Index
 
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: L
- L command (sendmail.cf)
- 
  - sendmail, D.1. Sun Enhancements 
  - sendmail, D.4. L and G Configuration Commands 
 
- l flag
: sendmail, 30.8. Alphabetized F= Flags
- L flag
: sendmail, 30.8. Alphabetized F= Flags
- $l macro
: (see UnixFromLine option)
- $L macro
: sendmail, 31.10. Alphabetized Reference 
- l option
: (see UseErrorsTo (l) option)
- L option
: (see LogLevel (L) option)
- L-devices file
: Practical UNIX & Internet Security, 14.5.1. Hooking Up a Modem to Your Computer 
- L.cmds file
: Practical UNIX & Internet Security, 15.4.3. L.cmds: Providing Remote Command Execution 
- L.sys file
: Practical UNIX & Internet Security, 15.3.3. Security of L.sys and Systems Files 
- L= equate
- 
  - sendmail, 18.8. Alphabetized Reference 
  - sendmail, 30.4. The Equates
 
- LA_TYPE macro
: sendmail, 18.8. Alphabetized Reference 
- labeling the system
: Building Internet Firewalls, 13.5.2. Labeling and Diagraming Your System
- laboratory networks
: Building Internet Firewalls, 4.4.1. Laboratory Networks
- Lai, Xuejia
: Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems 
- laid-off employees
: Practical UNIX & Internet Security, 13.2.6. Departure
- LaMacchia, Brian
: Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
- LANs (local area networks)
- 
  - Practical UNIX & Internet Security, 16.1. Networking 
  - Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
  - TCP/IP Network Administration, 1.7. Application Layer
  - (see also Ethernet)
  - applications
: TCP/IP Network Administration, 3.7.1. File Sharing
  - proprietary
: TCP/IP Network Administration, 3.7.1. File Sharing
  - servers
: TCP/IP Network Administration, 3. Network Services
 
- LAN-oriented service
: Building Internet Firewalls, 5.6. Selecting Services Provided by the
- Lance Ethernet Interface
: TCP/IP Network Administration, 6.1.1. Determining the Interface Name 
- laptop computers
- 
  - Practical UNIX & Internet Security, 12.2.6.3. Portables
  - TCP/IP Network Administration, 11.2. Diagnostic Tools 
 
- large transmission window size
: TCP/IP Network Administration, 5.2. Linux Kernel Configuration 
- last connection time
: sendmail, B.1. Status file lines 
- last program
- 
  - Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts 
  - Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files 
  - Practical UNIX & Internet Security, 10.1.3. last Program 
  - Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file 
  - Practical UNIX & Internet Security, 15.3.1. Assigning Additional UUCP Logins 
  - TCP/IP Network Administration, 12.4.2.2. Checking login activity 
  - -f option
: Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file 
 
- lastcomm program
- 
  - Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File 
  - Practical UNIX & Internet Security, 10.2.2. Accounting with BSD
 
- lastlog file
: Practical UNIX & Internet Security, 10.1.1. lastlog File 
- laws
- 
  - Practical UNIX & Internet Security, 26. Computer Security and U.S. Law
  - Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication,  and Defamation
  - backups and
: Practical UNIX & Internet Security, 7.1.7. Legal Issues
  - checklist for
: Practical UNIX & Internet Security, A.1.1.25. Chapter 26: Computer Security and U.S. Law 
  - copyright
  
- 
    - Practical UNIX & Internet Security, 9.2.1. Comparison Copies 
    - Practical UNIX & Internet Security, 26.4.2. Copyright Infringement
    - Practical UNIX & Internet Security, 26.4.2.1. Software piracy and the SPA
  
 
- criminal prosecution
  
- 
    - Practical UNIX & Internet Security, 26.2. Criminal Prosecution 
    - Practical UNIX & Internet Security, 26.2.7. A Final Note on Criminal Actions
  
 
- documentation of incidents
: Building Internet Firewalls, 13.1.7. Document the Incident
  - Electronic Communications Privacy Act (ECPA)
: Practical UNIX & Internet Security, 26.2.3. Federal Computer Crime Laws 
  - encryption
  
- 
    - Practical UNIX & Internet Security, 6.7. Encryption and U.S. Law
    - Practical UNIX & Internet Security, 6.7.2. Cryptography and Export Controls
    - Practical UNIX & Internet Security, 12.2.6.3. Portables
  
 
- enforcement agencies
: Practical UNIX & Internet Security, 14.4.4.1. Kinds of eavesdropping
  - export
  
- 
    - Practical UNIX & Internet Security, 6.4.4.1. Use and export of DES 
    - Practical UNIX & Internet Security, 6.7.2. Cryptography and Export Controls
    - Practical UNIX & Internet Security, 26.4.1. Munitions Export
  
 
- federal enforcement
  
- 
    - Practical UNIX & Internet Security, 26.2.2. Federal Jurisdiction 
    - Practical UNIX & Internet Security, 26.2.3. Federal Computer Crime Laws 
  
 
- indecent material
: Practical UNIX & Internet Security, 26.4.5. Pornography and Indecent Material
  - liability
  
- 
    - Practical UNIX & Internet Security, 26.4. Other Liability
    - Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication,  and Defamation
  
