 
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: M
- m class
- 
  - sendmail, 19.6. Alphabetized m4 Macros 
  - sendmail, 32.5. Alphabetized Reference 
 
- M configuration command
- 
  - sendmail, 5.3.1. Mail Delivery Agents 
  - sendmail, 6.2. Define a Mail Delivery Agent 
  - sendmail, 6.3. The local Delivery Agent 
  - sendmail, 30.1. Configuration File Syntax
 
- -m database switch
: sendmail, 33.3.4.5. -m  suppress replacement on match (V8.1 and above) 
- m flag
: sendmail, 30.8. Alphabetized F= Flags
- M flag
- 
  - sendmail, 14.2.3. The Message-ID: Header 
  - sendmail, 30.8. Alphabetized F= Flags
 
- M line (qf file)
- 
  - sendmail, 23.4.1. Printing the Queue in Verbose Mode 
  - sendmail, 23.9. The qf File Internals 
 
- M lines in sendmail.cf
: sendmail, 3.1. Role in the Filesystem 
- $m macro
- 
  - sendmail, 7.3.1. The hostname 
  - sendmail, 12.1.7. Adding the Domain 
  - sendmail, 31.10. Alphabetized Reference 
 
- $M macro
: sendmail, 31.10. Alphabetized Reference 
- m option
: (see MeToo (m) option)
- M option
- 
  - sendmail, 31.2. Command-Line Definitions 
  - sendmail, 34.1.3. Appropriateness of Options 
  - sendmail, 34.8. Alphabetized Reference 
 
- M rule-testing command
: sendmail, 38.4.2. Show Delivery Agents with =M 
- -m switch (sendmail)
- 
  - sendmail, 18.3.2. The makesendmail Script 
  - sendmail, 36.7. Alphabetized Reference 
 
- -M switch (sendmail)
- 
  - sendmail, 31.2. Command-Line Definitions 
  - sendmail, 36.7. Alphabetized Reference 
 
- m4 macros
- 
  - TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros 
  - TCP/IP Network Administration, E.3. m4 sendmail Macros
 
- m4 preprocessor
- 
  - sendmail, 16.3. Run m4 
  - sendmail, 19. V8 m4 Configuration 
  - class macros and
: sendmail, 32.3. Class with m4 
  - comments in files
: sendmail, 19.5. Pitfalls 
  - configuration version
: sendmail, 31.10. Alphabetized Reference 
  - database maps and
: sendmail, 33.6. Database Maps and m4 
  - delivery agent configuration
: sendmail, 30.3. m4 Configuration Syntax
  - diversions
: sendmail, 19.1.4. m4 diversions 
  - macros and
: sendmail, 31.8. Macros with the m4 Technique 
  - rule sets and
: sendmail, 29.2. Rule Sets and m4 
  - sendmail options and
: sendmail, 34.3. Configuring with V8 m4 Options 
 
- M= equate
: sendmail, 30.4. The Equates
- MAC (Mandatory Access Controls)
: Practical UNIX & Internet Security, 4.1.3. Groups and Group Identifiers (GIDs) 
- MACH operating system
: Practical UNIX & Internet Security, 1.3. History of UNIX 
- machine
- 
  - auditing
: (see auditing)
  - backing up
: Building Internet Firewalls, 13.5.1. Backing Up Your Filesystems
  - choosing
: Building Internet Firewalls, 5.3. Choosing a Machine
  - configuring
: Building Internet Firewalls, 5.8.4. Reconfiguring for Production
  - connecting
: Building Internet Firewalls, 5.8.6. Connecting the Machine
  - disconnecting or shutting down
: Building Internet Firewalls, 13.4.3. Planning for Disconnecting or
  - hardware
: (see hardware)
  - hijacking
: Building Internet Firewalls, 10.1.1. Hijacking
  - name
: Practical UNIX & Internet Security, 16.2.3. Hostnames
  - physical location of
: Building Internet Firewalls, 5.4. Choosing a Physical Location
  - securing
: Building Internet Firewalls, 5.8.1. Securing the Machine
  - software
: (see software)
  - speed of
: Building Internet Firewalls, 5.3.2. How Fast a Machine?
 
- MACHINE= command
- 
  - Practical UNIX & Internet Security, 15.5.1.2. Name-value pairs 
  - Practical UNIX & Internet Security, 15.5.2. Permissions Commands 
 
- macid()
: sendmail, 20.3. Alphabetized V8.8 Subroutines 
- Macintosh
- 
  - Practical UNIX & Internet Security, 18.2. Running a Secure Server
  - sendmail, 3.3.3. Other Protocols 
 
- macro conditionals
- 
  - sendmail, 14.1.3. Testing So Far 
  - sendmail, 31.6. Macro Conditionals: $?, $|, and $. 
  - TCP/IP Network Administration, 10.5.2.1. Conditionals 
 
- macro virus
: (see viruses)
- macros
- 
  - sendmail, 5.3.2. Macros 
  - sendmail, 7. Macros 
  - sendmail, 31.9. Pitfalls 
  - class macros
  
- 
    - sendmail, 5.3.5. Class Macros 
    - sendmail, 12. Class 
    - sendmail, 32. Class Macros 
  
 
- classes and
: sendmail, 12.1.1.1. A caveat 
  - database macros
: sendmail, 33. Database Macros 
  - declaring
  
- 
    - sendmail, 7.2. Defining Macros 
    - sendmail, 31.2. Command-Line Definitions 
  
 
- defining
  
- 
    - sendmail, 19.4.2. Define Macros 
    - sendmail, 20.3. Alphabetized V8.8 Subroutines 
    - sendmail, 36.7. Alphabetized Reference 
    - sendmail, 38.2.1. Define a Macro with .D 
    - with M option
: sendmail, 34.8. Alphabetized Reference 
  
 
- dumping
: sendmail, 38.3. Dump a Macro 
  - expanding
: TCP/IP Network Administration, 10.6.2. Transforming the Address 
  - fetching value of
: sendmail, 20.3. Alphabetized V8.8 Subroutines 
  - file class macros
: sendmail, 5.3.6. File Class Macros 
  - for compiling sendmail
: sendmail, 18.8. Alphabetized Reference 
  - in header fields
: sendmail, 35.3.1. Macros in the Header Field 
  - initializing
: sendmail, 36.4.2.2. Initialize macros 
  - m4 preprocessor
: sendmail, 19. V8 m4 Configuration 
  - naming
  
