
- ICMP
: Building Internet Firewalls, 8.12.5. Other ICMP Packets
- inbound versus outbound
: Building Internet Firewalls, 6.2.2. Be Careful of `Inbound'
- monitoring
: Practical UNIX & Internet Security, 12.3.1.2. Eavesdropping by Ethernet and 10Base-T
- options in DHCP
: TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- queued
: TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- rates of
: Building Internet Firewalls, 6.8.1. It Should Have Good Enough
- routing
: TCP/IP Network Administration, 1.5.1.1. The datagram
- source-routed
: Building Internet Firewalls, 5.8.2.5. Turning off routing
- structure
: Building Internet Firewalls, 6.3. What Does a Packet Look Like?
- TCP
: Building Internet Firewalls, 6.3.3.1. TCP
- UDP
: Building Internet Firewalls, 6.3.3.2. UDP
- update
: TCP/IP Network Administration, 7.4.1. Routing Information Protocol
- packetsize
: TCP/IP Network Administration, 11.3.1. The ping Command
- PAP (Password Authentication Protocol)
- TCP/IP Network Administration, 6.3.4. PPP Daemon Security
- TCP/IP Network Administration, A.2. The PPP Daemon
- pap-secrets file
: TCP/IP Network Administration, 6.3.4. PPP Daemon Security
- paper
- backups on
: Practical UNIX & Internet Security, 24.5.1. Never Trust Anything Except Hardcopy
- copies
: Practical UNIX & Internet Security, 7.3.2. Building an Automatic Backup System
- logging on
: Practical UNIX & Internet Security, 10.7. Handwritten Logs
- throwing out
: Practical UNIX & Internet Security, 12.3.3. Other Media
- PAR (Positive Acknowledgment with Retransmission)
: Building Internet Firewalls, C.6.2. Transmission Control Protocol
- Parallel Line IP (PLIP)
: TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- parallel multipart subtype
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- parent processes
: Practical UNIX & Internet Security, C.2. Creating Processes
- parentheses (), for continuation characters
: TCP/IP Network Administration, C.3.1. Standard Resource Records
- /parse rule-testing command
- sendmail, 15.1. Test the Configuration File
- sendmail, 38.5.5. Parse an Address with /parse
- parsing addresses
- sendmail, 15.1. Test the Configuration File
- sendmail, 38.5.5. Parse an Address with /parse
- (see also rule set 3)
- partial message subtype
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- partitions
: Practical UNIX & Internet Security, 25.2.2.4. Using partitions to protect your users
- backup by
: Practical UNIX & Internet Security, 7.1.3. Types of Backups
- root
: (see root directory)
- pass phrases for PGP
- Practical UNIX & Internet Security, 6.6.3.1. Encrypting files with IDEA
- (see also passwords)
- passing data
: (see data, communications model)
- passive FTP
- Building Internet Firewalls, 8.2.1.1. Packet filtering characteristics of
- Practical UNIX & Internet Security, 17.3.2.2. Passive vs. active FTP
- Practical UNIX & Internet Security, 17.3.2.3. FTP passive mode
- passive option
- in pppd
: TCP/IP Network Administration, 6.3.5. PPP Server Configuration
- in RIP
- TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
- TCP/IP Network Administration, 7.7.1.2. Interior gateway configurations
- passwd command
- Practical UNIX & Internet Security, 3.4. Changing Your Password
- Practical UNIX & Internet Security, 8.6.2. What Is Salt?
- as SUID program
: Practical UNIX & Internet Security, 5.5. SUID
- -l option
- Practical UNIX & Internet Security, 8.4.1. Changing an Account's Password
- Practical UNIX & Internet Security, 8.8.8. Disabling an Account by Changing Its Password
- -n option
: Practical UNIX & Internet Security, 8.8.6. Password Aging and Expiration
- -x option
: Practical UNIX & Internet Security, 8.8.6. Password Aging and Expiration
- -f nomemory option
: Practical UNIX & Internet Security, 3.5. Verifying Your New Password
- using as superuser
: Practical UNIX & Internet Security, 3.5. Verifying Your New Password
- passwd command line
: TCP/IP Network Administration, 12.2.1. The Shadow Password File
- passwd file
- Practical UNIX & Internet Security, 1.2. What Is an Operating System?
- Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
- Practical UNIX & Internet Security, 4.2.3. Impact of the /etc/passwd and /etc/group
- Practical UNIX & Internet Security, 7.1.2. What Should You Back Up?
- Practical UNIX & Internet Security, 8.1.1. Accounts Without Passwords
- Practical UNIX & Internet Security, 8.6. The UNIX Encrypted Password System
- Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work
- Practical UNIX & Internet Security, 24.4.1. New Accounts
- Practical UNIX & Internet Security, C.5.1. Process #1: /etc/init
- sendmail, 30.8. Alphabetized F= Flags
- TCP/IP Network Administration, 6.3.2. Dial-Up PPP
- TCP/IP Network Administration, 6.3.5. PPP Server Configuration
- TCP/IP Network Administration, 6.4.3. SLIP Server Configuration
- TCP/IP Network Administration, 9.1.5. NFS Authentication Server
- TCP/IP Network Administration, 9.3. Network Information Service
- TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros
- TCP/IP Network Administration, 12.2.1. The Shadow Password File
- TCP/IP Network Administration, 13.2.1. Creating an FTP Server
- + in
: (see NIS)
- accounts without passwords
: Practical UNIX & Internet Security, 8.1.1. Accounts Without Passwords
- backing up
: Practical UNIX & Internet Security, 7.1.2. What Should You Back Up?
- gecos field
: sendmail, 14.2.1. The Full-Name: Header
- mail hubs and
: sendmail, 6. The Mail Hub and Delivery Agents
- new accounts
: Practical UNIX & Internet Security, 24.4.1. New Accounts
- NFS
: Practical UNIX & Internet Security, 20.2.1.1. /etc/exports
- protecting
: TCP/IP Network Administration, 12.2. User Authentication
- in security checks
: TCP/IP Network Administration, 12.4.2. Looking for Trouble
- trusted users and
: sendmail, 14.6. Trusted User
- user database class for
: sendmail, 33.8. Alphabetized Reference
- uucp user and
: Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work
- Passwd table (NIS+)
: Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
- passwd+ package
- Practical UNIX & Internet Security, 8.8.2. Constraining Passwords
- Practical UNIX & Internet Security, 8.8.4. Password Generators
- Password Authentication Protocol (PAP)
- TCP/IP Network Administration, 6.3.4. PPP Daemon Security
- TCP/IP Network Administration, A.2. The PPP Daemon
- password file
- Practical UNIX & Internet Security, 19.4.4.6. NIS is confused about "+"
- (see also passwd file)
- password modems
: Practical UNIX & Internet Security, 14.6. Additional Security for Modems
- password.adjunct file
: Practical UNIX & Internet Security, 8.8.5. Shadow Password Files
- passwords
- Building Internet Firewalls, 10.2. What Is Authentication?
