start page  | rating of books | rating of authors | reviews | copyrights
  
  
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z  
Index: V
   - V configuration command 
-    - sendmail, 5.2.1. Version    - sendmail, 27.5. The V Configuration Command    - sendmail, D. Sun Enhancements  
 
- -v database switch : sendmail, 33.3.4.11. -v  specify the value's column (V8.7 and above)  - V line (host status file) : sendmail, B.1. Status file lines  - V line (qf file) : sendmail, 23.9. The qf File Internals  - $v macro : sendmail, 31.10. Alphabetized Reference  - $V macro : sendmail, 31.10. Alphabetized Reference  - v option : (see Verbose (v) option) - V option : (see FallbackMXhost (V) option) - -v switch (makemap) : sendmail, 33.2.1.6. -v  watch keys and data being added  - -v switch (sendmail) 
-    - sendmail, 4.2. Verbose (-v)    - sendmail, 23.4.1. Printing the Queue in Verbose Mode    - sendmail, 23.6.2.2. Combine -v with -q    - sendmail, 36.7. Alphabetized Reference  
 
- -V switch (sendmail) : sendmail, 36.7. Alphabetized Reference  - V.35 : TCP/IP Network Administration, 1.2. A Data Communications Model - V8 sendmail : sendmail, 29.3.1. V8 Enhancements  
-    - comments and : sendmail, 27.3. V8 Comments    - killing and restarting daemon : sendmail, 4.1.1.1. Kill and restart, beginning with V8.7    - m4 preprocessor : sendmail, 19. V8 m4 Configuration    - obtaining source code : sendmail, 2.1. Get the Source    - Sun Microsystem V8.8 enhancements : sendmail, D. Sun Enhancements  
 
- vacation program : sendmail, 25.5.5. Precedence: bulk  - vacuums, computer : Practical UNIX & Internet Security, 12.2.1.3. Dust  - VALIDATE= command : Practical UNIX & Internet Security, 15.5.2. Permissions Commands  - validating firewalls : Building Internet Firewalls, 6.8.7. It Should Be Able to Log Accepted and - vampire taps : Practical UNIX & Internet Security, 12.3.1.5. Fiber optic cable  - Van Jacobson header compression 
-    - Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4   - TCP/IP Network Administration, 5.2. Linux Kernel Configuration    - TCP/IP Network Administration, 6.4.1. slattach    - disabling : TCP/IP Network Administration, A.2. The PPP Daemon 
 
- vandalism 
-    - Building Internet Firewalls, 1.2.2.2. Vandals   - Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures   - Practical UNIX & Internet Security, 12.2.4. Vandalism    - Practical UNIX & Internet Security, 12.2.4.3. Network connectors  
 
- /var directory 
-    - Practical UNIX & Internet Security, 4.3.7. The Bad su Log    - Practical UNIX & Internet Security, 9.1.2. Read-only Filesystems   - (see also /usr directory)   - /var/adm directory : Practical UNIX & Internet Security, 11.5.3.6. Other files    
-      - /var/adm/acct : Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File      - /var/adm/lastlog file : Practical UNIX & Internet Security, 10.1.1. lastlog File      - /var/adm/loginlog file : Practical UNIX & Internet Security, 10.1.4. loginlog File     - /var/adm/messages     
-        - Practical UNIX & Internet Security, 10.2.3. messages Log File       - Practical UNIX & Internet Security, 4.3.7. The Bad su Log      
 
- /var/adm/savacct : Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File      - /var/adm/sulog file : Practical UNIX & Internet Security, 4.3.7. The Bad su Log      - /var/adm/wtmp file     
-        - Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files        - Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file      
 
- /var/adm/xferlog : Practical UNIX & Internet Security, 10.3.3. xferlog Log File   
 
- /var/log directory : Practical UNIX & Internet Security, 11.5.3.6. Other files    - /var/run/dhcpd.pid file : TCP/IP Network Administration, D.2. The dhcpd Command   - /var/spool/mqueue temporary files : TCP/IP Network Administration, 10.5.4. The Set Option Command    - /var/spool/uucp/.Admin directory : Practical UNIX & Internet Security, 10.3.4. uucp Log Files   - /var/yp/Makefile file : sendmail, 7.3.1. The hostname  
 
- variable-length subnet masks (VLSMs) : TCP/IP Network Administration, 4.2.2. Defining the Subnet Mask  - variables 
-    - bounds checking : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs   - to CGI scripts : Practical UNIX & Internet Security, 18.2.3.1. Do not trust the user's browser!   - environment   
-      - sendmail, 5.3.12. Environment variables      - sendmail, 22.2. The Environment    
 
- global : sendmail, 20.1.2. Global Variables  
 
- Vendor Extensions field, in BOOTP : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol - vendors : Practical UNIX & Internet Security, 27.3.3. Your Vendor? 
-    - liability of : Practical UNIX & Internet Security, 18.5.2. Trusting Your Software Vendor   - sendmail versions   
-      - sendmail, 18.2. Vendor Versus Compiling      - sendmail, 27.5.1. The vendor      - (see also versions)   
 
- vendor-neutral language : TCP/IP Network Administration, 11.9. Simple Network Management Protocol    - vendor-specific syntax : TCP/IP Network Administration, 10.5.1. The Version Level Command  
 
