K
- Kahn, David
(The Codebreakers), Cryptography Books
- Karels, Michael (The Design and
Implementation of the 4.4 BSD UNIX Operating System), Unix Programming and System Administration
- Kaufman, Charles, Picking a Random Seed, Network Technology and Security
- Network Security:
Private Communications in a Public World, Network Technology and Security
- Kaufman, Lar
(Running Linux), Unix Programming and System Administration
- Kerberos system, Using Network Authorization Systems, AUTH_KERB, Proving your identity, Kerberos–Kerberos Limitations, Kerberos Authentication–Kerberos 4 versus Kerberos 5, Initial login, Initial login, Kerberos 4 versus Kerberos 5, Getting Kerberos, Using Kerberos, Using Kerberos, Kerberos Limitations–Kerberos Limitations, Kerberos Limitations, Picking a Random Seed, Codebooks, Kerberos
- authentication
with, Kerberos Authentication–Kerberos 4 versus Kerberos 5
- installing, Getting Kerberos
- limitations
of, Kerberos Limitations–Kerberos Limitations
- logical
servers for, Initial login
- OpenSSH
and, Initial login
- random number
generator, Picking a Random Seed
- RPC system
and, AUTH_KERB
- server lock
and key, Proving your identity
- using, Using Kerberos
- using with
LDAP, Using Kerberos
- using with PAM, Kerberos Limitations
- Versions 4
and 5, Kerberos 4 versus Kerberos 5
- kermit
program, Modems and Unix, Privilege testing
- kernel, What Is an Operating System?, BSD Kernel Security Levels, Immutable and Append-Only Files, Kernel security level, Kernel security level
- immutable, Immutable and Append-Only Files
- security levels
for, BSD Kernel Security Levels, Kernel security level, Kernel security level
- kernel-level
firewalls, Using a Host-Based Packet Firewall
- Kernighan, Brian (The UNIX
Programming Environment), Unix Programming and System Administration
- key
length, Key Length with Symmetric Key Algorithms–Key Length with Symmetric Key Algorithms, Key Length with Symmetric Key Algorithms, Key Length with Symmetric Key Algorithms, Public Key Algorithms
- and brute
force attacks, Key Length with Symmetric Key Algorithms
- search times
corresponding
to, Key Length with Symmetric Key Algorithms
- strength relative
to crypographic algorithms, Public Key Algorithms
- key search
attacks, The traditional crypt ( ) algorithm, A Cryptographic Example, Key Length with Symmetric Key Algorithms, Key search (brute force) attacks, Key search attacks
- key
switches, Key Switches
- keyboard monitors, Keyboard monitors
- keylogin
program, Using Secure RPC, Using NIS+
- keylogout
program, Using Secure RPC
- keys
(encryption/decryption), Understanding Cryptography, Cryptographic Algorithms and Functions, Systems-based attacks, Proving your identity, Limitations of Secure RPC
- keyserv
process, Proving your identity, Making sure Secure RPC support is running on every workstation, Using NIS+
- keystore file, Proving your identity
- keystrokes,
monitoring, Authenticating with Passwords, X security, X security
- (see also sniffers)
- kill command, Getting Rid of the Intruder, Recovering from too many processes–Recovering from too many processes, Safely halting the system, Unix Signals and the kill Command–Killing Multiple Processes at the Same Time
- built in to ksh
or csh, Safely halting the system
- to stop
process overload, Recovering from too many processes–Recovering from too many processes
- killall
command, Recovering from too many processes
- Kim,
Gene H., Tripwire, Tripwire
- kinit
program, Using Kerberos
- Klaus, Christopher William, ISS (Internet Security Scanner)
- kmem
device, Device Files, Back Doors and Trap Doors
- known plaintext
attacks, Cryptographic Strength of Symmetric Algorithms, Cryptanalysis
- Knuth,
Donald, Design Principles
- Kochan, Stephen
G. (UNIX System Security), Unix Security References
- Korn
shell, Conventions Used in This Book (see ksh)
- Korn, David G. (The New Kornshell
Command and Programmang Language), Unix Programming and System Administration
- ksh (Korn
shell), Conventions Used in This Book, The umask Command, Built-in shell autologout, Before You Finish, Shell History, Shell Features, Unix Programming and System Administration
- (see also shells)
- history
file, Shell History
- programs using, Before You Finish
- prompt, Conventions Used in This Book
- published resources
on, Unix Programming and System Administration
- TMOUT variable, Built-in shell autologout
- umask and, The umask Command
- .kshrc file, .cshrc, .kshrc, .tcshrc