Index

A note on the digital index

A link in an index entry is displayed as the section title in which that entry appears. Because some sections have multiple index markers, it is not unusual for an entry to have several links to the same section. Clicking on any link will take you directly to the place in the text in which the marker appears.

Symbols

! (bang) character, retrieving previously issued commands, Learning from Your Command History
# (hash mark) for comments in code, The Default Boot Menu
(') (single quote) vs. backticks (`), Finding Program Paths
(`) (backticks) vs. single quote ('), Finding Program Paths
.” (comment) groff command, Creating a Manpage

A

Access Control Lists (ACLs), FreeBSD Access Control ListsSee Also
adding/subtracting, Adding and Subtracting ACLs
enabling, Enabling ACLs
setting default ACLs, Setting Default ACLsSetting Default ACLs
viewing, Viewing ACLs
access, limiting with IP Filter, Limiting Access with IP FilterSee Also
accounting (system), enabling, Details, DetailsDetails, Details
accton command, Details, Details
ACID (Analysis Console for Intrusion Databases)
adding more security to, Hacking the Hack
alerts, Running SnortHacking the Hack
configuring, Configure ACID
installing, More installations
running, Running ACID
ack numbers in packets, Deciphering tcpdump Output
addresses, MAC, spoofing, Spoof a MAC AddressSpoofing with OpenBSD
adduser command, OpenBSD
Blowfish and, Forcing new passwords to use Blowfish
adodb (database library for PHP), installing, More installations
ADSL PPPoE configuration, What the Script DoesExample Usage
alerts, ACID, Running SnortHacking the Hack
anonymous CVS, Build a Port Without the Ports Tree
antivirus software, Scan a Network of Windows Computers for VirusesSee Also
Apache servers
configuring, Configure Apache and PHP
consolidating logs, Consolidate Web Server Logs
installing, Install PHP4, Apache, and MySQL
starting, Running ACID
tuning, See Also
APG (Automated Password Generator), Automate Memorable Password Generation
improving, Improving apg
installing, Installing and Using apg
appending changes to files, Preventing Some Changes and Allowing Others
applets, Java, Applets
arch flag, Preventing File Changes, Controlling Backups
archives
compressed, Archiving and Compressing Data with tar and gzip
without intermediate files, Compress Archives Without Using Intermediate Files
creating portable POSIX archives, Create Portable POSIX ArchivesSee Also
downloading and untarring, Simultaneously Download and Untar
multivolume, resources for, Useful Resources for Multiple Volume Archives
rooted, Rooted Archives and the Substitution Argument
ARP packets, Deciphering tcpdump Output
attaching/detaching screen sessions, Attaching and Deattaching
attributes of files, preserving when copying, Attribute-Preserving Copies
authorized/unauthorized hosts, PF ConfigurationHacking the Hack
auto completion, History and Auto-Completion
working around, Silencing Auto-Complete
autologout after inactivity, Using autologout
automated re-upgrades, preventing, Preventing Automated Re-Upgrades
automating
backups, Automating the backup
data dumps for PostgreSQL databases, Automate Data Dumps for PostgreSQL DatabasesSee Also
floppy format process, Automating the Format Process
ftp logins, Automating Logins
generated firewall rules, Automatically Generate Firewall RulesSee Also
installs, Automated InstallSee Also
NetBSD package builds, Automate NetBSD Package BuildsHacking the Hack
password generation, Automate Memorable Password GenerationSee Also
remote backups, Automate Remote BackupsSee Also
security patches, Automate Security PatchesSee Also
system updates, Automate UpdatesSee Also
virus scanning, Automating the Process
awk command, Finding Symlinks

B

backticks (`) vs. single quote ('), Finding Program Paths
backups
automating, Automating the backup
Bacula program, Perform Client-Server Cross-Platform Backups with BaculaSee Also
controlling with arch/nodump flags, Controlling Backups
creating schedules, Creating Backup Schedules
data dumps for PostgreSQL databases, automating, Automate Data Dumps for PostgreSQL DatabasesSee Also
remote, automating, Automate Remote BackupsSee Also
secure backups over networks, Secure Backups Over a NetworkAutomating the backup
Bacula program, Perform Client-Server Cross-Platform Backups with BaculaSee Also
client-only version, installing, Creating a Client-only Install
configuration files, modifying, Configuration FilesDirector on the backup server
using consoles, Introducing Bacula, Using the Bacula Console
database tables, creating, Database Setup
installing, Installation
starting daemons, Starting the Bacula Daemons
testing tape drives, Testing Your Tape Drive
bandwidth
allocating with traffic shaping, Traffic Shaping on FreeBSDComplex Configurations
limiting
complex configurations, Complex Configurations
simple configuration, Simple Configurations
batcher process, logproc DescribedViewing Live Log Data
Beastie boot menu, The Default Boot MenuThe Default Boot Menu
BEEP_ONHALT option, Beep on Halt
bell command, Scripting an Entire Session
Berlin, Marlon, Contributors
Bernier, Robert, Contributors
Big Brother System and Network Monitor, Hacking the Hack
binaries
finding, Finding Program Paths
protecting, using flags, Protecting Binaries
bitmap images, loading, Configuring the Splash Screen
blank lines, removing using grep/sed, Removing Blank Lines
Blowfish hashes, Protecting Passwords With Blowfish HashesSee Also
forcing new passwords to use Blowfish, Forcing new passwords to use Blowfish
protecting system passwords with, Protecting System Passwords with BlowfishForcing new passwords to use Blowfish
/boot directory, The Default Boot Menu
boot menu (default), customizing, Customize the Default Boot MenuBeep on Halt
boot messages, viewing, Viewing Boot Messages
boot process
interrupting, Password Protecting Single-User Mode
protecting, Protect the Boot ProcessSee Also
bootblocks configuration, changing, Enabling a Serial Console
browsers, command-line, Creating a Dictionary or Thesaurus
brute-force password crackers, preventing with Blowfish, Protecting Passwords With Blowfish HashesForcing new passwords to use Blowfish
bsdlabel command, Formatting Floppies
btape utility, Testing Your Tape Drive
buffer overflows, analyzing with GNU debugger, Use the GNU Debugger to Analyze a Buffer OverflowSee Also
bus information in kernel configuration files, Supported buses and media devices

