[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Y]
[Z]
"An Empirical Study of the Reliability of UNIX Utilities" (Miller, Barton P.; Fredriksen, Lars; So,
"Codes, Keys, and Conflicts: Issues in U.S. Crypto Policy" (Association for Computing Machinery)
"Computation of Discrete Logarithms in Prime Fields" (LaMacchia, Brian A. and Odlyzko, Andrew M.)
"Hiding Information and Signatures in Trap Door Knapsacks" (Merkle, Ralph and Hellman, Martin E.)
"New Directions in Cryptography" (Diffie, Whitfield and Hellman, Martin E.)
"On the Design and Security of Block Ciphers" (Lai, Xuejia)
"On the Security of Multiple Encryption" (Merkle, Ralph and Hellman, Martin E.)
"Reflections on Trusting Trust" (Thompson, Ken)
"Secure Communication Over Insecure Channels" (Merkle, Ralph)
"The First Ten Years of Public-Key Cryptography" (Diffie, Whitfield)
"UNIX Operating System Security" (Grampp, F. T. and Morris, R. H.)
# (hash mark) disabling services with
Unix superuser prompt
$ (dollar sign), as Unix Bourne or Korn shell prompt
% (percent sign), Unix C shell prompt
() (parentheses), indicating system call
(ISC)2 (International Information Systems Security Certification Consoritium, Inc.)
+ (plus sign) in file permissions
in hosts.equiv file
in NIS
2nd
. (dot) directory
2nd
.. (dot-dot) directory
2nd
.forward file
.indent hidden file
.profile file
.rhosts file modified by intruders
.shosts file, back door in
.ssh/authorized_keys file modified by intruders
/ (slash) as IFS separator
pathnames beginning with
/bin directory
/dev directory /dev/klog device
/etc directory /etc/aliases file
2nd
/etc/crontab file
/etc/default/su file
/etc/dfs/dfstab file
2nd
/etc/dfs/dfstab script
/etc/dfs/sharetab file
/etc/exports file
2nd
3rd
/etc/fstab file
/etc/group file
2nd
/etc/hosts file
/etc/hosts.allow file
2nd
3rd
/etc/hosts.deny file
2nd
3rd
/etc/hosts.equiv file
2nd
/etc/hosts.lpd file
/etc/inetd.conf file
2nd
3rd
4th
/etc/init.d directory
2nd
/etc/logindevperm file
/etc/mail/aliases file
2nd
3rd
/etc/master.passwd file
2nd
/etc/named.conf file
/etc/netgroup file
/etc/netgroups file
2nd
/etc/nsswitch.conf file
/etc/pam.conf file
2nd
/etc/pam.d directory
2nd
/etc/passwd file
2nd
3rd
4th
5th
6th
7th
8th
/etc/periodic/security directory
/etc/rc directory
/etc/rc script
/etc/rcn.d directory
/etc/remote file
/etc/resolv.conf file
/etc/securetty file
/etc/security/console.perms file
/etc/security/passwd file
/etc/sendmail/aliases file
/etc/services file
2nd
/etc/shadow file
2nd
3rd
/etc/smb.conf file
/etc/sudoers file
/etc/syslog.conf file
2nd
/etc/ttys file
2nd
/etc/ttytab file
/etc/vfstab file
/etc/X0.hosts file
/etc/xinetd.d directory
network servers in
/proc directory
/System/Library/Startup Items directory
/usr directory /usr//lib/crontab files
/usr/adm directory
/usr/etc directory
/usr/etc/exportfs program
/usr/etc/netgroup file
/usr/lib directory
/usr/lib/aliases file
2nd
/usr/libexec directory
/usr/local/etc/rc.d directory
/usr/local/src directory
/usr/sbin directory
/usr/src directory
/var directory /var/account/acct file
/var/adm directory
2nd
/var/adm/messages file
/var/log directory
2nd
/var/log/messages file
/var/xferlog file
/var/yp/securenets file
@ Large (Freedman, David H. and Mann, Charles C.)
@ (at sign), in xhost list
[] (square brackets), indicating optional syntax
^, indicating control character
_ (underscore), in hostnames
~ (tilde) ~! in mail messages
for home directory
3DES
[See Triple-DES algorithm]
|