O
- objects
(LDAP), LDAP: The Protocol
- obscenity
laws, Pornography, Indecency, and Obscenity–Child pornography
- obscurity, security
through, The Problem with Security Through Obscurity–Responsible Disclosure
- octal file
permissions, Calculating octal file permissions
- octets, Internet Addresses
- Odlyzko, Andrew M., Limitations of Secure RPC, Cryptography Papers and Other Publications
- “Computation of Discrete Logarithms in Prime
Fields”, Cryptography Papers and Other Publications
- oftpd server, Setting up an FTP server
- on-demand filtering, The ipfw host-based firewall
- one-command
accounts, Accounts That Run a Single Command
- one-time
pad, One-Time Passwords (see codebooks)
- one-time passwords, One-Time Passwords, Things to Avoid, One-Time Passwords–Codebooks, Codebooks
- one-user workstations, What Is a Deployment Environment?
- one-way hash
functions, Message Digest Functions (see message digest functions)
- one-way phone lines, One-Way Phone Lines
- open
access, Expectations
- open
accounts, Open Accounts–Potential problems with restricted shells, Algorithm and Library Changes
- Open Software
Foundation (OSF), Unix Wars 2: SVR4 versus OSF/1
- open source
Unix, Versions Covered in This Book
- Open System Interconnection
(OSI), Adding authentication to TCP/IP with ident
- open() system call, File Permissions, Design Principles, Coding Standards
- OpenBSD, Versions Covered in This Book, Versions Covered in This Book, NetBSD, FreeBSD, and OpenBSD, NetBSD, FreeBSD, and OpenBSD, Software Quality, sudo: A More Restrictive su, CVS
- (see also BSD
Unix)
- code
reviews of, Software Quality
- CVS used
by, CVS
- history
of, NetBSD, FreeBSD, and OpenBSD
- sudo
program, sudo: A More Restrictive su
- opendir()
system call, Directory Permissions
- OpenLDAP, LDAP (see LDAP)
- openlog() system call, Unix syslog
- OpenSSH, Users and Groups, SSH: The Secure Shell (TCP Port 22), Tunneling X with SSH, Initial login, Back Doors and Trap Doors, OpenSSH
- back door
in, Back Doors and Trap Doors
- Kerberos for
authentication with, Initial login
- sshd user for, Users and Groups
- tunneling X
with, Tunneling X with SSH
- OpenSSL, SMTP: Simple Mail Transfer Protocol (TCP Port 25), OpenSSL
- openssl program, Encrypting Your Backups
- operating
systems, Which Unix System?, What Is an Operating System?, Keeping Secrets, Never Trust Anything Except Hardcopy
- (see also specific operating
systems)
- bootable
copy of, Never Trust Anything Except Hardcopy
- keeping
secret, Keeping Secrets
- operator user, Users and Groups
- optical vampire
taps, Fiber optic cable
- Orange
Book, Adding Up the Numbers
- organizations,
security-related, Organizations–Computer Emergency Response Team Coordination Center (CERT/CC)
- originate mode, Originate and Answer
- originate testing,
modems, Originate testing–Originate testing
- Orwant, Jon
(Programming Perl), Miscellaneous References
- OSF (Open Software
Foundation), Unix Wars 2: SVR4 versus OSF/1
- OSF/1, Unix Wars 2: SVR4 versus OSF/1
- OSI (Open System
Interconnection), Adding authentication to TCP/IP with ident
- Outcome table (NIS+), NIS+ Tables and Other Objects
- outgoing mail, logging, Mail
- outsourcing security, Outsourcing Options, Outsourcing Options, Formulating Your Plan of Action, Choosing a Vendor–“Reformed” hackers, Monitoring Services, Final Words on Outsourcing
- choosing vendor
for, Choosing a Vendor–“Reformed” hackers
- deciding
on services needed, Formulating Your Plan of Action
- monitoring
services, Monitoring Services
- shortage
of experts for, Outsourcing Options
- overflow security
vulnerabilities, The Lesson of the Internet Worm–The Lesson of the Internet Worm
- overload denial of service attacks, Types of Attacks, Process and CPU Overload Problems–CPU overload attacks, CPU overload attacks, Swap Space Problems–Swapping to files, Disk Attacks–Tree structure attacks, Tree structure attacks–Tree structure attacks, /tmp Problems, Soft Process Limits: Preventing Accidental Denial of Service, Soft Process Limits: Preventing Accidental Denial of Service, Service Overloading–Service Overloading
- accidental, Soft Process Limits: Preventing Accidental Denial of Service
- CPU
overload, CPU overload attacks
- disk
attacks, Disk Attacks–Tree structure attacks
- network service
overloading, Service Overloading–Service Overloading
- on
processes, Process and CPU Overload Problems–CPU overload attacks
- soft process
limits, Soft Process Limits: Preventing Accidental Denial of Service
- swap space, running out
of, Swap Space Problems–Swapping to files
- on tmp
directory, /tmp Problems
- tree structure
attacks, Tree structure attacks–Tree structure attacks
- overwriting
media, Sanitizing Media Before Disposal
- owners, Assign an owner, File Permissions, chown: Changing a File’s Owner–Use chown with caution
- file permissions
for, File Permissions
- file,
changing, chown: Changing a File’s Owner–Use chown with caution
- of information, Assign an owner
- O’Reilly & Associates,
Inc., Comments and Questions