Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: V
- V configuration command
- sendmail, 5.2.1. Version
- sendmail, 27.5. The V Configuration Command
- sendmail, D. Sun Enhancements
- -v database switch
: sendmail, 33.3.4.11. -v specify the value's column (V8.7 and above)
- V line (host status file)
: sendmail, B.1. Status file lines
- V line (qf file)
: sendmail, 23.9. The qf File Internals
- $v macro
: sendmail, 31.10. Alphabetized Reference
- $V macro
: sendmail, 31.10. Alphabetized Reference
- v option
: (see Verbose (v) option)
- V option
: (see FallbackMXhost (V) option)
- -v switch (makemap)
: sendmail, 33.2.1.6. -v watch keys and data being added
- -v switch (sendmail)
- sendmail, 4.2. Verbose (-v)
- sendmail, 23.4.1. Printing the Queue in Verbose Mode
- sendmail, 23.6.2.2. Combine -v with -q
- sendmail, 36.7. Alphabetized Reference
- -V switch (sendmail)
: sendmail, 36.7. Alphabetized Reference
- V.35
: TCP/IP Network Administration, 1.2. A Data Communications Model
- V8 sendmail
: sendmail, 29.3.1. V8 Enhancements
- comments and
: sendmail, 27.3. V8 Comments
- killing and restarting daemon
: sendmail, 4.1.1.1. Kill and restart, beginning with V8.7
- m4 preprocessor
: sendmail, 19. V8 m4 Configuration
- obtaining source code
: sendmail, 2.1. Get the Source
- Sun Microsystem V8.8 enhancements
: sendmail, D. Sun Enhancements
- vacation program
: sendmail, 25.5.5. Precedence: bulk
- vacuums, computer
: Practical UNIX & Internet Security, 12.2.1.3. Dust
- VALIDATE= command
: Practical UNIX & Internet Security, 15.5.2. Permissions Commands
- validating firewalls
: Building Internet Firewalls, 6.8.7. It Should Be Able to Log Accepted and
- vampire taps
: Practical UNIX & Internet Security, 12.3.1.5. Fiber optic cable
- Van Jacobson header compression
- Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
- TCP/IP Network Administration, 5.2. Linux Kernel Configuration
- TCP/IP Network Administration, 6.4.1. slattach
- disabling
: TCP/IP Network Administration, A.2. The PPP Daemon
- vandalism
- Building Internet Firewalls, 1.2.2.2. Vandals
- Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
- Practical UNIX & Internet Security, 12.2.4. Vandalism
- Practical UNIX & Internet Security, 12.2.4.3. Network connectors
- /var directory
- Practical UNIX & Internet Security, 4.3.7. The Bad su Log
- Practical UNIX & Internet Security, 9.1.2. Read-only Filesystems
- (see also /usr directory)
- /var/adm directory
: Practical UNIX & Internet Security, 11.5.3.6. Other files
- /var/adm/acct
: Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File
- /var/adm/lastlog file
: Practical UNIX & Internet Security, 10.1.1. lastlog File
- /var/adm/loginlog file
: Practical UNIX & Internet Security, 10.1.4. loginlog File
- /var/adm/messages
- Practical UNIX & Internet Security, 10.2.3. messages Log File
- Practical UNIX & Internet Security, 4.3.7. The Bad su Log
- /var/adm/savacct
: Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File
- /var/adm/sulog file
: Practical UNIX & Internet Security, 4.3.7. The Bad su Log
- /var/adm/wtmp file
- Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
- Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file
- /var/adm/xferlog
: Practical UNIX & Internet Security, 10.3.3. xferlog Log File
- /var/log directory
: Practical UNIX & Internet Security, 11.5.3.6. Other files
- /var/run/dhcpd.pid file
: TCP/IP Network Administration, D.2. The dhcpd Command
- /var/spool/mqueue temporary files
: TCP/IP Network Administration, 10.5.4. The Set Option Command
- /var/spool/uucp/.Admin directory
: Practical UNIX & Internet Security, 10.3.4. uucp Log Files
- /var/yp/Makefile file
: sendmail, 7.3.1. The hostname
- variable-length subnet masks (VLSMs)
: TCP/IP Network Administration, 4.2.2. Defining the Subnet Mask
- variables
- bounds checking
: Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- to CGI scripts
: Practical UNIX & Internet Security, 18.2.3.1. Do not trust the user's browser!
- environment
- sendmail, 5.3.12. Environment variables
- sendmail, 22.2. The Environment
- global
: sendmail, 20.1.2. Global Variables
- Vendor Extensions field, in BOOTP
: TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- vendors
: Practical UNIX & Internet Security, 27.3.3. Your Vendor?
