start page  | rating of books | rating of authors | reviews | copyrights
  
  
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z  
Index: U
   - U.S. Department of Energy : F.3.4.12. France: universities, Ministry of Research and Education in France, CNRS, CEA, INRIA, CNES, INRA, IFREMER, and EDF - U.S. Department of the Navy : F.3.4.44. U.S. Department of the Navy - U.S. law : (see laws) - U.S. Secret Service 
-    - 26.2.2. Federal Jurisdiction   - F.3.3. U.S. Secret Service (USSS) 
 
- UDP (User Datagram Protocol) 
-    - 16.2.4.3. UDP   - 17.1.3. The /etc/inetd Program   - (see also network services)   - packet relayer : E.4.15. UDP Packet Relayer 
 
- ufsdump : (see dump/restore program) - UIDs (user identifiers) 
-    - 4.1. Users and Groups   - 4.1.2. Multiple Accounts with the Same UID   - real versus effective   
-      - 4.3.1. Real and Effective UIDs     - C.1.3.2. Process real and effective UID   
 
- RPC requests and : 19.2.2.2. AUTH_UNIX   - su command and : 10.1.2.1. su command and /etc/utmp and /var/adm/wtmp files   - of web servers : 18.2.1. The Server's UID   - zero : (see root account; superuser) 
 
- UK Defense Research Agency : F.3.4.37. UK: Defense Research Agency - ulimit command : 25.2.5. Soft Process Limits: Preventing Accidental  Denial of Service - Ultrix : 1.3. History of UNIX 
-    - trusted path : 8.5.3.1. Trusted path   - UUCP : 15.4.1.3. Format of USERFILE entry without system name 
 
- umask 
-    - 5.3. The umask   - 5.3.2. Common umask Values   - 8.4.3. Finding Dormant Accounts 
 
- unattended terminals 
-    - 12.3.5. Unattended Terminals   - 12.3.5.2. X screen savers 
 
- uninterruptable power supply (UPS) 
-    - 2.2. Risk Assessment   - 12.2.1.1. Fire 
 
- Unisys : F.3.4.39. UK: other government departments and agencies - universes : 5.9.1. Dual Universes - UNIX : 1. Introduction 
-    - add-on functionality of : 1.4.3. Add-On Functionality Breeds Problems   - conventional passwords : 3.2.6. Conventional UNIX Passwords   - DAC (Discretionary Access Controls) : 4.1.3. Groups and Group Identifiers (GIDs)   - DNS under : 16.2.6.1. DNS under UNIX   - encryption programs for   
-      - 6.6. Encryption Programs Available for UNIX     - 6.6.3.6. PGP detached signatures   
 
- filesystem   
-      - 5. The UNIX Filesystem     - 5.10. Summary   
 
- history of : 1.3. History of UNIX   - modems and   
-      - 14.5. Modems and UNIX     - 14.5.3.3. Privilege testing   
 
- networking and : 16.1.2. Networking and UNIX   - operating systems : (see operating systems)   - primary network services   
-      - 17.3. Primary UNIX Network Services     - 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)   
 
- process scheduler : C.1.3.3. Process priority and niceness   - processes : (see processes)   - programming references : D.1.11. UNIX Programming and System Administration   - published resources for : D.1. UNIX Security References   - security and   
-      - 1.4. Security and UNIX     - 1.4.3. Add-On Functionality Breeds Problems   
 
- signals : C.3. Signals   - starting up   
-      - C.5. Starting Up UNIX and Logging In     - C.5.3. Running the User's Shell   
 
- Version 6 : 1.3. History of UNIX   - viruses : (see viruses)   - web server on : 18.2. Running a Secure Server 
 
- unlinked files : 25.2.2.7. Hidden space - unowned files : 24.4.1.8. Unowned files - unplugging connections : 24.2.5. Getting Rid of the Intruder - unpredictability of randomness : 23.6. Tips on Generating Random Numbers - upgrades, logging : 10.7.2.1. Exception and activity reports - uploading stored information : 12.3.4. Protecting Local Storage - UPS (uninterruptable power supply) 
-    - 2.2. Risk Assessment   - 12.2.1.1. Fire 
 
- uptime command : 8.1.3. Accounts That Run a Single Command - urandom device : 23.7.4. Other random number generators - Usenet 
-    - 17.3.13. Network News Transport Protocol (NNTP)  (TCP Port 119)   - E.2. Usenet Groups   - (see also NNTP)   - cleanup scripts : 11.5.3. Abusing Automatic Mechanisms   - encryption for : (see ROT13 algorithm)   - posting breakins to : 24.6. Resuming Operation   - reporting security holes on : 2.5.1. Going Public 
 