C

calendar command, Pursuing Trivia
capturing packets, The BasicsDeciphering tcpdump Output
cap_mkdb command, Protecting System Passwords with Blowfish
Carosone, Daniel, Contributors
case of characters, translating, Translating Case
cd command, Editing and Navigating the Command Line
CD-ROMs, mounting, Managing the Floppy
Cerias FTP site (cracker dictionaries), See Also
cgd(4) devices, The Cryptographic Disk DeviceSee Also
cgdconfig program, The Cryptographic Disk DeviceSee Also
chflags command, Preventing File ChangesLog Protection
chmod command, Allowing Regular Users to Mount Floppies
chromatic, Contributors
chroot support for scponly, Restrict an SSH server
testing, Testing the chroot
ClamAV utility, Scan a Network of Windows Computers for VirusesSee Also
clamav.conf file, Installing and Running the Virus Scanner
clamd command, Installing and Running the Virus Scanner
clamdscan command, Installing and Running the Virus Scanner
clamscan command, Installing and Running the Virus Scanner
CLASSPATH environment variable, Running Java Applications
Client Daemon (Bacula), Introducing Bacula
installing client-only version of Bacula, Creating a Client-only Install
clipboard, managing, Managing Your Clipboard
ClusterIt tool, Why ClusterIt?See Also
installing/configuring, Installation and Configuration
noninteractive commands, testing, Testing Noninteractive Commands
code examples, permission for using, Using Code Examples
col command, Cleaning Up script Files, Translating Tabs to Spaces
colors, adding to terminals, Adding Some Color to Your Terminal
command history, History and Auto-Completion
retrieving previously issued commands, Learning from Your Command History
command line
editing, Editing and Navigating the Command Line
navigating, Editing and Navigating the Command Line
w3m browser for, Creating a Dictionary or Thesaurus
command-line Console (Bacula), Introducing Bacula, Using the Bacula Console
commands
distributed, Distributed Command ExecutionSee Also
finding, Finding Commands
comments
adding to code using # (hash mark), The Default Boot Menu
adding to source code, Adding Comments to Source Code
in manpages, Creating a Manpage
removing from source code, Removing Comments
in source code, reading, What Did the Manpage Forget to Say?What Did the Manpage Forget to Say?
compiling software, optimizing, Optimizing Software Compiling
compressed archives
creating, Archiving and Compressing Data with tar and gzip
without intermediate files, Compress Archives Without Using Intermediate Files
configuration files
for Apache, Configure Apache and PHP
for Bacula, Configuration FilesDirector on the backup server
for cgd devices, modifying, Modifying Configuration Files
customizing for kernels, Customizing Your KernelUSB support
default files for users, Customize User Configurationsdot.shrc
safely merging changes to, Safely Merge Changes to /etcSee Also
for sudo utility, sudo Configuration Gotchas
connectivity failure, surviving, Survive Catastrophic Internet LossSee Also
console messages
from headless systems, Log a Headless Server RemotelySetting Up the Headless System
viewing, Seeing Console Messages
over remote logins, See Console Messages Over a Remote LoginHacking the Hack
consolidating web server logs, Consolidate Web Server LogsSee Also
copier process, logproc DescribedTesting the Configuration
COPTFLAGS option, Kernel Optimizations
copying interactively, Interactive Copy
copyright information, changing, Changing the Copyright Display
core files, limiting size of, Limiting Files
core X distribution, utilities that come with, Fun with XSee Also
cp command, Finding Your Source FilesRenaming Files Interactively
vs. mv/rm commands, Preventing File Changes
CPU information in kernel configuration files, CPU options
CPU_WT_ALLOC option, Kernel Optimizations
crack (dictionary password cracker), Installing and Using crackSee Also
crackers, password, preventing with Blowfish, Protecting Passwords With Blowfish HashesForcing new passwords to use Blowfish
Crandall, Aaron, Contributors
cron utility
access restriction rules, Switching Rules on a Schedule
making more user friendly, Making cron More User-Friendly
using with quickpatch, Automating the Process
rsnapshot, scheduling, Scheduling rsnapshot
scheduling backups, Archiving and Compressing Data with tar and gzip
cross-platform backups, Perform Client-Server Cross-Platform Backups with BaculaSee Also
crossword-puzzle solver, Become a Crossword Champion
cryptographic disasters, preventing, Final Thoughts and Warnings
cryptographic disk devices, The Cryptographic Disk DeviceSee Also
.cshrc files
adding color to terminals, Adding Some Color to Your Terminal
adding key bindings to, Specifying Strings
autologout, Using autologout
dot.cshrc file and, dot.cshrc
locking terminals, Using lock
making prompts more useful, Making Your Prompt More Useful, Making Your Prompt More Useful
phase of the moon, displaying, The phase of the moon
receiving daily fortunes, A Fortune a Day
seeing trivia at login or logout, Pursuing Trivia
setting shell variables, Setting Shell Variables
using trash command, Replacing rm with ~/bin/trash
CTM, keeping ports up-to-date with, Keep Ports Up-to-Date with CTMSee Also
cu command, If the Headless System Becomes Inaccessible
current time, displaying, The current time
custom packages, creating, Create a Package RepositoryCreating the NFS Share
customizing
default boot menu, Customize the Default Boot MenuBeep on Halt
kernels, Customizing Your KernelUSB support
CVS, anonymous, Build a Port Without the Ports Tree
cvsup process
automating updates, Assembling the PiecesSee Also
editing /usr/src/share/skel/Makefile file, Editing /usr/src/share/skel/Makefile
etcmerge utility and, Initial Preparations

D

daemons, running without root permissions, Running Without Root
daily_clean_disks script, daily_clean_disks
daily_clean_preserve script, daily_clean_preserve
daily_clean_tmps script, daily_clean_tmps
DarwinPorts project, installing Unix applications on Mac OS X, Easily Install Unix Applications on Mac OS XSee Also
debugger, GNU, analyzing buffer overflows, Use the GNU Debugger to Analyze a Buffer OverflowSee Also
debugging regular expressions, Using Regular Expressions
decompressing files, Limiting Files
default ACLs, setting, Setting Default ACLsSetting Default ACLs
default configuration files, Customize User Configurationsdot.shrc
default shell for FreeBSD, Get the Most Out of the Default Shell
deleted files, sending to trash directory, Create a Trash DirectoryHacking the Hack
delimited files and double quotation marks, Delimiter DilemmaSee Also
demos for trade shows, creating, Create a Trade Show DemoSee Also
dependencies
checking before uninstalling applications, Checking Dependencies Before Uninstalling
of ports, checking for, Finding a Port and Its Dependencies
deploying images, Deploying the Image
DESTDIR variable (pkg_comp), Configuration Variables
/dev/console file, An Alternate Method
devices in kernel configuration files, Supported buses and media devices
DEVICE_POLLING option, Optimizing Network Performance
devinfo command, Viewing Resource Information
/dev/null, using with find command, Finding Words
df command, Managing the Floppy, Clearing /tmp
dhclient command, Spoofing on FreeBSD, Initial PreparationHacking the Hack
dhclient.conf file, Spoofing on FreeBSD
DHCP clients/servers
configuring multiple wireless networks, Initial Preparation
spoofing MAC addresses, Spoof a MAC AddressSpoofing on FreeBSD
DHCP server configuration, DHCP Configuration, What the Script DoesExample Usage
Diablo Java packages, Choosing Which Java Port to Install
dial filter rules, Dealing with DNS
dictionaries
creating, Creating a Dictionary or Thesaurus
improving your, Improved Dictionary
password, customizing, Customizing Password DictionariesSee Also
dictionary password cracker, Installing and Using crackSee Also
diff command, Apply, Understand, and Create PatchesSee Also
dig (domain information groper) utility, locating DNS information, Exploring Your ISP’s DNSSee Also
Director Daemon (Bacula), Introducing BaculaSee Also
directories
maintaining synchronized copies of, Enter unisonSee Also
protecting files with flags, Watch Your Directories
recreating structures with mtree, Recreate a Directory Structure Using mtreeSee Also
disk hogs, dealing with, Deal with Disk HogsSee Also
disk space used by ports, checking, Checking the Disk Space Your Ports Use
disklabel command, The Cryptographic Disk Device
display filters and tcpdump, Display Filters
DISTRIBDIR variable (pkg_comp), Configuration Variables
distributed command execution using tentakel, Distributed Command ExecutionSee Also
dmesg command, Moving /tmp to RAM, Initial Preparation
DNS, Understand DNS Records and ToolsSee Also
deciphering tcpdump output, Deciphering tcpdump Output
finding names of SMTP servers, Understanding DNS entries
finding server addresses, Exploring Your ISP’s DNS
problems with sendmail and mail queues, Dealing with DNS
providing security for, Securing DNSTesting DNS
split DNS approach, The two-pronged approach
testing servers, The two-pronged approach
understanding DNS entries, Understanding DNS entriesUnderstanding DNS entries
zone transfers, controlling tightly, Securing DNSTesting DNS
documentation for FreeBSD, Online ResourcesWhat Did the Manpage Forget to Say?
documents, extracting text using grep, Document Extracts
DOS floppies (see floppies)
dot.cshrc file, dot.cshrcdot.cshrc
dot.login file, dot.login
dot.login_conf file, dot.login_conf
dot.logout file, dot.logout
dot.mailrc file, dot.mail_aliases and dot.mailrc
dot.mail_aliases file, dot.mail_aliases and dot.mailrc
dot.profile file, dot.profile
dot.rhosts file, dot.rhosts
dot.shrc file, dot.shrc
dot.xinitrc file, dot.xinitrc
Dotzler, Asa, Creating a Dictionary or Thesaurus
double quotation marks and delimited files, Delimiter DilemmaSee Also
Dowdeswell, Roland C., The Cryptographic Disk Device
downgrading ports, Downgrade a PortSee Also
downloading and untarring archives, Simultaneously Download and Untar
du command, Creating an Image
dummynet command, Traffic Shaping on FreeBSDCreating Pipes and Queues, See Also
dump command, Final Thoughts and Warnings
dumpfiles
creating, The Basics
deciphering tcpdump output, Deciphering tcpdump Output
duplicate line feeds, removing, Removing Duplicate Line Feeds
dvt (distributed virtual terminal) command, Using dvt

