V
- VA Linux, Businesses adopt Unix
- vacation
program, Delivery to programs
- vampire
taps, Fiber optic cable
- vandalism, Defending Against Vandalism–Utility connections
- vandals,
computer, Introduction: Some Fundamental Questions (see intruders)
- /var directory, The su Log, The su Log, Read-Only Filesystems, lastlog File–lastlog File, utmp and wtmp Files–Pruning the wtmp file, loginlog File, Process Accounting: The acct/pacct File, Process Accounting: The acct/pacct File, Other files, Other files
- (see also /usr
firectory)
- /var/adm
directory, Other files
- /var/adm/acct file, Process Accounting: The acct/pacct File
- /var/adm/lastlog
file, lastlog File–lastlog File
- /var/adm/loginlog file, loginlog File
- /var/adm/messages
file, The su Log
- /var/adm/savacct
file, Process Accounting: The acct/pacct File
- /var/adm/wtmp file, utmp and wtmp Files–Pruning the wtmp file
- /var/log directory, Other files
- variables, bounds checking, Coding Standards
- Varley, John (Press
Enter), Understanding the Computer Security “Culture”
- VC-I video encryption
algorithm, Systems-based attacks
- vendors, Get a referral and insist on references, Get a referral and insist on references, Beware of soup-to-nuts, Insist on breadth of background, People, “Reformed” hackers, Other Contingencies, Other People, Can You Trust Your Suppliers?–Network Providers That Network Too Well, Your Vendor?, Your Consultants?, Response Teams and Vendors
- security, Get a referral and insist on references, Get a referral and insist on references, Beware of soup-to-nuts, Insist on breadth of background, People, “Reformed” hackers, Other People, Your Consultants?, Response Teams and Vendors
- access
given to, Other People
- all-in-one
contracts, Beware of soup-to-nuts
- corporate
stability of, Get a referral and insist on references
- evaluating
employees of, People
- experience
of, Insist on breadth of background
- hackers
as, “Reformed” hackers
- mailing
lists for, Response Teams and Vendors
- referrals
and references for, Get a referral and insist on references
- trusting, Your Consultants?
- software, Other Contingencies, Can You Trust Your Suppliers?–Network Providers That Network Too Well, Your Vendor?
- loss
of, Other Contingencies
- trusting, Can You Trust Your Suppliers?–Network Providers That Network Too Well, Your Vendor?
- Venema, Wietse, SMTP: Simple Mail Transfer Protocol (TCP Port 25), Sun RPC’s portmapper (UDP and TCP Ports 111), Sun’s portmap/rpcbind, chrootuid, portmap, SATAN, TCP Wrappers
- ventilation, Entrance through air ducts, Ventilation holes
- access
through, Entrance through air ducts
- holes (in
hardware), Ventilation holes
- VERB command, SMTP, Security concerns with SMTP banners and commands
- vfork() system
call, Creating Processes
- vfstab
file, Which Files to Back Up?
- vi editor, An example of a SUID attack: IFS and the /usr/lib/preserve hole, .exrc, .nexrc, Other initializations
- vibrations, effects on
hardware, Vibration
- Viega, John
(Building Secure Software), General Computer Security
- Vinge, Vernor
(True Names and Other Dangers), Understanding the Computer Security “Culture”
- vipw
command, Disabling an Account by Changing the Account’s Password
- virtual filesystem
interface, The Virtual Filesystem Interface
- Virtual Light (Gibson, William), Understanding the Computer Security “Culture”
- virtual
nodes, The Virtual Filesystem Interface
- Virtual Private
Network (VPN), Networking
- The Virus Bulletin, Computer Viruses and Programmed Threats
- viruses, SMTP: Simple Mail Transfer Protocol (TCP Port 25), Programmed Threats: Definitions, Viruses, Viruses on the Distribution Disk, Computer Viruses and Programmed Threats
- on distribution disk, Viruses on the Distribution Disk
- email, SMTP: Simple Mail Transfer Protocol (TCP Port 25)
- published
resources on, Computer Viruses and Programmed Threats
- visitors, security
regarding, Other People
- vnode
interface, The Virtual Filesystem Interface (see virtual filesystem
interface)
- vold.log
file, Essential Log Files
- voltage
spikes, Electrical noise (see power, surges)
- VonStorch,
William (Computer Crime: A Crimefighter’s
Handbook), Computer Crime and Law
- VPN (Virtual Private
Network), Networking
- VRFY command,
SMTP, Security concerns with SMTP banners and commands, Security concerns with SMTP banners and commands, Security concerns with SMTP banners and commands
- vsnprintf()
system call, Things to Avoid
- vsprintf() system
call, Things to Avoid, Things to Avoid
- vsyslog() system call, Unix syslog