T
- tables
(NIS+), What NIS+ Does, NIS+ Tables and Other Objects
- TACACS and TACACS+
protocols, TACACS and TACACS+ (UDP Port 49)
- tagging,
hardware, Tagging
- TAI (International Atomic
Time), NTP: Network Time Protocol (UDP Port 123)
- taint option, Perl, SUID Scripts
- tainting, Tips on Writing SUID/SGID Programs
- taintperl, Tips on Writing SUID/SGID Programs
- Takedown: The Pursuit and
Capture of Kevin Mitnick, America’s Most Wanted Computer Outlaw
-- By the Man Who Did it (Shimomura, Tsutomu
and Markoff, John), Understanding the Computer Security “Culture”
- talk
program, Contacting the Intruder, Terminal-based Trojan horses
- talk service, UDP
- tandem
backup, Guarding Against Media Failure
- Tanenbaum, Andrew
S., Minix
- Tangled Web (Power, Richard), Computer Crime and Law
- tape
drives, Keep your tape drives clean, Verify the backup, World-readable backup devices
- cleaning, Keep your tape drives clean
- problems
with, Verify the backup
- world-readable, World-readable backup devices
- tapes, Verify your backups, Replace tapes as needed, Replace tapes as needed, How Long Should You Keep a Backup?
- (see also media)
- degradation
of, Replace tapes as needed
- print through
process, Verify your backups
- upgrading, How Long Should You Keep a Backup?
- tar
program, Building an Automatic Backup System, Simple Archives, Network Backup Systems, Encrypting Your Backups, Preserving the Evidence
- TCB (trusted
computing base), Trusted computing base
- /tcb directory, Accounts Without Passwords
- TCFS (Transparent Cryptographic
Filesystem), The Virtual Filesystem Interface
- tcov
tester, Before You Finish
- TCP (Transmission Control
Protocol), Packets and Protocols, TCP–TCP, The inetd Program, What TCP Wrappers does, Domain Name System (DNS) (TCP and UDP Port 53), Clogging (SYN Flood Attacks)
- (see also network
services)
- connections,
clogging, Clogging (SYN Flood Attacks)
- connections,
controlling, What TCP Wrappers does (see TCP Wrappers program)
- TCP
Wrappers
program, Adding authentication to TCP/IP with ident, Controlling Access to Servers, Controlling Access to Servers, Access Control Lists with TCP Wrappers–What TCP Wrappers does, What TCP Wrappers does, What TCP Wrappers does, What TCP Wrappers does, The TCP Wrappers configuration language–Making sense of your TCP Wrappers configuration files, The TCP Wrappers configuration language, The TCP Wrappers configuration language, The TCP Wrappers configuration language, The TCP Wrappers configuration language, Making sense of your TCP Wrappers configuration files–Making sense of your TCP Wrappers configuration files, Making sense of your TCP Wrappers configuration files, Disabling finger, TCP Wrappers
- -DPARANOID
option, What TCP Wrappers does
- -DPROCESS_OPTION
option, What TCP Wrappers does
- -DPROCESS_OPTIONS
option, The TCP Wrappers configuration language, The TCP Wrappers configuration language
- configuration language
for, The TCP Wrappers configuration language–Making sense of your TCP Wrappers configuration files
- finger
daemons provided with, Disabling finger
- inetd and, Controlling Access to Servers, What TCP Wrappers does
- IP
spoofing and, The TCP Wrappers configuration language
- tcpdchk utility
for, Making sense of your TCP Wrappers configuration files–Making sense of your TCP Wrappers configuration files
- tcpdmatch utility
for, Making sense of your TCP Wrappers configuration files
- UDP support, The TCP Wrappers configuration language
- TCP/IP, Adding authentication to TCP/IP with ident–Adding authentication to TCP/IP with ident, Logging across the network, Chapter 11: TCP/IP Networks–Chapter 12: Securing TCP and UDP Services
- (see also networks)
- authentication
with ident, Adding authentication to TCP/IP with ident–Adding authentication to TCP/IP with ident
- security
checklist for, Chapter 11: TCP/IP Networks–Chapter 12: Securing TCP and UDP Services
- TCP/IP Network
Administration (Hunt,
Craig), Network Technology and Security
- TCP/IP networks, TCP/IP Networks–Summary, Protocols
- SMB running
on, Protocols
- tcpd program, Access Control Lists with TCP Wrappers, Access Control Lists with TCP Wrappers
- (see also TCP
Wrappers program; TCP/IP)
- tcpdchk
utility, Making sense of your TCP Wrappers configuration files–Making sense of your TCP Wrappers configuration files
- tcpdmatch utility, Making sense of your TCP Wrappers configuration files
- tcpdump
command, Monitoring Your Network with tcpdump–Monitoring Your Network with tcpdump, Monitoring the Intruder
- tcpserver
program, SMTP: Simple Mail Transfer Protocol (TCP Port 25)