 
- monitoring keystrokes
: Practical UNIX & Internet Security, 24.2.3. Monitoring the Intruder
  - non-citizen access
: Practical UNIX & Internet Security, 26.4.1. Munitions Export
  - patents
: Practical UNIX & Internet Security, 26.4.4. Patent Concerns
  - for portable computers
: Practical UNIX & Internet Security, 12.2.6.3. Portables
  - pursuing intruders
: Building Internet Firewalls, 13.3. Pursuing and Capturing the
  - resources on
: Practical UNIX & Internet Security, D.1.1. Other Computer References
  - search warrants
  
- 
    - Practical UNIX & Internet Security, 26.2.4. Hazards of Criminal Prosecution 
    - Practical UNIX & Internet Security, 26.2.5. If You or One of Your Employees Is a Target
  
 
- security responsibilities
: Building Internet Firewalls, 11.2.3. External Factors That Influence
  - smoking
: Practical UNIX & Internet Security, 12.2.1.2. Smoke 
  - state and local enforcement
: Practical UNIX & Internet Security, 26.2.1. The Local Option 
  - trademarks
: Practical UNIX & Internet Security, 26.4.3. Trademark Violations
  - vendor liability
: Practical UNIX & Internet Security, 18.5.2. Trusting Your Software Vendor
 
- lawsuits (civil)
: Practical UNIX & Internet Security, 26.3. Civil Actions 
- layering firewalls
: Building Internet Firewalls, 3.2. Defense in Depth
- layers
- 
  - TCP/IP Network Administration, 1.2. A Data Communications Model
  - TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
 
- LCP (Link Control Protocol)
- 
  - TCP/IP Network Administration, 6.2.1. The Serial Protocols 
  - TCP/IP Network Administration, A.2. The PPP Daemon
 
- LD_LIBRARY_PATH variable
: sendmail, 22.2. The Environment 
- LDAPMAP macro
: sendmail, 18.8. Alphabetized Reference 
- ldapx database class
: sendmail, 33.8. Alphabetized Reference 
- LDOPTS= directive
: sendmail, 18.4.4. LDOPTS= 
- leased telephone lines
: Practical UNIX & Internet Security, 14.5.4. Physical Protection of Modems
- leases on addresses
: TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- 
  - default-lease-time
: TCP/IP Network Administration, 9.5.1. dhcpd.conf 
  - renewing
: TCP/IP Network Administration, 9.4.2. BOOTP extensions 
 
- least privilege
- 
  - Building Internet Firewalls, 3.1. Least Privilege
  - Building Internet Firewalls, 9.1.4.1. Least privilege
  - Building Internet Firewalls, 9.2.3.1. Least privilege
  - Practical UNIX & Internet Security, 5.5.3.2. Another SUID example: IFS and the /usr/lib/preserve
  - Practical UNIX & Internet Security, 13.2.5. Least Privilege and Separation of Duties
 
- Lee, Ying-Da
: Practical UNIX & Internet Security, 22.4. SOCKS
- legal
: (see laws)
- Lesk, Mike
- 
  - Practical UNIX & Internet Security, 1.3. History of UNIX 
  - Practical UNIX & Internet Security, 15.2. Versions of UUCP 
 
- level, debugging
: sendmail, 4.3. Debugging (-d) 
- level, logging
: (see logs/logging)
- level, version
: (see versions)
- level, warning
- 
  - sendmail, 26.1.1. syslog(3) 
  - sendmail, 26.1.2. Tuning syslog.conf 
 
- LHS, rule
- 
  - sendmail, 8.4. Rules 
  - sendmail, 8.7.1. Other Text in the LHS 
  - sendmail, 28.5. The LHS 
  - (see also rule sets)
  - class macros in
: sendmail, 12.1.3. Class Macros in the LHS 
  - wildcards for
: (see wildcard operators)
 
- liability, legal
- 
  - Practical UNIX & Internet Security, 26.4. Other Liability
  - Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication,  and Defamation
 
- /lib directory
: Practical UNIX & Internet Security, 11.5.3.6. Other files 
- LIBDIRS= directive
: sendmail, 18.4.5. LIBDIRS= 
- libresolv.a
: sendmail, 18.5.1. Use libresolv.a 
- LIBS= directive
: sendmail, 18.4.6. LIBS= 
- libwrap.a package
- 
  - sendmail, 18.8. Alphabetized Reference 
  - sendmail, 22.4.1. Accept/Reject Connections via libwrap.a 
 
- license agreements
: Practical UNIX & Internet Security, 18.5.2. Trusting Your Software Vendor
- 
  - comparison copies and
: Practical UNIX & Internet Security, 9.2.1. Comparison Copies 
 
- lie-detector tests
: Practical UNIX & Internet Security, 13.1. Background Checks
- life, queue messages
: sendmail, 13.2.2. Limit the Life of Queued Messages 
- lightning
- 
  - Practical UNIX & Internet Security, 12.2. Protecting Computer Hardware 
  - Practical UNIX & Internet Security, 12.2.1.9. Lightning 
 
- Lightweight Directory Access Protocol (LDAP)
- 
  - sendmail, 18.8. Alphabetized Reference 
  - sendmail, 33.8. Alphabetized Reference 
 
