Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: F

factoring numbers
6.4.6. RSA and Public Key Cryptography
6.4.6.3. Strength of RSA
(see also RSA algorithm)
failed login attempts : (see logging in)
failures, computer
7.1.1.1. A taxonomy of computer failures
23.2. Tips on Avoiding Security-related Bugs
(see also bugs)
fair use laws : 26.4.2. Copyright Infringement
Fast Filesystem (FFS) : 25.2.2.6. Reserved space
FBI (Federal Bureau of Investigation)
26.2.2. Federal Jurisdiction
F.3.2. Federal Bureau of Investigation (FBI)
fbtab file : 17.3.21.1. /etc/fbtab and /etc/logindevperm
Federal Information Processing Standard (FIPS) : 6.4.2. Summary of Public Key Systems
federal law enforcement
26.2.2. Federal Jurisdiction
26.2.3. Federal Computer Crime Laws
FFS (Fast File System) : 25.2.2.6. Reserved space
fgets function : 23.1.1. The Lesson of the Internet Worm
fiber optic cables : (see cables, network)
File Handles : 20.1.2. File Handles
File Transfer Protocol : (see FTP)
filenames, attacks via : 11.5.1.4. Filename attacks
files : 5.1. Files
automatic directory listings : 18.2.2.2. Additional configuration issues
backing up
7. Backups
7.4.7. inode Modification Times
automatic system for
7.3.2. Building an Automatic Backup System
18.2.3.5. Beware stray CGI scripts
critical files
7.3. Backing Up System Files
7.3.2. Building an Automatic Backup System
prioritizing : 7.3.1. What Files to Back Up?
changing owner of : 5.7. chown: Changing a File's Owner
context-dependent (CDFs)
5.9.2. Context-Dependent Files
24.4.1.7. Hidden files and directories
core : C.4. The kill Command
descriptors : 23.2. Tips on Avoiding Security-related Bugs
detecting changes to
9.2. Detecting Change
9.3. A Final Note
device : 5.6. Device Files
downloading, logs of
10.3.3. xferlog Log File
10.3.5. access_log Log File
finding all SUID/SGID
5.5.4. Finding All of the SUID and SGID Files
5.5.4.1. The ncheck command
format, monitoring : 8.2. Monitoring File Format
group-writable : 11.6.1.2. Writable system files and directories
hidden : 24.4.1.7. Hidden files and directories
hidden space : 25.2.2.7. Hidden space
history : 10.4.1. Shell History
immutable : 9.1.1. Immutable and Append-Only Files
integrity of : (see integrity)
intruder's changes to : 24.4.1.1. Changes in file contents
locating largest : 25.2.2.1. Disk-full attacks
locking : 23.2. Tips on Avoiding Security-related Bugs
log : (see log files)
mail sent directly to : 15.7. Early Security Problems with UUCP
modification times of
5.1.2. Inodes
5.1.5. File Times
7.4.7. inode Modification Times
9.2.2. Checklists and Metadata
network configuration : 10.4.3. Network Setup
permissions to : (see permissions)
remote access to
15.4.1. USERFILE: Providing Remote File Access
15.4.2.1. Some bad examples
SGID bit on : 5.5.7. SGID Bit on Files (System V UNIX Only): Mandatory Record Locking
startup
11.5.2. Start-up File Attacks
11.5.2.7. Other initializations
system database : 1.2. What Is an Operating System?
transfering between systems : 15.1.1. uucp Command
types of : 5.1.6. Understanding File Permissions
unowned : 24.4.1.8. Unowned files
on Web servers : (see Web servers)
world-writable : 11.6.1.1. World-writable user files and directories
zero-filled bytes in : 7.4. Software for Backups
filesystems : (see directories)
filter files (mail) : 11.5.2.5. .forward, .procmailrc
filters, air : 12.2.1.3. Dust
find command
5.5.4. Finding All of the SUID and SGID Files
11.5.1.4. Filename attacks
-H option : 5.9.2. Context-Dependent Files
-ls option : 9.2.2.1. Simple listing
-size option : 25.2.2.1. Disk-full attacks
-H option : 24.4.1.7. Hidden files and directories
-print option : 5.5.4. Finding All of the SUID and SGID Files
type -f option : 5.5.4. Finding All of the SUID and SGID Files
-xdev option : 5.5.4. Finding All of the SUID and SGID Files
finger command
8.1.3. Accounts That Run a Single Command
10.1.1. lastlog File
10.1.2. utmp and wtmp Files
15.3.1. Assigning Additional UUCP Logins
15.4.3. L.cmds: Providing Remote Command Execution
17.3.4.3. Improving the security of Berkeley sendmail V8
