[ Team LiB ]

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

UMAC32 
umasks 
universal hash functions 
Unix  2nd 
    access control 
        restricting for new files 
    creating temporary files 
    crypt( ) 
    cryptographic algorithms, timing on 
    debuggers and ptrace 
    domain sockets, authentication using 
        operating systems, differences among 
    entropy gathering
        from keyboards 
        from system state 
        from threads 
    entropy, observable on 
    environment variables, dependencies on 
    external programs, executing 
    locking files 
    passwords, prompting for 
    recipes for 
    resource starvation attacks, preventing 
        setrlimit( ), limiting resources with 
    restricting filesystem access 
    signal handling 
        guidelines 
        program termination 
        writing signal handlers 
    standard randomness infrastructure, using 
    user and group information, getting 
UnlockFile( ) 
UnlockFileEx( ) 
unsetenv( ) 
URLs (Uniform Resource Locators)
    evaluating encodings of 
user IDs 
users, acquiring information about
    on Unix 
    on Windows 
using a high-level, error-resistant encryption and decryption API 
UTF-8 encoding 
    detecting illegal characters 
    invalid sequences 

[ Team LiB ]