- limit command
: Practical UNIX & Internet Security, 25.2.5. Soft Process Limits: Preventing Accidental  Denial
- Limit command (<Directory>)
: Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
- limited user access
: Practical UNIX & Internet Security, 8.1.5.1. Limited users
- limited_masquerade feature
: sendmail, 19.6. Alphabetized m4 Macros 
- limiting
- 
  - DHCP servers
: TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
  - number of processable messages
: sendmail, 23.5. How the Queue Is Processed 
  - queue message lifetime
  
- 
    - sendmail, 13.2.2. Limit the Life of Queued Messages 
    - sendmail, 34.8. Alphabetized Reference 
  
 
 
- line length
- 
  - sendmail, 30.4. The Equates
  - sendmail, 30.8. Alphabetized F= Flags
 
- line length restriction
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- Line Printer (LP) print service, in Solaris
: TCP/IP Network Administration, 9.2.2. Solaris Line Printer Service 
- Link Control Protocol (LCP)
- 
  - TCP/IP Network Administration, 6.2.1. The Serial Protocols 
  - TCP/IP Network Administration, A.2. The PPP Daemon
 
- link-level encryption
: Building Internet Firewalls, 10.5.1. At What Level Do You Encrypt?
- link-level security
: Practical UNIX & Internet Security, 16.3.1. Link-level Security
- link-state
- 
  - database
: TCP/IP Network Administration, 7.4.3. Open Shortest Path First 
  - routing protocols
  
- 
    - TCP/IP Network Administration, 7.4. Interior Routing Protocols 
    - TCP/IP Network Administration, 7.4.2. RIP Version 2 
  
 
 
- Link-State Advertisements (LSAs)
- 
  - TCP/IP Network Administration, 7.4.3. Open Shortest Path First 
  - TCP/IP Network Administration, B.8.1. The ospf Statement
 
- links
- 
  - encryption of
: Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire
  - link-level security
: Practical UNIX & Internet Security, 16.3.1. Link-level Security
  - static
: Practical UNIX & Internet Security, 23.4. Tips on Writing SUID/SGID Programs
  - symbolic, following (Web)
  
- 
    - Practical UNIX & Internet Security, 18.2.2.2. Additional configuration issues
    - Practical UNIX & Internet Security, 18.3.2. Commands Within the <Directory>
  
 
 
- lint program
: Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- LINUX operating system
- 
  - Practical UNIX & Internet Security, 1.3. History of UNIX 
  - Practical UNIX & Internet Security, 3.3. Entering Your Password 
  - Practical UNIX & Internet Security, 23.1.2.1. What they found
  - TCP/IP Network Administration, UNIX Versions
  - TCP/IP Network Administration, 4.7. netconfig 
  - TCP/IP Network Administration, 10.2. Running sendmail as a Daemon 
  - ext2 filesystem
: Practical UNIX & Internet Security, 25.2.2.6. Reserved space 
  - ifconfig command on
  
- 
    - TCP/IP Network Administration, 6.1.2. Checking the Interface with ifconfig 
    - TCP/IP Network Administration, 6.1.5.3. Metric 
  
 
- kernel configuration
: TCP/IP Network Administration, 5.2. Linux Kernel Configuration 
  
- 
    - of PPP
: TCP/IP Network Administration, 6.3. Installing PPP 
  
 
- random number generators
: Practical UNIX & Internet Security, 23.7.4. Other random number generators
  - remounting filesystems on
: TCP/IP Network Administration, 9.1.3.2. The vfstab and fstab files 
  - sharing directories on
: TCP/IP Network Administration, 9.1.2.2. The /etc/exports file 
  - source directory
: TCP/IP Network Administration, 5.2. Linux Kernel Configuration 
 
- linux.mc macro control file
: TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros 
- linux.smtp.cf file
- 
  - TCP/IP Network Administration, 10.4.2. General sendmail.cf Structure 
  - TCP/IP Network Administration, 10.7. Modifying a sendmail.cf File 
 
- list-bounce alias
: sendmail, 25.5.3. A list-bounced Alias 
- list-of-lists
: TCP/IP Network Administration, 13.5. Mailing Lists 
- list precedence
: sendmail, 14.4. Precedence 
- list syntax
: (see mailing lists)
- List:; form addresses
- 
  - sendmail, 17.1.2.1. A rule to handle List:; 
  - sendmail, 17.3. Rule Set 0 
 
- ListProcessor package
: sendmail, 25.6.3. ListProcessor 
- lists, old-style address
: sendmail, 13.2.7. Accept Old-Style Lists of Addresses 
- LISTSERV
: TCP/IP Network Administration, 13.5. Mailing Lists 
- literals
: TCP/IP Network Administration, 10.6.2. Transforming the Address 
- Live Script
: Practical UNIX & Internet Security, 18.5.2. Trusting Your Software Vendor
- Livingston routers
: Building Internet Firewalls, 6.5. Conventions for Packet Filtering
- *LK* keyword
: TCP/IP Network Administration, 12.2.1. The Shadow Password File 
- load
: (see performance)
- local
- 
  - aliases
: sendmail, 24.1.2. Local Must Be Local 
  - area networks (LANs)
  
- 
    - Practical UNIX & Internet Security, 16.1. Networking 
    - Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
  
 
- authentication (NIS+)
: Practical UNIX & Internet Security, 19.5.4. Using NIS+
  - canonical name
  
- 
    - sendmail, 21.2.1. Determine the Local Canonical Name 
    - sendmail, 31.10. Alphabetized Reference 
  
