S

S command (sendmail), The Set Ruleset Command
SAINT (automated system monitoring), Automated Monitoring
Samba, Print Services, Using Samba to Share Resources with Windows, Using Samba to Share Resources with Windows, Configuring a Samba ServerThe smb.conf homes section, Configuring a Samba Server, Sharing directories through Samba, Sharing printers through SambaSharing printers through Samba, NetBIOS Name Service
daemon, Using Samba to Share Resources with Windows
directory sharing, Sharing directories through Samba
name servers, NetBIOS Name Service
overview, Using Samba to Share Resources with Windows
passwords, Configuring a Samba Server
printer sharing, Print Services, Sharing printers through SambaSharing printers through Samba
server, configuring, Configuring a Samba ServerThe smb.conf homes section
SANS (System Administration, Networking and Security) Institute web site, Use the network to distribute information
SARA (automated system monitoring), Automated Monitoring
SAY command (chat), chat
scalability, Internet Routing Architecture, The Host Table, DNS, Obtaining an IP Address
address translation compared to proxy servers, Obtaining an IP Address
DNS, DNS
gateway hierarchy, Internet Routing Architecture
host tables, The Host Table
scaninterval (gated), Interface Statements
ScoreBoardFile directives (httpd.conf file), Defining Where Things Are Stored
scp (secure copy), Secure Shell
screened subnet firewall architecture, Firewalls
ScriptAlias directive (httpd.conf file), Defining Where Things Are Stored
scripts, system initialization, Understanding /etc/inittab
search entry (resolv.conf file), The Resolver Configuration File
sec= option (vfstab file), The vfstab and fstab files
sec=type option (share command), The share command
secondary servers, BIND, Resolvers, and named
secret field (chap-secrets file), PPP Daemon Security
secring.gpg file, Public-Key Encryption Tools
secure servers, bastion hosts, Firewalls
security, Connected and Non-Connected Networks, Connected and Non-Connected Networks, Obtaining an IP Address, Obtaining an IP Address, Obtaining an IP Address, The PPP Daemon, PPP Daemon SecurityPPP Daemon Security, The share command, Configuring a Samba Server, Web Server Security, The CGI and SSI Threat, The CGI and SSI Threat, Security Planning, Assessing the Threat, Distributed Control, Use subnets to distribute control, Use the network to distribute information, Use the network to distribute information, Writing a Security Policy, User Authentication, The Shadow Password FileThe Shadow Password File, Choosing a Password, One-Time Passwords, OPIEOPIE, Secure the r CommandsSecure the r Commands, Secure the r Commands, Secure ShellSecure Shell, Secure Shell, Secure Shell, Remove Unnecessary Software, Keep Software Updated, Know Your System, Looking for Trouble, Checking files, Checking login activity, Access Control, tcpd access control filestcpd access control files, Defining an optional shell command, Optional access control language extensions, Encryption, Encryption, When Is Symmetric Encryption Useful?, Public-Key Encryption ToolsPublic-Key Encryption Tools, stunnelstunnel, FirewallsFirewalls, Functions of the Firewall, Filtering Traffic with iptables, Defining iptables filter rules, Words to the Wise, chat, chat
access control, Access Control, tcpd access control filestcpd access control files, Defining an optional shell command, Optional access control language extensions
language extensions, Optional access control language extensions
overview, Access Control
shell command, Defining an optional shell command
tcpd, tcpd access control filestcpd access control files
aclok option (share command), The share command
address spoofing, Obtaining an IP Address
address translation, Obtaining an IP Address
applications, Remove Unnecessary Software, Keep Software Updated
removing unnecessary, Remove Unnecessary Software
updating, Keep Software Updated
authentication, The Shadow Password FileThe Shadow Password File, Secure Shell
shadow password files, The Shadow Password FileThe Shadow Password File
ssh, Secure Shell
chat, chat
dedicated connections and, The PPP Daemon
distributing responsibility, Distributed Control, Use subnets to distribute control
subnets, Use subnets to distribute control
encryption, Encryption, Encryption, When Is Symmetric Encryption Useful?, Public-Key Encryption ToolsPublic-Key Encryption Tools, stunnelstunnel
public key, Encryption
public key tools, Public-Key Encryption ToolsPublic-Key Encryption Tools
stunnel, stunnelstunnel
symmetric, When Is Symmetric Encryption Useful?
