[web] published wrong version of Security Guide in last push; this is securityguide_f19_en-US

Pete Travis immanetize at fedoraproject.org
Fri Dec 13 23:28:52 UTC 2013


commit ad35257b0d92129b00c659c66886d10e736c9f0c
Author: Pete Travis <immanetize at fedoraproject.org>
Date:   Fri Dec 13 16:28:24 2013 -0700

    published wrong version of Security Guide in last push; this is securityguide_f19_en-US

 fedoradocs.db                                      |  Bin 1006592 -> 1006592 bytes
 public_html/Sitemap                                |   48 ---
 public_html/as-IN/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/as-IN/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/as-IN/opds-Fedora_Core.xml             |    2 +-
 public_html/as-IN/opds-Fedora_Documentation.xml    |    2 +-
 .../as-IN/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/as-IN/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/as-IN/opds.xml                         |   16 +-
 public_html/bg-BG/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/bg-BG/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/bg-BG/opds-Fedora_Core.xml             |    2 +-
 public_html/bg-BG/opds-Fedora_Documentation.xml    |    2 +-
 .../bg-BG/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/bg-BG/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/bg-BG/opds.xml                         |   16 +-
 public_html/bn-IN/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/bn-IN/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/bn-IN/opds-Fedora_Core.xml             |    2 +-
 public_html/bn-IN/opds-Fedora_Documentation.xml    |    2 +-
 .../bn-IN/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/bn-IN/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/bn-IN/opds.xml                         |   16 +-
 public_html/bs-BA/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/bs-BA/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/bs-BA/opds-Fedora_Core.xml             |    2 +-
 public_html/bs-BA/opds-Fedora_Documentation.xml    |    2 +-
 .../bs-BA/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/bs-BA/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/bs-BA/opds.xml                         |   16 +-
 public_html/ca-ES/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/ca-ES/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/ca-ES/opds-Fedora_Core.xml             |    2 +-
 public_html/ca-ES/opds-Fedora_Documentation.xml    |    2 +-
 .../ca-ES/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/ca-ES/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/ca-ES/opds.xml                         |   16 +-
 public_html/cs-CZ/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/cs-CZ/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/cs-CZ/opds-Fedora_Core.xml             |    2 +-
 public_html/cs-CZ/opds-Fedora_Documentation.xml    |    2 +-
 .../cs-CZ/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/cs-CZ/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/cs-CZ/opds.xml                         |   16 +-
 public_html/da-DK/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/da-DK/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/da-DK/opds-Fedora_Core.xml             |    2 +-
 public_html/da-DK/opds-Fedora_Documentation.xml    |    2 +-
 .../da-DK/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/da-DK/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/da-DK/opds.xml                         |   16 +-
 public_html/de-DE/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/de-DE/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/de-DE/opds-Fedora_Core.xml             |    2 +-
 public_html/de-DE/opds-Fedora_Documentation.xml    |    2 +-
 .../de-DE/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/de-DE/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/de-DE/opds.xml                         |   16 +-
 public_html/el-GR/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/el-GR/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/el-GR/opds-Fedora_Core.xml             |    2 +-
 public_html/el-GR/opds-Fedora_Documentation.xml    |    2 +-
 .../el-GR/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/el-GR/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/el-GR/opds.xml                         |   16 +-
 .../Fedora-19-Security_Guide-en-US.epub            |  Bin 1102884 -> 1100665 bytes
 .../19/html-single/Security_Guide/index.html       |  392 +++++++++-----------
 .../Fedora/19/html/Security_Guide/apas02.html      |   42 +-
 .../Fedora/19/html/Security_Guide/apas02s02.html   |    6 +-
 .../Fedora/19/html/Security_Guide/apas02s03.html   |    6 +-
 .../Fedora/19/html/Security_Guide/apas02s04.html   |    6 +-
 .../Fedora/19/html/Security_Guide/apas02s05.html   |    6 +-
 .../Fedora/19/html/Security_Guide/apas02s06.html   |    6 +-
 .../en-US/Fedora/19/html/Security_Guide/ch09.html  |   22 +-
 .../en-US/Fedora/19/html/Security_Guide/ch10.html  |   10 +-
 .../chap-Security_Guide-Basic_Hardening.html       |    8 +-
 .../chap-Security_Guide-Encryption_Standards.html  |   38 +-
 ...General_Principles_of_Information_Security.html |   16 +-
 .../chap-Security_Guide-Securing_Your_Network.html |   52 +--
 .../chap-Security_Guide-Security_Overview.html     |   34 +-
 .../en-US/Fedora/19/html/Security_Guide/index.html |    6 +-
 .../Fedora/19/html/Security_Guide/pr01s02.html     |    2 +-
 .../pref-Security_Guide-Preface.html               |    8 +-
 .../Security_Guide/sec-Disabling_firewalld.html    |    4 +-
 ...g_Confined_Services-File_Transfer_Protocol.html |    8 +-
 .../sect-Managing_Confined_Services-Samba.html     |    4 +-
 ...ervices-Targeted_policy-Confined_processes.html |    4 +-
 ...vices-Targeted_policy-Unconfined_processes.html |    4 +-
 ...g_Confined_Services-The_Apache_HTTP_Server.html |    4 +-
 ...ixing_Problems-Allowing_Access_audit2allow.html |    4 +-
 ...Problems-Searching_For_and_Viewing_Denials.html |   12 +-
 ...bels_-Checking_the_Default_SELinux_Context.html |    4 +-
 ..._File_Systems-Changing_the_Default_Context.html |    4 +-
 ...Linux-Targeted_Policy-Unconfined_Processes.html |    4 +-
 ...ct-Security-Enhanced_Linux-Targeted_Policy.html |    4 +-
 ...Problems-How_are_Confined_Services_Running.html |    4 +-
 ...oubleshooting-Top_Three_Causes_of_Problems.html |    4 +-
 ...ith_SELinux-The_file_t_and_default_t_Types.html |    4 +-
 ...curity-Enhanced_Linux-Working_with_SELinux.html |    8 +-
 .../sect-Security_Guide-Basic_Hardening-NTP.html   |    6 +-
 ...rity_Guide-Basic_Hardening-Networking-IPv6.html |    6 +-
 ...-Security_Guide-Basic_Hardening-Networking.html |    8 +-
 ...ng-Physical_Security-Why_is_this_important.html |    8 +-
 ...ty_Guide-Basic_Hardening-Physical_Security.html |   14 +-
 ...ct-Security_Guide-Basic_Hardening-Services.html |    6 +-
 ...-Security_Guide-Basic_Hardening-Up_to_date.html |    6 +-
 .../sect-Security_Guide-Kerberos.html              |    4 +-
 ...Server_Security-Inattentive_Administration.html |    4 +-
 .../Fedora-19-Security_Guide-en-US.pdf             |  Bin 2250032 -> 2234461 bytes
 public_html/en-US/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/en-US/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/en-US/opds-Fedora_Core.xml             |    2 +-
 public_html/en-US/opds-Fedora_Documentation.xml    |    2 +-
 .../en-US/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/en-US/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/en-US/opds.xml                         |   16 +-
 public_html/es-ES/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/es-ES/opds-Fedora.xml                  |    2 +-
 public_html/es-ES/opds-Fedora_15.xml               |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/es-ES/opds-Fedora_Core.xml             |    2 +-
 public_html/es-ES/opds-Fedora_Documentation.xml    |    2 +-
 .../es-ES/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/es-ES/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/es-ES/opds.xml                         |   18 +-
 public_html/fa-IR/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/fa-IR/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/fa-IR/opds-Fedora_Core.xml             |    2 +-
 public_html/fa-IR/opds-Fedora_Documentation.xml    |    2 +-
 .../fa-IR/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/fa-IR/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/fa-IR/opds.xml                         |   16 +-
 public_html/fi-FI/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/fi-FI/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/fi-FI/opds-Fedora_Core.xml             |    2 +-
 public_html/fi-FI/opds-Fedora_Documentation.xml    |    2 +-
 .../fi-FI/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/fi-FI/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/fi-FI/opds.xml                         |   16 +-
 public_html/fr-FR/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/fr-FR/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/fr-FR/opds-Fedora_Core.xml             |    2 +-
 public_html/fr-FR/opds-Fedora_Documentation.xml    |    2 +-
 .../fr-FR/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/fr-FR/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/fr-FR/opds.xml                         |   16 +-
 public_html/gu-IN/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/gu-IN/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/gu-IN/opds-Fedora_Core.xml             |    2 +-
 public_html/gu-IN/opds-Fedora_Documentation.xml    |    2 +-
 .../gu-IN/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/gu-IN/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/gu-IN/opds.xml                         |   16 +-
 public_html/he-IL/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/he-IL/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/he-IL/opds-Fedora_Core.xml             |    2 +-
 public_html/he-IL/opds-Fedora_Documentation.xml    |    2 +-
 .../he-IL/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/he-IL/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/he-IL/opds.xml                         |   16 +-
 public_html/hi-IN/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/hi-IN/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/hi-IN/opds-Fedora_Core.xml             |    2 +-
 public_html/hi-IN/opds-Fedora_Documentation.xml    |    2 +-
 .../hi-IN/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/hi-IN/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/hi-IN/opds.xml                         |   16 +-
 public_html/hu-HU/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/hu-HU/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/hu-HU/opds-Fedora_Core.xml             |    2 +-
 public_html/hu-HU/opds-Fedora_Documentation.xml    |    2 +-
 .../hu-HU/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/hu-HU/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/hu-HU/opds.xml                         |   16 +-
 public_html/ia/Site_Statistics.html                |    6 +-
 .../ia/opds-Community_Services_Infrastructure.xml  |    2 +-
 public_html/ia/opds-Fedora.xml                     |    2 +-
 .../ia/opds-Fedora_Contributor_Documentation.xml   |    2 +-
 public_html/ia/opds-Fedora_Core.xml                |    2 +-
 public_html/ia/opds-Fedora_Documentation.xml       |    2 +-
 public_html/ia/opds-Fedora_Draft_Documentation.xml |    2 +-
 public_html/ia/opds-Fedora_Security_Team.xml       |    2 +-
 public_html/ia/opds.xml                            |   16 +-
 public_html/id-ID/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/id-ID/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/id-ID/opds-Fedora_Core.xml             |    2 +-
 public_html/id-ID/opds-Fedora_Documentation.xml    |    2 +-
 .../id-ID/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/id-ID/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/id-ID/opds.xml                         |   16 +-
 public_html/it-IT/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/it-IT/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/it-IT/opds-Fedora_Core.xml             |    2 +-
 public_html/it-IT/opds-Fedora_Documentation.xml    |    2 +-
 .../it-IT/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/it-IT/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/it-IT/opds.xml                         |   16 +-
 public_html/ja-JP/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/ja-JP/opds-Fedora.xml                  |    8 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/ja-JP/opds-Fedora_Core.xml             |    2 +-
 public_html/ja-JP/opds-Fedora_Documentation.xml    |    2 +-
 .../ja-JP/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/ja-JP/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/ja-JP/opds.xml                         |   16 +-
 public_html/ja-JP/toc.html                         |   18 +-
 public_html/kn-IN/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/kn-IN/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/kn-IN/opds-Fedora_Core.xml             |    2 +-
 public_html/kn-IN/opds-Fedora_Documentation.xml    |    2 +-
 .../kn-IN/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/kn-IN/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/kn-IN/opds.xml                         |   16 +-
 public_html/ko-KR/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/ko-KR/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/ko-KR/opds-Fedora_Core.xml             |    2 +-
 public_html/ko-KR/opds-Fedora_Documentation.xml    |    2 +-
 .../ko-KR/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/ko-KR/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/ko-KR/opds.xml                         |   16 +-
 public_html/ml-IN/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/ml-IN/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/ml-IN/opds-Fedora_Core.xml             |    2 +-
 public_html/ml-IN/opds-Fedora_Documentation.xml    |    2 +-
 .../ml-IN/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/ml-IN/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/ml-IN/opds.xml                         |   16 +-
 public_html/mr-IN/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/mr-IN/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/mr-IN/opds-Fedora_Core.xml             |    2 +-
 public_html/mr-IN/opds-Fedora_Documentation.xml    |    2 +-
 .../mr-IN/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/mr-IN/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/mr-IN/opds.xml                         |   16 +-
 public_html/nb-NO/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/nb-NO/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/nb-NO/opds-Fedora_Core.xml             |    2 +-
 public_html/nb-NO/opds-Fedora_Documentation.xml    |    2 +-
 .../nb-NO/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/nb-NO/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/nb-NO/opds.xml                         |   16 +-
 public_html/nl-NL/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/nl-NL/opds-Fedora.xml                  |    8 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/nl-NL/opds-Fedora_Core.xml             |    2 +-
 public_html/nl-NL/opds-Fedora_Documentation.xml    |    2 +-
 .../nl-NL/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/nl-NL/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/nl-NL/opds.xml                         |   16 +-
 public_html/nl-NL/toc.html                         |   18 +-
 public_html/opds.xml                               |   90 +++---
 public_html/or-IN/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/or-IN/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/or-IN/opds-Fedora_Core.xml             |    2 +-
 public_html/or-IN/opds-Fedora_Documentation.xml    |    2 +-
 .../or-IN/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/or-IN/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/or-IN/opds.xml                         |   16 +-
 public_html/pa-IN/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/pa-IN/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/pa-IN/opds-Fedora_Core.xml             |    2 +-
 public_html/pa-IN/opds-Fedora_Documentation.xml    |    2 +-
 .../pa-IN/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/pa-IN/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/pa-IN/opds.xml                         |   16 +-
 public_html/pl-PL/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/pl-PL/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/pl-PL/opds-Fedora_Core.xml             |    2 +-
 public_html/pl-PL/opds-Fedora_Documentation.xml    |    2 +-
 .../pl-PL/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/pl-PL/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/pl-PL/opds.xml                         |   16 +-
 public_html/pt-BR/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/pt-BR/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/pt-BR/opds-Fedora_Core.xml             |    2 +-
 public_html/pt-BR/opds-Fedora_Documentation.xml    |    2 +-
 .../pt-BR/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/pt-BR/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/pt-BR/opds.xml                         |   16 +-
 public_html/pt-PT/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/pt-PT/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/pt-PT/opds-Fedora_Core.xml             |    2 +-
 public_html/pt-PT/opds-Fedora_Documentation.xml    |    2 +-
 .../pt-PT/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/pt-PT/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/pt-PT/opds.xml                         |   16 +-
 public_html/ro/Site_Statistics.html                |    6 +-
 .../ro/opds-Community_Services_Infrastructure.xml  |    2 +-
 public_html/ro/opds-Fedora.xml                     |    2 +-
 .../ro/opds-Fedora_Contributor_Documentation.xml   |    2 +-
 public_html/ro/opds-Fedora_Core.xml                |    2 +-
 public_html/ro/opds-Fedora_Documentation.xml       |    2 +-
 public_html/ro/opds-Fedora_Draft_Documentation.xml |    2 +-
 public_html/ro/opds-Fedora_Security_Team.xml       |    2 +-
 public_html/ro/opds.xml                            |   16 +-
 public_html/ru-RU/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/ru-RU/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/ru-RU/opds-Fedora_Core.xml             |    2 +-
 public_html/ru-RU/opds-Fedora_Documentation.xml    |    2 +-
 .../ru-RU/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/ru-RU/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/ru-RU/opds.xml                         |   16 +-
 public_html/sk-SK/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/sk-SK/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/sk-SK/opds-Fedora_Core.xml             |    2 +-
 public_html/sk-SK/opds-Fedora_Documentation.xml    |    2 +-
 .../sk-SK/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/sk-SK/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/sk-SK/opds.xml                         |   16 +-
 public_html/sr-Latn-RS/Site_Statistics.html        |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/sr-Latn-RS/opds-Fedora.xml             |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/sr-Latn-RS/opds-Fedora_Core.xml        |    2 +-
 .../sr-Latn-RS/opds-Fedora_Documentation.xml       |    2 +-
 .../sr-Latn-RS/opds-Fedora_Draft_Documentation.xml |    2 +-
 .../sr-Latn-RS/opds-Fedora_Security_Team.xml       |    2 +-
 public_html/sr-Latn-RS/opds.xml                    |   16 +-
 public_html/sr-RS/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/sr-RS/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/sr-RS/opds-Fedora_Core.xml             |    2 +-
 public_html/sr-RS/opds-Fedora_Documentation.xml    |    2 +-
 .../sr-RS/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/sr-RS/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/sr-RS/opds.xml                         |   16 +-
 public_html/sv-SE/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/sv-SE/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/sv-SE/opds-Fedora_Core.xml             |    2 +-
 public_html/sv-SE/opds-Fedora_Documentation.xml    |    2 +-
 .../sv-SE/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/sv-SE/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/sv-SE/opds.xml                         |   16 +-
 public_html/ta-IN/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/ta-IN/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/ta-IN/opds-Fedora_Core.xml             |    2 +-
 public_html/ta-IN/opds-Fedora_Documentation.xml    |    2 +-
 .../ta-IN/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/ta-IN/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/ta-IN/opds.xml                         |   16 +-
 public_html/te-IN/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/te-IN/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/te-IN/opds-Fedora_Core.xml             |    2 +-
 public_html/te-IN/opds-Fedora_Documentation.xml    |    2 +-
 .../te-IN/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/te-IN/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/te-IN/opds.xml                         |   16 +-
 public_html/toc.html                               |   30 --
 public_html/uk-UA/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/uk-UA/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/uk-UA/opds-Fedora_Core.xml             |    2 +-
 public_html/uk-UA/opds-Fedora_Documentation.xml    |    2 +-
 .../uk-UA/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/uk-UA/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/uk-UA/opds.xml                         |   16 +-
 public_html/zh-CN/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/zh-CN/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/zh-CN/opds-Fedora_Core.xml             |    2 +-
 public_html/zh-CN/opds-Fedora_Documentation.xml    |    2 +-
 .../zh-CN/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/zh-CN/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/zh-CN/opds.xml                         |   16 +-
 public_html/zh-TW/Site_Statistics.html             |    6 +-
 .../opds-Community_Services_Infrastructure.xml     |    2 +-
 public_html/zh-TW/opds-Fedora.xml                  |    2 +-
 .../opds-Fedora_Contributor_Documentation.xml      |    2 +-
 public_html/zh-TW/opds-Fedora_Core.xml             |    2 +-
 public_html/zh-TW/opds-Fedora_Documentation.xml    |    2 +-
 .../zh-TW/opds-Fedora_Draft_Documentation.xml      |    2 +-
 public_html/zh-TW/opds-Fedora_Security_Team.xml    |    2 +-
 public_html/zh-TW/opds.xml                         |   16 +-
 447 files changed, 1231 insertions(+), 1375 deletions(-)
---
diff --git a/fedoradocs.db b/fedoradocs.db
index 3eb01cc..2d74c1a 100644
Binary files a/fedoradocs.db and b/fedoradocs.db differ
diff --git a/public_html/Sitemap b/public_html/Sitemap
index 33ed26e..4308701 100644
--- a/public_html/Sitemap
+++ b/public_html/Sitemap
@@ -10297,30 +10297,6 @@
 	<priority>0.8</priority>
 </url>
 <url>
-	<loc>http://docs.fedoraproject.org/ja-JP/Fedora/19/epub/Security_Guide/Fedora-19-Security_Guide-ja-JP.epub</loc>
-	<lastmod>2013-12-13</lastmod>
-	<changefreq>monthly</changefreq>
-	<priority>0.8</priority>
-</url>
-<url>
-	<loc>http://docs.fedoraproject.org/ja-JP/Fedora/19/html/Security_Guide/index.html</loc>
-	<lastmod>2013-12-13</lastmod>
-	<changefreq>monthly</changefreq>
-	<priority>0.8</priority>
-</url>
-<url>
-	<loc>http://docs.fedoraproject.org/ja-JP/Fedora/19/html-single/Security_Guide/index.html</loc>
-	<lastmod>2013-12-13</lastmod>
-	<changefreq>monthly</changefreq>
-	<priority>0.8</priority>
-</url>
-<url>
-	<loc>http://docs.fedoraproject.org/ja-JP/Fedora/19/pdf/Security_Guide/Fedora-19-Security_Guide-ja-JP.pdf</loc>
-	<lastmod>2013-12-13</lastmod>
-	<changefreq>monthly</changefreq>
-	<priority>0.8</priority>
-</url>
-<url>
 	<loc>http://docs.fedoraproject.org/ja-JP/Fedora/18/epub/Burning_ISO_images_to_disc/Fedora-18-Burning_ISO_images_to_disc-ja-JP.epub</loc>
 	<lastmod>2013-04-12</lastmod>
 	<changefreq>monthly</changefreq>
@@ -12247,30 +12223,6 @@
 	<priority>0.8</priority>
 </url>
 <url>
-	<loc>http://docs.fedoraproject.org/nl-NL/Fedora/19/epub/Security_Guide/Fedora-19-Security_Guide-nl-NL.epub</loc>
-	<lastmod>2013-12-13</lastmod>
-	<changefreq>monthly</changefreq>
-	<priority>0.8</priority>
-</url>
-<url>
-	<loc>http://docs.fedoraproject.org/nl-NL/Fedora/19/html/Security_Guide/index.html</loc>
-	<lastmod>2013-12-13</lastmod>
-	<changefreq>monthly</changefreq>
-	<priority>0.8</priority>
-</url>
-<url>
-	<loc>http://docs.fedoraproject.org/nl-NL/Fedora/19/html-single/Security_Guide/index.html</loc>
-	<lastmod>2013-12-13</lastmod>
-	<changefreq>monthly</changefreq>
-	<priority>0.8</priority>
-</url>
-<url>
-	<loc>http://docs.fedoraproject.org/nl-NL/Fedora/19/pdf/Security_Guide/Fedora-19-Security_Guide-nl-NL.pdf</loc>
-	<lastmod>2013-12-13</lastmod>
-	<changefreq>monthly</changefreq>
-	<priority>0.8</priority>
-</url>
-<url>
 	<loc>http://docs.fedoraproject.org/nl-NL/Fedora/18/epub/Burning_ISO_images_to_disc/Fedora-18-Burning_ISO_images_to_disc-nl-NL.epub</loc>
 	<lastmod>2013-04-12</lastmod>
 	<changefreq>monthly</changefreq>
diff --git a/public_html/as-IN/Site_Statistics.html b/public_html/as-IN/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/as-IN/Site_Statistics.html
+++ b/public_html/as-IN/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/as-IN/opds-Community_Services_Infrastructure.xml b/public_html/as-IN/opds-Community_Services_Infrastructure.xml
index e1ba147..0b493f1 100644
--- a/public_html/as-IN/opds-Community_Services_Infrastructure.xml
+++ b/public_html/as-IN/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/as-IN/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:28</updated>
+  <updated>2013-12-13T23:25:44</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/as-IN/opds-Fedora.xml b/public_html/as-IN/opds-Fedora.xml
index c9c693f..f502b73 100644
--- a/public_html/as-IN/opds-Fedora.xml
+++ b/public_html/as-IN/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/as-IN/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:28</updated>
+  <updated>2013-12-13T23:25:44</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/as-IN/opds-Fedora_Contributor_Documentation.xml b/public_html/as-IN/opds-Fedora_Contributor_Documentation.xml
index bf2844b..c2036a1 100644
--- a/public_html/as-IN/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/as-IN/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/as-IN/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:28</updated>
+  <updated>2013-12-13T23:25:44</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/as-IN/opds-Fedora_Core.xml b/public_html/as-IN/opds-Fedora_Core.xml
index 083a4f3..fe6adf7 100644
--- a/public_html/as-IN/opds-Fedora_Core.xml
+++ b/public_html/as-IN/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/as-IN/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:28</updated>
+  <updated>2013-12-13T23:25:44</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/as-IN/opds-Fedora_Documentation.xml b/public_html/as-IN/opds-Fedora_Documentation.xml
index 1d6c3b4..cadd74b 100644
--- a/public_html/as-IN/opds-Fedora_Documentation.xml
+++ b/public_html/as-IN/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/as-IN/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:28</updated>
+  <updated>2013-12-13T23:25:44</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/as-IN/opds-Fedora_Draft_Documentation.xml b/public_html/as-IN/opds-Fedora_Draft_Documentation.xml
index 11829b5..62566c1 100644
--- a/public_html/as-IN/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/as-IN/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/as-IN/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:28</updated>
+  <updated>2013-12-13T23:25:44</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/as-IN/opds-Fedora_Security_Team.xml b/public_html/as-IN/opds-Fedora_Security_Team.xml
index bf8fde5..99b9ad3 100644
--- a/public_html/as-IN/opds-Fedora_Security_Team.xml
+++ b/public_html/as-IN/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/as-IN/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:28</updated>
+  <updated>2013-12-13T23:25:44</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/as-IN/opds.xml b/public_html/as-IN/opds.xml
index dc3a807..e3e7f3e 100644
--- a/public_html/as-IN/opds.xml
+++ b/public_html/as-IN/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/as-IN/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:28</updated>
+  <updated>2013-12-13T23:25:44</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/as-IN/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:28</updated>
+    <updated>2013-12-13T23:25:44</updated>
     <dc:language>as-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/as-IN/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:28</updated>
+    <updated>2013-12-13T23:25:44</updated>
     <dc:language>as-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/as-IN/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:28</updated>
+    <updated>2013-12-13T23:25:44</updated>
     <dc:language>as-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/as-IN/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:28</updated>
+    <updated>2013-12-13T23:25:44</updated>
     <dc:language>as-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/as-IN/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:28</updated>
+    <updated>2013-12-13T23:25:44</updated>
     <dc:language>as-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/as-IN/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:28</updated>
+    <updated>2013-12-13T23:25:44</updated>
     <dc:language>as-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/as-IN/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:28</updated>
+    <updated>2013-12-13T23:25:44</updated>
     <dc:language>as-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/bg-BG/Site_Statistics.html b/public_html/bg-BG/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/bg-BG/Site_Statistics.html
+++ b/public_html/bg-BG/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/bg-BG/opds-Community_Services_Infrastructure.xml b/public_html/bg-BG/opds-Community_Services_Infrastructure.xml
index 5506cce..c683f43 100644
--- a/public_html/bg-BG/opds-Community_Services_Infrastructure.xml
+++ b/public_html/bg-BG/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/bg-BG/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:28</updated>
+  <updated>2013-12-13T23:25:44</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/bg-BG/opds-Fedora.xml b/public_html/bg-BG/opds-Fedora.xml
index fb2f185..52ecc2c 100644
--- a/public_html/bg-BG/opds-Fedora.xml
+++ b/public_html/bg-BG/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/bg-BG/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:28</updated>
+  <updated>2013-12-13T23:25:44</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/bg-BG/opds-Fedora_Contributor_Documentation.xml b/public_html/bg-BG/opds-Fedora_Contributor_Documentation.xml
index 84d0386..dad3168 100644
--- a/public_html/bg-BG/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/bg-BG/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/bg-BG/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:28</updated>
+  <updated>2013-12-13T23:25:44</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/bg-BG/opds-Fedora_Core.xml b/public_html/bg-BG/opds-Fedora_Core.xml
index 4cbc44b..4eeee08 100644
--- a/public_html/bg-BG/opds-Fedora_Core.xml
+++ b/public_html/bg-BG/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/bg-BG/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:28</updated>
+  <updated>2013-12-13T23:25:44</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/bg-BG/opds-Fedora_Documentation.xml b/public_html/bg-BG/opds-Fedora_Documentation.xml
index 88a53a5..1a4e598 100644
--- a/public_html/bg-BG/opds-Fedora_Documentation.xml
+++ b/public_html/bg-BG/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/bg-BG/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:28</updated>
+  <updated>2013-12-13T23:25:44</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/bg-BG/opds-Fedora_Draft_Documentation.xml b/public_html/bg-BG/opds-Fedora_Draft_Documentation.xml
index 5839b23..7e1c386 100644
--- a/public_html/bg-BG/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/bg-BG/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/bg-BG/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:28</updated>
+  <updated>2013-12-13T23:25:44</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/bg-BG/opds-Fedora_Security_Team.xml b/public_html/bg-BG/opds-Fedora_Security_Team.xml
index 02106c8..f919b04 100644
--- a/public_html/bg-BG/opds-Fedora_Security_Team.xml
+++ b/public_html/bg-BG/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/bg-BG/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:28</updated>
+  <updated>2013-12-13T23:25:44</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/bg-BG/opds.xml b/public_html/bg-BG/opds.xml
index 533ceb9..16dcf4e 100644
--- a/public_html/bg-BG/opds.xml
+++ b/public_html/bg-BG/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/bg-BG/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:28</updated>
+  <updated>2013-12-13T23:25:44</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/bg-BG/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:28</updated>
+    <updated>2013-12-13T23:25:44</updated>
     <dc:language>bg-BG</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/bg-BG/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:28</updated>
+    <updated>2013-12-13T23:25:44</updated>
     <dc:language>bg-BG</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/bg-BG/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:28</updated>
+    <updated>2013-12-13T23:25:44</updated>
     <dc:language>bg-BG</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/bg-BG/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:28</updated>
+    <updated>2013-12-13T23:25:44</updated>
     <dc:language>bg-BG</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/bg-BG/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:28</updated>
+    <updated>2013-12-13T23:25:44</updated>
     <dc:language>bg-BG</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/bg-BG/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:28</updated>
+    <updated>2013-12-13T23:25:44</updated>
     <dc:language>bg-BG</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/bg-BG/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:28</updated>
+    <updated>2013-12-13T23:25:44</updated>
     <dc:language>bg-BG</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/bn-IN/Site_Statistics.html b/public_html/bn-IN/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/bn-IN/Site_Statistics.html
+++ b/public_html/bn-IN/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/bn-IN/opds-Community_Services_Infrastructure.xml b/public_html/bn-IN/opds-Community_Services_Infrastructure.xml
index 80418b5..c9dbbd0 100644
--- a/public_html/bn-IN/opds-Community_Services_Infrastructure.xml
+++ b/public_html/bn-IN/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/bn-IN/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:28</updated>
+  <updated>2013-12-13T23:25:44</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/bn-IN/opds-Fedora.xml b/public_html/bn-IN/opds-Fedora.xml
index 7f1cd53..b9b65d3 100644
--- a/public_html/bn-IN/opds-Fedora.xml
+++ b/public_html/bn-IN/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/bn-IN/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/bn-IN/opds-Fedora_Contributor_Documentation.xml b/public_html/bn-IN/opds-Fedora_Contributor_Documentation.xml
index 70a79a7..1f02538 100644
--- a/public_html/bn-IN/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/bn-IN/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/bn-IN/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/bn-IN/opds-Fedora_Core.xml b/public_html/bn-IN/opds-Fedora_Core.xml
index 52aa02f..d62b4ca 100644
--- a/public_html/bn-IN/opds-Fedora_Core.xml
+++ b/public_html/bn-IN/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/bn-IN/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/bn-IN/opds-Fedora_Documentation.xml b/public_html/bn-IN/opds-Fedora_Documentation.xml
index 8f67f2d..5cee19e 100644
--- a/public_html/bn-IN/opds-Fedora_Documentation.xml
+++ b/public_html/bn-IN/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/bn-IN/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/bn-IN/opds-Fedora_Draft_Documentation.xml b/public_html/bn-IN/opds-Fedora_Draft_Documentation.xml
index 7806142..d465bbb 100644
--- a/public_html/bn-IN/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/bn-IN/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/bn-IN/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/bn-IN/opds-Fedora_Security_Team.xml b/public_html/bn-IN/opds-Fedora_Security_Team.xml
index b45d8a7..fec0602 100644
--- a/public_html/bn-IN/opds-Fedora_Security_Team.xml
+++ b/public_html/bn-IN/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/bn-IN/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/bn-IN/opds.xml b/public_html/bn-IN/opds.xml
index cd1de07..a33c53f 100644
--- a/public_html/bn-IN/opds.xml
+++ b/public_html/bn-IN/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/bn-IN/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/bn-IN/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:28</updated>
+    <updated>2013-12-13T23:25:44</updated>
     <dc:language>bn-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/bn-IN/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>bn-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/bn-IN/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>bn-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/bn-IN/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>bn-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/bn-IN/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>bn-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/bn-IN/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>bn-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/bn-IN/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>bn-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/bs-BA/Site_Statistics.html b/public_html/bs-BA/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/bs-BA/Site_Statistics.html
+++ b/public_html/bs-BA/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/bs-BA/opds-Community_Services_Infrastructure.xml b/public_html/bs-BA/opds-Community_Services_Infrastructure.xml
index 7620e0e..df4f80a 100644
--- a/public_html/bs-BA/opds-Community_Services_Infrastructure.xml
+++ b/public_html/bs-BA/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/bs-BA/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/bs-BA/opds-Fedora.xml b/public_html/bs-BA/opds-Fedora.xml
index 9c05055..f35724f 100644
--- a/public_html/bs-BA/opds-Fedora.xml
+++ b/public_html/bs-BA/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/bs-BA/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/bs-BA/opds-Fedora_Contributor_Documentation.xml b/public_html/bs-BA/opds-Fedora_Contributor_Documentation.xml
index 4d0078b..1cbfb44 100644
--- a/public_html/bs-BA/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/bs-BA/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/bs-BA/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/bs-BA/opds-Fedora_Core.xml b/public_html/bs-BA/opds-Fedora_Core.xml
index 76d9ae7..32bf88e 100644
--- a/public_html/bs-BA/opds-Fedora_Core.xml
+++ b/public_html/bs-BA/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/bs-BA/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/bs-BA/opds-Fedora_Documentation.xml b/public_html/bs-BA/opds-Fedora_Documentation.xml
index 1b20fd1..1dacf25 100644
--- a/public_html/bs-BA/opds-Fedora_Documentation.xml
+++ b/public_html/bs-BA/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/bs-BA/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/bs-BA/opds-Fedora_Draft_Documentation.xml b/public_html/bs-BA/opds-Fedora_Draft_Documentation.xml
index efd8f0b..e030691 100644
--- a/public_html/bs-BA/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/bs-BA/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/bs-BA/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/bs-BA/opds-Fedora_Security_Team.xml b/public_html/bs-BA/opds-Fedora_Security_Team.xml
index ded165b..851f831 100644
--- a/public_html/bs-BA/opds-Fedora_Security_Team.xml
+++ b/public_html/bs-BA/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/bs-BA/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/bs-BA/opds.xml b/public_html/bs-BA/opds.xml
index cceedac..4c47a98 100644
--- a/public_html/bs-BA/opds.xml
+++ b/public_html/bs-BA/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/bs-BA/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/bs-BA/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>bs-BA</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/bs-BA/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>bs-BA</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/bs-BA/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>bs-BA</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/bs-BA/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>bs-BA</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/bs-BA/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>bs-BA</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/bs-BA/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>bs-BA</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/bs-BA/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>bs-BA</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/ca-ES/Site_Statistics.html b/public_html/ca-ES/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/ca-ES/Site_Statistics.html
+++ b/public_html/ca-ES/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/ca-ES/opds-Community_Services_Infrastructure.xml b/public_html/ca-ES/opds-Community_Services_Infrastructure.xml
index 0089ea7..a82742f 100644
--- a/public_html/ca-ES/opds-Community_Services_Infrastructure.xml
+++ b/public_html/ca-ES/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ca-ES/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ca-ES/opds-Fedora.xml b/public_html/ca-ES/opds-Fedora.xml
index 8970147..5c4ab98 100644
--- a/public_html/ca-ES/opds-Fedora.xml
+++ b/public_html/ca-ES/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ca-ES/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ca-ES/opds-Fedora_Contributor_Documentation.xml b/public_html/ca-ES/opds-Fedora_Contributor_Documentation.xml
index 166e3a4..56e65a2 100644
--- a/public_html/ca-ES/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/ca-ES/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ca-ES/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ca-ES/opds-Fedora_Core.xml b/public_html/ca-ES/opds-Fedora_Core.xml
index b9e1fd7..0b81811 100644
--- a/public_html/ca-ES/opds-Fedora_Core.xml
+++ b/public_html/ca-ES/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ca-ES/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ca-ES/opds-Fedora_Documentation.xml b/public_html/ca-ES/opds-Fedora_Documentation.xml
index 83a6aaa..6285ab8 100644
--- a/public_html/ca-ES/opds-Fedora_Documentation.xml
+++ b/public_html/ca-ES/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ca-ES/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ca-ES/opds-Fedora_Draft_Documentation.xml b/public_html/ca-ES/opds-Fedora_Draft_Documentation.xml
index a23ae8f..8c20628 100644
--- a/public_html/ca-ES/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/ca-ES/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ca-ES/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ca-ES/opds-Fedora_Security_Team.xml b/public_html/ca-ES/opds-Fedora_Security_Team.xml
index d289032..c54886b 100644
--- a/public_html/ca-ES/opds-Fedora_Security_Team.xml
+++ b/public_html/ca-ES/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ca-ES/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ca-ES/opds.xml b/public_html/ca-ES/opds.xml
index fd1e3ec..ce5b128 100644
--- a/public_html/ca-ES/opds.xml
+++ b/public_html/ca-ES/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/ca-ES/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/ca-ES/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>ca-ES</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/ca-ES/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>ca-ES</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/ca-ES/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>ca-ES</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/ca-ES/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>ca-ES</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/ca-ES/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>ca-ES</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/ca-ES/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>ca-ES</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/ca-ES/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>ca-ES</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/cs-CZ/Site_Statistics.html b/public_html/cs-CZ/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/cs-CZ/Site_Statistics.html
+++ b/public_html/cs-CZ/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/cs-CZ/opds-Community_Services_Infrastructure.xml b/public_html/cs-CZ/opds-Community_Services_Infrastructure.xml
index 78b33bb..9ec9bf2 100644
--- a/public_html/cs-CZ/opds-Community_Services_Infrastructure.xml
+++ b/public_html/cs-CZ/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/cs-CZ/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/cs-CZ/opds-Fedora.xml b/public_html/cs-CZ/opds-Fedora.xml
index ab7177e..0c1615a 100644
--- a/public_html/cs-CZ/opds-Fedora.xml
+++ b/public_html/cs-CZ/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/cs-CZ/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/cs-CZ/opds-Fedora_Contributor_Documentation.xml b/public_html/cs-CZ/opds-Fedora_Contributor_Documentation.xml
index cb421bc..95c4d4f 100644
--- a/public_html/cs-CZ/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/cs-CZ/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/cs-CZ/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/cs-CZ/opds-Fedora_Core.xml b/public_html/cs-CZ/opds-Fedora_Core.xml
index 71a8a9b..220a8a6 100644
--- a/public_html/cs-CZ/opds-Fedora_Core.xml
+++ b/public_html/cs-CZ/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/cs-CZ/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/cs-CZ/opds-Fedora_Documentation.xml b/public_html/cs-CZ/opds-Fedora_Documentation.xml
index d80a98c..03101e5 100644
--- a/public_html/cs-CZ/opds-Fedora_Documentation.xml
+++ b/public_html/cs-CZ/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/cs-CZ/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/cs-CZ/opds-Fedora_Draft_Documentation.xml b/public_html/cs-CZ/opds-Fedora_Draft_Documentation.xml
index a81b4e7..4279dc3 100644
--- a/public_html/cs-CZ/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/cs-CZ/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/cs-CZ/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/cs-CZ/opds-Fedora_Security_Team.xml b/public_html/cs-CZ/opds-Fedora_Security_Team.xml
index 99cd31a..61f7965 100644
--- a/public_html/cs-CZ/opds-Fedora_Security_Team.xml
+++ b/public_html/cs-CZ/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/cs-CZ/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/cs-CZ/opds.xml b/public_html/cs-CZ/opds.xml
index eaa389b..8b02b44 100644
--- a/public_html/cs-CZ/opds.xml
+++ b/public_html/cs-CZ/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/cs-CZ/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/cs-CZ/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>cs-CZ</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/cs-CZ/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>cs-CZ</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/cs-CZ/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>cs-CZ</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/cs-CZ/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>cs-CZ</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/cs-CZ/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>cs-CZ</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/cs-CZ/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>cs-CZ</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/cs-CZ/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>cs-CZ</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/da-DK/Site_Statistics.html b/public_html/da-DK/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/da-DK/Site_Statistics.html
+++ b/public_html/da-DK/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/da-DK/opds-Community_Services_Infrastructure.xml b/public_html/da-DK/opds-Community_Services_Infrastructure.xml
index 42b2023..c54d206 100644
--- a/public_html/da-DK/opds-Community_Services_Infrastructure.xml
+++ b/public_html/da-DK/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/da-DK/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/da-DK/opds-Fedora.xml b/public_html/da-DK/opds-Fedora.xml
index 71d7fb3..cc728ac 100644
--- a/public_html/da-DK/opds-Fedora.xml
+++ b/public_html/da-DK/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/da-DK/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/da-DK/opds-Fedora_Contributor_Documentation.xml b/public_html/da-DK/opds-Fedora_Contributor_Documentation.xml
index 928ca7e..117a604 100644
--- a/public_html/da-DK/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/da-DK/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/da-DK/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/da-DK/opds-Fedora_Core.xml b/public_html/da-DK/opds-Fedora_Core.xml
index e19f6ad..e9851fc 100644
--- a/public_html/da-DK/opds-Fedora_Core.xml
+++ b/public_html/da-DK/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/da-DK/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/da-DK/opds-Fedora_Documentation.xml b/public_html/da-DK/opds-Fedora_Documentation.xml
index 30c6373..dd4f085 100644
--- a/public_html/da-DK/opds-Fedora_Documentation.xml
+++ b/public_html/da-DK/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/da-DK/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/da-DK/opds-Fedora_Draft_Documentation.xml b/public_html/da-DK/opds-Fedora_Draft_Documentation.xml
index 599fd2b..f4bf9a3 100644
--- a/public_html/da-DK/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/da-DK/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/da-DK/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:45</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/da-DK/opds-Fedora_Security_Team.xml b/public_html/da-DK/opds-Fedora_Security_Team.xml
index 2900c87..7ae6698 100644
--- a/public_html/da-DK/opds-Fedora_Security_Team.xml
+++ b/public_html/da-DK/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/da-DK/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/da-DK/opds.xml b/public_html/da-DK/opds.xml
index 7c17ee0..fb9a77f 100644
--- a/public_html/da-DK/opds.xml
+++ b/public_html/da-DK/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/da-DK/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/da-DK/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>da-DK</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/da-DK/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>da-DK</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/da-DK/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>da-DK</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/da-DK/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>da-DK</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/da-DK/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>da-DK</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/da-DK/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>da-DK</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/da-DK/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>da-DK</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/de-DE/Site_Statistics.html b/public_html/de-DE/Site_Statistics.html
index b45a080..2ab7800 100644
--- a/public_html/de-DE/Site_Statistics.html
+++ b/public_html/de-DE/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Sprachen gesamt: </b>44<br />
-	<b>Pakete gesamt: </b>893
+	<b>Pakete gesamt: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/de-DE/opds-Community_Services_Infrastructure.xml b/public_html/de-DE/opds-Community_Services_Infrastructure.xml
index 4cf36cc..2254a31 100644
--- a/public_html/de-DE/opds-Community_Services_Infrastructure.xml
+++ b/public_html/de-DE/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/de-DE/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/de-DE/opds-Fedora.xml b/public_html/de-DE/opds-Fedora.xml
index 584c05b..db4351a 100644
--- a/public_html/de-DE/opds-Fedora.xml
+++ b/public_html/de-DE/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/de-DE/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/de-DE/opds-Fedora_Contributor_Documentation.xml b/public_html/de-DE/opds-Fedora_Contributor_Documentation.xml
index d1d6e37..90962fb 100644
--- a/public_html/de-DE/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/de-DE/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/de-DE/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/de-DE/opds-Fedora_Core.xml b/public_html/de-DE/opds-Fedora_Core.xml
index 75015bd..409108c 100644
--- a/public_html/de-DE/opds-Fedora_Core.xml
+++ b/public_html/de-DE/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/de-DE/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/de-DE/opds-Fedora_Documentation.xml b/public_html/de-DE/opds-Fedora_Documentation.xml
index e46083d..7e1041a 100644
--- a/public_html/de-DE/opds-Fedora_Documentation.xml
+++ b/public_html/de-DE/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/de-DE/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/de-DE/opds-Fedora_Draft_Documentation.xml b/public_html/de-DE/opds-Fedora_Draft_Documentation.xml
index 971f45f..b70a5db 100644
--- a/public_html/de-DE/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/de-DE/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/de-DE/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/de-DE/opds-Fedora_Security_Team.xml b/public_html/de-DE/opds-Fedora_Security_Team.xml
index 4fa1255..ff71fb6 100644
--- a/public_html/de-DE/opds-Fedora_Security_Team.xml
+++ b/public_html/de-DE/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/de-DE/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:29</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/de-DE/opds.xml b/public_html/de-DE/opds.xml
index 82c7da3..9e187c8 100644
--- a/public_html/de-DE/opds.xml
+++ b/public_html/de-DE/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/de-DE/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/de-DE/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>de-DE</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/de-DE/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>de-DE</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/de-DE/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>de-DE</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/de-DE/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>de-DE</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/de-DE/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>de-DE</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/de-DE/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>de-DE</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/de-DE/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>de-DE</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/el-GR/Site_Statistics.html b/public_html/el-GR/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/el-GR/Site_Statistics.html
+++ b/public_html/el-GR/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/el-GR/opds-Community_Services_Infrastructure.xml b/public_html/el-GR/opds-Community_Services_Infrastructure.xml
index f21dd56..ac60b99 100644
--- a/public_html/el-GR/opds-Community_Services_Infrastructure.xml
+++ b/public_html/el-GR/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/el-GR/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/el-GR/opds-Fedora.xml b/public_html/el-GR/opds-Fedora.xml
index 154cd1a..c4478d8 100644
--- a/public_html/el-GR/opds-Fedora.xml
+++ b/public_html/el-GR/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/el-GR/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/el-GR/opds-Fedora_Contributor_Documentation.xml b/public_html/el-GR/opds-Fedora_Contributor_Documentation.xml
index 3c11400..bc1d6e8 100644
--- a/public_html/el-GR/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/el-GR/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/el-GR/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/el-GR/opds-Fedora_Core.xml b/public_html/el-GR/opds-Fedora_Core.xml
index a927017..303933c 100644
--- a/public_html/el-GR/opds-Fedora_Core.xml
+++ b/public_html/el-GR/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/el-GR/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/el-GR/opds-Fedora_Documentation.xml b/public_html/el-GR/opds-Fedora_Documentation.xml
index 16a98d9..b21fcd5 100644
--- a/public_html/el-GR/opds-Fedora_Documentation.xml
+++ b/public_html/el-GR/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/el-GR/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/el-GR/opds-Fedora_Draft_Documentation.xml b/public_html/el-GR/opds-Fedora_Draft_Documentation.xml
index e09a902..7ad27c1 100644
--- a/public_html/el-GR/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/el-GR/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/el-GR/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/el-GR/opds-Fedora_Security_Team.xml b/public_html/el-GR/opds-Fedora_Security_Team.xml
index ac506ff..4fa2b06 100644
--- a/public_html/el-GR/opds-Fedora_Security_Team.xml
+++ b/public_html/el-GR/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/el-GR/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/el-GR/opds.xml b/public_html/el-GR/opds.xml
index 9919d5b..5c2812a 100644
--- a/public_html/el-GR/opds.xml
+++ b/public_html/el-GR/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/el-GR/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/el-GR/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>el-GR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/el-GR/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>el-GR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/el-GR/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>el-GR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/el-GR/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>el-GR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/el-GR/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>el-GR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/el-GR/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>el-GR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/el-GR/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>el-GR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/en-US/Fedora/19/epub/Security_Guide/Fedora-19-Security_Guide-en-US.epub b/public_html/en-US/Fedora/19/epub/Security_Guide/Fedora-19-Security_Guide-en-US.epub
index f3469a1..fa6ad69 100644
Binary files a/public_html/en-US/Fedora/19/epub/Security_Guide/Fedora-19-Security_Guide-en-US.epub and b/public_html/en-US/Fedora/19/epub/Security_Guide/Fedora-19-Security_Guide-en-US.epub differ
diff --git a/public_html/en-US/Fedora/19/html-single/Security_Guide/index.html b/public_html/en-US/Fedora/19/html-single/Security_Guide/index.html
index aa44492..7c231b8 100644
--- a/public_html/en-US/Fedora/19/html-single/Security_Guide/index.html
+++ b/public_html/en-US/Fedora/19/html-single/Security_Guide/index.html
@@ -6,10 +6,10 @@
               
               addID('Fedora.19.books');
 	      addID('Fedora.19.Security_Guide');
-              </script></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><div xml:lang="en-US" class="book" id="idm218995304512" lang="en-US"><div class="titlepage"><div><div class="producttitle" font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><span class="productname">Fedora</span> <span class="productnumber">19</span></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h1 id="idm218995304512" class="title">Security Guide</h1></d
 iv><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h2 class="subtitle">A Guide to Securing Fedora Linux</h2></div><p class="edition">Edition 19.1</p><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h3 class="corpauthor">
+              </script></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><div xml:lang="en-US" class="book" id="idm219185421360" lang="en-US"><div class="titlepage"><div><div class="producttitle" font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><span class="productname">Fedora</span> <span class="productnumber">19</span></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h1 id="idm219185421360" class="title">Security Guide</h1></d
 iv><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h2 class="subtitle">A Guide to Securing Fedora Linux</h2></div><p class="edition">Edition 19.1</p><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h3 class="corpauthor">
 		<span class="inlinemediaobject"><object data="Common_Content/images/title_logo.svg" type="image/svg+xml"> Logo</object></span>
 
-	</h3></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div xml:lang="en-US" class="authorgroup" lang="en-US"><div class="author"><h3 class="author"><span class="firstname">Johnray</span> <span class="surname">Fuller</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:jrfuller at redhat.com">jrfuller at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">John</span> <span class="surname">Ha</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:jha at redhat.com">jha at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">David</span> <span class="surname">O'Brien</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:daobrien at redhat
 .com">daobrien at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Scott</span> <span class="surname">Radvan</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:sradvan at redhat.com">sradvan at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Eric</span> <span class="surname">Christensen</span></h3><div class="affiliation"><span class="orgname">Fedora Project</span> <span class="orgdiv">Documentation Team</span></div><code class="email"><a class="email" href="mailto:sparks at fedoraproject.org">sparks at fedoraproject.org</a></code></div><div class="author"><h3 class="author"><span class="firstname">Adam</span> <span class="surname">Ligas</span></h3><div class="affiliation"><span class="orgname">Fedora Project</span></div><code class="email"><a class="email" href="mailto:agent86 at fedoraproject.org">agent86 at fedoraproject.org</a></code>
 </div><div class="author"><h3 class="author"><span class="firstname">Murray</span> <span class="surname">McAllister</span></h3><div class="affiliation"><span class="orgname">Red Hat</span> <span class="orgdiv">Engineering Content Services</span></div><code class="email"><a class="email" href="mailto:mmcallis at redhat.com">mmcallis at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Scott</span> <span class="surname">Radvan</span></h3><div class="affiliation"><span class="orgname">Red Hat</span> <span class="orgdiv">Engineering Content Services</span></div><code class="email"><a class="email" href="mailto:sradvan at redhat.com">sradvan at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Daniel</span> <span class="surname">Walsh</span></h3><div class="affiliation"><span class="orgname">Red Hat</span> <span class="orgdiv">Security Engineering</span></div><code class="email"><a class="email" href="mailto:dwal
 sh at redhat.com">dwalsh at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Dominick</span> <span class="surname">Grift</span></h3><span class="contrib">Technical editor for the Introduction, SELinux Contexts, Targeted Policy, Working with SELinux, Confining Users, and Troubleshooting chapters.</span> <div class="affiliation"><span class="orgname"></span> <span class="orgdiv"></span></div><code class="email"><a class="email" href="mailto:domg472 at gmail.com">domg472 at gmail.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Eric</span> <span class="surname">Paris</span></h3><span class="contrib">Technical editor for the Mounting File Systems and Raw Audit Messages sections.</span> <div class="affiliation"><span class="orgname">Red Hat</span> <span class="orgdiv">Security Engineering</span></div><code class="email"><a class="email" href="mailto:eparis at parisplace.org">eparis at parisplace.org</a></code></div><div c
 lass="author"><h3 class="author"><span class="firstname">James</span> <span class="surname">Morris</span></h3><span class="contrib">Technical editor for the Introduction and Targeted Policy chapters.</span> <div class="affiliation"><span class="orgname">Red Hat</span> <span class="orgdiv">Security Engineering</span></div><code class="email"><a class="email" href="mailto:jmorris at redhat.com">jmorris at redhat.com</a></code></div></div></div><hr /><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div id="idm218970777648" class="legalnotice"><h1 class="legalnotice">Legal Notice</h1><div class="para">
+	</h3></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div xml:lang="en-US" class="authorgroup" lang="en-US"><div class="author"><h3 class="author"><span class="firstname">Johnray</span> <span class="surname">Fuller</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:jrfuller at redhat.com">jrfuller at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">John</span> <span class="surname">Ha</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:jha at redhat.com">jha at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">David</span> <span class="surname">O'Brien</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:daobrien at redhat
 .com">daobrien at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Scott</span> <span class="surname">Radvan</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:sradvan at redhat.com">sradvan at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Eric</span> <span class="surname">Christensen</span></h3><div class="affiliation"><span class="orgname">Fedora Project</span> <span class="orgdiv">Documentation Team</span></div><code class="email"><a class="email" href="mailto:sparks at fedoraproject.org">sparks at fedoraproject.org</a></code></div><div class="author"><h3 class="author"><span class="firstname">Adam</span> <span class="surname">Ligas</span></h3><div class="affiliation"><span class="orgname">Fedora Project</span></div><code class="email"><a class="email" href="mailto:agent86 at fedoraproject.org">agent86 at fedoraproject.org</a></code>
 </div><div class="author"><h3 class="author"><span class="firstname">Murray</span> <span class="surname">McAllister</span></h3><div class="affiliation"><span class="orgname">Red Hat</span> <span class="orgdiv">Engineering Content Services</span></div><code class="email"><a class="email" href="mailto:mmcallis at redhat.com">mmcallis at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Scott</span> <span class="surname">Radvan</span></h3><div class="affiliation"><span class="orgname">Red Hat</span> <span class="orgdiv">Engineering Content Services</span></div><code class="email"><a class="email" href="mailto:sradvan at redhat.com">sradvan at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Daniel</span> <span class="surname">Walsh</span></h3><div class="affiliation"><span class="orgname">Red Hat</span> <span class="orgdiv">Security Engineering</span></div><code class="email"><a class="email" href="mailto:dwal
 sh at redhat.com">dwalsh at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Dominick</span> <span class="surname">Grift</span></h3><span class="contrib">Technical editor for the Introduction, SELinux Contexts, Targeted Policy, Working with SELinux, Confining Users, and Troubleshooting chapters.</span> <div class="affiliation"><span class="orgname"></span> <span class="orgdiv"></span></div><code class="email"><a class="email" href="mailto:domg472 at gmail.com">domg472 at gmail.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Eric</span> <span class="surname">Paris</span></h3><span class="contrib">Technical editor for the Mounting File Systems and Raw Audit Messages sections.</span> <div class="affiliation"><span class="orgname">Red Hat</span> <span class="orgdiv">Security Engineering</span></div><code class="email"><a class="email" href="mailto:eparis at parisplace.org">eparis at parisplace.org</a></code></div><div c
 lass="author"><h3 class="author"><span class="firstname">James</span> <span class="surname">Morris</span></h3><span class="contrib">Technical editor for the Introduction and Targeted Policy chapters.</span> <div class="affiliation"><span class="orgname">Red Hat</span> <span class="orgdiv">Security Engineering</span></div><code class="email"><a class="email" href="mailto:jmorris at redhat.com">jmorris at redhat.com</a></code></div></div></div><hr /><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div id="idm219174398064" class="legalnotice"><h1 class="legalnotice">Legal Notice</h1><div class="para">
 		Copyright <span class="trademark"></span>© 2007-2013 Fedora Project Contributors.
 	</div><div class="para">
 		The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at <a href="http://creativecommons.org/licenses/by-sa/3.0/">http://creativecommons.org/licenses/by-sa/3.0/</a>. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version.
@@ -31,11 +31,11 @@
 		All other trademarks are the property of their respective owners.
 	</div></div></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div class="abstract"><h6>Abstract</h6><div class="para">
 			The Fedora Security Guide is designed to assist users of Fedora in learning the processes and practices of securing workstations and servers against local and remote intrusion, exploitation, and malicious activity. Focused on Fedora Linux but detailing concepts and techniques valid for all Linux systems, the Fedora Security Guide details the planning and the tools involved in creating a secured computing environment for the data center, workplace, and home. With proper administrative knowledge, vigilance, and tools, systems running Linux can be both fully functional and secured from most common intrusion and exploit methods.
-		</div></div></div></div><hr /></div><div class="toc"><dl class="toc"><dt><span class="preface"><a href="#pref-Security_Guide-Preface">Preface</a></span></dt><dd><dl><dt><span class="section"><a href="#idm218998804560">1. Document Conventions</a></span></dt><dd><dl><dt><span class="section"><a href="#idm218979323696">1.1. Typographic Conventions</a></span></dt><dt><span class="section"><a href="#idm218930783520">1.2. Pull-quote Conventions</a></span></dt><dt><span class="section"><a href="#idm218933409680">1.3. Notes and Warnings</a></span></dt></dl></dd><dt><span class="section"><a href="#idm219023054224">2. We Need Feedback!</a></span></dt></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Security_Overview">1. Security Overview</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Security">1.1. Introduction to Security</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Se
 curity-What_is_Computer_Security">1.1.1. What is Computer Security?</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Security-SELinux">1.1.2. SELinux</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Security-Security_Controls">1.1.3. Security Controls</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Security-Conclusion">1.1.4. Conclusion</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities">1.2. Attackers and Vulnerabilities</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities-A_Quick_History_of_Hackers">1.2.1. A Quick History of Hackers</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security">1.2.2. Threats to Network Security</a></span></dt><dt><span class="section"><a href="#s
 ect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security">1.2.3. Threats to Server Security</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security">1.2.4. Threats to Workstation and Home PC Security</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Vulnerability_Assessment">1.3. Vulnerability Assessment</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Vulnerability_Assessment-Thinking_Like_the_Enemy">1.3.1. Thinking Like the Enemy</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing">1.3.2. Defining Assessment and Testing</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools">1.3.3. Evaluating the Tools</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Secu
 rity_Guide-Common_Exploits_and_Attacks">1.4. Common Exploits and Attacks</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Security_Updates">1.5. Security Updates</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Security_Updates-Updating_Packages">1.5.1. Updating Packages</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages">1.5.2. Verifying Signed Packages</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Updating_Packages-Installing_Signed_Packages">1.5.3. Installing Signed Packages</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Updating_Packages-Applying_the_Changes">1.5.4. Applying the Changes</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Basic_Hardening">2. Basic Hardening Guide</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardenin
 g-General_Principles">2.1. General Principles</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-General_Principles-Why_is_this_important">2.2. Why is this important?</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-Physical_Security">2.3. Physical Security</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-Physical_Security-Why_is_this_important">2.4. Why this is important</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-Networking">2.5. Networking</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-Networking-iptables">2.5.1. iptables</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-Networking-IPv6">2.5.2. IPv6</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-Up_to_date">2.6. Keeping software up to da
 te</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-Services">2.7. Services</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-NTP">2.8. NTP</a></span></dt></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Securing_Your_Network">3. Securing Your Network</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security">3.1. Workstation Security</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Evaluating_Workstation_Security">3.1.1. Evaluating Workstation Security</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-BIOS_and_Boot_Loader_Security">3.1.2. BIOS and Boot Loader Security</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Password_Security">3.1.3. Password Security</a></span></dt><dt><span class="section"><a href="
 #sect-Security_Guide-Workstation_Security-Administrative_Controls">3.1.4. Administrative Controls</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Available_Network_Services">3.1.5. Available Network Services</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Personal_Firewalls">3.1.6. Personal Firewalls</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Security_Enhanced_Communication_Tools">3.1.7. Security Enhanced Communication Tools</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Server_Security">3.2. Server Security</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_Services_With_TCP_Wrappers_and_xinetd">3.2.1. Securing Services With TCP Wrappers and xinetd</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_Portmap">3.
 2.2. Securing Portmap</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_NIS">3.2.3. Securing NIS</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_NFS">3.2.4. Securing NFS</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server">3.2.5. Securing the Apache HTTP Server</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_FTP">3.2.6. Securing FTP</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_Sendmail">3.2.7. Securing Sendmail</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening">3.2.8. Verifying Which Ports Are Listening</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO">3.3. Single Sign-on (SSO)</a></span></dt><dd><
 dl><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-Introduction">3.3.1. Introduction</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card">3.3.2. Getting Started with your new Smart Card</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works">3.3.3. How Smart Card Enrollment Works</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works">3.3.4. How Smart Card Login Works</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO">3.3.5. Configuring Firefox to use Kerberos for SSO</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Multifactor_Authentication">3.4. Multifactor Authentication Solutions</a></span></dt><dd><dl><dt><span class="sectio
 n"><a href="#sect-Security_Guide-Multifactor_Authentication-Yubikey">3.4.1. Yubikey</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM">3.5. Pluggable Authentication Modules (PAM)</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Advantages_of_PAM">3.5.1. Advantages of PAM</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files">3.5.2. PAM Configuration Files</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format">3.5.3. PAM Configuration File Format</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files">3.5.4. Sample PAM Configuration Files</a></span></dt><dt><span class="section"><a href="#sect-Security
 _Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules">3.5.5. Creating PAM Modules</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching">3.5.6. PAM and Administrative Credential Caching</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership">3.5.7. PAM and Device Ownership</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources">3.5.8. Additional Resources</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd">3.6. TCP Wrappers and xinetd</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers">3.6.1. TCP Wrappers</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_
 Wrappers_Configuration_Files">3.6.2. TCP Wrappers Configuration Files</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd">3.6.3. xinetd</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files">3.6.4. xinetd Configuration Files</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources">3.6.5. Additional Resources</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Kerberos">3.7. Kerberos</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-What_is_Kerberos">3.7.1. What is Kerberos?</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Kerberos_Terminology">3.7.2. Kerberos Terminology</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-How_Kerberos_Works">3.7.3. How Kerberos Works</a></spa
 n></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Kerberos_and_PAM">3.7.4. Kerberos and PAM</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server">3.7.5. Configuring a Kerberos 5 Server</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client">3.7.6. Configuring a Kerberos 5 Client</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping">3.7.7. Domain-to-Realm Mapping</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs">3.7.8. Setting Up Secondary KDCs</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication">3.7.9. Setting Up Cross Realm Authentication</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Additional_Resources">3.7.10. Additional Resources<
 /a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Using_Firewalls">3.8. Using Firewalls</a></span></dt><dd><dl><dt><span class="section"><a href="#sec-Introduction_to_firewalld">3.8.1. Introduction to firewalld</a></span></dt><dt><span class="section"><a href="#sec-Understanding_firewalld">3.8.2. Understanding firewalld</a></span></dt><dt><span class="section"><a href="#sec-Comparison_of_Firewalld_to_system-config-firewall">3.8.3. Comparison of Firewalld to system-config-firewall and iptables</a></span></dt><dt><span class="section"><a href="#sec-Understanding_Network_Zones">3.8.4. Understanding Network Zones</a></span></dt><dt><span class="section"><a href="#sec-Choosing_a_Network_Zone">3.8.5. Choosing a Network Zone</a></span></dt><dt><span class="section"><a href="#sec-Understanding_Predefined_Services">3.8.6. Understanding Predefined Services</a></span></dt><dt><span class="section"><a href="#sec-Understanding_the_direct_interface">3.8.7. U
 nderstanding The Direct Interface</a></span></dt><dt><span class="section"><a href="#sec-Check_if_firewalld_is_installed">3.8.8. Check if firewalld is installed</a></span></dt><dt><span class="section"><a href="#sec-Disabling_firewalld">3.8.9. Disabling firewalld</a></span></dt><dt><span class="section"><a href="#sec-Start_firewalld">3.8.10. Start firewalld</a></span></dt><dt><span class="section"><a href="#sec-Check_if_firewalld_is_running">3.8.11. Check if firewalld is running</a></span></dt><dt><span class="section"><a href="#sec-Installing_firewalld">3.8.12. Installing firewalld</a></span></dt><dt><span class="section"><a href="#sec-Configuring_the_Firewall">3.8.13. Configuring the Firewall</a></span></dt><dt><span class="section"><a href="#sec-firewalld-additional_resources">3.8.14. Additional Resources</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Encryption">4. Encryption</a></span></dt><dd><dl><dt><span class="section"><a 
 href="#sect-Security_Guide-Encryption-Data_at_Rest">4.1. Data at Rest</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption">4.1.1. Full Disk Encryption</a></span></dt><dt><span class="section"><a href="#Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption">4.1.2. File Based Encryption</a></span></dt></dl></dd><dt><span class="section"><a href="#Security_Guide-Encryption-Data_in_Motion">4.2. Data in Motion</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs">4.2.1. Virtual Private Networks (VPNs)</a></span></dt><dt><span class="section"><a href="#Security_Guide-Encryption-Data_in_Motion-Secure_Shell">4.2.2. Secure Shell</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption">4.2.3. LUKS Disk Encryption</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7
 _Zip_Encrypted_Archives">4.2.4. 7-Zip Encrypted Archives</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG">4.2.5. Using GNU Privacy Guard (GnuPG)</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-General_Principles_of_Information_Security">5. General Principles of Information Security</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-General_Principles_of_Information_Security-Tips_Guides_and_Tools">5.1. Tips, Guides, and Tools</a></span></dt></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Secure_Installation">6. Secure Installation</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Secure_Installation-Disk_Partitions">6.1. Disk Partitions</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption">6.2. Utilize LUKS Partition Encryption</a></span></dt></d
 l></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Software_Maintenance">7. Software Maintenance</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Software_Maintenance-Install_Minimal_Software">7.1. Install Minimal Software</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates">7.2. Plan and Configure Security Updates</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates">7.3. Adjusting Automatic Updates</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories">7.4. Install Signed Packages from Well Known Repositories</a></span></dt></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-CVE">8. Common Vulnerabilities and Exposures</a></span></dt><dd><dl><dt><span c
 lass="section"><a href="#sect-Security_Guide-CVE-yum_plugin">8.1. YUM Plugin</a></span></dt></dl></dd><dt><span class="chapter"><a href="#idm219003204928">9. SELinux</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Introduction">9.1. Introduction</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Introduction-Benefits_of_running_SELinux">9.1.1. Benefits of running SELinux</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Introduction-Examples">9.1.2. Examples</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Introduction-SELinux_Architecture">9.1.3. SELinux Architecture</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Introduction-SELinux_on_Other_Operating_Systems">9.1.4. SELinux on Other Operating Systems</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-SELinux_Context
 s">9.2. SELinux Contexts</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-SELinux_Contexts-Domain_Transitions">9.2.1. Domain Transitions</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-SELinux_Contexts-SELinux_Contexts_for_Processes">9.2.2. SELinux Contexts for Processes</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-SELinux_Contexts-SELinux_Contexts_for_Users">9.2.3. SELinux Contexts for Users</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Targeted_Policy">9.3. Targeted Policy</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Targeted_Policy-Confined_Processes">9.3.1. Confined Processes</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Targeted_Policy-Unconfined_Processes">9.3.2. Unconfined Processes</a></span></dt><dt><span class="section"><a href="#sect-Securit
 y-Enhanced_Linux-Targeted_Policy-Confined_and_Unconfined_Users">9.3.3. Confined and Unconfined Users</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux">9.4. Working with SELinux</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-SELinux_Packages">9.4.1. SELinux Packages</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-Which_Log_File_is_Used">9.4.2. Which Log File is Used</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-Main_Configuration_File">9.4.3. Main Configuration File</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-Enabling_and_Disabling_SELinux">9.4.4. Enabling and Disabling SELinux</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-SELinux_Modes">
 9.4.5. SELinux Modes</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-Booleans">9.4.6. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-SELinux_Contexts_Labeling_Files">9.4.7. SELinux Contexts - Labeling Files</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-The_file_t_and_default_t_Types">9.4.8. The file_t and default_t Types</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-Mounting_File_Systems">9.4.9. Mounting File Systems</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-Maintaining_SELinux_Labels_">9.4.10. Maintaining SELinux Labels </a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Confining_Users">9.5. Confining Users</a></span></dt><dd><dl><dt><span class="section"
 ><a href="#sect-Security-Enhanced_Linux-Confining_Users-Linux_and_SELinux_User_Mappings">9.5.1. Linux and SELinux User Mappings</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Confining_Users-Confining_New_Linux_Users_useradd">9.5.2. Confining New Linux Users: useradd</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Confining_Users-Confining_Existing_Linux_Users_semanage_login">9.5.3. Confining Existing Linux Users: semanage login</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Confining_Users-Changing_the_Default_Mapping">9.5.4. Changing the Default Mapping</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Confining_Users-xguest_Kiosk_Mode">9.5.5. xguest: Kiosk Mode</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Confining_Users-Booleans_for_Users_Executing_Applications">9.5.6. Booleans for Users Executing Applications<
 /a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Troubleshooting">9.6. Troubleshooting</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Troubleshooting-What_Happens_when_Access_is_Denied">9.6.1. What Happens when Access is Denied</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Troubleshooting-Top_Three_Causes_of_Problems">9.6.2. Top Three Causes of Problems</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Troubleshooting-Fixing_Problems">9.6.3. Fixing Problems</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Further_Information">9.7. Further Information</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Further_Information-Contributors">9.7.1. Contributors</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Further_Information-Oth
 er_Resources">9.7.2. Other Resources</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="#idm219033574720">10. Managing Confined Services</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-Introduction">10.1. Introduction</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Targeted_policy">10.2. Targeted policy</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-Targeted_policy-Type_Enforcement">10.2.1. Type Enforcement</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Targeted_policy-Confined_processes">10.2.2. Confined processes</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Targeted_policy-Unconfined_processes">10.2.3. Unconfined processes</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-The_Apache_HTTP_Server">10.3. The Apache HTTP Se
 rver</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-The_Apache_HTTP_Server-The_Apache_HTTP_Server_and_SELinux">10.3.1. The Apache HTTP Server and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-The_Apache_HTTP_Server-Types">10.3.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-The_Apache_HTTP_Server-Booleans">10.3.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-The_Apache_HTTP_Server-Configuration_examples">10.3.4. Configuration examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-Samba">10.4. Samba</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-Samba-Samba_and_SELinux">10.4.1. Samba and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Samba-Types">10.4.2. Types</a></s
 pan></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Samba-Booleans">10.4.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Samba-Configuration_examples">10.4.4. Configuration examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-File_Transfer_Protocol">10.5. File Transfer Protocol</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-File_Transfer_Protocol-FTP_and_SELinux">10.5.1. FTP and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-File_Transfer_Protocol-Types">10.5.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-File_Transfer_Protocol-Booleans">10.5.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-File_Transfer_Protocol-Configuration_Examples">10.5.4. Configuration Examples</a></span></d
 t></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-Network_File_System">10.6. Network File System</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-NFS-NFS_and_SELinux">10.6.1. NFS and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-NFS-Types">10.6.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_services-NFS-Booleans">10.6.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-NFS-Configuration_Examples">10.6.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-Berkeley_Internet_Name_Domain">10.7. Berkeley Internet Name Domain</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-BIND-BIND_and_SELinux">10.7.1. BIND and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managin
 g_Confined_Services-BIND-Types">10.7.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-BIND-Booleans">10.7.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-BIND-Configuration_Examples">10.7.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-Concurrent_Versioning_System">10.8. Concurrent Versioning System</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-Concurrent_Versioning_System-CVS_and_SELinux">10.8.1. CVS and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Concurrent_Versioning_System-Types">10.8.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Concurrent_Versioning_System-Booleans">10.8.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Concurrent_
 Versioning_System-Configuration_Examples">10.8.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-Squid_Caching_Proxy">10.9. Squid Caching Proxy</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-Squid_Caching_Proxy-Squid_Caching_Proxy_and_SELinux">10.9.1. Squid Caching Proxy and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Squid_Caching_Proxy-Types">10.9.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Squid_Caching_Proxy-Booleans">10.9.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Squid_Caching_Proxy-Configuration_Examples">10.9.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-MySQL">10.10. MySQL</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Man
 aging_Confined_Services-MySQL-MySQL_and_SELinux">10.10.1. MySQL and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-MySQL-Types">10.10.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-MySQL-Booleans">10.10.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-MySQL-Configuration_Examples">10.10.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-PostgreSQL">10.11. PostgreSQL</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-PostgreSQL-PostgreSQL_and_SELinux">10.11.1. PostgreSQL and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-PostgreSQL-Types">10.11.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-PostgreSQL-Booleans">10.11.3. Booleans</a></span></dt><dt><s
 pan class="section"><a href="#sect-Managing_Confined_Services-PostgreSQL-Configuration_Examples">10.11.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-rsync">10.12. rsync</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-rsync-rsync_and_SELinux">10.12.1. rsync and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-rsync-Types">10.12.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-rsync-Booleans">10.12.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-rsync-Configuration_Examples">10.12.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-Postfix">10.13. Postfix</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-rsync-Postfix_and_SELin
 ux">10.13.1. Postfix and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Postfix-Types">10.13.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Postfix-Booleans">10.13.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Postfix-Configuration_Examples">10.13.4. Configuration Examples</a></span></dt></dl></dd></dl></dd><dt><span class="appendix"><a href="#chap-Security_Guide-Encryption_Standards">A. Encryption Standards</a></span></dt><dd><dl><dt><span class="section"><a href="#idm219022408448">A.1. Synchronous Encryption</a></span></dt><dd><dl><dt><span class="section"><a href="#idm219045320384">A.1.1. Advanced Encryption Standard - AES</a></span></dt><dt><span class="section"><a href="#idm219019737760">A.1.2.  Data Encryption Standard - DES</a></span></dt></dl></dd><dt><span class="section"><a href="#idm219023599792">A.2. Public-key Encryption</a></
 span></dt><dd><dl><dt><span class="section"><a href="#idm219011620240">A.2.1. Diffie-Hellman</a></span></dt><dt><span class="section"><a href="#idm219023430784">A.2.2. RSA</a></span></dt><dt><span class="section"><a href="#idm218984798624">A.2.3. DSA</a></span></dt><dt><span class="section"><a href="#idm219008625792">A.2.4. SSL/TLS</a></span></dt><dt><span class="section"><a href="#idm219008116128">A.2.5. Cramer-Shoup Cryptosystem</a></span></dt><dt><span class="section"><a href="#idm219029052032">A.2.6. ElGamal Encryption</a></span></dt></dl></dd></dl></dd><dt><span class="appendix"><a href="#appe-Publican-Revision_History">B. Revision History</a></span></dt></dl></div><div xml:lang="en-US" class="preface" id="pref-Security_Guide-Preface" lang="en-US"><div class="titlepage"><div><div><h1 class="title">Preface</h1></div></div></div><div xml:lang="en-US" class="section" id="idm218998804560" lang="en-US"><div class="titlepage"><div><div keep-together.within-column="always"><h2
  class="title" id="idm218998804560">1. Document Conventions</h2></div></div></div><div class="para">
+		</div></div></div></div><hr /></div><div class="toc"><dl class="toc"><dt><span class="preface"><a href="#pref-Security_Guide-Preface">Preface</a></span></dt><dd><dl><dt><span class="section"><a href="#idm219193538624">1. Document Conventions</a></span></dt><dd><dl><dt><span class="section"><a href="#idm219193597216">1.1. Typographic Conventions</a></span></dt><dt><span class="section"><a href="#idm219154254304">1.2. Pull-quote Conventions</a></span></dt><dt><span class="section"><a href="#idm219169487120">1.3. Notes and Warnings</a></span></dt></dl></dd><dt><span class="section"><a href="#idm219170528208">2. We Need Feedback!</a></span></dt></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Security_Overview">1. Security Overview</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Security">1.1. Introduction to Security</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Se
 curity-What_is_Computer_Security">1.1.1. What is Computer Security?</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Security-SELinux">1.1.2. SELinux</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Security-Security_Controls">1.1.3. Security Controls</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Introduction_to_Security-Conclusion">1.1.4. Conclusion</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities">1.2. Attackers and Vulnerabilities</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities-A_Quick_History_of_Hackers">1.2.1. A Quick History of Hackers</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security">1.2.2. Threats to Network Security</a></span></dt><dt><span class="section"><a href="#s
 ect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security">1.2.3. Threats to Server Security</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security">1.2.4. Threats to Workstation and Home PC Security</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Vulnerability_Assessment">1.3. Vulnerability Assessment</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Vulnerability_Assessment-Thinking_Like_the_Enemy">1.3.1. Thinking Like the Enemy</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing">1.3.2. Defining Assessment and Testing</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools">1.3.3. Evaluating the Tools</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Secu
 rity_Guide-Common_Exploits_and_Attacks">1.4. Common Exploits and Attacks</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Security_Updates">1.5. Security Updates</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Security_Updates-Updating_Packages">1.5.1. Updating Packages</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages">1.5.2. Verifying Signed Packages</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Updating_Packages-Installing_Signed_Packages">1.5.3. Installing Signed Packages</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Updating_Packages-Applying_the_Changes">1.5.4. Applying the Changes</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Basic_Hardening">2. Basic Hardening Guide</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardenin
 g-General_Principles">2.1. General Principles</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-Physical_Security">2.2. Physical Security</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-Physical_Security-Why_is_this_important">2.3. Why this is important</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-Networking">2.4. Networking</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-Networking-iptables">2.4.1. iptables</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-Networking-IPv6">2.4.2. IPv6</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-Up_to_date">2.5. Keeping software up to date</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-Services">2.6. Services</a></span></dt><dt><span class="section"><a
  href="#sect-Security_Guide-Basic_Hardening-NTP">2.7. NTP</a></span></dt></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Securing_Your_Network">3. Securing Your Network</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security">3.1. Workstation Security</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Evaluating_Workstation_Security">3.1.1. Evaluating Workstation Security</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-BIOS_and_Boot_Loader_Security">3.1.2. BIOS and Boot Loader Security</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Password_Security">3.1.3. Password Security</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Administrative_Controls">3.1.4. Administrative Controls</a></span></dt><dt><span class="section"><a href="#sect-Sec
 urity_Guide-Workstation_Security-Available_Network_Services">3.1.5. Available Network Services</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Personal_Firewalls">3.1.6. Personal Firewalls</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Security_Enhanced_Communication_Tools">3.1.7. Security Enhanced Communication Tools</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Server_Security">3.2. Server Security</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_Services_With_TCP_Wrappers_and_xinetd">3.2.1. Securing Services With TCP Wrappers and xinetd</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_Portmap">3.2.2. Securing Portmap</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_NIS">3.2.3. Securing NIS</a></span></dt
 ><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_NFS">3.2.4. Securing NFS</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server">3.2.5. Securing the Apache HTTP Server</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_FTP">3.2.6. Securing FTP</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_Sendmail">3.2.7. Securing Sendmail</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening">3.2.8. Verifying Which Ports Are Listening</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO">3.3. Single Sign-on (SSO)</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-Introduction">3.3.1. Introduction</a></span></dt><dt><span class="section"><a h
 ref="#sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card">3.3.2. Getting Started with your new Smart Card</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works">3.3.3. How Smart Card Enrollment Works</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works">3.3.4. How Smart Card Login Works</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO">3.3.5. Configuring Firefox to use Kerberos for SSO</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Multifactor_Authentication">3.4. Multifactor Authentication Solutions</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Multifactor_Authentication-Yubikey">3.4.1. Yubikey</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Securit
 y_Guide-Pluggable_Authentication_Modules_PAM">3.5. Pluggable Authentication Modules (PAM)</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Advantages_of_PAM">3.5.1. Advantages of PAM</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files">3.5.2. PAM Configuration Files</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format">3.5.3. PAM Configuration File Format</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files">3.5.4. Sample PAM Configuration Files</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules">3.5.5. Creating PAM Modules</a></span></dt><dt><span class="section"><a href="#sect-Securit
 y_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching">3.5.6. PAM and Administrative Credential Caching</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership">3.5.7. PAM and Device Ownership</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources">3.5.8. Additional Resources</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd">3.6. TCP Wrappers and xinetd</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers">3.6.1. TCP Wrappers</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files">3.6.2. TCP Wrappers Configuration Files</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and
 _xinetd-xinetd">3.6.3. xinetd</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files">3.6.4. xinetd Configuration Files</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources">3.6.5. Additional Resources</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Kerberos">3.7. Kerberos</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-What_is_Kerberos">3.7.1. What is Kerberos?</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Kerberos_Terminology">3.7.2. Kerberos Terminology</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-How_Kerberos_Works">3.7.3. How Kerberos Works</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Kerberos_and_PAM">3.7.4. Kerberos and PAM</a></span></dt><dt><span class="section"><a
  href="#sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server">3.7.5. Configuring a Kerberos 5 Server</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client">3.7.6. Configuring a Kerberos 5 Client</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping">3.7.7. Domain-to-Realm Mapping</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs">3.7.8. Setting Up Secondary KDCs</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication">3.7.9. Setting Up Cross Realm Authentication</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Additional_Resources">3.7.10. Additional Resources</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Using_Firewalls">3.8. Using Firewalls</a></span></dt><dd><dl><dt><span class
 ="section"><a href="#sec-Introduction_to_firewalld">3.8.1. Introduction to firewalld</a></span></dt><dt><span class="section"><a href="#sec-Understanding_firewalld">3.8.2. Understanding firewalld</a></span></dt><dt><span class="section"><a href="#sec-Comparison_of_Firewalld_to_system-config-firewall">3.8.3. Comparison of Firewalld to system-config-firewall and iptables</a></span></dt><dt><span class="section"><a href="#sec-Understanding_Network_Zones">3.8.4. Understanding Network Zones</a></span></dt><dt><span class="section"><a href="#sec-Choosing_a_Network_Zone">3.8.5. Choosing a Network Zone</a></span></dt><dt><span class="section"><a href="#sec-Understanding_Predefined_Services">3.8.6. Understanding Predefined Services</a></span></dt><dt><span class="section"><a href="#sec-Understanding_the_direct_interface">3.8.7. Understanding The Direct Interface</a></span></dt><dt><span class="section"><a href="#sec-Check_if_firewalld_is_installed">3.8.8. Check if firewalld is instal
 led</a></span></dt><dt><span class="section"><a href="#sec-Disabling_firewalld">3.8.9. Disabling firewalld</a></span></dt><dt><span class="section"><a href="#sec-Start_firewalld">3.8.10. Start firewalld</a></span></dt><dt><span class="section"><a href="#sec-Check_if_firewalld_is_running">3.8.11. Check if firewalld is running</a></span></dt><dt><span class="section"><a href="#sec-Installing_firewalld">3.8.12. Installing firewalld</a></span></dt><dt><span class="section"><a href="#sec-Configuring_the_Firewall">3.8.13. Configuring the Firewall</a></span></dt><dt><span class="section"><a href="#sec-firewalld-additional_resources">3.8.14. Additional Resources</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Encryption">4. Encryption</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Data_at_Rest">4.1. Data at Rest</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Encrypti
 on-Protecting_Data_at_Rest-Full_Disk_Encryption">4.1.1. Full Disk Encryption</a></span></dt><dt><span class="section"><a href="#Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption">4.1.2. File Based Encryption</a></span></dt></dl></dd><dt><span class="section"><a href="#Security_Guide-Encryption-Data_in_Motion">4.2. Data in Motion</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs">4.2.1. Virtual Private Networks (VPNs)</a></span></dt><dt><span class="section"><a href="#Security_Guide-Encryption-Data_in_Motion-Secure_Shell">4.2.2. Secure Shell</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption">4.2.3. LUKS Disk Encryption</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives">4.2.4. 7-Zip Encrypted Archives</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG">4.2.5. 
 Using GNU Privacy Guard (GnuPG)</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-General_Principles_of_Information_Security">5. General Principles of Information Security</a></span></dt><dt><span class="chapter"><a href="#chap-Security_Guide-Secure_Installation">6. Secure Installation</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Secure_Installation-Disk_Partitions">6.1. Disk Partitions</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption">6.2. Utilize LUKS Partition Encryption</a></span></dt></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-Software_Maintenance">7. Software Maintenance</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Software_Maintenance-Install_Minimal_Software">7.1. Install Minimal Software</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Softw
 are_Maintenance-Plan_and_Configure_Security_Updates">7.2. Plan and Configure Security Updates</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates">7.3. Adjusting Automatic Updates</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories">7.4. Install Signed Packages from Well Known Repositories</a></span></dt></dl></dd><dt><span class="chapter"><a href="#chap-Security_Guide-CVE">8. Common Vulnerabilities and Exposures</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-CVE-yum_plugin">8.1. YUM Plugin</a></span></dt></dl></dd><dt><span class="chapter"><a href="#idm219186749536">9. SELinux</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Introduction">9.1. Introduction</a></span></dt><dd><dl><dt><span class="section"><a hre
 f="#sect-Security-Enhanced_Linux-Introduction-Benefits_of_running_SELinux">9.1.1. Benefits of running SELinux</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Introduction-Examples">9.1.2. Examples</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Introduction-SELinux_Architecture">9.1.3. SELinux Architecture</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Introduction-SELinux_on_Other_Operating_Systems">9.1.4. SELinux on Other Operating Systems</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-SELinux_Contexts">9.2. SELinux Contexts</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-SELinux_Contexts-Domain_Transitions">9.2.1. Domain Transitions</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-SELinux_Contexts-SELinux_Contexts_for_Processes">9.2.2. SELinux Contexts for Processe
 s</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-SELinux_Contexts-SELinux_Contexts_for_Users">9.2.3. SELinux Contexts for Users</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Targeted_Policy">9.3. Targeted Policy</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Targeted_Policy-Confined_Processes">9.3.1. Confined Processes</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Targeted_Policy-Unconfined_Processes">9.3.2. Unconfined Processes</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Targeted_Policy-Confined_and_Unconfined_Users">9.3.3. Confined and Unconfined Users</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux">9.4. Working with SELinux</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_S
 ELinux-SELinux_Packages">9.4.1. SELinux Packages</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-Which_Log_File_is_Used">9.4.2. Which Log File is Used</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-Main_Configuration_File">9.4.3. Main Configuration File</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-Enabling_and_Disabling_SELinux">9.4.4. Enabling and Disabling SELinux</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-SELinux_Modes">9.4.5. SELinux Modes</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-Booleans">9.4.6. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-SELinux_Contexts_Labeling_Files">9.4.7. SELinux Contexts - Labeling Files</a></span></dt><dt
 ><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-The_file_t_and_default_t_Types">9.4.8. The file_t and default_t Types</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-Mounting_File_Systems">9.4.9. Mounting File Systems</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-Maintaining_SELinux_Labels_">9.4.10. Maintaining SELinux Labels </a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Confining_Users">9.5. Confining Users</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Confining_Users-Linux_and_SELinux_User_Mappings">9.5.1. Linux and SELinux User Mappings</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Confining_Users-Confining_New_Linux_Users_useradd">9.5.2. Confining New Linux Users: useradd</a></span></dt><dt><span class="section"
 ><a href="#sect-Security-Enhanced_Linux-Confining_Users-Confining_Existing_Linux_Users_semanage_login">9.5.3. Confining Existing Linux Users: semanage login</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Confining_Users-Changing_the_Default_Mapping">9.5.4. Changing the Default Mapping</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Confining_Users-xguest_Kiosk_Mode">9.5.5. xguest: Kiosk Mode</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Confining_Users-Booleans_for_Users_Executing_Applications">9.5.6. Booleans for Users Executing Applications</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Troubleshooting">9.6. Troubleshooting</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Troubleshooting-What_Happens_when_Access_is_Denied">9.6.1. What Happens when Access is Denied</a></span></dt><dt><span class=
 "section"><a href="#sect-Security-Enhanced_Linux-Troubleshooting-Top_Three_Causes_of_Problems">9.6.2. Top Three Causes of Problems</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Troubleshooting-Fixing_Problems">9.6.3. Fixing Problems</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Further_Information">9.7. Further Information</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Further_Information-Contributors">9.7.1. Contributors</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Further_Information-Other_Resources">9.7.2. Other Resources</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="#idm219163491248">10. Managing Confined Services</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-Introduction">10.1. Introduction</a></span></dt><dt><span class="section"><a href="#sect-Manag
 ing_Confined_Services-Targeted_policy">10.2. Targeted policy</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-Targeted_policy-Type_Enforcement">10.2.1. Type Enforcement</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Targeted_policy-Confined_processes">10.2.2. Confined processes</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Targeted_policy-Unconfined_processes">10.2.3. Unconfined processes</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-The_Apache_HTTP_Server">10.3. The Apache HTTP Server</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-The_Apache_HTTP_Server-The_Apache_HTTP_Server_and_SELinux">10.3.1. The Apache HTTP Server and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-The_Apache_HTTP_Server-Types">10.3.2. Types</a></span></dt><
 dt><span class="section"><a href="#sect-Managing_Confined_Services-The_Apache_HTTP_Server-Booleans">10.3.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-The_Apache_HTTP_Server-Configuration_examples">10.3.4. Configuration examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-Samba">10.4. Samba</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-Samba-Samba_and_SELinux">10.4.1. Samba and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Samba-Types">10.4.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Samba-Booleans">10.4.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Samba-Configuration_examples">10.4.4. Configuration examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Ser
 vices-File_Transfer_Protocol">10.5. File Transfer Protocol</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-File_Transfer_Protocol-FTP_and_SELinux">10.5.1. FTP and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-File_Transfer_Protocol-Types">10.5.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-File_Transfer_Protocol-Booleans">10.5.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-File_Transfer_Protocol-Configuration_Examples">10.5.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-Network_File_System">10.6. Network File System</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-NFS-NFS_and_SELinux">10.6.1. NFS and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Serv
 ices-NFS-Types">10.6.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_services-NFS-Booleans">10.6.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-NFS-Configuration_Examples">10.6.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-Berkeley_Internet_Name_Domain">10.7. Berkeley Internet Name Domain</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-BIND-BIND_and_SELinux">10.7.1. BIND and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-BIND-Types">10.7.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-BIND-Booleans">10.7.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-BIND-Configuration_Examples">10.7.4. Configuration Examples</a></span></dt></dl></dd><dt><span cl
 ass="section"><a href="#sect-Managing_Confined_Services-Concurrent_Versioning_System">10.8. Concurrent Versioning System</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-Concurrent_Versioning_System-CVS_and_SELinux">10.8.1. CVS and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Concurrent_Versioning_System-Types">10.8.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Concurrent_Versioning_System-Booleans">10.8.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Concurrent_Versioning_System-Configuration_Examples">10.8.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-Squid_Caching_Proxy">10.9. Squid Caching Proxy</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-Squid_Caching_Proxy-Squid_Caching_Pro
 xy_and_SELinux">10.9.1. Squid Caching Proxy and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Squid_Caching_Proxy-Types">10.9.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Squid_Caching_Proxy-Booleans">10.9.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Squid_Caching_Proxy-Configuration_Examples">10.9.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-MySQL">10.10. MySQL</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-MySQL-MySQL_and_SELinux">10.10.1. MySQL and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-MySQL-Types">10.10.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-MySQL-Booleans">10.10.3. Booleans</a></span></dt><dt><span class="secti
 on"><a href="#sect-Managing_Confined_Services-MySQL-Configuration_Examples">10.10.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-PostgreSQL">10.11. PostgreSQL</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-PostgreSQL-PostgreSQL_and_SELinux">10.11.1. PostgreSQL and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-PostgreSQL-Types">10.11.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-PostgreSQL-Booleans">10.11.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-PostgreSQL-Configuration_Examples">10.11.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-rsync">10.12. rsync</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-rsync-rs
 ync_and_SELinux">10.12.1. rsync and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-rsync-Types">10.12.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-rsync-Booleans">10.12.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-rsync-Configuration_Examples">10.12.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-Postfix">10.13. Postfix</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-rsync-Postfix_and_SELinux">10.13.1. Postfix and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Postfix-Types">10.13.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Postfix-Booleans">10.13.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Se
 rvices-Postfix-Configuration_Examples">10.13.4. Configuration Examples</a></span></dt></dl></dd></dl></dd><dt><span class="appendix"><a href="#chap-Security_Guide-Encryption_Standards">A. Encryption Standards</a></span></dt><dd><dl><dt><span class="section"><a href="#idm219146240096">A.1. Synchronous Encryption</a></span></dt><dd><dl><dt><span class="section"><a href="#idm219149369776">A.1.1. Advanced Encryption Standard - AES</a></span></dt><dt><span class="section"><a href="#idm219200445568">A.1.2.  Data Encryption Standard - DES</a></span></dt></dl></dd><dt><span class="section"><a href="#idm219188760912">A.2. Public-key Encryption</a></span></dt><dd><dl><dt><span class="section"><a href="#idm219222932576">A.2.1. Diffie-Hellman</a></span></dt><dt><span class="section"><a href="#idm219166358336">A.2.2. RSA</a></span></dt><dt><span class="section"><a href="#idm219200249696">A.2.3. DSA</a></span></dt><dt><span class="section"><a href="#idm219171942368">A.2.4. SSL/TLS</a></sp
 an></dt><dt><span class="section"><a href="#idm219203403776">A.2.5. Cramer-Shoup Cryptosystem</a></span></dt><dt><span class="section"><a href="#idm219203402400">A.2.6. ElGamal Encryption</a></span></dt></dl></dd></dl></dd><dt><span class="appendix"><a href="#appe-Publican-Revision_History">B. Revision History</a></span></dt></dl></div><div xml:lang="en-US" class="preface" id="pref-Security_Guide-Preface" lang="en-US"><div class="titlepage"><div><div><h1 class="title">Preface</h1></div></div></div><div xml:lang="en-US" class="section" id="idm219193538624" lang="en-US"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title" id="idm219193538624">1. Document Conventions</h2></div></div></div><div class="para">
 		This manual uses several conventions to highlight certain words and phrases and draw attention to specific pieces of information.
 	</div><div class="para">
 		In PDF and paper editions, this manual uses typefaces drawn from the <a href="https://fedorahosted.org/liberation-fonts/">Liberation Fonts</a> set. The Liberation Fonts set is also used in HTML editions if the set is installed on your system. If not, alternative but equivalent typefaces are displayed. Note: Red Hat Enterprise Linux 5 and later includes the Liberation Fonts set by default.
-	</div><div class="section" id="idm218979323696"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm218979323696">1.1. Typographic Conventions</h3></div></div></div><div class="para">
+	</div><div class="section" id="idm219193597216"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219193597216">1.1. Typographic Conventions</h3></div></div></div><div class="para">
 			Four typographic conventions are used to call attention to specific words and phrases. These conventions, and the circumstances they apply to, are as follows.
 		</div><div class="para">
 			<code class="literal">Mono-spaced Bold</code>
@@ -83,7 +83,7 @@
 			Aside from standard usage for presenting the title of a work, italics denotes the first use of a new and important term. For example:
 		</div><div class="blockquote"><blockquote class="blockquote"><div class="para">
 				Publican is a <em class="firstterm">DocBook</em> publishing system.
-			</div></blockquote></div></div><div class="section" id="idm218930783520"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm218930783520">1.2. Pull-quote Conventions</h3></div></div></div><div class="para">
+			</div></blockquote></div></div><div class="section" id="idm219154254304"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219154254304">1.2. Pull-quote Conventions</h3></div></div></div><div class="para">
 			Terminal output and source code listings are set off visually from the surrounding text.
 		</div><div class="para">
 			Output sent to a terminal is set in <code class="computeroutput">mono-spaced roman</code> and presented thus:
@@ -108,7 +108,7 @@ books_tests  Desktop1  downloads      images  notes  scripts  svgs</pre><div cla
 
