Полезная информация

Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: G

games
8.1.4. Open Accounts
17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
gas, natural : 12.2.1.5. Explosion
gated deamon : 17.3.19. Routing Internet Protocol (RIP routed) (UDP Port 520)
gateways : 16.2.2. Routing
gcore program : C.4. The kill Command
GCT tool : 23.2. Tips on Avoiding Security-related Bugs
gdb debugger : C.4. The kill Command
GECOS (or GCOS) : 3.2.1. The /etc/passwd File
Geer, Dan : 27.2.6. Network Providers that Network Too Well
General Electric Company : F.3.4.13. General Electric
generating
passwords automatically : 8.8.4. Password Generators
random numbers : 23.6. Tips on Generating Random Numbers
German government institutions : F.3.4.25. Netherlands: SURFnet-connected sites
gethostbyaddresses function : 16.2.6.1. DNS under UNIX
gethostbyname function : 16.2.6.1. DNS under UNIX
getopt function : 23.2. Tips on Avoiding Security-related Bugs
getpass function
23.2. Tips on Avoiding Security-related Bugs
23.5. Tips on Using Passwords
getpwuid function : 19.4.1. Including or excluding specific accounts:
gets function : 23.1.1. The Lesson of the Internet Worm
getservicebyname function : 17.1.1. The /etc/services File
getstats program : 10.3.5. access_log Log File
getty program : C.5.2. Logging In
GIDs (group identifiers)
1.4.3. Add-On Functionality Breeds Problems
4.1.3. Groups and Group Identifiers (GIDs)
4.1.3.3. Groups and BSD or SVR4 UNIX
real versus effective : 4.3.1. Real and Effective UIDs
GIP RENATER : F.3.4.12. France: universities, Ministry of Research and Education in France, CNRS, CEA, INRIA, CNES, INRA, IFREMER, and EDF
glass walls : 12.2.3.3. Glass walls
GNU Emacs : 11.5.2.3. GNU .emacs
GNU utilities : 23.1.2.1. What they found
Goldman, Sachs, and Company : F.3.4.38. U.K. JANET network
granularity, time : 23.8. Picking a Random Seed
grounding signals : 25.3.3. Signal Grounding
group disk quotas : 25.2.2.5. Using quotas
group file
1.2. What Is an Operating System?
4.1.3.1. The /etc/group file
4.2.3. Impact of the /etc/passwd and /etc/group Files on Security
8.1.6. Group Accounts
group IDs : (see GIDs)
Group table (NIS+) : 19.5.3. NIS+ Tables
groups
4.1.3. Groups and Group Identifiers (GIDs)
4.1.3.3. Groups and BSD or SVR4 UNIX
accounts for : 8.1.6. Group Accounts
changing : 5.8. chgrp: Changing a File's Group
checklist for : A.1.1.3. Chapter 4: Users, Groups, and the Superuser
files writable by : 11.6.1.2. Writable system files and directories
identifiers for : (see GIDs)
NIS netgroups
19.4.4. NIS Netgroups
19.4.4.6. NIS is confused about "+"
umask for group projects : 5.3.1. The umask Command
wheel : (see wheel group)
grpck command : 8.2. Monitoring File Format
guessing passwords : (see cracking, passwords)
guest accounts
4.1. Users and Groups
8.1.4. Open Accounts
8.1.4.6. Potential problems with rsh
8.8.7. Algorithm and Library Changes


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.