firewalls, FirewallsFirewalls, Functions of the Firewall, Filtering Traffic with iptables, Defining iptables filter rules
filtering routers, Filtering Traffic with iptables
functions of, Functions of the Firewall
iptables command, Defining iptables filter rules
overview, FirewallsFirewalls
information resources, Use the network to distribute information
Internet connection considerations, Connected and Non-Connected Networks
passwords, Choosing a Password, One-Time Passwords, OPIEOPIE
one-time, One-Time Passwords
OPIE, OPIEOPIE
selecting, Choosing a Password
planning, overview, Security Planning
policies, creating, Writing a Security Policy
PPP, PPP Daemon SecurityPPP Daemon Security
proxy servers, Obtaining an IP Address
r commands (Unix), Secure the r CommandsSecure the r Commands, Secure Shell
disabling, Secure Shell
resources, Words to the Wise
risks, Connected and Non-Connected Networks, Assessing the Threat
types of, Assessing the Threat
Samba, encrypted passwords, Configuring a Samba Server
ssh, Secure ShellSecure Shell
system monitoring, Know Your System, Looking for Trouble, Checking files, Checking login activity
find command, Checking files
intruder detection, Looking for Trouble
login activity, Checking login activity
trusted hosts, Secure the r Commands
user authentication, User Authentication
vendors, information mailing lists, Use the network to distribute information
web servers, Web Server Security, The CGI and SSI Threat, The CGI and SSI Threat
CGI scripts, The CGI and SSI Threat
overview, Web Server Security
SSI, The CGI and SSI Threat
security parameter (smb.config file), Configuring a Samba Server
segment header, TCP Segment Header
segments, TCP/IP Protocol Architecture, Transmission Control Protocol, Transmission Control Protocol
format, Transmission Control Protocol
TCP headers, Transmission Control Protocol
SELECT command (IMAP), Internet Message Access Protocol
send (gated), Trace Statements
send command (dip), Dial-Up PPP, The dip Script File
sendbuffer parameter (gated), The bgp Statement
Sender fields (sendmail), Defining Mailers
sendmail, sendmail’s Function, sendmail’s Function, sendmail’s FunctionUsing Key Files in sendmail, Running sendmail as a Daemon, Running sendmail as a Daemon, Running sendmail as a Daemon, sendmail Aliases, Personal Mail Forwarding, The sendmail.cf File, Locating a Sample sendmail.cf File, Locating a Sample sendmail.cf File, Building a sendmail.cf with m4 macrosBuilding a sendmail.cf with m4 macros, Building a sendmail.cf with m4 macros, General sendmail.cf Structure, sendmail.cf Configuration Language, sendmail.cf Configuration Language, The Version Level Command, The Define Macro Command, Conditionals, Defining Classes, Setting Options, Defining Trusted Users, Defining Mail Precedence, Defining Mail Headers, Defining Mailers, Some common mailer definitions, Rewriting the Mail Address, Pattern Matching, Transforming the AddressTransforming the Address, Transforming with a database, The Set Ruleset Command, Modifying a sendmail.cf File, Modifying Local InformationModifying Local Information, Modifying Local Information, Modifying Local Information, Modifying Local Information, Modifying Local Information, Modifying Options, Testing sendmail.cfTesting sendmail.cf, Testing Rewrite RulesTesting Rewrite Rules, Testing Rewrite Rules, Using Key Files in sendmailUsing Key Files in sendmail, Compiling sendmailCompiling sendmail, Compiling sendmailSample script, Compiling sendmail, The sendmail CommandThe sendmail Command, m4 sendmail Macrosm4 sendmail Macros, definedefine, FEATUREFEATURE, OSTYPE, DOMAIN, DOMAIN, DOMAIN, DOMAIN, DOMAIN, DOMAIN, DOMAIN, MAILER, sendmail Classes, sendmail Optionssendmail Options, sendmail Mailer Flags, The sendmail K CommandThe sendmail K Command
(see also email)
aliases, overview, sendmail Aliases
classes, Modifying Local Information, Modifying Local Information, Modifying Local Information, Modifying Local Information
E, Modifying Local Information
M, Modifying Local Information
