[web: 2/2] Merge branch 'master' of ssh://git.fedorahosted.org/git/docs/web

Rüdiger Landmann rlandmann at fedoraproject.org
Thu Jun 10 06:14:21 UTC 2010


commit c2338c243b02a0187710cc7d45e62ecbf8bbc3bb
Merge: 9916244... ca84411...
Author: Ruediger Landmann <r.landmann at redhat.com>
Date:   Thu Jun 10 14:55:43 2010 +1000

    Merge branch 'master' of ssh://git.fedorahosted.org/git/docs/web

 public_html/Sitemap                                |   16 +-
 .../Fedora-13-Security_Guide-en-US.epub            |  Bin 766167 -> 765669 bytes
 .../Security_Guide/Common_Content/css/lang.css     |    2 +
 .../13/html-single/Security_Guide/index.html       |  200 ++++++++++----------
 .../Security_Guide/Common_Content/css/lang.css     |    2 +
 ...ide-Encryption-Data_in_Motion-Secure_Shell.html |    2 +-
 ...on-Data_in_Motion-Virtual_Private_Networks.html |    2 +-
 .../Security_Guide-Encryption-Data_in_Motion.html  |    2 +-
 ...tecting_Data_at_Rest-File_Based_Encryption.html |    2 +-
 .../13/html/Security_Guide/We_Need_Feedback.html   |    2 +-
 .../Fedora/13/html/Security_Guide/apas02.html      |   42 ++--
 .../Fedora/13/html/Security_Guide/apas02s02.html   |    6 +-
 .../Fedora/13/html/Security_Guide/apas02s03.html   |    6 +-
 .../Fedora/13/html/Security_Guide/apas02s04.html   |    6 +-
 .../Fedora/13/html/Security_Guide/apas02s05.html   |    6 +-
 .../Fedora/13/html/Security_Guide/apas02s06.html   |    6 +-
 .../appe-Publican-Revision_History.html            |   10 +-
 .../chap-Security_Guide-Encryption.html            |    2 +-
 .../chap-Security_Guide-Encryption_Standards.html  |   40 ++--
 ...General_Principles_of_Information_Security.html |    4 +-
 .../chap-Security_Guide-References.html            |    2 +-
 .../chap-Security_Guide-Secure_Installation.html   |    2 +-
 .../chap-Security_Guide-Securing_Your_Network.html |   18 +-
 .../chap-Security_Guide-Security_Overview.html     |   36 ++--
 .../chap-Security_Guide-Software_Maintenance.html  |    2 +-
 .../en-US/Fedora/13/html/Security_Guide/index.html |    8 +-
 .../pref-Security_Guide-Preface.html               |    8 +-
 ...y_Guide-Additional_Resources-Related_Books.html |    2 +-
 ...Additional_Resources-Related_Documentation.html |    2 +-
 ...itional_Resources-Useful_Firewall_Websites.html |    2 +-
 ...tional_Resources-Useful_IP_Tables_Websites.html |    2 +-
 ...itional_Resources-Useful_Kerberos_Websites.html |    2 +-
 ...e-Additional_Resources-Useful_PAM_Websites.html |    2 +-
 ...nal_Resources-Useful_TCP_Wrappers_Websites.html |    2 +-
 ...Configuration_Files-Access_Control_Options.html |    2 +-
 ...tion_Files-Binding_and_Redirection_Options.html |    2 +-
 ...guration_Files-Resource_Management_Options.html |    2 +-
 ...ulnerabilities-Threats_to_Network_Security.html |    2 +-
 ...Vulnerabilities-Threats_to_Server_Security.html |    2 +-
 ...hreats_to_Workstation_and_Home_PC_Security.html |    2 +-
 ...curity_Guide-Attackers_and_Vulnerabilities.html |    2 +-
 ...figuration-Activating_the_IPTables_Service.html |    2 +-