- liability of
: Practical UNIX & Internet Security, 18.5.2. Trusting Your Software Vendor
- sendmail versions
- sendmail, 18.2. Vendor Versus Compiling
- sendmail, 27.5.1. The vendor
- (see also versions)
- vendor-neutral language
: TCP/IP Network Administration, 11.9. Simple Network Management Protocol
- vendor-specific syntax
: TCP/IP Network Administration, 10.5.1. The Version Level Command
- ventilation
- Practical UNIX & Internet Security, 12.2.1.10. Vibration
- (see also dust; smoke and smoking)
- air ducts
: Practical UNIX & Internet Security, 12.2.3.2. Entrance through air ducts
- holes (in hardware)
: Practical UNIX & Internet Security, 12.2.4.1. Ventilation holes
- VERB command (ESMTP)
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- VERB command (sendmail)
: Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
- VERB command (SMTP)
: sendmail, 30.8. Alphabetized F= Flags
- Verbose (v) option
- sendmail, 34.1.3. Appropriateness of Options
- sendmail, 34.8. Alphabetized Reference
- verbose mode
- sendmail, 4.2. Verbose (-v)
- sendmail, 23.4.1. Printing the Queue in Verbose Mode
- sendmail, 23.6.2.2. Combine -v with -q
- sendmail, 34.8. Alphabetized Reference
- sendmail, 36.7. Alphabetized Reference
- TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
- TCP/IP Network Administration, A.1. Dial-Up IP
- TCP/IP Network Administration, A.3. chat
- verify mode
- sendmail, 4.1.4. Verify Mode (-bv)
- sendmail, 36.7. Alphabetized Reference
- verifying
: (see testing)
- Verisign Inc.
: Practical UNIX & Internet Security, 18.6. Dependence on Third Parties
- versions
- sendmail, 5.2.1. Version
- (see also V configuration command)
- BIND
: sendmail, 21.1.1. Which DNS? 4.8.3 or 4.9?
- host status file
: sendmail, B.1. Status file lines
- m4
- sendmail, 19.2. Build with m4
- sendmail, 31.10. Alphabetized Reference
- mc files
: sendmail, 19.6. Alphabetized m4 Macros
- qf file
: sendmail, 23.9. The qf File Internals
- sendmail
- sendmail, UNIX and sendmail Versions
- sendmail, 5.2.1. Version
- sendmail, 18.2. Vendor Versus Compiling
- sendmail, 27.5. The V Configuration Command
- sendmail, 31.10. Alphabetized Reference
- sendmail, D.2. Backward Compatibility
- UUCP
- Practical UNIX & Internet Security, 15.2. Versions of UUCP
- Practical UNIX & Internet Security, 15.4. Security in Version 2 UUCP
- Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution
- callback feature
: Practical UNIX & Internet Security, 15.4.1.5. Requiring callback
- V configuration command
: sendmail, D. Sun Enhancements
- VERSIONID macro
- sendmail, 19.6. Alphabetized m4 Macros
- TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros
- vertical bar (|)
- ! flag
: sendmail, 30.8. Alphabetized F= Flags
- | prefix
- sendmail, 22.4.3. The F Command - Program Form
- sendmail, 24.2.3. Delivery via Programs
- in addresses
: (see programs, delivering to)
- Veteran's Health Administration
: Practical UNIX & Internet Security, F.3.4.45. U.S. Veteran's Health Administration
- vi editor
- Practical UNIX & Internet Security, 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve
- Practical UNIX & Internet Security, 11.5.2.4. .exrc
- Practical UNIX & Internet Security, 11.5.2.7. Other initializations
- "Via:" header line
: sendmail, 35.10. Alphabetized Reference
- vibration
: Practical UNIX & Internet Security, 12.2.1.10. Vibration
- victim hosts
: Building Internet Firewalls, 5.6. Selecting Services Provided by the
- victim machines
: Building Internet Firewalls, 5.2.2. Victim Machines
- video content type
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- video tape
: Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
- view command
- TCP/IP Network Administration, 8.4. Using nslookup
- TCP/IP Network Administration, 11.6. Checking Name Service
- vipw command
: Practical UNIX & Internet Security, 8.4.1. Changing an Account's Password
- virtual links
: TCP/IP Network Administration, B.8.1. The ospf Statement
- virtual terminal devices
: TCP/IP Network Administration, 5.3.1.2. Pseudo-device
- virtual terminals
: (see Telnet service)
- virtusertable feature
: sendmail, 19.6. Alphabetized m4 Macros
- Virual Private Networks (VPNs)
: Practical UNIX & Internet Security, 21.1.2. Uses of Firewalls
- VIRUS-L list
: TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
- viruses
- Building Internet Firewalls, 1.4.2.4. A firewall can't protect against
- Practical UNIX & Internet Security, 11.1. Programmed Threats: Definitions
- Practical UNIX & Internet Security, 11.1.5. Viruses
- Practical UNIX & Internet Security, 27.2.2. Viruses on the Distribution Disk
- voice authentication
: Building Internet Firewalls, 10.2.1. Something You Are
- voice-message multipart subtype
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- voltage levels
: TCP/IP Network Administration, 1.2. A Data Communications Model
- voltage spikes
: Practical UNIX & Internet Security, 12.2.1.8. Electrical noise
- VPNs (virtual private networks)
: Practical UNIX & Internet Security, 21.1.2. Uses of Firewalls
- VRFY command (SMTP)
- Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
- sendmail, 22.3.2. SMTP vrfy and expn
- sendmail, 22.8.3.5. The PrivacyOptions option
- sendmail, 30.8. Alphabetized F= Flags
- TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
- vsprintf function
: Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- VT100 terminal
: Practical UNIX & Internet Security, 27.2.1. Hardware Bugs
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
O'Reilly & Associates, Inc.
All Rights Reserved.