- Building Internet Firewalls, 10.2.2. Something You Know
- Practical UNIX & Internet Security, 3.2. Passwords
- Practical UNIX & Internet Security, 3.6.1. Bad Passwords: Open Doors
- Practical UNIX & Internet Security, 3.8. Summary
- Practical UNIX & Internet Security, 17.4. Security Implications of Network Services
- Practical UNIX & Internet Security, 23.5. Tips on Using Passwords
- TCP/IP Network Administration, 1.7. Application Layer
- (see also authentication)
- (see also shadow file)
- accounts without
: Practical UNIX & Internet Security, 8.1.1. Accounts Without Passwords
- aging
- Building Internet Firewalls, 12.1.2. Managing Your Accounts
- TCP/IP Network Administration, 12.2.1. The Shadow Password File
- assigning to users
: Practical UNIX & Internet Security, 8.8.1. Assigning Passwords to Users
- authentication based on
- TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- TCP/IP Network Administration, 7.7.1.2. Interior gateway configurations
- TCP/IP Network Administration, 9.1.5. NFS Authentication Server
- avoiding conventional
- Practical UNIX & Internet Security, 8.8. Administrative Techniques for Conventional Passwords
- Practical UNIX & Internet Security, 8.8.9. Account Names Revisited: Using Aliases for Increased
- bad choices for
- Practical UNIX & Internet Security, 3.6.1. Bad Passwords: Open Doors
- Practical UNIX & Internet Security, 3.6.4. Passwords on Multiple Machines
- checklist for
: Practical UNIX & Internet Security, A.1.1.2. Chapter 3: Users and Passwords
- choosing, generating
- Practical UNIX & Internet Security, 8.8.4. Password Generators
- TCP/IP Network Administration, 12.2.2. Choosing a Password
- changing
- Practical UNIX & Internet Security, 3.4. Changing Your Password
- Practical UNIX & Internet Security, 3.5. Verifying Your New Password
- Practical UNIX & Internet Security, 8.4.1. Changing an Account's Password
- Practical UNIX & Internet Security, 8.8.8. Disabling an Account by Changing Its Password
- TCP/IP Network Administration, 12.2. User Authentication
- time-based
: Building Internet Firewalls, 10.3.2. Time-based Passwords
- tricks used to avoid changing
: TCP/IP Network Administration, 12.2.1. The Shadow Password File
- constraining
: Practical UNIX & Internet Security, 8.8.2. Constraining Passwords
- conventional
: Practical UNIX & Internet Security, 3.2.6. Conventional UNIX Passwords
- cracking, guessing, stealing
- Practical UNIX & Internet Security, 3.6.1. Bad Passwords: Open Doors
- Practical UNIX & Internet Security, 3.6.3. Good Passwords: Locked Doors
- Practical UNIX & Internet Security, 3.6.4. Passwords on Multiple Machines
- Practical UNIX & Internet Security, 8.6.1. The crypt()
- Practical UNIX & Internet Security, 8.8.3. Cracking Your Own Passwords
- Practical UNIX & Internet Security, 8.8.3.2. The dilemma of password crackers
- Practical UNIX & Internet Security, 17.3.3. TELNET (TCP Port 23)
- TCP/IP Network Administration, 12.2. User Authentication
- logging failed attempts
: Practical UNIX & Internet Security, 10.5.3. syslog Messages
- sniffing
- Building Internet Firewalls, 1.2.1.3. Information Theft
- Building Internet Firewalls, 10.1.2. Packet Sniffing
- Building Internet Firewalls, 10.3.1. One-Time Passwords
- Practical UNIX & Internet Security, 1.4.3. Add-On Functionality Breeds Problems
- Practical UNIX & Internet Security, 3. Users and Passwords
- Practical UNIX & Internet Security, 8.7. One-Time Passwords
- Practical UNIX & Internet Security, 16.3. IP Security
- Practical UNIX & Internet Security, 17.3.3. TELNET (TCP Port 23)
- (see also eavesdropping)
- (see also packet sniffing)
- stealing with network taps
: Building Internet Firewalls, 1.2.1.3. Information Theft
- encrypting
- Practical UNIX & Internet Security, 8.6. The UNIX Encrypted Password System
- Practical UNIX & Internet Security, 8.6.4. Crypt16() and Other Algorithms
- expiring
: Practical UNIX & Internet Security, 8.8.6. Password Aging and Expiration
- false authentication and
: Building Internet Firewalls, 10.1.3. False Authentication
- federal jurisdiction over
: Practical UNIX & Internet Security, 26.2.2. Federal Jurisdiction
- FTP and
: Practical UNIX & Internet Security, 17.3.2. (FTP) File Transfer Protocol (TCP Ports 20 and 21)
- hit lists of
: Practical UNIX & Internet Security, 3.6.1. Bad Passwords: Open Doors
- Kerberos
: Practical UNIX & Internet Security, 19.6.5. Kerberos Limitations
- logging changes to
: Practical UNIX & Internet Security, 10.7.2.1. Exception and activity reports
- for MUDs
: Practical UNIX & Internet Security, 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
- on multiple machines
- Practical UNIX & Internet Security, 3.6.4. Passwords on Multiple Machines
- Practical UNIX & Internet Security, 3.6.5. Writing Down Passwords
- over network connections
: Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
- with network services
: Practical UNIX & Internet Security, 17.4. Security Implications of Network Services
- NIS, with Secure RPC
: Practical UNIX & Internet Security, 19.3.2.1. Creating passwords for users
- NIS+, changing
: Practical UNIX & Internet Security, 19.5.4.1. Changing your password
- one-time
- Building Internet Firewalls, 10.3.1. One-Time Passwords
- Practical UNIX & Internet Security, 8.7. One-Time Passwords
- Practical UNIX & Internet Security, 8.7.3. Code Books
- Practical UNIX & Internet Security, 17.4. Security Implications of Network Services
- Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
- TCP/IP Network Administration, Preface
- TCP/IP Network Administration, 12.2.3. One-Time Passwords
- password coach
: Practical UNIX & Internet Security, 8.8.4. Password Generators
- with POP
: Practical UNIX & Internet Security, 17.3.10. Post Office Protocol (POP) (TCP Ports
- required for Web use
- Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
- Practical UNIX & Internet Security, 18.3.3. Setting Up Web Users and Passwords
- shadow
- Practical UNIX & Internet Security, 8.4.1. Changing an Account's Password
- Practical UNIX & Internet Security, 8.8.5. Shadow Password Files
- system clock and
: Practical UNIX & Internet Security, 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
- token cards with
: Practical UNIX & Internet Security, 8.7.2. Token Cards
- usernames as
: Practical UNIX & Internet Security, 8.8.3.1. Joetest: a simple password cracker
- UUCP accounts
: Practical UNIX & Internet Security, 15.3.2. Establishing UUCP Passwords
- verifying new
: Practical UNIX & Internet Security, 3.5. Verifying Your New Password
- wizard's (sendmail)
: Practical UNIX & Internet Security, 17.3.4.1. sendmail and security
- writing down
- Practical UNIX & Internet Security, 3.6.5. Writing Down Passwords
- TCP/IP Network Administration, 12.2.4. OPIE
- patches
- Building Internet Firewalls, 12.3.2. Keeping Your Systems Up To Date
- Practical UNIX & Internet Security, 10.7.2.2. Informational material
- patents
- Practical UNIX & Internet Security, 6.7.1. Cryptography and the U.S. Patent System
- Practical UNIX & Internet Security, 26.4.4. Patent Concerns
- paths
: Practical UNIX & Internet Security, 5.1.3. Current Directory and Paths
- delivery agent
: sendmail, 30.4. The Equates
- to execution directories
: sendmail, 30.4. The Equates
- for .forward file
: sendmail, 22.8.3.2. The ForwardPath option
- return, per RFC821
: sendmail, 30.8. Alphabetized F= Flags
- trusted
: Practical UNIX & Internet Security, 8.5.3.1. Trusted path
- path MTU discovery code
: TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- PATH variable
- Practical UNIX & Internet Security, 8.1.4.1. Restricted shells under System V UNIX
- Practical UNIX & Internet Security, 8.1.4.6. Potential problems with rsh
- Practical UNIX & Internet Security, 23.4. Tips on Writing SUID/SGID Programs
- attacks via
: Practical UNIX & Internet Security, 11.5.1.1. PATH attacks
- path vector protocols
: TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
- PATH... macros
: sendmail, 18.8. Alphabetized Reference
- pathname
- Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- sendmail, 12.2. The File Form of Class
- mail delivery program
- sendmail, 6.2. Define a Mail Delivery Agent
- sendmail, 6.3. The local Delivery Agent
- sendmail, 22.4.4. The P= of Delivery Agents
- UUCP and
: sendmail, 8.1.4. UUCP and Host Paths
- pattern matching
- TCP/IP Network Administration, 10.6.1. Pattern Matching
- (see $ operators; wildcard operators)
- symbols for
: TCP/IP Network Administration, 10.5.3. The Define Class Command
- pax program
: Practical UNIX & Internet Security, 7.4.2. Simple Archives
- PC NFS Authentication and Print Server (pcnfsd)
: TCP/IP Network Administration, 9.1.5. NFS Authentication Server
- pcbind service
: Building Internet Firewalls, 5.8.2.4. Which services should you disable?
