[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Y]
[Z]
Kahn, David (The Codebreakers)
Karels, Michael (The Design and Implementation of the 4.4 BSD UNIX Operating System)
Kaufman, Charles
Network Security: Private Communications in a Public World
Kaufman, Lar (Running Linux)
Kerberos system
2nd
3rd
4th
authentication with
installing
limitations of
logical servers for
OpenSSH and
random number generator
RPC system and
server lock and key
using
using with LDAP
using with PAM
Versions 4 and 5
kermit program
2nd
kernel
immutable
security levels for
2nd
3rd
kernel-level firewalls
Kernighan, Brian (The UNIX Programming Environment)
key length
and brute force attacks
search times corresponding to
strength relative to crypographic algorithms
key search attacks
2nd
3rd
4th
5th
key switches
keyboard monitors
keylogin program
2nd
keylogout program
keys (encryption/decryption)
2nd
3rd
4th
5th
keyserv process
2nd
3rd
keystore file
keystrokes, monitoring
2nd
3rd
[See also sniffers] kill command
2nd
built in to ksh or csh
to stop process overload
killall command
Kim, Gene H.
2nd
kinit program
Klaus, Christopher William
kmem device
2nd
known plaintext attacks
2nd
Knuth, Donald
Kochan, Stephen G. (UNIX System Security)
Korn shell
[See ksh] Korn, David G. (The New Kornshell Command and Programmang Language)
ksh (Korn shell)
[See also shells] history file
programs using
prompt
published resources on
TMOUT variable
umask and
.kshrc file
|