UNIX System Security: A Guide for Users and System AdministratorsMany of the same features that have attracted the corporate and government world to UNIX have made security very difficult to control. This book examines several high-profile security break-ins, and then provides the information necessary to protect a UNIX system from unauthorized access. Covers all the most recent releases of UNIX. |
Contents
UNIX Security Stories | 1 |
Account Security | 13 |
File System Security | 43 |
Copyright | |
16 other sections not shown
Other editions - View all
UNIX System Security: A Guide for Users and System Administrators David A. Curry No preview available - 1992 |
Common terms and phrases
allow anonymous FTP Athena attacker authentication available for anonymous backup Berkeley bits CERT/CC Charon chmod ciphertext command Computer Security computer system configuration connection copy crypt buf decrypt default delete device files dial-up electronic mail encrypted password Euripides example execute file system firewall home directory hosts.equiv huey implement inetd Internet Kerberos login name louie machine mode modem modified monitor netgroup operating system option output packet passwd password aging password file permissions plaintext procedures Protocol pw->pw_passwd remote system return buf rhosts files security policy security problems sendmail session key set-group-id set-user-id shadow password specified sticky bit strcmp stream tcp nowait Sun Microsystems SunOS system administrator System V Release tcp nowait root terminal ticket-granting trusted hosts ULTRIX UNIX security UNIX systems user id user's UUCP vendors versions of UNIX workstation worm writable