       System.<span class="perl_Function">out</span>.<span class="perl_Function">println</span>(<span class="perl_String">"Echo.echo('Hello') = "</span> + echo.<span class="perl_Function">echo</span>(<span class="perl_String">"Hello"</span>));
    }
-}</pre></div><div class="section" id="idm218933409680"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm218933409680">1.3. Notes and Warnings</h3></div></div></div><div class="para">
+}</pre></div><div class="section" id="idm219169487120"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219169487120">1.3. Notes and Warnings</h3></div></div></div><div class="para">
 			Finally, we use three visual styles to draw attention to information that might otherwise be overlooked.
 		</div><div class="note"><div class="admonition_header"><h2>Note</h2></div><div class="admonition"><div class="para">
 				Notes are tips, shortcuts or alternative approaches to the task at hand. Ignoring a note should have no negative consequences, but you might miss out on a trick that makes your life easier.
@@ -116,7 +116,7 @@ books_tests  Desktop1  downloads      images  notes  scripts  svgs</pre><div cla
 				Important boxes detail things that are easily missed: configuration changes that only apply to the current session, or services that need restarting before an update will apply. Ignoring a box labeled 'Important' will not cause data loss but may cause irritation and frustration.
 			</div></div></div><div class="warning"><div class="admonition_header"><h2>Warning</h2></div><div class="admonition"><div class="para">
 				Warnings should not be ignored. Ignoring warnings will most likely cause data loss.
-			</div></div></div></div></div><div xml:lang="en-US" class="section" id="idm219023054224" lang="en-US"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title" id="idm219023054224">2. We Need Feedback!</h2></div></div></div><a id="idm219032790544" class="indexterm"></a><div class="para">
+			</div></div></div></div></div><div xml:lang="en-US" class="section" id="idm219170528208" lang="en-US"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title" id="idm219170528208">2. We Need Feedback!</h2></div></div></div><a id="idm219174906000" class="indexterm"></a><div class="para">
 		If you find a typographical error in this manual, or if you have thought of a way to make this manual better, we would love to hear from you! Please submit a report in Bugzilla: <a href="http://bugzilla.redhat.com/bugzilla/">http://bugzilla.redhat.com/bugzilla/</a> against the product <span class="application"><strong>Fedora.</strong></span>
 	</div><div class="para">
 		When submitting a bug report, be sure to mention the manual's identifier: <em class="citetitle">security-guide</em>
@@ -129,7 +129,7 @@ books_tests  Desktop1  downloads      images  notes  scripts  svgs</pre><div cla
 	</div><div xml:lang="en-US" class="section" id="sect-Security_Guide-Introduction_to_Security" lang="en-US"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">1.1. Introduction to Security</h2></div></div></div><div class="section" id="sect-Security_Guide-Introduction_to_Security-What_is_Computer_Security"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.1.1. What is Computer Security?</h3></div></div></div><div class="para">
 			Computer security is a general term that covers a wide area of computing and information processing. Industries that depend on computer systems and networks to conduct daily business transactions and access crucial information regard their data as an important part of their overall assets. Several terms and metrics have entered our daily business vocabulary, such as total cost of ownership (TCO) and quality of service (QoS). Using these metrics, industries can calculate aspects such as data integrity and high-availability as part of their planning and process management costs. In some industries, such as electronic commerce, the availability and trustworthiness of data can be the difference between success and failure.
 		</div><div class="section" id="sect-Security_Guide-What_is_Computer_Security-How_did_Computer_Security_Come_about"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.1.1.1. How did Computer Security Come about?</h4></div></div></div><div class="para">
-				Information security has evolved over the years due to the increasing reliance on public networks not to disclose personal, financial, and other restricted information. There are numerous instances such as the Mitnick <a href="#ftn.idm219028032784" class="footnote"><sup class="footnote" id="idm219028032784">[1]</sup></a>and the Vladimir Levin <a href="#ftn.idm219000717616" class="footnote"><sup class="footnote" id="idm219000717616">[2]</sup></a>cases that prompted organizations across all industries to re-think the way they handle information, as well as its transmission and disclosure. The popularity of the Internet was one of the most important developments that prompted an intensified effort in data security.
+				Information security has evolved over the years due to the increasing reliance on public networks not to disclose personal, financial, and other restricted information. There are numerous instances such as the Mitnick <a href="#ftn.idm219170852736" class="footnote"><sup class="footnote" id="idm219170852736">[1]</sup></a>and the Vladimir Levin <a href="#ftn.idm219187293536" class="footnote"><sup class="footnote" id="idm219187293536">[2]</sup></a>cases that prompted organizations across all industries to re-think the way they handle information, as well as its transmission and disclosure. The popularity of the Internet was one of the most important developments that prompted an intensified effort in data security.
 			</div><div class="para">
 				An ever-growing number of people are using their personal computers to gain access to the resources that the Internet has to offer. From research and information retrieval to electronic mail and commerce transaction, the Internet has been regarded as one of the most important developments of the 20th century.
 			</div><div class="para">
@@ -137,19 +137,19 @@ books_tests  Desktop1  downloads      images  notes  scripts  svgs</pre><div cla
 			</div></div><div class="section" id="sect-Security_Guide-What_is_Computer_Security-Security_Today"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.1.1.2. Security Today</h4></div></div></div><div class="para">
 				In February of 2000, a Distributed Denial of Service (DDoS) attack was unleashed on several of the most heavily-trafficked sites on the Internet. The attack rendered yahoo.com, cnn.com, amazon.com, fbi.gov, and several other sites completely unreachable to normal users, as it tied up routers for several hours with large-byte ICMP packet transfers, also called a <em class="firstterm">ping flood</em>. The attack was brought on by unknown assailants using specially created, widely available programs that scanned vulnerable network servers, installed client applications called <em class="firstterm">trojans</em> on the servers, and timed an attack with every infected server flooding the victim sites and rendering them unavailable. Many blame the attack on fundamental flaws in the way routers and the protocols used are structured to accept all incoming data, no matter where or for what purpose the packets are sent.
 			</div><div class="para">
-				In 2007, a data breach exploiting the widely-known weaknesses of the Wired Equivalent Privacy (WEP) wireless encryption protocol resulted in the theft from a global financial institution of over 45 million credit card numbers.<a href="#ftn.idm219000722400" class="footnote"><sup class="footnote" id="idm219000722400">[3]</sup></a>
+				In 2007, a data breach exploiting the widely-known weaknesses of the Wired Equivalent Privacy (WEP) wireless encryption protocol resulted in the theft from a global financial institution of over 45 million credit card numbers.<a href="#ftn.idm219187298240" class="footnote"><sup class="footnote" id="idm219187298240">[3]</sup></a>
 			</div><div class="para">
-				In a separate incident, the billing records of over 2.2 million patients stored on a backup tape were stolen from the front seat of a courier's car.<a href="#ftn.idm218973234784" class="footnote"><sup class="footnote" id="idm218973234784">[4]</sup></a>
+				In a separate incident, the billing records of over 2.2 million patients stored on a backup tape were stolen from the front seat of a courier's car.<a href="#ftn.idm219172810432" class="footnote"><sup class="footnote" id="idm219172810432">[4]</sup></a>
 			</div><div class="para">
-				Currently, an estimated 1.8 billion people use or have used the Internet worldwide.<a href="#ftn.idm218973235904" class="footnote"><sup class="footnote" id="idm218973235904">[5]</sup></a> At the same time:
+				Currently, an estimated 1.8 billion people use or have used the Internet worldwide.<a href="#ftn.idm219172811552" class="footnote"><sup class="footnote" id="idm219172811552">[5]</sup></a> At the same time:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
-						On any given day, there are approximately 225 major incidences of security breach reported to the CERT Coordination Center at Carnegie Mellon University.<a href="#ftn.idm218973237840" class="footnote"><sup class="footnote" id="idm218973237840">[6]</sup></a>
+						On any given day, there are approximately 225 major incidences of security breach reported to the CERT Coordination Center at Carnegie Mellon University.<a href="#ftn.idm219172813488" class="footnote"><sup class="footnote" id="idm219172813488">[6]</sup></a>
 					</div></li><li class="listitem"><div class="para">
-						In 2003, the number of CERT reported incidences jumped to 137,529 from 82,094 in 2002 and from 52,658 in 2001.<a href="#ftn.idm218973240384" class="footnote"><sup class="footnote" id="idm218973240384">[7]</sup></a>
+						In 2003, the number of CERT reported incidences jumped to 137,529 from 82,094 in 2002 and from 52,658 in 2001.<a href="#ftn.idm219172816032" class="footnote"><sup class="footnote" id="idm219172816032">[7]</sup></a>
 					</div></li><li class="listitem"><div class="para">
-						The worldwide economic impact of the three most dangerous Internet Viruses of the last three years was estimated at US$13.2 Billion.<a href="#ftn.idm219010187392" class="footnote"><sup class="footnote" id="idm219010187392">[8]</sup></a>
+						The worldwide economic impact of the three most dangerous Internet Viruses of the last three years was estimated at US$13.2 Billion.<a href="#ftn.idm219101748096" class="footnote"><sup class="footnote" id="idm219101748096">[8]</sup></a>
 					</div></li></ul></div><div class="para">
-				From a 2008 global survey of business and technology executives "The Global State of Information Security"<a href="#ftn.idm219010189648" class="footnote"><sup class="footnote" id="idm219010189648">[9]</sup></a>, undertaken by <span class="emphasis"><em>CIO Magazine</em></span>, some points are:
+				From a 2008 global survey of business and technology executives "The Global State of Information Security"<a href="#ftn.idm219101750192" class="footnote"><sup class="footnote" id="idm219101750192">[9]</sup></a>, undertaken by <span class="emphasis"><em>CIO Magazine</em></span>, some points are:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						Just 43% of respondents audit or monitor user compliance with security policies
 					</div></li><li class="listitem"><div class="para">
@@ -265,7 +265,7 @@ books_tests  Desktop1  downloads      images  notes  scripts  svgs</pre><div cla
 			</div><div class="para">
 				Refer to <a class="xref" href="#sect-Security_Guide-Security_Updates">Section 1.5, “Security Updates”</a> for more information about keeping a system up-to-date.
 			</div></div><div class="section" id="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.2.3.3. Inattentive Administration</h4></div></div></div><div class="para">
-				Administrators who fail to patch their systems are one of the greatest threats to server security. According to the <em class="firstterm">SysAdmin, Audit, Network, Security Institute</em> (<em class="firstterm">SANS</em>), the primary cause of computer security vulnerability is to "assign untrained people to maintain security and provide neither the training nor the time to make it possible to do the job."<a href="#ftn.idm219030342032" class="footnote"><sup class="footnote" id="idm219030342032">[10]</sup></a> This applies as much to inexperienced administrators as it does to overconfident or amotivated administrators.
+				Administrators who fail to patch their systems are one of the greatest threats to server security. According to the <em class="firstterm">SysAdmin, Audit, Network, Security Institute</em> (<em class="firstterm">SANS</em>), the primary cause of computer security vulnerability is to "assign untrained people to maintain security and provide neither the training nor the time to make it possible to do the job."<a href="#ftn.idm219216954576" class="footnote"><sup class="footnote" id="idm219216954576">[10]</sup></a> This applies as much to inexperienced administrators as it does to overconfident or amotivated administrators.
 			</div><div class="para">
 				Some administrators fail to patch their servers and workstations, while others fail to watch log messages from the system kernel or network traffic. Another common error is when default passwords or keys to services are left unchanged. For example, some databases have default administration passwords because the database developers assume that the system administrator changes these passwords immediately after installation. If a database administrator fails to change this password, even an inexperienced cracker can use a widely-known default password to gain administrative privileges to the database. These are only a few examples of how inattentive administration can lead to compromised servers.
 			</div></div><div class="section" id="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.2.3.4. Inherently Insecure Services</h4></div></div></div><div class="para">
@@ -540,47 +540,43 @@ PORT    STATE  SERVICE
 						In the previous examples, replace <em class="replaceable"><code>&lt;PID&gt;</code></em> with the process identification number (found in the second column of the <code class="command">ps</code> command) for an IMAP session.
 					</div><div class="para">
 						To kill all active IMAP sessions, issue the following command:
-					</div><pre class="screen"><code class="command">killall imapd</code></pre></dd></dl></div></div></div><div class="footnotes"><br /><hr width="100" align="left" /><div id="ftn.idm219028032784" class="footnote"><div class="para"><a href="#idm219028032784" class="para"><sup class="para">[1] </sup></a>
+					</div><pre class="screen"><code class="command">killall imapd</code></pre></dd></dl></div></div></div><div class="footnotes"><br /><hr width="100" align="left" /><div id="ftn.idm219170852736" class="footnote"><div class="para"><a href="#idm219170852736" class="para"><sup class="para">[1] </sup></a>
 					http://law.jrank.org/pages/3791/Kevin-Mitnick-Case-1999.html
-				</div></div><div id="ftn.idm219000717616" class="footnote"><div class="para"><a href="#idm219000717616" class="para"><sup class="para">[2] </sup></a>
+				</div></div><div id="ftn.idm219187293536" class="footnote"><div class="para"><a href="#idm219187293536" class="para"><sup class="para">[2] </sup></a>
 					http://www.livinginternet.com/i/ia_hackers_levin.htm
-				</div></div><div id="ftn.idm219000722400" class="footnote"><div class="para"><a href="#idm219000722400" class="para"><sup class="para">[3] </sup></a>
+				</div></div><div id="ftn.idm219187298240" class="footnote"><div class="para"><a href="#idm219187298240" class="para"><sup class="para">[3] </sup></a>
 					http://www.theregister.co.uk/2007/05/04/txj_nonfeasance/
-				</div></div><div id="ftn.idm218973234784" class="footnote"><div class="para"><a href="#idm218973234784" class="para"><sup class="para">[4] </sup></a>
+				</div></div><div id="ftn.idm219172810432" class="footnote"><div class="para"><a href="#idm219172810432" class="para"><sup class="para">[4] </sup></a>
 					http://www.healthcareitnews.com/story.cms?id=9408
-				</div></div><div id="ftn.idm218973235904" class="footnote"><div class="para"><a href="#idm218973235904" class="para"><sup class="para">[5] </sup></a>
+				</div></div><div id="ftn.idm219172811552" class="footnote"><div class="para"><a href="#idm219172811552" class="para"><sup class="para">[5] </sup></a>
 					http://www.internetworldstats.com/stats.htm
-				</div></div><div id="ftn.idm218973237840" class="footnote"><div class="para"><a href="#idm218973237840" class="para"><sup class="para">[6] </sup></a>
+				</div></div><div id="ftn.idm219172813488" class="footnote"><div class="para"><a href="#idm219172813488" class="para"><sup class="para">[6] </sup></a>
 							http://www.cert.org
-						</div></div><div id="ftn.idm218973240384" class="footnote"><div class="para"><a href="#idm218973240384" class="para"><sup class="para">[7] </sup></a>
+						</div></div><div id="ftn.idm219172816032" class="footnote"><div class="para"><a href="#idm219172816032" class="para"><sup class="para">[7] </sup></a>
 							http://www.cert.org/stats/fullstats.html
-						</div></div><div id="ftn.idm219010187392" class="footnote"><div class="para"><a href="#idm219010187392" class="para"><sup class="para">[8] </sup></a>
+						</div></div><div id="ftn.idm219101748096" class="footnote"><div class="para"><a href="#idm219101748096" class="para"><sup class="para">[8] </sup></a>
 							http://www.newsfactor.com/perl/story/16407.html
-						</div></div><div id="ftn.idm219010189648" class="footnote"><div class="para"><a href="#idm219010189648" class="para"><sup class="para">[9] </sup></a>
+						</div></div><div id="ftn.idm219101750192" class="footnote"><div class="para"><a href="#idm219101750192" class="para"><sup class="para">[9] </sup></a>
 					http://www.csoonline.com/article/454939/The_Global_State_of_Information_Security_
-				</div></div><div id="ftn.idm219030342032" class="footnote"><div class="para"><a href="#idm219030342032" class="para"><sup class="para">[10] </sup></a>
+				</div></div><div id="ftn.idm219216954576" class="footnote"><div class="para"><a href="#idm219216954576" class="para"><sup class="para">[10] </sup></a>
 					http://www.sans.org/resources/errors.php
-				</div></div></div></div><div xml:lang="en-US" class="chapter" id="chap-Security_Guide-Basic_Hardening" lang="en-US"><div class="titlepage"><div><div><h1 class="title">Chapter 2. Basic Hardening Guide</h1></div></div></div><div class="toc"><dl class="toc"><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-General_Principles">2.1. General Principles</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-General_Principles-Why_is_this_important">2.2. Why is this important?</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-Physical_Security">2.3. Physical Security</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-Physical_Security-Why_is_this_important">2.4. Why this is important</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-Networking">2.5. Networking</a></span></dt><dd><dl><dt><span class="section"><a href
 ="#sect-Security_Guide-Basic_Hardening-Networking-iptables">2.5.1. iptables</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-Networking-IPv6">2.5.2. IPv6</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-Up_to_date">2.6. Keeping software up to date</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-Services">2.7. Services</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-NTP">2.8. NTP</a></span></dt></dl></div><div class="para">
-		The <a href="http://www.nsa.gov">US National Security Agency</a> (NSA) has developed two guides for hardening a default installation of Red Hat Enterprise Linux 5. Many of the tips provided in these guides are also valid for installations of Fedora. This Basic Hardening Guide will cover portions of the NSA's Hardening Tips and will explain why implementing these tips are important. This document does not represent the full NSA Hardening Guide.
-	</div><div class="para">
-		As with any change to a system these changes could cause unintended results. Changes should be evaluated for appropriateness on your system before implementing.
+				</div></div></div></div><div xml:lang="en-US" class="chapter" id="chap-Security_Guide-Basic_Hardening" lang="en-US"><div class="titlepage"><div><div><h1 class="title">Chapter 2. Basic Hardening Guide</h1></div></div></div><div class="toc"><dl class="toc"><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-General_Principles">2.1. General Principles</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-Physical_Security">2.2. Physical Security</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-Physical_Security-Why_is_this_important">2.3. Why this is important</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-Networking">2.4. Networking</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-Networking-iptables">2.4.1. iptables</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hard
 ening-Networking-IPv6">2.4.2. IPv6</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-Up_to_date">2.5. Keeping software up to date</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-Services">2.6. Services</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Basic_Hardening-NTP">2.7. NTP</a></span></dt></dl></div><div class="para">
+		Every computer system should be hardened against threats found both over the network as well as those found physically at the computer. The system changes are necessary based on default settings usually being set to allow software to work over the software being secure. As with any change to a system these changes could cause unintended results. Changes should be evaluated for appropriateness on your system before implementing.
 	</div><div class="section" id="sect-Security_Guide-Basic_Hardening-General_Principles"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.1. General Principles</h2></div></div></div><div class="para">
 			<table border="0" summary="Simple list" class="simplelist"><tr><td>Encrypt all data transmitted over the network. Encrypting authentication information (such as passwords) is particularly important.</td></tr><tr><td>Minimize the amount of software installed and running in order to minimize vulnerability.</td></tr><tr><td>Use security-enhancing software and tools whenever available (e.g. SELinux and IPTables).</td></tr><tr><td>Run each network service on a separate server whenever possible. This minimizes the risk that a compromise of one service could lead to a compromise of others.</td></tr><tr><td>Maintain user accounts. Create a good password policy and enforce its use. Delete unused user accounts.</td></tr><tr><td>Review system and application logs on a routine basis. Send logs to a dedicated log server. This prevents intruders from easily avoiding detection by modifying the local logs.</td></tr><tr><td>Never log in directly as root, unless absolutely necessary. Admin
 istrators should use <code class="command">sudo</code> to execute commands as root when required. The accounts capable of using sudo are specified in <code class="filename">/etc/sudoers</code>, which is edited with the visudo utility. By default, relevant logs are written to <code class="filename">/var/log/secure</code>.</td></tr></table>
-		</div></div><div class="section" id="sect-Security_Guide-Basic_Hardening-General_Principles-Why_is_this_important"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.2. Why is this important?</h2></div></div></div><div class="para">
-			The general principles from the NSA represent a best practices overview of security. There are items in the above list that probably won't be used by everyone and there are items missing that should be stressed as a best practice. Additional information on these ideas and others will be explained below.
-		</div></div><div class="section" id="sect-Security_Guide-Basic_Hardening-Physical_Security"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.3. Physical Security</h2></div></div></div><div class="para">
-			Physical security of the system is of utmost importance. Many of the suggestions given here won't protect your system if the attacker has physical access to the system.
-		</div><div class="important"><div class="admonition_header"><h2>Important</h2></div><div class="admonition"><div class="para">
-				This section contains information regarding GRUB Legacy and not the current release of GRUB (also known as GRUB2).
-			</div></div></div><div class="para">
-			Configure the BIOS to disable booting from CDs/DVDs, floppies, and external devices, and set a password to protect these settings. Next, set a password for the GRUB bootloader. Generate a password hash using the command <code class="command">/sbin/grub-md5-crypt</code>. Add the hash to the first line of <code class="command">/etc/grub.conf</code> using <code class="command">password --md5 'passwordhash'</code>. This prevents users from entering single user mode or changing settings at boot time.
-		</div></div><div class="section" id="sect-Security_Guide-Basic_Hardening-Physical_Security-Why_is_this_important"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.4. Why this is important</h2></div></div></div><div class="para">
+		</div></div><div class="section" id="sect-Security_Guide-Basic_Hardening-Physical_Security"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.2. Physical Security</h2></div></div></div><div class="para">
+			Physical security of the system is of utmost importance. Many of the suggestions given here won't protect your system if the attacker has physical access to the system. Physical access doesn't necessarily mean that the battle is lost, however. Strengthening your BIOS and boot software can help defend your system against certain types of attacks.
+		</div><div class="para">
+			Configuring the BIOS to disable booting from CDs/DVDs, floppies, and external devices, can prevent bypassing the boot partition and the boot loader where other protections are in place. It is important to password-protect your BIOS settings so that an attacker cannot just change these, and other, settings. Next, set a password for the GRUB bootloader. Use the <span class="application"><strong>grub2-mkpasswd-pbkdf2</strong></span> to create your password hash. This prevents users from entering single user mode or changing settings at boot time.
+		</div></div><div class="section" id="sect-Security_Guide-Basic_Hardening-Physical_Security-Why_is_this_important"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.3. Why this is important</h2></div></div></div><div class="para">
 			An attacker could take complete control of your system by booting from an external source. By booting from an external source (e.g. a live Linux CD) many of the security settings are bypassed. If the attacker can modify the GRUB settings they can boot into single user mode which allows admin access to the system.
-		</div></div><div class="section" id="sect-Security_Guide-Basic_Hardening-Networking"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.5. Networking</h2></div></div></div><div class="para">
+		</div><div class="para">
+			Additional explaination and hardening can be found in <a class="xref" href="#sect-Security_Guide-Workstation_Security-BIOS_and_Boot_Loader_Security">Section 3.1.2, “BIOS and Boot Loader Security”</a> of this guide.
+		</div></div><div class="section" id="sect-Security_Guide-Basic_Hardening-Networking"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.4. Networking</h2></div></div></div><div class="para">
 			The computer's network connection is the gateway to your system. Your files and processor time could be available to anyone who successfully connects to your system via this network connection if other safeguards have not been implemented. One of the primary ways to keep you in control of your system is to prevent the attackers from gaining access to your system in the first place.
-		</div><div class="section" id="sect-Security_Guide-Basic_Hardening-Networking-iptables"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.5.1. iptables</h3></div></div></div><div class="para">
+		</div><div class="section" id="sect-Security_Guide-Basic_Hardening-Networking-iptables"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.4.1. iptables</h3></div></div></div><div class="para">
 				<span class="application"><strong>iptables</strong></span> is the most widely used firewall software on Linux systems today. This program intercepts packets coming into your computer via the network connection and filters them according to rules you have specified.
-			</div></div><div class="section" id="sect-Security_Guide-Basic_Hardening-Networking-IPv6"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.5.2. IPv6</h3></div></div></div><div class="para">
+			</div></div><div class="section" id="sect-Security_Guide-Basic_Hardening-Networking-IPv6"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.4.2. IPv6</h3></div></div></div><div class="para">
 				IPv6 is the latest Internet protocol which aims to solve the address quantity shortfall inherent to IPv4. And while there are no security risks directly associated with the new protocol there are a few things to understand before utilizing this new technology.
 			</div><div class="para">
 				Most system administrators are familiar with IPv4 and the work-arounds that were put in place to make IPv4 work. One of these work-arounds is network address translation, or <em class="firstterm">NAT</em>. NAT is traditionally used to keep the number of needed public IP addresses to a minimum when setting up a local area network. Systems on these networks do not all require public IP addresses and valuable address space can be saved by implementing this technology. There are some security features that were side effects to NAT; the biggest being that outside traffic cannot make it inside the network unless a port is forwarded across the router. Because IPv6 solves the addressing problem there is no longer a need to use NAT. Everything can have a public IP address and, by extension, everything is not publically routable across the Internet when physical and logical connections are made.
@@ -588,11 +584,11 @@ PORT    STATE  SERVICE
 				Another thing to worry about is how security software deals with this new protocol. <span class="application"><strong>iptables</strong></span> does not know or understand IPv6 and so it ignores those packets altogether. That means if your network is utilizing IPv6 and you have not activated <span class="application"><strong>ip6tables</strong></span> then you have just left the door to your system open to the world.
 			</div><div class="para">
 				Using IPv6 is not dangerous as long as you know and understand the changes that your system's software went through to make it possible to use this new network protocol.
-			</div></div></div><div class="section" id="sect-Security_Guide-Basic_Hardening-Up_to_date"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.6. Keeping software up to date</h2></div></div></div><div class="para">
+			</div></div></div><div class="section" id="sect-Security_Guide-Basic_Hardening-Up_to_date"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.5. Keeping software up to date</h2></div></div></div><div class="para">
 			Software gets patched everyday. Some of these updates fix security problems that were identified by the developers. When these patches become available it is important that they are applied to your system as soon as possible. One of the easier ways to manage updates for your system is using <span class="application"><strong>yum</strong></span>. A special plugin is available to allow only security updates to be installed while ignoring bugfixes and enhancements. This plugin is explained better at <a class="xref" href="#sect-Security_Guide-CVE-yum_plugin">Section 8.1, “YUM Plugin”</a>.
-		</div></div><div class="section" id="sect-Security_Guide-Basic_Hardening-Services"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.7. Services</h2></div></div></div><div class="para">
+		</div></div><div class="section" id="sect-Security_Guide-Basic_Hardening-Services"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.6. Services</h2></div></div></div><div class="para">
 			Services in Linux are programs that run as daemons in the background. It is important to audit these programs regularly to determine if they need to be running. Many daemons open network ports in order to listen for calls. Having unnecessary ports open can harm the overall security of the system. An unknown security flaw in a piece of software can allow a hacker into a system for no good reason.
-		</div></div><div class="section" id="sect-Security_Guide-Basic_Hardening-NTP"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.8. NTP</h2></div></div></div><div class="para">
+		</div></div><div class="section" id="sect-Security_Guide-Basic_Hardening-NTP"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.7. NTP</h2></div></div></div><div class="para">
 			Network Time Protocol, or <em class="firstterm">NTP</em>, keeps the time on your systems accurate. Time is a very important piece of the security puzzle and should be maintained as precisely as possible. Time is used in log files, timestamps, and in encryption. If someone is able to control the time settings on one of your systems then they are able to make the recreation of a break-in that much more difficult.
 		</div></div></div><div xml:lang="en-US" class="chapter" id="chap-Security_Guide-Securing_Your_Network" lang="en-US"><div class="titlepage"><div><div><h1 class="title">Chapter 3. Securing Your Network</h1></div></div></div><div class="toc"><dl class="toc"><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security">3.1. Workstation Security</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Evaluating_Workstation_Security">3.1.1. Evaluating Workstation Security</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-BIOS_and_Boot_Loader_Security">3.1.2. BIOS and Boot Loader Security</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Password_Security">3.1.3. Password Security</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Administrative_Controls">3.1.4. Administrative Controls</a></span>
 </dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Available_Network_Services">3.1.5. Available Network Services</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Personal_Firewalls">3.1.6. Personal Firewalls</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Workstation_Security-Security_Enhanced_Communication_Tools">3.1.7. Security Enhanced Communication Tools</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Server_Security">3.2. Server Security</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_Services_With_TCP_Wrappers_and_xinetd">3.2.1. Securing Services With TCP Wrappers and xinetd</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_Portmap">3.2.2. Securing Portmap</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security
 -Securing_NIS">3.2.3. Securing NIS</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_NFS">3.2.4. Securing NFS</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server">3.2.5. Securing the Apache HTTP Server</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_FTP">3.2.6. Securing FTP</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Securing_Sendmail">3.2.7. Securing Sendmail</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening">3.2.8. Verifying Which Ports Are Listening</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO">3.3. Single Sign-on (SSO)</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-Introduction">3.3.1. Introduct
 ion</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card">3.3.2. Getting Started with your new Smart Card</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works">3.3.3. How Smart Card Enrollment Works</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works">3.3.4. How Smart Card Login Works</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO">3.3.5. Configuring Firefox to use Kerberos for SSO</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Multifactor_Authentication">3.4. Multifactor Authentication Solutions</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Multifactor_Authentication-Yubikey">3.4.1. Yubikey</a></span></dt></dl></dd
 ><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM">3.5. Pluggable Authentication Modules (PAM)</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Advantages_of_PAM">3.5.1. Advantages of PAM</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files">3.5.2. PAM Configuration Files</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format">3.5.3. PAM Configuration File Format</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files">3.5.4. Sample PAM Configuration Files</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules">3.5.5. Creating PAM Modules</a></span></dt
 ><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching">3.5.6. PAM and Administrative Credential Caching</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership">3.5.7. PAM and Device Ownership</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources">3.5.8. Additional Resources</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd">3.6. TCP Wrappers and xinetd</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers">3.6.1. TCP Wrappers</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files">3.6.2. TCP Wrappers Configuration Files</a></span></dt><dt><span class="sectio
 n"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd">3.6.3. xinetd</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files">3.6.4. xinetd Configuration Files</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources">3.6.5. Additional Resources</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Kerberos">3.7. Kerberos</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-What_is_Kerberos">3.7.1. What is Kerberos?</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Kerberos_Terminology">3.7.2. Kerberos Terminology</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-How_Kerberos_Works">3.7.3. How Kerberos Works</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Kerberos_and_PAM">3.7.4. Kerberos an
 d PAM</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server">3.7.5. Configuring a Kerberos 5 Server</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client">3.7.6. Configuring a Kerberos 5 Client</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping">3.7.7. Domain-to-Realm Mapping</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs">3.7.8. Setting Up Secondary KDCs</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication">3.7.9. Setting Up Cross Realm Authentication</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Kerberos-Additional_Resources">3.7.10. Additional Resources</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security_Guide-Using_Firewalls">3.8. Using
  Firewalls</a></span></dt><dd><dl><dt><span class="section"><a href="#sec-Introduction_to_firewalld">3.8.1. Introduction to firewalld</a></span></dt><dt><span class="section"><a href="#sec-Understanding_firewalld">3.8.2. Understanding firewalld</a></span></dt><dt><span class="section"><a href="#sec-Comparison_of_Firewalld_to_system-config-firewall">3.8.3. Comparison of Firewalld to system-config-firewall and iptables</a></span></dt><dt><span class="section"><a href="#sec-Understanding_Network_Zones">3.8.4. Understanding Network Zones</a></span></dt><dt><span class="section"><a href="#sec-Choosing_a_Network_Zone">3.8.5. Choosing a Network Zone</a></span></dt><dt><span class="section"><a href="#sec-Understanding_Predefined_Services">3.8.6. Understanding Predefined Services</a></span></dt><dt><span class="section"><a href="#sec-Understanding_the_direct_interface">3.8.7. Understanding The Direct Interface</a></span></dt><dt><span class="section"><a href="#sec-Check_if_firewalld_
 is_installed">3.8.8. Check if firewalld is installed</a></span></dt><dt><span class="section"><a href="#sec-Disabling_firewalld">3.8.9. Disabling firewalld</a></span></dt><dt><span class="section"><a href="#sec-Start_firewalld">3.8.10. Start firewalld</a></span></dt><dt><span class="section"><a href="#sec-Check_if_firewalld_is_running">3.8.11. Check if firewalld is running</a></span></dt><dt><span class="section"><a href="#sec-Installing_firewalld">3.8.12. Installing firewalld</a></span></dt><dt><span class="section"><a href="#sec-Configuring_the_Firewall">3.8.13. Configuring the Firewall</a></span></dt><dt><span class="section"><a href="#sec-firewalld-additional_resources">3.8.14. Additional Resources</a></span></dt></dl></dd></dl></div><div xml:lang="en-US" class="section" id="sect-Security_Guide-Workstation_Security" lang="en-US"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.1. Workstation Security</h2></div></div></div><div cl
 ass="para">
 		Securing a Linux environment begins with the workstation. Whether locking down a personal machine or securing an enterprise system, sound security policy begins with the individual computer. A computer network is only as secure as its weakest node.
@@ -615,7 +611,7 @@ PORT    STATE  SERVICE
 		</div><div class="para">
 			For example, if a machine is used in a secure location where only trusted people have access and the computer contains no sensitive information, then it may not be critical to prevent such attacks. However, if an employee's laptop with private, unencrypted SSH keys for the corporate network is left unattended at a trade show, it could lead to a major security breach with ramifications for the entire company.
 		</div><div class="section" id="sect-Security_Guide-BIOS_and_Boot_Loader_Security-BIOS_Passwords"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">3.1.2.1. BIOS Passwords</h4></div></div></div><div class="para">
-				The two primary reasons for password protecting the BIOS of a computer are<a href="#ftn.idm219031256528" class="footnote"><sup class="footnote" id="idm219031256528">[11]</sup></a>:
+				The two primary reasons for password protecting the BIOS of a computer are<a href="#ftn.idm219201077728" class="footnote"><sup class="footnote" id="idm219201077728">[11]</sup></a>:
 			</div><div class="orderedlist"><ol><li class="listitem"><div class="para">
 						<span class="emphasis"><em>Preventing Changes to BIOS Settings</em></span> — If an intruder has access to the BIOS, they can set it to boot from a diskette or CD-ROM. This makes it possible for them to enter rescue mode or single user mode, which in turn allows them to start arbitrary processes on the system or copy sensitive data.
 					</div></li><li class="listitem"><div class="para">
@@ -637,30 +633,12 @@ PORT    STATE  SERVICE
 					</div></li><li class="listitem"><div class="para">
 						<span class="emphasis"><em>Preventing Access to Insecure Operating Systems</em></span> — If it is a dual-boot system, an attacker can select an operating system at boot time (for example, DOS), which ignores access controls and file permissions.
 					</div></li></ol></div><div class="para">
-				Fedora ships with the GRUB boot loader on the x86 platform. For a detailed look at GRUB, refer to the Red Hat Installation Guide.
+				Fedora ships with the GRUB boot loader on the x86 platform. For a detailed look at GRUB, refer to the Fedora Installation Guide.
 			</div><div class="section" id="sect-Security_Guide-Boot_Loader_Passwords-Password_Protecting_GRUB"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">3.1.2.2.1. Password Protecting GRUB</h5></div></div></div><div class="para">
-					You can configure GRUB to address the first two issues listed in <a class="xref" href="#sect-Security_Guide-BIOS_and_Boot_Loader_Security-Boot_Loader_Passwords">Section 3.1.2.2, “Boot Loader Passwords”</a> by adding a password directive to its configuration file. To do this, first choose a strong password, open a shell, log in as root, and then type the following command:
-				</div><pre class="screen"><code class="command">/sbin/grub-md5-crypt</code></pre><div class="para">
-					When prompted, type the GRUB password and press <span class="keycap"><strong>Enter</strong></span>. This returns an MD5 hash of the password.
-				</div><div class="para">
-					Next, edit the GRUB configuration file <code class="filename">/boot/grub/grub.conf</code>. Open the file and below the <code class="command">timeout</code> line in the main section of the document, add the following line:
-				</div><pre class="screen"><code class="command">password --md5 <em class="replaceable"><code>&lt;password-hash&gt;</code></em></code></pre><div class="para">
-					Replace <em class="replaceable"><code>&lt;password-hash&gt;</code></em> with the value returned by <code class="command">/sbin/grub-md5-crypt</code><a href="#ftn.idm218988728224" class="footnote"><sup class="footnote" id="idm218988728224">[12]</sup></a>.
+					You can configure GRUB to address the first two issues listed in <a class="xref" href="#sect-Security_Guide-BIOS_and_Boot_Loader_Security-Boot_Loader_Passwords">Section 3.1.2.2, “Boot Loader Passwords”</a> by adding a password directive to its configuration file. 
 				</div><div class="para">
 					The next time the system boots, the GRUB menu prevents access to the editor or command interface without first pressing <span class="keycap"><strong>p</strong></span> followed by the GRUB password.
-				</div><div class="para">
-					Unfortunately, this solution does not prevent an attacker from booting into an insecure operating system in a dual-boot environment. For this, a different part of the <code class="filename">/boot/grub/grub.conf</code> file must be edited.
-				</div><div class="para">
-					Look for the <code class="computeroutput">title</code> line of the operating system that you want to secure, and add a line with the <code class="command">lock</code> directive immediately beneath it.
-				</div><div class="para">
-					For a DOS system, the stanza should begin similar to the following:
-				</div><pre class="screen"><code class="computeroutput">title DOS lock</code></pre><div class="warning"><div class="admonition_header"><h2>Warning</h2></div><div class="admonition"><div class="para">
-						A <code class="computeroutput">password</code> line must be present in the main section of the <code class="filename">/boot/grub/grub.conf</code> file for this method to work properly. Otherwise, an attacker can access the GRUB editor interface and remove the lock line.
-					</div></div></div><div class="para">
-					To create a different password for a particular kernel or operating system, add a <code class="command">lock</code> line to the stanza, followed by a password line.
-				</div><div class="para">
-					Each stanza protected with a unique password should begin with lines similar to the following example:
-				</div><pre class="screen"><code class="computeroutput">title DOS lock password --md5 <em class="replaceable"><code>&lt;password-hash&gt;</code></em></code></pre></div></div></div><div class="section" id="sect-Security_Guide-Workstation_Security-Password_Security"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.1.3. Password Security</h3></div></div></div><div class="para">
+				</div></div></div></div><div class="section" id="sect-Security_Guide-Workstation_Security-Password_Security"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.1.3. Password Security</h3></div></div></div><div class="para">
 			Passwords are the primary method that Fedora uses to verify a user's identity. This is why password security is so important for protection of the user, the workstation, and the network.
 		</div><div class="para">
 			For security purposes, the installation program configures the system to use <em class="firstterm">Message-Digest Algorithm</em> (<span class="emphasis"><em>MD5</em></span>) and shadow passwords. It is highly recommended that you do not alter these settings.
@@ -677,7 +655,7 @@ PORT    STATE  SERVICE
 		</div><div class="section" id="sect-Security_Guide-Password_Security-Creating_Strong_Passwords"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">3.1.3.1. Creating Strong Passwords</h4></div></div></div><div class="para">
 				When creating a secure password, it is a good idea to follow these guidelines:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
-						<span class="emphasis"><em>Do Not Use Only Words or Numbers</em></span> — Never use only numbers or words in a password.
+						<span class="emphasis"><em>Do Not Use Only Letters or Numbers</em></span> — Using only letters or numbers does not make for a complex password.
 					</div><div class="para">
 						Some insecure examples include the following:
 					</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
@@ -725,7 +703,7 @@ PORT    STATE  SERVICE
 							</div></li><li class="listitem"><div class="para">
 								The names of family members
 							</div></li><li class="listitem"><div class="para">
-								Any birth dates
+								Any birth or anniversary dates
 							</div></li><li class="listitem"><div class="para">
 								Your phone number or zip code
 							</div></li></ul></div></li><li class="listitem"><div class="para">
@@ -745,15 +723,17 @@ PORT    STATE  SERVICE
 					</div></li></ul></div><div class="para">
 				The following guidelines will help you to create a strong password:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
-						<span class="emphasis"><em>Make the Password at Least Eight Characters Long</em></span> — The longer the password, the better. If using MD5 passwords, it should be 15 characters or longer. With DES passwords, use the maximum length (eight characters).
+						<span class="emphasis"><em>Make the Password at Least Twelve Characters Long</em></span> — The longer the password, the better. If using MD5 passwords, it should be 15 characters or longer.
 					</div></li><li class="listitem"><div class="para">
-						<span class="emphasis"><em>Mix Upper and Lower Case Letters</em></span> — Fedora is case sensitive, so mix cases to enhance the strength of the password.
+						<span class="emphasis"><em>Mix Upper and Lower Case Letters</em></span> — Fedora uses case sensitive passwords, so mix cases to enhance the strength of the password.
 					</div></li><li class="listitem"><div class="para">
 						<span class="emphasis"><em>Mix Letters and Numbers</em></span> — Adding numbers to passwords, especially when added to the middle (not just at the beginning or the end), can enhance password strength.
 					</div></li><li class="listitem"><div class="para">
 						<span class="emphasis"><em>Include Non-Alphanumeric Characters</em></span> — Special characters such as &amp;, $, and &gt; can greatly improve the strength of a password (this is not possible if using DES passwords).
 					</div></li><li class="listitem"><div class="para">
 						<span class="emphasis"><em>Pick a Password You Can Remember</em></span> — The best password in the world does little good if you cannot remember it; use acronyms or other mnemonic devices to aid in memorizing passwords.
+					</div></li><li class="listitem"><div class="para">
+						<span class="emphasis"><em>Use a Password Generator</em></span> — Using a random password generator, along with secure password storage software, can make it very difficult for an attacker to discover your password.
 					</div></li></ul></div><div class="para">
 				With all these rules, it may seem difficult to create a password that meets all of the criteria for good passwords while avoiding the traits of a bad one. Fortunately, there are some steps you can take to generate an easily-remembered, secure password.
 			</div><div class="section" id="sect-Security_Guide-Creating_Strong_Passwords-Secure_Password_Creation_Methodology"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">3.1.3.1.1. Secure Password Creation Methodology</h5></div></div></div><div class="para">
@@ -898,14 +878,14 @@ Account Expiration Date (YYYY-MM-DD) [1969-12-31]:
 							</td></tr><tr><td class="">
 								Use PAM to limit root access to services.
 							</td><td class="">
-								Edit the file for the target service in the <code class="filename">/etc/pam.d/</code> directory. Make sure the <code class="filename">pam_listfile.so</code> is required for authentication.<a href="#ftn.idm219020024112" class="footnote"><sup class="footnote" id="idm219020024112">[a]</sup></a>
+								Edit the file for the target service in the <code class="filename">/etc/pam.d/</code> directory. Make sure the <code class="filename">pam_listfile.so</code> is required for authentication.<a href="#ftn.idm219186053840" class="footnote"><sup class="footnote" id="idm219186053840">[a]</sup></a>
 							</td><td class="">
 								<table border="0" summary="Simple list" class="simplelist"><tr><td> Prevents root access to network services that are PAM aware. </td></tr><tr><td> The following services are prevented from accessing the root account: </td></tr><tr><td> · FTP clients </td></tr><tr><td> · Email clients </td></tr><tr><td> · <code class="command">login</code></td></tr><tr><td> · <code class="command">gdm</code></td></tr><tr><td> · <code class="command">kdm</code></td></tr><tr><td> · <code class="command">xdm</code></td></tr><tr><td> · <code class="command">ssh</code></td></tr><tr><td> · <code class="command">scp</code></td></tr><tr><td> · <code class="command">sftp</code></td></tr><tr><td> · Any PAM aware services </td></tr></table>
 
 							</td><td class="">
 								<table border="0" summary="Simple list" class="simplelist"><tr><td> Programs and services that are not PAM aware. </td></tr></table>
 
-							</td></tr></tbody><tbody class="footnotes"><tr><td colspan="4"><div id="ftn.idm219020024112" class="footnote"><div class="para"><a href="#idm219020024112" class="para"><sup class="para">[a] </sup></a>
+							</td></tr></tbody><tbody class="footnotes"><tr><td colspan="4"><div id="ftn.idm219186053840" class="footnote"><div class="para"><a href="#idm219186053840" class="para"><sup class="para">[a] </sup></a>
 									Refer to <a class="xref" href="#sect-Security_Guide-Disallowing_Root_Access-Disabling_Root_Using_PAM">Section 3.1.4.2.4, “Disabling Root Using PAM”</a> for details.
 								</div></div></td></tr></tbody></table></div></div><br class="table-break" /><div class="section" id="sect-Security_Guide-Disallowing_Root_Access-Disabling_the_Root_Shell"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">3.1.4.2.1. Disabling the Root Shell</h5></div></div></div><div class="para">
 					To prevent users from logging in directly as root, the system administrator can set the root account's shell to <code class="command">/sbin/nologin</code> in the <code class="filename">/etc/passwd</code> file. This prevents access to the root account through commands that require a shell, such as the <code class="command">su</code> and the <code class="command">ssh</code> commands.
@@ -935,7 +915,7 @@ sense=deny file=/etc/vsftpd.ftpusers onerr=succeed</pre><div class="para">
 			</div><div class="section" id="sect-Security_Guide-Limiting_Root_Access-The_su_Command"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">3.1.4.3.1. The <code class="command">su</code> Command</h5></div></div></div><div class="para">
 					When a user executes the <code class="command">su</code> command, they are prompted for the root password and, after authentication, is given a root shell prompt.
 				</div><div class="para">
-					Once logged in via the <code class="command">su</code> command, the user <span class="emphasis"><em>is</em></span> the root user and has absolute administrative access to the system<a href="#ftn.idm219022598224" class="footnote"><sup class="footnote" id="idm219022598224">[13]</sup></a>. In addition, once a user has become root, it is possible for them to use the <code class="command">su</code> command to change to any other user on the system without being prompted for a password.
+					Once logged in via the <code class="command">su</code> command, the user <span class="emphasis"><em>is</em></span> the root user and has absolute administrative access to the system<a href="#ftn.idm219165318944" class="footnote"><sup class="footnote" id="idm219165318944">[12]</sup></a>. In addition, once a user has become root, it is possible for them to use the <code class="command">su</code> command to change to any other user on the system without being prompted for a password.
 				</div><div class="para">
 					Because this program is so powerful, administrators within an organization may wish to limit who has access to the command.
 				</div><div class="para">
@@ -2317,7 +2297,7 @@ Sep  7 14:58:33 localhost xinetd[5283]: EXIT: telnet status=0 pid=5285 duration=
 	</div><div class="para">
 		Kerberos is a way to eliminate the need for protocols that allow unsafe methods of authentication, thereby enhancing overall network security.
 	</div><div class="section" id="sect-Security_Guide-Kerberos-What_is_Kerberos"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.7.1. What is Kerberos?</h3></div></div></div><div class="para">
-			Kerberos is a network authentication protocol created by MIT, and uses symmetric-key cryptography<a href="#ftn.idm219008171456" class="footnote"><sup class="footnote" id="idm219008171456">[14]</sup></a> to authenticate users to network services, which means passwords are never actually sent over the network.
+			Kerberos is a network authentication protocol created by MIT, and uses symmetric-key cryptography<a href="#ftn.idm219162717584" class="footnote"><sup class="footnote" id="idm219162717584">[13]</sup></a> to authenticate users to network services, which means passwords are never actually sent over the network.
 		</div><div class="para">
 			Consequently, when users authenticate to network services using Kerberos, unauthorized users attempting to gather passwords by monitoring network traffic are effectively thwarted.
 		</div><div class="section" id="sect-Security_Guide-What_is_Kerberos-Advantages_of_Kerberos"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">3.7.1.1. Advantages of Kerberos</h4></div></div></div><div class="para">
@@ -2775,8 +2755,8 @@ Entry for principal host/slavekdc.example.com with kvno 3, encryption type DES c
 <pre class="screen">~]# <code class="command">systemctl disable firewalld # systemctl stop firewalld</code></pre>
 
 			</div><div class="para">
-				Then install the <span class="package">iptables-service</span> package by entering the following command as root: 
-<pre class="screen">~]# <code class="command">iptables-service </code></pre>
+				Then install the <span class="package">iptables-services</span> package by entering the following command as root: 
+<pre class="screen">~]# <code class="command">yum install iptables-services</code></pre>
 
 			</div><div class="para">
 				Then, to start <span class="application"><strong>iptables service</strong></span>, run the following commands as root: 
@@ -3088,13 +3068,11 @@ external.xml  public.xml  work.xml</pre>
 						<code class="filename">firewalld.zone(5)</code> man page — Describes XML configuration files for <code class="systemitem">firewalld</code> zone configuration.
 					</div></li></ul></div></div><div class="section" id="sec-firewalld-docs-useful-websites"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">3.8.14.2. Useful Websites</h4></div></div></div><div class="variablelist"><dl class="variablelist"><dt class="varlistentry"><span class="term"><a href="https://fedoraproject.org/wiki/FirewallD">https://fedoraproject.org/wiki/FirewallD</a></span></dt><dd><div class="para">
 							The website of the upstream project.
-						</div></dd></dl></div></div></div></div><div class="footnotes"><br /><hr width="100" align="left" /><div id="ftn.idm219031256528" class="footnote"><div class="para"><a href="#idm219031256528" class="para"><sup class="para">[11] </sup></a>
+						</div></dd></dl></div></div></div></div><div class="footnotes"><br /><hr width="100" align="left" /><div id="ftn.idm219201077728" class="footnote"><div class="para"><a href="#idm219201077728" class="para"><sup class="para">[11] </sup></a>
 					Since system BIOSes differ between manufacturers, some may not support password protection of either type, while others may support one type but not the other.
-				</div></div><div id="ftn.idm218988728224" class="footnote"><div class="para"><a href="#idm218988728224" class="para"><sup class="para">[12] </sup></a>
-						GRUB also accepts unencrypted passwords, but it is recommended that an MD5 hash be used for added security.
-					</div></div><div id="ftn.idm219022598224" class="footnote"><div class="para"><a href="#idm219022598224" class="para"><sup class="para">[13] </sup></a>
+				</div></div><div id="ftn.idm219165318944" class="footnote"><div class="para"><a href="#idm219165318944" class="para"><sup class="para">[12] </sup></a>
 						This access is still subject to the restrictions imposed by SELinux, if it is enabled.
-					</div></div><div id="ftn.idm219008171456" class="footnote"><div class="para"><a href="#idm219008171456" class="para"><sup class="para">[14] </sup></a>
+					</div></div><div id="ftn.idm219162717584" class="footnote"><div class="para"><a href="#idm219162717584" class="para"><sup class="para">[13] </sup></a>
 				A system where both the client and the server share a common key that is used to encrypt and decrypt network communication.
 			</div></div></div></div><div xml:lang="en-US" class="chapter" id="chap-Security_Guide-Encryption" lang="en-US"><div class="titlepage"><div><div><h1 class="title">Chapter 4. Encryption</h1></div></div></div><div class="toc"><dl class="toc"><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Data_at_Rest">4.1. Data at Rest</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption">4.1.1. Full Disk Encryption</a></span></dt><dt><span class="section"><a href="#Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption">4.1.2. File Based Encryption</a></span></dt></dl></dd><dt><span class="section"><a href="#Security_Guide-Encryption-Data_in_Motion">4.2. Data in Motion</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security_Guide-Virtual_Private_Networks_VPNs">4.2.1. Virtual Private Networks (VPNs)</a></span></dt><dt><span class="section"><a href="#Securi
 ty_Guide-Encryption-Data_in_Motion-Secure_Shell">4.2.2. Secure Shell</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-LUKS_Disk_Encryption">4.2.3. LUKS Disk Encryption</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives">4.2.4. 7-Zip Encrypted Archives</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Encryption-Using_GPG">4.2.5. Using GNU Privacy Guard (GnuPG)</a></span></dt></dl></dd></dl></div><div class="para">
 		There are two main types of data that must be protected: data at rest and data in motion. These different types of data are protected in similar ways using similar technology but the implementations can be completely different. No single protective implementation can prevent all possible methods of compromise as the same information may be at rest and in motion at different points in time.
@@ -3774,7 +3752,7 @@ sending-filters=/home/max/bin/ez-pine-gpg-sign _INCLUDEALLHDRS_,
 					<a href="http://en.wikipedia.org/wiki/Public-key_cryptography">Wikipedia - Public Key Cryptography</a>
 				</div></li><li class="listitem"><div class="para">
 					<a href="http://computer.howstuffworks.com/encryption.htm">HowStuffWorks - Encryption</a>
-				</div></li></ol></div></div></div></div></div><div xml:lang="en-US" class="chapter" id="chap-Security_Guide-General_Principles_of_Information_Security" lang="en-US"><div class="titlepage"><div><div><h1 class="title">Chapter 5. General Principles of Information Security</h1></div></div></div><div class="toc"><dl class="toc"><dt><span class="section"><a href="#sect-Security_Guide-General_Principles_of_Information_Security-Tips_Guides_and_Tools">5.1. Tips, Guides, and Tools</a></span></dt></dl></div><div class="para">
+				</div></li></ol></div></div></div></div></div><div xml:lang="en-US" class="chapter" id="chap-Security_Guide-General_Principles_of_Information_Security" lang="en-US"><div class="titlepage"><div><div><h1 class="title">Chapter 5. General Principles of Information Security</h1></div></div></div><div class="para">
 		The following general principals provide an overview of good security practices:
 	</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 				encrypt all data transmitted over networks to help prevent man-in-the-middle attacks and eavesdropping. It is important to encrypt authentication information, such as passwords.
@@ -3790,19 +3768,7 @@ sending-filters=/home/max/bin/ez-pine-gpg-sign _INCLUDEALLHDRS_,
 				routinely review system and application logs. By default, security-relevant system logs are written to <code class="filename">/var/log/secure</code> and <code class="filename">/var/log/audit/audit.log</code>. Note: sending logs to a dedicated log server helps prevent attackers from easily modifying local logs to avoid detection.
 			</div></li><li class="listitem"><div class="para">
 				never log in as the root user unless absolutely necessary. It is recommended that administrators use <code class="command">sudo</code> to execute commands as root when required. Users capable of running <code class="command">sudo</code> are specified in <code class="filename">/etc/sudoers</code>. Use the <code class="command">visudo</code> utility to edit <code class="filename">/etc/sudoers</code>.
-			</div></li></ul></div><div class="section" id="sect-Security_Guide-General_Principles_of_Information_Security-Tips_Guides_and_Tools"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">5.1. Tips, Guides, and Tools</h2></div></div></div><div class="para">
-			The United States' <a href="http://www.nsa.gov/">National Security Agency (NSA)</a> provides hardening guides and tips for many different operating systems, to help government agencies, businesses, and individuals secure their systems against attack. The following guides (in PDF format) provide guidance for Red Hat Enterprise Linux 5:
-		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
-					<a href="http://www.nsa.gov/ia/_files/os/redhat/rhel5-pamphlet-i731.pdf">Hardening Tips for the Red Hat Enterprise Linux 5</a>
-				</div></li><li class="listitem"><div class="para">
-					<a href="http://www.nsa.gov/ia/_files/os/redhat/rhel5-guide-i731.pdf">Guide to the Secure Configuration of Red Hat Enterprise Linux 5</a>
-				</div></li></ul></div><div class="para">
-			The <a href="http://www.disa.mil/">Defense Information Systems Agency (DISA)</a> provides documentation, checklists, and tests to help secure your system (<a href="http://iase.disa.mil/index2.html">Information Assurance Support Environment</a>). The <a href="http://iase.disa.mil/stigs/stig/unix-stig-v5r1.pdf">UNIX Security Technical Implementation Guide</a> (PDF) is a very specific guide to UNIX security - an advanced knowledge of UNIX and Linux is recommended before reading this guide.
-		</div><div class="para">
-			The DISA <a href="http://iase.disa.mil/stigs/downloads/zip/unclassified_unix_checklist_v5r1-26_20100827.zip">UNIX Security Checklist Version 5, Release 1.26</a> provides a collection of documents and checklists, ranging from the correct ownerships and modes for system files, to patch control.
-		</div><div class="para">
-			Also, DISA has made available <a href="http://iase.disa.mil/stigs/SRR/unix.html">UNIX SRR scripts</a> that allow administrators to check specific settings on systems. These scripts provide XML-formatted reports listing any known vulnerable settings.
-		</div></div></div><div xml:lang="en-US" class="chapter" id="chap-Security_Guide-Secure_Installation" lang="en-US"><div class="titlepage"><div><div><h1 class="title">Chapter 6. Secure Installation</h1></div></div></div><div class="toc"><dl class="toc"><dt><span class="section"><a href="#sect-Security_Guide-Secure_Installation-Disk_Partitions">6.1. Disk Partitions</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption">6.2. Utilize LUKS Partition Encryption</a></span></dt></dl></div><div class="para">
+			</div></li></ul></div></div><div xml:lang="en-US" class="chapter" id="chap-Security_Guide-Secure_Installation" lang="en-US"><div class="titlepage"><div><div><h1 class="title">Chapter 6. Secure Installation</h1></div></div></div><div class="toc"><dl class="toc"><dt><span class="section"><a href="#sect-Security_Guide-Secure_Installation-Disk_Partitions">6.1. Disk Partitions</a></span></dt><dt><span class="section"><a href="#sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption">6.2. Utilize LUKS Partition Encryption</a></span></dt></dl></div><div class="para">
 		Security begins with the first time you put that CD or DVD into your disk drive to install Fedora. Configuring your system securely from the beginning makes it easier to implement additional security settings later.
 	</div><div class="section" id="sect-Security_Guide-Secure_Installation-Disk_Partitions"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">6.1. Disk Partitions</h2></div></div></div><div class="para">
 			The NSA recommends creating separate partitions for /boot, /, /home, /tmp, and /var/tmp. The reasons for each are different and we will address each partition.
@@ -3840,13 +3806,13 @@ sending-filters=/home/max/bin/ez-pine-gpg-sign _INCLUDEALLHDRS_,
 			The <span class="package">yum-plugin-security</span> package is a feature of Fedora. If installed, the yum module provided by this package can be used to limit yum to retrieve only security-related updates. It can also be used to provide information about which Red Hat advisory, which bug in Red Hat’s Bugzilla database, or which CVE number from MITRE’s Common Vulnerabilities and Exposures directory is addressed by a package update.
 		</div><div class="para">
 			Enabling these features is as simple as running the <code class="command">yum install yum-plugin-security</code> command.
-		</div></div></div><div class="chapter" id="idm219003204928"><div class="titlepage"><div><div><h1 class="title" id="idm219003204928">Chapter 9. SELinux</h1></div></div></div><div class="toc"><dl class="toc"><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Introduction">9.1. Introduction</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Introduction-Benefits_of_running_SELinux">9.1.1. Benefits of running SELinux</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Introduction-Examples">9.1.2. Examples</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Introduction-SELinux_Architecture">9.1.3. SELinux Architecture</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Introduction-SELinux_on_Other_Operating_Systems">9.1.4. SELinux on Other Operating Systems</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security-Enhanced_
 Linux-SELinux_Contexts">9.2. SELinux Contexts</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-SELinux_Contexts-Domain_Transitions">9.2.1. Domain Transitions</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-SELinux_Contexts-SELinux_Contexts_for_Processes">9.2.2. SELinux Contexts for Processes</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-SELinux_Contexts-SELinux_Contexts_for_Users">9.2.3. SELinux Contexts for Users</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Targeted_Policy">9.3. Targeted Policy</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Targeted_Policy-Confined_Processes">9.3.1. Confined Processes</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Targeted_Policy-Unconfined_Processes">9.3.2. Unconfined Processes</a></span></dt><dt><span class="section"><
 a href="#sect-Security-Enhanced_Linux-Targeted_Policy-Confined_and_Unconfined_Users">9.3.3. Confined and Unconfined Users</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux">9.4. Working with SELinux</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-SELinux_Packages">9.4.1. SELinux Packages</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-Which_Log_File_is_Used">9.4.2. Which Log File is Used</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-Main_Configuration_File">9.4.3. Main Configuration File</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-Enabling_and_Disabling_SELinux">9.4.4. Enabling and Disabling SELinux</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SE
 Linux-SELinux_Modes">9.4.5. SELinux Modes</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-Booleans">9.4.6. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-SELinux_Contexts_Labeling_Files">9.4.7. SELinux Contexts - Labeling Files</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-The_file_t_and_default_t_Types">9.4.8. The file_t and default_t Types</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-Mounting_File_Systems">9.4.9. Mounting File Systems</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-Maintaining_SELinux_Labels_">9.4.10. Maintaining SELinux Labels </a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Confining_Users">9.5. Confining Users</a></span></dt><dd><dl><dt>
 <span class="section"><a href="#sect-Security-Enhanced_Linux-Confining_Users-Linux_and_SELinux_User_Mappings">9.5.1. Linux and SELinux User Mappings</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Confining_Users-Confining_New_Linux_Users_useradd">9.5.2. Confining New Linux Users: useradd</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Confining_Users-Confining_Existing_Linux_Users_semanage_login">9.5.3. Confining Existing Linux Users: semanage login</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Confining_Users-Changing_the_Default_Mapping">9.5.4. Changing the Default Mapping</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Confining_Users-xguest_Kiosk_Mode">9.5.5. xguest: Kiosk Mode</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Confining_Users-Booleans_for_Users_Executing_Applications">9.5.6. Booleans for Users Ex
 ecuting Applications</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Troubleshooting">9.6. Troubleshooting</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Troubleshooting-What_Happens_when_Access_is_Denied">9.6.1. What Happens when Access is Denied</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Troubleshooting-Top_Three_Causes_of_Problems">9.6.2. Top Three Causes of Problems</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Troubleshooting-Fixing_Problems">9.6.3. Fixing Problems</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Further_Information">9.7. Further Information</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Further_Information-Contributors">9.7.1. Contributors</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Fu
 rther_Information-Other_Resources">9.7.2. Other Resources</a></span></dt></dl></dd></dl></div><div class="para">
+		</div></div></div><div class="chapter" id="idm219186749536"><div class="titlepage"><div><div><h1 class="title" id="idm219186749536">Chapter 9. SELinux</h1></div></div></div><div class="toc"><dl class="toc"><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Introduction">9.1. Introduction</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Introduction-Benefits_of_running_SELinux">9.1.1. Benefits of running SELinux</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Introduction-Examples">9.1.2. Examples</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Introduction-SELinux_Architecture">9.1.3. SELinux Architecture</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Introduction-SELinux_on_Other_Operating_Systems">9.1.4. SELinux on Other Operating Systems</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security-Enhanced_
 Linux-SELinux_Contexts">9.2. SELinux Contexts</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-SELinux_Contexts-Domain_Transitions">9.2.1. Domain Transitions</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-SELinux_Contexts-SELinux_Contexts_for_Processes">9.2.2. SELinux Contexts for Processes</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-SELinux_Contexts-SELinux_Contexts_for_Users">9.2.3. SELinux Contexts for Users</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Targeted_Policy">9.3. Targeted Policy</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Targeted_Policy-Confined_Processes">9.3.1. Confined Processes</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Targeted_Policy-Unconfined_Processes">9.3.2. Unconfined Processes</a></span></dt><dt><span class="section"><
 a href="#sect-Security-Enhanced_Linux-Targeted_Policy-Confined_and_Unconfined_Users">9.3.3. Confined and Unconfined Users</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux">9.4. Working with SELinux</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-SELinux_Packages">9.4.1. SELinux Packages</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-Which_Log_File_is_Used">9.4.2. Which Log File is Used</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-Main_Configuration_File">9.4.3. Main Configuration File</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-Enabling_and_Disabling_SELinux">9.4.4. Enabling and Disabling SELinux</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SE
 Linux-SELinux_Modes">9.4.5. SELinux Modes</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-Booleans">9.4.6. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-SELinux_Contexts_Labeling_Files">9.4.7. SELinux Contexts - Labeling Files</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-The_file_t_and_default_t_Types">9.4.8. The file_t and default_t Types</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-Mounting_File_Systems">9.4.9. Mounting File Systems</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Working_with_SELinux-Maintaining_SELinux_Labels_">9.4.10. Maintaining SELinux Labels </a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Confining_Users">9.5. Confining Users</a></span></dt><dd><dl><dt>
 <span class="section"><a href="#sect-Security-Enhanced_Linux-Confining_Users-Linux_and_SELinux_User_Mappings">9.5.1. Linux and SELinux User Mappings</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Confining_Users-Confining_New_Linux_Users_useradd">9.5.2. Confining New Linux Users: useradd</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Confining_Users-Confining_Existing_Linux_Users_semanage_login">9.5.3. Confining Existing Linux Users: semanage login</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Confining_Users-Changing_the_Default_Mapping">9.5.4. Changing the Default Mapping</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Confining_Users-xguest_Kiosk_Mode">9.5.5. xguest: Kiosk Mode</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Confining_Users-Booleans_for_Users_Executing_Applications">9.5.6. Booleans for Users Ex
 ecuting Applications</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Troubleshooting">9.6. Troubleshooting</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Troubleshooting-What_Happens_when_Access_is_Denied">9.6.1. What Happens when Access is Denied</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Troubleshooting-Top_Three_Causes_of_Problems">9.6.2. Top Three Causes of Problems</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Troubleshooting-Fixing_Problems">9.6.3. Fixing Problems</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Further_Information">9.7. Further Information</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Further_Information-Contributors">9.7.1. Contributors</a></span></dt><dt><span class="section"><a href="#sect-Security-Enhanced_Linux-Fu
 rther_Information-Other_Resources">9.7.2. Other Resources</a></span></dt></dl></dd></dl></div><div class="para">
 		</div><div xml:lang="en-US" class="section" id="sect-Security-Enhanced_Linux-Introduction" lang="en-US"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">9.1. Introduction</h2></div></div></div><div class="para">
 		Security-Enhanced Linux (SELinux) is an implementation of a <em class="firstterm">mandatory access control</em> mechanism in the Linux kernel, checking for allowed operations after standard <em class="firstterm">discretionary access controls</em> are checked. It was created by the National Security Agency and can enforce rules on files and processes in a Linux system, and on their actions, based on defined policy.
 	</div><div class="para">
 		When using SELinux, files, including directories and devices, are referred to as objects. Processes, such as a user running a command or the <span class="trademark">Mozilla</span>®<span class="trademark"> Firefox</span>® application, are referred to as subjects. Most operating systems use a Discretionary Access Control (DAC) system that controls how subjects interact with objects, and how subjects interact with each other. On operating systems using DAC, users control the permissions of files (objects) that they own. For example, on <span class="trademark">Linux</span>® operating systems, users could make their home directories world-readable, giving users and processes (subjects) access to potentially sensitive information, with no further protection over this unwanted action.
 	</div><div class="para">
-		Relying on DAC mechanisms alone is fundamentally inadequate for strong system security. DAC access decisions are only based on user identity and ownership, ignoring other security-relevant information such as the role of the user, the function and trustworthiness of the program, and the sensitivity and integrity of the data. Each user has complete discretion over their files, making it impossible to enforce a system-wide security policy. Furthermore, every program run by a user inherits all of the permissions granted to the user and is free to change access to the user's files, so no protection is provided against malicious software. Many system services and privileged programs must run with coarse-grained privileges that far exceed their requirements, so that a flaw in any one of these programs could be exploited to obtain further system access.<a href="#ftn.idm219016426016" class="footnote"><sup class="footnote" id="idm219016426016">[15]</sup></a>
+		Relying on DAC mechanisms alone is fundamentally inadequate for strong system security. DAC access decisions are only based on user identity and ownership, ignoring other security-relevant information such as the role of the user, the function and trustworthiness of the program, and the sensitivity and integrity of the data. Each user has complete discretion over their files, making it impossible to enforce a system-wide security policy. Furthermore, every program run by a user inherits all of the permissions granted to the user and is free to change access to the user's files, so no protection is provided against malicious software. Many system services and privileged programs must run with coarse-grained privileges that far exceed their requirements, so that a flaw in any one of these programs could be exploited to obtain further system access.<a href="#ftn.idm219216320832" class="footnote"><sup class="footnote" id="idm219216320832">[14]</sup></a>
 	</div><div class="para">
 		The following is an example of permissions used on Linux operating systems that do not run Security-Enhanced Linux (SELinux). The permissions and output in these examples may differ from your system. Use the <code class="command">ls -l</code> command to view file permissions:
 	</div><pre class="screen">$ ls -l file1
@@ -3854,7 +3820,7 @@ sending-filters=/home/max/bin/ez-pine-gpg-sign _INCLUDEALLHDRS_,
 </pre><div class="para">
 		The first three permission bits, <code class="computeroutput">rw</code>, control the access the Linux <code class="computeroutput">user1</code> user (in this case, the owner) has to <code class="filename">file1</code>. The next three permission bits, <code class="computeroutput">rw-</code>, control the access the Linux <code class="computeroutput">group1</code> group has to <code class="filename">file1</code>. The last three permission bits, <code class="computeroutput">r--</code>, control the access everyone else has to <code class="filename">file1</code>, which includes all users and processes.
 	</div><div class="para">
-		Security-Enhanced Linux (SELinux) adds Mandatory Access Control (MAC) to the Linux kernel, and is enabled by default in Fedora. A general purpose MAC architecture needs the ability to enforce an administratively-set security policy over all processes and files in the system, basing decisions on labels containing a variety of security-relevant information. When properly implemented, it enables a system to adequately defend itself and offers critical support for application security by protecting against the tampering with, and bypassing of, secured applications. MAC provides strong separation of applications that permits the safe execution of untrustworthy applications. Its ability to limit the privileges associated with executing processes limits the scope of potential damage that can result from the exploitation of vulnerabilities in applications and system services. MAC enables information to be protected from legitimate users with limited authorization as well as from a
 uthorized users who have unwittingly executed malicious applications.<a href="#ftn.idm219023556176" class="footnote"><sup class="footnote" id="idm219023556176">[16]</sup></a>
+		Security-Enhanced Linux (SELinux) adds Mandatory Access Control (MAC) to the Linux kernel, and is enabled by default in Fedora. A general purpose MAC architecture needs the ability to enforce an administratively-set security policy over all processes and files in the system, basing decisions on labels containing a variety of security-relevant information. When properly implemented, it enables a system to adequately defend itself and offers critical support for application security by protecting against the tampering with, and bypassing of, secured applications. MAC provides strong separation of applications that permits the safe execution of untrustworthy applications. Its ability to limit the privileges associated with executing processes limits the scope of potential damage that can result from the exploitation of vulnerabilities in applications and system services. MAC enables information to be protected from legitimate users with limited authorization as well as from a
 uthorized users who have unwittingly executed malicious applications.<a href="#ftn.idm219090529552" class="footnote"><sup class="footnote" id="idm219090529552">[15]</sup></a>
 	</div><div class="para">
 		The following is an example of the labels containing security-relevant information that are used on processes, Linux users, and files, on Linux operating systems that run SELinux. This information is called the SELinux <span class="emphasis"><em>context</em></span>, and is viewed using the <code class="command">ls -Z</code> command:
 	</div><pre class="screen">$ ls -Z file1
@@ -3894,11 +3860,11 @@ sending-filters=/home/max/bin/ez-pine-gpg-sign _INCLUDEALLHDRS_,
 				</div></li><li class="listitem"><div class="para">
 					Process separation is used. Processes run in their own domains, preventing processes from accessing files used by other processes, as well as preventing processes from accessing other processes. For example, when running SELinux, unless otherwise configured, an attacker can not compromise a Samba server, and then use that Samba server as an attack vector to read and write to files used by other processes, such as databases used by <span class="trademark">MySQL</span>®.
 				</div></li><li class="listitem"><div class="para">
-					SELinux helps limit the damage made by configuration mistakes. <a href="http://en.wikipedia.org/wiki/Domain_Name_System">Domain Name System (DNS)</a> servers often replicate information between each other in what is known as a zone transfer. Attackers can use zone transfers to update DNS servers with false information. When running the <a href="https://www.isc.org/software/bind">Berkeley Internet Name Daemon (BIND)</a> as a DNS server in Fedora, even if an administrator forgets to limit which servers can perform a zone transfer, the default SELinux policy prevents zone files <a href="#ftn.idm219012091040" class="footnote"><sup class="footnote" id="idm219012091040">[17]</sup></a> from being updated via zone transfers, by the BIND <code class="systemitem">named</code> daemon itself, and by other processes.
+					SELinux helps limit the damage made by configuration mistakes. <a href="http://en.wikipedia.org/wiki/Domain_Name_System">Domain Name System (DNS)</a> servers often replicate information between each other in what is known as a zone transfer. Attackers can use zone transfers to update DNS servers with false information. When running the <a href="https://www.isc.org/software/bind">Berkeley Internet Name Daemon (BIND)</a> as a DNS server in Fedora, even if an administrator forgets to limit which servers can perform a zone transfer, the default SELinux policy prevents zone files <a href="#ftn.idm219165612720" class="footnote"><sup class="footnote" id="idm219165612720">[16]</sup></a> from being updated via zone transfers, by the BIND <code class="systemitem">named</code> daemon itself, and by other processes.
 				</div></li><li class="listitem"><div class="para">
-					Refer to the <a href="http://www.redhatmagazine.com/"><span class="trademark">Red Hat</span>® Magazine</a> article, <a href="http://www.redhatmagazine.com/2008/02/26/risk-report-three-years-of-red-hat-enterprise-linux-4/">Risk report: Three years of Red Hat Enterprise Linux 4</a><a href="#ftn.idm218979345440" class="footnote"><sup class="footnote" id="idm218979345440">[18]</sup></a>, for exploits that were restricted due to the default SELinux targeted policy in <span class="trademark">Red Hat</span>® Enterprise <span class="trademark">Linux</span>® 4.
+					Refer to the <a href="http://www.redhatmagazine.com/"><span class="trademark">Red Hat</span>® Magazine</a> article, <a href="http://www.redhatmagazine.com/2008/02/26/risk-report-three-years-of-red-hat-enterprise-linux-4/">Risk report: Three years of Red Hat Enterprise Linux 4</a><a href="#ftn.idm219091274352" class="footnote"><sup class="footnote" id="idm219091274352">[17]</sup></a>, for exploits that were restricted due to the default SELinux targeted policy in <span class="trademark">Red Hat</span>® Enterprise <span class="trademark">Linux</span>® 4.
 				</div></li><li class="listitem"><div class="para">
-					Refer to the <a href="http://www.linuxworld.com">LinuxWorld.com</a> article, <a href="http://www.linuxworld.com/news/2008/022408-selinux.html?page=1">A seatbelt for server software: SELinux blocks real-world exploits</a><a href="#ftn.idm219030435632" class="footnote"><sup class="footnote" id="idm219030435632">[19]</sup></a>, for background information about SELinux, and information about various exploits that SELinux has prevented.
+					Refer to the <a href="http://www.linuxworld.com">LinuxWorld.com</a> article, <a href="http://www.linuxworld.com/news/2008/022408-selinux.html?page=1">A seatbelt for server software: SELinux blocks real-world exploits</a><a href="#ftn.idm219167242912" class="footnote"><sup class="footnote" id="idm219167242912">[18]</sup></a>, for background information about SELinux, and information about various exploits that SELinux has prevented.
 				</div></li><li class="listitem"><div class="para">
 					Refer to James Morris's <a href="http://james-morris.livejournal.com/25421.html">SELinux mitigates remote root vulnerability in OpenPegasus</a> blog post for information about an exploit in <a href="http://www.openpegasus.org/">OpenPegasus</a> that was mitigated by SELinux as shipped with Red Hat Enterprise Linux 4 and 5.
 				</div></li></ul></div><div class="para">
@@ -4030,7 +3996,7 @@ Policy from config file:        targeted
 					Run the <code class="command">ls -Z /var/www/html/testfile</code> command to view the SELinux context:
 				</div><pre class="screen">-rw-r--r--  root root unconfined_u:object_r:httpd_sys_content_t:s0 /var/www/html/testfile
 </pre><div class="para">
-					By default, Linux users run unconfined in Fedora, which is why the <code class="filename">testfile</code> file is labeled with the SELinux <code class="computeroutput">unconfined_u</code> user. RBAC is used for processes, not files. Roles do not have a meaning for files - the <code class="computeroutput">object_r</code> role is a generic role used for files (on persistent storage and network file systems). Under the <code class="filename">/proc/</code> directory, files related to processes may use the <code class="computeroutput">system_r</code> role.<a href="#ftn.idm219025017616" class="footnote"><sup class="footnote" id="idm219025017616">[20]</sup></a> The <code class="computeroutput">httpd_sys_content_t</code> type allows the <code class="systemitem">httpd</code> process to access this file.
+					By default, Linux users run unconfined in Fedora, which is why the <code class="filename">testfile</code> file is labeled with the SELinux <code class="computeroutput">unconfined_u</code> user. RBAC is used for processes, not files. Roles do not have a meaning for files - the <code class="computeroutput">object_r</code> role is a generic role used for files (on persistent storage and network file systems). Under the <code class="filename">/proc/</code> directory, files related to processes may use the <code class="computeroutput">system_r</code> role.<a href="#ftn.idm219188217616" class="footnote"><sup class="footnote" id="idm219188217616">[19]</sup></a> The <code class="computeroutput">httpd_sys_content_t</code> type allows the <code class="systemitem">httpd</code> process to access this file.
 				</div></li><li class="listitem"><div class="para">
 					As the Linux root user, run the <code class="command">service httpd start</code> command to start the <code class="systemitem">httpd</code> process. The output is as follows if <code class="systemitem">httpd</code> starts successfully:
 				</div><pre class="screen"># /sbin/service httpd start
@@ -4107,7 +4073,7 @@ Policy from config file:        targeted
 					Run the <code class="command">ls -Z /var/www/html/test2file</code> command to view the SELinux context:
 				</div><pre class="screen">-rw-r--r--  root root unconfined_u:object_r:httpd_sys_content_t:s0 /var/www/html/test2file
 </pre><div class="para">
-					By default, Linux users run unconfined in Fedora, which is why the <code class="filename">test2file</code> file is labeled with the SELinux <code class="computeroutput">unconfined_u</code> user. RBAC is used for processes, not files. Roles do not have a meaning for files - the <code class="computeroutput">object_r</code> role is a generic role used for files (on persistent storage and network file systems). Under the <code class="filename">/proc/</code> directory, files related to processes may use the <code class="computeroutput">system_r</code> role.<a href="#ftn.idm218977808816" class="footnote"><sup class="footnote" id="idm218977808816">[21]</sup></a> The <code class="computeroutput">httpd_sys_content_t</code> type allows the <code class="systemitem">httpd</code> process to access this file.
+					By default, Linux users run unconfined in Fedora, which is why the <code class="filename">test2file</code> file is labeled with the SELinux <code class="computeroutput">unconfined_u</code> user. RBAC is used for processes, not files. Roles do not have a meaning for files - the <code class="computeroutput">object_r</code> role is a generic role used for files (on persistent storage and network file systems). Under the <code class="filename">/proc/</code> directory, files related to processes may use the <code class="computeroutput">system_r</code> role.<a href="#ftn.idm219179403584" class="footnote"><sup class="footnote" id="idm219179403584">[20]</sup></a> The <code class="computeroutput">httpd_sys_content_t</code> type allows the <code class="systemitem">httpd</code> process to access this file.
 				</div></li><li class="listitem"><div class="para">
 					The <code class="command">chcon</code> command relabels files; however, such label changes do not survive when the file system is relabeled. For permanent changes that survive a file system relabel, use the <code class="command">semanage</code> command, which is discussed later. As the Linux root user, run the following command to change the type to a type used by Samba:
 				</div><div class="para">
@@ -4315,7 +4281,7 @@ unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
 		</div><div class="para">
 			<span class="package">setroubleshoot-server</span>: translates denial messages, produced when access is denied by SELinux, into detailed descriptions that are viewed with <code class="command">sealert</code> (which is provided by this package).
 		</div><div class="para">
-			<span class="package">setools</span>, <span class="package">setools-gui</span>, and <span class="package">setools-console</span>: these packages provide the <a href="http://oss.tresys.com/projects/setools">Tresys Technology SETools distribution</a>, a number of tools and libraries for analyzing and querying policy, audit log monitoring and reporting, and file context management<a href="#ftn.idm219012581472" class="footnote"><sup class="footnote" id="idm219012581472">[22]</sup></a>. The <span class="package">setools</span> package is a meta-package for SETools. The <span class="package">setools-gui</span> package provides the <code class="command">apol</code>, <code class="command">seaudit</code>, and <code class="command">sediffx</code> tools. The <span class="package">setools-console</span> package provides the <code class="command">seaudit-report</code>, <code class="command">sechecker</code>, <code class="command">sediff</code>, <code class="command">seinfo</code>, <co
 de class="command">sesearch</code>, <code class="command">findcon</code>, <code class="command">replcon</code>, and <code class="command">indexcon</code> command line tools. Refer to the <a href="http://oss.tresys.com/projects/setools">Tresys Technology SETools</a> page for information about these tools.
+			<span class="package">setools</span>, <span class="package">setools-gui</span>, and <span class="package">setools-console</span>: these packages provide the <a href="http://oss.tresys.com/projects/setools">Tresys Technology SETools distribution</a>, a number of tools and libraries for analyzing and querying policy, audit log monitoring and reporting, and file context management<a href="#ftn.idm219194134896" class="footnote"><sup class="footnote" id="idm219194134896">[21]</sup></a>. The <span class="package">setools</span> package is a meta-package for SETools. The <span class="package">setools-gui</span> package provides the <code class="command">apol</code>, <code class="command">seaudit</code>, and <code class="command">sediffx</code> tools. The <span class="package">setools-console</span> package provides the <code class="command">seaudit-report</code>, <code class="command">sechecker</code>, <code class="command">sediff</code>, <code class="command">seinfo</code>, <co
 de class="command">sesearch</code>, <code class="command">findcon</code>, <code class="command">replcon</code>, and <code class="command">indexcon</code> command line tools. Refer to the <a href="http://oss.tresys.com/projects/setools">Tresys Technology SETools</a> page for information about these tools.
 		</div><div class="para">
 			<span class="package">libselinux-utils</span>: provides the <code class="command">avcstat</code>, <code class="command">getenforce</code>, <code class="command">getsebool</code>, <code class="command">matchpathcon</code>, <code class="command">selinuxconlist</code>, <code class="command">selinuxdefcon</code>, <code class="command">selinuxenabled</code>, <code class="command">setenforce</code>, <code class="command">togglesebool</code> tools.
 		</div><div class="para">
@@ -4323,7 +4289,7 @@ unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
 		</div><div class="para">
 			To install packages in Fedora, as the Linux root user, run the <code class="command">yum install <em class="replaceable"><code>package-name</code></em></code> command. For example, to install the <span class="package">mcstrans</span> package, run the <code class="command">yum install mcstrans</code> command. To upgrade all installed packages in Fedora, run the <code class="command">yum update</code> command.
 		</div><div class="para">
-			Refer to <a href="http://docs.fedoraproject.org/yum/en/">Managing Software with yum</a><a href="#ftn.idm218975218672" class="footnote"><sup class="footnote" id="idm218975218672">[23]</sup></a> for further information about using <code class="command">yum</code> to manage packages.
+			Refer to <a href="http://docs.fedoraproject.org/yum/en/">Managing Software with yum</a><a href="#ftn.idm219217556208" class="footnote"><sup class="footnote" id="idm219217556208">[22]</sup></a> for further information about using <code class="command">yum</code> to manage packages.
 		</div><div class="note"><div class="admonition_header"><h2>Note</h2></div><div class="admonition"><div class="para">
 				In previous versions of Fedora, the <span class="package">selinux-policy-devel</span> package is required when making a local policy module with <code class="command">audit2allow -M</code>.
 			</div></div></div></div><div class="section" id="sect-Security-Enhanced_Linux-Working_with_SELinux-Which_Log_File_is_Used"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">9.4.2. Which Log File is Used</h3></div></div></div><div class="para">
@@ -4759,7 +4725,7 @@ restorecon reset /web/file1 context unconfined_u:object_r:default_t:s0-&gt;syste
 			</div><div class="important"><div class="admonition_header"><h2>Important</h2></div><div class="admonition"><div class="para">
 					When changing the SELinux context with <code class="command">/usr/sbin/semanage fcontext -a</code>, use the full path to the file or directory to avoid files being mislabeled after a file system relabel, or after the <code class="command">/sbin/restorecon</code> command is run.
 				</div></div></div></div></div><div class="section" id="sect-Security-Enhanced_Linux-Working_with_SELinux-The_file_t_and_default_t_Types"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">9.4.8. The file_t and default_t Types</h3></div></div></div><div class="para">
-			For file systems that support extended attributes, when a file that lacks an SELinux context on disk is accessed, it is treated as if it had a default context as defined by SELinux policy. In common policies, this default context uses the <code class="computeroutput">file_t</code> type. This should be the only use of this type, so that files without a context on disk can be distinguished in policy, and generally kept inaccessible to confined domains. The <code class="computeroutput">file_t</code> type should not exist on correctly-labeled file systems, because all files on a system running SELinux should have an SELinux context, and the <code class="computeroutput">file_t</code> type is never used in file-context configuration<a href="#ftn.idm219019247824" class="footnote"><sup class="footnote" id="idm219019247824">[24]</sup></a>.
+			For file systems that support extended attributes, when a file that lacks an SELinux context on disk is accessed, it is treated as if it had a default context as defined by SELinux policy. In common policies, this default context uses the <code class="computeroutput">file_t</code> type. This should be the only use of this type, so that files without a context on disk can be distinguished in policy, and generally kept inaccessible to confined domains. The <code class="computeroutput">file_t</code> type should not exist on correctly-labeled file systems, because all files on a system running SELinux should have an SELinux context, and the <code class="computeroutput">file_t</code> type is never used in file-context configuration<a href="#ftn.idm219175604688" class="footnote"><sup class="footnote" id="idm219175604688">[23]</sup></a>.
 		</div><div class="para">
 			The <code class="computeroutput">default_t</code> type is used on files that do not match any other pattern in file-context configuration, so that such files can be distinguished from files that do not have a context on disk, and generally kept inaccessible to confined domains. If you create a new top-level directory, such as <code class="filename">/mydirectory/</code>, this directory may be labeled with the <code class="computeroutput">default_t</code> type. If services need access to such a directory, update the file-contexts configuration for this location. Refer to <a class="xref" href="#sect-Security-Enhanced_Linux-SELinux_Contexts_Labeling_Files-Persistent_Changes_semanage_fcontext">Section 9.4.7.2, “Persistent Changes: semanage fcontext”</a> for details on adding a context to the file-context configuration.
 		</div></div><div class="section" id="sect-Security-Enhanced_Linux-Working_with_SELinux-Mounting_File_Systems"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">9.4.9. Mounting File Systems</h3></div></div></div><div class="para">
@@ -4787,7 +4753,7 @@ context="system_u:object_r:httpd_sys_content_t:s0"
 </pre><div class="para">
 				In this example:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
-						the <code class="option">defcontext</code> option defines that <code class="computeroutput">system_u:object_r:samba_share_t:s0</code> is "the default security context for unlabeled files"<a href="#ftn.idm219021304880" class="footnote"><sup class="footnote" id="idm219021304880">[25]</sup></a>.
+						the <code class="option">defcontext</code> option defines that <code class="computeroutput">system_u:object_r:samba_share_t:s0</code> is "the default security context for unlabeled files"<a href="#ftn.idm219164375344" class="footnote"><sup class="footnote" id="idm219164375344">[24]</sup></a>.
 					</div></li><li class="listitem"><div class="para">
 						when mounted, the root directory (<code class="filename">/test/</code>) of the file system is treated as if it is labeled with the context specified by <code class="option">defcontext</code> (this label is not stored on disk). This affects the labeling for files created under <code class="filename">/test/</code>: new files inherit the <code class="computeroutput">samba_share_t</code> type, and these labels are stored on disk.
 					</div></li><li class="listitem"><div class="para">
@@ -4927,7 +4893,7 @@ drwxr-xr-x  root root system_u:object_r:httpd_sys_content_t:s0 /var/www/html/
 			</div><div class="important"><div class="admonition_header"><h2>Important</h2></div><div class="admonition"><div class="para">
 					Moving files and directories with the <code class="command">mv</code> command may result in the wrong SELinux context, preventing processes, such as the Apache HTTP Server and Samba, from accessing such files and directories.
 				</div></div></div></div><div class="section" id="sect-Security-Enhanced_Linux-Maintaining_SELinux_Labels_-Checking_the_Default_SELinux_Context"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">9.4.10.3. Checking the Default SELinux Context</h4></div></div></div><div class="para">
-				Use the <code class="command">/usr/sbin/matchpathcon</code> command to check if files and directories have the correct SELinux context. From the <span class="citerefentry"><span class="refentrytitle">matchpathcon</span>(8)</span> manual page: "<code class="command">matchpathcon</code> queries the system policy and outputs the default security context associated with the file path."<a href="#ftn.idm219033184160" class="footnote"><sup class="footnote" id="idm219033184160">[26]</sup></a>. The following example demonstrates using the <code class="command">/usr/sbin/matchpathcon</code> command to verify that files in <code class="filename">/var/www/html/</code> directory are labeled correctly:
+				Use the <code class="command">/usr/sbin/matchpathcon</code> command to check if files and directories have the correct SELinux context. From the <span class="citerefentry"><span class="refentrytitle">matchpathcon</span>(8)</span> manual page: "<code class="command">matchpathcon</code> queries the system policy and outputs the default security context associated with the file path."<a href="#ftn.idm219196904832" class="footnote"><sup class="footnote" id="idm219196904832">[25]</sup></a>. The following example demonstrates using the <code class="command">/usr/sbin/matchpathcon</code> command to verify that files in <code class="filename">/var/www/html/</code> directory are labeled correctly:
 			</div><div class="orderedlist"><ol><li class="listitem"><div class="para">
 						As the Linux root user, run the <code class="command">touch /var/www/html/file{1,2,3}</code> command to create three files (<code class="filename">file1</code>, <code class="filename">file2</code>, and <code class="filename">file3</code>). These files inherit the <code class="computeroutput">httpd_sys_content_t</code> type from the <code class="filename">/var/www/html/</code> directory:
 					</div><pre class="screen"># touch /var/www/html/file{1,2,3}
@@ -5216,7 +5182,7 @@ You don't have permission to access <em class="replaceable"><code>file name</cod
 # /usr/sbin/semanage fcontext -a -t httpd_sys_content_t \
 "/srv/myweb(/.*)?"
 </pre><div class="para">
-				This <code class="command">semanage</code> command adds the context for the <code class="filename">/srv/myweb/</code> directory (and all files and directories under it) to the SELinux file-context configuration<a href="#ftn.idm218970834784" class="footnote"><sup class="footnote" id="idm218970834784">[27]</sup></a>. The <code class="command">semanage</code> command does not change the context. As the Linux root user, run the <code class="command">restorecon</code> command to apply the changes:
+				This <code class="command">semanage</code> command adds the context for the <code class="filename">/srv/myweb/</code> directory (and all files and directories under it) to the SELinux file-context configuration<a href="#ftn.idm219174086464" class="footnote"><sup class="footnote" id="idm219174086464">[26]</sup></a>. The <code class="command">semanage</code> command does not change the context. As the Linux root user, run the <code class="command">restorecon</code> command to apply the changes:
 			</div><pre class="screen">
 # /sbin/restorecon -R -v /srv/myweb
 </pre><div class="para">
@@ -5282,7 +5248,7 @@ Unable to open logs
 			</div><pre class="screen">
 type=AVC msg=audit(1225948455.061:294): avc:  denied  { name_bind } for  pid=4997 comm="httpd" src=9876 scontext=unconfined_u:system_r:httpd_t:s0 tcontext=system_u:object_r:port_t:s0 tclass=tcp_socket
 </pre><div class="para">
-				To allow <code class="systemitem">httpd</code> to listen on a port that is not listed for the <code class="computeroutput">http_port_t</code> port type, run the <code class="command">semanage port</code> command to add a port to policy configuration<a href="#ftn.idm219025146960" class="footnote"><sup class="footnote" id="idm219025146960">[28]</sup></a>:
+				To allow <code class="systemitem">httpd</code> to listen on a port that is not listed for the <code class="computeroutput">http_port_t</code> port type, run the <code class="command">semanage port</code> command to add a port to policy configuration<a href="#ftn.idm219198660912" class="footnote"><sup class="footnote" id="idm219198660912">[27]</sup></a>:
 			</div><pre class="screen">
 # /usr/sbin/semanage port -a -t http_port_t -p tcp 9876
 </pre><div class="para">
@@ -5389,9 +5355,9 @@ type=SYSCALL msg=audit(1226882925.714:136): arch=40000003 syscall=5 success=yes
 				</div></div></div><div class="section" id="sect-Security-Enhanced_Linux-Fixing_Problems-Searching_For_and_Viewing_Denials"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">9.6.3.5. Searching For and Viewing Denials</h4></div></div></div><div class="para">
 				This section assumes the <span class="package">setroubleshoot</span>, <span class="package">setroubleshoot-server</span>, <span class="package">dbus</span> and <span class="package">audit</span> packages are installed, and that the <code class="systemitem">auditd</code>, <code class="systemitem">rsyslogd</code>, and <code class="systemitem">setroubleshootd</code> daemons are running. Refer to <a class="xref" href="#sect-Security-Enhanced_Linux-Working_with_SELinux-Which_Log_File_is_Used">Section 9.4.2, “Which Log File is Used”</a> for information about starting these daemons. A number of tools are available for searching for and viewing SELinux denials, such as <code class="command">ausearch</code>, <code class="command">aureport</code>, and <code class="command">sealert</code>.
 			</div><div class="formalpara" id="form-Security-Enhanced_Linux-Searching_For_and_Viewing_Denials-ausearch"><h5 class="formalpara">ausearch</h5>
-					The <span class="package">audit</span> package provides <code class="command">ausearch</code>. From the <span class="citerefentry"><span class="refentrytitle">ausearch</span>(8)</span> manual page: "<code class="command">ausearch</code> is a tool that can query the audit daemon logs based for events based on different search criteria"<a href="#ftn.idm219029144528" class="footnote"><sup class="footnote" id="idm219029144528">[29]</sup></a>. The <code class="command">ausearch</code> tool accesses <code class="filename">/var/log/audit/audit.log</code>, and as such, must be run as the Linux root user:
+					The <span class="package">audit</span> package provides <code class="command">ausearch</code>. From the <span class="citerefentry"><span class="refentrytitle">ausearch</span>(8)</span> manual page: "<code class="command">ausearch</code> is a tool that can query the audit daemon logs based for events based on different search criteria"<a href="#ftn.idm219187685296" class="footnote"><sup class="footnote" id="idm219187685296">[28]</sup></a>. The <code class="command">ausearch</code> tool accesses <code class="filename">/var/log/audit/audit.log</code>, and as such, must be run as the Linux root user:
 				</div><div class="segmentedlist"><table border="0"><thead><tr class="segtitle"><th>Searching For</th><th>Command</th></tr></thead><tbody><tr class="seglistitem"><td class="seg">all denials</td><td class="seg"><code class="command">/sbin/ausearch -m avc</code></td></tr><tr class="seglistitem"><td class="seg">denials for that today</td><td class="seg"><code class="command">/sbin/ausearch -m avc -ts today</code></td></tr><tr class="seglistitem"><td class="seg">denials from the last 10 minutes</td><td class="seg"><code class="command">/sbin/ausearch -m avc -ts recent</code></td></tr></tbody></table></div><div class="para">
-				To search for SELinux denials for a particular service, use the <code class="option">-c <em class="replaceable"><code>comm-name</code></em></code> option, where <em class="replaceable"><code>comm-name</code></em> "is the executable’s name"<a href="#ftn.idm219002136720" class="footnote"><sup class="footnote" id="idm219002136720">[30]</sup></a>, for example, <code class="systemitem">httpd</code> for the Apache HTTP Server, and <code class="systemitem">smbd</code> for Samba:
+				To search for SELinux denials for a particular service, use the <code class="option">-c <em class="replaceable"><code>comm-name</code></em></code> option, where <em class="replaceable"><code>comm-name</code></em> "is the executable’s name"<a href="#ftn.idm219182237104" class="footnote"><sup class="footnote" id="idm219182237104">[29]</sup></a>, for example, <code class="systemitem">httpd</code> for the Apache HTTP Server, and <code class="systemitem">smbd</code> for Samba:
 			</div><div class="para">
 				<code class="command">/sbin/ausearch -m avc -c httpd</code>
 			</div><div class="para">
@@ -5399,7 +5365,7 @@ type=SYSCALL msg=audit(1226882925.714:136): arch=40000003 syscall=5 success=yes
 			</div><div class="para">
 				Refer to the <span class="citerefentry"><span class="refentrytitle">ausearch</span>(8)</span> manual page for further <code class="command">ausearch</code> options.
 			</div><div class="formalpara" id="form-Security-Enhanced_Linux-Searching_For_and_Viewing_Denials-aureport"><h5 class="formalpara">aureport</h5>
-					The <span class="package">audit</span> package provides <code class="command">aureport</code>. From the <span class="citerefentry"><span class="refentrytitle">aureport</span>(8)</span> manual page: "<code class="command">aureport</code> is a tool that produces summary reports of the audit system logs"<a href="#ftn.idm219023249376" class="footnote"><sup class="footnote" id="idm219023249376">[31]</sup></a>. The <code class="command">aureport</code> tool accesses <code class="filename">/var/log/audit/audit.log</code>, and as such, must be run as the Linux root user. To view a list of SELinux denials and how often each one occurred, run the <code class="command">aureport -a</code> command. The following is example output that includes two denials:
+					The <span class="package">audit</span> package provides <code class="command">aureport</code>. From the <span class="citerefentry"><span class="refentrytitle">aureport</span>(8)</span> manual page: "<code class="command">aureport</code> is a tool that produces summary reports of the audit system logs"<a href="#ftn.idm219174632992" class="footnote"><sup class="footnote" id="idm219174632992">[30]</sup></a>. The <code class="command">aureport</code> tool accesses <code class="filename">/var/log/audit/audit.log</code>, and as such, must be run as the Linux root user. To view a list of SELinux denials and how often each one occurred, run the <code class="command">aureport -a</code> command. The following is example output that includes two denials:
 				</div><pre class="screen">
 # /sbin/aureport -a
 
