A note on the digital index A link in an index entry is displayed as the section title in which that entry appears. Because some sections have multiple index markers, it is not unusual for an entry to have several links to the same section. Clicking on any link will take you directly to the place in the text in which the marker appears.
A Access Control Lists (ACLs), FreeBSD Access Control Lists –See Also adding/subtracting, Adding and Subtracting ACLs enabling, Enabling ACLs setting default ACLs, Setting Default ACLs –Setting Default ACLs viewing, Viewing ACLs access, limiting with IP Filter, Limiting Access with IP Filter –See Also accounting (system), enabling, Details, Details –Details, Details accton command, Details, Details ACID (Analysis Console for Intrusion
Databases) adding more security to, Hacking the Hack alerts, Running Snort –Hacking the Hack configuring, Configure ACID installing, More installations running, Running ACID ack numbers in packets, Deciphering tcpdump Output addresses, MAC, spoofing, Spoof a MAC Address –Spoofing with OpenBSD adduser command, OpenBSD Blowfish and, Forcing new passwords to use Blowfish adodb (database library for PHP), installing, More installations ADSL PPPoE configuration, What the Script Does –Example Usage alerts, ACID, Running Snort –Hacking the Hack anonymous CVS, Build a Port Without the Ports Tree antivirus software, Scan a Network of Windows Computers for Viruses –See Also Apache servers configuring, Configure Apache and PHP consolidating logs, Consolidate Web Server Logs installing, Install PHP4, Apache, and MySQL starting, Running ACID tuning, See Also APG (Automated Password Generator), Automate Memorable Password Generation improving, Improving apg installing, Installing and Using apg appending changes to files, Preventing Some Changes and Allowing Others applets, Java, Applets arch flag, Preventing File Changes , Controlling Backups archives compressed, Archiving and Compressing Data with tar and gzip without intermediate files, Compress Archives Without Using Intermediate Files creating portable POSIX archives, Create Portable POSIX Archives –See Also downloading and untarring, Simultaneously Download and Untar multivolume, resources for, Useful Resources for Multiple Volume Archives rooted, Rooted Archives and the Substitution Argument ARP packets, Deciphering tcpdump Output attaching/detaching screen sessions, Attaching and Deattaching attributes of files, preserving when copying, Attribute-Preserving Copies authorized/unauthorized hosts, PF Configuration –Hacking the Hack auto completion, History and Auto-Completion working around, Silencing Auto-Complete autologout after inactivity, Using autologout automated re-upgrades, preventing, Preventing Automated Re-Upgrades automating backups, Automating the backup data dumps for PostgreSQL databases, Automate Data Dumps for PostgreSQL Databases –See Also floppy format process, Automating the Format Process ftp logins, Automating Logins generated firewall rules, Automatically Generate Firewall Rules –See Also installs, Automated Install –See Also NetBSD package builds, Automate NetBSD Package Builds –Hacking the Hack password generation, Automate Memorable Password Generation –See Also remote backups, Automate Remote Backups –See Also security patches, Automate Security Patches –See Also system updates, Automate Updates –See Also virus scanning, Automating the Process awk command, Finding Symlinks B backticks (`) vs. single quote ('), Finding Program Paths backups automating, Automating the backup Bacula program, Perform Client-Server Cross-Platform Backups with Bacula –See Also controlling with arch/nodump flags, Controlling Backups creating schedules, Creating Backup Schedules data dumps for PostgreSQL databases,
automating, Automate Data Dumps for PostgreSQL Databases –See Also remote, automating, Automate Remote Backups –See Also secure backups over networks, Secure Backups Over a Network –Automating the backup Bacula program, Perform Client-Server Cross-Platform Backups with Bacula –See Also client-only version, installing, Creating a Client-only Install configuration files, modifying, Configuration Files –Director on the backup server using consoles, Introducing Bacula , Using the Bacula Console database tables, creating, Database Setup installing, Installation starting daemons, Starting the Bacula Daemons testing tape drives, Testing Your Tape Drive bandwidth allocating with traffic shaping, Traffic Shaping on FreeBSD –Complex Configurations limiting complex configurations, Complex Configurations simple configuration, Simple Configurations batcher process, logproc Described –Viewing Live Log Data Beastie boot menu, The Default Boot Menu –The Default Boot Menu BEEP_ONHALT option, Beep on Halt bell command, Scripting an Entire Session Berlin, Marlon, Contributors Bernier, Robert, Contributors Big Brother System and Network Monitor, Hacking the Hack binaries finding, Finding Program Paths protecting, using flags, Protecting Binaries bitmap images, loading, Configuring the Splash Screen blank lines, removing using grep/sed, Removing Blank Lines Blowfish hashes, Protecting Passwords With Blowfish Hashes –See Also forcing new passwords to use Blowfish, Forcing new passwords to use Blowfish protecting system passwords with, Protecting System Passwords with Blowfish –Forcing new passwords to use Blowfish /boot directory, The Default Boot Menu boot menu (default), customizing, Customize the Default Boot Menu –Beep on Halt boot messages, viewing, Viewing Boot Messages boot process interrupting, Password Protecting Single-User Mode protecting, Protect the Boot Process –See Also bootblocks configuration, changing, Enabling a Serial Console browsers, command-line, Creating a Dictionary or Thesaurus brute-force password crackers, preventing with
Blowfish, Protecting Passwords With Blowfish Hashes –Forcing new passwords to use Blowfish bsdlabel command, Formatting Floppies btape utility, Testing Your Tape Drive buffer overflows, analyzing with GNU debugger, Use the GNU Debugger to Analyze a Buffer Overflow –See Also bus information in kernel configuration files, Supported buses and media devices C calendar command, Pursuing Trivia capturing packets, The Basics –Deciphering tcpdump Output cap_mkdb command, Protecting System Passwords with Blowfish Carosone, Daniel, Contributors case of characters, translating, Translating Case cd command, Editing and Navigating the Command Line CD-ROMs, mounting, Managing the Floppy Cerias FTP site (cracker dictionaries), See Also cgd(4) devices, The Cryptographic Disk Device –See Also cgdconfig program, The Cryptographic Disk Device –See Also chflags command, Preventing File Changes –Log Protection chmod command, Allowing Regular Users to Mount Floppies chromatic, Contributors chroot support for scponly, Restrict an SSH server testing, Testing the chroot ClamAV utility, Scan a Network of Windows Computers for Viruses –See Also clamav.conf file, Installing and Running the Virus Scanner clamd command, Installing and Running the Virus Scanner clamdscan command, Installing and Running the Virus Scanner clamscan command, Installing and Running the Virus Scanner CLASSPATH environment variable, Running Java Applications Client Daemon (Bacula), Introducing Bacula installing client-only version of Bacula, Creating a Client-only Install clipboard, managing, Managing Your Clipboard ClusterIt tool, Why ClusterIt? –See Also installing/configuring, Installation and Configuration noninteractive commands, testing, Testing Noninteractive Commands code examples, permission for using, Using Code Examples col command, Cleaning Up script Files , Translating Tabs to Spaces colors, adding to terminals, Adding Some Color to Your Terminal command history, History and Auto-Completion retrieving previously issued commands, Learning from Your Command History command line editing, Editing and Navigating the Command Line navigating, Editing and Navigating the Command Line w3m browser for, Creating a Dictionary or Thesaurus command-line Console (Bacula), Introducing Bacula , Using the Bacula Console commands distributed, Distributed Command Execution –See Also finding, Finding Commands comments adding to code using # (hash mark), The Default Boot Menu adding to source code, Adding Comments to Source Code in manpages, Creating a Manpage removing from source code, Removing Comments in source code,
reading, What Did the Manpage Forget to Say? –What Did the Manpage Forget to Say? compiling software, optimizing, Optimizing Software Compiling compressed archives creating, Archiving and Compressing Data with tar and gzip without intermediate files, Compress Archives Without Using Intermediate Files configuration files for Apache, Configure Apache and PHP for Bacula, Configuration Files –Director on the backup server for cgd devices,
