Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Burgess M.Principles of network and system administration.2004.pdf
Скачиваний:
181
Добавлен:
23.08.2013
Размер:
5.65 Mб
Скачать

Index

-D option, 263 -N option, 263

. directory, 27

.. directory, 27 /etc/hosts, 127

Average time before failure, 508 + in make, 553

$< in make, 553 $? in make, 553

CACLS command, 37

PRINTER, 382

PwDump, Windows, 472 arch program, 88 biod, 377

cancel, 382

catman command, 545 chgrp command, 31 chmod command, 30 chown command, 31 configure, 135

cp command, 544 cron, 259, 545 crontab command, 242 crypt(), 566

df command, 543 dig, 89 dnsquery, 547 domainname, 89 du command, 543

dump command, 544 etherfind command, 548 exportfs command, 375 find command, 545

for loop in Perl, 558 foreach loop in Perl, 558 fork(), 567

fsck program, 546 ftp, 134

groups and time intervals, 267 groups in cfengine, 261

host lookup, 89

ifconfig command, 61, 548 in.rarpd, 129

inetd, 545

installboot, SunOS, 142 iostat command, 547 kill command, 545 ldconfig command, 545 ldd command, 545

ln -s, 27 ln, 27

locate command, 545 lpc, 382

lpd, 382 lpq, 382 lprm, 382 lpr, 382 lpsched, 382 lpshut, 382

lpstat -a, 382 lpstat -o all, 382 lp, 382

ls -l, 28

mach program, 88 make, 135

mkfile command, 129 mkfs, 117

mount -a, 376 mount command, 376 mountd, 377

mwm window manager, 155 ncftp, 134

ndd, kernel parameters, 141 netstat command, 547

netstat -r and routing table, 547 netstat -r command, 62

624

INDEX

newfs, 117

newfs command, 546 nfsd, 377

nfsiod, 377

nfsstat command, 547 nice, 546

nslookup, 89, 547

ping command, 446, 547 probe-scsi, Sun, 122 ps command, 545

rdump command, 544 renice command, 546 restore command, 544 rlogin command, 543 rm -i command, 455 route command, 548 rpc.mountd, 377 rpc.nfsd, 377

rsh command, 543 sendmail, 546 shareall, 376 share, 375, 376 snoop command, 548 ssh command, 543 startx, 155

su -c command, 138 swapon command, 546 tar command, 544 telnet command, 543

traceroute command, 548 ufsdump command, 544 umask variable, 30

uname, 88

updatedb script, 545 vmstat command, 547 whatis command, 545 which command, 545 whois command, 547 xdm, 155

xhost command, 477 xntpd, 242

.bashrc, 155

.cshrc, 150, 155

.mwmrc, 155

.profile, 150, 155

.rhosts, 543

.xinitrc, 155

.xsession , 155 /bin, 26 /devices, 26 /dev, 26 /etc/aliases, 372

/etc/checklist, 376 /etc/checklist, HPUX, 117 /etc/dfs/dfstab, 41, 375 /etc/ethers, 63 /etc/exports, 41, 375 /etc/filesystems, AIX, 117 /etc/filesystems, 376 /etc/fstab, 117, 376 /etc/group, 28 /etc/hosts.allow, 377 /etc/inetd.conf, 333 /etc/inittab, 112 /etc/named.conf, 339 /etc/nsswitch.conf, 128 /etc/printcap, 379 /etc/resolv.conf, 90, 127 /etc/services, 333 /etc/system, 321 /etc/vfstab, 117, 376

/etc, 26 /export, 26 /home, 26 /sbin, 26 /sys, 26 /users, 26 /usr/bin, 26

/usr/etc/resolv.conf on IRIX, 127

/usr/local/gnu, 133 /usr/local/site, 133 /usr/local, 26, 133 /usr, 26

/var/adm, 27 /var/mail, 546 /var/spool, 27 /var, 27 INSTALL, 134 README, 134

cfagent.conf, 258 crack, passwords, 472 crontab, 242

dfstab, 41

INDEX

625

ftp.funet.fi, 134 ftp.uu.net, 134 lost+found, 117 passwd file, 566

rc files, 112

<> filehandle in Perl, 561 ==, 555

‘..‘ in Perl, 553

chomp command in Perl, 564 chop command in Perl, 564 close command in Perl, 561 die, 564

do..while in Perl, 558 eq, 555

eq and == in Perl, 555 if in Perl, 558

open command in Perl, 561 rename in Perl, 569

sed as a Perl script, 568 shift and arrays, 556

shift and arrays in Perl, 556 split and arrays, 556

split command, 556

stty and switching off term echo, 566

unless in Perl, 558 while in Perl, 558

Network address, 58

/var/spool/mail, 546

A record, 346

Abstract Syntax Notation, 197 Access bits, 28

Access bits, octal form, 29 Access bits, text form, 29 Access control lists, 32 Access rights, 28

