[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

L-devices file 
Lai, Xuejia ("On the Design and Security of Block Ciphers") 
LaMacchia, Brian A. 
    "Computation of Discrete Logarithms in Prime Fields" 
LANs (Local Area Networks)  2nd  3rd 
laptops
    locking 
    recovery from theft 
    ruggedized 
    tagging 
    temperature of 
    theft prevention for 
    vibration protection for 
last program  2nd  3rd  4th 
lastcomm program  2nd 
lastlog file  2nd 
laws  [See legal issues]
LDAP (Lightweight Directory Access Protocol)  2nd  3rd  4th 
    authentication with 
    data integrity and 
    nss_ldap configuration 
    protocol for 
    reliability and 
    TLS support for 
    using with Kerberos 
    using with PAM 
    versions of 
Learning Perl (Schwartz, Randal L. and Phoenix, Tom) 
leased telephone lines 
least privilege principle  2nd 
legal issues
    access device limitations 
    avoiding computer abuse 
    backups 
    comparison copies and 
    compromised networks, risks of being prosecuted for 
    copyright laws  2nd 
    criminal complaints, filing 
    criminal prosecution, disadvantages of 
    federal laws regarding computer crimes 
    jurisdiction for computer crimes 
    law enforcement, wiretapping by 
    license agreements for worms 
    monitoring intruders 
    pornography, indecency, obscenity 
    published resources on 
    recourses after a break-in 
    responsibilities to report crime 
    security checklist for 
    situations requiring legal action 
Lenstra, Arjen 
    "The Number Field Sieve" 
Lenstra, H. W., Jr. ("The Number Field Sieve") 
Lesk, Mike 
level-zero backup 
Leveson, Nancy G. (Safeware: System Safety and Computers. A Guide to Preventing Accidents and Losses 
Levy, Steven (Hackers: Heroes of the Computer Revolution) 
Leyland, Paul 
/lib directory 
Libes, Don 
license agreements, comparison copies and 
lie-detector tests, of employees 
lightning  2nd 
Lightweight Directory Access Protocol  [See LDAP]
limit command 
LINK function (RPC) 
link-level encryption 
links  2nd  [See also symbolic links]
    to directories 
    static 
Linux  2nd  [See also System V Unix]
    "no dump" file attribute 
    ACL support for 
    append-only files 
    bug fixes, responsibility for 
    capabilities system 
    chattr() system call 
    chroot wrapper 
    Cryptfs support for 
    current trends 
    debugfs command 
    default accounts for 
    exim mailer program for 
    expiring accounts 
    exporting NFS directories 
    ext2fs filesystem  2nd  3rd 
    FIFO file type 
    filesystem UID (FSUID) 
    filesystem, minfree amount 
    filesystems 
    group disk quotas 
    for handheld computers 
    history of  2nd 
    host-based firewall for  2nd 
    immutable files 
    Kerberos client for 
    kernel security levels 
    logrotate program 
    mobile versions of 
    npasswd package 
    Openwall patches 
    packaging tools 
    PAM
        resource limits 
        support for 
    periodic security-checking scripts 
    portmapper program 
    portmon variable 
    process accounting with 
    ps command 
    published resources on 
    Red Hat  [See Red Hat Linux]
    reliability of 
    RPM Package Manager  2nd 
    S/Key support 
    secure terminals 
    secure versions of 
    server startup on 
    shadow password file 
    smbfs support 
    software quality 
    source packages 
    stateful inspection program 
    sudo program  2nd 
    sulog, scanning 
    swapping to files 
    TCP Wrappers support 
    ttywatch program 
    VA  [See VA Linux]
    versions of  2nd 
    X security 
Littman, Jonathan (The Fugitive Game: Online with Kevin Mitnick) 
Liu, Cricket (DNS and BIND) 
ln command 
load shedding 
local area networks  [See LANs]
LOCAL authentication (NIS+) 
local jurisdiction 
local storage, protecting 
lock program 
lock-down 
locking accounts 
locking files  2nd 
locks, hardware 
log books 
log events 
log files  [See also history files; email, logging]2nd 
    access_log 
    acct 
    aculog 
    analysis tools 
    analyzing for intruders 
    created during initialization 
    crontab 
    hardcopy of  2nd 
    immutable 
    lastlog 
    list of 
    locations of 
    loginlog 
    managing 
    messages 
    pacct 
    rotating 
    sulog  2nd 
    syslog creating 
    system clock and  2nd 
    utmp  2nd  3rd 
    wtmp 
    wtmpx 
log server 
logcheck program 
logdaemon package 
logger program  2nd 
logging  2nd  3rd  4th  [See also forensics; log files]
    across networks 
    break-ins 
    C2 audit 
    criminal investigations, and 
    critical messages from 
    failed passwords 
    failed su attempts 
    from third-party software 
    handwritten logs 
    to hardcopy device 
    individual users 
    network services 
    newsyslog program 
    outgoing mail 
    policy for 
    process accounting 
    security checklist for 
    Swatch program 
    syslog facility 
    what not to log 
    who is logged in 
logging in 
    authentication of 
    failed attempts, logging 
    FTP 
        access without 
    Kerberos system 
    preventing for dormant accounts 
    recorded in log file 
    restricting 
    with Secure RPC 
    startup file attacks 
logging out
    automatic 
    with Secure RPC 
logic bombs  2nd  3rd 
login file 
.login file  2nd 
login program  2nd 
    back doors in 
    trusted path for 
login service 
logindevperm file 
loginlog file  2nd  3rd 
logins command 
.logout file 
long distance service 
LOOKUP function (RPC) 
loopback encryption 
losses  [See also disaster planning]
    calculating cost of 
    calculating cost of prevention 
    determining whether to protect against 
    estimating probability of 
lp user 
lpd system 
lrand48() system call 
ls command  2nd 
    -d option 
    -i option 
    -c option 
    file permissions listed by 
    file times displayed by 
    -H option 
    indicating SUID/SGID programs 
    -l option 
    listing files with control characters 
lsof command  2nd  3rd  4th  5th  6th 
lstat() system call