- PCERT (Purdue University)
: Practical UNIX & Internet Security, F.3.4.30. Purdue University
- PCI bus
: TCP/IP Network Administration, 5.3.1.3. Devices
- PCM audio subtype
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- pcnfsd.conf file
: TCP/IP Network Administration, 9.1.5.1. NFS print services
- PCs
- viruses on
: Practical UNIX & Internet Security, 11.1.5. Viruses
- web server on
: Practical UNIX & Internet Security, 18.2. Running a Secure Server
- ${pd} macro
: sendmail, D.1. Sun Enhancements
- PDP-11 processors
- Practical UNIX & Internet Security, 1.3. History of UNIX
- Practical UNIX & Internet Security, 8.6.1. The crypt()
- PDUs (Protocol Data Units)
: TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- peer
- TCP/IP Network Administration, 3. Network Services
- TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
- TCP/IP Network Administration, B.5. Options Statements
- clauses
: TCP/IP Network Administration, 7.7.1.3. Exterior gateway configuration
- level communications
: TCP/IP Network Administration, 1.2. A Data Communications Model
- subclauses
: TCP/IP Network Administration, B.8.5. The bgp Statement
- Penn State response team
: Practical UNIX & Internet Security, F.3.4.29. Pennsylvania State University
- per-machine logs
: Practical UNIX & Internet Security, 10.7.2. Per-Machine Logs
- per-site logs
: Practical UNIX & Internet Security, 10.7.1. Per-Site Logs
- percent (%) in addresses
- sendmail, 17.1.5. The % Hack
- sendmail, 21.5.1. Offsite MX Hosts
- performance
- analyzing
: Practical UNIX & Internet Security, 18.4. Avoiding the Risks of Eavesdropping
- compromised
- Practical UNIX & Internet Security, 25.2.1. Process-Overload Problems
- Practical UNIX & Internet Security, 25.2.1.2. System overload attacks
- high-load queuing and
: sendmail, 34.8. Alphabetized Reference
- :include: lists and
: sendmail, 25.2.2. Tradeoffs
- incoming SMTP connection rate
: sendmail, 34.8. Alphabetized Reference
- load average
- sendmail, 18.8. Alphabetized Reference
- sendmail, 23.4. Printing the Queue
- load balancing
- TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- TCP/IP Network Administration, 7.4.3. Open Shortest Path First
- TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
- TCP/IP Network Administration, 11.4.4. Subdividing an Ethernet
- load shedding
: Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
- mail hubs and
: sendmail, 6. The Mail Hub and Delivery Agents
- with multiple interior routers
: Building Internet Firewalls, 4.3.5. It's Dangerous to Use Multiple
- MX records pointing to CNAMEs
: sendmail, 21.3.2. MX to CNAME Causes Extra Lookups
- of packet filter
: Building Internet Firewalls, 6.8.1. It Should Have Good Enough
- refusing connections on high load
: sendmail, 34.8. Alphabetized Reference
- reviews
: Practical UNIX & Internet Security, 13.2.3. Performance Reviews and Monitoring
- with Secure RPC
: Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
- sendmail options for
: sendmail, 34.6.4. Controlling Machine Load
- using FFS
: Practical UNIX & Internet Security, 25.2.2.6. Reserved space
- perimeter networks
- Building Internet Firewalls, 4.1. Some Firewall Definitions
- Building Internet Firewalls, 4.2.3.1. Perimeter network
- Practical UNIX & Internet Security, 12.1.1. The Physical Security Plan
- TCP/IP Network Administration, 12.7. Firewalls
- multiple
: Building Internet Firewalls, 4.3.7. It's OK to Have Multiple Perimeter
- shared
: Building Internet Firewalls, 4.4.5. A Shared Perimeter Network Allows
- period (.)
- . line (qf file)
: sendmail, 23.9. The qf File Internals
- checking for in ${pd}
: sendmail, D.1. Sun Enhancements
- for current directory
: Practical UNIX & Internet Security, 5.1.1. Directories
- to end messages
- sendmail, 4.2. Verbose (-v)
- sendmail, 30.8. Alphabetized F= Flags
- filenames starting with, disabling creation of
: Building Internet Firewalls, 8.2.1.6. Be careful of writable
- host status file line
: sendmail, B.1. Status file lines
- leading in messages
: sendmail, 34.8. Alphabetized Reference
- trailing in FQDNs
- sendmail, 15.3. MX Records
- sendmail, 17.4. Rule Set 4
- sendmail, 29.5.1. Stripping Trailing Dots
- .. directory
: Practical UNIX & Internet Security, 5.1.1. Directories
- .. for domain name
: TCP/IP Network Administration, C.3.1. Standard Resource Records
- Perl programming language
- Practical UNIX & Internet Security, 5.5.3. SUID Shell Scripts
- Practical UNIX & Internet Security, 11.1.4. Trojan Horses
- Practical UNIX & Internet Security, 11.5.1.2. IFS attacks
- perl -T command
- Practical UNIX & Internet Security, 18.2.3.4. Tainting with Perl
- Practical UNIX & Internet Security, 23.4. Tips on Writing SUID/SGID Programs
- random seed generator
: Practical UNIX & Internet Security, 23.9. A Good Random Seed
- script for reading lastlog file
: Practical UNIX & Internet Security, 10.1.1. lastlog File
- Swatch program
- Practical UNIX & Internet Security, 10.6. Swatch: A Log File Tool
- Practical UNIX & Internet Security, 10.6.2. The Swatch Configuration File
- Practical UNIX & Internet Security, E.4.9. Swatch
- tainting facility
: Practical UNIX & Internet Security, 18.2.3.4. Tainting with Perl
- permissions
- Practical UNIX & Internet Security, 1.1. What Is Computer Security?
- Practical UNIX & Internet Security, 5.1.6. Understanding File Permissions
- Practical UNIX & Internet Security, 5.2.4. Using Octal File Permissions
- Practical UNIX & Internet Security, 11.1.5. Viruses
- Practical UNIX & Internet Security, 11.6.1. File Protections
- Practical UNIX & Internet Security, 11.6.1.3. World-readable backup devices
- sendmail, 13.2.4. The Default File Permissions
- sendmail, 22.5. Permissions
- access control lists (ACLs)
- Practical UNIX & Internet Security, 5.2.5. Access Control Lists
- Practical UNIX & Internet Security, 5.2.5.2. HP-UX access control lists
- changing
- Practical UNIX & Internet Security, 5.2.1. chmod: Changing a File's Permissions
- Practical UNIX & Internet Security, 5.2.4. Using Octal File Permissions
- directory
: Practical UNIX & Internet Security, 5.4. Using Directory Permissions
- directory for safe writes
: sendmail, 34.8. Alphabetized Reference
- /etc/utmp file
: Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
- .forward file and
: sendmail, 22.5.3. Permissions for ~/.forward Files
- group
: sendmail, 34.8. Alphabetized Reference
- intruder's modifications to
: Practical UNIX & Internet Security, 24.4.1.2. Changes in file and directory protections
- modem devices
: Practical UNIX & Internet Security, 14.5.2. Setting Up the UNIX Device
- modem files
: Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer
- of NIS+ objects
: Practical UNIX & Internet Security, 19.5.5. NIS+ Limitations
- NO_GROUP_SET macro
: sendmail, 18.8. Alphabetized Reference
- octal
- Practical UNIX & Internet Security, 5.2.3. Calculating Octal File Permissions
- Practical UNIX & Internet Security, 5.2.4. Using Octal File Permissions
- qf file
: sendmail, 23.3.2. Bad qf Owner or Permissions
- queue directory
: sendmail, 23.1. Overview of the Queue
- of .rhosts file
: Practical UNIX & Internet Security, 17.3.18.4. The ~/.rhosts file
- root user
- sendmail, Other Books, Other Problems
- sendmail, 14.6. Trusted User
- sendmail, 22.1. Why root?