 ...ration-Enabling_and_Disabling_the_Firewall.html |    2 +-
 ...e-Basic_Firewall_Configuration-Other_Ports.html |    2 +-
 ...Firewall_Configuration-Saving_the_Settings.html |    2 +-
 ...ic_Firewall_Configuration-Trusted_Services.html |    2 +-
 ...mmand_Options_for_IPTables-Command_Options.html |    2 +-
 ...ptions_for_IPTables-IPTables_Match_Options.html |    2 +-
 ...ns_for_IPTables-IPTables_Parameter_Options.html |    2 +-
 ...mmand_Options_for_IPTables-Listing_Options.html |    2 +-
 ...ommand_Options_for_IPTables-Target_Options.html |    2 +-
 ...Security_Guide-Common_Exploits_and_Attacks.html |    2 +-
 ...crypted_Archives-Installation-Instructions.html |    2 +-
 ...on-7_Zip_Encrypted_Archives-Things_of_note.html |    4 +-
 ..._Zip_Encrypted_Archives-Usage_Instructions.html |    2 +-
 ..._Guide-Encryption-7_Zip_Encrypted_Archives.html |    2 +-
 ...otecting_Data_at_Rest-Full_Disk_Encryption.html |    2 +-
 ...tion-Using_GPG-About_Public_Key_Encryption.html |    4 +-
 ...ryption-Using_GPG-Creating_GPG_Keys_in_KDE.html |    2 +-
 ...yption-Using_GPG-Creating_GPG_Keys_in_KDE1.html |    2 +-
 ...Encryption-Using_GPG-Using_GPG_with_Alpine.html |    2 +-
 ..._GPG_with_Evolution-Signing_and_Encrypting.html |    2 +-
 ...ing_GPG-Using_GPG_with_Evolution-Verifying.html |    2 +-
 ...ryption-Using_GPG-Using_GPG_with_Evolution.html |    2 +-
 ...ption-Using_GPG-Using_GPG_with_Thunderbird.html |    4 +-
 .../sect-Security_Guide-Encryption-Using_GPG.html  |    2 +-
 ...g_the_Tools-Anticipating_Your_Future_Needs.html |    2 +-
 ...Security_Guide-Evaluating_the_Tools-Nessus.html |    2 +-
 ...-Security_Guide-Evaluating_the_Tools-Nikto.html |    2 +-
 ...uide-Evaluating_the_Tools-VLAD_the_Scanner.html |    2 +-
 ...de-FORWARD_and_NAT_Rules-DMZs_and_IPTables.html |    2 +-
 ...ity_Guide-FORWARD_and_NAT_Rules-Prerouting.html |    2 +-
 ...urity_Guide-Firewalls-Additional_Resources.html |    2 +-
 ...ide-Firewalls-Basic_Firewall_Configuration.html |    2 +-
 ..._Guide-Firewalls-Common_IPTables_Filtering.html |    2 +-
 ...rity_Guide-Firewalls-FORWARD_and_NAT_Rules.html |    2 +-
 ...Firewalls-IPTables_and_Connection_Tracking.html |    2 +-
 .../sect-Security_Guide-Firewalls-IPv6.html        |    2 +-
 ...alicious_Software_and_Spoofed_IP_Addresses.html |    2 +-
 ...ct-Security_Guide-Firewalls-Using_IPTables.html |    2 +-
 .../sect-Security_Guide-Firewalls.html             |    2 +-
 ...curity_Guide-IPTables-Additional_Resources.html |    2 +-
 ...uide-IPTables-Command_Options_for_IPTables.html |    2 +-
 ...ty_Guide-IPTables-IPTables_Control_Scripts.html |    2 +-
 ...-Security_Guide-IPTables-IPTables_and_IPv6.html |    2 +-
 ...urity_Guide-IPTables-Saving_IPTables_Rules.html |    2 +-
 .../sect-Security_Guide-IPTables.html              |    2 +-
 ...ch_Options-Additional_Match_Option_Modules.html |    2 +-
 ...Guide-IPTables_Match_Options-ICMP_Protocol.html |    2 +-
 ..._Guide-IPTables_Match_Options-UDP_Protocol.html |    2 +-
 ...on-Manual_IPsec_Host_to_Host_Configuration.html |    2 +-
