- absolute pathnames, reading tapes
- Reading Media from Other Systems
- Access Control Lists
- Access
Control
Lists (ACLs)
- access control violations
- File Permission Violations by Inside Users
- accounting
- process
- System Accounting
- system
- System Accounting
- acl
- Access
Control
Lists (ACLs)
- ls option
- Access
Control
Lists (ACLs)
- archiving audit data
- Archiving Audit Data
- attrinit command
-
Using attrinit to Clean Up Capability Corruption
- audit
- a file
- Auditing a File
- Access to Particular Files or Resources
- a label
- Auditing a Label Under Trusted IRIX
- a user
- Auditing a Specific User
- Activity by Particular Inside Users
- customizing
- Customizing Auditing
- data archiving
- Archiving Audit Data
- data removing
- Removing Audit Data
- event types
- Auditable Events
- guidelines
- About Proper and Improper System Management
- improper use
- About Proper and Improper System Management
- particularly interesting users
- Activity by Particular Inside Users
- sample record
- About the Audit Data
- sat_select
- Auditable Actions
- system data files modification
- Modifications of System Data Files
- system programs modification
- Modifications of System Program Attributes
- the audit trail
- Manipulation of the Audit Trail
- audit data
- interpreting
- About the Audit Data
- understanding
- About the Audit Data
- auditing
- cofiguration utilities
- Customizing Auditing
- customizing
- Customizing Auditing
- default environment
- Default Auditing
- enabling
- Enabling Auditing
- list of items to audit
- Auditable Events
- reading output
- About the Audit Data
- recovery
- Saving and Retrieving Your Auditing Environment
- saved files
- Placing the Audit Files
- saving
- Saving and Retrieving Your Auditing Environment
- auditing, description
- Administering the System Audit Trail
- auditing, satconfig utility
- About satconfig
- autochangers
- Types of Backup Media
- Backup
- Saving Data with Backup
- backup and restore
- using xfsdump and xfsrestore
- About xfsdump and xfsrestore
- Backup and Restore window
- System Backup Tools
- backups
- about
- Planning a Backup Strategy
- across a network
- File Backup Across a Network
- automatic
- Automatic Backups with cron
- available programs
- IRIX Backup Tools
- byte swapping
- Reading Media from Other Systems
- dd conversion options
- Reading Media from Other Systems
- error messages
- Backup and Recovery Error Messages and Actions
- errors
- Troubleshooting Errors During Backup
- estimate space with bru
- Saving Data with Backup
- how often
- When to Back Up Data and What to Back Up
- incremental
- Incremental Backup Schedule
- incremental with cpio
- Performing Incremental Backups with tar
- Performing Incremental Backups with cpio
- incremental with dump
- Performing Incremental Backups
- incremental with tar
- Performing Incremental Backups with tar
- Performing Incremental Backups with cpio
- making
- General Backup Procedure
- restored wrong one
-
Restoring the Correct Backup after the Wrong One
- root filesystem
-
Root Filesystem Backup
- storing
- Storage of Backups
- strategies for
- Backup Strategies
- unreadable
- Troubleshooting Unreadable Backups
- user filesystems
-
User Filesystem Backup
- Capabilities
- Least-Privilege Capabilities
- Capabilities, default
- Capabilities in This Release
- capabilities, on files
-
File
Capabilities
- chacl command
- Short ACL Text Form
- changing passwords
- Controlling Password Aging by Editing /etc/passwd
- Controlling Password Aging by Editing /etc/passwd
- cpio
- about
- IRIX Backup Tools
- and System Manager
- About cpio
- capabilities
- About cpio
- making backups
- Using cpio to Back Up Files by Modification Date
- restoring files
- Restoring tar Archives
- Restoring cpio Archives
- cumulative restores, xfsrestore
- Performing Cumulative Restores with xfsrestore
- customizing auditing
- Customizing Auditing
- data segments, xfsdump
- Media Layout for xfsdump
- dbedit utility
- Modifications of System Data Files
