[ Team LiB ]

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

kadmin utility 
    adding Kerberos principals to IMAP mail server 
    adding users to existing realm 
    modifying KDC database for host 
    running on new host 
    setting server to start at boot 
kadmind command (Kerberos) 
kaserver (Andrew Filesystem) 
kdb5_util command (Kerberos) 
KDC  [See Key Distribution Center]
KDE applications, certificate storage 
Kerberos authentication 
    in /etc/pam.d startup file 
    hosts, adding to existing realm 
    IMAP, using with 
    Key Distribution Centers (KDCs) 
    ksu 
    ksu command 
    PAM, using with 
    without passwords 
    POP, using with 
    setting up MIT Kerberos-5 KDC 
    sharing root privileges via 
    SSH, using with 
        debugging 
        SSH-1 protocol 
    Telnet, using with 
    users, adding to existing realm 
    web site (MIT) 
KerberosTgtPassing (in sshd_config) 
kernel
    /proc files and 
    collection of messages from by system logger 
    enabling source address verification 
    IP forwarding flag 
    ipchains (Versions 2.2 and up) 
    iptables (Versions 2.4 and up) 
    process information recorded on exit 
    runtime integrity checkers 
    source address verification, enabling 
Key Distribution Center (KDC), setting up for MIT Kerberos-5 
keyring files (GnuPG) 
    adding keys to 
    viewing keys on 
        information listed for keys 
keys, cryptographic  [See also cryptographic authentication]
    adding to GnuPG keyring 
    backing up GnuPG private key 
    dummy keypairs for imapd and pop3d 
    encrypting files for others with GnuPG 
    generating key pair for GnuPG 
    GnuPG, viewing on your keyring 
    key pairs in public-key encryption 
    keyring files for GnuPG keys 
    obtaining from keyserver and verifying 
    OpenSSH programs for creating/using 
    PGP keys, using in GnuPG 
    revoking a public key 
    sharing public keys securely 
    Tripwire 
    viewing on GnuPG keyring 
keyserver
    adding key to 
    informing that a public keys is no longer valid 
    obtaining keys from 
    uploading new signatures to 
killing processes
    authorizing users to kill via sudo command 
    pidof command, using 
    terminating SSH agent on logout 
kinit command (Kerberos)  2nd  3rd 
    -f option (forwardable credentials) 
klist command (Kerberos)  2nd 
known hosts database (OpenSSH server) 
kpasswd command (Kerberos) 
krb5.conf file, copying to new Kerberos host 
krb5.keytab file 
krb5kdc 
kstat (integrity checker) 
ksu (Kerberized su)
    authentication via Kerberos 
    sharing root privileges via 

[ Team LiB ]