Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: U

U.S. Department of Energy : F.3.4.12. France: universities, Ministry of Research and Education in France, CNRS, CEA, INRIA, CNES, INRA, IFREMER, and EDF
U.S. Department of the Navy : F.3.4.44. U.S. Department of the Navy
U.S. law : (see laws)
U.S. Secret Service
26.2.2. Federal Jurisdiction
F.3.3. U.S. Secret Service (USSS)
UDP (User Datagram Protocol)
16.2.4.3. UDP
17.1.3. The /etc/inetd Program
(see also network services)
packet relayer : E.4.15. UDP Packet Relayer
ufsdump : (see dump/restore program)
UIDs (user identifiers)
4.1. Users and Groups
4.1.2. Multiple Accounts with the Same UID
real versus effective
4.3.1. Real and Effective UIDs
C.1.3.2. Process real and effective UID
RPC requests and : 19.2.2.2. AUTH_UNIX
su command and : 10.1.2.1. su command and /etc/utmp and /var/adm/wtmp files
of web servers : 18.2.1. The Server's UID
zero : (see root account; superuser)
UK Defense Research Agency : F.3.4.37. UK: Defense Research Agency
ulimit command : 25.2.5. Soft Process Limits: Preventing Accidental Denial of Service
Ultrix : 1.3. History of UNIX
trusted path : 8.5.3.1. Trusted path
UUCP : 15.4.1.3. Format of USERFILE entry without system name
umask
5.3. The umask
5.3.2. Common umask Values
8.4.3. Finding Dormant Accounts
unattended terminals
12.3.5. Unattended Terminals
12.3.5.2. X screen savers
uninterruptable power supply (UPS)
2.2. Risk Assessment
12.2.1.1. Fire
Unisys : F.3.4.39. UK: other government departments and agencies
universes : 5.9.1. Dual Universes
UNIX : 1. Introduction
add-on functionality of : 1.4.3. Add-On Functionality Breeds Problems
conventional passwords : 3.2.6. Conventional UNIX Passwords
DAC (Discretionary Access Controls) : 4.1.3. Groups and Group Identifiers (GIDs)
DNS under : 16.2.6.1. DNS under UNIX
encryption programs for
6.6. Encryption Programs Available for UNIX
6.6.3.6. PGP detached signatures
filesystem
5. The UNIX Filesystem
5.10. Summary
history of : 1.3. History of UNIX
modems and
14.5. Modems and UNIX
14.5.3.3. Privilege testing
networking and : 16.1.2. Networking and UNIX
operating systems : (see operating systems)
primary network services
17.3. Primary UNIX Network Services
17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
process scheduler : C.1.3.3. Process priority and niceness
processes : (see processes)
programming references : D.1.11. UNIX Programming and System Administration
published resources for : D.1. UNIX Security References
security and
1.4. Security and UNIX
1.4.3. Add-On Functionality Breeds Problems
signals : C.3. Signals
starting up
C.5. Starting Up UNIX and Logging In
C.5.3. Running the User's Shell
Version 6 : 1.3. History of UNIX
viruses : (see viruses)
web server on : 18.2. Running a Secure Server
unlinked files : 25.2.2.7. Hidden space
unowned files : 24.4.1.8. Unowned files
unplugging connections : 24.2.5. Getting Rid of the Intruder
unpredictability of randomness : 23.6. Tips on Generating Random Numbers
upgrades, logging : 10.7.2.1. Exception and activity reports
uploading stored information : 12.3.4. Protecting Local Storage
UPS (uninterruptable power supply)
2.2. Risk Assessment
12.2.1.1. Fire
uptime command : 8.1.3. Accounts That Run a Single Command
urandom device : 23.7.4. Other random number generators
Usenet
17.3.13. Network News Transport Protocol (NNTP) (TCP Port 119)
E.2. Usenet Groups
(see also NNTP)
cleanup scripts : 11.5.3. Abusing Automatic Mechanisms
encryption for : (see ROT13 algorithm)
posting breakins to : 24.6. Resuming Operation
reporting security holes on : 2.5.1. Going Public
User Datagram Protocol (UDP) : 16.2.4.3. UDP
user error : 7.1.1.1. A taxonomy of computer failures
user IDs : (see UIDs)
USERFILE file (UUCP)
15.4.1. USERFILE: Providing Remote File Access
15.4.2.1. Some bad examples