- tcsh, Shell History, Shell Features
- (see also shells)
- history
file, Shell History
- .tcshrc file, .cshrc, .kshrc, .tcshrc
- TD (Transmit Data), The RS-232 Serial Protocol
- telephone firewalls, Telephone firewalls
- telephone
lines, One-Way Phone Lines, Eavesdropping countermeasures, Limitations of scanning and firewalls, Protection of Modems and Lines, Protection of Modems and Lines
- leasing, Protection of Modems and Lines
- one-way, One-Way Phone Lines
- physical security of, Protection of Modems and Lines
- sweeping, Eavesdropping countermeasures
- unauthorized, Limitations of scanning and firewalls
- telephones, Other Contingencies, Electrical noise, Originate and Answer, Telephone scanning, aculog Log File, Tracing a Connection, Chapter 10: Modems and Dialup Security
- (see also modems)
- cellular, computer
malfunctions caused by, Electrical noise
- recording call
information, aculog Log File
- scanners
for, Telephone scanning
- security checklist
for, Chapter 10: Modems and Dialup Security
- service, loss
of, Other Contingencies
- tracing
connections from, Tracing a Connection
- telnet program, Verifying your new password, Networking and Unix, TCP, Clients and Servers, Telnet (TCP Port 23), rlogin and rsh (TCP Ports 513 and 514)
- compared to
rlogin, rlogin and rsh (TCP Ports 513 and 514)
- verifying new
password with, Verifying your new password
- Telnet utility, Telnet (TCP Port 23)
- telnetd
program, Telnet (TCP Port 23), Back Doors and Trap Doors
- back doors in, Back Doors and Trap Doors
- temperature, effects on
hardware, Extreme temperatures
- TEMPEST
system, Eavesdropping by radio and using TEMPEST
- terminal emulators, Modems and Unix
- terminal service,
remote, Telnet (TCP Port 23), rlogin and rsh (TCP Ports 513 and 514)–/etc/hosts.lpd file
- terminals, Secure Terminals: Limiting Where the Superuser Can Log In (see hardware)
- terrorism, Defending Against Acts of War and Terrorism
- testing, Software Quality, Intensive Investigations, Checking Your Modem–Privilege testing, Before You Finish
- employee, Intensive Investigations
- modems, Checking Your Modem–Privilege testing
- software, Software Quality, Before You Finish
- TeX files,
Trojan horses in, Trojan horses in mobile code
- TFTP (Trivial File Transfer
Protocol), UDP, TFTP: Trivial File Transfer Protocol (UDP Port 69)
- tftpd
daemon, TFTP: Trivial File Transfer Protocol (UDP Port 69)
- The Code Book: The Science of
Secrecy from Ancient Egypt to Quantum Cryptography (Singh, Simon), Cryptography Books
- theft of
backups, Protecting Backups
- theft of hardware, The Disaster Recovery Plan, Preventing Theft–Encryption, Locks, Tagging, Tagging, Laptop Recovery Software and Services, RAM Theft, Encryption, The Role of Backups
- encryption
and, Encryption
- locks
preventing, Locks
- precautions
for, Tagging
- RAM
theft, RAM Theft
- recovery
for, The Disaster Recovery Plan, Laptop Recovery Software and Services
- tagging
preventing, Tagging
- thieves, planting programmed threats, Authors
- thin-client Unix
systems, What Is a Deployment Environment?
- third-party billing, Protection of Modems and Lines
- Thomas, Robert and
Carleen, Amateur Action
- Thompson,
Ken, Multics: The Unix Prototype, The Unix Encrypted Password System, The traditional crypt ( ) algorithm, Trusting Trust, General Computer Security
- crypt()
designed by, The traditional crypt ( ) algorithm
- discussing password
security, The Unix Encrypted Password System
- Unix developed
by, Multics: The Unix Prototype
- “Reflections on Trusting
Trust”, Trusting Trust, General Computer Security
- threads, Processes and Programs
- threats, Identifying threats–Review Your Risks, The Probability of a Loss, The Physical Security Plan, Sudden changes in time, RISKS
- estimating
probability of, The Probability of a Loss
- identifying
and quantifying, Identifying threats–Review Your Risks, The Physical Security Plan
- mailing list
for, RISKS
- replay
attacks, Sudden changes in time
- three-way
handshake, TCP, TCP
- tickets
(Kerberos), Kerberos, Initial login–Using the ticket-granting ticket
- Tiger system, Tiger
- tilde (~), Accounts That Run a Single Command, $HOME attacks
- as home
directory, $HOME attacks
- ~! in mail
messages, Accounts That Run a Single Command
- time, NTP: Network Time Protocol (UDP Port 123), Setting the window, Picking a Random Seed, Picking a Random Seed, Large Service-Based Networks with Large Budget, Checklists and Metadata
- (see also NTP; system
clock)
- defining random seed by, Picking a Random Seed
- determining
accurately, NTP: Network Time Protocol (UDP Port 123)