E

e16keyedit utility, More Complex Scripts
echoing responses to OTP challenge, Generating Responses
editing the command line, Editing and Navigating the Command Line
eesh utility (Enlightenment), Create a Trade Show DemoSee Also
egrep command, Using Regular Expressions
Eichmann, Heiner, Downgrade a Port
email, Why Do I Need sendmail?
(see also sendmail)
holding for later delivery, Hold Email for Later DeliverySee Also
reading with telnet, Reading Email with telnet
relaying considered harmful, Sending Email with telnet
security considerations, Security Considerations
sending
to external recipients, Simple sendmail Configuration with a Local MTA
with telnet, Sending Email with telnetSending Email with telnet
emergency repair kit
creating, Create an Emergency Repair KitSee Also
customizing boot process and, The Default Boot Menu
testing, Use the FreeBSD Recovery ProcessSee Also
encrypted disk devices, creating, Creating the Encrypted Disk Device
encrypting hard disks, Encrypt Your Hard DiskSee Also
Enlightenment window manager, Create a Trade Show DemoSee Also
error messages for mount command, Common Error Messages
errors
analyzing buffer overflows with GNU debugger, Use the GNU Debugger to Analyze a Buffer OverflowSee Also
reading comments in source code for help, What Did the Manpage Forget to Say?What Did the Manpage Forget to Say?
/etc files, safely merging changes to, Safely Merge Changes to /etcSee Also
/etc/dhclient.conf file, Spoofing on FreeBSD
/etc/fstab file, Managing the Floppy, Modifying Configuration Files
/etc/ipf.rules file, Limiting Access with IP Filter
/etc/login.access file, /etc/login.access
/etc/login.conf file, /etc/login.conf
/etc/make.conf file, Optimizing Software Compiling
/etc/netstart command, Spoofing on FreeBSD
/etc/periodic.conf file, Periodic Scripts
/etc/pf.conf file, PF Configuration
/etc/profile file, dot.profile
/etc/ssh/sshd_config file, /etc/ssh/sshd_config
/etc/ttys file, securing, /etc/ttys
etcmerge utility, Initial PreparationsSee Also
Expect scripts, generating GPG keys with, Script User InteractionSee Also
<Emphasis>Exploring Expect<Default Para Font>, See Also
extattrctl command, Additional UFS1 Configuration
extended attributes, enabling for ACLs, Additional UFS1 Configuration
extended regular expressions, Using Regular Expressions
extracting text from documents using grep, Document Extracts

F

fastest-cvsup command, Automating the Process
FAT12 filesystem, Mounting a Floppy
fdformat command, Formatting Floppies
fdisk command, Creating an Image
fetch utility, Installation, Improved Dictionary
File Daemon (Bacula), Introducing Bacula
file integrity checking using mtree, Use mtree as a Built-in TripwireDeciding on Which Files to Include
file servers, optimizing, Optimizing File Servers
file utility, Cleaning Up script Files
files
appending changes to, Preventing Some Changes and Allowing Others
attributes of, preserving when copying, Attribute-Preserving Copies
decompressing, Limiting Files
deleted, sending to trash directory, Create a Trash DirectoryHacking the Hack
delimited, Delimiter DilemmaSee Also
hierarchies, copying, Attribute-Preserving Copies
last modification dates of, When Did I Change That File?
limiting, Limiting Files
portable, creating, Creating Portable Files
protecting with flags, Protect Files with FlagsSee Also
renaming interactively, Renaming Files Interactively
with specific extensions, deleting, daily_clean_disks
filesystems
disk hogs, dealing with, Deal with Disk HogsSee Also
DOS floppies (see floppies)
ghosting systems, Ghosting SystemsSee Also
recreating directory structures with mtree, Recreate a Directory Structure Using mtreeSee Also
sharing files between Windows and FreeBSD, Access Windows Shares Without a ServerSee Also
swap files and, Creating a Swap File on DiskSee Also
temporary files, adding, Manage Temporary Files and Swap Space
using live filesystems, Using the Live Filesystem
filters, display and tcpdump, Display Filters
find command, Finding WordsFinding Words, Finding Your Source FilesRenaming Files Interactively
finding
commands, Finding Commands
program paths, Finding Program Paths
words, Finding WordsFinding Words
Fink project, Easily Install Unix Applications on Mac OS X, See Also
firewalls
automatically generating rules, Automatically Generate Firewall RulesSee Also
IP Filter, limiting access with, Limiting Access with IP FilterSee Also
ipfw command, Creating Pipes and Queues, Using Masks
securing wireless networks with PF, DHCP ConfigurationHacking the Hack
zone transfers, controlling, The two-pronged approach
Firewire support in kernel configuration files, USB support
fixit floppies, Inventory of the KitPreparing the Floppies
repairing with, Using the fixit Floppy
flags field of TCP headers, More Complicated Filters
flags, protecting files with, Protect Files with FlagsSee Also
Flickenger, Rob, Acknowledgments
floppies
formatting, Formatting Floppies
ghosting systems, Ghosting SystemsSee Also
mounting, Mounting a Floppy
by regular users, Allowing Regular Users to Mount Floppies
preparing for emergencies, Preparing the Floppies
unmounting, Managing the Floppy
flushing mail queues, Configuring PPP
forcing users to change passwords, Adding Your Own Options
formatting floppies, Formatting Floppies
automating the process, Automating the Format Process
formatting sequences for prompts, Making Your Prompt More Useful
fortune program, A Fortune a Day, Rotate Your SignatureHacking the Hack
FreeBSD
backing up with SMBFS, Back Up FreeBSD with SMBFSSee Also
default shell for, Get the Most Out of the Default Shell
online/offline resources for, Online ResourcesWhat Did the Manpage Forget to Say?
running native Java applications on, Run Native Java ApplicationsSee Also
sharing files between Windows and, Access Windows Shares Without a ServerSee Also
spoofing with, Spoofing on FreeBSDSpoofing on FreeBSD
FreeBSD From Scratch hack, FreeBSD from ScratchSee Also
freshclam command, Installing and Running the Virus Scanner
fsck_ffs command, Using the fixit Floppy
fstab command, Managing the Floppy
ftp command
automating logins, Automating Logins
automating transfers, Automating Transfers
keeping ports up-to-date with CTM, Keep Ports Up-to-Date with CTMHacking the Hack
ncftp tool and, A Better FTP?
scripting entire sessions, Scripting an Entire Session

G

g4u (Ghost For Unix) utility, Ghosting SystemsSee Also
gdb command, Using the GNU DebuggerUsing the GNU Debugger
getfacl command, Viewing ACLs, Setting Default ACLs
ghost disks, creating, Creating the Ghost Disk
Ghost For Unix (g4u) utility, Ghosting SystemsSee Also
ghosting systems, Ghosting SystemsSee Also
images, creating/deploying, Creating an ImageDeploying the Image
GNOME GUI Console (Bacula), Introducing Bacula, Using the Bacula Console
GNU debugger, analyzing buffer overflows, Use the GNU Debugger to Analyze a Buffer OverflowSee Also
GNU tar utility, incompatibility issues with, GNU Versus POSIX tar
Gould, Andrew, Contributors
GPG keys, generating with Expect scripts, Script User InteractionSee Also
grdc command, The current time
grep command, Get the Most Out of grepCombining grep with Other Commands
case-insensitive search, performing, Multiple Transformations
combining with other commands, Combining grep with Other Commands
extracting text from documents, Document Extracts
finding words, Finding WordsFinding Words
using regular expressions, Using Regular Expressions
relevance searches, Searching by Relevance
removing blank lines, Removing Blank Lines
text, finding, Finding Text
groff commands for creating manpages, Creating a Manpage
grokking BSD, IntroductionSee Also
groups of hosts, executing commands on, using tentakel, How tentakel Can HelpSee Also
gzip utility, Back Up FreeBSD with SMBFS, Archiving and Compressing Data with tar and gzip, Creating the Script

H

hacking BSD, Why BSD Hacks?
Haitzler, Carsten, More Complex Scripts
halt command and BEEP_ONHALT option, Beep on Halt
hard disks
encrypted disk device, creating, Creating the Encrypted Disk Device
encrypting, Encrypt Your Hard DiskSee Also
ghosting systems and, Ghosting SystemsSee Also
preparing for encryption, Preparing the Disk
restoring data, Restoring Data
scrubbing, Scrubbing the Disk
hardware information, displaying, Display Hardware InformationSee Also
Harris, Daniel, Contributors
Harrison, Geoff, More Complex Scripts
head command, Seeing Remote Console Messages
headers, packet, More Complicated Filters
headless systems, Run a Headless System
becoming inaccessible, If the Headless System Becomes InaccessibleSee Also
logging servers remotely, Log a Headless Server RemotelyBeep on Halt
preparing for, Preparing the System
setting up, Setting Up the Headless System
shutting down servers using wsmoused, Shutting Down the Server Using wsmoused
Hess, Joey, See Also
hierarchies of files, copying, Attribute-Preserving Copies
history, command, History and Auto-Completion
retrieving previously issued commands, Learning from Your Command History
host controller information in kernel configuration files, USB support
host systems, establishing SMB connections with, Establishing an SMB Connection with a Host System
host utility, Testing DNS
hosts, authorized and unauthorized, PF ConfigurationHacking the Hack
html2txt converter, Improved Dictionary
HZ option, Optimizing Network Performance, Configuring Your Kernel for Traffic Shaping