usermod command
-e option : 8.4.3. Finding Dormant Accounts
-f option : 8.4.3. Finding Dormant Accounts
-s option : 8.3. Restricting Logins
usernames : 3.1. Usernames
aliases for : 8.8.9. Account Names Revisited: Using Aliases for Increased Security
doubling as passwords (Joes) : 3.6.2. Smoking Joes
last command and : 10.1.3. last Program
as passwords : 8.8.3.1. Joetest: a simple password cracker
special
4.2. Special Usernames
4.2.3. Impact of the /etc/passwd and /etc/group Files on Security
using someone else's
4.3. su: Changing Who You Claim to Be
4.3.8. Other Uses of su
users
4. Users, Groups, and the Superuser
4.1. Users and Groups
4.1.2. Multiple Accounts with the Same UID
(see also groups; su command)
assigning passwords to : 8.8.1. Assigning Passwords to Users
auditing who is logged in
10.1.2. utmp and wtmp Files
10.1.2.1. su command and /etc/utmp and /var/adm/wtmp files
authentication for Web : 18.3.3. Setting Up Web Users and Passwords
becoming other
4.3. su: Changing Who You Claim to Be
4.3.8. Other Uses of su
checklist for : A.1.1.2. Chapter 3: Users and Passwords
dormant accounts and
8.4. Managing Dormant Accounts
8.4.3. Finding Dormant Accounts
identifiers for : (see UIDs)
importing to NIS server
19.4.1. Including or excluding specific accounts:
19.4.4.2. Using netgroups to limit the importing of accounts
letting in threats : 11.4. Entry
limited : 8.1.5.1. Limited users
logging
10.4. Per-User Trails in the Filesystem
10.4.3. Network Setup
NIS passwords for : 19.3.2.1. Creating passwords for users
nobody (Secure RPC) : 19.3.2.1. Creating passwords for users
notifying about monitoring : 26.2.6. Other Tips
proving identity of : 19.3.1.1. Proving your identity
recognizing as intruders
24.2. Discovering an Intruder
24.2.6. Anatomy of a Break-in
restricting certain : 18.3. Controlling Access to Files on Your Server
root : (see root account; superuser)
sending messages to : 10.5.1. The syslog.conf Configuration File
summarizing system usage by : 25.2.2.2. quot command
tainting : 18.2.3.4. Tainting with Perl
training : 13.2.1. Initial Training
UIDs : (see UIDs)
unattended terminals
12.3.5. Unattended Terminals
12.3.5.2. X screen savers
USERFILE entries for : 15.4.1.2. USERFILE entries for local users
www : 18.2.2. Understand Your Server's Directory Structure
users command
10.1.2. utmp and wtmp Files
24.2.1. Catching One in the Act
USG (UNIX Support Group) : 1.3. History of UNIX
/usr directory
4.3.7. The Bad su Log
(see also /var directory)
backing up /usr/bin : 7.1.2. What Should You Back Up?
/usr/adm directory : 11.5.3.6. Other files
/usr/adm/lastlog file : 10.1.1. lastlog File
/usr/adm/messages file : 10.2.3. messages Log File
/usr/bin directory
11.1.5. Viruses
11.5.1.1. PATH attacks
/usr/bin/uudecode : (see uudecode program)
/usr/etc/yp/makedbm program : 19.4.4.1. Setting up netgroups
/usr/lib/aliases file : 11.5.3.3. /usr/lib/aliases, /etc/aliases, /etc/sendmail/aliases, aliases.dir, or aliases.pag
/usr/lib directory : 11.5.3.6. Other files
in restricted filesystems : 8.1.5. Restricted Filesystem
/usr/lib/preserve program : 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
/usr/lib/sendmail : (see sendmail)
/usr/lib/uucp/Devices file : 14.5.1. Hooking Up a Modem to Your Computer
/usr/lib/uucp directory
15.4.2.1. Some bad examples
15.5.2. Permissions Commands
/usr/lib/uucp/L-devices file : 14.5.1. Hooking Up a Modem to Your Computer
/usr/lib/uucp/L.cmds file : (see L.cmds file)
/usr/lib/uucp/L.sys file : 15.3.3. Security of L.sys and Systems Files
/usr/lib/uucp/Permissions file : (see Permissions file)
/usr/lib/uucp/Systems file : 15.3.3. Security of L.sys and Systems Files
/usr/lib/uucp/USERFILE file
15.4.1. USERFILE: Providing Remote File Access
15.4.2.1. Some bad examples
/usr/local/bin : 1.1. What Is Computer Security?