Access to files, 28 ACEs in Windows, 37 ACLs, 32, 483

ACLS in Windows, 37 ACLs, network services, 336 actionsequence, 258

Active Directory, 198, 201 Active users, 163

AD, 198

Administrator account, 21

AFS, 39, 150

Agents, 333 Aliases in mail, 372 Aliases, DNS, 81

Alive, checking a host, 547 Analyzing security, 469 Andrew filesystem, 38 Anomaly detection, 313 Application layer, 47

Area Border Router, 406 Area, routing, 403

Argument vector in Perl, 553, 556 ARP, 63, 71

ARP/RARP, 84

Arrays (associated) in Perl, 557 Arrays (normal) in Perl, 555 Arrays and split, 556

Arrays in Perl, 553 AS, 66

ASN, 67 ASN.1, 197

Associated arrays, iteration, 560 AT&T, 18

ATA disks, 14 Athena, 150 ATM, 395

Attacks, links, 138 Authentication, 170 Autonomous system, 66 Autonomous system number, 67

Autonomous System Routing, 407

Back-doors, 437

Background process, Windows, 44 Backup, 442

Backup schedule, 458 Backup tools, 458 Backups, 455

BGP, 65

Big endian, 54 Binary server, 100 BIND, 547

BIND version 9, 339 BIND, setting up, 127

Binding, socket service, 336 BIOS, 17, 113

Block, disk, 323 Blocks, 116

626

INDEX

Bluetooth, 219 Boot loader, 142 Boot scripts, 112 Booting Unix, 111 Booting, NT, 113 BOOTP protocol, 84

Bootstrapping an infrastructure, 219 Border gateway protocol, 65

Bridge, 50

Broadcast address, 58 BSD 4.3, 243

BSD Unix, 18 Byte order, 54

Cache file, DNS, 339 Cache poisoning, 449 Canonical name, 81, 345 Canonical names, 339 Causality, 287

CD-ROM player, Solaris, 122 cfdisk, 116

Cfengine, 170, 470 cfengine, 258

Cfengine, authentication, 466 Cfengine, checksums, 463 Cfengine, inhomogeneous networks,

204

Cfengine, prevention, 253 Cfengine, specialized hosts, 78 CGI protocol, 575

Checking the mode of installed software, 135

Checking whether host is alive, 547 Checksums, 463

CIDR, 55

Class A,B,C,D,E networks, 55 Classed addresses, 63 Classes, 261

Classes, compound, 263 Classes, defining and undefining,

263

Classless addresses, 64 Classless IP addresses, 55 Clock synchronization, 242 Cloning Windows, 131 Closed system, 522 CNAME, 345, 346 Collisions, 319

Command interpreter, 20 Command line arguments in Perl,

553, 556

Common Unix Print System, 380 Common Unix Printing system, 380 Community string, 256, 474 Community strings, 215

Compiling sendmail, 367 Components, handling, 14 Compound classes, 263 Computer immunology, 226 Connection times, TCP, 321 Contact with the outside world, 62 Contention, 104

Contention in networks, 393 Convergence, 220, 226 Corollary

Aliases, 101 Authentication is

re-identification, 444 Data invulnerability, 441 Minimum privilege, 21 Multiuser communities, 76 Network communities, 76 Performance, 318 Privileges ports, 356 Redundancy, 220 Reproducibility, 220 Trusted third parties, 465

Corruption in filesystem, 297 Cricket, 313

cron, 242

Cron jobs, controlling with cfagent, 265

CUPS, 379, 380

Cut as a Perl script, 561 Cutset, fault tree, 303

Cygwin Unix compatibility for NT, 134

Daemon, 336

Daemons, 79

Daemons and services, 333 Daemons, starting without privilege,

138

Data links layer, 47 Day of the week, 267 DCE, 39, 150

INDEX

627

Death to the users, 95 Default nameserver, 90 Default printer, 379

Default route, 58, 62, 403, 548 Definition

Directory service, 197 Directory User Agent, 199 human–computer system, 11 Peer-to-peer application, 206 Policy, 76

