Book Home

Perl for System AdministrationSearch this book

Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: L

last command (Unix): 9.2.2. Calling an OS (or Someone Else's) Binary
9.5.4.1. Using Perl-only databases
9.5.4.2. Using Perl-cliented SQL databases
LDAP Data Interchange Format (see LDIF)
LDAP entries
attributes
in search operations: 6.4.3. Performing LDAP Searches
6.4.3. Performing LDAP Searches
methods for retrieving: 6.4.4. Entry Representation in Perl
modifying: 6.4.9. Modifying Entry Attributes
separators: 6.4.10. Putting It All Together
values, quoting: 6.4.2. The Initial LDAP Connection
modifying with Perl: 6.4.8. Modifying Entry Names
representation in Perl: 6.4.4. Entry Representation in Perl
LDAP (Lightweight Directory Access Protocol): 6.4. LDAP: A Sophisticated Directory Service
anonymous authentication: 6.4.2. The Initial LDAP Connection
data organization of: B.1. LDAP Data Organization
objectClass attribute: B. The Ten-Minute LDAP Tutorial
Perl modules, comparing: 6.4.1. LDAP Programming with Perl
tutorial: B. The Ten-Minute LDAP Tutorial
LDAP operations
adding/deleting: 6.4.6. Adding Entries with Standard LDAP Operations
binding: 6.4.2. The Initial LDAP Connection
searching: 6.4.3. Performing LDAP Searches
LDIF (LDAP Data Interchange Format): 6.4.3. Performing LDAP Searches
6.4.10. Putting It All Together
reading/writing
directory entries with: 6.4.5. Adding Entries with LDIF
from Perl: 6.4.5. Adding Entries with LDIF
leaf objects (LDAP): 6.5.1. ADSI Basics
6.5.3. Dealing with Container/Collection Objects
libcrack library: 10.5. Preventing Suspicious Activities
libnet package: 8.1.3. Speaking to the Mail Protocols Directly
libpcap library: 10.4.1. Perl Saves the Day
10.4.1. Perl Saves the Day
Lightweight Directory Access Protocol (see LDAP)
LIKE wildcards (SQL): D.3.2. Retrieving a Subset of the Rows in a Table
Linux
directories, hidden: 10.2.1. Local Signs of Peril
driver: 2.1. Perl to the Rescue
NIS+ and: 5.2.1. NIS+
privileges on, dropping: 1.6.2. Drop Your Privileges as Soon as Possible
Sybase OpenClient libraries and: 7.1. Interacting with an SQL Server from Perl
lockfile program: 3.3.4. Account System Wrap-Up
log files: 9. Log Files
analyzing: 9.5. Log Analysis
black box approach: 9.5.3. Black Boxes
database approach: 9.5.4. Using Databases
read-remember-process: 9.5.2. Read-Remember-Process
stream read-count: 9.5.1. Stream Read-Count
binary: 9.2. Binary Log Files
Event Log Service: 9.2.3. Using the OS's Logging API
wtmp: 9.2. Binary Log Files
circular buffering of: 9.4.2. Circular Buffering
disk space problems and: 9.4. Disk Space Problems
mail log data, summarizing: 9.5.3. Black Boxes
rotating: 9.4.1. Log Rotation
security of, when processing: 9.4.2.2. Security in log processing programs
stateful vs. stateless: 9.3. Stateful and Stateless Data
text: 9.1. Text Logs
Logfile\:\:Rotate module: 9.4.1. Log Rotation
L0phtCrack program: 10.5. Preventing Suspicious Activities
lsof program: 4.4.2. Tracking Operations in Unix
lstat() function (Perl): 10.1.1. Local Filesystem Changes


Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z


Library Navigation Links

Copyright © 2001 O'Reilly & Associates, Inc. All Rights Reserved.


HIVE: All information for read only. Please respect copyright!
Hosted by hive КГБ: Киевская городская библиотека