/usr/local/bin directory : 11.5.1.1. PATH attacks
/usr/local/etc/http/logs directory : 10.3.5. access_log Log File
/usr/local/lib directory : 11.5.3.6. Other files
/usr/sbin/rexecd : (see rexec service)
/usr/spool/cron/crontabs directory : 15.6.2. Automatic Execution of Cleanup Scripts
/usr/spool/uucp directory : 15.1.4. How the UUCP Commands Work
/usr/spool/uucppublic : (see uucppublic directory)
/usr/ucb directory : 11.1.5. Viruses
utility programs : 1.2. What Is an Operating System?
utimes commandn : 24.5.1. Never Trust Anything Except Hardcopy
utmp file
10.1.2. utmp and wtmp Files
10.1.2.1. su command and /etc/utmp and /var/adm/wtmp files
24.2.1. Catching One in the Act
24.2.4. Tracing a Connection
uucheck program : 15.5.3. uucheck: Checking Your Permissions File
uucico program
15.1.4. How the UUCP Commands Work
15.3. UUCP and Security
15.5.1.1. Starting up
uucp (user)
4.1. Users and Groups
4.2.2. Other Special Users
uucp command : 15.1.1. uucp Command
UUCP system
4.1.2. Multiple Accounts with the Same UID
14.5. Modems and UNIX
15. UUCP
15.9. Summary
additional logins : 15.3.1. Assigning Additional UUCP Logins
BNU
15.2. Versions of UUCP
15.5. Security in BNU UUCP
15.5.3. uucheck: Checking Your Permissions File
checklist for : A.1.1.14. Chapter 15: UUCP
cleanup scripts
11.5.3. Abusing Automatic Mechanisms
15.6.2. Automatic Execution of Cleanup Scripts
early security problems : 15.7. Early Security Problems with UUCP
HoneyDanBer (HDB) : 15.2. Versions of UUCP
logging : 10.3.4. uucp Log Files
mail forwarding : 15.6.1. Mail Forwarding for UUCP
naming computer : 15.5.2. Permissions Commands
over networks : 15.8. UUCP Over Networks
NFS server and : 15.3. UUCP and Security
passwords for : 15.3.2. Establishing UUCP Passwords
Taylor : 15.2. Versions of UUCP
over TCP : 17.3.20. UUCP over TCP (TCP Port 540)
Version 2
15.2. Versions of UUCP
15.4. Security in Version 2 UUCP
15.4.3. L.cmds: Providing Remote Command Execution
uucpa account : 15.3.1. Assigning Additional UUCP Logins
uucpd program : 15.8. UUCP Over Networks
uucppublic directory
15.1.1. uucp Command
15.4.1.3. Format of USERFILE entry without system name
15.5.2. Permissions Commands
uudecode program : 17.3.4.2. Using sendmail to receive email
uuencode program : 6.6.1.2. Ways of improving the security of crypt
uux command : 15.1.2. uux Command
- (hyphen) option : 15.1.2. uux Command
-r option : 15.1.4. How the UUCP Commands Work
uuxqt program : 15.4.1.3. Format of USERFILE entry without system name
uuxqtcmds files : 15.4.3. L.cmds: Providing Remote Command Execution


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.

This HTML Help has been published using the chm2web software.