- safe options
: sendmail, 34.1.4. Options that Are Safe
- SUID programs
- Practical UNIX & Internet Security, 5.5. SUID
- Practical UNIX & Internet Security, 5.5.7. SGID Bit on Files (System V UNIX Only)
- symbolic links and
: Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail
- temporary files
- sendmail, 22.8.3.7. The TempFileMode option
- sendmail, 34.8. Alphabetized Reference
- umasks
- Practical UNIX & Internet Security, 5.3. The umask
- Practical UNIX & Internet Security, 5.3.2. Common umask Values
- UUCP
: Practical UNIX & Internet Security, 15.4.1.4. Special permissions
- Permissions file
- Practical UNIX & Internet Security, 15.5. Security in BNU UUCP
- Practical UNIX & Internet Security, 15.5.1. Permissions File
- Practical UNIX & Internet Security, 15.5.3. uucheck: Checking Your Permissions File
- persistent host-status
: sendmail, 36.7. Alphabetized Reference
- personal mail forwarding
: TCP/IP Network Administration, 10.3.1. Personal mail forwarding
- personnel
: (see employees)
- PGP (Pretty Good Privacy)
- Practical UNIX & Internet Security, 6.6.3. PGP: Pretty Good Privacy
- Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
- TCP/IP Network Administration, 12.6.1. When is symmetric encryption useful?
- -eat and -seat options
: Practical UNIX & Internet Security, 6.6.3.3. Encrypting a message
- encrypting message with
: Practical UNIX & Internet Security, 6.6.3.3. Encrypting a message
- encrypting Web documents
: Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire
- -ka option
: Practical UNIX & Internet Security, 6.6.3.2. Creating your PGP public key
- -kg option
: Practical UNIX & Internet Security, 6.6.3.2. Creating your PGP public key
- -kvc option
: Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
- -kxaf option
: Practical UNIX & Internet Security, 6.6.3.2. Creating your PGP public key
- -o option
: Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
- -sat option
: Practical UNIX & Internet Security, 6.6.3.4. Adding a digital signature to an announcement
- -sb option
: Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
- software signature
: Practical UNIX & Internet Security, E.4. Software Resources
- ph (phonebook) server
: Practical UNIX & Internet Security, 17.3.8.3. Replacing finger
- phantom mail
: Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
- Physical Layer
- TCP/IP Network Administration, 1.2. A Data Communications Model
- TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- physical network
- TCP/IP Network Administration, 1.5.1.2. Routing datagrams
- TCP/IP Network Administration, 2.3. Subnets
- TCP/IP Network Administration, 2.6. Address Resolution
- TCP/IP Network Administration, 3.5.1. Reverse Address Resolution Protocol
- address, embedded in response
: TCP/IP Network Administration, 3.6. Bootstrap Protocol
- independence from
- TCP/IP Network Administration, 1.1.1. TCP/IP Features
- TCP/IP Network Administration, 6. Configuring the Interface
- physical security
- Practical UNIX & Internet Security, 12. Physical Security
- Practical UNIX & Internet Security, 12.4.2. "Nothing to Lose?"
- TCP/IP Network Administration, 12.1.1. Assessing the Threat
- access control
: Practical UNIX & Internet Security, 12.2.3. Physical Access
- of backups
- Practical UNIX & Internet Security, 7.1.6. Security for Backups
- Practical UNIX & Internet Security, 7.1.6.3. Data security for backups
- checklist for
: Practical UNIX & Internet Security, A.1.1.11. Chapter 12: Physical Security
- modems
- Practical UNIX & Internet Security, 14.5.4. Physical Protection of Modems
- Practical UNIX & Internet Security, 14.6. Additional Security for Modems
- read-only filesystems
: Practical UNIX & Internet Security, 9.1.2. Read-only Filesystems
- signal grounding
: Practical UNIX & Internet Security, 25.3.3. Signal Grounding
- physical serial ports
: TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- PICKY... macros
: sendmail, 18.8. Alphabetized Reference
- PICKY_QF_NAME_CHECK variable
- sendmail, 18.8. Alphabetized Reference
- sendmail, 23.3.1. Badly Formed qf Filename
- PIDs (process identifiers)
- Practical UNIX & Internet Security, C.1.3.1. PIDs (process IDs)Process identification
- Practical UNIX & Internet Security, C.1.3.4. Process groups and sessions
- sendmail, 23.2.1. The Queue Identifier
- including with logs
: sendmail, 26.1.1. syslog(3)
- for sendmail
: (see $p macro)
- Pieprzyk, Josef
: Practical UNIX & Internet Security, 6.5.4.3. HAVAL
- ping command
- Building Internet Firewalls, 2.10. Network Management Services
- Building Internet Firewalls, 5.6. Selecting Services Provided by the
- Building Internet Firewalls, 8.12.3. ping
- TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- TCP/IP Network Administration, 7.2. The Minimal Routing Table
- statistics displayed by
- TCP/IP Network Administration, 11.3.1. The ping Command
- TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
- in troubleshooting
: TCP/IP Network Administration, 11.3. Testing Basic Connectivity
- PingWare program
: Practical UNIX & Internet Security, 17.6.3. PingWare
- pipe (in Swatch program)
: Practical UNIX & Internet Security, 10.6.2. The Swatch Configuration File
- pipe character (|) separating multiple printer names
: TCP/IP Network Administration, 9.2.1. The printcap File
- pipes
- Practical UNIX & Internet Security, 18.2.3.2. Testing is not enough!
- Practical UNIX & Internet Security, 18.2.3.3. Sending mail
- (see also programs, delivering to)
- pipes (for smoking)
: Practical UNIX & Internet Security, 12.2.1.2. Smoke
- piracy of software
- Practical UNIX & Internet Security, 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP
- Practical UNIX & Internet Security, 26.4.2.1. Software piracy and the SPA
- (see also software)
- plain text subtype
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- plaintext attacks
: Practical UNIX & Internet Security, 6.2.3. Cryptographic Strength
- .plan file
: Practical UNIX & Internet Security, 17.3.8.1. The .plan and .project files
- planning sheets
: TCP/IP Network Administration, 4.6.1. Sample Planning Sheets
- platforms
: (see operating systems)
- play accounts
: (see open accounts)
- playback attacks
: Practical UNIX & Internet Security, 19.6.1.2. Using the ticket granting ticket
- PLIP (Parallel Line IP)
: TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- plug-gw proxy
: Building Internet Firewalls, 7.7.3. Generic Proxying with TIS
- plumb/unplumb parameters
: TCP/IP Network Administration, 6.1.5.5. Point-to-point
- plus sign (+)
- in configuration file
: sendmail, 1.3.1. The Configuration File
- indicating a trusted host
: TCP/IP Network Administration, 12.2.5. Secure the r Commands
- in hosts.equiv file
: Practical UNIX & Internet Security, 17.3.18.5. Searching for .rhosts files
- marking users with
: sendmail, 24.4.3. Plussed Users
- in NIS
- Practical UNIX & Internet Security, 19.4. Sun's Network Information Service (NIS)
- Practical UNIX & Internet Security, 19.4.4.6. NIS is confused about "+"
- plussed users
: sendmail, 24.4.3. Plussed Users
- point-to-point interfaces
- TCP/IP Network Administration, 6.1.5.5. Point-to-point
- TCP/IP Network Administration, B.6. Interface Statements
- defined
: TCP/IP Network Administration, 6.1.1. Determining the Interface Name
- Point-to-Point Protocol
: (see PPP)
- pointers
: TCP/IP Network Administration, 3.3.2. Creating Domains and Subdomains
- poison reverse feature
: TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
- policy, security
- Practical UNIX & Internet Security, 1.2. What Is an Operating System?