modifying, Modifying Configuration Files customizing for kernels, Customizing Your Kernel –USB support default files for users, Customize User Configurations –dot.shrc safely merging changes to, Safely Merge Changes to /etc –See Also for sudo utility, sudo Configuration Gotchas connectivity failure, surviving, Survive Catastrophic Internet Loss –See Also console messages from headless
systems, Log a Headless Server Remotely –Setting Up the Headless System viewing, Seeing Console Messages over remote logins, See Console Messages Over a Remote Login –Hacking the Hack consolidating web server logs, Consolidate Web Server Logs –See Also copier process, logproc Described –Testing the Configuration COPTFLAGS option, Kernel Optimizations copying interactively, Interactive Copy copyright information, changing, Changing the Copyright Display core files, limiting size of, Limiting Files core X distribution, utilities that come with, Fun with X –See Also cp command, Finding Your Source Files –Renaming Files Interactively vs. mv/rm commands, Preventing File Changes CPU information in kernel configuration files, CPU options CPU_WT_ALLOC option, Kernel Optimizations crack (dictionary password cracker), Installing and Using crack –See Also crackers, password, preventing with Blowfish, Protecting Passwords With Blowfish Hashes –Forcing new passwords to use Blowfish Crandall, Aaron, Contributors cron utility access restriction rules, Switching Rules on a Schedule making more user friendly, Making cron More User-Friendly using with quickpatch, Automating the Process rsnapshot, scheduling, Scheduling rsnapshot scheduling backups, Archiving and Compressing Data with tar and gzip cross-platform backups, Perform Client-Server Cross-Platform Backups with Bacula –See Also crossword-puzzle solver, Become a Crossword Champion cryptographic disasters, preventing, Final Thoughts and Warnings cryptographic disk devices, The Cryptographic Disk Device –See Also .cshrc files adding color to terminals, Adding Some Color to Your Terminal adding key bindings to, Specifying Strings autologout, Using autologout dot.cshrc file and, dot.cshrc locking terminals, Using lock making prompts more useful, Making Your Prompt More Useful , Making Your Prompt More Useful phase of the moon, displaying, The phase of the moon receiving daily fortunes, A Fortune a Day seeing trivia at login or logout, Pursuing Trivia setting shell variables, Setting Shell Variables using trash command, Replacing rm with ~/bin/trash CTM, keeping ports up-to-date with, Keep Ports Up-to-Date with CTM –See Also cu command, If the Headless System Becomes Inaccessible current time, displaying, The current time custom packages, creating, Create a Package Repository –Creating the NFS Share customizing default boot menu, Customize the Default Boot Menu –Beep on Halt kernels, Customizing Your Kernel –USB support CVS, anonymous, Build a Port Without the Ports Tree cvsup process automating updates, Assembling the Pieces –See Also editing /usr/src/share/skel/Makefile file, Editing /usr/src/share/skel/Makefile etcmerge utility and, Initial Preparations D daemons, running without root permissions, Running Without Root daily_clean_disks script, daily_clean_disks daily_clean_preserve script, daily_clean_preserve daily_clean_tmps script, daily_clean_tmps DarwinPorts project, installing Unix applications on Mac OS
X, Easily Install Unix Applications on Mac OS X –See Also debugger, GNU, analyzing buffer overflows, Use the GNU Debugger to Analyze a Buffer Overflow –See Also debugging regular expressions, Using Regular Expressions decompressing files, Limiting Files default ACLs, setting, Setting Default ACLs –Setting Default ACLs default configuration files, Customize User Configurations –dot.shrc default shell for FreeBSD, Get the Most Out of the Default Shell deleted files, sending to trash directory, Create a Trash Directory –Hacking the Hack delimited files and double quotation marks, Delimiter Dilemma –See Also demos for trade shows, creating, Create a Trade Show Demo –See Also dependencies checking before uninstalling applications, Checking Dependencies Before Uninstalling of ports, checking
for, Finding a Port and Its Dependencies deploying images, Deploying the Image DESTDIR variable (pkg_comp), Configuration Variables /dev/console file, An Alternate Method devices in kernel configuration files, Supported buses and media devices DEVICE_POLLING option, Optimizing Network Performance devinfo command, Viewing Resource Information /dev/null, using with find
command, Finding Words df command, Managing the Floppy , Clearing /tmp dhclient command, Spoofing on FreeBSD , Initial Preparation –Hacking the Hack dhclient.conf file, Spoofing on FreeBSD DHCP clients/servers configuring multiple wireless networks, Initial Preparation spoofing MAC addresses, Spoof a MAC Address –Spoofing on FreeBSD DHCP server configuration, DHCP Configuration , What the Script Does –Example Usage Diablo Java packages, Choosing Which Java Port to Install dial filter rules, Dealing with DNS dictionaries creating, Creating a Dictionary or Thesaurus improving your, Improved Dictionary password, customizing, Customizing Password Dictionaries –See Also dictionary password cracker, Installing and Using crack –See Also diff command, Apply, Understand, and Create Patches –See Also dig (domain information groper) utility, locating DNS
information, Exploring Your ISP’s DNS –See Also Director Daemon (Bacula), Introducing Bacula –See Also directories maintaining synchronized copies of, Enter unison –See Also protecting files with flags, Watch Your Directories recreating structures with mtree, Recreate a Directory Structure Using mtree –See Also disk hogs, dealing with, Deal with Disk Hogs –See Also disk space used by ports, checking, Checking the Disk Space Your Ports Use disklabel command, The Cryptographic Disk Device display filters and tcpdump, Display Filters DISTRIBDIR variable (pkg_comp), Configuration Variables distributed command execution using tentakel, Distributed Command Execution –See Also dmesg command, Moving /tmp to RAM , Initial Preparation DNS, Understand DNS Records and Tools –See Also deciphering tcpdump output, Deciphering tcpdump Output finding names of SMTP servers, Understanding DNS entries finding server addresses, Exploring Your ISP’s DNS problems with sendmail and mail queues, Dealing with DNS providing security for, Securing DNS –Testing DNS split DNS approach, The two-pronged approach testing servers, The two-pronged approach understanding DNS entries, Understanding DNS entries –Understanding DNS entries zone transfers, controlling tightly, Securing DNS –Testing DNS documentation for FreeBSD, Online Resources –What Did the Manpage Forget to Say? documents, extracting text using grep, Document Extracts DOS floppies (see floppies) dot.cshrc file, dot.cshrc –dot.cshrc dot.login file, dot.login dot.login_conf file, dot.login_conf dot.logout file, dot.logout dot.mailrc file, dot.mail_aliases and dot.mailrc dot.mail_aliases file, dot.mail_aliases and dot.mailrc dot.profile file, dot.profile dot.rhosts file, dot.rhosts dot.shrc file, dot.shrc dot.xinitrc file, dot.xinitrc Dotzler, Asa, Creating a Dictionary or Thesaurus double quotation marks and delimited files, Delimiter Dilemma –See Also Dowdeswell, Roland C., The Cryptographic Disk Device downgrading ports, Downgrade a Port –See Also downloading and untarring archives, Simultaneously Download and Untar du command, Creating an Image dummynet command, Traffic Shaping on FreeBSD –Creating Pipes and Queues , See Also dump command, Final Thoughts and Warnings dumpfiles creating, The Basics deciphering tcpdump output, Deciphering tcpdump Output duplicate line feeds, removing, Removing Duplicate Line Feeds dvt (distributed virtual terminal) command, Using dvt E e16keyedit utility, More Complex Scripts echoing responses to OTP challenge, Generating Responses editing the command line, Editing and Navigating the Command Line eesh utility (Enlightenment), Create a Trade Show Demo –See Also egrep command, Using Regular Expressions Eichmann, Heiner, Downgrade a Port email, Why Do I Need sendmail? (see also sendmail) holding for later delivery, Hold Email for Later Delivery –See Also reading with telnet, Reading Email with telnet relaying considered harmful, Sending Email with telnet security considerations, Security Considerations sending to external