- 
    - sendmail, 5.3.2. Macros 
    - sendmail, 7.2. Defining Macros 
    - sendmail, 31.4. Macro Names 
    - converting names to integers
: sendmail, 20.3. Alphabetized V8.8 Subroutines 
  
 
- predefined
  
- 
    - sendmail, 7.3. Predefined Macros 
    - sendmail, 31.1. Preassigned Macros 
  
 
- required
: sendmail, 31.3.1. Required Macros (V8.6 and earlier) 
  - restoring macro values
: sendmail, 23.9. The qf File Internals 
  - in rule set names
: sendmail, 29.1.4. Macros in Rule-Set Names 
  - in rules
: sendmail, 28.1.1. Macros in Rules 
  - for time and date
: sendmail, 31.7.2. Macros and the Date 
 
- macvalue()
: sendmail, 20.3. Alphabetized V8.8 Subroutines 
- MAEs (Metropolitan Area Exchanges)
: TCP/IP Network Administration, 1.1. TCP/IP and the Internet
- magic cookies
: Practical UNIX & Internet Security, 17.3.21.4. Using Xauthority magic cookies
- magic number
- 
  - Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail 
  - TCP/IP Network Administration, A.2. The PPP Daemon
 
- mail
- 
  - (see email)
  - (see sendmail)
 
- MAIL command (SMTP)
- 
  - sendmail, 29.10.1. The check_mail Rule Set 
  - sendmail, 34.8. Alphabetized Reference 
 
- Mail Exchanger records
: (see MX records)
- "Mail-From:" header line
: sendmail, 35.10. Alphabetized Reference 
- mail hubs
: (see hubs)
- /mail/imap.tar.Z file
: TCP/IP Network Administration, 9.7.2. IMAP Server 
- mail program
- 
  - Practical UNIX & Internet Security, 15.1.3. mail Command 
  - sendmail, 3.2.1. Delivery to a Mailbox 
 
- mail11 program
: sendmail, 3.3.3. Other Protocols 
- Mail_Aliases table (NIS+)
: Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
- MAIL_HUB macro (m4)
- 
  - sendmail, 19.6. Alphabetized m4 Macros 
  - sendmail, 31.10. Alphabetized Reference 
 
- mailbox file
: sendmail, 3.2.1. Delivery to a Mailbox 
- mailbox servers
: TCP/IP Network Administration, 9.7. Mail Servers 
- 
  - synchronizing
: TCP/IP Network Administration, 9.7.2. IMAP Server 
 
- mailer
- 
  - definition fields
: TCP/IP Network Administration, 10.5.8. Defining Mailers 
  
- 
    - common
: TCP/IP Network Administration, 10.5.8.1. Some common mailer definitions 
  
 
- local
: TCP/IP Network Administration, 10.5.8. Defining Mailers 
 
- MAILER command (UUCP)
: sendmail, 31.10. Alphabetized Reference 
- MAILER() (m4)
- 
  - sendmail, 19.3.2. MAILER() 
  - sendmail, 30.3. m4 Configuration Syntax
 
- MAILER-DAEMON alias
- 
  - sendmail, 3.1.1. The Aliases File 
  - sendmail, 24.4.2. The MAILER-DAEMON Alias 
  - sendmail, 31.10. Alphabetized Reference 
  - (see also $n macro)
 
- MAILER source file (in sendmail)
- 
  - TCP/IP Network Administration, E.3. m4 sendmail Macros
  - TCP/IP Network Administration, E.3.5. MAILER
  - values available, listed
: TCP/IP Network Administration, E.3.5. MAILER
 
- mailer= equate (syslog output)
: sendmail, 26.1.3.4. mailer= the delivery agent used 
- MAILER_DEFINITIONS macro (m4)
: sendmail, 19.6. Alphabetized m4 Macros 
- mailertable database
- 
  - sendmail, 19.6. Alphabetized m4 Macros 
  - TCP/IP Network Administration, 10.7.1. Modifying Local Information 
 
- mailing lists
- 
  - Practical UNIX & Internet Security, E.1. Mailing Lists
  - Practical UNIX & Internet Security, E.1.3.10. WWW-security
  - sendmail, 1.3.3. Aliases and Mailing Lists 
  - sendmail, 17.1.2.1. A rule to handle List:; 
  - sendmail, 20.2.2. Workstation Refuses to Act as a Mail Gateway 
  - sendmail, 34.8. Alphabetized Reference 
  - (see also email)
  - exploder lists
: sendmail, 25.4. Exploder Mailing Lists 
  - EXPN command (SMTP)
: sendmail, 22.3.2. SMTP vrfy and expn 
  - for distributing security information
: TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information 
  - for exchanging information and ideas
: TCP/IP Network Administration, 13.5. Mailing Lists 
  - :include: directive
  
- 
    - sendmail, 22.5.2. Permissions for :include: 
    - sendmail, 23.9. The qf File Internals 
    - sendmail, 25.2. :include: Mailing Lists 
  
 
- including oneself on
: sendmail, 34.8. Alphabetized Reference 
  - internal
: sendmail, 25.1. Internal Mailing Lists 
  - joining
: TCP/IP Network Administration, 13.5. Mailing Lists 
  - keeping current
: Building Internet Firewalls, 12.3.1.1. Mailing lists
  - list precedence
: sendmail, 14.4. Precedence 
  - owner
: sendmail, 25.3. Defining a Mailing List Owner 
  - packages for
: sendmail, 25.6. Packages That Help 
  - resources via
: Building Internet Firewalls, A.3. Mailing Lists
  - sendmail and
: TCP/IP Network Administration, 10.1. sendmail's Function 
  - troubleshooting
: sendmail, 25.5. Problems with Mailing Lists 
 
- mailq command
- 
  - sendmail, 4.1.2. Show Queue Mode (-bp) 
  - sendmail, 36.1.2. mailq 
 
- mailstats program
: sendmail, 26.2.2. Viewing Statistics: mailstats 
- maintaining firewalls
: Building Internet Firewalls, 12. Maintaining Firewalls
- maintenance mode
: Practical UNIX & Internet Security, C.5.1. Process #1: /etc/init 
- maintenance personnel
: Practical UNIX & Internet Security, 13.3. Outsiders
- maintenance toolkits, ready-made
: TCP/IP Network Administration, 11.2. Diagnostic Tools 
- Majordomo package
- 
  - sendmail, 25.6.1. Majordomo 
  - TCP/IP Network Administration, 13.5. Mailing Lists 
 
