18.12.2012 Views

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Index<br />

backing up<br />

7. Backups<br />

7.4.7. inode Modification Times<br />

automatic system for<br />

7.3.2. Building an Automatic Backup System<br />

18.2.3.5. Beware stray CGI scripts<br />

critical files<br />

7.3. Backing Up System Files<br />

7.3.2. Building an Automatic Backup System<br />

prioritizing : 7.3.1. What Files to Back Up?<br />

changing owner of : 5.7. chown: Changing a File's Owner<br />

context-dependent (CDFs)<br />

5.9.2. Context-Dependent Files<br />

24.4.1.7. Hidden files and directories<br />

core : C.4. The kill Command<br />

descriptors : 23.2. Tips on Avoiding <strong>Sec</strong>urity-related Bugs<br />

detecting changes to<br />

9.2. Detecting Change<br />

9.3. A Final Note<br />

device : 5.6. Device Files<br />

downloading, logs of<br />

10.3.3. xferlog Log File<br />

10.3.5. access_log Log File<br />

finding all SUID/SGID<br />

5.5.4. Finding All of the SUID and SGID Files<br />

5.5.4.1. The ncheck command<br />

format, monitoring : 8.2. Monitoring File Format<br />

group-writable : 11.6.1.2. Writable system files and directories<br />

hidden : 24.4.1.7. Hidden files and directories<br />

hidden space : 25.2.2.7. Hidden space<br />

history : 10.4.1. Shell History<br />

immutable : 9.1.1. Immutable and Append-Only Files<br />

integrity of : (see integrity)<br />

intruder's changes to : 24.4.1.1. Changes in file contents<br />

file:///C|/Oreilly Unix etc/<strong>O'Reilly</strong> Reference Library/networking/puis/index/idx_f.htm (2 of 7) [2002-04-12 10:43:46]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!