recipients, Simple sendmail Configuration with a Local MTA with telnet, Sending Email with telnet –Sending Email with telnet emergency repair kit creating, Create an Emergency Repair Kit –See Also customizing boot process and, The Default Boot Menu testing, Use the FreeBSD Recovery Process –See Also encrypted disk devices, creating, Creating the Encrypted Disk Device encrypting hard disks, Encrypt Your Hard Disk –See Also Enlightenment window manager, Create a Trade Show Demo –See Also error messages for mount command, Common Error Messages errors analyzing buffer overflows with GNU debugger, Use the GNU Debugger to Analyze a Buffer Overflow –See Also reading comments in source code for help, What Did the Manpage Forget to Say? –What Did the Manpage Forget to Say? /etc files,
safely merging changes to, Safely Merge Changes to /etc –See Also /etc/dhclient.conf
file, Spoofing on FreeBSD /etc/fstab file, Managing the Floppy , Modifying Configuration Files /etc/ipf.rules file, Limiting Access with IP Filter /etc/login.access
file, /etc/login.access /etc/login.conf
file, /etc/login.conf /etc/make.conf file, Optimizing Software Compiling /etc/netstart
command, Spoofing on FreeBSD /etc/periodic.conf
file, Periodic Scripts /etc/pf.conf file, PF Configuration /etc/profile file, dot.profile /etc/ssh/sshd_config
file, /etc/ssh/sshd_config /etc/ttys file,
securing, /etc/ttys etcmerge utility, Initial Preparations –See Also Expect scripts, generating GPG keys with, Script User Interaction –See Also <Emphasis>Exploring
Expect<Default Para Font>, See Also extattrctl command, Additional UFS1 Configuration extended attributes, enabling for ACLs, Additional UFS1 Configuration extended regular expressions, Using Regular Expressions extracting text from documents using grep, Document Extracts F fastest-cvsup command, Automating the Process FAT12 filesystem, Mounting a Floppy fdformat command, Formatting Floppies fdisk command, Creating an Image fetch utility, Installation , Improved Dictionary File Daemon (Bacula), Introducing Bacula file integrity checking using mtree, Use mtree as a Built-in Tripwire –Deciding on Which Files to Include file servers, optimizing, Optimizing File Servers file utility, Cleaning Up script Files files appending changes to, Preventing Some Changes and Allowing Others attributes of, preserving when copying, Attribute-Preserving Copies decompressing, Limiting Files deleted, sending to trash directory, Create a Trash Directory –Hacking the Hack delimited, Delimiter Dilemma –See Also hierarchies, copying, Attribute-Preserving Copies last modification dates of, When Did I Change That File? limiting, Limiting Files portable, creating, Creating Portable Files protecting with flags, Protect Files with Flags –See Also renaming interactively, Renaming Files Interactively with specific extensions, deleting, daily_clean_disks filesystems disk hogs, dealing with, Deal with Disk Hogs –See Also DOS floppies (see floppies) ghosting systems, Ghosting Systems –See Also recreating directory structures with mtree, Recreate a Directory Structure Using mtree –See Also sharing files between Windows and FreeBSD, Access Windows Shares Without a Server –See Also swap files and, Creating a Swap File on Disk –See Also temporary files, adding, Manage Temporary Files and Swap Space using live filesystems, Using the Live Filesystem filters, display and tcpdump, Display Filters find command, Finding Words –Finding Words , Finding Your Source Files –Renaming Files Interactively finding commands, Finding Commands program paths, Finding Program Paths words, Finding Words –Finding Words Fink project, Easily Install Unix Applications on Mac OS X , See Also firewalls automatically generating rules, Automatically Generate Firewall Rules –See Also IP Filter, limiting access with, Limiting Access with IP Filter –See Also ipfw command, Creating Pipes and Queues , Using Masks securing wireless networks with PF, DHCP Configuration –Hacking the Hack zone transfers, controlling, The two-pronged approach Firewire support in kernel configuration
files, USB support fixit floppies, Inventory of the Kit –Preparing the Floppies repairing with, Using the fixit Floppy flags field of TCP headers, More Complicated Filters flags, protecting files with, Protect Files with Flags –See Also Flickenger, Rob, Acknowledgments floppies formatting, Formatting Floppies ghosting systems, Ghosting Systems –See Also mounting, Mounting a Floppy by regular users, Allowing Regular Users to Mount Floppies preparing for emergencies, Preparing the Floppies unmounting, Managing the Floppy flushing mail queues, Configuring PPP forcing users to change passwords, Adding Your Own Options formatting floppies, Formatting Floppies automating the process, Automating the Format Process formatting sequences for prompts, Making Your Prompt More Useful fortune program, A Fortune a Day , Rotate Your Signature –Hacking the Hack FreeBSD backing up with SMBFS, Back Up FreeBSD with SMBFS –See Also default shell for, Get the Most Out of the Default Shell online/offline resources for, Online Resources –What Did the Manpage Forget to Say? running native Java applications on, Run Native Java Applications –See Also sharing files between Windows and, Access Windows Shares Without a Server –See Also spoofing with, Spoofing on FreeBSD –Spoofing on FreeBSD FreeBSD From Scratch hack, FreeBSD from Scratch –See Also freshclam command, Installing and Running the Virus Scanner fsck_ffs command, Using the fixit Floppy fstab command, Managing the Floppy ftp command automating logins, Automating Logins automating transfers, Automating Transfers keeping ports up-to-date with CTM, Keep Ports Up-to-Date with CTM –Hacking the Hack ncftp tool and, A Better FTP? scripting entire sessions, Scripting an Entire Session G g4u (Ghost For Unix) utility, Ghosting Systems –See Also gdb command, Using the GNU Debugger –Using the GNU Debugger getfacl command, Viewing ACLs , Setting Default ACLs ghost disks, creating, Creating the Ghost Disk Ghost For Unix (g4u) utility, Ghosting Systems –See Also ghosting systems, Ghosting Systems –See Also images, creating/deploying, Creating an Image –Deploying the Image GNOME GUI Console (Bacula), Introducing Bacula , Using the Bacula Console GNU debugger, analyzing buffer overflows, Use the GNU Debugger to Analyze a Buffer Overflow –See Also GNU tar utility, incompatibility issues with, GNU Versus POSIX tar Gould, Andrew, Contributors GPG keys, generating with Expect scripts, Script User Interaction –See Also grdc command, The current time grep command, Get the Most Out of grep –Combining grep with Other Commands case-insensitive search, performing, Multiple Transformations combining with other commands, Combining grep with Other Commands extracting text from documents, Document Extracts finding words, Finding Words –Finding Words using regular
expressions, Using Regular Expressions relevance searches, Searching by Relevance removing blank lines, Removing Blank Lines text, finding, Finding Text groff commands for creating manpages, Creating a Manpage grokking BSD, Introduction –See Also groups of hosts, executing commands on, using
tentakel, How tentakel Can Help –See Also gzip utility, Back Up FreeBSD with SMBFS , Archiving and Compressing Data with tar and gzip , Creating the Script H hacking BSD, Why BSD Hacks? Haitzler, Carsten, More Complex Scripts halt command and BEEP_ONHALT option, Beep on Halt hard disks encrypted disk device, creating, Creating the Encrypted Disk Device encrypting, Encrypt Your Hard Disk –See Also ghosting systems and, Ghosting Systems –See Also preparing for encryption, Preparing the Disk restoring data, Restoring Data scrubbing, Scrubbing the Disk hardware information, displaying, Display Hardware Information –See Also Harris, Daniel, Contributors Harrison, Geoff, More Complex Scripts head command, Seeing Remote Console Messages headers, packet, More Complicated Filters headless systems, Run a Headless System becoming inaccessible, If the Headless System Becomes Inaccessible –See Also logging servers remotely, Log a Headless Server Remotely –Beep on Halt preparing for, Preparing the System setting up, Setting Up the Headless System shutting down servers using wsmoused, Shutting Down the Server Using wsmoused Hess, Joey, See Also hierarchies of files, copying, Attribute-Preserving Copies history, command, History and Auto-Completion retrieving previously issued commands, Learning from Your Command History host controller information in kernel configuration
files, USB support host systems, establishing SMB connections with, Establishing an SMB Connection with a Host System host utility, Testing DNS hosts, authorized and unauthorized, PF Configuration –Hacking the Hack html2txt converter, Improved Dictionary HZ option, Optimizing Network Performance , Configuring Your Kernel for Traffic Shaping I ICMP type field/ICMP code field, More Complicated Filters IDE devices in kernel configuration files, Supported buses and media devices idled utility, Enforcing Logout IDSs (Intrusion Detection Systems), Intrusion Detection with Snort, ACID, MySQL, and FreeBSD –See Also ifconfig command enabling/disabling interfaces, Quickly Disable All Interfaces optimizing network performance, Optimizing Network Performance running headless systems, Preparing the System scripting wireless network configurations, Initial Preparation spoofing MAC addresses, Spoofing on FreeBSD tcpdump output, humanizing, The Basics images, creating/deploying, using ghosting