Secure system, 429 Small world network, 283

Defunct process, 44 Delegation, 58, 204 Delta distribution, 527 Demultiplexing, 223

Denial of service attack, 443, 447 DENIM, 200

Dependencies in Makefiles, 550 Dependency, 100

Dependency problems, 295 Depot, 133

Determinism

Quality of Service, 410 Deterministic system, 522 Devices, 122

DFS, 39

DFS, Windows, 39

Diagnostics, 291 Differences, hosts, 78 Differentiated services, 411 Diffserv, 411

Digital signatures, 465 Directory services, 197 Disk backups, 455 Disk doctor, 546

Disk mirroring, 104, 442 Disk partition names, 123 Disk performance, 318 Disk quotas, 164

Disk repair, 546 Disk statistics, 547 Disk striping, 318 Disk, installing, 121

Distinguished Name, 198 Distributed Computing

Environment, 39

Distribution, measurements, 526 DNS, 88, 89, 337, 547

DNS aliases, 81

DNS and Directory Services, 199 DNS and IPv6 registration, 347 DNS and IPv6, Solaris, 128

DNS cache file, 339

DNS lookup with host, 92 DNS, BIND setup, 127 DNS, mail records, 346 DNS, revoking ls rights, 342 Domain, 88

Domain name, 89

Domain name system, 337 Domain name, definition, 127 Domain OS, 32

Domain, listing hosts in, 94 Domain, Windows, 84 DOS, 17

DoS attack, 447

Dots in hostnames, 264 Down, checking a host, 547 Downtime, 508

Drive letter assignment, 117 Dynamical systems, 536

Encryption, 566 Entropy, 523

Entry points to OS code, 16 Environment variables, 45 Environment variables in Perl, 553,

557 Error law, 530

Error reporting, 291 Errors in Perl, 564 Ethernet, 397

Length limit, 397 Ethics responsibility for

infrastructure, 238 Executable, making programs, 30 Exiting on errors in Perl, 564 Export files, 377

Exporting filesystems, Unix, 41 Exporting on GNU/Linux, 375 Exterior routing, 403

Exterior Routing Protocol, 407 External hosts do not seem to exist,

62

628

INDEX

Fail-over, 223

Fault tolerance, policy, 253 Fault tree analysis, 299 fdisk, 116

FEC, 408

Feedback regulation, 226 File access permission, 28 File handles in Perl, 561 File hierarchy, Unix, 25 File protection bits, 28

File sharing, Windows/Unix, 378 File type problem in WWW, 364 Files in Perl, 561

Files, iterating over lines, 561 Finding a mail server, 92 Finding domain information, 547

Finding the name server for other domains, 93

Fire cell, 110 Firewall, 129 Firewalls, 486 For loop, 559

For loops in Perl, 558 Foreach loop, 559

Forking new processes, 567 Formatting a filesystem, 546 Forms in HTML, 575

Forwarding Equivalence Class, 408 Fourier analysis, 535

FQHN, 337

Fractal nature of network traffic, 511 Fragment, of block, 323 Fragmentation of IP, 448

Free software foundation, 133 FSF, 133

FTP, 331

Fully qualified names, 264

Game theory, 306, 536 Gateway, 548

Gaussian distribution, 530 Glue record, DNS, 353 GNU software, 133 Grouping time values, 267 groups, 28

GRUB, 127

Guest accounts, 154

Handling components, 14 Handshaking, 47 Hangup signal, 545

Hard links, 27

Hard links, Windows, 36 Heavy-tailed distribution, 534 Help desk, 161

Hewlett Packard, 18 Hierarchy, file, 25 HINFO, 346

hme fast Ethernet interface, 319 Home directories, location, 150 Home directory, 150 Homogeneity, 204

host -n, 92

host command and DNS, 92 Host name gets truncated, 264 Host name lookup, 90 Hostname lookup, 128

HTTP, 331

HTTPS, 332 Hub, 50

IBM AS/400s, 18 IBM S/370, 18 IBM S/390, 18 IDE disks, 14 IMAP, 332

Immune system, 226 Immunity model, 226 Immunology, 226 Incremental backup, 458, 459 Index nodes, 25, 28

index SONET, 400

inetd master-daemon, 334 Inheritance of environment, 45 Inode corruption, 297

inodes, 25, 28

Installing a new disk, 121 Integrity, 455

Interface configuration, 61, 548 Interior routing, 403

Interior Routing Protocol, 406 Internet domain, 88

Internet protocol IPSec, 480

Interpretation of values in Perl, 555 Interrupts, 17

INDEX

629

Intranet, 360 IP address, 94

IP address lookup, 90 IP address, setting, 61 IP addresses, 55, 337 IP chains, 485

