Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: T

table objects (NIS+) : 19.5.3. NIS+ Tables
TACACS : 17.3.5. TACACS (UDP Port 49)
tainting
18.2.3.4. Tainting with Perl
23.4. Tips on Writing SUID/SGID Programs
taintperl
5.5.3. SUID Shell Scripts
18.2.3.4. Tainting with Perl
23.4. Tips on Writing SUID/SGID Programs
talk program : 11.1.4. Trojan Horses
tandem backup : 7.1.4. Guarding Against Media Failure
tar program
6.6.1.2. Ways of improving the security of crypt
7.3.2. Building an Automatic Backup System
7.4.2. Simple Archives
7.4.4. Encrypting Your Backups
24.2.6. Anatomy of a Break-in
Taylor UUCP : 15.2. Versions of UUCP
TCB (trusted computing base) : 8.5.3.2. Trusted computing base
/tcb directory : 8.1.1. Accounts Without Passwords
tcov tester : 23.2. Tips on Avoiding Security-related Bugs
TCP (Transmission Control Protocol)
16.2.4.2. TCP
17.1.3. The /etc/inetd Program
(see also network services)
connections, clogging : 25.3.4. Clogging
TCP/IP
1.4.3. Add-On Functionality Breeds Problems
10.5.2.2. Logging across the network
(see also networks)
checklist for
A.1.1.15. Chapter 16: TCP/IP Networks
A.1.1.16. Chapter 17: TCP/IP Services
network services : (see network services)
networks
16. TCP/IP Networks
16.5. Summary
tcpwrapper program
17.2. Controlling Access to Servers
E.4.10. tcpwrapper
tcsh
11.5.1. Shell Features
(see also shells)
history file : 10.4.1. Shell History
telecommunications : 26.2.2. Federal Jurisdiction
telephone
14.3.1. Originate and Answer
(see also modems)
calls, recording outgoing : 10.3.1. aculog File
cellular : 12.2.1.8. Electrical noise
checklist for : A.1.1.13. Chapter 14: Telephone Security
hang-up signal : (see signals)
lines : 14.5.4. Physical Protection of Modems
leasing : 14.5.4. Physical Protection of Modems
one-way : 14.4.1. One-Way Phone Lines
physical security of : 14.5.4. Physical Protection of Modems
Telnet versus : 17.3.3. TELNET (TCP Port 23)
Telnet utility
3.5. Verifying Your New Password
16.2.5. Clients and Servers
17.3.3. TELNET (TCP Port 23)
versus rlogin : 17.3.18. rlogin and rsh (TCP Ports 513 and 514)
telnetd program : 11.1.2. Back Doors and Trap Doors
temperature : 12.2.1.6. Temperature extremes
TEMPEST system : 12.3.1.3. Eavesdropping by radio and using TEMPEST
terminal name and last command : 10.1.3. last Program
terrorism : 12.2.5. Defending Against Acts of War and Terrorism
testing
CGI scripts : 18.2.3.2. Testing is not enough!
core files and : 23.2. Tips on Avoiding Security-related Bugs
programs : 23.2. Tips on Avoiding Security-related Bugs
software : 1.4.2. Software Quality
TFTP (Trivial File Transfer Protocol) : 17.3.7. Trivial File Transfer Protocol (TFTP) (UDP Port 69)
tftpd server : 17.3.7. Trivial File Transfer Protocol (TFTP) (UDP Port 69)
theft
7.1.1.1. A taxonomy of computer failures
12.2.6. Preventing Theft
12.2.6.4. Minimizing downtime
12.4.1.2. Potential for eavesdropping and data theft
of backups
12.3.2. Protecting Backups
12.3.2.4. Backup encryption
of RAM chips : 12.2.6. Preventing Theft
thieves : 11.3. Authors
third-party billing : 14.5.4. Physical Protection of Modems
Thompson, Ken
1.3. History of UNIX
8.6. The UNIX Encrypted Password System
threats
assessing cost of : 2.3.3. Adding Up the Numbers
back doors : (see back doors)
to backups
7.1.6. Security for Backups
7.1.6.3. Data security for backups
bacteria programs : 11.1.7. Bacteria and Rabbits
biological : 12.2.1.7. Bugs (biological)
broadcast storms : 25.3.2. Message Flooding
via CGI scripts : 18.2.3.2. Testing is not enough!
