[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Y]
[Z]
L-devices file
Lai, Xuejia ("On the Design and Security of Block Ciphers")
LaMacchia, Brian A.
"Computation of Discrete Logarithms in Prime Fields"
LANs (Local Area Networks)
2nd
3rd
laptops locking
recovery from theft
ruggedized
tagging
temperature of
theft prevention for
vibration protection for
last program
2nd
3rd
4th
lastcomm program
2nd
lastlog file
2nd
laws
[See legal issues] LDAP (Lightweight Directory Access Protocol)
2nd
3rd
4th
authentication with
data integrity and
nss_ldap configuration
protocol for
reliability and
TLS support for
using with Kerberos
using with PAM
versions of
Learning Perl (Schwartz, Randal L. and Phoenix, Tom)
leased telephone lines
least privilege principle
2nd
legal issues access device limitations
avoiding computer abuse
backups
comparison copies and
compromised networks, risks of being prosecuted for
copyright laws
2nd
criminal complaints, filing
criminal prosecution, disadvantages of
federal laws regarding computer crimes
jurisdiction for computer crimes
law enforcement, wiretapping by
license agreements for worms
monitoring intruders
pornography, indecency, obscenity
published resources on
recourses after a break-in
responsibilities to report crime
security checklist for
situations requiring legal action
Lenstra, Arjen
"The Number Field Sieve"
Lenstra, H. W., Jr. ("The Number Field Sieve")
Lesk, Mike
level-zero backup
Leveson, Nancy G. (Safeware: System Safety and Computers. A Guide to Preventing Accidents and Losses
Levy, Steven (Hackers: Heroes of the Computer Revolution)
Leyland, Paul
/lib directory
Libes, Don
license agreements, comparison copies and
lie-detector tests, of employees
lightning
2nd
Lightweight Directory Access Protocol
[See LDAP] limit command
LINK function (RPC)
link-level encryption
links
2nd
[See also symbolic links] to directories
static
Linux
2nd
[See also System V Unix] "no dump" file attribute
ACL support for
append-only files
bug fixes, responsibility for
capabilities system
chattr() system call
chroot wrapper
Cryptfs support for
current trends
debugfs command
default accounts for
exim mailer program for
expiring accounts
exporting NFS directories
ext2fs filesystem
2nd
3rd
FIFO file type
filesystem UID (FSUID)
filesystem, minfree amount
filesystems
group disk quotas
for handheld computers
history of
2nd
host-based firewall for
2nd
immutable files
Kerberos client for
kernel security levels
logrotate program
mobile versions of
npasswd package
Openwall patches
packaging tools
PAM resource limits
support for
periodic security-checking scripts
portmapper program
portmon variable
process accounting with
ps command
published resources on
Red Hat
[See Red Hat Linux] reliability of
RPM Package Manager
2nd
S/Key support
secure terminals
secure versions of
server startup on
shadow password file
smbfs support
software quality
source packages
stateful inspection program
sudo program
2nd
sulog, scanning
swapping to files
TCP Wrappers support
ttywatch program
VA
[See VA Linux] versions of
2nd
X security
Littman, Jonathan (The Fugitive Game: Online with Kevin Mitnick)
Liu, Cricket (DNS and BIND)
ln command
load shedding
local area networks
[See LANs] LOCAL authentication (NIS+)
local jurisdiction
local storage, protecting
lock program
lock-down
locking accounts
locking files
2nd
locks, hardware
log books
log events
log files
[See also history files; email, logging]2nd
access_log
acct
aculog
analysis tools
analyzing for intruders
created during initialization
crontab
hardcopy of
2nd
immutable
lastlog
list of
locations of
loginlog
managing
messages
pacct
rotating
sulog
2nd
syslog creating
system clock and
2nd
utmp
2nd
3rd
wtmp
wtmpx
log server
logcheck program
logdaemon package
logger program
2nd
logging
2nd
3rd
4th
[See also forensics; log files] across networks
break-ins
C2 audit
criminal investigations, and
critical messages from
failed passwords
failed su attempts
from third-party software
handwritten logs
to hardcopy device
individual users
network services
newsyslog program
outgoing mail
policy for
process accounting
security checklist for
Swatch program
syslog facility
what not to log
who is logged in
logging in
authentication of
failed attempts, logging
FTP
access without
Kerberos system
preventing for dormant accounts
recorded in log file
restricting
with Secure RPC
startup file attacks
logging out automatic
with Secure RPC
logic bombs
2nd
3rd
login file
.login file
2nd
login program
2nd
back doors in
trusted path for
login service
logindevperm file
loginlog file
2nd
3rd
logins command
.logout file
long distance service
LOOKUP function (RPC)
loopback encryption
losses
[See also disaster planning] calculating cost of
calculating cost of prevention
determining whether to protect against
estimating probability of
lp user
lpd system
lrand48() system call
ls command
2nd
-d option
-i option
-c option
file permissions listed by
file times displayed by
-H option
indicating SUID/SGID programs
-l option
listing files with control characters
lsof command
2nd
3rd
4th
5th
6th
lstat() system call
|