H
- hacker challenges, Hacker Challenges
- The
Hacker Crackdown: Law and Disorder on the Electronic
Frontier (Sterling,
Bruce), Understanding the Computer Security “Culture”
- hackers, Introduction: Some Fundamental Questions, Introduction: Some Fundamental Questions, “Reformed” hackers
- (see also intruders)
- as security
consultants, “Reformed” hackers
- Hackers: Heroes of the Computer
Revolution (Levy,
Steven), Understanding the Computer Security “Culture”
- Hafner, Katie (Cyberpunk:
Outlaws and Hackers on the Computer Frontier), Understanding the Computer Security “Culture”
- Haley, Chuck, Unix escapes AT&T
- Halon
gas, Fire
- halt command, Accounts That Run a Single Command
- handheld computers, What the Future Holds
- Harbison, Samuel P.
(C, a Reference Manual), Unix Programming and System Administration
- hard disks, Using quotas (see disk drives)
- hard
links, Directories and links (see links)
- hardcopy
device, Logging to a printer (see printers)
- hardcopy of log
files, Logging to a printer, Never Trust Anything Except Hardcopy, Never Trust Anything Except Hardcopy
- (see also media,
printed)
- hardware, Secure Terminals: Limiting Where the Superuser Can Log In, Problems with SUID, The Disaster Recovery Plan, Protecting Computer Hardware, Protecting Against Environmental Dangers–Environmental monitoring, Earthquakes, Extreme temperatures, Controlling Physical Access, Preventing Theft–Encryption, Locks, Tagging, Protecting Local Storage–Function keys, Unattended Terminals, Auditing Access, Auditing Access, Modems and Dialup Security–Additional Security for Modems, The Role of Backups, The Role of Backups, Keep your tape drives clean, Verify the backup, Individual Workstation, Secure Terminals, Read-Only Filesystems–Read-Only Filesystems, Informational material, Getting Rid of the Intruder, World-readable backup devices, Destructive Attacks, Destructive Attacks, Destructive Attacks, Can You Trust Your Computer?–What the Superuser Can and Cannot Do, Hardware Bugs, Hardware Bugs
- (see also devices;
disk drives; laptops)
- auditing user access
to, Auditing Access
- backing
up, Individual Workstation (see backups)
- bugs
in, Hardware Bugs
- cables, cutting as
destructive attack, Destructive Attacks
- environmental
dangers affecting, Protecting Against Environmental Dangers–Environmental monitoring
- failure
of, The Role of Backups
- importance of
protecting, Protecting Computer Hardware
- local
storage of secondary equipment, Protecting Local Storage–Function keys
- locking, Locks
- logging information
about, Informational material
- modems, Modems and Dialup Security–Additional Security for Modems
- physical access
to, Controlling Physical Access, Auditing Access
- placement
of, Earthquakes
- power loss, as
destructive attack, Destructive Attacks
- read-only
protection, Read-Only Filesystems–Read-Only Filesystems
- tagging, Tagging
- tape
drives, Keep your tape drives clean, Verify the backup, World-readable backup devices
- temperature effects
on, Extreme temperatures
- terminals, Secure Terminals: Limiting Where the Superuser Can Log In, Problems with SUID, Unattended Terminals, Secure Terminals
- secure, Secure Terminals: Limiting Where the Superuser Can Log In, Secure Terminals
- unattended, Problems with SUID, Unattended Terminals
- theft
of, The Disaster Recovery Plan, Preventing Theft–Encryption, The Role of Backups
- trusting, Can You Trust Your Computer?–What the Superuser Can and Cannot Do, Hardware Bugs
- unplugging to get
rid of intruder, Getting Rid of the Intruder
- hardware tokens, One-Time Passwords
- hash functions, Message Digest Functions (see message digest
functions)
- hash mark (#), Conventions Used in This Book, Primary Unix Network Services
- disabling services
with, Primary Unix Network Services
- Unix superuser
prompt, Conventions Used in This Book
- Hash Message Authentication Code
(HMAC), HMAC
- Hawking, Stephen W. (A Brief
History of Time: From the Big Bang to Black Holes), Miscellaneous References
- header,
packet, IP: The Internet Protocol
- Hein, Trent R.