I

ICMP type field/ICMP code field, More Complicated Filters
IDE devices in kernel configuration files, Supported buses and media devices
idled utility, Enforcing Logout
IDSs (Intrusion Detection Systems), Intrusion Detection with Snort, ACID, MySQL, and FreeBSDSee Also
ifconfig command
enabling/disabling interfaces, Quickly Disable All Interfaces
optimizing network performance, Optimizing Network Performance
running headless systems, Preparing the System
scripting wireless network configurations, Initial Preparation
spoofing MAC addresses, Spoofing on FreeBSD
tcpdump output, humanizing, The Basics
images, creating/deploying, using ghosting utility, Creating an ImageDeploying the Image
inaccessibility of headless systems, If the Headless System Becomes InaccessibleSee Also
incorrect user input, handling, Handling Incorrect Input
installboot utility, Enabling a Serial Console
installing systems automatically, Automated InstallSee Also
integrity checking for files using mtree, Use mtree as a Built-in TripwireDeciding on Which Files to Include
integrity databases
creating, Creating the Integrity DatabaseCreating the Integrity Database
deciding which files to include, Deciding on Which Files to Include
preparing for storage, Preparing the Database for Storage
working with, Using the Integrity Database
interact command, Adding User Interaction
interactive
copying, Interactive Copy
file renaming, Renaming Files Interactively
remote administration, Interactive Remote AdministrationHacking the Hack
scripts, creating with Expect, Script User InteractionSee Also
shells, Use an Interactive ShellLetting Other People Watch Your Live Shell Sessions
interface statistics, gathering, Gathering Interface Statistics
interface support in kernel configuration files, Interface support
interfaces, enabling/disabling, Quickly Disable All Interfaces
intermittent Internet connection and sendmail, Hold Email for Later DeliverySee Also
Internet loss, catastrophic, surviving, Survive Catastrophic Internet LossSee Also
intervals of backups, specifying, Specifying backup intervals
Intrusion Detection Systems (IDSs), Intrusion Detection with Snort, ACID, MySQL, and FreeBSDSee Also
IP Filter
automatically generating firewall rules, Automatically Generate Firewall RulesSee Also
limiting access with, Limiting Access with IP FilterSee Also
switching rules on schedule, Switching Rules on a Schedule
IP NAT configuration, What the Script Does
IPFIREWALL_DEFAULT_TO_ACCEPT option, Using Masks
ipfw command, Creating Pipes and Queues, Using Masks

J

Jabber4r Ruby module, Jabber and Ruby to the Rescue!
Java applets, Applets
Java applications, running on FreeBSD, Run Native Java ApplicationsSee Also
Java Development Kits (JDKs), Choosing Which Java Port to Install
Java Runtime Environments (JREs), Choosing Which Java Port to Install
Java Virtual Machines (JVMs), Choosing Which Java Port to Install
javavmwrapper port, Javavmwrapper
javaws application, Java WebStart
JAVA_HOME environment variable, Standalone Java Applications
JDKs (Java Development Kits), Choosing Which Java Port to Install
Jetty (Java servlet), Servlets
JPGraph, installing, More installations
JREs (Java Runtime Environments), Choosing Which Java Port to Install
JVMs (Java Virtual Machines), Choosing Which Java Port to Install

K

kenv command, Viewing Kernel Environment
kernel environment, viewing, Viewing Kernel Environment
kernels
adding SMB support to, Adding NETSMB Kernel Support
building new, Building the New Kernel
configuring for traffic shaping, Configuring Your Kernel for Traffic Shaping
customizing, Customizing Your KernelUSB support
installing, Installing the New Kernel
optimizing, Kernel Optimizations
stripping, Strip the KernelSee Also
supporting MAC (Mandatory Access Control), Preparing the SystemQuickly Disable All Interfaces
keys, GPG, generating, Script User InteractionSee Also
kldload command, Seeing Other Users
kldunload command, Seeing Other Users

L

Langille, Dan, Contributors
laptops
backing up, Perform Client-Server Cross-Platform Backups with BaculaSee Also
configuring wireless interfaces for, Use Multiple Wireless NIC ConfigurationsHacking the Hack
encrypting hard disks, Encrypt Your Hard DiskFinal Thoughts and Warnings
power management support for, Peripheral support and power management
last command, When Did That Happen?
last modification dates of files, finding, When Did I Change That File?
lastcomm command, Details, Details
lastlogin command, When Did That Happen?
leave command, Don’t Forget to Leave
Lents, David, Acknowledgments, Log Protection
less pager
customizing, Customizing less
vs. more pager, Navigational Tricks
Libes, Don, See Also
limiting files, Limiting Files
line feeds (duplicate), removing, Removing Duplicate Line Feeds
live filesystems, using, Using the Live Filesystem
live log data, viewing, Viewing Live Log Data
livelock and kernel optimizations, Optimizing Network Performance
loader.conf file, The Default Boot Menu, Configuring the Splash Screen
password protection, Password Protecting loader
loader.rc file, The Default Boot Menu
locate command, What Did the Manpage Forget to Say?
lock command, Lock the Screen
log files for sudoscript, The sudoscript Log FileThe sudoscript Log File
log hosts
configuring scripts on, Configuring Scripts on the Log Host
consolidating web server logs, Consolidate Web Server LogsSee Also
logproc and, logproc Described
preparing, Preparing the Log Host
variables/values for
log host scripts, Configuring Scripts on the Log Host
web server scripts, Preparing the Web Servers
logging out of login shell, dot.logout
logging servers, setting up, Setting Up the Logging Server
login banner, removing, Remove the Terminal Login BannerSee Also
.login file, dot.login
login prompt, changing, Changing the Login Prompt
.login.conf file, dot.login_conf
logins
automating, using ftp, Automating Logins
lastlogin command, When Did That Happen?
remote, See Console Messages Over a Remote LoginHacking the Hack
connecting to headless servers, Log a Headless Server RemotelyBeep on Halt
restricting, Restrict Logins/etc/login.conf
logout policy, enforcing, Enforcing Logout
logproc scripts, Consolidate Web Server LogsSee Also
logs for web servers, consolidating, Consolidate Web Server LogsSee Also
logs, protecting with flags, Log ProtectionLog Protection
@LongName tar format extension, GNU Versus POSIX tar
look command, Quick Spellcheck
lowercasing characters, Translating Case

