Полезная информация

Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: N

name service
16.2.6. Name Service
16.2.6.2. Other naming services
security and : 16.3.2. Security and Nameservice
name-value pairs in BNU UUCP : 15.5.1.2. Name-value pairs
named daemon : 16.2.6.1. DNS under UNIX
named nameserver : 17.3.6.2. DNS nameserver attacks
named-xfer program : 16.2.6.1. DNS under UNIX
named.boot file
17.3.6.1. DNS zone transfers
17.3.6.2. DNS nameserver attacks
names
choosing UUCP : 15.5.2. Permissions Commands
computer
16.2.3. Hostnames
16.2.3.1. The /etc/hosts file
user : (see usernames)
nameserver attacks, DNS : 17.3.6.2. DNS nameserver attacks
nameserver cache loading : 16.3.2. Security and Nameservice
NASA
Ames Research Center : F.3.4.22. NASA: Ames Research Center
NASA: Goddard Space Flight Center : F.3.4.23. NASA: Goddard Space Flight Center
National Aeronautical Space Agency : (see NASA)
National Computer Security Center (NCSC) : F.2.1. National Institute of Standards and Technology (NIST)
National Institute of Standards and Technology : (see NIST)
National Science Foundation Network : (see networks, NFSNET)
national security : 26.2.2. Federal Jurisdiction
natural disasters
1.1. What Is Computer Security?
7.1.1.1. A taxonomy of computer failures
7.1.6.1. Physical security for backups
12.2.1.1. Fire
(see also physical security)
accidents : 12.2.2. Preventing Accidents
earthquakes : 12.2.1.4. Earthquake
fires
12.2.1.1. Fire
12.2.1.2. Smoke
lightning
12.2. Protecting Computer Hardware
12.2.1.9. Lightning
natural gas : 12.2.1.5. Explosion
Naval Computer Incident Response Team (NAVCIRT) : F.3.4.44. U.S. Department of the Navy
ncheck command : 5.5.4.1. The ncheck command
-s option
5.5.4.1. The ncheck command
5.6. Device Files
NCSA HTTPD server : 10.3.5. access_log Log File
NCSA server : (see Web servers)
NCSC (National Computer Security Center) : F.2.1. National Institute of Standards and Technology (NIST)
needexpnhelo (sendmail) : 17.3.4.3. Improving the security of Berkeley sendmail V8
needmailhelo (sendmail) : 17.3.4.3. Improving the security of Berkeley sendmail V8
needvrfyhelo (sendmail) : 17.3.4.3. Improving the security of Berkeley sendmail V8
nested directories : 25.2.2.8. Tree-structure attacks
Netgroup table (NIS+) : 19.5.3. NIS+ Tables
netgroups, NIS
19.4.4. NIS Netgroups
19.4.4.6. NIS is confused about "+"
limiting imported accounts : 19.4.4.2. Using netgroups to limit the importing of accounts
NetInfo
3.2.2. The /etc/passwd File and Network Databases
16.2.6.2. Other naming services
Netmasks table (NIS+) : 19.5.3. NIS+ Tables
netnews~firewalls : 21.4.3. Netnews
.netrc file : 10.4.3. Network Setup
Netscape Navigator
encryption system of : 18.4.1. Eavesdropping Over the Wire
random number generator : 23.8. Picking a Random Seed
netstat command
17.5. Monitoring Your Network with netstat
24.2.1. Catching One in the Act
24.2.4. Tracing a Connection
-a option : 17.5. Monitoring Your Network with netstat
-n option : 17.5. Monitoring Your Network with netstat
network connections : 17.3.3. TELNET (TCP Port 23)
network databases : 3.2.2. The /etc/passwd File and Network Databases
Network Filesystem : (see NFS)
network filesystems : 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
Network Information Center (NIC) : 24.2.4.2. How to contact the system administrator of a computer you don't know
Network Information System : (see NIS)
Network News Transport Protocol : (see NNTP)
network providers : 27.2.6. Network Providers that Network Too Well
network services
17. TCP/IP Services
17.7. Summary
23.3. Tips on Writing Network Programs
DNS : (see DNS)
encryption with : 17.4. Security Implications of Network Services
finger : (see finger command)
FTP : (see FTP)
NNTP : (see NNTP)
NTP : (see NTP)
passwords for : 17.4. Security Implications of Network Services
POP : (see POP)
root account with : 17.4. Security Implications of Network Services
securing : 19.1. Securing Network Services
SMTP : (see SMTP)
SNMP : (see SNMP)
spoofing : 17.5. Monitoring Your Network with netstat
systat : 17.3.1. systat (TCP Port 11)
table of : G. Table of IP Services
Telnet : (see Telnet utility)
TFTP : (see TFTP)
UUCP over TCP : 17.3.20. UUCP over TCP (TCP Port 540)
Network Time Protocol : (see NTP)
network weaving : 16.1.1.1. Who is on the Internet?