- dd
- about
- IRIX Backup Tools
- capabilities
- About dd
- conversion options
- Reading Media from Other Systems
- default backup device
- changing
- Changing the Default Backup Device
- /dev/tape
- General Backup Procedure
- disabling IP packet forwarding
- Disabling Forwarding of IP Packets
- disabling NFS
- Disallowing NFS Access on the Firewall
- disabling NIS
- Disabling NIS (YP) on the Firewall
- DNS configuration of internal network
- Domain Name System (DNS) Security Guidelines
- dual-homed host
- hardware setup
- Dual-Homed Host Firewall
- software setup
- Network Software Setup on a Dual-Homed Host
- dump
- about
- IRIX Backup Tools
- /etc/dumpdates
- Backing Up a Filesystem with dump
- incremental backups
- Performing Incremental Backups
- making backups
- Backing Up a Filesystem with dump
- vs. xfsdump
- About xfsdump and xfsrestore
- dump inventory, xfsdump
- Media Layout for xfsdump
- dump session, xfsdump
- Media Layout for xfsdump
- dump stream, xfsdump
- Media Layout for xfsdump
- educating users about security
- Educating Users About the Firewall
- error messages, backup and recovery
- Backup and Recovery Error Messages and Actions
- /etc/capability file
-
The /etc/capability File
- /etc/dumpdates
- Backing Up a Filesystem with dump
- /etc/hosts.equiv file
-
Network Access Control Files
- /etc/inetd.conf file
- Local inetd Services
- /etc/passwd file
-
Network Access Control Files
- file audit
- Auditing a File
- File Capabilities
-
File
Capabilities
- firewall
- definition
- About Firewalls
- design philosophy
- Firewall Design Philosophy
- hardware configuration
- RHardware Configuration for Firewalls
- monitoring security
- Monitoring the Firewall
- software configuration
-
IRIX Configuration for Security
- firewalls
- About Network Security and Firewalls
- forwarding IP packets
- Disabling Forwarding of IP Packets
- FTP services
- Limiting inetd Services
- hardware configuration
- firewall
- RHardware Configuration for Firewalls
- routers
- Routers and Firewalls
- host
- dual-homed
- Dual-Homed Host Firewall
- screened
- Screened Host Gateway
- housekeeping directory
- About the housekeeping and orphanage Directories
- incremental dumps, xfsdump
- About Incremental and Resumed Dumps
- inetd daemon
- Local inetd Services
- inetd services
- limiting
- Limiting inetd Services
- insider security violation
- System Use and Abuse by Inside Users
- interactive restore, xfsrestore
- Performing Interactive Restores with xfsrestore
- internal network configuration
- Internal Network Security Configuration
- Internet, definition
- About the Internet
- interrupted restores, xfsrestore
- Interrupting xfsrestore
- inventory, xfsdump
- Media Layout for xfsdump
- Examining xfsdump Archives
- IP packet forwarding
- Disabling Forwarding of IP Packets
- jukeboxes
- Types of Backup Media
- label audit
- Auditing a Label Under Trusted IRIX
- locking logins
- Controlling Password Aging by Editing /etc/passwd
- log files
- About Log Files on the Firewall
- login
- disable time
-
Setting a Time Period to Disable a Line (DISABLETIME)
- locking
- Controlling Password Aging by Editing /etc/passwd
-
Locking Unused Logins
- maximum attempts
-
Restricting Login Attempts (MAXTRYS)
- options
- System Login Options
- recording
-
Recording Login Attempts
- restricting root
-
Restricting root Logins
- special accounts
-
About Special Accounts
- ls -d option
- Using ls -D and chacl
- mail
- configuration of internal network
- Mail Configuration Security Guidelines
- spool isolation
- Mail Spool Isolation
- media
- layout, xfsdump
- Media Layout for xfsdump
- object, xfsdump
- Media Layout for xfsdump
- storing
- Storage of Backups
- modification of system data files
- Modifications of System Data Files
- modifications of system programs
- Modifications of System Program Attributes
- monitoring the firewall
- Monitoring the Firewall
- ncheck command
- Checking for Set-UIDs in the root Filesystem
- network
- access control
