Index: S
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: S
- SAM (Security Accounts Manager): 3.2.1. NT/2000 User Identity Storage and Access
- SASL (Simple Authentication and Security Layer): 6.4.2. The Initial LDAP Connection
- schema-defined properties: 6.5.1. ADSI Basics
- 6.5.5. So How Do You Know Anything About an Object?
- 6.5.5. So How Do You Know Anything About an Object?
- scopes of searches: 6.4.3. Performing LDAP Searches
- scripts: 7.8.1. SQL
- (see also Perl)
- for sending email: 8.2.1. Overzealous Message Sending
- message body of: 8.2.3. Insufficient Information in the Message Body
- for user administration processes: 3.3.3. The Process Scripts
- search base: 6.4.3. Performing LDAP Searches
- search filters: 6.4.3. Performing LDAP Searches
- secondary servers: 5.3. Domain Name Service (DNS)
- DNS: 5.3.1.1. Creating the administrative header
- Secure Socket Layer (SSL): 6.4.2. The Initial LDAP Connection
- security
- of bots: 4.3.4. Using the Proc::ProcessTable Module
- of SNMP: E. The Twenty-Minute SNMP Tutorial
- breaches in, documenting: 10.2.1. Local Signs of Peril
- denial-of-service attacks: 10.4.1. Perl Saves the Day
- detecting changes
- to files: 10.1.1. Local Filesystem Changes
- to networks: 10.1.2. Network Service Changes
- of Perl: 1.6. It's Not Easy Being Omnipotent
- suspicious activities, noticing: 10.2.1. Local Signs of Peril
- SYN attacks, detecting from Perl: 10.4.1. Perl Saves the Day
- Security Accounts Manager (SAM): 3.2.1. NT/2000 User Identity Storage and Access
- security identifier (SID): 3.2.2. NT/2000 User ID Numbers
- 3.2.2. NT/2000 User ID Numbers
- (see also users, identity of, Windows NT/2000)
- SELECT command (SQL): D.3. Querying Information
- D.3.3. Simple Manipulation of Data Returned by Queries
- Sendmail for NT program: 8.1.1. Getting sendmail (or Similar Mail Transport Agent)
- sendmail program: 8.1. Sending Mail
- 8.1.3. Speaking to the Mail Protocols Directly
- blacklists, local: 8.3.3.1. Checking against a local blacklist
- services
- directory (see directory services)
- TCP/IP (see TCP/IP, name services)
- shadow password files (Unix): 3.1.4. Shadow Passwords
- shell field (Unix): 3.1.1. The Classic Unix Password File
- SID (security identifier): 3.2.2. NT/2000 User ID Numbers
- 3.2.2. NT/2000 User ID Numbers
- (see also users, identity of, Windows NT/2000)
- Simple Authentication and Security Layer (SASL): 6.4.2. The Initial LDAP Connection
- Simple Mail Transport Protocol (see SMTP)
- Simple Network Management Protocol (see SNMP)
- slave servers: 5.2. NIS, NIS+, and WINS
- 5.3. Domain Name Service (DNS)
- DNS: 5.3.1.1. Creating the administrative header
- SMI RFCs: E.1. SNMP in Practice
- SMTP (Simple Mail Transport Protocol): 8.1.3. Speaking to the Mail Protocols Directly
- SNMP Extension Module for the UCD SNMPv3 Library: 10.3.1. Using SNMP from Perl
- SNMP (Simple Network Management Protocol): E. The Twenty-Minute SNMP Tutorial
- access policy: E. The Twenty-Minute SNMP Tutorial
- communities: E. The Twenty-Minute SNMP Tutorial
- modules, comparing: 10.3.1. Using SNMP from Perl
- monitoring networks with: 10.3.1. Using SNMP from Perl
- security of: E. The Twenty-Minute SNMP Tutorial
- theory: E. The Twenty-Minute SNMP Tutorial
- tutorial: E.1. SNMP in Practice
- using from Perl: 10.3.1. Using SNMP from Perl
- variables: E. The Twenty-Minute SNMP Tutorial
- SNMP\:\:MIB module: 10.3.1. Using SNMP from Perl