@@ -5530,7 +5496,7 @@ node=<em class="replaceable"><code>hostname</code></em> type=SYSCALL msg=audit(1
 						</div></dd></dl></div></div><div class="section" id="sect-Security-Enhanced_Linux-Fixing_Problems-Allowing_Access_audit2allow"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">9.6.3.8. Allowing Access: audit2allow</h4></div></div></div><div class="para">
 				Do not use the example in this section in production. It is used only to demonstrate the use of <code class="command">audit2allow</code>.
 			</div><div class="para">
-				From the <span class="citerefentry"><span class="refentrytitle">audit2allow</span>(1)</span> manual page: "<code class="command">audit2allow</code> - generate SELinux policy allow rules from logs of denied operations"<a href="#ftn.idm218993312944" class="footnote"><sup class="footnote" id="idm218993312944">[32]</sup></a>. After analyzing denials as per <a class="xref" href="#sect-Security-Enhanced_Linux-Fixing_Problems-sealert_Messages">Section 9.6.3.7, “sealert Messages”</a>, and if no label changes or Booleans allowed access, use <code class="command">audit2allow</code> to create a local policy module. After access is denied by SELinux, running the <code class="command">audit2allow</code> command presents Type Enforcement rules that allow the previously denied access.
+				From the <span class="citerefentry"><span class="refentrytitle">audit2allow</span>(1)</span> manual page: "<code class="command">audit2allow</code> - generate SELinux policy allow rules from logs of denied operations"<a href="#ftn.idm219183229728" class="footnote"><sup class="footnote" id="idm219183229728">[31]</sup></a>. After analyzing denials as per <a class="xref" href="#sect-Security-Enhanced_Linux-Fixing_Problems-sealert_Messages">Section 9.6.3.7, “sealert Messages”</a>, and if no label changes or Booleans allowed access, use <code class="command">audit2allow</code> to create a local policy module. After access is denied by SELinux, running the <code class="command">audit2allow</code> command presents Type Enforcement rules that allow the previously denied access.
 			</div><div class="para">
 				The following example demonstrates using <code class="command">audit2allow</code> to create a policy module:
 			</div><div class="orderedlist"><ol><li class="listitem"><div class="para">
@@ -5652,47 +5618,47 @@ To make this policy package active, execute:
 					#fedora-selinux
 				</div></li><li class="listitem"><div class="para">
 					#security
-				</div></li></ul></div></div></div><div class="footnotes"><br /><hr width="100" align="left" /><div id="ftn.idm219016426016" class="footnote"><div class="para"><a href="#idm219016426016" class="para"><sup class="para">[15] </sup></a>
+				</div></li></ul></div></div></div><div class="footnotes"><br /><hr width="100" align="left" /><div id="ftn.idm219216320832" class="footnote"><div class="para"><a href="#idm219216320832" class="para"><sup class="para">[14] </sup></a>
 			"Integrating Flexible Support for Security Policies into the Linux Operating System", by Peter Loscocco and Stephen Smalley. This paper was originally prepared for the National Security Agency and is, consequently, in the public domain. Refer to the <a href="http://www.nsa.gov/research/_files/selinux/papers/freenix01/index.shtml">original paper</a> for details and the document as it was first released. Any edits and changes were done by Murray McAllister.
-		</div></div><div id="ftn.idm219023556176" class="footnote"><div class="para"><a href="#idm219023556176" class="para"><sup class="para">[16] </sup></a>
+		</div></div><div id="ftn.idm219090529552" class="footnote"><div class="para"><a href="#idm219090529552" class="para"><sup class="para">[15] </sup></a>
 			"Meeting Critical Security Objectives with Security-Enhanced Linux", by Peter Loscocco and Stephen Smalley. This paper was originally prepared for the National Security Agency and is, consequently, in the public domain. Refer to the <a href="http://www.nsa.gov/research/_files/selinux/papers/ottawa01/index.shtml">original paper</a> for details and the document as it was first released. Any edits and changes were done by Murray McAllister.
-		</div></div><div id="ftn.idm219012091040" class="footnote"><div class="para"><a href="#idm219012091040" class="para"><sup class="para">[17] </sup></a>
+		</div></div><div id="ftn.idm219165612720" class="footnote"><div class="para"><a href="#idm219165612720" class="para"><sup class="para">[16] </sup></a>
 						Text files that include information, such as hostname to IP address mappings, that are used by DNS servers.
-					</div></div><div id="ftn.idm218979345440" class="footnote"><div class="para"><a href="#idm218979345440" class="para"><sup class="para">[18] </sup></a>
+					</div></div><div id="ftn.idm219091274352" class="footnote"><div class="para"><a href="#idm219091274352" class="para"><sup class="para">[17] </sup></a>
 						Cox, Mark. "Risk report: Three years of Red Hat Enterprise Linux 4". Published 26 February 2008. Accessed 27 August 2009: <a href="http://www.redhatmagazine.com/2008/02/26/risk-report-three-years-of-red-hat-enterprise-linux-4/">http://www.redhatmagazine.com/2008/02/26/risk-report-three-years-of-red-hat-enterprise-linux-4/</a>.
-					</div></div><div id="ftn.idm219030435632" class="footnote"><div class="para"><a href="#idm219030435632" class="para"><sup class="para">[19] </sup></a>
+					</div></div><div id="ftn.idm219167242912" class="footnote"><div class="para"><a href="#idm219167242912" class="para"><sup class="para">[18] </sup></a>
 						Marti, Don. "A seatbelt for server software: SELinux blocks real-world exploits". Published 24 February 2008. Accessed 27 August 2009: <a href="http://www.linuxworld.com/news/2008/022408-selinux.html?page=1">http://www.linuxworld.com/news/2008/022408-selinux.html?page=1</a>.
-					</div></div><div id="ftn.idm219025017616" class="footnote"><div class="para"><a href="#idm219025017616" class="para"><sup class="para">[20] </sup></a>
+					</div></div><div id="ftn.idm219188217616" class="footnote"><div class="para"><a href="#idm219188217616" class="para"><sup class="para">[19] </sup></a>
 						When using other policies, such as MLS, other roles may be used, for example, <code class="computeroutput">secadm_r</code>.
-					</div></div><div id="ftn.idm218977808816" class="footnote"><div class="para"><a href="#idm218977808816" class="para"><sup class="para">[21] </sup></a>
+					</div></div><div id="ftn.idm219179403584" class="footnote"><div class="para"><a href="#idm219179403584" class="para"><sup class="para">[20] </sup></a>
 						When using other policies, such as MLS, other roles may also be used, for example, <code class="computeroutput">secadm_r</code>.
-					</div></div><div id="ftn.idm219012581472" class="footnote"><div class="para"><a href="#idm219012581472" class="para"><sup class="para">[22] </sup></a>
+					</div></div><div id="ftn.idm219194134896" class="footnote"><div class="para"><a href="#idm219194134896" class="para"><sup class="para">[21] </sup></a>
 				Brindle, Joshua. "Re: blurb for fedora setools packages" Email to Murray McAllister. 1 November 2008. Any edits or changes in this version were done by Murray McAllister.
-			</div></div><div id="ftn.idm218975218672" class="footnote"><div class="para"><a href="#idm218975218672" class="para"><sup class="para">[23] </sup></a>
+			</div></div><div id="ftn.idm219217556208" class="footnote"><div class="para"><a href="#idm219217556208" class="para"><sup class="para">[22] </sup></a>
 				Managing Software with yum, written by Stuart Ellis, edited by Paul W. Frields, Rodrigo Menezes, and Hugo Cisneiros.
-			</div></div><div id="ftn.idm219019247824" class="footnote"><div class="para"><a href="#idm219019247824" class="para"><sup class="para">[24] </sup></a>
+			</div></div><div id="ftn.idm219175604688" class="footnote"><div class="para"><a href="#idm219175604688" class="para"><sup class="para">[23] </sup></a>
 				Files in <code class="filename">/etc/selinux/targeted/contexts/files/</code> define contexts for files and directories. Files in this directory are read by <code class="command">restorecon</code> and <code class="command">setfiles</code> to restore files and directories to their default contexts.
-			</div></div><div id="ftn.idm219021304880" class="footnote"><div class="para"><a href="#idm219021304880" class="para"><sup class="para">[25] </sup></a>
+			</div></div><div id="ftn.idm219164375344" class="footnote"><div class="para"><a href="#idm219164375344" class="para"><sup class="para">[24] </sup></a>
 							Morris, James. "Filesystem Labeling in SELinux". Published 1 October 2004. Accessed 14 October 2008: <a href="http://www.linuxjournal.com/article/7426">http://www.linuxjournal.com/article/7426</a>.
-						</div></div><div id="ftn.idm219033184160" class="footnote"><div class="para"><a href="#idm219033184160" class="para"><sup class="para">[26] </sup></a>
+						</div></div><div id="ftn.idm219196904832" class="footnote"><div class="para"><a href="#idm219196904832" class="para"><sup class="para">[25] </sup></a>
 					The <span class="citerefentry"><span class="refentrytitle">matchpathcon</span>(8)</span> manual page, as shipped with the <span class="package">libselinux-utils</span> package in Fedora, is written by Daniel Walsh. Any edits or changes in this version were done by Murray McAllister.
-				</div></div><div id="ftn.idm218970834784" class="footnote"><div class="para"><a href="#idm218970834784" class="para"><sup class="para">[27] </sup></a>
+				</div></div><div id="ftn.idm219174086464" class="footnote"><div class="para"><a href="#idm219174086464" class="para"><sup class="para">[26] </sup></a>
 					Files in <code class="filename">/etc/selinux/targeted/contexts/files/</code> define contexts for files and directories. Files in this directory are read by <code class="command">restorecon</code> and <code class="command">setfiles</code> to restore files and directories to their default contexts.
-				</div></div><div id="ftn.idm219025146960" class="footnote"><div class="para"><a href="#idm219025146960" class="para"><sup class="para">[28] </sup></a>
+				</div></div><div id="ftn.idm219198660912" class="footnote"><div class="para"><a href="#idm219198660912" class="para"><sup class="para">[27] </sup></a>
 					The <code class="command">semanage port -a</code> command adds an entry to the <code class="filename">/etc/selinux/targeted/modules/active/ports.local</code> file. Note: by default, this file can only be viewed by the Linux root user.
-				</div></div><div id="ftn.idm219029144528" class="footnote"><div class="para"><a href="#idm219029144528" class="para"><sup class="para">[29] </sup></a>
+				</div></div><div id="ftn.idm219187685296" class="footnote"><div class="para"><a href="#idm219187685296" class="para"><sup class="para">[28] </sup></a>
 						From the <span class="citerefentry"><span class="refentrytitle">ausearch</span>(8)</span> manual page, as shipped with the <span class="package">audit</span> package in Fedora 19.
-					</div></div><div id="ftn.idm219002136720" class="footnote"><div class="para"><a href="#idm219002136720" class="para"><sup class="para">[30] </sup></a>
+					</div></div><div id="ftn.idm219182237104" class="footnote"><div class="para"><a href="#idm219182237104" class="para"><sup class="para">[29] </sup></a>
 					From the <span class="citerefentry"><span class="refentrytitle">ausearch</span>(8)</span> manual page, as shipped with the <span class="package">audit</span> package in Fedora 19.
-				</div></div><div id="ftn.idm219023249376" class="footnote"><div class="para"><a href="#idm219023249376" class="para"><sup class="para">[31] </sup></a>
+				</div></div><div id="ftn.idm219174632992" class="footnote"><div class="para"><a href="#idm219174632992" class="para"><sup class="para">[30] </sup></a>
 						From the <span class="citerefentry"><span class="refentrytitle">aureport</span>(8)</span> manual page, as shipped with the <span class="package">audit</span> package in Fedora 19.
-					</div></div><div id="ftn.idm218993312944" class="footnote"><div class="para"><a href="#idm218993312944" class="para"><sup class="para">[32] </sup></a>
+					</div></div><div id="ftn.idm219183229728" class="footnote"><div class="para"><a href="#idm219183229728" class="para"><sup class="para">[31] </sup></a>
 					From the <span class="citerefentry"><span class="refentrytitle">audit2allow</span>(1)</span> manual page, as shipped with the <span class="package">policycoreutils</span> package in Fedora 19.
-				</div></div></div></div><div xml:lang="en-US" class="chapter" id="idm219033574720" lang="en-US"><div class="titlepage"><div><div><h1 class="title" id="idm219033574720">Chapter 10. Managing Confined Services</h1></div></div></div><div class="toc"><dl class="toc"><dt><span class="section"><a href="#sect-Managing_Confined_Services-Introduction">10.1. Introduction</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Targeted_policy">10.2. Targeted policy</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-Targeted_policy-Type_Enforcement">10.2.1. Type Enforcement</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Targeted_policy-Confined_processes">10.2.2. Confined processes</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Targeted_policy-Unconfined_processes">10.2.3. Unconfined processes</a></span></dt></dl></dd><dt><span class="section"><
 a href="#sect-Managing_Confined_Services-The_Apache_HTTP_Server">10.3. The Apache HTTP Server</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-The_Apache_HTTP_Server-The_Apache_HTTP_Server_and_SELinux">10.3.1. The Apache HTTP Server and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-The_Apache_HTTP_Server-Types">10.3.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-The_Apache_HTTP_Server-Booleans">10.3.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-The_Apache_HTTP_Server-Configuration_examples">10.3.4. Configuration examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-Samba">10.4. Samba</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-Samba-Samba_and_SELinux">10.4.1. Samba and SELinux</a></span></dt><dt><span cl
 ass="section"><a href="#sect-Managing_Confined_Services-Samba-Types">10.4.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Samba-Booleans">10.4.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Samba-Configuration_examples">10.4.4. Configuration examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-File_Transfer_Protocol">10.5. File Transfer Protocol</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-File_Transfer_Protocol-FTP_and_SELinux">10.5.1. FTP and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-File_Transfer_Protocol-Types">10.5.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-File_Transfer_Protocol-Booleans">10.5.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Fi
 le_Transfer_Protocol-Configuration_Examples">10.5.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-Network_File_System">10.6. Network File System</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-NFS-NFS_and_SELinux">10.6.1. NFS and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-NFS-Types">10.6.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_services-NFS-Booleans">10.6.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-NFS-Configuration_Examples">10.6.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-Berkeley_Internet_Name_Domain">10.7. Berkeley Internet Name Domain</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-BIND-BIND_and_SELinux"
 >10.7.1. BIND and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-BIND-Types">10.7.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-BIND-Booleans">10.7.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-BIND-Configuration_Examples">10.7.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-Concurrent_Versioning_System">10.8. Concurrent Versioning System</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-Concurrent_Versioning_System-CVS_and_SELinux">10.8.1. CVS and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Concurrent_Versioning_System-Types">10.8.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Concurrent_Versioning_System-Booleans">10.8.3. Booleans</a></
 span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Concurrent_Versioning_System-Configuration_Examples">10.8.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-Squid_Caching_Proxy">10.9. Squid Caching Proxy</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-Squid_Caching_Proxy-Squid_Caching_Proxy_and_SELinux">10.9.1. Squid Caching Proxy and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Squid_Caching_Proxy-Types">10.9.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Squid_Caching_Proxy-Booleans">10.9.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Squid_Caching_Proxy-Configuration_Examples">10.9.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Service
 s-MySQL">10.10. MySQL</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-MySQL-MySQL_and_SELinux">10.10.1. MySQL and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-MySQL-Types">10.10.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-MySQL-Booleans">10.10.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-MySQL-Configuration_Examples">10.10.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-PostgreSQL">10.11. PostgreSQL</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-PostgreSQL-PostgreSQL_and_SELinux">10.11.1. PostgreSQL and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-PostgreSQL-Types">10.11.2. Types</a></span></dt><dt><span class="section"><a href="#sec
 t-Managing_Confined_Services-PostgreSQL-Booleans">10.11.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-PostgreSQL-Configuration_Examples">10.11.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-rsync">10.12. rsync</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-rsync-rsync_and_SELinux">10.12.1. rsync and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-rsync-Types">10.12.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-rsync-Booleans">10.12.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-rsync-Configuration_Examples">10.12.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-Postfix">10.13. Postfix</a></span></dt><dd><dl><d
 t><span class="section"><a href="#sect-Managing_Confined_Services-rsync-Postfix_and_SELinux">10.13.1. Postfix and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Postfix-Types">10.13.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Postfix-Booleans">10.13.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Postfix-Configuration_Examples">10.13.4. Configuration Examples</a></span></dt></dl></dd></dl></div><div class="para">
+				</div></div></div></div><div xml:lang="en-US" class="chapter" id="idm219163491248" lang="en-US"><div class="titlepage"><div><div><h1 class="title" id="idm219163491248">Chapter 10. Managing Confined Services</h1></div></div></div><div class="toc"><dl class="toc"><dt><span class="section"><a href="#sect-Managing_Confined_Services-Introduction">10.1. Introduction</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Targeted_policy">10.2. Targeted policy</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-Targeted_policy-Type_Enforcement">10.2.1. Type Enforcement</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Targeted_policy-Confined_processes">10.2.2. Confined processes</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Targeted_policy-Unconfined_processes">10.2.3. Unconfined processes</a></span></dt></dl></dd><dt><span class="section"><
 a href="#sect-Managing_Confined_Services-The_Apache_HTTP_Server">10.3. The Apache HTTP Server</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-The_Apache_HTTP_Server-The_Apache_HTTP_Server_and_SELinux">10.3.1. The Apache HTTP Server and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-The_Apache_HTTP_Server-Types">10.3.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-The_Apache_HTTP_Server-Booleans">10.3.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-The_Apache_HTTP_Server-Configuration_examples">10.3.4. Configuration examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-Samba">10.4. Samba</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-Samba-Samba_and_SELinux">10.4.1. Samba and SELinux</a></span></dt><dt><span cl
 ass="section"><a href="#sect-Managing_Confined_Services-Samba-Types">10.4.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Samba-Booleans">10.4.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Samba-Configuration_examples">10.4.4. Configuration examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-File_Transfer_Protocol">10.5. File Transfer Protocol</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-File_Transfer_Protocol-FTP_and_SELinux">10.5.1. FTP and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-File_Transfer_Protocol-Types">10.5.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-File_Transfer_Protocol-Booleans">10.5.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Fi
 le_Transfer_Protocol-Configuration_Examples">10.5.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-Network_File_System">10.6. Network File System</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-NFS-NFS_and_SELinux">10.6.1. NFS and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-NFS-Types">10.6.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_services-NFS-Booleans">10.6.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-NFS-Configuration_Examples">10.6.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-Berkeley_Internet_Name_Domain">10.7. Berkeley Internet Name Domain</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-BIND-BIND_and_SELinux"
 >10.7.1. BIND and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-BIND-Types">10.7.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-BIND-Booleans">10.7.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-BIND-Configuration_Examples">10.7.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-Concurrent_Versioning_System">10.8. Concurrent Versioning System</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-Concurrent_Versioning_System-CVS_and_SELinux">10.8.1. CVS and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Concurrent_Versioning_System-Types">10.8.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Concurrent_Versioning_System-Booleans">10.8.3. Booleans</a></
 span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Concurrent_Versioning_System-Configuration_Examples">10.8.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-Squid_Caching_Proxy">10.9. Squid Caching Proxy</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-Squid_Caching_Proxy-Squid_Caching_Proxy_and_SELinux">10.9.1. Squid Caching Proxy and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Squid_Caching_Proxy-Types">10.9.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Squid_Caching_Proxy-Booleans">10.9.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Squid_Caching_Proxy-Configuration_Examples">10.9.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Service
 s-MySQL">10.10. MySQL</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-MySQL-MySQL_and_SELinux">10.10.1. MySQL and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-MySQL-Types">10.10.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-MySQL-Booleans">10.10.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-MySQL-Configuration_Examples">10.10.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-PostgreSQL">10.11. PostgreSQL</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-PostgreSQL-PostgreSQL_and_SELinux">10.11.1. PostgreSQL and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-PostgreSQL-Types">10.11.2. Types</a></span></dt><dt><span class="section"><a href="#sec
 t-Managing_Confined_Services-PostgreSQL-Booleans">10.11.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-PostgreSQL-Configuration_Examples">10.11.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-rsync">10.12. rsync</a></span></dt><dd><dl><dt><span class="section"><a href="#sect-Managing_Confined_Services-rsync-rsync_and_SELinux">10.12.1. rsync and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-rsync-Types">10.12.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-rsync-Booleans">10.12.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-rsync-Configuration_Examples">10.12.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="#sect-Managing_Confined_Services-Postfix">10.13. Postfix</a></span></dt><dd><dl><d
 t><span class="section"><a href="#sect-Managing_Confined_Services-rsync-Postfix_and_SELinux">10.13.1. Postfix and SELinux</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Postfix-Types">10.13.2. Types</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Postfix-Booleans">10.13.3. Booleans</a></span></dt><dt><span class="section"><a href="#sect-Managing_Confined_Services-Postfix-Configuration_Examples">10.13.4. Configuration Examples</a></span></dt></dl></dd></dl></div><div class="para">
 	</div><div xml:lang="en-US" class="section" id="sect-Managing_Confined_Services-Introduction" lang="en-US"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">10.1. Introduction</h2></div></div></div><div class="para">
 		Security-Enhanced Linux (SELinux) refers to files, such as directories and devices, as objects. Processes, such as a user running a command or the <span class="trademark">Mozilla</span>®<span class="trademark"> Firefox</span>® application, are referred to as subjects. Most operating systems use a Discretionary Access Control (DAC) system that controls how subjects interact with objects, and how subjects interact with each other. On operating systems using DAC, users control the permissions of files (objects) that they own. For example, on <span class="trademark">Linux</span>® operating systems, users could make their home directories world-readable, inadvertently giving users and processes (subjects) access to potentially sensitive information.
 	</div><div class="para">
-		DAC mechanisms are fundamentally inadequate for strong system security. DAC access decisions are only based on user identity and ownership, ignoring other security-relevant information such as the role of the user, the function and trustworthiness of the program, and the sensitivity and integrity of the data. Each user has complete discretion over their files, making it impossible to enforce a system-wide security policy. Furthermore, every program run by a user inherits all of the permissions granted to the user and is free to change access to the user's files, so no protection is provided against malicious software. Many system services and privileged programs must run with coarse-grained privileges that far exceed their requirements, so that a flaw in any one of these programs can be exploited to obtain complete system access.<a href="#ftn.idm219017629952" class="footnote"><sup class="footnote" id="idm219017629952">[33]</sup></a>
+		DAC mechanisms are fundamentally inadequate for strong system security. DAC access decisions are only based on user identity and ownership, ignoring other security-relevant information such as the role of the user, the function and trustworthiness of the program, and the sensitivity and integrity of the data. Each user has complete discretion over their files, making it impossible to enforce a system-wide security policy. Furthermore, every program run by a user inherits all of the permissions granted to the user and is free to change access to the user's files, so no protection is provided against malicious software. Many system services and privileged programs must run with coarse-grained privileges that far exceed their requirements, so that a flaw in any one of these programs can be exploited to obtain complete system access.<a href="#ftn.idm219198025872" class="footnote"><sup class="footnote" id="idm219198025872">[32]</sup></a>
 	</div><div class="para">
 		The following is an example of permissions used on Linux operating systems that do not run Security-Enhanced Linux (SELinux). The permissions in these examples may differ from your system. Use the <code class="command">ls -l</code> command to view file permissions:
 	</div><pre class="screen">
@@ -5701,7 +5667,7 @@ $ ls -l file1
 </pre><div class="para">
 		The first three permission bits, <code class="computeroutput">rwx</code>, control the access the Linux <code class="computeroutput">user1</code> user (in this case, the owner) has to <code class="filename">file1</code>. The next three permission bits, <code class="computeroutput">rw-</code>, control the access the Linux <code class="computeroutput">group1</code> group has to <code class="filename">file1</code>. The last three permission bits, <code class="computeroutput">r--</code>, control the access everyone else has to <code class="filename">file1</code>, which includes all users and processes.
 	</div><div class="para">
-		Security-Enhanced Linux (SELinux) adds Mandatory Access Control (MAC) to the Linux kernel, and is enabled by default in Fedora. A general purpose MAC architecture needs the ability to enforce an administratively-set security policy over all processes and files in the system, basing decisions on labels containing a variety of security-relevant information. When properly implemented, it enables a system to adequately defend itself and offers critical support for application security by protecting against the tampering with, and bypassing of, secured applications. MAC provides strong separation of applications that permits the safe execution of untrustworthy applications. Its ability to limit the privileges associated with executing processes limits the scope of potential damage that can result from the exploitation of vulnerabilities in applications and system services. MAC enables information to be protected from legitimate users with limited authorization as well as from a
 uthorized users who have unwittingly executed malicious applications.<a href="#ftn.idm219009516672" class="footnote"><sup class="footnote" id="idm219009516672">[34]</sup></a>
+		Security-Enhanced Linux (SELinux) adds Mandatory Access Control (MAC) to the Linux kernel, and is enabled by default in Fedora. A general purpose MAC architecture needs the ability to enforce an administratively-set security policy over all processes and files in the system, basing decisions on labels containing a variety of security-relevant information. When properly implemented, it enables a system to adequately defend itself and offers critical support for application security by protecting against the tampering with, and bypassing of, secured applications. MAC provides strong separation of applications that permits the safe execution of untrustworthy applications. Its ability to limit the privileges associated with executing processes limits the scope of potential damage that can result from the exploitation of vulnerabilities in applications and system services. MAC enables information to be protected from legitimate users with limited authorization as well as from a
 uthorized users who have unwittingly executed malicious applications.<a href="#ftn.idm219195749296" class="footnote"><sup class="footnote" id="idm219195749296">[33]</sup></a>
 	</div><div class="para">
 		The following is an example of the labels containing security-relevant information that are used on processes, Linux users, and files, on Linux operating systems that run SELinux. This information is called the SELinux context, and is viewed using the <code class="command">ls -Z</code> command:
 	</div><pre class="screen">
@@ -5739,7 +5705,7 @@ Policy from config file:        targeted
 					Run the <code class="command">ls -Z /var/www/html/testfile</code> command to view the SELinux context:
 				</div><pre class="screen">-rw-r--r--  root root unconfined_u:object_r:httpd_sys_content_t:s0 /var/www/html/testfile
 </pre><div class="para">
-					The <code class="filename">testfile</code> file is labeled with the SELinux <code class="computeroutput">unconfined_u</code> user because a Linux user that is mapped to the <code class="computeroutput">unconfined_u</code> SELinux user created the file. Role-Based Access Control (RBAC) is used for processes, not files. Roles do not have a meaning for files - the <code class="computeroutput">object_r</code> role is a generic role used for files (on persistent storage and network file systems). Under the <code class="filename">/proc/</code> directory, files related to processes may use the <code class="computeroutput">system_r</code> role.<a href="#ftn.idm218981015904" class="footnote"><sup class="footnote" id="idm218981015904">[35]</sup></a> The <code class="computeroutput">httpd_sys_content_t</code> type allows the <code class="systemitem">httpd</code> process to access this file.
+					The <code class="filename">testfile</code> file is labeled with the SELinux <code class="computeroutput">unconfined_u</code> user because a Linux user that is mapped to the <code class="computeroutput">unconfined_u</code> SELinux user created the file. Role-Based Access Control (RBAC) is used for processes, not files. Roles do not have a meaning for files - the <code class="computeroutput">object_r</code> role is a generic role used for files (on persistent storage and network file systems). Under the <code class="filename">/proc/</code> directory, files related to processes may use the <code class="computeroutput">system_r</code> role.<a href="#ftn.idm219194550096" class="footnote"><sup class="footnote" id="idm219194550096">[34]</sup></a> The <code class="computeroutput">httpd_sys_content_t</code> type allows the <code class="systemitem">httpd</code> process to access this file.
 				</div></li><li class="listitem"><div class="para">
 					As the root user, run the <code class="command">service httpd start</code> command to start the <code class="systemitem">httpd</code> process. The output is as follows if <code class="systemitem">httpd</code> starts successfully:
 				</div><pre class="screen"># /sbin/service httpd start
@@ -5811,7 +5777,7 @@ Policy from config file:        targeted
 					Run the <code class="command">ls -Z /var/www/html/test2file</code> command to view the SELinux context:
 				</div><pre class="screen">-rw-r--r--  root root unconfined_u:object_r:httpd_sys_content_t:s0 /var/www/html/test2file
 </pre><div class="para">
-					<code class="filename">test2file</code> is labeled with the SELinux <code class="computeroutput">unconfined_u</code> user because a Linux user that is mapped to the <code class="computeroutput">unconfined_u</code> SELinux user created the file. RBAC is used for processes, not files. Roles do not have a meaning for files - the <code class="computeroutput">object_r</code> role is a generic role used for files (on persistent storage and network file systems). Under the <code class="filename">/proc/</code> directory, files related to processes may use the <code class="computeroutput">system_r</code> role.<a href="#ftn.idm219022836096" class="footnote"><sup class="footnote" id="idm219022836096">[36]</sup></a> The <code class="computeroutput">httpd_sys_content_t</code> type allows the <code class="systemitem">httpd</code> process to access this file.
+					<code class="filename">test2file</code> is labeled with the SELinux <code class="computeroutput">unconfined_u</code> user because a Linux user that is mapped to the <code class="computeroutput">unconfined_u</code> SELinux user created the file. RBAC is used for processes, not files. Roles do not have a meaning for files - the <code class="computeroutput">object_r</code> role is a generic role used for files (on persistent storage and network file systems). Under the <code class="filename">/proc/</code> directory, files related to processes may use the <code class="computeroutput">system_r</code> role.<a href="#ftn.idm219151870720" class="footnote"><sup class="footnote" id="idm219151870720">[35]</sup></a> The <code class="computeroutput">httpd_sys_content_t</code> type allows the <code class="systemitem">httpd</code> process to access this file.
 				</div></li><li class="listitem"><div class="para">
 					The <code class="command">chcon</code> command relabels files; however, such label changes do not survive when the file system is relabeled. For permanent changes that survive a file system relabel, use the <code class="command">semanage</code> command, which is discussed later. As the root user, run the following command to change the type to a type used by Samba:
 				</div><div class="para">
@@ -5898,7 +5864,7 @@ Stopping httpd:                                            [  OK  ]
 		</div></div></div><div xml:lang="en-US" class="section" id="sect-Managing_Confined_Services-The_Apache_HTTP_Server" lang="en-US"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">10.3. The Apache HTTP Server</h2></div></div></div><div class="para">
 		From the <a href="http://httpd.apache.org/">Apache HTTP Server Project</a> page:
 	</div><div class="para">
-		"The Apache HTTP Server Project is an effort to develop and maintain an open-source HTTP server for modern operating systems including UNIX and Windows NT. The goal of this project is to provide a secure, efficient and extensible server that provides HTTP services in sync with the current HTTP standards".<a href="#ftn.idm219017854048" class="footnote"><sup class="footnote" id="idm219017854048">[37]</sup></a>
+		"The Apache HTTP Server Project is an effort to develop and maintain an open-source HTTP server for modern operating systems including UNIX and Windows NT. The goal of this project is to provide a secure, efficient and extensible server that provides HTTP services in sync with the current HTTP standards".<a href="#ftn.idm219183331072" class="footnote"><sup class="footnote" id="idm219183331072">[36]</sup></a>
 	</div><div class="para">
 		In Fedora, the <span class="package">httpd</span> package provides the Apache HTTP Server. Run <code class="command">rpm -q httpd</code> to see if the <span class="package">httpd</span> package is installed. If it is not installed and you want to use the Apache HTTP Server, run the following command as the root user to install it:
 	</div><pre class="screen">
@@ -6327,7 +6293,7 @@ http_port_t                    tcp      12345, 80, 443, 488, 8008, 8009, 8443
 			</div></div></div></div><div xml:lang="en-US" class="section" id="sect-Managing_Confined_Services-Samba" lang="en-US"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">10.4. Samba</h2></div></div></div><div class="para">
 		From the <a href="http://samba.org/">Samba</a> website:
 	</div><div class="para">
-		"Samba is an <a href="http://www.opensource.org/">Open Source</a>/<a href="http://www.gnu.org/philosophy/free-sw.html">Free Software</a> suite that has, <a href="http://us1.samba.org/samba/docs/10years.html">since 1992</a>, provided file and print services to all manner of SMB/CIFS clients, including the numerous versions of Microsoft Windows operating systems. Samba is freely available under the <a href="http://us1.samba.org/samba/docs/GPL.html">GNU General Public License</a>.".<a href="#ftn.idm219005982208" class="footnote"><sup class="footnote" id="idm219005982208">[38]</sup></a>
+		"Samba is an <a href="http://www.opensource.org/">Open Source</a>/<a href="http://www.gnu.org/philosophy/free-sw.html">Free Software</a> suite that has, <a href="http://us1.samba.org/samba/docs/10years.html">since 1992</a>, provided file and print services to all manner of SMB/CIFS clients, including the numerous versions of Microsoft Windows operating systems. Samba is freely available under the <a href="http://us1.samba.org/samba/docs/GPL.html">GNU General Public License</a>.".<a href="#ftn.idm219177371200" class="footnote"><sup class="footnote" id="idm219177371200">[37]</sup></a>
 	</div><div class="para">
 		In Fedora, the <span class="package">samba</span> package provides the Samba server. Run <code class="command">rpm -q samba</code> to see if the <span class="package">samba</span> package is installed. If it is not installed and you want to use Samba, run the following command as the root user to install it:
 	</div><pre class="screen">
@@ -6517,9 +6483,9 @@ Starting SMB services:                                     [  OK  ]
 </pre></li></ol></div></div></div></div><div xml:lang="en-US" class="section" id="sect-Managing_Confined_Services-File_Transfer_Protocol" lang="en-US"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">10.5. File Transfer Protocol</h2></div></div></div><div class="para">
 		From the <a href="http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Deployment_Guide/index.html">Red Hat Enterprise Linux 5 Deployment Guide</a>:
 	</div><div class="para">
-		File Transfer Protocol (FTP) is one of the oldest and most commonly used protocols found on the Internet today. Its purpose is to reliably transfer files between computer hosts on a network without requiring the user to log directly into the remote host or have knowledge of how to use the remote system. It allows users to access files on remote systems using a standard set of simple commands.<a href="#ftn.idm218930096208" class="footnote"><sup class="footnote" id="idm218930096208">[39]</sup></a>
+		File Transfer Protocol (FTP) is one of the oldest and most commonly used protocols found on the Internet today. Its purpose is to reliably transfer files between computer hosts on a network without requiring the user to log directly into the remote host or have knowledge of how to use the remote system. It allows users to access files on remote systems using a standard set of simple commands.<a href="#ftn.idm219199865296" class="footnote"><sup class="footnote" id="idm219199865296">[38]</sup></a>
 	</div><div class="para">
-		The Very Secure FTP Daemon (<code class="systemitem">vsftpd</code>) is designed from the ground up to be fast, stable, and, most importantly, secure. Its ability to handle large numbers of connections efficiently and securely is why <code class="systemitem">vsftpd</code> is the only stand-alone FTP distributed with Red Hat Enterprise Linux.<a href="#ftn.idm219022559232" class="footnote"><sup class="footnote" id="idm219022559232">[40]</sup></a>
+		The Very Secure FTP Daemon (<code class="systemitem">vsftpd</code>) is designed from the ground up to be fast, stable, and, most importantly, secure. Its ability to handle large numbers of connections efficiently and securely is why <code class="systemitem">vsftpd</code> is the only stand-alone FTP distributed with Red Hat Enterprise Linux.<a href="#ftn.idm219227491360" class="footnote"><sup class="footnote" id="idm219227491360">[39]</sup></a>
 	</div><div class="para">
 		In Fedora, the <span class="package">vsftpd</span> package provides the Very Secure FTP daemon. Run <code class="command">rpm -q vsftpd</code> to see if <span class="package">vsftpd</span> is installed:
 	</div><pre class="screen">
@@ -7703,61 +7669,61 @@ tcp	0	0 127.0.0.1:10000	0.0.0.0:*	LISTEN	2224/spamd.pid
 
 					</div></li><li class="listitem"><div class="para">
 						At this point, <code class="systemitem">spamd</code> is properly operating on TCP port 10000 as it has been allowed access to that port by SELinux policy.
-					</div></li></ol></div></div></div></div><div class="footnotes"><br /><hr width="100" align="left" /><div id="ftn.idm219017629952" class="footnote"><div class="para"><a href="#idm219017629952" class="para"><sup class="para">[33] </sup></a>
+					</div></li></ol></div></div></div></div><div class="footnotes"><br /><hr width="100" align="left" /><div id="ftn.idm219198025872" class="footnote"><div class="para"><a href="#idm219198025872" class="para"><sup class="para">[32] </sup></a>
 			"Integrating Flexible Support for Security Policies into the Linux Operating System", by Peter Loscocco and Stephen Smalley. This paper was originally prepared for the National Security Agency and is, consequently, in the public domain. Refer to the <a href="http://www.nsa.gov/research/_files/selinux/papers/freenix01/index.shtml">original paper</a> for details and the document as it was first released. Any edits and changes were done by Murray McAllister.
-		</div></div><div id="ftn.idm219009516672" class="footnote"><div class="para"><a href="#idm219009516672" class="para"><sup class="para">[34] </sup></a>
+		</div></div><div id="ftn.idm219195749296" class="footnote"><div class="para"><a href="#idm219195749296" class="para"><sup class="para">[33] </sup></a>
 			"Meeting Critical Security Objectives with Security-Enhanced Linux", by Peter Loscocco and Stephen Smalley. This paper was originally prepared for the National Security Agency and is, consequently, in the public domain. Refer to the <a href="http://www.nsa.gov/research/_files/selinux/papers/ottawa01/index.shtml">original paper</a> for details and the document as it was first released. Any edits and changes were done by Murray McAllister.
-		</div></div><div id="ftn.idm218981015904" class="footnote"><div class="para"><a href="#idm218981015904" class="para"><sup class="para">[35] </sup></a>
+		</div></div><div id="ftn.idm219194550096" class="footnote"><div class="para"><a href="#idm219194550096" class="para"><sup class="para">[34] </sup></a>
 						When using other policies, such as MLS, other roles may be used, for example, <code class="computeroutput">secadm_r</code>.
-					</div></div><div id="ftn.idm219022836096" class="footnote"><div class="para"><a href="#idm219022836096" class="para"><sup class="para">[36] </sup></a>
+					</div></div><div id="ftn.idm219151870720" class="footnote"><div class="para"><a href="#idm219151870720" class="para"><sup class="para">[35] </sup></a>
 						When using other policies, such as MLS, other roles may also be used, for example, <code class="computeroutput">secadm_r</code>.
-					</div></div><div id="ftn.idm219017854048" class="footnote"><div class="para"><a href="#idm219017854048" class="para"><sup class="para">[37] </sup></a>
+					</div></div><div id="ftn.idm219183331072" class="footnote"><div class="para"><a href="#idm219183331072" class="para"><sup class="para">[36] </sup></a>
 			From the "The Number One HTTP Server On The Internet" section of the Apache HTTP Server Project page: <a href="http://httpd.apache.org/">http://httpd.apache.org/</a>. Copyright © 2010 The Apache Software Foundation. Accessed 1 March 2010.
-		</div></div><div id="ftn.idm219005982208" class="footnote"><div class="para"><a href="#idm219005982208" class="para"><sup class="para">[38] </sup></a>
+		</div></div><div id="ftn.idm219177371200" class="footnote"><div class="para"><a href="#idm219177371200" class="para"><sup class="para">[37] </sup></a>
 			From the opening paragraph on the Samba website: <a href="http://samba.org">http://samba.org</a>. Accessed 20 January 2009.
-		</div></div><div id="ftn.idm218930096208" class="footnote"><div class="para"><a href="#idm218930096208" class="para"><sup class="para">[39] </sup></a>
+		</div></div><div id="ftn.idm219199865296" class="footnote"><div class="para"><a href="#idm219199865296" class="para"><sup class="para">[38] </sup></a>
 			The first paragraph of "Chapter 23. FTP" of the Red Hat Enterprise Linux 5 Deployment Guide: <a href="http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Deployment_Guide/ch-ftp.html">http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Deployment_Guide/ch-ftp.html</a>. Copyright © 2007 Red Hat, Inc.
-		</div></div><div id="ftn.idm219022559232" class="footnote"><div class="para"><a href="#idm219022559232" class="para"><sup class="para">[40] </sup></a>
+		</div></div><div id="ftn.idm219227491360" class="footnote"><div class="para"><a href="#idm219227491360" class="para"><sup class="para">[39] </sup></a>
 			The first paragraph of the "23.2.1. vsftpd" section of the Red Hat Enterprise Linux 5 Deployment Guide: <a href="http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Deployment_Guide/s1-ftp-servers.html#s2-ftp-servers-vsftpd">http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Deployment_Guide/s1-ftp-servers.html#s2-ftp-servers-vsftpd</a>. Copyright © 2007 Red Hat, Inc.
 		</div></div></div></div><div xml:lang="en-US" class="appendix" id="chap-Security_Guide-Encryption_Standards" lang="en-US"><div class="titlepage"><div><div><h1 class="title">Encryption Standards</h1></div></div></div><div class="para">
-	</div><div class="section" id="idm219022408448"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title" id="idm219022408448">A.1. Synchronous Encryption</h2></div></div></div><div class="para">
-		</div><div class="section" id="idm219045320384"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219045320384">A.1.1. Advanced Encryption Standard - AES</h3></div></div></div><div class="para">
-				In cryptography, the Advanced Encryption Standard (AES) is an encryption standard adopted by the U.S. government. The standard comprises three block ciphers, AES-128, AES-192 and AES-256, adopted from a larger collection originally published as Rijndael. Each AES cipher has a 128-bit block size, with key sizes of 128, 192 and 256 bits, respectively. The AES ciphers have been analyzed extensively and are now used worldwide, as was the case with its predecessor, the Data Encryption Standard (DES).<a href="#ftn.idm218991684656" class="footnote"><sup class="footnote" id="idm218991684656">[41]</sup></a>
-			</div><div class="section" id="idm218931425664"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title" id="idm218931425664">A.1.1.1. AES Uses</h4></div></div></div><div class="para">
-				</div></div><div class="section" id="idm218994042448"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title" id="idm218994042448">A.1.1.2. AES History</h4></div></div></div><div class="para">
-					AES was announced by National Institute of Standards and Technology (NIST) as U.S. FIPS PUB 197 (FIPS 197) on November 26, 2001 after a 5-year standardization process in which fifteen competing designs were presented and evaluated before Rijndael was selected as the most suitable (see Advanced Encryption Standard process for more details). It became effective as a standard May 26, 2002. It is available in many different encryption packages. AES is the first publicly accessible and open cipher approved by the NSA for top secret information (see Security of AES, below).<a href="#ftn.idm218968053104" class="footnote"><sup class="footnote" id="idm218968053104">[42]</sup></a>
-				</div><div class="para">
-					The Rijndael cipher was developed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen, and submitted by them to the AES selection process. Rijndael (pronounced [rɛindaːl]) is a portmanteau of the names of the two inventors.<a href="#ftn.idm218928109392" class="footnote"><sup class="footnote" id="idm218928109392">[43]</sup></a>
-				</div></div></div><div class="section" id="idm219019737760"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219019737760">A.1.2.  Data Encryption Standard - DES</h3></div></div></div><div class="para">
-				The Data Encryption Standard (DES) is a block cipher (a form of shared secret encryption) that was selected by the National Bureau of Standards as an official Federal Information Processing Standard (FIPS) for the United States in 1976 and which has subsequently enjoyed widespread use internationally. It is based on a symmetric-key algorithm that uses a 56-bit key. The algorithm was initially controversial with classified design elements, a relatively short key length, and suspicions about a National Security Agency (NSA) backdoor. DES consequently came under intense academic scrutiny which motivated the modern understanding of block ciphers and their cryptanalysis.<a href="#ftn.idm219016811440" class="footnote"><sup class="footnote" id="idm219016811440">[44]</sup></a>
-			</div><div class="section" id="idm219006559632"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title" id="idm219006559632">A.1.2.1. DES Uses</h4></div></div></div><div class="para">
-				</div></div><div class="section" id="idm219024605024"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title" id="idm219024605024">A.1.2.2. DES History</h4></div></div></div><div class="para">
-					DES is now considered to be insecure for many applications. This is chiefly due to the 56-bit key size being too small; in January, 1999, distributed.net and the Electronic Frontier Foundation collaborated to publicly break a DES key in 22 hours and 15 minutes (see chronology). There are also some analytical results which demonstrate theoretical weaknesses in the cipher, although they are unfeasible to mount in practice. The algorithm is believed to be practically secure in the form of Triple DES, although there are theoretical attacks. In recent years, the cipher has been superseded by the Advanced Encryption Standard (AES).<a href="#ftn.idm219008656336" class="footnote"><sup class="footnote" id="idm219008656336">[45]</sup></a>
-				</div><div class="para">
-					In some documentation, a distinction is made between DES as a standard and DES the algorithm which is referred to as the DEA (the Data Encryption Algorithm). When spoken, "DES" is either spelled out as an abbreviation (/ˌdiːˌiːˈɛs/), or pronounced as a one-syllable acronym (/ˈdɛz/).<a href="#ftn.idm219011984464" class="footnote"><sup class="footnote" id="idm219011984464">[46]</sup></a>
-				</div></div></div></div><div class="section" id="idm219023599792"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title" id="idm219023599792">A.2. Public-key Encryption</h2></div></div></div><div class="para">
-			Public-key cryptography is a cryptographic approach, employed by many cryptographic algorithms and cryptosystems, whose distinguishing characteristic is the use of asymmetric key algorithms instead of or in addition to symmetric key algorithms. Using the techniques of public key-private key cryptography, many methods of protecting communications or authenticating messages formerly unknown have become practical. They do not require a secure initial exchange of one or more secret keys as is required when using symmetric key algorithms. It can also be used to create digital signatures.<a href="#ftn.idm219015400640" class="footnote"><sup class="footnote" id="idm219015400640">[47]</sup></a>
-		</div><div class="para">
-			Public key cryptography is a fundamental and widely used technology around the world, and is the approach which underlies such Internet standards as Transport Layer Security (TLS) (successor to SSL), PGP and GPG.<a href="#ftn.idm219001631488" class="footnote"><sup class="footnote" id="idm219001631488">[48]</sup></a>
-		</div><div class="para">
-			The distinguishing technique used in public key cryptography is the use of asymmetric key algorithms, where the key used to encrypt a message is not the same as the key used to decrypt it. Each user has a pair of cryptographic keys — a public key and a private key. The private key is kept secret, whilst the public key may be widely distributed. Messages are encrypted with the recipient's public key and can only be decrypted with the corresponding private key. The keys are related mathematically, but the private key cannot be feasibly (ie, in actual or projected practice) derived from the public key. It was the discovery of such algorithms which revolutionized the practice of cryptography beginning in the middle 1970s.<a href="#ftn.idm219007033952" class="footnote"><sup class="footnote" id="idm219007033952">[49]</sup></a>
-		</div><div class="para">
-			In contrast, Symmetric-key algorithms, variations of which have been used for some thousands of years, use a single secret key shared by sender and receiver (which must also be kept private, thus accounting for the ambiguity of the common terminology) for both encryption and decryption. To use a symmetric encryption scheme, the sender and receiver must securely share a key in advance.<a href="#ftn.idm219031564560" class="footnote"><sup class="footnote" id="idm219031564560">[50]</sup></a>
-		</div><div class="para">
-			Because symmetric key algorithms are nearly always much less computationally intensive, it is common to exchange a key using a key-exchange algorithm and transmit data using that key and a symmetric key algorithm. PGP, and the SSL/TLS family of schemes do this, for instance, and are called hybrid cryptosystems in consequence.<a href="#ftn.idm219028051968" class="footnote"><sup class="footnote" id="idm219028051968">[51]</sup></a>
-		</div><div class="section" id="idm219011620240"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219011620240">A.2.1. Diffie-Hellman</h3></div></div></div><div class="para">
-				Diffie–Hellman key exchange (D–H) is a cryptographic protocol that allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt subsequent communications using a symmetric key cipher.<a href="#ftn.idm219022005776" class="footnote"><sup class="footnote" id="idm219022005776">[52]</sup></a>
-			</div><div class="section" id="idm218979820592"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title" id="idm218979820592">A.2.1.1. Diffie-Hellman History</h4></div></div></div><div class="para">
-					The scheme was first published by Whitfield Diffie and Martin Hellman in 1976, although it later emerged that it had been separately invented a few years earlier within GCHQ, the British signals intelligence agency, by Malcolm J. Williamson but was kept classified. In 2002, Hellman suggested the algorithm be called Diffie–Hellman–Merkle key exchange in recognition of Ralph Merkle's contribution to the invention of public-key cryptography (Hellman, 2002).<a href="#ftn.idm218979819024" class="footnote"><sup class="footnote" id="idm218979819024">[53]</sup></a>
-				</div><div class="para">
-					Although Diffie–Hellman key agreement itself is an anonymous (non-authenticated) key-agreement protocol, it provides the basis for a variety of authenticated protocols, and is used to provide perfect forward secrecy in Transport Layer Security's ephemeral modes (referred to as EDH or DHE depending on the cipher suite).<a href="#ftn.idm219001748048" class="footnote"><sup class="footnote" id="idm219001748048">[54]</sup></a>
-				</div><div class="para">
-					U.S. Patent 4,200,770, now expired, describes the algorithm and credits Hellman, Diffie, and Merkle as inventors.<a href="#ftn.idm219020166944" class="footnote"><sup class="footnote" id="idm219020166944">[55]</sup></a>
-				</div></div></div><div class="section" id="idm219023430784"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219023430784">A.2.2. RSA</h3></div></div></div><div class="para">
-				In cryptography, RSA (which stands for Rivest, Shamir and Adleman who first publicly described it; see below) is an algorithm for public-key cryptography. It is the first algorithm known to be suitable for signing as well as encryption, and was one of the first great advances in public key cryptography. RSA is widely used in electronic commerce protocols, and is believed to be secure given sufficiently long keys and the use of up-to-date implementations.<a href="#ftn.idm219023429216" class="footnote"><sup class="footnote" id="idm219023429216">[56]</sup></a>
-			</div></div><div class="section" id="idm218984798624"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm218984798624">A.2.3. DSA</h3></div></div></div><div class="para">
-				The Digital Signature Algorithm (DSA) is a United States Federal Government standard or FIPS for digital signatures. It was proposed by the National Institute of Standards and Technology (NIST) in August 1991 for use in their Digital Signature Standard (DSS), specified in FIPS 186, adopted in 1993. A minor revision was issued in 1996 as FIPS 186-1. The standard was expanded further in 2000 as FIPS 186-2 and again in 2009 as FIPS 186-3.<a href="#ftn.idm219006296896" class="footnote"><sup class="footnote" id="idm219006296896">[57]</sup></a>
-			</div></div><div class="section" id="idm219008625792"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219008625792">A.2.4. SSL/TLS</h3></div></div></div><div class="para">
+	</div><div class="section" id="idm219146240096"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title" id="idm219146240096">A.1. Synchronous Encryption</h2></div></div></div><div class="para">
+		</div><div class="section" id="idm219149369776"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219149369776">A.1.1. Advanced Encryption Standard - AES</h3></div></div></div><div class="para">
+				In cryptography, the Advanced Encryption Standard (AES) is an encryption standard adopted by the U.S. government. The standard comprises three block ciphers, AES-128, AES-192 and AES-256, adopted from a larger collection originally published as Rijndael. Each AES cipher has a 128-bit block size, with key sizes of 128, 192 and 256 bits, respectively. The AES ciphers have been analyzed extensively and are now used worldwide, as was the case with its predecessor, the Data Encryption Standard (DES).<a href="#ftn.idm219186004352" class="footnote"><sup class="footnote" id="idm219186004352">[40]</sup></a>
+			</div><div class="section" id="idm219192952048"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title" id="idm219192952048">A.1.1.1. AES Uses</h4></div></div></div><div class="para">
+				</div></div><div class="section" id="idm219185483664"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title" id="idm219185483664">A.1.1.2. AES History</h4></div></div></div><div class="para">
+					AES was announced by National Institute of Standards and Technology (NIST) as U.S. FIPS PUB 197 (FIPS 197) on November 26, 2001 after a 5-year standardization process in which fifteen competing designs were presented and evaluated before Rijndael was selected as the most suitable (see Advanced Encryption Standard process for more details). It became effective as a standard May 26, 2002. It is available in many different encryption packages. AES is the first publicly accessible and open cipher approved by the NSA for top secret information (see Security of AES, below).<a href="#ftn.idm219193753312" class="footnote"><sup class="footnote" id="idm219193753312">[41]</sup></a>
+				</div><div class="para">
+					The Rijndael cipher was developed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen, and submitted by them to the AES selection process. Rijndael (pronounced [rɛindaːl]) is a portmanteau of the names of the two inventors.<a href="#ftn.idm219144383120" class="footnote"><sup class="footnote" id="idm219144383120">[42]</sup></a>
+				</div></div></div><div class="section" id="idm219200445568"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219200445568">A.1.2.  Data Encryption Standard - DES</h3></div></div></div><div class="para">
+				The Data Encryption Standard (DES) is a block cipher (a form of shared secret encryption) that was selected by the National Bureau of Standards as an official Federal Information Processing Standard (FIPS) for the United States in 1976 and which has subsequently enjoyed widespread use internationally. It is based on a symmetric-key algorithm that uses a 56-bit key. The algorithm was initially controversial with classified design elements, a relatively short key length, and suspicions about a National Security Agency (NSA) backdoor. DES consequently came under intense academic scrutiny which motivated the modern understanding of block ciphers and their cryptanalysis.<a href="#ftn.idm219197979296" class="footnote"><sup class="footnote" id="idm219197979296">[43]</sup></a>
+			</div><div class="section" id="idm219182102704"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title" id="idm219182102704">A.1.2.1. DES Uses</h4></div></div></div><div class="para">
+				</div></div><div class="section" id="idm219182101264"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title" id="idm219182101264">A.1.2.2. DES History</h4></div></div></div><div class="para">
+					DES is now considered to be insecure for many applications. This is chiefly due to the 56-bit key size being too small; in January, 1999, distributed.net and the Electronic Frontier Foundation collaborated to publicly break a DES key in 22 hours and 15 minutes (see chronology). There are also some analytical results which demonstrate theoretical weaknesses in the cipher, although they are unfeasible to mount in practice. The algorithm is believed to be practically secure in the form of Triple DES, although there are theoretical attacks. In recent years, the cipher has been superseded by the Advanced Encryption Standard (AES).<a href="#ftn.idm219192956480" class="footnote"><sup class="footnote" id="idm219192956480">[44]</sup></a>
+				</div><div class="para">
+					In some documentation, a distinction is made between DES as a standard and DES the algorithm which is referred to as the DEA (the Data Encryption Algorithm). When spoken, "DES" is either spelled out as an abbreviation (/ˌdiːˌiːˈɛs/), or pronounced as a one-syllable acronym (/ˈdɛz/).<a href="#ftn.idm219165193296" class="footnote"><sup class="footnote" id="idm219165193296">[45]</sup></a>
+				</div></div></div></div><div class="section" id="idm219188760912"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title" id="idm219188760912">A.2. Public-key Encryption</h2></div></div></div><div class="para">
+			Public-key cryptography is a cryptographic approach, employed by many cryptographic algorithms and cryptosystems, whose distinguishing characteristic is the use of asymmetric key algorithms instead of or in addition to symmetric key algorithms. Using the techniques of public key-private key cryptography, many methods of protecting communications or authenticating messages formerly unknown have become practical. They do not require a secure initial exchange of one or more secret keys as is required when using symmetric key algorithms. It can also be used to create digital signatures.<a href="#ftn.idm219188759216" class="footnote"><sup class="footnote" id="idm219188759216">[46]</sup></a>
+		</div><div class="para">
+			Public key cryptography is a fundamental and widely used technology around the world, and is the approach which underlies such Internet standards as Transport Layer Security (TLS) (successor to SSL), PGP and GPG.<a href="#ftn.idm219174967056" class="footnote"><sup class="footnote" id="idm219174967056">[47]</sup></a>
+		</div><div class="para">
+			The distinguishing technique used in public key cryptography is the use of asymmetric key algorithms, where the key used to encrypt a message is not the same as the key used to decrypt it. Each user has a pair of cryptographic keys — a public key and a private key. The private key is kept secret, whilst the public key may be widely distributed. Messages are encrypted with the recipient's public key and can only be decrypted with the corresponding private key. The keys are related mathematically, but the private key cannot be feasibly (ie, in actual or projected practice) derived from the public key. It was the discovery of such algorithms which revolutionized the practice of cryptography beginning in the middle 1970s.<a href="#ftn.idm219199864608" class="footnote"><sup class="footnote" id="idm219199864608">[48]</sup></a>
+		</div><div class="para">
+			In contrast, Symmetric-key algorithms, variations of which have been used for some thousands of years, use a single secret key shared by sender and receiver (which must also be kept private, thus accounting for the ambiguity of the common terminology) for both encryption and decryption. To use a symmetric encryption scheme, the sender and receiver must securely share a key in advance.<a href="#ftn.idm219160066640" class="footnote"><sup class="footnote" id="idm219160066640">[49]</sup></a>
+		</div><div class="para">
+			Because symmetric key algorithms are nearly always much less computationally intensive, it is common to exchange a key using a key-exchange algorithm and transmit data using that key and a symmetric key algorithm. PGP, and the SSL/TLS family of schemes do this, for instance, and are called hybrid cryptosystems in consequence.<a href="#ftn.idm219222934752" class="footnote"><sup class="footnote" id="idm219222934752">[50]</sup></a>
+		</div><div class="section" id="idm219222932576"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219222932576">A.2.1. Diffie-Hellman</h3></div></div></div><div class="para">
+				Diffie–Hellman key exchange (D–H) is a cryptographic protocol that allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt subsequent communications using a symmetric key cipher.<a href="#ftn.idm219152167072" class="footnote"><sup class="footnote" id="idm219152167072">[51]</sup></a>
+			</div><div class="section" id="idm219180686144"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title" id="idm219180686144">A.2.1.1. Diffie-Hellman History</h4></div></div></div><div class="para">
+					The scheme was first published by Whitfield Diffie and Martin Hellman in 1976, although it later emerged that it had been separately invented a few years earlier within GCHQ, the British signals intelligence agency, by Malcolm J. Williamson but was kept classified. In 2002, Hellman suggested the algorithm be called Diffie–Hellman–Merkle key exchange in recognition of Ralph Merkle's contribution to the invention of public-key cryptography (Hellman, 2002).<a href="#ftn.idm219180684576" class="footnote"><sup class="footnote" id="idm219180684576">[52]</sup></a>
+				</div><div class="para">
+					Although Diffie–Hellman key agreement itself is an anonymous (non-authenticated) key-agreement protocol, it provides the basis for a variety of authenticated protocols, and is used to provide perfect forward secrecy in Transport Layer Security's ephemeral modes (referred to as EDH or DHE depending on the cipher suite).<a href="#ftn.idm219185224560" class="footnote"><sup class="footnote" id="idm219185224560">[53]</sup></a>
+				</div><div class="para">
+					U.S. Patent 4,200,770, now expired, describes the algorithm and credits Hellman, Diffie, and Merkle as inventors.<a href="#ftn.idm219168948064" class="footnote"><sup class="footnote" id="idm219168948064">[54]</sup></a>
+				</div></div></div><div class="section" id="idm219166358336"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219166358336">A.2.2. RSA</h3></div></div></div><div class="para">
+				In cryptography, RSA (which stands for Rivest, Shamir and Adleman who first publicly described it; see below) is an algorithm for public-key cryptography. It is the first algorithm known to be suitable for signing as well as encryption, and was one of the first great advances in public key cryptography. RSA is widely used in electronic commerce protocols, and is believed to be secure given sufficiently long keys and the use of up-to-date implementations.<a href="#ftn.idm219137349904" class="footnote"><sup class="footnote" id="idm219137349904">[55]</sup></a>
+			</div></div><div class="section" id="idm219200249696"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219200249696">A.2.3. DSA</h3></div></div></div><div class="para">
+				The Digital Signature Algorithm (DSA) is a United States Federal Government standard or FIPS for digital signatures. It was proposed by the National Institute of Standards and Technology (NIST) in August 1991 for use in their Digital Signature Standard (DSS), specified in FIPS 186, adopted in 1993. A minor revision was issued in 1996 as FIPS 186-1. The standard was expanded further in 2000 as FIPS 186-2 and again in 2009 as FIPS 186-3.<a href="#ftn.idm219200248144" class="footnote"><sup class="footnote" id="idm219200248144">[56]</sup></a>
+			</div></div><div class="section" id="idm219171942368"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219171942368">A.2.4. SSL/TLS</h3></div></div></div><div class="para">
 				Transport Layer Security (TLS) and its predecessor, Secure Socket Layer (SSL), are cryptographic protocols that provide security for communications over networks such as the Internet. TLS and SSL encrypt the segments of network connections at the Transport Layer end-to-end. Several versions of the protocols are in widespread use in applications like web browsing, electronic mail, Internet faxing, instant messaging and voice-over-IP (VoIP). TLS is an IETF standards track protocol, last updated in RFC 5246, that was based on the earlier SSL specifications developed by Netscape Corporation.
 			</div><div class="para">
 				The TLS protocol allows client/server applications to communicate across a network in a way designed to prevent eavesdropping and tampering. TLS provides endpoint authentication and communications confidentiality over the Internet using cryptography. TLS provides RSA security with 1024 and 2048 bit strengths.
@@ -7768,50 +7734,50 @@ tcp	0	0 127.0.0.1:10000	0.0.0.0:*	LISTEN	2224/spamd.pid
 			</div><div class="para">
 				Typically, the key information and certificates necessary for TLS are handled in the form of X.509 certificates, which define required fields and data formats.
 			</div><div class="para">
-				SSL operates in modular fashion. It is extensible by design, with support for forward and backward compatibility and negotiation between peers.<a href="#ftn.idm219021704736" class="footnote"><sup class="footnote" id="idm219021704736">[58]</sup></a>
-			</div></div><div class="section" id="idm219008116128"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219008116128">A.2.5. Cramer-Shoup Cryptosystem</h3></div></div></div><div class="para">
-				The Cramer–Shoup system is an asymmetric key encryption algorithm, and was the first efficient scheme proven to be secure against adaptive chosen ciphertext attack using standard cryptographic assumptions. Its security is based on the computational intractability (widely assumed, but not proved) of the decisional Diffie–Hellman assumption. Developed by Ronald Cramer and Victor Shoup in 1998, it is an extension of the Elgamal cryptosystem. In contrast to Elgamal, which is extremely malleable, Cramer–Shoup adds additional elements to ensure non-malleability even against a resourceful attacker. This non-malleability is achieved through the use of a collision-resistant hash function and additional computations, resulting in a ciphertext which is twice as large as in Elgamal.<a href="#ftn.idm219008114256" class="footnote"><sup class="footnote" id="idm219008114256">[59]</sup></a>
-			</div></div><div class="section" id="idm219029052032"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219029052032">A.2.6. ElGamal Encryption</h3></div></div></div><div class="para">
-				In cryptography, the ElGamal encryption system is an asymmetric key encryption algorithm for public-key cryptography which is based on the Diffie-Hellman key agreement. It was described by Taher Elgamal in 1985.[1] ElGamal encryption is used in the free GNU Privacy Guard software, recent versions of PGP, and other cryptosystems. The Digital Signature Algorithm is a variant of the ElGamal signature scheme, which should not be confused with ElGamal encryption.<a href="#ftn.idm218933299888" class="footnote"><sup class="footnote" id="idm218933299888">[60]</sup></a>
-			</div></div></div><div class="footnotes"><br /><hr width="100" align="left" /><div id="ftn.idm218991684656" class="footnote"><div class="para"><a href="#idm218991684656" class="para"><sup class="para">[41] </sup></a>
+				SSL operates in modular fashion. It is extensible by design, with support for forward and backward compatibility and negotiation between peers.<a href="#ftn.idm219165424144" class="footnote"><sup class="footnote" id="idm219165424144">[57]</sup></a>
+			</div></div><div class="section" id="idm219203403776"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219203403776">A.2.5. Cramer-Shoup Cryptosystem</h3></div></div></div><div class="para">
+				The Cramer–Shoup system is an asymmetric key encryption algorithm, and was the first efficient scheme proven to be secure against adaptive chosen ciphertext attack using standard cryptographic assumptions. Its security is based on the computational intractability (widely assumed, but not proved) of the decisional Diffie–Hellman assumption. Developed by Ronald Cramer and Victor Shoup in 1998, it is an extension of the Elgamal cryptosystem. In contrast to Elgamal, which is extremely malleable, Cramer–Shoup adds additional elements to ensure non-malleability even against a resourceful attacker. This non-malleability is achieved through the use of a collision-resistant hash function and additional computations, resulting in a ciphertext which is twice as large as in Elgamal.<a href="#ftn.idm219183461744" class="footnote"><sup class="footnote" id="idm219183461744">[58]</sup></a>
+			</div></div><div class="section" id="idm219203402400"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219203402400">A.2.6. ElGamal Encryption</h3></div></div></div><div class="para">
+				In cryptography, the ElGamal encryption system is an asymmetric key encryption algorithm for public-key cryptography which is based on the Diffie-Hellman key agreement. It was described by Taher Elgamal in 1985.[1] ElGamal encryption is used in the free GNU Privacy Guard software, recent versions of PGP, and other cryptosystems. The Digital Signature Algorithm is a variant of the ElGamal signature scheme, which should not be confused with ElGamal encryption.<a href="#ftn.idm219173700064" class="footnote"><sup class="footnote" id="idm219173700064">[59]</sup></a>
+			</div></div></div><div class="footnotes"><br /><hr width="100" align="left" /><div id="ftn.idm219186004352" class="footnote"><div class="para"><a href="#idm219186004352" class="para"><sup class="para">[40] </sup></a>
 					"Advanced Encryption Standard." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Advanced_Encryption_Standard">http://en.wikipedia.org/wiki/Advanced_Encryption_Standard</a>
-				</div></div><div id="ftn.idm218968053104" class="footnote"><div class="para"><a href="#idm218968053104" class="para"><sup class="para">[42] </sup></a>
+				</div></div><div id="ftn.idm219193753312" class="footnote"><div class="para"><a href="#idm219193753312" class="para"><sup class="para">[41] </sup></a>
 						"Advanced Encryption Standard." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Advanced_Encryption_Standard">http://en.wikipedia.org/wiki/Advanced_Encryption_Standard</a>
-					</div></div><div id="ftn.idm218928109392" class="footnote"><div class="para"><a href="#idm218928109392" class="para"><sup class="para">[43] </sup></a>
+					</div></div><div id="ftn.idm219144383120" class="footnote"><div class="para"><a href="#idm219144383120" class="para"><sup class="para">[42] </sup></a>
 						"Advanced Encryption Standard." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Advanced_Encryption_Standard">http://en.wikipedia.org/wiki/Advanced_Encryption_Standard</a>
-					</div></div><div id="ftn.idm219016811440" class="footnote"><div class="para"><a href="#idm219016811440" class="para"><sup class="para">[44] </sup></a>
+					</div></div><div id="ftn.idm219197979296" class="footnote"><div class="para"><a href="#idm219197979296" class="para"><sup class="para">[43] </sup></a>
 					"Data Encryption Standard." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Data_Encryption_Standard">http://en.wikipedia.org/wiki/Data_Encryption_Standard</a>
-				</div></div><div id="ftn.idm219008656336" class="footnote"><div class="para"><a href="#idm219008656336" class="para"><sup class="para">[45] </sup></a>
+				</div></div><div id="ftn.idm219192956480" class="footnote"><div class="para"><a href="#idm219192956480" class="para"><sup class="para">[44] </sup></a>
 						"Data Encryption Standard." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Data_Encryption_Standard">http://en.wikipedia.org/wiki/Data_Encryption_Standard</a>
-					</div></div><div id="ftn.idm219011984464" class="footnote"><div class="para"><a href="#idm219011984464" class="para"><sup class="para">[46] </sup></a>
+					</div></div><div id="ftn.idm219165193296" class="footnote"><div class="para"><a href="#idm219165193296" class="para"><sup class="para">[45] </sup></a>
 						"Data Encryption Standard." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Data_Encryption_Standard">http://en.wikipedia.org/wiki/Data_Encryption_Standard</a>
-					</div></div><div id="ftn.idm219015400640" class="footnote"><div class="para"><a href="#idm219015400640" class="para"><sup class="para">[47] </sup></a>
+					</div></div><div id="ftn.idm219188759216" class="footnote"><div class="para"><a href="#idm219188759216" class="para"><sup class="para">[46] </sup></a>
 				"Public-key Encryption." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Public-key_cryptography">http://en.wikipedia.org/wiki/Public-key_cryptography</a>
-			</div></div><div id="ftn.idm219001631488" class="footnote"><div class="para"><a href="#idm219001631488" class="para"><sup class="para">[48] </sup></a>
+			</div></div><div id="ftn.idm219174967056" class="footnote"><div class="para"><a href="#idm219174967056" class="para"><sup class="para">[47] </sup></a>
 				"Public-key Encryption." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Public-key_cryptography">http://en.wikipedia.org/wiki/Public-key_cryptography</a>
-			</div></div><div id="ftn.idm219007033952" class="footnote"><div class="para"><a href="#idm219007033952" class="para"><sup class="para">[49] </sup></a>
+			</div></div><div id="ftn.idm219199864608" class="footnote"><div class="para"><a href="#idm219199864608" class="para"><sup class="para">[48] </sup></a>
 				"Public-key Encryption." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Public-key_cryptography">http://en.wikipedia.org/wiki/Public-key_cryptography</a>
-			</div></div><div id="ftn.idm219031564560" class="footnote"><div class="para"><a href="#idm219031564560" class="para"><sup class="para">[50] </sup></a>
+			</div></div><div id="ftn.idm219160066640" class="footnote"><div class="para"><a href="#idm219160066640" class="para"><sup class="para">[49] </sup></a>
 				"Public-key Encryption." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Public-key_cryptography">http://en.wikipedia.org/wiki/Public-key_cryptography</a>
-			</div></div><div id="ftn.idm219028051968" class="footnote"><div class="para"><a href="#idm219028051968" class="para"><sup class="para">[51] </sup></a>
+			</div></div><div id="ftn.idm219222934752" class="footnote"><div class="para"><a href="#idm219222934752" class="para"><sup class="para">[50] </sup></a>
 				"Public-key Encryption." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Public-key_cryptography">http://en.wikipedia.org/wiki/Public-key_cryptography</a>
-			</div></div><div id="ftn.idm219022005776" class="footnote"><div class="para"><a href="#idm219022005776" class="para"><sup class="para">[52] </sup></a>
+			</div></div><div id="ftn.idm219152167072" class="footnote"><div class="para"><a href="#idm219152167072" class="para"><sup class="para">[51] </sup></a>
 					"Diffie-Hellman." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Diffie-Hellman">http://en.wikipedia.org/wiki/Diffie-Hellman</a>
-				</div></div><div id="ftn.idm218979819024" class="footnote"><div class="para"><a href="#idm218979819024" class="para"><sup class="para">[53] </sup></a>
+				</div></div><div id="ftn.idm219180684576" class="footnote"><div class="para"><a href="#idm219180684576" class="para"><sup class="para">[52] </sup></a>
 						"Diffie-Hellman." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Diffie-Hellman">http://en.wikipedia.org/wiki/Diffie-Hellman</a>
-					</div></div><div id="ftn.idm219001748048" class="footnote"><div class="para"><a href="#idm219001748048" class="para"><sup class="para">[54] </sup></a>
+					</div></div><div id="ftn.idm219185224560" class="footnote"><div class="para"><a href="#idm219185224560" class="para"><sup class="para">[53] </sup></a>
 						"Diffie-Hellman." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Diffie-Hellman">http://en.wikipedia.org/wiki/Diffie-Hellman</a>
-					</div></div><div id="ftn.idm219020166944" class="footnote"><div class="para"><a href="#idm219020166944" class="para"><sup class="para">[55] </sup></a>
+					</div></div><div id="ftn.idm219168948064" class="footnote"><div class="para"><a href="#idm219168948064" class="para"><sup class="para">[54] </sup></a>
 						"Diffie-Hellman." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Diffie-Hellman">http://en.wikipedia.org/wiki/Diffie-Hellman</a>
-					</div></div><div id="ftn.idm219023429216" class="footnote"><div class="para"><a href="#idm219023429216" class="para"><sup class="para">[56] </sup></a>
+					</div></div><div id="ftn.idm219137349904" class="footnote"><div class="para"><a href="#idm219137349904" class="para"><sup class="para">[55] </sup></a>
 					"RSA" <span class="emphasis"><em>Wikipedia</em></span> 14 April 2010 <a href="http://en.wikipedia.org/wiki/RSA">http://en.wikipedia.org/wiki/RSA</a>
-				</div></div><div id="ftn.idm219006296896" class="footnote"><div class="para"><a href="#idm219006296896" class="para"><sup class="para">[57] </sup></a>
+				</div></div><div id="ftn.idm219200248144" class="footnote"><div class="para"><a href="#idm219200248144" class="para"><sup class="para">[56] </sup></a>
 					"Digital Signature Algorithm" <span class="emphasis"><em>Wikipedia</em></span> 14 April 2010 <a href="http://en.wikipedia.org/wiki/Digital_Signature_Algorithm">http://en.wikipedia.org/wiki/Digital_Signature_Algorithm</a>
-				</div></div><div id="ftn.idm219021704736" class="footnote"><div class="para"><a href="#idm219021704736" class="para"><sup class="para">[58] </sup></a>
+				</div></div><div id="ftn.idm219165424144" class="footnote"><div class="para"><a href="#idm219165424144" class="para"><sup class="para">[57] </sup></a>
 					"Transport Layer Security" <span class="emphasis"><em>Wikipedia</em></span> 14 April 2010 <a href="http://en.wikipedia.org/wiki/Transport_Layer_Security">http://en.wikipedia.org/wiki/Transport_Layer_Security</a>
-				</div></div><div id="ftn.idm219008114256" class="footnote"><div class="para"><a href="#idm219008114256" class="para"><sup class="para">[59] </sup></a>
+				</div></div><div id="ftn.idm219183461744" class="footnote"><div class="para"><a href="#idm219183461744" class="para"><sup class="para">[58] </sup></a>
 					"Cramer–Shoup cryptosystem" <span class="emphasis"><em>Wikipedia</em></span> 14 April 2010 <a href="http://en.wikipedia.org/wiki/Cramer-Shoup_cryptosystem">http://en.wikipedia.org/wiki/Cramer-Shoup_cryptosystem</a>
-				</div></div><div id="ftn.idm218933299888" class="footnote"><div class="para"><a href="#idm218933299888" class="para"><sup class="para">[60] </sup></a>
+				</div></div><div id="ftn.idm219173700064" class="footnote"><div class="para"><a href="#idm219173700064" class="para"><sup class="para">[59] </sup></a>
 					"ElGamal encryption" <span class="emphasis"><em>Wikipedia</em></span> 14 April 2010 <a href="http://en.wikipedia.org/wiki/ElGamal_encryption">http://en.wikipedia.org/wiki/ElGamal_encryption</a>
 				</div></div></div></div><div xml:lang="en-US" class="appendix" id="appe-Publican-Revision_History" lang="en-US"><div class="titlepage"><div><div><h1 class="title">Revision History</h1></div></div></div><div class="para">
 		<div class="revhistory"><table summary="Revision History"><tr><th align="left" valign="top" colspan="3"><strong>Revision History</strong></th></tr><tr><td align="left">Revision 19.1-1</td><td align="left">Mon June 03 2013</td><td align="left"><span class="author"><span class="firstname">Eric</span> <span class="surname">Christensen</span></span></td></tr><tr><td align="left" colspan="3">
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/apas02.html b/public_html/en-US/Fedora/19/html/Security_Guide/apas02.html
index 10106d8..877455e 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/apas02.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/apas02.html
@@ -6,40 +6,40 @@
               