- file
modification, Large Service-Based Networks with Large Budget
- granularity
of, Picking a Random Seed
- modification, Checklists and Metadata
- time service, TCP, UDP
- time-sharing, Kerberos Limitations, Design Principles
- timeouts, Things to Do, Logic Bombs
- timestamp, Secure RPC
window, Setting the window
- Timezone table
(NIS+), NIS+ Tables and Other Objects
- tip command, Modems and Unix, Originate testing, Originate testing, Privilege testing, aculog Log File
- TLS
protocol, SMTP: Simple Mail Transfer Protocol (TCP Port 25), SMTP: Simple Mail Transfer Protocol (TCP Port 25)
- TMOUT variable, Built-in shell autologout
- tmp directory, overload attacks
using, /tmp Problems
- tmpfile() system
call, Coding Standards
- token
cards, Token Cards–Token Cards
- toll fraud, One-Way Phone Lines
- tools, The Birth of Unix (see software)
- top
command, Discovering an Intruder, The ps Command
- Torvalds, Linus, Linux
- traceroute command, Contacting a site’s ISP
- tracing
connections, Tracing a Connection–Tracing a Connection
- tracing programs, Laptop Recovery Software and Services
- traffic
analysis, Key Length with Symmetric Key Algorithms
- training, employees, Initial Training
- transaction audits, Network-Based Authentication Systems
- Transmission
Control Protocol, TCP (see TCP)
- Transmit Data (TD), The RS-232 Serial Protocol
- Transparent
Cryptographic Filesystem (TCFS), The Virtual Filesystem Interface
- transposition
ciphers, Roots of Cryptography
- trap doors, Programmed Threats: Definitions, Back Doors and Trap Doors (see back doors)
- trashing, Sanitizing Printed Media
- tree
structure attacks, Tree structure attacks–Tree structure attacks
- trimlog
system, trimlog
- Triple-DES (3DES)
algorithm, Common Symmetric Key Algorithms
- Tripwire
package, Tripwire–Running Tripwire, Tripwire
- Trivial File Transfer Protocol
(TFTP), TFTP: Trivial File Transfer Protocol (UDP Port 69)
- Trojan horses, Use su with Caution, X security, Kerberos Limitations, Understanding NFS, Programmed Threats: Definitions, Trojan Horses–Avoiding Trojan horses, Protecting Yourself, Viruses on the Distribution Disk
- as common
threat, Protecting Yourself
- Kerberos and, Kerberos Limitations
- in mass-market
software, Viruses on the Distribution Disk
- NFS and, Understanding NFS
- X clients, X security
- Trojan
processes, Service Overloading
- truck
bombs, as destructive attack, Destructive Attacks
- True Names and Other
Dangers (Vinge,
Vernor), Understanding the Computer Security “Culture”
- truncate() system call, File Permissions
- trust, What Is Computer Security?, Trust, Managing Log Files, Can You Trust Your Computer?–What the Superuser Can and Cannot Do, Can You Trust Your Suppliers?–Network Providers That Network Too Well, Hardware Bugs, Viruses on the Distribution Disk–Security Bugs That Never Get Fixed, Network Providers That Network Too Well, Your Employees?, Your System Administrator?, Your Vendor?, Your Consultants?, Response Personnel?, Chapter 26: Who Do You Trust?
- checklist
for, Chapter 26: Who Do You Trust?
- in
computers, Trust, Can You Trust Your Computer?–What the Superuser Can and Cannot Do, Hardware Bugs
- in
consultants, Your Consultants?
- in
employees, Your Employees?
- in log
files, Managing Log Files
- in network
providers, Network Providers That Network Too Well
- in security response
teams, Response Personnel?
- in
software, Viruses on the Distribution Disk–Security Bugs That Never Get Fixed
- in system
administrator, Your System Administrator?
- in
vendors, Can You Trust Your Suppliers?–Network Providers That Network Too Well, Your Vendor?
- trusted computing base
(TCB), Trusted computing base
- trusted hosts, Trusted hosts and users–/etc/hosts.lpd file
- Trusted
Linux, “Secure” Versions of Unix
- trusted path, Trusted path
- trusted
ports, Add-on Functionality Breeds Problems, Calling getservbyname( )
- Trusted
Solaris, “Secure” Versions of Unix
- trusted
Unix, “Secure” Versions of Unix (see secure Unix systems)
- trusted
users, Trusted hosts and users
- Tse Huong
Choo, “Secure” Versions of Unix
- ttymon
program, Logging In
- ttys
file, Secure Terminals: Limiting Where the Superuser Can Log In, Connecting a Modem to Your Computer, Which Files to Back Up?, Secure Terminals
- ttytab
file, Which Files to Back Up?
- ttywatch program, Monitoring the Intruder
- tunefs
command, Reserved space
- tunneling, Adding authentication to TCP/IP with ident, Tunneling X with SSH
- two-key
cryptography, Cryptographic Algorithms and Functions
- twoftpd server, Setting up an FTP server
- TZ
variable, Things to Avoid