
- •Contents
- •Preface to second edition
- •1 Introduction
- •1.2 Applying technology in an environment
- •1.3 The human role in systems
- •1.4 Ethical issues
- •1.7 Common practice and good practice
- •1.8 Bugs and emergent phenomena
- •1.10 Knowledge is a jigsaw puzzle
- •1.11 To the student
- •1.12 Some road-maps
- •2 System components
- •2.2 Handling hardware
- •2.3 Operating systems
- •2.4 Filesystems
- •2.5 Processes and job control
- •2.6 Networks
- •2.7 IPv4 networks
- •2.8 Address space in IPv4
- •2.9 IPv6 networks
- •3 Networked communities
- •3.1 Communities and enterprises
- •3.2 Policy blueprints
- •3.4 User behavior: socio-anthropology
- •3.5 Clients, servers and delegation
- •3.6 Host identities and name services
- •3.8 Local network orientation and analysis
- •4 Host management
- •4.1 Global view, local action
- •4.2 Physical considerations of server room
- •4.3 Computer startup and shutdown
- •4.5 Installing a Unix disk
- •4.6 Installation of the operating system
- •4.7 Software installation
- •4.8 Kernel customization
- •5 User management
- •5.1 Issues
- •5.2 User registration
- •5.3 Account policy
- •5.4 Login environment
- •5.5 User support services
- •5.6 Controlling user resources
- •5.7 Online user services
- •5.9 Ethical conduct of administrators and users
- •5.10 Computer usage policy
- •6 Models of network and system administration
- •6.5 Creating infrastructure
- •6.7 Competition, immunity and convergence
- •6.8 Policy and configuration automation
- •7.2 Methods: controlling causes and symptoms
- •7.4 Declarative languages
- •7.6 Common assumptions: clock synchronization
- •7.7 Human–computer job scheduling
- •7.9 Preventative host maintenance
- •7.10 SNMP tools
- •7.11 Cfengine
- •8 Diagnostics, fault and change management
- •8.1 Fault tolerance and propagation
- •8.2 Networks and small worlds
- •8.3 Causality and dependency
- •8.4 Defining the system
- •8.5 Faults
- •8.6 Cause trees
- •8.7 Probabilistic fault trees
- •8.9 Game-theoretical strategy selection
- •8.10 Monitoring
- •8.12 Principles of quality assurance
- •9 Application-level services
- •9.1 Application-level services
- •9.2 Proxies and agents
- •9.3 Installing a new service
- •9.4 Summoning daemons
- •9.5 Setting up the DNS nameservice
- •9.7 E-mail configuration
- •9.8 OpenLDAP directory service
- •9.10 Samba
- •9.11 The printer service
- •9.12 Java web and enterprise services
- •10 Network-level services
- •10.1 The Internet
- •10.2 A recap of networking concepts
- •10.3 Getting traffic to its destination
- •10.4 Alternative network transport technologies
- •10.5 Alternative network connection technologies
- •10.6 IP routing and forwarding
- •10.7 Multi-Protocol Label Switching (MPLS)
- •10.8 Quality of Service
- •10.9 Competition or cooperation for service?
