Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: K

k class : sendmail, 32.5. Alphabetized Reference
K commands
TCP/IP Network Administration, 10.8.2. Using Key Files in sendmail
TCP/IP Network Administration, E.4.4. The sendmail K Command
K configuration command
sendmail, 5.3.11. Keyed Databases
sendmail, 20.3. Alphabetized V8.8 Subroutines
sendmail, 33.3. The K Configuration Command
-d switch for : sendmail, D.3. K Command's -d switch
-k database switch : sendmail, 33.3.4.4. -k specify column for key (V8.7 and above)
k flag : sendmail, 30.8. Alphabetized F= Flags
K line (qf file) : sendmail, 23.9. The qf File Internals
$k macro
sendmail, 18.8. Alphabetized Reference
sendmail, 31.10. Alphabetized Reference
sendmail, D.1. Sun Enhancements
overriding : sendmail, 31.10. Alphabetized Reference
k option : (see ConnectionCacheSize (k) option)
K option : (see ConnectionCacheTimeout (K) option)
KarlBridge package : Building Internet Firewalls, B.3.3. KarlBridge
Karn, Phil : Practical UNIX & Internet Security, 6.6.2. des: The Data Encryption Standard
keepalives
TCP/IP Network Administration, 5.2. Linux Kernel Configuration
TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
TCP/IP Network Administration, B.8.5. The bgp Statement
Kerberos authentication system
Building Internet Firewalls, 2.12. Network File Systems
Building Internet Firewalls, 10.4.1. Kerberos
Building Internet Firewalls, B.1.2. Kerberos
Practical UNIX & Internet Security, 8.7.3. Code Books
Practical UNIX & Internet Security, 19.6. Kerberos
Practical UNIX & Internet Security, 19.6.5. Kerberos Limitations
Practical UNIX & Internet Security, E.4.5. Kerberos
installing : Practical UNIX & Internet Security, 19.6.3. Installing Kerberos
RPC system and : Practical UNIX & Internet Security, 19.2.2.4. AUTH_KERB
supporting versions of POP : Building Internet Firewalls, 8.1.2. Post Office Protocol
Versions 4 and 5 : Practical UNIX & Internet Security, 19.6.1.4. Kerberos 4 vs. Kerberos 5
versus Secure RPC : Practical UNIX & Internet Security, 19.6.2. Kerberos vs. Secure RPC
kermit program
Practical UNIX & Internet Security, 14.5. Modems and UNIX
Practical UNIX & Internet Security, 14.5.3.3. Privilege testing
kernel
Practical UNIX & Internet Security, 1.2. What Is an Operating System?
Practical UNIX & Internet Security, 5.5.3. SUID Shell Scripts
TCP/IP Network Administration, 5.1. Kernel Configuration
reconfiguring : Building Internet Firewalls, 5.8.4.1. Reconfigure and rebuild the kernel
statement (in gated) : TCP/IP Network Administration, B.8.10.1. The routerdiscovery client statement
key
distribution, encryption : Building Internet Firewalls, 10.5.4. Key Distribution
escrow : Practical UNIX & Internet Security, 6.1.3. Modern Controversy
fingerprints : Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
search
Practical UNIX & Internet Security, 6.2.3. Cryptographic Strength
Practical UNIX & Internet Security, 8.6.1. The crypt()
switches : Practical UNIX & Internet Security, 12.3.6. Key Switches
keyboard interrupts : TCP/IP Network Administration, 9.1.3.2. The vfstab and fstab files
keyed databases : (see databases)
keylogin program
Practical UNIX & Internet Security, 19.3.3. Using Secure RPC
Practical UNIX & Internet Security, 19.5.4. Using NIS+
keylogout program : Practical UNIX & Internet Security, 19.3.3. Using Secure RPC
keys, duplicate database : sendmail, 33.2.1.1. -d allow duplicate keys
keyserv process
Practical UNIX & Internet Security, 19.3.1.1. Proving your identity
Practical UNIX & Internet Security, 19.3.2.3. Making sure Secure RPC programs are running on every
Practical UNIX & Internet Security, 19.5.4. Using NIS+
keystore file : Practical UNIX & Internet Security, 19.3.1.1. Proving your identity
keystrokes
monitoring
Practical UNIX & Internet Security, 17.3.21.2. X security
Practical UNIX & Internet Security, 24.2.3. Monitoring the Intruder
(see also sniffing)
time between
Building Internet Firewalls, 10.2.1. Something You Are
Practical UNIX & Internet Security, 23.8. Picking a Random Seed
keyword search : Building Internet Firewalls, 2.6. Other Information Services
"Keywords:" header line : sendmail, 35.10. Alphabetized Reference
kill command
Practical UNIX & Internet Security, 17.3.4.2. Using sendmail to receive email
Practical UNIX & Internet Security, 24.2.5. Getting Rid of the Intruder
Practical UNIX & Internet Security, C.4. The kill Command
to stop process overload
Practical UNIX & Internet Security, 25.2.1.1. Too many processes
Practical UNIX & Internet Security, 25.2.1.2. System overload attacks
killing sendmail daemon
sendmail, 4.1.1.1. Kill and restart, beginning with V8.7
sendmail, 15.5. Prevent the Daemon from Running
kinit program : Practical UNIX & Internet Security, 19.6.4. Using Kerberos
kmem device
Practical UNIX & Internet Security, 5.6. Device Files
Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
known text attacks : Practical UNIX & Internet Security, 6.2.3. Cryptographic Strength
Koblas, David : Practical UNIX & Internet Security, 22.4. SOCKS
Koblas, Michelle : Practical UNIX & Internet Security, 22.4. SOCKS
KPOP (Kerberos-supporting Post Office Protocol) : Building Internet Firewalls, 8.1.2. Post Office Protocol
ksh (Korn shell)
Practical UNIX & Internet Security, 11.5.1. Shell Features
Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
Practical UNIX & Internet Security, C.5.3. Running the User's Shell
(see also shells)
history file : Practical UNIX & Internet Security, 10.4.1. Shell History
restricted shell : Practical UNIX & Internet Security, 8.1.4.3. Restricted Korn shell
TMOUT variable : Practical UNIX & Internet Security, 12.3.5.1. Built-in shell autologout
umask and : Practical UNIX & Internet Security, 5.3.1. The umask Command
ksh93 shell
Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
Practical UNIX & Internet Security, 24.4.1.7. Hidden files and directories
.kshrc file : Practical UNIX & Internet Security, 11.5.2.2. .cshrc, .kshrc


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.