18.12.2012 Views

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Index<br />

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z<br />

Index: B<br />

back doors<br />

2.5. The Problem with <strong>Sec</strong>urity Through Obscurity<br />

6.2.3. Cryptographic Strength<br />

11.1. Programmed Threats: Definitions<br />

11.1.2. Back Doors and Trap Doors<br />

11.5. Protecting Yourself<br />

27.1.2. Trusting Trust<br />

in MUDs and IRCs : 17.3.23. Other TCP Ports: MUDs and <strong>Internet</strong> Relay Chat (IRC)<br />

background checks, employee : 13.1. Background Checks<br />

backquotes in CGI input<br />

18.2.3.2. Testing is not enough!<br />

18.2.3.3. Sending mail<br />

BACKSPACE key : 3.4. Changing Your Password<br />

backup program : 7.4.3. Specialized Backup Programs<br />

backups<br />

7. Backups<br />

7.4.7. inode Modification Times<br />

9.1.2. Read-only Filesystems<br />

24.2.2. What to Do When You Catch Somebody<br />

across networks : 7.4.5. Backups Across the Net<br />

for archiving information : 7.1.1.1. A taxonomy of computer failures<br />

automatic<br />

7.3.2. Building an Automatic Backup System<br />

18.2.3.5. Beware stray CGI scripts<br />

checklist for : A.1.1.6. Chapter 7: Backups<br />

criminal investigations and : 26.2.4. Hazards of Criminal Prosecution<br />

of critical files<br />

file:///C|/Oreilly Unix etc/<strong>O'Reilly</strong> Reference Library/networking/puis/index/idx_b.htm (1 of 6) [2002-04-12 10:43:41]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!