M

MAC (Mandatory Access Control) framework, Tighten Security with Mandatory Access ControlSee Also
Mac OS X
installing Unix applications using DarwinPorts, Easily Install Unix Applications on Mac OS XSee Also
macdef command, Automating TransfersScripting an Entire Session
macros, FTP, Automating TransfersScripting an Entire Session
MAC_IFOFF module, Quickly Disable All Interfaces
MAC_SEEOTHERUIDS module, Seeing Other Users
magic cookies and X authorization, Understanding X authorization
mail (see email)
mail exchange (MX) records, Understanding DNS entries, Sending Email with telnet
mail servers
checking connectivity of, Testing SMTP Server Availability
optimizing, Optimizing Mail Servers
Mail Submission Process (MSP), Closing Port 25Simple sendmail Configuration Without a Local MTA
Mail Transport Agents (MTAs), Why Do I Need sendmail?See Also
mail user agents (MUAs) and pipes, If Your Mail Program Supports a Pipe
mailing lists for receiving CTM updates, Hacking the Hack
make.conf file, Optimizing Software Compiling
Makefile, editing, Editing /usr/src/share/skel/MakefileEditing /usr/src/share/skel/Makefile
makewhatis command, Finding Installed Manpages
Mandatory Access Control (MAC) framework, Tighten Security with Mandatory Access ControlSee Also
manpages, How to Use this Book
adding fancy formatting to, Getting Fancier
creating your own, Create Your Own ManpagesSee Also
finding, Finding Program Paths
finding all, Finding Installed Manpages
navigational tricks for reading, Navigational Tricks
printing, Printing Manpages
searching for text in, Making Your Prompt More Useful, Searching Text
manpath.config file, Manpage Basics
masks and pipes/queues, Using Masks
Maxwell, David, Contributors
Mayo, Adrian, Contributors
mdconfig command, Creating a Swap File on Disk
Media Access Control (MAC) layer, spoofing addresses, Spoof a MAC AddressSpoofing with OpenBSD
media devices in kernel configuration files, Supported buses and media devices
mergemaster utility, FreeBSD from Scratch, Safely Merge Changes to /etc
merging changes to configuration files, Safely Merge Changes to /etcSee Also
Merino Vidal, Julio, Contributors
message of the day (motd), changing, Changing the Message of the Day
messages, console (see console messages)
MIBs, changing from the command line, Seeing Other Users
miibus entry in kernel configuration files, Interface supportBuilding the New Kernel
minicom utility, Enabling a Serial Console
MIT magic cookie, Understanding X authorization
mktemp command, Script Walkthrough
Mock, Jim, Contributors
modification dates of files, finding, When Did I Change That File?
modules, Mandatory Access Control (MAC), Preparing the SystemQuickly Disable All Interfaces
MODULES_OVERRIDE option, Kernel Optimizations
moon, phases of (pom) utility, The phase of the moon
Moran, Bill, Simple sendmail Configuration Without a Local MTA
more pager vs. less pager, Navigational Tricks
motd (message of the day), changing, Changing the Message of the Day
mount command, Mounting a FloppyAllowing Regular Users to Mount Floppies
error messages for, Common Error Messages
mount points, Mounting a Floppy, Preparing the FreeBSD System
mounting
CD-ROMs, Managing the Floppy
floppies, Mounting a Floppy
by regular users, Allowing Regular Users to Mount Floppies
remote shares, Mounting a Share
mount_msdosfs command, Mounting a Floppy
mount_smbfs utility, Access Windows Shares Without a Server, Establishing an SMB Connection with a Host System
Mozilla, configuring to use signature file, Pipeless Signature Rotation
MSP (Mail Submission Process), Closing Port 25Simple sendmail Configuration Without a Local MTA
MTAs (Mail Transport Agents), Why Do I Need sendmail?See Also
mtree utility, Using mtreeSee Also
command syntax for, Creating the Integrity Database
using as built-in tripwire, Use mtree as a Built-in TripwireDeciding on Which Files to Include
MUAs (mail user agents) and pipes, If Your Mail Program Supports a Pipe
multiple systems, maintaining your environment on, Maintain Your Environment on Multiple SystemsSee Also
multivol utility, Useful Resources for Multiple Volume Archives
multivolume archives, resources for, Useful Resources for Multiple Volume Archives
mv command vs. cp command, Preventing File Changes
MX (mail exchange) records, Understanding DNS entries, Sending Email with telnet
MySQL
adding more security to, Hacking the Hack
configuring, Configure MySQL
installing client and server, Install MySQL-server

N

nameservers
finding DNS server addresses, Exploring Your ISP’s DNS
locating primary nameservers, Understanding DNS entries
securing, Securing DNSTesting DNS
NAT
automatically generated firewall rules, What the Script DoesExample Usage
reconfiguring dynamically, Survive Catastrophic Internet LossSee Also
wireless networks and, DHCP ConfigurationSee Also
native Java applications, running on FreeBSD, Run Native Java ApplicationsSee Also
navigating
command line, Editing and Navigating the Command Line
manpages, Navigational Tricks
nbtstat command, Installing and Configuring Sharity-Light
ncftp tool, A Better FTP?
NetBIOS names of computers, Installing and Configuring Sharity-Light, Preparing the FreeBSD System
NetBSD
automating package builds, Automate NetBSD Package BuildsHacking the Hack
cgd(4) devices, The Cryptographic Disk DeviceSee Also
dealing with disk hogs, NetBSD
default shell for, Get the Most Out of the Default Shell
logging headless servers remotely, Log a Headless Server RemotelyBeep on Halt
skeleton home directory location, NetBSD
spoofing with, Spoofing on NetBSD
NETBSD_RELEASE variable (pkg_comp), Configuration Variables
netstart command, Spoofing on FreeBSD
netstat command, Seeing Other Users, Gathering Interface Statistics
network interface information, gathering, Gathering Interface Statistics
network terminals, logging into, The Console
networking
allocating bandwidth, Traffic Shaping on FreeBSDComplex Configurations
catastrophic Internet loss, surviving, Survive Catastrophic Internet LossSee Also
holding email for later delivery, Hold Email for Later DeliverySee Also
interacting with remote administration tasks, Interactive Remote AdministrationHacking the Hack
optimizing performance, Optimizing Network Performance
secure backups over networks, Secure Backups Over a NetworkAutomating the backup
securing wireless networks with PF, Secure a Wireless Network Using PFSee Also
tcpdump utility, Humanize tcpdump OutputSee Also
traffic shaping, Traffic Shaping on FreeBSDComplex Configurations
newfs command, Creating the Encrypted Disk Device
newfs_msdos command, Formatting Floppies
newsyslog, disabling, Log Protection
NFS share, creating, Creating the NFS Share
NFS_NOSERVER option, Kernel Optimizations
NIC configurations, wireless, Use Multiple Wireless NIC ConfigurationsHacking the Hack
NoCatAuth authentication software, See Also
nodump flag, Preventing File Changes, Controlling Backups
nonlogin shells, dot.login
nouchg flag, Watch Your Directories
NSWAPDEV option, Kernel Optimizations
null modem cables for headless systems, Run a Headless System

O

od command, Translating Tabs to Spaces
one-liner commands, Unix, Useful One-Liners
one-time passwords, Use One Time PasswordsSee Also
OpenBSD
dealing with disk hogs, OpenBSD
default shell for, Get the Most Out of the Default Shell
skeleton home directory location, OpenBSD
spoofing with, Spoofing with OpenBSD
swap files, adding, OpenBSD Differences
openssl command, Preparing the Database for Storage
OPIE (One-time Passwords In Everything), Configuring OPIE
opieinfo command, Configuring OPIE
opiekey command, Configuring OPIE
opiepasswd command, Configuring OPIE, Generating Responses
optimizing
file servers, Optimizing File Servers
kernels, Kernel Optimizations
mail servers, Optimizing Mail Servers
network performance, Optimizing Network Performance
software compiling, Optimizing Software Compiling
web servers, Optimizing Web Servers
OTP (One Time Password) system, Use One Time PasswordsChoosing When to Use OTP
choosing when to use, Choosing When to Use OTP
generating responses, Configuring OPIE
Owen, Howard, Contributors