- make command
- 
  - sendmail, 2.5. Build 
  - TCP/IP Network Administration, 5.2. Linux Kernel Configuration 
  - make config command
: TCP/IP Network Administration, 5.2. Linux Kernel Configuration 
  - make install.man
: TCP/IP Network Administration, 9.4. A BOOTP Server 
  - make zImage command
: TCP/IP Network Administration, 5.2. Linux Kernel Configuration 
  - in NIS
: TCP/IP Network Administration, 9.3. Network Information Service 
 
- makedbm program
: Practical UNIX & Internet Security, 19.4.4.1. Setting up netgroups 
- Makefile file
- 
  - sendmail, 2.4. Preliminaries 
  - sendmail, 18.4. Tuning Makefile 
  - db library package
: sendmail, C.2. Get the Source 
 
- makemap command
- 
  - sendmail, 33.2. Create Files with makemap 
  - TCP/IP Network Administration, 10.4.1.1. Building a sendmail.cf with m4 macros 
  - TCP/IP Network Administration, E.1. Compiling sendmail
  - TCP/IP Network Administration, E.4.4. The sendmail K Command
 
- makesendmail script
- 
  - sendmail, 2.4. Preliminaries 
  - sendmail, 18.3.2. The makesendmail Script 
  - sendmail, 18.6. Install sendmail 
 
- malware
: Practical UNIX & Internet Security, 11.1. Programmed Threats: Definitions 
- man pages
: Practical UNIX & Internet Security, 2.5. The Problem with Security  Through Obscurity 
- man-in-the-middle forgery
: Building Internet Firewalls, 6.6.1. Risks of Filtering by Source
- Management Information Base (MIB)
: TCP/IP Network Administration, 11.9. Simple Network Management Protocol 
- management tools
: Building Internet Firewalls, 2.10. Network Management Services
- management, role of
- 
  - Practical UNIX & Internet Security, 2.3.4. Convincing Management
  - Practical UNIX & Internet Security, 2.5. The Problem with Security  Through Obscurity 
 
- managing accounts
: Building Internet Firewalls, 12.1.2. Managing Your Accounts
- MANs (Metropolitan Networks)
: Practical UNIX & Internet Security, 16.1. Networking 
- manual logging
- 
  - Practical UNIX & Internet Security, 10.7. Handwritten Logs
  - Practical UNIX & Internet Security, 10.7.2.2. Informational material
 
- manual pages
: Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- manual sendmail use
: sendmail, 1.4. Run sendmail by Hand 
- map
- 
  - TCP/IP Network Administration, 1.7. Application Layer
  - (see also automounter daemon)
  - (see also /etc/hosts file)
  - (see also /etc/networks file)
  - (see also IMAP)
  - (see also Network Information Service)
  - (see also portmapper)
  - building
: TCP/IP Network Administration, 7.4.3. Open Shortest Path First 
  - name assigned a database
: TCP/IP Network Administration, 10.6.2.1. Transforming with a database 
  - NIS
: (see NIS)
 
- /map rule-testing command
: sendmail, 38.5.3. Look up a Database Item with /map 
- map_lookup()
: sendmail, 20.3. Alphabetized V8.8 Subroutines 
- martians
- 
  - TCP/IP Network Administration, 4.2.1. Obtaining an IP Address 
  - TCP/IP Network Administration, B.7. Definition Statements
 
- mask information
: (see information)
- masking
- 
  - TCP/IP Network Administration, 2.2.2. Classless IP Addresses
  - TCP/IP Network Administration, 2.3. Subnets
 
- MASQUERADE_AS macro (m4)
- 
  - sendmail, 19.6. Alphabetized m4 Macros 
  - sendmail, 31.10. Alphabetized Reference 
 
- MASQUERADE_DOMAIN macro (m4)
: sendmail, 19.6. Alphabetized m4 Macros 
- MASQUERADE_DOMAIN_FILE macro (m4)
: sendmail, 19.6. Alphabetized m4 Macros 
- masquerade_entire_domain feature
: sendmail, 19.6. Alphabetized m4 Macros 
- masquerade_envelope feature
: sendmail, 19.6. Alphabetized m4 Macros 
- masquerading
- 
  - sendmail, 19.4.4. Masquerading 
  - sendmail, 19.6. Alphabetized m4 Macros 
  - TCP/IP Network Administration, E.3.2. FEATURE
  - TCP/IP Network Administration, E.3.4. DOMAIN
 
- Massey, James L.
: Practical UNIX & Internet Security, 6.4.1. Summary of Private Key Systems 
- Master mode (uucico)
: Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work 
- master server
- 
  - Practical UNIX & Internet Security, 19.4. Sun's Network Information Service (NIS)
  - (see also NIS)
 
- MatchGecos (G) option
- 
  - sendmail, 20.1.2. Global Variables 
  - sendmail, 34.8. Alphabetized Reference 
 
- MATCHGECOS macro
: sendmail, 18.8. Alphabetized Reference 
- matching
: (see wildcard operators)
- MAX... macros
: sendmail, 18.8. Alphabetized Reference 
- MaxDaemonChildren option
- 
  - sendmail, 34.1.3. Appropriateness of Options 
  - sendmail, 34.8. Alphabetized Reference 
 
- MaxHopCount (h) option
: sendmail, 34.8. Alphabetized Reference 
- maximum line length
- 
  - sendmail, 30.4. The Equates
  - sendmail, 30.8. Alphabetized F= Flags
 
- maximum receive unit (MRU)
: TCP/IP Network Administration, A.2. The PPP Daemon
- maximum transmission unit (MTU)
- 
  - Building Internet Firewalls, C.5.1.3. Fragmenting datagrams
  - TCP/IP Network Administration, 1.5.1.3. Fragmenting datagrams
  - TCP/IP Network Administration, 6.1.1. Determining the Interface Name 
  - TCP/IP Network Administration, 6.1.2. Checking the Interface with ifconfig 
  - TCP/IP Network Administration, 6.1.5.4. Maximum transmission unit 
  - TCP/IP Network Administration, A.1. Dial-Up IP
  - determining smallest
: TCP/IP Network Administration, 5.2. Linux Kernel Configuration 
 
