Полезная информация

Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: V

vacuums, computer : 12.2.1.3. Dust
VALIDATE= command : 15.5.2. Permissions Commands
vampire taps : 12.3.1.5. Fiber optic cable
vandalism
7.1.1.1. A taxonomy of computer failures
12.2.4. Vandalism
12.2.4.3. Network connectors
/var directory
4.3.7. The Bad su Log
9.1.2. Read-only Filesystems
(see also /usr directory)
/var/adm/acct : 10.2. The acct/pacct Process Accounting File
/var/adm directory : 11.5.3.6. Other files
/var/adm/lastlog file : 10.1.1. lastlog File
/var/adm/loginlog file : 10.1.4. loginlog File
/var/adm/messages : 10.2.3. messages Log File
/var/adm/messages file : 4.3.7. The Bad su Log
/var/adm/savacct : 10.2. The acct/pacct Process Accounting File
/var/adm/sulog file : 4.3.7. The Bad su Log
/var/adm/wtmp file
10.1.2. utmp and wtmp Files
10.1.3.1. Pruning the wtmp file
/var/adm/xferlog : 10.3.3. xferlog Log File
/var/log directory : 11.5.3.6. Other files
/var/spool/uucp/.Admin directory : 10.3.4. uucp Log Files
variables
bounds checking : 23.2. Tips on Avoiding Security-related Bugs
to CGI scripts : 18.2.3.1. Do not trust the user's browser!
vendor liability : 18.5.2. Trusting Your Software Vendor
vendors : 27.3.3. Your Vendor?
ventilation
12.2.1.10. Vibration
(see also dust; smoke and smoking)
air ducts : 12.2.3.2. Entrance through air ducts
holes (in hardware) : 12.2.4.1. Ventilation holes
VERB command (sendmail) : 17.3.4.3. Improving the security of Berkeley sendmail V8
verifying
backups : 12.3.2.1. Verify your backups
new passwords : 3.5. Verifying Your New Password
signatures with PGP : 6.6.3.5. Decrypting messages and verifying signatures
Verisign Inc. : 18.6. Dependence on Third Parties
Version 2 UUCP
15.2. Versions of UUCP
15.4. Security in Version 2 UUCP
15.4.3. L.cmds: Providing Remote Command Execution
callback feature : 15.4.1.5. Requiring callback
Veteran's Health Administration : F.3.4.45. U.S. Veteran's Health Administration
vi editor
5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve hole
11.5.2.4. .exrc
11.5.2.7. Other initializations
vibration : 12.2.1.10. Vibration
video tape : 7.1.4. Guarding Against Media Failure
vipw command : 8.4.1. Changing an Account's Password
virtual terminals : (see Telnet utility)
Virual Private Network : 21.1.2. Uses of Firewalls
viruses
11.1. Programmed Threats: Definitions
11.1.5. Viruses
27.2.2. Viruses on the Distribution Disk
bacteria programs : 11.1.7. Bacteria and Rabbits
references on : D.1.4. Computer Viruses and Programmed Threats
voltage spikes : 12.2.1.8. Electrical noise
VPN : 21.1.2. Uses of Firewalls
VRFY option (sendmail) : 17.3.4.3. Improving the security of Berkeley sendmail V8
vsprintf function : 23.2. Tips on Avoiding Security-related Bugs
VT100 terminal : 27.2.1. Hardware Bugs


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.