(UNIX System Administration Handbook), Unix Programming and System Administration
- Hellman, Martin E., Public Key Algorithms, Cryptography Papers and Other Publications, Cryptography Papers and Other Publications, Cryptography Papers and Other Publications
- “Hiding Information and Signatures in
Trap Door Knapsacks”, Cryptography Papers and Other Publications
- “New
Directions in Cryptography”, Cryptography Papers and Other Publications
- “On the
Security of Multiple Encryption”, Cryptography Papers and Other Publications
- HELO command, SMTP, Security concerns with SMTP banners and commands
- HELP command,
SMTP, Security concerns with SMTP banners and commands, Security concerns with SMTP banners and commands
- HF200
gas, Fire
- HFS filesystem, The Virtual Filesystem Interface
- HFS+ filesystem, The Virtual Filesystem Interface
- hidden
files, Exploring with the ls Command, Hidden files and directories–Hidden files and directories
- created by
intruders, Hidden files and directories–Hidden files and directories
- listing, Exploring with the ls Command
- hidden
space, Hidden space
- High
Technology Crimes Investigation Association
(HTCIA), High Technology Crimes Investigation Association (HTCIA)
- hijacking Telnet
sessions, Telnet (TCP Port 23)
- Hinsley, F. H. (Code Breakers:
The Inside Story of Bletchley Park), Cryptography Books
- historical accounts, Finding Dormant Accounts
- history
files, Shell History
- hit lists of
passwords, Bad Passwords: Open Doors
- HMAC (Hash Message Authentication
Code), HMAC
- Hoffman, Lance
J., Computer Viruses and Programmed Threats, Cryptography Books
- Building in Big Brother: The
Cryptographic Policy Debate, Cryptography Books
- Rogue Programs: Viruses,
Worms and Trojan Horses, Computer Viruses and Programmed Threats
- holes,
security, Keeping Secrets (see security holes)
- home
directories, Current Directory and Paths, Primary Unix Network Services
- HOME variable, attacks
through, $HOME attacks
- The Honeynet
Project, Keeping Up to Date
- honeypots, Decoy Systems
- host authentication,
SSH, Host authentication with SSH–Host authentication with SSH
- host
command, Looking up information by IP address
- host-based firewall program, Controlling Access to Servers, Using a Host-Based Packet Firewall
- host-based IDS, Intrusion Detection Systems
- hostnames, Hostnames–The /etc/hosts file, Format of the hostname, Name Service–Other naming services, Controlling Access to Servers, Domain Name System (DNS) (TCP and UDP Port 53)
- controlling
access to, Controlling Access to Servers
- determining from IP
addresses, Domain Name System (DNS) (TCP and UDP Port 53)
- name
service and, Name Service–Other naming services
- underscore
character in, Format of the hostname
- hosts, IP: The Internet Protocol, Trusted hosts and users–/etc/hosts.lpd file, Monitoring Your Host with netstat–Limitation of netstat and lsof, Creating passwords for hosts
- monitoring
with netstat, Monitoring Your Host with netstat–Limitation of netstat and lsof
- NIS passwords
for, Creating passwords for hosts
- trusted, Trusted hosts and users–/etc/hosts.lpd file
- hosts file, The /etc/hosts file, Name Service
- Hosts table (NIS+), NIS+ Tables and Other Objects
- hosts.allow
file, What TCP Wrappers does, The TCP Wrappers configuration language, The TCP Wrappers configuration language
- hosts.deny
file, What TCP Wrappers does, The TCP Wrappers configuration language, The TCP Wrappers configuration language
- hosts.equiv
file, Specifying trusted hosts with /etc/hosts.equiv and ~/.rhosts, Changes to the /etc/hosts.equiv file, Changes to the /etc/hosts.equiv file
- hosts.lpd file, /etc/hosts.lpd file
- Hoyt, D. B. (Computer Security
Handbook), General Computer Security
- HTCIA (High Technology Crimes Investigation
Association), High Technology Crimes Investigation Association (HTCIA)
- HTTP (Hypertext Transfer Protocol), Networking and Unix, TCP, HTTP, HTTPS: HyperText Transfer Protocol (TCP Ports 80, 443)
- http
group, The /etc/group file
- http user, Users and Groups
- HTTPS (secure HTTP), TCP, HTTP, HTTPS: HyperText Transfer Protocol (TCP Ports 80, 443)
- humidity, Humidity
- Hunt, A. E.
(Computer Security Handbook), General Computer Security
- Hunt, Craig
(TCP/IP Network Administration), Network Technology and Security
- hybrid public/private
cryptosystems, Cryptographic Algorithms and Functions
- Hypertext Transfer
Protocol, HTTP, HTTPS: HyperText Transfer Protocol (TCP Ports 80, 443) (see HTTP)