Полезная информация

Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: V

V configuration command
sendmail, 5.2.1. Version
sendmail, 27.5. The V Configuration Command
sendmail, D. Sun Enhancements
-v database switch : sendmail, 33.3.4.11. -v specify the value's column (V8.7 and above)
V line (host status file) : sendmail, B.1. Status file lines
V line (qf file) : sendmail, 23.9. The qf File Internals
$v macro : sendmail, 31.10. Alphabetized Reference
$V macro : sendmail, 31.10. Alphabetized Reference
v option : (see Verbose (v) option)
V option : (see FallbackMXhost (V) option)
-v switch (makemap) : sendmail, 33.2.1.6. -v watch keys and data being added
-v switch (sendmail)
sendmail, 4.2. Verbose (-v)
sendmail, 23.4.1. Printing the Queue in Verbose Mode
sendmail, 23.6.2.2. Combine -v with -q
sendmail, 36.7. Alphabetized Reference
-V switch (sendmail) : sendmail, 36.7. Alphabetized Reference
V.35 : TCP/IP Network Administration, 1.2. A Data Communications Model
V8 sendmail : sendmail, 29.3.1. V8 Enhancements
comments and : sendmail, 27.3. V8 Comments
killing and restarting daemon : sendmail, 4.1.1.1. Kill and restart, beginning with V8.7
m4 preprocessor : sendmail, 19. V8 m4 Configuration
obtaining source code : sendmail, 2.1. Get the Source
Sun Microsystem V8.8 enhancements : sendmail, D. Sun Enhancements
vacation program : sendmail, 25.5.5. Precedence: bulk
vacuums, computer : Practical UNIX & Internet Security, 12.2.1.3. Dust
VALIDATE= command : Practical UNIX & Internet Security, 15.5.2. Permissions Commands
validating firewalls : Building Internet Firewalls, 6.8.7. It Should Be Able to Log Accepted and
vampire taps : Practical UNIX & Internet Security, 12.3.1.5. Fiber optic cable
Van Jacobson header compression
Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
TCP/IP Network Administration, 5.2. Linux Kernel Configuration
TCP/IP Network Administration, 6.4.1. slattach
disabling : TCP/IP Network Administration, A.2. The PPP Daemon
vandalism
Building Internet Firewalls, 1.2.2.2. Vandals
Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
Practical UNIX & Internet Security, 12.2.4. Vandalism
Practical UNIX & Internet Security, 12.2.4.3. Network connectors
/var directory
Practical UNIX & Internet Security, 4.3.7. The Bad su Log
Practical UNIX & Internet Security, 9.1.2. Read-only Filesystems
(see also /usr directory)
/var/adm directory : Practical UNIX & Internet Security, 11.5.3.6. Other files
/var/adm/acct : Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File
/var/adm/lastlog file : Practical UNIX & Internet Security, 10.1.1. lastlog File
/var/adm/loginlog file : Practical UNIX & Internet Security, 10.1.4. loginlog File
/var/adm/messages
Practical UNIX & Internet Security, 10.2.3. messages Log File
Practical UNIX & Internet Security, 4.3.7. The Bad su Log
/var/adm/savacct : Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File
/var/adm/sulog file : Practical UNIX & Internet Security, 4.3.7. The Bad su Log
/var/adm/wtmp file
Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files
Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file
/var/adm/xferlog : Practical UNIX & Internet Security, 10.3.3. xferlog Log File
/var/log directory : Practical UNIX & Internet Security, 11.5.3.6. Other files
/var/run/dhcpd.pid file : TCP/IP Network Administration, D.2. The dhcpd Command
/var/spool/mqueue temporary files : TCP/IP Network Administration, 10.5.4. The Set Option Command
/var/spool/uucp/.Admin directory : Practical UNIX & Internet Security, 10.3.4. uucp Log Files
/var/yp/Makefile file : sendmail, 7.3.1. The hostname
variable-length subnet masks (VLSMs) : TCP/IP Network Administration, 4.2.2. Defining the Subnet Mask
variables
bounds checking : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
to CGI scripts : Practical UNIX & Internet Security, 18.2.3.1. Do not trust the user's browser!
environment
sendmail, 5.3.12. Environment variables
sendmail, 22.2. The Environment
global : sendmail, 20.1.2. Global Variables
Vendor Extensions field, in BOOTP : TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
vendors : Practical UNIX & Internet Security, 27.3.3. Your Vendor?
liability of : Practical UNIX & Internet Security, 18.5.2. Trusting Your Software Vendor
sendmail versions
sendmail, 18.2. Vendor Versus Compiling
sendmail, 27.5.1. The vendor
(see also versions)
vendor-neutral language : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
vendor-specific syntax : TCP/IP Network Administration, 10.5.1. The Version Level Command
ventilation
Practical UNIX & Internet Security, 12.2.1.10. Vibration
(see also dust; smoke and smoking)
air ducts : Practical UNIX & Internet Security, 12.2.3.2. Entrance through air ducts