- User Datagram Protocol (UDP) : 16.2.4.3. UDP - user error : 7.1.1.1. A taxonomy of computer failures - user IDs : (see UIDs) - USERFILE file (UUCP) 
-    - 15.4.1. USERFILE: Providing Remote File Access   - 15.4.2.1. Some bad examples 
 
- usermod command 
-    - -e option : 8.4.3. Finding Dormant Accounts   - -f option : 8.4.3. Finding Dormant Accounts   - -s option : 8.3. Restricting Logins 
 
- usernames : 3.1. Usernames 
-    - aliases for : 8.8.9. Account Names Revisited: Using Aliases  for Increased Security   - doubling as passwords (Joes) : 3.6.2. Smoking Joes   - last command and : 10.1.3. last Program   - as passwords : 8.8.3.1. Joetest: a simple password cracker   - special   
-      - 4.2. Special Usernames     - 4.2.3. Impact of the /etc/passwd and /etc/group Files  on Security   
 
- using someone else's   
-      - 4.3. su: Changing Who You Claim to Be     - 4.3.8. Other Uses of su   
 
 
- users 
-    - 4. Users, Groups, and the Superuser   - 4.1. Users and Groups   - 4.1.2. Multiple Accounts with the Same UID   - (see also groups; su command)   - assigning passwords to : 8.8.1. Assigning Passwords to Users   - auditing who is logged in   
-      - 10.1.2. utmp and wtmp Files     - 10.1.2.1. su command and /etc/utmp and /var/adm/wtmp files   
 
- authentication for Web : 18.3.3. Setting Up Web Users and Passwords   - becoming other   
-      - 4.3. su: Changing Who You Claim to Be     - 4.3.8. Other Uses of su   
 
- checklist for : A.1.1.2. Chapter 3: Users and Passwords   - dormant accounts and   
-      - 8.4. Managing Dormant Accounts     - 8.4.3. Finding Dormant Accounts   
 
- identifiers for : (see UIDs)   - importing to NIS server   
-      - 19.4.1. Including or excluding specific accounts:     - 19.4.4.2. Using netgroups to limit the importing of accounts   
 
- letting in threats : 11.4. Entry   - limited : 8.1.5.1. Limited users   - logging   
-      - 10.4. Per-User Trails in the Filesystem     - 10.4.3. Network Setup   
 
- NIS passwords for : 19.3.2.1. Creating passwords for users   - nobody (Secure RPC) : 19.3.2.1. Creating passwords for users   - notifying about monitoring : 26.2.6. Other Tips   - proving identity of : 19.3.1.1. Proving your identity   - recognizing as intruders   
-      - 24.2. Discovering an Intruder     - 24.2.6. Anatomy of a Break-in   
 
- restricting certain : 18.3. Controlling Access to Files on Your Server   - root : (see root account; superuser)   - sending messages to : 10.5.1. The syslog.conf Configuration File   - summarizing system usage by : 25.2.2.2. quot command   - tainting : 18.2.3.4. Tainting with Perl   - training : 13.2.1. Initial Training   - UIDs : (see UIDs)   - unattended terminals   
-      - 12.3.5. Unattended Terminals     - 12.3.5.2. X screen savers   
 
- USERFILE entries for : 15.4.1.2. USERFILE entries for local users   - www : 18.2.2. Understand Your Server's Directory Structure 
 
- users command 
-    - 10.1.2. utmp and wtmp Files   - 24.2.1. Catching One in the Act 
 
- USG (UNIX Support Group) : 1.3. History of UNIX - /usr directory 
-    - 4.3.7. The Bad su Log   - (see also /var directory)   - backing up /usr/bin : 7.1.2. What Should You Back Up?   - /usr/adm directory : 11.5.3.6. Other files   - /usr/adm/lastlog file : 10.1.1. lastlog File   - /usr/adm/messages file : 10.2.3. messages Log File   - /usr/bin directory   
-      - 11.1.5. Viruses     - 11.5.1.1. PATH attacks   
 
- /usr/bin/uudecode : (see uudecode program)   - /usr/etc/yp/makedbm program : 19.4.4.1. Setting up netgroups   - /usr/lib/aliases file : 11.5.3.3. /usr/lib/aliases, /etc/aliases, /etc/sendmail/aliases, aliases.dir, or aliases.pag   - /usr/lib directory : 11.5.3.6. Other files   
-      - in restricted filesystems : 8.1.5. Restricted Filesystem   
 