 ...ual_IPsec_Network_to_Network_Configuration.html |    2 +-
 ...curity_Guide-Kerberos-Additional_Resources.html |    2 +-
 ...e-Kerberos-Configuring_a_Kerberos_5_Client.html |    2 +-
 ...e-Kerberos-Configuring_a_Kerberos_5_Server.html |    2 +-
 ...ity_Guide-Kerberos-Domain_to_Realm_Mapping.html |    2 +-
 ...Security_Guide-Kerberos-How_Kerberos_Works.html |    2 +-
 ...curity_Guide-Kerberos-Kerberos_Terminology.html |    2 +-
 ...t-Security_Guide-Kerberos-Kerberos_and_PAM.html |    2 +-
 ...eros-Setting_Up_Cross_Realm_Authentication.html |    2 +-
 ...y_Guide-Kerberos-Setting_Up_Secondary_KDCs.html |    2 +-
 .../sect-Security_Guide-Kerberos.html              |    6 +-
 ...ide-LUKS_Disk_Encryption-Links_of_Interest.html |    2 +-
 ...ting_Directories-Step_by_Step_Instructions.html |    2 +-
 ...irectories-What_you_have_just_accomplished.html |    2 +-
 ...Encryption-Manually_Encrypting_Directories.html |    2 +-
 .../sect-Security_Guide-LUKS_Disk_Encryption.html  |    2 +-
 ...ecurity_Guide-Option_Fields-Access_Control.html |    2 +-
 ...ct-Security_Guide-Option_Fields-Expansions.html |    2 +-
 ...ecurity_Guide-Option_Fields-Shell_Commands.html |    2 +-
 ...PAM_Configuration_File_Format-Control_Flag.html |    2 +-
 ...Configuration_File_Format-Module_Arguments.html |    2 +-
 ...-PAM_Configuration_File_Format-Module_Name.html |    2 +-
 ...al_Caching-Common_pam_timestamp_Directives.html |    2 +-
 ...AM_and_Device_Ownership-Application_Access.html |    2 +-
 ...ntication_Modules_PAM-Additional_Resources.html |    2 +-
 ...ntication_Modules_PAM-Creating_PAM_Modules.html |    2 +-
 ..._Modules_PAM-PAM_Configuration_File_Format.html |    2 +-
 ...cation_Modules_PAM-PAM_Configuration_Files.html |    2 +-
 ...-PAM_and_Administrative_Credential_Caching.html |    2 +-
 ...ation_Modules_PAM-PAM_and_Device_Ownership.html |    2 +-
 ...Modules_PAM-Sample_PAM_Configuration_Files.html |    2 +-
 ...Guide-Pluggable_Authentication_Modules_PAM.html |    2 +-
 ...allation-Utilize_LUKS_Partition_Encryption.html |    2 +-
 ...curity_Guide-Securing_FTP-Anonymous_Access.html |    2 +-
 ...ing_FTP-Use_TCP_Wrappers_To_Control_Access.html |    2 +-
 ...-Security_Guide-Securing_FTP-User_Accounts.html |    2 +-
 ...Guide-Securing_NFS-Beware_of_Syntax_Errors.html |    2 +-
 ...g_NFS-Do_Not_Use_the_no_root_squash_Option.html |    2 +-
 ...de-Securing_NFS-NFS_Firewall_Configuration.html |    2 +-
 ...Assign_Static_Ports_and_Use_iptables_Rules.html |    2 +-
 ...Securing_NIS-Edit_the_varypsecurenets_File.html |    2 +-
 ...e-Securing_NIS-Use_Kerberos_Authentication.html |    2 +-
 ...Password_like_NIS_Domain_Name_and_Hostname.html |    2 +-
 ...ring_Portmap-Protect_portmap_With_iptables.html |    2 +-
 ...ty_Guide-Securing_Sendmail-Mail_only_Users.html |    2 +-
 ...y_Guide-Securing_Sendmail-NFS_and_Sendmail.html |    2 +-
 .../sect-Security_Guide-Security_Updates.html      |    2 +-
 ...ecurity_Guide-Server_Security-Securing_FTP.html |    2 +-
 ...ecurity_Guide-Server_Security-Securing_NFS.html |    2 +-
