Team LiB   Previous Section
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

S/KEY 
SAINT 
salt 
Samba  2nd  3rd 
SASL (Simple Authentication and Security Layer)  2nd 
    configuring
        client-sever authentication, for 
        server-server authentication, for 
    methods 
    obtaining Cyrus SASL 
sasldb, SASL method 
scan types
    port scans 
        simple 
        stealth  2nd 
    security scans  2nd 
scanners
    port  [See nmap]
    security  [See also Nessus]
        explained 
        free 
    signature 
scanning
    options, OS fingerprinting 
    ranges of IP addresses for vulnerabilities 
    signatures, for  2nd 
    tools  2nd  [See also scanners]
    your own systems for weaknesses 
schain_hostnames, syslog-ng global option 
Scheidler, Balazs 
Schneier, Bruce  2nd  3rd 
scp, SSH tool  2nd  3rd 
    encrypted file transfers, and 
    rcp, and 
screate_dirs, syslog-ng global option 
screened-subnet architecture 
script kiddies  2nd 
sdir_group, syslog-ng global option 
sdir_owner, syslog-ng global option 
sdir_perm, syslog-ng global option 
secrets file, rsync option 
secure
    data transmission 
    network design 
    Telnet service example 
Secure FTP  [See SFTP]
Secure Shell  [See SSH]
Secure Shell Daemon  [See sshd]
Secure Sockets Layer  [See SSL]
SecureInetd.pm, InteractiveBastille module 
security
    enhancing 
    goals 
        data confidentiality 
        data integrity 
        system integrity 
        system/network availability 
        web 
    patches 
    planning 
    principles 
    scanners  [See also Nessus]
        explained 
        free 
    scans  2nd 
    updates
        Debian 
        manual application of 
        Red Hat 
        SuSE 
    web
        FAQ 
        goals and problems 
security in depth 
security-advisory email lists
    BUGTRAQ 
    VulnWatch 
security-announcement mailing lists 
    Redhat-Watch-list 
    suse-security-announce 
Sendmail  2nd  3rd  [See also sendmail.mc]4th 
    access database, configuring 
    aliases 
        converting to map file 
    architecture 
    configuration
        files  2nd 
        overview 
    configuring
        client-server authentication, for 
        sendmail.mc file 
        server-server authentication, for 
        to run semichrooted 
    daemon 
    daemon mode 
    database formats 
        btree 
        dbm 
        determining which formats are supported 
    Debian 
        versions, and 
    getting and installing 
    m4 scripts 
    mailertable file 
    message relay access 
    privacy flags 
    pros and cons 
    Red Hat 
        configuration preparation 
    STARTTLS, and 
    SuSE, and 
    versions that support
        SMTP AUTH 
        STARTTLS 
    virtual domains 
sendmail.cf file  2nd  3rd 
sendmail.mc file 
    configuring 
    directives
        feature  2nd 
        m4 variable definitions, Sendmail 
        mailer 
        masquerading  2nd 
    entry types
        comment 
    use_cw_file
        local-host-names 
Sendmail.pm, InteractiveBastille module 
server
    certificates 
        unencrypted keys 
    services  [See daemon]
server-server SMTP relays 
Server-Side Includes (SSI) 
ServerIdent, ProFTPD setting 
ServerName, ProFTPD setting 
ServerRoot, Apache option 
ServerType, ProFTPD setting 
session keys  2nd 
    SSL 
sessions and cookies explained 
set group-ID (SGID) 
set user-ID (SUID) 
SFTP 
    encrypted file transfers 
sftp, SSH tool  2nd 
SGID (set group-ID) 
sgroup, syslog-ng global option 
Shamir, Adi 
Shapiro, Gregory Neil 
shosts authentication 
Sidewinder 
signatures
    attack  2nd  [See also Snort rules]
        arachNIDS attack signature database 
    digital 
    scanning  2nd 
    signature-based systems 
        anomaly detection systems, and 
Simple Authentication and Security Layer  [See SASL]
Simple Mail Transfer Protocol  [See SMTP]
Simple Object Access Protocol (SOAP) 
simple packet filtering 
simple port scans 
simplefile, read-only HTTP and FTP server 
single-port TCP service 
site maintenance 
skeep_hostnames, syslog-ng global option 
SMB (CIFS)  [See Samba]
SMTP (Simple Mail Transfer Protocol) 
    attacks 
    commands
        EXPN 
        VERB 
        VRFY 
    firewalls, and 
    gateways  2nd  3rd  4th  5th  [See also Sendmail]
        aliases database, and 
        mailertable sample 
        server-server relaying 
        versus SMTP server with local user accounts 
    relays
        client-server 
        open 
        server-server 
    security 
    testing 
SMTP AUTH  2nd 
    Debian, and 
    email relay access, and 
    Sendmail version support 
    SSL, and 
    TLS encryption 
Snort  2nd  3rd 
    creating a database for 
    download site 
    IDS mode
        starting in 
        testing and watching logs 
    IDS, configuring and using Snort as an 
