Book Home

Perl for System AdministrationSearch this book

Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: S

SAM (Security Accounts Manager): 3.2.1. NT/2000 User Identity Storage and Access
SASL (Simple Authentication and Security Layer): 6.4.2. The Initial LDAP Connection
schema-defined properties: 6.5.1. ADSI Basics
6.5.5. So How Do You Know Anything About an Object?
6.5.5. So How Do You Know Anything About an Object?
scopes of searches: 6.4.3. Performing LDAP Searches
scripts: 7.8.1. SQL
(see also Perl)
for sending email: 8.2.1. Overzealous Message Sending
message body of: 8.2.3. Insufficient Information in the Message Body
for user administration processes: 3.3.3. The Process Scripts
search base: 6.4.3. Performing LDAP Searches
search filters: 6.4.3. Performing LDAP Searches
secondary servers: 5.3. Domain Name Service (DNS)
DNS: 5.3.1.1. Creating the administrative header
Secure Socket Layer (SSL): 6.4.2. The Initial LDAP Connection
security
of bots: 4.3.4. Using the Proc::ProcessTable Module
of SNMP: E. The Twenty-Minute SNMP Tutorial
breaches in, documenting: 10.2.1. Local Signs of Peril
denial-of-service attacks: 10.4.1. Perl Saves the Day
detecting changes
to files: 10.1.1. Local Filesystem Changes
to networks: 10.1.2. Network Service Changes
of Perl: 1.6. It's Not Easy Being Omnipotent
suspicious activities, noticing: 10.2.1. Local Signs of Peril
SYN attacks, detecting from Perl: 10.4.1. Perl Saves the Day
Security Accounts Manager (SAM): 3.2.1. NT/2000 User Identity Storage and Access
security identifier (SID): 3.2.2. NT/2000 User ID Numbers
3.2.2. NT/2000 User ID Numbers
(see also users, identity of, Windows NT/2000)
SELECT command (SQL): D.3. Querying Information
D.3.3. Simple Manipulation of Data Returned by Queries
Sendmail for NT program: 8.1.1. Getting sendmail (or Similar Mail Transport Agent)
sendmail program: 8.1. Sending Mail
8.1.3. Speaking to the Mail Protocols Directly
blacklists, local: 8.3.3.1. Checking against a local blacklist
services
directory (see directory services)
TCP/IP (see TCP/IP, name services)
shadow password files (Unix): 3.1.4. Shadow Passwords
shell field (Unix): 3.1.1. The Classic Unix Password File
SID (security identifier): 3.2.2. NT/2000 User ID Numbers
3.2.2. NT/2000 User ID Numbers
(see also users, identity of, Windows NT/2000)
Simple Authentication and Security Layer (SASL): 6.4.2. The Initial LDAP Connection
Simple Mail Transport Protocol (see SMTP)
Simple Network Management Protocol (see SNMP)
slave servers: 5.2. NIS, NIS+, and WINS
5.3. Domain Name Service (DNS)
DNS: 5.3.1.1. Creating the administrative header
SMI RFCs: E.1. SNMP in Practice
SMTP (Simple Mail Transport Protocol): 8.1.3. Speaking to the Mail Protocols Directly
SNMP Extension Module for the UCD SNMPv3 Library: 10.3.1. Using SNMP from Perl
SNMP (Simple Network Management Protocol): E. The Twenty-Minute SNMP Tutorial
access policy: E. The Twenty-Minute SNMP Tutorial
communities: E. The Twenty-Minute SNMP Tutorial
modules, comparing: 10.3.1. Using SNMP from Perl
monitoring networks with: 10.3.1. Using SNMP from Perl
security of: E. The Twenty-Minute SNMP Tutorial
theory: E. The Twenty-Minute SNMP Tutorial
tutorial: E.1. SNMP in Practice
using from Perl: 10.3.1. Using SNMP from Perl
variables: E. The Twenty-Minute SNMP Tutorial
SNMP\:\:MIB module: 10.3.1. Using SNMP from Perl
SNMP_Session module: 10.3.1. Using SNMP from Perl
