Errata

Practical UNIX and Internet Security

Errata for Practical UNIX and Internet Security, Third Edition

Submit your own errata for this product.

The errata list is a list of errors and their corrections that were found after the product was released. If the error was corrected in a later version or reprint the date of the correction will be displayed in the column titled "Date Corrected".

The following errata were submitted by our customers and approved as valid errors by the author or editor.

Color key: Serious technical mistake Minor technical mistake Language or formatting error Typo Question Note Update

Version Location Description Submitted By Date submitted Date corrected
Printed
Page 3
in the last sentence of the second paragraph

"...private computer systems, and using those systems for nefarious purposes."

NOW READS:
"...private computer systems, using those systems for nefarious purposes."

Anonymous    Jan 01, 2004
Printed
Page 33
IN PRINT: "Planning Your Security Needs", first paragraph, third sentence

"Basically, we a computer is..."

NOW READS:
"Basically, we know a computer is..."

Anonymous    Jan 01, 2004
Printed
Page 170
equation at the bottom

number of keys should be 2 ^ (number of bits)

Note from the Author or Editor:
This is correct errata -- the parenthetical expression should have been printed as a superscript.

This is a typo.

nkoss  Jan 28, 2009 
Printed
Page 244
Figure 10-3

Numbering of the pins at the female and male connector does not match (1 and 5 are swapped
at the male connector).
AUTHOR: The numbers 1,2,3,4,5 should be reversed on the male connector, as should the numbers 6,7,8,9.

Anonymous   
Printed
Page 285
under UDP section

"Uunreliable"

NOW READS:
"Unreliable"

Anonymous    Jan 01, 2004
Printed
Page 351
'Security concerns with SMTP banners and commands', 1st sentence

"... previous versions of SMTP and MTP were in used in the 1970s."

NOW READS:
"... previous versions of SMTP and MTP were in use in the 1970s.

Anonymous    Jan 01, 2004
Printed
Page 399
'Freeware security scanners'

"The disadvantage is that their databases are can be limited ..."

NOW READS:
"The disadvantage is that their databases can be limited ..."


Anonymous    Jan 01, 2004
Printed
Page 424
2nd half of page, last line of final code snippet

+:*:000:000:::

NOW READS:
+:*:999:999:::

Anonymous    Jan 01, 2004
Printed
Page 466
first footnote, second sentence

Historically, the value of nobody was -1, ....

NOW READS:
Historically, the value of nobody was -2, ....

Anonymous    Jan 01, 2004
Printed
Page 526
just after box

RFC 1705

NOW READS:
RFC 1750.

Anonymous    Jan 01, 2004
Printed
Page 630
example find command, near end of line of code

A space HAS BEEN ADDED between "{}" and ";" .

Anonymous    Jan 01, 2004
Printed
Page 704
4th paragraph

The text refers to a line of code that has a different value.

The line of code:
# cat /etc/passwd | awk -F: 'NF != 9|| $3 == 0 || $2 "" { print $1 " " $2 " " $3}'

The text on the fourth paragrph:
The awk command then prints out the first three fields (username, password, and UID)
of any line in the /etc/passwd file that does not have SEVEN fields, ...

The number seven in the text should macth the number 9 in the code. The correct value is 7 (seven)

Anonymous    May 10, 2011
Printed
Page 735
1st paragraph; typo:

simultaniously

NOW READS:
simultaneously

Anonymous    Jan 01, 2004
Printed
Page 775
destructive program example

The body of the while loop was incorrectly specified:

main()
{
while (1)
malloc(256*1024*1024);
fork();
}

NOW READS:

main()
{
while (1) {
malloc(256*1024*1024);
fork();
}
}

799 1st paragraph at the end
"sinilar"

NOW READS:
"similar"

Anonymous    Jan 01, 2004
Printed
Page 820
6th paragraph; typo:

producct

NOW READS:
product

878 The Sendmail listing;
"O'Reill"

NOW READS:
"O'Reilly"

Anonymous    Jan 01, 2004