Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: I

I/O : (see input/output)
ICMP (Internet Control Message Protocol) : 16.2.4.1. ICMP
IDEA (International Data Encryption Algorithm)
6.4.1. Summary of Private Key Systems
6.6.3.1. Encrypting files with IDEA
identd daemon : 17.3.12. Identification Protocol (auth) (TCP Port 113)
identification protocol : 17.3.12. Identification Protocol (auth) (TCP Port 113)
identifiers : 3.1. Usernames
IEEE Computer Society : F.1.7. IEEE Computer Society
IFS variable
5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
23.4. Tips on Writing SUID/SGID Programs
attacks via : 11.5.1.2. IFS attacks
ignore (in Swatch command) : 10.6.2. The Swatch Configuration File
immutable files : 9.1.1. Immutable and Append-Only Files
importing NIS accounts
19.4.1. Including or excluding specific accounts:
19.4.4.2. Using netgroups to limit the importing of accounts
in.named daemon : 16.2.6.1. DNS under UNIX
includes : (see server-side includes)
Includes option : 18.3.2. Commands Within the <Directory> Block
IncludesNoExec option : 18.3.2. Commands Within the <Directory> Block
incremental backups : 7.1.3. Types of Backups
indecent material : 26.4.5. Pornography and Indecent Material
index.html file, absence of : 18.2.2.2. Additional configuration issues
inetd daemon
17.1.2. Starting the Servers
17.1.3. The /etc/inetd Program
-nowait option : 25.3.1. Service Overloading
-t (trace) option : 10.3.6. Logging Network Services
denial-of-service attacks : 17.1.3. The /etc/inetd Program
inetd.conf file
11.5.3.2. inetd.conf
17.3. Primary UNIX Network Services
information : (see data)
init program
5.3.2. Common umask Values
C.5.1. Process #1: /etc/init
initialization vector (IV) : 6.4.4.2. DES modes
initializing
environment variables : 11.5.2.7. Other initializations
system, files for : 11.5.3.5. System initialization files
inittab program
14.5.1. Hooking Up a Modem to Your Computer
C.5.1. Process #1: /etc/init
INND program : 17.3.13. Network News Transport Protocol (NNTP) (TCP Port 119)
inodes
5.1. Files
5.1.2. Inodes
change time : (see ctime)
for device files : 5.6. Device Files
problems with : 25.2.2.3. Inode problems
input/output (I/O)
checking for meta characters : 23.2. Tips on Avoiding Security-related Bugs
portable library : 1.3. History of UNIX
insects : 12.2.1.7. Bugs (biological)
installing
cables : 12.2.4.2. Network cables
Kerberos : 19.6.3. Installing Kerberos
logging installations : 10.7.2.1. Exception and activity reports
physical security plan for : 12.1.1. The Physical Security Plan
insurance
26.1. Legal Options After a Break-in
26.2.6. Other Tips
integrity
2.1. Planning Your Security Needs
9. Integrity Management
9.3. A Final Note
11.1.5. Viruses
12.3. Protecting Data
12.3.6. Key Switches
Kerberos : 19.6.1.3. Authentication, data integrity, and secrecy
management checklist : A.1.1.8. Chapter 9: Integrity Management
Secure RPC : 19.3.4. Limitations of Secure RPC
software for checking : 19.5.5. NIS+ Limitations
international cryptography export
6.4.4.1. Use and export of DES
6.7.2. Cryptography and Export Controls
International Data Encryption Algorithm (IDEA)
6.4.1. Summary of Private Key Systems
6.6.3.1. Encrypting files with IDEA
Internet
16.1.1. The Internet
18. WWW Security
(see also World Wide Web)
addresses
16.2.1. Internet Addresses
16.2.1.3. CIDR addresses
daemon : (see inetd daemon)
domain as NIS domain : 19.4.3. NIS Domains
firewalls : (see firewalls)
servers : (see servers, Internet)
Worm program : 1. Introduction
Worm program Worm program : 23.1.1. The Lesson of the Internet Worm
Internet Control Message Protocol (ICMP) : 16.2.4.1. ICMP
Internet Packet Exchange (IPX) : 16.4.1. IPX
Internet Relay Chat (IRC) : 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
Internet Security Scanner (ISS) : 17.6.2. ISS
intruders : 1. Introduction
confronting : 24.2.2. What to Do When You Catch Somebody
creating hidden files : 24.4.1.7. Hidden files and directories
discovering
24.2. Discovering an Intruder
24.2.6. Anatomy of a Break-in
legal options regarding : 26.1. Legal Options After a Break-in
responding to
24. Discovering a Break-in
24.7. Damage Control
tracking from log files : 24.3. The Log Files: Discovering an Intruder's Tracks
ioctl system call : C.1.3.4. Process groups and sessions
IP addresses
controlling access by : 17.2. Controlling Access to Servers
name service and
16.2.6. Name Service
16.2.6.2. Other naming services
restricting access by : 18.3. Controlling Access to Files on Your Server
IP numbers, monitoring : 12.3.1.2. Eavesdropping by Ethernet and 10Base-T
IP packets
16.2. IPv4: The Internet Protocol Version 4
16.2.4. Packets and Protocols
16.2.4.3. UDP
eavesdropping : 16.3.1. Link-level Security
monitoring : 12.3.1.2. Eavesdropping by Ethernet and 10Base-T
sniffing
16.3.1. Link-level Security
17.3.3. TELNET (TCP Port 23)
IP protocols
1.4.3. Add-On Functionality Breeds Problems
16.2.4. Packets and Protocols
16.2.4.3. UDP
IP security
16.3. IP Security
16.3.3. Authentication
IP services : (see network services)
IP spoofing
1.4.3. Add-On Functionality Breeds Problems
16.3. IP Security
IPv4 (IP Version 4)
16.2. IPv4: The Internet Protocol Version 4
16.2.6.2. Other naming services
IPX (Internet Packet Exchange) : 16.4.1. IPX
IRC (Internet Relay Chat) : 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
IRIX wtmpx file : 10.1.2. utmp and wtmp Files
ISS (Internet Security Scanner)
17.6.2. ISS
E.4.4. ISS (Internet Security Scanner)


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.