[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Y]
[Z]
S/KEY
SAINT
salt
Samba
2nd
3rd
SASL (Simple Authentication and Security Layer)
2nd
configuring client-sever authentication, for
server-server authentication, for
methods
obtaining Cyrus SASL
sasldb, SASL method
scan types port scans
simple
stealth
2nd
security scans
2nd
scanners port
[See nmap] security
[See also Nessus] explained
free
signature
scanning options, OS fingerprinting
ranges of IP addresses for vulnerabilities
signatures, for
2nd
tools
2nd
[See also scanners] your own systems for weaknesses
schain_hostnames, syslog-ng global option
Scheidler, Balazs
Schneier, Bruce
2nd
3rd
scp, SSH tool
2nd
3rd
encrypted file transfers, and
rcp, and
screate_dirs, syslog-ng global option
screened-subnet architecture
script kiddies
2nd
sdir_group, syslog-ng global option
sdir_owner, syslog-ng global option
sdir_perm, syslog-ng global option
secrets file, rsync option
secure data transmission
network design
Telnet service example
Secure FTP
[See SFTP] Secure Shell
[See SSH] Secure Shell Daemon
[See sshd] Secure Sockets Layer
[See SSL] SecureInetd.pm, InteractiveBastille module
security enhancing
goals
data confidentiality
data integrity
system integrity
system/network availability
web
patches
planning
principles
scanners
[See also Nessus] explained
free
scans
2nd
updates Debian
manual application of
Red Hat
SuSE
web FAQ
goals and problems
security in depth
security-advisory email lists BUGTRAQ
VulnWatch
security-announcement mailing lists
Redhat-Watch-list
suse-security-announce
Sendmail
2nd
3rd
[See also sendmail.mc]4th
access database, configuring
aliases
converting to map file
architecture
configuration files
2nd
overview
configuring client-server authentication, for
sendmail.mc file
server-server authentication, for
to run semichrooted
daemon
daemon mode
database formats
btree
dbm
determining which formats are supported
Debian
versions, and
getting and installing
m4 scripts
mailertable file
message relay access
privacy flags
pros and cons
Red Hat
configuration preparation
STARTTLS, and
SuSE, and
versions that support SMTP AUTH
STARTTLS
virtual domains
sendmail.cf file
2nd
3rd
sendmail.mc file
configuring
directives feature
2nd
m4 variable definitions, Sendmail
mailer
masquerading
2nd
entry types comment
use_cw_file local-host-names
Sendmail.pm, InteractiveBastille module
server certificates
unencrypted keys
services
[See daemon] server-server SMTP relays
Server-Side Includes (SSI)
ServerIdent, ProFTPD setting
ServerName, ProFTPD setting
ServerRoot, Apache option
ServerType, ProFTPD setting
session keys
2nd
SSL
sessions and cookies explained
set group-ID (SGID)
set user-ID (SUID)
SFTP
encrypted file transfers
sftp, SSH tool
2nd
SGID (set group-ID)
sgroup, syslog-ng global option
Shamir, Adi
Shapiro, Gregory Neil
shosts authentication
Sidewinder
signatures attack
2nd
[See also Snort rules] arachNIDS attack signature database
digital
scanning
2nd
signature-based systems
anomaly detection systems, and
Simple Authentication and Security Layer
[See SASL] Simple Mail Transfer Protocol
[See SMTP] Simple Object Access Protocol (SOAP)
simple packet filtering
simple port scans
simplefile, read-only HTTP and FTP server
single-port TCP service
site maintenance
skeep_hostnames, syslog-ng global option
SMB (CIFS)
[See Samba] SMTP (Simple Mail Transfer Protocol)
attacks
commands EXPN
VERB
VRFY
firewalls, and
gateways
2nd
3rd
4th
5th
[See also Sendmail] aliases database, and
mailertable sample
server-server relaying
versus SMTP server with local user accounts
relays client-server
open
server-server
security
testing
SMTP AUTH
2nd
Debian, and
email relay access, and
Sendmail version support
SSL, and
TLS encryption
Snort
2nd
3rd
creating a database for
download site
IDS mode starting in
testing and watching logs
IDS, configuring and using Snort as an
