[ Team LiB ]

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

tar utility
    bundling files into single file and encrypting the tarball 
    encrypted backups, creating with gpg 
    encrypting all files in directory 
TCP
    enabling/disabling service invocation by inetd 
    IPID Sequence tests and, measuring vulnerability to forged connections 
    pings for host discovery, use by nmap 
    preventing service invocation by xinetd 
    reassembling streams with libnids 
    redirection of connections with SSH tunneling 
    restricting access by remote hosts (inetd) 
    restricting access by remote hosts (xinetd) 
    restricting access by remote users 
    RST packets for blocked ports, returned by firewall 
    slowing or killing connections, simulation with dsniff 
    stream reassembly with libnids 
    testing for open port 
    testing port by trying to connect with Telnet 
    tunneling session through SSH 
TCP-wrappers
    controlling incoming access by particular hosts or domains 
    sshd, built-in support for 
TCP/IP connections
    DROP vs. REJECT 
    rejecting TCP packets that initiate connections 
tcpd
    restricting access by remote hosts
        using with xinetd 
    using with inetd to restrict remote host access 
tcpdump (packet sniffer) 
    -i any options, using ifconfig before 
    -i option (to listen on a specific interface) 
    -r option, reading/displaying network trace data 
    -w option (saving packets to file) 
    libcap (packet capture library) 
    payload display 
    printing information about nmap port scan 
    selecting specific packets with capture filter expression 
    snapshot length 
    verifying secure mail traffic 
tcsh shell
    terminating SSH agent on logout 
TCT (The CoronerÕs Toolkit) 
tee command 
Telnet
    access control
        blocking all outgoing connections 
        restricting access by time of day 
        restricting for remote hosts (xinetd with libwrap) 
    disabling/enabling invocation by xinetd 
    Kerberos authentication with PAM 
    Kerberos authentication, using with 
    passwords captured from sessions with dsniff 
    security risks of 
    testing TCP port by trying to connect 
telnetd, configuring to require strong authentication 
terminals
    Linux recording of for each user 
    preventing superuser (root) from logging in via 
testing systems for security holes  [See monitoring systems for suspicious activity]
tethereal 
text editors, using encryption features for email 
text-based certificate format  [See PEM format]
Thawte (Certifying Authority) 
threading, listing for new service in inetd.conf 
tickets, Kerberos 
    for IMAP on the mail server 
    SSH client, obtaining for 
ticks 
time of day, restricting service access by 
timestamps
    recorded by system logger for each message 
    in Snort filenames 
    sorting log files by 
    verifying for RPM-installed files 
TLS (Transport Layer Security)  [See SSL]
tracing network system calls 
Transport Layer Security (TLS)  [See SSL]
Tripwire 
    checking Windows VFAT filesystems 
    configuration 
    database 
        adding files to 
        excluding files from 
        updating to ignore discrepancies 
    displaying policy and configuration 
    download site for latest version 
    download sites 
    highly secure integrity checks 
    integrity check 
    integrity checking, basic 
    manual integrity checks, using instead of 
    policy 
    policy and configuration, modifying 
    printing latest report 
    protecting files against attacks 
    read-only integrity checks 
    remote integrity checking 
    RPM-installed files, verifying 
    setting up 
        twinstall.sh script 
    using rsync instead of 
    weaknesses 
Trojan horses
    checking for with chkrootkit 
    planted in commonly-used software packages 
trust, web of 
trusted certificates 
trusted public keys (GnuPG) 
trusted-host authentication 
    canonical hostname, finding for client 
    implications of
        strong trust of client host 
        weak authorization controls 
tty item (PAM) 
tunneling
    TCP session through SSH 
    transferring your email from another ISP with SSH 
twcfg.txt file 
twinstall.sh script (Tripwire) 
twpol.txt file 
twprint program 

[ Team LiB ]