[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

VA Linux 
vacation program 
vampire taps 
vandalism 
vandals, computer  [See intruders]
/var directory  [See also /usr firectory]2nd 
    /var/adm directory 
    /var/adm/acct file 
    /var/adm/lastlog file 
    /var/adm/loginlog file 
    /var/adm/messages file 
    /var/adm/savacct file 
    /var/adm/wtmp file 
    /var/log directory 
variables, bounds checking 
Varley, John (Press Enter) 
VC-I video encryption algorithm 
vendors
    security
        access given to 
        all-in-one contracts 
        corporate stability of 
        evaluating employees of 
        experience of 
        hackers as 
        mailing lists for 
        referrals and references for 
        trusting 
    software
        loss of 
        trusting  2nd 
Venema, Wietse  2nd  3rd  4th  5th  6th  7th 
ventilation
    access through 
    holes (in hardware) 
VERB command, SMTP 
vfork() system call 
vfstab file 
vi editor  2nd  3rd 
vibrations, effects on hardware 
Viega, John (Building Secure Software) 
Vinge, Vernor (True Names and Other Dangers) 
vipw command 
virtual filesystem interface 
Virtual Light (Gibson, William) 
virtual nodes 
Virtual Private Network (VPN) 
The Virus Bulletin 
viruses  2nd 
    on distribution disk 
    email 
    published resources on 
visitors, security regarding 
vnode interface  [See virtual filesystem interface]
vold.log file 
voltage spikes  [See power, surges]
VonStorch, William (Computer Crime: A Crimefighter's Handbook) 
VPN (Virtual Private Network) 
VRFY command, SMTP  2nd  3rd 
vsnprintf() system call 
vsprintf() system call  2nd 
vsyslog() system call