- MAXLINE variable
: sendmail, 18.8. Alphabetized Reference 
- MaxMessageSize
: sendmail, 34.8. Alphabetized Reference 
- maxpacketsize
: TCP/IP Network Administration, B.8.6. The egp Statement
- MaxQueueRunSize option
- 
  - sendmail, 23.4. Printing the Queue 
  - sendmail, 34.8. Alphabetized Reference 
 
- MAXRWSETS variable
: sendmail, 29.1.2. Rule-Set Names 
- MBONE (Multicast Backbone)
- 
  - Building Internet Firewalls, 2.8. Real-Time Conferencing
  - TCP/IP Network Administration, 5.2. Linux Kernel Configuration 
  - TCP/IP Network Administration, 5.3.1.1. Options 
  - configuring
: Building Internet Firewalls, 8.9.3. The Multicast Backbone (MBONE)
 
- mc files
- 
  - sendmail, 19.3. The Minimal mc File 
  - sendmail, 19.6. Alphabetized m4 Macros 
 
- MCERT
: Practical UNIX & Internet Security, F.3.4.21. Motorola, Inc.
- MCI Corporation
: Practical UNIX & Internet Security, F.3.4.19. MCI Corporation
- MD2 algorithm
: Practical UNIX & Internet Security, 6.5.4.1. MD2, MD4, and MD5
- MD4 algorithm
- 
  - Building Internet Firewalls, 10.3.1. One-Time Passwords
  - Practical UNIX & Internet Security, 6.5.4.1. MD2, MD4, and MD5
 
- MD5 algorithm
- 
  - Practical UNIX & Internet Security, 6.5.2. Using Message Digests
  - Practical UNIX & Internet Security, 6.5.4.1. MD2, MD4, and MD5
  - Practical UNIX & Internet Security, 23.5.1. Use Message Digests for Storing Passwords
  - Practical UNIX & Internet Security, 23.9. A Good Random Seed
  - digital signatures versus
: Practical UNIX & Internet Security, 6.6.3.6. PGP detached signatures
  - in POP
: Practical UNIX & Internet Security, 17.3.10. Post Office Protocol (POP) (TCP Ports
 
- MDAs (mail delivery agents)
: (see MTAs)
- media
: Practical UNIX & Internet Security, 12.3.3. Other Media
- 
  - damaged by smoke
: Practical UNIX & Internet Security, 12.2.1.2. Smoke 
  - destroying
: Practical UNIX & Internet Security, 12.3.2.3. Sanitize your media before disposal 
  - failure of
: Practical UNIX & Internet Security, 7.1.4. Guarding Against Media Failure
  - hard/soft disk quotas
: Practical UNIX & Internet Security, 25.2.2.5. Using quotas 
  - print through process
: Practical UNIX & Internet Security, 12.3.2.1. Verify your backups 
  - rotating for backups
: Practical UNIX & Internet Security, 7.1.3. Types of Backups 
  - rotation of
: Practical UNIX & Internet Security, 7.2.1.2. Media rotation
  - sanitizing
: Practical UNIX & Internet Security, 12.3.2.3. Sanitize your media before disposal 
  - viruses from
: Practical UNIX & Internet Security, 11.1.5. Viruses 
 
- meet-in-the-middle attacks
: Practical UNIX & Internet Security, 6.4.5.1. Double DES
- MEMCHUNKSIZE macro
: sendmail, 18.8. Alphabetized Reference 
- memory
- 
  - Building Internet Firewalls, 1.1.2. Your Resources
  - Building Internet Firewalls, 5.3.3. What Hardware Configuration?
  - Practical UNIX & Internet Security, 25.2.2. Disk Attacks 
  - Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
  - sendmail, 34.8. Alphabetized Reference 
  - hidden space
: Practical UNIX & Internet Security, 25.2.2.7. Hidden space
  - for logs
  
- 
    - Building Internet Firewalls, 12.1.3. Managing Your Disk Space
    - Building Internet Firewalls, 12.2.2. What Should You Watch For?
  
 
- managing
: Building Internet Firewalls, 12.1.3. Managing Your Disk Space
  - reserved space
: Practical UNIX & Internet Security, 25.2.2.6. Reserved space 
  - swap space
: Practical UNIX & Internet Security, 25.2.3. Swap Space Problems 
  - /tmp directory and
: Practical UNIX & Internet Security, 25.2.4. /tmp Problems
  - tree-structure attacks
: Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
 
- memory-to-memory copies
: TCP/IP Network Administration, 6.1.5.2. ARP and trailers 
- merging interior and exterior routers
: Building Internet Firewalls, 4.3.2. It's OK to Merge the Interior Router and the Exterior Router
- Merkle, Ralph
: Practical UNIX & Internet Security, 6.4.5.1. Double DES
- Message Authentication Code (MAC)
: Practical UNIX & Internet Security, 6.5.5.2. Message authentication codes
- Message Digest 5 (MD5) cryptographic checksum
- 
  - TCP/IP Network Administration, 7.4.3. Open Shortest Path First 
  - TCP/IP Network Administration, 7.7.1.1. A host configuration 
  - TCP/IP Network Administration, B.8.2. The rip Statement
 
- message digests
- 
  - Practical UNIX & Internet Security, 6.5. Message Digests and Digital Signatures
  - Practical UNIX & Internet Security, 6.5.2. Using Message Digests
  - Practical UNIX & Internet Security, 9.2.3. Checksums and Signatures
  - Practical UNIX & Internet Security, 23.5.1. Use Message Digests for Storing Passwords
  - Tripwire package
  
- 
    - Practical UNIX & Internet Security, 9.2.4. Tripwire
    - Practical UNIX & Internet Security, 9.2.4.2. Running Tripwire
  
 
 
- "Message:" header line
: sendmail, 35.10. Alphabetized Reference 
- message queue
: (see queue)
- "Message-ID:" header line
- 
  - sendmail, 1.5. The Header 
  - sendmail, 13.4. Sending Mail 
  - sendmail, 14.2.3. The Message-ID: Header 
  - sendmail, 26.1.3.5. msgid= the Message-ID: identifier 
  - sendmail, 30.8. Alphabetized F= Flags
  - sendmail, 35.5.16. Replacing Headers with H_ACHECK 
  - sendmail, 35.10. Alphabetized Reference 
 