 
- checking if host is
: sendmail, 17.2.1. Is the Host Local? 
  - delivery
: sendmail, 30.8. Alphabetized F= Flags
  - delivery agent
  
- 
    - sendmail, 6.3. The local Delivery Agent 
    - sendmail, 30.2.1. Required Symbolic Names
    - sendmail, 30.8. Alphabetized F= Flags
  
 
- domains, list of
: sendmail, 32.5. Alphabetized Reference 
  - gateways
: (see gateways)
  - law enforcement
: Practical UNIX & Internet Security, 26.2.1. The Local Option 
  - newsgroups
: Building Internet Firewalls, 2.4. Usenet News
  - recipients
  
- 
    - sendmail, 3.2. Role in Local Delivery 
    - sendmail, 19.6. Alphabetized m4 Macros 
    - sendmail, 29.6.3. Delivering to Local Recipient 
  
 
- server, local delivery on
: sendmail, 19.6. Alphabetized m4 Macros 
  - storage
  
- 
    - Practical UNIX & Internet Security, 12.3.4. Protecting Local Storage 
    - Practical UNIX & Internet Security, 12.3.4.5. Function keys 
  
 
- users
  
- 
    - Practical UNIX & Internet Security, 15.4.1.2. USERFILE entries for local users 
    - sendmail, 20.2.1. Accept Mail Only From Our Domain 
    - sendmail, 31.10. Alphabetized Reference 
  
 
- UUCP handling
: sendmail, 29.6.5. Handling UUCP Locally 
 
- LOCAL_CONFIG macro (m4)
: sendmail, 19.6. Alphabetized m4 Macros 
- LOCAL_NET_CONFIG macro (m4)
: sendmail, 19.6. Alphabetized m4 Macros 
- local_procmail feature
: sendmail, 19.6. Alphabetized m4 Macros 
- LOCAL_RELAY macro (m4)
: sendmail, 19.6. Alphabetized m4 Macros 
- LOCAL_REPLAY macro (m4)
: sendmail, 31.10. Alphabetized Reference 
- LOCAL_RULE macro (m4)
: sendmail, 19.6. Alphabetized m4 Macros 
- LOCAL_RULE_# macros (m4)
: sendmail, 19.6. Alphabetized m4 Macros 
- LOCAL_RULESETS macro (m4)
: sendmail, 19.6. Alphabetized m4 Macros 
- LOCAL_USER macro (m4)
: sendmail, 19.6. Alphabetized m4 Macros 
- LOCALDOMAIN variable
: TCP/IP Network Administration, 8.2.1. The Resolver Configuration File 
- localhost
- 
  - TCP/IP Network Administration, 3.2. The Host Table
  - TCP/IP Network Administration, 7.2. The Minimal Routing Table 
  - TCP/IP Network Administration, 8.3.4. The named.local File 
 
- LOCALRES environmental variable
: TCP/IP Network Administration, 11.6.4. dig: An Alternative to nslookup 
- lock daemon (lockd)
: TCP/IP Network Administration, 9.1.1. NFS Daemons 
- lock file
: sendmail, 23.2.3. The Lock File (obsolete as of V5.62): lf 
- lock program
: Practical UNIX & Internet Security, 12.3.5.2. X screen savers
- lock requests
: (see files, lock requests, handling)
- locked accounts
: Practical UNIX & Internet Security, 3.3. Entering Your Password 
- locking files
: Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- log files and logging
- 
  - Building Internet Firewalls, 5.8.1.4. Safeguard the system logs
  - Building Internet Firewalls, 8.11. syslog
  - Building Internet Firewalls, 13.5.4. Keeping Activity Logs
  - Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
  - Practical UNIX & Internet Security, 10. Auditing and Logging
  - Practical UNIX & Internet Security, 10.8. Managing Log Files
  - Practical UNIX & Internet Security, 11.5.3.5. System initialization files 
  - Practical UNIX & Internet Security, 21.5. Special Considerations 
  - Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
  - sendmail, 13.2.6. The Default Logging Level 
  - sendmail, 18.8. Alphabetized Reference 
  - sendmail, 26.1. Logging with syslog 
  - sendmail, 36.7. Alphabetized Reference 
  - (see also syslog)
  - access_log
  
- 
    - Practical UNIX & Internet Security, 10.3.5. access_log Log File
    - Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
  
 
- across networks
: Practical UNIX & Internet Security, 10.5.2.2. Logging across the network
  - aculog
: Practical UNIX & Internet Security, 10.3.1. aculog File 
  - agent_log file
: Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
  - archiving information
: Practical UNIX & Internet Security, 7.4.2. Simple Archives
  - backups and
  
- 
    - Building Internet Firewalls, 5.10.2. Do Secure Backups
    - Practical UNIX & Internet Security, 10.2.2. Accounting with BSD
  
 
- breakins
: Practical UNIX & Internet Security, 24.1.2. Rule #2: DOCUMENT
  - C2 audit
: Practical UNIX & Internet Security, 10.1. The Basic Log Files
  - checklist for
: Practical UNIX & Internet Security, A.1.1.9. Chapter 10: Auditing and Logging
  - creating with SOCKS
: Building Internet Firewalls, 7.6. Using SOCKS for
  - critical messages
  
- 
    - Practical UNIX & Internet Security, 10.5.3. syslog Messages
    - Practical UNIX & Internet Security, 10.5.3.1. Beware false log entries
  
