[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Y]
[Z]
games user
games, accounts for
Gangemi, G. T., Sr. (Computer Security Basics)
Garfinkel, Simson (PGP: Pretty Good Privacy)
gas-charged fire extinguishers
Gasser, Morrie (Building a Secure Computer System)
gated daemon
gateways
[See routers] gcore program
gcov tester
gdb command
gdb debugger
GECOS (General Electric Computer Operating System)
Geer, Dan
General Electric Computer Operating System (GECOS)
generation count, file handle
2nd
generators, password
GETATTR function (RPC)
gethostbyaddresses() system call
gethostbyname() system call
getopt() system call
getpass() system call
2nd
getpwuid() system call
gets() system call
2nd
getservbyname() system call
2nd
getty program
Gibson, William All Tomorrow's Parties
Burning Chrome
Count Zero
Idora
Mona Lisa Overdrive
Neuromancer
Virtual Light
GIDs (group identifiers)
2nd
3rd
[See also SGID programs] real versus effective
and RPC requests
stored in inodes
glass walls, security aspects
GMT
[See UTC] GNU Emacs
2nd
3rd
4th
GNU project
GNU utilities, reliability of
gnupg signatures
2nd
goaway option, sendmail
Gollmann, Dieter (Computer Security)
gopher
gpg signatures
Graff, Michael
Grampp, F. T. ("UNIX Operating System Security")
granularity, time
graphical displays, sharing with X Window System
grep command, scanning su log file with
grounding signals, attacks by
group disk quotas
group file
2nd
3rd
4th
monitoring
group IDs
[See GIDs] Group table (NIS+)
groups
accounts for
changing
files writable by
identifiers for
[See GIDs] NIS netgroups
passwords for
permissions for
process
security checklist for
umask for group projects
wheel
[See wheel group] groups command
grpck command
Grünbacher, Andreas
guest account
2nd
guest user
guidelines, in security policy
|