- message_volume.sh script
: sendmail, 26.1.4.1. message_volume.sh 
- messages file
: TCP/IP Network Administration, 12.4.2.2. Checking login activity 
- messages log file
: Practical UNIX & Internet Security, 10.2.3. messages Log File
- messages, error
: (see error messages)
- messages, email
- 
  - sendmail, 34.8. Alphabetized Reference 
  - TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
  - TCP/IP Network Administration, 1.5.2. Internet Control Message Protocol
  - assigning priority to
: TCP/IP Network Administration, 10.5.6. Defining Mail Precedence 
  - blank lines ending
: sendmail, 30.8. Alphabetized F= Flags
  - body of
  
- 
    - sendmail, 1.6. The Body 
    - sendmail, 23.2.2. The Data (Message Body) File: df 
    - (see also -B switch (sendmail))
  
 
- bouncing
  
- 
    - sendmail, 10.3. Missing Addresses 
    - sendmail, 13.2.2. Limit the Life of Queued Messages 
    - sendmail, 14.4. Precedence 
    - sendmail, 19.6. Alphabetized m4 Macros 
    - sendmail, 22.8.3.4. The PostmasterCopy option 
    - sendmail, 23.3.6. Savemail Panic 
    - sendmail, 23.7.1. Handling a Down Site 
    - sendmail, 24.4.1. The Postmaster Alias 
    - sendmail, 25.5.1. Reply Versus Bounce 
    - sendmail, 25.5.3. A list-bounced Alias 
    - sendmail, 34.8. Alphabetized Reference 
    - sendmail, 35.10. Alphabetized Reference 
    - sendmail, 36.7. Alphabetized Reference 
    - (see also $n macro)
  
 
- content type
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
  - converting between 7- and 8-bit
: sendmail, 18.8. Alphabetized Reference 
  - delivering
: (see delivery)
  - envelope
: (see envelope)
  - encapsulated
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
  - error
: (see errors)
  - flooding
: Practical UNIX & Internet Security, 25.3.2. Message Flooding 
  - forged
: sendmail, 22.7. Forged Mail 
  - forwarding
: sendmail, 35.7. Forwarding with Resent-Headers 
  - forwarding loops
: sendmail, 25.7.2. Forwarding Loops 
  - headers for
: (see headers, message)
  - holding
: (see queue)
  - hop count
: (see hop count)
  - hub's acceptance of
: sendmail, 15.4. Hub Accepts Mail for Client 
  - leading dots in
: sendmail, 34.8. Alphabetized Reference 
  - limiting size of
: sendmail, 20.2.3. Limit the Size of Guest Messages 
  - multipart subtype
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
  - multiple objects in single
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
  - origin date of
: (see $a macro)
  - priority of
  
- 
    - sendmail, 14.4. Precedence 
    - (see priority, message)
  
 
- processing limits on
: sendmail, 23.5. How the Queue Is Processed 
  - queue
  
- 
    - sendmail, 1.3.2. The Queue 
    - sendmail, 23. The Queue 
    - checkpointing
: sendmail, 34.8. Alphabetized Reference 
    - down sites and
: sendmail, 23.7.1. Handling a Down Site 
    - lifetime
    
- 
      - sendmail, 13.2.2. Limit the Life of Queued Messages 
      - sendmail, 34.8. Alphabetized Reference 
    
 
- message life
: sendmail, 13.2.2. Limit the Life of Queued Messages 
    - message parts
: sendmail, 23.2. Parts of a Queued Message 
    - printing
    
- 
      - sendmail, 4.1.2. Show Queue Mode (-bp) 
      - sendmail, 23.2.3.2. Locks shown when printing the queue 
      - sendmail, 23.4. Printing the Queue 
      - sendmail, 36.7. Alphabetized Reference 
    
 
- processing
    
- 
      - sendmail, 23.5. How the Queue Is Processed 
      - sendmail, 23.9. The qf File Internals 
      - sendmail, 36.7. Alphabetized Reference 
    
 
- putting everything in
: sendmail, 34.8. Alphabetized Reference 
    - requeuing on error
: sendmail, 25.7.6. Force Requeue on Error 
    - sendmail options for
: sendmail, 34.6.2. The Queue 
    - sorting
: sendmail, 34.8. Alphabetized Reference 
    - time message placed in
: sendmail, 23.9. The qf File Internals 
    - troubleshooting
: sendmail, 23.8. Pitfalls 
    - why message is stored in
: sendmail, 23.9. The qf File Internals 
  
 
- rejecting
  
- 
    - sendmail, 18.8. Alphabetized Reference 
    - sendmail, 20.2.6. Reject Mail from Spamming or Mail-bombing Sites 
  
 
- relays for
: sendmail, 19.4.5. Relays 
  - sending
  
- 
    - sendmail, 13.4. Sending Mail 
    - sendmail, 14.5. Sending Real Mail 
  
 
- size of
  
- 
    - sendmail, 26.1.3.10. size= the size of the message 
    - sendmail, 30.4. The Equates
    - sendmail, 34.8. Alphabetized Reference 
  
 
- stored in queue in error
: sendmail, 23.9. The qf File Internals 
  - time placed in queue
: sendmail, 23.9. The qf File Internals 
  - unique identifier for
  
- 
    - sendmail, 13.4. Sending Mail 
    - sendmail, 14.2.3. The Message-ID: Header 
    - sendmail, 26.1.3.5. msgid= the Message-ID: identifier 
  
 
 
- messages, SMTP greeting
- 
  - sendmail, 31.10. Alphabetized Reference 
  - sendmail, 34.8. Alphabetized Reference 
 
- messages, warning
: (see warning messages)
- meta characters
: Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- meta-packets, and filtering
: Building Internet Firewalls, 6.8.4. It Should Allow Rules Based on Any
- metadata
- 
  - Practical UNIX & Internet Security, 9.2.2. Checklists and Metadata
  - Practical UNIX & Internet Security, 9.2.2.2. Ancestor directories
 
- metasymbols
: TCP/IP Network Administration, 10.6.1. Pattern Matching 
- 
  - for transforming the address
: TCP/IP Network Administration, 10.6.2. Transforming the Address 
 
- MeToo (m) option
- 
  - sendmail, 34.8. Alphabetized Reference 
  - sendmail, 36.7. Alphabetized Reference 
 
- metrics
: TCP/IP Network Administration, 6.1.5.3. Metric 
- 
  - arbitrariness of
: TCP/IP Network Administration, 7.4.1.1. Running RIP with routed 
  - incompatibility of
: TCP/IP Network Administration, 7.6.1. gated's Preference Value 
 