 
- documenting incidents
: Building Internet Firewalls, 13.1.7. Document the Incident
  - downloaded files
  
- 
    - Practical UNIX & Internet Security, 10.3.3. xferlog Log File
    - Practical UNIX & Internet Security, 10.3.5. access_log Log File
  
 
- of dropped packets
: Building Internet Firewalls, 6.9. Where to Do Packet Filtering
  - failed su attempts
: Practical UNIX & Internet Security, 4.3.7. The Bad su Log 
  - file format
: Practical UNIX & Internet Security, 8.2. Monitoring File Format
  - files transferred by FTP
: Practical UNIX & Internet Security, 10.3.3. xferlog Log File
  - to hardcopy device
: Practical UNIX & Internet Security, 10.5.2.1. Logging to a printer
  - individual users
  
- 
    - Practical UNIX & Internet Security, 10.4. Per-User Trails in the Filesystem
    - Practical UNIX & Internet Security, 10.4.3. Network Setup
  
 
- lastlog
: Practical UNIX & Internet Security, 10.1.1. lastlog File 
  - managing
: Practical UNIX & Internet Security, 10.8. Managing Log Files
  - manually logging
  
- 
    - Practical UNIX & Internet Security, 10.7. Handwritten Logs
    - Practical UNIX & Internet Security, 10.7.2.2. Informational material
  
 
- memory required for
  
- 
    - Building Internet Firewalls, 12.1.3. Managing Your Disk Space
    - Building Internet Firewalls, 12.2.2. What Should You Watch For?
  
 
- mistyped passwords
: Practical UNIX & Internet Security, 10.5.3. syslog Messages
  - network services
: Practical UNIX & Internet Security, 10.3.6. Logging Network Services
  - outgoing mail
: Practical UNIX & Internet Security, 10.4.2. Mail
  - per-machine
: Practical UNIX & Internet Security, 10.7.2. Per-Machine Logs
  - per-site
: Practical UNIX & Internet Security, 10.7.1. Per-Site Logs
  - potentially criminal activity
: Practical UNIX & Internet Security, 26.2.6. Other Tips 
  - proxy services and
: Building Internet Firewalls, 7.1.1.2. Proxy services are good at logging
  - refer_log file
: Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
  - of router actions
: Building Internet Firewalls, 6.4.1. Logging Actions
  - sulog
: (see sulog file)
  - Swatch program
  
- 
    - Practical UNIX & Internet Security, 10.6. Swatch: A Log File Tool 
    - Practical UNIX & Internet Security, 10.6.2. The Swatch Configuration File
    - Practical UNIX & Internet Security, E.4.9. Swatch
  
 
- syslog facility
  
- 
    - Practical UNIX & Internet Security, 10.5. The UNIX System Log (syslog) Facility
    - Practical UNIX & Internet Security, 10.5.3.1. Beware false log entries
    - sendmail, 26.1.1. syslog(3) 
  
 
- system clock and
: Practical UNIX & Internet Security, 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
  - tracking intruders with
: Practical UNIX & Internet Security, 24.3. The Log Files: Discovering an Intruder's
  - trimlog program for
: Building Internet Firewalls, B.6.5. trimlog
  - unexpectedly deleted or modified
: Building Internet Firewalls, 12.2.3. The Good, the Bad, and the Ugly
  - /usr/adm/messages
: Practical UNIX & Internet Security, 10.2.3. messages Log File
  - utmp and wtmp
  
- 
    - Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files 
    - Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file 
  
 
- UUCP
: Practical UNIX & Internet Security, 10.3.4. uucp Log Files
  - /var/adm/acct
: Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File 
  - /var/adm/loginlog
: Practical UNIX & Internet Security, 10.1.4. loginlog File
  - of web servers
: Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
  - what to watch for
: Building Internet Firewalls, 12.2.2. What Should You Watch For?
  - what not to log
: Practical UNIX & Internet Security, 10.5.3. syslog Messages
  - -X switch for
: sendmail, 26.4. Log Transactions with -X 
  - xferlog
: Practical UNIX & Internet Security, 10.3.3. xferlog Log File
 
- LOG macro
: sendmail, 18.8. Alphabetized Reference 
- LOG_MAIL
: (see facility, mail-handling program)
- LOG_PID
: sendmail, 26.1.1. syslog(3) 
- logdaemon package
: Practical UNIX & Internet Security, 17.3.18.5. Searching for .rhosts files 
- logger command
: Practical UNIX & Internet Security, 10.5.3. syslog Messages
- logging in
- 
  - Practical UNIX & Internet Security, C.5. Starting Up UNIX and Logging In 
  - Practical UNIX & Internet Security, C.5.3. Running the User's Shell 
  - FTP access without
: Practical UNIX & Internet Security, 17.3.2.7. Allowing only FTP access
  - Kerberos system
: Practical UNIX & Internet Security, 19.6.1.1. Initial login
  - last program
  
- 
    - Practical UNIX & Internet Security, 10.1.3. last Program 
    - Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file 
  
 
- lastlog file
: Practical UNIX & Internet Security, 10.1.1. lastlog File 
  - passwords
: Practical UNIX & Internet Security, 3.3. Entering Your Password 
  - preventing
  
- 
    - Practical UNIX & Internet Security, 8.4. Managing Dormant Accounts 
    - Practical UNIX & Internet Security, 8.4.3. Finding Dormant Accounts 
  