- SNMP_Session module: 10.3.1. Using SNMP from Perl
- SNMP_utility module: 10.3.1. Using SNMP from Perl
- SOA (Start of Authority): 5.3.1.1. Creating the administrative header
- software metering: 4.3.4. Using the Proc::ProcessTable Module
- source control systems: 5.1.4. Incorporating a Source Code Control System
- RCS (see RCS)
- spam, finding source of: 8.3.3. Tracking Down Spam
- blacklists, checking against
- Internet-wide: 8.3.3.2. Checking against Internet-wide blacklists
- local: 8.3.3.1. Checking against a local blacklist
- split() function (Unix): 5.1.1. Generating Host Files
- SQL databases
- creating/deleting: D.1. Creating /Deleting Databases and Tables
- data in, manipulating: D.3.3. Simple Manipulation of Data Returned by Queries
- Perl-cliented: 9.5.4.2. Using Perl-cliented SQL databases
- querying information: D.3. Querying Information
- stored procedures: D.6.3. Stored Procedures
- SQL (Structured Query Language): 7. SQL Database Administration
- commands, sending from Perl: 7.3. Using the ODBC Framework
- databases
- documenting from Perl: 7.4. Server Documentation
- interacting with from Perl: 7.1. Interacting with an SQL Server from Perl
- managing logins from Perl: 7.5. Database Logins
- monitoring from Perl: 7.6. Monitoring Server Health
- using DBI: 7.2. Using the DBI Framework
- using ODBC: 7.3. Using the ODBC Framework
- tutorial: D. The Fifteen-Minute SQL Tutorial
- SQL tables
- changing: D.4. Changing Table Information
- creating/deleting: D.1. Creating /Deleting Databases and Tables
- inserting data into: D.2. Inserting Data into a Table
- query results, adding: D.3.4. Adding the Query Results to Another Table
- relating: D.5. Relating Tables to Each Other
- rows in, retrieving: D.3.1. Retrieving All of the Rows in a Table
- D.3.2. Retrieving a Subset of the Rows in a Table
- views of: D.6.1. Views
- SSL (Secure Socket Layer): 6.4.2. The Initial LDAP Connection
- Start of Authority (SOA): 5.3.1.1. Creating the administrative header
- stat() function (Perl): 10.1.1. Local Filesystem Changes
- statement handle, DBI: 7.2. Using the DBI Framework
- Structure for Management Information (SMI): E.1. SNMP in Practice
- Structured Query Language (see SQL)
- SunOS
- host files: 5.1. Host Files
- wtmp file: 9.2.1. Using unpack( )
- suss program: 8.3.4. Support Mail Augmentation
- Sybase OpenClient libraries: 7.1. Interacting with an SQL Server from Perl
- Sybase server, documenting via DBI module: 7.4.2. Sybase Server via DBI
- SYN-ACK attack: 10.4.1. Perl Saves the Day
- SYN Flood: 10.4.1. Perl Saves the Day
- Sys\:\:Hostname module: 9.5.4.1. Using Perl-only databases
- SyslogScan package: 9.5.3. Black Boxes
- system administration
- with ADSI: 6.5.8. Working with Users via ADSI
- email for: 8. Electronic Mail
- as support medium: 8.3.4. Support Mail Augmentation
- limiting message sending: 8.2.1.1. Controlling the frequency of mail
- sending: 8.1. Sending Mail
- log files: 9. Log Files
- monitoring
- networks: 10.3.1. Using SNMP from Perl
- security: 10. Security and Network Monitoring
- Perl as language for: 1.2. How Perl Can Help
- SQL databases and: 7. SQL Database Administration
- system administrators
- contacting: 6.3. The WHOIS Directory Service
- mechanics vs. architects: 3.3.1. The Backend Database
- \\\\$systemroot$\\\\system32\\\\drivers\\\\etc\\\\hosts file: 5.1. Host Files
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2001
O'Reilly & Associates, Inc.
All Rights Reserved.