- Metropolitan Area Exchanges (MAEs)
: TCP/IP Network Administration, 1.1. TCP/IP and the Internet
- Metropolitan Networks (MANs)
: Practical UNIX & Internet Security, 16.1. Networking 
- MH (mail handler)
: Practical UNIX & Internet Security, 11.5.2.5. .forward, .procmailrc
- MIB (Management Information Base)
: TCP/IP Network Administration, 11.9. Simple Network Management Protocol 
- MIBI and MIBII
: TCP/IP Network Administration, 11.9. Simple Network Management Protocol 
- Micro-BIT Virus Center
: Practical UNIX & Internet Security, F.3.4.16. Germany: Southern area
- mil domain
: TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
- Miller, Barton
: Practical UNIX & Internet Security, 23.1.2. An Empirical Study of the Reliability of UNIX Utilities
- MILNET
: Practical UNIX & Internet Security, F.3.4.20. Motorola, Inc.
- MIME (Multipurpose Internet Mail Extensions)
- 
  - Building Internet Firewalls, 8.1.3. Multipurpose Internet Mail Extensions
  - Practical UNIX & Internet Security, 11.1.5. Viruses 
  - sendmail, 5.3.8. Headers 
  - TCP/IP Network Administration, 1.2. A Data Communications Model
  - TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
  - format errors
: sendmail, 34.8. Alphabetized Reference 
  - headers for
: sendmail, 35.6.7. MIME Headers 
  - sendmail and
: TCP/IP Network Administration, 10.5.8. Defining Mailers 
  - standardizing on
: TCP/IP Network Administration, 4.5.3. Planning Your Mail System 
  - types
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
 
- "MIME-Version:" header line
: sendmail, 35.10. Alphabetized Reference 
- MIME7TO8 macro
: sendmail, 18.8. Alphabetized Reference 
- MIME8TO7 macro
: sendmail, 18.8. Alphabetized Reference 
- MinFreeBlocks (b) option
: sendmail, 34.8. Alphabetized Reference 
- minicom
: TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections 
- minimum matching
- 
  - sendmail, 8.7.2. Minimal Matching 
  - sendmail, 28.5.1. Minimum Matching 
  - sendmail, 32.2.3. Backup and Retry 
 
- MinQueueAge option
- 
  - sendmail, 23.9. The qf File Internals 
  - sendmail, 34.8. Alphabetized Reference 
 
- minus sign (hyphen)
- 
  - in machine conversation
: sendmail, 4.2. Verbose (-v) 
  - non-equivalent host
: TCP/IP Network Administration, 12.2.5. Secure the r Commands 
 
- missing addresses
: (see addresses, null)
- "Missing username" error
: sendmail, 9.4. The error Delivery Agent 
- MIT-KERBEROS-5 authentication
: Practical UNIX & Internet Security, 17.3.21.3. The xhost facility 
- Mitnick, Kevin
: Practical UNIX & Internet Security, 27.2.6. Network Providers that Network Too Well
- mixed multipart subtype
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- mknod command
: TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections 
- mkpasswd program
: Practical UNIX & Internet Security, 8.8.4. Password Generators 
- mktemp function
: Practical UNIX & Internet Security, 23.2. Tips on Avoiding Security-related Bugs
- mobile network computing
: Practical UNIX & Internet Security, 8.7. One-Time Passwords
- mobile systems, requirements of
: TCP/IP Network Administration, 3.6.1. Dynamic Host Configuration Protocol
- mode command
: TCP/IP Network Administration, 6.3.2. Dial-Up PPP 
- modem pools
: Building Internet Firewalls, 10.6. Terminal Servers and Modem Pools
- modems
- 
  - Practical UNIX & Internet Security, 14. Telephone Security
  - Practical UNIX & Internet Security, 14.6. Additional Security for Modems 
  - TCP/IP Network Administration, 1.7. Application Layer
  - (see also Automatic Call Unit)
  - asynchronous
: TCP/IP Network Administration, 5.3.1.2. Pseudo-device 
  - callback setups
  
- 
    - Practical UNIX & Internet Security, 14.4.2. 
    - Practical UNIX & Internet Security, 14.6. Additional Security for Modems 
  
 
- carrier-detect (DCD) indicator, monitoring
: TCP/IP Network Administration, 6.3.3. chat 
  - checking configuration of
: TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections 
  - clogging
: Practical UNIX & Internet Security, 25.3.4. Clogging
  - documentation
: TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections 
  - encrypting
: Practical UNIX & Internet Security, 14.6. Additional Security for Modems 
  - hanging up
: (see signals)
  - high-speed dial-up
: TCP/IP Network Administration, 6.2. TCP/IP Over a Serial Line 
  - physical security of
  
- 
    - Practical UNIX & Internet Security, 14.5.4. Physical Protection of Modems
    - Practical UNIX & Internet Security, 14.6. Additional Security for Modems 
  
 
- recording call information
: Practical UNIX & Internet Security, 10.3.1. aculog File 
  - synchronous
: TCP/IP Network Administration, 5.3.1.2. Pseudo-device 
  - tracing connections
  
- 
    - Practical UNIX & Internet Security, 24.2.4. Tracing a Connection 
    - Practical UNIX & Internet Security, 24.2.4.2. How to contact the system administrator of a computer
  
 
- UNIX and
  
- 
    - Practical UNIX & Internet Security, 14.5. Modems and UNIX
    - Practical UNIX & Internet Security, 14.5.3.3. Privilege testing 
  
 
 
- modes
- 
  - daemon
: sendmail, 4.1.1. Daemon Mode (-bd) 
  - delivery
: sendmail, 13.2.3. The Default Delivery Mode 
  - sendmail operating
: sendmail, 36.7. Alphabetized Reference 
  - TempFileMode option
  
- 
    - sendmail, 13.2.4. The Default File Permissions 
    - sendmail, 22.8.3.7. The TempFileMode option 
  
 
 
- modification times
- 
  - Practical UNIX & Internet Security, 5.1.2. Inodes
  - Practical UNIX & Internet Security, 5.1.5. File Times
  - Practical UNIX & Internet Security, 7.4.7. inode Modification Times
  - Practical UNIX & Internet Security, 9.2.2. Checklists and Metadata
 