               addID('Fedora.19.books');
 	      addID('Fedora.19.Security_Guide');
-              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Encryption_Standards.html" title="Appendix A. Encryption Standards" /><link rel="prev" href="chap-Security_Guide-Encryption_Standards.html" title="Appendix A. Encryption Standards" /><link rel="next" href="apas02s02.html" title="A.2.2. RSA" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Encryption_Standards.html"><strong>Prev</s
 trong></a></li><li class="next"><a accesskey="n" href="apas02s02.html"><strong>Next</strong></a></li></ul><div class="section" id="idm219013180112"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title" id="idm219013180112">A.2. Public-key Encryption</h2></div></div></div><div class="para">
-			Public-key cryptography is a cryptographic approach, employed by many cryptographic algorithms and cryptosystems, whose distinguishing characteristic is the use of asymmetric key algorithms instead of or in addition to symmetric key algorithms. Using the techniques of public key-private key cryptography, many methods of protecting communications or authenticating messages formerly unknown have become practical. They do not require a secure initial exchange of one or more secret keys as is required when using symmetric key algorithms. It can also be used to create digital signatures.<a href="#ftn.idm219013178416" class="footnote"><sup class="footnote" id="idm219013178416">[47]</sup></a>
+              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Encryption_Standards.html" title="Appendix A. Encryption Standards" /><link rel="prev" href="chap-Security_Guide-Encryption_Standards.html" title="Appendix A. Encryption Standards" /><link rel="next" href="apas02s02.html" title="A.2.2. RSA" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Encryption_Standards.html"><strong>Prev</s
 trong></a></li><li class="next"><a accesskey="n" href="apas02s02.html"><strong>Next</strong></a></li></ul><div class="section" id="idm219172619328"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title" id="idm219172619328">A.2. Public-key Encryption</h2></div></div></div><div class="para">
+			Public-key cryptography is a cryptographic approach, employed by many cryptographic algorithms and cryptosystems, whose distinguishing characteristic is the use of asymmetric key algorithms instead of or in addition to symmetric key algorithms. Using the techniques of public key-private key cryptography, many methods of protecting communications or authenticating messages formerly unknown have become practical. They do not require a secure initial exchange of one or more secret keys as is required when using symmetric key algorithms. It can also be used to create digital signatures.<a href="#ftn.idm219223975104" class="footnote"><sup class="footnote" id="idm219223975104">[46]</sup></a>
 		</div><div class="para">
-			Public key cryptography is a fundamental and widely used technology around the world, and is the approach which underlies such Internet standards as Transport Layer Security (TLS) (successor to SSL), PGP and GPG.<a href="#ftn.idm219002641968" class="footnote"><sup class="footnote" id="idm219002641968">[48]</sup></a>
+			Public key cryptography is a fundamental and widely used technology around the world, and is the approach which underlies such Internet standards as Transport Layer Security (TLS) (successor to SSL), PGP and GPG.<a href="#ftn.idm219201942288" class="footnote"><sup class="footnote" id="idm219201942288">[47]</sup></a>
 		</div><div class="para">
-			The distinguishing technique used in public key cryptography is the use of asymmetric key algorithms, where the key used to encrypt a message is not the same as the key used to decrypt it. Each user has a pair of cryptographic keys — a public key and a private key. The private key is kept secret, whilst the public key may be widely distributed. Messages are encrypted with the recipient's public key and can only be decrypted with the corresponding private key. The keys are related mathematically, but the private key cannot be feasibly (ie, in actual or projected practice) derived from the public key. It was the discovery of such algorithms which revolutionized the practice of cryptography beginning in the middle 1970s.<a href="#ftn.idm219035608016" class="footnote"><sup class="footnote" id="idm219035608016">[49]</sup></a>
+			The distinguishing technique used in public key cryptography is the use of asymmetric key algorithms, where the key used to encrypt a message is not the same as the key used to decrypt it. Each user has a pair of cryptographic keys — a public key and a private key. The private key is kept secret, whilst the public key may be widely distributed. Messages are encrypted with the recipient's public key and can only be decrypted with the corresponding private key. The keys are related mathematically, but the private key cannot be feasibly (ie, in actual or projected practice) derived from the public key. It was the discovery of such algorithms which revolutionized the practice of cryptography beginning in the middle 1970s.<a href="#ftn.idm219201939072" class="footnote"><sup class="footnote" id="idm219201939072">[48]</sup></a>
 		</div><div class="para">
-			In contrast, Symmetric-key algorithms, variations of which have been used for some thousands of years, use a single secret key shared by sender and receiver (which must also be kept private, thus accounting for the ambiguity of the common terminology) for both encryption and decryption. To use a symmetric encryption scheme, the sender and receiver must securely share a key in advance.<a href="#ftn.idm219014132128" class="footnote"><sup class="footnote" id="idm219014132128">[50]</sup></a>
+			In contrast, Symmetric-key algorithms, variations of which have been used for some thousands of years, use a single secret key shared by sender and receiver (which must also be kept private, thus accounting for the ambiguity of the common terminology) for both encryption and decryption. To use a symmetric encryption scheme, the sender and receiver must securely share a key in advance.<a href="#ftn.idm219185558928" class="footnote"><sup class="footnote" id="idm219185558928">[49]</sup></a>
 		</div><div class="para">
-			Because symmetric key algorithms are nearly always much less computationally intensive, it is common to exchange a key using a key-exchange algorithm and transmit data using that key and a symmetric key algorithm. PGP, and the SSL/TLS family of schemes do this, for instance, and are called hybrid cryptosystems in consequence.<a href="#ftn.idm219036737888" class="footnote"><sup class="footnote" id="idm219036737888">[51]</sup></a>
-		</div><div class="section" id="idm219036735712"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219036735712">A.2.1. Diffie-Hellman</h3></div></div></div><div class="para">
-				Diffie–Hellman key exchange (D–H) is a cryptographic protocol that allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt subsequent communications using a symmetric key cipher.<a href="#ftn.idm219014897696" class="footnote"><sup class="footnote" id="idm219014897696">[52]</sup></a>
-			</div><div class="section" id="idm219014895520"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title" id="idm219014895520">A.2.1.1. Diffie-Hellman History</h4></div></div></div><div class="para">
-					The scheme was first published by Whitfield Diffie and Martin Hellman in 1976, although it later emerged that it had been separately invented a few years earlier within GCHQ, the British signals intelligence agency, by Malcolm J. Williamson but was kept classified. In 2002, Hellman suggested the algorithm be called Diffie–Hellman–Merkle key exchange in recognition of Ralph Merkle's contribution to the invention of public-key cryptography (Hellman, 2002).<a href="#ftn.idm219027358480" class="footnote"><sup class="footnote" id="idm219027358480">[53]</sup></a>
+			Because symmetric key algorithms are nearly always much less computationally intensive, it is common to exchange a key using a key-exchange algorithm and transmit data using that key and a symmetric key algorithm. PGP, and the SSL/TLS family of schemes do this, for instance, and are called hybrid cryptosystems in consequence.<a href="#ftn.idm219173963856" class="footnote"><sup class="footnote" id="idm219173963856">[50]</sup></a>
+		</div><div class="section" id="idm219182227760"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219182227760">A.2.1. Diffie-Hellman</h3></div></div></div><div class="para">
+				Diffie–Hellman key exchange (D–H) is a cryptographic protocol that allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt subsequent communications using a symmetric key cipher.<a href="#ftn.idm219182226336" class="footnote"><sup class="footnote" id="idm219182226336">[51]</sup></a>
+			</div><div class="section" id="idm219186950160"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title" id="idm219186950160">A.2.1.1. Diffie-Hellman History</h4></div></div></div><div class="para">
+					The scheme was first published by Whitfield Diffie and Martin Hellman in 1976, although it later emerged that it had been separately invented a few years earlier within GCHQ, the British signals intelligence agency, by Malcolm J. Williamson but was kept classified. In 2002, Hellman suggested the algorithm be called Diffie–Hellman–Merkle key exchange in recognition of Ralph Merkle's contribution to the invention of public-key cryptography (Hellman, 2002).<a href="#ftn.idm219186948592" class="footnote"><sup class="footnote" id="idm219186948592">[52]</sup></a>
 				</div><div class="para">
-					Although Diffie–Hellman key agreement itself is an anonymous (non-authenticated) key-agreement protocol, it provides the basis for a variety of authenticated protocols, and is used to provide perfect forward secrecy in Transport Layer Security's ephemeral modes (referred to as EDH or DHE depending on the cipher suite).<a href="#ftn.idm219001086880" class="footnote"><sup class="footnote" id="idm219001086880">[54]</sup></a>
+					Although Diffie–Hellman key agreement itself is an anonymous (non-authenticated) key-agreement protocol, it provides the basis for a variety of authenticated protocols, and is used to provide perfect forward secrecy in Transport Layer Security's ephemeral modes (referred to as EDH or DHE depending on the cipher suite).<a href="#ftn.idm219221469360" class="footnote"><sup class="footnote" id="idm219221469360">[53]</sup></a>
 				</div><div class="para">
-					U.S. Patent 4,200,770, now expired, describes the algorithm and credits Hellman, Diffie, and Merkle as inventors.<a href="#ftn.idm219029677744" class="footnote"><sup class="footnote" id="idm219029677744">[55]</sup></a>
-				</div></div></div><div class="footnotes"><br /><hr /><div id="ftn.idm219013178416" class="footnote"><div class="para"><a href="#idm219013178416" class="para"><sup class="para">[47] </sup></a>
+					U.S. Patent 4,200,770, now expired, describes the algorithm and credits Hellman, Diffie, and Merkle as inventors.<a href="#ftn.idm219188611456" class="footnote"><sup class="footnote" id="idm219188611456">[54]</sup></a>
+				</div></div></div><div class="footnotes"><br /><hr /><div id="ftn.idm219223975104" class="footnote"><div class="para"><a href="#idm219223975104" class="para"><sup class="para">[46] </sup></a>
 				"Public-key Encryption." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Public-key_cryptography">http://en.wikipedia.org/wiki/Public-key_cryptography</a>
-			</div></div><div id="ftn.idm219002641968" class="footnote"><div class="para"><a href="#idm219002641968" class="para"><sup class="para">[48] </sup></a>
+			</div></div><div id="ftn.idm219201942288" class="footnote"><div class="para"><a href="#idm219201942288" class="para"><sup class="para">[47] </sup></a>
 				"Public-key Encryption." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Public-key_cryptography">http://en.wikipedia.org/wiki/Public-key_cryptography</a>
-			</div></div><div id="ftn.idm219035608016" class="footnote"><div class="para"><a href="#idm219035608016" class="para"><sup class="para">[49] </sup></a>
+			</div></div><div id="ftn.idm219201939072" class="footnote"><div class="para"><a href="#idm219201939072" class="para"><sup class="para">[48] </sup></a>
 				"Public-key Encryption." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Public-key_cryptography">http://en.wikipedia.org/wiki/Public-key_cryptography</a>
-			</div></div><div id="ftn.idm219014132128" class="footnote"><div class="para"><a href="#idm219014132128" class="para"><sup class="para">[50] </sup></a>
+			</div></div><div id="ftn.idm219185558928" class="footnote"><div class="para"><a href="#idm219185558928" class="para"><sup class="para">[49] </sup></a>
 				"Public-key Encryption." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Public-key_cryptography">http://en.wikipedia.org/wiki/Public-key_cryptography</a>
-			</div></div><div id="ftn.idm219036737888" class="footnote"><div class="para"><a href="#idm219036737888" class="para"><sup class="para">[51] </sup></a>
+			</div></div><div id="ftn.idm219173963856" class="footnote"><div class="para"><a href="#idm219173963856" class="para"><sup class="para">[50] </sup></a>
 				"Public-key Encryption." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Public-key_cryptography">http://en.wikipedia.org/wiki/Public-key_cryptography</a>
-			</div></div><div id="ftn.idm219014897696" class="footnote"><div class="para"><a href="#idm219014897696" class="para"><sup class="para">[52] </sup></a>
+			</div></div><div id="ftn.idm219182226336" class="footnote"><div class="para"><a href="#idm219182226336" class="para"><sup class="para">[51] </sup></a>
 					"Diffie-Hellman." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Diffie-Hellman">http://en.wikipedia.org/wiki/Diffie-Hellman</a>
-				</div></div><div id="ftn.idm219027358480" class="footnote"><div class="para"><a href="#idm219027358480" class="para"><sup class="para">[53] </sup></a>
+				</div></div><div id="ftn.idm219186948592" class="footnote"><div class="para"><a href="#idm219186948592" class="para"><sup class="para">[52] </sup></a>
 						"Diffie-Hellman." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Diffie-Hellman">http://en.wikipedia.org/wiki/Diffie-Hellman</a>
-					</div></div><div id="ftn.idm219001086880" class="footnote"><div class="para"><a href="#idm219001086880" class="para"><sup class="para">[54] </sup></a>
+					</div></div><div id="ftn.idm219221469360" class="footnote"><div class="para"><a href="#idm219221469360" class="para"><sup class="para">[53] </sup></a>
 						"Diffie-Hellman." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Diffie-Hellman">http://en.wikipedia.org/wiki/Diffie-Hellman</a>
-					</div></div><div id="ftn.idm219029677744" class="footnote"><div class="para"><a href="#idm219029677744" class="para"><sup class="para">[55] </sup></a>
+					</div></div><div id="ftn.idm219188611456" class="footnote"><div class="para"><a href="#idm219188611456" class="para"><sup class="para">[54] </sup></a>
 						"Diffie-Hellman." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Diffie-Hellman">http://en.wikipedia.org/wiki/Diffie-Hellman</a>
 					</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Encryption_Standards.html"><strong>Prev</strong>Appendix A. Encryption Standards</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="apas02s02.html"><strong>Next</strong>A.2.2. RSA</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/apas02s02.html b/public_html/en-US/Fedora/19/html/Security_Guide/apas02s02.html
index 3ae649a..9da8029 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/apas02s02.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/apas02s02.html
@@ -6,8 +6,8 @@
               
               addID('Fedora.19.books');
 	      addID('Fedora.19.Security_Guide');
-              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="apas02.html" title="A.2. Public-key Encryption" /><link rel="prev" href="apas02.html" title="A.2. Public-key Encryption" /><link rel="next" href="apas02s03.html" title="A.2.3. DSA" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="apas02.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="apas02s03.html"><strong>Next</strong></a></li></ul><div class
 ="section" id="idm219029675248"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219029675248">A.2.2. RSA</h3></div></div></div><div class="para">
-				In cryptography, RSA (which stands for Rivest, Shamir and Adleman who first publicly described it; see below) is an algorithm for public-key cryptography. It is the first algorithm known to be suitable for signing as well as encryption, and was one of the first great advances in public key cryptography. RSA is widely used in electronic commerce protocols, and is believed to be secure given sufficiently long keys and the use of up-to-date implementations.<a href="#ftn.idm219023217136" class="footnote"><sup class="footnote" id="idm219023217136">[56]</sup></a>
-			</div><div class="footnotes"><br /><hr /><div id="ftn.idm219023217136" class="footnote"><div class="para"><a href="#idm219023217136" class="para"><sup class="para">[56] </sup></a>
+              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="apas02.html" title="A.2. Public-key Encryption" /><link rel="prev" href="apas02.html" title="A.2. Public-key Encryption" /><link rel="next" href="apas02s03.html" title="A.2.3. DSA" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="apas02.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="apas02s03.html"><strong>Next</strong></a></li></ul><div class
 ="section" id="idm219196239312"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219196239312">A.2.2. RSA</h3></div></div></div><div class="para">
+				In cryptography, RSA (which stands for Rivest, Shamir and Adleman who first publicly described it; see below) is an algorithm for public-key cryptography. It is the first algorithm known to be suitable for signing as well as encryption, and was one of the first great advances in public key cryptography. RSA is widely used in electronic commerce protocols, and is believed to be secure given sufficiently long keys and the use of up-to-date implementations.<a href="#ftn.idm219196237744" class="footnote"><sup class="footnote" id="idm219196237744">[55]</sup></a>
+			</div><div class="footnotes"><br /><hr /><div id="ftn.idm219196237744" class="footnote"><div class="para"><a href="#idm219196237744" class="para"><sup class="para">[55] </sup></a>
 					"RSA" <span class="emphasis"><em>Wikipedia</em></span> 14 April 2010 <a href="http://en.wikipedia.org/wiki/RSA">http://en.wikipedia.org/wiki/RSA</a>
 				</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="apas02.html"><strong>Prev</strong>A.2. Public-key Encryption</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="apas02s03.html"><strong>Next</strong>A.2.3. DSA</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/apas02s03.html b/public_html/en-US/Fedora/19/html/Security_Guide/apas02s03.html
index eb5b6f7..1e6f0bc 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/apas02s03.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/apas02s03.html
@@ -6,8 +6,8 @@
               
               addID('Fedora.19.books');
 	      addID('Fedora.19.Security_Guide');
-              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="apas02.html" title="A.2. Public-key Encryption" /><link rel="prev" href="apas02s02.html" title="A.2.2. RSA" /><link rel="next" href="apas02s04.html" title="A.2.4. SSL/TLS" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="apas02s02.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="apas02s04.html"><strong>Next</strong></a></li></ul><div class="sect
 ion" id="idm219023214896"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219023214896">A.2.3. DSA</h3></div></div></div><div class="para">
-				The Digital Signature Algorithm (DSA) is a United States Federal Government standard or FIPS for digital signatures. It was proposed by the National Institute of Standards and Technology (NIST) in August 1991 for use in their Digital Signature Standard (DSS), specified in FIPS 186, adopted in 1993. A minor revision was issued in 1996 as FIPS 186-1. The standard was expanded further in 2000 as FIPS 186-2 and again in 2009 as FIPS 186-3.<a href="#ftn.idm219016805616" class="footnote"><sup class="footnote" id="idm219016805616">[57]</sup></a>
-			</div><div class="footnotes"><br /><hr /><div id="ftn.idm219016805616" class="footnote"><div class="para"><a href="#idm219016805616" class="para"><sup class="para">[57] </sup></a>
+              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="apas02.html" title="A.2. Public-key Encryption" /><link rel="prev" href="apas02s02.html" title="A.2.2. RSA" /><link rel="next" href="apas02s04.html" title="A.2.4. SSL/TLS" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="apas02s02.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="apas02s04.html"><strong>Next</strong></a></li></ul><div class="sect
 ion" id="idm219193645600"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219193645600">A.2.3. DSA</h3></div></div></div><div class="para">
+				The Digital Signature Algorithm (DSA) is a United States Federal Government standard or FIPS for digital signatures. It was proposed by the National Institute of Standards and Technology (NIST) in August 1991 for use in their Digital Signature Standard (DSS), specified in FIPS 186, adopted in 1993. A minor revision was issued in 1996 as FIPS 186-1. The standard was expanded further in 2000 as FIPS 186-2 and again in 2009 as FIPS 186-3.<a href="#ftn.idm219193644048" class="footnote"><sup class="footnote" id="idm219193644048">[56]</sup></a>
+			</div><div class="footnotes"><br /><hr /><div id="ftn.idm219193644048" class="footnote"><div class="para"><a href="#idm219193644048" class="para"><sup class="para">[56] </sup></a>
 					"Digital Signature Algorithm" <span class="emphasis"><em>Wikipedia</em></span> 14 April 2010 <a href="http://en.wikipedia.org/wiki/Digital_Signature_Algorithm">http://en.wikipedia.org/wiki/Digital_Signature_Algorithm</a>
 				</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="apas02s02.html"><strong>Prev</strong>A.2.2. RSA</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="apas02s04.html"><strong>Next</strong>A.2.4. SSL/TLS</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/apas02s04.html b/public_html/en-US/Fedora/19/html/Security_Guide/apas02s04.html
index a34117f..1a6889c 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/apas02s04.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/apas02s04.html
@@ -6,7 +6,7 @@
               
               addID('Fedora.19.books');
 	      addID('Fedora.19.Security_Guide');
-              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="apas02.html" title="A.2. Public-key Encryption" /><link rel="prev" href="apas02s03.html" title="A.2.3. DSA" /><link rel="next" href="apas02s05.html" title="A.2.5. Cramer-Shoup Cryptosystem" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="apas02s03.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="apas02s05.html"><strong>Next</strong></a></li></u
 l><div class="section" id="idm219012625552"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219012625552">A.2.4. SSL/TLS</h3></div></div></div><div class="para">
+              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="apas02.html" title="A.2. Public-key Encryption" /><link rel="prev" href="apas02s03.html" title="A.2.3. DSA" /><link rel="next" href="apas02s05.html" title="A.2.5. Cramer-Shoup Cryptosystem" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="apas02s03.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="apas02s05.html"><strong>Next</strong></a></li></u
 l><div class="section" id="idm219222698208"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219222698208">A.2.4. SSL/TLS</h3></div></div></div><div class="para">
 				Transport Layer Security (TLS) and its predecessor, Secure Socket Layer (SSL), are cryptographic protocols that provide security for communications over networks such as the Internet. TLS and SSL encrypt the segments of network connections at the Transport Layer end-to-end. Several versions of the protocols are in widespread use in applications like web browsing, electronic mail, Internet faxing, instant messaging and voice-over-IP (VoIP). TLS is an IETF standards track protocol, last updated in RFC 5246, that was based on the earlier SSL specifications developed by Netscape Corporation.
 			</div><div class="para">
 				The TLS protocol allows client/server applications to communicate across a network in a way designed to prevent eavesdropping and tampering. TLS provides endpoint authentication and communications confidentiality over the Internet using cryptography. TLS provides RSA security with 1024 and 2048 bit strengths.
@@ -17,7 +17,7 @@
 			</div><div class="para">
 				Typically, the key information and certificates necessary for TLS are handled in the form of X.509 certificates, which define required fields and data formats.
 			</div><div class="para">
-				SSL operates in modular fashion. It is extensible by design, with support for forward and backward compatibility and negotiation between peers.<a href="#ftn.idm219013174192" class="footnote"><sup class="footnote" id="idm219013174192">[58]</sup></a>
-			</div><div class="footnotes"><br /><hr /><div id="ftn.idm219013174192" class="footnote"><div class="para"><a href="#idm219013174192" class="para"><sup class="para">[58] </sup></a>
+				SSL operates in modular fashion. It is extensible by design, with support for forward and backward compatibility and negotiation between peers.<a href="#ftn.idm219171537584" class="footnote"><sup class="footnote" id="idm219171537584">[57]</sup></a>
+			</div><div class="footnotes"><br /><hr /><div id="ftn.idm219171537584" class="footnote"><div class="para"><a href="#idm219171537584" class="para"><sup class="para">[57] </sup></a>
 					"Transport Layer Security" <span class="emphasis"><em>Wikipedia</em></span> 14 April 2010 <a href="http://en.wikipedia.org/wiki/Transport_Layer_Security">http://en.wikipedia.org/wiki/Transport_Layer_Security</a>
 				</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="apas02s03.html"><strong>Prev</strong>A.2.3. DSA</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="apas02s05.html"><strong>Next</strong>A.2.5. Cramer-Shoup Cryptosystem</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/apas02s05.html b/public_html/en-US/Fedora/19/html/Security_Guide/apas02s05.html
index 46e56c6..4db95aa 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/apas02s05.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/apas02s05.html
@@ -6,8 +6,8 @@
               
               addID('Fedora.19.books');
 	      addID('Fedora.19.Security_Guide');
-              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="apas02.html" title="A.2. Public-key Encryption" /><link rel="prev" href="apas02s04.html" title="A.2.4. SSL/TLS" /><link rel="next" href="apas02s06.html" title="A.2.6. ElGamal Encryption" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="apas02s04.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="apas02s06.html"><strong>Next</strong></a></li></ul><
 div class="section" id="idm219016862160"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219016862160">A.2.5. Cramer-Shoup Cryptosystem</h3></div></div></div><div class="para">
-				The Cramer–Shoup system is an asymmetric key encryption algorithm, and was the first efficient scheme proven to be secure against adaptive chosen ciphertext attack using standard cryptographic assumptions. Its security is based on the computational intractability (widely assumed, but not proved) of the decisional Diffie–Hellman assumption. Developed by Ronald Cramer and Victor Shoup in 1998, it is an extension of the Elgamal cryptosystem. In contrast to Elgamal, which is extremely malleable, Cramer–Shoup adds additional elements to ensure non-malleability even against a resourceful attacker. This non-malleability is achieved through the use of a collision-resistant hash function and additional computations, resulting in a ciphertext which is twice as large as in Elgamal.<a href="#ftn.idm219016860288" class="footnote"><sup class="footnote" id="idm219016860288">[59]</sup></a>
-			</div><div class="footnotes"><br /><hr /><div id="ftn.idm219016860288" class="footnote"><div class="para"><a href="#idm219016860288" class="para"><sup class="para">[59] </sup></a>
+              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="apas02.html" title="A.2. Public-key Encryption" /><link rel="prev" href="apas02s04.html" title="A.2.4. SSL/TLS" /><link rel="next" href="apas02s06.html" title="A.2.6. ElGamal Encryption" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="apas02s04.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="apas02s06.html"><strong>Next</strong></a></li></ul><
 div class="section" id="idm219186944736"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219186944736">A.2.5. Cramer-Shoup Cryptosystem</h3></div></div></div><div class="para">
+				The Cramer–Shoup system is an asymmetric key encryption algorithm, and was the first efficient scheme proven to be secure against adaptive chosen ciphertext attack using standard cryptographic assumptions. Its security is based on the computational intractability (widely assumed, but not proved) of the decisional Diffie–Hellman assumption. Developed by Ronald Cramer and Victor Shoup in 1998, it is an extension of the Elgamal cryptosystem. In contrast to Elgamal, which is extremely malleable, Cramer–Shoup adds additional elements to ensure non-malleability even against a resourceful attacker. This non-malleability is achieved through the use of a collision-resistant hash function and additional computations, resulting in a ciphertext which is twice as large as in Elgamal.<a href="#ftn.idm219197308144" class="footnote"><sup class="footnote" id="idm219197308144">[58]</sup></a>
+			</div><div class="footnotes"><br /><hr /><div id="ftn.idm219197308144" class="footnote"><div class="para"><a href="#idm219197308144" class="para"><sup class="para">[58] </sup></a>
 					"Cramer–Shoup cryptosystem" <span class="emphasis"><em>Wikipedia</em></span> 14 April 2010 <a href="http://en.wikipedia.org/wiki/Cramer-Shoup_cryptosystem">http://en.wikipedia.org/wiki/Cramer-Shoup_cryptosystem</a>
 				</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="apas02s04.html"><strong>Prev</strong>A.2.4. SSL/TLS</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="apas02s06.html"><strong>Next</strong>A.2.6. ElGamal Encryption</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/apas02s06.html b/public_html/en-US/Fedora/19/html/Security_Guide/apas02s06.html
index d45110a..3cd64ba 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/apas02s06.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/apas02s06.html
@@ -6,8 +6,8 @@
               
               addID('Fedora.19.books');
 	      addID('Fedora.19.Security_Guide');
-              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="apas02.html" title="A.2. Public-key Encryption" /><link rel="prev" href="apas02s05.html" title="A.2.5. Cramer-Shoup Cryptosystem" /><link rel="next" href="appe-Publican-Revision_History.html" title="Appendix B. Revision History" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="apas02s05.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="appe-Publ
 ican-Revision_History.html"><strong>Next</strong></a></li></ul><div class="section" id="idm219035716896"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219035716896">A.2.6. ElGamal Encryption</h3></div></div></div><div class="para">
-				In cryptography, the ElGamal encryption system is an asymmetric key encryption algorithm for public-key cryptography which is based on the Diffie-Hellman key agreement. It was described by Taher Elgamal in 1985.[1] ElGamal encryption is used in the free GNU Privacy Guard software, recent versions of PGP, and other cryptosystems. The Digital Signature Algorithm is a variant of the ElGamal signature scheme, which should not be confused with ElGamal encryption.<a href="#ftn.idm219030443328" class="footnote"><sup class="footnote" id="idm219030443328">[60]</sup></a>
-			</div><div class="footnotes"><br /><hr /><div id="ftn.idm219030443328" class="footnote"><div class="para"><a href="#idm219030443328" class="para"><sup class="para">[60] </sup></a>
+              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="apas02.html" title="A.2. Public-key Encryption" /><link rel="prev" href="apas02s05.html" title="A.2.5. Cramer-Shoup Cryptosystem" /><link rel="next" href="appe-Publican-Revision_History.html" title="Appendix B. Revision History" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="apas02s05.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="appe-Publ
 ican-Revision_History.html"><strong>Next</strong></a></li></ul><div class="section" id="idm219197305936"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219197305936">A.2.6. ElGamal Encryption</h3></div></div></div><div class="para">
+				In cryptography, the ElGamal encryption system is an asymmetric key encryption algorithm for public-key cryptography which is based on the Diffie-Hellman key agreement. It was described by Taher Elgamal in 1985.[1] ElGamal encryption is used in the free GNU Privacy Guard software, recent versions of PGP, and other cryptosystems. The Digital Signature Algorithm is a variant of the ElGamal signature scheme, which should not be confused with ElGamal encryption.<a href="#ftn.idm219185640016" class="footnote"><sup class="footnote" id="idm219185640016">[59]</sup></a>
+			</div><div class="footnotes"><br /><hr /><div id="ftn.idm219185640016" class="footnote"><div class="para"><a href="#idm219185640016" class="para"><sup class="para">[59] </sup></a>
 					"ElGamal encryption" <span class="emphasis"><em>Wikipedia</em></span> 14 April 2010 <a href="http://en.wikipedia.org/wiki/ElGamal_encryption">http://en.wikipedia.org/wiki/ElGamal_encryption</a>
 				</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="apas02s05.html"><strong>Prev</strong>A.2.5. Cramer-Shoup Cryptosystem</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="appe-Publican-Revision_History.html"><strong>Next</strong>Appendix B. Revision History</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/ch09.html b/public_html/en-US/Fedora/19/html/Security_Guide/ch09.html
index 59fff36..3406808 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/ch09.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/ch09.html
@@ -6,13 +6,13 @@
               
               addID('Fedora.19.books');
 	      addID('Fedora.19.Security_Guide');
-              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="chap-Security_Guide-CVE.html" title="Chapter 8. Common Vulnerabilities and Exposures" /><link rel="next" href="sect-Security-Enhanced_Linux-SELinux_Contexts.html" title="9.2. SELinux Contexts" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-CVE.html"><strong>Prev</strong></a></li><li class="n
 ext"><a accesskey="n" href="sect-Security-Enhanced_Linux-SELinux_Contexts.html"><strong>Next</strong></a></li></ul><div class="chapter" id="idm219029763520"><div class="titlepage"><div><div><h1 class="title" id="idm219029763520">Chapter 9. SELinux</h1></div></div></div><div class="toc"><dl class="toc"><dt><span class="section"><a href="ch09.html#sect-Security-Enhanced_Linux-Introduction">9.1. Introduction</a></span></dt><dd><dl><dt><span class="section"><a href="ch09.html#sect-Security-Enhanced_Linux-Introduction-Benefits_of_running_SELinux">9.1.1. Benefits of running SELinux</a></span></dt><dt><span class="section"><a href="ch09.html#sect-Security-Enhanced_Linux-Introduction-Examples">9.1.2. Examples</a></span></dt><dt><span class="section"><a href="ch09.html#sect-Security-Enhanced_Linux-Introduction-SELinux_Architecture">9.1.3. SELinux Architecture</a></span></dt><dt><span class="section"><a href="ch09.html#sect-Security-Enhanced_Linux-Introduction-SELinux_on_Other_Opera
 ting_Systems">9.1.4. SELinux on Other Operating Systems</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security-Enhanced_Linux-SELinux_Contexts.html">9.2. SELinux Contexts</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security-Enhanced_Linux-SELinux_Contexts.html#sect-Security-Enhanced_Linux-SELinux_Contexts-Domain_Transitions">9.2.1. Domain Transitions</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-SELinux_Contexts-SELinux_Contexts_for_Processes.html">9.2.2. SELinux Contexts for Processes</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-SELinux_Contexts-SELinux_Contexts_for_Users.html">9.2.3. SELinux Contexts for Users</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Targeted_Policy.html">9.3. Targeted Policy</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Targeted_Policy.html#sect-Security-Enhanced_L
 inux-Targeted_Policy-Confined_Processes">9.3.1. Confined Processes</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Targeted_Policy-Unconfined_Processes.html">9.3.2. Unconfined Processes</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Targeted_Policy-Confined_and_Unconfined_Users.html">9.3.3. Confined and Unconfined Users</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux.html">9.4. Working with SELinux</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux.html#sect-Security-Enhanced_Linux-Working_with_SELinux-SELinux_Packages">9.4.1. SELinux Packages</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-Which_Log_File_is_Used.html">9.4.2. Which Log File is Used</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinu
 x-Main_Configuration_File.html">9.4.3. Main Configuration File</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-Enabling_and_Disabling_SELinux.html">9.4.4. Enabling and Disabling SELinux</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-SELinux_Modes.html">9.4.5. SELinux Modes</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-Booleans.html">9.4.6. Booleans</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-SELinux_Contexts_Labeling_Files.html">9.4.7. SELinux Contexts - Labeling Files</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-The_file_t_and_default_t_Types.html">9.4.8. The file_t and default_t Types</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-Mounting_File_Systems.htm
 l">9.4.9. Mounting File Systems</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-Maintaining_SELinux_Labels_.html">9.4.10. Maintaining SELinux Labels </a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Confining_Users.html">9.5. Confining Users</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Confining_Users.html#sect-Security-Enhanced_Linux-Confining_Users-Linux_and_SELinux_User_Mappings">9.5.1. Linux and SELinux User Mappings</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Confining_Users-Confining_New_Linux_Users_useradd.html">9.5.2. Confining New Linux Users: useradd</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Confining_Users-Confining_Existing_Linux_Users_semanage_login.html">9.5.3. Confining Existing Linux Users: semanage login</a></span></dt><dt><span class="section"><a href="se
 ct-Security-Enhanced_Linux-Confining_Users-Changing_the_Default_Mapping.html">9.5.4. Changing the Default Mapping</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Confining_Users-xguest_Kiosk_Mode.html">9.5.5. xguest: Kiosk Mode</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Confining_Users-Booleans_for_Users_Executing_Applications.html">9.5.6. Booleans for Users Executing Applications</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Troubleshooting.html">9.6. Troubleshooting</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Troubleshooting.html#sect-Security-Enhanced_Linux-Troubleshooting-What_Happens_when_Access_is_Denied">9.6.1. What Happens when Access is Denied</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Troubleshooting-Top_Three_Causes_of_Problems.html">9.6.2. Top Three Causes of Problems</a></span
 ></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Troubleshooting-Fixing_Problems.html">9.6.3. Fixing Problems</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Further_Information.html">9.7. Further Information</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Further_Information.html#sect-Security-Enhanced_Linux-Further_Information-Contributors">9.7.1. Contributors</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Further_Information-Other_Resources.html">9.7.2. Other Resources</a></span></dt></dl></dd></dl></div><div class="para">
+              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="chap-Security_Guide-CVE.html" title="Chapter 8. Common Vulnerabilities and Exposures" /><link rel="next" href="sect-Security-Enhanced_Linux-SELinux_Contexts.html" title="9.2. SELinux Contexts" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-CVE.html"><strong>Prev</strong></a></li><li class="n
 ext"><a accesskey="n" href="sect-Security-Enhanced_Linux-SELinux_Contexts.html"><strong>Next</strong></a></li></ul><div class="chapter" id="idm219173895552"><div class="titlepage"><div><div><h1 class="title" id="idm219173895552">Chapter 9. SELinux</h1></div></div></div><div class="toc"><dl class="toc"><dt><span class="section"><a href="ch09.html#sect-Security-Enhanced_Linux-Introduction">9.1. Introduction</a></span></dt><dd><dl><dt><span class="section"><a href="ch09.html#sect-Security-Enhanced_Linux-Introduction-Benefits_of_running_SELinux">9.1.1. Benefits of running SELinux</a></span></dt><dt><span class="section"><a href="ch09.html#sect-Security-Enhanced_Linux-Introduction-Examples">9.1.2. Examples</a></span></dt><dt><span class="section"><a href="ch09.html#sect-Security-Enhanced_Linux-Introduction-SELinux_Architecture">9.1.3. SELinux Architecture</a></span></dt><dt><span class="section"><a href="ch09.html#sect-Security-Enhanced_Linux-Introduction-SELinux_on_Other_Opera
 ting_Systems">9.1.4. SELinux on Other Operating Systems</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security-Enhanced_Linux-SELinux_Contexts.html">9.2. SELinux Contexts</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security-Enhanced_Linux-SELinux_Contexts.html#sect-Security-Enhanced_Linux-SELinux_Contexts-Domain_Transitions">9.2.1. Domain Transitions</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-SELinux_Contexts-SELinux_Contexts_for_Processes.html">9.2.2. SELinux Contexts for Processes</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-SELinux_Contexts-SELinux_Contexts_for_Users.html">9.2.3. SELinux Contexts for Users</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Targeted_Policy.html">9.3. Targeted Policy</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Targeted_Policy.html#sect-Security-Enhanced_L
 inux-Targeted_Policy-Confined_Processes">9.3.1. Confined Processes</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Targeted_Policy-Unconfined_Processes.html">9.3.2. Unconfined Processes</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Targeted_Policy-Confined_and_Unconfined_Users.html">9.3.3. Confined and Unconfined Users</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux.html">9.4. Working with SELinux</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux.html#sect-Security-Enhanced_Linux-Working_with_SELinux-SELinux_Packages">9.4.1. SELinux Packages</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-Which_Log_File_is_Used.html">9.4.2. Which Log File is Used</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinu
 x-Main_Configuration_File.html">9.4.3. Main Configuration File</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-Enabling_and_Disabling_SELinux.html">9.4.4. Enabling and Disabling SELinux</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-SELinux_Modes.html">9.4.5. SELinux Modes</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-Booleans.html">9.4.6. Booleans</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-SELinux_Contexts_Labeling_Files.html">9.4.7. SELinux Contexts - Labeling Files</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-The_file_t_and_default_t_Types.html">9.4.8. The file_t and default_t Types</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-Mounting_File_Systems.htm
 l">9.4.9. Mounting File Systems</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-Maintaining_SELinux_Labels_.html">9.4.10. Maintaining SELinux Labels </a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Confining_Users.html">9.5. Confining Users</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Confining_Users.html#sect-Security-Enhanced_Linux-Confining_Users-Linux_and_SELinux_User_Mappings">9.5.1. Linux and SELinux User Mappings</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Confining_Users-Confining_New_Linux_Users_useradd.html">9.5.2. Confining New Linux Users: useradd</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Confining_Users-Confining_Existing_Linux_Users_semanage_login.html">9.5.3. Confining Existing Linux Users: semanage login</a></span></dt><dt><span class="section"><a href="se
 ct-Security-Enhanced_Linux-Confining_Users-Changing_the_Default_Mapping.html">9.5.4. Changing the Default Mapping</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Confining_Users-xguest_Kiosk_Mode.html">9.5.5. xguest: Kiosk Mode</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Confining_Users-Booleans_for_Users_Executing_Applications.html">9.5.6. Booleans for Users Executing Applications</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Troubleshooting.html">9.6. Troubleshooting</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Troubleshooting.html#sect-Security-Enhanced_Linux-Troubleshooting-What_Happens_when_Access_is_Denied">9.6.1. What Happens when Access is Denied</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Troubleshooting-Top_Three_Causes_of_Problems.html">9.6.2. Top Three Causes of Problems</a></span
 ></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Troubleshooting-Fixing_Problems.html">9.6.3. Fixing Problems</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Further_Information.html">9.7. Further Information</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Further_Information.html#sect-Security-Enhanced_Linux-Further_Information-Contributors">9.7.1. Contributors</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Further_Information-Other_Resources.html">9.7.2. Other Resources</a></span></dt></dl></dd></dl></div><div class="para">
 		</div><div xml:lang="en-US" class="section" id="sect-Security-Enhanced_Linux-Introduction" lang="en-US"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">9.1. Introduction</h2></div></div></div><div class="para">
 		Security-Enhanced Linux (SELinux) is an implementation of a <em class="firstterm">mandatory access control</em> mechanism in the Linux kernel, checking for allowed operations after standard <em class="firstterm">discretionary access controls</em> are checked. It was created by the National Security Agency and can enforce rules on files and processes in a Linux system, and on their actions, based on defined policy.
 	</div><div class="para">
 		When using SELinux, files, including directories and devices, are referred to as objects. Processes, such as a user running a command or the <span class="trademark">Mozilla</span>®<span class="trademark"> Firefox</span>® application, are referred to as subjects. Most operating systems use a Discretionary Access Control (DAC) system that controls how subjects interact with objects, and how subjects interact with each other. On operating systems using DAC, users control the permissions of files (objects) that they own. For example, on <span class="trademark">Linux</span>® operating systems, users could make their home directories world-readable, giving users and processes (subjects) access to potentially sensitive information, with no further protection over this unwanted action.
 	</div><div class="para">
-		Relying on DAC mechanisms alone is fundamentally inadequate for strong system security. DAC access decisions are only based on user identity and ownership, ignoring other security-relevant information such as the role of the user, the function and trustworthiness of the program, and the sensitivity and integrity of the data. Each user has complete discretion over their files, making it impossible to enforce a system-wide security policy. Furthermore, every program run by a user inherits all of the permissions granted to the user and is free to change access to the user's files, so no protection is provided against malicious software. Many system services and privileged programs must run with coarse-grained privileges that far exceed their requirements, so that a flaw in any one of these programs could be exploited to obtain further system access.<a href="#ftn.idm219011530176" class="footnote"><sup class="footnote" id="idm219011530176">[15]</sup></a>
+		Relying on DAC mechanisms alone is fundamentally inadequate for strong system security. DAC access decisions are only based on user identity and ownership, ignoring other security-relevant information such as the role of the user, the function and trustworthiness of the program, and the sensitivity and integrity of the data. Each user has complete discretion over their files, making it impossible to enforce a system-wide security policy. Furthermore, every program run by a user inherits all of the permissions granted to the user and is free to change access to the user's files, so no protection is provided against malicious software. Many system services and privileged programs must run with coarse-grained privileges that far exceed their requirements, so that a flaw in any one of these programs could be exploited to obtain further system access.<a href="#ftn.idm219183696336" class="footnote"><sup class="footnote" id="idm219183696336">[14]</sup></a>
 	</div><div class="para">
 		The following is an example of permissions used on Linux operating systems that do not run Security-Enhanced Linux (SELinux). The permissions and output in these examples may differ from your system. Use the <code class="command">ls -l</code> command to view file permissions:
 	</div><pre class="screen">$ ls -l file1
@@ -20,7 +20,7 @@
 </pre><div class="para">
 		The first three permission bits, <code class="computeroutput">rw</code>, control the access the Linux <code class="computeroutput">user1</code> user (in this case, the owner) has to <code class="filename">file1</code>. The next three permission bits, <code class="computeroutput">rw-</code>, control the access the Linux <code class="computeroutput">group1</code> group has to <code class="filename">file1</code>. The last three permission bits, <code class="computeroutput">r--</code>, control the access everyone else has to <code class="filename">file1</code>, which includes all users and processes.
 	</div><div class="para">
-		Security-Enhanced Linux (SELinux) adds Mandatory Access Control (MAC) to the Linux kernel, and is enabled by default in Fedora. A general purpose MAC architecture needs the ability to enforce an administratively-set security policy over all processes and files in the system, basing decisions on labels containing a variety of security-relevant information. When properly implemented, it enables a system to adequately defend itself and offers critical support for application security by protecting against the tampering with, and bypassing of, secured applications. MAC provides strong separation of applications that permits the safe execution of untrustworthy applications. Its ability to limit the privileges associated with executing processes limits the scope of potential damage that can result from the exploitation of vulnerabilities in applications and system services. MAC enables information to be protected from legitimate users with limited authorization as well as from a
 uthorized users who have unwittingly executed malicious applications.<a href="#ftn.idm219025754416" class="footnote"><sup class="footnote" id="idm219025754416">[16]</sup></a>
+		Security-Enhanced Linux (SELinux) adds Mandatory Access Control (MAC) to the Linux kernel, and is enabled by default in Fedora. A general purpose MAC architecture needs the ability to enforce an administratively-set security policy over all processes and files in the system, basing decisions on labels containing a variety of security-relevant information. When properly implemented, it enables a system to adequately defend itself and offers critical support for application security by protecting against the tampering with, and bypassing of, secured applications. MAC provides strong separation of applications that permits the safe execution of untrustworthy applications. Its ability to limit the privileges associated with executing processes limits the scope of potential damage that can result from the exploitation of vulnerabilities in applications and system services. MAC enables information to be protected from legitimate users with limited authorization as well as from a
 uthorized users who have unwittingly executed malicious applications.<a href="#ftn.idm219216837344" class="footnote"><sup class="footnote" id="idm219216837344">[15]</sup></a>
 	</div><div class="para">
 		The following is an example of the labels containing security-relevant information that are used on processes, Linux users, and files, on Linux operating systems that run SELinux. This information is called the SELinux <span class="emphasis"><em>context</em></span>, and is viewed using the <code class="command">ls -Z</code> command:
 	</div><pre class="screen">$ ls -Z file1
@@ -60,11 +60,11 @@
 				</div></li><li class="listitem"><div class="para">
 					Process separation is used. Processes run in their own domains, preventing processes from accessing files used by other processes, as well as preventing processes from accessing other processes. For example, when running SELinux, unless otherwise configured, an attacker can not compromise a Samba server, and then use that Samba server as an attack vector to read and write to files used by other processes, such as databases used by <span class="trademark">MySQL</span>®.
 				</div></li><li class="listitem"><div class="para">
-					SELinux helps limit the damage made by configuration mistakes. <a href="http://en.wikipedia.org/wiki/Domain_Name_System">Domain Name System (DNS)</a> servers often replicate information between each other in what is known as a zone transfer. Attackers can use zone transfers to update DNS servers with false information. When running the <a href="https://www.isc.org/software/bind">Berkeley Internet Name Daemon (BIND)</a> as a DNS server in Fedora, even if an administrator forgets to limit which servers can perform a zone transfer, the default SELinux policy prevents zone files <a href="#ftn.idm219011196672" class="footnote"><sup class="footnote" id="idm219011196672">[17]</sup></a> from being updated via zone transfers, by the BIND <code class="systemitem">named</code> daemon itself, and by other processes.
+					SELinux helps limit the damage made by configuration mistakes. <a href="http://en.wikipedia.org/wiki/Domain_Name_System">Domain Name System (DNS)</a> servers often replicate information between each other in what is known as a zone transfer. Attackers can use zone transfers to update DNS servers with false information. When running the <a href="https://www.isc.org/software/bind">Berkeley Internet Name Daemon (BIND)</a> as a DNS server in Fedora, even if an administrator forgets to limit which servers can perform a zone transfer, the default SELinux policy prevents zone files <a href="#ftn.idm219174411056" class="footnote"><sup class="footnote" id="idm219174411056">[16]</sup></a> from being updated via zone transfers, by the BIND <code class="systemitem">named</code> daemon itself, and by other processes.
 				</div></li><li class="listitem"><div class="para">
-					Refer to the <a href="http://www.redhatmagazine.com/"><span class="trademark">Red Hat</span>® Magazine</a> article, <a href="http://www.redhatmagazine.com/2008/02/26/risk-report-three-years-of-red-hat-enterprise-linux-4/">Risk report: Three years of Red Hat Enterprise Linux 4</a><a href="#ftn.idm219010418256" class="footnote"><sup class="footnote" id="idm219010418256">[18]</sup></a>, for exploits that were restricted due to the default SELinux targeted policy in <span class="trademark">Red Hat</span>® Enterprise <span class="trademark">Linux</span>® 4.
+					Refer to the <a href="http://www.redhatmagazine.com/"><span class="trademark">Red Hat</span>® Magazine</a> article, <a href="http://www.redhatmagazine.com/2008/02/26/risk-report-three-years-of-red-hat-enterprise-linux-4/">Risk report: Three years of Red Hat Enterprise Linux 4</a><a href="#ftn.idm219219469264" class="footnote"><sup class="footnote" id="idm219219469264">[17]</sup></a>, for exploits that were restricted due to the default SELinux targeted policy in <span class="trademark">Red Hat</span>® Enterprise <span class="trademark">Linux</span>® 4.
 				</div></li><li class="listitem"><div class="para">
-					Refer to the <a href="http://www.linuxworld.com">LinuxWorld.com</a> article, <a href="http://www.linuxworld.com/news/2008/022408-selinux.html?page=1">A seatbelt for server software: SELinux blocks real-world exploits</a><a href="#ftn.idm218993038784" class="footnote"><sup class="footnote" id="idm218993038784">[19]</sup></a>, for background information about SELinux, and information about various exploits that SELinux has prevented.
+					Refer to the <a href="http://www.linuxworld.com">LinuxWorld.com</a> article, <a href="http://www.linuxworld.com/news/2008/022408-selinux.html?page=1">A seatbelt for server software: SELinux blocks real-world exploits</a><a href="#ftn.idm219201491008" class="footnote"><sup class="footnote" id="idm219201491008">[18]</sup></a>, for background information about SELinux, and information about various exploits that SELinux has prevented.
 				</div></li><li class="listitem"><div class="para">
 					Refer to James Morris's <a href="http://james-morris.livejournal.com/25421.html">SELinux mitigates remote root vulnerability in OpenPegasus</a> blog post for information about an exploit in <a href="http://www.openpegasus.org/">OpenPegasus</a> that was mitigated by SELinux as shipped with Red Hat Enterprise Linux 4 and 5.
 				</div></li></ul></div><div class="para">
@@ -85,14 +85,14 @@
 					Red Hat Enterprise Linux: <a href="http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.2/html/Deployment_Guide/selg-overview.html">Red Hat Enterprise Linux Deployment Guide</a> and <a href="http://www.redhat.com/docs/manuals/enterprise/RHEL-4-Manual/selinux-guide/">Red Hat Enterprise Linux 4 SELinux Guide</a>.
 				</div></li><li class="listitem"><div class="para">
 					Fedora: <a href="http://fedoraproject.org/wiki/SELinux">http://fedoraproject.org/wiki/SELinux</a> and the <a href="http://docs.fedoraproject.org/selinux-faq-fc5/">Fedora Core 5 SELinux FAQ</a>.
-				</div></li></ul></div></div></div><div class="footnotes"><br /><hr /><div id="ftn.idm219011530176" class="footnote"><div class="para"><a href="#idm219011530176" class="para"><sup class="para">[15] </sup></a>
+				</div></li></ul></div></div></div><div class="footnotes"><br /><hr /><div id="ftn.idm219183696336" class="footnote"><div class="para"><a href="#idm219183696336" class="para"><sup class="para">[14] </sup></a>
 			"Integrating Flexible Support for Security Policies into the Linux Operating System", by Peter Loscocco and Stephen Smalley. This paper was originally prepared for the National Security Agency and is, consequently, in the public domain. Refer to the <a href="http://www.nsa.gov/research/_files/selinux/papers/freenix01/index.shtml">original paper</a> for details and the document as it was first released. Any edits and changes were done by Murray McAllister.
-		</div></div><div id="ftn.idm219025754416" class="footnote"><div class="para"><a href="#idm219025754416" class="para"><sup class="para">[16] </sup></a>
+		</div></div><div id="ftn.idm219216837344" class="footnote"><div class="para"><a href="#idm219216837344" class="para"><sup class="para">[15] </sup></a>
 			"Meeting Critical Security Objectives with Security-Enhanced Linux", by Peter Loscocco and Stephen Smalley. This paper was originally prepared for the National Security Agency and is, consequently, in the public domain. Refer to the <a href="http://www.nsa.gov/research/_files/selinux/papers/ottawa01/index.shtml">original paper</a> for details and the document as it was first released. Any edits and changes were done by Murray McAllister.
-		</div></div><div id="ftn.idm219011196672" class="footnote"><div class="para"><a href="#idm219011196672" class="para"><sup class="para">[17] </sup></a>
+		</div></div><div id="ftn.idm219174411056" class="footnote"><div class="para"><a href="#idm219174411056" class="para"><sup class="para">[16] </sup></a>
 						Text files that include information, such as hostname to IP address mappings, that are used by DNS servers.
-					</div></div><div id="ftn.idm219010418256" class="footnote"><div class="para"><a href="#idm219010418256" class="para"><sup class="para">[18] </sup></a>
+					</div></div><div id="ftn.idm219219469264" class="footnote"><div class="para"><a href="#idm219219469264" class="para"><sup class="para">[17] </sup></a>
 						Cox, Mark. "Risk report: Three years of Red Hat Enterprise Linux 4". Published 26 February 2008. Accessed 27 August 2009: <a href="http://www.redhatmagazine.com/2008/02/26/risk-report-three-years-of-red-hat-enterprise-linux-4/">http://www.redhatmagazine.com/2008/02/26/risk-report-three-years-of-red-hat-enterprise-linux-4/</a>.
-					</div></div><div id="ftn.idm218993038784" class="footnote"><div class="para"><a href="#idm218993038784" class="para"><sup class="para">[19] </sup></a>
+					</div></div><div id="ftn.idm219201491008" class="footnote"><div class="para"><a href="#idm219201491008" class="para"><sup class="para">[18] </sup></a>
 						Marti, Don. "A seatbelt for server software: SELinux blocks real-world exploits". Published 24 February 2008. Accessed 27 August 2009: <a href="http://www.linuxworld.com/news/2008/022408-selinux.html?page=1">http://www.linuxworld.com/news/2008/022408-selinux.html?page=1</a>.
 					</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-CVE.html"><strong>Prev</strong>Chapter 8. Common Vulnerabilities and Exposures</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security-Enhanced_Linux-SELinux_Contexts.html"><strong>Next</strong>9.2. SELinux Contexts</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/ch10.html b/public_html/en-US/Fedora/19/html/Security_Guide/ch10.html
index 1cfe60c..63d3c53 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/ch10.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/ch10.html
@@ -6,11 +6,11 @@
               
               addID('Fedora.19.books');
 	      addID('Fedora.19.Security_Guide');
-              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="sect-Security-Enhanced_Linux-Further_Information-Other_Resources.html" title="9.7.2. Other Resources" /><link rel="next" href="sect-Managing_Confined_Services-Targeted_policy.html" title="10.2. Targeted policy" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security-Enhanced_Linux-Further_Information-Other_
 Resources.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="sect-Managing_Confined_Services-Targeted_policy.html"><strong>Next</strong></a></li></ul><div xml:lang="en-US" class="chapter" id="idm218995471200" lang="en-US"><div class="titlepage"><div><div><h1 class="title" id="idm218995471200">Chapter 10. Managing Confined Services</h1></div></div></div><div class="toc"><dl class="toc"><dt><span class="section"><a href="ch10.html#sect-Managing_Confined_Services-Introduction">10.1. Introduction</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Targeted_policy.html">10.2. Targeted policy</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Targeted_policy.html#sect-Managing_Confined_Services-Targeted_policy-Type_Enforcement">10.2.1. Type Enforcement</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Targeted_policy-Confined_processes.html">10.2.2. Confi
 ned processes</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Targeted_policy-Unconfined_processes.html">10.2.3. Unconfined processes</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-The_Apache_HTTP_Server.html">10.3. The Apache HTTP Server</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-The_Apache_HTTP_Server.html#sect-Managing_Confined_Services-The_Apache_HTTP_Server-The_Apache_HTTP_Server_and_SELinux">10.3.1. The Apache HTTP Server and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-The_Apache_HTTP_Server-Types.html">10.3.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-The_Apache_HTTP_Server-Booleans.html">10.3.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-The_Apache_HTTP_Server-Configuration_examples.html">10.3.4. Configura
 tion examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-Samba.html">10.4. Samba</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Samba.html#sect-Managing_Confined_Services-Samba-Samba_and_SELinux">10.4.1. Samba and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Samba-Types.html">10.4.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Samba-Booleans.html">10.4.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Samba-Configuration_examples.html">10.4.4. Configuration examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-File_Transfer_Protocol.html">10.5. File Transfer Protocol</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-File_Transfer_Protocol.html#sect-Managing_Confined_Se
 rvices-File_Transfer_Protocol-FTP_and_SELinux">10.5.1. FTP and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-File_Transfer_Protocol-Types.html">10.5.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-File_Transfer_Protocol-Booleans.html">10.5.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-File_Transfer_Protocol-Configuration_Examples.html">10.5.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-Network_File_System.html">10.6. Network File System</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Network_File_System.html#sect-Managing_Confined_Services-NFS-NFS_and_SELinux">10.6.1. NFS and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-NFS-Types.html">10.6.2. Types</a></span></dt><dt><span class="secti
 on"><a href="sect-Managing_Confined_services-NFS-Booleans.html">10.6.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-NFS-Configuration_Examples.html">10.6.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-Berkeley_Internet_Name_Domain.html">10.7. Berkeley Internet Name Domain</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Berkeley_Internet_Name_Domain.html#sect-Managing_Confined_Services-BIND-BIND_and_SELinux">10.7.1. BIND and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-BIND-Types.html">10.7.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-BIND-Booleans.html">10.7.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-BIND-Configuration_Examples.html">10.7.4. Configuration Examples</a></span></dt
 ></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-Concurrent_Versioning_System.html">10.8. Concurrent Versioning System</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Concurrent_Versioning_System.html#sect-Managing_Confined_Services-Concurrent_Versioning_System-CVS_and_SELinux">10.8.1. CVS and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Concurrent_Versioning_System-Types.html">10.8.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Concurrent_Versioning_System-Booleans.html">10.8.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Concurrent_Versioning_System-Configuration_Examples.html">10.8.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-Squid_Caching_Proxy.html">10.9. Squid Caching Proxy</a></span></dt><dd><
 dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Squid_Caching_Proxy.html#sect-Managing_Confined_Services-Squid_Caching_Proxy-Squid_Caching_Proxy_and_SELinux">10.9.1. Squid Caching Proxy and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Squid_Caching_Proxy-Types.html">10.9.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Squid_Caching_Proxy-Booleans.html">10.9.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Squid_Caching_Proxy-Configuration_Examples.html">10.9.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-MySQL.html">10.10. MySQL</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-MySQL.html#sect-Managing_Confined_Services-MySQL-MySQL_and_SELinux">10.10.1. MySQL and SELinux</a></span></dt><dt><span class="section"><a
  href="sect-Managing_Confined_Services-MySQL-Types.html">10.10.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-MySQL-Booleans.html">10.10.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-MySQL-Configuration_Examples.html">10.10.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-PostgreSQL.html">10.11. PostgreSQL</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-PostgreSQL.html#sect-Managing_Confined_Services-PostgreSQL-PostgreSQL_and_SELinux">10.11.1. PostgreSQL and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-PostgreSQL-Types.html">10.11.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-PostgreSQL-Booleans.html">10.11.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confi
 ned_Services-PostgreSQL-Configuration_Examples.html">10.11.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-rsync.html">10.12. rsync</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-rsync.html#sect-Managing_Confined_Services-rsync-rsync_and_SELinux">10.12.1. rsync and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-rsync-Types.html">10.12.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-rsync-Booleans.html">10.12.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-rsync-Configuration_Examples.html">10.12.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-Postfix.html">10.13. Postfix</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Postfi
 x.html#sect-Managing_Confined_Services-rsync-Postfix_and_SELinux">10.13.1. Postfix and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Postfix-Types.html">10.13.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Postfix-Booleans.html">10.13.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Postfix-Configuration_Examples.html">10.13.4. Configuration Examples</a></span></dt></dl></dd></dl></div><div class="para">
+              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="sect-Security-Enhanced_Linux-Further_Information-Other_Resources.html" title="9.7.2. Other Resources" /><link rel="next" href="sect-Managing_Confined_Services-Targeted_policy.html" title="10.2. Targeted policy" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security-Enhanced_Linux-Further_Information-Other_
 Resources.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="sect-Managing_Confined_Services-Targeted_policy.html"><strong>Next</strong></a></li></ul><div xml:lang="en-US" class="chapter" id="idm219190928240" lang="en-US"><div class="titlepage"><div><div><h1 class="title" id="idm219190928240">Chapter 10. Managing Confined Services</h1></div></div></div><div class="toc"><dl class="toc"><dt><span class="section"><a href="ch10.html#sect-Managing_Confined_Services-Introduction">10.1. Introduction</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Targeted_policy.html">10.2. Targeted policy</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Targeted_policy.html#sect-Managing_Confined_Services-Targeted_policy-Type_Enforcement">10.2.1. Type Enforcement</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Targeted_policy-Confined_processes.html">10.2.2. Confi
 ned processes</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Targeted_policy-Unconfined_processes.html">10.2.3. Unconfined processes</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-The_Apache_HTTP_Server.html">10.3. The Apache HTTP Server</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-The_Apache_HTTP_Server.html#sect-Managing_Confined_Services-The_Apache_HTTP_Server-The_Apache_HTTP_Server_and_SELinux">10.3.1. The Apache HTTP Server and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-The_Apache_HTTP_Server-Types.html">10.3.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-The_Apache_HTTP_Server-Booleans.html">10.3.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-The_Apache_HTTP_Server-Configuration_examples.html">10.3.4. Configura
 tion examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-Samba.html">10.4. Samba</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Samba.html#sect-Managing_Confined_Services-Samba-Samba_and_SELinux">10.4.1. Samba and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Samba-Types.html">10.4.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Samba-Booleans.html">10.4.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Samba-Configuration_examples.html">10.4.4. Configuration examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-File_Transfer_Protocol.html">10.5. File Transfer Protocol</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-File_Transfer_Protocol.html#sect-Managing_Confined_Se
 rvices-File_Transfer_Protocol-FTP_and_SELinux">10.5.1. FTP and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-File_Transfer_Protocol-Types.html">10.5.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-File_Transfer_Protocol-Booleans.html">10.5.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-File_Transfer_Protocol-Configuration_Examples.html">10.5.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-Network_File_System.html">10.6. Network File System</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Network_File_System.html#sect-Managing_Confined_Services-NFS-NFS_and_SELinux">10.6.1. NFS and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-NFS-Types.html">10.6.2. Types</a></span></dt><dt><span class="secti
 on"><a href="sect-Managing_Confined_services-NFS-Booleans.html">10.6.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-NFS-Configuration_Examples.html">10.6.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-Berkeley_Internet_Name_Domain.html">10.7. Berkeley Internet Name Domain</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Berkeley_Internet_Name_Domain.html#sect-Managing_Confined_Services-BIND-BIND_and_SELinux">10.7.1. BIND and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-BIND-Types.html">10.7.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-BIND-Booleans.html">10.7.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-BIND-Configuration_Examples.html">10.7.4. Configuration Examples</a></span></dt
 ></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-Concurrent_Versioning_System.html">10.8. Concurrent Versioning System</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Concurrent_Versioning_System.html#sect-Managing_Confined_Services-Concurrent_Versioning_System-CVS_and_SELinux">10.8.1. CVS and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Concurrent_Versioning_System-Types.html">10.8.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Concurrent_Versioning_System-Booleans.html">10.8.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Concurrent_Versioning_System-Configuration_Examples.html">10.8.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-Squid_Caching_Proxy.html">10.9. Squid Caching Proxy</a></span></dt><dd><
 dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Squid_Caching_Proxy.html#sect-Managing_Confined_Services-Squid_Caching_Proxy-Squid_Caching_Proxy_and_SELinux">10.9.1. Squid Caching Proxy and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Squid_Caching_Proxy-Types.html">10.9.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Squid_Caching_Proxy-Booleans.html">10.9.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Squid_Caching_Proxy-Configuration_Examples.html">10.9.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-MySQL.html">10.10. MySQL</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-MySQL.html#sect-Managing_Confined_Services-MySQL-MySQL_and_SELinux">10.10.1. MySQL and SELinux</a></span></dt><dt><span class="section"><a
  href="sect-Managing_Confined_Services-MySQL-Types.html">10.10.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-MySQL-Booleans.html">10.10.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-MySQL-Configuration_Examples.html">10.10.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-PostgreSQL.html">10.11. PostgreSQL</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-PostgreSQL.html#sect-Managing_Confined_Services-PostgreSQL-PostgreSQL_and_SELinux">10.11.1. PostgreSQL and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-PostgreSQL-Types.html">10.11.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-PostgreSQL-Booleans.html">10.11.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confi
 ned_Services-PostgreSQL-Configuration_Examples.html">10.11.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-rsync.html">10.12. rsync</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-rsync.html#sect-Managing_Confined_Services-rsync-rsync_and_SELinux">10.12.1. rsync and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-rsync-Types.html">10.12.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-rsync-Booleans.html">10.12.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-rsync-Configuration_Examples.html">10.12.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-Postfix.html">10.13. Postfix</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Postfi
 x.html#sect-Managing_Confined_Services-rsync-Postfix_and_SELinux">10.13.1. Postfix and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Postfix-Types.html">10.13.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Postfix-Booleans.html">10.13.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Postfix-Configuration_Examples.html">10.13.4. Configuration Examples</a></span></dt></dl></dd></dl></div><div class="para">
 	</div><div xml:lang="en-US" class="section" id="sect-Managing_Confined_Services-Introduction" lang="en-US"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">10.1. Introduction</h2></div></div></div><div class="para">
 		Security-Enhanced Linux (SELinux) refers to files, such as directories and devices, as objects. Processes, such as a user running a command or the <span class="trademark">Mozilla</span>®<span class="trademark"> Firefox</span>® application, are referred to as subjects. Most operating systems use a Discretionary Access Control (DAC) system that controls how subjects interact with objects, and how subjects interact with each other. On operating systems using DAC, users control the permissions of files (objects) that they own. For example, on <span class="trademark">Linux</span>® operating systems, users could make their home directories world-readable, inadvertently giving users and processes (subjects) access to potentially sensitive information.
 	</div><div class="para">
-		DAC mechanisms are fundamentally inadequate for strong system security. DAC access decisions are only based on user identity and ownership, ignoring other security-relevant information such as the role of the user, the function and trustworthiness of the program, and the sensitivity and integrity of the data. Each user has complete discretion over their files, making it impossible to enforce a system-wide security policy. Furthermore, every program run by a user inherits all of the permissions granted to the user and is free to change access to the user's files, so no protection is provided against malicious software. Many system services and privileged programs must run with coarse-grained privileges that far exceed their requirements, so that a flaw in any one of these programs can be exploited to obtain complete system access.<a href="#ftn.idm219013331472" class="footnote"><sup class="footnote" id="idm219013331472">[33]</sup></a>
+		DAC mechanisms are fundamentally inadequate for strong system security. DAC access decisions are only based on user identity and ownership, ignoring other security-relevant information such as the role of the user, the function and trustworthiness of the program, and the sensitivity and integrity of the data. Each user has complete discretion over their files, making it impossible to enforce a system-wide security policy. Furthermore, every program run by a user inherits all of the permissions granted to the user and is free to change access to the user's files, so no protection is provided against malicious software. Many system services and privileged programs must run with coarse-grained privileges that far exceed their requirements, so that a flaw in any one of these programs can be exploited to obtain complete system access.<a href="#ftn.idm219172742064" class="footnote"><sup class="footnote" id="idm219172742064">[32]</sup></a>
 	</div><div class="para">
 		The following is an example of permissions used on Linux operating systems that do not run Security-Enhanced Linux (SELinux). The permissions in these examples may differ from your system. Use the <code class="command">ls -l</code> command to view file permissions:
 	</div><pre class="screen">
@@ -19,7 +19,7 @@ $ ls -l file1
 </pre><div class="para">
 		The first three permission bits, <code class="computeroutput">rwx</code>, control the access the Linux <code class="computeroutput">user1</code> user (in this case, the owner) has to <code class="filename">file1</code>. The next three permission bits, <code class="computeroutput">rw-</code>, control the access the Linux <code class="computeroutput">group1</code> group has to <code class="filename">file1</code>. The last three permission bits, <code class="computeroutput">r--</code>, control the access everyone else has to <code class="filename">file1</code>, which includes all users and processes.
 	</div><div class="para">
-		Security-Enhanced Linux (SELinux) adds Mandatory Access Control (MAC) to the Linux kernel, and is enabled by default in Fedora. A general purpose MAC architecture needs the ability to enforce an administratively-set security policy over all processes and files in the system, basing decisions on labels containing a variety of security-relevant information. When properly implemented, it enables a system to adequately defend itself and offers critical support for application security by protecting against the tampering with, and bypassing of, secured applications. MAC provides strong separation of applications that permits the safe execution of untrustworthy applications. Its ability to limit the privileges associated with executing processes limits the scope of potential damage that can result from the exploitation of vulnerabilities in applications and system services. MAC enables information to be protected from legitimate users with limited authorization as well as from a
 uthorized users who have unwittingly executed malicious applications.<a href="#ftn.idm219007787680" class="footnote"><sup class="footnote" id="idm219007787680">[34]</sup></a>
+		Security-Enhanced Linux (SELinux) adds Mandatory Access Control (MAC) to the Linux kernel, and is enabled by default in Fedora. A general purpose MAC architecture needs the ability to enforce an administratively-set security policy over all processes and files in the system, basing decisions on labels containing a variety of security-relevant information. When properly implemented, it enables a system to adequately defend itself and offers critical support for application security by protecting against the tampering with, and bypassing of, secured applications. MAC provides strong separation of applications that permits the safe execution of untrustworthy applications. Its ability to limit the privileges associated with executing processes limits the scope of potential damage that can result from the exploitation of vulnerabilities in applications and system services. MAC enables information to be protected from legitimate users with limited authorization as well as from a
 uthorized users who have unwittingly executed malicious applications.<a href="#ftn.idm219169753232" class="footnote"><sup class="footnote" id="idm219169753232">[33]</sup></a>
 	</div><div class="para">
 		The following is an example of the labels containing security-relevant information that are used on processes, Linux users, and files, on Linux operating systems that run SELinux. This information is called the SELinux context, and is viewed using the <code class="command">ls -Z</code> command:
 	</div><pre class="screen">
@@ -27,8 +27,8 @@ $ ls -Z file1
 -rwxrw-r--  user1 group1 unconfined_u:object_r:user_home_t:s0      file1
 </pre><div class="para">
 		In this example, SELinux provides a user (<code class="computeroutput">unconfined_u</code>), a role (<code class="computeroutput">object_r</code>), a type (<code class="computeroutput">user_home_t</code>), and a level (<code class="computeroutput">s0</code>). This information is used to make access control decisions. This example also displays the DAC rules, which are shown in the SELinux context via the <code class="command">ls -Z</code> command. SELinux policy rules are checked after DAC rules. SELinux policy rules are not used if DAC rules deny access first.
-	</div></div><div class="footnotes"><br /><hr /><div id="ftn.idm219013331472" class="footnote"><div class="para"><a href="#idm219013331472" class="para"><sup class="para">[33] </sup></a>
+	</div></div><div class="footnotes"><br /><hr /><div id="ftn.idm219172742064" class="footnote"><div class="para"><a href="#idm219172742064" class="para"><sup class="para">[32] </sup></a>
 			"Integrating Flexible Support for Security Policies into the Linux Operating System", by Peter Loscocco and Stephen Smalley. This paper was originally prepared for the National Security Agency and is, consequently, in the public domain. Refer to the <a href="http://www.nsa.gov/research/_files/selinux/papers/freenix01/index.shtml">original paper</a> for details and the document as it was first released. Any edits and changes were done by Murray McAllister.
-		</div></div><div id="ftn.idm219007787680" class="footnote"><div class="para"><a href="#idm219007787680" class="para"><sup class="para">[34] </sup></a>
+		</div></div><div id="ftn.idm219169753232" class="footnote"><div class="para"><a href="#idm219169753232" class="para"><sup class="para">[33] </sup></a>
 			"Meeting Critical Security Objectives with Security-Enhanced Linux", by Peter Loscocco and Stephen Smalley. This paper was originally prepared for the National Security Agency and is, consequently, in the public domain. Refer to the <a href="http://www.nsa.gov/research/_files/selinux/papers/ottawa01/index.shtml">original paper</a> for details and the document as it was first released. Any edits and changes were done by Murray McAllister.
 		</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security-Enhanced_Linux-Further_Information-Other_Resources.html"><strong>Prev</strong>9.7.2. Other Resources</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Managing_Confined_Services-Targeted_policy.html"><strong>Next</strong>10.2. Targeted policy</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/chap-Security_Guide-Basic_Hardening.html b/public_html/en-US/Fedora/19/html/Security_Guide/chap-Security_Guide-Basic_Hardening.html
index e1adc13..5907879 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/chap-Security_Guide-Basic_Hardening.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/chap-Security_Guide-Basic_Hardening.html
@@ -6,10 +6,8 @@
               
