Errata
The errata list is a list of errors and their corrections that were found after the product was released. If the error was corrected in a later version or reprint the date of the correction will be displayed in the column titled "Date Corrected".
The following errata were submitted by our customers and approved as valid errors by the author or editor.
Color key: Serious technical mistake Minor technical mistake Language or formatting error Typo Question Note Update
Version | Location | Description | Submitted By | Date submitted | Date corrected |
---|---|---|---|---|---|
Printed | Page xxviii changed "103 Morris Street, Suite A" to "101 Morris Street" |
Anonymous | Apr 01, 1998 | ||
Printed | Page xxviii & xxix The following information was added to the Preface |
Comments and Questions |
Anonymous | Mar 01, 2000 | |
Printed | Page 62 3rd paragraph |
Instead of trying every combination of letters, starting with AAAAAA (or whatever), crackers use hit lists of common passwords such as wizard or demo. Note from the Author or Editor: |
Anonymous | ||
Printed | Page 77 Figure 4.1, in the "Users Group" section: gid was changed from "102" to |
"100." |
Anonymous | Mar 01, 2000 | |
Printed | Page 87 In the "Restricting su" section, the first sentence of the first |
paragraph did read: |
Anonymous | Mar 01, 2000 | |
Printed | Page 101 The first footnote, marked with an asterisk, did read: |
"...NFS..." |
Anonymous | Mar 01, 2000 | |
Printed | Page 118 The last sentence of the first paragraph, did read: |
"...not to give one..." |
Anonymous | Mar 01, 2000 | |
Printed | Page 131 |
The paragraph beginning with "Note that some versions..." did read: |
Anonymous | Mar 01, 2000 | |
Printed | Page 150 In the paragraph entitled "crypt", the last sentence did read: |
"...crypt program..." |
Anonymous | Mar 01, 2000 | |
Printed | Page 167 The bulleted section titled "Authentication" did read: |
"...makes possible mathematically verifying..." |
Anonymous | Mar 01, 2000 | |
Printed | Page 178 made 1st heading B-Head instead of A-Head |
Anonymous | Apr 01, 1998 | ||
Printed | Page 217 |
The second sentence in the second paragraph did read: |
Anonymous | Mar 01, 2000 | |
Printed | Page 233 in figure, changed both instances of "is" to "ls" |
Anonymous | Apr 01, 1998 | ||
Printed | Page 233 The third line of the second paragraph did read: |
"...chroot system command..." |
Anonymous | Mar 01, 2000 | |
Printed | Page 236 in the script, added a forward slash to the line |
my_tty="$(bin/tty)" |
Anonymous | Nov 01, 1998 | |
Printed | Page 236 |
A footnote has been added for the "Restricting Logins" title that reads: |
Anonymous | Mar 01, 2000 | |
Printed | Page 238 |
The second sentence in the last paragraph did read: |
Anonymous | Mar 01, 2000 | |
Printed | Page 263 The third sentence of the third paragraph in the section "Shadow |
Password Files" did read: |
Anonymous | Mar 01, 2000 | |
Printed | Page 288 2nd paragraph |
The textual description of how a computer uses |
Anonymous | ||
Printed | Page 294 Example 10-1, line 10 |
|
Anonymous | Nov 01, 1998 | |
Printed | Page 298 Example on how to backup log files |
# make a copy of the log file and zero the old one |
Anonymous | Mar 01, 1999 | |
Printed | Page 300 The first line of the first paragraph did read: |
"This command can..." |
Anonymous | Mar 01, 2000 | |
Printed | Page 301 |
Middle of the page, the line that read: |
Anonymous | Jul 01, 1999 | |
Printed | Page 311 A footnote has been added for the "NOTE" section in the middle of the |
page, which reads: "AIX silently ignores .* as priority, one has to use |
Anonymous | Mar 01, 2000 | |
Printed | Page 316 In Table 10-5, the fourth row in the "Message" column, which read "root |
logged in.", has been moved to column 3, line 2. |
Anonymous | Mar 01, 2000 | |
Printed | Page 332 The second line in the fourth paragraph did read: |
"...wishes to run--a game..." |
Anonymous | Mar 01, 2000 | |
Printed | Page 342 The third line of the first paragraph did read: |
"...not contain a / symbol..." |
Anonymous | Mar 01, 2000 | |
Printed | Page 342 The third code section did read: |
"PATH= /usr/bin......." |
Anonymous | Mar 01, 2000 | |
Printed | Page 344 Regarding the "$HOME attacks" section: if a shell uses $HOME it is also |
vulnerable, not only if it uses ~ as a shortcut. |
Anonymous | ||
Printed | Page 355 In the NOTE, the extra blanks before "access" in the Berkley example |
have been deleted. |
Anonymous | Mar 01, 2000 | |
Printed | Page 531 line -3: removed the final (lowercase) "u" from "GHOTI.LCS.MIT.EDUu" |
Anonymous | Nov 01, 1998 | ||
Printed | Page 541 Under the Warning heading: Replaced the sentence |
"Do not run your server as root!" (all in italics) |
Anonymous | Nov 01, 1998 | |
Printed | Page 542 In para 2, replaced the sentence |
"Because the httpd program is run as root..." |
Anonymous | Nov 01, 1998 | |
Printed | Page 675 The first ftp site under "Getting tcpwrapper" was listed as: |
|
Anonymous | Nov 01, 2000 | |
Printed | Page 679 |
The first line of Item 5 did read: |
Anonymous | Nov 01, 2000 | |
Printed | Page 700 Line 4 |
for (iloop = 1; i loop < argc; iloop++) |
Anonymous | Sep 01, 2001 | |
Printed | Page 954 "netnews~firewalls, 661" |
has been changed to read: |
Anonymous | Mar 01, 1999 | |
Printed | Page 956 The entries "one" and "Open Source Distribution" have been |
deleted. |
Anonymous | Mar 01, 1999 | |
Printed | Page 968 A subentry "firewealls, 661" has been added under the entry |
Usenet. |
Anonymous | Mar 01, 1999 | |
Printed | Page 974 added the following to the next-to-last para |
Whenever possible, our books use RepKover (tm), a durable and flexible |
Anonymous | Apr 01, 1998 |