G
- games user, Users and Groups
- games, accounts for, Open Accounts
- Gangemi, G. T.,
Sr. (Computer Security Basics), General Computer Security
- Garfinkel, Simson
(PGP: Pretty Good Privacy), Cryptography Books
- gas-charged fire
extinguishers, Fire
- Gasser, Morrie
(Building a Secure Computer System), General Computer Security
- gated daemon, RIP Routed: Routing Internet Protocol (UDP Port 520)
- gateways, IP: The Internet Protocol (see routers)
- gcore
program, gcore: Dumping Core
- gcov
tester, Before You Finish
- gdb command, gdb: Controlling a Process
- gdb debugger, gcore: Dumping Core
- GECOS (General
Electric Computer Operating System), The /etc/passwd File
- Geer, Dan, Network Providers That Network Too Well
- General Electric Computer Operating System
(GECOS), The /etc/passwd File
- generation count, file
handle, File Handles, File Handles
- generators,
password, Password Generators
- GETATTR function
(RPC), The NFS Protocol
- gethostbyaddresses() system
call, DNS under Unix
- gethostbyname() system call, DNS under Unix
- getopt() system
call, Things to Avoid
- getpass() system
call, Things to Avoid, Tips on Using Passwords
- getpwuid() system
call, Including or excluding specific accounts
- gets()
system call, The Lesson of the Internet Worm, Things to Avoid
- getservbyname() system
call, Calling getservbyname( ), Things to Avoid
- getty
program, Logging In
- Gibson,
William, Understanding the Computer Security “Culture”, Understanding the Computer Security “Culture”, Understanding the Computer Security “Culture”, Understanding the Computer Security “Culture”, Understanding the Computer Security “Culture”, Understanding the Computer Security “Culture”, Understanding the Computer Security “Culture”
- All Tomorrow’s
Parties, Understanding the Computer Security “Culture”
- Burning Chrome, Understanding the Computer Security “Culture”
- Count Zero, Understanding the Computer Security “Culture”
- Idora, Understanding the Computer Security “Culture”
- Mona Lisa
Overdrive, Understanding the Computer Security “Culture”
- Neuromancer, Understanding the Computer Security “Culture”
- Virtual Light, Understanding the Computer Security “Culture”
- GIDs (group
identifiers), Add-on Functionality Breeds Problems, Groups and Group Identifiers (GIDs)–The /etc/group file, Other IDs, Inodes, SUID and SGID, AUTH_UNIX
- (see also SGID
programs)
- real versus
effective, Other IDs
- and RPC requests, AUTH_UNIX
- stored in
inodes, Inodes
- glass walls, security
aspects, Glass walls
- GMT, NTP: Network Time Protocol (UDP Port 123) (see UTC)
- GNU Emacs, FSF and GNU, Hidden files and directories, .emacs, Other initializations
- GNU
project, FSF and GNU
- GNU utilities,
reliability of, What he found
- gnupg
signatures, Software Management Systems, Upgrading Distributed Applications
- goaway option,
sendmail, Security concerns with SMTP banners and commands
- Gollmann, Dieter (Computer
Security), General Computer Security
- gopher, Networking and Unix
- gpg
signatures, Upgrading Distributed Applications
- Graff,
Michael, Key search attacks
- Grampp, F. T. (“UNIX Operating System
Security”), Unix Security References
- granularity,
time, Picking a Random Seed
- graphical displays, sharing with X
Window System, The X Window System (TCP Ports 6000-6063)–Tunneling X with SSH
- grep command, scanning
su log file with, The sulog under Solaris
- grounding
signals, attacks by, Signal Grounding and Jamming
- group disk
quotas, Using quotas
- group file, What Is an Operating System?, The /etc/group file, Which Files to Back Up?, Group Accounts, Monitoring File Format
- monitoring, Monitoring File Format
- group
IDs, Add-on Functionality Breeds Problems (see GIDs)
- Group table (NIS+), NIS+ Tables and Other Objects
- groups, Add-on Functionality Breeds Problems, Groups and Group Identifiers (GIDs)–The /etc/group file, The /etc/group file, File Permissions, The umask Command, chgrp: Changing a File’s Group, NIS Netgroups–NIS is confused about “+”, Group Accounts, The wheel Group, Group-writable files, Chapter 5: Users, Groups, and the Superuser, Process groups and sessions
- accounts
for, Group Accounts
- changing, chgrp: Changing a File’s Group
- files writable
by, Group-writable files
- identifiers
for, Add-on Functionality Breeds Problems (see GIDs)
- NIS
netgroups, NIS Netgroups–NIS is confused about “+”
- passwords
for, The /etc/group file
- permissions
for, File Permissions
- process, Process groups and sessions
- security checklist
for, Chapter 5: Users, Groups, and the Superuser
- umask for group
projects, The umask Command
- wheel, The wheel Group (see wheel
group)
- groups
command, The /etc/group file
- grpck
command, Monitoring File Format
- Grünbacher,
Andreas, Access Control Lists
- guest account, Open Accounts, Algorithm and Library Changes
- guest user, Users and Groups
- guidelines, in
security policy, Guidelines