P

Package Compiler (pkg_comp) command, Installing pkg_compHacking the Hack
package repositories, creating, Create a Package RepositoryCreating the NFS Share
packageAdd command, Preparing the Install Script
packages
automating NetBSD builds, Automate NetBSD Package BuildsHacking the Hack
checking dependencies, Checking Dependencies Before Uninstalling
Packet Filter (PF)
configuring, PF ConfigurationPF Configuration
securing wireless networks with, Secure a Wireless Network Using PFSee Also
packet sniffers, protecting from, Reading Email with telnet
packets
capturing, The BasicsDeciphering tcpdump Output
deciphering tcpdump output, Deciphering tcpdump OutputDeciphering tcpdump Output
PAM (Pluggable Authentication Modules), Create an Effective, Reusable Password PolicySee Also
pam_passwdqc module
changing default settings, Adding Your Own Options
enabling, Enabling pam_passwdqcEnabling pam_passwdqc
overview of, Introducing pam_passwdqc
parallel command execution using tentakel, Distributed Command ExecutionSee Also
partition full detection script, Log Protection
partitioning scheme for automated installs, Preparing the Install Script
passphrases
for cgd devices, Creating the Encrypted Disk Device
changing periodically, Generating Responses
one-time passwords and, Configuring OPIE
passwd command, Converting existing passwords, sudo Configuration Gotchas
changing default options using pam_passwdqc module, Adding Your Own Options
password protecting
loaders, Password Protecting loader
single-user mode, Password Protecting Single-User Mode
passwords
converting existing passwords to Blowfish, Converting existing passwordsConverting existing passwords
crack (dictionary password cracker), Installing and Using crackSee Also
customizing dictionaries, Customizing Password DictionariesSee Also
forcing new passwords to use Blowfish, Forcing new passwords to use Blowfish
helping users choose memorable passwords, Automate Memorable Password GenerationSee Also
one-time passwords, Use One Time PasswordsSee Also
protecting email, Reading Email with telnet
protecting system passwords with Blowfish, Protecting System Passwords with BlowfishForcing new passwords to use Blowfish
reusable, creating policy for, Create an Effective, Reusable Password PolicySee Also
setting expiration dates for, Adding Your Own Options
patches
applying to files, Applying PatchesApplying Patches
creating, Creating Patches
diff command and, Finding DifferencesFinding Differences
revision control and, Revision Control
security, automating, Automate Security PatchesSee Also
pathnames, finding, Finding Program Paths
pattern space vs. holding space (sed utility), Using the Holding Space to Mark Text
pax utility, Replacing tar with paxSee Also
performance of networks, optimizing, Optimizing Network Performance
periodic scripts, Deal with Disk Hogs
MTAs (Mail Transport Agents), Why Do I Need sendmail?
peripheral information in kernel configuration files, Peripheral support and power management
permission for using code examples, Using Code Examples
permissions
FTP servers, accessing, Automating Logins
protecting files with flags, Protect Files with FlagsSee Also
specifying for ACLs, Viewing ACLs
standard Unix vs. ACLs, FreeBSD Access Control Lists
Peterson, Jan L., Contributors
PF (Packet Filter)
configuring, PF ConfigurationPF Configuration
securing wireless networks with, Secure a Wireless Network Using PFSee Also
pg_dump/pg_dumpall tools, Automate Data Dumps for PostgreSQL Databases
phases of the moon (pom) utility, The phase of the moon
PHP, configuring, Configure Apache and PHP
PHP4, installing, Install PHP4, Apache, and MySQL
PHPlot, installing, More installations
pine mail program and pipes, If Your Mail Program Supports a Pipe
ping command, Connectivity Software, Testing SMTP Server Availability
pipes for traffic shaping, Creating Pipes and Queues
pkg_add command, Hacking the Hack
pkg_comp command, Installing pkg_compHacking the Hack
pkg_info command, Dealing with Installed Ports
checking dependencies before uninstalling, Checking Dependencies Before Uninstalling
checking disk space used by ports, Checking the Disk Space Your Ports Use
pkg_version command, Checking the Disk Space Your Ports Use
Pluggable Authentication Modules (PAM), Create an Effective, Reusable Password PolicySee Also
Pluggable Password Checking, See Also
pom (phases of the moon) utility, The phase of the moon
pop-up messages, sending, Sending Pop-up MessagesUnderstanding X authorization
POP3 protocol
reading email with telnet, Reading Email with telnet
security considerations, Security Considerations
Popa, Alexandru, Contributors
port 25, closing, Closing Port 25
portable files, creating, Creating Portable Files
portable POSIX archives, creating, Create Portable POSIX ArchivesSee Also
portdowngrade command, Downgrade a Port
ports
building without ports trees, Build a Port Without the Ports TreeSee Also
checking disk space used by, Checking the Disk Space Your Ports Use
choosing Java ports to install, Choosing Which Java Port to Install
configuring, Stage Three: Post-Configuration
dependencies, checking for, Finding a Port and Its Dependencies
downgrading, Downgrade a PortSee Also
finding the right port, Finding the Right Port
installing, Stage Two: Ports Installation
installing Unix applications on Mac OS X using DarwinPorts, Easily Install Unix Applications on Mac OS XSee Also
keeping up-to-date with CTM, Keep Ports Up-to-Date with CTMSee Also
pkg_info command and, Dealing with Installed Ports
screen window manager, What Is screen?
skeletons, checking out, Checking Out Port Skeletons
ports collection, keeping up-to-date with, Navigate the Ports SystemSee Also
ports trees
building ports without, Build a Port Without the Ports TreeSee Also
updating DarwinPorts trees, Updating the Ports Tree
updating using ftp and ctm, Using ftp and ctm to Stay Current
portupgrade command, Assembling the PiecesSee Also
portversion command, An Example Dry Run
POSIX archives, creating, Create Portable POSIX ArchivesSee Also
PostgreSQL databases, automating data dumps for, Automate Data Dumps for PostgreSQL DatabasesSee Also
power management information in kernel configuration files, Peripheral support and power management
PPP variables, What the Script DoesExample Usage
printing manpages, Printing Manpages
priority number of MX records, Understanding DNS entries
ÒThe Problem of PORCMOLSULBÓ, See Also
.profile file, dot.profile
program paths, finding, Finding Program Paths
prompt
login, changing, Changing the Login Prompt
for tcsh shell, making more useful, Making Your Prompt More Useful
prompt command, Scripting an Entire Session
protecting the boot process, Protect the Boot ProcessSee Also
pseudodevice information in kernel configuration files, Interface support
pseudoterminals, logging into, The Console
pw command, Initial Preparation

Q

queue runners, MSP, Simple sendmail Configuration Without a Local MTA
queueing sent messages for later delivery, Configuring sendmail QueueingSee Also
queues, creating, Creating Pipes and Queues
quickpatch utility, Automate Security PatchesSee Also
quotation marks (double) and delimited files, Delimiter DilemmaSee Also

R

RAID controller information in kernel configuration files, Supported buses and media devices
RAM, showing amount of, Moving /tmp to RAM
randomizing signatures, Rotate Your SignatureHacking the Hack
randomly generated passwords, Adding Your Own Options
read/write access for mounting floppies, Allowing Regular Users to Mount Floppies
REAL_DISTFILES variable (pkg_comp), Configuration Variables
REAL_PACKAGES variable (pkg_comp), Configuration Variables
REAL_PKGSRC variable (pkg_comp), Configuration Variables
REAL_PKGVULNDIR variable (pkg_comp), Configuration Variables
REAL_SRC variable (pkg_comp), Configuration Variables
reboot command, The Default Boot Menu
reboots
limiting unauthorized, Limiting Unauthorized Reboots
viewing records of, When Did That Happen?
recording
interactive shell sessions, Recording an Interactive Shell Session
shell input/output, Recording All Shell Input and Output
recovery media, testing, Testing the Recovery Media
recovery process and emergency repair kit, Use the FreeBSD Recovery ProcessSee Also
Reddy, Dheeraj, Spoofing on NetBSD
reformatting disks before upgrading, FreeBSD from ScratchSee Also
regular expressions
debugging, Using Regular Expressions
using grep with, Using Regular Expressions
rehash command, Automating the Format Process
relaying mail considered harmful, Sending Email with telnet
relevance searches using grep, Searching by Relevance
remote administration tasks, interacting with, Interactive Remote AdministrationHacking the Hack
remote backups, automating, Automate Remote BackupsSee Also
remote logins
headless servers, connecting to, Log a Headless Server RemotelyBeep on Halt
preventing, /etc/login.access
seeing console messages over, See Console Messages Over a Remote LoginHacking the Hack
remote shares, mounting, Mounting a Share
renaming
files interactively, Renaming Files Interactively
source files, Renaming a Batch of Source Files
repair kit, emergency
creating, Create an Emergency Repair KitSee Also
customizing boot process and, The Default Boot Menu
testing, Use the FreeBSD Recovery ProcessSee Also
Reporter script and crack utility, Monitoring the results
resources, FreeBSD
comments in source code, What Did the Manpage Forget to Say?What Did the Manpage Forget to Say?
manpages
creating your own, Create Your Own ManpagesSee Also
getting the most out of, Get the Most Out of ManpagesSearching Text
offline resources, keeping up-to-date, Keeping Offline Resources Up-to-Date
online resources, Online Resources
resources, system, Viewing Resource Information
restoring data on hard disks, Restoring Data
restricting
logins, Restrict Logins/etc/login.conf
SSH servers, Restrict an SSH serverNow What?
reusable password policy, creating, Create an Effective, Reusable Password PolicySee Also
revision control and patches, Revision Control
re_format command, Using Regular Expressions
rhosts file, dot.rhosts
Richard, John, Contributors
Rightnour, Tim, Why ClusterIt?
rm * command, preventing disaster from, Recreate a Directory Structure Using mtree
rm -R command, recovering from accidental, Using mtreeSee Also
rm command vs. cp command, Preventing File Changes
rmstar shell variable, Necessary Interaction
Robbins, Arnold, Log Protection
rooted archives and substitution argument, Rooted Archives and the Substitution Argument
Rosenquist, Nathan, Contributors
rotating signatures, Rotate Your SignatureHacking the Hack
route command, The Code
rsnapshot utility, Automate Remote BackupsSee Also
accessing snapshots, Accessing Snapshots
configuration file, testing, Testing your config file
specifying backup intervals, Specifying backup intervals
storage scheme for, The Snapshot Storage Scheme
rsync utility, Specifying backup intervals
rulesets, IP Filter, Script IP Filter RulesetsSee Also
Russell, Kirk, Contributors

