
globbing
Filename substitution.
HIP
Host intrusion prevention. Works with the operating system kernel to block abnormal
application behavior in the expectation that the abnormal behavior represents an
unknown attack. Blocks malicious packets on the host at the network level before
they can “hurt” the application they target.
mandatory access control
A means of restricting access to objects that is based on fixed security attributes
assigned to users, files, and other objects. The controls are mandatory in the sense
that they cannot be modified by users or their programs.
profile foundation classes
Profile building blocks needed for common application activities, such as DNS
lookup and user authentication.
RPM
The RPM Package Manager. An open packaging system available for anyone to
use. It works on Red Hat Linux, SUSE Linux Enterprise Server, and other Linux
and UNIX systems. It is capable of installing, uninstalling, verifying, querying,
and updating computer software packages. See
http://www.rpm.org/
for
more information.
SSH
Secure Shell. A service that allows you to access your server from a remote com-
puter and issue text commands through a secure connection.
streamlined access control
Novell AppArmor provides streamlined access control for network services by
specifying which files each program is allowed to read, write, and execute. This
ensures that each program does what it is supposed to do and nothing else.
URI
Universal resource identifier. The generic term for all types of names and addresses
that refer to objects on the World Wide Web. A URL is one kind of URI.
URL
Uniform Resource Locator. The global address of documents and other resources
on the World Wide Web.
370
Security Guide
Содержание LINUX ENTERPRISE DESKTOP 11
Страница 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Страница 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Страница 10: ......
Страница 29: ...Part I Authentication...
Страница 30: ......
Страница 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Страница 126: ......
Страница 127: ...Part II Local Security...
Страница 128: ......
Страница 158: ......
Страница 173: ...Part III Network Security...
Страница 174: ......
Страница 194: ......
Страница 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Страница 210: ......
Страница 228: ......
Страница 229: ...Part IV Confining Privileges with Novell AppArmor...
Страница 230: ......
Страница 274: ......
Страница 300: ......
Страница 328: ......
Страница 340: ......
Страница 342: ......
Страница 386: ......
Страница 387: ...Part V The Linux Audit Framework...
Страница 388: ......