- •10.10 Service Level Agreements
- •11 Principles of security
- •11.1 Four independent issues
- •11.2 Physical security
- •11.3 Trust relationships
- •11.7 Preventing and minimizing failure modes
- •12 Security implementation
- •12.2 The recovery plan
- •12.3 Data integrity and protection
- •12.5 Analyzing network security
- •12.6 VPNs: secure shell and FreeS/WAN
- •12.7 Role-based security and capabilities
- •12.8 WWW security
- •12.9 IPSec – secure IP
- •12.10 Ordered access control and policy conflicts
- •12.11 IP filtering for firewalls
- •12.12 Firewalls
- •12.13 Intrusion detection and forensics
- •13 Analytical system administration
- •13.1 Science vs technology
- •13.2 Studying complex systems
- •13.3 The purpose of observation
- •13.5 Evaluating a hierarchical system
- •13.6 Deterministic and stochastic behavior
- •13.7 Observational errors
- •13.8 Strategic analyses
- •13.9 Summary
- •14 Summary and outlook
- •14.3 Pervasive computing
- •B.1 Make
- •B.2 Perl
- •Bibliography
- •Index
Index
-D option, 263 -N option, 263
. directory, 27
.. directory, 27 /etc/hosts, 127
Average time before failure, 508 + in make, 553
$< in make, 553 $? in make, 553
CACLS command, 37
PRINTER, 382
PwDump, Windows, 472 arch program, 88 biod, 377
cancel, 382
catman command, 545 chgrp command, 31 chmod command, 30 chown command, 31 configure, 135
cp command, 544 cron, 259, 545 crontab command, 242 crypt(), 566
df command, 543 dig, 89 dnsquery, 547 domainname, 89 du command, 543
dump command, 544 etherfind command, 548 exportfs command, 375 find command, 545
for loop in Perl, 558 foreach loop in Perl, 558 fork(), 567
fsck program, 546 ftp, 134
groups and time intervals, 267 groups in cfengine, 261
host lookup, 89
ifconfig command, 61, 548 in.rarpd, 129
inetd, 545
installboot, SunOS, 142 iostat command, 547 kill command, 545 ldconfig command, 545 ldd command, 545
ln -s, 27 ln, 27
locate command, 545 lpc, 382
lpd, 382 lpq, 382 lprm, 382 lpr, 382 lpsched, 382 lpshut, 382
lpstat -a, 382 lpstat -o all, 382 lp, 382
ls -l, 28
mach program, 88 make, 135
mkfile command, 129 mkfs, 117
mount -a, 376 mount command, 376 mountd, 377
mwm window manager, 155 ncftp, 134
ndd, kernel parameters, 141 netstat command, 547
netstat -r and routing table, 547 netstat -r command, 62
624 |
INDEX |
newfs, 117
newfs command, 546 nfsd, 377
nfsiod, 377
nfsstat command, 547 nice, 546
nslookup, 89, 547
ping command, 446, 547 probe-scsi, Sun, 122 ps command, 545
rdump command, 544 renice command, 546 restore command, 544 rlogin command, 543 rm -i command, 455 route command, 548 rpc.mountd, 377 rpc.nfsd, 377
rsh command, 543 sendmail, 546 shareall, 376 share, 375, 376 snoop command, 548 ssh command, 543 startx, 155
su -c command, 138 swapon command, 546 tar command, 544 telnet command, 543
traceroute command, 548 ufsdump command, 544 umask variable, 30
uname, 88
updatedb script, 545 vmstat command, 547 whatis command, 545 which command, 545 whois command, 547 xdm, 155
xhost command, 477 xntpd, 242
.bashrc, 155
.cshrc, 150, 155
.mwmrc, 155
.profile, 150, 155
.rhosts, 543
.xinitrc, 155
.xsession , 155 /bin, 26 /devices, 26 /dev, 26 /etc/aliases, 372
