[ Team LiB ]

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

m4 macro processor 
MAC addresses
    controlling access by 
    spoofed 
mail  [See email IMAP POP]
Mail application (Mozilla) 
mail clients
    connecting to mail server over SSL 
    support for secure POP and IMAP using SSL 
mail facility (system messages) 
mail servers
    receiving Internet email without visible server 
    support for SSL 
    testing SSL connection locally 
Mailcrypt
    mc-deactivate-passwd to force passphrase erasure 
    official web site 
    using with GnuPG 
mailpgp (script for encrypting/sending email) 
mailsnarf command 
    -v option, capturing only unencrypted messages 
malicious program, /tmp/ls 
man-in-the-middle (MITM) attacks
    dsniff, proof of concept with 
    self-signed certificates, risk of 
    services deployed with dummy keys 
manual integrity checks 
mask format, CIDR 
Massachusetts Institute of Technology (MIT) Kerberos 
matching anything (ALL keyword)  2nd 
max_load keyword (xinetd)  2nd 
mc-encrypt function 
MD5 checksum
    verifying for RPM-installed files 
merging system log files 
MH (mail handler) 
mirroring a set of files securely between machines 
MIT Kerberos 
MITM  [See man-in-the-middle attacks]
modules
    PAM 
        CrackLib 
        listfile  2nd 
        pam_stack 
    Perl
        Sys::Lastlog and Sys::Utmp 
        Sys::Syslog 
        XML::Simple 
monitoring systems for suspicious activity 
    account use 
        checking on multiple systems 
    device special files 
    directing system messages to log files 
    displaying executed commands 
    executed command, monitoring 
    filesystems 
        searching effectively 
    finding accounts with no password 
    finding superuser accounts 
    finding writable files 
    insecure network protocols, detecting 
    local network activities 
    log files, combining 
    logging 
    login passwords 
    logins and passwords 
    logwatch filter for services not supported 
    lsof command, investigating processes with 
    network-intrusion detection with Snort  2nd 
        decoding alert messages 
        logging output 
        partitioning logs into files 
        ruleset, upgrading and tuning 
    networking 
    observing network traffic 
        with Ethereal GUI 
    open network ports, testing for 
    packet sniffing with Snort 
    recovering from a hack 
    rootkits 
    rotating log files 
    scanning log files for problem reports 
    search path, testing 
    searching for strings in network traffic 
    security incident report, filing 
    sending messages to system logger 
    setuid and setgid programs, insecure 
    syslog configuration, testing 
    syslog messages, logging remotely 
    tracing processes 
    writing system log entries
        shell scripts 
        with C 
        with Perl scripts 
monitoring tools for networks
    NIH page 
    web page information on 
morepgp (script for decrypting/reading email) 
mount command 
    -o nodev (prohibiting device special files) 
    grpid option 
    noexec option 
    nosuid option 
    setuid and setgid programs, protecting against misuse 
mounts file (/proc) 
Mozilla
    certificate storage 
    encrypted mail with Mail & Newsgroups 
Muffet, Alec (Crack utility) 
multi-homed hosts
    firewall for 
    SSH client, problems with canonical hostname 
multi-homed server machines, socket mail server is listening on 
multicast packets 
multithreaded services (in inetd.conf) 
mutt mailer 
    home web page 
    securing POP/IMAP with SSL 

[ Team LiB ]