               addID('Fedora.19.books');
 	      addID('Fedora.19.Security_Guide');
-              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html" title="1.5.4. Applying the Changes" /><link rel="next" href="sect-Security_Guide-Basic_Hardening-General_Principles-Why_is_this_important.html" title="2.2. Why is this important?" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-U
 pdating_Packages-Applying_the_Changes.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-General_Principles-Why_is_this_important.html"><strong>Next</strong></a></li></ul><div xml:lang="en-US" class="chapter" id="chap-Security_Guide-Basic_Hardening" lang="en-US"><div class="titlepage"><div><div><h1 class="title">Chapter 2. Basic Hardening Guide</h1></div></div></div><div class="toc"><dl class="toc"><dt><span class="section"><a href="chap-Security_Guide-Basic_Hardening.html#sect-Security_Guide-Basic_Hardening-General_Principles">2.1. General Principles</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-General_Principles-Why_is_this_important.html">2.2. Why is this important?</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-Physical_Security.html">2.3. Physical Security</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Basi
 c_Hardening-Physical_Security-Why_is_this_important.html">2.4. Why this is important</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-Networking.html">2.5. Networking</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-Networking.html#sect-Security_Guide-Basic_Hardening-Networking-iptables">2.5.1. iptables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-Networking-IPv6.html">2.5.2. IPv6</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-Up_to_date.html">2.6. Keeping software up to date</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-Services.html">2.7. Services</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-NTP.html">2.8. NTP</a></span></dt></dl></div><div class="para">
-		The <a href="http://www.nsa.gov">US National Security Agency</a> (NSA) has developed two guides for hardening a default installation of Red Hat Enterprise Linux 5. Many of the tips provided in these guides are also valid for installations of Fedora. This Basic Hardening Guide will cover portions of the NSA's Hardening Tips and will explain why implementing these tips are important. This document does not represent the full NSA Hardening Guide.
-	</div><div class="para">
-		As with any change to a system these changes could cause unintended results. Changes should be evaluated for appropriateness on your system before implementing.
+              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html" title="1.5.4. Applying the Changes" /><link rel="next" href="sect-Security_Guide-Basic_Hardening-Physical_Security.html" title="2.2. Physical Security" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Updating_Packages-Applying_th
 e_Changes.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-Physical_Security.html"><strong>Next</strong></a></li></ul><div xml:lang="en-US" class="chapter" id="chap-Security_Guide-Basic_Hardening" lang="en-US"><div class="titlepage"><div><div><h1 class="title">Chapter 2. Basic Hardening Guide</h1></div></div></div><div class="toc"><dl class="toc"><dt><span class="section"><a href="chap-Security_Guide-Basic_Hardening.html#sect-Security_Guide-Basic_Hardening-General_Principles">2.1. General Principles</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-Physical_Security.html">2.2. Physical Security</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-Physical_Security-Why_is_this_important.html">2.3. Why this is important</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-Networking.html">2.4. Networking</a></spa
 n></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-Networking.html#sect-Security_Guide-Basic_Hardening-Networking-iptables">2.4.1. iptables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-Networking-IPv6.html">2.4.2. IPv6</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-Up_to_date.html">2.5. Keeping software up to date</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-Services.html">2.6. Services</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-NTP.html">2.7. NTP</a></span></dt></dl></div><div class="para">
+		Every computer system should be hardened against threats found both over the network as well as those found physically at the computer. The system changes are necessary based on default settings usually being set to allow software to work over the software being secure. As with any change to a system these changes could cause unintended results. Changes should be evaluated for appropriateness on your system before implementing.
 	</div><div class="section" id="sect-Security_Guide-Basic_Hardening-General_Principles"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.1. General Principles</h2></div></div></div><div class="para">
 			<table border="0" summary="Simple list" class="simplelist"><tr><td>Encrypt all data transmitted over the network. Encrypting authentication information (such as passwords) is particularly important.</td></tr><tr><td>Minimize the amount of software installed and running in order to minimize vulnerability.</td></tr><tr><td>Use security-enhancing software and tools whenever available (e.g. SELinux and IPTables).</td></tr><tr><td>Run each network service on a separate server whenever possible. This minimizes the risk that a compromise of one service could lead to a compromise of others.</td></tr><tr><td>Maintain user accounts. Create a good password policy and enforce its use. Delete unused user accounts.</td></tr><tr><td>Review system and application logs on a routine basis. Send logs to a dedicated log server. This prevents intruders from easily avoiding detection by modifying the local logs.</td></tr><tr><td>Never log in directly as root, unless absolutely necessary. Admin
 istrators should use <code class="command">sudo</code> to execute commands as root when required. The accounts capable of using sudo are specified in <code class="filename">/etc/sudoers</code>, which is edited with the visudo utility. By default, relevant logs are written to <code class="filename">/var/log/secure</code>.</td></tr></table>
-		</div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html"><strong>Prev</strong>1.5.4. Applying the Changes</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-General_Principles-Why_is_this_important.html"><strong>Next</strong>2.2. Why is this important?</a></li></ul></body></html>
\ No newline at end of file
+		</div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html"><strong>Prev</strong>1.5.4. Applying the Changes</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-Physical_Security.html"><strong>Next</strong>2.2. Physical Security</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/chap-Security_Guide-Encryption_Standards.html b/public_html/en-US/Fedora/19/html/Security_Guide/chap-Security_Guide-Encryption_Standards.html
index 2e6761b..7ed6dbb 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/chap-Security_Guide-Encryption_Standards.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/chap-Security_Guide-Encryption_Standards.html
@@ -7,31 +7,31 @@
               addID('Fedora.19.books');
 	      addID('Fedora.19.Security_Guide');
               </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="sect-Managing_Confined_Services-Postfix-Configuration_Examples.html" title="10.13.4. Configuration Examples" /><link rel="next" href="apas02.html" title="A.2. Public-key Encryption" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Managing_Confined_Services-Postfix-Configuration_Examples.html"><strong>Prev</s
 trong></a></li><li class="next"><a accesskey="n" href="apas02.html"><strong>Next</strong></a></li></ul><div xml:lang="en-US" class="appendix" id="chap-Security_Guide-Encryption_Standards" lang="en-US"><div class="titlepage"><div><div><h1 class="title">Encryption Standards</h1></div></div></div><div class="para">
-	</div><div class="section" id="idm219013706816"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title" id="idm219013706816">A.1. Synchronous Encryption</h2></div></div></div><div class="para">
-		</div><div class="section" id="idm219017241040"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219017241040">A.1.1. Advanced Encryption Standard - AES</h3></div></div></div><div class="para">
-				In cryptography, the Advanced Encryption Standard (AES) is an encryption standard adopted by the U.S. government. The standard comprises three block ciphers, AES-128, AES-192 and AES-256, adopted from a larger collection originally published as Rijndael. Each AES cipher has a 128-bit block size, with key sizes of 128, 192 and 256 bits, respectively. The AES ciphers have been analyzed extensively and are now used worldwide, as was the case with its predecessor, the Data Encryption Standard (DES).<a href="#ftn.idm219014862800" class="footnote"><sup class="footnote" id="idm219014862800">[41]</sup></a>
-			</div><div class="section" id="idm219003737712"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title" id="idm219003737712">A.1.1.1. AES Uses</h4></div></div></div><div class="para">
-				</div></div><div class="section" id="idm219001460256"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title" id="idm219001460256">A.1.1.2. AES History</h4></div></div></div><div class="para">
-					AES was announced by National Institute of Standards and Technology (NIST) as U.S. FIPS PUB 197 (FIPS 197) on November 26, 2001 after a 5-year standardization process in which fifteen competing designs were presented and evaluated before Rijndael was selected as the most suitable (see Advanced Encryption Standard process for more details). It became effective as a standard May 26, 2002. It is available in many different encryption packages. AES is the first publicly accessible and open cipher approved by the NSA for top secret information (see Security of AES, below).<a href="#ftn.idm219013540928" class="footnote"><sup class="footnote" id="idm219013540928">[42]</sup></a>
+	</div><div class="section" id="idm219193930000"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title" id="idm219193930000">A.1. Synchronous Encryption</h2></div></div></div><div class="para">
+		</div><div class="section" id="idm219188617968"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219188617968">A.1.1. Advanced Encryption Standard - AES</h3></div></div></div><div class="para">
+				In cryptography, the Advanced Encryption Standard (AES) is an encryption standard adopted by the U.S. government. The standard comprises three block ciphers, AES-128, AES-192 and AES-256, adopted from a larger collection originally published as Rijndael. Each AES cipher has a 128-bit block size, with key sizes of 128, 192 and 256 bits, respectively. The AES ciphers have been analyzed extensively and are now used worldwide, as was the case with its predecessor, the Data Encryption Standard (DES).<a href="#ftn.idm219202450208" class="footnote"><sup class="footnote" id="idm219202450208">[40]</sup></a>
+			</div><div class="section" id="idm219200109200"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title" id="idm219200109200">A.1.1.1. AES Uses</h4></div></div></div><div class="para">
+				</div></div><div class="section" id="idm219220590608"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title" id="idm219220590608">A.1.1.2. AES History</h4></div></div></div><div class="para">
+					AES was announced by National Institute of Standards and Technology (NIST) as U.S. FIPS PUB 197 (FIPS 197) on November 26, 2001 after a 5-year standardization process in which fifteen competing designs were presented and evaluated before Rijndael was selected as the most suitable (see Advanced Encryption Standard process for more details). It became effective as a standard May 26, 2002. It is available in many different encryption packages. AES is the first publicly accessible and open cipher approved by the NSA for top secret information (see Security of AES, below).<a href="#ftn.idm219217087520" class="footnote"><sup class="footnote" id="idm219217087520">[41]</sup></a>
 				</div><div class="para">
-					The Rijndael cipher was developed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen, and submitted by them to the AES selection process. Rijndael (pronounced [rɛindaːl]) is a portmanteau of the names of the two inventors.<a href="#ftn.idm219027207920" class="footnote"><sup class="footnote" id="idm219027207920">[43]</sup></a>
-				</div></div></div><div class="section" id="idm219025666224"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219025666224">A.1.2.  Data Encryption Standard - DES</h3></div></div></div><div class="para">
-				The Data Encryption Standard (DES) is a block cipher (a form of shared secret encryption) that was selected by the National Bureau of Standards as an official Federal Information Processing Standard (FIPS) for the United States in 1976 and which has subsequently enjoyed widespread use internationally. It is based on a symmetric-key algorithm that uses a 56-bit key. The algorithm was initially controversial with classified design elements, a relatively short key length, and suspicions about a National Security Agency (NSA) backdoor. DES consequently came under intense academic scrutiny which motivated the modern understanding of block ciphers and their cryptanalysis.<a href="#ftn.idm219021743088" class="footnote"><sup class="footnote" id="idm219021743088">[44]</sup></a>
-			</div><div class="section" id="idm218999343744"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title" id="idm218999343744">A.1.2.1. DES Uses</h4></div></div></div><div class="para">
-				</div></div><div class="section" id="idm219014563472"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title" id="idm219014563472">A.1.2.2. DES History</h4></div></div></div><div class="para">
-					DES is now considered to be insecure for many applications. This is chiefly due to the 56-bit key size being too small; in January, 1999, distributed.net and the Electronic Frontier Foundation collaborated to publicly break a DES key in 22 hours and 15 minutes (see chronology). There are also some analytical results which demonstrate theoretical weaknesses in the cipher, although they are unfeasible to mount in practice. The algorithm is believed to be practically secure in the form of Triple DES, although there are theoretical attacks. In recent years, the cipher has been superseded by the Advanced Encryption Standard (AES).<a href="#ftn.idm219014561728" class="footnote"><sup class="footnote" id="idm219014561728">[45]</sup></a>
+					The Rijndael cipher was developed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen, and submitted by them to the AES selection process. Rijndael (pronounced [rɛindaːl]) is a portmanteau of the names of the two inventors.<a href="#ftn.idm219183955328" class="footnote"><sup class="footnote" id="idm219183955328">[42]</sup></a>
+				</div></div></div><div class="section" id="idm219181639600"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219181639600">A.1.2.  Data Encryption Standard - DES</h3></div></div></div><div class="para">
+				The Data Encryption Standard (DES) is a block cipher (a form of shared secret encryption) that was selected by the National Bureau of Standards as an official Federal Information Processing Standard (FIPS) for the United States in 1976 and which has subsequently enjoyed widespread use internationally. It is based on a symmetric-key algorithm that uses a 56-bit key. The algorithm was initially controversial with classified design elements, a relatively short key length, and suspicions about a National Security Agency (NSA) backdoor. DES consequently came under intense academic scrutiny which motivated the modern understanding of block ciphers and their cryptanalysis.<a href="#ftn.idm219184559360" class="footnote"><sup class="footnote" id="idm219184559360">[43]</sup></a>
+			</div><div class="section" id="idm219192487408"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title" id="idm219192487408">A.1.2.1. DES Uses</h4></div></div></div><div class="para">
+				</div></div><div class="section" id="idm219192485968"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title" id="idm219192485968">A.1.2.2. DES History</h4></div></div></div><div class="para">
+					DES is now considered to be insecure for many applications. This is chiefly due to the 56-bit key size being too small; in January, 1999, distributed.net and the Electronic Frontier Foundation collaborated to publicly break a DES key in 22 hours and 15 minutes (see chronology). There are also some analytical results which demonstrate theoretical weaknesses in the cipher, although they are unfeasible to mount in practice. The algorithm is believed to be practically secure in the form of Triple DES, although there are theoretical attacks. In recent years, the cipher has been superseded by the Advanced Encryption Standard (AES).<a href="#ftn.idm219181927408" class="footnote"><sup class="footnote" id="idm219181927408">[44]</sup></a>
 				</div><div class="para">
-					In some documentation, a distinction is made between DES as a standard and DES the algorithm which is referred to as the DEA (the Data Encryption Algorithm). When spoken, "DES" is either spelled out as an abbreviation (/ˌdiːˌiːˈɛs/), or pronounced as a one-syllable acronym (/ˈdɛz/).<a href="#ftn.idm219033697024" class="footnote"><sup class="footnote" id="idm219033697024">[46]</sup></a>
-				</div></div></div></div><div class="footnotes"><br /><hr /><div id="ftn.idm219014862800" class="footnote"><div class="para"><a href="#idm219014862800" class="para"><sup class="para">[41] </sup></a>
+					In some documentation, a distinction is made between DES as a standard and DES the algorithm which is referred to as the DEA (the Data Encryption Algorithm). When spoken, "DES" is either spelled out as an abbreviation (/ˌdiːˌiːˈɛs/), or pronounced as a one-syllable acronym (/ˈdɛz/).<a href="#ftn.idm219192484880" class="footnote"><sup class="footnote" id="idm219192484880">[45]</sup></a>
+				</div></div></div></div><div class="footnotes"><br /><hr /><div id="ftn.idm219202450208" class="footnote"><div class="para"><a href="#idm219202450208" class="para"><sup class="para">[40] </sup></a>
 					"Advanced Encryption Standard." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Advanced_Encryption_Standard">http://en.wikipedia.org/wiki/Advanced_Encryption_Standard</a>
-				</div></div><div id="ftn.idm219013540928" class="footnote"><div class="para"><a href="#idm219013540928" class="para"><sup class="para">[42] </sup></a>
+				</div></div><div id="ftn.idm219217087520" class="footnote"><div class="para"><a href="#idm219217087520" class="para"><sup class="para">[41] </sup></a>
 						"Advanced Encryption Standard." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Advanced_Encryption_Standard">http://en.wikipedia.org/wiki/Advanced_Encryption_Standard</a>
-					</div></div><div id="ftn.idm219027207920" class="footnote"><div class="para"><a href="#idm219027207920" class="para"><sup class="para">[43] </sup></a>
+					</div></div><div id="ftn.idm219183955328" class="footnote"><div class="para"><a href="#idm219183955328" class="para"><sup class="para">[42] </sup></a>
 						"Advanced Encryption Standard." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Advanced_Encryption_Standard">http://en.wikipedia.org/wiki/Advanced_Encryption_Standard</a>
-					</div></div><div id="ftn.idm219021743088" class="footnote"><div class="para"><a href="#idm219021743088" class="para"><sup class="para">[44] </sup></a>
+					</div></div><div id="ftn.idm219184559360" class="footnote"><div class="para"><a href="#idm219184559360" class="para"><sup class="para">[43] </sup></a>
 					"Data Encryption Standard." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Data_Encryption_Standard">http://en.wikipedia.org/wiki/Data_Encryption_Standard</a>
-				</div></div><div id="ftn.idm219014561728" class="footnote"><div class="para"><a href="#idm219014561728" class="para"><sup class="para">[45] </sup></a>
+				</div></div><div id="ftn.idm219181927408" class="footnote"><div class="para"><a href="#idm219181927408" class="para"><sup class="para">[44] </sup></a>
 						"Data Encryption Standard." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Data_Encryption_Standard">http://en.wikipedia.org/wiki/Data_Encryption_Standard</a>
-					</div></div><div id="ftn.idm219033697024" class="footnote"><div class="para"><a href="#idm219033697024" class="para"><sup class="para">[46] </sup></a>
+					</div></div><div id="ftn.idm219192484880" class="footnote"><div class="para"><a href="#idm219192484880" class="para"><sup class="para">[45] </sup></a>
 						"Data Encryption Standard." <span class="emphasis"><em>Wikipedia.</em></span> 14 November 2009 <a href="http://en.wikipedia.org/wiki/Data_Encryption_Standard">http://en.wikipedia.org/wiki/Data_Encryption_Standard</a>
 					</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Managing_Confined_Services-Postfix-Configuration_Examples.html"><strong>Prev</strong>10.13.4. Configuration Examples</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="apas02.html"><strong>Next</strong>A.2. Public-key Encryption</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/chap-Security_Guide-General_Principles_of_Information_Security.html b/public_html/en-US/Fedora/19/html/Security_Guide/chap-Security_Guide-General_Principles_of_Information_Security.html
index 05bc22b..71eb869 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/chap-Security_Guide-General_Principles_of_Information_Security.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/chap-Security_Guide-General_Principles_of_Information_Security.html
@@ -6,7 +6,7 @@
               
               addID('Fedora.19.books');
 	      addID('Fedora.19.Security_Guide');
-              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html" title="4.2.5.7. About Public Key Encryption" /><link rel="next" href="chap-Security_Guide-Secure_Installation.html" title="Chapter 6. Secure Installation" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Usin
 g_GPG-About_Public_Key_Encryption.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Secure_Installation.html"><strong>Next</strong></a></li></ul><div xml:lang="en-US" class="chapter" id="chap-Security_Guide-General_Principles_of_Information_Security" lang="en-US"><div class="titlepage"><div><div><h1 class="title">Chapter 5. General Principles of Information Security</h1></div></div></div><div class="toc"><dl class="toc"><dt><span class="section"><a href="chap-Security_Guide-General_Principles_of_Information_Security.html#sect-Security_Guide-General_Principles_of_Information_Security-Tips_Guides_and_Tools">5.1. Tips, Guides, and Tools</a></span></dt></dl></div><div class="para">
+              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html" title="4.2.5.7. About Public Key Encryption" /><link rel="next" href="chap-Security_Guide-Secure_Installation.html" title="Chapter 6. Secure Installation" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Usin
 g_GPG-About_Public_Key_Encryption.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Secure_Installation.html"><strong>Next</strong></a></li></ul><div xml:lang="en-US" class="chapter" id="chap-Security_Guide-General_Principles_of_Information_Security" lang="en-US"><div class="titlepage"><div><div><h1 class="title">Chapter 5. General Principles of Information Security</h1></div></div></div><div class="para">
 		The following general principals provide an overview of good security practices:
 	</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 				encrypt all data transmitted over networks to help prevent man-in-the-middle attacks and eavesdropping. It is important to encrypt authentication information, such as passwords.
@@ -22,16 +22,4 @@
 				routinely review system and application logs. By default, security-relevant system logs are written to <code class="filename">/var/log/secure</code> and <code class="filename">/var/log/audit/audit.log</code>. Note: sending logs to a dedicated log server helps prevent attackers from easily modifying local logs to avoid detection.
 			</div></li><li class="listitem"><div class="para">
 				never log in as the root user unless absolutely necessary. It is recommended that administrators use <code class="command">sudo</code> to execute commands as root when required. Users capable of running <code class="command">sudo</code> are specified in <code class="filename">/etc/sudoers</code>. Use the <code class="command">visudo</code> utility to edit <code class="filename">/etc/sudoers</code>.
-			</div></li></ul></div><div class="section" id="sect-Security_Guide-General_Principles_of_Information_Security-Tips_Guides_and_Tools"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">5.1. Tips, Guides, and Tools</h2></div></div></div><div class="para">
-			The United States' <a href="http://www.nsa.gov/">National Security Agency (NSA)</a> provides hardening guides and tips for many different operating systems, to help government agencies, businesses, and individuals secure their systems against attack. The following guides (in PDF format) provide guidance for Red Hat Enterprise Linux 5:
-		</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
-					<a href="http://www.nsa.gov/ia/_files/os/redhat/rhel5-pamphlet-i731.pdf">Hardening Tips for the Red Hat Enterprise Linux 5</a>
-				</div></li><li class="listitem"><div class="para">
-					<a href="http://www.nsa.gov/ia/_files/os/redhat/rhel5-guide-i731.pdf">Guide to the Secure Configuration of Red Hat Enterprise Linux 5</a>
-				</div></li></ul></div><div class="para">
-			The <a href="http://www.disa.mil/">Defense Information Systems Agency (DISA)</a> provides documentation, checklists, and tests to help secure your system (<a href="http://iase.disa.mil/index2.html">Information Assurance Support Environment</a>). The <a href="http://iase.disa.mil/stigs/stig/unix-stig-v5r1.pdf">UNIX Security Technical Implementation Guide</a> (PDF) is a very specific guide to UNIX security - an advanced knowledge of UNIX and Linux is recommended before reading this guide.
-		</div><div class="para">
-			The DISA <a href="http://iase.disa.mil/stigs/downloads/zip/unclassified_unix_checklist_v5r1-26_20100827.zip">UNIX Security Checklist Version 5, Release 1.26</a> provides a collection of documents and checklists, ranging from the correct ownerships and modes for system files, to patch control.
-		</div><div class="para">
-			Also, DISA has made available <a href="http://iase.disa.mil/stigs/SRR/unix.html">UNIX SRR scripts</a> that allow administrators to check specific settings on systems. These scripts provide XML-formatted reports listing any known vulnerable settings.
-		</div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html"><strong>Prev</strong>4.2.5.7. About Public Key Encryption</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Secure_Installation.html"><strong>Next</strong>Chapter 6. Secure Installation</a></li></ul></body></html>
\ No newline at end of file
+			</div></li></ul></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Encryption-Using_GPG-About_Public_Key_Encryption.html"><strong>Prev</strong>4.2.5.7. About Public Key Encryption</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Secure_Installation.html"><strong>Next</strong>Chapter 6. Secure Installation</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/chap-Security_Guide-Securing_Your_Network.html b/public_html/en-US/Fedora/19/html/Security_Guide/chap-Security_Guide-Securing_Your_Network.html
index ab98064..960cc45 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/chap-Security_Guide-Securing_Your_Network.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/chap-Security_Guide-Securing_Your_Network.html
@@ -6,7 +6,7 @@
               
               addID('Fedora.19.books');
 	      addID('Fedora.19.Security_Guide');
-              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="sect-Security_Guide-Basic_Hardening-NTP.html" title="2.8. NTP" /><link rel="next" href="sect-Security_Guide-Server_Security.html" title="3.2. Server Security" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Hardening-NTP.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="
 n" href="sect-Security_Guide-Server_Security.html"><strong>Next</strong></a></li></ul><div xml:lang="en-US" class="chapter" id="chap-Security_Guide-Securing_Your_Network" lang="en-US"><div class="titlepage"><div><div><h1 class="title">Chapter 3. Securing Your Network</h1></div></div></div><div class="toc"><dl class="toc"><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security">3.1. Workstation Security</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Evaluating_Workstation_Security">3.1.1. Evaluating Workstation Security</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-BIOS_and_Boot_Loader_Security">3.1.2. BIOS and Boot Loader Security</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Networ
 k.html#sect-Security_Guide-Workstation_Security-Password_Security">3.1.3. Password Security</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Administrative_Controls">3.1.4. Administrative Controls</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Available_Network_Services">3.1.5. Available Network Services</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Personal_Firewalls">3.1.6. Personal Firewalls</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Security_Enhanced_Communication_Tools">3.1.7. Security Enhanced Communication Tools</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Server_Security.h
 tml">3.2. Server Security</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Server_Security.html#sect-Security_Guide-Server_Security-Securing_Services_With_TCP_Wrappers_and_xinetd">3.2.1. Securing Services With TCP Wrappers and xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_Portmap.html">3.2.2. Securing Portmap</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_NIS.html">3.2.3. Securing NIS</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_NFS.html">3.2.4. Securing NFS</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html">3.2.5. Securing the Apache HTTP Server</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_FTP.html">3.2.6. Securing FTP</a></span></dt><dt><span class="section"><a href="sect-
 Security_Guide-Server_Security-Securing_Sendmail.html">3.2.7. Securing Sendmail</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html">3.2.8. Verifying Which Ports Are Listening</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO.html">3.3. Single Sign-on (SSO)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO.html#sect-Security_Guide-Single_Sign_on_SSO-Introduction">3.3.1. Introduction</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html">3.3.2. Getting Started with your new Smart Card</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html">3.3.3. How Smart Card Enrollment Works</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_
 on_SSO-How_Smart_Card_Login_Works.html">3.3.4. How Smart Card Login Works</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html">3.3.5. Configuring Firefox to use Kerberos for SSO</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Multifactor_Authentication.html">3.4. Multifactor Authentication Solutions</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Multifactor_Authentication.html#sect-Security_Guide-Multifactor_Authentication-Yubikey">3.4.1. Yubikey</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html">3.5. Pluggable Authentication Modules (PAM)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Advantages_of_PAM">3.5.1. Advantages of PAM</
 a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html">3.5.2. PAM Configuration Files</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html">3.5.3. PAM Configuration File Format</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html">3.5.4. Sample PAM Configuration Files</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html">3.5.5. Creating PAM Modules</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html">3.5.6. PAM and Administrative Credential Caching</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication
 _Modules_PAM-PAM_and_Device_Ownership.html">3.5.7. PAM and Device Ownership</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html">3.5.8. Additional Resources</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html">3.6. TCP Wrappers and xinetd</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers">3.6.1. TCP Wrappers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html">3.6.2. TCP Wrappers Configuration Files</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html">3.6.3. xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html">3.6.4.
  xinetd Configuration Files</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html">3.6.5. Additional Resources</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Kerberos.html">3.7. Kerberos</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Kerberos.html#sect-Security_Guide-Kerberos-What_is_Kerberos">3.7.1. What is Kerberos?</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html">3.7.2. Kerberos Terminology</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html">3.7.3. How Kerberos Works</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html">3.7.4. Kerberos and PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html">3.7.5. Configuring a Kerberos 5 
 Server</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html">3.7.6. Configuring a Kerberos 5 Client</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html">3.7.7. Domain-to-Realm Mapping</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html">3.7.8. Setting Up Secondary KDCs</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html">3.7.9. Setting Up Cross Realm Authentication</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Additional_Resources.html">3.7.10. Additional Resources</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Using_Firewalls.html">3.8. Using Firewalls</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Using_Firewalls.html#sec-Introduction_
 to_firewalld">3.8.1. Introduction to firewalld</a></span></dt><dt><span class="section"><a href="sec-Understanding_firewalld.html">3.8.2. Understanding firewalld</a></span></dt><dt><span class="section"><a href="sec-Comparison_of_Firewalld_to_system-config-firewall.html">3.8.3. Comparison of Firewalld to system-config-firewall and iptables</a></span></dt><dt><span class="section"><a href="sec-Understanding_Network_Zones.html">3.8.4. Understanding Network Zones</a></span></dt><dt><span class="section"><a href="sec-Choosing_a_Network_Zone.html">3.8.5. Choosing a Network Zone</a></span></dt><dt><span class="section"><a href="sec-Understanding_Predefined_Services.html">3.8.6. Understanding Predefined Services</a></span></dt><dt><span class="section"><a href="sec-Understanding_the_direct_interface.html">3.8.7. Understanding The Direct Interface</a></span></dt><dt><span class="section"><a href="sec-Check_if_firewalld_is_installed.html">3.8.8. Check if firewalld is installed</a></s
 pan></dt><dt><span class="section"><a href="sec-Disabling_firewalld.html">3.8.9. Disabling firewalld</a></span></dt><dt><span class="section"><a href="sec-Start_firewalld.html">3.8.10. Start firewalld</a></span></dt><dt><span class="section"><a href="sec-Check_if_firewalld_is_running.html">3.8.11. Check if firewalld is running</a></span></dt><dt><span class="section"><a href="sec-Installing_firewalld.html">3.8.12. Installing firewalld</a></span></dt><dt><span class="section"><a href="sec-Configuring_the_Firewall.html">3.8.13. Configuring the Firewall</a></span></dt><dt><span class="section"><a href="sec-firewalld-additional_resources.html">3.8.14. Additional Resources</a></span></dt></dl></dd></dl></div><div xml:lang="en-US" class="section" id="sect-Security_Guide-Workstation_Security" lang="en-US"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.1. Workstation Security</h2></div></div></div><div class="para">
+              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="sect-Security_Guide-Basic_Hardening-NTP.html" title="2.7. NTP" /><link rel="next" href="sect-Security_Guide-Server_Security.html" title="3.2. Server Security" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Hardening-NTP.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="
 n" href="sect-Security_Guide-Server_Security.html"><strong>Next</strong></a></li></ul><div xml:lang="en-US" class="chapter" id="chap-Security_Guide-Securing_Your_Network" lang="en-US"><div class="titlepage"><div><div><h1 class="title">Chapter 3. Securing Your Network</h1></div></div></div><div class="toc"><dl class="toc"><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security">3.1. Workstation Security</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Evaluating_Workstation_Security">3.1.1. Evaluating Workstation Security</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-BIOS_and_Boot_Loader_Security">3.1.2. BIOS and Boot Loader Security</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Networ
 k.html#sect-Security_Guide-Workstation_Security-Password_Security">3.1.3. Password Security</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Administrative_Controls">3.1.4. Administrative Controls</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Available_Network_Services">3.1.5. Available Network Services</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Personal_Firewalls">3.1.6. Personal Firewalls</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Security_Enhanced_Communication_Tools">3.1.7. Security Enhanced Communication Tools</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Server_Security.h
 tml">3.2. Server Security</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Server_Security.html#sect-Security_Guide-Server_Security-Securing_Services_With_TCP_Wrappers_and_xinetd">3.2.1. Securing Services With TCP Wrappers and xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_Portmap.html">3.2.2. Securing Portmap</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_NIS.html">3.2.3. Securing NIS</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_NFS.html">3.2.4. Securing NFS</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html">3.2.5. Securing the Apache HTTP Server</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_FTP.html">3.2.6. Securing FTP</a></span></dt><dt><span class="section"><a href="sect-
 Security_Guide-Server_Security-Securing_Sendmail.html">3.2.7. Securing Sendmail</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html">3.2.8. Verifying Which Ports Are Listening</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO.html">3.3. Single Sign-on (SSO)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO.html#sect-Security_Guide-Single_Sign_on_SSO-Introduction">3.3.1. Introduction</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html">3.3.2. Getting Started with your new Smart Card</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html">3.3.3. How Smart Card Enrollment Works</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_
 on_SSO-How_Smart_Card_Login_Works.html">3.3.4. How Smart Card Login Works</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html">3.3.5. Configuring Firefox to use Kerberos for SSO</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Multifactor_Authentication.html">3.4. Multifactor Authentication Solutions</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Multifactor_Authentication.html#sect-Security_Guide-Multifactor_Authentication-Yubikey">3.4.1. Yubikey</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html">3.5. Pluggable Authentication Modules (PAM)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Advantages_of_PAM">3.5.1. Advantages of PAM</
 a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html">3.5.2. PAM Configuration Files</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html">3.5.3. PAM Configuration File Format</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html">3.5.4. Sample PAM Configuration Files</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html">3.5.5. Creating PAM Modules</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html">3.5.6. PAM and Administrative Credential Caching</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication
 _Modules_PAM-PAM_and_Device_Ownership.html">3.5.7. PAM and Device Ownership</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html">3.5.8. Additional Resources</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html">3.6. TCP Wrappers and xinetd</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers">3.6.1. TCP Wrappers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html">3.6.2. TCP Wrappers Configuration Files</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html">3.6.3. xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html">3.6.4.
  xinetd Configuration Files</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html">3.6.5. Additional Resources</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Kerberos.html">3.7. Kerberos</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Kerberos.html#sect-Security_Guide-Kerberos-What_is_Kerberos">3.7.1. What is Kerberos?</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html">3.7.2. Kerberos Terminology</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html">3.7.3. How Kerberos Works</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html">3.7.4. Kerberos and PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html">3.7.5. Configuring a Kerberos 5 
 Server</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html">3.7.6. Configuring a Kerberos 5 Client</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html">3.7.7. Domain-to-Realm Mapping</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html">3.7.8. Setting Up Secondary KDCs</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html">3.7.9. Setting Up Cross Realm Authentication</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Additional_Resources.html">3.7.10. Additional Resources</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Using_Firewalls.html">3.8. Using Firewalls</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Using_Firewalls.html#sec-Introduction_
 to_firewalld">3.8.1. Introduction to firewalld</a></span></dt><dt><span class="section"><a href="sec-Understanding_firewalld.html">3.8.2. Understanding firewalld</a></span></dt><dt><span class="section"><a href="sec-Comparison_of_Firewalld_to_system-config-firewall.html">3.8.3. Comparison of Firewalld to system-config-firewall and iptables</a></span></dt><dt><span class="section"><a href="sec-Understanding_Network_Zones.html">3.8.4. Understanding Network Zones</a></span></dt><dt><span class="section"><a href="sec-Choosing_a_Network_Zone.html">3.8.5. Choosing a Network Zone</a></span></dt><dt><span class="section"><a href="sec-Understanding_Predefined_Services.html">3.8.6. Understanding Predefined Services</a></span></dt><dt><span class="section"><a href="sec-Understanding_the_direct_interface.html">3.8.7. Understanding The Direct Interface</a></span></dt><dt><span class="section"><a href="sec-Check_if_firewalld_is_installed.html">3.8.8. Check if firewalld is installed</a></s
 pan></dt><dt><span class="section"><a href="sec-Disabling_firewalld.html">3.8.9. Disabling firewalld</a></span></dt><dt><span class="section"><a href="sec-Start_firewalld.html">3.8.10. Start firewalld</a></span></dt><dt><span class="section"><a href="sec-Check_if_firewalld_is_running.html">3.8.11. Check if firewalld is running</a></span></dt><dt><span class="section"><a href="sec-Installing_firewalld.html">3.8.12. Installing firewalld</a></span></dt><dt><span class="section"><a href="sec-Configuring_the_Firewall.html">3.8.13. Configuring the Firewall</a></span></dt><dt><span class="section"><a href="sec-firewalld-additional_resources.html">3.8.14. Additional Resources</a></span></dt></dl></dd></dl></div><div xml:lang="en-US" class="section" id="sect-Security_Guide-Workstation_Security" lang="en-US"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">3.1. Workstation Security</h2></div></div></div><div class="para">
 		Securing a Linux environment begins with the workstation. Whether locking down a personal machine or securing an enterprise system, sound security policy begins with the individual computer. A computer network is only as secure as its weakest node.
 	</div><div class="section" id="sect-Security_Guide-Workstation_Security-Evaluating_Workstation_Security"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.1.1. Evaluating Workstation Security</h3></div></div></div><div class="para">
 			When evaluating the security of a Fedora workstation, consider the following:
@@ -27,7 +27,7 @@
 		</div><div class="para">
 			For example, if a machine is used in a secure location where only trusted people have access and the computer contains no sensitive information, then it may not be critical to prevent such attacks. However, if an employee's laptop with private, unencrypted SSH keys for the corporate network is left unattended at a trade show, it could lead to a major security breach with ramifications for the entire company.
 		</div><div class="section" id="sect-Security_Guide-BIOS_and_Boot_Loader_Security-BIOS_Passwords"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">3.1.2.1. BIOS Passwords</h4></div></div></div><div class="para">
-				The two primary reasons for password protecting the BIOS of a computer are<a href="#ftn.idm219009208272" class="footnote"><sup class="footnote" id="idm219009208272">[11]</sup></a>:
+				The two primary reasons for password protecting the BIOS of a computer are<a href="#ftn.idm219193274528" class="footnote"><sup class="footnote" id="idm219193274528">[11]</sup></a>:
 			</div><div class="orderedlist"><ol><li class="listitem"><div class="para">
 						<span class="emphasis"><em>Preventing Changes to BIOS Settings</em></span> — If an intruder has access to the BIOS, they can set it to boot from a diskette or CD-ROM. This makes it possible for them to enter rescue mode or single user mode, which in turn allows them to start arbitrary processes on the system or copy sensitive data.
 					</div></li><li class="listitem"><div class="para">
@@ -49,30 +49,12 @@
 					</div></li><li class="listitem"><div class="para">
 						<span class="emphasis"><em>Preventing Access to Insecure Operating Systems</em></span> — If it is a dual-boot system, an attacker can select an operating system at boot time (for example, DOS), which ignores access controls and file permissions.
 					</div></li></ol></div><div class="para">
-				Fedora ships with the GRUB boot loader on the x86 platform. For a detailed look at GRUB, refer to the Red Hat Installation Guide.
+				Fedora ships with the GRUB boot loader on the x86 platform. For a detailed look at GRUB, refer to the Fedora Installation Guide.
 			</div><div class="section" id="sect-Security_Guide-Boot_Loader_Passwords-Password_Protecting_GRUB"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">3.1.2.2.1. Password Protecting GRUB</h5></div></div></div><div class="para">
-					You can configure GRUB to address the first two issues listed in <a class="xref" href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-BIOS_and_Boot_Loader_Security-Boot_Loader_Passwords">Section 3.1.2.2, “Boot Loader Passwords”</a> by adding a password directive to its configuration file. To do this, first choose a strong password, open a shell, log in as root, and then type the following command:
-				</div><pre class="screen"><code class="command">/sbin/grub-md5-crypt</code></pre><div class="para">
-					When prompted, type the GRUB password and press <span class="keycap"><strong>Enter</strong></span>. This returns an MD5 hash of the password.
-				</div><div class="para">
-					Next, edit the GRUB configuration file <code class="filename">/boot/grub/grub.conf</code>. Open the file and below the <code class="command">timeout</code> line in the main section of the document, add the following line:
-				</div><pre class="screen"><code class="command">password --md5 <em class="replaceable"><code>&lt;password-hash&gt;</code></em></code></pre><div class="para">
-					Replace <em class="replaceable"><code>&lt;password-hash&gt;</code></em> with the value returned by <code class="command">/sbin/grub-md5-crypt</code><a href="#ftn.idm218999353232" class="footnote"><sup class="footnote" id="idm218999353232">[12]</sup></a>.
+					You can configure GRUB to address the first two issues listed in <a class="xref" href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-BIOS_and_Boot_Loader_Security-Boot_Loader_Passwords">Section 3.1.2.2, “Boot Loader Passwords”</a> by adding a password directive to its configuration file. 
 				</div><div class="para">
 					The next time the system boots, the GRUB menu prevents access to the editor or command interface without first pressing <span class="keycap"><strong>p</strong></span> followed by the GRUB password.
-				</div><div class="para">
-					Unfortunately, this solution does not prevent an attacker from booting into an insecure operating system in a dual-boot environment. For this, a different part of the <code class="filename">/boot/grub/grub.conf</code> file must be edited.
-				</div><div class="para">
-					Look for the <code class="computeroutput">title</code> line of the operating system that you want to secure, and add a line with the <code class="command">lock</code> directive immediately beneath it.
-				</div><div class="para">
-					For a DOS system, the stanza should begin similar to the following:
-				</div><pre class="screen"><code class="computeroutput">title DOS lock</code></pre><div class="warning"><div class="admonition_header"><h2>Warning</h2></div><div class="admonition"><div class="para">
-						A <code class="computeroutput">password</code> line must be present in the main section of the <code class="filename">/boot/grub/grub.conf</code> file for this method to work properly. Otherwise, an attacker can access the GRUB editor interface and remove the lock line.
-					</div></div></div><div class="para">
-					To create a different password for a particular kernel or operating system, add a <code class="command">lock</code> line to the stanza, followed by a password line.
-				</div><div class="para">
-					Each stanza protected with a unique password should begin with lines similar to the following example:
-				</div><pre class="screen"><code class="computeroutput">title DOS lock password --md5 <em class="replaceable"><code>&lt;password-hash&gt;</code></em></code></pre></div></div></div><div class="section" id="sect-Security_Guide-Workstation_Security-Password_Security"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.1.3. Password Security</h3></div></div></div><div class="para">
+				</div></div></div></div><div class="section" id="sect-Security_Guide-Workstation_Security-Password_Security"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.1.3. Password Security</h3></div></div></div><div class="para">
 			Passwords are the primary method that Fedora uses to verify a user's identity. This is why password security is so important for protection of the user, the workstation, and the network.
 		</div><div class="para">
 			For security purposes, the installation program configures the system to use <em class="firstterm">Message-Digest Algorithm</em> (<span class="emphasis"><em>MD5</em></span>) and shadow passwords. It is highly recommended that you do not alter these settings.
@@ -89,7 +71,7 @@
 		</div><div class="section" id="sect-Security_Guide-Password_Security-Creating_Strong_Passwords"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">3.1.3.1. Creating Strong Passwords</h4></div></div></div><div class="para">
 				When creating a secure password, it is a good idea to follow these guidelines:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
-						<span class="emphasis"><em>Do Not Use Only Words or Numbers</em></span> — Never use only numbers or words in a password.
+						<span class="emphasis"><em>Do Not Use Only Letters or Numbers</em></span> — Using only letters or numbers does not make for a complex password.
 					</div><div class="para">
 						Some insecure examples include the following:
 					</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
@@ -137,7 +119,7 @@
 							</div></li><li class="listitem"><div class="para">
 								The names of family members
 							</div></li><li class="listitem"><div class="para">
-								Any birth dates
+								Any birth or anniversary dates
 							</div></li><li class="listitem"><div class="para">
 								Your phone number or zip code
 							</div></li></ul></div></li><li class="listitem"><div class="para">
@@ -157,15 +139,17 @@
 					</div></li></ul></div><div class="para">
 				The following guidelines will help you to create a strong password:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
-						<span class="emphasis"><em>Make the Password at Least Eight Characters Long</em></span> — The longer the password, the better. If using MD5 passwords, it should be 15 characters or longer. With DES passwords, use the maximum length (eight characters).
+						<span class="emphasis"><em>Make the Password at Least Twelve Characters Long</em></span> — The longer the password, the better. If using MD5 passwords, it should be 15 characters or longer.
 					</div></li><li class="listitem"><div class="para">
-						<span class="emphasis"><em>Mix Upper and Lower Case Letters</em></span> — Fedora is case sensitive, so mix cases to enhance the strength of the password.
+						<span class="emphasis"><em>Mix Upper and Lower Case Letters</em></span> — Fedora uses case sensitive passwords, so mix cases to enhance the strength of the password.
 					</div></li><li class="listitem"><div class="para">
 						<span class="emphasis"><em>Mix Letters and Numbers</em></span> — Adding numbers to passwords, especially when added to the middle (not just at the beginning or the end), can enhance password strength.
 					</div></li><li class="listitem"><div class="para">
 						<span class="emphasis"><em>Include Non-Alphanumeric Characters</em></span> — Special characters such as &amp;, $, and &gt; can greatly improve the strength of a password (this is not possible if using DES passwords).
 					</div></li><li class="listitem"><div class="para">
 						<span class="emphasis"><em>Pick a Password You Can Remember</em></span> — The best password in the world does little good if you cannot remember it; use acronyms or other mnemonic devices to aid in memorizing passwords.
+					</div></li><li class="listitem"><div class="para">
+						<span class="emphasis"><em>Use a Password Generator</em></span> — Using a random password generator, along with secure password storage software, can make it very difficult for an attacker to discover your password.
 					</div></li></ul></div><div class="para">
 				With all these rules, it may seem difficult to create a password that meets all of the criteria for good passwords while avoiding the traits of a bad one. Fortunately, there are some steps you can take to generate an easily-remembered, secure password.
 			</div><div class="section" id="sect-Security_Guide-Creating_Strong_Passwords-Secure_Password_Creation_Methodology"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">3.1.3.1.1. Secure Password Creation Methodology</h5></div></div></div><div class="para">
@@ -310,14 +294,14 @@ Account Expiration Date (YYYY-MM-DD) [1969-12-31]:
 							</td></tr><tr><td class="">
 								Use PAM to limit root access to services.
 							</td><td class="">
-								Edit the file for the target service in the <code class="filename">/etc/pam.d/</code> directory. Make sure the <code class="filename">pam_listfile.so</code> is required for authentication.<a href="#ftn.idm219002080160" class="footnote"><sup class="footnote" id="idm219002080160">[a]</sup></a>
+								Edit the file for the target service in the <code class="filename">/etc/pam.d/</code> directory. Make sure the <code class="filename">pam_listfile.so</code> is required for authentication.<a href="#ftn.idm219170299392" class="footnote"><sup class="footnote" id="idm219170299392">[a]</sup></a>
 							</td><td class="">
 								<table border="0" summary="Simple list" class="simplelist"><tr><td> Prevents root access to network services that are PAM aware. </td></tr><tr><td> The following services are prevented from accessing the root account: </td></tr><tr><td> · FTP clients </td></tr><tr><td> · Email clients </td></tr><tr><td> · <code class="command">login</code></td></tr><tr><td> · <code class="command">gdm</code></td></tr><tr><td> · <code class="command">kdm</code></td></tr><tr><td> · <code class="command">xdm</code></td></tr><tr><td> · <code class="command">ssh</code></td></tr><tr><td> · <code class="command">scp</code></td></tr><tr><td> · <code class="command">sftp</code></td></tr><tr><td> · Any PAM aware services </td></tr></table>
 
 							</td><td class="">
 								<table border="0" summary="Simple list" class="simplelist"><tr><td> Programs and services that are not PAM aware. </td></tr></table>
 
-							</td></tr></tbody><tbody class="footnotes"><tr><td colspan="4"><div id="ftn.idm219002080160" class="footnote"><div class="para"><a href="#idm219002080160" class="para"><sup class="para">[a] </sup></a>
+							</td></tr></tbody><tbody class="footnotes"><tr><td colspan="4"><div id="ftn.idm219170299392" class="footnote"><div class="para"><a href="#idm219170299392" class="para"><sup class="para">[a] </sup></a>
 									Refer to <a class="xref" href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Disallowing_Root_Access-Disabling_Root_Using_PAM">Section 3.1.4.2.4, “Disabling Root Using PAM”</a> for details.
 								</div></div></td></tr></tbody></table></div></div><br class="table-break" /><div class="section" id="sect-Security_Guide-Disallowing_Root_Access-Disabling_the_Root_Shell"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">3.1.4.2.1. Disabling the Root Shell</h5></div></div></div><div class="para">
 					To prevent users from logging in directly as root, the system administrator can set the root account's shell to <code class="command">/sbin/nologin</code> in the <code class="filename">/etc/passwd</code> file. This prevents access to the root account through commands that require a shell, such as the <code class="command">su</code> and the <code class="command">ssh</code> commands.
@@ -347,7 +331,7 @@ sense=deny file=/etc/vsftpd.ftpusers onerr=succeed</pre><div class="para">
 			</div><div class="section" id="sect-Security_Guide-Limiting_Root_Access-The_su_Command"><div class="titlepage"><div><div keep-together.within-column="always"><h5 class="title">3.1.4.3.1. The <code class="command">su</code> Command</h5></div></div></div><div class="para">
 					When a user executes the <code class="command">su</code> command, they are prompted for the root password and, after authentication, is given a root shell prompt.
 				</div><div class="para">
-					Once logged in via the <code class="command">su</code> command, the user <span class="emphasis"><em>is</em></span> the root user and has absolute administrative access to the system<a href="#ftn.idm219011978000" class="footnote"><sup class="footnote" id="idm219011978000">[13]</sup></a>. In addition, once a user has become root, it is possible for them to use the <code class="command">su</code> command to change to any other user on the system without being prompted for a password.
+					Once logged in via the <code class="command">su</code> command, the user <span class="emphasis"><em>is</em></span> the root user and has absolute administrative access to the system<a href="#ftn.idm219184794704" class="footnote"><sup class="footnote" id="idm219184794704">[12]</sup></a>. In addition, once a user has become root, it is possible for them to use the <code class="command">su</code> command to change to any other user on the system without being prompted for a password.
 				</div><div class="para">
 					Because this program is so powerful, administrators within an organization may wish to limit who has access to the command.
 				</div><div class="para">
@@ -516,10 +500,8 @@ sense=deny file=/etc/vsftpd.ftpusers onerr=succeed</pre><div class="para">
 				Although the <code class="command">sshd</code> service is inherently secure, the service <span class="emphasis"><em>must</em></span> be kept up-to-date to prevent security threats. Refer to <a class="xref" href="sect-Security_Guide-Security_Updates.html">Section 1.5, “Security Updates”</a> for more information.
 			</div></div></div><div class="para">
 			GPG is one way to ensure private email communication. It can be used both to email sensitive data over public networks and to protect sensitive data on hard drives.
-		</div></div></div><div class="footnotes"><br /><hr /><div id="ftn.idm219009208272" class="footnote"><div class="para"><a href="#idm219009208272" class="para"><sup class="para">[11] </sup></a>
+		</div></div></div><div class="footnotes"><br /><hr /><div id="ftn.idm219193274528" class="footnote"><div class="para"><a href="#idm219193274528" class="para"><sup class="para">[11] </sup></a>
 					Since system BIOSes differ between manufacturers, some may not support password protection of either type, while others may support one type but not the other.
-				</div></div><div id="ftn.idm218999353232" class="footnote"><div class="para"><a href="#idm218999353232" class="para"><sup class="para">[12] </sup></a>
-						GRUB also accepts unencrypted passwords, but it is recommended that an MD5 hash be used for added security.
-					</div></div><div id="ftn.idm219011978000" class="footnote"><div class="para"><a href="#idm219011978000" class="para"><sup class="para">[13] </sup></a>
+				</div></div><div id="ftn.idm219184794704" class="footnote"><div class="para"><a href="#idm219184794704" class="para"><sup class="para">[12] </sup></a>
 						This access is still subject to the restrictions imposed by SELinux, if it is enabled.
-					</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Hardening-NTP.html"><strong>Prev</strong>2.8. NTP</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security.html"><strong>Next</strong>3.2. Server Security</a></li></ul></body></html>
\ No newline at end of file
+					</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Hardening-NTP.html"><strong>Prev</strong>2.7. NTP</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Server_Security.html"><strong>Next</strong>3.2. Server Security</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/chap-Security_Guide-Security_Overview.html b/public_html/en-US/Fedora/19/html/Security_Guide/chap-Security_Guide-Security_Overview.html
index 8710459..75b7bbc 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/chap-Security_Guide-Security_Overview.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/chap-Security_Guide-Security_Overview.html
@@ -13,7 +13,7 @@
 	</div><div xml:lang="en-US" class="section" id="sect-Security_Guide-Introduction_to_Security" lang="en-US"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">1.1. Introduction to Security</h2></div></div></div><div class="section" id="sect-Security_Guide-Introduction_to_Security-What_is_Computer_Security"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.1.1. What is Computer Security?</h3></div></div></div><div class="para">
 			Computer security is a general term that covers a wide area of computing and information processing. Industries that depend on computer systems and networks to conduct daily business transactions and access crucial information regard their data as an important part of their overall assets. Several terms and metrics have entered our daily business vocabulary, such as total cost of ownership (TCO) and quality of service (QoS). Using these metrics, industries can calculate aspects such as data integrity and high-availability as part of their planning and process management costs. In some industries, such as electronic commerce, the availability and trustworthiness of data can be the difference between success and failure.
 		</div><div class="section" id="sect-Security_Guide-What_is_Computer_Security-How_did_Computer_Security_Come_about"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.1.1.1. How did Computer Security Come about?</h4></div></div></div><div class="para">
-				Information security has evolved over the years due to the increasing reliance on public networks not to disclose personal, financial, and other restricted information. There are numerous instances such as the Mitnick <a href="#ftn.idm219033313664" class="footnote"><sup class="footnote" id="idm219033313664">[1]</sup></a>and the Vladimir Levin <a href="#ftn.idm219033315536" class="footnote"><sup class="footnote" id="idm219033315536">[2]</sup></a>cases that prompted organizations across all industries to re-think the way they handle information, as well as its transmission and disclosure. The popularity of the Internet was one of the most important developments that prompted an intensified effort in data security.
+				Information security has evolved over the years due to the increasing reliance on public networks not to disclose personal, financial, and other restricted information. There are numerous instances such as the Mitnick <a href="#ftn.idm219185939392" class="footnote"><sup class="footnote" id="idm219185939392">[1]</sup></a>and the Vladimir Levin <a href="#ftn.idm219185941264" class="footnote"><sup class="footnote" id="idm219185941264">[2]</sup></a>cases that prompted organizations across all industries to re-think the way they handle information, as well as its transmission and disclosure. The popularity of the Internet was one of the most important developments that prompted an intensified effort in data security.
 			</div><div class="para">
 				An ever-growing number of people are using their personal computers to gain access to the resources that the Internet has to offer. From research and information retrieval to electronic mail and commerce transaction, the Internet has been regarded as one of the most important developments of the 20th century.
 			</div><div class="para">
@@ -21,19 +21,19 @@
 			</div></div><div class="section" id="sect-Security_Guide-What_is_Computer_Security-Security_Today"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.1.1.2. Security Today</h4></div></div></div><div class="para">
 				In February of 2000, a Distributed Denial of Service (DDoS) attack was unleashed on several of the most heavily-trafficked sites on the Internet. The attack rendered yahoo.com, cnn.com, amazon.com, fbi.gov, and several other sites completely unreachable to normal users, as it tied up routers for several hours with large-byte ICMP packet transfers, also called a <em class="firstterm">ping flood</em>. The attack was brought on by unknown assailants using specially created, widely available programs that scanned vulnerable network servers, installed client applications called <em class="firstterm">trojans</em> on the servers, and timed an attack with every infected server flooding the victim sites and rendering them unavailable. Many blame the attack on fundamental flaws in the way routers and the protocols used are structured to accept all incoming data, no matter where or for what purpose the packets are sent.
 			</div><div class="para">
-				In 2007, a data breach exploiting the widely-known weaknesses of the Wired Equivalent Privacy (WEP) wireless encryption protocol resulted in the theft from a global financial institution of over 45 million credit card numbers.<a href="#ftn.idm219033320240" class="footnote"><sup class="footnote" id="idm219033320240">[3]</sup></a>
+				In 2007, a data breach exploiting the widely-known weaknesses of the Wired Equivalent Privacy (WEP) wireless encryption protocol resulted in the theft from a global financial institution of over 45 million credit card numbers.<a href="#ftn.idm219185946048" class="footnote"><sup class="footnote" id="idm219185946048">[3]</sup></a>
 			</div><div class="para">
-				In a separate incident, the billing records of over 2.2 million patients stored on a backup tape were stolen from the front seat of a courier's car.<a href="#ftn.idm219033322144" class="footnote"><sup class="footnote" id="idm219033322144">[4]</sup></a>
+				In a separate incident, the billing records of over 2.2 million patients stored on a backup tape were stolen from the front seat of a courier's car.<a href="#ftn.idm219185948064" class="footnote"><sup class="footnote" id="idm219185948064">[4]</sup></a>
 			</div><div class="para">
-				Currently, an estimated 1.8 billion people use or have used the Internet worldwide.<a href="#ftn.idm219033323264" class="footnote"><sup class="footnote" id="idm219033323264">[5]</sup></a> At the same time:
+				Currently, an estimated 1.8 billion people use or have used the Internet worldwide.<a href="#ftn.idm219185949184" class="footnote"><sup class="footnote" id="idm219185949184">[5]</sup></a> At the same time:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
-						On any given day, there are approximately 225 major incidences of security breach reported to the CERT Coordination Center at Carnegie Mellon University.<a href="#ftn.idm219006527728" class="footnote"><sup class="footnote" id="idm219006527728">[6]</sup></a>
+						On any given day, there are approximately 225 major incidences of security breach reported to the CERT Coordination Center at Carnegie Mellon University.<a href="#ftn.idm219185950912" class="footnote"><sup class="footnote" id="idm219185950912">[6]</sup></a>
 					</div></li><li class="listitem"><div class="para">
-						In 2003, the number of CERT reported incidences jumped to 137,529 from 82,094 in 2002 and from 52,658 in 2001.<a href="#ftn.idm219006530272" class="footnote"><sup class="footnote" id="idm219006530272">[7]</sup></a>
+						In 2003, the number of CERT reported incidences jumped to 137,529 from 82,094 in 2002 and from 52,658 in 2001.<a href="#ftn.idm219193239440" class="footnote"><sup class="footnote" id="idm219193239440">[7]</sup></a>
 					</div></li><li class="listitem"><div class="para">
-						The worldwide economic impact of the three most dangerous Internet Viruses of the last three years was estimated at US$13.2 Billion.<a href="#ftn.idm219006532304" class="footnote"><sup class="footnote" id="idm219006532304">[8]</sup></a>
+						The worldwide economic impact of the three most dangerous Internet Viruses of the last three years was estimated at US$13.2 Billion.<a href="#ftn.idm219193241472" class="footnote"><sup class="footnote" id="idm219193241472">[8]</sup></a>
 					</div></li></ul></div><div class="para">
-				From a 2008 global survey of business and technology executives "The Global State of Information Security"<a href="#ftn.idm219006534400" class="footnote"><sup class="footnote" id="idm219006534400">[9]</sup></a>, undertaken by <span class="emphasis"><em>CIO Magazine</em></span>, some points are:
+				From a 2008 global survey of business and technology executives "The Global State of Information Security"<a href="#ftn.idm219193243568" class="footnote"><sup class="footnote" id="idm219193243568">[9]</sup></a>, undertaken by <span class="emphasis"><em>CIO Magazine</em></span>, some points are:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
 						Just 43% of respondents audit or monitor user compliance with security policies
 					</div></li><li class="listitem"><div class="para">
@@ -106,22 +106,22 @@
 						Personnel registration and accounting
 					</div></li></ul></div></div></div><div class="section" id="sect-Security_Guide-Introduction_to_Security-Conclusion"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">1.1.4. Conclusion</h3></div></div></div><div class="para">
 			Now that you have learned about the origins, reasons, and aspects of security, you will find it easier to determine the appropriate course of action with regard to Fedora. It is important to know what factors and conditions make up security in order to plan and implement a proper strategy. With this information in mind, the process can be formalized and the path becomes clearer as you delve deeper into the specifics of the security process.
-		</div></div></div><div class="footnotes"><br /><hr /><div id="ftn.idm219033313664" class="footnote"><div class="para"><a href="#idm219033313664" class="para"><sup class="para">[1] </sup></a>
+		</div></div></div><div class="footnotes"><br /><hr /><div id="ftn.idm219185939392" class="footnote"><div class="para"><a href="#idm219185939392" class="para"><sup class="para">[1] </sup></a>
 					http://law.jrank.org/pages/3791/Kevin-Mitnick-Case-1999.html
-				</div></div><div id="ftn.idm219033315536" class="footnote"><div class="para"><a href="#idm219033315536" class="para"><sup class="para">[2] </sup></a>
+				</div></div><div id="ftn.idm219185941264" class="footnote"><div class="para"><a href="#idm219185941264" class="para"><sup class="para">[2] </sup></a>
 					http://www.livinginternet.com/i/ia_hackers_levin.htm
-				</div></div><div id="ftn.idm219033320240" class="footnote"><div class="para"><a href="#idm219033320240" class="para"><sup class="para">[3] </sup></a>
+				</div></div><div id="ftn.idm219185946048" class="footnote"><div class="para"><a href="#idm219185946048" class="para"><sup class="para">[3] </sup></a>
 					http://www.theregister.co.uk/2007/05/04/txj_nonfeasance/
-				</div></div><div id="ftn.idm219033322144" class="footnote"><div class="para"><a href="#idm219033322144" class="para"><sup class="para">[4] </sup></a>
+				</div></div><div id="ftn.idm219185948064" class="footnote"><div class="para"><a href="#idm219185948064" class="para"><sup class="para">[4] </sup></a>
 					http://www.healthcareitnews.com/story.cms?id=9408
-				</div></div><div id="ftn.idm219033323264" class="footnote"><div class="para"><a href="#idm219033323264" class="para"><sup class="para">[5] </sup></a>
+				</div></div><div id="ftn.idm219185949184" class="footnote"><div class="para"><a href="#idm219185949184" class="para"><sup class="para">[5] </sup></a>
 					http://www.internetworldstats.com/stats.htm
-				</div></div><div id="ftn.idm219006527728" class="footnote"><div class="para"><a href="#idm219006527728" class="para"><sup class="para">[6] </sup></a>
+				</div></div><div id="ftn.idm219185950912" class="footnote"><div class="para"><a href="#idm219185950912" class="para"><sup class="para">[6] </sup></a>
 							http://www.cert.org
-						</div></div><div id="ftn.idm219006530272" class="footnote"><div class="para"><a href="#idm219006530272" class="para"><sup class="para">[7] </sup></a>
+						</div></div><div id="ftn.idm219193239440" class="footnote"><div class="para"><a href="#idm219193239440" class="para"><sup class="para">[7] </sup></a>
 							http://www.cert.org/stats/fullstats.html
-						</div></div><div id="ftn.idm219006532304" class="footnote"><div class="para"><a href="#idm219006532304" class="para"><sup class="para">[8] </sup></a>
+						</div></div><div id="ftn.idm219193241472" class="footnote"><div class="para"><a href="#idm219193241472" class="para"><sup class="para">[8] </sup></a>
 							http://www.newsfactor.com/perl/story/16407.html
-						</div></div><div id="ftn.idm219006534400" class="footnote"><div class="para"><a href="#idm219006534400" class="para"><sup class="para">[9] </sup></a>
+						</div></div><div id="ftn.idm219193243568" class="footnote"><div class="para"><a href="#idm219193243568" class="para"><sup class="para">[9] </sup></a>
 					http://www.csoonline.com/article/454939/The_Global_State_of_Information_Security_
 				</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="pr01s02.html"><strong>Prev</strong>2. We Need Feedback!</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Attackers_and_Vulnerabilities.html"><strong>Next</strong>1.2. Attackers and Vulnerabilities</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/index.html b/public_html/en-US/Fedora/19/html/Security_Guide/index.html
index a560abe..b05d053 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/index.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/index.html
@@ -6,10 +6,10 @@
               
               addID('Fedora.19.books');
 	      addID('Fedora.19.Security_Guide');
-              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="next" href="pref-Security_Guide-Preface.html" title="Preface" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"></li><li class="next"><a accesskey="n" href="pref-Security_Guide-Preface.html"><strong>Next</strong></a></li></ul><div xml:lang="en-US" class="book" id="idm219008152144" lang="en-US"><div class="titlepage"><div><div class="producttitle" font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold
 " font-size="12pt" text-align="center"><span class="productname">Fedora</span> <span class="productnumber">19</span></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h1 id="idm219008152144" class="title">Security Guide</h1></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h2 class="subtitle">A Guide to Securing Fedora Linux</h2></div><p class="edition">Edition 19.1</p><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h3 class="corpauthor">
+              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="next" href="pref-Security_Guide-Preface.html" title="Preface" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"></li><li class="next"><a accesskey="n" href="pref-Security_Guide-Preface.html"><strong>Next</strong></a></li></ul><div xml:lang="en-US" class="book" id="idm219174183136" lang="en-US"><div class="titlepage"><div><div class="producttitle" font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold
 " font-size="12pt" text-align="center"><span class="productname">Fedora</span> <span class="productnumber">19</span></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h1 id="idm219174183136" class="title">Security Guide</h1></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h2 class="subtitle">A Guide to Securing Fedora Linux</h2></div><p class="edition">Edition 19.1</p><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><h3 class="corpauthor">
 		<span class="inlinemediaobject"><object data="Common_Content/images/title_logo.svg" type="image/svg+xml"> Logo</object></span>
 