/etc/checklist, 376 /etc/checklist, HPUX, 117 /etc/dfs/dfstab, 41, 375 /etc/ethers, 63 /etc/exports, 41, 375 /etc/filesystems, AIX, 117 /etc/filesystems, 376 /etc/fstab, 117, 376 /etc/group, 28 /etc/hosts.allow, 377 /etc/inetd.conf, 333 /etc/inittab, 112 /etc/named.conf, 339 /etc/nsswitch.conf, 128 /etc/printcap, 379 /etc/resolv.conf, 90, 127 /etc/services, 333 /etc/system, 321 /etc/vfstab, 117, 376
/etc, 26 /export, 26 /home, 26 /sbin, 26 /sys, 26 /users, 26 /usr/bin, 26
/usr/etc/resolv.conf on IRIX, 127
/usr/local/gnu, 133 /usr/local/site, 133 /usr/local, 26, 133 /usr, 26
/var/adm, 27 /var/mail, 546 /var/spool, 27 /var, 27 INSTALL, 134 README, 134
cfagent.conf, 258 crack, passwords, 472 crontab, 242
dfstab, 41
INDEX |
625 |
ftp.funet.fi, 134 ftp.uu.net, 134 lost+found, 117 passwd file, 566
rc files, 112
<> filehandle in Perl, 561 ==, 555
‘..‘ in Perl, 553
chomp command in Perl, 564 chop command in Perl, 564 close command in Perl, 561 die, 564
do..while in Perl, 558 eq, 555
eq and == in Perl, 555 if in Perl, 558
open command in Perl, 561 rename in Perl, 569
sed as a Perl script, 568 shift and arrays, 556
shift and arrays in Perl, 556 split and arrays, 556
split command, 556
stty and switching off term echo, 566
unless in Perl, 558 while in Perl, 558
Network address, 58
/var/spool/mail, 546
A record, 346
Abstract Syntax Notation, 197 Access bits, 28
Access bits, octal form, 29 Access bits, text form, 29 Access control lists, 32 Access rights, 28
Access to files, 28 ACEs in Windows, 37 ACLs, 32, 483
ACLS in Windows, 37 ACLs, network services, 336 actionsequence, 258
Active Directory, 198, 201 Active users, 163
AD, 198
Administrator account, 21
AFS, 39, 150
Agents, 333 Aliases in mail, 372 Aliases, DNS, 81
Alive, checking a host, 547 Analyzing security, 469 Andrew filesystem, 38 Anomaly detection, 313 Application layer, 47
Area Border Router, 406 Area, routing, 403
Argument vector in Perl, 553, 556 ARP, 63, 71
ARP/RARP, 84
Arrays (associated) in Perl, 557 Arrays (normal) in Perl, 555 Arrays and split, 556
Arrays in Perl, 553 AS, 66
ASN, 67 ASN.1, 197
Associated arrays, iteration, 560 AT&T, 18
ATA disks, 14 Athena, 150 ATM, 395
Attacks, links, 138 Authentication, 170 Autonomous system, 66 Autonomous system number, 67
Autonomous System Routing, 407
Back-doors, 437
Background process, Windows, 44 Backup, 442
Backup schedule, 458 Backup tools, 458 Backups, 455
BGP, 65
Big endian, 54 Binary server, 100 BIND, 547
BIND version 9, 339 BIND, setting up, 127
Binding, socket service, 336 BIOS, 17, 113
Block, disk, 323 Blocks, 116
626 |
INDEX |
Bluetooth, 219 Boot loader, 142 Boot scripts, 112 Booting Unix, 111 Booting, NT, 113 BOOTP protocol, 84
Bootstrapping an infrastructure, 219 Border gateway protocol, 65
Bridge, 50
Broadcast address, 58 BSD 4.3, 243
BSD Unix, 18 Byte order, 54
Cache file, DNS, 339 Cache poisoning, 449 Canonical name, 81, 345 Canonical names, 339 Causality, 287
CD-ROM player, Solaris, 122 cfdisk, 116
Cfengine, 170, 470 cfengine, 258
Cfengine, authentication, 466 Cfengine, checksums, 463 Cfengine, inhomogeneous networks,
204
Cfengine, prevention, 253 Cfengine, specialized hosts, 78 CGI protocol, 575
Checking the mode of installed software, 135
Checking whether host is alive, 547 Checksums, 463
CIDR, 55
Class A,B,C,D,E networks, 55 Classed addresses, 63 Classes, 261
Classes, compound, 263 Classes, defining and undefining,
263