P, Modifying Local Information
w, Modifying Local Information
command-line arguments, The sendmail CommandThe sendmail Command
compiling, Compiling sendmailCompiling sendmail
configuration commands, sendmail.cf Configuration Language
configuration file, The sendmail.cf File, Locating a Sample sendmail.cf File, Building a sendmail.cf with m4 macrosBuilding a sendmail.cf with m4 macros, General sendmail.cf Structure, Modifying a sendmail.cf File, Modifying Local InformationModifying Local Information, Modifying Options, Testing sendmail.cfTesting sendmail.cf, Testing Rewrite RulesTesting Rewrite Rules
creating with m4 macros, Building a sendmail.cf with m4 macrosBuilding a sendmail.cf with m4 macros
local information, Modifying Local InformationModifying Local Information
modifying, Modifying a sendmail.cf File
Options section, Modifying Options
overview, The sendmail.cf File
samples, Locating a Sample sendmail.cf File
structure, General sendmail.cf Structure
testing, Testing sendmail.cfTesting sendmail.cf
testing rewrite rules, Testing Rewrite RulesTesting Rewrite Rules
configuration options, Building a sendmail.cf with m4 macros
configuring, sendmail.cf Configuration Language, The Version Level Command, The Define Macro Command, Defining Classes, Setting Options, Defining Trusted Users, Defining Mail Precedence, Defining Mail Headers, Defining Mailers, The Set Ruleset Command
define class command, Defining Classes
define macro command, The Define Macro Command
headers command, Defining Mail Headers
mailers command, Defining Mailers
overview, sendmail.cf Configuration Language
precedence command, Defining Mail Precedence
set option command, Setting Options
set ruleset command, The Set Ruleset Command
trusted users command, Defining Trusted Users
version level command, The Version Level Command
as daemon, Running sendmail as a Daemon
databases, address transformation, Using Key Files in sendmailUsing Key Files in sendmail
define m4 macro, definedefine
Domain source file, DOMAIN
DOMAIN source file, DOMAIN, DOMAIN
DNS features, DOMAIN
DNS macros, DOMAIN
FEATURE macro, FEATUREFEATURE
forwarding, Personal Mail Forwarding
installing, Compiling sendmail
internal classes, sendmail Classes
K command, The sendmail K CommandThe sendmail K Command
m4 macros, m4 sendmail Macrosm4 sendmail Macros
macros, conditionals, Conditionals
mailer definitions, Some common mailer definitions
mailer flags, sendmail Mailer Flags
MAILER source file, MAILER
masquerading features, DOMAIN
masquerading macros, DOMAIN
options, sendmail Optionssendmail Options
OSTYPE macro, OSTYPE
overview, sendmail’s Function
queue processing time, Running sendmail as a Daemon
relay features, DOMAIN
rewrite rules, Rewriting the Mail Address, Pattern Matching, Transforming the AddressTransforming the Address, Transforming with a database
pattern matching, Pattern Matching
transformation fields, Transforming the AddressTransforming the Address
transformation with database, Transforming with a database
SMTP, receiving, Running sendmail as a Daemon
source code distribution web site, Locating a Sample sendmail.cf File
spam macros, DOMAIN
test commands, Testing Rewrite Rules
sendmail.cf file, The sendmail.cf File, Locating a Sample sendmail.cf File, Building a sendmail.cf with m4 macros, General sendmail.cf Structure, Modifying a sendmail.cf File, Modifying Local InformationModifying Local Information, Modifying Options, Testing sendmail.cfTesting sendmail.cf, Testing Rewrite RulesTesting Rewrite Rules, More sendmail.cf
configuring, More sendmail.cf
creating with m4 macros, Building a sendmail.cf with m4 macros
modifying, Modifying a sendmail.cf File, Modifying Local InformationModifying Local Information, Modifying Options
local information, Modifying Local InformationModifying Local Information
Options section, Modifying Options
overview, Modifying a sendmail.cf File
overview, The sendmail.cf File
samples, Locating a Sample sendmail.cf File
structure, General sendmail.cf Structure