 
- remotely
: TCP/IP Network Administration, 1.7. Application Layer
  - restricting
: Practical UNIX & Internet Security, 8.3. Restricting Logins
  - with Secure RPC
: Practical UNIX & Internet Security, 19.3.3. Using Secure RPC 
  - startup file attacks
  
- 
    - Practical UNIX & Internet Security, 11.5.2. Start-up File Attacks 
    - Practical UNIX & Internet Security, 11.5.2.7. Other initializations 
  
 
 
- logging out with Secure RPC[logging out:Secure RPC]
: Practical UNIX & Internet Security, 19.3.3. Using Secure RPC 
- loghost
: TCP/IP Network Administration, 3.2. The Host Table
- logic bombs
- 
  - Practical UNIX & Internet Security, 11.1. Programmed Threats: Definitions 
  - Practical UNIX & Internet Security, 11.1.3. Logic Bombs 
  - Practical UNIX & Internet Security, 27.2.2. Viruses on the Distribution Disk
 
- login activity, checking
: TCP/IP Network Administration, 12.4.2.2. Checking login activity 
- .login file
- 
  - Practical UNIX & Internet Security, 8.5.1. Secure Terminals 
  - Practical UNIX & Internet Security, 11.5.2.1. .login, .profile, /etc/profile 
  - Practical UNIX & Internet Security, 24.4.1.6. Changes to startup files 
 
- login program
- 
  - Practical UNIX & Internet Security, 8.6. The UNIX Encrypted Password System 
  - Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors 
  - Practical UNIX & Internet Security, 19.5.4. Using NIS+
  - Practical UNIX & Internet Security, 26.2.6. Other Tips 
  - Practical UNIX & Internet Security, 27.1.2. Trusting Trust
 
- logindevperm file
: Practical UNIX & Internet Security, 17.3.21.1. /etc/fbtab and /etc/logindevperm
- loginlog file
: Practical UNIX & Internet Security, 10.1.4. loginlog File
- logins
- 
  - authentication
: Practical UNIX & Internet Security, 17.3.5. TACACS (UDP Port 49)
  - FTP
: Practical UNIX & Internet Security, 17.3.2. (FTP) File Transfer Protocol (TCP Ports 20 and 21)
  - remote
: Building Internet Firewalls, 2.3. Remote Terminal Access and Command
  - successful, from unexpected site
: Building Internet Firewalls, 12.2.3. The Good, the Bad, and the Ugly
  - UUCP, additional
: Practical UNIX & Internet Security, 15.3.1. Assigning Additional UUCP Logins 
 
- logins command
- 
  - Practical UNIX & Internet Security, 8.1.1. Accounts Without Passwords 
  - Practical UNIX & Internet Security, 8.2. Monitoring File Format
 
- LogLevel (L) option
- 
  - sendmail, 13.2.6. The Default Logging Level 
  - sendmail, 22.8.3.3. The LogLevel option 
  - sendmail, 26.1.1. syslog(3) 
  - sendmail, 34.8. Alphabetized Reference 
  - LogLevel variable for
: sendmail, 20.1.2. Global Variables 
 
- LOGNAME= command
- 
  - Practical UNIX & Internet Security, 15.5.1.3. A Sample Permissions file 
  - Practical UNIX & Internet Security, 15.5.2. Permissions Commands 
 
- .logout file
: Practical UNIX & Internet Security, 19.3.3. Using Secure RPC 
- logs/logging
- 
  - Building Internet Firewalls, 5.8.1.4. Safeguard the system logs
  - Building Internet Firewalls, 8.11. syslog
  - Building Internet Firewalls, 13.5.4. Keeping Activity Logs
  - Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
  - Practical UNIX & Internet Security, 10. Auditing and Logging
  - Practical UNIX & Internet Security, 10.8. Managing Log Files
  - Practical UNIX & Internet Security, 11.5.3.5. System initialization files 
  - Practical UNIX & Internet Security, 21.5. Special Considerations 
  - Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
  - sendmail, 13.2.6. The Default Logging Level 
  - sendmail, 18.8. Alphabetized Reference 
  - sendmail, 26.1. Logging with syslog 
  - sendmail, 36.7. Alphabetized Reference 
  - (see also syslog)
  - access_log
  
- 
    - Practical UNIX & Internet Security, 10.3.5. access_log Log File
    - Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
  
 
- across networks
: Practical UNIX & Internet Security, 10.5.2.2. Logging across the network
  - aculog
: Practical UNIX & Internet Security, 10.3.1. aculog File 
  - agent_log file
: Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
  - archiving information
: Practical UNIX & Internet Security, 7.4.2. Simple Archives
  - backups and
  
- 
    - Building Internet Firewalls, 5.10.2. Do Secure Backups
    - Practical UNIX & Internet Security, 10.2.2. Accounting with BSD
  
 
- breakins
: Practical UNIX & Internet Security, 24.1.2. Rule #2: DOCUMENT
  - C2 audit
: Practical UNIX & Internet Security, 10.1. The Basic Log Files
  - checklist for
: Practical UNIX & Internet Security, A.1.1.9. Chapter 10: Auditing and Logging
  - creating with SOCKS
: Building Internet Firewalls, 7.6. Using SOCKS for
  - critical messages
  
