Index: L
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: L
- last command (Unix): 9.2.2. Calling an OS (or Someone Else's) Binary
- 9.5.4.1. Using Perl-only databases
- 9.5.4.2. Using Perl-cliented SQL databases
- LDAP Data Interchange Format (see LDIF)
- LDAP entries
- attributes
- in search operations: 6.4.3. Performing LDAP Searches
- 6.4.3. Performing LDAP Searches
- methods for retrieving: 6.4.4. Entry Representation in Perl
- modifying: 6.4.9. Modifying Entry Attributes
- separators: 6.4.10. Putting It All Together
- values, quoting: 6.4.2. The Initial LDAP Connection
- modifying with Perl: 6.4.8. Modifying Entry Names
- representation in Perl: 6.4.4. Entry Representation in Perl
- LDAP (Lightweight Directory Access Protocol): 6.4. LDAP: A Sophisticated Directory Service
- anonymous authentication: 6.4.2. The Initial LDAP Connection
- data organization of: B.1. LDAP Data Organization
- objectClass attribute: B. The Ten-Minute LDAP Tutorial
- Perl modules, comparing: 6.4.1. LDAP Programming with Perl
- tutorial: B. The Ten-Minute LDAP Tutorial
- LDAP operations
- adding/deleting: 6.4.6. Adding Entries with Standard LDAP Operations
- binding: 6.4.2. The Initial LDAP Connection
- searching: 6.4.3. Performing LDAP Searches
- LDIF (LDAP Data Interchange Format): 6.4.3. Performing LDAP Searches
- 6.4.10. Putting It All Together
- reading/writing
- directory entries with: 6.4.5. Adding Entries with LDIF
- from Perl: 6.4.5. Adding Entries with LDIF
- leaf objects (LDAP): 6.5.1. ADSI Basics
- 6.5.3. Dealing with Container/Collection Objects
- libcrack library: 10.5. Preventing Suspicious Activities
- libnet package: 8.1.3. Speaking to the Mail Protocols Directly
- libpcap library: 10.4.1. Perl Saves the Day
- 10.4.1. Perl Saves the Day
- Lightweight Directory Access Protocol (see LDAP)
- LIKE wildcards (SQL): D.3.2. Retrieving a Subset of the Rows in a Table
- Linux
- directories, hidden: 10.2.1. Local Signs of Peril
- driver: 2.1. Perl to the Rescue
- NIS+ and: 5.2.1. NIS+
- privileges on, dropping: 1.6.2. Drop Your Privileges as Soon as Possible
- Sybase OpenClient libraries and: 7.1. Interacting with an SQL Server from Perl
- lockfile program: 3.3.4. Account System Wrap-Up
- log files: 9. Log Files
- analyzing: 9.5. Log Analysis
- black box approach: 9.5.3. Black Boxes
- database approach: 9.5.4. Using Databases
- read-remember-process: 9.5.2. Read-Remember-Process
- stream read-count: 9.5.1. Stream Read-Count
- binary: 9.2. Binary Log Files
- Event Log Service: 9.2.3. Using the OS's Logging API
- wtmp: 9.2. Binary Log Files
- circular buffering of: 9.4.2. Circular Buffering
- disk space problems and: 9.4. Disk Space Problems
- mail log data, summarizing: 9.5.3. Black Boxes
- rotating: 9.4.1. Log Rotation
- security of, when processing: 9.4.2.2. Security in log processing programs
- stateful vs. stateless: 9.3. Stateful and Stateless Data
- text: 9.1. Text Logs
- Logfile\:\:Rotate module: 9.4.1. Log Rotation
- L0phtCrack program: 10.5. Preventing Suspicious Activities
- lsof program: 4.4.2. Tracking Operations in Unix
- lstat() function (Perl): 10.1.1. Local Filesystem Changes
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2001
O'Reilly & Associates, Inc.
All Rights Reserved.