-	</h3></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div xml:lang="en-US" class="authorgroup" lang="en-US"><div class="author"><h3 class="author"><span class="firstname">Johnray</span> <span class="surname">Fuller</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:jrfuller at redhat.com">jrfuller at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">John</span> <span class="surname">Ha</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:jha at redhat.com">jha at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">David</span> <span class="surname">O'Brien</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:daobrien at redhat
 .com">daobrien at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Scott</span> <span class="surname">Radvan</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:sradvan at redhat.com">sradvan at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Eric</span> <span class="surname">Christensen</span></h3><div class="affiliation"><span class="orgname">Fedora Project</span> <span class="orgdiv">Documentation Team</span></div><code class="email"><a class="email" href="mailto:sparks at fedoraproject.org">sparks at fedoraproject.org</a></code></div><div class="author"><h3 class="author"><span class="firstname">Adam</span> <span class="surname">Ligas</span></h3><div class="affiliation"><span class="orgname">Fedora Project</span></div><code class="email"><a class="email" href="mailto:agent86 at fedoraproject.org">agent86 at fedoraproject.org</a></code>
 </div><div class="author"><h3 class="author"><span class="firstname">Murray</span> <span class="surname">McAllister</span></h3><div class="affiliation"><span class="orgname">Red Hat</span> <span class="orgdiv">Engineering Content Services</span></div><code class="email"><a class="email" href="mailto:mmcallis at redhat.com">mmcallis at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Scott</span> <span class="surname">Radvan</span></h3><div class="affiliation"><span class="orgname">Red Hat</span> <span class="orgdiv">Engineering Content Services</span></div><code class="email"><a class="email" href="mailto:sradvan at redhat.com">sradvan at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Daniel</span> <span class="surname">Walsh</span></h3><div class="affiliation"><span class="orgname">Red Hat</span> <span class="orgdiv">Security Engineering</span></div><code class="email"><a class="email" href="mailto:dwal
 sh at redhat.com">dwalsh at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Dominick</span> <span class="surname">Grift</span></h3><span class="contrib">Technical editor for the Introduction, SELinux Contexts, Targeted Policy, Working with SELinux, Confining Users, and Troubleshooting chapters.</span> <div class="affiliation"><span class="orgname"></span> <span class="orgdiv"></span></div><code class="email"><a class="email" href="mailto:domg472 at gmail.com">domg472 at gmail.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Eric</span> <span class="surname">Paris</span></h3><span class="contrib">Technical editor for the Mounting File Systems and Raw Audit Messages sections.</span> <div class="affiliation"><span class="orgname">Red Hat</span> <span class="orgdiv">Security Engineering</span></div><code class="email"><a class="email" href="mailto:eparis at parisplace.org">eparis at parisplace.org</a></code></div><div c
 lass="author"><h3 class="author"><span class="firstname">James</span> <span class="surname">Morris</span></h3><span class="contrib">Technical editor for the Introduction and Targeted Policy chapters.</span> <div class="affiliation"><span class="orgname">Red Hat</span> <span class="orgdiv">Security Engineering</span></div><code class="email"><a class="email" href="mailto:jmorris at redhat.com">jmorris at redhat.com</a></code></div></div></div><hr /><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div id="idm219018104496" class="legalnotice"><h1 class="legalnotice">Legal Notice</h1><div class="para">
+	</h3></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div xml:lang="en-US" class="authorgroup" lang="en-US"><div class="author"><h3 class="author"><span class="firstname">Johnray</span> <span class="surname">Fuller</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:jrfuller at redhat.com">jrfuller at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">John</span> <span class="surname">Ha</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:jha at redhat.com">jha at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">David</span> <span class="surname">O'Brien</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:daobrien at redhat
 .com">daobrien at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Scott</span> <span class="surname">Radvan</span></h3><div class="affiliation"><span class="orgname">Red Hat</span></div><code class="email"><a class="email" href="mailto:sradvan at redhat.com">sradvan at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Eric</span> <span class="surname">Christensen</span></h3><div class="affiliation"><span class="orgname">Fedora Project</span> <span class="orgdiv">Documentation Team</span></div><code class="email"><a class="email" href="mailto:sparks at fedoraproject.org">sparks at fedoraproject.org</a></code></div><div class="author"><h3 class="author"><span class="firstname">Adam</span> <span class="surname">Ligas</span></h3><div class="affiliation"><span class="orgname">Fedora Project</span></div><code class="email"><a class="email" href="mailto:agent86 at fedoraproject.org">agent86 at fedoraproject.org</a></code>
 </div><div class="author"><h3 class="author"><span class="firstname">Murray</span> <span class="surname">McAllister</span></h3><div class="affiliation"><span class="orgname">Red Hat</span> <span class="orgdiv">Engineering Content Services</span></div><code class="email"><a class="email" href="mailto:mmcallis at redhat.com">mmcallis at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Scott</span> <span class="surname">Radvan</span></h3><div class="affiliation"><span class="orgname">Red Hat</span> <span class="orgdiv">Engineering Content Services</span></div><code class="email"><a class="email" href="mailto:sradvan at redhat.com">sradvan at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Daniel</span> <span class="surname">Walsh</span></h3><div class="affiliation"><span class="orgname">Red Hat</span> <span class="orgdiv">Security Engineering</span></div><code class="email"><a class="email" href="mailto:dwal
 sh at redhat.com">dwalsh at redhat.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Dominick</span> <span class="surname">Grift</span></h3><span class="contrib">Technical editor for the Introduction, SELinux Contexts, Targeted Policy, Working with SELinux, Confining Users, and Troubleshooting chapters.</span> <div class="affiliation"><span class="orgname"></span> <span class="orgdiv"></span></div><code class="email"><a class="email" href="mailto:domg472 at gmail.com">domg472 at gmail.com</a></code></div><div class="author"><h3 class="author"><span class="firstname">Eric</span> <span class="surname">Paris</span></h3><span class="contrib">Technical editor for the Mounting File Systems and Raw Audit Messages sections.</span> <div class="affiliation"><span class="orgname">Red Hat</span> <span class="orgdiv">Security Engineering</span></div><code class="email"><a class="email" href="mailto:eparis at parisplace.org">eparis at parisplace.org</a></code></div><div c
 lass="author"><h3 class="author"><span class="firstname">James</span> <span class="surname">Morris</span></h3><span class="contrib">Technical editor for the Introduction and Targeted Policy chapters.</span> <div class="affiliation"><span class="orgname">Red Hat</span> <span class="orgdiv">Security Engineering</span></div><code class="email"><a class="email" href="mailto:jmorris at redhat.com">jmorris at redhat.com</a></code></div></div></div><hr /><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div id="idm219189615376" class="legalnotice"><h1 class="legalnotice">Legal Notice</h1><div class="para">
 		Copyright <span class="trademark"></span>© 2007-2013 Fedora Project Contributors.
 	</div><div class="para">
 		The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at <a href="http://creativecommons.org/licenses/by-sa/3.0/">http://creativecommons.org/licenses/by-sa/3.0/</a>. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version.
@@ -31,4 +31,4 @@
 		All other trademarks are the property of their respective owners.
 	</div></div></div><div font-family="sans-serif,Symbol,ZapfDingbats" font-weight="bold" font-size="12pt" text-align="center"><div class="abstract"><h6>Abstract</h6><div class="para">
 			The Fedora Security Guide is designed to assist users of Fedora in learning the processes and practices of securing workstations and servers against local and remote intrusion, exploitation, and malicious activity. Focused on Fedora Linux but detailing concepts and techniques valid for all Linux systems, the Fedora Security Guide details the planning and the tools involved in creating a secured computing environment for the data center, workplace, and home. With proper administrative knowledge, vigilance, and tools, systems running Linux can be both fully functional and secured from most common intrusion and exploit methods.
-		</div></div></div></div><hr /></div><div class="toc"><dl class="toc"><dt><span class="preface"><a href="pref-Security_Guide-Preface.html">Preface</a></span></dt><dd><dl><dt><span class="section"><a href="pref-Security_Guide-Preface.html#idm219016677328">1. Document Conventions</a></span></dt><dd><dl><dt><span class="section"><a href="pref-Security_Guide-Preface.html#idm219000609856">1.1. Typographic Conventions</a></span></dt><dt><span class="section"><a href="pref-Security_Guide-Preface.html#idm219007626176">1.2. Pull-quote Conventions</a></span></dt><dt><span class="section"><a href="pref-Security_Guide-Preface.html#idm219003565024">1.3. Notes and Warnings</a></span></dt></dl></dd><dt><span class="section"><a href="pr01s02.html">2. We Need Feedback!</a></span></dt></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Security_Overview.html">1. Security Overview</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html
 #sect-Security_Guide-Introduction_to_Security">1.1. Introduction to Security</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-What_is_Computer_Security">1.1.1. What is Computer Security?</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-SELinux">1.1.2. SELinux</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-Security_Controls">1.1.3. Security Controls</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-Conclusion">1.1.4. Conclusion</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities.html">1.2. Attackers and Vulnerabilities</a></span></dt><dd><dl><dt><span class="se
 ction"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities.html#sect-Security_Guide-Attackers_and_Vulnerabilities-A_Quick_History_of_Hackers">1.2.1. A Quick History of Hackers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html">1.2.2. Threats to Network Security</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html">1.2.3. Threats to Server Security</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html">1.2.4. Threats to Workstation and Home PC Security</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment.html">1.3. Vulnerability Assessment</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment.html#sect-Security_Guide-
 Vulnerability_Assessment-Thinking_Like_the_Enemy">1.3.1. Thinking Like the Enemy</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html">1.3.2. Defining Assessment and Testing</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html">1.3.3. Evaluating the Tools</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Common_Exploits_and_Attacks.html">1.4. Common Exploits and Attacks</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Security_Updates.html">1.5. Security Updates</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Security_Updates.html#sect-Security_Guide-Security_Updates-Updating_Packages">1.5.1. Updating Packages</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html">1.5.2. Verifying Signed
  Packages</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html">1.5.3. Installing Signed Packages</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html">1.5.4. Applying the Changes</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Basic_Hardening.html">2. Basic Hardening Guide</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Basic_Hardening.html#sect-Security_Guide-Basic_Hardening-General_Principles">2.1. General Principles</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-General_Principles-Why_is_this_important.html">2.2. Why is this important?</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-Physical_Security.html">2.3. Physical Security</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-B
 asic_Hardening-Physical_Security-Why_is_this_important.html">2.4. Why this is important</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-Networking.html">2.5. Networking</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-Networking.html#sect-Security_Guide-Basic_Hardening-Networking-iptables">2.5.1. iptables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-Networking-IPv6.html">2.5.2. IPv6</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-Up_to_date.html">2.6. Keeping software up to date</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-Services.html">2.7. Services</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-NTP.html">2.8. NTP</a></span></dt></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Securing_Your_Network.html">3. Se
 curing Your Network</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security">3.1. Workstation Security</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Evaluating_Workstation_Security">3.1.1. Evaluating Workstation Security</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-BIOS_and_Boot_Loader_Security">3.1.2. BIOS and Boot Loader Security</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Password_Security">3.1.3. Password Security</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Administrative_Controls">3.1.4. Administrative Contr
 ols</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Available_Network_Services">3.1.5. Available Network Services</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Personal_Firewalls">3.1.6. Personal Firewalls</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Security_Enhanced_Communication_Tools">3.1.7. Security Enhanced Communication Tools</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Server_Security.html">3.2. Server Security</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Server_Security.html#sect-Security_Guide-Server_Security-Securing_Services_With_TCP_Wrappers_and_xinetd">3.2.1. Securing Services With TCP Wrappers and xinetd</a></span></dt><dt>
 <span class="section"><a href="sect-Security_Guide-Server_Security-Securing_Portmap.html">3.2.2. Securing Portmap</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_NIS.html">3.2.3. Securing NIS</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_NFS.html">3.2.4. Securing NFS</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html">3.2.5. Securing the Apache HTTP Server</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_FTP.html">3.2.6. Securing FTP</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_Sendmail.html">3.2.7. Securing Sendmail</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html">3.2.8. Verifying Which Ports Are Listening</a></span></dt></dl></dd><dt><s
 pan class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO.html">3.3. Single Sign-on (SSO)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO.html#sect-Security_Guide-Single_Sign_on_SSO-Introduction">3.3.1. Introduction</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html">3.3.2. Getting Started with your new Smart Card</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html">3.3.3. How Smart Card Enrollment Works</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html">3.3.4. How Smart Card Login Works</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html">3.3.5. Configuring Firefox to use Kerberos for SSO</a></span></dt></d
 l></dd><dt><span class="section"><a href="sect-Security_Guide-Multifactor_Authentication.html">3.4. Multifactor Authentication Solutions</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Multifactor_Authentication.html#sect-Security_Guide-Multifactor_Authentication-Yubikey">3.4.1. Yubikey</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html">3.5. Pluggable Authentication Modules (PAM)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Advantages_of_PAM">3.5.1. Advantages of PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html">3.5.2. PAM Configuration Files</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Conf
 iguration_File_Format.html">3.5.3. PAM Configuration File Format</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Sample_PAM_Configuration_Files.html">3.5.4. Sample PAM Configuration Files</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html">3.5.5. Creating PAM Modules</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html">3.5.6. PAM and Administrative Credential Caching</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html">3.5.7. PAM and Device Ownership</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html">3.5.8. Additional Resources</a></span></dt></dl></dd><dt><span class="se
 ction"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html">3.6. TCP Wrappers and xinetd</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers">3.6.1. TCP Wrappers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html">3.6.2. TCP Wrappers Configuration Files</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html">3.6.3. xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html">3.6.4. xinetd Configuration Files</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html">3.6.5. Additional Resources</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Kerberos.html">3.7. Kerbe
 ros</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Kerberos.html#sect-Security_Guide-Kerberos-What_is_Kerberos">3.7.1. What is Kerberos?</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html">3.7.2. Kerberos Terminology</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html">3.7.3. How Kerberos Works</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html">3.7.4. Kerberos and PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html">3.7.5. Configuring a Kerberos 5 Server</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html">3.7.6. Configuring a Kerberos 5 Client</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html">3.7.7. Dom
 ain-to-Realm Mapping</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html">3.7.8. Setting Up Secondary KDCs</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html">3.7.9. Setting Up Cross Realm Authentication</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Additional_Resources.html">3.7.10. Additional Resources</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Using_Firewalls.html">3.8. Using Firewalls</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Using_Firewalls.html#sec-Introduction_to_firewalld">3.8.1. Introduction to firewalld</a></span></dt><dt><span class="section"><a href="sec-Understanding_firewalld.html">3.8.2. Understanding firewalld</a></span></dt><dt><span class="section"><a href="sec-Comparison_of_Firewalld_to_system-config-firewall.html">3.8.3. Com
 parison of Firewalld to system-config-firewall and iptables</a></span></dt><dt><span class="section"><a href="sec-Understanding_Network_Zones.html">3.8.4. Understanding Network Zones</a></span></dt><dt><span class="section"><a href="sec-Choosing_a_Network_Zone.html">3.8.5. Choosing a Network Zone</a></span></dt><dt><span class="section"><a href="sec-Understanding_Predefined_Services.html">3.8.6. Understanding Predefined Services</a></span></dt><dt><span class="section"><a href="sec-Understanding_the_direct_interface.html">3.8.7. Understanding The Direct Interface</a></span></dt><dt><span class="section"><a href="sec-Check_if_firewalld_is_installed.html">3.8.8. Check if firewalld is installed</a></span></dt><dt><span class="section"><a href="sec-Disabling_firewalld.html">3.8.9. Disabling firewalld</a></span></dt><dt><span class="section"><a href="sec-Start_firewalld.html">3.8.10. Start firewalld</a></span></dt><dt><span class="section"><a href="sec-Check_if_firewalld_is_runni
 ng.html">3.8.11. Check if firewalld is running</a></span></dt><dt><span class="section"><a href="sec-Installing_firewalld.html">3.8.12. Installing firewalld</a></span></dt><dt><span class="section"><a href="sec-Configuring_the_Firewall.html">3.8.13. Configuring the Firewall</a></span></dt><dt><span class="section"><a href="sec-firewalld-additional_resources.html">3.8.14. Additional Resources</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Encryption.html">4. Encryption</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Encryption.html#sect-Security_Guide-Encryption-Data_at_Rest">4.1. Data at Rest</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Encryption.html#sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption">4.1.1. Full Disk Encryption</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Encryption.html#Security_Guide-Encryption-Prote
 cting_Data_at_Rest-File_Based_Encryption">4.1.2. File Based Encryption</a></span></dt></dl></dd><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion.html">4.2. Data in Motion</a></span></dt><dd><dl><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion.html#sect-Security_Guide-Virtual_Private_Networks_VPNs">4.2.1. Virtual Private Networks (VPNs)</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html">4.2.2. Secure Shell</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption.html">4.2.3. LUKS Disk Encryption</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html">4.2.4. 7-Zip Encrypted Archives</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG.html">4.2.5. Using GNU Privacy Guard (GnuPG)</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><
 a href="chap-Security_Guide-General_Principles_of_Information_Security.html">5. General Principles of Information Security</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-General_Principles_of_Information_Security.html#sect-Security_Guide-General_Principles_of_Information_Security-Tips_Guides_and_Tools">5.1. Tips, Guides, and Tools</a></span></dt></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Secure_Installation.html">6. Secure Installation</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Secure_Installation.html#sect-Security_Guide-Secure_Installation-Disk_Partitions">6.1. Disk Partitions</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html">6.2. Utilize LUKS Partition Encryption</a></span></dt></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Software_Maintenance.html">7. Software Maintenance</a></span></dt>
 <dd><dl><dt><span class="section"><a href="chap-Security_Guide-Software_Maintenance.html#sect-Security_Guide-Software_Maintenance-Install_Minimal_Software">7.1. Install Minimal Software</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html">7.2. Plan and Configure Security Updates</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html">7.3. Adjusting Automatic Updates</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html">7.4. Install Signed Packages from Well Known Repositories</a></span></dt></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-CVE.html">8. Common Vulnerabilities and Exposures</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-CVE.html#sect-Secur
 ity_Guide-CVE-yum_plugin">8.1. YUM Plugin</a></span></dt></dl></dd><dt><span class="chapter"><a href="ch09.html">9. SELinux</a></span></dt><dd><dl><dt><span class="section"><a href="ch09.html#sect-Security-Enhanced_Linux-Introduction">9.1. Introduction</a></span></dt><dd><dl><dt><span class="section"><a href="ch09.html#sect-Security-Enhanced_Linux-Introduction-Benefits_of_running_SELinux">9.1.1. Benefits of running SELinux</a></span></dt><dt><span class="section"><a href="ch09.html#sect-Security-Enhanced_Linux-Introduction-Examples">9.1.2. Examples</a></span></dt><dt><span class="section"><a href="ch09.html#sect-Security-Enhanced_Linux-Introduction-SELinux_Architecture">9.1.3. SELinux Architecture</a></span></dt><dt><span class="section"><a href="ch09.html#sect-Security-Enhanced_Linux-Introduction-SELinux_on_Other_Operating_Systems">9.1.4. SELinux on Other Operating Systems</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security-Enhanced_Linux-SELinux_Conte
 xts.html">9.2. SELinux Contexts</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security-Enhanced_Linux-SELinux_Contexts.html#sect-Security-Enhanced_Linux-SELinux_Contexts-Domain_Transitions">9.2.1. Domain Transitions</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-SELinux_Contexts-SELinux_Contexts_for_Processes.html">9.2.2. SELinux Contexts for Processes</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-SELinux_Contexts-SELinux_Contexts_for_Users.html">9.2.3. SELinux Contexts for Users</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Targeted_Policy.html">9.3. Targeted Policy</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Targeted_Policy.html#sect-Security-Enhanced_Linux-Targeted_Policy-Confined_Processes">9.3.1. Confined Processes</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Targeted_Pol
 icy-Unconfined_Processes.html">9.3.2. Unconfined Processes</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Targeted_Policy-Confined_and_Unconfined_Users.html">9.3.3. Confined and Unconfined Users</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux.html">9.4. Working with SELinux</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux.html#sect-Security-Enhanced_Linux-Working_with_SELinux-SELinux_Packages">9.4.1. SELinux Packages</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-Which_Log_File_is_Used.html">9.4.2. Which Log File is Used</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-Main_Configuration_File.html">9.4.3. Main Configuration File</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SEL
 inux-Enabling_and_Disabling_SELinux.html">9.4.4. Enabling and Disabling SELinux</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-SELinux_Modes.html">9.4.5. SELinux Modes</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-Booleans.html">9.4.6. Booleans</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-SELinux_Contexts_Labeling_Files.html">9.4.7. SELinux Contexts - Labeling Files</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-The_file_t_and_default_t_Types.html">9.4.8. The file_t and default_t Types</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-Mounting_File_Systems.html">9.4.9. Mounting File Systems</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-Maintaining_SELinux_Labels
 _.html">9.4.10. Maintaining SELinux Labels </a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Confining_Users.html">9.5. Confining Users</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Confining_Users.html#sect-Security-Enhanced_Linux-Confining_Users-Linux_and_SELinux_User_Mappings">9.5.1. Linux and SELinux User Mappings</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Confining_Users-Confining_New_Linux_Users_useradd.html">9.5.2. Confining New Linux Users: useradd</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Confining_Users-Confining_Existing_Linux_Users_semanage_login.html">9.5.3. Confining Existing Linux Users: semanage login</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Confining_Users-Changing_the_Default_Mapping.html">9.5.4. Changing the Default Mapping</a></span></dt><dt><span class="section"><a 
 href="sect-Security-Enhanced_Linux-Confining_Users-xguest_Kiosk_Mode.html">9.5.5. xguest: Kiosk Mode</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Confining_Users-Booleans_for_Users_Executing_Applications.html">9.5.6. Booleans for Users Executing Applications</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Troubleshooting.html">9.6. Troubleshooting</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Troubleshooting.html#sect-Security-Enhanced_Linux-Troubleshooting-What_Happens_when_Access_is_Denied">9.6.1. What Happens when Access is Denied</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Troubleshooting-Top_Three_Causes_of_Problems.html">9.6.2. Top Three Causes of Problems</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Troubleshooting-Fixing_Problems.html">9.6.3. Fixing Problems</a></span></dt></dl></dd><d
 t><span class="section"><a href="sect-Security-Enhanced_Linux-Further_Information.html">9.7. Further Information</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Further_Information.html#sect-Security-Enhanced_Linux-Further_Information-Contributors">9.7.1. Contributors</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Further_Information-Other_Resources.html">9.7.2. Other Resources</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="ch10.html">10. Managing Confined Services</a></span></dt><dd><dl><dt><span class="section"><a href="ch10.html#sect-Managing_Confined_Services-Introduction">10.1. Introduction</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Targeted_policy.html">10.2. Targeted policy</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Targeted_policy.html#sect-Managing_Confined_Services-Targeted_policy-Type_En
 forcement">10.2.1. Type Enforcement</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Targeted_policy-Confined_processes.html">10.2.2. Confined processes</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Targeted_policy-Unconfined_processes.html">10.2.3. Unconfined processes</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-The_Apache_HTTP_Server.html">10.3. The Apache HTTP Server</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-The_Apache_HTTP_Server.html#sect-Managing_Confined_Services-The_Apache_HTTP_Server-The_Apache_HTTP_Server_and_SELinux">10.3.1. The Apache HTTP Server and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-The_Apache_HTTP_Server-Types.html">10.3.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-The_Apache_HTTP_Server-Booleans.ht
 ml">10.3.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-The_Apache_HTTP_Server-Configuration_examples.html">10.3.4. Configuration examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-Samba.html">10.4. Samba</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Samba.html#sect-Managing_Confined_Services-Samba-Samba_and_SELinux">10.4.1. Samba and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Samba-Types.html">10.4.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Samba-Booleans.html">10.4.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Samba-Configuration_examples.html">10.4.4. Configuration examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-File_Transfer_Protocol.html">
 10.5. File Transfer Protocol</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-File_Transfer_Protocol.html#sect-Managing_Confined_Services-File_Transfer_Protocol-FTP_and_SELinux">10.5.1. FTP and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-File_Transfer_Protocol-Types.html">10.5.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-File_Transfer_Protocol-Booleans.html">10.5.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-File_Transfer_Protocol-Configuration_Examples.html">10.5.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-Network_File_System.html">10.6. Network File System</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Network_File_System.html#sect-Managing_Confined_Services-NFS-NFS_and_SELinux">1
 0.6.1. NFS and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-NFS-Types.html">10.6.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_services-NFS-Booleans.html">10.6.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-NFS-Configuration_Examples.html">10.6.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-Berkeley_Internet_Name_Domain.html">10.7. Berkeley Internet Name Domain</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Berkeley_Internet_Name_Domain.html#sect-Managing_Confined_Services-BIND-BIND_and_SELinux">10.7.1. BIND and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-BIND-Types.html">10.7.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-BIND-Booleans.html">10.7.3
 . Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-BIND-Configuration_Examples.html">10.7.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-Concurrent_Versioning_System.html">10.8. Concurrent Versioning System</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Concurrent_Versioning_System.html#sect-Managing_Confined_Services-Concurrent_Versioning_System-CVS_and_SELinux">10.8.1. CVS and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Concurrent_Versioning_System-Types.html">10.8.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Concurrent_Versioning_System-Booleans.html">10.8.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Concurrent_Versioning_System-Configuration_Examples.html">10.8.4. Configuration E
 xamples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-Squid_Caching_Proxy.html">10.9. Squid Caching Proxy</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Squid_Caching_Proxy.html#sect-Managing_Confined_Services-Squid_Caching_Proxy-Squid_Caching_Proxy_and_SELinux">10.9.1. Squid Caching Proxy and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Squid_Caching_Proxy-Types.html">10.9.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Squid_Caching_Proxy-Booleans.html">10.9.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Squid_Caching_Proxy-Configuration_Examples.html">10.9.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-MySQL.html">10.10. MySQL</a></span></dt><dd><dl><dt><span class="section"><a href
 ="sect-Managing_Confined_Services-MySQL.html#sect-Managing_Confined_Services-MySQL-MySQL_and_SELinux">10.10.1. MySQL and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-MySQL-Types.html">10.10.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-MySQL-Booleans.html">10.10.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-MySQL-Configuration_Examples.html">10.10.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-PostgreSQL.html">10.11. PostgreSQL</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-PostgreSQL.html#sect-Managing_Confined_Services-PostgreSQL-PostgreSQL_and_SELinux">10.11.1. PostgreSQL and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-PostgreSQL-Types.html">10.11.2. Types</a></span></dt><dt><spa
 n class="section"><a href="sect-Managing_Confined_Services-PostgreSQL-Booleans.html">10.11.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-PostgreSQL-Configuration_Examples.html">10.11.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-rsync.html">10.12. rsync</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-rsync.html#sect-Managing_Confined_Services-rsync-rsync_and_SELinux">10.12.1. rsync and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-rsync-Types.html">10.12.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-rsync-Booleans.html">10.12.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-rsync-Configuration_Examples.html">10.12.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="sec
 tion"><a href="sect-Managing_Confined_Services-Postfix.html">10.13. Postfix</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Postfix.html#sect-Managing_Confined_Services-rsync-Postfix_and_SELinux">10.13.1. Postfix and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Postfix-Types.html">10.13.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Postfix-Booleans.html">10.13.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Postfix-Configuration_Examples.html">10.13.4. Configuration Examples</a></span></dt></dl></dd></dl></dd><dt><span class="appendix"><a href="chap-Security_Guide-Encryption_Standards.html">A. Encryption Standards</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Encryption_Standards.html#idm219013706816">A.1. Synchronous Encryption</a></span></dt><dd><dl><dt><span class="
 section"><a href="chap-Security_Guide-Encryption_Standards.html#idm219017241040">A.1.1. Advanced Encryption Standard - AES</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Encryption_Standards.html#idm219025666224">A.1.2.  Data Encryption Standard - DES</a></span></dt></dl></dd><dt><span class="section"><a href="apas02.html">A.2. Public-key Encryption</a></span></dt><dd><dl><dt><span class="section"><a href="apas02.html#idm219036735712">A.2.1. Diffie-Hellman</a></span></dt><dt><span class="section"><a href="apas02s02.html">A.2.2. RSA</a></span></dt><dt><span class="section"><a href="apas02s03.html">A.2.3. DSA</a></span></dt><dt><span class="section"><a href="apas02s04.html">A.2.4. SSL/TLS</a></span></dt><dt><span class="section"><a href="apas02s05.html">A.2.5. Cramer-Shoup Cryptosystem</a></span></dt><dt><span class="section"><a href="apas02s06.html">A.2.6. ElGamal Encryption</a></span></dt></dl></dd></dl></dd><dt><span class="appendix"><a href="appe-Pub
 lican-Revision_History.html">B. Revision History</a></span></dt></dl></div></div><ul class="docnav"><li class="previous"></li><li class="next"><a accesskey="n" href="pref-Security_Guide-Preface.html"><strong>Next</strong>Preface</a></li></ul></body></html>
\ No newline at end of file
+		</div></div></div></div><hr /></div><div class="toc"><dl class="toc"><dt><span class="preface"><a href="pref-Security_Guide-Preface.html">Preface</a></span></dt><dd><dl><dt><span class="section"><a href="pref-Security_Guide-Preface.html#idm219181637568">1. Document Conventions</a></span></dt><dd><dl><dt><span class="section"><a href="pref-Security_Guide-Preface.html#idm219164321312">1.1. Typographic Conventions</a></span></dt><dt><span class="section"><a href="pref-Security_Guide-Preface.html#idm219184297552">1.2. Pull-quote Conventions</a></span></dt><dt><span class="section"><a href="pref-Security_Guide-Preface.html#idm219196523632">1.3. Notes and Warnings</a></span></dt></dl></dd><dt><span class="section"><a href="pr01s02.html">2. We Need Feedback!</a></span></dt></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Security_Overview.html">1. Security Overview</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html
 #sect-Security_Guide-Introduction_to_Security">1.1. Introduction to Security</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-What_is_Computer_Security">1.1.1. What is Computer Security?</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-SELinux">1.1.2. SELinux</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-Security_Controls">1.1.3. Security Controls</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Security_Overview.html#sect-Security_Guide-Introduction_to_Security-Conclusion">1.1.4. Conclusion</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities.html">1.2. Attackers and Vulnerabilities</a></span></dt><dd><dl><dt><span class="se
 ction"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities.html#sect-Security_Guide-Attackers_and_Vulnerabilities-A_Quick_History_of_Hackers">1.2.1. A Quick History of Hackers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Network_Security.html">1.2.2. Threats to Network Security</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html">1.2.3. Threats to Server Security</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Workstation_and_Home_PC_Security.html">1.2.4. Threats to Workstation and Home PC Security</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment.html">1.3. Vulnerability Assessment</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment.html#sect-Security_Guide-
 Vulnerability_Assessment-Thinking_Like_the_Enemy">1.3.1. Thinking Like the Enemy</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment-Defining_Assessment_and_Testing.html">1.3.2. Defining Assessment and Testing</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Vulnerability_Assessment-Evaluating_the_Tools.html">1.3.3. Evaluating the Tools</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Common_Exploits_and_Attacks.html">1.4. Common Exploits and Attacks</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Security_Updates.html">1.5. Security Updates</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Security_Updates.html#sect-Security_Guide-Security_Updates-Updating_Packages">1.5.1. Updating Packages</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Verifying_Signed_Packages.html">1.5.2. Verifying Signed
  Packages</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Installing_Signed_Packages.html">1.5.3. Installing Signed Packages</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Updating_Packages-Applying_the_Changes.html">1.5.4. Applying the Changes</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Basic_Hardening.html">2. Basic Hardening Guide</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Basic_Hardening.html#sect-Security_Guide-Basic_Hardening-General_Principles">2.1. General Principles</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-Physical_Security.html">2.2. Physical Security</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-Physical_Security-Why_is_this_important.html">2.3. Why this is important</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Bas
 ic_Hardening-Networking.html">2.4. Networking</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-Networking.html#sect-Security_Guide-Basic_Hardening-Networking-iptables">2.4.1. iptables</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-Networking-IPv6.html">2.4.2. IPv6</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-Up_to_date.html">2.5. Keeping software up to date</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-Services.html">2.6. Services</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Basic_Hardening-NTP.html">2.7. NTP</a></span></dt></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Securing_Your_Network.html">3. Securing Your Network</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Secu
 rity">3.1. Workstation Security</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Evaluating_Workstation_Security">3.1.1. Evaluating Workstation Security</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-BIOS_and_Boot_Loader_Security">3.1.2. BIOS and Boot Loader Security</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Password_Security">3.1.3. Password Security</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Administrative_Controls">3.1.4. Administrative Controls</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Available_Network_S
 ervices">3.1.5. Available Network Services</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Personal_Firewalls">3.1.6. Personal Firewalls</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-Security_Enhanced_Communication_Tools">3.1.7. Security Enhanced Communication Tools</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Server_Security.html">3.2. Server Security</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Server_Security.html#sect-Security_Guide-Server_Security-Securing_Services_With_TCP_Wrappers_and_xinetd">3.2.1. Securing Services With TCP Wrappers and xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_Portmap.html">3.2.2. Securing Portmap</a></span></dt><dt><span class="section"><a hre
 f="sect-Security_Guide-Server_Security-Securing_NIS.html">3.2.3. Securing NIS</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_NFS.html">3.2.4. Securing NFS</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_the_Apache_HTTP_Server.html">3.2.5. Securing the Apache HTTP Server</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_FTP.html">3.2.6. Securing FTP</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Securing_Sendmail.html">3.2.7. Securing Sendmail</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Server_Security-Verifying_Which_Ports_Are_Listening.html">3.2.8. Verifying Which Ports Are Listening</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO.html">3.3. Single Sign-on (SSO)</a></span></dt><dd><dl><dt><span class="section"><a href="sec
 t-Security_Guide-Single_Sign_on_SSO.html#sect-Security_Guide-Single_Sign_on_SSO-Introduction">3.3.1. Introduction</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-Getting_Started_with_your_new_Smart_Card.html">3.3.2. Getting Started with your new Smart Card</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Enrollment_Works.html">3.3.3. How Smart Card Enrollment Works</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-How_Smart_Card_Login_Works.html">3.3.4. How Smart Card Login Works</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Single_Sign_on_SSO-Configuring_Firefox_to_use_Kerberos_for_SSO.html">3.3.5. Configuring Firefox to use Kerberos for SSO</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Multifactor_Authentication.html">3.4. Multifactor Authentication Solutions</a></span></dt><dd><dl><
 dt><span class="section"><a href="sect-Security_Guide-Multifactor_Authentication.html#sect-Security_Guide-Multifactor_Authentication-Yubikey">3.4.1. Yubikey</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html">3.5. Pluggable Authentication Modules (PAM)</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM.html#sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Advantages_of_PAM">3.5.1. Advantages of PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_Files.html">3.5.2. PAM Configuration Files</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_Configuration_File_Format.html">3.5.3. PAM Configuration File Format</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_M
 odules_PAM-Sample_PAM_Configuration_Files.html">3.5.4. Sample PAM Configuration Files</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Creating_PAM_Modules.html">3.5.5. Creating PAM Modules</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Administrative_Credential_Caching.html">3.5.6. PAM and Administrative Credential Caching</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-PAM_and_Device_Ownership.html">3.5.7. PAM and Device Ownership</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Pluggable_Authentication_Modules_PAM-Additional_Resources.html">3.5.8. Additional Resources</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd.html">3.6. TCP Wrappers and xinetd</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Sec
 urity_Guide-TCP_Wrappers_and_xinetd.html#sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers">3.6.1. TCP Wrappers</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-TCP_Wrappers_Configuration_Files.html">3.6.2. TCP Wrappers Configuration Files</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd.html">3.6.3. xinetd</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-xinetd_Configuration_Files.html">3.6.4. xinetd Configuration Files</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-TCP_Wrappers_and_xinetd-Additional_Resources.html">3.6.5. Additional Resources</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Kerberos.html">3.7. Kerberos</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Kerberos.html#sect-Security_Guide-Kerberos-What_is_Kerberos">3.7.1. What is Ker
 beros?</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html">3.7.2. Kerberos Terminology</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-How_Kerberos_Works.html">3.7.3. How Kerberos Works</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Kerberos_and_PAM.html">3.7.4. Kerberos and PAM</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Server.html">3.7.5. Configuring a Kerberos 5 Server</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Configuring_a_Kerberos_5_Client.html">3.7.6. Configuring a Kerberos 5 Client</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Domain_to_Realm_Mapping.html">3.7.7. Domain-to-Realm Mapping</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Setting_Up_Secondary_KDCs.html">3.7.8. Setting Up Secondary K
 DCs</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Setting_Up_Cross_Realm_Authentication.html">3.7.9. Setting Up Cross Realm Authentication</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Kerberos-Additional_Resources.html">3.7.10. Additional Resources</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security_Guide-Using_Firewalls.html">3.8. Using Firewalls</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security_Guide-Using_Firewalls.html#sec-Introduction_to_firewalld">3.8.1. Introduction to firewalld</a></span></dt><dt><span class="section"><a href="sec-Understanding_firewalld.html">3.8.2. Understanding firewalld</a></span></dt><dt><span class="section"><a href="sec-Comparison_of_Firewalld_to_system-config-firewall.html">3.8.3. Comparison of Firewalld to system-config-firewall and iptables</a></span></dt><dt><span class="section"><a href="sec-Understanding_Network_Zones.html">3.8.4. Unders
 tanding Network Zones</a></span></dt><dt><span class="section"><a href="sec-Choosing_a_Network_Zone.html">3.8.5. Choosing a Network Zone</a></span></dt><dt><span class="section"><a href="sec-Understanding_Predefined_Services.html">3.8.6. Understanding Predefined Services</a></span></dt><dt><span class="section"><a href="sec-Understanding_the_direct_interface.html">3.8.7. Understanding The Direct Interface</a></span></dt><dt><span class="section"><a href="sec-Check_if_firewalld_is_installed.html">3.8.8. Check if firewalld is installed</a></span></dt><dt><span class="section"><a href="sec-Disabling_firewalld.html">3.8.9. Disabling firewalld</a></span></dt><dt><span class="section"><a href="sec-Start_firewalld.html">3.8.10. Start firewalld</a></span></dt><dt><span class="section"><a href="sec-Check_if_firewalld_is_running.html">3.8.11. Check if firewalld is running</a></span></dt><dt><span class="section"><a href="sec-Installing_firewalld.html">3.8.12. Installing firewalld</a><
 /span></dt><dt><span class="section"><a href="sec-Configuring_the_Firewall.html">3.8.13. Configuring the Firewall</a></span></dt><dt><span class="section"><a href="sec-firewalld-additional_resources.html">3.8.14. Additional Resources</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Encryption.html">4. Encryption</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Encryption.html#sect-Security_Guide-Encryption-Data_at_Rest">4.1. Data at Rest</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Encryption.html#sect-Security_Guide-Encryption-Protecting_Data_at_Rest-Full_Disk_Encryption">4.1.1. Full Disk Encryption</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Encryption.html#Security_Guide-Encryption-Protecting_Data_at_Rest-File_Based_Encryption">4.1.2. File Based Encryption</a></span></dt></dl></dd><dt><span class="section"><a href="Security_Guide-Encryption-Data
 _in_Motion.html">4.2. Data in Motion</a></span></dt><dd><dl><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion.html#sect-Security_Guide-Virtual_Private_Networks_VPNs">4.2.1. Virtual Private Networks (VPNs)</a></span></dt><dt><span class="section"><a href="Security_Guide-Encryption-Data_in_Motion-Secure_Shell.html">4.2.2. Secure Shell</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-LUKS_Disk_Encryption.html">4.2.3. LUKS Disk Encryption</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-7_Zip_Encrypted_Archives.html">4.2.4. 7-Zip Encrypted Archives</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Encryption-Using_GPG.html">4.2.5. Using GNU Privacy Guard (GnuPG)</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-General_Principles_of_Information_Security.html">5. General Principles of Information Security</a></span></dt><dt><span class="chapte
 r"><a href="chap-Security_Guide-Secure_Installation.html">6. Secure Installation</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Secure_Installation.html#sect-Security_Guide-Secure_Installation-Disk_Partitions">6.1. Disk Partitions</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Secure_Installation-Utilize_LUKS_Partition_Encryption.html">6.2. Utilize LUKS Partition Encryption</a></span></dt></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-Software_Maintenance.html">7. Software Maintenance</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Software_Maintenance.html#sect-Security_Guide-Software_Maintenance-Install_Minimal_Software">7.1. Install Minimal Software</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates.html">7.2. Plan and Configure Security Updates</a></span></dt><dt><span class="section"><a href="se
 ct-Security_Guide-Software_Maintenance-Plan_and_Configure_Security_Updates-Adjusting_Automatic_Updates.html">7.3. Adjusting Automatic Updates</a></span></dt><dt><span class="section"><a href="sect-Security_Guide-Software_Maintenance-Install_Signed_Packages_from_Well_Known_Repositories.html">7.4. Install Signed Packages from Well Known Repositories</a></span></dt></dl></dd><dt><span class="chapter"><a href="chap-Security_Guide-CVE.html">8. Common Vulnerabilities and Exposures</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-CVE.html#sect-Security_Guide-CVE-yum_plugin">8.1. YUM Plugin</a></span></dt></dl></dd><dt><span class="chapter"><a href="ch09.html">9. SELinux</a></span></dt><dd><dl><dt><span class="section"><a href="ch09.html#sect-Security-Enhanced_Linux-Introduction">9.1. Introduction</a></span></dt><dd><dl><dt><span class="section"><a href="ch09.html#sect-Security-Enhanced_Linux-Introduction-Benefits_of_running_SELinux">9.1.1. Benefits of r
 unning SELinux</a></span></dt><dt><span class="section"><a href="ch09.html#sect-Security-Enhanced_Linux-Introduction-Examples">9.1.2. Examples</a></span></dt><dt><span class="section"><a href="ch09.html#sect-Security-Enhanced_Linux-Introduction-SELinux_Architecture">9.1.3. SELinux Architecture</a></span></dt><dt><span class="section"><a href="ch09.html#sect-Security-Enhanced_Linux-Introduction-SELinux_on_Other_Operating_Systems">9.1.4. SELinux on Other Operating Systems</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security-Enhanced_Linux-SELinux_Contexts.html">9.2. SELinux Contexts</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security-Enhanced_Linux-SELinux_Contexts.html#sect-Security-Enhanced_Linux-SELinux_Contexts-Domain_Transitions">9.2.1. Domain Transitions</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-SELinux_Contexts-SELinux_Contexts_for_Processes.html">9.2.2. SELinux Contexts for Processes</a></spa
 n></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-SELinux_Contexts-SELinux_Contexts_for_Users.html">9.2.3. SELinux Contexts for Users</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Targeted_Policy.html">9.3. Targeted Policy</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Targeted_Policy.html#sect-Security-Enhanced_Linux-Targeted_Policy-Confined_Processes">9.3.1. Confined Processes</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Targeted_Policy-Unconfined_Processes.html">9.3.2. Unconfined Processes</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Targeted_Policy-Confined_and_Unconfined_Users.html">9.3.3. Confined and Unconfined Users</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux.html">9.4. Working with SELinux</a></span></dt><dd><dl><dt><span class="sec
 tion"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux.html#sect-Security-Enhanced_Linux-Working_with_SELinux-SELinux_Packages">9.4.1. SELinux Packages</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-Which_Log_File_is_Used.html">9.4.2. Which Log File is Used</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-Main_Configuration_File.html">9.4.3. Main Configuration File</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-Enabling_and_Disabling_SELinux.html">9.4.4. Enabling and Disabling SELinux</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-SELinux_Modes.html">9.4.5. SELinux Modes</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-Booleans.html">9.4.6. Booleans</a></span></dt><dt><span class="section"><a href="sect-Secur
 ity-Enhanced_Linux-Working_with_SELinux-SELinux_Contexts_Labeling_Files.html">9.4.7. SELinux Contexts - Labeling Files</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-The_file_t_and_default_t_Types.html">9.4.8. The file_t and default_t Types</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-Mounting_File_Systems.html">9.4.9. Mounting File Systems</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Working_with_SELinux-Maintaining_SELinux_Labels_.html">9.4.10. Maintaining SELinux Labels </a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Confining_Users.html">9.5. Confining Users</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Confining_Users.html#sect-Security-Enhanced_Linux-Confining_Users-Linux_and_SELinux_User_Mappings">9.5.1. Linux and SELinux User Mappings</a></span><
 /dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Confining_Users-Confining_New_Linux_Users_useradd.html">9.5.2. Confining New Linux Users: useradd</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Confining_Users-Confining_Existing_Linux_Users_semanage_login.html">9.5.3. Confining Existing Linux Users: semanage login</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Confining_Users-Changing_the_Default_Mapping.html">9.5.4. Changing the Default Mapping</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Confining_Users-xguest_Kiosk_Mode.html">9.5.5. xguest: Kiosk Mode</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Confining_Users-Booleans_for_Users_Executing_Applications.html">9.5.6. Booleans for Users Executing Applications</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Troubleshooting.html">9.6. Tro
 ubleshooting</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Troubleshooting.html#sect-Security-Enhanced_Linux-Troubleshooting-What_Happens_when_Access_is_Denied">9.6.1. What Happens when Access is Denied</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Troubleshooting-Top_Three_Causes_of_Problems.html">9.6.2. Top Three Causes of Problems</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Troubleshooting-Fixing_Problems.html">9.6.3. Fixing Problems</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Further_Information.html">9.7. Further Information</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Further_Information.html#sect-Security-Enhanced_Linux-Further_Information-Contributors">9.7.1. Contributors</a></span></dt><dt><span class="section"><a href="sect-Security-Enhanced_Linux-Further_Information-Other
 _Resources.html">9.7.2. Other Resources</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="ch10.html">10. Managing Confined Services</a></span></dt><dd><dl><dt><span class="section"><a href="ch10.html#sect-Managing_Confined_Services-Introduction">10.1. Introduction</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Targeted_policy.html">10.2. Targeted policy</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Targeted_policy.html#sect-Managing_Confined_Services-Targeted_policy-Type_Enforcement">10.2.1. Type Enforcement</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Targeted_policy-Confined_processes.html">10.2.2. Confined processes</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Targeted_policy-Unconfined_processes.html">10.2.3. Unconfined processes</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managin
 g_Confined_Services-The_Apache_HTTP_Server.html">10.3. The Apache HTTP Server</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-The_Apache_HTTP_Server.html#sect-Managing_Confined_Services-The_Apache_HTTP_Server-The_Apache_HTTP_Server_and_SELinux">10.3.1. The Apache HTTP Server and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-The_Apache_HTTP_Server-Types.html">10.3.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-The_Apache_HTTP_Server-Booleans.html">10.3.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-The_Apache_HTTP_Server-Configuration_examples.html">10.3.4. Configuration examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-Samba.html">10.4. Samba</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Samba.html#sect-Mana
 ging_Confined_Services-Samba-Samba_and_SELinux">10.4.1. Samba and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Samba-Types.html">10.4.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Samba-Booleans.html">10.4.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Samba-Configuration_examples.html">10.4.4. Configuration examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-File_Transfer_Protocol.html">10.5. File Transfer Protocol</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-File_Transfer_Protocol.html#sect-Managing_Confined_Services-File_Transfer_Protocol-FTP_and_SELinux">10.5.1. FTP and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-File_Transfer_Protocol-Types.html">10.5.2. Types</a></span></dt><dt><span class="sectio
 n"><a href="sect-Managing_Confined_Services-File_Transfer_Protocol-Booleans.html">10.5.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-File_Transfer_Protocol-Configuration_Examples.html">10.5.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-Network_File_System.html">10.6. Network File System</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Network_File_System.html#sect-Managing_Confined_Services-NFS-NFS_and_SELinux">10.6.1. NFS and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-NFS-Types.html">10.6.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_services-NFS-Booleans.html">10.6.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-NFS-Configuration_Examples.html">10.6.4. Configuration Examples</a></span></d
 t></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-Berkeley_Internet_Name_Domain.html">10.7. Berkeley Internet Name Domain</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Berkeley_Internet_Name_Domain.html#sect-Managing_Confined_Services-BIND-BIND_and_SELinux">10.7.1. BIND and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-BIND-Types.html">10.7.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-BIND-Booleans.html">10.7.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-BIND-Configuration_Examples.html">10.7.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-Concurrent_Versioning_System.html">10.8. Concurrent Versioning System</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Co
 ncurrent_Versioning_System.html#sect-Managing_Confined_Services-Concurrent_Versioning_System-CVS_and_SELinux">10.8.1. CVS and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Concurrent_Versioning_System-Types.html">10.8.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Concurrent_Versioning_System-Booleans.html">10.8.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Concurrent_Versioning_System-Configuration_Examples.html">10.8.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-Squid_Caching_Proxy.html">10.9. Squid Caching Proxy</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Squid_Caching_Proxy.html#sect-Managing_Confined_Services-Squid_Caching_Proxy-Squid_Caching_Proxy_and_SELinux">10.9.1. Squid Caching Proxy and SELinux</a></span></dt><dt><
 span class="section"><a href="sect-Managing_Confined_Services-Squid_Caching_Proxy-Types.html">10.9.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Squid_Caching_Proxy-Booleans.html">10.9.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Squid_Caching_Proxy-Configuration_Examples.html">10.9.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-MySQL.html">10.10. MySQL</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-MySQL.html#sect-Managing_Confined_Services-MySQL-MySQL_and_SELinux">10.10.1. MySQL and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-MySQL-Types.html">10.10.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-MySQL-Booleans.html">10.10.3. Booleans</a></span></dt><dt><span class="section"><a hre
 f="sect-Managing_Confined_Services-MySQL-Configuration_Examples.html">10.10.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-PostgreSQL.html">10.11. PostgreSQL</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-PostgreSQL.html#sect-Managing_Confined_Services-PostgreSQL-PostgreSQL_and_SELinux">10.11.1. PostgreSQL and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-PostgreSQL-Types.html">10.11.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-PostgreSQL-Booleans.html">10.11.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-PostgreSQL-Configuration_Examples.html">10.11.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-rsync.html">10.12. rsync</a></span></dt><dd><dl><dt><span class
 ="section"><a href="sect-Managing_Confined_Services-rsync.html#sect-Managing_Confined_Services-rsync-rsync_and_SELinux">10.12.1. rsync and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-rsync-Types.html">10.12.2. Types</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-rsync-Booleans.html">10.12.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-rsync-Configuration_Examples.html">10.12.4. Configuration Examples</a></span></dt></dl></dd><dt><span class="section"><a href="sect-Managing_Confined_Services-Postfix.html">10.13. Postfix</a></span></dt><dd><dl><dt><span class="section"><a href="sect-Managing_Confined_Services-Postfix.html#sect-Managing_Confined_Services-rsync-Postfix_and_SELinux">10.13.1. Postfix and SELinux</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Postfix-Types.html">10.13.2. Types</a></span></dt><dt><span cla
 ss="section"><a href="sect-Managing_Confined_Services-Postfix-Booleans.html">10.13.3. Booleans</a></span></dt><dt><span class="section"><a href="sect-Managing_Confined_Services-Postfix-Configuration_Examples.html">10.13.4. Configuration Examples</a></span></dt></dl></dd></dl></dd><dt><span class="appendix"><a href="chap-Security_Guide-Encryption_Standards.html">A. Encryption Standards</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Encryption_Standards.html#idm219193930000">A.1. Synchronous Encryption</a></span></dt><dd><dl><dt><span class="section"><a href="chap-Security_Guide-Encryption_Standards.html#idm219188617968">A.1.1. Advanced Encryption Standard - AES</a></span></dt><dt><span class="section"><a href="chap-Security_Guide-Encryption_Standards.html#idm219181639600">A.1.2.  Data Encryption Standard - DES</a></span></dt></dl></dd><dt><span class="section"><a href="apas02.html">A.2. Public-key Encryption</a></span></dt><dd><dl><dt><span clas
 s="section"><a href="apas02.html#idm219182227760">A.2.1. Diffie-Hellman</a></span></dt><dt><span class="section"><a href="apas02s02.html">A.2.2. RSA</a></span></dt><dt><span class="section"><a href="apas02s03.html">A.2.3. DSA</a></span></dt><dt><span class="section"><a href="apas02s04.html">A.2.4. SSL/TLS</a></span></dt><dt><span class="section"><a href="apas02s05.html">A.2.5. Cramer-Shoup Cryptosystem</a></span></dt><dt><span class="section"><a href="apas02s06.html">A.2.6. ElGamal Encryption</a></span></dt></dl></dd></dl></dd><dt><span class="appendix"><a href="appe-Publican-Revision_History.html">B. Revision History</a></span></dt></dl></div></div><ul class="docnav"><li class="previous"></li><li class="next"><a accesskey="n" href="pref-Security_Guide-Preface.html"><strong>Next</strong>Preface</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/pr01s02.html b/public_html/en-US/Fedora/19/html/Security_Guide/pr01s02.html
index dc06f15..6692619 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/pr01s02.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/pr01s02.html
@@ -6,7 +6,7 @@
               
               addID('Fedora.19.books');
 	      addID('Fedora.19.Security_Guide');
-              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="pref-Security_Guide-Preface.html" title="Preface" /><link rel="prev" href="pref-Security_Guide-Preface.html" title="Preface" /><link rel="next" href="chap-Security_Guide-Security_Overview.html" title="Chapter 1. Security Overview" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="pref-Security_Guide-Preface.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="
 n" href="chap-Security_Guide-Security_Overview.html"><strong>Next</strong></a></li></ul><div xml:lang="en-US" class="section" id="idm219002056288" lang="en-US"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title" id="idm219002056288">2. We Need Feedback!</h2></div></div></div><a id="idm219012295456" class="indexterm"></a><div class="para">
+              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="pref-Security_Guide-Preface.html" title="Preface" /><link rel="prev" href="pref-Security_Guide-Preface.html" title="Preface" /><link rel="next" href="chap-Security_Guide-Security_Overview.html" title="Chapter 1. Security Overview" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="pref-Security_Guide-Preface.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="
 n" href="chap-Security_Guide-Security_Overview.html"><strong>Next</strong></a></li></ul><div xml:lang="en-US" class="section" id="idm219200703360" lang="en-US"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title" id="idm219200703360">2. We Need Feedback!</h2></div></div></div><a id="idm219225689712" class="indexterm"></a><div class="para">
 		If you find a typographical error in this manual, or if you have thought of a way to make this manual better, we would love to hear from you! Please submit a report in Bugzilla: <a href="http://bugzilla.redhat.com/bugzilla/">http://bugzilla.redhat.com/bugzilla/</a> against the product <span class="application"><strong>Fedora.</strong></span>
 	</div><div class="para">
 		When submitting a bug report, be sure to mention the manual's identifier: <em class="citetitle">security-guide</em>
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/pref-Security_Guide-Preface.html b/public_html/en-US/Fedora/19/html/Security_Guide/pref-Security_Guide-Preface.html
index e77e62f..89ef247 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/pref-Security_Guide-Preface.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/pref-Security_Guide-Preface.html
@@ -6,11 +6,11 @@
               
               addID('Fedora.19.books');
 	      addID('Fedora.19.Security_Guide');
-              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="index.html" title="Security Guide" /><link rel="next" href="pr01s02.html" title="2. We Need Feedback!" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="index.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="pr01s02.html"><strong>Next</strong></a></li></ul><div xml:lang="en-US" class="pref
 ace" id="pref-Security_Guide-Preface" lang="en-US"><div class="titlepage"><div><div><h1 class="title">Preface</h1></div></div></div><div xml:lang="en-US" class="section" id="idm219016677328" lang="en-US"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title" id="idm219016677328">1. Document Conventions</h2></div></div></div><div class="para">
+              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="index.html" title="Security Guide" /><link rel="prev" href="index.html" title="Security Guide" /><link rel="next" href="pr01s02.html" title="2. We Need Feedback!" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="index.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="pr01s02.html"><strong>Next</strong></a></li></ul><div xml:lang="en-US" class="pref
 ace" id="pref-Security_Guide-Preface" lang="en-US"><div class="titlepage"><div><div><h1 class="title">Preface</h1></div></div></div><div xml:lang="en-US" class="section" id="idm219181637568" lang="en-US"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title" id="idm219181637568">1. Document Conventions</h2></div></div></div><div class="para">
 		This manual uses several conventions to highlight certain words and phrases and draw attention to specific pieces of information.
 	</div><div class="para">
 		In PDF and paper editions, this manual uses typefaces drawn from the <a href="https://fedorahosted.org/liberation-fonts/">Liberation Fonts</a> set. The Liberation Fonts set is also used in HTML editions if the set is installed on your system. If not, alternative but equivalent typefaces are displayed. Note: Red Hat Enterprise Linux 5 and later includes the Liberation Fonts set by default.
-	</div><div class="section" id="idm219000609856"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219000609856">1.1. Typographic Conventions</h3></div></div></div><div class="para">
+	</div><div class="section" id="idm219164321312"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219164321312">1.1. Typographic Conventions</h3></div></div></div><div class="para">
 			Four typographic conventions are used to call attention to specific words and phrases. These conventions, and the circumstances they apply to, are as follows.
 		</div><div class="para">
 			<code class="literal">Mono-spaced Bold</code>
@@ -58,7 +58,7 @@
 			Aside from standard usage for presenting the title of a work, italics denotes the first use of a new and important term. For example:
 		</div><div class="blockquote"><blockquote class="blockquote"><div class="para">
 				Publican is a <em class="firstterm">DocBook</em> publishing system.
-			</div></blockquote></div></div><div class="section" id="idm219007626176"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219007626176">1.2. Pull-quote Conventions</h3></div></div></div><div class="para">
+			</div></blockquote></div></div><div class="section" id="idm219184297552"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219184297552">1.2. Pull-quote Conventions</h3></div></div></div><div class="para">
 			Terminal output and source code listings are set off visually from the surrounding text.
 		</div><div class="para">
 			Output sent to a terminal is set in <code class="computeroutput">mono-spaced roman</code> and presented thus:
@@ -83,7 +83,7 @@ books_tests  Desktop1  downloads      images  notes  scripts  svgs</pre><div cla
 
       System.<span class="perl_Function">out</span>.<span class="perl_Function">println</span>(<span class="perl_String">"Echo.echo('Hello') = "</span> + echo.<span class="perl_Function">echo</span>(<span class="perl_String">"Hello"</span>));
    }
-}</pre></div><div class="section" id="idm219003565024"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219003565024">1.3. Notes and Warnings</h3></div></div></div><div class="para">
+}</pre></div><div class="section" id="idm219196523632"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title" id="idm219196523632">1.3. Notes and Warnings</h3></div></div></div><div class="para">
 			Finally, we use three visual styles to draw attention to information that might otherwise be overlooked.
 		</div><div class="note"><div class="admonition_header"><h2>Note</h2></div><div class="admonition"><div class="para">
 				Notes are tips, shortcuts or alternative approaches to the task at hand. Ignoring a note should have no negative consequences, but you might miss out on a trick that makes your life easier.
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/sec-Disabling_firewalld.html b/public_html/en-US/Fedora/19/html/Security_Guide/sec-Disabling_firewalld.html
index 22eb568..b3aaf45 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/sec-Disabling_firewalld.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/sec-Disabling_firewalld.html
@@ -15,8 +15,8 @@
 <pre class="screen">~]# <code class="command">systemctl disable firewalld # systemctl stop firewalld</code></pre>
 
 			</div><div class="para">
-				Then install the <span class="package">iptables-service</span> package by entering the following command as root: 
-<pre class="screen">~]# <code class="command">iptables-service </code></pre>
+				Then install the <span class="package">iptables-services</span> package by entering the following command as root: 
+<pre class="screen">~]# <code class="command">yum install iptables-services</code></pre>
 
 			</div><div class="para">
 				Then, to start <span class="application"><strong>iptables service</strong></span>, run the following commands as root: 
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Managing_Confined_Services-File_Transfer_Protocol.html b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Managing_Confined_Services-File_Transfer_Protocol.html
index 3d60a38..2f4dea6 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Managing_Confined_Services-File_Transfer_Protocol.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Managing_Confined_Services-File_Transfer_Protocol.html
@@ -9,9 +9,9 @@
               </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="ch10.html" title="Chapter 10. Managing Confined Services" /><link rel="prev" href="sect-Managing_Confined_Services-Configuration_examples-Sharing_a_website.html" title="10.4.4.2. Sharing a website" /><link rel="next" href="sect-Managing_Confined_Services-File_Transfer_Protocol-Types.html" title="10.5.2. Types" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Managin
 g_Confined_Services-Configuration_examples-Sharing_a_website.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="sect-Managing_Confined_Services-File_Transfer_Protocol-Types.html"><strong>Next</strong></a></li></ul><div xml:lang="en-US" class="section" id="sect-Managing_Confined_Services-File_Transfer_Protocol" lang="en-US"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">10.5. File Transfer Protocol</h2></div></div></div><div class="para">
 		From the <a href="http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Deployment_Guide/index.html">Red Hat Enterprise Linux 5 Deployment Guide</a>:
 	</div><div class="para">
-		File Transfer Protocol (FTP) is one of the oldest and most commonly used protocols found on the Internet today. Its purpose is to reliably transfer files between computer hosts on a network without requiring the user to log directly into the remote host or have knowledge of how to use the remote system. It allows users to access files on remote systems using a standard set of simple commands.<a href="#ftn.idm219022107440" class="footnote"><sup class="footnote" id="idm219022107440">[39]</sup></a>
+		File Transfer Protocol (FTP) is one of the oldest and most commonly used protocols found on the Internet today. Its purpose is to reliably transfer files between computer hosts on a network without requiring the user to log directly into the remote host or have knowledge of how to use the remote system. It allows users to access files on remote systems using a standard set of simple commands.<a href="#ftn.idm219166159712" class="footnote"><sup class="footnote" id="idm219166159712">[38]</sup></a>
 	</div><div class="para">
-		The Very Secure FTP Daemon (<code class="systemitem">vsftpd</code>) is designed from the ground up to be fast, stable, and, most importantly, secure. Its ability to handle large numbers of connections efficiently and securely is why <code class="systemitem">vsftpd</code> is the only stand-alone FTP distributed with Red Hat Enterprise Linux.<a href="#ftn.idm219035173744" class="footnote"><sup class="footnote" id="idm219035173744">[40]</sup></a>
+		The Very Secure FTP Daemon (<code class="systemitem">vsftpd</code>) is designed from the ground up to be fast, stable, and, most importantly, secure. Its ability to handle large numbers of connections efficiently and securely is why <code class="systemitem">vsftpd</code> is the only stand-alone FTP distributed with Red Hat Enterprise Linux.<a href="#ftn.idm219200238112" class="footnote"><sup class="footnote" id="idm219200238112">[39]</sup></a>
 	</div><div class="para">
 		In Fedora, the <span class="package">vsftpd</span> package provides the Very Secure FTP daemon. Run <code class="command">rpm -q vsftpd</code> to see if <span class="package">vsftpd</span> is installed:
 	</div><pre class="screen">
@@ -77,8 +77,8 @@ ftp&gt; ls
 226 Directory Send OK.
 ftp&gt;
 
-</pre></li></ol></div></div><div class="footnotes"><br /><hr /><div id="ftn.idm219022107440" class="footnote"><div class="para"><a href="#idm219022107440" class="para"><sup class="para">[39] </sup></a>
+</pre></li></ol></div></div><div class="footnotes"><br /><hr /><div id="ftn.idm219166159712" class="footnote"><div class="para"><a href="#idm219166159712" class="para"><sup class="para">[38] </sup></a>
 			The first paragraph of "Chapter 23. FTP" of the Red Hat Enterprise Linux 5 Deployment Guide: <a href="http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Deployment_Guide/ch-ftp.html">http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Deployment_Guide/ch-ftp.html</a>. Copyright © 2007 Red Hat, Inc.
-		</div></div><div id="ftn.idm219035173744" class="footnote"><div class="para"><a href="#idm219035173744" class="para"><sup class="para">[40] </sup></a>
+		</div></div><div id="ftn.idm219200238112" class="footnote"><div class="para"><a href="#idm219200238112" class="para"><sup class="para">[39] </sup></a>
 			The first paragraph of the "23.2.1. vsftpd" section of the Red Hat Enterprise Linux 5 Deployment Guide: <a href="http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Deployment_Guide/s1-ftp-servers.html#s2-ftp-servers-vsftpd">http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Deployment_Guide/s1-ftp-servers.html#s2-ftp-servers-vsftpd</a>. Copyright © 2007 Red Hat, Inc.
 		</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Managing_Confined_Services-Configuration_examples-Sharing_a_website.html"><strong>Prev</strong>10.4.4.2. Sharing a website</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Managing_Confined_Services-File_Transfer_Protocol-Types.html"><strong>Next</strong>10.5.2. Types</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Managing_Confined_Services-Samba.html b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Managing_Confined_Services-Samba.html
index 1d6172a..5647ff6 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Managing_Confined_Services-Samba.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Managing_Confined_Services-Samba.html
@@ -9,7 +9,7 @@
               </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="ch10.html" title="Chapter 10. Managing Confined Services" /><link rel="prev" href="sect-Managing_Confined_Services-Configuration_examples-Changing_port_numbers.html" title="10.3.4.4. Changing port numbers" /><link rel="next" href="sect-Managing_Confined_Services-Samba-Types.html" title="10.4.2. Types" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Managing_Confine
 d_Services-Configuration_examples-Changing_port_numbers.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="sect-Managing_Confined_Services-Samba-Types.html"><strong>Next</strong></a></li></ul><div xml:lang="en-US" class="section" id="sect-Managing_Confined_Services-Samba" lang="en-US"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">10.4. Samba</h2></div></div></div><div class="para">
 		From the <a href="http://samba.org/">Samba</a> website:
 	</div><div class="para">
-		"Samba is an <a href="http://www.opensource.org/">Open Source</a>/<a href="http://www.gnu.org/philosophy/free-sw.html">Free Software</a> suite that has, <a href="http://us1.samba.org/samba/docs/10years.html">since 1992</a>, provided file and print services to all manner of SMB/CIFS clients, including the numerous versions of Microsoft Windows operating systems. Samba is freely available under the <a href="http://us1.samba.org/samba/docs/GPL.html">GNU General Public License</a>.".<a href="#ftn.idm218990281760" class="footnote"><sup class="footnote" id="idm218990281760">[38]</sup></a>
+		"Samba is an <a href="http://www.opensource.org/">Open Source</a>/<a href="http://www.gnu.org/philosophy/free-sw.html">Free Software</a> suite that has, <a href="http://us1.samba.org/samba/docs/10years.html">since 1992</a>, provided file and print services to all manner of SMB/CIFS clients, including the numerous versions of Microsoft Windows operating systems. Samba is freely available under the <a href="http://us1.samba.org/samba/docs/GPL.html">GNU General Public License</a>.".<a href="#ftn.idm219219588000" class="footnote"><sup class="footnote" id="idm219219588000">[37]</sup></a>
 	</div><div class="para">
 		In Fedora, the <span class="package">samba</span> package provides the Samba server. Run <code class="command">rpm -q samba</code> to see if the <span class="package">samba</span> package is installed. If it is not installed and you want to use Samba, run the following command as the root user to install it:
 	</div><pre class="screen">
@@ -38,6 +38,6 @@ unconfined_u:system_r:smbd_t:s0 <em class="replaceable"><code>16422</code></em>
 					The SELinux context associated with the <code class="systemitem">smbd</code> processes is <code class="computeroutput">unconfined_u:system_r:smbd_t:s0</code>. The second last part of the context, <code class="computeroutput">smbd_t</code>, is the type. A type defines a domain for processes and a type for files. In this case, the <code class="systemitem">smbd</code> processes are running in the smbd_t domain.
 				</div></li></ol></div><div class="para">
 			Files must be labeled correctly to allow <code class="systemitem">smbd</code> to access and share them. For example, <code class="systemitem">smbd</code> can read and write to files labeled with the <code class="computeroutput">samba_share_t</code> type, but by default, can not access files labeled with the <code class="computeroutput">httpd_sys_content_t</code> type, which is intended for use by the Apache HTTP Server. Booleans must be turned on to allow certain behavior, such as allowing home directories and NFS file systems to be exported through Samba, as well as to allow Samba to act as a domain controller.
-		</div></div><div class="footnotes"><br /><hr /><div id="ftn.idm218990281760" class="footnote"><div class="para"><a href="#idm218990281760" class="para"><sup class="para">[38] </sup></a>
+		</div></div><div class="footnotes"><br /><hr /><div id="ftn.idm219219588000" class="footnote"><div class="para"><a href="#idm219219588000" class="para"><sup class="para">[37] </sup></a>
 			From the opening paragraph on the Samba website: <a href="http://samba.org">http://samba.org</a>. Accessed 20 January 2009.
 		</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Managing_Confined_Services-Configuration_examples-Changing_port_numbers.html"><strong>Prev</strong>10.3.4.4. Changing port numbers</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Managing_Confined_Services-Samba-Types.html"><strong>Next</strong>10.4.2. Types</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Managing_Confined_Services-Targeted_policy-Confined_processes.html b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Managing_Confined_Services-Targeted_policy-Confined_processes.html
index ee84ec1..add8c34 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Managing_Confined_Services-Targeted_policy-Confined_processes.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Managing_Confined_Services-Targeted_policy-Confined_processes.html
@@ -28,7 +28,7 @@ Policy from config file:        targeted
 					Run the <code class="command">ls -Z /var/www/html/testfile</code> command to view the SELinux context:
 				</div><pre class="screen">-rw-r--r--  root root unconfined_u:object_r:httpd_sys_content_t:s0 /var/www/html/testfile
 </pre><div class="para">
-					The <code class="filename">testfile</code> file is labeled with the SELinux <code class="computeroutput">unconfined_u</code> user because a Linux user that is mapped to the <code class="computeroutput">unconfined_u</code> SELinux user created the file. Role-Based Access Control (RBAC) is used for processes, not files. Roles do not have a meaning for files - the <code class="computeroutput">object_r</code> role is a generic role used for files (on persistent storage and network file systems). Under the <code class="filename">/proc/</code> directory, files related to processes may use the <code class="computeroutput">system_r</code> role.<a href="#ftn.idm219025150144" class="footnote"><sup class="footnote" id="idm219025150144">[35]</sup></a> The <code class="computeroutput">httpd_sys_content_t</code> type allows the <code class="systemitem">httpd</code> process to access this file.
+					The <code class="filename">testfile</code> file is labeled with the SELinux <code class="computeroutput">unconfined_u</code> user because a Linux user that is mapped to the <code class="computeroutput">unconfined_u</code> SELinux user created the file. Role-Based Access Control (RBAC) is used for processes, not files. Roles do not have a meaning for files - the <code class="computeroutput">object_r</code> role is a generic role used for files (on persistent storage and network file systems). Under the <code class="filename">/proc/</code> directory, files related to processes may use the <code class="computeroutput">system_r</code> role.<a href="#ftn.idm219173834864" class="footnote"><sup class="footnote" id="idm219173834864">[34]</sup></a> The <code class="computeroutput">httpd_sys_content_t</code> type allows the <code class="systemitem">httpd</code> process to access this file.
 				</div></li><li class="listitem"><div class="para">
 					As the root user, run the <code class="command">service httpd start</code> command to start the <code class="systemitem">httpd</code> process. The output is as follows if <code class="systemitem">httpd</code> starts successfully:
 				</div><pre class="screen"># /sbin/service httpd start
@@ -78,6 +78,6 @@ type=SYSCALL msg=audit(1220706212.937:70): arch=40000003 syscall=196 success=no
 </pre><div class="para">
 			Also, an error similar to the following is logged to <code class="filename">/var/log/httpd/error_log</code>:
 		</div><pre class="screen">[Sat Apr 06 23:00:54 2009] [error] [client <em class="replaceable"><code>127.0.0.1</code></em>] (13)Permission denied: access to /testfile denied
-</pre><div class="footnotes"><br /><hr /><div id="ftn.idm219025150144" class="footnote"><div class="para"><a href="#idm219025150144" class="para"><sup class="para">[35] </sup></a>
+</pre><div class="footnotes"><br /><hr /><div id="ftn.idm219173834864" class="footnote"><div class="para"><a href="#idm219173834864" class="para"><sup class="para">[34] </sup></a>
 						When using other policies, such as MLS, other roles may be used, for example, <code class="computeroutput">secadm_r</code>.
 					</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Managing_Confined_Services-Targeted_policy.html"><strong>Prev</strong>10.2. Targeted policy</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Managing_Confined_Services-Targeted_policy-Unconfined_processes.html"><strong>Next</strong>10.2.3. Unconfined processes</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Managing_Confined_Services-Targeted_policy-Unconfined_processes.html b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Managing_Confined_Services-Targeted_policy-Unconfined_processes.html
index c6cd7f6..b4ffd2f 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Managing_Confined_Services-Targeted_policy-Unconfined_processes.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Managing_Confined_Services-Targeted_policy-Unconfined_processes.html
@@ -28,7 +28,7 @@ Policy from config file:        targeted
 					Run the <code class="command">ls -Z /var/www/html/test2file</code> command to view the SELinux context:
 				</div><pre class="screen">-rw-r--r--  root root unconfined_u:object_r:httpd_sys_content_t:s0 /var/www/html/test2file
 </pre><div class="para">
-					<code class="filename">test2file</code> is labeled with the SELinux <code class="computeroutput">unconfined_u</code> user because a Linux user that is mapped to the <code class="computeroutput">unconfined_u</code> SELinux user created the file. RBAC is used for processes, not files. Roles do not have a meaning for files - the <code class="computeroutput">object_r</code> role is a generic role used for files (on persistent storage and network file systems). Under the <code class="filename">/proc/</code> directory, files related to processes may use the <code class="computeroutput">system_r</code> role.<a href="#ftn.idm219020479120" class="footnote"><sup class="footnote" id="idm219020479120">[36]</sup></a> The <code class="computeroutput">httpd_sys_content_t</code> type allows the <code class="systemitem">httpd</code> process to access this file.
+					<code class="filename">test2file</code> is labeled with the SELinux <code class="computeroutput">unconfined_u</code> user because a Linux user that is mapped to the <code class="computeroutput">unconfined_u</code> SELinux user created the file. RBAC is used for processes, not files. Roles do not have a meaning for files - the <code class="computeroutput">object_r</code> role is a generic role used for files (on persistent storage and network file systems). Under the <code class="filename">/proc/</code> directory, files related to processes may use the <code class="computeroutput">system_r</code> role.<a href="#ftn.idm219191181056" class="footnote"><sup class="footnote" id="idm219191181056">[35]</sup></a> The <code class="computeroutput">httpd_sys_content_t</code> type allows the <code class="systemitem">httpd</code> process to access this file.
 				</div></li><li class="listitem"><div class="para">
 					The <code class="command">chcon</code> command relabels files; however, such label changes do not survive when the file system is relabeled. For permanent changes that survive a file system relabel, use the <code class="command">semanage</code> command, which is discussed later. As the root user, run the following command to change the type to a type used by Samba:
 				</div><div class="para">
@@ -112,6 +112,6 @@ unconfined_u:system_r:httpd_t    8889 ?        00:00:00 httpd
 Stopping httpd:                                            [  OK  ]
 </pre></li></ol></div><div class="para">
 			The examples in these sections demonstrate how data can be protected from a compromised confined process (protected by SELinux), as well as how data is more accessible to an attacker from a compromised unconfined process (not protected by SELinux).
-		</div><div class="footnotes"><br /><hr /><div id="ftn.idm219020479120" class="footnote"><div class="para"><a href="#idm219020479120" class="para"><sup class="para">[36] </sup></a>
+		</div><div class="footnotes"><br /><hr /><div id="ftn.idm219191181056" class="footnote"><div class="para"><a href="#idm219191181056" class="para"><sup class="para">[35] </sup></a>
 						When using other policies, such as MLS, other roles may also be used, for example, <code class="computeroutput">secadm_r</code>.
 					</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Managing_Confined_Services-Targeted_policy-Confined_processes.html"><strong>Prev</strong>10.2.2. Confined processes</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Managing_Confined_Services-The_Apache_HTTP_Server.html"><strong>Next</strong>10.3. The Apache HTTP Server</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Managing_Confined_Services-The_Apache_HTTP_Server.html b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Managing_Confined_Services-The_Apache_HTTP_Server.html
index 5a850c5..5dac6cd 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Managing_Confined_Services-The_Apache_HTTP_Server.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Managing_Confined_Services-The_Apache_HTTP_Server.html
@@ -9,7 +9,7 @@
               </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="ch10.html" title="Chapter 10. Managing Confined Services" /><link rel="prev" href="sect-Managing_Confined_Services-Targeted_policy-Unconfined_processes.html" title="10.2.3. Unconfined processes" /><link rel="next" href="sect-Managing_Confined_Services-The_Apache_HTTP_Server-Types.html" title="10.3.2. Types" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Managing_C
 onfined_Services-Targeted_policy-Unconfined_processes.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="sect-Managing_Confined_Services-The_Apache_HTTP_Server-Types.html"><strong>Next</strong></a></li></ul><div xml:lang="en-US" class="section" id="sect-Managing_Confined_Services-The_Apache_HTTP_Server" lang="en-US"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">10.3. The Apache HTTP Server</h2></div></div></div><div class="para">
 		From the <a href="http://httpd.apache.org/">Apache HTTP Server Project</a> page:
 	</div><div class="para">
-		"The Apache HTTP Server Project is an effort to develop and maintain an open-source HTTP server for modern operating systems including UNIX and Windows NT. The goal of this project is to provide a secure, efficient and extensible server that provides HTTP services in sync with the current HTTP standards".<a href="#ftn.idm219022775344" class="footnote"><sup class="footnote" id="idm219022775344">[37]</sup></a>
+		"The Apache HTTP Server Project is an effort to develop and maintain an open-source HTTP server for modern operating systems including UNIX and Windows NT. The goal of this project is to provide a secure, efficient and extensible server that provides HTTP services in sync with the current HTTP standards".<a href="#ftn.idm219170679952" class="footnote"><sup class="footnote" id="idm219170679952">[36]</sup></a>
 	</div><div class="para">
 		In Fedora, the <span class="package">httpd</span> package provides the Apache HTTP Server. Run <code class="command">rpm -q httpd</code> to see if the <span class="package">httpd</span> package is installed. If it is not installed and you want to use the Apache HTTP Server, run the following command as the root user to install it:
 	</div><pre class="screen">
@@ -108,6 +108,6 @@ Accept-Ranges: bytes
 Content-Length: 3918
 Content-Type: text/html; charset=UTF-8
 [...continues...]
-</pre></li></ol></div></div><div class="footnotes"><br /><hr /><div id="ftn.idm219022775344" class="footnote"><div class="para"><a href="#idm219022775344" class="para"><sup class="para">[37] </sup></a>
+</pre></li></ol></div></div><div class="footnotes"><br /><hr /><div id="ftn.idm219170679952" class="footnote"><div class="para"><a href="#idm219170679952" class="para"><sup class="para">[36] </sup></a>
 			From the "The Number One HTTP Server On The Internet" section of the Apache HTTP Server Project page: <a href="http://httpd.apache.org/">http://httpd.apache.org/</a>. Copyright © 2010 The Apache Software Foundation. Accessed 1 March 2010.
 		</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Managing_Confined_Services-Targeted_policy-Unconfined_processes.html"><strong>Prev</strong>10.2.3. Unconfined processes</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Managing_Confined_Services-The_Apache_HTTP_Server-Types.html"><strong>Next</strong>10.3.2. Types</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Fixing_Problems-Allowing_Access_audit2allow.html b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Fixing_Problems-Allowing_Access_audit2allow.html
index 1b91a71..9d0b454 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Fixing_Problems-Allowing_Access_audit2allow.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Fixing_Problems-Allowing_Access_audit2allow.html
@@ -9,7 +9,7 @@
               </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security-Enhanced_Linux-Troubleshooting-Fixing_Problems.html" title="9.6.3. Fixing Problems" /><link rel="prev" href="sect-Security-Enhanced_Linux-Fixing_Problems-sealert_Messages.html" title="9.6.3.7. sealert Messages" /><link rel="next" href="sect-Security-Enhanced_Linux-Further_Information.html" title="9.7. Further Information" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accessk
 ey="p" href="sect-Security-Enhanced_Linux-Fixing_Problems-sealert_Messages.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="sect-Security-Enhanced_Linux-Further_Information.html"><strong>Next</strong></a></li></ul><div class="section" id="sect-Security-Enhanced_Linux-Fixing_Problems-Allowing_Access_audit2allow"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">9.6.3.8. Allowing Access: audit2allow</h4></div></div></div><div class="para">
 				Do not use the example in this section in production. It is used only to demonstrate the use of <code class="command">audit2allow</code>.
 			</div><div class="para">
-				From the <span class="citerefentry"><span class="refentrytitle">audit2allow</span>(1)</span> manual page: "<code class="command">audit2allow</code> - generate SELinux policy allow rules from logs of denied operations"<a href="#ftn.idm219034521568" class="footnote"><sup class="footnote" id="idm219034521568">[32]</sup></a>. After analyzing denials as per <a class="xref" href="sect-Security-Enhanced_Linux-Fixing_Problems-sealert_Messages.html">Section 9.6.3.7, “sealert Messages”</a>, and if no label changes or Booleans allowed access, use <code class="command">audit2allow</code> to create a local policy module. After access is denied by SELinux, running the <code class="command">audit2allow</code> command presents Type Enforcement rules that allow the previously denied access.
+				From the <span class="citerefentry"><span class="refentrytitle">audit2allow</span>(1)</span> manual page: "<code class="command">audit2allow</code> - generate SELinux policy allow rules from logs of denied operations"<a href="#ftn.idm219194195296" class="footnote"><sup class="footnote" id="idm219194195296">[31]</sup></a>. After analyzing denials as per <a class="xref" href="sect-Security-Enhanced_Linux-Fixing_Problems-sealert_Messages.html">Section 9.6.3.7, “sealert Messages”</a>, and if no label changes or Booleans allowed access, use <code class="command">audit2allow</code> to create a local policy module. After access is denied by SELinux, running the <code class="command">audit2allow</code> command presents Type Enforcement rules that allow the previously denied access.
 			</div><div class="para">
 				The following example demonstrates using <code class="command">audit2allow</code> to create a policy module:
 			</div><div class="orderedlist"><ol><li class="listitem"><div class="para">
@@ -67,6 +67,6 @@ To make this policy package active, execute:
 # /usr/sbin/semodule -i mycertwatch2.pp
 </pre><div class="para">
 				Refer to Dan Walsh's <a href="http://danwalsh.livejournal.com/24750.html">"Using audit2allow to build policy modules. Revisited."</a> blog entry for further information about using <code class="command">audit2allow</code> to build policy modules.
-			</div><div class="footnotes"><br /><hr /><div id="ftn.idm219034521568" class="footnote"><div class="para"><a href="#idm219034521568" class="para"><sup class="para">[32] </sup></a>
+			</div><div class="footnotes"><br /><hr /><div id="ftn.idm219194195296" class="footnote"><div class="para"><a href="#idm219194195296" class="para"><sup class="para">[31] </sup></a>
 					From the <span class="citerefentry"><span class="refentrytitle">audit2allow</span>(1)</span> manual page, as shipped with the <span class="package">policycoreutils</span> package in Fedora 19.
 				</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security-Enhanced_Linux-Fixing_Problems-sealert_Messages.html"><strong>Prev</strong>9.6.3.7. sealert Messages</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security-Enhanced_Linux-Further_Information.html"><strong>Next</strong>9.7. Further Information</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Fixing_Problems-Searching_For_and_Viewing_Denials.html b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Fixing_Problems-Searching_For_and_Viewing_Denials.html
index 9686ecc..a6537ae 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Fixing_Problems-Searching_For_and_Viewing_Denials.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Fixing_Problems-Searching_For_and_Viewing_Denials.html
@@ -9,9 +9,9 @@
               </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security-Enhanced_Linux-Troubleshooting-Fixing_Problems.html" title="9.6.3. Fixing Problems" /><link rel="prev" href="sect-Security-Enhanced_Linux-Permissive_Domains-Denials_for_Permissive_Domains.html" title="9.6.3.4.2. Denials for Permissive Domains" /><link rel="next" href="sect-Security-Enhanced_Linux-Fixing_Problems-Raw_Audit_Messages.html" title="9.6.3.6. Raw Audit Messages" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p
 ><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security-Enhanced_Linux-Permissive_Domains-Denials_for_Permissive_Domains.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="sect-Security-Enhanced_Linux-Fixing_Problems-Raw_Audit_Messages.html"><strong>Next</strong></a></li></ul><div class="section" id="sect-Security-Enhanced_Linux-Fixing_Problems-Searching_For_and_Viewing_Denials"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">9.6.3.5. Searching For and Viewing Denials</h4></div></div></div><div class="para">
 				This section assumes the <span class="package">setroubleshoot</span>, <span class="package">setroubleshoot-server</span>, <span class="package">dbus</span> and <span class="package">audit</span> packages are installed, and that the <code class="systemitem">auditd</code>, <code class="systemitem">rsyslogd</code>, and <code class="systemitem">setroubleshootd</code> daemons are running. Refer to <a class="xref" href="sect-Security-Enhanced_Linux-Working_with_SELinux-Which_Log_File_is_Used.html">Section 9.4.2, “Which Log File is Used”</a> for information about starting these daemons. A number of tools are available for searching for and viewing SELinux denials, such as <code class="command">ausearch</code>, <code class="command">aureport</code>, and <code class="command">sealert</code>.
 			</div><div class="formalpara" id="form-Security-Enhanced_Linux-Searching_For_and_Viewing_Denials-ausearch"><h5 class="formalpara">ausearch</h5>
-					The <span class="package">audit</span> package provides <code class="command">ausearch</code>. From the <span class="citerefentry"><span class="refentrytitle">ausearch</span>(8)</span> manual page: "<code class="command">ausearch</code> is a tool that can query the audit daemon logs based for events based on different search criteria"<a href="#ftn.idm219018628304" class="footnote"><sup class="footnote" id="idm219018628304">[29]</sup></a>. The <code class="command">ausearch</code> tool accesses <code class="filename">/var/log/audit/audit.log</code>, and as such, must be run as the Linux root user:
+					The <span class="package">audit</span> package provides <code class="command">ausearch</code>. From the <span class="citerefentry"><span class="refentrytitle">ausearch</span>(8)</span> manual page: "<code class="command">ausearch</code> is a tool that can query the audit daemon logs based for events based on different search criteria"<a href="#ftn.idm219184399360" class="footnote"><sup class="footnote" id="idm219184399360">[28]</sup></a>. The <code class="command">ausearch</code> tool accesses <code class="filename">/var/log/audit/audit.log</code>, and as such, must be run as the Linux root user:
 				</div><div class="segmentedlist"><table border="0"><thead><tr class="segtitle"><th>Searching For</th><th>Command</th></tr></thead><tbody><tr class="seglistitem"><td class="seg">all denials</td><td class="seg"><code class="command">/sbin/ausearch -m avc</code></td></tr><tr class="seglistitem"><td class="seg">denials for that today</td><td class="seg"><code class="command">/sbin/ausearch -m avc -ts today</code></td></tr><tr class="seglistitem"><td class="seg">denials from the last 10 minutes</td><td class="seg"><code class="command">/sbin/ausearch -m avc -ts recent</code></td></tr></tbody></table></div><div class="para">
-				To search for SELinux denials for a particular service, use the <code class="option">-c <em class="replaceable"><code>comm-name</code></em></code> option, where <em class="replaceable"><code>comm-name</code></em> "is the executable’s name"<a href="#ftn.idm219034943904" class="footnote"><sup class="footnote" id="idm219034943904">[30]</sup></a>, for example, <code class="systemitem">httpd</code> for the Apache HTTP Server, and <code class="systemitem">smbd</code> for Samba:
+				To search for SELinux denials for a particular service, use the <code class="option">-c <em class="replaceable"><code>comm-name</code></em></code> option, where <em class="replaceable"><code>comm-name</code></em> "is the executable’s name"<a href="#ftn.idm219200255280" class="footnote"><sup class="footnote" id="idm219200255280">[29]</sup></a>, for example, <code class="systemitem">httpd</code> for the Apache HTTP Server, and <code class="systemitem">smbd</code> for Samba:
 			</div><div class="para">
 				<code class="command">/sbin/ausearch -m avc -c httpd</code>
 			</div><div class="para">
@@ -19,7 +19,7 @@
 			</div><div class="para">
 				Refer to the <span class="citerefentry"><span class="refentrytitle">ausearch</span>(8)</span> manual page for further <code class="command">ausearch</code> options.
 			</div><div class="formalpara" id="form-Security-Enhanced_Linux-Searching_For_and_Viewing_Denials-aureport"><h5 class="formalpara">aureport</h5>
-					The <span class="package">audit</span> package provides <code class="command">aureport</code>. From the <span class="citerefentry"><span class="refentrytitle">aureport</span>(8)</span> manual page: "<code class="command">aureport</code> is a tool that produces summary reports of the audit system logs"<a href="#ftn.idm219032357696" class="footnote"><sup class="footnote" id="idm219032357696">[31]</sup></a>. The <code class="command">aureport</code> tool accesses <code class="filename">/var/log/audit/audit.log</code>, and as such, must be run as the Linux root user. To view a list of SELinux denials and how often each one occurred, run the <code class="command">aureport -a</code> command. The following is example output that includes two denials:
+					The <span class="package">audit</span> package provides <code class="command">aureport</code>. From the <span class="citerefentry"><span class="refentrytitle">aureport</span>(8)</span> manual page: "<code class="command">aureport</code> is a tool that produces summary reports of the audit system logs"<a href="#ftn.idm219196715280" class="footnote"><sup class="footnote" id="idm219196715280">[30]</sup></a>. The <code class="command">aureport</code> tool accesses <code class="filename">/var/log/audit/audit.log</code>, and as such, must be run as the Linux root user. To view a list of SELinux denials and how often each one occurred, run the <code class="command">aureport -a</code> command. The following is example output that includes two denials:
 				</div><pre class="screen">
 # /sbin/aureport -a
 