 ...ecurity_Guide-Server_Security-Securing_NIS.html |    2 +-
 ...ity_Guide-Server_Security-Securing_Portmap.html |    2 +-
 ...ty_Guide-Server_Security-Securing_Sendmail.html |    2 +-
 ...r_Security-Securing_the_Apache_HTTP_Server.html |    2 +-
 ...curity-Verifying_Which_Ports_Are_Listening.html |    2 +-
 .../sect-Security_Guide-Server_Security.html       |    2 +-
 ...onfiguring_Firefox_to_use_Kerberos_for_SSO.html |    2 +-
 ...O-Getting_Started_with_your_new_Smart_Card.html |    2 +-
 ...ign_on_SSO-How_Smart_Card_Enrollment_Works.html |    2 +-
 ...gle_Sign_on_SSO-How_Smart_Card_Login_Works.html |    2 +-
 .../sect-Security_Guide-Single_Sign_on_SSO.html    |    2 +-
 ...gned_Packages_from_Well_Known_Repositories.html |    2 +-
 ...curity_Updates-Adjusting_Automatic_Updates.html |    2 +-
 ...enance-Plan_and_Configure_Security_Updates.html |    2 +-
 ...Wrappers_Configuration_Files-Option_Fields.html |    2 +-
 ...P_Wrappers_and_xinetd-Additional_Resources.html |    2 +-
 ...nd_xinetd-TCP_Wrappers_Configuration_Files.html |    2 +-
 ...urity_Guide-TCP_Wrappers_and_xinetd-xinetd.html |    2 +-
 ...pers_and_xinetd-xinetd_Configuration_Files.html |    2 +-
 ...ect-Security_Guide-TCP_Wrappers_and_xinetd.html |    2 +-
 ...Server_Security-Inattentive_Administration.html |    6 +-
 ...rver_Security-Inherently_Insecure_Services.html |    2 +-
 ...eats_to_Server_Security-Unpatched_Services.html |    2 +-
 ...PC_Security-Vulnerable_Client_Applications.html |    2 +-
 ...ide-Updating_Packages-Applying_the_Changes.html |    2 +-
 ...dating_Packages-Installing_Signed_Packages.html |    2 +-
 ...pdating_Packages-Verifying_Signed_Packages.html |    2 +-
 ...ide-Using_IPTables-Basic_Firewall_Policies.html |    2 +-
 ...Tables-Saving_and_Restoring_IPTables_Rules.html |    2 +-
 ...Networks_VPNs-Creating_an_IPsec_Connection.html |    2 +-
 ..._Guide-Virtual_Private_Networks_VPNs-IPsec.html |    2 +-
 ...orks_VPNs-IPsec_Host_to_Host_Configuration.html |    2 +-
 ...l_Private_Networks_VPNs-IPsec_Installation.html |    2 +-
 ...PNs-IPsec_Network_to_Network_Configuration.html |    2 +-
 ...-Starting_and_Stopping_an_IPsec_Connection.html |    2 +-
 ...irtual_Private_Networks_VPNs-VPNs_and_PROD.html |    2 +-
 ...curity_Guide-Virtual_Private_Networks_VPNs.html |    2 +-
 ...Assessment-Defining_Assessment_and_Testing.html |    2 +-
 ...nerability_Assessment-Evaluating_the_Tools.html |    2 +-
 ...ct-Security_Guide-Vulnerability_Assessment.html |    2 +-
 ..._Files-Altering_xinetd_Configuration_Files.html |    2 +-
 ...figuration_Files-The_etcxinetd.d_Directory.html |    2 +-
 .../Fedora-13-Security_Guide-en-US.pdf             |  Bin 1448947 -> 1446953 bytes
 public_html/en-US/toc.html                         |    4 +-
 public_html/pt-PT/toc.html                         |    2 +-
 public_html/toc.html                               |    8 +-
 public_html/uk-UA/toc.html                         |    2 +-
 187 files changed, 391 insertions(+), 383 deletions(-)
---


More information about the docs-commits mailing list