testing, Testing sendmail.cfTesting sendmail.cf
testing rewrite rules, Testing Rewrite RulesTesting Rewrite Rules
sequence (sendmail K command value), The sendmail K Command
Sequence Number field, TCP headers, Transmission Control Protocol
Serial Line IP protocol, BSD Unix support, The pseudo-device statement
serial lines, TCP/IP Over a Serial Line, The Serial Protocols, Troubleshooting Serial ConnectionsTroubleshooting Serial Connections
connections, troubleshooting, Troubleshooting Serial ConnectionsTroubleshooting Serial Connections
overview, TCP/IP Over a Serial Line
protocols, SLIP, The Serial Protocols
serial ports, troubleshooting, Troubleshooting Serial Connections
serial-queries option (named), The options Statement
server field, The Internet Daemon, PPP Daemon Security
chap-secrets file, PPP Daemon Security
inet.conf file, The Internet Daemon
Server Message Block (SMB), File Sharing
Server Selection (SRV) records, Server Selection record
server setting (smb.config file), Configuring a Samba Server
Server Side Includes, The CGI and SSI Threat (see SSI)
server statement (named.conf file), The server Statement
server string parameter (smb.config file), Configuring a Samba Server
server-identifier parameter (dhcpd), Configuration Parameters
server-name parameter (dhcpd), Configuration Parameters
ServerAdmin defines (httpd.conf file), Basic Configuration Directives
ServerAdmin values (Apache), changing (Solaris), Configuring Apache on Solaris
ServerName (httpd.conf file), Basic Configuration Directives
ServerRoot directive (httpd.conf file), Basic Configuration Directives
servers, Network Services, DNS, The Domain Hierarchy, BIND, Resolvers, and named, Internet Message Access Protocol, Configuration Servers, Reverse Address Resolution Protocol, Dynamic Host Configuration Protocol, Planning Your Mail System, PPP Server ConfigurationPPP Server Configuration, BIND Configurations, BIND Configurations, BIND Configurations, A caching-only server configuration, Master and slave server configurations, Master and slave server configurations, The Cache Initialization File, The Network File System, Configuring a Samba Server, Managing Distributed Servers, POP Server, IMAP Server, Configuring Apache
(see also Apache; web servers)
caching-only, BIND Configurations, A caching-only server configuration
configuration, A caching-only server configuration
configuration, Configuration Servers, Reverse Address Resolution Protocol, Dynamic Host Configuration Protocol
DHCP, Dynamic Host Configuration Protocol
RARP, Reverse Address Resolution Protocol
distributed, management, Managing Distributed Servers
DNS, authoritative, DNS
IMAP, Internet Message Access Protocol, IMAP Server
configuring, IMAP Server
testing, Internet Message Access Protocol
mail, Planning Your Mail System
master name, BIND Configurations, Master and slave server configurations
configuration, Master and slave server configurations
name, classifications, BIND, Resolvers, and named
NFS, The Network File System
POP, configuring, POP Server
PPP, configuring, PPP Server ConfigurationPPP Server Configuration
root, The Domain Hierarchy, The Cache Initialization File
cache initialization files, The Cache Initialization File
Samba, configuring, Configuring a Samba Server
slave, BIND Configurations, Master and slave server configurations
configuration, Master and slave server configurations
TCP/IP networks compared to PC LAN servers, Network Services
ServerType directive (httpd.conf file), Basic Configuration Directives
service extensions, SMTP, Multipurpose Internet Mail Extensions
services file, NIS map, Network Information Service
Session Layer (OSI Model), A Data Communications Model, A Data Communications Model
set option command (sendmail), Setting Options
SetEnvIf directive (Apache), Using Encryption
setgid files, share command and, The share command
setuid files, share command and, The share command
sftp (secure shell), Secure Shell
shadow password files, The Shadow Password FileThe Shadow Password File