networks
10Base-T : 12.3.1.2. Eavesdropping by Ethernet and 10Base-T
allowing threats from : 11.4. Entry
ARPANET : 16.1.1. The Internet
backing up
7.2.2. Small Network of Workstations and a Server
7.2.4. Large Service-Based Networks with Large Budgets
backups across : 7.4.5. Backups Across the Net
cables for : 12.2.4.2. Network cables
checklist for
A.1.1.15. Chapter 16: TCP/IP Networks
A.1.1.16. Chapter 17: TCP/IP Services
configuration files : 10.4.3. Network Setup
connectors for : 12.2.4.3. Network connectors
cutting cables : 25.1. Destructive Attacks
denial of service on
25.3. Network Denial of Service Attacks
25.3.4. Clogging
disabling physically : 25.3.3. Signal Grounding
Internet : 16.1.1. The Internet
LANs : (see LANs)
logging across : 10.5.2.2. Logging across the network
logging services of : 10.3.6. Logging Network Services
MANs : 16.1. Networking
mobile computing : 8.7. One-Time Passwords
monitoring with netstat : 17.5. Monitoring Your Network with netstat
NFSNET : 16.1.1. The Internet
packet-switching : 16.2. IPv4: The Internet Protocol Version 4
scanning : 17.6. Network Scanning
security references : D.1.8. Network Technology and Security
services for : 11.1.2. Back Doors and Trap Doors
sniffers : 16.3. IP Security
spoofed connection : 8.5.3.1. Trusted path
TCP/IP : (see TCP/IP, networks)
UNIX and : 16.1.2. Networking and UNIX
UUCP over : 15.8. UUCP Over Networks
WANs : 16.1. Networking
Networks table (NIS+) : 19.5.3. NIS+ Tables
networks, computer : 1.4.3. Add-On Functionality Breeds Problems
Neumann, Peter : 1.3. History of UNIX
newgrp command : 4.1.3.2. Groups and older AT&T UNIX
newkey -u command
19.3.2.1. Creating passwords for users
19.5.4.2. When a user's passwords don't match
news : (see Usenet)
news (user) : 4.1. Users and Groups
newsgroups, defamation/harassment via : 26.4.7. Harassment, Threatening Communication, and Defamation
NEXTSTEP Window Server (NSWS) : 17.3.16. NEXTSTEP Window Server (NSWS) (TCP Port 178)
NFS (Network Filesystem) : 19. RPC, NIS, NIS+, and Kerberos
authentication and
19.2.2. RPC Authentication
19.2.2.4. AUTH_KERB
checklist for : A.1.1.19. Chapter 20: NFS
file permissions : 5.1.7. File Permissions in Detail
find command on : 5.5.4. Finding All of the SUID and SGID Files
-local option : 11.6.1.2. Writable system files and directories
MOUNT : 20.1.1. NFS History
Secure NFS : (see Secure NFS)
server, and UUCP : 15.3. UUCP and Security
technical description of : 20.1.1. NFS History
and trusted hosts : 17.3.18.2. The problem with trusted hosts
-xdev option : 11.6.1.2. Writable system files and directories
NIC (Network Information Center) : 24.2.4.2. How to contact the system administrator of a computer you don't know
nice command : 25.2.1.2. System overload attacks
nice numbers : C.1.3.3. Process priority and niceness
NIS (Network Information Service)
+ in
19.4. Sun's Network Information Service (NIS)
19.4.4.6. NIS is confused about "+"
clients : 19.4. Sun's Network Information Service (NIS)
domains : 19.4.3. NIS Domains