- 
    - Practical UNIX & Internet Security, 10.5.3. syslog Messages
    - Practical UNIX & Internet Security, 10.5.3.1. Beware false log entries
  
 
- documenting incidents
: Building Internet Firewalls, 13.1.7. Document the Incident
  - downloaded files
  
- 
    - Practical UNIX & Internet Security, 10.3.3. xferlog Log File
    - Practical UNIX & Internet Security, 10.3.5. access_log Log File
  
 
- of dropped packets
: Building Internet Firewalls, 6.9. Where to Do Packet Filtering
  - failed su attempts
: Practical UNIX & Internet Security, 4.3.7. The Bad su Log 
  - file format
: Practical UNIX & Internet Security, 8.2. Monitoring File Format
  - files transferred by FTP
: Practical UNIX & Internet Security, 10.3.3. xferlog Log File
  - to hardcopy device
: Practical UNIX & Internet Security, 10.5.2.1. Logging to a printer
  - individual users
  
- 
    - Practical UNIX & Internet Security, 10.4. Per-User Trails in the Filesystem
    - Practical UNIX & Internet Security, 10.4.3. Network Setup
  
 
- lastlog
: Practical UNIX & Internet Security, 10.1.1. lastlog File 
  - managing
: Practical UNIX & Internet Security, 10.8. Managing Log Files
  - manually logging
  
- 
    - Practical UNIX & Internet Security, 10.7. Handwritten Logs
    - Practical UNIX & Internet Security, 10.7.2.2. Informational material
  
 
- memory required for
  
- 
    - Building Internet Firewalls, 12.1.3. Managing Your Disk Space
    - Building Internet Firewalls, 12.2.2. What Should You Watch For?
  
 
- mistyped passwords
: Practical UNIX & Internet Security, 10.5.3. syslog Messages
  - network services
: Practical UNIX & Internet Security, 10.3.6. Logging Network Services
  - outgoing mail
: Practical UNIX & Internet Security, 10.4.2. Mail
  - per-machine
: Practical UNIX & Internet Security, 10.7.2. Per-Machine Logs
  - per-site
: Practical UNIX & Internet Security, 10.7.1. Per-Site Logs
  - potentially criminal activity
: Practical UNIX & Internet Security, 26.2.6. Other Tips 
  - proxy services and
: Building Internet Firewalls, 7.1.1.2. Proxy services are good at logging
  - refer_log file
: Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
  - of router actions
: Building Internet Firewalls, 6.4.1. Logging Actions
  - sulog
: (see sulog file)
  - Swatch program
  
- 
    - Practical UNIX & Internet Security, 10.6. Swatch: A Log File Tool 
    - Practical UNIX & Internet Security, 10.6.2. The Swatch Configuration File
    - Practical UNIX & Internet Security, E.4.9. Swatch
  
 
- syslog facility
  
- 
    - Practical UNIX & Internet Security, 10.5. The UNIX System Log (syslog) Facility
    - Practical UNIX & Internet Security, 10.5.3.1. Beware false log entries
    - sendmail, 26.1.1. syslog(3) 
  
 
- system clock and
: Practical UNIX & Internet Security, 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
  - tracking intruders with
: Practical UNIX & Internet Security, 24.3. The Log Files: Discovering an Intruder's
  - trimlog program for
: Building Internet Firewalls, B.6.5. trimlog
  - unexpectedly deleted or modified
: Building Internet Firewalls, 12.2.3. The Good, the Bad, and the Ugly
  - /usr/adm/messages
: Practical UNIX & Internet Security, 10.2.3. messages Log File
  - utmp and wtmp
  
- 
    - Practical UNIX & Internet Security, 10.1.2. utmp and wtmp Files 
    - Practical UNIX & Internet Security, 10.1.3.1. Pruning the wtmp file 
  
 
- UUCP
: Practical UNIX & Internet Security, 10.3.4. uucp Log Files
  - /var/adm/acct
: Practical UNIX & Internet Security, 10.2. The acct/pacct Process Accounting File 
  - /var/adm/loginlog
: Practical UNIX & Internet Security, 10.1.4. loginlog File
  - of web servers
: Practical UNIX & Internet Security, 18.4.2. Eavesdropping Through Log Files
  - what to watch for
: Building Internet Firewalls, 12.2.2. What Should You Watch For?
  - what not to log
: Practical UNIX & Internet Security, 10.5.3. syslog Messages
  - -X switch for
: sendmail, 26.4. Log Transactions with -X 
  - xferlog
: Practical UNIX & Internet Security, 10.3.3. xferlog Log File
 
- long distance service
- 
  - Practical UNIX & Internet Security, 14.5.4. Physical Protection of Modems
  - Practical UNIX & Internet Security, 17.3.3. TELNET (TCP Port 23)
 
- looking up database keys
: sendmail, 20.3. Alphabetized V8.8 Subroutines 
- lookups, DNS
- 
  - Building Internet Firewalls, 8.10.1. Packet Filtering Characteristics of
  - Building Internet Firewalls, 8.10.4.2. Mismatched data between the hostname
 
- loopback
- 
  - address
  
- 
    - Building Internet Firewalls, C.9. The IP Address
    - TCP/IP Network Administration, 2.2.2.1. Final notes on IP addresses
    - TCP/IP Network Administration, 3.2. The Host Table
    - TCP/IP Network Administration, 8.3.4. The named.local File 
  