- Practical UNIX & Internet Security, 2. Policies and Guidelines
- Practical UNIX & Internet Security, 2.5.3. Final Words: Risk Management Means Common Sense
- Practical UNIX & Internet Security, A.1.1.1. Chapter 2: Policies and Guidelines
- (see security, policies of)
- cost-benefit analysis
- Practical UNIX & Internet Security, 2.3. Cost-Benefit Analysis
- Practical UNIX & Internet Security, 2.3.4. Convincing Management
- risk assessment
- Practical UNIX & Internet Security, 2.2. Risk Assessment
- Practical UNIX & Internet Security, 2.2.2. Review Your Risks
- Practical UNIX & Internet Security, 2.5.3. Final Words: Risk Management Means Common Sense
- role of
- Practical UNIX & Internet Security, 2.4.1. The Role of Policy
- Practical UNIX & Internet Security, 2.4.4. Some Key Ideas in Developing a Workable Policy
- Practical UNIX & Internet Security, 2.4.4.7. Defend in depth
- policy-based routing
: TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
- database
: TCP/IP Network Administration, 2.4. Internet Routing Architecture
- politics
: Practical UNIX & Internet Security, 11.3. Authors
- polling
- TCP/IP Network Administration, 7.5.1. Exterior Gateway Protocol
- TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- trap-directed
: TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- polyalphabetic ciphers
: Practical UNIX & Internet Security, 6.3. The Enigma Encryption System
- polygraph tests
: Practical UNIX & Internet Security, 13.1. Background Checks
- POP (Post Office Protocol)
- Building Internet Firewalls, 8.1.2. Post Office Protocol
- Practical UNIX & Internet Security, 17.3.10. Post Office Protocol (POP) (TCP Ports
- TCP/IP Network Administration, 3.4.2. Post Office Protocol
- TCP/IP Network Administration, 4.5.3. Planning Your Mail System
- commands, listed
: TCP/IP Network Administration, 3.4.2. Post Office Protocol
- mail server
: TCP/IP Network Administration, 9.7.1. POP Server
- multiple services
: Building Internet Firewalls, 8.1.2.2. Proxying characteristics of
- pop3d.tar
: TCP/IP Network Administration, 9.7.1. POP Server
- popen command
- Practical UNIX & Internet Security, 18.2.3.2. Testing is not enough!
- Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- sendmail, 18.8. Alphabetized Reference
- popper17.tar
: TCP/IP Network Administration, 9.7.1. POP Server
- pornography
: Practical UNIX & Internet Security, 26.4.5. Pornography and Indecent Material
- ports
- Practical UNIX & Internet Security, 16.2.4.2. TCP
- Practical UNIX & Internet Security, 17.1.1. The /etc/services File
- Practical UNIX & Internet Security, G. Table of IP Services
- TCP/IP Network Administration, 1.2. A Data Communications Model
- TCP/IP Network Administration, 2.7.3. Sockets
- numbers
- Building Internet Firewalls, C.12.2. Port Numbers
- Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
- Practical UNIX & Internet Security, G. Table of IP Services
- TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
- TCP/IP Network Administration, 2.7. Protocols, Ports, and Sockets
- TCP/IP Network Administration, 2.7.2. Port Numbers
- passing
: TCP/IP Network Administration, 2.7.3. Sockets
- randomly generated
: TCP/IP Network Administration, 3.6. Bootstrap Protocol
- reserved TCP
: sendmail, 30.8. Alphabetized F= Flags
- source, filtering by
: Building Internet Firewalls, 6.7.4. Risks of Filtering by Source
- trusted
: (see trusted ports)
- well-known
: Building Internet Firewalls, C.12.3. Sockets
- PORT directory (db distribution)
: sendmail, C.2. Get the Source
- portable computers
: Practical UNIX & Internet Security, 12.2.6.3. Portables
- portable I/O library
: Practical UNIX & Internet Security, 1.3. History of UNIX
- portmap service
- Building Internet Firewalls, 5.8.2.4. Which services should you disable?
- Building Internet Firewalls, B.5.3. portmap
- Practical UNIX & Internet Security, 19.2.1. Sun's portmap/rpcbind
- Practical UNIX & Internet Security, 19.4.4.4. Spoofing RPC
- Practical UNIX & Internet Security, E.4.6. portmap
- portmapper
- Building Internet Firewalls, 6.3.3.4. RPC
- Practical UNIX & Internet Security, 17.3.11. Sun RPC's portmapper (UDP and TCP Ports 111)
- Practical UNIX & Internet Security, 19.2.1. Sun's portmap/rpcbind
- Practical UNIX & Internet Security, 19.4.5. Unintended Disclosure of Site Information with NIS
- TCP/IP Network Administration, 2.7.2. Port Numbers
- positional operators
- sendmail, 9.2.3. The User ($:)
- sendmail, 10.2.2. The RHS
- sendmail, 12.1.4. Class Macros in the RHS
- sendmail, 28.6.1. Copy by Position: $digit
- m4 arguments and
: sendmail, 19.1.3. m4 and arguments
- positive acknowledgment
- Building Internet Firewalls, C.6.2. Transmission Control Protocol
- TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
- positivity
: Practical UNIX & Internet Security, 2.4.4.2. Be positive
- POSIX
- Practical UNIX & Internet Security, 1.3. History of UNIX
- Practical UNIX & Internet Security, 1.4.2. Software Quality
- Practical UNIX & Internet Security, C.1.3.4. Process groups and sessions
- chown command and
: Practical UNIX & Internet Security, 5.7. chown: Changing a File's Owner
- post office
: sendmail, 18.1. To Use or Not to Use
- Post Office Protocol
: (see POP)
- post office servers
: (see mailbox servers)
- "Posted-Date:" header line
: sendmail, 35.10. Alphabetized Reference
- postmaster alias
- sendmail, 3.1.1. The Aliases File
- sendmail, 24.4.1. The Postmaster Alias
- sendmail, 34.8. Alphabetized Reference
- postmaster, contacting
: Practical UNIX & Internet Security, 24.2.4.2. How to contact the system administrator of a computer
- PostmasterCopy (P) option
- sendmail, 22.8.3.4. The PostmasterCopy option
- sendmail, 24.4.1. The Postmaster Alias
- sendmail, 34.8. Alphabetized Reference
- PostScript application subtype
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- PostScript files
: Practical UNIX & Internet Security, 11.1.5. Viruses
- pound sign (#) for comments
- TCP/IP Network Administration, 3.2. The Host Table
- TCP/IP Network Administration, 5.4. The Internet Daemon
- TCP/IP Network Administration, 7.7.1.1. A host configuration
- TCP/IP Network Administration, 9.1.4. NFS Automounter
- TCP/IP Network Administration, 9.2.1. The printcap File
- TCP/IP Network Administration, 9.4. A BOOTP Server
- TCP/IP Network Administration, A.1.1. The dip Script File
- TCP/IP Network Administration, D.3. The dhcpd.conf Configuration File
- power outage
- logging
: Practical UNIX & Internet Security, 10.7.1.1. Exception and activity reports
- possible effects of
- TCP/IP Network Administration, 9.4. A BOOTP Server
- TCP/IP Network Administration, 9.5.1. dhcpd.conf
- power surges
- Practical UNIX & Internet Security, 12.2. Protecting Computer Hardware
- Practical UNIX & Internet Security, 12.2.1.8. Electrical noise
- (see also lightning)
- PPP (Point-to-Point Protocol)
- Practical UNIX & Internet Security, 14.5. Modems and UNIX
- Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
- TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- TCP/IP Network Administration, 5.3.1.2. Pseudo-device
- TCP/IP Network Administration, 6.2.1. The Serial Protocols
- as default
: TCP/IP Network Administration, A.1.1. The dip Script File
- installing
- TCP/IP Network Administration, 6.1.5.5. Point-to-point
- TCP/IP Network Administration, 6.3. Installing PPP
- interoperability and
: TCP/IP Network Administration, 6.2.2. Choosing a Serial Protocol
- server configuration
: TCP/IP Network Administration, 6.3.5. PPP Server Configuration
- in Solaris
: TCP/IP Network Administration, 6.3.6. Solaris PPP
- tools reference
: TCP/IP Network Administration, A. PPP Tools
- ppp directory, protecting
: TCP/IP Network Administration, A.2. The PPP Daemon
- pppd (PPP daemon)
- TCP/IP Network Administration, 6.3.1. The PPP Daemon
- TCP/IP Network Administration, 6.3.4. PPP Daemon Security