- modifying Internet services
: Building Internet Firewalls, 5.8.3. Installing and Modifying Services
- modules, loadable
: TCP/IP Network Administration, 5.2. Linux Kernel Configuration 
- monitoring
- 
  - automatically
: Building Internet Firewalls, 5.9.2. Consider Writing Software to Automate Monitoring
  - hardware for
: (see detectors)
  - intruders
: Practical UNIX & Internet Security, 24.2.3. Monitoring the Intruder
  - performance
: Practical UNIX & Internet Security, 13.2.3. Performance Reviews and Monitoring
  - security
: (see logs/logging)
  - software
  
- 
    - TCP/IP Network Administration, 11.9. Simple Network Management Protocol 
    - TCP/IP Network Administration, 12.4.3. Automated Monitoring 
  
 
- system usage
  
- 
    - Building Internet Firewalls, 12.2. Monitoring Your System
    - TCP/IP Network Administration, 5.2. Linux Kernel Configuration 
  
 
- users
: Practical UNIX & Internet Security, 26.2.6. Other Tips 
 
- monitors and screen savers
: Practical UNIX & Internet Security, 12.3.5.2. X screen savers
- more command
: TCP/IP Network Administration, 8.4. Using nslookup 
- Morris worm
: Building Internet Firewalls, 8.1. Electronic Mail
- Morris, Robert T.
- 
  - Practical UNIX & Internet Security, 1. Introduction
  - Practical UNIX & Internet Security, 8.6. The UNIX Encrypted Password System 
  - Practical UNIX & Internet Security, 17.4. Security Implications of Network Services 
 
- Mosaic
- 
  - Building Internet Firewalls, 2.5. The World Wide Web
  - TCP/IP Network Administration, 13.1. The World Wide Web 
 
- motd file
: Practical UNIX & Internet Security, 26.2.6. Other Tips 
- Motorola, Inc.
: Practical UNIX & Internet Security, F.3.4.20. Motorola, Inc.
- mount command
- 
  - Practical UNIX & Internet Security, 20.3. Client-Side NFS Security
  - TCP/IP Network Administration, 9.1.3.1. The mount command 
  - Practical UNIX & Internet Security, 5.5.5. Turning Off SUID and SGID in Mounted Filesystems 
 
- mount daemon (mountd)
- 
  - Building Internet Firewalls, 5.8.2.4. Which services should you disable?
  - TCP/IP Network Administration, 9.1.1. NFS Daemons 
 
- mount point
: TCP/IP Network Administration, 9.1.3.1. The mount command 
- mounted filesystems
- 
  - Building Internet Firewalls, 5.8.4.3. Mount filesystems as read-only
  - Practical UNIX & Internet Security, 5.5.5. Turning Off SUID and SGID in Mounted Filesystems 
  - TCP/IP Network Administration, 9.1.3. Mounting Remote Filesystems 
  - (see also directories)
 
- mounting directory
: TCP/IP Network Administration, 9.1. The Network File System 
- mpeg video subtype
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- mqueue directory
: (see queue directory)
- mqueue temporary files
: TCP/IP Network Administration, 10.5.4. The Set Option Command 
- mrand48 function
: Practical UNIX & Internet Security, 23.7.3. drand48  (  ), lrand48  (  ), and mrand48  (  )
- mrouter
- 
  - Building Internet Firewalls, 6.3.3.5. IP over IP
  - Building Internet Firewalls, 8.9.3. The Multicast Backbone (MBONE)
 
- MRU (maximum receive unit)
: TCP/IP Network Administration, A.2. The PPP Daemon
- ${ms} macro
: sendmail, D.1. Sun Enhancements 
- msgid= equate (syslog output)
: sendmail, 26.1.3.5. msgid= the Message-ID: identifier 
- MTAs
- 
  - Building Internet Firewalls, 8.1. Electronic Mail
  - sendmail, 1.1. MUA Versus MTA 
  - sendmail, 5.3.1. Mail Delivery Agents 
  - sendmail, 6.2. Define a Mail Delivery Agent 
  - sendmail, 30. Delivery Agents
  - (see also M configuration command)
  - $# operator and
  
- 
    - sendmail, 9.2.1. The Delivery Agent ($#) 
    - sendmail, 28.6.5. Specify a Delivery Agent: $# 
  
 
- advantages to sendmail
: sendmail, 18.1. To Use or Not to Use 
  - choosing
  
- 
    - sendmail, 9. Rule Set 0 
    - sendmail, 9.5. Things to Try 
  
 
- declaring
: sendmail, 19.3.2. MAILER() 
  - default
: sendmail, 34.8. Alphabetized Reference 
  - equates for
: sendmail, 30.4. The Equates
  - for errors
: sendmail, 9.4. The error Delivery Agent 
  - expensive
  
- 
    - sendmail, 23.6.1. Periodically with -q 
    - sendmail, 30.8. Alphabetized F= Flags
    - sendmail, 34.8. Alphabetized Reference 
  
 
- flags
  
- 
    - sendmail, 6.3. The local Delivery Agent 
    - sendmail, 6.4. Add the Missing Parts to Mhub 
    - sendmail, 14.2. Headers Versus Delivery Agent Flags
    - sendmail, 30.8. Alphabetized F= Flags
    - sendmail, 35.4. ?flags? in Header Definitions 
  
 
- ignoring MX records
: sendmail, 21.3.5. What? They Ignore MX Records? 
  - local
  
- 
    - sendmail, 6.3. The local Delivery Agent 
    - sendmail, 19.6. Alphabetized m4 Macros 
  
 
- logging
: sendmail, 26.1.3.4. mailer= the delivery agent used 
  - printing list of
: sendmail, 38.4.2. Show Delivery Agents with =M 
  - as recipients
: sendmail, 30.8. Alphabetized F= Flags
  - scripts via
: sendmail, 24.3. Write a Delivery Agent Script 
  - statistics
: (see statistics)
  - symbolic name
: sendmail, 30.2. The Symbolic Name
  - testing
: sendmail, 38.5.6. Try a Delivery Agent with /try 
  - UUCP
: sendmail, 19.4.6. UUCP 
 
- mtime
- 
  - Practical UNIX & Internet Security, 5.1.2. Inodes
  - Practical UNIX & Internet Security, 5.1.5. File Times
  - Practical UNIX & Internet Security, 9.2.2. Checklists and Metadata
  - Practical UNIX & Internet Security, 24.4.1.6. Changes to startup files 
 