obtaining, compiling, and installing
Oinkmaster
packet logger, using as a
packet sniffer, using as a
preprocessor plug-ins
rules
download site
updating automatically
snort.conf file
SOAP (Simple Object Access Protocol)
SOCKS protocol
software-development environments
Song, Dug
sowner, syslog-ng global option
Spafford, Gene
2nd
SpamAssassin
spamming
sperm, syslog-ng global option
spiders and robots
Spitzner, Lance
2nd
split DNS
2nd
spoofing
2nd
3rd
attacks and TSIG
iptables anti-spoofing rules
spoofed packets
2nd
SSH (Secure Shell)
[See also OpenSSH]2nd
3rd
file sharing, and
history of
how it works
quick start instructions
RSA/DSA keys, and
tools scp
sftp
ssh
ssh-add
2nd
ssh-agent
2nd
ssh-askpass
ssh-keygen
sshd
using to execute remote commands
SSH Communications Security
ssh, SSH tool
compared to Telnet
ssh-add, SSH tool
2nd
ssh-agent, SSH tool
2nd
ssh-askpass, SSH tool
ssh-keygen, SSH tool
2nd
ssh_config file
2nd
3rd
parameters CheckHostIP
Cipher
Ciphers
Compression
ForwardX11
PasswordAuthentication
sshd (Secure Shell Daemon)
configuring and running
sshd_config file
2nd
3rd
4th
parameters PasswordAuthentication
PermitEmptyPasswords
PermitRootLogin
Port
X11Forwarding
SSI (Server-Side Includes)
SSL (Secure Sockets Layer)
[See also OpenSSL] Apache, and
client-certificate authentication
history of
overview
session authentication
keys
SMTP AUTH, and
SSH, and
transactions, Certificate Authorities, and
SSL-wrapper utility
SSLeay
sslog_fifo_size, syslog-ng global option
SSLwrap
ssync, syslog-ng global option
Start-of-Authority (SOA) record
STARTTLS
email relay access, and
Sendmail version support
Sendmail, and
startup services, managing
state-based systems
[See anomaly detection systems] Stateful Inspection
stateful packet filtering
defined
static content and Apache
statically linked versions of Apache
stealth logging
stealth scanning
2nd
Stein, Lincoln
stime_reap, syslog-ng global option
stime_reopen, syslog-ng global option
Stoll, Cliff
stream ciphers
defined
Stunnel
[See also tunneling] certificate-based authentication
2nd
client certificates, and
compile-time options
concepts
configure options
daemon
daemon mode example
running in
2nd
differences between running in client and server mode
Inetd mode
iptables, and
OpenSSL, and
options
POP3, and
port-forwarding
rsync, and
x.509 certificate authentication
su
subnets strong screened
weak screened
sudo
2nd
suEXEC
SUID (set-user ID)
SuSE OpenSSH, and
OpenSSL home directory
security updates
Sendmail preparation
suse-security-announce mailing list
suse_dns, syslog-ng global option
suse_fqdn, syslog-ng global option
suse_times_recvd, syslog-ng global option
SuSEÕs Proxy Suite
Swatch
2nd
actions
configuring
file synchronization, and
fine-tuning
installing
running
throttle parameter
Symantec Enterprise Firewall
symmetric algorithm, defined
synchronization of log files
syslog
access control mechanisms
actions
chart summary
configuring
facilities auth
auth-priv, syslog
chart summary
daemon
kern
local7
mark
multiple
none
user
logging email and uucp messages
remote
stealth
mapping of actions to facilities and priorities
priorities
chart summary
TCPwrappers, and
syslog-ng
2nd
as its own log watcher, example
compiling and installing
configuring
creating new directories for its log files
destination drivers
file synchronization
global options
libol (support library)
log{} statements
message filters
message sources
official (maintained) documentation
running
startup flags
supported source drivers
syslog-ng.conf file example
options{} section
syslog.conf file
default
multiple facilities
multiple selectors
syslogd
2nd
flags
mark, turning on
running
unpredictable behavior
SyslogFacility, ProFTPD setting
system log management and monitoring
log monitoring tools
[See Swatch] system availability
2nd
system integrity
overview
system-integrity checker Tripwire
|