utility, Creating an Image –Deploying the Image inaccessibility of headless systems, If the Headless System Becomes Inaccessible –See Also incorrect user input, handling, Handling Incorrect Input installboot utility, Enabling a Serial Console installing systems automatically, Automated Install –See Also integrity checking for files using mtree, Use mtree as a Built-in Tripwire –Deciding on Which Files to Include integrity databases creating, Creating the Integrity Database –Creating the Integrity Database deciding which files to include, Deciding on Which Files to Include preparing for storage, Preparing the Database for Storage working with, Using the Integrity Database interact command, Adding User Interaction interactive copying, Interactive Copy file renaming, Renaming Files Interactively remote administration, Interactive Remote Administration –Hacking the Hack scripts, creating with Expect, Script User Interaction –See Also shells, Use an Interactive Shell –Letting Other People Watch Your Live Shell Sessions interface statistics, gathering, Gathering Interface Statistics interface support in kernel configuration
files, Interface support interfaces, enabling/disabling, Quickly Disable All Interfaces intermittent Internet connection and sendmail, Hold Email for Later Delivery –See Also Internet loss, catastrophic, surviving, Survive Catastrophic Internet Loss –See Also intervals of backups, specifying, Specifying backup intervals Intrusion Detection Systems (IDSs), Intrusion Detection with Snort, ACID, MySQL, and FreeBSD –See Also IP Filter automatically generating firewall rules, Automatically Generate Firewall Rules –See Also limiting access with, Limiting Access with IP Filter –See Also switching rules on schedule, Switching Rules on a Schedule IP NAT configuration, What the Script Does IPFIREWALL_DEFAULT_TO_ACCEPT option, Using Masks ipfw command, Creating Pipes and Queues , Using Masks J Jabber4r Ruby module, Jabber and Ruby to the Rescue! Java applets, Applets Java applications, running on FreeBSD, Run Native Java Applications –See Also Java Development Kits (JDKs), Choosing Which Java Port to Install Java Runtime Environments (JREs), Choosing Which Java Port to Install Java Virtual Machines (JVMs), Choosing Which Java Port to Install javavmwrapper port, Javavmwrapper javaws application, Java WebStart JAVA_HOME environment variable, Standalone Java Applications JDKs (Java Development Kits), Choosing Which Java Port to Install Jetty (Java servlet), Servlets JPGraph, installing, More installations JREs (Java Runtime Environments), Choosing Which Java Port to Install JVMs (Java Virtual Machines), Choosing Which Java Port to Install K kenv command, Viewing Kernel Environment kernel environment, viewing, Viewing Kernel Environment kernels adding SMB support to, Adding NETSMB Kernel Support building new, Building the New Kernel configuring for traffic shaping, Configuring Your Kernel for Traffic Shaping customizing, Customizing Your Kernel –USB support installing, Installing the New Kernel optimizing, Kernel Optimizations stripping, Strip the Kernel –See Also supporting MAC (Mandatory Access Control), Preparing the System –Quickly Disable All Interfaces keys, GPG, generating, Script User Interaction –See Also kldload command, Seeing Other Users kldunload command, Seeing Other Users L Langille, Dan, Contributors laptops backing up, Perform Client-Server Cross-Platform Backups with Bacula –See Also configuring wireless interfaces for, Use Multiple Wireless NIC Configurations –Hacking the Hack encrypting hard disks, Encrypt Your Hard Disk –Final Thoughts and Warnings power management support for, Peripheral support and power management last command, When Did That Happen? last modification dates of files, finding, When Did I Change That File? lastcomm command, Details, Details lastlogin command, When Did That Happen? leave command, Don’t Forget to Leave Lents, David, Acknowledgments , Log Protection less pager customizing, Customizing less vs. more pager, Navigational Tricks Libes, Don, See Also limiting files, Limiting Files line feeds (duplicate), removing, Removing Duplicate Line Feeds live filesystems, using, Using the Live Filesystem live log data, viewing, Viewing Live Log Data livelock and kernel optimizations, Optimizing Network Performance loader.conf file, The Default Boot Menu , Configuring the Splash Screen password protection, Password Protecting loader loader.rc file, The Default Boot Menu locate command, What Did the Manpage Forget to Say? lock command, Lock the Screen log files for sudoscript, The sudoscript Log File –The sudoscript Log File log hosts configuring scripts on, Configuring Scripts on the Log Host consolidating web server logs, Consolidate Web Server Logs –See Also logproc and, logproc Described preparing, Preparing the Log Host variables/values for log host scripts, Configuring Scripts on the Log Host web server scripts, Preparing the Web Servers logging out of login shell, dot.logout logging servers, setting up, Setting Up the Logging Server login banner, removing, Remove the Terminal Login Banner –See Also .login file, dot.login login prompt, changing, Changing the Login Prompt .login.conf file, dot.login_conf logins automating, using ftp, Automating Logins lastlogin command, When Did That Happen? remote, See Console Messages Over a Remote Login –Hacking the Hack connecting to headless servers, Log a Headless Server Remotely –Beep on Halt restricting, Restrict Logins –/etc/login.conf logout policy, enforcing, Enforcing Logout logproc scripts, Consolidate Web Server Logs –See Also logs for web servers, consolidating, Consolidate Web Server Logs –See Also logs, protecting with flags, Log Protection –Log Protection @LongName tar
format extension, GNU Versus POSIX tar look command, Quick Spellcheck lowercasing characters, Translating Case M MAC (Mandatory Access Control) framework, Tighten Security with Mandatory Access Control –See Also Mac OS X installing Unix applications using
DarwinPorts, Easily Install Unix Applications on Mac OS X –See Also macdef command, Automating Transfers –Scripting an Entire Session macros, FTP, Automating Transfers –Scripting an Entire Session MAC_IFOFF module, Quickly Disable All Interfaces MAC_SEEOTHERUIDS module, Seeing Other Users magic cookies and X authorization, Understanding X authorization mail (see email) mail exchange (MX) records, Understanding DNS entries , Sending Email with telnet mail servers checking connectivity of, Testing SMTP Server Availability optimizing, Optimizing Mail Servers Mail Submission Process (MSP), Closing Port 25 –Simple sendmail Configuration Without a Local MTA Mail Transport Agents (MTAs), Why Do I Need sendmail? –See Also mail user agents (MUAs) and pipes, If Your Mail Program Supports a Pipe mailing lists for receiving CTM updates, Hacking the Hack make.conf file, Optimizing Software Compiling Makefile, editing, Editing /usr/src/share/skel/Makefile –Editing /usr/src/share/skel/Makefile makewhatis command, Finding Installed Manpages Mandatory Access Control (MAC) framework, Tighten Security with Mandatory Access Control –See Also manpages, How to Use this Book adding fancy formatting to, Getting Fancier creating your own, Create Your Own Manpages –See Also finding, Finding Program Paths finding all, Finding Installed Manpages navigational tricks for reading, Navigational Tricks printing, Printing Manpages searching for text in, Making Your Prompt More Useful , Searching Text manpath.config file, Manpage Basics masks and pipes/queues, Using Masks Maxwell, David, Contributors Mayo, Adrian, Contributors mdconfig command, Creating a Swap File on Disk Media Access Control (MAC) layer, spoofing
