The first part of the address indicates what protocol to use and the second part
specifies the IP address or the domain name where the resource is located.
For example, in
http://www.novell.com
, http is the protocol to use.
vulnerabilities
An aspect of a system or network that leaves it open to attack. Characteristics of
computer systems that allow an individual to keep it from correctly operating or
that allows unauthorized users to take control of the system. Design, administrative,
or implementation weaknesses or flaws in hardware, firmware, or software. If ex-
ploited, a vulnerability could lead to an unacceptable impact in the form of unau-
thorized access to information or disruption of critical processing.
AppArmor Glossary
371
Содержание LINUX ENTERPRISE DESKTOP 11
Страница 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Страница 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Страница 10: ......
Страница 29: ...Part I Authentication...
Страница 30: ......
Страница 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Страница 126: ......
Страница 127: ...Part II Local Security...
Страница 128: ......
Страница 158: ......
Страница 173: ...Part III Network Security...
Страница 174: ......
Страница 194: ......
Страница 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Страница 210: ......
Страница 228: ......
Страница 229: ...Part IV Confining Privileges with Novell AppArmor...
Страница 230: ......
Страница 274: ......
Страница 300: ......
Страница 328: ......
Страница 340: ......
Страница 342: ......
Страница 386: ......
Страница 387: ...Part V The Linux Audit Framework...
Страница 388: ......