share command, The share command, The share command
options, The share command
persistence, The share command
share setting (smb.config file), Configuring a Samba Server
shared media networks, Subdividing an Ethernet
shared-network statement (dhcpd), Topology Statements
sharp sign (#), The Host Table, The Host Table, Understanding /etc/inittab, NFS Automounter
automounter comments, NFS Automounter
comments, The Host Table
comments in host table, The Host Table
inittab file, Understanding /etc/inittab
shell command, Defining an optional shell command, The dip Script File
dip, The dip Script File
security, Defining an optional shell command
shell files, security considerations, Looking for Trouble
show-password option (pppd), The PPP Daemon
showmount command, Mounting Remote Filesystems
showwarnings parameter (gated), The bgp Statement
sig-validity-interval (named), The BIND 9 options statement
SIGHUP, Signal Processing, Signal Processing, Signal Processing
gated signal processing, Signal Processing
named signal processing, Signal Processing
pppd signal processing, Signal Processing
SIGILL (named signal processing), Signal Processing
SIGINT, Signal Processing, Signal Processing, Signal Processing
gated signal processing, Signal Processing
named signal processing, Signal Processing
pppd signal processing, Signal Processing
SIGKILL (gated signal processing), Signal Processing
signal processing, Signal Processing, Signal Processing, Signal Processing
gated, Signal Processing
named command, Signal Processing
pppd, Signal Processing
SIGSYS (named signal processing), Signal Processing
SIGTERM, Signal Processing, Signal Processing
gated signal processing, Signal Processing
named signal processing, Signal Processing
SIGUSR1, Signal Processing, Signal Processing, Signal Processing
gated signal processing, Signal Processing
named signal processing, Signal Processing
pppd signal processing, Signal Processing
SIGUSR2, Signal Processing, Signal Processing
named signal processing, Signal Processing
pppd signal processing, Signal Processing
SIGUSR2 (gated signal processing), Signal Processing
SIGWINCH (named signal processing), Signal Processing
silent option (pppd), The PPP Daemon
Simple Mail Transfer Protocol, Application Layer, Simple Mail Transfer Protocol (see SMTP)
simplex (gated), Interface Statements
SITE macro (sendmail), m4 sendmail Macros
SITECONFIG macro (sendmail), m4 sendmail Macros
size bytes (gated), Trace Statements
size field (lsmod command), Using Dynamically Loadable Modules
skey command (dip), The dip Script File
slave servers, BIND, Resolvers, and named, BIND Configurations, Master and slave server configurations, The named.local File
configuring, Master and slave server configurations, The named.local File
sleep 2 command (dip), Dial-Up PPP
sleep command (dip), The dip Script File
SLIP (Serial Line IP), The Serial Protocols, The Serial Protocols
limitations, The Serial Protocols
SLIP END character, The Serial Protocols
SLIP ESC character, The Serial Protocols
SMB (Server Message Block), File Sharing
smb.conf file, Configuring a Samba Server, Configuring a Samba Server, The smb.conf homes section, Sharing directories through Samba, Sharing printers through Samba, NetBIOS Name Service
directory sharing, Sharing directories through Samba
global section, Configuring a Samba Server
home section, The smb.conf homes section
name server configuration, NetBIOS Name Service
printer sharing, Sharing printers through Samba
smbd command, Using Samba to Share Resources with Windows
smbpasswd file, Configuring a Samba Server
SMTP (Simple Mail Transfer Protocol), Application Layer, Simple Mail Transfer ProtocolSimple Mail Transfer Protocol, Simple Mail Transfer Protocol, Simple Mail Transfer Protocol, Multipurpose Internet Mail Extensions, Multipurpose Internet Mail Extensions, Multipurpose Internet Mail Extensions, Multipurpose Internet Mail Extensions, Running sendmail as a Daemon, Building a sendmail.cf with m4 macros, The sendmail Command