- TCP/IP Network Administration, A.2. The PPP Daemon
- ppplogin
: TCP/IP Network Administration, 6.3.5. PPP Server Configuration
- .ppprc file
: TCP/IP Network Administration, A.2. The PPP Daemon
- prearranging file transfer
: Building Internet Firewalls, 8.2.1.6. Be careful of writable
- precedence
- sendmail, 34.8. Alphabetized Reference
- TCP/IP Network Administration, 10.5.6. Defining Mail Precedence
- (see also priority, message)
- "Precedence:" header line
- sendmail, 14.4. Precedence
- sendmail, 25.5.5. Precedence: bulk
- sendmail, 26.1.3.1. class= the queue class
- sendmail, 35.8. Precedence
- sendmail, 35.10. Alphabetized Reference
- predefined macros (sendmail)
- sendmail, 7.3. Predefined Macros
- sendmail, 31.1. Preassigned Macros
- Predictor-1 compression
: TCP/IP Network Administration, A.2. The PPP Daemon
- preference
- host
- sendmail, 15.3. MX Records
- sendmail, 21.3. Set Up MX Records
- message delivery
: (see priority, message)
- values for
- TCP/IP Network Administration, 7.6.1. gated's Preference Value
- TCP/IP Network Administration, B.6. Interface Statements
- TCP/IP Network Administration, B.8.5. The bgp Statement
- TCP/IP Network Administration, B.9. static Statements
- TCP/IP Network Administration, B.10. Control Statements
- high-cost
: TCP/IP Network Administration, 7.7.1.2. Interior gateway configurations
- negative
: TCP/IP Network Administration, B.10.1. The import Statement
- prefix-length
: TCP/IP Network Administration, 2.2.2. Classless IP Addresses
- preprocessing rule set
: (see rule set 3)
- Presentation Layer
: TCP/IP Network Administration, 1.2. A Data Communications Model
- preserve program
: Practical UNIX & Internet Security, 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve
- Pretty Good Privacy
: (see PGP)
- prevention, cost of
- Practical UNIX & Internet Security, 2.3. Cost-Benefit Analysis
- Practical UNIX & Internet Security, 2.3.4. Convincing Management
- pri= equate (syslog output)
: sendmail, 26.1.3.7. pri= the initial priority
- primary group
: Practical UNIX & Internet Security, 4.1.3. Groups and Group Identifiers (GIDs)
- primary servers
- TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
- TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
- TCP/IP Network Administration, 8.1.1. BIND Configurations
- TCP/IP Network Administration, C.2. named.boot Configuration Commands
- configuring
: TCP/IP Network Administration, 8.3.1.2. Primary and secondary server configurations
- offsite
: sendmail, 21.5.2. Offsite Servers
- principals, NIS+
: Practical UNIX & Internet Security, 19.5.1. What NIS+ Does
- print servers
: TCP/IP Network Administration, 3.7.2. Print Services
- configuring
- TCP/IP Network Administration, 4.5.2. Print servers
- TCP/IP Network Administration, 9.2.1. The printcap File
- print spool directory, making
- TCP/IP Network Administration, 9.1.5.1. NFS print services
- TCP/IP Network Administration, 9.2.1. The printcap File
- print through process
: Practical UNIX & Internet Security, 12.3.2.1. Verify your backups
- printcap file
: TCP/IP Network Administration, 9.2.1. The printcap File
- printers and printing
: Building Internet Firewalls, 3.1. Least Privilege
- buffers
: Practical UNIX & Internet Security, 12.3.4.1. Printer buffers
- configuring protocols
: Building Internet Firewalls, 8.17. Printing Protocols (lpr and lp)
- delivery agent definitions
: sendmail, 6.3.3. Testing the New Delivery Agent Definitions
- /etc/hosts.lpd file
: Practical UNIX & Internet Security, 17.3.18.6. /etc/hosts.lpd file
- list of delivery agents
: sendmail, 38.4.2. Show Delivery Agents with =M
- logging to
: Practical UNIX & Internet Security, 10.5.2.1. Logging to a printer
- macro definitions
: sendmail, 7.3. Predefined Macros
- multiple printers
: TCP/IP Network Administration, 9.2.1. The printcap File
- output from printers
: Practical UNIX & Internet Security, 12.3.4.2. Printer output
- persistent-host status
: sendmail, 36.7. Alphabetized Reference
- ports for
: Practical UNIX & Internet Security, 12.3.1.4. Auxiliary ports on terminals
- queue
- sendmail, 4.1.2. Show Queue Mode (-bp)
- sendmail, 23.2.3.2. Locks shown when printing the queue
- sendmail, 23.4. Printing the Queue
- sendmail, 36.7. Alphabetized Reference
- TCP/IP Network Administration, 9.2.1.2. Using LPD
- security
: TCP/IP Network Administration, 9.2.1.1. LPD security
- sendmail.st file
: sendmail, 26.2.2. Viewing Statistics: mailstats
- systems
: Building Internet Firewalls, 2.14. Printing Systems
- priority
- logging
: sendmail, 26.1.1. syslog(3)
- mailing lists
: sendmail, 25.5.5. Precedence: bulk
- messages
- sendmail, 5.3.9. Priority
- sendmail, 14.4. Precedence
- sendmail, 23.4.1. Printing the Queue in Verbose Mode
- sendmail, 23.9. The qf File Internals
- sendmail, 26.1.3.7. pri= the initial priority
- sendmail, 35.8. Precedence
- TCP/IP Network Administration, 10.5.6. Defining Mail Precedence
- TCP/IP Network Administration, B.8.4. The isis Statement
- precedence weight
: sendmail, 34.8. Alphabetized Reference
- raising for retry
: sendmail, 34.8. Alphabetized Reference
- processes
: Practical UNIX & Internet Security, C.1.3.3. Process priority and niceness
- "Priority:" header line
: sendmail, 35.10. Alphabetized Reference
- privacy
- Practical UNIX & Internet Security, 2.1. Planning Your Security Needs
- Practical UNIX & Internet Security, 2.5.2. Confidential Information
- Practical UNIX & Internet Security, 9. Integrity Management
- Practical UNIX & Internet Security, 12.3. Protecting Data
- Practical UNIX & Internet Security, 12.3.6. Key Switches
- (see also encryption; integrity)
- Electronic Communications Privacy Act (ECPA)
: Practical UNIX & Internet Security, 26.2.3. Federal Computer Crime Laws
- IP addresses
: Building Internet Firewalls, 4.5. What the Future Holds
- key cryptography
: Building Internet Firewalls, 10. Authentication and Inbound
- newsgroups
: Building Internet Firewalls, 2.4. Usenet News
- Secure RPC
: Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
- PrivacyOptions (p) option
- sendmail, 22.8.3.5. The PrivacyOptions option
- sendmail, 34.8. Alphabetized Reference
- private argument
: TCP/IP Network Administration, 6.1.5.3. Metric
- private-key cryptography
- Practical UNIX & Internet Security, 6.4. Common Cryptographic Algorithms
- Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems
- TCP/IP Network Administration, 12.6. Encryption
- privilege testing (modem)
: Practical UNIX & Internet Security, 14.5.3.3. Privilege testing
- privileges, file
: (see permissions)
- privileges, SUID
: (see SUID/SGID programs)
- probes, responding to
: Building Internet Firewalls, 12.2.4. Responding to Probes
- procedures for proxying, custom
: Building Internet Firewalls, 7.2.2. Using Custom User Procedures for
- processes
- Practical UNIX & Internet Security, C.1. About Processes
- Practical UNIX & Internet Security, C.5.3. Running the User's Shell
- (see PIDs (process identifiers))
- accounting
- Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File
- Practical UNIX & Internet Security, 10.2.3. messages Log File
- group IDs
- Practical UNIX & Internet Security, 4.3.3. Other IDs
- Practical UNIX & Internet Security, C.1.3.4. Process groups and sessions
- overload attacks
- Practical UNIX & Internet Security, 25.2.1. Process-Overload Problems
- Practical UNIX & Internet Security, 25.2.1.2. System overload attacks
- priority of
: Practical UNIX & Internet Security, C.1.3.3. Process priority and niceness
- scheduler
: Practical UNIX & Internet Security, C.1.3.3. Process priority and niceness
- processing
- command-line processing
: sendmail, 36.4. Processing the Command Line
- flow of rules
: sendmail, 29.3. The Sequence of Rule Sets
- queue
- sendmail, 23.5. How the Queue Is Processed
- sendmail, 36.7. Alphabetized Reference
- speed
: Building Internet Firewalls, 5.3.2. How Fast a Machine?