changing file owners : 5.7. chown: Changing a File's Owner
changing system clock : 5.1.5. File Times
code breaking
6.1.1. Code Making and Code Breaking
(see also cryptography)
commonly attacked accounts : 8.1.2. Default Accounts
computer failures : 7.1.1.1. A taxonomy of computer failures
decode aliases : 17.3.4.2. Using sendmail to receive email
deep tree structures : 25.2.2.8. Tree-structure attacks
denial of service
17.1.3. The /etc/inetd Program
17.3.21.5. Denial of service attacks under X
25. Denial of Service Attacks and Solutions
25.3.4. Clogging
accidental : 25.2.5. Soft Process Limits: Preventing Accidental Denial of Service
checklist for : A.1.1.24. Chapter 25: Denial of Service Attacks and Solutions
destructive attacks : 25.1. Destructive Attacks
disk attacks
25.2.2. Disk Attacks
25.2.2.8. Tree-structure attacks
overload attacks
25.2. Overload Attacks
25.2.5. Soft Process Limits: Preventing Accidental Denial of Service
system overload attacks : 25.2.1.2. System overload attacks
disposed materials : 12.3.3. Other Media
DNS client flooding : 16.3.2. Security and Nameservice
DNS nameserver attacks : 17.3.6.2. DNS nameserver attacks
DNS zone transfers : 17.3.6.1. DNS zone transfers
dormant accounts
8.4. Managing Dormant Accounts
8.4.3. Finding Dormant Accounts
false syslog entries : 10.5.3.1. Beware false log entries
filename attacks : 11.5.1.4. Filename attacks
hidden space : 25.2.2.7. Hidden space
HOME variable attacks : 11.5.1.3. $HOME attacks
identifying and quantifying
2.2.1.2. Identifying threats
2.2.2. Review Your Risks
IFS variable attacks : 11.5.1.2. IFS attacks
intruders : (see intruders)
letting in accidentally : 11.4. Entry
logic bombs
11.1.3. Logic Bombs
27.2.2. Viruses on the Distribution Disk
mailing list for : E.1.3.9. RISKS
media failure : 7.1.4. Guarding Against Media Failure
meet-in-the-middle attacks : 6.4.5.1. Double DES
MUD/IRC client programs : 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
newly created accounts : 24.4.1. New Accounts
NIS, unintended disclosure : 19.4.5. Unintended Disclosure of Site Information with NIS
with NNTP : 17.3.13. Network News Transport Protocol (NNTP) (TCP Port 119)
open (guest) accounts
8.1.4. Open Accounts
8.1.4.6. Potential problems with rsh
PATH variable attacks : 11.5.1.1. PATH attacks
plaintext attacks : 6.2.3. Cryptographic Strength
playback (replay) attacks : 19.6.1.2. Using the ticket granting ticket
programmed
11. Protecting Against Programmed Threats
11.6.2. Shared Libraries
A.1.1.10. Chapter 11: Protecting Against Programmed Threats
D.1.4. Computer Viruses and Programmed Threats
authors of : 11.3. Authors
damage from : 11.2. Damage
replay attacks : 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
rsh, problems with : 8.1.4.6. Potential problems with rsh
sendmail problems : 17.3.4.1. sendmail and security
spoofed network connection : 8.5.3.1. Trusted path
start-up file attacks
11.5.2. Start-up File Attacks
11.5.2.7. Other initializations
system clock : (see system clock)
theft : (see theft)
/tmp directory attacks : 25.2.4. /tmp Problems
toll fraud : 14.4.1. One-Way Phone Lines
traffic analysis : 18.4. Avoiding the Risks of Eavesdropping
tree-structure attacks : 25.2.2.8. Tree-structure attacks
Trojan horses
4.3.5. Using su with Caution
11.1.4. Trojan Horses
11.5. Protecting Yourself
17.3.21.2. X security
19.6.5. Kerberos Limitations
27.2.2. Viruses on the Distribution Disk
trusted hosts : (see trusted, hosts)
unattended terminals
12.3.5. Unattended Terminals
12.3.5.2. X screen savers
unowned files : 24.4.1.8. Unowned files
vandalism
12.2.4. Vandalism
12.2.4.3. Network connectors
viruses
11.1.5. Viruses
(see viruses)
war and terrorism : 12.2.5. Defending Against Acts of War and Terrorism
weakness-finding tools : 11.1.1. Security Tools
by web browsers
18.5. Risks of Web Browsers
18.5.2. Trusting Your Software Vendor
worms : 11.1.6. Worms
three-way handshake (TCP) : 16.2.4.2. TCP
ticket-granting service
19.6.1.1. Initial login