IP slash notation, 342 IP tables, 485

IPSec, 480, 483 IPv6, 55

IPv6 DNS lookup, 128 IPv6 DNS registration, 347 IPv6 in TCP wrappers, 337 ISO, 46

Iterating over files, 561 Iteration over arrays, 560 ITU, 216

junkfilter, 371

Kerberos, 150

Kernel architecture, 141 Kernel configuration, 141 Kernel tuning, Solaris, 321 keys, 560

kill, Windows process , 44

Labelling a disk, 116 Lambda switching, 393 Lame delegation, DNS, 353 Latency, 323

Law of errors, 530

Layer 3 switch, 395, 396 LDAP, 198, 332

LDAP classes, 272 LDAP schema, 272 Lexis, 170

License servers, 136 Link attacks, 138 Linux, 18

Linux, exports, 375 Little endian, 54

lmgrd, license server, 136 Local variables in Perl, 564 Log rotation, 296

Logical NOT, 263 Login directory, 150 Logistic networks, 207

Long file listing, 28 Looking up name/domain

information, 547 Lookup hosts in a domain, 94 Loopback address, 56, 58, 127 Loopback network in DNS, 339 lp default printer, 379

LPRng, 380

MacIntosh, 17, 229 Macintosh, 85 Magic numbers, 28

Mail address of administrator, 95 Mail aliases, 372

Mail exchangers, 92 Mail queue, 546

Mail records in DNS, 346 Mail relaying, 366

Mail spool directory, 546 Mail, finding the server, 92 Mailbox system, 365

Make program for configuration, 220 Management information base, 215 Management model, 217

Masking programs executable, 30 Master boot record, 113

Mean downtime, 508

Mean time before failure, 508 Mean value, 530

Memory leak, 316

Metropolitan Area Networks, 396 MIB, 215

Mime types in W3, 575 Mirroring of filesystems, 104 Mission critical systems, 425 Mixed strategies, 306

mkfs command, 117 Modular kernel, 322 Months, 267

Mounting filesystems, 42 Mounting filesystems., 544 Mounting problems, 377 MPLS, 395

MRTG, 313

Multi user OS, 16 Multi-port repeater, 50 multi-user mode, 111 Multicast address, 58

630

INDEX

Multiplexing, 393

Multitasking system, 16

MX, 346

MX records, 346

MySQL, 355

Name service, 80

Name service lookups, 89 Nameserver for other domains, 93 Nameserver list, 127

Naming scheme for Internet, 88 NAT, 67

ndd command, Solaris, 321 NDS, 198

Netmask, 58

Netmask, examples, 59 Netmask, exporting, 377 Network Address Translation, 67 Network address translator, 67 Network byte order, 54

Network information service, 89, 149 Network interface, 46

Network interfaces, 547 Network layer, 47

Network Management Model, 217 Network numbers, 339

Network Operating System, 200 Network, transmission method, 48 Networks, 55

Newcastle filesystem, 38 newfs command, 117 Newsprint, 382

NFS, 38

NFS client/server statistics, 547 NFS, root access, 471

Nine Step Model, 162, 163 NIS, 89, 128, 149

NIS plus, 128 nmap program, 476

nmap, port scanner, 98

No contact with outside world, 62 Non-repudiation, 21

Normal distribution, 530 Normal error law, 530 Normalization, 78 Normalization of a system, 454 NOS, 200

NOT operator, 263

Novell, 32, 85, 131, 200 Novell Directory Services, 198 Novell disk purge, 293

NS, 346

NTP, 332

Null client (mail), 349

One time passwords, 473 Online examinations, 170 Open system, 522 OpenAFS, 39

Operating system, 16 Operator ordering, 264 Oracle, 355

OSI Management Model, 217 OSI model, 46, 197 Outsourcing, 416 Overheads, performance, 318

Paging, 118 PAM, 230 Parallelism, 223

Parameters in Perl functions, 564 Pareto distribution, 534 Partitions, 122

Passive users, 163

Password cracking, Windows, 472 Password sniffing, 472, 473

Paste as a Perl script, 562

Pattern matching in Perl, 568, 571 Pattern replacement in Perl, 568 PCNFS, 229

Peer-to-peer and BGP, 407 Perl, 251, 470

Perl variables and types, 553 Perl, strings and scalar, 554 Perl, truncating strings, 564 Permissions on files, 28