- MTU (maximum transmission unit)
- 
  - Building Internet Firewalls, C.5.1.3. Fragmenting datagrams
  - TCP/IP Network Administration, 1.5.1.3. Fragmenting datagrams
  - TCP/IP Network Administration, 6.1.1. Determining the Interface Name 
  - TCP/IP Network Administration, 6.1.2. Checking the Interface with ifconfig 
  - TCP/IP Network Administration, 6.1.5.4. Maximum transmission unit 
  - TCP/IP Network Administration, A.1. Dial-Up IP
  - determining smallest
: TCP/IP Network Administration, 5.2. Linux Kernel Configuration 
 
- MUAs (mail user agents)
- 
  - sendmail, 1.1. MUA Versus MTA 
  - sendmail, 36.7. Alphabetized Reference 
  - (see also delivery agents)
 
- MUDs (Multiuser Dungeons)
: Practical UNIX & Internet Security, 17.3.23. Other TCP Ports: MUDs and Internet Relay Chat (IRC)
- Muffet, Alec
: Practical UNIX & Internet Security, 10.5.3.1. Beware false log entries
- Multicast Backbone
: (see MBONE)
- multicast groups
: Practical UNIX & Internet Security, 16.2.1.2. Classical network addresses
- multicast IP
: Building Internet Firewalls, 6.3.3.5. IP over IP
- multicasting
- 
  - Building Internet Firewalls, 8.9.3. The Multicast Backbone (MBONE)
  - TCP/IP Network Administration, 6.1.2. Checking the Interface with ifconfig 
  - TCP/IP Network Administration, 6.1.5.5. Point-to-point 
  - addresses
  
- 
    - TCP/IP Network Administration, 2.2.1. Address Classes
    - TCP/IP Network Administration, 2.2.2.1. Final notes on IP addresses
    - TCP/IP Network Administration, 2.6. Address Resolution
    - TCP/IP Network Administration, 7.4.2. RIP Version 2 
  
 
- routing, support for
  
- 
    - TCP/IP Network Administration, 5.2. Linux Kernel Configuration 
    - TCP/IP Network Administration, 5.3.1.1. Options 
  
 
 
- Multichannel Memorandum Distribution Facility (MMDF)
: TCP/IP Network Administration, 10. sendmail 
- multicharacter
- 
  - names
: (see names)
  - options
: (see options, sendmail)
 
- MULTICS (Multiplexed Information and Computing Service)
: Practical UNIX & Internet Security, 1.3. History of UNIX 
- multidirectional connections
: Building Internet Firewalls, 7.4.2. Unidirectional Versus Multidirectional
- multihomed
- 
  - hosts
  
- 
    - Building Internet Firewalls, C.5.1.2. Routing datagrams
    - TCP/IP Network Administration, 5.3.1.1. Options 
    - TCP/IP Network Administration, 8.2.1. The Resolver Configuration File 
    - architecture of
: TCP/IP Network Administration, 12.7. Firewalls 
  
 
- site
: TCP/IP Network Administration, 4.3.1. Obtaining an autonomous system number 
 
- multilevel security
- 
  - Practical UNIX & Internet Security, 1.3. History of UNIX 
  - Practical UNIX & Internet Security, 2.4.4.7. Defend in depth
  - Practical UNIX & Internet Security, 2.5.3. Final Words: Risk Management Means  Common Sense
  - Practical UNIX & Internet Security, 17.2. Controlling Access to Servers
 
- multimedia mail
: (see email)
- multipart content type
: TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
- multipart encryption
: (see encryption)
- multipart messages
: (see messages)
- multiple
- 
  - recipients
: sendmail, 30.8. Alphabetized F= Flags
  - SMTP connections
: sendmail, 34.8. Alphabetized Reference 
  - timeouts
: sendmail, 34.8. Alphabetized Reference 
 
- multiplexing
- 
  - TCP/IP Network Administration, 2.1. Addressing, Routing, and Multiplexing
  - TCP/IP Network Administration, 2.7. Protocols, Ports, and Sockets
 
- Multipurpose Internet Mail Extensions
: (see MIME)
- multitasking
- 
  - Practical UNIX & Internet Security, 1.4. Security and UNIX 
  - Practical UNIX & Internet Security, C.1.3.3. Process priority and niceness 
 
- multiuser operating systems
: Practical UNIX & Internet Security, 1.4. Security and UNIX 
- multiuser workstations
: Practical UNIX & Internet Security, 17.3.21.1. etc/fbtab and /etc/logindevperm
- munitions export
: Practical UNIX & Internet Security, 26.4.1. Munitions Export
- MustQuoteChars option
: sendmail, 34.8. Alphabetized Reference 
- MX records
- 
  - Building Internet Firewalls, 8.10.5.1. Set up a `fake'
  - Practical UNIX & Internet Security, 17.3.6. Domain Name System (DNS) (TCP and UDP Port 53)
  - sendmail, 15.3. MX Records 
  - sendmail, 18.8. Alphabetized Reference 
  - sendmail, 21.3. Set Up MX Records 
  - sendmail, 34.8. Alphabetized Reference 
  - sendmail, 38.5.2. Look Up MX Records with /mx 
  - TCP/IP Network Administration, 8.3.2. Standard Resource Records 
  - TCP/IP Network Administration, 8.3.6. The named.hosts File 
  - TCP/IP Network Administration, 8.4. Using nslookup 
  - TCP/IP Network Administration, 10.7.1. Modifying Local Information 
  - TCP/IP Network Administration, C.3.1.4. Mail exchanger record
  - 0 flag
: sendmail, 30.8. Alphabetized F= Flags
  - bestmx database class
: sendmail, 33.8. Alphabetized Reference 
  - bestmx_is_local feature
: sendmail, 19.6. Alphabetized m4 Macros 
  - fallback MX host
: sendmail, 34.8. Alphabetized Reference 
  - ignored by delivery agents
: sendmail, 21.3.5. What? They Ignore MX Records? 
  - looking up for addresses
: sendmail, 21.2.3. Look Up Addresses for Delivery 
  - offsite hosts
: sendmail, 21.5.1. Offsite MX Hosts 
  - with wildcards
: sendmail, 21.3.4. Wildcard MX Records 
 
- /mx rule-testing command
: sendmail, 38.5.2. Look Up MX Records with /mx 
- MYNAME= command
: Practical UNIX & Internet Security, 15.5.2. Permissions Commands 
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
 O'Reilly & Associates, Inc.
All Rights Reserved.