Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: B

back doors
2.5. The Problem with Security Through Obscurity
6.2.3. Cryptographic Strength
11.1. Programmed Threats: Definitions
11.1.2. Back Doors and Trap Doors
11.5. Protecting Yourself
27.1.2. Trusting Trust
in MUDs and IRCs : 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
background checks, employee : 13.1. Background Checks
backquotes in CGI input
18.2.3.2. Testing is not enough!
18.2.3.3. Sending mail
BACKSPACE key : 3.4. Changing Your Password
backup program : 7.4.3. Specialized Backup Programs
backups
7. Backups
7.4.7. inode Modification Times
9.1.2. Read-only Filesystems
24.2.2. What to Do When You Catch Somebody
across networks : 7.4.5. Backups Across the Net
for archiving information : 7.1.1.1. A taxonomy of computer failures
automatic
7.3.2. Building an Automatic Backup System
18.2.3.5. Beware stray CGI scripts
checklist for : A.1.1.6. Chapter 7: Backups
criminal investigations and : 26.2.4. Hazards of Criminal Prosecution
of critical files
7.3. Backing Up System Files
7.3.2. Building an Automatic Backup System
encrypting
7.4.4. Encrypting Your Backups
12.3.2.4. Backup encryption
hardcopy : 24.5.1. Never Trust Anything Except Hardcopy
keeping secure
2.4.2. Standards
2.4.3. Guidelines
7.1.6. Security for Backups
7.1.6.3. Data security for backups
26.2.6. Other Tips
laws concerning : 7.1.7. Legal Issues
of log files : 10.2.2. Accounting with BSD
retention of
7.1.5. How Long Should You Keep a Backup?
7.2. Sample Backup Strategies
7.2.5. Deciding upon a Backup Strategy
rotating media : 7.1.3. Types of Backups
software for
7.4. Software for Backups
7.4.7. inode Modification Times
commercial : 7.4.6. Commercial Offerings
special programs for : 7.4.3. Specialized Backup Programs
strategies for
7.2. Sample Backup Strategies
7.2.5. Deciding upon a Backup Strategy
10.8. Managing Log Files
theft of
12.3.2. Protecting Backups
12.3.2.4. Backup encryption
verifying : 12.3.2.1. Verify your backups
zero-filled bytes in : 7.4. Software for Backups
bacteria
11.1. Programmed Threats: Definitions
11.1.7. Bacteria and Rabbits
BADSU attempts : (see sulog file)
Baldwin, Robert : 6.6.1.1. The crypt program
bang (!) and mail command : 15.1.3. mail Command
Bash shell (bsh) : 8.1.4.4. No restricted bash
Basic Networking Utilities : (see BNU UUCP)
bastion hosts : 21.1.3. Anatomy of a Firewall
batch command : 25.2.1.2. System overload attacks
batch jobs : (see cron file)
baud : 14.1. Modems: Theory of Operation
bell (in Swatch program) : 10.6.2. The Swatch Configuration File
Bellcore : F.3.4.5. Bellcore
Berkeley UNIX : (see BSD UNIX)
Berkeley's sendmail : (see sendmail)
bidirectionality
14.1. Modems: Theory of Operation
14.4.1. One-Way Phone Lines
bigcrypt algorithm : 8.6.4. Crypt16() and Other Algorithms
/bin directory
11.1.5. Viruses
11.5.1.1. PATH attacks
backing up : 7.1.2. What Should You Back Up?
/bin/csh : (see csh)
/bin/ksh : (see ksh)
/bin/login : (see login program)
/bin/passwd : (see passwd command)
/bin/sh : (see sh)
in restricted filesystems : 8.1.5. Restricted Filesystem
binary code : 11.1.5. Viruses
bind system call
16.2.6.1. DNS under UNIX
17.1.3. The /etc/inetd Program
biological threats : 12.2.1.7. Bugs (biological)
block devices : 5.6. Device Files
block send commands : 11.1.4. Trojan Horses
blocking systems : 19.2. Sun's Remote Procedure Call (RPC)
BNU UUCP
15.5. Security in BNU UUCP
15.5.3. uucheck: Checking Your Permissions File
Boeing CERT : F.3.4.5. Bellcore
bogusns directive : 17.3.6.2. DNS nameserver attacks
boot viruses : 11.1.5. Viruses
Bootparams table (NIS+) : 19.5.3. NIS+ Tables
Bourne shell
C.5.3. Running the User's Shell
(see also sh program; shells)
(see sh)
Bourne shell (sh) : C.5.3. Running the User's Shell
bps (bits per second) : 14.1. Modems: Theory of Operation
BREAK key : 14.5.3.2. Answer testing
breakins
checklist for : A.1.1.23. Chapter 24: Discovering a Break-in
legal options following : 26.1. Legal Options After a Break-in
responding to
24. Discovering a Break-in
24.7. Damage Control
resuming operation after : 24.6. Resuming Operation
broadcast storm : 25.3.2. Message Flooding
browsers : (see Web browsers)
BSD UNIX
Which UNIX System?
1.3. History of UNIX
accounting with : 10.2.2. Accounting with BSD
Fast Filesystem (FFS) : 25.2.2.6. Reserved space
groups and : 4.1.3.3. Groups and BSD or SVR4 UNIX
immutable files : 9.1.1. Immutable and Append-Only Files
modems and : 14.5.1. Hooking Up a Modem to Your Computer
programming references : D.1.11. UNIX Programming and System Administration
ps command with : C.1.2.2. Listing processes with Berkeley-derived versions of UNIX
published resources for : D.1. UNIX Security References
restricted shells : 8.1.4.2. Restricted shells under Berkeley versions
SUID files, list of : B.3. SUID and SGID Files
sulog log under : 4.3.7.1. The sulog under Berkeley UNIX
utmp and wtmp files : 10.1.2. utmp and wtmp Files
BSD/OS (operating system) : 1.3. History of UNIX
bsh (Bash shell) : 8.1.4.4. No restricted bash
BSI/GISA : F.3.4.15. Germany: government institutions
buffers
checking boundaries : 23.2. Tips on Avoiding Security-related Bugs
for editors : 11.1.4. Trojan Horses
bugs
1.1. What Is Computer Security?
1.4.2. Software Quality
23.1.2.1. What they found
27.2.3. Buggy Software
27.2.5. Security Bugs that Never Get Fixed
Bugtraq mailing list : E.1.3.3. Bugtraq
hacker challenges : 27.2.4. Hacker Challenges
hardware : 27.2.1. Hardware Bugs
.htaccess file : 18.3.1. The access.conf and .htaccess Files
keeping secret : 2.5. The Problem with Security Through Obscurity
tips on avoiding : 23.2. Tips on Avoiding Security-related Bugs
bugs (biological) : 12.2.1.7. Bugs (biological)
bugs
Preface
(see also security holes)
bulk erasers : 12.3.2.3. Sanitize your media before disposal
byte-by-byte comparisons
9.2.1. Comparison Copies
9.2.1.3. rdist
bytes, zero-filled : 7.4. Software for Backups


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.

This HTML Help has been published using the chm2web software.