Classless addresses, 64 Classless IP addresses, 55 Clock synchronization, 242 Cloning Windows, 131 Closed system, 522 CNAME, 345, 346 Collisions, 319
Command interpreter, 20 Command line arguments in Perl,
553, 556
Common Unix Print System, 380 Common Unix Printing system, 380 Community string, 256, 474 Community strings, 215
Compiling sendmail, 367 Components, handling, 14 Compound classes, 263 Computer immunology, 226 Connection times, TCP, 321 Contact with the outside world, 62 Contention, 104
Contention in networks, 393 Convergence, 220, 226 Corollary
Aliases, 101 Authentication is
re-identification, 444 Data invulnerability, 441 Minimum privilege, 21 Multiuser communities, 76 Network communities, 76 Performance, 318 Privileges ports, 356 Redundancy, 220 Reproducibility, 220 Trusted third parties, 465
Corruption in filesystem, 297 Cricket, 313
cron, 242
Cron jobs, controlling with cfagent, 265
CUPS, 379, 380
Cut as a Perl script, 561 Cutset, fault tree, 303
Cygwin Unix compatibility for NT, 134
Daemon, 336
Daemons, 79
Daemons and services, 333 Daemons, starting without privilege,
138
Data links layer, 47 Day of the week, 267 DCE, 39, 150
INDEX |
627 |
Death to the users, 95 Default nameserver, 90 Default printer, 379
Default route, 58, 62, 403, 548 Definition
Directory service, 197 Directory User Agent, 199 human–computer system, 11 Peer-to-peer application, 206 Policy, 76
Secure system, 429 Small world network, 283
Defunct process, 44 Delegation, 58, 204 Delta distribution, 527 Demultiplexing, 223
Denial of service attack, 443, 447 DENIM, 200
Dependencies in Makefiles, 550 Dependency, 100
Dependency problems, 295 Depot, 133
Determinism
Quality of Service, 410 Deterministic system, 522 Devices, 122
DFS, 39
DFS, Windows, 39
Diagnostics, 291 Differences, hosts, 78 Differentiated services, 411 Diffserv, 411
Digital signatures, 465 Directory services, 197 Disk backups, 455 Disk doctor, 546
Disk mirroring, 104, 442 Disk partition names, 123 Disk performance, 318 Disk quotas, 164
Disk repair, 546 Disk statistics, 547 Disk striping, 318 Disk, installing, 121
Distinguished Name, 198 Distributed Computing
Environment, 39
Distribution, measurements, 526 DNS, 88, 89, 337, 547
DNS aliases, 81
DNS and Directory Services, 199 DNS and IPv6 registration, 347 DNS and IPv6, Solaris, 128
DNS cache file, 339
DNS lookup with host, 92 DNS, BIND setup, 127 DNS, mail records, 346 DNS, revoking ls rights, 342 Domain, 88
Domain name, 89
Domain name system, 337 Domain name, definition, 127 Domain OS, 32
Domain, listing hosts in, 94 Domain, Windows, 84 DOS, 17
DoS attack, 447
Dots in hostnames, 264 Down, checking a host, 547 Downtime, 508
Drive letter assignment, 117 Dynamical systems, 536
Encryption, 566 Entropy, 523
Entry points to OS code, 16 Environment variables, 45 Environment variables in Perl, 553,
557 Error law, 530
Error reporting, 291 Errors in Perl, 564 Ethernet, 397
Length limit, 397 Ethics responsibility for
infrastructure, 238 Executable, making programs, 30 Exiting on errors in Perl, 564 Export files, 377
Exporting filesystems, Unix, 41 Exporting on GNU/Linux, 375 Exterior routing, 403
Exterior Routing Protocol, 407 External hosts do not seem to exist,
62
628 |
INDEX |
Fail-over, 223
Fault tolerance, policy, 253 Fault tree analysis, 299 fdisk, 116