SNMP_utility module: 10.3.1. Using SNMP from Perl
SOA (Start of Authority): 5.3.1.1. Creating the administrative header
software metering: 4.3.4. Using the Proc::ProcessTable Module
source control systems: 5.1.4. Incorporating a Source Code Control System
RCS (see RCS)
spam, finding source of: 8.3.3. Tracking Down Spam
blacklists, checking against
Internet-wide: 8.3.3.2. Checking against Internet-wide blacklists
local: 8.3.3.1. Checking against a local blacklist
split() function (Unix): 5.1.1. Generating Host Files
SQL databases
creating/deleting: D.1. Creating /Deleting Databases and Tables
data in, manipulating: D.3.3. Simple Manipulation of Data Returned by Queries
Perl-cliented: 9.5.4.2. Using Perl-cliented SQL databases
querying information: D.3. Querying Information
stored procedures: D.6.3. Stored Procedures
SQL (Structured Query Language): 7. SQL Database Administration
commands, sending from Perl: 7.3. Using the ODBC Framework
databases
documenting from Perl: 7.4. Server Documentation
interacting with from Perl: 7.1. Interacting with an SQL Server from Perl
managing logins from Perl: 7.5. Database Logins
monitoring from Perl: 7.6. Monitoring Server Health
using DBI: 7.2. Using the DBI Framework
using ODBC: 7.3. Using the ODBC Framework
tutorial: D. The Fifteen-Minute SQL Tutorial
SQL tables
changing: D.4. Changing Table Information
creating/deleting: D.1. Creating /Deleting Databases and Tables
inserting data into: D.2. Inserting Data into a Table
query results, adding: D.3.4. Adding the Query Results to Another Table
relating: D.5. Relating Tables to Each Other
rows in, retrieving: D.3.1. Retrieving All of the Rows in a Table
D.3.2. Retrieving a Subset of the Rows in a Table
views of: D.6.1. Views
SSL (Secure Socket Layer): 6.4.2. The Initial LDAP Connection
Start of Authority (SOA): 5.3.1.1. Creating the administrative header
stat() function (Perl): 10.1.1. Local Filesystem Changes
statement handle, DBI: 7.2. Using the DBI Framework
Structure for Management Information (SMI): E.1. SNMP in Practice
Structured Query Language (see SQL)
SunOS
host files: 5.1. Host Files
wtmp file: 9.2.1. Using unpack( )
suss program: 8.3.4. Support Mail Augmentation
Sybase OpenClient libraries: 7.1. Interacting with an SQL Server from Perl
Sybase server, documenting via DBI module: 7.4.2. Sybase Server via DBI
SYN-ACK attack: 10.4.1. Perl Saves the Day
SYN Flood: 10.4.1. Perl Saves the Day
Sys\:\:Hostname module: 9.5.4.1. Using Perl-only databases
SyslogScan package: 9.5.3. Black Boxes
system administration
with ADSI: 6.5.8. Working with Users via ADSI
email for: 8. Electronic Mail
as support medium: 8.3.4. Support Mail Augmentation
limiting message sending: 8.2.1.1. Controlling the frequency of mail
sending: 8.1. Sending Mail
log files: 9. Log Files
monitoring
networks: 10.3.1. Using SNMP from Perl
security: 10. Security and Network Monitoring
Perl as language for: 1.2. How Perl Can Help
SQL databases and: 7. SQL Database Administration
system administrators
contacting: 6.3. The WHOIS Directory Service
mechanics vs. architects: 3.3.1. The Backend Database
\\\\$systemroot$\\\\system32\\\\drivers\\\\etc\\\\hosts file: 5.1. Host Files


Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z


Library Navigation Links

Copyright © 2001 O'Reilly & Associates, Inc. All Rights Reserved.


HIVE: All information for read only. Please respect copyright!
Hosted by hive КГБ: Киевская городская библиотека