-
Network Access Control Files
- backups
- File Backup Across a Network
- screened
- Screened Host Gateway
- security issues
- Network Security Issues
- NFS
- limiting or disabling
- Disallowing NFS Access on the Firewall
- NIS
- disabling
- Disabling NIS (YP) on the Firewall
- operating the system
- general
- System Accounting
- orphanage directory
- About the housekeeping and orphanage Directories
- outside connections
- Connections with Machines Outside the Local Network
- outsider security violation
- System Use and Abuse by Outside Users
- password
- aging
-
About Password Aging
- changing
- Controlling Password Aging by Editing /etc/passwd
- Controlling Password Aging by Editing /etc/passwd
- checking
- Using pwck to Check the Password File
- choosing
-
Guidelines for Devising Passwords
- dialup
- Establishing Second (Dialup) Passwords
- forcing
- Forcing a Password
- PROM
- About PROM Passwords
- protection
-
Password Protection on the Firewall
- password PROM
- About PROM Passwords
- passwords
- administration
- Password Administration
- potential security violations
- About Security Violations
- process accounting
- System Accounting
- PROM passwords
- clearing
-
Clearing the PROM Password Using nvram
- setting
-
Setting the PROM Password from the Command Monitor
- use of
- About PROM Passwords
- proxy servers
- About Proxy Servers
- pwck command
- Using pwck to Check the Password File
- Recover System
-
Recovering Data After System Corruption
- recovery
- after system corruption
-
Recovering Data After System Corruption
- error messages
- Backup and Recovery Error Messages and Actions
- removing
- audit data
- Removing Audit Data
- Restore
- about
- IRIX Backup Tools
- IRIX Backup Tools
- interactive mode
- Recovering Individual Files with restore
- restoring data
- Restoring Data with Restore
- restoring filesystems
- Recovering a Filesystem with restore
- restoring individual files
- Recovering Individual Files with restore
- vs. xfsrestore
- About xfsdump and xfsrestore
- restoring data
- cpio
- Restoring tar Archives
- Restoring cpio Archives
- Restore
- Restoring Data with Restore
- Recovering a Filesystem with restore
- tar
- Restoring tar Archives
- Restoring cpio Archives
- restoring interrupted dumps, xfsrestore
- Performing Cumulative Restores with xfsrestore
- .rhosts file
-
Network Access Control Files
- robotic media changers
- Types of Backup Media
- root privilege violation
- Unexpected Use of Root Privilege by Inside Users
- routers and firewalls
- Routers and Firewalls
- RPC services
- limiting
- Limiting rpc Services Access on the Firewall
- SAT
- customizing
- Customizing Auditing
- event types
- Auditable Events
- sample record
- About the Audit Data
- sat_select
- Auditable Actions
- understanding data
- About the Audit Data
- sat_interpret utility
- About the Audit Data
- About the Audit Data
- sat_reduce utility
- About the Audit Data
- sat_select
- Auditable Actions
- sat_select utility
- About sat_select
- sat_summarize utility
- About the Audit Data
- About the Audit Data
- satconfig utility
- About satconfig
- screened host
- hardware setup
- Screened Host Gateway
- screened network
- hardware setup
- Screened Host Gateway
- security
- guidelines
- Security Safeguards and Cautions
- IRIX standard
- Standard Security Features
- LAN
-
Local Area Network Access
- network
- Network Security
- process accounting
- System Accounting
- tightening for firewall
- Tightening Security in IRIX
- Trojan horse attack
- Security Safeguards and Cautions
- xhost command
- Limiting Access with the xhost Command
- security violation
- insider
- System Use and Abuse by Inside Users
- security violation (auditing)
- access control
- File Permission Violations by Inside Users
- outside connections
- Connections with Machines Outside the Local Network
- outsider
- System Use and Abuse by Outside Users
- potential
- About Security Violations
- root privilege
- Unexpected Use of Root Privilege by Inside Users