- procmail
- TCP/IP Network Administration, E.3.5. MAILER
- sendmail, 19.6. Alphabetized m4 Macros
- sendmail, 25.7.5.2. The procmail program
- Practical UNIX & Internet Security, 11.5.2.5. .forward, .procmailrc
- .procmailrc file
: Practical UNIX & Internet Security, 11.5.2.5. .forward, .procmailrc
- .profile file
- Practical UNIX & Internet Security, 8.1.4.1. Restricted shells under System V UNIX
- Practical UNIX & Internet Security, 8.1.4.6. Potential problems with rsh
- Practical UNIX & Internet Security, 11.5.2.1. .login, .profile, /etc/profile
- Practical UNIX & Internet Security, 24.4.1.6. Changes to startup files
- prog delivery agent
: sendmail, 30.2.1. Required Symbolic Names
- prog pattern
: TCP/IP Network Administration, 13.3.1. archie
- program database class
: sendmail, 33.8. Alphabetized Reference
- program form, F command
: sendmail, 22.4.3. The F Command - Program Form
- programmed threats
- Practical UNIX & Internet Security, 11. Protecting Against Programmed Threats
- Practical UNIX & Internet Security, 11.6.2. Shared Libraries
- authors of
: Practical UNIX & Internet Security, 11.3. Authors
- checklist for
: Practical UNIX & Internet Security, A.1.1.10. Chapter 11: Protecting Against Programmed Threats
- protection from
: Practical UNIX & Internet Security, 11.5. Protecting Yourself
- references on
: Practical UNIX & Internet Security, D.1.4. Computer Viruses and Programmed Threats
- programs
: Practical UNIX & Internet Security, 23. Writing Secure SUID and Network Programs
- CGI
: (see CGI, scripts)
- delivering to
- sendmail, 3.2.2. Delivery Through a Program
- sendmail, 24.2.3. Delivery via Programs
- sendmail, 25.7.4. Piping Through Programs
- sendmail, 30.8. Alphabetized F= Flags
- filter
- sendmail, 24.4.1. The Postmaster Alias
- sendmail, 24.6.2. Filtering Recipients with a Shell Script
- for network services
: Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
- nonessential, removing
: Building Internet Firewalls, 5.8.4.2. Remove nonessential programs
- rabbit
- Practical UNIX & Internet Security, 11.1. Programmed Threats: Definitions
- Practical UNIX & Internet Security, 11.1.7. Bacteria and Rabbits
- references for
: Practical UNIX & Internet Security, D.1.11. UNIX Programming and System Administration
- running simultaneously
: Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- secure
: Practical UNIX & Internet Security, 23. Writing Secure SUID and Network Programs
- worms
: Practical UNIX & Internet Security, 11.1.6. Worms
- Project Athena
: (see Kerberos authentication system)
- .project file
: Practical UNIX & Internet Security, 17.3.8.1. The .plan and .project files
- promiscuous mode
- Building Internet Firewalls, 5.5. Locating the Bastion Host on the Network
- TCP/IP Network Administration, 6.1.5.5. Point-to-point
- TCP/IP Network Administration, 11.7.1. Packet Filters
- interface
: TCP/IP Network Administration, 5.3.1.2. Pseudo-device
- proprietary ownership notices
: Practical UNIX & Internet Security, 26.2.6. Other Tips
- prosecution, criminal
- Practical UNIX & Internet Security, 26.2. Criminal Prosecution
- Practical UNIX & Internet Security, 26.2.7. A Final Note on Criminal Actions
- proto clauses
- TCP/IP Network Administration, 7.7.1.3. Exterior gateway configuration
- TCP/IP Network Administration, A.1. Dial-Up IP
- TCP/IP Network Administration, B.10.2. The export Statement
- proto= equate (syslog output)
: sendmail, 26.1.3.8. proto= the protocol used in transmission
- protocols
: Practical UNIX & Internet Security, 16.2.4. Packets and Protocols
- analyzers
- Building Internet Firewalls, 8.18. Analyzing Other Protocols
- TCP/IP Network Administration, 5.3.1.2. Pseudo-device
- TCP/IP Network Administration, 11.7. Analyzing Protocol Problems
- TCP/IP Network Administration, 12.2.3. One-Time Passwords
- bidirectionality of
: Building Internet Firewalls, 6.2.1. Protocols Are Usually
- client server
: TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- data
: (see TCP/IP services)
- dedicated Archie
: Building Internet Firewalls, 8.7.3.3. Providing Archie service to your
- IP
: (see IP protocols)
- above IP
: Building Internet Firewalls, 6.3.3. Protocols Above
- manager/agent
: TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- minor
: TCP/IP Network Administration, 2.7.1. Protocol Numbers
- name, alias for
: TCP/IP Network Administration, 2.7.1. Protocol Numbers
- non-IP
: Building Internet Firewalls, 6.3.7. Non-IP Protocols
- numbers for
- Building Internet Firewalls, C.12.1. Protocol Numbers
- TCP/IP Network Administration, 1.5.1.4. Passing datagrams to the transport layer
- TCP/IP Network Administration, 2.7.1. Protocol Numbers
- packet filtering and
: Building Internet Firewalls, 6.1.2.2. Some protocols are not well suited to packet
- problems, troubleshooting
: TCP/IP Network Administration, 11.7. Analyzing Protocol Problems
- routing
: (see RIP)
- security of, and proxying
: Building Internet Firewalls, 7.4.3. Protocol Security
- stack
- TCP/IP Network Administration, 1.2. A Data Communications Model
- TCP/IP Network Administration, 11.1. Approaching a Problem
- standards
- TCP/IP Network Administration, 1.1.2. Protocol Standards
- TCP/IP Network Administration, 1.7. Application Layer
- statements (in gated)
: TCP/IP Network Administration, B.8. Protocol Statements
- suite
: TCP/IP Network Administration, 1.2. A Data Communications Model
- time-dependence of
: Building Internet Firewalls, 8.13. Network Time Protocol (NTP)
- tracing
: TCP/IP Network Administration, B.1. The gated Command
- transmission
- sendmail, 26.1.3.8. proto= the protocol used in transmission
- sendmail, 31.10. Alphabetized Reference
- $r macro
: sendmail, 31.10. Alphabetized Reference
- setting
: sendmail, 36.7. Alphabetized Reference
- weaknesses of, and proxy services
: Building Internet Firewalls, 7.1.2.5. Proxy services don't protect you from all protocol
- Protocol Data Units (PDUs)
: TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- protocols file
- TCP/IP Network Administration, 2.7.1. Protocol Numbers
- TCP/IP Network Administration, 5.4. The Internet Daemon
- TCP/IP Network Administration, 9.3. Network Information Service
- Protocols table (NIS+)
: Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
- proxy servers/services
- Building Internet Firewalls, 4.1. Some Firewall Definitions
- Building Internet Firewalls, 4.1.2. Proxy Services
- Building Internet Firewalls, 7. Proxy Systems
- Building Internet Firewalls, 7.4. Using Proxying with Internet
- TCP/IP Network Administration, 4.2.1. Obtaining an IP Address
- TCP/IP Network Administration, 5.3.1.1. Options
- TCP/IP Network Administration, 12.7. Firewalls
- application- versus circuit-level
: Building Internet Firewalls, 7.3.1. Application-Level Versus Circuit-Level
- characteristics of
- Archie
: Building Internet Firewalls, 8.7.3.2. Proxying characteristics of
- Berkeley r commands
: Building Internet Firewalls, 8.4.1.2. Proxying characteristics of the
- DNS
: Building Internet Firewalls, 8.10.2. Proxying Characteristics of
- finger