FEC, 408
Feedback regulation, 226 File access permission, 28 File handles in Perl, 561 File hierarchy, Unix, 25 File protection bits, 28
File sharing, Windows/Unix, 378 File type problem in WWW, 364 Files in Perl, 561
Files, iterating over lines, 561 Finding a mail server, 92 Finding domain information, 547
Finding the name server for other domains, 93
Fire cell, 110 Firewall, 129 Firewalls, 486 For loop, 559
For loops in Perl, 558 Foreach loop, 559
Forking new processes, 567 Formatting a filesystem, 546 Forms in HTML, 575
Forwarding Equivalence Class, 408 Fourier analysis, 535
FQHN, 337
Fractal nature of network traffic, 511 Fragment, of block, 323 Fragmentation of IP, 448
Free software foundation, 133 FSF, 133
FTP, 331
Fully qualified names, 264
Game theory, 306, 536 Gateway, 548
Gaussian distribution, 530 Glue record, DNS, 353 GNU software, 133 Grouping time values, 267 groups, 28
GRUB, 127
Guest accounts, 154
Handling components, 14 Handshaking, 47 Hangup signal, 545
Hard links, 27
Hard links, Windows, 36 Heavy-tailed distribution, 534 Help desk, 161
Hewlett Packard, 18 Hierarchy, file, 25 HINFO, 346
hme fast Ethernet interface, 319 Home directories, location, 150 Home directory, 150 Homogeneity, 204
host -n, 92
host command and DNS, 92 Host name gets truncated, 264 Host name lookup, 90 Hostname lookup, 128
HTTP, 331
HTTPS, 332 Hub, 50
IBM AS/400s, 18 IBM S/370, 18 IBM S/390, 18 IDE disks, 14 IMAP, 332
Immune system, 226 Immunity model, 226 Immunology, 226 Incremental backup, 458, 459 Index nodes, 25, 28
index SONET, 400
inetd master-daemon, 334 Inheritance of environment, 45 Inode corruption, 297
inodes, 25, 28
Installing a new disk, 121 Integrity, 455
Interface configuration, 61, 548 Interior routing, 403
Interior Routing Protocol, 406 Internet domain, 88
Internet protocol IPSec, 480
Interpretation of values in Perl, 555 Interrupts, 17
INDEX |
629 |
Intranet, 360 IP address, 94
IP address lookup, 90 IP address, setting, 61 IP addresses, 55, 337 IP chains, 485
IP slash notation, 342 IP tables, 485
IPSec, 480, 483 IPv6, 55
IPv6 DNS lookup, 128 IPv6 DNS registration, 347 IPv6 in TCP wrappers, 337 ISO, 46
Iterating over files, 561 Iteration over arrays, 560 ITU, 216
junkfilter, 371
Kerberos, 150
Kernel architecture, 141 Kernel configuration, 141 Kernel tuning, Solaris, 321 keys, 560
kill, Windows process , 44
Labelling a disk, 116 Lambda switching, 393 Lame delegation, DNS, 353 Latency, 323
Law of errors, 530
Layer 3 switch, 395, 396 LDAP, 198, 332
LDAP classes, 272 LDAP schema, 272 Lexis, 170
License servers, 136 Link attacks, 138 Linux, 18
Linux, exports, 375 Little endian, 54
lmgrd, license server, 136 Local variables in Perl, 564 Log rotation, 296
Logical NOT, 263 Login directory, 150 Logistic networks, 207
Long file listing, 28 Looking up name/domain
information, 547 Lookup hosts in a domain, 94 Loopback address, 56, 58, 127 Loopback network in DNS, 339 lp default printer, 379
LPRng, 380
MacIntosh, 17, 229 Macintosh, 85 Magic numbers, 28
Mail address of administrator, 95 Mail aliases, 372
Mail exchangers, 92 Mail queue, 546
Mail records in DNS, 346 Mail relaying, 366
Mail spool directory, 546 Mail, finding the server, 92 Mailbox system, 365
Make program for configuration, 220 Management information base, 215 Management model, 217