@@ -47,10 +47,10 @@ setroubleshoot: SELinux is preventing httpd (httpd_t) "getattr" to /var/www/html
 						As the Linux root user, run the <code class="command">sealert -a /var/log/audit/audit.log -H &gt; audit.html</code> command to create a HTML version of the <code class="command">sealert</code> analysis, as seen with the <code class="command">sealert</code> GUI.
 					</div></li></ul></div><div class="para">
 				Refer to the <span class="citerefentry"><span class="refentrytitle">sealert</span>(8)</span> manual page for further <code class="command">sealert</code> options.
-			</div><div class="footnotes"><br /><hr /><div id="ftn.idm219018628304" class="footnote"><div class="para"><a href="#idm219018628304" class="para"><sup class="para">[29] </sup></a>
+			</div><div class="footnotes"><br /><hr /><div id="ftn.idm219184399360" class="footnote"><div class="para"><a href="#idm219184399360" class="para"><sup class="para">[28] </sup></a>
 						From the <span class="citerefentry"><span class="refentrytitle">ausearch</span>(8)</span> manual page, as shipped with the <span class="package">audit</span> package in Fedora 19.
-					</div></div><div id="ftn.idm219034943904" class="footnote"><div class="para"><a href="#idm219034943904" class="para"><sup class="para">[30] </sup></a>
+					</div></div><div id="ftn.idm219200255280" class="footnote"><div class="para"><a href="#idm219200255280" class="para"><sup class="para">[29] </sup></a>
 					From the <span class="citerefentry"><span class="refentrytitle">ausearch</span>(8)</span> manual page, as shipped with the <span class="package">audit</span> package in Fedora 19.
-				</div></div><div id="ftn.idm219032357696" class="footnote"><div class="para"><a href="#idm219032357696" class="para"><sup class="para">[31] </sup></a>
+				</div></div><div id="ftn.idm219196715280" class="footnote"><div class="para"><a href="#idm219196715280" class="para"><sup class="para">[30] </sup></a>
 						From the <span class="citerefentry"><span class="refentrytitle">aureport</span>(8)</span> manual page, as shipped with the <span class="package">audit</span> package in Fedora 19.
 					</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security-Enhanced_Linux-Permissive_Domains-Denials_for_Permissive_Domains.html"><strong>Prev</strong>9.6.3.4.2. Denials for Permissive Domains</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security-Enhanced_Linux-Fixing_Problems-Raw_Audit_Messages.html"><strong>Next</strong>9.6.3.6. Raw Audit Messages</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Maintaining_SELinux_Labels_-Checking_the_Default_SELinux_Context.html b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Maintaining_SELinux_Labels_-Checking_the_Default_SELinux_Context.html
index 7ed1277..a9832f3 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Maintaining_SELinux_Labels_-Checking_the_Default_SELinux_Context.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Maintaining_SELinux_Labels_-Checking_the_Default_SELinux_Context.html
@@ -7,7 +7,7 @@
               addID('Fedora.19.books');
 	      addID('Fedora.19.Security_Guide');
               </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security-Enhanced_Linux-Working_with_SELinux-Maintaining_SELinux_Labels_.html" title="9.4.10. Maintaining SELinux Labels" /><link rel="prev" href="sect-Security-Enhanced_Linux-Maintaining_SELinux_Labels_-Moving_Files_and_Directories.html" title="9.4.10.2. Moving Files and Directories" /><link rel="next" href="sect-Security-Enhanced_Linux-Maintaining_SELinux_Labels_-Archiving_Files_with_tar.html" title="9.4.10.4. Archiving Files with tar" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/
 images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security-Enhanced_Linux-Maintaining_SELinux_Labels_-Moving_Files_and_Directories.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="sect-Security-Enhanced_Linux-Maintaining_SELinux_Labels_-Archiving_Files_with_tar.html"><strong>Next</strong></a></li></ul><div class="section" id="sect-Security-Enhanced_Linux-Maintaining_SELinux_Labels_-Checking_the_Default_SELinux_Context"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">9.4.10.3. Checking the Default SELinux Context</h4></div></div></div><div class="para">
-				Use the <code class="command">/usr/sbin/matchpathcon</code> command to check if files and directories have the correct SELinux context. From the <span class="citerefentry"><span class="refentrytitle">matchpathcon</span>(8)</span> manual page: "<code class="command">matchpathcon</code> queries the system policy and outputs the default security context associated with the file path."<a href="#ftn.idm219030374912" class="footnote"><sup class="footnote" id="idm219030374912">[26]</sup></a>. The following example demonstrates using the <code class="command">/usr/sbin/matchpathcon</code> command to verify that files in <code class="filename">/var/www/html/</code> directory are labeled correctly:
+				Use the <code class="command">/usr/sbin/matchpathcon</code> command to check if files and directories have the correct SELinux context. From the <span class="citerefentry"><span class="refentrytitle">matchpathcon</span>(8)</span> manual page: "<code class="command">matchpathcon</code> queries the system policy and outputs the default security context associated with the file path."<a href="#ftn.idm219216476768" class="footnote"><sup class="footnote" id="idm219216476768">[25]</sup></a>. The following example demonstrates using the <code class="command">/usr/sbin/matchpathcon</code> command to verify that files in <code class="filename">/var/www/html/</code> directory are labeled correctly:
 			</div><div class="orderedlist"><ol><li class="listitem"><div class="para">
 						As the Linux root user, run the <code class="command">touch /var/www/html/file{1,2,3}</code> command to create three files (<code class="filename">file1</code>, <code class="filename">file2</code>, and <code class="filename">file3</code>). These files inherit the <code class="computeroutput">httpd_sys_content_t</code> type from the <code class="filename">/var/www/html/</code> directory:
 					</div><pre class="screen"># touch /var/www/html/file{1,2,3}
@@ -30,6 +30,6 @@
 				To resolve the label problem and allow the Apache HTTP Server access to <code class="filename">file1</code>, as the Linux root user, run the <code class="command">/sbin/restorecon -v /var/www/html/file1</code> command:
 			</div><pre class="screen"># /sbin/restorecon -v /var/www/html/file1
 restorecon reset /var/www/html/file1 context unconfined_u:object_r:samba_share_t:s0-&gt;system_u:object_r:httpd_sys_content_t:s0
-</pre><div class="footnotes"><br /><hr /><div id="ftn.idm219030374912" class="footnote"><div class="para"><a href="#idm219030374912" class="para"><sup class="para">[26] </sup></a>
+</pre><div class="footnotes"><br /><hr /><div id="ftn.idm219216476768" class="footnote"><div class="para"><a href="#idm219216476768" class="para"><sup class="para">[25] </sup></a>
 					The <span class="citerefentry"><span class="refentrytitle">matchpathcon</span>(8)</span> manual page, as shipped with the <span class="package">libselinux-utils</span> package in Fedora, is written by Daniel Walsh. Any edits or changes in this version were done by Murray McAllister.
 				</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security-Enhanced_Linux-Maintaining_SELinux_Labels_-Moving_Files_and_Directories.html"><strong>Prev</strong>9.4.10.2. Moving Files and Directories</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security-Enhanced_Linux-Maintaining_SELinux_Labels_-Archiving_Files_with_tar.html"><strong>Next</strong>9.4.10.4. Archiving Files with tar</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Mounting_File_Systems-Changing_the_Default_Context.html b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Mounting_File_Systems-Changing_the_Default_Context.html
index 38181f3..0d54a70 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Mounting_File_Systems-Changing_the_Default_Context.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Mounting_File_Systems-Changing_the_Default_Context.html
@@ -15,11 +15,11 @@
 </pre><div class="para">
 				In this example:
 			</div><div class="itemizedlist"><ul><li class="listitem"><div class="para">
-						the <code class="option">defcontext</code> option defines that <code class="computeroutput">system_u:object_r:samba_share_t:s0</code> is "the default security context for unlabeled files"<a href="#ftn.idm219010336720" class="footnote"><sup class="footnote" id="idm219010336720">[25]</sup></a>.
+						the <code class="option">defcontext</code> option defines that <code class="computeroutput">system_u:object_r:samba_share_t:s0</code> is "the default security context for unlabeled files"<a href="#ftn.idm219175166928" class="footnote"><sup class="footnote" id="idm219175166928">[24]</sup></a>.
 					</div></li><li class="listitem"><div class="para">
 						when mounted, the root directory (<code class="filename">/test/</code>) of the file system is treated as if it is labeled with the context specified by <code class="option">defcontext</code> (this label is not stored on disk). This affects the labeling for files created under <code class="filename">/test/</code>: new files inherit the <code class="computeroutput">samba_share_t</code> type, and these labels are stored on disk.
 					</div></li><li class="listitem"><div class="para">
 						files created under <code class="filename">/test/</code> while the file system was mounted with a <code class="option">defcontext</code> option retain their labels.
-					</div></li></ul></div><div class="footnotes"><br /><hr /><div id="ftn.idm219010336720" class="footnote"><div class="para"><a href="#idm219010336720" class="para"><sup class="para">[25] </sup></a>
+					</div></li></ul></div><div class="footnotes"><br /><hr /><div id="ftn.idm219175166928" class="footnote"><div class="para"><a href="#idm219175166928" class="para"><sup class="para">[24] </sup></a>
 							Morris, James. "Filesystem Labeling in SELinux". Published 1 October 2004. Accessed 14 October 2008: <a href="http://www.linuxjournal.com/article/7426">http://www.linuxjournal.com/article/7426</a>.
 						</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security-Enhanced_Linux-Working_with_SELinux-Mounting_File_Systems.html"><strong>Prev</strong>9.4.9. Mounting File Systems</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security-Enhanced_Linux-Mounting_File_Systems-Mounting_an_NFS_File_System.html"><strong>Next</strong>9.4.9.3. Mounting an NFS File System</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Targeted_Policy-Unconfined_Processes.html b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Targeted_Policy-Unconfined_Processes.html
index cb2eb07..40fc8f0 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Targeted_Policy-Unconfined_Processes.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Targeted_Policy-Unconfined_Processes.html
@@ -28,7 +28,7 @@ Policy from config file:        targeted
 					Run the <code class="command">ls -Z /var/www/html/test2file</code> command to view the SELinux context:
 				</div><pre class="screen">-rw-r--r--  root root unconfined_u:object_r:httpd_sys_content_t:s0 /var/www/html/test2file
 </pre><div class="para">
-					By default, Linux users run unconfined in Fedora, which is why the <code class="filename">test2file</code> file is labeled with the SELinux <code class="computeroutput">unconfined_u</code> user. RBAC is used for processes, not files. Roles do not have a meaning for files - the <code class="computeroutput">object_r</code> role is a generic role used for files (on persistent storage and network file systems). Under the <code class="filename">/proc/</code> directory, files related to processes may use the <code class="computeroutput">system_r</code> role.<a href="#ftn.idm219026121408" class="footnote"><sup class="footnote" id="idm219026121408">[21]</sup></a> The <code class="computeroutput">httpd_sys_content_t</code> type allows the <code class="systemitem">httpd</code> process to access this file.
+					By default, Linux users run unconfined in Fedora, which is why the <code class="filename">test2file</code> file is labeled with the SELinux <code class="computeroutput">unconfined_u</code> user. RBAC is used for processes, not files. Roles do not have a meaning for files - the <code class="computeroutput">object_r</code> role is a generic role used for files (on persistent storage and network file systems). Under the <code class="filename">/proc/</code> directory, files related to processes may use the <code class="computeroutput">system_r</code> role.<a href="#ftn.idm219220357088" class="footnote"><sup class="footnote" id="idm219220357088">[20]</sup></a> The <code class="computeroutput">httpd_sys_content_t</code> type allows the <code class="systemitem">httpd</code> process to access this file.
 				</div></li><li class="listitem"><div class="para">
 					The <code class="command">chcon</code> command relabels files; however, such label changes do not survive when the file system is relabeled. For permanent changes that survive a file system relabel, use the <code class="command">semanage</code> command, which is discussed later. As the Linux root user, run the following command to change the type to a type used by Samba:
 				</div><div class="para">
@@ -112,6 +112,6 @@ unconfined_u:system_r:httpd_t    8889 ?        00:00:00 httpd
 Stopping httpd:                                            [  OK  ]
 </pre></li></ol></div><div class="para">
 			The examples in these sections demonstrate how data can be protected from a compromised confined-process (protected by SELinux), as well as how data is more accessible to an attacker from a compromised unconfined-process (not protected by SELinux).
-		</div><div class="footnotes"><br /><hr /><div id="ftn.idm219026121408" class="footnote"><div class="para"><a href="#idm219026121408" class="para"><sup class="para">[21] </sup></a>
+		</div><div class="footnotes"><br /><hr /><div id="ftn.idm219220357088" class="footnote"><div class="para"><a href="#idm219220357088" class="para"><sup class="para">[20] </sup></a>
 						When using other policies, such as MLS, other roles may also be used, for example, <code class="computeroutput">secadm_r</code>.
 					</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security-Enhanced_Linux-Targeted_Policy.html"><strong>Prev</strong>9.3. Targeted Policy</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security-Enhanced_Linux-Targeted_Policy-Confined_and_Unconfined_Users.html"><strong>Next</strong>9.3.3. Confined and Unconfined Users</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Targeted_Policy.html b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Targeted_Policy.html
index a0493ff..41e8a45 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Targeted_Policy.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Targeted_Policy.html
@@ -32,7 +32,7 @@ Policy from config file:        targeted
 					Run the <code class="command">ls -Z /var/www/html/testfile</code> command to view the SELinux context:
 				</div><pre class="screen">-rw-r--r--  root root unconfined_u:object_r:httpd_sys_content_t:s0 /var/www/html/testfile
 </pre><div class="para">
-					By default, Linux users run unconfined in Fedora, which is why the <code class="filename">testfile</code> file is labeled with the SELinux <code class="computeroutput">unconfined_u</code> user. RBAC is used for processes, not files. Roles do not have a meaning for files - the <code class="computeroutput">object_r</code> role is a generic role used for files (on persistent storage and network file systems). Under the <code class="filename">/proc/</code> directory, files related to processes may use the <code class="computeroutput">system_r</code> role.<a href="#ftn.idm219025860624" class="footnote"><sup class="footnote" id="idm219025860624">[20]</sup></a> The <code class="computeroutput">httpd_sys_content_t</code> type allows the <code class="systemitem">httpd</code> process to access this file.
+					By default, Linux users run unconfined in Fedora, which is why the <code class="filename">testfile</code> file is labeled with the SELinux <code class="computeroutput">unconfined_u</code> user. RBAC is used for processes, not files. Roles do not have a meaning for files - the <code class="computeroutput">object_r</code> role is a generic role used for files (on persistent storage and network file systems). Under the <code class="filename">/proc/</code> directory, files related to processes may use the <code class="computeroutput">system_r</code> role.<a href="#ftn.idm219172822304" class="footnote"><sup class="footnote" id="idm219172822304">[19]</sup></a> The <code class="computeroutput">httpd_sys_content_t</code> type allows the <code class="systemitem">httpd</code> process to access this file.
 				</div></li><li class="listitem"><div class="para">
 					As the Linux root user, run the <code class="command">service httpd start</code> command to start the <code class="systemitem">httpd</code> process. The output is as follows if <code class="systemitem">httpd</code> starts successfully:
 				</div><pre class="screen"># /sbin/service httpd start
@@ -87,6 +87,6 @@ type=SYSCALL msg=audit(1220706212.937:70): arch=40000003 syscall=196 success=no
 </pre><div class="para">
 			Also, an error similar to the following is logged to <code class="filename">/var/log/httpd/error_log</code>:
 		</div><pre class="screen">[Tue May 11 13:23:49 2010] [error] [client <em class="replaceable"><code>::1</code></em>] (13)Permission denied: access to /testfile denied
-</pre></div><div class="footnotes"><br /><hr /><div id="ftn.idm219025860624" class="footnote"><div class="para"><a href="#idm219025860624" class="para"><sup class="para">[20] </sup></a>
+</pre></div><div class="footnotes"><br /><hr /><div id="ftn.idm219172822304" class="footnote"><div class="para"><a href="#idm219172822304" class="para"><sup class="para">[19] </sup></a>
 						When using other policies, such as MLS, other roles may be used, for example, <code class="computeroutput">secadm_r</code>.
 					</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security-Enhanced_Linux-SELinux_Contexts-SELinux_Contexts_for_Users.html"><strong>Prev</strong>9.2.3. SELinux Contexts for Users</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security-Enhanced_Linux-Targeted_Policy-Unconfined_Processes.html"><strong>Next</strong>9.3.2. Unconfined Processes</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Top_Three_Causes_of_Problems-How_are_Confined_Services_Running.html b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Top_Three_Causes_of_Problems-How_are_Confined_Services_Running.html
index 5f5f1f3..d4ba117 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Top_Three_Causes_of_Problems-How_are_Confined_Services_Running.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Top_Three_Causes_of_Problems-How_are_Confined_Services_Running.html
@@ -48,11 +48,11 @@ Unable to open logs
 			</div><pre class="screen">
 type=AVC msg=audit(1225948455.061:294): avc:  denied  { name_bind } for  pid=4997 comm="httpd" src=9876 scontext=unconfined_u:system_r:httpd_t:s0 tcontext=system_u:object_r:port_t:s0 tclass=tcp_socket
 </pre><div class="para">
-				To allow <code class="systemitem">httpd</code> to listen on a port that is not listed for the <code class="computeroutput">http_port_t</code> port type, run the <code class="command">semanage port</code> command to add a port to policy configuration<a href="#ftn.idm219002715120" class="footnote"><sup class="footnote" id="idm219002715120">[28]</sup></a>:
+				To allow <code class="systemitem">httpd</code> to listen on a port that is not listed for the <code class="computeroutput">http_port_t</code> port type, run the <code class="command">semanage port</code> command to add a port to policy configuration<a href="#ftn.idm219196005456" class="footnote"><sup class="footnote" id="idm219196005456">[27]</sup></a>:
 			</div><pre class="screen">
 # /usr/sbin/semanage port -a -t http_port_t -p tcp 9876
 </pre><div class="para">
 				The <code class="option">-a</code> option adds a new record; the <code class="option">-t</code> option defines a type; and the <code class="option">-p</code> option defines a protocol. The last argument is the port number to add.
-			</div><div class="footnotes"><br /><hr /><div id="ftn.idm219002715120" class="footnote"><div class="para"><a href="#idm219002715120" class="para"><sup class="para">[28] </sup></a>
+			</div><div class="footnotes"><br /><hr /><div id="ftn.idm219196005456" class="footnote"><div class="para"><a href="#idm219196005456" class="para"><sup class="para">[27] </sup></a>
 					The <code class="command">semanage port -a</code> command adds an entry to the <code class="filename">/etc/selinux/targeted/modules/active/ports.local</code> file. Note: by default, this file can only be viewed by the Linux root user.
 				</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security-Enhanced_Linux-Troubleshooting-Top_Three_Causes_of_Problems.html"><strong>Prev</strong>9.6.2. Top Three Causes of Problems</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security-Enhanced_Linux-Top_Three_Causes_of_Problems-Evolving_Rules_and_Broken_Applications.html"><strong>Next</strong>9.6.2.3. Evolving Rules and Broken Applications</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Troubleshooting-Top_Three_Causes_of_Problems.html b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Troubleshooting-Top_Three_Causes_of_Problems.html
index fa872c6..5a32713 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Troubleshooting-Top_Three_Causes_of_Problems.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Troubleshooting-Top_Three_Causes_of_Problems.html
@@ -16,7 +16,7 @@
 # /usr/sbin/semanage fcontext -a -t httpd_sys_content_t \
 "/srv/myweb(/.*)?"
 </pre><div class="para">
-				This <code class="command">semanage</code> command adds the context for the <code class="filename">/srv/myweb/</code> directory (and all files and directories under it) to the SELinux file-context configuration<a href="#ftn.idm219031080592" class="footnote"><sup class="footnote" id="idm219031080592">[27]</sup></a>. The <code class="command">semanage</code> command does not change the context. As the Linux root user, run the <code class="command">restorecon</code> command to apply the changes:
+				This <code class="command">semanage</code> command adds the context for the <code class="filename">/srv/myweb/</code> directory (and all files and directories under it) to the SELinux file-context configuration<a href="#ftn.idm219169427856" class="footnote"><sup class="footnote" id="idm219169427856">[26]</sup></a>. The <code class="command">semanage</code> command does not change the context. As the Linux root user, run the <code class="command">restorecon</code> command to apply the changes:
 			</div><pre class="screen">
 # /sbin/restorecon -R -v /srv/myweb
 </pre><div class="para">
@@ -40,6 +40,6 @@ restorecon reset /var/www/html/page1.html context unconfined_u:object_r:samba_sh
 restorecon reset /var/www/html/index.html context unconfined_u:object_r:samba_share_t:s0-&gt;system_u:object_r:httpd_sys_content_t:s0
 </pre><div class="para">
 					Refer to <a class="xref" href="sect-Security-Enhanced_Linux-Maintaining_SELinux_Labels_-Checking_the_Default_SELinux_Context.html">Section 9.4.10.3, “Checking the Default SELinux Context”</a> for a more detailed example of <code class="command">matchpathcon</code>.
-				</div></div></div><div class="footnotes"><br /><hr /><div id="ftn.idm219031080592" class="footnote"><div class="para"><a href="#idm219031080592" class="para"><sup class="para">[27] </sup></a>
+				</div></div></div><div class="footnotes"><br /><hr /><div id="ftn.idm219169427856" class="footnote"><div class="para"><a href="#idm219169427856" class="para"><sup class="para">[26] </sup></a>
 					Files in <code class="filename">/etc/selinux/targeted/contexts/files/</code> define contexts for files and directories. Files in this directory are read by <code class="command">restorecon</code> and <code class="command">setfiles</code> to restore files and directories to their default contexts.
 				</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security-Enhanced_Linux-Troubleshooting.html"><strong>Prev</strong>9.6. Troubleshooting</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security-Enhanced_Linux-Top_Three_Causes_of_Problems-How_are_Confined_Services_Running.html"><strong>Next</strong>9.6.2.2. How are Confined Services Running?</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Working_with_SELinux-The_file_t_and_default_t_Types.html b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Working_with_SELinux-The_file_t_and_default_t_Types.html
index d8b22ed..fb612b0 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Working_with_SELinux-The_file_t_and_default_t_Types.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Working_with_SELinux-The_file_t_and_default_t_Types.html
@@ -7,9 +7,9 @@
               addID('Fedora.19.books');
 	      addID('Fedora.19.Security_Guide');
               </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security-Enhanced_Linux-Working_with_SELinux.html" title="9.4. Working with SELinux" /><link rel="prev" href="sect-Security-Enhanced_Linux-SELinux_Contexts_Labeling_Files-Persistent_Changes_semanage_fcontext.html" title="9.4.7.2. Persistent Changes: semanage fcontext" /><link rel="next" href="sect-Security-Enhanced_Linux-Working_with_SELinux-Mounting_File_Systems.html" title="9.4.9. Mounting File Systems" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Docu
 mentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security-Enhanced_Linux-SELinux_Contexts_Labeling_Files-Persistent_Changes_semanage_fcontext.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="sect-Security-Enhanced_Linux-Working_with_SELinux-Mounting_File_Systems.html"><strong>Next</strong></a></li></ul><div class="section" id="sect-Security-Enhanced_Linux-Working_with_SELinux-The_file_t_and_default_t_Types"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">9.4.8. The file_t and default_t Types</h3></div></div></div><div class="para">
-			For file systems that support extended attributes, when a file that lacks an SELinux context on disk is accessed, it is treated as if it had a default context as defined by SELinux policy. In common policies, this default context uses the <code class="computeroutput">file_t</code> type. This should be the only use of this type, so that files without a context on disk can be distinguished in policy, and generally kept inaccessible to confined domains. The <code class="computeroutput">file_t</code> type should not exist on correctly-labeled file systems, because all files on a system running SELinux should have an SELinux context, and the <code class="computeroutput">file_t</code> type is never used in file-context configuration<a href="#ftn.idm219009131840" class="footnote"><sup class="footnote" id="idm219009131840">[24]</sup></a>.
+			For file systems that support extended attributes, when a file that lacks an SELinux context on disk is accessed, it is treated as if it had a default context as defined by SELinux policy. In common policies, this default context uses the <code class="computeroutput">file_t</code> type. This should be the only use of this type, so that files without a context on disk can be distinguished in policy, and generally kept inaccessible to confined domains. The <code class="computeroutput">file_t</code> type should not exist on correctly-labeled file systems, because all files on a system running SELinux should have an SELinux context, and the <code class="computeroutput">file_t</code> type is never used in file-context configuration<a href="#ftn.idm219200097152" class="footnote"><sup class="footnote" id="idm219200097152">[23]</sup></a>.
 		</div><div class="para">
 			The <code class="computeroutput">default_t</code> type is used on files that do not match any other pattern in file-context configuration, so that such files can be distinguished from files that do not have a context on disk, and generally kept inaccessible to confined domains. If you create a new top-level directory, such as <code class="filename">/mydirectory/</code>, this directory may be labeled with the <code class="computeroutput">default_t</code> type. If services need access to such a directory, update the file-contexts configuration for this location. Refer to <a class="xref" href="sect-Security-Enhanced_Linux-SELinux_Contexts_Labeling_Files-Persistent_Changes_semanage_fcontext.html">Section 9.4.7.2, “Persistent Changes: semanage fcontext”</a> for details on adding a context to the file-context configuration.
-		</div><div class="footnotes"><br /><hr /><div id="ftn.idm219009131840" class="footnote"><div class="para"><a href="#idm219009131840" class="para"><sup class="para">[24] </sup></a>
+		</div><div class="footnotes"><br /><hr /><div id="ftn.idm219200097152" class="footnote"><div class="para"><a href="#idm219200097152" class="para"><sup class="para">[23] </sup></a>
 				Files in <code class="filename">/etc/selinux/targeted/contexts/files/</code> define contexts for files and directories. Files in this directory are read by <code class="command">restorecon</code> and <code class="command">setfiles</code> to restore files and directories to their default contexts.
 			</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security-Enhanced_Linux-SELinux_Contexts_Labeling_Files-Persistent_Changes_semanage_fcontext.html"><strong>Prev</strong>9.4.7.2. Persistent Changes: semanage fcontext</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security-Enhanced_Linux-Working_with_SELinux-Mounting_File_Systems.html"><strong>Next</strong>9.4.9. Mounting File Systems</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Working_with_SELinux.html b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Working_with_SELinux.html
index 5ab2ebe..aa9994d 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Working_with_SELinux.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security-Enhanced_Linux-Working_with_SELinux.html
@@ -23,7 +23,7 @@
 		</div><div class="para">
 			<span class="package">setroubleshoot-server</span>: translates denial messages, produced when access is denied by SELinux, into detailed descriptions that are viewed with <code class="command">sealert</code> (which is provided by this package).
 		</div><div class="para">
-			<span class="package">setools</span>, <span class="package">setools-gui</span>, and <span class="package">setools-console</span>: these packages provide the <a href="http://oss.tresys.com/projects/setools">Tresys Technology SETools distribution</a>, a number of tools and libraries for analyzing and querying policy, audit log monitoring and reporting, and file context management<a href="#ftn.idm218999210448" class="footnote"><sup class="footnote" id="idm218999210448">[22]</sup></a>. The <span class="package">setools</span> package is a meta-package for SETools. The <span class="package">setools-gui</span> package provides the <code class="command">apol</code>, <code class="command">seaudit</code>, and <code class="command">sediffx</code> tools. The <span class="package">setools-console</span> package provides the <code class="command">seaudit-report</code>, <code class="command">sechecker</code>, <code class="command">sediff</code>, <code class="command">seinfo</code>, <co
 de class="command">sesearch</code>, <code class="command">findcon</code>, <code class="command">replcon</code>, and <code class="command">indexcon</code> command line tools. Refer to the <a href="http://oss.tresys.com/projects/setools">Tresys Technology SETools</a> page for information about these tools.
+			<span class="package">setools</span>, <span class="package">setools-gui</span>, and <span class="package">setools-console</span>: these packages provide the <a href="http://oss.tresys.com/projects/setools">Tresys Technology SETools distribution</a>, a number of tools and libraries for analyzing and querying policy, audit log monitoring and reporting, and file context management<a href="#ftn.idm219166952752" class="footnote"><sup class="footnote" id="idm219166952752">[21]</sup></a>. The <span class="package">setools</span> package is a meta-package for SETools. The <span class="package">setools-gui</span> package provides the <code class="command">apol</code>, <code class="command">seaudit</code>, and <code class="command">sediffx</code> tools. The <span class="package">setools-console</span> package provides the <code class="command">seaudit-report</code>, <code class="command">sechecker</code>, <code class="command">sediff</code>, <code class="command">seinfo</code>, <co
 de class="command">sesearch</code>, <code class="command">findcon</code>, <code class="command">replcon</code>, and <code class="command">indexcon</code> command line tools. Refer to the <a href="http://oss.tresys.com/projects/setools">Tresys Technology SETools</a> page for information about these tools.
 		</div><div class="para">
 			<span class="package">libselinux-utils</span>: provides the <code class="command">avcstat</code>, <code class="command">getenforce</code>, <code class="command">getsebool</code>, <code class="command">matchpathcon</code>, <code class="command">selinuxconlist</code>, <code class="command">selinuxdefcon</code>, <code class="command">selinuxenabled</code>, <code class="command">setenforce</code>, <code class="command">togglesebool</code> tools.
 		</div><div class="para">
@@ -31,11 +31,11 @@
 		</div><div class="para">
 			To install packages in Fedora, as the Linux root user, run the <code class="command">yum install <em class="replaceable"><code>package-name</code></em></code> command. For example, to install the <span class="package">mcstrans</span> package, run the <code class="command">yum install mcstrans</code> command. To upgrade all installed packages in Fedora, run the <code class="command">yum update</code> command.
 		</div><div class="para">
-			Refer to <a href="http://docs.fedoraproject.org/yum/en/">Managing Software with yum</a><a href="#ftn.idm219034913696" class="footnote"><sup class="footnote" id="idm219034913696">[23]</sup></a> for further information about using <code class="command">yum</code> to manage packages.
+			Refer to <a href="http://docs.fedoraproject.org/yum/en/">Managing Software with yum</a><a href="#ftn.idm219175611744" class="footnote"><sup class="footnote" id="idm219175611744">[22]</sup></a> for further information about using <code class="command">yum</code> to manage packages.
 		</div><div class="note"><div class="admonition_header"><h2>Note</h2></div><div class="admonition"><div class="para">
 				In previous versions of Fedora, the <span class="package">selinux-policy-devel</span> package is required when making a local policy module with <code class="command">audit2allow -M</code>.
-			</div></div></div></div><div class="footnotes"><br /><hr /><div id="ftn.idm218999210448" class="footnote"><div class="para"><a href="#idm218999210448" class="para"><sup class="para">[22] </sup></a>
+			</div></div></div></div><div class="footnotes"><br /><hr /><div id="ftn.idm219166952752" class="footnote"><div class="para"><a href="#idm219166952752" class="para"><sup class="para">[21] </sup></a>
 				Brindle, Joshua. "Re: blurb for fedora setools packages" Email to Murray McAllister. 1 November 2008. Any edits or changes in this version were done by Murray McAllister.
-			</div></div><div id="ftn.idm219034913696" class="footnote"><div class="para"><a href="#idm219034913696" class="para"><sup class="para">[23] </sup></a>
+			</div></div><div id="ftn.idm219175611744" class="footnote"><div class="para"><a href="#idm219175611744" class="para"><sup class="para">[22] </sup></a>
 				Managing Software with yum, written by Stuart Ellis, edited by Paul W. Frields, Rodrigo Menezes, and Hugo Cisneiros.
 			</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security-Enhanced_Linux-Targeted_Policy-Confined_and_Unconfined_Users.html"><strong>Prev</strong>9.3.3. Confined and Unconfined Users</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security-Enhanced_Linux-Working_with_SELinux-Which_Log_File_is_Used.html"><strong>Next</strong>9.4.2. Which Log File is Used</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-NTP.html b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-NTP.html
index 33889b3..012af5f 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-NTP.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-NTP.html
@@ -1,11 +1,11 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
-<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.8. NTP</title><link rel="stylesheet" type="text/css" href="Common_Content/css/default.css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 2.8" /><meta name="package" content="Fedora-Security_Guide-19-en-US-19.1-1" /><script type="text/javascript" src="../../../../../toc.js"></script><script type="text/javascript">
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7. NTP</title><link rel="stylesheet" type="text/css" href="Common_Content/css/default.css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 2.8" /><meta name="package" content="Fedora-Security_Guide-19-en-US-19.1-1" /><script type="text/javascript" src="../../../../../toc.js"></script><script type="text/javascript">
               addID('Fedora');
               
 	      addID('Fedora.19');
               
               addID('Fedora.19.books');
 	      addID('Fedora.19.Security_Guide');
-              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Basic_Hardening.html" title="Chapter 2. Basic Hardening Guide" /><link rel="prev" href="sect-Security_Guide-Basic_Hardening-Services.html" title="2.7. Services" /><link rel="next" href="chap-Security_Guide-Securing_Your_Network.html" title="Chapter 3. Securing Your Network" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Ha
 rdening-Services.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Securing_Your_Network.html"><strong>Next</strong></a></li></ul><div class="section" id="sect-Security_Guide-Basic_Hardening-NTP"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.8. NTP</h2></div></div></div><div class="para">
+              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Basic_Hardening.html" title="Chapter 2. Basic Hardening Guide" /><link rel="prev" href="sect-Security_Guide-Basic_Hardening-Services.html" title="2.6. Services" /><link rel="next" href="chap-Security_Guide-Securing_Your_Network.html" title="Chapter 3. Securing Your Network" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Ha
 rdening-Services.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Securing_Your_Network.html"><strong>Next</strong></a></li></ul><div class="section" id="sect-Security_Guide-Basic_Hardening-NTP"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.7. NTP</h2></div></div></div><div class="para">
 			Network Time Protocol, or <em class="firstterm">NTP</em>, keeps the time on your systems accurate. Time is a very important piece of the security puzzle and should be maintained as precisely as possible. Time is used in log files, timestamps, and in encryption. If someone is able to control the time settings on one of your systems then they are able to make the recreation of a break-in that much more difficult.
-		</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Hardening-Services.html"><strong>Prev</strong>2.7. Services</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Securing_Your_Network.html"><strong>Next</strong>Chapter 3. Securing Your Network</a></li></ul></body></html>
\ No newline at end of file
+		</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Hardening-Services.html"><strong>Prev</strong>2.6. Services</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="chap-Security_Guide-Securing_Your_Network.html"><strong>Next</strong>Chapter 3. Securing Your Network</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-Networking-IPv6.html b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-Networking-IPv6.html
index 7afc246..a40c131 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-Networking-IPv6.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-Networking-IPv6.html
@@ -1,12 +1,12 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
-<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5.2. IPv6</title><link rel="stylesheet" type="text/css" href="Common_Content/css/default.css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 2.8" /><meta name="package" content="Fedora-Security_Guide-19-en-US-19.1-1" /><script type="text/javascript" src="../../../../../toc.js"></script><script type="text/javascript">
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4.2. IPv6</title><link rel="stylesheet" type="text/css" href="Common_Content/css/default.css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 2.8" /><meta name="package" content="Fedora-Security_Guide-19-en-US-19.1-1" /><script type="text/javascript" src="../../../../../toc.js"></script><script type="text/javascript">
               addID('Fedora');
               
 	      addID('Fedora.19');
               
               addID('Fedora.19.books');
 	      addID('Fedora.19.Security_Guide');
-              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Basic_Hardening-Networking.html" title="2.5. Networking" /><link rel="prev" href="sect-Security_Guide-Basic_Hardening-Networking.html" title="2.5. Networking" /><link rel="next" href="sect-Security_Guide-Basic_Hardening-Up_to_date.html" title="2.6. Keeping software up to date" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_H
 ardening-Networking.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-Up_to_date.html"><strong>Next</strong></a></li></ul><div class="section" id="sect-Security_Guide-Basic_Hardening-Networking-IPv6"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.5.2. IPv6</h3></div></div></div><div class="para">
+              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Basic_Hardening-Networking.html" title="2.4. Networking" /><link rel="prev" href="sect-Security_Guide-Basic_Hardening-Networking.html" title="2.4. Networking" /><link rel="next" href="sect-Security_Guide-Basic_Hardening-Up_to_date.html" title="2.5. Keeping software up to date" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_H
 ardening-Networking.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-Up_to_date.html"><strong>Next</strong></a></li></ul><div class="section" id="sect-Security_Guide-Basic_Hardening-Networking-IPv6"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.4.2. IPv6</h3></div></div></div><div class="para">
 				IPv6 is the latest Internet protocol which aims to solve the address quantity shortfall inherent to IPv4. And while there are no security risks directly associated with the new protocol there are a few things to understand before utilizing this new technology.
 			</div><div class="para">
 				Most system administrators are familiar with IPv4 and the work-arounds that were put in place to make IPv4 work. One of these work-arounds is network address translation, or <em class="firstterm">NAT</em>. NAT is traditionally used to keep the number of needed public IP addresses to a minimum when setting up a local area network. Systems on these networks do not all require public IP addresses and valuable address space can be saved by implementing this technology. There are some security features that were side effects to NAT; the biggest being that outside traffic cannot make it inside the network unless a port is forwarded across the router. Because IPv6 solves the addressing problem there is no longer a need to use NAT. Everything can have a public IP address and, by extension, everything is not publically routable across the Internet when physical and logical connections are made.
@@ -14,4 +14,4 @@
 				Another thing to worry about is how security software deals with this new protocol. <span class="application"><strong>iptables</strong></span> does not know or understand IPv6 and so it ignores those packets altogether. That means if your network is utilizing IPv6 and you have not activated <span class="application"><strong>ip6tables</strong></span> then you have just left the door to your system open to the world.
 			</div><div class="para">
 				Using IPv6 is not dangerous as long as you know and understand the changes that your system's software went through to make it possible to use this new network protocol.
-			</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Hardening-Networking.html"><strong>Prev</strong>2.5. Networking</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-Up_to_date.html"><strong>Next</strong>2.6. Keeping software up to date</a></li></ul></body></html>
\ No newline at end of file
+			</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Hardening-Networking.html"><strong>Prev</strong>2.4. Networking</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-Up_to_date.html"><strong>Next</strong>2.5. Keeping software up to date</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-Networking.html b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-Networking.html
index 98372eb..3cf679c 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-Networking.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-Networking.html
@@ -1,13 +1,13 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
-<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5. Networking</title><link rel="stylesheet" type="text/css" href="Common_Content/css/default.css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 2.8" /><meta name="package" content="Fedora-Security_Guide-19-en-US-19.1-1" /><script type="text/javascript" src="../../../../../toc.js"></script><script type="text/javascript">
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4. Networking</title><link rel="stylesheet" type="text/css" href="Common_Content/css/default.css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 2.8" /><meta name="package" content="Fedora-Security_Guide-19-en-US-19.1-1" /><script type="text/javascript" src="../../../../../toc.js"></script><script type="text/javascript">
               addID('Fedora');
               
 	      addID('Fedora.19');
               
               addID('Fedora.19.books');
 	      addID('Fedora.19.Security_Guide');
-              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Basic_Hardening.html" title="Chapter 2. Basic Hardening Guide" /><link rel="prev" href="sect-Security_Guide-Basic_Hardening-Physical_Security-Why_is_this_important.html" title="2.4. Why this is important" /><link rel="next" href="sect-Security_Guide-Basic_Hardening-Networking-IPv6.html" title="2.5.2. IPv6" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" hr
 ef="sect-Security_Guide-Basic_Hardening-Physical_Security-Why_is_this_important.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-Networking-IPv6.html"><strong>Next</strong></a></li></ul><div class="section" id="sect-Security_Guide-Basic_Hardening-Networking"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.5. Networking</h2></div></div></div><div class="para">
+              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Basic_Hardening.html" title="Chapter 2. Basic Hardening Guide" /><link rel="prev" href="sect-Security_Guide-Basic_Hardening-Physical_Security-Why_is_this_important.html" title="2.3. Why this is important" /><link rel="next" href="sect-Security_Guide-Basic_Hardening-Networking-IPv6.html" title="2.4.2. IPv6" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" hr
 ef="sect-Security_Guide-Basic_Hardening-Physical_Security-Why_is_this_important.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-Networking-IPv6.html"><strong>Next</strong></a></li></ul><div class="section" id="sect-Security_Guide-Basic_Hardening-Networking"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.4. Networking</h2></div></div></div><div class="para">
 			The computer's network connection is the gateway to your system. Your files and processor time could be available to anyone who successfully connects to your system via this network connection if other safeguards have not been implemented. One of the primary ways to keep you in control of your system is to prevent the attackers from gaining access to your system in the first place.
-		</div><div class="section" id="sect-Security_Guide-Basic_Hardening-Networking-iptables"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.5.1. iptables</h3></div></div></div><div class="para">
+		</div><div class="section" id="sect-Security_Guide-Basic_Hardening-Networking-iptables"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">2.4.1. iptables</h3></div></div></div><div class="para">
 				<span class="application"><strong>iptables</strong></span> is the most widely used firewall software on Linux systems today. This program intercepts packets coming into your computer via the network connection and filters them according to rules you have specified.
-			</div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Hardening-Physical_Security-Why_is_this_important.html"><strong>Prev</strong>2.4. Why this is important</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-Networking-IPv6.html"><strong>Next</strong>2.5.2. IPv6</a></li></ul></body></html>
\ No newline at end of file
+			</div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Hardening-Physical_Security-Why_is_this_important.html"><strong>Prev</strong>2.3. Why this is important</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-Networking-IPv6.html"><strong>Next</strong>2.4.2. IPv6</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-Physical_Security-Why_is_this_important.html b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-Physical_Security-Why_is_this_important.html
index 979dc29..f9c8298 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-Physical_Security-Why_is_this_important.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-Physical_Security-Why_is_this_important.html
@@ -1,11 +1,13 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
-<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.4. Why this is important</title><link rel="stylesheet" type="text/css" href="Common_Content/css/default.css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 2.8" /><meta name="package" content="Fedora-Security_Guide-19-en-US-19.1-1" /><script type="text/javascript" src="../../../../../toc.js"></script><script type="text/javascript">
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.3. Why this is important</title><link rel="stylesheet" type="text/css" href="Common_Content/css/default.css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 2.8" /><meta name="package" content="Fedora-Security_Guide-19-en-US-19.1-1" /><script type="text/javascript" src="../../../../../toc.js"></script><script type="text/javascript">
               addID('Fedora');
               
 	      addID('Fedora.19');
               
               addID('Fedora.19.books');
 	      addID('Fedora.19.Security_Guide');
-              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Basic_Hardening.html" title="Chapter 2. Basic Hardening Guide" /><link rel="prev" href="sect-Security_Guide-Basic_Hardening-Physical_Security.html" title="2.3. Physical Security" /><link rel="next" href="sect-Security_Guide-Basic_Hardening-Networking.html" title="2.5. Networking" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Bas
 ic_Hardening-Physical_Security.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-Networking.html"><strong>Next</strong></a></li></ul><div class="section" id="sect-Security_Guide-Basic_Hardening-Physical_Security-Why_is_this_important"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.4. Why this is important</h2></div></div></div><div class="para">
+              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Basic_Hardening.html" title="Chapter 2. Basic Hardening Guide" /><link rel="prev" href="sect-Security_Guide-Basic_Hardening-Physical_Security.html" title="2.2. Physical Security" /><link rel="next" href="sect-Security_Guide-Basic_Hardening-Networking.html" title="2.4. Networking" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Bas
 ic_Hardening-Physical_Security.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-Networking.html"><strong>Next</strong></a></li></ul><div class="section" id="sect-Security_Guide-Basic_Hardening-Physical_Security-Why_is_this_important"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.3. Why this is important</h2></div></div></div><div class="para">
 			An attacker could take complete control of your system by booting from an external source. By booting from an external source (e.g. a live Linux CD) many of the security settings are bypassed. If the attacker can modify the GRUB settings they can boot into single user mode which allows admin access to the system.
-		</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Hardening-Physical_Security.html"><strong>Prev</strong>2.3. Physical Security</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-Networking.html"><strong>Next</strong>2.5. Networking</a></li></ul></body></html>
\ No newline at end of file
+		</div><div class="para">
+			Additional explaination and hardening can be found in <a class="xref" href="chap-Security_Guide-Securing_Your_Network.html#sect-Security_Guide-Workstation_Security-BIOS_and_Boot_Loader_Security">Section 3.1.2, “BIOS and Boot Loader Security”</a> of this guide.
+		</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Hardening-Physical_Security.html"><strong>Prev</strong>2.2. Physical Security</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-Networking.html"><strong>Next</strong>2.4. Networking</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-Physical_Security.html b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-Physical_Security.html
index b39140a..558f5f5 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-Physical_Security.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-Physical_Security.html
@@ -1,15 +1,13 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
-<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.3. Physical Security</title><link rel="stylesheet" type="text/css" href="Common_Content/css/default.css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 2.8" /><meta name="package" content="Fedora-Security_Guide-19-en-US-19.1-1" /><script type="text/javascript" src="../../../../../toc.js"></script><script type="text/javascript">
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.2. Physical Security</title><link rel="stylesheet" type="text/css" href="Common_Content/css/default.css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 2.8" /><meta name="package" content="Fedora-Security_Guide-19-en-US-19.1-1" /><script type="text/javascript" src="../../../../../toc.js"></script><script type="text/javascript">
               addID('Fedora');
               
 	      addID('Fedora.19');
               
               addID('Fedora.19.books');
 	      addID('Fedora.19.Security_Guide');
-              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Basic_Hardening.html" title="Chapter 2. Basic Hardening Guide" /><link rel="prev" href="sect-Security_Guide-Basic_Hardening-General_Principles-Why_is_this_important.html" title="2.2. Why is this important?" /><link rel="next" href="sect-Security_Guide-Basic_Hardening-Physical_Security-Why_is_this_important.html" title="2.4. Why this is important" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"
 ><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Hardening-General_Principles-Why_is_this_important.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-Physical_Security-Why_is_this_important.html"><strong>Next</strong></a></li></ul><div class="section" id="sect-Security_Guide-Basic_Hardening-Physical_Security"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.3. Physical Security</h2></div></div></div><div class="para">
-			Physical security of the system is of utmost importance. Many of the suggestions given here won't protect your system if the attacker has physical access to the system.
-		</div><div class="important"><div class="admonition_header"><h2>Important</h2></div><div class="admonition"><div class="para">
-				This section contains information regarding GRUB Legacy and not the current release of GRUB (also known as GRUB2).
-			</div></div></div><div class="para">
-			Configure the BIOS to disable booting from CDs/DVDs, floppies, and external devices, and set a password to protect these settings. Next, set a password for the GRUB bootloader. Generate a password hash using the command <code class="command">/sbin/grub-md5-crypt</code>. Add the hash to the first line of <code class="command">/etc/grub.conf</code> using <code class="command">password --md5 'passwordhash'</code>. This prevents users from entering single user mode or changing settings at boot time.
-		</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Hardening-General_Principles-Why_is_this_important.html"><strong>Prev</strong>2.2. Why is this important?</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-Physical_Security-Why_is_this_important.html"><strong>Next</strong>2.4. Why this is important</a></li></ul></body></html>
\ No newline at end of file
+              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Basic_Hardening.html" title="Chapter 2. Basic Hardening Guide" /><link rel="prev" href="chap-Security_Guide-Basic_Hardening.html" title="Chapter 2. Basic Hardening Guide" /><link rel="next" href="sect-Security_Guide-Basic_Hardening-Physical_Security-Why_is_this_important.html" title="2.3. Why this is important" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey=
 "p" href="chap-Security_Guide-Basic_Hardening.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-Physical_Security-Why_is_this_important.html"><strong>Next</strong></a></li></ul><div class="section" id="sect-Security_Guide-Basic_Hardening-Physical_Security"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.2. Physical Security</h2></div></div></div><div class="para">
+			Physical security of the system is of utmost importance. Many of the suggestions given here won't protect your system if the attacker has physical access to the system. Physical access doesn't necessarily mean that the battle is lost, however. Strengthening your BIOS and boot software can help defend your system against certain types of attacks.
+		</div><div class="para">
+			Configuring the BIOS to disable booting from CDs/DVDs, floppies, and external devices, can prevent bypassing the boot partition and the boot loader where other protections are in place. It is important to password-protect your BIOS settings so that an attacker cannot just change these, and other, settings. Next, set a password for the GRUB bootloader. Use the <span class="application"><strong>grub2-mkpasswd-pbkdf2</strong></span> to create your password hash. This prevents users from entering single user mode or changing settings at boot time.
+		</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="chap-Security_Guide-Basic_Hardening.html"><strong>Prev</strong>Chapter 2. Basic Hardening Guide</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-Physical_Security-Why_is_this_important.html"><strong>Next</strong>2.3. Why this is important</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-Services.html b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-Services.html
index 7c04f96..03e5b8c 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-Services.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-Services.html
@@ -1,11 +1,11 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
-<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.7. Services</title><link rel="stylesheet" type="text/css" href="Common_Content/css/default.css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 2.8" /><meta name="package" content="Fedora-Security_Guide-19-en-US-19.1-1" /><script type="text/javascript" src="../../../../../toc.js"></script><script type="text/javascript">
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6. Services</title><link rel="stylesheet" type="text/css" href="Common_Content/css/default.css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 2.8" /><meta name="package" content="Fedora-Security_Guide-19-en-US-19.1-1" /><script type="text/javascript" src="../../../../../toc.js"></script><script type="text/javascript">
               addID('Fedora');
               
 	      addID('Fedora.19');
               
               addID('Fedora.19.books');
 	      addID('Fedora.19.Security_Guide');
-              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Basic_Hardening.html" title="Chapter 2. Basic Hardening Guide" /><link rel="prev" href="sect-Security_Guide-Basic_Hardening-Up_to_date.html" title="2.6. Keeping software up to date" /><link rel="next" href="sect-Security_Guide-Basic_Hardening-NTP.html" title="2.8. NTP" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Hardenin
 g-Up_to_date.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-NTP.html"><strong>Next</strong></a></li></ul><div class="section" id="sect-Security_Guide-Basic_Hardening-Services"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.7. Services</h2></div></div></div><div class="para">
+              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Basic_Hardening.html" title="Chapter 2. Basic Hardening Guide" /><link rel="prev" href="sect-Security_Guide-Basic_Hardening-Up_to_date.html" title="2.5. Keeping software up to date" /><link rel="next" href="sect-Security_Guide-Basic_Hardening-NTP.html" title="2.7. NTP" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Hardenin
 g-Up_to_date.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-NTP.html"><strong>Next</strong></a></li></ul><div class="section" id="sect-Security_Guide-Basic_Hardening-Services"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.6. Services</h2></div></div></div><div class="para">
 			Services in Linux are programs that run as daemons in the background. It is important to audit these programs regularly to determine if they need to be running. Many daemons open network ports in order to listen for calls. Having unnecessary ports open can harm the overall security of the system. An unknown security flaw in a piece of software can allow a hacker into a system for no good reason.
-		</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Hardening-Up_to_date.html"><strong>Prev</strong>2.6. Keeping software up to date</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-NTP.html"><strong>Next</strong>2.8. NTP</a></li></ul></body></html>
\ No newline at end of file
+		</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Hardening-Up_to_date.html"><strong>Prev</strong>2.5. Keeping software up to date</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-NTP.html"><strong>Next</strong>2.7. NTP</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-Up_to_date.html b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-Up_to_date.html
index ae15d5f..1da9885 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-Up_to_date.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Basic_Hardening-Up_to_date.html
@@ -1,11 +1,11 @@
 <?xml version="1.0" encoding="UTF-8" standalone="no"?>
-<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.6. Keeping software up to date</title><link rel="stylesheet" type="text/css" href="Common_Content/css/default.css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 2.8" /><meta name="package" content="Fedora-Security_Guide-19-en-US-19.1-1" /><script type="text/javascript" src="../../../../../toc.js"></script><script type="text/javascript">
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>2.5. Keeping software up to date</title><link rel="stylesheet" type="text/css" href="Common_Content/css/default.css" /><link rel="stylesheet" media="print" href="Common_Content/css/print.css" type="text/css" /><meta name="generator" content="publican 2.8" /><meta name="package" content="Fedora-Security_Guide-19-en-US-19.1-1" /><script type="text/javascript" src="../../../../../toc.js"></script><script type="text/javascript">
               addID('Fedora');
               
 	      addID('Fedora.19');
               