addresses, Spoof a MAC Address –Spoofing with OpenBSD media devices in kernel configuration files, Supported buses and media devices mergemaster utility, FreeBSD from Scratch , Safely Merge Changes to /etc merging changes to configuration files, Safely Merge Changes to /etc –See Also Merino Vidal, Julio, Contributors message of the day (motd), changing, Changing the Message of the Day messages, console (see console messages) MIBs, changing from the command line, Seeing Other Users miibus entry in kernel configuration files, Interface support –Building the New Kernel minicom utility, Enabling a Serial Console MIT magic cookie, Understanding X authorization mktemp command, Script Walkthrough Mock, Jim, Contributors modification dates of files, finding, When Did I Change That File? modules, Mandatory Access Control (MAC), Preparing the System –Quickly Disable All Interfaces MODULES_OVERRIDE option, Kernel Optimizations moon, phases of (pom) utility, The phase of the moon Moran, Bill, Simple sendmail Configuration Without a Local MTA more pager vs. less pager, Navigational Tricks motd (message of the day), changing, Changing the Message of the Day mount command, Mounting a Floppy –Allowing Regular Users to Mount Floppies error messages for, Common Error Messages mount points, Mounting a Floppy , Preparing the FreeBSD System mounting CD-ROMs, Managing the Floppy floppies, Mounting a Floppy by regular users, Allowing Regular Users to Mount Floppies remote shares, Mounting a Share mount_msdosfs command, Mounting a Floppy mount_smbfs utility, Access Windows Shares Without a Server , Establishing an SMB Connection with a Host System Mozilla, configuring to use signature file, Pipeless Signature Rotation MSP (Mail Submission Process), Closing Port 25 –Simple sendmail Configuration Without a Local MTA MTAs (Mail Transport Agents), Why Do I Need sendmail? –See Also mtree utility, Using mtree –See Also command syntax for, Creating the Integrity Database using as built-in tripwire, Use mtree as a Built-in Tripwire –Deciding on Which Files to Include MUAs (mail user agents) and pipes, If Your Mail Program Supports a Pipe multiple systems, maintaining your environment on, Maintain Your Environment on Multiple Systems –See Also multivol utility, Useful Resources for Multiple Volume Archives multivolume archives, resources for, Useful Resources for Multiple Volume Archives mv command vs. cp command, Preventing File Changes MX (mail exchange) records, Understanding DNS entries , Sending Email with telnet MySQL adding more security to, Hacking the Hack configuring, Configure MySQL installing client and server, Install MySQL-server N nameservers finding DNS server addresses, Exploring Your ISP’s DNS locating primary nameservers, Understanding DNS entries securing, Securing DNS –Testing DNS NAT automatically generated firewall
rules, What the Script Does –Example Usage reconfiguring dynamically, Survive Catastrophic Internet Loss –See Also wireless networks and, DHCP Configuration –See Also native Java applications, running on FreeBSD, Run Native Java Applications –See Also navigating command line, Editing and Navigating the Command Line manpages, Navigational Tricks nbtstat command, Installing and Configuring Sharity-Light ncftp tool, A Better FTP? NetBIOS names of computers, Installing and Configuring Sharity-Light , Preparing the FreeBSD System NetBSD automating package builds, Automate NetBSD Package Builds –Hacking the Hack cgd(4) devices, The Cryptographic Disk Device –See Also dealing with disk hogs, NetBSD default shell for, Get the Most Out of the Default Shell logging headless servers remotely, Log a Headless Server Remotely –Beep on Halt skeleton home directory location, NetBSD spoofing with, Spoofing on NetBSD NETBSD_RELEASE variable (pkg_comp), Configuration Variables netstart command, Spoofing on FreeBSD netstat command, Seeing Other Users , Gathering Interface Statistics network interface information, gathering, Gathering Interface Statistics network terminals, logging into, The Console networking allocating bandwidth, Traffic Shaping on FreeBSD –Complex Configurations catastrophic Internet loss, surviving, Survive Catastrophic Internet Loss –See Also holding email for later delivery, Hold Email for Later Delivery –See Also interacting with remote administration tasks, Interactive Remote Administration –Hacking the Hack optimizing performance, Optimizing Network Performance secure backups over networks, Secure Backups Over a Network –Automating the backup securing wireless networks with PF, Secure a Wireless Network Using PF –See Also tcpdump utility, Humanize tcpdump Output –See Also traffic shaping, Traffic Shaping on FreeBSD –Complex Configurations newfs command, Creating the Encrypted Disk Device newfs_msdos command, Formatting Floppies newsyslog, disabling, Log Protection NFS share, creating, Creating the NFS Share NFS_NOSERVER option, Kernel Optimizations NIC configurations, wireless, Use Multiple Wireless NIC Configurations –Hacking the Hack NoCatAuth authentication software, See Also nodump flag, Preventing File Changes , Controlling Backups nonlogin shells, dot.login nouchg flag, Watch Your Directories NSWAPDEV option, Kernel Optimizations null modem cables for headless systems, Run a Headless System O od command, Translating Tabs to Spaces one-liner commands, Unix, Useful One-Liners one-time passwords, Use One Time Passwords –See Also OpenBSD dealing with disk hogs, OpenBSD default shell for, Get the Most Out of the Default Shell skeleton home directory location, OpenBSD spoofing with, Spoofing with OpenBSD swap files, adding, OpenBSD Differences openssl command, Preparing the Database for Storage OPIE (One-time Passwords In Everything), Configuring OPIE opieinfo command, Configuring OPIE opiekey command, Configuring OPIE opiepasswd command, Configuring OPIE , Generating Responses optimizing file servers, Optimizing File Servers kernels, Kernel Optimizations mail servers, Optimizing Mail Servers network performance, Optimizing Network Performance software compiling, Optimizing Software Compiling web servers, Optimizing Web Servers OTP (One Time Password) system, Use One Time Passwords –Choosing When to Use OTP choosing when to use, Choosing When to Use OTP generating responses, Configuring OPIE Owen, Howard, Contributors P Package Compiler (pkg_comp) command, Installing pkg_comp –Hacking the Hack package repositories, creating, Create a Package Repository –Creating the NFS Share packageAdd command, Preparing the Install Script packages automating NetBSD builds, Automate NetBSD Package Builds –Hacking the Hack checking dependencies, Checking Dependencies Before Uninstalling Packet Filter (PF) configuring, PF Configuration –PF Configuration securing wireless networks with, Secure a Wireless Network Using PF –See Also packet sniffers, protecting from, Reading Email with telnet packets capturing, The Basics –Deciphering tcpdump Output deciphering tcpdump output, Deciphering tcpdump Output –Deciphering tcpdump Output PAM (Pluggable Authentication Modules), Create an Effective, Reusable Password Policy –See Also pam_passwdqc module changing default settings, Adding Your Own Options enabling, Enabling pam_passwdqc –Enabling pam_passwdqc overview of, Introducing pam_passwdqc parallel command execution using tentakel, Distributed Command Execution –See Also partition full detection script, Log Protection partitioning scheme for automated installs, Preparing the Install Script passphrases for cgd devices, Creating the Encrypted Disk Device changing periodically, Generating Responses one-time passwords and, Configuring OPIE passwd command, Converting existing passwords , sudo Configuration Gotchas changing default options using pam_passwdqc
module, Adding Your Own Options password protecting loaders, Password Protecting loader single-user mode, Password Protecting Single-User Mode passwords converting existing passwords to Blowfish, Converting existing passwords –Converting existing passwords crack (dictionary password cracker), Installing and Using crack –See Also customizing dictionaries, Customizing Password Dictionaries –See Also forcing new passwords to use Blowfish, Forcing new passwords to use Blowfish helping users choose memorable passwords, Automate Memorable Password Generation –See Also one-time passwords, Use One Time Passwords –See Also protecting email, Reading Email with telnet protecting system passwords with Blowfish, Protecting System Passwords with Blowfish –Forcing new passwords to use Blowfish reusable, creating policy for, Create an Effective, Reusable Password Policy –See Also setting expiration dates for, Adding Your Own Options patches applying to files, Applying Patches –Applying Patches creating, Creating Patches diff command and, Finding Differences –Finding Differences revision control and, Revision Control security, automating, Automate Security Patches –See Also pathnames, finding, Finding Program Paths pattern space vs. holding space (sed utility), Using the Holding Space to Mark Text pax utility, Replacing tar with pax –See Also performance of networks, optimizing, Optimizing Network Performance periodic scripts, Deal with Disk Hogs MTAs (Mail Transport Agents), Why Do I Need sendmail? peripheral information in kernel configuration