17.3.8. finger (TCP Port 79)
17.3.8.3. Replacing finger
21.4.4.1. Creating an ftpout account to allow FTP without proxies.
23.1.1. The Lesson of the Internet Worm
24.2.1. Catching One in the Act
24.2.4.2. How to contact the system administrator of a computer you don't know
(see also Internet, Worm program)
disabling : 17.3.8.2. Disabling finger
FIPS (Federal Information Processing Standard) : 6.4.2. Summary of Public Key Systems
fired employees : 13.2.6. Departure
fires
12.2.1.1. Fire
12.2.1.2. Smoke
12.4.1.1. Fire hazards
extinguishers and radio transmitters : 12.2.1.8. Electrical noise
firewalls
8.8.9. Account Names Revisited: Using Aliases for Increased Security
17.2. Controlling Access to Servers
21. Firewalls
21.4.2. Electronic Mail
21.5. Special Considerations
checklist for : A.1.1.20. Chapter 21: Firewalls
mailing list for
E.1.3.1. Academic-Firewalls
E.1.3.7. Firewalls
nameservers and : 17.3.6.2. DNS nameserver attacks
for NIS sites : 19.4.5. Unintended Disclosure of Site Information with NIS
portmapper program and : 19.2.1. Sun's portmap/rpcbind
for specific network services : G. Table of IP Services
FIRST teams
24.6. Resuming Operation
E.3.3. FIRST
Fitzgerald, Tom : 22.5. UDP Relayer
flooding
client : 16.3.2. Security and Nameservice
messages : 25.3.2. Message Flooding
servers with requests : 25.3.1. Service Overloading
water : (see water)
floors, raised : 12.2.3.1. Raised floors and dropped ceilings
floppy disks : (see backups; media)
folders : (see directories)
FollowSymLinks option : 18.3.2. Commands Within the <Directory> Block
food : 12.2.2.1. Food and drink
fork command
23.2. Tips on Avoiding Security-related Bugs
25.2.1.1. Too many processes
C.2. Creating Processes
format
file, monitoring : 8.2. Monitoring File Format
redoing as destructive attack : 25.1. Destructive Attacks
USERFILE entries : 15.4.1.3. Format of USERFILE entry without system name
.forward file
11.5.2.5. .forward, .procmailrc
21.4.2. Electronic Mail
24.4.1.6. Changes to startup files
Frame Ground (FG) : 14.3. The RS-232 Serial Protocol
fraud
14.4.1. One-Way Phone Lines
26.2.2. Federal Jurisdiction
fscanf function : 23.2. Tips on Avoiding Security-related Bugs
fsck program
24.4.1.7. Hidden files and directories
25.2.2.8. Tree-structure attacks
fsirand command : 20.4.8. Use fsirand
fstab file
11.1.2. Back Doors and Trap Doors
19.3.2.5. Mounting a secure filesystem
FTP (File Transfer Protocol)
17.3.2. (FTP) File Transfer Protocol (TCP Ports 20 and 21)
17.3.2.7. Allowing only FTP access
anonymous
4.1. Users and Groups
17.3.2.1. Using anonymous FTP
17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP server
anonymous
and HTTP : 18.2.4.1. Beware mixing HTTP with anonymous FTP
~ftp/bin directory : 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP server
~ftp/etc directory : 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP server
~ftp/pub directory : 17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP server
logging transferred files : 10.3.3. xferlog Log File
passive mode
17.3.2.2. Passive vs. active FTP
17.3.2.3. FTP passive mode
setting up server
17.3.2.4. Setting up an FTP server
17.3.2.6. Setting up anonymous FTP with the standard UNIX FTP server
ftp account : (see anonymous FTP)
ftpd server
8.4.2. Changing the Account's Login Shell
11.1.2. Back Doors and Trap Doors
17.3.2. (FTP) File Transfer Protocol (TCP Ports 20 and 21)
17.3.2.4. Setting up an FTP server
for backups : 7.4.5. Backups Across the Net
security hole : 6.5.2. Using Message Digests
UUCP enabled on : 15.8. UUCP Over Networks
ftpout account, firewalls : 21.4.4.1. Creating an ftpout account to allow FTP without proxies.
ftpusers file : 17.3.2.5. Restricting FTP with the standard UNIX FTP server
ftruncate system call : 5.1.7. File Permissions in Detail
full backups : 7.1.3. Types of Backups
function keys : 12.3.4.5. Function keys
functionality, add-on : 1.4.3. Add-On Functionality Breeds Problems


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.

This HTML Help has been published using the chm2web software.