               addID('Fedora.19.books');
 	      addID('Fedora.19.Security_Guide');
-              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Basic_Hardening.html" title="Chapter 2. Basic Hardening Guide" /><link rel="prev" href="sect-Security_Guide-Basic_Hardening-Networking-IPv6.html" title="2.5.2. IPv6" /><link rel="next" href="sect-Security_Guide-Basic_Hardening-Services.html" title="2.7. Services" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Hardening-Netw
 orking-IPv6.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-Services.html"><strong>Next</strong></a></li></ul><div class="section" id="sect-Security_Guide-Basic_Hardening-Up_to_date"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.6. Keeping software up to date</h2></div></div></div><div class="para">
+              </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="chap-Security_Guide-Basic_Hardening.html" title="Chapter 2. Basic Hardening Guide" /><link rel="prev" href="sect-Security_Guide-Basic_Hardening-Networking-IPv6.html" title="2.4.2. IPv6" /><link rel="next" href="sect-Security_Guide-Basic_Hardening-Services.html" title="2.6. Services" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documentation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Hardening-Netw
 orking-IPv6.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-Services.html"><strong>Next</strong></a></li></ul><div class="section" id="sect-Security_Guide-Basic_Hardening-Up_to_date"><div class="titlepage"><div><div keep-together.within-column="always"><h2 class="title">2.5. Keeping software up to date</h2></div></div></div><div class="para">
 			Software gets patched everyday. Some of these updates fix security problems that were identified by the developers. When these patches become available it is important that they are applied to your system as soon as possible. One of the easier ways to manage updates for your system is using <span class="application"><strong>yum</strong></span>. A special plugin is available to allow only security updates to be installed while ignoring bugfixes and enhancements. This plugin is explained better at <a class="xref" href="chap-Security_Guide-CVE.html#sect-Security_Guide-CVE-yum_plugin">Section 8.1, “YUM Plugin”</a>.
-		</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Hardening-Networking-IPv6.html"><strong>Prev</strong>2.5.2. IPv6</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-Services.html"><strong>Next</strong>2.7. Services</a></li></ul></body></html>
\ No newline at end of file
+		</div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Basic_Hardening-Networking-IPv6.html"><strong>Prev</strong>2.4.2. IPv6</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Basic_Hardening-Services.html"><strong>Next</strong>2.6. Services</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Kerberos.html b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Kerberos.html
index fc5bd51..2d8448e 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Kerberos.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Kerberos.html
@@ -13,7 +13,7 @@
 	</div><div class="para">
 		Kerberos is a way to eliminate the need for protocols that allow unsafe methods of authentication, thereby enhancing overall network security.
 	</div><div class="section" id="sect-Security_Guide-Kerberos-What_is_Kerberos"><div class="titlepage"><div><div keep-together.within-column="always"><h3 class="title">3.7.1. What is Kerberos?</h3></div></div></div><div class="para">
-			Kerberos is a network authentication protocol created by MIT, and uses symmetric-key cryptography<a href="#ftn.idm219025765408" class="footnote"><sup class="footnote" id="idm219025765408">[14]</sup></a> to authenticate users to network services, which means passwords are never actually sent over the network.
+			Kerberos is a network authentication protocol created by MIT, and uses symmetric-key cryptography<a href="#ftn.idm219174175712" class="footnote"><sup class="footnote" id="idm219174175712">[13]</sup></a> to authenticate users to network services, which means passwords are never actually sent over the network.
 		</div><div class="para">
 			Consequently, when users authenticate to network services using Kerberos, unauthorized users attempting to gather passwords by monitoring network traffic are effectively thwarted.
 		</div><div class="section" id="sect-Security_Guide-What_is_Kerberos-Advantages_of_Kerberos"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">3.7.1.1. Advantages of Kerberos</h4></div></div></div><div class="para">
@@ -36,6 +36,6 @@
 						For an application to use Kerberos, its source must be modified to make the appropriate calls into the Kerberos libraries. Applications modified in this way are considered to be <em class="firstterm">Kerberos-aware</em>, or <em class="firstterm">kerberized</em>. For some applications, this can be quite problematic due to the size of the application or its design. For other incompatible applications, changes must be made to the way in which the server and client communicate. Again, this may require extensive programming. Closed-source applications that do not have Kerberos support by default are often the most problematic.
 					</div></li><li class="listitem"><div class="para">
 						Kerberos is an all-or-nothing solution. If Kerberos is used on the network, any unencrypted passwords transferred to a non-Kerberos aware service is at risk. Thus, the network gains no benefit from the use of Kerberos. To secure a network with Kerberos, one must either use Kerberos-aware versions of <span class="emphasis"><em>all</em></span> client/server applications that transmit passwords unencrypted, or not use <span class="emphasis"><em>any</em></span> such client/server applications at all.
-					</div></li></ul></div></div></div><div class="footnotes"><br /><hr /><div id="ftn.idm219025765408" class="footnote"><div class="para"><a href="#idm219025765408" class="para"><sup class="para">[14] </sup></a>
+					</div></li></ul></div></div></div><div class="footnotes"><br /><hr /><div id="ftn.idm219174175712" class="footnote"><div class="para"><a href="#idm219174175712" class="para"><sup class="para">[13] </sup></a>
 				A system where both the client and the server share a common key that is used to encrypt and decrypt network communication.
 			</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Additional_Resources-Related_Books.html"><strong>Prev</strong>3.6.5.3. Related Books</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Kerberos-Kerberos_Terminology.html"><strong>Next</strong>3.7.2. Kerberos Terminology</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html
index 67d1bf4..ac2e1f5 100644
--- a/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html
+++ b/public_html/en-US/Fedora/19/html/Security_Guide/sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration.html
@@ -7,9 +7,9 @@
               addID('Fedora.19.books');
 	      addID('Fedora.19.Security_Guide');
               </script><link rel="home" href="index.html" title="Security Guide" /><link rel="up" href="sect-Security_Guide-Attackers_and_Vulnerabilities-Threats_to_Server_Security.html" title="1.2.3. Threats to Server Security" /><link rel="prev" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html" title="1.2.3.2. Unpatched Services" /><link rel="next" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html" title="1.2.3.4. Inherently Insecure Services" /></head><body class="toc_embeded "><div id="tocdiv" class="toc"><iframe id="tocframe" class="toc" src="../../../../toc.html">This is an iframe, to view it upgrade your browser or enable iframe display.</iframe></div><p id="title"><a class="left" href="http://www.fedoraproject.org"><img src="Common_Content/images/image_left.png" alt="Product Site" /></a><a class="right" href="http://docs.fedoraproject.org"><img src="Common_Content/images/image_right.png" alt="Documen
 tation Site" /></a></p><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html"><strong>Prev</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html"><strong>Next</strong></a></li></ul><div class="section" id="sect-Security_Guide-Threats_to_Server_Security-Inattentive_Administration"><div class="titlepage"><div><div keep-together.within-column="always"><h4 class="title">1.2.3.3. Inattentive Administration</h4></div></div></div><div class="para">
-				Administrators who fail to patch their systems are one of the greatest threats to server security. According to the <em class="firstterm">SysAdmin, Audit, Network, Security Institute</em> (<em class="firstterm">SANS</em>), the primary cause of computer security vulnerability is to "assign untrained people to maintain security and provide neither the training nor the time to make it possible to do the job."<a href="#ftn.idm219009464880" class="footnote"><sup class="footnote" id="idm219009464880">[10]</sup></a> This applies as much to inexperienced administrators as it does to overconfident or amotivated administrators.
+				Administrators who fail to patch their systems are one of the greatest threats to server security. According to the <em class="firstterm">SysAdmin, Audit, Network, Security Institute</em> (<em class="firstterm">SANS</em>), the primary cause of computer security vulnerability is to "assign untrained people to maintain security and provide neither the training nor the time to make it possible to do the job."<a href="#ftn.idm219222928736" class="footnote"><sup class="footnote" id="idm219222928736">[10]</sup></a> This applies as much to inexperienced administrators as it does to overconfident or amotivated administrators.
 			</div><div class="para">
 				Some administrators fail to patch their servers and workstations, while others fail to watch log messages from the system kernel or network traffic. Another common error is when default passwords or keys to services are left unchanged. For example, some databases have default administration passwords because the database developers assume that the system administrator changes these passwords immediately after installation. If a database administrator fails to change this password, even an inexperienced cracker can use a widely-known default password to gain administrative privileges to the database. These are only a few examples of how inattentive administration can lead to compromised servers.
-			</div><div class="footnotes"><br /><hr /><div id="ftn.idm219009464880" class="footnote"><div class="para"><a href="#idm219009464880" class="para"><sup class="para">[10] </sup></a>
+			</div><div class="footnotes"><br /><hr /><div id="ftn.idm219222928736" class="footnote"><div class="para"><a href="#idm219222928736" class="para"><sup class="para">[10] </sup></a>
 					http://www.sans.org/resources/errors.php
 				</div></div></div></div><ul class="docnav"><li class="previous"><a accesskey="p" href="sect-Security_Guide-Threats_to_Server_Security-Unpatched_Services.html"><strong>Prev</strong>1.2.3.2. Unpatched Services</a></li><li class="up"><a accesskey="u" href="#"><strong>Up</strong></a></li><li class="home"><a accesskey="h" href="index.html"><strong>Home</strong></a></li><li class="next"><a accesskey="n" href="sect-Security_Guide-Threats_to_Server_Security-Inherently_Insecure_Services.html"><strong>Next</strong>1.2.3.4. Inherently Insecure Services</a></li></ul></body></html>
\ No newline at end of file
diff --git a/public_html/en-US/Fedora/19/pdf/Security_Guide/Fedora-19-Security_Guide-en-US.pdf b/public_html/en-US/Fedora/19/pdf/Security_Guide/Fedora-19-Security_Guide-en-US.pdf
index fe782d9..86b2e82 100644
Binary files a/public_html/en-US/Fedora/19/pdf/Security_Guide/Fedora-19-Security_Guide-en-US.pdf and b/public_html/en-US/Fedora/19/pdf/Security_Guide/Fedora-19-Security_Guide-en-US.pdf differ
diff --git a/public_html/en-US/Site_Statistics.html b/public_html/en-US/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/en-US/Site_Statistics.html
+++ b/public_html/en-US/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/en-US/opds-Community_Services_Infrastructure.xml b/public_html/en-US/opds-Community_Services_Infrastructure.xml
index a4c9f9a..6031d23 100644
--- a/public_html/en-US/opds-Community_Services_Infrastructure.xml
+++ b/public_html/en-US/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/en-US/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/en-US/opds-Fedora.xml b/public_html/en-US/opds-Fedora.xml
index be8f9be..b927808 100644
--- a/public_html/en-US/opds-Fedora.xml
+++ b/public_html/en-US/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/en-US/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/en-US/opds-Fedora_Contributor_Documentation.xml b/public_html/en-US/opds-Fedora_Contributor_Documentation.xml
index b0c4e42..8dc2da0 100644
--- a/public_html/en-US/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/en-US/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/en-US/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/en-US/opds-Fedora_Core.xml b/public_html/en-US/opds-Fedora_Core.xml
index 8abbb5d..b7706b6 100644
--- a/public_html/en-US/opds-Fedora_Core.xml
+++ b/public_html/en-US/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/en-US/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/en-US/opds-Fedora_Documentation.xml b/public_html/en-US/opds-Fedora_Documentation.xml
index ace4700..140145d 100644
--- a/public_html/en-US/opds-Fedora_Documentation.xml
+++ b/public_html/en-US/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/en-US/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/en-US/opds-Fedora_Draft_Documentation.xml b/public_html/en-US/opds-Fedora_Draft_Documentation.xml
index e3e9606..8c330d0 100644
--- a/public_html/en-US/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/en-US/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/en-US/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/en-US/opds-Fedora_Security_Team.xml b/public_html/en-US/opds-Fedora_Security_Team.xml
index ff36f96..cfd64dc 100644
--- a/public_html/en-US/opds-Fedora_Security_Team.xml
+++ b/public_html/en-US/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/en-US/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/en-US/opds.xml b/public_html/en-US/opds.xml
index f245286..7c05702 100644
--- a/public_html/en-US/opds.xml
+++ b/public_html/en-US/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/en-US/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/en-US/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>en-US</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/en-US/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>en-US</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/en-US/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>en-US</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/en-US/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>en-US</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/en-US/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>en-US</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/en-US/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>en-US</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/en-US/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>en-US</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/es-ES/Site_Statistics.html b/public_html/es-ES/Site_Statistics.html
index 61fa269..8b2c200 100644
--- a/public_html/es-ES/Site_Statistics.html
+++ b/public_html/es-ES/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Idiomas totales: </b>44<br />
-	<b>Paquetes totales: </b>893
+	<b>Paquetes totales: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/es-ES/opds-Community_Services_Infrastructure.xml b/public_html/es-ES/opds-Community_Services_Infrastructure.xml
index e3ed480..cb65ea8 100644
--- a/public_html/es-ES/opds-Community_Services_Infrastructure.xml
+++ b/public_html/es-ES/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/es-ES/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/es-ES/opds-Fedora.xml b/public_html/es-ES/opds-Fedora.xml
index 24aaf17d..aacab99 100644
--- a/public_html/es-ES/opds-Fedora.xml
+++ b/public_html/es-ES/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/es-ES/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/es-ES/opds-Fedora_15.xml b/public_html/es-ES/opds-Fedora_15.xml
index 12484d0..db48f73 100644
--- a/public_html/es-ES/opds-Fedora_15.xml
+++ b/public_html/es-ES/opds-Fedora_15.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/es-ES/opds-Fedora_15.xml</id>
   <title>Fedora 15</title>
   <subtitle>Fedora 15</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/es-ES/opds-Fedora_Contributor_Documentation.xml b/public_html/es-ES/opds-Fedora_Contributor_Documentation.xml
index e1531c1..3ee4f7e 100644
--- a/public_html/es-ES/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/es-ES/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/es-ES/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Documentación de Contribuyente</title>
   <subtitle>Fedora Documentación de Contribuyente</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/es-ES/opds-Fedora_Core.xml b/public_html/es-ES/opds-Fedora_Core.xml
index fe060ca..ccac9f4 100644
--- a/public_html/es-ES/opds-Fedora_Core.xml
+++ b/public_html/es-ES/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/es-ES/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/es-ES/opds-Fedora_Documentation.xml b/public_html/es-ES/opds-Fedora_Documentation.xml
index 7f0f77d..b6616fe 100644
--- a/public_html/es-ES/opds-Fedora_Documentation.xml
+++ b/public_html/es-ES/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/es-ES/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/es-ES/opds-Fedora_Draft_Documentation.xml b/public_html/es-ES/opds-Fedora_Draft_Documentation.xml
index c6eb114..0a87147 100644
--- a/public_html/es-ES/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/es-ES/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/es-ES/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/es-ES/opds-Fedora_Security_Team.xml b/public_html/es-ES/opds-Fedora_Security_Team.xml
index 19192b2..f419510 100644
--- a/public_html/es-ES/opds-Fedora_Security_Team.xml
+++ b/public_html/es-ES/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/es-ES/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/es-ES/opds.xml b/public_html/es-ES/opds.xml
index 81f43a5..9a6381d 100644
--- a/public_html/es-ES/opds.xml
+++ b/public_html/es-ES/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/es-ES/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/es-ES/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>es-ES</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/es-ES/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>es-ES</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora 15</title>
     <id>http://docs.fedoraproject.org/es-ES/Fedora_15/opds-Fedora_15.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>es-ES</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_15.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Documentación de Contribuyente</title>
     <id>http://docs.fedoraproject.org/es-ES/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>es-ES</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/es-ES/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>es-ES</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/es-ES/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>es-ES</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/es-ES/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>es-ES</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -71,7 +71,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/es-ES/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>es-ES</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/fa-IR/Site_Statistics.html b/public_html/fa-IR/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/fa-IR/Site_Statistics.html
+++ b/public_html/fa-IR/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/fa-IR/opds-Community_Services_Infrastructure.xml b/public_html/fa-IR/opds-Community_Services_Infrastructure.xml
index 4fcf5d3..859bff6 100644
--- a/public_html/fa-IR/opds-Community_Services_Infrastructure.xml
+++ b/public_html/fa-IR/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/fa-IR/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/fa-IR/opds-Fedora.xml b/public_html/fa-IR/opds-Fedora.xml
index 9b2e59f..d03e7f5 100644
--- a/public_html/fa-IR/opds-Fedora.xml
+++ b/public_html/fa-IR/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/fa-IR/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/fa-IR/opds-Fedora_Contributor_Documentation.xml b/public_html/fa-IR/opds-Fedora_Contributor_Documentation.xml
index 610597f..1780800 100644
--- a/public_html/fa-IR/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/fa-IR/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/fa-IR/opds-Fedora_Contributor_Documentation.xml</id>
   <title>مستندات مشارکت کننده فدورا</title>
   <subtitle>مستندات مشارکت کننده فدورا</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/fa-IR/opds-Fedora_Core.xml b/public_html/fa-IR/opds-Fedora_Core.xml
index 801c6b6..4933cab 100644
--- a/public_html/fa-IR/opds-Fedora_Core.xml
+++ b/public_html/fa-IR/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/fa-IR/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/fa-IR/opds-Fedora_Documentation.xml b/public_html/fa-IR/opds-Fedora_Documentation.xml
index f699e68..7602fb6 100644
--- a/public_html/fa-IR/opds-Fedora_Documentation.xml
+++ b/public_html/fa-IR/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/fa-IR/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/fa-IR/opds-Fedora_Draft_Documentation.xml b/public_html/fa-IR/opds-Fedora_Draft_Documentation.xml
index 6241852..bcf4f5d 100644
--- a/public_html/fa-IR/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/fa-IR/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/fa-IR/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/fa-IR/opds-Fedora_Security_Team.xml b/public_html/fa-IR/opds-Fedora_Security_Team.xml
index a3603a2..6ee55d8 100644
--- a/public_html/fa-IR/opds-Fedora_Security_Team.xml
+++ b/public_html/fa-IR/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/fa-IR/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/fa-IR/opds.xml b/public_html/fa-IR/opds.xml
index e9add5d..d21ceb4 100644
--- a/public_html/fa-IR/opds.xml
+++ b/public_html/fa-IR/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/fa-IR/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/fa-IR/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>fa-IR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/fa-IR/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>fa-IR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>مستندات مشارکت کننده فدورا</title>
     <id>http://docs.fedoraproject.org/fa-IR/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>fa-IR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/fa-IR/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>fa-IR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/fa-IR/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>fa-IR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/fa-IR/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>fa-IR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/fa-IR/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>fa-IR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/fi-FI/Site_Statistics.html b/public_html/fi-FI/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/fi-FI/Site_Statistics.html
+++ b/public_html/fi-FI/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/fi-FI/opds-Community_Services_Infrastructure.xml b/public_html/fi-FI/opds-Community_Services_Infrastructure.xml
index b554f06..56502e3 100644
--- a/public_html/fi-FI/opds-Community_Services_Infrastructure.xml
+++ b/public_html/fi-FI/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/fi-FI/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:46</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/fi-FI/opds-Fedora.xml b/public_html/fi-FI/opds-Fedora.xml
index 59f77df..73c583c 100644
--- a/public_html/fi-FI/opds-Fedora.xml
+++ b/public_html/fi-FI/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/fi-FI/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/fi-FI/opds-Fedora_Contributor_Documentation.xml b/public_html/fi-FI/opds-Fedora_Contributor_Documentation.xml
index 9752415..483e4c7 100644
--- a/public_html/fi-FI/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/fi-FI/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/fi-FI/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:30</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/fi-FI/opds-Fedora_Core.xml b/public_html/fi-FI/opds-Fedora_Core.xml
index 447e598..0f2ee4c 100644
--- a/public_html/fi-FI/opds-Fedora_Core.xml
+++ b/public_html/fi-FI/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/fi-FI/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/fi-FI/opds-Fedora_Documentation.xml b/public_html/fi-FI/opds-Fedora_Documentation.xml
index 8b1015d..36aecf3 100644
--- a/public_html/fi-FI/opds-Fedora_Documentation.xml
+++ b/public_html/fi-FI/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/fi-FI/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/fi-FI/opds-Fedora_Draft_Documentation.xml b/public_html/fi-FI/opds-Fedora_Draft_Documentation.xml
index 49d84df..9941425 100644
--- a/public_html/fi-FI/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/fi-FI/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/fi-FI/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/fi-FI/opds-Fedora_Security_Team.xml b/public_html/fi-FI/opds-Fedora_Security_Team.xml
index 30faa7c..73c31b0 100644
--- a/public_html/fi-FI/opds-Fedora_Security_Team.xml
+++ b/public_html/fi-FI/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/fi-FI/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/fi-FI/opds.xml b/public_html/fi-FI/opds.xml
index 5e681a1..abb9de9 100644
--- a/public_html/fi-FI/opds.xml
+++ b/public_html/fi-FI/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/fi-FI/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/fi-FI/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>fi-FI</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/fi-FI/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>fi-FI</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/fi-FI/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>fi-FI</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/fi-FI/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>fi-FI</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/fi-FI/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>fi-FI</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/fi-FI/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>fi-FI</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/fi-FI/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>fi-FI</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/fr-FR/Site_Statistics.html b/public_html/fr-FR/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/fr-FR/Site_Statistics.html
+++ b/public_html/fr-FR/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/fr-FR/opds-Community_Services_Infrastructure.xml b/public_html/fr-FR/opds-Community_Services_Infrastructure.xml
index ec088c8..a389216 100644
--- a/public_html/fr-FR/opds-Community_Services_Infrastructure.xml
+++ b/public_html/fr-FR/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/fr-FR/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/fr-FR/opds-Fedora.xml b/public_html/fr-FR/opds-Fedora.xml
index a20b717..2f00a1c 100644
--- a/public_html/fr-FR/opds-Fedora.xml
+++ b/public_html/fr-FR/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/fr-FR/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/fr-FR/opds-Fedora_Contributor_Documentation.xml b/public_html/fr-FR/opds-Fedora_Contributor_Documentation.xml
index b70c598..4bdf488 100644
--- a/public_html/fr-FR/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/fr-FR/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/fr-FR/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/fr-FR/opds-Fedora_Core.xml b/public_html/fr-FR/opds-Fedora_Core.xml
index 0c01737..a048434 100644
--- a/public_html/fr-FR/opds-Fedora_Core.xml
+++ b/public_html/fr-FR/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/fr-FR/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/fr-FR/opds-Fedora_Documentation.xml b/public_html/fr-FR/opds-Fedora_Documentation.xml
index dca7b7f..acb5e63 100644
--- a/public_html/fr-FR/opds-Fedora_Documentation.xml
+++ b/public_html/fr-FR/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/fr-FR/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/fr-FR/opds-Fedora_Draft_Documentation.xml b/public_html/fr-FR/opds-Fedora_Draft_Documentation.xml
index 9a6fea6..cf99028 100644
--- a/public_html/fr-FR/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/fr-FR/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/fr-FR/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/fr-FR/opds-Fedora_Security_Team.xml b/public_html/fr-FR/opds-Fedora_Security_Team.xml
index 9fca577..8955118 100644
--- a/public_html/fr-FR/opds-Fedora_Security_Team.xml
+++ b/public_html/fr-FR/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/fr-FR/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/fr-FR/opds.xml b/public_html/fr-FR/opds.xml
index 4f04d95..9f9b294 100644
--- a/public_html/fr-FR/opds.xml
+++ b/public_html/fr-FR/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/fr-FR/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/fr-FR/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>fr-FR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/fr-FR/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>fr-FR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/fr-FR/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>fr-FR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/fr-FR/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>fr-FR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/fr-FR/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>fr-FR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/fr-FR/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>fr-FR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/fr-FR/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>fr-FR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/gu-IN/Site_Statistics.html b/public_html/gu-IN/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/gu-IN/Site_Statistics.html
+++ b/public_html/gu-IN/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/gu-IN/opds-Community_Services_Infrastructure.xml b/public_html/gu-IN/opds-Community_Services_Infrastructure.xml
index 6ef49c6..4bc1902 100644
--- a/public_html/gu-IN/opds-Community_Services_Infrastructure.xml
+++ b/public_html/gu-IN/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/gu-IN/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/gu-IN/opds-Fedora.xml b/public_html/gu-IN/opds-Fedora.xml
index 625504e..0c30f48 100644
--- a/public_html/gu-IN/opds-Fedora.xml
+++ b/public_html/gu-IN/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/gu-IN/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/gu-IN/opds-Fedora_Contributor_Documentation.xml b/public_html/gu-IN/opds-Fedora_Contributor_Documentation.xml
index 8f3514e..5a792fb 100644
--- a/public_html/gu-IN/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/gu-IN/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/gu-IN/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/gu-IN/opds-Fedora_Core.xml b/public_html/gu-IN/opds-Fedora_Core.xml
index a1de243..307d2dc 100644
--- a/public_html/gu-IN/opds-Fedora_Core.xml
+++ b/public_html/gu-IN/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/gu-IN/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/gu-IN/opds-Fedora_Documentation.xml b/public_html/gu-IN/opds-Fedora_Documentation.xml
index 1c9787a..fdf9d16 100644
--- a/public_html/gu-IN/opds-Fedora_Documentation.xml
+++ b/public_html/gu-IN/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/gu-IN/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/gu-IN/opds-Fedora_Draft_Documentation.xml b/public_html/gu-IN/opds-Fedora_Draft_Documentation.xml
index 44f213c..1045d01 100644
--- a/public_html/gu-IN/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/gu-IN/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/gu-IN/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/gu-IN/opds-Fedora_Security_Team.xml b/public_html/gu-IN/opds-Fedora_Security_Team.xml
index 2a21105..28c56e3 100644
--- a/public_html/gu-IN/opds-Fedora_Security_Team.xml
+++ b/public_html/gu-IN/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/gu-IN/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/gu-IN/opds.xml b/public_html/gu-IN/opds.xml
index 2d84e45..563d9ba 100644
--- a/public_html/gu-IN/opds.xml
+++ b/public_html/gu-IN/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/gu-IN/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/gu-IN/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>gu-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/gu-IN/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>gu-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/gu-IN/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>gu-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/gu-IN/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>gu-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/gu-IN/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>gu-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/gu-IN/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>gu-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/gu-IN/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>gu-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/he-IL/Site_Statistics.html b/public_html/he-IL/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/he-IL/Site_Statistics.html
+++ b/public_html/he-IL/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/he-IL/opds-Community_Services_Infrastructure.xml b/public_html/he-IL/opds-Community_Services_Infrastructure.xml
index 6204fa0..f8edf4e 100644
--- a/public_html/he-IL/opds-Community_Services_Infrastructure.xml
+++ b/public_html/he-IL/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/he-IL/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/he-IL/opds-Fedora.xml b/public_html/he-IL/opds-Fedora.xml
index 6ca44ee..f4dac83 100644
--- a/public_html/he-IL/opds-Fedora.xml
+++ b/public_html/he-IL/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/he-IL/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/he-IL/opds-Fedora_Contributor_Documentation.xml b/public_html/he-IL/opds-Fedora_Contributor_Documentation.xml
index f865052..730633b 100644
--- a/public_html/he-IL/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/he-IL/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/he-IL/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/he-IL/opds-Fedora_Core.xml b/public_html/he-IL/opds-Fedora_Core.xml
index 4e078cc..5bb19f1 100644
--- a/public_html/he-IL/opds-Fedora_Core.xml
+++ b/public_html/he-IL/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/he-IL/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/he-IL/opds-Fedora_Documentation.xml b/public_html/he-IL/opds-Fedora_Documentation.xml
index cf56c8e..1c6d926 100644
--- a/public_html/he-IL/opds-Fedora_Documentation.xml
+++ b/public_html/he-IL/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/he-IL/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/he-IL/opds-Fedora_Draft_Documentation.xml b/public_html/he-IL/opds-Fedora_Draft_Documentation.xml
index a600ed4..b546bb1 100644
--- a/public_html/he-IL/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/he-IL/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/he-IL/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/he-IL/opds-Fedora_Security_Team.xml b/public_html/he-IL/opds-Fedora_Security_Team.xml
index 4c9a4cb..7a19f94 100644
--- a/public_html/he-IL/opds-Fedora_Security_Team.xml
+++ b/public_html/he-IL/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/he-IL/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/he-IL/opds.xml b/public_html/he-IL/opds.xml
index 3cf710f..a302917 100644
--- a/public_html/he-IL/opds.xml
+++ b/public_html/he-IL/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/he-IL/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/he-IL/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>he-IL</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/he-IL/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>he-IL</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/he-IL/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>he-IL</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/he-IL/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>he-IL</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/he-IL/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>he-IL</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/he-IL/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>he-IL</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/he-IL/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>he-IL</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/hi-IN/Site_Statistics.html b/public_html/hi-IN/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/hi-IN/Site_Statistics.html
+++ b/public_html/hi-IN/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/hi-IN/opds-Community_Services_Infrastructure.xml b/public_html/hi-IN/opds-Community_Services_Infrastructure.xml
index 053a644..2db2b3b 100644
--- a/public_html/hi-IN/opds-Community_Services_Infrastructure.xml
+++ b/public_html/hi-IN/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/hi-IN/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/hi-IN/opds-Fedora.xml b/public_html/hi-IN/opds-Fedora.xml
index 4bf6b0d..a09ca0a 100644
--- a/public_html/hi-IN/opds-Fedora.xml
+++ b/public_html/hi-IN/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/hi-IN/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/hi-IN/opds-Fedora_Contributor_Documentation.xml b/public_html/hi-IN/opds-Fedora_Contributor_Documentation.xml
index 83b1778..4876c1d 100644
--- a/public_html/hi-IN/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/hi-IN/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/hi-IN/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/hi-IN/opds-Fedora_Core.xml b/public_html/hi-IN/opds-Fedora_Core.xml
index 91091a0..0838345 100644
--- a/public_html/hi-IN/opds-Fedora_Core.xml
+++ b/public_html/hi-IN/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/hi-IN/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/hi-IN/opds-Fedora_Documentation.xml b/public_html/hi-IN/opds-Fedora_Documentation.xml
index bb5f2d8..301d36d 100644
--- a/public_html/hi-IN/opds-Fedora_Documentation.xml
+++ b/public_html/hi-IN/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/hi-IN/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/hi-IN/opds-Fedora_Draft_Documentation.xml b/public_html/hi-IN/opds-Fedora_Draft_Documentation.xml
index 6a62f67..629efe8 100644
--- a/public_html/hi-IN/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/hi-IN/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/hi-IN/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/hi-IN/opds-Fedora_Security_Team.xml b/public_html/hi-IN/opds-Fedora_Security_Team.xml
index 0ca982d..e715895 100644
--- a/public_html/hi-IN/opds-Fedora_Security_Team.xml
+++ b/public_html/hi-IN/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/hi-IN/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/hi-IN/opds.xml b/public_html/hi-IN/opds.xml
index 6eb13f0..32b18d9 100644
--- a/public_html/hi-IN/opds.xml
+++ b/public_html/hi-IN/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/hi-IN/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/hi-IN/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>hi-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/hi-IN/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>hi-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/hi-IN/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>hi-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/hi-IN/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>hi-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/hi-IN/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>hi-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/hi-IN/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>hi-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/hi-IN/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>hi-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/hu-HU/Site_Statistics.html b/public_html/hu-HU/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/hu-HU/Site_Statistics.html
+++ b/public_html/hu-HU/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/hu-HU/opds-Community_Services_Infrastructure.xml b/public_html/hu-HU/opds-Community_Services_Infrastructure.xml
index 8669659..a7f65e4 100644
--- a/public_html/hu-HU/opds-Community_Services_Infrastructure.xml
+++ b/public_html/hu-HU/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/hu-HU/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:47</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/hu-HU/opds-Fedora.xml b/public_html/hu-HU/opds-Fedora.xml
index b01898e..7f0dba2 100644
--- a/public_html/hu-HU/opds-Fedora.xml
+++ b/public_html/hu-HU/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/hu-HU/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/hu-HU/opds-Fedora_Contributor_Documentation.xml b/public_html/hu-HU/opds-Fedora_Contributor_Documentation.xml
index dabf6bd..7e16872 100644
--- a/public_html/hu-HU/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/hu-HU/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/hu-HU/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/hu-HU/opds-Fedora_Core.xml b/public_html/hu-HU/opds-Fedora_Core.xml
index 1313304..cb017d5 100644
--- a/public_html/hu-HU/opds-Fedora_Core.xml
+++ b/public_html/hu-HU/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/hu-HU/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/hu-HU/opds-Fedora_Documentation.xml b/public_html/hu-HU/opds-Fedora_Documentation.xml
index 7ff2253..f6fbfd5 100644
--- a/public_html/hu-HU/opds-Fedora_Documentation.xml
+++ b/public_html/hu-HU/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/hu-HU/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/hu-HU/opds-Fedora_Draft_Documentation.xml b/public_html/hu-HU/opds-Fedora_Draft_Documentation.xml
index 3be228d..8c2b54b 100644
--- a/public_html/hu-HU/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/hu-HU/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/hu-HU/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/hu-HU/opds-Fedora_Security_Team.xml b/public_html/hu-HU/opds-Fedora_Security_Team.xml
index ee71508..5b1c32c 100644
--- a/public_html/hu-HU/opds-Fedora_Security_Team.xml
+++ b/public_html/hu-HU/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/hu-HU/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:31</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/hu-HU/opds.xml b/public_html/hu-HU/opds.xml
index e1fe5c3..83468e2 100644
--- a/public_html/hu-HU/opds.xml
+++ b/public_html/hu-HU/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/hu-HU/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/hu-HU/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>hu-HU</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/hu-HU/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>hu-HU</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/hu-HU/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>hu-HU</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/hu-HU/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>hu-HU</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/hu-HU/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>hu-HU</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/hu-HU/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>hu-HU</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/hu-HU/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>hu-HU</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/ia/Site_Statistics.html b/public_html/ia/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/ia/Site_Statistics.html
+++ b/public_html/ia/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/ia/opds-Community_Services_Infrastructure.xml b/public_html/ia/opds-Community_Services_Infrastructure.xml
index 7d376eb..0d92472 100644
--- a/public_html/ia/opds-Community_Services_Infrastructure.xml
+++ b/public_html/ia/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ia/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ia/opds-Fedora.xml b/public_html/ia/opds-Fedora.xml
index c1f7743..45bc181 100644
--- a/public_html/ia/opds-Fedora.xml
+++ b/public_html/ia/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ia/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ia/opds-Fedora_Contributor_Documentation.xml b/public_html/ia/opds-Fedora_Contributor_Documentation.xml
index e6b70a0..d3eb815 100644
--- a/public_html/ia/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/ia/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ia/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ia/opds-Fedora_Core.xml b/public_html/ia/opds-Fedora_Core.xml
index df0eb27..32d4876 100644
--- a/public_html/ia/opds-Fedora_Core.xml
+++ b/public_html/ia/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ia/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ia/opds-Fedora_Documentation.xml b/public_html/ia/opds-Fedora_Documentation.xml
index 26afced..90aecd4 100644
--- a/public_html/ia/opds-Fedora_Documentation.xml
+++ b/public_html/ia/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ia/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ia/opds-Fedora_Draft_Documentation.xml b/public_html/ia/opds-Fedora_Draft_Documentation.xml
index 76f43af..a33fba3 100644
--- a/public_html/ia/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/ia/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ia/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ia/opds-Fedora_Security_Team.xml b/public_html/ia/opds-Fedora_Security_Team.xml
index eade092..7905156 100644
--- a/public_html/ia/opds-Fedora_Security_Team.xml
+++ b/public_html/ia/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ia/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ia/opds.xml b/public_html/ia/opds.xml
index e3e7d0e..001da60 100644
--- a/public_html/ia/opds.xml
+++ b/public_html/ia/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/ia/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/ia/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>ia</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/ia/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>ia</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/ia/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>ia</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/ia/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>ia</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/ia/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>ia</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/ia/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>ia</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/ia/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>ia</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/id-ID/Site_Statistics.html b/public_html/id-ID/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/id-ID/Site_Statistics.html
+++ b/public_html/id-ID/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/id-ID/opds-Community_Services_Infrastructure.xml b/public_html/id-ID/opds-Community_Services_Infrastructure.xml
index 8894f15..6048bb8 100644
--- a/public_html/id-ID/opds-Community_Services_Infrastructure.xml
+++ b/public_html/id-ID/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/id-ID/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/id-ID/opds-Fedora.xml b/public_html/id-ID/opds-Fedora.xml
index ad958e2..c0f9d44 100644
--- a/public_html/id-ID/opds-Fedora.xml
+++ b/public_html/id-ID/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/id-ID/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/id-ID/opds-Fedora_Contributor_Documentation.xml b/public_html/id-ID/opds-Fedora_Contributor_Documentation.xml
index 5361e2e..8f231f1 100644
--- a/public_html/id-ID/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/id-ID/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/id-ID/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/id-ID/opds-Fedora_Core.xml b/public_html/id-ID/opds-Fedora_Core.xml
index 9ad17a2..dff7f84 100644
--- a/public_html/id-ID/opds-Fedora_Core.xml
+++ b/public_html/id-ID/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/id-ID/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/id-ID/opds-Fedora_Documentation.xml b/public_html/id-ID/opds-Fedora_Documentation.xml
index 3a3c2cb..596eee1 100644
--- a/public_html/id-ID/opds-Fedora_Documentation.xml
+++ b/public_html/id-ID/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/id-ID/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/id-ID/opds-Fedora_Draft_Documentation.xml b/public_html/id-ID/opds-Fedora_Draft_Documentation.xml
index 215e6d9..a354b93 100644
--- a/public_html/id-ID/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/id-ID/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/id-ID/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/id-ID/opds-Fedora_Security_Team.xml b/public_html/id-ID/opds-Fedora_Security_Team.xml
index 3fcc809..0f9fb1f 100644
--- a/public_html/id-ID/opds-Fedora_Security_Team.xml
+++ b/public_html/id-ID/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/id-ID/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/id-ID/opds.xml b/public_html/id-ID/opds.xml
index 4b1c8de..3b4b286 100644
--- a/public_html/id-ID/opds.xml
+++ b/public_html/id-ID/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/id-ID/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/id-ID/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>id-ID</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/id-ID/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>id-ID</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/id-ID/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>id-ID</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/id-ID/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>id-ID</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/id-ID/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>id-ID</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/id-ID/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>id-ID</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/id-ID/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>id-ID</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/it-IT/Site_Statistics.html b/public_html/it-IT/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/it-IT/Site_Statistics.html
+++ b/public_html/it-IT/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/it-IT/opds-Community_Services_Infrastructure.xml b/public_html/it-IT/opds-Community_Services_Infrastructure.xml
index 6fa74e4..3b13cdb 100644
--- a/public_html/it-IT/opds-Community_Services_Infrastructure.xml
+++ b/public_html/it-IT/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/it-IT/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/it-IT/opds-Fedora.xml b/public_html/it-IT/opds-Fedora.xml
index 4aa6f49..019b4c0 100644
--- a/public_html/it-IT/opds-Fedora.xml
+++ b/public_html/it-IT/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/it-IT/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/it-IT/opds-Fedora_Contributor_Documentation.xml b/public_html/it-IT/opds-Fedora_Contributor_Documentation.xml
index 3c6a314..4ed19c5 100644
--- a/public_html/it-IT/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/it-IT/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/it-IT/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Documentazione Collaboratori Fedora</title>
   <subtitle>Documentazione Collaboratori Fedora</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/it-IT/opds-Fedora_Core.xml b/public_html/it-IT/opds-Fedora_Core.xml
index 48a76d3..2ac40f1 100644
--- a/public_html/it-IT/opds-Fedora_Core.xml
+++ b/public_html/it-IT/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/it-IT/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/it-IT/opds-Fedora_Documentation.xml b/public_html/it-IT/opds-Fedora_Documentation.xml
index 971c8ad..4fd4f21 100644
--- a/public_html/it-IT/opds-Fedora_Documentation.xml
+++ b/public_html/it-IT/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/it-IT/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/it-IT/opds-Fedora_Draft_Documentation.xml b/public_html/it-IT/opds-Fedora_Draft_Documentation.xml
index 07b20ae..cd56ea0 100644
--- a/public_html/it-IT/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/it-IT/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/it-IT/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/it-IT/opds-Fedora_Security_Team.xml b/public_html/it-IT/opds-Fedora_Security_Team.xml
index 545997a..d934922 100644
--- a/public_html/it-IT/opds-Fedora_Security_Team.xml
+++ b/public_html/it-IT/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/it-IT/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/it-IT/opds.xml b/public_html/it-IT/opds.xml
index 04d3737..5808123 100644
--- a/public_html/it-IT/opds.xml
+++ b/public_html/it-IT/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/it-IT/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/it-IT/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>it-IT</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/it-IT/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>it-IT</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Documentazione Collaboratori Fedora</title>
     <id>http://docs.fedoraproject.org/it-IT/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>it-IT</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/it-IT/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>it-IT</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/it-IT/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>it-IT</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/it-IT/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>it-IT</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/it-IT/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>it-IT</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/ja-JP/Site_Statistics.html b/public_html/ja-JP/Site_Statistics.html
index 9e6e5f3..5df151f 100644
--- a/public_html/ja-JP/Site_Statistics.html
+++ b/public_html/ja-JP/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>言語数の合計: </b>44<br />
-	<b>パッケージ数の合計: </b>893
+	<b>パッケージ数の合計: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/ja-JP/opds-Community_Services_Infrastructure.xml b/public_html/ja-JP/opds-Community_Services_Infrastructure.xml
index 4be35df..f7bd77e 100644
--- a/public_html/ja-JP/opds-Community_Services_Infrastructure.xml
+++ b/public_html/ja-JP/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ja-JP/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ja-JP/opds-Fedora.xml b/public_html/ja-JP/opds-Fedora.xml
index ad350af..e8577f2 100644
--- a/public_html/ja-JP/opds-Fedora.xml
+++ b/public_html/ja-JP/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ja-JP/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -140,8 +140,8 @@
     <!--link type="application/atom+xml;type=entry" href="" rel="alternate" title="Full entry"/-->
  </entry>
   <entry>
-    <title>セキュリティガイド</title>
-    <id>http://docs.fedoraproject.org/ja-JP/Fedora/19/epub/Security_Guide/Fedora-19-Security_Guide-ja-JP.epub</id>
+    <title>Security Guide</title>
+    <id>http://docs.fedoraproject.org/en-US/Fedora/19/epub/Security_Guide/Fedora-19-Security_Guide-en-US.epub</id>
     <!--author>
       <name></name>
       <uri></uri>
@@ -152,7 +152,7 @@
     <!--dc:issued></dc:issued-->
     <summary>A Guide to Securing Fedora Linux</summary>
     <content type="text">The Fedora Security Guide is designed to assist users of Fedora in learning the processes and practices of securing workstations and servers against local and remote intrusion, exploitation, and malicious activity. Focused on Fedora Linux but detailing concepts and techniques valid for all Linux systems, the Fedora Security Guide details the planning and the tools involved in creating a secured computing environment for the data center, workplace, and home. With proper administrative knowledge, vigilance, and tools, systems running Linux can be both fully functional and secured from most common intrusion and exploit methods.</content>
-    <link type="application/epub+zip" rel="http://opds-spec.org/acquisition" href="http://docs.fedoraproject.org/ja-JP/Fedora/19/epub/Security_Guide/Fedora-19-Security_Guide-ja-JP.epub">
+    <link type="application/epub+zip" rel="http://opds-spec.org/acquisition" href="http://docs.fedoraproject.org/en-US/Fedora/19/epub/Security_Guide/Fedora-19-Security_Guide-en-US.epub">
       <dc:format>application/epub+zip</dc:format>
     </link>      
     <!--link type="application/atom+xml;type=entry" href="" rel="alternate" title="Full entry"/-->
diff --git a/public_html/ja-JP/opds-Fedora_Contributor_Documentation.xml b/public_html/ja-JP/opds-Fedora_Contributor_Documentation.xml
index e17e028..5009f4b 100644
--- a/public_html/ja-JP/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/ja-JP/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ja-JP/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora コントリビュータ用ドキュメント</title>
   <subtitle>Fedora コントリビュータ用ドキュメント</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ja-JP/opds-Fedora_Core.xml b/public_html/ja-JP/opds-Fedora_Core.xml
index 1495d7c..f93fcde 100644
--- a/public_html/ja-JP/opds-Fedora_Core.xml
+++ b/public_html/ja-JP/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ja-JP/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ja-JP/opds-Fedora_Documentation.xml b/public_html/ja-JP/opds-Fedora_Documentation.xml
index f75fd8f..4e8ba5e 100644
--- a/public_html/ja-JP/opds-Fedora_Documentation.xml
+++ b/public_html/ja-JP/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ja-JP/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ja-JP/opds-Fedora_Draft_Documentation.xml b/public_html/ja-JP/opds-Fedora_Draft_Documentation.xml
index b15ab6c..955183b 100644
--- a/public_html/ja-JP/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/ja-JP/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ja-JP/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora ドラフト文書</title>
   <subtitle>Fedora ドラフト文書</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ja-JP/opds-Fedora_Security_Team.xml b/public_html/ja-JP/opds-Fedora_Security_Team.xml
index 44d60d8..c015c0a 100644
--- a/public_html/ja-JP/opds-Fedora_Security_Team.xml
+++ b/public_html/ja-JP/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ja-JP/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ja-JP/opds.xml b/public_html/ja-JP/opds.xml
index 8e67faa..b3c55c0 100644
--- a/public_html/ja-JP/opds.xml
+++ b/public_html/ja-JP/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/ja-JP/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/ja-JP/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>ja-JP</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/ja-JP/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>ja-JP</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora コントリビュータ用ドキュメント</title>
     <id>http://docs.fedoraproject.org/ja-JP/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>ja-JP</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/ja-JP/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>ja-JP</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/ja-JP/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>ja-JP</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora ドラフト文書</title>
     <id>http://docs.fedoraproject.org/ja-JP/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>ja-JP</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/ja-JP/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>ja-JP</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/ja-JP/toc.html b/public_html/ja-JP/toc.html
index f42a210..bb46752 100644
--- a/public_html/ja-JP/toc.html
+++ b/public_html/ja-JP/toc.html
@@ -125,15 +125,6 @@
 							<a class="type" href="./Fedora/19/pdf/Release_Notes/Fedora-19-Release_Notes-ja-JP.pdf" onclick="window.top.location='./Fedora/19/pdf/Release_Notes/Fedora-19-Release_Notes-ja-JP.pdf';return false;">pdf</a>
 						</div>
 					</div>
-					<div id='Fedora.19.Security_Guide' class="book collapsed">
-						<a class="type" href="Fedora/19/html/Security_Guide/index.html" onclick="window.top.location='./Fedora/19/html/Security_Guide/index.html'"><span class="book">セキュリティガイド</span></a> 
-						<div id='Fedora.19.Security_Guide.types' class="types" onclick="work=0;">
-							<a class="type" href="./Fedora/19/epub/Security_Guide/Fedora-19-Security_Guide-ja-JP.epub" >epub</a>
-							<a class="type" href="./Fedora/19/html/Security_Guide/index.html" onclick="window.top.location='./Fedora/19/html/Security_Guide/index.html';return false;">html</a>
-							<a class="type" href="./Fedora/19/html-single/Security_Guide/index.html" onclick="window.top.location='./Fedora/19/html-single/Security_Guide/index.html';return false;">html-single</a>
-							<a class="type" href="./Fedora/19/pdf/Security_Guide/Fedora-19-Security_Guide-ja-JP.pdf" onclick="window.top.location='./Fedora/19/pdf/Security_Guide/Fedora-19-Security_Guide-ja-JP.pdf';return false;">pdf</a>
-						</div>
-					</div>
 					<div id='Fedora.19' class="version collapsed untranslated" onclick="toggle(event, 'Fedora.19.untrans_books');">
 						<span class="version">未翻訳</span>
 						<div id='Fedora.19.untrans_books' class="books hidden">
@@ -182,6 +173,15 @@
 									<a class="type" href="../en-US/./Fedora/19/pdf/Power_Management_Guide/Fedora-19-Power_Management_Guide-en-US.pdf" onclick="window.top.location='../en-US/./Fedora/19/pdf/Power_Management_Guide/Fedora-19-Power_Management_Guide-en-US.pdf';return false;">pdf</a>
 								</div>
 							</div>
+							<div id='Fedora.19.Security_Guide' class="book collapsed" onclick="toggle(event, 'Fedora.19.Security_Guide.types');">
+								<a class="type" href="../en-US/Fedora/19/html/Security_Guide/index.html" onclick="window.top.location='../en-US/Fedora/19/html/Security_Guide/index.html'"><span class="book">Security Guide</span></a> 
+								<div id='Fedora.19.Security_Guide.types' class="types hidden" onclick="work=0;">
+									<a class="type" href="../en-US/./Fedora/19/epub/Security_Guide/Fedora-19-Security_Guide-en-US.epub" >epub</a>
+									<a class="type" href="../en-US/./Fedora/19/html/Security_Guide/index.html" onclick="window.top.location='../en-US/./Fedora/19/html/Security_Guide/index.html';return false;">html</a>
+									<a class="type" href="../en-US/./Fedora/19/html-single/Security_Guide/index.html" onclick="window.top.location='../en-US/./Fedora/19/html-single/Security_Guide/index.html';return false;">html-single</a>
+									<a class="type" href="../en-US/./Fedora/19/pdf/Security_Guide/Fedora-19-Security_Guide-en-US.pdf" onclick="window.top.location='../en-US/./Fedora/19/pdf/Security_Guide/Fedora-19-Security_Guide-en-US.pdf';return false;">pdf</a>
+								</div>
+							</div>
 							<div id='Fedora.19.Virtualization_Getting_Started_Guide' class="book collapsed" onclick="toggle(event, 'Fedora.19.Virtualization_Getting_Started_Guide.types');">
 								<a class="type" href="../en-US/Fedora/19/html/Virtualization_Getting_Started_Guide/index.html" onclick="window.top.location='../en-US/Fedora/19/html/Virtualization_Getting_Started_Guide/index.html'"><span class="book">Virtualization Getting Started Guide</span></a> 
 								<div id='Fedora.19.Virtualization_Getting_Started_Guide.types' class="types hidden" onclick="work=0;">
diff --git a/public_html/kn-IN/Site_Statistics.html b/public_html/kn-IN/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/kn-IN/Site_Statistics.html
+++ b/public_html/kn-IN/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/kn-IN/opds-Community_Services_Infrastructure.xml b/public_html/kn-IN/opds-Community_Services_Infrastructure.xml
index 4475a88..fcfc875 100644
--- a/public_html/kn-IN/opds-Community_Services_Infrastructure.xml
+++ b/public_html/kn-IN/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/kn-IN/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/kn-IN/opds-Fedora.xml b/public_html/kn-IN/opds-Fedora.xml
index 3f2f234..2473c48 100644
--- a/public_html/kn-IN/opds-Fedora.xml
+++ b/public_html/kn-IN/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/kn-IN/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/kn-IN/opds-Fedora_Contributor_Documentation.xml b/public_html/kn-IN/opds-Fedora_Contributor_Documentation.xml
index e8a6d48..3bde9a2 100644
--- a/public_html/kn-IN/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/kn-IN/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/kn-IN/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/kn-IN/opds-Fedora_Core.xml b/public_html/kn-IN/opds-Fedora_Core.xml
index e8e014b..8146d7c 100644
--- a/public_html/kn-IN/opds-Fedora_Core.xml
+++ b/public_html/kn-IN/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/kn-IN/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/kn-IN/opds-Fedora_Documentation.xml b/public_html/kn-IN/opds-Fedora_Documentation.xml
index aa5435a..e7333cb 100644
--- a/public_html/kn-IN/opds-Fedora_Documentation.xml
+++ b/public_html/kn-IN/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/kn-IN/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/kn-IN/opds-Fedora_Draft_Documentation.xml b/public_html/kn-IN/opds-Fedora_Draft_Documentation.xml
index add28c9..96681b3 100644
--- a/public_html/kn-IN/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/kn-IN/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/kn-IN/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:48</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/kn-IN/opds-Fedora_Security_Team.xml b/public_html/kn-IN/opds-Fedora_Security_Team.xml
index ef77f6e..a0e4f9f 100644
--- a/public_html/kn-IN/opds-Fedora_Security_Team.xml
+++ b/public_html/kn-IN/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/kn-IN/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/kn-IN/opds.xml b/public_html/kn-IN/opds.xml
index 55aeffe..2f7b353 100644
--- a/public_html/kn-IN/opds.xml
+++ b/public_html/kn-IN/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/kn-IN/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/kn-IN/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>kn-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/kn-IN/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>kn-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/kn-IN/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>kn-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/kn-IN/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>kn-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/kn-IN/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>kn-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/kn-IN/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>kn-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/kn-IN/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>kn-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/ko-KR/Site_Statistics.html b/public_html/ko-KR/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/ko-KR/Site_Statistics.html
+++ b/public_html/ko-KR/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/ko-KR/opds-Community_Services_Infrastructure.xml b/public_html/ko-KR/opds-Community_Services_Infrastructure.xml
index 4b9ac05..bdee563 100644
--- a/public_html/ko-KR/opds-Community_Services_Infrastructure.xml
+++ b/public_html/ko-KR/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ko-KR/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:32</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ko-KR/opds-Fedora.xml b/public_html/ko-KR/opds-Fedora.xml
index 25ad048..e76d233 100644
--- a/public_html/ko-KR/opds-Fedora.xml
+++ b/public_html/ko-KR/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ko-KR/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ko-KR/opds-Fedora_Contributor_Documentation.xml b/public_html/ko-KR/opds-Fedora_Contributor_Documentation.xml
index e0a34ce..8f1a990 100644
--- a/public_html/ko-KR/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/ko-KR/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ko-KR/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ko-KR/opds-Fedora_Core.xml b/public_html/ko-KR/opds-Fedora_Core.xml
index d6b3584..4cfd525 100644
--- a/public_html/ko-KR/opds-Fedora_Core.xml
+++ b/public_html/ko-KR/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ko-KR/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ko-KR/opds-Fedora_Documentation.xml b/public_html/ko-KR/opds-Fedora_Documentation.xml
index 3f68ac9..0389198 100644
--- a/public_html/ko-KR/opds-Fedora_Documentation.xml
+++ b/public_html/ko-KR/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ko-KR/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ko-KR/opds-Fedora_Draft_Documentation.xml b/public_html/ko-KR/opds-Fedora_Draft_Documentation.xml
index 339f051..f8df4aa 100644
--- a/public_html/ko-KR/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/ko-KR/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ko-KR/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ko-KR/opds-Fedora_Security_Team.xml b/public_html/ko-KR/opds-Fedora_Security_Team.xml
index 7ba1353..cf8b5b6 100644
--- a/public_html/ko-KR/opds-Fedora_Security_Team.xml
+++ b/public_html/ko-KR/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ko-KR/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ko-KR/opds.xml b/public_html/ko-KR/opds.xml
index 45ff851..1d7af0f 100644
--- a/public_html/ko-KR/opds.xml
+++ b/public_html/ko-KR/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/ko-KR/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/ko-KR/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>ko-KR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/ko-KR/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>ko-KR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/ko-KR/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>ko-KR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/ko-KR/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>ko-KR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/ko-KR/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>ko-KR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/ko-KR/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>ko-KR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/ko-KR/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>ko-KR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/ml-IN/Site_Statistics.html b/public_html/ml-IN/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/ml-IN/Site_Statistics.html
+++ b/public_html/ml-IN/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/ml-IN/opds-Community_Services_Infrastructure.xml b/public_html/ml-IN/opds-Community_Services_Infrastructure.xml
index b726c4c..fd97e6b 100644
--- a/public_html/ml-IN/opds-Community_Services_Infrastructure.xml
+++ b/public_html/ml-IN/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ml-IN/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ml-IN/opds-Fedora.xml b/public_html/ml-IN/opds-Fedora.xml
index dc38b45..0b6fcfa 100644
--- a/public_html/ml-IN/opds-Fedora.xml
+++ b/public_html/ml-IN/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ml-IN/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ml-IN/opds-Fedora_Contributor_Documentation.xml b/public_html/ml-IN/opds-Fedora_Contributor_Documentation.xml
index 2cfaffc..bead2c3 100644
--- a/public_html/ml-IN/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/ml-IN/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ml-IN/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ml-IN/opds-Fedora_Core.xml b/public_html/ml-IN/opds-Fedora_Core.xml
index 758e19e..82fbaf5 100644
--- a/public_html/ml-IN/opds-Fedora_Core.xml
+++ b/public_html/ml-IN/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ml-IN/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ml-IN/opds-Fedora_Documentation.xml b/public_html/ml-IN/opds-Fedora_Documentation.xml
index 39dcd9f..729b61b 100644
--- a/public_html/ml-IN/opds-Fedora_Documentation.xml
+++ b/public_html/ml-IN/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ml-IN/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ml-IN/opds-Fedora_Draft_Documentation.xml b/public_html/ml-IN/opds-Fedora_Draft_Documentation.xml
index 11db006..e36f4ff 100644
--- a/public_html/ml-IN/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/ml-IN/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ml-IN/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ml-IN/opds-Fedora_Security_Team.xml b/public_html/ml-IN/opds-Fedora_Security_Team.xml
index 082f0cf..8d74a57 100644
--- a/public_html/ml-IN/opds-Fedora_Security_Team.xml
+++ b/public_html/ml-IN/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ml-IN/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ml-IN/opds.xml b/public_html/ml-IN/opds.xml
index 9a7f37d..8b867c2 100644
--- a/public_html/ml-IN/opds.xml
+++ b/public_html/ml-IN/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/ml-IN/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/ml-IN/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>ml-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/ml-IN/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>ml-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/ml-IN/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>ml-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/ml-IN/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>ml-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/ml-IN/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>ml-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/ml-IN/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>ml-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/ml-IN/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>ml-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/mr-IN/Site_Statistics.html b/public_html/mr-IN/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/mr-IN/Site_Statistics.html
+++ b/public_html/mr-IN/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/mr-IN/opds-Community_Services_Infrastructure.xml b/public_html/mr-IN/opds-Community_Services_Infrastructure.xml
index 2367c88..b19b4a3 100644
--- a/public_html/mr-IN/opds-Community_Services_Infrastructure.xml
+++ b/public_html/mr-IN/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/mr-IN/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/mr-IN/opds-Fedora.xml b/public_html/mr-IN/opds-Fedora.xml
index d19b433..fa80fc2 100644
--- a/public_html/mr-IN/opds-Fedora.xml
+++ b/public_html/mr-IN/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/mr-IN/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/mr-IN/opds-Fedora_Contributor_Documentation.xml b/public_html/mr-IN/opds-Fedora_Contributor_Documentation.xml
index 19446da..c78197f 100644
--- a/public_html/mr-IN/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/mr-IN/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/mr-IN/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/mr-IN/opds-Fedora_Core.xml b/public_html/mr-IN/opds-Fedora_Core.xml
index c9b6365..07d67f3 100644
--- a/public_html/mr-IN/opds-Fedora_Core.xml
+++ b/public_html/mr-IN/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/mr-IN/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/mr-IN/opds-Fedora_Documentation.xml b/public_html/mr-IN/opds-Fedora_Documentation.xml
index 70ffd3c..a2cec5c 100644
--- a/public_html/mr-IN/opds-Fedora_Documentation.xml
+++ b/public_html/mr-IN/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/mr-IN/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/mr-IN/opds-Fedora_Draft_Documentation.xml b/public_html/mr-IN/opds-Fedora_Draft_Documentation.xml
index 8979b8e..d181611 100644
--- a/public_html/mr-IN/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/mr-IN/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/mr-IN/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/mr-IN/opds-Fedora_Security_Team.xml b/public_html/mr-IN/opds-Fedora_Security_Team.xml
index 13dddd8..4257a82 100644
--- a/public_html/mr-IN/opds-Fedora_Security_Team.xml
+++ b/public_html/mr-IN/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/mr-IN/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/mr-IN/opds.xml b/public_html/mr-IN/opds.xml
index 97e64f7..dba5284 100644
--- a/public_html/mr-IN/opds.xml
+++ b/public_html/mr-IN/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/mr-IN/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/mr-IN/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>mr-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/mr-IN/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>mr-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/mr-IN/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>mr-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/mr-IN/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>mr-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/mr-IN/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>mr-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/mr-IN/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>mr-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/mr-IN/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>mr-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/nb-NO/Site_Statistics.html b/public_html/nb-NO/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/nb-NO/Site_Statistics.html
+++ b/public_html/nb-NO/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/nb-NO/opds-Community_Services_Infrastructure.xml b/public_html/nb-NO/opds-Community_Services_Infrastructure.xml
index 7afa0c3..13523f5 100644
--- a/public_html/nb-NO/opds-Community_Services_Infrastructure.xml
+++ b/public_html/nb-NO/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/nb-NO/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/nb-NO/opds-Fedora.xml b/public_html/nb-NO/opds-Fedora.xml
index 0d4b07b..7b5d91f 100644
--- a/public_html/nb-NO/opds-Fedora.xml
+++ b/public_html/nb-NO/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/nb-NO/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/nb-NO/opds-Fedora_Contributor_Documentation.xml b/public_html/nb-NO/opds-Fedora_Contributor_Documentation.xml
index 32fde95..a41a704 100644
--- a/public_html/nb-NO/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/nb-NO/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/nb-NO/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/nb-NO/opds-Fedora_Core.xml b/public_html/nb-NO/opds-Fedora_Core.xml
index c874bb1..01e3105 100644
--- a/public_html/nb-NO/opds-Fedora_Core.xml
+++ b/public_html/nb-NO/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/nb-NO/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/nb-NO/opds-Fedora_Documentation.xml b/public_html/nb-NO/opds-Fedora_Documentation.xml
index 9fca2b0..1130c51 100644
--- a/public_html/nb-NO/opds-Fedora_Documentation.xml
+++ b/public_html/nb-NO/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/nb-NO/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/nb-NO/opds-Fedora_Draft_Documentation.xml b/public_html/nb-NO/opds-Fedora_Draft_Documentation.xml
index 1416180..e399067 100644
--- a/public_html/nb-NO/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/nb-NO/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/nb-NO/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/nb-NO/opds-Fedora_Security_Team.xml b/public_html/nb-NO/opds-Fedora_Security_Team.xml
index e210f2d..801ee59 100644
--- a/public_html/nb-NO/opds-Fedora_Security_Team.xml
+++ b/public_html/nb-NO/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/nb-NO/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/nb-NO/opds.xml b/public_html/nb-NO/opds.xml
index 1daa495..90b1266 100644
--- a/public_html/nb-NO/opds.xml
+++ b/public_html/nb-NO/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/nb-NO/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/nb-NO/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>nb-NO</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/nb-NO/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>nb-NO</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/nb-NO/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>nb-NO</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/nb-NO/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>nb-NO</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/nb-NO/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>nb-NO</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/nb-NO/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>nb-NO</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/nb-NO/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>nb-NO</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/nl-NL/Site_Statistics.html b/public_html/nl-NL/Site_Statistics.html
index 08cdba4..3df4e39 100644
--- a/public_html/nl-NL/Site_Statistics.html
+++ b/public_html/nl-NL/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Totaal talen: </b>44<br />
-	<b>Totaal pakketten: </b>893
+	<b>Totaal pakketten: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/nl-NL/opds-Community_Services_Infrastructure.xml b/public_html/nl-NL/opds-Community_Services_Infrastructure.xml
index b7c58dc..6db1a4a 100644
--- a/public_html/nl-NL/opds-Community_Services_Infrastructure.xml
+++ b/public_html/nl-NL/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/nl-NL/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/nl-NL/opds-Fedora.xml b/public_html/nl-NL/opds-Fedora.xml
index f980cab..70005ff 100644
--- a/public_html/nl-NL/opds-Fedora.xml
+++ b/public_html/nl-NL/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/nl-NL/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -140,8 +140,8 @@
     <!--link type="application/atom+xml;type=entry" href="" rel="alternate" title="Full entry"/-->
  </entry>
   <entry>
-    <title>Beveiligingsgids</title>
-    <id>http://docs.fedoraproject.org/nl-NL/Fedora/19/epub/Security_Guide/Fedora-19-Security_Guide-nl-NL.epub</id>
+    <title>Security Guide</title>
+    <id>http://docs.fedoraproject.org/en-US/Fedora/19/epub/Security_Guide/Fedora-19-Security_Guide-en-US.epub</id>
     <!--author>
       <name></name>
       <uri></uri>
@@ -152,7 +152,7 @@
     <!--dc:issued></dc:issued-->
     <summary>A Guide to Securing Fedora Linux</summary>
     <content type="text">The Fedora Security Guide is designed to assist users of Fedora in learning the processes and practices of securing workstations and servers against local and remote intrusion, exploitation, and malicious activity. Focused on Fedora Linux but detailing concepts and techniques valid for all Linux systems, the Fedora Security Guide details the planning and the tools involved in creating a secured computing environment for the data center, workplace, and home. With proper administrative knowledge, vigilance, and tools, systems running Linux can be both fully functional and secured from most common intrusion and exploit methods.</content>
-    <link type="application/epub+zip" rel="http://opds-spec.org/acquisition" href="http://docs.fedoraproject.org/nl-NL/Fedora/19/epub/Security_Guide/Fedora-19-Security_Guide-nl-NL.epub">
+    <link type="application/epub+zip" rel="http://opds-spec.org/acquisition" href="http://docs.fedoraproject.org/en-US/Fedora/19/epub/Security_Guide/Fedora-19-Security_Guide-en-US.epub">
       <dc:format>application/epub+zip</dc:format>
     </link>      
     <!--link type="application/atom+xml;type=entry" href="" rel="alternate" title="Full entry"/-->
diff --git a/public_html/nl-NL/opds-Fedora_Contributor_Documentation.xml b/public_html/nl-NL/opds-Fedora_Contributor_Documentation.xml
index 66ff65f..60afc63 100644
--- a/public_html/nl-NL/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/nl-NL/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/nl-NL/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/nl-NL/opds-Fedora_Core.xml b/public_html/nl-NL/opds-Fedora_Core.xml
index 95f72df..9244b2a 100644
--- a/public_html/nl-NL/opds-Fedora_Core.xml
+++ b/public_html/nl-NL/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/nl-NL/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/nl-NL/opds-Fedora_Documentation.xml b/public_html/nl-NL/opds-Fedora_Documentation.xml
index 848b2ac..d39c962 100644
--- a/public_html/nl-NL/opds-Fedora_Documentation.xml
+++ b/public_html/nl-NL/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/nl-NL/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/nl-NL/opds-Fedora_Draft_Documentation.xml b/public_html/nl-NL/opds-Fedora_Draft_Documentation.xml
index afda699..4af7e42 100644
--- a/public_html/nl-NL/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/nl-NL/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/nl-NL/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/nl-NL/opds-Fedora_Security_Team.xml b/public_html/nl-NL/opds-Fedora_Security_Team.xml
index 40b414a..2da3196 100644
--- a/public_html/nl-NL/opds-Fedora_Security_Team.xml
+++ b/public_html/nl-NL/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/nl-NL/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/nl-NL/opds.xml b/public_html/nl-NL/opds.xml
index 09ae666..ecdd604 100644
--- a/public_html/nl-NL/opds.xml
+++ b/public_html/nl-NL/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/nl-NL/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:49</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/nl-NL/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>nl-NL</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/nl-NL/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>nl-NL</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/nl-NL/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>nl-NL</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/nl-NL/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>nl-NL</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/nl-NL/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>nl-NL</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/nl-NL/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>nl-NL</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/nl-NL/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>nl-NL</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/nl-NL/toc.html b/public_html/nl-NL/toc.html
index 5a27b0d..0335bb2 100644
--- a/public_html/nl-NL/toc.html
+++ b/public_html/nl-NL/toc.html
@@ -134,15 +134,6 @@
 							<a class="type" href="./Fedora/19/pdf/Release_Notes/Fedora-19-Release_Notes-nl-NL.pdf" onclick="window.top.location='./Fedora/19/pdf/Release_Notes/Fedora-19-Release_Notes-nl-NL.pdf';return false;">pdf</a>
 						</div>
 					</div>
-					<div id='Fedora.19.Security_Guide' class="book collapsed">
-						<a class="type" href="Fedora/19/html/Security_Guide/index.html" onclick="window.top.location='./Fedora/19/html/Security_Guide/index.html'"><span class="book">Beveiligingsgids</span></a> 
-						<div id='Fedora.19.Security_Guide.types' class="types" onclick="work=0;">
-							<a class="type" href="./Fedora/19/epub/Security_Guide/Fedora-19-Security_Guide-nl-NL.epub" >epub</a>
-							<a class="type" href="./Fedora/19/html/Security_Guide/index.html" onclick="window.top.location='./Fedora/19/html/Security_Guide/index.html';return false;">html</a>
-							<a class="type" href="./Fedora/19/html-single/Security_Guide/index.html" onclick="window.top.location='./Fedora/19/html-single/Security_Guide/index.html';return false;">html-single</a>
-							<a class="type" href="./Fedora/19/pdf/Security_Guide/Fedora-19-Security_Guide-nl-NL.pdf" onclick="window.top.location='./Fedora/19/pdf/Security_Guide/Fedora-19-Security_Guide-nl-NL.pdf';return false;">pdf</a>
-						</div>
-					</div>
 					<div id='Fedora.19' class="version collapsed untranslated" onclick="toggle(event, 'Fedora.19.untrans_books');">
 						<span class="version">Onvertaald</span>
 						<div id='Fedora.19.untrans_books' class="books hidden">
@@ -182,6 +173,15 @@
 									<a class="type" href="../en-US/./Fedora/19/pdf/Power_Management_Guide/Fedora-19-Power_Management_Guide-en-US.pdf" onclick="window.top.location='../en-US/./Fedora/19/pdf/Power_Management_Guide/Fedora-19-Power_Management_Guide-en-US.pdf';return false;">pdf</a>
 								</div>
 							</div>
+							<div id='Fedora.19.Security_Guide' class="book collapsed" onclick="toggle(event, 'Fedora.19.Security_Guide.types');">
+								<a class="type" href="../en-US/Fedora/19/html/Security_Guide/index.html" onclick="window.top.location='../en-US/Fedora/19/html/Security_Guide/index.html'"><span class="book">Security Guide</span></a> 
+								<div id='Fedora.19.Security_Guide.types' class="types hidden" onclick="work=0;">
+									<a class="type" href="../en-US/./Fedora/19/epub/Security_Guide/Fedora-19-Security_Guide-en-US.epub" >epub</a>
+									<a class="type" href="../en-US/./Fedora/19/html/Security_Guide/index.html" onclick="window.top.location='../en-US/./Fedora/19/html/Security_Guide/index.html';return false;">html</a>
+									<a class="type" href="../en-US/./Fedora/19/html-single/Security_Guide/index.html" onclick="window.top.location='../en-US/./Fedora/19/html-single/Security_Guide/index.html';return false;">html-single</a>
+									<a class="type" href="../en-US/./Fedora/19/pdf/Security_Guide/Fedora-19-Security_Guide-en-US.pdf" onclick="window.top.location='../en-US/./Fedora/19/pdf/Security_Guide/Fedora-19-Security_Guide-en-US.pdf';return false;">pdf</a>
+								</div>
+							</div>
 							<div id='Fedora.19.Virtualization_Getting_Started_Guide' class="book collapsed" onclick="toggle(event, 'Fedora.19.Virtualization_Getting_Started_Guide.types');">
 								<a class="type" href="../en-US/Fedora/19/html/Virtualization_Getting_Started_Guide/index.html" onclick="window.top.location='../en-US/Fedora/19/html/Virtualization_Getting_Started_Guide/index.html'"><span class="book">Virtualization Getting Started Guide</span></a> 
 								<div id='Fedora.19.Virtualization_Getting_Started_Guide.types' class="types hidden" onclick="work=0;">
diff --git a/public_html/opds.xml b/public_html/opds.xml
index 39f1f93..07ad1fe 100644
--- a/public_html/opds.xml
+++ b/public_html/opds.xml
@@ -7,7 +7,7 @@
   <link rel="start" href="http://docs.fedoraproject.org/opds.xml" type="application/atom+xml;type=feed;profile=opds-catalog"/>
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <title>Fedora Documentation</title>
-  <updated>2013-12-13T04:03:37</updated>
+  <updated>2013-12-13T23:25:53</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -16,7 +16,7 @@
   <entry>
     <title>অসমীয়া</title>
     <id>as-IN/opds.xml</id>
-    <updated>2013-12-13T04:03:28</updated>
+    <updated>2013-12-13T23:25:44</updated>
     <dc:language>as-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="as-IN/opds.xml"/>
@@ -24,7 +24,7 @@
   <entry>
     <title>български</title>
     <id>bg-BG/opds.xml</id>
-    <updated>2013-12-13T04:03:28</updated>
+    <updated>2013-12-13T23:25:44</updated>
     <dc:language>bg-BG</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="bg-BG/opds.xml"/>
@@ -32,7 +32,7 @@
   <entry>
     <title>বাংলা</title>
     <id>bn-IN/opds.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>bn-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="bn-IN/opds.xml"/>
@@ -40,7 +40,7 @@
   <entry>
     <title>Bosanski</title>
     <id>bs-BA/opds.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>bs-BA</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="bs-BA/opds.xml"/>
@@ -48,7 +48,7 @@
   <entry>
     <title>Català</title>
     <id>ca-ES/opds.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>ca-ES</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="ca-ES/opds.xml"/>
@@ -56,7 +56,7 @@
   <entry>
     <title>Čeština</title>
     <id>cs-CZ/opds.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:45</updated>
     <dc:language>cs-CZ</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="cs-CZ/opds.xml"/>
@@ -64,7 +64,7 @@
   <entry>
     <title>Dansk</title>
     <id>da-DK/opds.xml</id>
-    <updated>2013-12-13T04:03:29</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>da-DK</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="da-DK/opds.xml"/>
@@ -72,7 +72,7 @@
   <entry>
     <title>Deutsch</title>
     <id>de-DE/opds.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>de-DE</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="de-DE/opds.xml"/>
@@ -80,7 +80,7 @@
   <entry>
     <title>Ελληνικά</title>
     <id>el-GR/opds.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>el-GR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="el-GR/opds.xml"/>
@@ -88,7 +88,7 @@
   <entry>
     <title>English</title>
     <id>en-US/opds.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>en-US</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="en-US/opds.xml"/>
@@ -96,7 +96,7 @@
   <entry>
     <title>Español</title>
     <id>es-ES/opds.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>es-ES</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="es-ES/opds.xml"/>
@@ -104,7 +104,7 @@
   <entry>
     <title>فارسی</title>
     <id>fa-IR/opds.xml</id>
-    <updated>2013-12-13T04:03:30</updated>
+    <updated>2013-12-13T23:25:46</updated>
     <dc:language>fa-IR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="fa-IR/opds.xml"/>
@@ -112,7 +112,7 @@
   <entry>
     <title>Suomi</title>
     <id>fi-FI/opds.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>fi-FI</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="fi-FI/opds.xml"/>
@@ -120,7 +120,7 @@
   <entry>
     <title>Français</title>
     <id>fr-FR/opds.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>fr-FR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="fr-FR/opds.xml"/>
@@ -128,7 +128,7 @@
   <entry>
     <title>ગુજરાતી</title>
     <id>gu-IN/opds.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>gu-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="gu-IN/opds.xml"/>
@@ -136,7 +136,7 @@
   <entry>
     <title>עברית</title>
     <id>he-IL/opds.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>he-IL</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="he-IL/opds.xml"/>
@@ -144,7 +144,7 @@
   <entry>
     <title>हिन्दी</title>
     <id>hi-IN/opds.xml</id>
-    <updated>2013-12-13T04:03:31</updated>
+    <updated>2013-12-13T23:25:47</updated>
     <dc:language>hi-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="hi-IN/opds.xml"/>
@@ -152,7 +152,7 @@
   <entry>
     <title>Magyar</title>
     <id>hu-HU/opds.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>hu-HU</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="hu-HU/opds.xml"/>
@@ -160,7 +160,7 @@
   <entry>
     <title>Interlingua (International Auxiliary Language Association)</title>
     <id>ia/opds.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>ia</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="ia/opds.xml"/>
@@ -168,7 +168,7 @@
   <entry>
     <title>Indonesia</title>
     <id>id-ID/opds.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>id-ID</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="id-ID/opds.xml"/>
@@ -176,7 +176,7 @@
   <entry>
     <title>Italiano</title>
     <id>it-IT/opds.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>it-IT</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="it-IT/opds.xml"/>
@@ -184,7 +184,7 @@
   <entry>
     <title>日本語</title>
     <id>ja-JP/opds.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:48</updated>
     <dc:language>ja-JP</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="ja-JP/opds.xml"/>
@@ -192,7 +192,7 @@
   <entry>
     <title>ಕನ್ನಡ</title>
     <id>kn-IN/opds.xml</id>
-    <updated>2013-12-13T04:03:32</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>kn-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="kn-IN/opds.xml"/>
@@ -200,7 +200,7 @@
   <entry>
     <title>한국어</title>
     <id>ko-KR/opds.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>ko-KR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="ko-KR/opds.xml"/>
@@ -208,7 +208,7 @@
   <entry>
     <title>മലയാളം</title>
     <id>ml-IN/opds.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>ml-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="ml-IN/opds.xml"/>
@@ -216,7 +216,7 @@
   <entry>
     <title>मराठी</title>
     <id>mr-IN/opds.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>mr-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="mr-IN/opds.xml"/>
@@ -224,7 +224,7 @@
   <entry>
     <title>Norsk (bokmål)</title>
     <id>nb-NO/opds.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>nb-NO</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="nb-NO/opds.xml"/>
@@ -232,7 +232,7 @@
   <entry>
     <title>Nederlands</title>
     <id>nl-NL/opds.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:49</updated>
     <dc:language>nl-NL</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="nl-NL/opds.xml"/>
@@ -240,7 +240,7 @@
   <entry>
     <title>ଓଡ଼ିଆ</title>
     <id>or-IN/opds.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>or-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="or-IN/opds.xml"/>
@@ -248,7 +248,7 @@
   <entry>
     <title>ਪੰਜਾਬੀ</title>
     <id>pa-IN/opds.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pa-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="pa-IN/opds.xml"/>
@@ -256,7 +256,7 @@
   <entry>
     <title>Polski</title>
     <id>pl-PL/opds.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pl-PL</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="pl-PL/opds.xml"/>
@@ -264,7 +264,7 @@
   <entry>
     <title>Português Brasileiro</title>
     <id>pt-BR/opds.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pt-BR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="pt-BR/opds.xml"/>
@@ -272,7 +272,7 @@
   <entry>
     <title>Português</title>
     <id>pt-PT/opds.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pt-PT</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="pt-PT/opds.xml"/>
@@ -280,7 +280,7 @@
   <entry>
     <title>Romanian</title>
     <id>ro/opds.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>ro</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="ro/opds.xml"/>
@@ -288,7 +288,7 @@
   <entry>
     <title>Русский</title>
     <id>ru-RU/opds.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>ru-RU</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="ru-RU/opds.xml"/>
@@ -296,7 +296,7 @@
   <entry>
     <title>Slovenščina</title>
     <id>sk-SK/opds.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sk-SK</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="sk-SK/opds.xml"/>
@@ -304,7 +304,7 @@
   <entry>
     <title>Srpski (latinica)</title>
     <id>sr-Latn-RS/opds.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sr-Latn-RS</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="sr-Latn-RS/opds.xml"/>
@@ -312,7 +312,7 @@
   <entry>
     <title>Српски</title>
     <id>sr-RS/opds.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sr-RS</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="sr-RS/opds.xml"/>
@@ -320,7 +320,7 @@
   <entry>
     <title>Svenska</title>
     <id>sv-SE/opds.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>sv-SE</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="sv-SE/opds.xml"/>
@@ -328,7 +328,7 @@
   <entry>
     <title>தமிழ்</title>
     <id>ta-IN/opds.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>ta-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="ta-IN/opds.xml"/>
@@ -336,7 +336,7 @@
   <entry>
     <title>తెలుగు</title>
     <id>te-IN/opds.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>te-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="te-IN/opds.xml"/>
@@ -344,7 +344,7 @@
   <entry>
     <title>Українська</title>
     <id>uk-UA/opds.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>uk-UA</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="uk-UA/opds.xml"/>
@@ -352,7 +352,7 @@
   <entry>
     <title>简体中文</title>
     <id>zh-CN/opds.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>zh-CN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="zh-CN/opds.xml"/>
@@ -360,7 +360,7 @@
   <entry>
     <title>繁體中文</title>
     <id>zh-TW/opds.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>zh-TW</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="zh-TW/opds.xml"/>
diff --git a/public_html/or-IN/Site_Statistics.html b/public_html/or-IN/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/or-IN/Site_Statistics.html
+++ b/public_html/or-IN/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/or-IN/opds-Community_Services_Infrastructure.xml b/public_html/or-IN/opds-Community_Services_Infrastructure.xml
index 0a00073..b220223 100644
--- a/public_html/or-IN/opds-Community_Services_Infrastructure.xml
+++ b/public_html/or-IN/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/or-IN/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:33</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/or-IN/opds-Fedora.xml b/public_html/or-IN/opds-Fedora.xml
index afabf9d..d283789 100644
--- a/public_html/or-IN/opds-Fedora.xml
+++ b/public_html/or-IN/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/or-IN/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/or-IN/opds-Fedora_Contributor_Documentation.xml b/public_html/or-IN/opds-Fedora_Contributor_Documentation.xml
index 43f0990..d9c53e9 100644
--- a/public_html/or-IN/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/or-IN/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/or-IN/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/or-IN/opds-Fedora_Core.xml b/public_html/or-IN/opds-Fedora_Core.xml
index c28e05a..4fa2bc3 100644
--- a/public_html/or-IN/opds-Fedora_Core.xml
+++ b/public_html/or-IN/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/or-IN/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/or-IN/opds-Fedora_Documentation.xml b/public_html/or-IN/opds-Fedora_Documentation.xml
index 7c62be4..8fc08a2 100644
--- a/public_html/or-IN/opds-Fedora_Documentation.xml
+++ b/public_html/or-IN/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/or-IN/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/or-IN/opds-Fedora_Draft_Documentation.xml b/public_html/or-IN/opds-Fedora_Draft_Documentation.xml
index 34ad301..b6b9b63 100644
--- a/public_html/or-IN/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/or-IN/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/or-IN/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/or-IN/opds-Fedora_Security_Team.xml b/public_html/or-IN/opds-Fedora_Security_Team.xml
index 12f38a7..9eff020 100644
--- a/public_html/or-IN/opds-Fedora_Security_Team.xml
+++ b/public_html/or-IN/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/or-IN/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/or-IN/opds.xml b/public_html/or-IN/opds.xml
index ce96c45..d6fa2f4 100644
--- a/public_html/or-IN/opds.xml
+++ b/public_html/or-IN/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/or-IN/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/or-IN/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:33</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>or-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/or-IN/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>or-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/or-IN/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>or-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/or-IN/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>or-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/or-IN/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>or-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/or-IN/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>or-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/or-IN/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>or-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/pa-IN/Site_Statistics.html b/public_html/pa-IN/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/pa-IN/Site_Statistics.html
+++ b/public_html/pa-IN/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/pa-IN/opds-Community_Services_Infrastructure.xml b/public_html/pa-IN/opds-Community_Services_Infrastructure.xml
index 5f2b29b..729952b 100644
--- a/public_html/pa-IN/opds-Community_Services_Infrastructure.xml
+++ b/public_html/pa-IN/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pa-IN/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pa-IN/opds-Fedora.xml b/public_html/pa-IN/opds-Fedora.xml
index b976561..185d25d 100644
--- a/public_html/pa-IN/opds-Fedora.xml
+++ b/public_html/pa-IN/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pa-IN/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pa-IN/opds-Fedora_Contributor_Documentation.xml b/public_html/pa-IN/opds-Fedora_Contributor_Documentation.xml
index 813a58f..b560233 100644
--- a/public_html/pa-IN/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/pa-IN/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pa-IN/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pa-IN/opds-Fedora_Core.xml b/public_html/pa-IN/opds-Fedora_Core.xml
index c246de5..62e3c19 100644
--- a/public_html/pa-IN/opds-Fedora_Core.xml
+++ b/public_html/pa-IN/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pa-IN/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pa-IN/opds-Fedora_Documentation.xml b/public_html/pa-IN/opds-Fedora_Documentation.xml
index 6ec16a7..4c83c79 100644
--- a/public_html/pa-IN/opds-Fedora_Documentation.xml
+++ b/public_html/pa-IN/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pa-IN/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pa-IN/opds-Fedora_Draft_Documentation.xml b/public_html/pa-IN/opds-Fedora_Draft_Documentation.xml
index cb1c90f..84d1d12 100644
--- a/public_html/pa-IN/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/pa-IN/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pa-IN/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pa-IN/opds-Fedora_Security_Team.xml b/public_html/pa-IN/opds-Fedora_Security_Team.xml
index 93339fa..1eed7b7 100644
--- a/public_html/pa-IN/opds-Fedora_Security_Team.xml
+++ b/public_html/pa-IN/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pa-IN/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pa-IN/opds.xml b/public_html/pa-IN/opds.xml
index ed194ce..19145d7 100644
--- a/public_html/pa-IN/opds.xml
+++ b/public_html/pa-IN/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/pa-IN/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/pa-IN/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pa-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/pa-IN/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pa-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/pa-IN/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pa-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/pa-IN/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pa-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/pa-IN/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pa-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/pa-IN/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pa-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/pa-IN/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pa-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/pl-PL/Site_Statistics.html b/public_html/pl-PL/Site_Statistics.html
index fe6ae5a..e463534 100644
--- a/public_html/pl-PL/Site_Statistics.html
+++ b/public_html/pl-PL/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Razem języków: </b>44<br />
-	<b>Razem pakietów: </b>893
+	<b>Razem pakietów: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/pl-PL/opds-Community_Services_Infrastructure.xml b/public_html/pl-PL/opds-Community_Services_Infrastructure.xml
index 6862917..9479b62 100644
--- a/public_html/pl-PL/opds-Community_Services_Infrastructure.xml
+++ b/public_html/pl-PL/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pl-PL/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pl-PL/opds-Fedora.xml b/public_html/pl-PL/opds-Fedora.xml
index 5276395..06ea86a 100644
--- a/public_html/pl-PL/opds-Fedora.xml
+++ b/public_html/pl-PL/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pl-PL/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pl-PL/opds-Fedora_Contributor_Documentation.xml b/public_html/pl-PL/opds-Fedora_Contributor_Documentation.xml
index 8b57a69..d710ed0 100644
--- a/public_html/pl-PL/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/pl-PL/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pl-PL/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Dokumentacja dla współtwórców Fedory</title>
   <subtitle>Dokumentacja dla współtwórców Fedory</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pl-PL/opds-Fedora_Core.xml b/public_html/pl-PL/opds-Fedora_Core.xml
index 5835f55..060715a 100644
--- a/public_html/pl-PL/opds-Fedora_Core.xml
+++ b/public_html/pl-PL/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pl-PL/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pl-PL/opds-Fedora_Documentation.xml b/public_html/pl-PL/opds-Fedora_Documentation.xml
index 7c35b1b..7a825c6 100644
--- a/public_html/pl-PL/opds-Fedora_Documentation.xml
+++ b/public_html/pl-PL/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pl-PL/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pl-PL/opds-Fedora_Draft_Documentation.xml b/public_html/pl-PL/opds-Fedora_Draft_Documentation.xml
index f0e2cb6..22694a1 100644
--- a/public_html/pl-PL/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/pl-PL/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pl-PL/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pl-PL/opds-Fedora_Security_Team.xml b/public_html/pl-PL/opds-Fedora_Security_Team.xml
index 82fbc2d..20672a3 100644
--- a/public_html/pl-PL/opds-Fedora_Security_Team.xml
+++ b/public_html/pl-PL/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pl-PL/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pl-PL/opds.xml b/public_html/pl-PL/opds.xml
index 8e7d1af..92ae820 100644
--- a/public_html/pl-PL/opds.xml
+++ b/public_html/pl-PL/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/pl-PL/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/pl-PL/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pl-PL</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/pl-PL/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pl-PL</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Dokumentacja dla współtwórców Fedory</title>
     <id>http://docs.fedoraproject.org/pl-PL/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pl-PL</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/pl-PL/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pl-PL</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/pl-PL/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pl-PL</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/pl-PL/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pl-PL</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/pl-PL/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pl-PL</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/pt-BR/Site_Statistics.html b/public_html/pt-BR/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/pt-BR/Site_Statistics.html
+++ b/public_html/pt-BR/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/pt-BR/opds-Community_Services_Infrastructure.xml b/public_html/pt-BR/opds-Community_Services_Infrastructure.xml
index 206110f..9b11b44 100644
--- a/public_html/pt-BR/opds-Community_Services_Infrastructure.xml
+++ b/public_html/pt-BR/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pt-BR/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pt-BR/opds-Fedora.xml b/public_html/pt-BR/opds-Fedora.xml
index 735c99f..a149fa9 100644
--- a/public_html/pt-BR/opds-Fedora.xml
+++ b/public_html/pt-BR/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pt-BR/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pt-BR/opds-Fedora_Contributor_Documentation.xml b/public_html/pt-BR/opds-Fedora_Contributor_Documentation.xml
index a772b82..0d412ec 100644
--- a/public_html/pt-BR/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/pt-BR/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pt-BR/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pt-BR/opds-Fedora_Core.xml b/public_html/pt-BR/opds-Fedora_Core.xml
index 4b04dd2..10576de 100644
--- a/public_html/pt-BR/opds-Fedora_Core.xml
+++ b/public_html/pt-BR/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pt-BR/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pt-BR/opds-Fedora_Documentation.xml b/public_html/pt-BR/opds-Fedora_Documentation.xml
index 91e60c6..25b6ceb 100644
--- a/public_html/pt-BR/opds-Fedora_Documentation.xml
+++ b/public_html/pt-BR/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pt-BR/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pt-BR/opds-Fedora_Draft_Documentation.xml b/public_html/pt-BR/opds-Fedora_Draft_Documentation.xml
index 4708fc2..60313d6 100644
--- a/public_html/pt-BR/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/pt-BR/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pt-BR/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pt-BR/opds-Fedora_Security_Team.xml b/public_html/pt-BR/opds-Fedora_Security_Team.xml
index ee842ce..9b33b16 100644
--- a/public_html/pt-BR/opds-Fedora_Security_Team.xml
+++ b/public_html/pt-BR/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pt-BR/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pt-BR/opds.xml b/public_html/pt-BR/opds.xml
index 13001ee..7f278df 100644
--- a/public_html/pt-BR/opds.xml
+++ b/public_html/pt-BR/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/pt-BR/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/pt-BR/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pt-BR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/pt-BR/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pt-BR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/pt-BR/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pt-BR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/pt-BR/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pt-BR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/pt-BR/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pt-BR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/pt-BR/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pt-BR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/pt-BR/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pt-BR</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/pt-PT/Site_Statistics.html b/public_html/pt-PT/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/pt-PT/Site_Statistics.html
+++ b/public_html/pt-PT/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/pt-PT/opds-Community_Services_Infrastructure.xml b/public_html/pt-PT/opds-Community_Services_Infrastructure.xml
index 8c3330c..b634f9b 100644
--- a/public_html/pt-PT/opds-Community_Services_Infrastructure.xml
+++ b/public_html/pt-PT/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pt-PT/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pt-PT/opds-Fedora.xml b/public_html/pt-PT/opds-Fedora.xml
index e3e9bbb..d7d7117 100644
--- a/public_html/pt-PT/opds-Fedora.xml
+++ b/public_html/pt-PT/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pt-PT/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pt-PT/opds-Fedora_Contributor_Documentation.xml b/public_html/pt-PT/opds-Fedora_Contributor_Documentation.xml
index 8e45d2f..7bd2f7c 100644
--- a/public_html/pt-PT/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/pt-PT/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pt-PT/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pt-PT/opds-Fedora_Core.xml b/public_html/pt-PT/opds-Fedora_Core.xml
index 3c980cd..02f9d8f 100644
--- a/public_html/pt-PT/opds-Fedora_Core.xml
+++ b/public_html/pt-PT/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pt-PT/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pt-PT/opds-Fedora_Documentation.xml b/public_html/pt-PT/opds-Fedora_Documentation.xml
index d8b9436..989894b 100644
--- a/public_html/pt-PT/opds-Fedora_Documentation.xml
+++ b/public_html/pt-PT/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pt-PT/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pt-PT/opds-Fedora_Draft_Documentation.xml b/public_html/pt-PT/opds-Fedora_Draft_Documentation.xml
index 187de37..102e62b 100644
--- a/public_html/pt-PT/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/pt-PT/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pt-PT/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pt-PT/opds-Fedora_Security_Team.xml b/public_html/pt-PT/opds-Fedora_Security_Team.xml
index 41882d3..ecfc67a 100644
--- a/public_html/pt-PT/opds-Fedora_Security_Team.xml
+++ b/public_html/pt-PT/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/pt-PT/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/pt-PT/opds.xml b/public_html/pt-PT/opds.xml
index d9284c4..cd35a68 100644
--- a/public_html/pt-PT/opds.xml
+++ b/public_html/pt-PT/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/pt-PT/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/pt-PT/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pt-PT</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/pt-PT/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pt-PT</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/pt-PT/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pt-PT</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/pt-PT/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pt-PT</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/pt-PT/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pt-PT</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/pt-PT/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pt-PT</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/pt-PT/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>pt-PT</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/ro/Site_Statistics.html b/public_html/ro/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/ro/Site_Statistics.html
+++ b/public_html/ro/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/ro/opds-Community_Services_Infrastructure.xml b/public_html/ro/opds-Community_Services_Infrastructure.xml
index 505e1ef..054155f 100644
--- a/public_html/ro/opds-Community_Services_Infrastructure.xml
+++ b/public_html/ro/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ro/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:50</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ro/opds-Fedora.xml b/public_html/ro/opds-Fedora.xml
index bfa42c4..9925178 100644
--- a/public_html/ro/opds-Fedora.xml
+++ b/public_html/ro/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ro/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ro/opds-Fedora_Contributor_Documentation.xml b/public_html/ro/opds-Fedora_Contributor_Documentation.xml
index 403ca82..c773a65 100644
--- a/public_html/ro/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/ro/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ro/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ro/opds-Fedora_Core.xml b/public_html/ro/opds-Fedora_Core.xml
index 1ec291d..0e36a78 100644
--- a/public_html/ro/opds-Fedora_Core.xml
+++ b/public_html/ro/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ro/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ro/opds-Fedora_Documentation.xml b/public_html/ro/opds-Fedora_Documentation.xml
index a8f2ac1..c2923c5 100644
--- a/public_html/ro/opds-Fedora_Documentation.xml
+++ b/public_html/ro/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ro/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ro/opds-Fedora_Draft_Documentation.xml b/public_html/ro/opds-Fedora_Draft_Documentation.xml
index 2c02020..c8706ad 100644
--- a/public_html/ro/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/ro/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ro/opds-Fedora_Draft_Documentation.xml</id>
   <title>Schiță Documentație Fedora</title>
   <subtitle>Schiță Documentație Fedora</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ro/opds-Fedora_Security_Team.xml b/public_html/ro/opds-Fedora_Security_Team.xml
index 23424ce..9a7dd23 100644
--- a/public_html/ro/opds-Fedora_Security_Team.xml
+++ b/public_html/ro/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ro/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:34</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ro/opds.xml b/public_html/ro/opds.xml
index 20d35aa..12dfb1e 100644
--- a/public_html/ro/opds.xml
+++ b/public_html/ro/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/ro/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/ro/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:50</updated>
     <dc:language>ro</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/ro/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>ro</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/ro/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>ro</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/ro/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>ro</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/ro/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>ro</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Schiță Documentație Fedora</title>
     <id>http://docs.fedoraproject.org/ro/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>ro</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/ro/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:34</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>ro</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/ru-RU/Site_Statistics.html b/public_html/ru-RU/Site_Statistics.html
index 12c5dc6..54bc913 100644
--- a/public_html/ru-RU/Site_Statistics.html
+++ b/public_html/ru-RU/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Всего языков: </b>44<br />
-	<b>Всего пакетов: </b>893
+	<b>Всего пакетов: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/ru-RU/opds-Community_Services_Infrastructure.xml b/public_html/ru-RU/opds-Community_Services_Infrastructure.xml
index dc99b2e..c7e33a7 100644
--- a/public_html/ru-RU/opds-Community_Services_Infrastructure.xml
+++ b/public_html/ru-RU/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ru-RU/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ru-RU/opds-Fedora.xml b/public_html/ru-RU/opds-Fedora.xml
index 08cc1ca..f6a2faf 100644
--- a/public_html/ru-RU/opds-Fedora.xml
+++ b/public_html/ru-RU/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ru-RU/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ru-RU/opds-Fedora_Contributor_Documentation.xml b/public_html/ru-RU/opds-Fedora_Contributor_Documentation.xml
index d53df6f..980a3b9 100644
--- a/public_html/ru-RU/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/ru-RU/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ru-RU/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Документация участника Fedora</title>
   <subtitle>Документация участника Fedora</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ru-RU/opds-Fedora_Core.xml b/public_html/ru-RU/opds-Fedora_Core.xml
index 7a46f20..686796e 100644
--- a/public_html/ru-RU/opds-Fedora_Core.xml
+++ b/public_html/ru-RU/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ru-RU/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ru-RU/opds-Fedora_Documentation.xml b/public_html/ru-RU/opds-Fedora_Documentation.xml
index 0d7e8f3..344e41b 100644
--- a/public_html/ru-RU/opds-Fedora_Documentation.xml
+++ b/public_html/ru-RU/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ru-RU/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ru-RU/opds-Fedora_Draft_Documentation.xml b/public_html/ru-RU/opds-Fedora_Draft_Documentation.xml
index 3a6f373..639eb98 100644
--- a/public_html/ru-RU/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/ru-RU/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ru-RU/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ru-RU/opds-Fedora_Security_Team.xml b/public_html/ru-RU/opds-Fedora_Security_Team.xml
index 93b86fa..2baaabb 100644
--- a/public_html/ru-RU/opds-Fedora_Security_Team.xml
+++ b/public_html/ru-RU/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ru-RU/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ru-RU/opds.xml b/public_html/ru-RU/opds.xml
index bb1b981..6df3dd6 100644
--- a/public_html/ru-RU/opds.xml
+++ b/public_html/ru-RU/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/ru-RU/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/ru-RU/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>ru-RU</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/ru-RU/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>ru-RU</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Документация участника Fedora</title>
     <id>http://docs.fedoraproject.org/ru-RU/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>ru-RU</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/ru-RU/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>ru-RU</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/ru-RU/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>ru-RU</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/ru-RU/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>ru-RU</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/ru-RU/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>ru-RU</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/sk-SK/Site_Statistics.html b/public_html/sk-SK/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/sk-SK/Site_Statistics.html
+++ b/public_html/sk-SK/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/sk-SK/opds-Community_Services_Infrastructure.xml b/public_html/sk-SK/opds-Community_Services_Infrastructure.xml
index 6f94c79..d05dd1f 100644
--- a/public_html/sk-SK/opds-Community_Services_Infrastructure.xml
+++ b/public_html/sk-SK/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sk-SK/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sk-SK/opds-Fedora.xml b/public_html/sk-SK/opds-Fedora.xml
index 9bc0126..385a4c0 100644
--- a/public_html/sk-SK/opds-Fedora.xml
+++ b/public_html/sk-SK/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sk-SK/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sk-SK/opds-Fedora_Contributor_Documentation.xml b/public_html/sk-SK/opds-Fedora_Contributor_Documentation.xml
index 9f96c8b..433552c 100644
--- a/public_html/sk-SK/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/sk-SK/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sk-SK/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sk-SK/opds-Fedora_Core.xml b/public_html/sk-SK/opds-Fedora_Core.xml
index f1a203e..156af49 100644
--- a/public_html/sk-SK/opds-Fedora_Core.xml
+++ b/public_html/sk-SK/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sk-SK/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sk-SK/opds-Fedora_Documentation.xml b/public_html/sk-SK/opds-Fedora_Documentation.xml
index 7601eba..cfe71cc 100644
--- a/public_html/sk-SK/opds-Fedora_Documentation.xml
+++ b/public_html/sk-SK/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sk-SK/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sk-SK/opds-Fedora_Draft_Documentation.xml b/public_html/sk-SK/opds-Fedora_Draft_Documentation.xml
index 546fd5f..93c3473 100644
--- a/public_html/sk-SK/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/sk-SK/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sk-SK/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sk-SK/opds-Fedora_Security_Team.xml b/public_html/sk-SK/opds-Fedora_Security_Team.xml
index fd25fb6..1703d16 100644
--- a/public_html/sk-SK/opds-Fedora_Security_Team.xml
+++ b/public_html/sk-SK/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sk-SK/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sk-SK/opds.xml b/public_html/sk-SK/opds.xml
index a8d00fd..7b456fb 100644
--- a/public_html/sk-SK/opds.xml
+++ b/public_html/sk-SK/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/sk-SK/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/sk-SK/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sk-SK</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/sk-SK/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sk-SK</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/sk-SK/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sk-SK</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/sk-SK/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sk-SK</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/sk-SK/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sk-SK</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/sk-SK/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sk-SK</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/sk-SK/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sk-SK</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/sr-Latn-RS/Site_Statistics.html b/public_html/sr-Latn-RS/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/sr-Latn-RS/Site_Statistics.html
+++ b/public_html/sr-Latn-RS/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/sr-Latn-RS/opds-Community_Services_Infrastructure.xml b/public_html/sr-Latn-RS/opds-Community_Services_Infrastructure.xml
index ee450b4..bdb9dba 100644
--- a/public_html/sr-Latn-RS/opds-Community_Services_Infrastructure.xml
+++ b/public_html/sr-Latn-RS/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sr-Latn-RS/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sr-Latn-RS/opds-Fedora.xml b/public_html/sr-Latn-RS/opds-Fedora.xml
index a7e55fb..28ca81d 100644
--- a/public_html/sr-Latn-RS/opds-Fedora.xml
+++ b/public_html/sr-Latn-RS/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sr-Latn-RS/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sr-Latn-RS/opds-Fedora_Contributor_Documentation.xml b/public_html/sr-Latn-RS/opds-Fedora_Contributor_Documentation.xml
index 171728d..3d5bd0e 100644
--- a/public_html/sr-Latn-RS/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/sr-Latn-RS/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sr-Latn-RS/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sr-Latn-RS/opds-Fedora_Core.xml b/public_html/sr-Latn-RS/opds-Fedora_Core.xml
index 17d62ca..716d29a 100644
--- a/public_html/sr-Latn-RS/opds-Fedora_Core.xml
+++ b/public_html/sr-Latn-RS/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sr-Latn-RS/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sr-Latn-RS/opds-Fedora_Documentation.xml b/public_html/sr-Latn-RS/opds-Fedora_Documentation.xml
index 9f9d576..18ec8f3 100644
--- a/public_html/sr-Latn-RS/opds-Fedora_Documentation.xml
+++ b/public_html/sr-Latn-RS/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sr-Latn-RS/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sr-Latn-RS/opds-Fedora_Draft_Documentation.xml b/public_html/sr-Latn-RS/opds-Fedora_Draft_Documentation.xml
index cb19dc9..9466715 100644
--- a/public_html/sr-Latn-RS/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/sr-Latn-RS/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sr-Latn-RS/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sr-Latn-RS/opds-Fedora_Security_Team.xml b/public_html/sr-Latn-RS/opds-Fedora_Security_Team.xml
index 827be5b..391fcff 100644
--- a/public_html/sr-Latn-RS/opds-Fedora_Security_Team.xml
+++ b/public_html/sr-Latn-RS/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sr-Latn-RS/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sr-Latn-RS/opds.xml b/public_html/sr-Latn-RS/opds.xml
index 03bc557..7e1dd81 100644
--- a/public_html/sr-Latn-RS/opds.xml
+++ b/public_html/sr-Latn-RS/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/sr-Latn-RS/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/sr-Latn-RS/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sr-Latn-RS</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/sr-Latn-RS/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sr-Latn-RS</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/sr-Latn-RS/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sr-Latn-RS</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/sr-Latn-RS/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sr-Latn-RS</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/sr-Latn-RS/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sr-Latn-RS</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/sr-Latn-RS/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sr-Latn-RS</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/sr-Latn-RS/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sr-Latn-RS</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/sr-RS/Site_Statistics.html b/public_html/sr-RS/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/sr-RS/Site_Statistics.html
+++ b/public_html/sr-RS/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/sr-RS/opds-Community_Services_Infrastructure.xml b/public_html/sr-RS/opds-Community_Services_Infrastructure.xml
index bad4a0c..ae9f379 100644
--- a/public_html/sr-RS/opds-Community_Services_Infrastructure.xml
+++ b/public_html/sr-RS/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sr-RS/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sr-RS/opds-Fedora.xml b/public_html/sr-RS/opds-Fedora.xml
index aa19608..7336ae6 100644
--- a/public_html/sr-RS/opds-Fedora.xml
+++ b/public_html/sr-RS/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sr-RS/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sr-RS/opds-Fedora_Contributor_Documentation.xml b/public_html/sr-RS/opds-Fedora_Contributor_Documentation.xml
index 7ef23d9..5173701 100644
--- a/public_html/sr-RS/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/sr-RS/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sr-RS/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sr-RS/opds-Fedora_Core.xml b/public_html/sr-RS/opds-Fedora_Core.xml
index b083f2c..f846406 100644
--- a/public_html/sr-RS/opds-Fedora_Core.xml
+++ b/public_html/sr-RS/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sr-RS/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sr-RS/opds-Fedora_Documentation.xml b/public_html/sr-RS/opds-Fedora_Documentation.xml
index 0d53ee9..4ef578c 100644
--- a/public_html/sr-RS/opds-Fedora_Documentation.xml
+++ b/public_html/sr-RS/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sr-RS/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sr-RS/opds-Fedora_Draft_Documentation.xml b/public_html/sr-RS/opds-Fedora_Draft_Documentation.xml
index fba5e79..9a8732e 100644
--- a/public_html/sr-RS/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/sr-RS/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sr-RS/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sr-RS/opds-Fedora_Security_Team.xml b/public_html/sr-RS/opds-Fedora_Security_Team.xml
index 3422e31..29c1a6f 100644
--- a/public_html/sr-RS/opds-Fedora_Security_Team.xml
+++ b/public_html/sr-RS/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sr-RS/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sr-RS/opds.xml b/public_html/sr-RS/opds.xml
index 35f1ba4..a88d92c 100644
--- a/public_html/sr-RS/opds.xml
+++ b/public_html/sr-RS/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/sr-RS/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/sr-RS/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sr-RS</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/sr-RS/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sr-RS</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/sr-RS/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sr-RS</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/sr-RS/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sr-RS</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/sr-RS/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sr-RS</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/sr-RS/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sr-RS</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/sr-RS/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sr-RS</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/sv-SE/Site_Statistics.html b/public_html/sv-SE/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/sv-SE/Site_Statistics.html
+++ b/public_html/sv-SE/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/sv-SE/opds-Community_Services_Infrastructure.xml b/public_html/sv-SE/opds-Community_Services_Infrastructure.xml
index 528c302..9ceb326 100644
--- a/public_html/sv-SE/opds-Community_Services_Infrastructure.xml
+++ b/public_html/sv-SE/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sv-SE/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sv-SE/opds-Fedora.xml b/public_html/sv-SE/opds-Fedora.xml
index 3c72db5..10befa3 100644
--- a/public_html/sv-SE/opds-Fedora.xml
+++ b/public_html/sv-SE/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sv-SE/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sv-SE/opds-Fedora_Contributor_Documentation.xml b/public_html/sv-SE/opds-Fedora_Contributor_Documentation.xml
index 1a84dd4..f1329af 100644
--- a/public_html/sv-SE/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/sv-SE/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sv-SE/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sv-SE/opds-Fedora_Core.xml b/public_html/sv-SE/opds-Fedora_Core.xml
index 322663f..6a97dbd 100644
--- a/public_html/sv-SE/opds-Fedora_Core.xml
+++ b/public_html/sv-SE/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sv-SE/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sv-SE/opds-Fedora_Documentation.xml b/public_html/sv-SE/opds-Fedora_Documentation.xml
index 7ba3d30..c27f6d7 100644
--- a/public_html/sv-SE/opds-Fedora_Documentation.xml
+++ b/public_html/sv-SE/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sv-SE/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sv-SE/opds-Fedora_Draft_Documentation.xml b/public_html/sv-SE/opds-Fedora_Draft_Documentation.xml
index 389e78e..b5944a9 100644
--- a/public_html/sv-SE/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/sv-SE/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sv-SE/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sv-SE/opds-Fedora_Security_Team.xml b/public_html/sv-SE/opds-Fedora_Security_Team.xml
index 4653ea1..ccac154 100644
--- a/public_html/sv-SE/opds-Fedora_Security_Team.xml
+++ b/public_html/sv-SE/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/sv-SE/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:51</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/sv-SE/opds.xml b/public_html/sv-SE/opds.xml
index 054307f..6dcf31c 100644
--- a/public_html/sv-SE/opds.xml
+++ b/public_html/sv-SE/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/sv-SE/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/sv-SE/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sv-SE</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/sv-SE/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sv-SE</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/sv-SE/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sv-SE</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/sv-SE/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sv-SE</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/sv-SE/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sv-SE</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/sv-SE/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sv-SE</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/sv-SE/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:51</updated>
     <dc:language>sv-SE</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/ta-IN/Site_Statistics.html b/public_html/ta-IN/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/ta-IN/Site_Statistics.html
+++ b/public_html/ta-IN/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/ta-IN/opds-Community_Services_Infrastructure.xml b/public_html/ta-IN/opds-Community_Services_Infrastructure.xml
index 0278697..853d484 100644
--- a/public_html/ta-IN/opds-Community_Services_Infrastructure.xml
+++ b/public_html/ta-IN/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ta-IN/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:35</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ta-IN/opds-Fedora.xml b/public_html/ta-IN/opds-Fedora.xml
index b728fe6..bde6680 100644
--- a/public_html/ta-IN/opds-Fedora.xml
+++ b/public_html/ta-IN/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ta-IN/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ta-IN/opds-Fedora_Contributor_Documentation.xml b/public_html/ta-IN/opds-Fedora_Contributor_Documentation.xml
index 76a95fb..a0adcaa 100644
--- a/public_html/ta-IN/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/ta-IN/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ta-IN/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ta-IN/opds-Fedora_Core.xml b/public_html/ta-IN/opds-Fedora_Core.xml
index d0fa652..c535f69 100644
--- a/public_html/ta-IN/opds-Fedora_Core.xml
+++ b/public_html/ta-IN/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ta-IN/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ta-IN/opds-Fedora_Documentation.xml b/public_html/ta-IN/opds-Fedora_Documentation.xml
index f0be31c..a2ac04e 100644
--- a/public_html/ta-IN/opds-Fedora_Documentation.xml
+++ b/public_html/ta-IN/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ta-IN/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ta-IN/opds-Fedora_Draft_Documentation.xml b/public_html/ta-IN/opds-Fedora_Draft_Documentation.xml
index 01dac90..4f8ef36 100644
--- a/public_html/ta-IN/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/ta-IN/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ta-IN/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ta-IN/opds-Fedora_Security_Team.xml b/public_html/ta-IN/opds-Fedora_Security_Team.xml
index fc6fdab..e79c005 100644
--- a/public_html/ta-IN/opds-Fedora_Security_Team.xml
+++ b/public_html/ta-IN/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/ta-IN/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/ta-IN/opds.xml b/public_html/ta-IN/opds.xml
index b349152..ad26624 100644
--- a/public_html/ta-IN/opds.xml
+++ b/public_html/ta-IN/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/ta-IN/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/ta-IN/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:35</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>ta-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/ta-IN/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>ta-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/ta-IN/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>ta-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/ta-IN/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>ta-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/ta-IN/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>ta-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/ta-IN/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>ta-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/ta-IN/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>ta-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/te-IN/Site_Statistics.html b/public_html/te-IN/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/te-IN/Site_Statistics.html
+++ b/public_html/te-IN/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/te-IN/opds-Community_Services_Infrastructure.xml b/public_html/te-IN/opds-Community_Services_Infrastructure.xml
index 644c844..7ab4b6f 100644
--- a/public_html/te-IN/opds-Community_Services_Infrastructure.xml
+++ b/public_html/te-IN/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/te-IN/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/te-IN/opds-Fedora.xml b/public_html/te-IN/opds-Fedora.xml
index 63c89f1..5981827 100644
--- a/public_html/te-IN/opds-Fedora.xml
+++ b/public_html/te-IN/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/te-IN/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/te-IN/opds-Fedora_Contributor_Documentation.xml b/public_html/te-IN/opds-Fedora_Contributor_Documentation.xml
index c62f04c..b978a65 100644
--- a/public_html/te-IN/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/te-IN/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/te-IN/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/te-IN/opds-Fedora_Core.xml b/public_html/te-IN/opds-Fedora_Core.xml
index aba763d..8ea3ab0 100644
--- a/public_html/te-IN/opds-Fedora_Core.xml
+++ b/public_html/te-IN/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/te-IN/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/te-IN/opds-Fedora_Documentation.xml b/public_html/te-IN/opds-Fedora_Documentation.xml
index 83be7dc..616ea06 100644
--- a/public_html/te-IN/opds-Fedora_Documentation.xml
+++ b/public_html/te-IN/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/te-IN/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/te-IN/opds-Fedora_Draft_Documentation.xml b/public_html/te-IN/opds-Fedora_Draft_Documentation.xml
index e2f587e..b3f57eb 100644
--- a/public_html/te-IN/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/te-IN/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/te-IN/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/te-IN/opds-Fedora_Security_Team.xml b/public_html/te-IN/opds-Fedora_Security_Team.xml
index a7937a4..682e363 100644
--- a/public_html/te-IN/opds-Fedora_Security_Team.xml
+++ b/public_html/te-IN/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/te-IN/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/te-IN/opds.xml b/public_html/te-IN/opds.xml
index 3a670be..53b6af9 100644
--- a/public_html/te-IN/opds.xml
+++ b/public_html/te-IN/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/te-IN/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/te-IN/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>te-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/te-IN/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>te-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/te-IN/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>te-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/te-IN/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>te-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/te-IN/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>te-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/te-IN/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>te-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/te-IN/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>te-IN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/toc.html b/public_html/toc.html
index cea4274..3191dab 100644
--- a/public_html/toc.html
+++ b/public_html/toc.html
@@ -7423,21 +7423,6 @@
 							</div>
 						</div>
 	        			
-						<div class="book">
-							<span id="Security_Guide" class="book">セキュリティガイド</span> 
-							<div class="types">
-							
-								<a class="type" href="./ja-JP/Fedora/19/epub/Security_Guide/Fedora-19-Security_Guide-ja-JP.epub">epub</a>
-			        			
-								<a class="type" href="./ja-JP/Fedora/19/html/Security_Guide/index.html">html</a>
-			        			
-								<a class="type" href="./ja-JP/Fedora/19/html-single/Security_Guide/index.html">html-single</a>
-			        			
-								<a class="type" href="./ja-JP/Fedora/19/pdf/Security_Guide/Fedora-19-Security_Guide-ja-JP.pdf">pdf</a>
-			        			
-							</div>
-						</div>
-	        			
 					</div>				</div>												<div class="version">
 					<span class="version">18</span>					<div class="books">
 					
@@ -8840,21 +8825,6 @@
 							</div>
 						</div>
 	        			
-						<div class="book">
-							<span id="Security_Guide" class="book">Beveiligingsgids</span> 
-							<div class="types">
-							
-								<a class="type" href="./nl-NL/Fedora/19/epub/Security_Guide/Fedora-19-Security_Guide-nl-NL.epub">epub</a>
-			        			
-								<a class="type" href="./nl-NL/Fedora/19/html/Security_Guide/index.html">html</a>
-			        			
-								<a class="type" href="./nl-NL/Fedora/19/html-single/Security_Guide/index.html">html-single</a>
-			        			
-								<a class="type" href="./nl-NL/Fedora/19/pdf/Security_Guide/Fedora-19-Security_Guide-nl-NL.pdf">pdf</a>
-			        			
-							</div>
-						</div>
-	        			
 					</div>				</div>												<div class="version">
 					<span class="version">18</span>					<div class="books">
 					
diff --git a/public_html/uk-UA/Site_Statistics.html b/public_html/uk-UA/Site_Statistics.html
index 595e978..dfe0b6f 100644
--- a/public_html/uk-UA/Site_Statistics.html
+++ b/public_html/uk-UA/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Загалом мов: </b>44<br />
-	<b>Загалом пакунків: </b>893
+	<b>Загалом пакунків: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/uk-UA/opds-Community_Services_Infrastructure.xml b/public_html/uk-UA/opds-Community_Services_Infrastructure.xml
index 5a68d64..a0b9b28 100644
--- a/public_html/uk-UA/opds-Community_Services_Infrastructure.xml
+++ b/public_html/uk-UA/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/uk-UA/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/uk-UA/opds-Fedora.xml b/public_html/uk-UA/opds-Fedora.xml
index 52769a2..a55abfc 100644
--- a/public_html/uk-UA/opds-Fedora.xml
+++ b/public_html/uk-UA/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/uk-UA/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/uk-UA/opds-Fedora_Contributor_Documentation.xml b/public_html/uk-UA/opds-Fedora_Contributor_Documentation.xml
index a5e0695..bc2537e 100644
--- a/public_html/uk-UA/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/uk-UA/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/uk-UA/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Документація для учасника розробки Fedora</title>
   <subtitle>Документація для учасника розробки Fedora</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/uk-UA/opds-Fedora_Core.xml b/public_html/uk-UA/opds-Fedora_Core.xml
index 4835cba..74fa13f 100644
--- a/public_html/uk-UA/opds-Fedora_Core.xml
+++ b/public_html/uk-UA/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/uk-UA/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/uk-UA/opds-Fedora_Documentation.xml b/public_html/uk-UA/opds-Fedora_Documentation.xml
index 302582b..5691204 100644
--- a/public_html/uk-UA/opds-Fedora_Documentation.xml
+++ b/public_html/uk-UA/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/uk-UA/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/uk-UA/opds-Fedora_Draft_Documentation.xml b/public_html/uk-UA/opds-Fedora_Draft_Documentation.xml
index ac90906..9b09a69 100644
--- a/public_html/uk-UA/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/uk-UA/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/uk-UA/opds-Fedora_Draft_Documentation.xml</id>
   <title>Чернетки документації з Fedora</title>
   <subtitle>Чернетки документації з Fedora</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/uk-UA/opds-Fedora_Security_Team.xml b/public_html/uk-UA/opds-Fedora_Security_Team.xml
index 74fdf03..0fcd9d9 100644
--- a/public_html/uk-UA/opds-Fedora_Security_Team.xml
+++ b/public_html/uk-UA/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/uk-UA/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/uk-UA/opds.xml b/public_html/uk-UA/opds.xml
index 0607372..c28e3f9 100644
--- a/public_html/uk-UA/opds.xml
+++ b/public_html/uk-UA/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/uk-UA/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/uk-UA/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>uk-UA</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/uk-UA/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>uk-UA</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Документація для учасника розробки Fedora</title>
     <id>http://docs.fedoraproject.org/uk-UA/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>uk-UA</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/uk-UA/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>uk-UA</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/uk-UA/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>uk-UA</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Чернетки документації з Fedora</title>
     <id>http://docs.fedoraproject.org/uk-UA/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>uk-UA</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/uk-UA/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>uk-UA</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/zh-CN/Site_Statistics.html b/public_html/zh-CN/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/zh-CN/Site_Statistics.html
+++ b/public_html/zh-CN/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/zh-CN/opds-Community_Services_Infrastructure.xml b/public_html/zh-CN/opds-Community_Services_Infrastructure.xml
index e0207ea..0300a80 100644
--- a/public_html/zh-CN/opds-Community_Services_Infrastructure.xml
+++ b/public_html/zh-CN/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/zh-CN/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/zh-CN/opds-Fedora.xml b/public_html/zh-CN/opds-Fedora.xml
index 982df28..32edd4b 100644
--- a/public_html/zh-CN/opds-Fedora.xml
+++ b/public_html/zh-CN/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/zh-CN/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/zh-CN/opds-Fedora_Contributor_Documentation.xml b/public_html/zh-CN/opds-Fedora_Contributor_Documentation.xml
index fcd1f1a..d83d8fb 100644
--- a/public_html/zh-CN/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/zh-CN/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/zh-CN/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/zh-CN/opds-Fedora_Core.xml b/public_html/zh-CN/opds-Fedora_Core.xml
index 568d2f6..505aa0b 100644
--- a/public_html/zh-CN/opds-Fedora_Core.xml
+++ b/public_html/zh-CN/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/zh-CN/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/zh-CN/opds-Fedora_Documentation.xml b/public_html/zh-CN/opds-Fedora_Documentation.xml
index 6b4a205..d64bbf1 100644
--- a/public_html/zh-CN/opds-Fedora_Documentation.xml
+++ b/public_html/zh-CN/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/zh-CN/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/zh-CN/opds-Fedora_Draft_Documentation.xml b/public_html/zh-CN/opds-Fedora_Draft_Documentation.xml
index 08082d9..a02a53d 100644
--- a/public_html/zh-CN/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/zh-CN/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/zh-CN/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/zh-CN/opds-Fedora_Security_Team.xml b/public_html/zh-CN/opds-Fedora_Security_Team.xml
index bca8653..9a4c072 100644
--- a/public_html/zh-CN/opds-Fedora_Security_Team.xml
+++ b/public_html/zh-CN/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/zh-CN/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/zh-CN/opds.xml b/public_html/zh-CN/opds.xml
index cedd461..ba7c92b 100644
--- a/public_html/zh-CN/opds.xml
+++ b/public_html/zh-CN/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/zh-CN/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/zh-CN/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>zh-CN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/zh-CN/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>zh-CN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/zh-CN/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>zh-CN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/zh-CN/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>zh-CN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/zh-CN/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>zh-CN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/zh-CN/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>zh-CN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/zh-CN/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>zh-CN</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>
diff --git a/public_html/zh-TW/Site_Statistics.html b/public_html/zh-TW/Site_Statistics.html
index 594c516..6f7267e 100644
--- a/public_html/zh-TW/Site_Statistics.html
+++ b/public_html/zh-TW/Site_Statistics.html
@@ -46,7 +46,7 @@
 		<td>2</td>
 		<td>19</td>
 		<td>15</td>
-		<td>69</td>
+		<td>68</td>
 	</tr>
 	
 	<tr>
@@ -55,7 +55,7 @@
 		<td>5</td>
 		<td>20</td>
 		<td>18</td>
-		<td>61</td>
+		<td>60</td>
 	</tr>
 	
 	<tr>
@@ -421,7 +421,7 @@
 </table>
 <div class="totals">
 	<b>Total Languages: </b>44<br />
-	<b>Total Packages: </b>893
+	<b>Total Packages: </b>891
 </div>
 </body>
 </html>
diff --git a/public_html/zh-TW/opds-Community_Services_Infrastructure.xml b/public_html/zh-TW/opds-Community_Services_Infrastructure.xml
index 5ce923c..d0472a8 100644
--- a/public_html/zh-TW/opds-Community_Services_Infrastructure.xml
+++ b/public_html/zh-TW/opds-Community_Services_Infrastructure.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/zh-TW/opds-Community_Services_Infrastructure.xml</id>
   <title>Community Services Infrastructure</title>
   <subtitle>Community Services Infrastructure</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/zh-TW/opds-Fedora.xml b/public_html/zh-TW/opds-Fedora.xml
index 8064ff0..598c7c9 100644
--- a/public_html/zh-TW/opds-Fedora.xml
+++ b/public_html/zh-TW/opds-Fedora.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/zh-TW/opds-Fedora.xml</id>
   <title>Fedora</title>
   <subtitle>Fedora</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/zh-TW/opds-Fedora_Contributor_Documentation.xml b/public_html/zh-TW/opds-Fedora_Contributor_Documentation.xml
index 9d3c341..56c8eb4 100644
--- a/public_html/zh-TW/opds-Fedora_Contributor_Documentation.xml
+++ b/public_html/zh-TW/opds-Fedora_Contributor_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/zh-TW/opds-Fedora_Contributor_Documentation.xml</id>
   <title>Fedora Contributor Documentation</title>
   <subtitle>Fedora Contributor Documentation</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/zh-TW/opds-Fedora_Core.xml b/public_html/zh-TW/opds-Fedora_Core.xml
index 9003c98..5543b21 100644
--- a/public_html/zh-TW/opds-Fedora_Core.xml
+++ b/public_html/zh-TW/opds-Fedora_Core.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/zh-TW/opds-Fedora_Core.xml</id>
   <title>Fedora Core</title>
   <subtitle>Fedora Core</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/zh-TW/opds-Fedora_Documentation.xml b/public_html/zh-TW/opds-Fedora_Documentation.xml
index f2ae8c9..15bb1ed 100644
--- a/public_html/zh-TW/opds-Fedora_Documentation.xml
+++ b/public_html/zh-TW/opds-Fedora_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/zh-TW/opds-Fedora_Documentation.xml</id>
   <title>Fedora Documentation</title>
   <subtitle>Fedora Documentation</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/zh-TW/opds-Fedora_Draft_Documentation.xml b/public_html/zh-TW/opds-Fedora_Draft_Documentation.xml
index 797c50c..4a547d8 100644
--- a/public_html/zh-TW/opds-Fedora_Draft_Documentation.xml
+++ b/public_html/zh-TW/opds-Fedora_Draft_Documentation.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/zh-TW/opds-Fedora_Draft_Documentation.xml</id>
   <title>Fedora Draft Documentation</title>
   <subtitle>Fedora Draft Documentation</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/zh-TW/opds-Fedora_Security_Team.xml b/public_html/zh-TW/opds-Fedora_Security_Team.xml
index 8a6c57d..147e8e8 100644
--- a/public_html/zh-TW/opds-Fedora_Security_Team.xml
+++ b/public_html/zh-TW/opds-Fedora_Security_Team.xml
@@ -6,7 +6,7 @@
   <id>http://docs.fedoraproject.org/zh-TW/opds-Fedora_Security_Team.xml</id>
   <title>Fedora Security Team</title>
   <subtitle>Fedora Security Team</subtitle>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
diff --git a/public_html/zh-TW/opds.xml b/public_html/zh-TW/opds.xml
index ccc97b4..269d69b 100644
--- a/public_html/zh-TW/opds.xml
+++ b/public_html/zh-TW/opds.xml
@@ -6,7 +6,7 @@
   <link rel="http://opds-spec.org/crawlable" type="application/atom+xml" href="http://bookserver.archive.org/catalog/crawlable" title="Crawlable feed"/>
   <id>http://docs.fedoraproject.org/zh-TW/opds.xml</id>
   <title>Product List</title>
-  <updated>2013-12-13T04:03:36</updated>
+  <updated>2013-12-13T23:25:52</updated>
   <!--author>
     <name></name>
     <uri></uri>
@@ -15,7 +15,7 @@
   <entry>
     <title>Community Services Infrastructure</title>
     <id>http://docs.fedoraproject.org/zh-TW/Community_Services_Infrastructure/opds-Community_Services_Infrastructure.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>zh-TW</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Community_Services_Infrastructure.xml"/>
@@ -23,7 +23,7 @@
   <entry>
     <title>Fedora</title>
     <id>http://docs.fedoraproject.org/zh-TW/Fedora/opds-Fedora.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>zh-TW</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora.xml"/>
@@ -31,7 +31,7 @@
   <entry>
     <title>Fedora Contributor Documentation</title>
     <id>http://docs.fedoraproject.org/zh-TW/Fedora_Contributor_Documentation/opds-Fedora_Contributor_Documentation.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>zh-TW</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Contributor_Documentation.xml"/>
@@ -39,7 +39,7 @@
   <entry>
     <title>Fedora Core</title>
     <id>http://docs.fedoraproject.org/zh-TW/Fedora_Core/opds-Fedora_Core.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>zh-TW</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Core.xml"/>
@@ -47,7 +47,7 @@
   <entry>
     <title>Fedora Documentation</title>
     <id>http://docs.fedoraproject.org/zh-TW/Fedora_Documentation/opds-Fedora_Documentation.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>zh-TW</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Documentation.xml"/>
@@ -55,7 +55,7 @@
   <entry>
     <title>Fedora Draft Documentation</title>
     <id>http://docs.fedoraproject.org/zh-TW/Fedora_Draft_Documentation/opds-Fedora_Draft_Documentation.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>zh-TW</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Draft_Documentation.xml"/>
@@ -63,7 +63,7 @@
   <entry>
     <title>Fedora Security Team</title>
     <id>http://docs.fedoraproject.org/zh-TW/Fedora_Security_Team/opds-Fedora_Security_Team.xml</id>
-    <updated>2013-12-13T04:03:36</updated>
+    <updated>2013-12-13T23:25:52</updated>
     <dc:language>zh-TW</dc:language>
     <content type="text"></content>
     <link type="application/atom+xml" href="opds-Fedora_Security_Team.xml"/>


More information about the docs-commits mailing list