Permissions on installed software, 135

Persistent connections, 358 PHP, 355

Physical layer, 47 PID, 43

ping, 182

Ping attacks, 446

Pluggable authentication modules, 230

INDEX

631

Police service, policy, 252 Policy, 230

IPSec, 481

Quality assurance, 324 Users, 153

Policy, formalizing, 227 Policy, user support, 161 Port, 336

Port numbers, 408 Port scanning, 87, 98 Port sniffing, 475 Portmapper, 377 Posix ACLs, 32

Predictability, 7, 77, 103, 153 Presentation layer, 47 Preventing loss, 455 Prey-Predator models, 226 Principle

Abstraction generalizes, 221 Access and privilege, 426 Active users, 163 Adaptability, 100, 195 Causality, 285 Communities, 75 Community borders, 488 Conflicting rules, 483 Conflicts of interest, 181 Contention/competition, 319 Data invulnerability, 441 Delegation I, 78

Delegation II, 205

Diagnostics, 291 Disorder, 235

Distributed accounts, 149 Equilibrium, 236

Flagging customization, 139 Freedom, 166

Harassment, 181 Homogeneity/Uniformity I, 203 Homogeneity/Uniformity II, 220 Identification requires trust, 444 Inter-dependency, 103 Minimum privilege, 21

Nash dilemma, 306

One name for one object I, 101 One name for one object II, 230 Perceived authority, 176

Policy, 236

Policy is the foundation, 6 Predictability, 7

Predictability vs determinism, 410

Predictable failure, 281 Predictable failure of humans,

192

Protocols offer predictability, 443 Rapid maintenance, 324

Rate guarantees, 410 Reliability, 219

Resource chokes and drains, 255

Resource map, 86 Risk, 429

Routing policy, 407 Scalability, 7, 219 Security is a property of

systems, 426

Security is about trust, 426 Separate user IDs for services,

356 Separation I, 119 Separation II, 120 Separation III, 136

Service corruption, 480 Simplest is best, 153 Standardized methods offer

predictability, 238 Strategic administration, 304 Symptoms and cause, 239, 315 System interaction, 195 System management’s role, 196 Temporary files, 138

Trusted third parties, 465 Uncertainty, 529 Uniformity, 77

Variety, 77 Weakest link, 318

Principle of uniformity, 204 Print services, 379

Print spool area, 379 Print-queue listing, 382 Print-queue, remove job, 382 Print-queue, start, 382 Print-queue, stop, 382

632

INDEX

Printer registration, 379 Printer, choosing a default, 379 Privilege

Limited privilege, 137 Privileged users, 161 Probability distributions, 526 Process ID, 43

Process starvation, 255 procmail, 371 Promiscuous mode, 392 Protection bits, 28 Protocols, 46

Proxy, 333

Proxy, firewall, 488 PTR records, 349

pty’s increasing number, 321 Public keys, 464

q=any, nslookup, 93 q=mx, nslookup, 92 q=ns, nslookup, 93 Quality of Service, 47, 68 queso program, 476 Quotas, 164

Race conditions, 138 RAID, 455

RARP, 63, 84, 129 Real time systems, 425 Redundancy, 223, 441

Registering a printer, 379 Registry, Windows, 131 Regulation, feedback, 226 Relaying, mail, 366 Reliability, 103

Repairing a damaged disk, 546 Repeater, 50

Resolver, setting up, 127 Resources, competition, 204 Restarting daemons, 545 Restricting privilege, 16, 19, 21, 28,

36

root account, 21 Root partition, 123 Rotation, logs, 296

Router, 49, 50, 393, 394 Router/switch difference, 50 Routers, 50

Routing Domain, 407 Routing domain, 66, 67 Routing information, 548 Routing table, 62, 547

RPC service not registered error, 377 RRDtool, 313

RSVP, 411

Running jobs at specified times, 242

s-bit, 30, 31 S-HTTP, 332 S/KEY, 473 Samba, 229, 378

Scalar variables in Perl, 554 Scheduling priority, 546 Scheduling service, Windows, 243 scli for SNMP, 257

Script aliases in W3, 575 Scripts, 20

SCSI disks, 14

SCSI probe on SunOS, 122 SDH, 50, 400

Searching and replacing in Perl (example), 569

Sectors, 116

Secure attention sequence, 444 Secure Socket Layer, 466 Secure socket layer, 465 Security holes, 437