files, Peripheral support and power management permission for using code examples, Using Code Examples permissions FTP servers, accessing, Automating Logins protecting files with flags, Protect Files with Flags –See Also specifying for ACLs, Viewing ACLs standard Unix vs. ACLs, FreeBSD Access Control Lists Peterson, Jan L., Contributors PF (Packet Filter) configuring, PF Configuration –PF Configuration securing wireless networks with, Secure a Wireless Network Using PF –See Also pg_dump/pg_dumpall tools, Automate Data Dumps for PostgreSQL Databases phases of the moon (pom) utility, The phase of the moon PHP, configuring, Configure Apache and PHP PHP4, installing, Install PHP4, Apache, and MySQL PHPlot, installing, More installations pine mail program and pipes, If Your Mail Program Supports a Pipe ping command, Connectivity Software , Testing SMTP Server Availability pipes for traffic shaping, Creating Pipes and Queues pkg_add command, Hacking the Hack pkg_comp command, Installing pkg_comp –Hacking the Hack pkg_info command, Dealing with Installed Ports checking dependencies before uninstalling, Checking Dependencies Before Uninstalling checking disk space used by ports, Checking the Disk Space Your Ports Use pkg_version command, Checking the Disk Space Your Ports Use Pluggable Authentication Modules (PAM), Create an Effective, Reusable Password Policy –See Also Pluggable Password Checking, See Also pom (phases of the moon) utility, The phase of the moon pop-up messages, sending, Sending Pop-up Messages –Understanding X authorization POP3 protocol reading email with telnet, Reading Email with telnet security considerations, Security Considerations Popa, Alexandru, Contributors port 25, closing, Closing Port 25 portable files, creating, Creating Portable Files portable POSIX archives, creating, Create Portable POSIX Archives –See Also portdowngrade command, Downgrade a Port ports building without ports trees, Build a Port Without the Ports Tree –See Also checking disk space used by, Checking the Disk Space Your Ports Use choosing Java ports to install, Choosing Which Java Port to Install configuring, Stage Three: Post-Configuration dependencies, checking for, Finding a Port and Its Dependencies downgrading, Downgrade a Port –See Also finding the right port, Finding the Right Port installing, Stage Two: Ports Installation installing Unix applications on Mac OS X using
DarwinPorts, Easily Install Unix Applications on Mac OS X –See Also keeping up-to-date with CTM, Keep Ports Up-to-Date with CTM –See Also pkg_info command and, Dealing with Installed Ports screen window manager, What Is screen? skeletons, checking out, Checking Out Port Skeletons ports collection, keeping up-to-date with, Navigate the Ports System –See Also ports trees building ports without, Build a Port Without the Ports Tree –See Also updating DarwinPorts trees, Updating the Ports Tree updating using ftp and ctm, Using ftp and ctm to Stay Current portupgrade command, Assembling the Pieces –See Also portversion command, An Example Dry Run POSIX archives, creating, Create Portable POSIX Archives –See Also PostgreSQL databases, automating data dumps for, Automate Data Dumps for PostgreSQL Databases –See Also power management information in kernel configuration
files, Peripheral support and power management PPP variables, What the Script Does –Example Usage printing manpages, Printing Manpages priority number of MX records, Understanding DNS entries ÒThe Problem of
PORCMOLSULBÓ, See Also .profile file, dot.profile program paths, finding, Finding Program Paths prompt login, changing, Changing the Login Prompt for tcsh shell,
making more useful, Making Your Prompt More Useful prompt command, Scripting an Entire Session protecting the boot process, Protect the Boot Process –See Also pseudodevice information in kernel configuration
files, Interface support pseudoterminals, logging into, The Console pw command, Initial Preparation R RAID controller information in kernel configuration
files, Supported buses and media devices RAM, showing amount of, Moving /tmp to RAM randomizing signatures, Rotate Your Signature –Hacking the Hack randomly generated passwords, Adding Your Own Options read/write access for mounting floppies, Allowing Regular Users to Mount Floppies REAL_DISTFILES variable (pkg_comp), Configuration Variables REAL_PACKAGES variable (pkg_comp), Configuration Variables REAL_PKGSRC variable (pkg_comp), Configuration Variables REAL_PKGVULNDIR variable (pkg_comp), Configuration Variables REAL_SRC variable (pkg_comp), Configuration Variables reboot command, The Default Boot Menu reboots limiting unauthorized, Limiting Unauthorized Reboots viewing records of, When Did That Happen? recording interactive shell sessions, Recording an Interactive Shell Session shell input/output, Recording All Shell Input and Output recovery media, testing, Testing the Recovery Media recovery process and emergency repair kit, Use the FreeBSD Recovery Process –See Also Reddy, Dheeraj, Spoofing on NetBSD reformatting disks before upgrading, FreeBSD from Scratch –See Also regular expressions debugging, Using Regular Expressions using grep with, Using Regular Expressions rehash command, Automating the Format Process relaying mail considered harmful, Sending Email with telnet relevance searches using grep, Searching by Relevance remote administration tasks, interacting with, Interactive Remote Administration –Hacking the Hack remote backups, automating, Automate Remote Backups –See Also remote logins headless servers, connecting to, Log a Headless Server Remotely –Beep on Halt preventing, /etc/login.access seeing console messages over, See Console Messages Over a Remote Login –Hacking the Hack remote shares, mounting, Mounting a Share renaming files interactively, Renaming Files Interactively source files, Renaming a Batch of Source Files repair kit, emergency creating, Create an Emergency Repair Kit –See Also customizing boot process and, The Default Boot Menu testing, Use the FreeBSD Recovery Process –See Also Reporter script and crack utility, Monitoring the results resources, FreeBSD comments in source code, What Did the Manpage Forget to Say? –What Did the Manpage Forget to Say? manpages creating your own, Create Your Own Manpages –See Also getting the most out of, Get the Most Out of Manpages –Searching Text offline resources, keeping up-to-date, Keeping Offline Resources Up-to-Date online resources, Online Resources resources, system, Viewing Resource Information restoring data on hard disks, Restoring Data restricting logins, Restrict Logins –/etc/login.conf SSH servers, Restrict an SSH server –Now What? reusable password policy, creating, Create an Effective, Reusable Password Policy –See Also revision control and patches, Revision Control re_format command, Using Regular Expressions rhosts file, dot.rhosts Richard, John, Contributors Rightnour, Tim, Why ClusterIt? rm * command, preventing disaster from, Recreate a Directory Structure Using mtree rm -R command, recovering from accidental, Using mtree –See Also rm command vs. cp command, Preventing File Changes rmstar shell variable, Necessary Interaction Robbins, Arnold, Log Protection rooted archives and substitution argument, Rooted Archives and the Substitution Argument Rosenquist, Nathan, Contributors rotating signatures, Rotate Your Signature –Hacking the Hack route command, The Code rsnapshot utility, Automate Remote Backups –See Also accessing snapshots, Accessing Snapshots configuration file, testing, Testing your config file specifying backup intervals, Specifying backup intervals storage scheme for, The Snapshot Storage Scheme rsync utility, Specifying backup intervals rulesets, IP Filter, Script IP Filter Rulesets –See Also Russell, Kirk, Contributors S Samba, Access Windows Shares Without a Server using Access Control
Lists with, Using ACLs with Samba and Windows sandboxes, automating NetBSD package builds with, Automate NetBSD Package Builds –Hacking the Hack sappnd flag, Preventing File Changes , Log Protection scanning Windows computers for viruses, Scan a Network of Windows Computers for Viruses –See Also Schaefer, Marc, Useful Resources for Multiple Volume Archives sched command, Creating Terminal Sticky Notes schedules creating for backups, Creating Backup Schedules rsnapshot utility, Scheduling rsnapshot switching access rules on, Switching Rules on a Schedule schg flag, Preventing File Changes , Log Protection , Protecting Binaries Schneier, Bruce, See Also Schweikhardt, Jens, Contributors scponly (SSH shell), Restrict an SSH server installing, Installing scponly testing the chroot, Testing the chroot scponlyc shell, Testing the chroot screen window manager, What Is screen? –See Also multitasking with, Multitasking with screen –See Also .screenrc resource