Masking programs executable, 30 Master boot record, 113
Mean downtime, 508
Mean time before failure, 508 Mean value, 530
Memory leak, 316
Metropolitan Area Networks, 396 MIB, 215
Mime types in W3, 575 Mirroring of filesystems, 104 Mission critical systems, 425 Mixed strategies, 306
mkfs command, 117 Modular kernel, 322 Months, 267
Mounting filesystems, 42 Mounting filesystems., 544 Mounting problems, 377 MPLS, 395
MRTG, 313
Multi user OS, 16 Multi-port repeater, 50 multi-user mode, 111 Multicast address, 58
630 |
INDEX |
Multiplexing, 393
Multitasking system, 16
MX, 346
MX records, 346
MySQL, 355
Name service, 80
Name service lookups, 89 Nameserver for other domains, 93 Nameserver list, 127
Naming scheme for Internet, 88 NAT, 67
ndd command, Solaris, 321 NDS, 198
Netmask, 58
Netmask, examples, 59 Netmask, exporting, 377 Network Address Translation, 67 Network address translator, 67 Network byte order, 54
Network information service, 89, 149 Network interface, 46
Network interfaces, 547 Network layer, 47
Network Management Model, 217 Network numbers, 339
Network Operating System, 200 Network, transmission method, 48 Networks, 55
Newcastle filesystem, 38 newfs command, 117 Newsprint, 382
NFS, 38
NFS client/server statistics, 547 NFS, root access, 471
Nine Step Model, 162, 163 NIS, 89, 128, 149
NIS plus, 128 nmap program, 476
nmap, port scanner, 98
No contact with outside world, 62 Non-repudiation, 21
Normal distribution, 530 Normal error law, 530 Normalization, 78 Normalization of a system, 454 NOS, 200
NOT operator, 263
Novell, 32, 85, 131, 200 Novell Directory Services, 198 Novell disk purge, 293
NS, 346
NTP, 332
Null client (mail), 349
One time passwords, 473 Online examinations, 170 Open system, 522 OpenAFS, 39
Operating system, 16 Operator ordering, 264 Oracle, 355
OSI Management Model, 217 OSI model, 46, 197 Outsourcing, 416 Overheads, performance, 318
Paging, 118 PAM, 230 Parallelism, 223
Parameters in Perl functions, 564 Pareto distribution, 534 Partitions, 122
Passive users, 163
Password cracking, Windows, 472 Password sniffing, 472, 473
Paste as a Perl script, 562
Pattern matching in Perl, 568, 571 Pattern replacement in Perl, 568 PCNFS, 229
Peer-to-peer and BGP, 407 Perl, 251, 470
Perl variables and types, 553 Perl, strings and scalar, 554 Perl, truncating strings, 564 Permissions on files, 28
Permissions on installed software, 135
Persistent connections, 358 PHP, 355
Physical layer, 47 PID, 43
ping, 182
Ping attacks, 446
Pluggable authentication modules, 230
INDEX |
631 |
Police service, policy, 252 Policy, 230
IPSec, 481
Quality assurance, 324 Users, 153
Policy, formalizing, 227 Policy, user support, 161 Port, 336
Port numbers, 408 Port scanning, 87, 98 Port sniffing, 475 Portmapper, 377 Posix ACLs, 32
Predictability, 7, 77, 103, 153 Presentation layer, 47 Preventing loss, 455 Prey-Predator models, 226 Principle
Abstraction generalizes, 221 Access and privilege, 426 Active users, 163 Adaptability, 100, 195 Causality, 285 Communities, 75 Community borders, 488 Conflicting rules, 483 Conflicts of interest, 181 Contention/competition, 319 Data invulnerability, 441 Delegation I, 78
Delegation II, 205
Diagnostics, 291 Disorder, 235
Distributed accounts, 149 Equilibrium, 236
Flagging customization, 139 Freedom, 166