19.6.1.2. Using the ticket granting ticket
19.6.1.3. Authentication, data integrity, and secrecy
tickets : (see Kerberos system)
Tiger : E.4.11. Tiger
tilde (~)
in automatic backups : 18.2.3.5. Beware stray CGI scripts
as home directory : 11.5.1.3. $HOME attacks
~! in mail messages : 8.1.3. Accounts That Run a Single Command
time
19.3.1.3. Setting the window
(see also NTP; system clock)
CPU, accounting
10.2. The acct/pacct Process Accounting File
10.2.3. messages Log File
defining random seed by : 23.8. Picking a Random Seed
modification
5.1.2. Inodes
5.1.5. File Times
7.4.7. inode Modification Times
9.2.2. Checklists and Metadata
24.5.1. Never Trust Anything Except Hardcopy
most recent login : 10.1.1. lastlog File
Secure RPC window of : 19.3.1.3. Setting the window
timeouts
11.1.3. Logic Bombs
23.3. Tips on Writing Network Programs
timesharing
19.6.5. Kerberos Limitations
23.2. Tips on Avoiding Security-related Bugs
Timezone table (NIS+) : 19.5.3. NIS+ Tables
tip command
10.3.1. aculog File
14.5. Modems and UNIX
14.5.3.1. Originate testing
14.5.3.3. Privilege testing
-l option : 14.5.3.1. Originate testing
TIS Internet Firewall Toolkit (FWTK) : E.4.12. TIS Internet Firewall Toolkit
TMOUT variable : 12.3.5.1. Built-in shell autologout
/tmp directory
14.5.3.3. Privilege testing
25.2.4. /tmp Problems
tmpfile function : 23.2. Tips on Avoiding Security-related Bugs
token cards : 8.7.2. Token Cards
token ring : 16.1. Networking
toll fraud : 14.4.1. One-Way Phone Lines
tools : 1.3. History of UNIX
to find weaknesses : 11.1.1. Security Tools
quality of
1.4.2. Software Quality
1.4.3. Add-On Functionality Breeds Problems
Totient Function : 6.4.6.1. How RSA works
tracing connections
24.2.4. Tracing a Connection
24.2.4.2. How to contact the system administrator of a computer you don't know
trademarks : 26.4.3. Trademark Violations
traffic analysis : 18.4. Avoiding the Risks of Eavesdropping
training : 13.2.1. Initial Training
transfer zones : 16.2.6.1. DNS under UNIX
transfering files : 15.1.1. uucp Command
Transmission Control Protocol (TCP) : 16.2.4.2. TCP
Transmit Data (TD) : 14.3. The RS-232 Serial Protocol
transmitters, radio : 12.2.1.8. Electrical noise
transposition (in encryption) : 6.1.2. Cryptography and Digital Computers
trap doors : (see back doors)
trashing : 12.3.3. Other Media
tree structures : 25.2.2.8. Tree-structure attacks
trimlog : E.4.13. trimlog
Triple DES
6.4.5. Improving the Security of DES
6.4.5.2. Triple DES
Tripwire package
9.2.4. Tripwire
9.2.4.2. Running Tripwire
19.5.5. NIS+ Limitations
E.4.14. Tripwire
Trivial File Transfer Protocol (TFTP) : 17.3.7. Trivial File Transfer Protocol (TFTP) (UDP Port 69)
Trojan horses
4.3.5. Using su with Caution
11.1.4. Trojan Horses
11.5. Protecting Yourself
27.2.2. Viruses on the Distribution Disk
Kerberos and : 19.6.5. Kerberos Limitations
X clients : 17.3.21.2. X security
truncate system call : 5.1.7. File Permissions in Detail
trust
1.1. What Is Computer Security?
2.1.1. Trust
27. Who Do You Trust?
27.4. What All This Means
of log files : 10.8. Managing Log Files
trusted
8.5.3.2. Trusted computing base
17.1.1. The /etc/services File
hosts
17.3.18.1. Trusted hosts and users
17.3.18.4. The ~/.rhosts file
NFS and : 17.3.18.2. The problem with trusted hosts
path : 8.5.3.1. Trusted path
ports : 1.4.3. Add-On Functionality Breeds Problems
users
17.3.4.1. sendmail and security
17.3.18.1. Trusted hosts and users
TRW Network Area and System Administrators : F.3.4.36. TRW network area and system administrators
tty file : 7.1.2. What Should You Back Up?
ttymon program : C.5.2. Logging In
ttys file
8.5.1. Secure Terminals
14.5.1. Hooking Up a Modem to Your Computer
ttytab file : C.5.1. Process #1: /etc/init
ttywatch program : 24.2.3. Monitoring the Intruder
tunefs command : 25.2.2.6. Reserved space
tunneling : 16.4.1. IPX
twisted pair : 16.1. Networking
TZ variable : 23.2. Tips on Avoiding Security-related Bugs


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.