- /usr/lib/preserve program : 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole   - /usr/lib/sendmail : (see sendmail)   - /usr/lib/uucp/Devices file : 14.5.1. Hooking Up a Modem to Your Computer   - /usr/lib/uucp directory   
-      - 15.4.2.1. Some bad examples     - 15.5.2. Permissions Commands   
 
- /usr/lib/uucp/L-devices file : 14.5.1. Hooking Up a Modem to Your Computer   - /usr/lib/uucp/L.cmds file : (see L.cmds file)   - /usr/lib/uucp/L.sys file : 15.3.3. Security of L.sys and Systems Files   - /usr/lib/uucp/Permissions file : (see Permissions file)   - /usr/lib/uucp/Systems file : 15.3.3. Security of L.sys and Systems Files   - /usr/lib/uucp/USERFILE file   
-      - 15.4.1. USERFILE: Providing Remote File Access     - 15.4.2.1. Some bad examples   
 
- /usr/local/bin : 1.1. What Is Computer Security?   - /usr/local/bin directory : 11.5.1.1. PATH attacks   - /usr/local/etc/http/logs directory : 10.3.5. access_log Log File   - /usr/local/lib directory : 11.5.3.6. Other files   - /usr/sbin/rexecd : (see rexec service)   - /usr/spool/cron/crontabs directory : 15.6.2. Automatic Execution of Cleanup Scripts   - /usr/spool/uucp directory : 15.1.4. How the UUCP Commands Work   - /usr/spool/uucppublic : (see uucppublic directory)   - /usr/ucb directory : 11.1.5. Viruses 
 
- utility programs : 1.2. What Is an Operating System? - utimes commandn : 24.5.1. Never Trust Anything Except Hardcopy - utmp file 
-    - 10.1.2. utmp and wtmp Files   - 10.1.2.1. su command and /etc/utmp and /var/adm/wtmp files   - 24.2.1. Catching One in the Act   - 24.2.4. Tracing a Connection 
 
- uucheck program : 15.5.3. uucheck: Checking Your Permissions File - uucico program 
-    - 15.1.4. How the UUCP Commands Work   - 15.3. UUCP and Security   - 15.5.1.1. Starting up 
 
- uucp (user) 
-    - 4.1. Users and Groups   - 4.2.2. Other Special Users 
 
- uucp command : 15.1.1. uucp Command - UUCP system 
-    - 4.1.2. Multiple Accounts with the Same UID   - 14.5. Modems and UNIX   - 15. UUCP   - 15.9. Summary   - additional logins : 15.3.1. Assigning Additional UUCP Logins   - BNU   
-      - 15.2. Versions of UUCP     - 15.5. Security in BNU UUCP     - 15.5.3. uucheck: Checking Your Permissions File   
 
- checklist for : A.1.1.14. Chapter 15: UUCP   - cleanup scripts   
-      - 11.5.3. Abusing Automatic Mechanisms     - 15.6.2. Automatic Execution of Cleanup Scripts   
 
- early security problems : 15.7. Early Security Problems with UUCP   - HoneyDanBer (HDB) : 15.2. Versions of UUCP   - logging : 10.3.4. uucp Log Files   - mail forwarding : 15.6.1. Mail Forwarding for UUCP   - naming computer : 15.5.2. Permissions Commands   - over networks : 15.8. UUCP Over Networks   - NFS server and : 15.3. UUCP and Security   - passwords for : 15.3.2. Establishing UUCP Passwords   - Taylor : 15.2. Versions of UUCP   - over TCP : 17.3.20. UUCP over TCP (TCP Port 540)   - Version 2   
-      - 15.2. Versions of UUCP     - 15.4. Security in Version 2 UUCP     - 15.4.3. L.cmds: Providing Remote Command Execution   
 
 
- uucpa account : 15.3.1. Assigning Additional UUCP Logins - uucpd program : 15.8. UUCP Over Networks - uucppublic directory 
-    - 15.1.1. uucp Command   - 15.4.1.3. Format of USERFILE entry without system name   - 15.5.2. Permissions Commands 
 
- uudecode program : 17.3.4.2. Using sendmail to receive email - uuencode program : 6.6.1.2. Ways of improving the security of crypt - uux command : 15.1.2. uux Command 
-    - - (hyphen) option : 15.1.2. uux Command   - -r option : 15.1.4. How the UUCP Commands Work 
 
- uuxqt program : 15.4.1.3. Format of USERFILE entry without system name - uuxqtcmds files : 15.4.3. L.cmds: Providing Remote Command Execution 
 
  Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z  
Copyright © 1999  O'Reilly & Associates, Inc. All Rights Reserved.