S

Samba, Access Windows Shares Without a Server
using Access Control Lists with, Using ACLs with Samba and Windows
sandboxes, automating NetBSD package builds with, Automate NetBSD Package BuildsHacking the Hack
sappnd flag, Preventing File Changes, Log Protection
scanning Windows computers for viruses, Scan a Network of Windows Computers for VirusesSee Also
Schaefer, Marc, Useful Resources for Multiple Volume Archives
sched command, Creating Terminal Sticky Notes
schedules
creating for backups, Creating Backup Schedules
rsnapshot utility, Scheduling rsnapshot
switching access rules on, Switching Rules on a Schedule
schg flag, Preventing File Changes, Log Protection, Protecting Binaries
Schneier, Bruce, See Also
Schweikhardt, Jens, Contributors
scponly (SSH shell), Restrict an SSH server
installing, Installing scponly
testing the chroot, Testing the chroot
scponlyc shell, Testing the chroot
screen window manager, What Is screen?See Also
multitasking with, Multitasking with screenSee Also
.screenrc resource file, Additional Features
screens
attaching/detaching sessions, Attaching and Deattaching
locking/unlocking, Lock the Screen
screensavers for terminals, The Terminal Screensaver
screenshots, taking, Taking Screenshots
script command, Recording All Shell Input and OutputLetting Other People Watch Your Live Shell Sessions
script files, cleaning up, Cleaning Up script Files
scripts, interactive, creating with Expect, Script User InteractionSee Also
scrubbing hard disks, Scrubbing the Disk
SCSI devices in kernel configuration files, Supported buses and media devices, USB support
Seaman, Matthew, Contributors
search and replace using sed, Replacing Existing Text
searching
manpage text, Making Your Prompt More Useful, Searching Text
by relevance using grep, Searching by Relevance
with sed utility, Searching with sed
securelevels, settings of, Log Protection
security
analyzing buffer overflows with GNU debugger, Use the GNU Debugger to Analyze a Buffer OverflowSee Also
for DNS servers, Securing DNSTesting DNS
wireless network issues, Security Concerns
security patches, automating, Automate Security PatchesSee Also
sed utility, Manipulate Files with sedSee Also
adding comments to source code, Adding Comments to Source Code
using holding space to mark text, Using the Holding Space to Mark Text
removing blank lines, Removing Blank Lines
removing comments from source code, Removing Comments
scripts with multiple commands, Multiple Transformations
search and replace, performing, Replacing Existing Text
searching with, Searching with sed
sendmail, Why Do I Need sendmail?See Also, Why Do I Need sendmail?
(see also email)
configuring with local MTA, Simple sendmail Configuration with a Local MTA
configuring without local MTA, Simple sendmail Configuration Without a Local MTA
disable receiving of email, Closing Port 25
DNS issues with mail queues, Dealing with DNS
holding mail for later delivery, Hold Email for Later DeliverySee Also
serial consoles, enabling, Enabling a Serial Console
service set identifiers (SSIDs), Use Multiple Wireless NIC Configurations
servlets, Java, Servlets
set command, Setting Shell Variables
setenv command, Setting Shell Variables
setfacl command, Adding and Subtracting ACLs, Setting Default ACLs
SETS variable (pkg_comp), Configuration Variables
SETS_X11 variable (pkg_comp), Configuration Variables
.SH (section) groff command, Creating a Manpage
sharing files between Windows and FreeBSD, Access Windows Shares Without a ServerSee Also
Sharity-Light utility, Installing and Configuring Sharity-LightSee Also
scanning Windows computers for viruses, Scan a Network of Windows Computers for VirusesSee Also
shells
authorizing access to, using sudo, Shell Access with sudo
input/output, recording, Recording All Shell Input and Output
interactive, Use an Interactive ShellLetting Other People Watch Your Live Shell Sessions
letting others watch live sessions, Letting Other People Watch Your Live Shell Sessions
recording interactive sessions, Recording an Interactive Shell Session
setting shell variables, Setting Shell Variables
shortcuts on the command line, Editing and Navigating the Command Line
shutdowns
of servers, using wsmoused, Shutting Down the Server Using wsmoused
viewing records of, When Did That Happen?
signature-at-bottom option, If Your Mail Program Supports a Pipe
signatures, randomizing, Rotate Your SignatureHacking the Hack
sigtool command, Installing and Running the Virus Scanner
single quote (') vs. backticks (`), Finding Program Paths
single-user mode, password protecting, Password Protecting Single-User Mode
skeletons, port, Checking Out Port Skeletons
SMBFS, backing up FreeBSD with, Back Up FreeBSD with SMBFSSee Also
smbutil utility, Access Windows Shares Without a Server, Establishing an SMB Connection with a Host System
SMTP servers
finding names of, Understanding DNS entries
relaying mail considered harmful, Sending Email with telnet
sending email with telnet, Sending Email with telnetSending Email with telnet
testing availability, Testing SMTP Server Availability
snapshots, remote, Installing and Configuring rsnapshotAccessing Snapshots
sniffing networks with tcpdump, Humanize tcpdump OutputSee Also
Snort
adding more security to, Hacking the Hack
configuring, Configure Snort
installing, More installations
running, Running Snort
sockstat command, Preparing the System, Seeing Other Users, Configure MySQL
software compiling, optimizing, Optimizing Software Compiling
source code
adding comments to, Adding Comments to Source Code
reading comments in, What Did the Manpage Forget to Say?What Did the Manpage Forget to Say?
removing comments from, Removing Comments
source files
finding, Finding Your Source Files
renaming a batch of, Renaming a Batch of Source Files
spaces, translating tabs to, Translating Tabs to Spaces
spell-checking on command line, Quick Spellcheck
splash screen, configuring, Configuring the Splash Screen
split DNS approach, used to prevent information leaks, The two-pronged approach
splitting windows (screen utility), Splitting windows
spoofing MAC addresses, Spoof a MAC AddressSpoofing with OpenBSD
SSH servers
/etc/ssh/sshd_config file, /etc/ssh/sshd_config
remote backups, automating, Specifying backup intervals
restricting, Restrict an SSH serverNow What?
secure backups over networks, Secure Backups Over a NetworkAutomating the backup
SSIDs (service set identifiers), Use Multiple Wireless NIC Configurations
ssmtp MTA, Simple sendmail Configuration Without a Local MTA
standalone Java applications, Standalone Java Applications
Stark, Sebastian, Contributors
startup scripts, creating your own, Create Your Own Startup ScriptsSee Also
Storage Daemon (Bacula), Introducing Bacula
on backup server, Storage Daemon on the backup server
running without root permission, Running Without Root
storage scheme for rsnapshot, The Snapshot Storage Scheme
stripping kernels, Strip the KernelSee Also
su command, Making Your Prompt More Useful
Subversion program, Revision Control
sudo utility
configuration file issues, sudo Configuration Gotchas
limitations of, Sudo GotchasSee Also
shell access with, Shell Access with sudo
sudoers file, Limitations of sudoUsing sudoscript
sudoscript, sudoscriptSee Also
log file for, The sudoscript Log FileThe sudoscript Log File
security issues with, Is sudoscript Secure?
working with, Using sudoscript
sudoscriptd script, sudoscript Overview
sudoshell script, sudoscript Overview
sunlnk flag, Preventing File Changes, Log Protection
superusers
binaries, protecting with flags, Protecting Binaries
controlling backups with arch/nodump flags, Controlling Backups
switching to, using su command, Making Your Prompt More Useful
system logs, protecting with flags, Log ProtectionLog Protection
swap files, creating, Creating a Swap File on DiskSee Also
swapctl command, Creating a Swap File on Disk
swapinfo command, Creating a Swap File on Disk
switches, adding to manpages, Getting Fancier
switching between windows, Switching between windows
symbolic links
creating, Using the fixit Floppy
finding, Finding Symlinks
synchronized copies of directories, maintaining, Enter unisonSee Also
syntax for mtree commands, Creating the Integrity Database
sysctl command, Seeing Other Users
sysinstall installation mechanism, Preparing the Install ScriptSee Also
setting up NFS mounts, Creating the NFS Share
syslogd, redirecting console messages using, Setting Up the Logging Server, An Alternate Method
systat command, Monitoring Swap Changes
system accounting, enabling, Details, DetailsDetails, Details
system logs, protecting with flags, Log ProtectionLog Protection
system passwords, protecting, using Blowfish, Protecting System Passwords with BlowfishForcing new passwords to use Blowfish
system resources, viewing, Viewing Resource Information
system-specific options in kernel configuration files, System-specific options