commands, Simple Mail Transfer Protocol, Simple Mail Transfer Protocol, The sendmail Command
source code, Simple Mail Transfer Protocol
viewing, The sendmail Command
ESMTP (Extended SMTP), Multipurpose Internet Mail Extensions, Multipurpose Internet Mail Extensions
private extensions to, Multipurpose Internet Mail Extensions
sendmail, Running sendmail as a Daemon, Building a sendmail.cf with m4 macros
required macros, Building a sendmail.cf with m4 macros
service extensions, Multipurpose Internet Mail Extensions, Multipurpose Internet Mail Extensions
smtp mailer, Building a sendmail.cf with m4 macros
smtp8 mailer, Building a sendmail.cf with m4 macros
smux statement (gated), The smux Statement
snoop, Diagnostic Tools, Packet FiltersModifying analyzer output, Protocol Case Study
diagnostic troubleshooting, Diagnostic Tools
troubleshooting protocols, Packet FiltersModifying analyzer output, Protocol Case Study
ftp failure, Protocol Case Study
Snort (automated system monitoring), Automated Monitoring
SOA (Start of Authority) records, The named.local File, The Reverse Zone File, The Forward-Mapping Zone File, Start of Authority recordStart of Authority record
forward-mapping zone files, The Forward-Mapping Zone File
named.local file, The named.local File
reverse zone files, The Reverse Zone File
socket options parameter (smb.config file), Configuring a Samba Server
sockets, A Data Communications Model, SocketsSockets
soft option (vfstab file), The vfstab and fstab files
Solaris, The Routing Table, The Host Table, The Host Table, Multipurpose Internet Mail Extensions, Reverse Address Resolution Protocol, Kernel Configuration, Kernel Configuration, Using Dynamically Loadable Modules, Using Dynamically Loadable Modules, Understanding /etc/inittab, Understanding /etc/inittab, The ifconfig Command, The ifconfig Command, The Interface Name, Checking the Interface with ifconfig, Assigning an Address, Assigning a Subnet Mask, Setting the Broadcast Address, Metric, Point-to-point, Putting ifconfig in the startup scripts, Solaris PPP, Troubleshooting Serial Connections, Installing static routes at startup, Running RIP with routed, Controlling the named Process, NFS Daemons, The share commandThe share command, The mount command, The vfstab and fstab files, The vfstab and fstab files, Line Printer Service, Running sendmail as a Daemon, Configuring the Apache Server, Configuring Apache on SolarisConfiguring Apache on Solaris, Loading Dynamic Shared Objects, Loading Dynamic Shared Objects, Basic Configuration Directives, Basic Configuration Directives, Defining Where Things Are Stored, Creating a Fancy Index, The Shadow Password File, The ping Command, Solaris httpd.conf FileSolaris httpd.conf File
AddModule directive, modules referenced, Loading Dynamic Shared Objects
Apache, Configuring Apache on SolarisConfiguring Apache on Solaris, Defining Where Things Are Stored
configuring, Configuring Apache on SolarisConfiguring Apache on Solaris
Directory containers, Defining Where Things Are Stored
bootup, Kernel Configuration
broadcast addresses, setting, Setting the Broadcast Address
configuration files, The Host Table, Basic Configuration Directives
command-line option to override location, Basic Configuration Directives
syslog.conf, The Host Table
device drivers, installing, Using Dynamically Loadable Modules
dmesg command, The Interface Name
DSO modules, Loading Dynamic Shared Objects
dynamically loadable modules, Using Dynamically Loadable Modules
Ethernet, ifconfig command, The ifconfig Command
filesystem type, specifying, The mount command
hostname file, Assigning an Address
httpd.conf file, Configuring the Apache Server, Basic Configuration Directives, Solaris httpd.conf FileSolaris httpd.conf File
configuration directives, Basic Configuration Directives
location, Configuring the Apache Server
ifconfig command, syntax, The ifconfig Command
IndexOptions directive (Apache), Creating a Fancy Index
kernel configuration, Kernel Configuration
loghost alias, The Host Table