Harassment, 181 Homogeneity/Uniformity I, 203 Homogeneity/Uniformity II, 220 Identification requires trust, 444 Inter-dependency, 103 Minimum privilege, 21
Nash dilemma, 306
One name for one object I, 101 One name for one object II, 230 Perceived authority, 176
Policy, 236
Policy is the foundation, 6 Predictability, 7
Predictability vs determinism, 410
Predictable failure, 281 Predictable failure of humans,
192
Protocols offer predictability, 443 Rapid maintenance, 324
Rate guarantees, 410 Reliability, 219
Resource chokes and drains, 255
Resource map, 86 Risk, 429
Routing policy, 407 Scalability, 7, 219 Security is a property of
systems, 426
Security is about trust, 426 Separate user IDs for services,
356 Separation I, 119 Separation II, 120 Separation III, 136
Service corruption, 480 Simplest is best, 153 Standardized methods offer
predictability, 238 Strategic administration, 304 Symptoms and cause, 239, 315 System interaction, 195 System management’s role, 196 Temporary files, 138
Trusted third parties, 465 Uncertainty, 529 Uniformity, 77
Variety, 77 Weakest link, 318
Principle of uniformity, 204 Print services, 379
Print spool area, 379 Print-queue listing, 382 Print-queue, remove job, 382 Print-queue, start, 382 Print-queue, stop, 382
632 |
INDEX |
Printer registration, 379 Printer, choosing a default, 379 Privilege
Limited privilege, 137 Privileged users, 161 Probability distributions, 526 Process ID, 43
Process starvation, 255 procmail, 371 Promiscuous mode, 392 Protection bits, 28 Protocols, 46
Proxy, 333
Proxy, firewall, 488 PTR records, 349
pty’s increasing number, 321 Public keys, 464
q=any, nslookup, 93 q=mx, nslookup, 92 q=ns, nslookup, 93 Quality of Service, 47, 68 queso program, 476 Quotas, 164
Race conditions, 138 RAID, 455
RARP, 63, 84, 129 Real time systems, 425 Redundancy, 223, 441
Registering a printer, 379 Registry, Windows, 131 Regulation, feedback, 226 Relaying, mail, 366 Reliability, 103
Repairing a damaged disk, 546 Repeater, 50
Resolver, setting up, 127 Resources, competition, 204 Restarting daemons, 545 Restricting privilege, 16, 19, 21, 28,
36
root account, 21 Root partition, 123 Rotation, logs, 296
Router, 49, 50, 393, 394 Router/switch difference, 50 Routers, 50
Routing Domain, 407 Routing domain, 66, 67 Routing information, 548 Routing table, 62, 547
RPC service not registered error, 377 RRDtool, 313
RSVP, 411
Running jobs at specified times, 242
s-bit, 30, 31 S-HTTP, 332 S/KEY, 473 Samba, 229, 378
Scalar variables in Perl, 554 Scheduling priority, 546 Scheduling service, Windows, 243 scli for SNMP, 257
Script aliases in W3, 575 Scripts, 20
SCSI disks, 14
SCSI probe on SunOS, 122 SDH, 50, 400
Searching and replacing in Perl (example), 569
Sectors, 116
Secure attention sequence, 444 Secure Socket Layer, 466 Secure socket layer, 465 Security holes, 437
Security, analysis, 469 Security, passive users, 163 Self-similar network traffic, 511 Sequence guessing, 448
Serial number, DNS, 351 Server message block, 378 Server room, 109
Service configuration, 333 Service Level Agreement, 416 Service packs, Windows, 126 Services, 79, 204
Services and daemons, 333 Services, starting without privilege,
138 Session layer, 47 setgid bit, 30 setuid bit, 30
Setuid programs, 437 Setuid software, 138
