Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: O

obscurity : (see security, through obscurity)
octal file permissions
5.2.3. Calculating Octal File Permissions
5.2.4. Using Octal File Permissions
octets : 16.2.1. Internet Addresses
Odlyzko, Andrew : 19.3.4. Limitations of Secure RPC
OFB (output feedback) : 6.4.4.2. DES modes
on-the-job security
13.2. On the Job
13.2.6. Departure
one : 9.2.1. Comparison Copies
one-command accounts : 8.1.3. Accounts That Run a Single Command
one-time pad encryption
6.4.7. An Unbreakable Encryption Algorithm
8.7.3. Code Books
one-time passwords
3.7. One-Time Passwords
8.7. One-Time Passwords
8.7.3. Code Books
17.4. Security Implications of Network Services
23.3. Tips on Writing Network Programs
one-way phone lines : 14.4.1. One-Way Phone Lines
open access, tradition of : 1.4.1. Expectations
open accounts
8.1.4. Open Accounts
8.1.4.6. Potential problems with rsh
8.8.7. Algorithm and Library Changes
open command : 23.2. Tips on Avoiding Security-related Bugs
O_CREAT and O_EXCL flags : 23.2. Tips on Avoiding Security-related Bugs
Open Software Distribution (OSD) : Preface
Open Software Foundation (OSF) : 1.3. History of UNIX
open system call : 5.1.7. File Permissions in Detail
Open System Interconnection (OSI) : 16.4.4. OSI
opendir library call : 5.4. Using Directory Permissions
operating systems
1.2. What Is an Operating System?
12.3.3. Other Media
keeping secret : 2.5. The Problem with Security Through Obscurity
operating systems
Which UNIX System?
(see also under specific name)
optic cables : (see cables, network)
optical vampire taps : 12.3.1.5. Fiber optic cable
Options command : 18.3.2. Commands Within the <Directory> Block
Orange Book : 2.3.3. Adding Up the Numbers
originate mode : 14.3.1. Originate and Answer
originate testing : 14.5.3.1. Originate testing
OSF (Open Software Foundation) : 1.3. History of UNIX
OSF/1 operating system : 1.3. History of UNIX
OSI (Open System Interconnection) : 16.4.4. OSI
Outcome table (NIS+) : 19.5.3. NIS+ Tables
outgoing calls : 14.5. Modems and UNIX
outgoing mail, logging : 10.4.2. Mail
output feedback (OFB) : 6.4.4.2. DES modes
outsiders : 13.3. Outsiders
overload attacks
25.2. Overload Attacks
25.2.5. Soft Process Limits: Preventing Accidental Denial of Service
overtime : 13.2.3. Performance Reviews and Monitoring
overwriting media : 12.3.2.3. Sanitize your media before disposal
OW- (sendmail.cf) : 17.3.4.2. Using sendmail to receive email
owners of information : 2.4.4.1. Assign an owner
owners, changing : 5.7. chown: Changing a File's Owner
ownership notices : 26.2.6. Other Tips


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.

This HTML Help has been published using the chm2web software.