maps : 19.4. Sun's Network Information Service (NIS)
netgroups
19.4.4. NIS Netgroups
19.4.4.6. NIS is confused about "+"
limiting imported accounts : 19.4.4.2. Using netgroups to limit the importing of accounts
Secure RPC with
19.3.2. Setting Up Secure RPC with NIS
19.3.4. Limitations of Secure RPC
spoofing : 19.4.4.5. Spoofing NIS
UDP : 16.2.4.3. UDP
Yellow Pages : 16.2.6.2. Other naming services
NIS (Network Information System)
3.2.2. The /etc/passwd File and Network Databases
3.4. Changing Your Password
19. RPC, NIS, NIS+, and Kerberos
19.4. Sun's Network Information Service (NIS)
19.4.5. Unintended Disclosure of Site Information with NIS
NIS+
3.2.2. The /etc/passwd File and Network Databases
3.4. Changing Your Password
16.2.6.2. Other naming services
19.5. Sun's NIS+
19.5.5. NIS+ Limitations
integrity-checking software for : 19.5.5. NIS+ Limitations
principals : 19.5.1. What NIS+ Does
Secure RPC with
19.3.2. Setting Up Secure RPC with NIS
19.3.4. Limitations of Secure RPC
nisaddcred command : 19.3.1.1. Proving your identity
niscat command : 3.2.2. The /etc/passwd File and Network Databases
nischown command : 19.5.4. Using NIS+
nispasswd command
3.4. Changing Your Password
19.5.4. Using NIS+
19.5.4.2. When a user's passwords don't match
NIST (National Institute of Standards and Technology)
F.2.1. National Institute of Standards and Technology (NIST)
F.3.4.26. NIST (National Institute of Standards and Technology)
NNTP (Network News Transport Protocol) : 17.3.13. Network News Transport Protocol (NNTP) (TCP Port 119)
nobody (user)
4.1. Users and Groups
19.3.2.1. Creating passwords for users
noexpn (sendmail) : 17.3.4.3. Improving the security of Berkeley sendmail V8
noise, electrical : 12.2.1.8. Electrical noise
nonadaptive modems : (see modems)
nonblocking systems : 19.2. Sun's Remote Procedure Call (RPC)
nonce : 23.3. Tips on Writing Network Programs
nonrepudiation : 6.5. Message Digests and Digital Signatures
NORDUNET : F.3.4.27. NORDUNET: Denmark, Sweden, Norway, Finland, Iceland
NOREAD= command : 15.5.2. Permissions Commands
Northwestern University : F.3.4.28. Northwestern University
nosuid : 11.1.2. Back Doors and Trap Doors
Novell : 1.3. History of UNIX
novrfy (sendmail) : 17.3.4.3. Improving the security of Berkeley sendmail V8
Nowitz, David : 15.2. Versions of UUCP
NOWRITE= command : 15.5.2. Permissions Commands
npasswd package : 8.8.2. Constraining Passwords
NPROC variable : 25.2.1.1. Too many processes
NSA (National Security Agency) : F.2.2. National Security Agency (NSA)
NSWS (NextStep Window Server) : 17.3.16. NEXTSTEP Window Server (NSWS) (TCP Port 178)
NTP (Network Time Protocol) : 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
Secure RPC and : 19.3.1.3. Setting the window
NU-CERT : F.3.4.28. Northwestern University
null device : 5.6. Device Files
nuucp account
15.1.4. How the UUCP Commands Work
15.3.1. Assigning Additional UUCP Logins
15.4.1.3. Format of USERFILE entry without system name


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.