[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

rabbit programs  2nd 
race conditions 
radio transmissions
    computer malfunctions caused by 
    eavesdropping on  2nd 
RADIUS (Remote Authentication Dial-In User Service)  2nd  3rd 
RAID filesystems 
RAM theft 
rand() system call 
random device 
random numbers 
    device file abstractions for 
    requirements for 
    seeds  2nd 
random() system call 
raw devices 
rc script  2nd 
RC2 algorithm 
RC4 algorithm 
RC5 algorithm 
rcp command  2nd 
RCS (Revision Control System)  2nd 
RD (Receive Data) 
rdist program 
rdump/rrestore program 
read command 
READ function (RPC) 
read permission 
    directories 
    files 
read() system call, timeouts on 
read-only filesystems  2nd 
READADDR function (RPC) 
readdir() system call 
READDIRPLUS function (RPC) 
READLINK function (RPC) 
real GIDs 
real UIDs  2nd 
realpath() system call 
reboots
    logged by wtmp file 
    single-user 
Receive Data (RD) 
record locking, mandatory 
Red Hat Linux 
    default accounts for 
    sulog, scanning 
    X security 
reiserfs filesystem 
relative pathnames 
Remote Authentication Dial-In User Service  [See RADIUS]
remote command execution 
remote file  2nd 
Remote Job Entry (RJE) 
remote log server 
Remote Method Invocation (RMI) 
remote network filesystems 
Remote Procedure Call  [See RPC]
REMOVE function (RPC) 
RENAME function (RPC) 
renice command  2nd 
replay attacks  2nd 
replicated filesystems 
Request to Send (RTS) 
resolution, time 
resolv.conf file 
resolver library (BIND) 
resolving (DNS) 
response teams 
    mailing lists for 
    trusting 
restore  [See dump program]
restore program 
restricted accounts 
restricted filesystems 
restricted logins 
restricted shells 
restricted terminals 
restrictmailq option, sendmail 
retention of backups  [See backups, retention of]
return codes, checking 
reverse lookup  2nd 
Revision Control System (RCS)  2nd 
rexd service 
rexec service 
RFC (Request For Comments), web site for 
.rhosts file  2nd  3rd 
    back door in 
    searching for 
RI (Ring Indicator) 
Rijmen, Vincent 
Ring Indicator (RI) 
Rinjdael (AES) algorithm  2nd  3rd 
RIP (Routing Internet Protocol) 
risks  [See also cost-benefit analysis]
    assessment of  2nd 
    difficulty in analyzing 
    inability to eliminate 
    secondary 
RISKS mailing list 
Ritchie, Dennis
    discussing Unix security 
    The UNIX Programming Environment 
    Unix developed by 
Rivest, Ron  2nd  3rd 
    "A Method for Obtaining Digital Signatures" 
RJE (Remote Job Entry) 
rlogin program  2nd  3rd 
    compared to telnet 
    security and 
    verifying new password with 
rm command  2nd  3rd  4th 
RMDIR function (RPC) 
RMI (Remote Method Invocation) 
Rogue Programs: Viruses, Worms and Trojan Horses (Hoffman, Lance J.) 
ROM monitor passwords 
root account  [See also superuser]2nd 
    prompt for 
root domain server (NIS+) 
root user  [See superuser]
rootkits  2nd 
route service 
routed daemon 
routers 
routing 
Routing Internet Protocol (RIP) 
RPC (Remote Procedure Call)  2nd 
    authentication of 
    functions used with NFS 
    MOUNT based on  2nd 
    NFS built on 
    NFS protocol based on 
    portmapper program and  2nd  3rd  4th 
    rpc.rexd 
    Secure  2nd 
    security checklist for 
    spoofing 
    table (NIS+) 
rpc.mountd daemon 
rpc.rexd service 
rpcbind  [See portmapper program]
rpm command 
rpm files 
RPM Package Manager  2nd 
RS-232 serial protocol 
RSA algorithm 
RSA Data Security 
    factoring challenges 
    SSH using  2nd 
rsh (restricted shell) 
rsh program  2nd  3rd 
rshd program, back doors in 
rsync program  2nd 
RTS (Request to Send) 
rtty program 
RUID  [See real UIDs]
run levels 
runacct command 
Running Linux (Welsh, Matt; Kaufman, Lar; Dalheimer, Matthias K.; Dawson, Terry) 
Russell, Deborah (Computer Security Basics)