file, Additional Features screens attaching/detaching sessions, Attaching and Deattaching locking/unlocking, Lock the Screen screensavers for terminals, The Terminal Screensaver screenshots, taking, Taking Screenshots script command, Recording All Shell Input and Output –Letting Other People Watch Your Live Shell Sessions script files, cleaning up, Cleaning Up script Files scripts, interactive, creating with Expect, Script User Interaction –See Also scrubbing hard disks, Scrubbing the Disk SCSI devices in kernel configuration files, Supported buses and media devices , USB support Seaman, Matthew, Contributors search and replace using sed, Replacing Existing Text searching manpage text, Making Your Prompt More Useful , Searching Text by relevance using
grep, Searching by Relevance with sed utility, Searching with sed securelevels, settings of, Log Protection security analyzing buffer overflows with GNU debugger, Use the GNU Debugger to Analyze a Buffer Overflow –See Also for DNS servers, Securing DNS –Testing DNS wireless network issues, Security Concerns security patches, automating, Automate Security Patches –See Also sed utility, Manipulate Files with sed –See Also adding comments to source code, Adding Comments to Source Code using holding space
to mark text, Using the Holding Space to Mark Text removing blank lines, Removing Blank Lines removing comments from source code, Removing Comments scripts with multiple commands, Multiple Transformations search and replace, performing, Replacing Existing Text searching with, Searching with sed sendmail, Why Do I Need sendmail? –See Also , Why Do I Need sendmail? (see also email) configuring with local MTA, Simple sendmail Configuration with a Local MTA configuring without local MTA, Simple sendmail Configuration Without a Local MTA disable receiving of email, Closing Port 25 DNS issues with mail queues, Dealing with DNS holding mail for later delivery, Hold Email for Later Delivery –See Also serial consoles, enabling, Enabling a Serial Console service set identifiers (SSIDs), Use Multiple Wireless NIC Configurations servlets, Java, Servlets set command, Setting Shell Variables setenv command, Setting Shell Variables setfacl command, Adding and Subtracting ACLs , Setting Default ACLs SETS variable (pkg_comp), Configuration Variables SETS_X11 variable (pkg_comp), Configuration Variables .SH (section)
groff command, Creating a Manpage sharing files between Windows and FreeBSD, Access Windows Shares Without a Server –See Also Sharity-Light utility, Installing and Configuring Sharity-Light –See Also scanning Windows computers for viruses, Scan a Network of Windows Computers for Viruses –See Also shells authorizing access to, using sudo, Shell Access with sudo input/output, recording, Recording All Shell Input and Output interactive, Use an Interactive Shell –Letting Other People Watch Your Live Shell Sessions letting others watch live sessions, Letting Other People Watch Your Live Shell Sessions recording interactive sessions, Recording an Interactive Shell Session setting shell variables, Setting Shell Variables shortcuts on the command line, Editing and Navigating the Command Line shutdowns of servers, using wsmoused, Shutting Down the Server Using wsmoused viewing records of, When Did That Happen? signature-at-bottom option, If Your Mail Program Supports a Pipe signatures, randomizing, Rotate Your Signature –Hacking the Hack sigtool command, Installing and Running the Virus Scanner single quote (') vs. backticks (`), Finding Program Paths single-user mode, password protecting, Password Protecting Single-User Mode skeletons, port, Checking Out Port Skeletons SMBFS, backing up FreeBSD with, Back Up FreeBSD with SMBFS –See Also smbutil utility, Access Windows Shares Without a Server , Establishing an SMB Connection with a Host System SMTP servers finding names of, Understanding DNS entries relaying mail considered harmful, Sending Email with telnet sending email with telnet, Sending Email with telnet –Sending Email with telnet testing availability, Testing SMTP Server Availability snapshots, remote, Installing and Configuring rsnapshot –Accessing Snapshots sniffing networks with tcpdump, Humanize tcpdump Output –See Also Snort adding more security to, Hacking the Hack configuring, Configure Snort installing, More installations running, Running Snort sockstat command, Preparing the System , Seeing Other Users , Configure MySQL software compiling, optimizing, Optimizing Software Compiling source code adding comments to, Adding Comments to Source Code reading comments in, What Did the Manpage Forget to Say? –What Did the Manpage Forget to Say? removing comments from, Removing Comments source files finding, Finding Your Source Files renaming a batch of, Renaming a Batch of Source Files spaces, translating tabs to, Translating Tabs to Spaces spell-checking on command line, Quick Spellcheck splash screen, configuring, Configuring the Splash Screen split DNS approach, used to prevent information
leaks, The two-pronged approach splitting windows (screen utility), Splitting windows spoofing MAC addresses, Spoof a MAC Address –Spoofing with OpenBSD SSH servers /etc/ssh/sshd_config
file, /etc/ssh/sshd_config remote backups, automating, Specifying backup intervals restricting, Restrict an SSH server –Now What? secure backups over networks, Secure Backups Over a Network –Automating the backup SSIDs (service set identifiers), Use Multiple Wireless NIC Configurations ssmtp MTA, Simple sendmail Configuration Without a Local MTA standalone Java applications, Standalone Java Applications Stark, Sebastian, Contributors startup scripts, creating your own, Create Your Own Startup Scripts –See Also Storage Daemon (Bacula), Introducing Bacula on backup server, Storage Daemon on the backup server running without root permission, Running Without Root storage scheme for rsnapshot, The Snapshot Storage Scheme stripping kernels, Strip the Kernel –See Also su command, Making Your Prompt More Useful Subversion program, Revision Control sudo utility configuration file issues, sudo Configuration Gotchas limitations of, Sudo Gotchas –See Also shell access with, Shell Access with sudo sudoers file, Limitations of sudo –Using sudoscript sudoscript, sudoscript –See Also log file for, The sudoscript Log File –The sudoscript Log File security issues with, Is sudoscript Secure? working with, Using sudoscript sudoscriptd script, sudoscript Overview sudoshell script, sudoscript Overview sunlnk flag, Preventing File Changes , Log Protection superusers binaries, protecting with flags, Protecting Binaries controlling backups with arch/nodump flags, Controlling Backups switching to, using su command, Making Your Prompt More Useful system logs, protecting with flags, Log Protection –Log Protection swap files, creating, Creating a Swap File on Disk –See Also swapctl command, Creating a Swap File on Disk swapinfo command, Creating a Swap File on Disk switches, adding to manpages, Getting Fancier switching between windows, Switching between windows symbolic links creating, Using the fixit Floppy finding, Finding Symlinks synchronized copies of directories, maintaining, Enter unison –See Also syntax for mtree commands, Creating the Integrity Database sysctl command, Seeing Other Users sysinstall installation mechanism, Preparing the Install Script –See Also setting up NFS mounts, Creating the NFS Share syslogd, redirecting console messages using, Setting Up the Logging Server , An Alternate Method systat command, Monitoring Swap Changes system accounting, enabling, Details, Details –Details, Details system logs, protecting with flags, Log Protection –Log Protection system passwords, protecting, using Blowfish, Protecting System Passwords with Blowfish –Forcing new passwords to use Blowfish system resources, viewing, Viewing Resource Information system-specific options in kernel configuration
files, System-specific options T tabs, translating to spaces, Translating Tabs to Spaces tail command, Seeing Remote Console Messages tape drives, testing with Bacula, Testing Your Tape Drive tar utility, Archiving and Compressing Data with tar and gzip , Simultaneously Download and Untar GNU tar vs. POSIX tar, GNU Versus POSIX tar replacing, with pax utility, Replacing tar with pax secure backups over networks, The Backup TCP flags field, More Complicated Filters tcpdump utility, Humanize tcpdump Output –See Also capturing packets, The Basics deciphering output, Deciphering tcpdump Output –Deciphering tcpdump Output display filters, Display Filters specific filters, creating, More Complicated Filters tcsh shell, Get the Most Out of the Default Shell auto completion, History and Auto-Completion working around, Silencing Auto-Complete autologout, Using autologout command history, History and Auto-Completion .cshrc file vs.