Security, analysis, 469 Security, passive users, 163 Self-similar network traffic, 511 Sequence guessing, 448

Serial number, DNS, 351 Server message block, 378 Server room, 109

Service configuration, 333 Service Level Agreement, 416 Service packs, Windows, 126 Services, 79, 204

Services and daemons, 333 Services, starting without privilege,

138 Session layer, 47 setgid bit, 30 setuid bit, 30

Setuid programs, 437 Setuid software, 138

INDEX

633

Shadow password files, 472 Shannon entropy, 523 Sharing filesystems, Unix, 41 Shell, 20, 43

Short cuts, Windows, 36 Shutdown, NT, 113 SIMM, 14

Simple Network Management

Protocol, 215 Single point of failure, 488 Single task system, 16 Single user mode, 334 Single user OS, 16 single-user mode, 111 Site specific data, 133 SLA, 416

Slash notation, IP, 342 Slowly running systems, 293 SMB protocol, 378

Smurf attack, 449 SNMP, 215, 257, 474 SNMP security, 216 SOA, 346

SOAP, 417

Socket connections, 547 Sockets, 47

Soft links, 27 SONET, 50

Spectrum of frequencies, 535 SQL, 269

SSH, 332 SSL, 465, 466

Standard deviation, 530 Standard error of the mean, 532 Standard I/O in Perl, 561 Standardization, 78

Start up files for Unix, 112 Starvation of process, 255 Static kernel, 322 Statistics, disks, 547 Statistics, NFS, 547

Statistics, virtual memory, 547 Sticky bit, 31

Strategy, 306 Strings in Perl, 554

Structured query language, 269 Subnets, 58

Subroutines in Perl, 564 Suffix rules in Makefiles, 550 Suggestion

Clear prompts, 156 Cron management, 243 Environment, 155 FAQs, 291

Network security, 429

OS configuration files, 461 Passwords, 150

Platform independent languages, 221

Problem users, 164 SNMP containment, 216 Static data, 458

Tape backup, 460 Unix printing, 380

Unix shell defaults, 156 URL filesystem names, 462 Vigilance, 137

Work defensively, 429 Sun Microsystems, 18 Superuser, 21

Support, 161 SVR4, 596

Swap partition, 123 Swap space, 546 Swapping, 118

Swapping, switching on, 546 Switch, 393

Switch/router difference, 50 Switched networks, 50 Switches, 50, 52

Sybase, 355

Symbolic link attacks, 138 Symbolic links, 27 Symmetric keys, 464

SYN flooding, 447 System 5/System V, 18 System accounting, 164 System policy, 227, 230 System registry, 131 System type, 88

t-bit, 31 T1, 400 T3, 400

TCP tuning, 321

634

INDEX

TCP wrappers, 336 TCP/IP, 46

TCP/IP security, privilege, 21 TCP/IP spoofing, 447

Team work, 201, 234 Teardrop, 448

Telecommunications Management Network, 216

Terminal echo and stty, 566 Text form of access bits, 29 Thin clients, 128

Thrashing, 320 Time classes, 266 Time service, 242

Time, executing jobs at specified, 242

timezone, 87 TLS, 466 TMN, 216

Token rings, 397 traceroute, 182 Traffic analysis, 534 Transport layer, 47

Transport Layer Security, 466 Tripwire, 463 Troubleshooting, 291 Truncating strings in Perl, 564 Trust relationship, 148 Trusted ports, 21

Trusted third party, 465, 468 TTL, 596

Types in Perl, 553

uid, 150 umask, 33

Undeleting files, 455 Uniformity, 78, 204

Up, checking a host, 547

Usage patterns, understanding, 205 User interface, 16

User name, 19 User support, 161

user-id, 150

UWIN Unix toolkit for Windows, 134

virtual circuits, 396

Virtual machine model, 220 Virtual memory statistics, 547 Virtual Network Computing, 161 Virtual private network, 477 VLANS, 50

VNC, 161

VPN, 477

WAN, 51 Weather, 15

Web of trust, 465 White Pages, 197 Wide area network, 51 Windows, 17, 84 Windows 2000, 201

Windows, ACL/ACEs, 37 Windows, drive letter assignment,

117 Windows, install, 126 Workstation, NT, 23 WWW security, 479

X.500, 197

xhost access control, 477 XML, 417

XML-RPC, 417

Years, 266

Yellow Pages, 197

Yellow pages, 149

YP, 149

z-OS, 18 z-os, 25 z-series, 25 z/series, 18

Zenworks, 131 Zombie process, 44