[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]
UMAC32
umasks
universal hash functions
Unix
2nd
access control
restricting for new files
creating temporary files
crypt( )
cryptographic algorithms, timing on
debuggers and ptrace
domain sockets, authentication using
operating systems, differences among
entropy gathering from keyboards
from system state
from threads
entropy, observable on
environment variables, dependencies on
external programs, executing
locking files
passwords, prompting for
recipes for
resource starvation attacks, preventing
setrlimit( ), limiting resources with
restricting filesystem access
signal handling
guidelines
program termination
writing signal handlers
standard randomness infrastructure, using
user and group information, getting
UnlockFile( )
UnlockFileEx( )
unsetenv( )
URLs (Uniform Resource Locators) evaluating encodings of
user IDs
users, acquiring information about on Unix
on Windows
using a high-level, error-resistant encryption and decryption API
UTF-8 encoding
detecting illegal characters
invalid sequences
|