holes (in hardware) : Practical UNIX & Internet Security, 12.2.4.1. Ventilation holes
VERB command (ESMTP) : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
VERB command (sendmail) : Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
VERB command (SMTP) : sendmail, 30.8. Alphabetized F= Flags
Verbose (v) option
sendmail, 34.1.3. Appropriateness of Options
sendmail, 34.8. Alphabetized Reference
verbose mode
sendmail, 4.2. Verbose (-v)
sendmail, 23.4.1. Printing the Queue in Verbose Mode
sendmail, 23.6.2.2. Combine -v with -q
sendmail, 34.8. Alphabetized Reference
sendmail, 36.7. Alphabetized Reference
TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
TCP/IP Network Administration, A.1. Dial-Up IP
TCP/IP Network Administration, A.3. chat
verify mode
sendmail, 4.1.4. Verify Mode (-bv)
sendmail, 36.7. Alphabetized Reference
verifying : (see testing)
Verisign Inc. : Practical UNIX & Internet Security, 18.6. Dependence on Third Parties
versions
sendmail, 5.2.1. Version
(see also V configuration command)
BIND : sendmail, 21.1.1. Which DNS? 4.8.3 or 4.9?
host status file : sendmail, B.1. Status file lines
m4
sendmail, 19.2. Build with m4
sendmail, 31.10. Alphabetized Reference
mc files : sendmail, 19.6. Alphabetized m4 Macros
qf file : sendmail, 23.9. The qf File Internals
sendmail
sendmail, UNIX and sendmail Versions
sendmail, 5.2.1. Version
sendmail, 18.2. Vendor Versus Compiling
sendmail, 27.5. The V Configuration Command
sendmail, 31.10. Alphabetized Reference
sendmail, D.2. Backward Compatibility
UUCP
Practical UNIX & Internet Security, 15.2. Versions of UUCP
Practical UNIX & Internet Security, 15.4. Security in Version 2 UUCP
Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution
callback feature : Practical UNIX & Internet Security, 15.4.1.5. Requiring callback
V configuration command : sendmail, D. Sun Enhancements
VERSIONID macro
sendmail, 19.6. Alphabetized m4 Macros
TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros
vertical bar (|)
! flag : sendmail, 30.8. Alphabetized F= Flags
| prefix
sendmail, 22.4.3. The F Command - Program Form
sendmail, 24.2.3. Delivery via Programs
in addresses : (see programs, delivering to)
Veteran's Health Administration : Practical UNIX & Internet Security, F.3.4.45. U.S. Veteran's Health Administration
vi editor
Practical UNIX & Internet Security, 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve
Practical UNIX & Internet Security, 11.5.2.4. .exrc
Practical UNIX & Internet Security, 11.5.2.7. Other initializations
"Via:" header line : sendmail, 35.10. Alphabetized Reference
vibration : Practical UNIX & Internet Security, 12.2.1.10. Vibration
victim hosts : Building Internet Firewalls, 5.6. Selecting Services Provided by the
victim machines : Building Internet Firewalls, 5.2.2. Victim Machines
video content type : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
video tape : Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
view command
TCP/IP Network Administration, 8.4. Using nslookup
TCP/IP Network Administration, 11.6. Checking Name Service
vipw command : Practical UNIX & Internet Security, 8.4.1. Changing an Account's Password
virtual links : TCP/IP Network Administration, B.8.1. The ospf Statement
virtual terminal devices : TCP/IP Network Administration, 5.3.1.2. Pseudo-device
virtual terminals : (see Telnet service)
virtusertable feature : sendmail, 19.6. Alphabetized m4 Macros
Virual Private Networks (VPNs) : Practical UNIX & Internet Security, 21.1.2. Uses of Firewalls
VIRUS-L list : TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
viruses
Building Internet Firewalls, 1.4.2.4. A firewall can't protect against
Practical UNIX & Internet Security, 11.1. Programmed Threats: Definitions
Practical UNIX & Internet Security, 11.1.5. Viruses
Practical UNIX & Internet Security, 27.2.2. Viruses on the Distribution Disk
voice authentication : Building Internet Firewalls, 10.2.1. Something You Are
voice-message multipart subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
voltage levels : TCP/IP Network Administration, 1.2. A Data Communications Model
voltage spikes : Practical UNIX & Internet Security, 12.2.1.8. Electrical noise
VPNs (virtual private networks) : Practical UNIX & Internet Security, 21.1.2. Uses of Firewalls
VRFY command (SMTP)
Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
sendmail, 22.3.2. SMTP vrfy and expn
sendmail, 22.8.3.5. The PrivacyOptions option
sendmail, 30.8. Alphabetized F= Flags
TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
vsprintf function : Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
VT100 terminal : Practical UNIX & Internet Security, 27.2.1. Hardware Bugs


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.