INDEX |
633 |
Shadow password files, 472 Shannon entropy, 523 Sharing filesystems, Unix, 41 Shell, 20, 43
Short cuts, Windows, 36 Shutdown, NT, 113 SIMM, 14
Simple Network Management
Protocol, 215 Single point of failure, 488 Single task system, 16 Single user mode, 334 Single user OS, 16 single-user mode, 111 Site specific data, 133 SLA, 416
Slash notation, IP, 342 Slowly running systems, 293 SMB protocol, 378
Smurf attack, 449 SNMP, 215, 257, 474 SNMP security, 216 SOA, 346
SOAP, 417
Socket connections, 547 Sockets, 47
Soft links, 27 SONET, 50
Spectrum of frequencies, 535 SQL, 269
SSH, 332 SSL, 465, 466
Standard deviation, 530 Standard error of the mean, 532 Standard I/O in Perl, 561 Standardization, 78
Start up files for Unix, 112 Starvation of process, 255 Static kernel, 322 Statistics, disks, 547 Statistics, NFS, 547
Statistics, virtual memory, 547 Sticky bit, 31
Strategy, 306 Strings in Perl, 554
Structured query language, 269 Subnets, 58
Subroutines in Perl, 564 Suffix rules in Makefiles, 550 Suggestion
Clear prompts, 156 Cron management, 243 Environment, 155 FAQs, 291
Network security, 429
OS configuration files, 461 Passwords, 150
Platform independent languages, 221
Problem users, 164 SNMP containment, 216 Static data, 458
Tape backup, 460 Unix printing, 380
Unix shell defaults, 156 URL filesystem names, 462 Vigilance, 137
Work defensively, 429 Sun Microsystems, 18 Superuser, 21
Support, 161 SVR4, 596
Swap partition, 123 Swap space, 546 Swapping, 118
Swapping, switching on, 546 Switch, 393
Switch/router difference, 50 Switched networks, 50 Switches, 50, 52
Sybase, 355
Symbolic link attacks, 138 Symbolic links, 27 Symmetric keys, 464
SYN flooding, 447 System 5/System V, 18 System accounting, 164 System policy, 227, 230 System registry, 131 System type, 88
t-bit, 31 T1, 400 T3, 400
TCP tuning, 321
634 |
INDEX |
TCP wrappers, 336 TCP/IP, 46
TCP/IP security, privilege, 21 TCP/IP spoofing, 447
Team work, 201, 234 Teardrop, 448
Telecommunications Management Network, 216
Terminal echo and stty, 566 Text form of access bits, 29 Thin clients, 128
Thrashing, 320 Time classes, 266 Time service, 242
Time, executing jobs at specified, 242
timezone, 87 TLS, 466 TMN, 216
Token rings, 397 traceroute, 182 Traffic analysis, 534 Transport layer, 47
Transport Layer Security, 466 Tripwire, 463 Troubleshooting, 291 Truncating strings in Perl, 564 Trust relationship, 148 Trusted ports, 21
Trusted third party, 465, 468 TTL, 596
Types in Perl, 553
uid, 150 umask, 33
Undeleting files, 455 Uniformity, 78, 204
Up, checking a host, 547
Usage patterns, understanding, 205 User interface, 16
User name, 19 User support, 161
user-id, 150
UWIN Unix toolkit for Windows, 134
virtual circuits, 396
Virtual machine model, 220 Virtual memory statistics, 547 Virtual Network Computing, 161 Virtual private network, 477 VLANS, 50
VNC, 161
VPN, 477
WAN, 51 Weather, 15
Web of trust, 465 White Pages, 197 Wide area network, 51 Windows, 17, 84 Windows 2000, 201
Windows, ACL/ACEs, 37 Windows, drive letter assignment,
117 Windows, install, 126 Workstation, NT, 23 WWW security, 479
X.500, 197
xhost access control, 477 XML, 417
XML-RPC, 417
Years, 266
Yellow Pages, 197
Yellow pages, 149
YP, 149
z-OS, 18 z-os, 25 z-series, 25 z/series, 18
Zenworks, 131 Zombie process, 44