    obtaining, compiling, and installing 
    Oinkmaster 
    packet logger, using as a 
    packet sniffer, using as a 
    preprocessor plug-ins 
    rules 
        download site 
        updating automatically 
snort.conf file 
SOAP (Simple Object Access Protocol) 
SOCKS protocol 
software-development environments 
Song, Dug 
sowner, syslog-ng global option 
Spafford, Gene  2nd 
SpamAssassin 
spamming 
sperm, syslog-ng global option 
spiders and robots 
Spitzner, Lance  2nd 
split DNS  2nd 
spoofing  2nd  3rd 
    attacks and TSIG 
    iptables
        anti-spoofing rules 
    spoofed packets  2nd 
SSH (Secure Shell)  [See also OpenSSH]2nd  3rd 
    file sharing, and 
    history of 
    how it works 
    quick start instructions 
    RSA/DSA keys, and 
    tools
        scp 
        sftp 
        ssh 
        ssh-add  2nd 
        ssh-agent  2nd 
        ssh-askpass 
        ssh-keygen 
        sshd 
    using to execute remote commands 
SSH Communications Security 
ssh, SSH tool 
    compared to Telnet 
ssh-add, SSH tool  2nd 
ssh-agent, SSH tool  2nd 
ssh-askpass, SSH tool 
ssh-keygen, SSH tool  2nd 
ssh_config file  2nd  3rd 
    parameters
        CheckHostIP 
        Cipher 
        Ciphers 
        Compression 
        ForwardX11 
        PasswordAuthentication 
sshd (Secure Shell Daemon) 
    configuring and running 
sshd_config file  2nd  3rd  4th 
    parameters
        PasswordAuthentication 
        PermitEmptyPasswords 
        PermitRootLogin 
        Port 
        X11Forwarding 
SSI (Server-Side Includes) 
SSL (Secure Sockets Layer)  [See also OpenSSL]
    Apache, and 
    client-certificate authentication 
    history of 
    overview 
    session
        authentication 
        keys 
    SMTP AUTH, and 
    SSH, and 
    transactions, Certificate Authorities, and 
SSL-wrapper utility 
SSLeay 
sslog_fifo_size, syslog-ng global option 
SSLwrap 
ssync, syslog-ng global option 
Start-of-Authority (SOA) record 
STARTTLS 
    email relay access, and 
    Sendmail version support 
    Sendmail, and 
startup services, managing 
state-based systems  [See anomaly detection systems]
Stateful Inspection 
stateful packet filtering 
    defined 
static content and Apache 
statically linked versions of Apache 
stealth logging 
stealth scanning  2nd 
Stein, Lincoln 
stime_reap, syslog-ng global option 
stime_reopen, syslog-ng global option 
Stoll, Cliff 
stream ciphers 
    defined 
Stunnel  [See also tunneling]
    certificate-based authentication  2nd 
    client certificates, and 
    compile-time options 
    concepts 
    configure options 
    daemon 
    daemon mode
        example 
        running in  2nd 
    differences between running in client and server mode 
    Inetd mode 
    iptables, and 
    OpenSSL, and 
    options 
    POP3, and 
    port-forwarding 
    rsync, and 
    x.509 certificate authentication 
su 
subnets
    strong screened 
    weak screened 
sudo  2nd 
suEXEC 
SUID (set-user ID) 
SuSE
    OpenSSH, and 
    OpenSSL home directory 
    security updates 
    Sendmail preparation 
    suse-security-announce mailing list 
suse_dns, syslog-ng global option 
suse_fqdn, syslog-ng global option 
suse_times_recvd, syslog-ng global option 
SuSEÕs Proxy Suite 
Swatch  2nd 
    actions 
    configuring 
    file synchronization, and 
    fine-tuning 
    installing 
    running 
    throttle parameter 
Symantec Enterprise Firewall 
symmetric algorithm, defined 
synchronization of log files 
syslog 
    access control mechanisms 
    actions 
        chart summary 
    configuring 
    facilities
        auth 
        auth-priv, syslog 
        chart summary 
        daemon 
        kern 
        local7 
        mark 
        multiple 
        none 
        user 
    logging
        email and uucp messages 
        remote 
        stealth 
    mapping of actions to facilities and priorities 
    priorities 
        chart summary 
    TCPwrappers, and 
syslog-ng  2nd 
    as its own log watcher, example 
    compiling and installing 
    configuring 
    creating new directories for its log files 
    destination drivers 
    file synchronization 
    global options 
    libol (support library) 
    log{} statements 
    message filters 
    message sources 
    official (maintained) documentation 
    running 
    startup flags 
    supported source drivers 
syslog-ng.conf file
    example 
    options{} section 
syslog.conf file 
    default 
    multiple facilities 
    multiple selectors 
syslogd  2nd 
    flags 
    mark, turning on 
    running 
    unpredictable behavior 
SyslogFacility, ProFTPD setting 
system
    log management and monitoring 
    log monitoring tools  [See Swatch]
system availability  2nd 
system integrity 
    overview 
system-integrity checker
    Tripwire 

Team LiB   Previous Section