: Building Internet Firewalls, 8.8.1.2. Proxying characteristics of finger
- FSP
: Building Internet Firewalls, 8.2.3.2. Proxying characteristics of
- FTP
: Building Internet Firewalls, 8.2.1.2. Proxying characteristics of
- Gopher
: Building Internet Firewalls, 8.7.1.2. Proxying characteristics of Gopher
- HTTP
: Building Internet Firewalls, 8.6.2. Proxying Characteristics of
- IRC
: Building Internet Firewalls, 8.9.2.2. Proxying characteristics of
- lp
: Building Internet Firewalls, 8.17.3. Packet Filtering and Proxying
- lpr
: Building Internet Firewalls, 8.17.2. Proxying Characteristics of lpr
- NFS
: Building Internet Firewalls, 8.14.2. Proxying Characteristics of
- NIS
: Building Internet Firewalls, 8.15.2. Proxying Characteristics of
- NNTP
- Building Internet Firewalls, 8.5.2. Proxying Characteristics of
- Building Internet Firewalls, 8.5.4. Good Ways to Set up
- NTP
: Building Internet Firewalls, 8.13.2. Proxying Characteristics of
- ping
: Building Internet Firewalls, 8.12.3.2. Proxying characteristics of ping
- POP
: Building Internet Firewalls, 8.1.2.2. Proxying characteristics of
- rex
: Building Internet Firewalls, 8.4.3.2. Proxying characteristics of rex
- rexec
: Building Internet Firewalls, 8.4.2.2. Proxying characteristics of
- RIP
: Building Internet Firewalls, 8.12.2.2. Proxying characteristics of
- SMTP
: Building Internet Firewalls, 8.1.1.5. Proxying characteristics of SMTP
- SNMP
: Building Internet Firewalls, 8.12.1.2. Proxying characteristics of SNMP
- syslog
: Building Internet Firewalls, 8.11.2. Proxying Characteristics of syslog
- talk
: Building Internet Firewalls, 8.9.1.2. Proxying characteristics of talk
- Telnet
: Building Internet Firewalls, 8.3.2. Proxying Characteristics of Telnet
- TFTP
: Building Internet Firewalls, 8.2.2.2. Proxying characteristics of
- traceroute
: Building Internet Firewalls, 8.12.4.2. Proxying characteristics of
- UUCP
: Building Internet Firewalls, 8.2.4.2. Proxying characteristics of UUCP
- WAIS
: Building Internet Firewalls, 8.7.2.2. Proxying characteristics of
- whois
: Building Internet Firewalls, 8.8.2.2. Proxying characteristics of whois
- checklist for
: Practical UNIX & Internet Security, A.1.1.21. Chapter 22: Wrappers and Proxies
- generic versus dedicated
: Building Internet Firewalls, 7.3.2. Generic Versus Dedicated Proxies
- intelligent servers
: Building Internet Firewalls, 7.3.3. Intelligent Proxy Servers
- internal versus external clients
: Building Internet Firewalls, 7.4.5. Internal Versus External Clients
- Internet services and
: Building Internet Firewalls, 7.4. Using Proxying with Internet
- multiple operating systems and
: Building Internet Firewalls, 7.1. Why Proxying?
- protocol security
: Building Internet Firewalls, 7.4.3. Protocol Security
- providing on a firewall
: TCP/IP Network Administration, 12.7.1. Functions of the firewall
- SOCKS package for
: Building Internet Firewalls, 7.6. Using SOCKS for
- software for
: Building Internet Firewalls, 7.2. How Proxying Works
- TIS Internet Firewalls Toolkit for
: Building Internet Firewalls, 7.7. Using the TIS
- tools for
: Building Internet Firewalls, B.4. Proxy Systems Tools
- versus packet filtering
: Building Internet Firewalls, 6.1.1.2. Packet filtering doesn't require user knowledge or
- when unable to provide
: Building Internet Firewalls, 7.8. What If You Can't Proxy?
- without proxy server
: Building Internet Firewalls, 7.5. Proxying Without a Proxy Server
- proxyarp option
: TCP/IP Network Administration, A.2. The PPP Daemon
- pruning route addresses
: sendmail, 34.8. Alphabetized Reference
- pruning the wtmp file
: Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file
- ps command
- Practical UNIX & Internet Security, 6.6.2. des: The Data Encryption Standard
- Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
- Practical UNIX & Internet Security, 19.3.2.3. Making sure Secure RPC programs are running on every
- Practical UNIX & Internet Security, 24.2.1. Catching One in the Act
- Practical UNIX & Internet Security, C.1.2. The ps Command
- Practical UNIX & Internet Security, C.1.2.2. Listing processes with Berkeley-derived versions of
- sendmail, 4.1.1.3. Kill and restart, old versions
- TCP/IP Network Administration, 12.4.1. Know Your System
- with kill command
: Practical UNIX & Internet Security, 24.2.5. Getting Rid of the Intruder
- to stop process overload
- Practical UNIX & Internet Security, 25.2.1.1. Too many processes
- Practical UNIX & Internet Security, 25.2.1.2. System overload attacks
- PSBUFSIZ macro
: sendmail, 18.8. Alphabetized Reference
- pseudo-device statement
: TCP/IP Network Administration, 5.3.1.2. Pseudo-device
- pseudo-devices
: Practical UNIX & Internet Security, 5.6. Device Files
- pseudo-domains
: TCP/IP Network Administration, 10.7.1. Modifying Local Information
- pseudorandom functions
: Practical UNIX & Internet Security, 23.6. Tips on Generating Random Numbers
- pseudo-terminals
: TCP/IP Network Administration, 5.3.1.2. Pseudo-device
- PTR resource records
- TCP/IP Network Administration, 8.3.5. The Reverse Domain File
- TCP/IP Network Administration, C.3.1.6. Domain Name Pointer record
- ptys
: TCP/IP Network Administration, 5.3.1.2. Pseudo-device
- PUBDIR= command
: Practical UNIX & Internet Security, 15.5.2. Permissions Commands
- public key cryptography
- Building Internet Firewalls, 10. Authentication and Inbound
- Practical UNIX & Internet Security, 6.4. Common Cryptographic Algorithms
- Practical UNIX & Internet Security, 6.4.2. Summary of Public Key Systems
- Practical UNIX & Internet Security, 6.4.6. RSA and Public Key Cryptography
- Practical UNIX & Internet Security, 6.4.6.3. Strength of RSA
- Practical UNIX & Internet Security, 6.5.3. Digital Signatures
- Practical UNIX & Internet Security, 18.3. Controlling Access to Files on Your Server
- Practical UNIX & Internet Security, 18.6. Dependence on Third Parties
- TCP/IP Network Administration, 12.6. Encryption
- breaking
: Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
- PGP
: Practical UNIX & Internet Security, 6.6.3.2. Creating your PGP public key
- proving identity with
: Practical UNIX & Internet Security, 19.3.1.1. Proving your identity
- publicity hounds
: Practical UNIX & Internet Security, 11.3. Authors
- publicizing security holes
: Practical UNIX & Internet Security, 2.5.1. Going Public
- publickey file
: Practical UNIX & Internet Security, 19.3.2.1. Creating passwords for users
- pulse code modulation (PCM) audio subtype
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- Purdue University (PCERT)
: Practical UNIX & Internet Security, F.3.4.30. Purdue University
- purgestat command
: sendmail, 36.1.4. purgestat (V8.8 and Above)
- purging persistent-host status
: sendmail, 36.7. Alphabetized Reference
- Purify
: Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- pursuing intruders
: Building Internet Firewalls, 13.3. Pursuing and Capturing the
- pwck command
: Practical UNIX & Internet Security, 8.2. Monitoring File Format
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
O'Reilly & Associates, Inc.
All Rights Reserved.