E
- -e option
- auditreduce command, How to Select Audit Events From the Audit Trail
- ppriv command, How to Determine Which Privileges a Program Requires
- ECC kernel provider, How to List Available Providers
- eeprom command
- Maintaining Physical Security
- Controlling Access to System Hardware (Tasks)
- effective privilege set, How Privileges Are Implemented
- efficiency, auditing and, Auditing Efficiently
- eject command, device cleanup and, Device-Clean Scripts
- elfsign command, description, Binary Signatures for Third-Party Software
- enabling
- audit service, How to Enable the Audit Service
- auditing, How to Enable the Audit Service
- cryptographic mechanisms, How to Prevent the Use of a User-Level Mechanism
- device allocation
- How to Enable Device Allocation
- How to Enable Device Allocation
- kernel software provider use, How to Prevent the Use of a Kernel Software Provider
- keyboard abort, How to Disable a System's Abort Sequence
- mechanisms and features on hardware provider, How to Disable Hardware Provider Mechanisms and Features
- encrypt command
- description, User-Level Commands in the Cryptographic Framework
- error messages, How to Encrypt and Decrypt a File
- troubleshooting, How to Encrypt and Decrypt a File
- encrypting
- communications between hosts, How to Log In to a Remote Host With Secure Shell
- encrypt command, How to Encrypt and Decrypt a File
- files
- Protecting Files With Encryption
- Protecting Files With the Cryptographic Framework (Task Map)
- How to Encrypt and Decrypt a File
- network traffic between hosts, Secure Shell (Overview)
- passwords, Changing the Default Algorithm for Password Encryption (Tasks)
- private key of NIS user, How to Set Up a Diffie-Hellman Key for an NIS User
- Secure NFS, DES Encryption With Secure NFS
- using user-level commands, User-Level Commands in the Cryptographic Framework
- encryption
- algorithms
- Kerberos and, Kerberos Encryption Types
DES algorithm, DES Encryption With Secure NFS
- generating symmetric key
- using the pktool command, How to Generate a Symmetric Key by Using the pktool Command
list of password algorithms, Password Encryption
- modes
- Kerberos and, Kerberos Encryption Types
password algorithm, Password Encryption
- privacy service, What Is the Kerberos Service?
- specifying algorithms in ssh_config file, Keywords in Secure Shell
- specifying password algorithm
- locally, Changing the Default Algorithm for Password Encryption (Tasks)
specifying password algorithms in policy.conf file, Password Encryption
- types
- Kerberos and
- Kerberos Encryption Types
- Using Kerberos Encryption Types
with -x option, Overview of Kerberized Commands
- environment variables
- See also variables
- audit token for, exec_env Token
- overriding proxy servers and ports, How to Set Up Default Secure Shell Connections to Hosts Outside a Firewall
- PATH, Preventing Unintentional Misuse of System Resources
- presence in audit records
- Understanding Audit Policy
- Audit Token Formats
- Secure Shell and, Secure Shell and Login Environment Variables
- use with ssh-agent command, Secure Shell Commands
- equal sign (=), file permissions symbol, File Permission Modes
- error messages
- encrypt command, How to Encrypt and Decrypt a File
- Kerberos, Kerberos Error Messages
- with kpasswd, Changing Your Password
- errors, allocate error state, Allocate Error State
- EscapeChar keyword, ssh_config file, Keywords in Secure Shell
- /etc/default/kbd file, How to Disable a System's Abort Sequence
- /etc/default/login file
- description, Secure Shell Files
- restricting remote root access, How to Restrict and Monitor root Logins
- Secure Shell and, Secure Shell and Login Environment Variables
- /etc/default/su file
- displaying su command attempts, How to Restrict and Monitor root Logins
- monitoring access attempts, How to Restrict and Monitor root Logins
- monitoring su command, How to Monitor Who Is Using the su Command
- /etc/hosts.equiv file, description, Secure Shell Files
- /etc/krb5/kadm5.acl file, description, Kerberos Files
- /etc/krb5/kadm5.keytab file, description, Kerberos Files
- /etc/krb5/kdc.conf file, description, Kerberos Files
- /etc/krb5/kpropd.acl file, description, Kerberos Files
- /etc/krb5/krb5.conf file, description, Kerberos Files
- /etc/krb5/krb5.keytab file, description, Kerberos Files
- /etc/krb5/warn.conf file, description, Kerberos Files
- /etc/logindevperm file, Remote Logins
- /etc/nologin file
- description, Secure Shell Files
- disabling user logins temporarily, How to Temporarily Disable User Logins
- /etc/pam.conf file, Kerberos and, Kerberos Files
- /etc/publickey file, DH authentication and, Diffie-Hellman Authentication and Secure RPC
- /etc/rsyslog.conf file, PAM and, How to Log PAM Error Reports
- /etc/security/audit_event file, audit events and, Audit Events
- /etc/security/device_allocate file, device_allocate File
- /etc/security/device_maps file, device_maps File
- /etc/security/policy.conf file, algorithms configuration, How to Specify an Algorithm for Password Encryption
- /etc/ssh_host_dsa_key.pub file, description, Secure Shell Files
- /etc/ssh_host_key.pub file, description, Secure Shell Files
- /etc/ssh_host_rsa_key.pub file, description, Secure Shell Files
- /etc/ssh/shosts.equiv file, description, Secure Shell Files
- /etc/ssh/ssh_config file
- configuring Secure Shell, Client Configuration in Secure Shell
- description, Secure Shell Files
- host-specific parameters, Host-Specific Parameters in Secure Shell
- keywords, Keywords in Secure Shell
- override, Secure Shell Files
- /etc/ssh/ssh_host_dsa_key file, description, Secure Shell Files
- /etc/ssh/ssh_host_key file, override, Secure Shell Files
- /etc/ssh/ssh_host_rsa_key file, description, Secure Shell Files
- /etc/ssh/ssh_known_hosts file
- controlling distribution, Maintaining Known Hosts in Secure Shell
- description, Secure Shell Files
- override, Secure Shell Files
- secure distribution, Maintaining Known Hosts in Secure Shell
- /etc/ssh/sshd_config file
- description, Secure Shell Files
- keywords, Keywords in Secure Shell
- /etc/ssh/sshrc file, description, Secure Shell Files
- /etc/syslog.conf file
- auditing and
- How to Configure syslog Audit Logs
- Audit Service Man Pages
- executable stack messages and, Protecting Executable Files From Compromising Security
- PAM and, How to Log PAM Error Reports
- event, description, Audit Events
- event modifiers, audit records, header Token
- exec_args audit token
- argv policy and, exec_args Token
- format, exec_args Token
- exec_attr database
- description, exec_attr Database
- summary, RBAC Databases
- exec_env audit token, format, exec_env Token
- executable stacks
- disabling logging messages, How to Disable Programs From Using Executable Stacks
- logging messages, Protecting Executable Files From Compromising Security
- protecting against, How to Disable Programs From Using Executable Stacks
- protecting against 32-bit processes, Protecting Executable Files From Compromising Security
- execute permissions, symbolic mode, File Permission Modes
- export subcommand, pktool command, How to Export a Certificate and Private Key in PKCS #12 Format
- extended policy, privileges, Expanding a User or Role's Privileges
- EXTERNAL security mechanism plug-in, SASL and, SASL Plug-ins