July 1991
Site Security Handbook
Status of this Memo
This handbook is the product of the Site Security Policy Handbook
Working Group (SSPHWG), a combined effort of the Security Area and
User Services Area of the Internet En... ors
The following are the authors of the Site Security Handbook. Without
their dedication, this hand
IMPROVING THE SECURITY OF YOUR UNIX SYSTEM
David A. Curry, Systems Programmer
... INTRODUCTION
1.1 UNIX SECURITY
The UNIX operating system, altho... e
in environments concerned about security, was not really
designed with security in mind [Ritc75]. This does not mean
ercent (%) Command Sets
Appendix D--Dial Security/Remote Access
Dial Security
Remote Access
Appendix E--Troubleshooting
Appendix F--Synchrono... and tables
* Alphabetical Command Summary
* Dial Security operations
* Troubleshooting
* Online synchronous... ols. See
Appendix F for more information.
Dial Security
With Dial Security, you will be able to prevent u
k(1)'.
= B =
=====
:back door: n. A hole in the security of a system deliberately left
in place by desi... y have
qualified as the most fiendishly clever security hack of all time.
The C compiler contained cod... flaming death}.
:crack root: v. To defeat the security system of a UNIX machine and
gain {root} privi... eby; see {cracking}.
:cracker: n. One who breaks security on a system. Coined ca. 1985
by hackers in de
ACCESS ALL AREAS
Computer Security & Hacking Conference
1... --------------------------
The first UK Computer Security and Hacking Conference, Access All Areas,
is to b...
It is aimed at hackers, phone phreaks, computer security professionals,
cyberpunks, law enforcement offici... e theatre that will be used for talks by
computer security professionals, legal experts and hackers alike.
be prepared for a SPEEDY passage through airport security by
being aware that in most cases you MUS... ible activity is
displayed on the screen. Security officials do this for a
reason: if a lapt... op owner
to activate the machine, airport security is effectively
screening for tampered mac... ou want to use to speed your trip through airport security. But
ALWAYS take the bootable floppy as w
some work and since it was a secure
building the security guard had do go with him. The electrician
at on... en reprimanded and re-assigned
to another of the security agency's customers.
/ net.rumor / rebel!george... empty cans in the
satellite uplink. A shift of security guards fixed that.
From: cyosta@taux01.UUCP (... or down).
The operator (fortunately for his job security, the son of the
company's vice-president), said
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
Enter your password. For security reasons, the host will not
display your password ... ack to the old password and eliminates a
possible security violation. If you try to change the password
bef... ance, they are an
important way to strengthen the security of the computer system.
1.11 On-line Manual
... YEARS IN PRISON. REPORT VIOLATIONS TO THE SYSTEM SECURITY OFFICER. ³
³ WARNING ****** WARNING ****** WA
o an intangible amount (usually represented by a
security level or flags) that indicate to what extent you ... , usually including your name,
phone number, and security level. [See also user number].
account number -... RUE or FALSE. It
is used in some bulletin board security systems to indicate
whether the user has access ... fers to
256 bytes. It is rarely used any more.
security level - Some BBS programs have different user lev
o an intangible amount (usually represented by a
security level or flags) that indicate to what extent you ... , usually including your name,
phone number, and security level. [See also user number].
account number -... RUE or FALSE. It
is used in some bulletin board security systems to indicate
whether the user has access ... fers to
256 bytes. It is rarely used any more.
security level - Some BBS programs have different user lev