 
- devices
: TCP/IP Network Administration, 5.3.1.2. Pseudo-device 
  - domain
: TCP/IP Network Administration, 8.3.1.1. Configuring a caching-only nameserver 
  - files
: TCP/IP Network Administration, 8.1.1. BIND Configurations 
  - interface
  
- 
    - TCP/IP Network Administration, 4.7. netconfig 
    - TCP/IP Network Administration, 6.1.1. Determining the Interface Name 
    - TCP/IP Network Administration, 6.1.5.6. Putting ifconfig in the startup files 
  
 
- route
  
- 
    - TCP/IP Network Administration, 2.5. The Routing Table
    - TCP/IP Network Administration, 7.2. The Minimal Routing Table 
    - TCP/IP Network Administration, 12.7.2. Routing control 
  
 
 
- loops
- 
  - forwarding
: sendmail, 25.7.2. Forwarding Loops 
  - in HELO command
: sendmail, 30.8. Alphabetized F= Flags
  - in rule sets
: sendmail, 28.6.2. Rewrite Once Prefix: $: 
 
- losses, cost of preventing
- 
  - Practical UNIX & Internet Security, 2.3. Cost-Benefit Analysis
  - Practical UNIX & Internet Security, 2.3.4. Convincing Management
 
- LOTUS_NOTES_HACK macro
: sendmail, 18.8. Alphabetized Reference 
- lowest-cost path
: TCP/IP Network Administration, 7.4.3. Open Shortest Path First 
- lp (user)
: Practical UNIX & Internet Security, 4.1. Users and Groups 
- lp directory
: TCP/IP Network Administration, 9.2.2. Solaris Line Printer Service 
- lp printing system
: Building Internet Firewalls, 2.14. Printing Systems
- 
  - configuring
: Building Internet Firewalls, 8.17. Printing Protocols (lpr and lp)
 
- lpd (Line Printer Daemon)
- 
  - Practical UNIX & Internet Security, 17.3.18.6. /etc/hosts.lpd file
  - TCP/IP Network Administration, 9.2. Line Printer Daemon 
  - commands, listed
: TCP/IP Network Administration, 9.2.1.2. Using LPD 
 
- lpr printing system
- 
  - Building Internet Firewalls, 2.14. Printing Systems
  - TCP/IP Network Administration, 3.7.2. Print Services
  - TCP/IP Network Administration, 9.2.1.2. Using LPD 
  - configuring
: Building Internet Firewalls, 8.17. Printing Protocols (lpr and lp)
 
- lpr server, IP address of
: TCP/IP Network Administration, 9.4. A BOOTP Server 
- lpsystem command
: TCP/IP Network Administration, 9.2.2. Solaris Line Printer Service 
- lrand48 function
: Practical UNIX & Internet Security, 23.7.3. drand48  (  ), lrand48  (  ), and mrand48  (  )
- ls command
- 
  - Practical UNIX & Internet Security, 5.1.4. Using the ls Command 
  - Practical UNIX & Internet Security, 5.1.5. File Times
  - Practical UNIX & Internet Security, 9.2.2. Checklists and Metadata
  - TCP/IP Network Administration, 8.4. Using nslookup 
  - TCP/IP Network Administration, 11.6. Checking Name Service 
  - -c option
  
- 
    - Practical UNIX & Internet Security, 5.1.5. File Times
    - Practical UNIX & Internet Security, 24.4.1.6. Changes to startup files 
  
 
- -d option
: Practical UNIX & Internet Security, 9.2.2.1. Simple listing
  - -e option
: Practical UNIX & Internet Security, 5.2.5.1. AIX Access Control Lists
  - -F option
: Practical UNIX & Internet Security, 5.1.4. Using the ls Command 
  - -g option
: Practical UNIX & Internet Security, 5.1.4. Using the ls Command 
  - -H option
  
- 
    - Practical UNIX & Internet Security, 5.9.2. Context-Dependent Files
    - Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories 
  
 
- -i option
: Practical UNIX & Internet Security, 9.2.2.1. Simple listing
  - -l option
  
- 
    - Practical UNIX & Internet Security, 5.1.4. Using the ls Command 
    - Practical UNIX & Internet Security, 5.2.5.1. AIX Access Control Lists
    - Practical UNIX & Internet Security, 5.5.1. SUID, SGID, and Sticky Bits 
    - Practical UNIX & Internet Security, 24.4.1.6. Changes to startup files 
  
 
- -q option
: Practical UNIX & Internet Security, 5.4. Using Directory Permissions 
  - -u option
: Practical UNIX & Internet Security, 5.1.5. File Times
 
- lsacl command
: Practical UNIX & Internet Security, 5.2.5.2. HP-UX access control lists
- lsof program
: Practical UNIX & Internet Security, 25.2.2.7. Hidden space
- lstat function
: Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- Lucifer algorithm
- 
  - Practical UNIX & Internet Security, 6.4.4. DES
  - Practical UNIX & Internet Security, 6.4.4.3. DES strength 
 
- LUCIFER cipher
: Practical UNIX & Internet Security, 6.4.4. DES
- LUSER-RELAY macro (m4)
- 
  - sendmail, 19.6. Alphabetized m4 Macros 
  - sendmail, 31.10. Alphabetized Reference 
 
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
 O'Reilly & Associates, Inc.
All Rights Reserved.
[ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | Practical Security ]