- ventilation 
-    - Practical UNIX & Internet Security, 12.2.1.10. Vibration    - (see also dust; smoke and smoking)   - air ducts : Practical UNIX & Internet Security, 12.2.3.2. Entrance through air ducts    - holes (in hardware) : Practical UNIX & Internet Security, 12.2.4.1. Ventilation holes  
 
- VERB command (ESMTP) : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions - VERB command (sendmail) : Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8 - VERB command (SMTP) : sendmail, 30.8. Alphabetized F= Flags - Verbose (v) option 
-    - sendmail, 34.1.3. Appropriateness of Options   - sendmail, 34.8. Alphabetized Reference 
 
- verbose mode 
-    - sendmail, 4.2. Verbose (-v)    - sendmail, 23.4.1. Printing the Queue in Verbose Mode    - sendmail, 23.6.2.2. Combine -v with -q    - sendmail, 34.8. Alphabetized Reference    - sendmail, 36.7. Alphabetized Reference    - TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections    - TCP/IP Network Administration, A.1. Dial-Up IP   - TCP/IP Network Administration, A.3. chat 
 
- verify mode 
-    - sendmail, 4.1.4. Verify Mode (-bv)    - sendmail, 36.7. Alphabetized Reference  
 
- verifying : (see testing) - Verisign Inc. : Practical UNIX & Internet Security, 18.6. Dependence on Third Parties - versions 
-    - sendmail, 5.2.1. Version    - (see also V configuration command)   - BIND : sendmail, 21.1.1. Which DNS? 4.8.3 or 4.9?    - host status file : sendmail, B.1. Status file lines    - m4   
-      - sendmail, 19.2. Build with m4      - sendmail, 31.10. Alphabetized Reference    
 
- mc files : sendmail, 19.6. Alphabetized m4 Macros    - qf file : sendmail, 23.9. The qf File Internals    - sendmail   
-      - sendmail, UNIX and sendmail Versions      - sendmail, 5.2.1. Version      - sendmail, 18.2. Vendor Versus Compiling      - sendmail, 27.5. The V Configuration Command      - sendmail, 31.10. Alphabetized Reference      - sendmail, D.2. Backward Compatibility    
 
- UUCP   
-      - Practical UNIX & Internet Security, 15.2. Versions of UUCP      - Practical UNIX & Internet Security, 15.4. Security in Version 2 UUCP      - Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution      - callback feature : Practical UNIX & Internet Security, 15.4.1.5. Requiring callback    
 
- V configuration command : sendmail, D. Sun Enhancements  
 
- VERSIONID macro 
-    - sendmail, 19.6. Alphabetized m4 Macros    - TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros  
 
- vertical bar (|) 
-    - ! flag : sendmail, 30.8. Alphabetized F= Flags   - | prefix   
-      - sendmail, 22.4.3. The F Command - Program Form      - sendmail, 24.2.3. Delivery via Programs    
 
- in addresses : (see programs, delivering to) 
 
- Veteran's Health Administration : Practical UNIX & Internet Security, F.3.4.45. U.S. Veteran's Health Administration - vi editor 
-    - Practical UNIX & Internet Security, 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve   - Practical UNIX & Internet Security, 11.5.2.4. .exrc    - Practical UNIX & Internet Security, 11.5.2.7. Other initializations  
 
- "Via:" header line : sendmail, 35.10. Alphabetized Reference  - vibration : Practical UNIX & Internet Security, 12.2.1.10. Vibration  - victim hosts : Building Internet Firewalls, 5.6. Selecting Services Provided by the - victim machines : Building Internet Firewalls, 5.2.2. Victim Machines - video content type : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions - video tape : Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure - view command 
-    - TCP/IP Network Administration, 8.4. Using nslookup    - TCP/IP Network Administration, 11.6. Checking Name Service  
 
- vipw command : Practical UNIX & Internet Security, 8.4.1. Changing an Account's Password  - virtual links : TCP/IP Network Administration, B.8.1. The ospf Statement - virtual terminal devices : TCP/IP Network Administration, 5.3.1.2. Pseudo-device  - virtual terminals : (see Telnet service) - virtusertable feature : sendmail, 19.6. Alphabetized m4 Macros  - Virual Private Networks (VPNs) : Practical UNIX & Internet Security, 21.1.2. Uses of Firewalls - VIRUS-L list : TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information  - viruses 
-    - Building Internet Firewalls, 1.4.2.4. A firewall can't protect against   - Practical UNIX & Internet Security, 11.1. Programmed Threats: Definitions    - Practical UNIX & Internet Security, 11.1.5. Viruses    - Practical UNIX & Internet Security, 27.2.2. Viruses on the Distribution Disk 
 
- voice authentication : Building Internet Firewalls, 10.2.1. Something You Are - voice-message multipart subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions - voltage levels : TCP/IP Network Administration, 1.2. A Data Communications Model - voltage spikes : Practical UNIX & Internet Security, 12.2.1.8. Electrical noise  - VPNs (virtual private networks) : Practical UNIX & Internet Security, 21.1.2. Uses of Firewalls - VRFY command (SMTP) 
-    - Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8   - sendmail, 22.3.2. SMTP vrfy and expn    - sendmail, 22.8.3.5. The PrivacyOptions option    - sendmail, 30.8. Alphabetized F= Flags   - TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol 
 
- vsprintf function : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs - VT100 terminal : Practical UNIX & Internet Security, 27.2.1. Hardware Bugs 
 
  Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z  
Copyright © 1999  O'Reilly & Associates, Inc. All Rights Reserved.