mountall command, The vfstab and fstab files
named command, running, Controlling the named Process
netmasks file, Assigning a Subnet Mask
network interfaces, checking status, Checking the Interface with ifconfig
NFS, daemon locations, NFS Daemons
physical network address, Reverse Address Resolution Protocol
ping command option, The ping Command
point-to-point connections, defining, Point-to-point
PPP, configuring, Solaris PPP
printers, configuring, Line Printer Service
rc.script files, Putting ifconfig in the startup scripts
routed command, running, Running RIP with routed
routing metric, changing, Metric
routing tables, The Routing Table
runlevels, Understanding /etc/inittab
sendmail, Running sendmail as a Daemon
serial ports, troubleshooting, Troubleshooting Serial Connections
shadow password files, The Shadow Password File
share command, The share commandThe share command
SMTP extensions, Multipurpose Internet Mail Extensions
static routing, adding to startup scripts, Installing static routes at startup
System V startup, Understanding /etc/inittab
vfstab files, options, The vfstab and fstab files
sortlist command, The Resolver Configuration File
sortlist entry (resolv.conf file), The Resolver Configuration File
sortlist option (named), The options Statement
source field (RIPE database), Obtaining an IN-ADDR.ARPA domain
Source Port, Transmission Control Protocol
Source Port numbers (UDP), User Datagram Protocol
Source Quench Message (ICMP), Internet Control Message Protocol
sourcegateways parameter (gated), The rip Statement
sourcenet parameter (gated), The egp Statement
spam, FEATURE, DOMAIN
preventing (sendmail features), FEATURE
sendmail macros, DOMAIN
speed command (dip), Dial-Up PPP, The dip Script File
SPF (Dijkstra Shortest Path First) algorithm, Open Shortest Path First
spf-interval parameter (gated), The isis Statement
spoofing IP addresses, Obtaining an IP Address
squash entries (exports file), The /etc/exports file
srm.conf (Apache configuration file), Configuring the Apache Server
SRV (Server Selection) records, Server Selection record
ssh (secure shell), Secure ShellSecure Shell
ssh-keygen (secure shell), Secure Shell
sshd (secure shell daemon), Secure Shell
SSI (Server Side Includes), security considerations, The CGI and SSI Threat
SSL (Secure Sockets Layer), Using EncryptionUsing Encryption, Using Encryption
Apache, Using EncryptionUsing Encryption
certificates, creating, Using Encryption
ssl CA certFile parameter (smb.config file), Configuring a Samba Server
SSLCertificateFile directive (Apache), Using Encryption
SSLCertificateKeyFile directive (Apache), Using Encryption
SSLEngine directive (Apache), Using Encryption
SSLOptions directive (Apache), Using Encryption
stab (sendmail K command value), The sendmail K Command
stack (protocol), A Data Communications Model, TCP/IP Protocol Architecture
headers, TCP/IP Protocol Architecture
stacksize option (named), The options Statement
standard resource records, Standard Resource Records
standards, TCP/IP Features, Protocol StandardsProtocol Standards, Protocol Standards
categories of, Protocol Standards
protocols, TCP/IP Features, Protocol StandardsProtocol Standards
standards track RFCs, maturity levels, Protocol Standards
start argument (sendmail), Running sendmail as a Daemon
Start of Authority, Start of Authority record (see SOA records)
StartServers directive (Apache), Managing the Swarm
startup files, Startup Files, Understanding /etc/inittab, The Extended Internet Daemon, Putting ifconfig in the startup scripts, Installing static routes at startup, Installing static routes at startup, Running gated at startup, The vfstab and fstab files, Running sendmail as a Daemon
(see also bootup)
gated, Running gated at startup
ifconfig command, Putting ifconfig in the startup scripts
inetd, Understanding /etc/inittab
mountall command, The vfstab and fstab files
sendmail, Running sendmail as a Daemon
static routing, Installing static routes at startup
Unix configuration, Startup Files
xinetd, The Extended Internet Daemon