- unauthorized entry
- Attempts at Unauthorized System Entry
- unusual system usage
- System Use at Unusual Hours or from Unusual Locations
- sendmail
- configuration
- Sendmail Configuration and Mail Aliases
- Set-GID
- Checking for Set-UIDs in the root Filesystem
- Set-UID
- Checking for Set-UIDs in the root Filesystem
- software
- checking integrity
- Checking Software Integrity on the Firewall
- stream terminator, xfsdump
- Media Layout for xfsdump
- system access
- Controlling Password Aging by Editing /etc/passwd
- Controlling Password Aging by Editing /etc/passwd
- Controlling Password Aging by Editing /etc/passwd
- system accounting
- System Accounting
- System Accounting
- system backups
- System Backup Tools
- system data files
- modification
- Modifications of System Data Files
- System Maintenance Menu
-
Recovering Data After System Corruption
- system passwords
- password
- system
- About PROM Passwords
- system recovery
-
Recovering Data After System Corruption
- tape device, default
- General Backup Procedure
- tapes
- reusing
- Guidelines for Tape Reuse
- storing
- Storage of Backups
- testing
- Testing for Bad Media
- tapes, absolute pathnames
- Reading Media from Other Systems
- tapes, reusing with xfsdump
- Reusing Tapes with xfsdump
- tar
- about
- IRIX Backup Tools
- capabilities
- About tar
- comparison key characters
- Examining tar Archives
- making backups
- Using tar to Back Up Files by Modification Date
- restoring files
- Restoring tar Archives
- Restoring cpio Archives
- terminator, xfsdump
- Media Layout for xfsdump
- Trojan horse attack
- Security Safeguards and Cautions
- unauthorized entry
- Attempts at Unauthorized System Entry
- understanding the audit data
- About the Audit Data
- unusual system usage
- System Use at Unusual Hours or from Unusual Locations
- user accounts
- forcing a password
- Forcing a Password
- user audit
- Auditing a Specific User
- users and security
- Educating Users About the Firewall
- violations
- of access control security
- File Permission Violations by Inside Users
- of root privilege security
- Unexpected Use of Root Privilege by Inside Users
- of security by insiders
- System Use and Abuse by Inside Users
- of security by outsiders
- System Use and Abuse by Outside Users
- of security by unauthorized entry
- Attempts at Unauthorized System Entry
- of security by unusual system usage
- System Use at Unusual Hours or from Unusual Locations
- possible
- About Security Violations
- through outside connections
- Connections with Machines Outside the Local Network
- World Wide Web
- and security
- World Wide Web Security Issues
- X server access
- checking
- Interactive Use of the xhost Command
- controlling
- X11 Network Access
- xfsdump
- dump inventory
- Examining xfsdump Archives
- incremental dumps
- About Incremental and Resumed Dumps
- media layout
- Media Layout for xfsdump
- network usage
- Using xfsdump and xfsrestore to Copy Filesystems
- resumed dumps
- About Incremental and Resumed Dumps
- reusing media
- Reusing Tapes with xfsdump
- specifying media
- Specifying Local Media with xfsdump
- STDOUT
- Using xfsdump and xfsrestore to Copy Filesystems
- using
- Saving Data with xfsdump
- xfsrestore
- cumulative restores
- Performing Cumulative Restores with xfsrestore
- interactive restore
- Performing Interactive Restores with xfsrestore
- interrupted restores
- Interrupting xfsrestore
- network usage
- Performing Network Restores with xfsrestore
- Using xfsdump and xfsrestore to Copy Filesystems
- restoring files
- Restoring Individual Files with xfsrestore
- restoring interrupted dumps
- Performing Cumulative Restores with xfsrestore
- session ID
- Performing Simple Restores with xfsrestore
- session label
- Performing Simple Restores with xfsrestore
- simple restores
- Performing Simple Restores with xfsrestore
- STDIN
- Using xfsdump and xfsrestore to Copy Filesystems
- using
- About xfsrestore
- xhost command
- Limiting Access with the xhost Command