T

tabs, translating to spaces, Translating Tabs to Spaces
tail command, Seeing Remote Console Messages
tape drives, testing with Bacula, Testing Your Tape Drive
tar utility, Archiving and Compressing Data with tar and gzip, Simultaneously Download and Untar
GNU tar vs. POSIX tar, GNU Versus POSIX tar
replacing, with pax utility, Replacing tar with pax
secure backups over networks, The Backup
TCP flags field, More Complicated Filters
tcpdump utility, Humanize tcpdump OutputSee Also
capturing packets, The Basics
deciphering output, Deciphering tcpdump OutputDeciphering tcpdump Output
display filters, Display Filters
specific filters, creating, More Complicated Filters
tcsh shell, Get the Most Out of the Default Shell
auto completion, History and Auto-Completion
working around, Silencing Auto-Complete
autologout, Using autologout
command history, History and Auto-Completion
.cshrc file vs. .login file, dot.login
limiting files, Limiting Files
making prompt more useful, Making Your Prompt More Useful
rmstar shell variable, Necessary Interaction
setting shell variables, Setting Shell Variables
telnet
checking connectivity of mail servers, Testing SMTP Server Availability
reading email, Reading Email with telnet
sending email, Sending Email with telnetSending Email with telnet
telnetd daemon, An Example ExploitUsing the GNU Debugger
temporary directories, cleaning out quickly, daily_clean_tmps
temporary files, managing, Manage Temporary Files and Swap Space
tentakel utility, Distributed Command ExecutionSee Also
configuring, Installing and Configuring tentakel
installing, Installing and Configuring tentakel
interactive mode, Using tentakel
terminals
adding color to video, Adding Some Color to Your Terminal
configuration file, securing, /etc/ttys
locking/unlocking, Lock the Screen
login banner, removing, Remove the Terminal Login BannerSee Also
screensavers for, The Terminal Screensaver
using multiple screens, Use Multiple Screens on One TerminalSee Also
virtual
dvt command (ClusterIt tool), Using dvt
logging into, The Console
testing
automated software installations, Test-Drive
DNS servers, The two-pronged approach
recovery media, Testing the Recovery Media
text
finding, using grep, Finding Text
marking, using holding space (sed utility), Using the Holding Space to Mark Text
search and replace using sed, Replacing Existing Text
.TH (title) groff command, Creating a Manpage
thesaurus, creating, Creating a Dictionary or Thesaurus
three-way handshake, TCP, More Complicated Filters
time of day, displaying, The current time
timeout value of screensavers, changing, The Terminal Screensaver
times.allow option, /etc/login.conf
times.deny option, /etc/login.conf
timestamps in packets, Deciphering tcpdump Output
tip utility, If the Headless System Becomes Inaccessible
/tmp filesystem
clearing out, Clearing /tmp
moving to RAM, Moving /tmp to RAM
Tomcat (Java servlet), Servlets
touch command, Necessary Interaction
tr command, Translating Case
trade show demos, creating, Create a Trade Show DemoSee Also
traffic shaping on FreeBSD, Traffic Shaping on FreeBSDComplex Configurations
transfers, automating, using ftp, Automating Transfers
translating
case of characters, Translating Case
tabs to spaces, Translating Tabs to Spaces
trash directory, creating, Create a Trash DirectoryHacking the Hack
tripwire, using mtree as built-in, Use mtree as a Built-in TripwireDeciding on Which Files to Include
trivia related to current date, displaying, Pursuing Trivia
TrustedBSD project, FreeBSD Access Control Lists, See Also
MAC (Mandatory Access Control) framework, Tighten Security with Mandatory Access ControlSee Also
tunefs command
editing superblock with, Enabling ACLs
tuning FreeBSD systems, Tune FreeBSD for Different ApplicationsSee Also

U

uappnd flag, Preventing File Changes, Preventing Some Changes and Allowing Others
uchg flag, Preventing File ChangesPreventing Some Changes and Allowing Others
UFS (Unix File System), Mounting a Floppy
UFS1 filesystem and ACLs, Additional UFS1 Configuration
umount command, Managing the Floppy, Moving /tmp to RAM
unauthorized reboots, limiting, Limiting Unauthorized Reboots
unauthorized/authorized hosts, PF ConfigurationHacking the Hack
UNC (Universal Naming Convention), Installing and Configuring Sharity-Light
uncompress command, Limiting Files
uninstalling applications, checking dependencies first, Checking Dependencies Before Uninstalling
unison utility, Enter unisonSee Also
Unix File System (UFS), Mounting a Floppy
Unix one-liner commands, Useful One-Liners
<Emphasis>Unix Power Tools<Default Para Font>, The sudoscript Log File
unlimit command, Limiting Files
unlocking and locking screens, Lock the Screen
unmounting
floppies, Managing the Floppy
remote shares, Hacking the Hack
/tmp filesystem, Moving /tmp to RAM
untarring archives, Simultaneously Download and Untar
updating systems
automatically, Automate UpdatesSee Also
uploaddisk command, Creating an Image
uppercasing characters, Translating Case
USB support in kernel configuration files, USB support
user interaction
adding to scripts, Adding User Interaction
handling incorrect input, Handling Incorrect Input
users
choosing memorable passwords, Automate Memorable Password GenerationSee Also
expiration dates for passwords, Adding Your Own Options
users command, Who’s on First?
/usr/local/etc/sudoers file, Limitations of sudoUsing sudoscript
/usr/src/share/skel/Makefile file, editing, Editing /usr/src/share/skel/MakefileEditing /usr/src/share/skel/Makefile
uunlnk flag, Preventing File Changes, Preventing Some Changes and Allowing Others

V

/var/log file, Log Protection
/var/log/console.log file, An Alternate Method
variables
for login prompt, Changing the Login Prompt
shell, Setting Shell Variables
vidcontrol command, Adding Some Color to Your Terminal, The Terminal Screensaver
Vig, Avleen, Contributors
Vince, Michael, Contributors, Automate Security Patches
virtual terminals
dvt command (ClusterIt tool), Using dvt
logging into, The Console
viruses
Intrusion Detection Systems and, Intrusion Detection with Snort, ACID, MySQL, and FreeBSDSee Also
scanning Windows computers for, Scan a Network of Windows Computers for VirusesSee Also
Vogel, Karl, Contributors
vol utility (Minix/QNX4), Useful Resources for Multiple Volume Archives

W

w command, The Console, Who’s on First?
w3m command-line browser, Creating a Dictionary or Thesaurus
Warden, Brett, Contributors
Warner, Joe, Contributors
web browsers and Java applets, Applets
web information, fetching, Improved Dictionary
web servers
allowing unauthorized hosts to access, PF ConfigurationHacking the Hack
consolidating logs for, Consolidate Web Server LogsSee Also
optimizing, Optimizing Web Servers
WebStart mechanism, Java WebStart
WEP (Wireless Encryption Protocol), Secure a Wireless Network Using PF
multiple NIC configurations, Use Multiple Wireless NIC Configurations, Preparing the Script
whatis command, Finding Program Paths, Finding Commands
whatis database, creating, Finding Installed Manpages
whereis command, Finding Program Paths
which command, Finding Program Paths
who command, Who’s on First?
window managers
screen, What Is screen?See Also
multitasking with, Multitasking with screenSee Also
showcasing, using eesh utility, Create a Trade Show DemoSee Also
Windows
using Access Control Lists with, Using ACLs with Samba and Windows
scanning computers for viruses, Scan a Network of Windows Computers for VirusesSee Also
wiping disks clean before upgrading, FreeBSD from ScratchSee Also
Wireless Encryption Protocol (WEP), Secure a Wireless Network Using PF
multiple NIC configurations, Use Multiple Wireless NIC Configurations, Preparing the Script
wireless networks
securing with PF, Secure a Wireless Network Using PFSee Also
using multiple NIC configurations, Use Multiple Wireless NIC ConfigurationsHacking the Hack
words, finding, Finding WordsFinding Words
worms, fighting with Intrusion Detection Systems, Intrusion Detection with Snort, ACID, MySQL, and FreeBSDSee Also
wsmoused, shutting down servers using, Shutting Down the Server Using wsmoused

X

X authorization, Understanding X authorization
X server utilities, Fun with XSee Also
xauth command, Understanding X authorization
xclipboard utility, Managing Your Clipboard
xconsole utility, Seeing Console Messages
.xinitrc file, dot.xinitrc
xwd command, Taking Screenshots
xwud command, Taking Screenshots

Z

zone transfers in DNS, controlling tightly, Securing DNSTesting DNS
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.189.170.206