.login file, dot.login limiting files, Limiting Files making prompt more useful, Making Your Prompt More Useful rmstar shell variable, Necessary Interaction setting shell variables, Setting Shell Variables telnet checking connectivity of mail servers, Testing SMTP Server Availability reading email, Reading Email with telnet sending email, Sending Email with telnet –Sending Email with telnet telnetd daemon, An Example Exploit –Using the GNU Debugger temporary directories, cleaning out quickly, daily_clean_tmps temporary files, managing, Manage Temporary Files and Swap Space tentakel utility, Distributed Command Execution –See Also configuring, Installing and Configuring tentakel installing, Installing and Configuring tentakel interactive mode, Using tentakel terminals adding color to video, Adding Some Color to Your Terminal configuration file, securing, /etc/ttys locking/unlocking, Lock the Screen login banner, removing, Remove the Terminal Login Banner –See Also screensavers for, The Terminal Screensaver using multiple screens, Use Multiple Screens on One Terminal –See Also virtual dvt command (ClusterIt tool), Using dvt logging into, The Console testing automated software installations, Test-Drive DNS servers, The two-pronged approach recovery media, Testing the Recovery Media text finding, using grep, Finding Text marking, using holding space (sed utility), Using the Holding Space to Mark Text search and replace using sed, Replacing Existing Text .TH (title)
groff command, Creating a Manpage thesaurus, creating, Creating a Dictionary or Thesaurus three-way handshake, TCP, More Complicated Filters time of day, displaying, The current time timeout value of screensavers, changing, The Terminal Screensaver times.allow option, /etc/login.conf times.deny option, /etc/login.conf timestamps in packets, Deciphering tcpdump Output tip utility, If the Headless System Becomes Inaccessible /tmp filesystem clearing out, Clearing /tmp moving to RAM, Moving /tmp to RAM Tomcat (Java servlet), Servlets touch command, Necessary Interaction tr command, Translating Case trade show demos, creating, Create a Trade Show Demo –See Also traffic shaping on FreeBSD, Traffic Shaping on FreeBSD –Complex Configurations transfers, automating, using ftp, Automating Transfers translating case of characters, Translating Case tabs to spaces, Translating Tabs to Spaces trash directory, creating, Create a Trash Directory –Hacking the Hack tripwire, using mtree as built-in, Use mtree as a Built-in Tripwire –Deciding on Which Files to Include trivia related to current date, displaying, Pursuing Trivia TrustedBSD project, FreeBSD Access Control Lists , See Also MAC (Mandatory Access Control) framework, Tighten Security with Mandatory Access Control –See Also tunefs command editing superblock with, Enabling ACLs tuning FreeBSD systems, Tune FreeBSD for Different Applications –See Also U uappnd flag, Preventing File Changes , Preventing Some Changes and Allowing Others uchg flag, Preventing File Changes –Preventing Some Changes and Allowing Others UFS (Unix File System), Mounting a Floppy UFS1 filesystem and ACLs, Additional UFS1 Configuration umount command, Managing the Floppy , Moving /tmp to RAM unauthorized reboots, limiting, Limiting Unauthorized Reboots unauthorized/authorized hosts, PF Configuration –Hacking the Hack UNC (Universal Naming Convention), Installing and Configuring Sharity-Light uncompress command, Limiting Files uninstalling applications, checking dependencies
first, Checking Dependencies Before Uninstalling unison utility, Enter unison –See Also Unix File System (UFS), Mounting a Floppy Unix one-liner commands, Useful One-Liners <Emphasis>Unix Power
Tools<Default Para Font>, The sudoscript Log File unlimit command, Limiting Files unlocking and locking screens, Lock the Screen unmounting floppies, Managing the Floppy remote shares, Hacking the Hack /tmp filesystem, Moving /tmp to RAM untarring archives, Simultaneously Download and Untar updating systems automatically, Automate Updates –See Also uploaddisk command, Creating an Image uppercasing characters, Translating Case USB support in kernel configuration files, USB support user interaction adding to scripts, Adding User Interaction handling incorrect input, Handling Incorrect Input users choosing memorable passwords, Automate Memorable Password Generation –See Also expiration dates for passwords, Adding Your Own Options users command, Who’s on First? /usr/local/etc/sudoers
file, Limitations of sudo –Using sudoscript /usr/src/share/skel/Makefile
file, editing, Editing /usr/src/share/skel/Makefile –Editing /usr/src/share/skel/Makefile uunlnk flag, Preventing File Changes , Preventing Some Changes and Allowing Others V /var/log file, Log Protection /var/log/console.log
file, An Alternate Method variables for login prompt, Changing the Login Prompt shell, Setting Shell Variables vidcontrol command, Adding Some Color to Your Terminal , The Terminal Screensaver Vig, Avleen, Contributors Vince, Michael, Contributors , Automate Security Patches virtual terminals dvt command (ClusterIt tool), Using dvt logging into, The Console viruses Intrusion Detection Systems and, Intrusion Detection with Snort, ACID, MySQL, and FreeBSD –See Also scanning Windows computers for, Scan a Network of Windows Computers for Viruses –See Also Vogel, Karl, Contributors vol utility (Minix/QNX4), Useful Resources for Multiple Volume Archives W w command, The Console , Who’s on First? w3m command-line browser, Creating a Dictionary or Thesaurus Warden, Brett, Contributors Warner, Joe, Contributors web browsers and Java applets, Applets web information, fetching, Improved Dictionary web servers allowing unauthorized hosts to access, PF Configuration –Hacking the Hack consolidating logs for, Consolidate Web Server Logs –See Also optimizing, Optimizing Web Servers WebStart mechanism, Java WebStart WEP (Wireless Encryption Protocol), Secure a Wireless Network Using PF multiple NIC configurations, Use Multiple Wireless NIC Configurations , Preparing the Script whatis command, Finding Program Paths , Finding Commands whatis database, creating, Finding Installed Manpages whereis command, Finding Program Paths which command, Finding Program Paths who command, Who’s on First? window managers screen, What Is screen? –See Also multitasking with, Multitasking with screen –See Also showcasing, using eesh utility, Create a Trade Show Demo –See Also Windows using Access Control
Lists with, Using ACLs with Samba and Windows scanning computers for viruses, Scan a Network of Windows Computers for Viruses –See Also wiping disks clean before upgrading, FreeBSD from Scratch –See Also Wireless Encryption Protocol (WEP), Secure a Wireless Network Using PF multiple NIC configurations, Use Multiple Wireless NIC Configurations , Preparing the Script wireless networks securing with PF, Secure a Wireless Network Using PF –See Also using multiple NIC configurations, Use Multiple Wireless NIC Configurations –Hacking the Hack words, finding, Finding Words –Finding Words worms, fighting with Intrusion Detection Systems, Intrusion Detection with Snort, ACID, MySQL, and FreeBSD –See Also wsmoused, shutting down servers using, Shutting Down the Server Using wsmoused
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.