STAT command (POP), Post Office Protocol
statd command, NFS Daemons
state (gated), Trace Statements
static address assignment, Assigning Host Addresses
static routing, Planning Routing, Common Routing Configurations, Building a Static Routing Table, Adding Static RoutesAdding Static Routes, Installing static routes at startup
startup files, Installing static routes at startup
tables, Planning Routing, Building a Static Routing Table, Adding Static RoutesAdding Static Routes
adding routes, Adding Static RoutesAdding Static Routes
creating, Building a Static Routing Table
static statements (gated), static Statements
statistics-file option (named), The options Statement
statistics-interval option (named), The options Statement
STDs (standards RFCs), Protocol Standards
stopbits command (dip), The dip Script File
store and forward protocols, Simple Mail Transfer Protocol
STORE command (IMAP), Internet Message Access Protocol
stream field (inet.conf file), The Internet Daemon
streams, TCP/IP Protocol Architecture
strictinterfaces (gated), Interface Statements
String value (dhcpd option statement), DHCP Options
string values (printcap file), The printcap file
stub areas (OSPF hierarchy), Open Shortest Path First
stubhosts parameter (gated), The ospf Statement
stunnel (public key encryption), stunnelstunnel
subdirectories, share command and, The share command
subdividing Ethernet segments, Subdividing an Ethernet
subdomains, Creating Domains and Subdomains
subject (DSN error code), Transforming the Address
subnet addresses, SubnetsSubnets
subnet masks, Subnets, Subnets, Getting Started, Defining the Subnet Mask, Defining the Subnet Mask, Defining the Subnet Mask, Assigning a Subnet MaskAssigning a Subnet Mask
assigning, ifconfig command, Assigning a Subnet MaskAssigning a Subnet Mask
creating, Subnets
defining, Defining the Subnet Mask, Defining the Subnet Mask
distributing, Defining the Subnet Mask
RFCs, Subnets
system configuration, Getting Started
subnet security, distributing responsibility, Use subnets to distribute control
subnet statement (dhcpd), dhcpd.conf, Topology Statements
subnetting, Obtaining an official network address, Assigning Host Addresses, Defining the Subnet Mask, Defining the Subnet Mask
need for, Assigning Host Addresses
organization purposes for, Defining the Subnet Mask
plans, RFCs, Obtaining an official network address
topological reasons for, Defining the Subnet Mask
summary-filter parameter (gated), The isis Statement
summary-originate parameter (gated), The isis Statement
switch (sendmail K command value), The sendmail K Command
symbols, Pattern Matching, Trace Statements
gated trace statements, Trace Statements
sendmail pattern matching, Pattern Matching
SymLinksIfOwnerMatch (Options directive setting), Controlling Server Options
symmetric encryption, Encryption, When Is Symmetric Encryption Useful?
SYN bit, TCP headers, Transmission Control Protocol
sync option (pppd), The PPP Daemon
synchronization, TCP byte numbering, Transmission Control Protocol
sys value (share command), The share command
syslog (gated), Options Statements
syslog parameter (gated), The ospf Statement
syslog.conf configuration file, The Host Table
system administration, Overview of TCP/IP, Managing Distributed Servers
defined, Overview of TCP/IP
distributed servers, managing, Managing Distributed Servers
system configuration, Getting Started, Informing the Users, Understanding /etc/inittab
end users, distributing to, Informing the Users
initialization scripts, Understanding /etc/inittab
planning, Getting Started
system file, Solaris configuration, Using Dynamically Loadable Modules
System V, The vfstab and fstab files, Line Printer Service
Line Printer configuration, Line Printer Service
vfstab files, options, The vfstab and fstab files
System V startup model, Startup Files, Startup Runlevels, Understanding /etc/inittab
inittab file, Understanding /etc/inittab
runlevels, Startup Runlevels
systemid systemid parameter (gated), The isis Statement