[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Y]
[Z]
MAC (Mandatory Access Controls)
2nd
Mac OS X
2nd
[See also BSD Unix] history of
host-based firewall for
2nd
kernel security levels on
NetInfo
password database
password file, printing
S/Key support
server startup on
SMB support
sudo program
2nd
TCP Wrappers support
Mach kernel
machine name
macro virus
[See viruses] MACs (message authentication codes)
2nd
3rd
magic cookies
magic number
magnetic tapes
[See tapes] mail
[See email] MAIL command, SMTP
mail handler (MH)
mail systems
[See MTAs] mail user
Mail_Aliases table (NIS+)
mailboxes
[See email] mailing lists, security-related
mailq command
main.cf file
maintenance mode
maintenance personnel, security regarding
makedbm program
malicious code
[See programmed threats] malware
[See programmed threats] man-in-the-middle attack
management participation in security policy
role of
2nd
3rd
Manasse, M. S. ("The Number Field Sieve")
Mandatory Access Controls
[See MAC] mandatory filtering software
mandatory record locking
Mann, Charles C. (@ Large)
manpages
MANs (metropolitan area networks)
manuals reading
restricting availability of
maps, NIS
[See NIS] Markoff, John Cyberpunk: Outlaws and Hackers on the Computer Frontier
Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw -- By the
master password file
master server
2nd
[See also NIS] master.passwd file
2nd
MCF (Modular Crypt Format)
McGraw, Gary (Building Secure Software<Default Para Font)
McKusick, Marshall Kirk (The Design and Implementation of the 4.4 BSD UNIX Operating System)
MD2 functions
MD4 functions
MD5 algorithm
2nd
MD5 cryptographic checksum
MD5 functions
media backing up to
[See backups] destroying
2nd
failure of, for backups
overwriting
print through process
printed
2nd
3rd
read-only
rotating for backups
sanitizing
tapes
2nd
upgrading
viruses from
write-once, logging to
meet-in-the-middle plaintext attacks
memory, swap space, running out of
Merkle, Ralph "Hiding Information and Signatures in Trap Door Knapsacks"
"On the Security of Multiple Encryption"
"Secure Communication Over Insecure Channels"
Merkle, Robert
message authentication codes
[See MACs] message digest functions
2nd
applications of
2nd
attacks on
checksums generated with
HMAC
Tripwire package and
message flooding
Message Transfer Agents
[See MTAs] Message User Agents (MUA)
messages file
2nd
3rd
[See also syslog file]4th
5th
metadata
2nd
Metcalf, Bob
"A Method for Obtaining Digital Signatures" (Rivest, Ron; Shamir, A.; Adleman, L.)
metropolitan area networks (MANs)
MH (mail handler)
Miller, Barton P.
2nd
"An Empirical Study of the Reliability of UNIX Utilities"
Minix operating system
mirror sites
mirrored disks and servers
MIT Kerberos
[See Kerberos system] MIT-KERBEROS-5 authentication
Mitnick, Kevin
2nd
MKDIR function (RPC)
mknod command
MKNOD function (RPC)
mkpasswd program
mkstemp() system call
MLS (Multilevel Security) environment
MNT request
mobile Unix systems
mode bits
[See permissions] modems
answer mode
banners displayed by
baud
bps (bits per second)
callback schemes and
2nd
Caller-ID and
2nd
clogging
connecting
current trends for use of
eavesdropping and
encrypting
hanging up with SIGHUP
initiating calls with
one-way phone lines used by
originate mode
password
phone numbers for, changing
physical security of
reasons to use
recording call information
RS-232 serial protocol used by
security and
2nd
security checklist for
serial interfaces used by
telephone scanning and firewalls for
testing
tracing connections
unauthorized
Unix devices for
modification times, files
2nd
Modular Crypt Format (MCF)
Mona Lisa Overdrive (Gibson, William)
monitoring
[See also logging]2nd
monitoring services
Morris, Robert H.
2nd
"UNIX Operating System Security"
Morris, Robert T.
motion detectors
mount command
2nd
3rd
MOUNT protocol
mountd daemon
mounted filesystems
mrand48() system call
MSDOS filesystem
MTAs (Message Transfer Agents)
mtime
2nd
3rd
4th
mtree program
MUA (Message User Agents)
Muddleftpd server
MUDs (Multiuser Dungeons/Dimensions)
Muffet, Alec
2nd
multicast groups
MULTICS (Multiplexed Information and Computing Service)
multilevel security (defense in depth)
2nd
3rd
multitasking
multithreaded programming
Multiuser Dungeons/Dimensions (MUDs)
multiuser operating systems
multiuser, shared systems
MX record type
|